2020-11-06 17:58:36.685 40 INFO tempest [-] Using tempest config file /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/for-deployment-c46774b6-2b57-45ff-ba6b-cb9fd0bb0e7f/tempest.conf 2020-11-06 17:58:36.687 40 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: heat 2020-11-06 17:58:36.688 40 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: keystone_tests 2020-11-06 17:58:36.688 40 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: telemetry_tests 2020-11-06 17:58:36.688 40 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: barbican_tests 2020-11-06 17:58:36.688 40 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: neutron_tests 2020-11-06 17:58:36.689 40 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: cyborg_tempest_plugin 2020-11-06 17:58:36.689 40 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: cinder_tests 2020-11-06 17:58:36.689 40 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: patrole_tests 2020-11-06 17:58:36.689 40 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: octavia-tempest-plugin 2020-11-06 17:58:36.690 40 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: heat 2020-11-06 17:58:36.690 40 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: keystone_tests 2020-11-06 17:58:36.690 40 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: telemetry_tests 2020-11-06 17:58:36.691 40 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: barbican_tests 2020-11-06 17:58:36.691 40 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: neutron_tests 2020-11-06 17:58:36.691 40 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: cyborg_tempest_plugin 2020-11-06 17:58:36.691 40 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: cinder_tests 2020-11-06 17:58:36.691 40 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: patrole_tests 2020-11-06 17:58:36.691 40 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: octavia-tempest-plugin 2020-11-06 17:58:36.692 40 DEBUG tempest [-] ******************************************************************************** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2567 2020-11-06 17:58:36.692 40 DEBUG tempest [-] Configuration options gathered from: log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2568 2020-11-06 17:58:36.692 40 DEBUG tempest [-] command line args: [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2569 2020-11-06 17:58:36.692 40 DEBUG tempest [-] config files: ['/root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/for-deployment-c46774b6-2b57-45ff-ba6b-cb9fd0bb0e7f/tempest.conf'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2570 2020-11-06 17:58:36.692 40 DEBUG tempest [-] ================================================================================ log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2572 2020-11-06 17:58:36.692 40 DEBUG tempest [-] config_dir = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.693 40 DEBUG tempest [-] config_file = ['/root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/for-deployment-c46774b6-2b57-45ff-ba6b-cb9fd0bb0e7f/tempest.conf'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.693 40 DEBUG tempest [-] config_source = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.693 40 DEBUG tempest [-] debug = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.693 40 DEBUG tempest [-] default_log_levels = ['amqp=WARN', 'amqplib=WARN', 'boto=WARN', 'qpid=WARN', 'sqlalchemy=WARN', 'suds=INFO', 'oslo.messaging=INFO', 'oslo_messaging=INFO', 'iso8601=WARN', 'requests.packages.urllib3.connectionpool=WARN', 'urllib3.connectionpool=WARN', 'websocket=WARN', 'requests.packages.urllib3.util.retry=WARN', 'urllib3.util.retry=WARN', 'keystonemiddleware=WARN', 'routes.middleware=WARN', 'stevedore=WARN', 'taskflow=WARN', 'keystoneauth=WARN', 'oslo.cache=INFO', 'oslo_policy=INFO', 'dogpile.core.dogpile=INFO'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.694 40 DEBUG tempest [-] instance_format = [instance: %(uuid)s] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.694 40 DEBUG tempest [-] instance_uuid_format = [instance: %(uuid)s] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.694 40 DEBUG tempest [-] log_config_append = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.694 40 DEBUG tempest [-] log_date_format = %Y-%m-%d %H:%M:%S log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.694 40 DEBUG tempest [-] log_dir = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.694 40 DEBUG tempest [-] log_file = /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/for-deployment-c46774b6-2b57-45ff-ba6b-cb9fd0bb0e7f/tempest.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.695 40 DEBUG tempest [-] log_rotate_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.695 40 DEBUG tempest [-] log_rotate_interval_type = days log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.695 40 DEBUG tempest [-] log_rotation_type = none log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.695 40 DEBUG tempest [-] logging_context_format_string = %(asctime)s.%(msecs)03d %(process)d %(levelname)s %(name)s [%(request_id)s %(user_identity)s] %(instance)s%(message)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.695 40 DEBUG tempest [-] logging_debug_format_suffix = %(funcName)s %(pathname)s:%(lineno)d log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.695 40 DEBUG tempest [-] logging_default_format_string = %(asctime)s.%(msecs)03d %(process)d %(levelname)s %(name)s [-] %(instance)s%(message)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.696 40 DEBUG tempest [-] logging_exception_prefix = %(asctime)s.%(msecs)03d %(process)d ERROR %(name)s %(instance)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.696 40 DEBUG tempest [-] logging_user_identity_format = %(user)s %(tenant)s %(domain)s %(user_domain)s %(project_domain)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.696 40 DEBUG tempest [-] max_logfile_count = 30 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.696 40 DEBUG tempest [-] max_logfile_size_mb = 200 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.696 40 DEBUG tempest [-] pause_teardown = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.696 40 DEBUG tempest [-] publish_errors = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.697 40 DEBUG tempest [-] rate_limit_burst = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.697 40 DEBUG tempest [-] rate_limit_except_level = CRITICAL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.697 40 DEBUG tempest [-] rate_limit_interval = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.697 40 DEBUG tempest [-] syslog_log_facility = LOG_USER log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.697 40 DEBUG tempest [-] use_eventlog = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.698 40 DEBUG tempest [-] use_journal = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.698 40 DEBUG tempest [-] use_json = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.698 40 DEBUG tempest [-] use_stderr = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.698 40 DEBUG tempest [-] use_syslog = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.698 40 DEBUG tempest [-] watch_log_file = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.698 40 DEBUG tempest [-] oslo_concurrency.disable_process_locking = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.699 40 DEBUG tempest [-] oslo_concurrency.lock_path = /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/for-deployment-c46774b6-2b57-45ff-ba6b-cb9fd0bb0e7f/lock_files log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.699 40 DEBUG tempest [-] auth.admin_domain_name = Default log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.699 40 DEBUG tempest [-] auth.admin_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.699 40 DEBUG tempest [-] auth.admin_project_name = patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.699 40 DEBUG tempest [-] auth.admin_username = patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.700 40 DEBUG tempest [-] auth.create_isolated_networks = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.700 40 DEBUG tempest [-] auth.default_credentials_domain_name = Default log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.700 40 DEBUG tempest [-] auth.tempest_roles = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.700 40 DEBUG tempest [-] auth.test_accounts_file = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.700 40 DEBUG tempest [-] auth.use_dynamic_credentials = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.700 40 DEBUG tempest [-] compute.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.701 40 DEBUG tempest [-] compute.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.701 40 DEBUG tempest [-] compute.catalog_type = compute log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.701 40 DEBUG tempest [-] compute.certified_image_ref = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.701 39 INFO tempest [-] Using tempest config file /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/for-deployment-c46774b6-2b57-45ff-ba6b-cb9fd0bb0e7f/tempest.conf 2020-11-06 17:58:36.701 40 DEBUG tempest [-] compute.certified_image_trusted_certs = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.701 40 DEBUG tempest [-] compute.compute_volume_common_az = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.702 40 DEBUG tempest [-] compute.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.702 40 DEBUG tempest [-] compute.fixed_network_name = patrole_reader-net_30048f18-b96b-4343-a720-1173982b59b8 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.702 40 DEBUG tempest [-] compute.flavor_ref = fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.702 40 DEBUG tempest [-] compute.flavor_ref_alt = a93eb10f-c417-43d8-812c-06039356e038 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.702 40 DEBUG tempest [-] compute.hypervisor_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.703 40 DEBUG tempest [-] compute.image_ref = 56b368f6-9136-40ec-a04c-564d02c95e42 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.703 40 DEBUG tempest [-] compute.image_ref_alt = de34e15c-369a-4038-89ed-d4de22d742c6 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.703 39 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: heat 2020-11-06 17:58:36.703 40 DEBUG tempest [-] compute.max_microversion = latest log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.703 40 DEBUG tempest [-] compute.min_compute_nodes = 2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.703 40 DEBUG tempest [-] compute.min_microversion = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.703 39 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: keystone_tests 2020-11-06 17:58:36.703 40 DEBUG tempest [-] compute.ready_wait = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.704 40 DEBUG tempest [-] compute.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.704 39 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: telemetry_tests 2020-11-06 17:58:36.704 40 DEBUG tempest [-] compute.shelved_offload_time = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.704 40 DEBUG tempest [-] compute.volume_device_name = sdb log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.704 39 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: barbican_tests 2020-11-06 17:58:36.704 40 DEBUG tempest [-] compute-feature-enabled.api_extensions = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.704 39 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: neutron_tests 2020-11-06 17:58:36.704 40 DEBUG tempest [-] compute-feature-enabled.attach_encrypted_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.704 39 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: cyborg_tempest_plugin 2020-11-06 17:58:36.705 39 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: cinder_tests 2020-11-06 17:58:36.705 40 WARNING oslo_config.cfg [-] Deprecated: Option "block_migrate_cinder_iscsi" from group "compute-feature-enabled" is deprecated for removal (This option duplicates the more generic [compute-feature-enabled]/block_migration _for_live_migration now that MIN_LIBVIRT_VERSION is >= 1.2.17 on all branches from stable/rocky and will be removed in a future release.). Its value may be silently ignored in the future. 2020-11-06 17:58:36.705 39 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: patrole_tests 2020-11-06 17:58:36.705 40 DEBUG tempest [-] compute-feature-enabled.block_migrate_cinder_iscsi = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.705 40 DEBUG tempest [-] compute-feature-enabled.block_migration_for_live_migration = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.705 40 DEBUG tempest [-] compute-feature-enabled.can_migrate_between_any_hosts = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.705 39 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: octavia-tempest-plugin 2020-11-06 17:58:36.706 40 DEBUG tempest [-] compute-feature-enabled.change_password = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.706 40 DEBUG tempest [-] compute-feature-enabled.cold_migration = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.706 40 DEBUG tempest [-] compute-feature-enabled.config_drive = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.706 40 DEBUG tempest [-] compute-feature-enabled.console_output = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.706 39 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: heat 2020-11-06 17:58:36.706 39 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: keystone_tests 2020-11-06 17:58:36.706 40 DEBUG tempest [-] compute-feature-enabled.disk_config = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.706 39 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: telemetry_tests 2020-11-06 17:58:36.706 40 DEBUG tempest [-] compute-feature-enabled.enable_instance_password = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.706 39 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: barbican_tests 2020-11-06 17:58:36.707 40 DEBUG tempest [-] compute-feature-enabled.interface_attach = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.707 39 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: neutron_tests 2020-11-06 17:58:36.707 39 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: cyborg_tempest_plugin 2020-11-06 17:58:36.707 40 DEBUG tempest [-] compute-feature-enabled.live_migrate_back_and_forth = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.707 39 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: cinder_tests 2020-11-06 17:58:36.707 40 DEBUG tempest [-] compute-feature-enabled.live_migration = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.707 39 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: patrole_tests 2020-11-06 17:58:36.707 40 DEBUG tempest [-] compute-feature-enabled.metadata_service = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.707 39 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: octavia-tempest-plugin 2020-11-06 17:58:36.707 40 DEBUG tempest [-] compute-feature-enabled.nova_cert = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.707 39 DEBUG tempest [-] ******************************************************************************** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2567 2020-11-06 17:58:36.707 40 DEBUG tempest [-] compute-feature-enabled.pause = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.708 39 DEBUG tempest [-] Configuration options gathered from: log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2568 2020-11-06 17:58:36.708 40 DEBUG tempest [-] compute-feature-enabled.personality = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.708 39 DEBUG tempest [-] command line args: [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2569 2020-11-06 17:58:36.708 40 WARNING oslo_config.cfg [-] Deprecated: Option "rdp_console" from group "compute-feature-enabled" is deprecated for removal (This config option is not being used in Tempest, we can add it back when adding the test cases.). Its value may be silently ignored in the future. 2020-11-06 17:58:36.708 39 DEBUG tempest [-] config files: ['/root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/for-deployment-c46774b6-2b57-45ff-ba6b-cb9fd0bb0e7f/tempest.conf'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2570 2020-11-06 17:58:36.708 39 DEBUG tempest [-] ================================================================================ log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2572 2020-11-06 17:58:36.708 40 DEBUG tempest [-] compute-feature-enabled.rdp_console = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.708 39 DEBUG tempest [-] config_dir = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.708 40 DEBUG tempest [-] compute-feature-enabled.rescue = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.708 39 DEBUG tempest [-] config_file = ['/root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/for-deployment-c46774b6-2b57-45ff-ba6b-cb9fd0bb0e7f/tempest.conf'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.708 40 DEBUG tempest [-] compute-feature-enabled.resize = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.709 39 DEBUG tempest [-] config_source = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.709 40 WARNING oslo_config.cfg [-] Deprecated: Option "scheduler_available_filters" from group "compute-feature-enabled" is deprecated. Use option "scheduler_enabled_filters" from group "compute-feature-enabled". 2020-11-06 17:58:36.709 39 DEBUG tempest [-] debug = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.709 40 DEBUG tempest [-] compute-feature-enabled.scheduler_enabled_filters = ['AvailabilityZoneFilter', 'ComputeFilter', 'ComputeCapabilitiesFilter', 'ImagePropertiesFilter', 'ServerGroupAntiAffinityFilter', 'ServerGroupAffinityFilter', 'SameHostFilter', 'DifferentHostFilter'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.709 39 DEBUG tempest [-] default_log_levels = ['amqp=WARN', 'amqplib=WARN', 'boto=WARN', 'qpid=WARN', 'sqlalchemy=WARN', 'suds=INFO', 'oslo.messaging=INFO', 'oslo_messaging=INFO', 'iso8601=WARN', 'requests.packages.urllib3.connectionpool=WARN', 'urllib3.connectionpool=WARN', 'websocket=WARN', 'requests.packages.urllib3.util.retry=WARN', 'urllib3.util.retry=WARN', 'keystonemiddleware=WARN', 'routes.middleware=WARN', 'stevedore=WARN', 'taskflow=WARN', 'keystoneauth=WARN', 'oslo.cache=INFO', 'oslo_policy=INFO', 'dogpile.core.dogpile=INFO'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.709 40 DEBUG tempest [-] compute-feature-enabled.serial_console = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.709 39 DEBUG tempest [-] instance_format = [instance: %(uuid)s] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.709 40 DEBUG tempest [-] compute-feature-enabled.shelve = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.710 39 DEBUG tempest [-] instance_uuid_format = [instance: %(uuid)s] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.710 40 DEBUG tempest [-] compute-feature-enabled.snapshot = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.710 39 DEBUG tempest [-] log_config_append = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.710 40 WARNING oslo_config.cfg [-] Deprecated: Option "spice_console" from group "compute-feature-enabled" is deprecated for removal (This config option is not being used in Tempest, we can add it back when adding the test cases.). Its value may be silently ignored in the future. 2020-11-06 17:58:36.710 39 DEBUG tempest [-] log_date_format = %Y-%m-%d %H:%M:%S log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.710 40 DEBUG tempest [-] compute-feature-enabled.spice_console = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.710 39 DEBUG tempest [-] log_dir = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.710 40 DEBUG tempest [-] compute-feature-enabled.stable_rescue = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.710 39 DEBUG tempest [-] log_file = /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/for-deployment-c46774b6-2b57-45ff-ba6b-cb9fd0bb0e7f/tempest.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.710 40 DEBUG tempest [-] compute-feature-enabled.suspend = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.710 39 DEBUG tempest [-] log_rotate_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.711 40 DEBUG tempest [-] compute-feature-enabled.swap_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.711 39 DEBUG tempest [-] log_rotate_interval_type = days log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.711 40 DEBUG tempest [-] compute-feature-enabled.vnc_console = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.711 39 DEBUG tempest [-] log_rotation_type = none log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.711 40 DEBUG tempest [-] compute-feature-enabled.vnc_server_header = WebSockify log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.711 39 DEBUG tempest [-] logging_context_format_string = %(asctime)s.%(msecs)03d %(process)d %(levelname)s %(name)s [%(request_id)s %(user_identity)s] %(instance)s%(message)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.711 40 DEBUG tempest [-] compute-feature-enabled.volume_backed_live_migration = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.711 39 DEBUG tempest [-] logging_debug_format_suffix = %(funcName)s %(pathname)s:%(lineno)d log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.711 39 DEBUG tempest [-] logging_default_format_string = %(asctime)s.%(msecs)03d %(process)d %(levelname)s %(name)s [-] %(instance)s%(message)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.711 40 DEBUG tempest [-] compute-feature-enabled.volume_multiattach = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.711 39 DEBUG tempest [-] logging_exception_prefix = %(asctime)s.%(msecs)03d %(process)d ERROR %(name)s %(instance)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.712 40 DEBUG tempest [-] compute-feature-enabled.xenapi_apis = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.712 39 DEBUG tempest [-] logging_user_identity_format = %(user)s %(tenant)s %(domain)s %(user_domain)s %(project_domain)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.712 40 DEBUG tempest [-] identity.admin_domain_scope = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.712 39 DEBUG tempest [-] max_logfile_count = 30 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.712 40 DEBUG tempest [-] identity.admin_role = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.712 39 DEBUG tempest [-] max_logfile_size_mb = 200 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.712 40 DEBUG tempest [-] identity.auth_version = v3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.712 39 DEBUG tempest [-] pause_teardown = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.712 40 DEBUG tempest [-] identity.ca_certificates_file = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.712 39 DEBUG tempest [-] publish_errors = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.712 40 DEBUG tempest [-] identity.catalog_type = identity log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.713 39 DEBUG tempest [-] rate_limit_burst = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.713 40 DEBUG tempest [-] identity.default_domain_id = default log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.713 39 DEBUG tempest [-] rate_limit_except_level = CRITICAL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.713 40 DEBUG tempest [-] identity.disable_ssl_certificate_validation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.713 39 DEBUG tempest [-] rate_limit_interval = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.713 40 DEBUG tempest [-] identity.region = RegionOne log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.713 39 DEBUG tempest [-] syslog_log_facility = LOG_USER log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.713 40 DEBUG tempest [-] identity.uri = http://172.30.13.94/identity/v2.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.713 39 DEBUG tempest [-] use_eventlog = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.713 40 DEBUG tempest [-] identity.uri_v3 = http://172.30.13.94/identity/v3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.713 39 DEBUG tempest [-] use_journal = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.714 40 DEBUG tempest [-] identity.user_lockout_duration = 10 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.714 39 DEBUG tempest [-] use_json = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.714 40 DEBUG tempest [-] identity.user_lockout_failure_attempts = 2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.714 39 DEBUG tempest [-] use_stderr = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.714 40 DEBUG tempest [-] identity.user_unique_last_password_count = 2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.714 39 DEBUG tempest [-] use_syslog = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.714 40 DEBUG tempest [-] identity.v2_admin_endpoint_type = adminURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.714 39 DEBUG tempest [-] watch_log_file = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.714 40 DEBUG tempest [-] identity.v2_public_endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.714 39 DEBUG tempest [-] oslo_concurrency.disable_process_locking = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.714 40 DEBUG tempest [-] identity.v3_endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.715 39 DEBUG tempest [-] oslo_concurrency.lock_path = /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/for-deployment-c46774b6-2b57-45ff-ba6b-cb9fd0bb0e7f/lock_files log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.715 40 DEBUG tempest [-] service-clients.http_timeout = 60 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.715 39 DEBUG tempest [-] auth.admin_domain_name = Default log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.715 40 DEBUG tempest [-] service-clients.proxy_url = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.715 39 DEBUG tempest [-] auth.admin_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.715 40 DEBUG tempest [-] identity-feature-enabled.access_rules = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.715 39 DEBUG tempest [-] auth.admin_project_name = patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.715 40 DEBUG tempest [-] identity-feature-enabled.api_extensions = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.715 39 DEBUG tempest [-] auth.admin_username = patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.715 40 WARNING oslo_config.cfg [-] Deprecated: Option "api_v2" from group "identity-feature-enabled" is deprecated for removal (The identity v2.0 API was removed in the Queens release. Tests that exercise the v2.0 API will be removed from tempest in the v22.0.0 release. They are kept only to test stable branches.). Its value may be silently ignored in the future. 2020-11-06 17:58:36.716 39 DEBUG tempest [-] auth.create_isolated_networks = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.716 40 DEBUG tempest [-] identity-feature-enabled.api_v2 = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.716 39 DEBUG tempest [-] auth.default_credentials_domain_name = Default log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.716 40 DEBUG tempest [-] identity-feature-enabled.api_v2_admin = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.716 39 DEBUG tempest [-] auth.tempest_roles = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.716 40 DEBUG tempest [-] identity-feature-enabled.api_v3 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.716 39 DEBUG tempest [-] auth.test_accounts_file = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.716 40 DEBUG tempest [-] identity-feature-enabled.application_credentials = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.716 39 DEBUG tempest [-] auth.use_dynamic_credentials = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.716 40 DEBUG tempest [-] identity-feature-enabled.domain_specific_drivers = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.716 39 DEBUG tempest [-] compute.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.717 40 DEBUG tempest [-] identity-feature-enabled.external_idp = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.717 39 DEBUG tempest [-] compute.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.717 40 DEBUG tempest [-] identity-feature-enabled.federation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.717 39 DEBUG tempest [-] compute.catalog_type = compute log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.717 40 DEBUG tempest [-] identity-feature-enabled.immutable_user_source = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.717 39 DEBUG tempest [-] compute.certified_image_ref = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.717 40 DEBUG tempest [-] identity-feature-enabled.project_tags = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.717 39 DEBUG tempest [-] compute.certified_image_trusted_certs = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.717 40 DEBUG tempest [-] identity-feature-enabled.security_compliance = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.717 39 DEBUG tempest [-] compute.compute_volume_common_az = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.717 40 DEBUG tempest [-] identity-feature-enabled.trust = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.718 39 DEBUG tempest [-] compute.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.718 40 DEBUG tempest [-] image.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.718 39 DEBUG tempest [-] compute.fixed_network_name = patrole_reader-net_30048f18-b96b-4343-a720-1173982b59b8 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.718 40 DEBUG tempest [-] image.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.718 39 DEBUG tempest [-] compute.flavor_ref = fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.718 40 DEBUG tempest [-] image.catalog_type = image log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.718 39 DEBUG tempest [-] compute.flavor_ref_alt = a93eb10f-c417-43d8-812c-06039356e038 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.718 40 DEBUG tempest [-] image.container_formats = ['ami', 'ari', 'aki', 'bare', 'ovf', 'ova'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.718 39 DEBUG tempest [-] compute.hypervisor_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.718 39 DEBUG tempest [-] compute.image_ref = 56b368f6-9136-40ec-a04c-564d02c95e42 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.718 40 DEBUG tempest [-] image.disk_formats = ['ami', 'ari', 'aki', 'vhd', 'vmdk', 'raw', 'qcow2', 'vdi', 'iso', 'vhdx'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.719 39 DEBUG tempest [-] compute.image_ref_alt = de34e15c-369a-4038-89ed-d4de22d742c6 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.719 40 DEBUG tempest [-] image.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.719 39 DEBUG tempest [-] compute.max_microversion = latest log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.719 40 DEBUG tempest [-] image.http_image = http://download.cirros-cloud.net/0.3.1/cirros-0.3.1-x86_64-uec.tar.gz log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.719 39 DEBUG tempest [-] compute.min_compute_nodes = 2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.719 40 DEBUG tempest [-] image.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.719 39 DEBUG tempest [-] compute.min_microversion = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.719 40 WARNING oslo_config.cfg [-] Deprecated: Option "api_v1" from group "image-feature-enabled" is deprecated for removal (Glance v1 APIs are deprecated and v2 APIs are current one. In future, Tempest will test v2 APIs only so this config option will be removed.). Its value may be silently ignored in the future. 2020-11-06 17:58:36.719 39 DEBUG tempest [-] compute.ready_wait = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.719 40 DEBUG tempest [-] image-feature-enabled.api_v1 = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.720 39 DEBUG tempest [-] compute.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.720 39 DEBUG tempest [-] compute.shelved_offload_time = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.720 40 WARNING oslo_config.cfg [-] Deprecated: Option "api_v2" from group "image-feature-enabled" is deprecated for removal (Glance v1 APIs are deprecated and v2 APIs are current one. In future, Tempest will test v2 APIs only so this config option will be removed.). Its value may be silently ignored in the future. 2020-11-06 17:58:36.720 39 DEBUG tempest [-] compute.volume_device_name = sdb log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.720 40 DEBUG tempest [-] image-feature-enabled.api_v2 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.720 39 DEBUG tempest [-] compute-feature-enabled.api_extensions = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.720 40 DEBUG tempest [-] image-feature-enabled.import_image = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.720 39 DEBUG tempest [-] compute-feature-enabled.attach_encrypted_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.720 40 DEBUG tempest [-] network.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.721 40 DEBUG tempest [-] network.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.721 39 WARNING oslo_config.cfg [-] Deprecated: Option "block_migrate_cinder_iscsi" from group "compute-feature-enabled" is deprecated for removal (This option duplicates the more generic [compute-feature-enabled]/block_migration _for_live_migration now that MIN_LIBVIRT_VERSION is >= 1.2.17 on all branches from stable/rocky and will be removed in a future release.). Its value may be silently ignored in the future. 2020-11-06 17:58:36.721 40 DEBUG tempest [-] network.catalog_type = network log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.721 39 DEBUG tempest [-] compute-feature-enabled.block_migrate_cinder_iscsi = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.721 40 DEBUG tempest [-] network.default_network = ['192.168.120.0/24'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.721 39 DEBUG tempest [-] compute-feature-enabled.block_migration_for_live_migration = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.721 40 DEBUG tempest [-] network.dns_servers = ['8.8.8.8', '8.8.4.4'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.721 39 DEBUG tempest [-] compute-feature-enabled.can_migrate_between_any_hosts = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.721 40 DEBUG tempest [-] network.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.721 39 DEBUG tempest [-] compute-feature-enabled.change_password = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.722 40 DEBUG tempest [-] network.floating_network_name = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.722 39 DEBUG tempest [-] compute-feature-enabled.cold_migration = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.722 40 DEBUG tempest [-] network.port_profile = {} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.722 39 DEBUG tempest [-] compute-feature-enabled.config_drive = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.722 40 DEBUG tempest [-] network.port_vnic_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.722 39 DEBUG tempest [-] compute-feature-enabled.console_output = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.722 40 DEBUG tempest [-] network.project_network_cidr = 192.168.120.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.722 39 DEBUG tempest [-] compute-feature-enabled.disk_config = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.722 40 DEBUG tempest [-] network.project_network_mask_bits = 28 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.722 39 DEBUG tempest [-] compute-feature-enabled.enable_instance_password = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.722 40 DEBUG tempest [-] network.project_network_v6_cidr = 2001:db8::/48 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.723 39 DEBUG tempest [-] compute-feature-enabled.interface_attach = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.723 40 DEBUG tempest [-] network.project_network_v6_mask_bits = 64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.722 37 INFO tempest [-] Using tempest config file /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/for-deployment-c46774b6-2b57-45ff-ba6b-cb9fd0bb0e7f/tempest.conf 2020-11-06 17:58:36.723 39 DEBUG tempest [-] compute-feature-enabled.live_migrate_back_and_forth = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.723 40 DEBUG tempest [-] network.project_networks_reachable = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.723 39 DEBUG tempest [-] compute-feature-enabled.live_migration = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.723 40 DEBUG tempest [-] network.public_network_id = 3fe4fc32-89a3-4f72-b166-6eb7100e1fea log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.723 39 DEBUG tempest [-] compute-feature-enabled.metadata_service = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.723 40 DEBUG tempest [-] network.public_router_id = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.723 39 DEBUG tempest [-] compute-feature-enabled.nova_cert = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.723 40 DEBUG tempest [-] network.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.723 40 DEBUG tempest [-] network.shared_physical_network = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.723 39 DEBUG tempest [-] compute-feature-enabled.pause = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.724 40 DEBUG tempest [-] network.subnet_id = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.724 39 DEBUG tempest [-] compute-feature-enabled.personality = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.724 39 WARNING oslo_config.cfg [-] Deprecated: Option "rdp_console" from group "compute-feature-enabled" is deprecated for removal (This config option is not being used in Tempest, we can add it back when adding the test cases.). Its value may be silently ignored in the future. 2020-11-06 17:58:36.724 40 DEBUG tempest [-] network-feature-enabled.api_extensions = ['address-group', 'address-scope', 'router-admin-state-down-before-update', 'agent', 'agent-resources-synced', 'allowed-address-pairs', 'auto-allocated-topology', 'availability_zone', 'availability_zone_filter', 'default-subnetpools', 'dhcp_agent_scheduler', 'dns-integration', 'dns-domain-ports', 'dvr', 'empty-string-filtering', 'expose-port-forwarding-in-fip', 'external-net', 'extra_dhcp_opt', 'extraroute', 'extraroute-atomic', 'filter-validation', 'floating-ip-port-forwarding-description', 'fip-port-details', 'flavors', 'floating-ip-port-forwarding', 'floatingip-pools', 'ip_allocation', 'ip-substring-filtering', 'l2_adjacency', 'router', 'ext-gw-mode', 'l3-ha', 'l3-flavors', 'l3-port-ip-change-not-allowed', 'l3_agent_scheduler', 'logging', 'multi-provider', 'net-mtu', 'net-mtu-writable', 'network_availability_zone', 'network-ip-availability', 'pagination', 'port-mac-address-regenerate', 'port-resource-request', 'binding', 'binding-extended', 'port-security', 'project-id', 'provider', 'qos', 'qos-bw-limit-direction', 'qos-bw-minimum-ingress', 'qos-default', 'qos-fip', 'qos-gateway-ip', 'qos-port-network-policy', 'qos-rule-type-details', 'qos-rules-alias', 'quotas', 'quota_details', 'rbac-policies', 'rbac-address-scope', 'rbac-security-groups', 'rbac-subnetpool', 'revision-if-match', 'standard-attr-revisions', 'router_availability_zone', 'port-security-groups-filtering', 'security-group', 'segment', 'segments-peer-subnet-host-routes', 'service-type', 'sorting', 'standard-attr-segment', 'standard-attr-description', 'stateful-security-group', 'subnet-dns-publish-fixed-ip', 'subnet_onboard', 'subnet-segmentid-writable', 'subnet-service-types', 'subnet_allocation', 'subnetpool-prefix-ops', 'standard-attr-tag', 'standard-attr-timestamp', 'trunk', 'trunk-details'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.724 39 DEBUG tempest [-] compute-feature-enabled.rdp_console = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.724 40 DEBUG tempest [-] network-feature-enabled.available_features = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.724 37 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: heat 2020-11-06 17:58:36.724 39 DEBUG tempest [-] compute-feature-enabled.rescue = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.724 40 DEBUG tempest [-] network-feature-enabled.floating_ips = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.724 39 DEBUG tempest [-] compute-feature-enabled.resize = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.725 40 DEBUG tempest [-] network-feature-enabled.ipv6 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.725 39 WARNING oslo_config.cfg [-] Deprecated: Option "scheduler_available_filters" from group "compute-feature-enabled" is deprecated. Use option "scheduler_enabled_filters" from group "compute-feature-enabled". 2020-11-06 17:58:36.725 40 DEBUG tempest [-] network-feature-enabled.ipv6_subnet_attributes = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.725 37 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: keystone_tests 2020-11-06 17:58:36.725 40 DEBUG tempest [-] network-feature-enabled.port_admin_state_change = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.725 39 DEBUG tempest [-] compute-feature-enabled.scheduler_enabled_filters = ['AvailabilityZoneFilter', 'ComputeFilter', 'ComputeCapabilitiesFilter', 'ImagePropertiesFilter', 'ServerGroupAntiAffinityFilter', 'ServerGroupAffinityFilter', 'SameHostFilter', 'DifferentHostFilter'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.725 40 DEBUG tempest [-] network-feature-enabled.port_security = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.725 39 DEBUG tempest [-] compute-feature-enabled.serial_console = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.725 37 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: telemetry_tests 2020-11-06 17:58:36.725 40 DEBUG tempest [-] network-feature-enabled.provider_net_base_segmentation_id = 3000 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.725 39 DEBUG tempest [-] compute-feature-enabled.shelve = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.726 40 DEBUG tempest [-] network-feature-enabled.qos_placement_physnet = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.726 39 DEBUG tempest [-] compute-feature-enabled.snapshot = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.726 37 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: barbican_tests 2020-11-06 17:58:36.726 40 DEBUG tempest [-] validation.auth_method = keypair log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.726 39 WARNING oslo_config.cfg [-] Deprecated: Option "spice_console" from group "compute-feature-enabled" is deprecated for removal (This config option is not being used in Tempest, we can add it back when adding the test cases.). Its value may be silently ignored in the future. 2020-11-06 17:58:36.726 40 DEBUG tempest [-] validation.connect_method = floating log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.726 37 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: neutron_tests 2020-11-06 17:58:36.726 39 DEBUG tempest [-] compute-feature-enabled.spice_console = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.726 40 DEBUG tempest [-] validation.connect_timeout = 60 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.726 37 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: cyborg_tempest_plugin 2020-11-06 17:58:36.726 39 DEBUG tempest [-] compute-feature-enabled.stable_rescue = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.726 40 DEBUG tempest [-] validation.floating_ip_range = 10.0.0.0/29 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.726 37 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: cinder_tests 2020-11-06 17:58:36.726 40 DEBUG tempest [-] validation.image_ssh_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.726 39 DEBUG tempest [-] compute-feature-enabled.suspend = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.726 37 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: patrole_tests 2020-11-06 17:58:36.727 40 DEBUG tempest [-] validation.image_ssh_user = cirros log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.727 39 DEBUG tempest [-] compute-feature-enabled.swap_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.727 40 DEBUG tempest [-] validation.ip_version_for_ssh = 4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.727 39 DEBUG tempest [-] compute-feature-enabled.vnc_console = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.727 40 DEBUG tempest [-] validation.network_for_ssh = patrole_reader-net_30048f18-b96b-4343-a720-1173982b59b8 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.727 39 DEBUG tempest [-] compute-feature-enabled.vnc_server_header = WebSockify log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.727 37 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: octavia-tempest-plugin 2020-11-06 17:58:36.727 40 DEBUG tempest [-] validation.ping_count = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.727 39 DEBUG tempest [-] compute-feature-enabled.volume_backed_live_migration = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.727 40 DEBUG tempest [-] validation.ping_size = 56 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.727 39 DEBUG tempest [-] compute-feature-enabled.volume_multiattach = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.727 40 DEBUG tempest [-] validation.ping_timeout = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.728 39 DEBUG tempest [-] compute-feature-enabled.xenapi_apis = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.728 40 DEBUG tempest [-] validation.run_validation = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.728 37 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: heat 2020-11-06 17:58:36.728 39 DEBUG tempest [-] identity.admin_domain_scope = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.728 37 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: keystone_tests 2020-11-06 17:58:36.728 40 DEBUG tempest [-] validation.security_group = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.728 39 DEBUG tempest [-] identity.admin_role = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.728 37 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: telemetry_tests 2020-11-06 17:58:36.728 40 DEBUG tempest [-] validation.security_group_rules = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.728 39 DEBUG tempest [-] identity.auth_version = v3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.728 37 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: barbican_tests 2020-11-06 17:58:36.728 40 DEBUG tempest [-] validation.ssh_shell_prologue = set -eu -o pipefail; PATH=$PATH:/sbin:/usr/sbin; log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.728 39 DEBUG tempest [-] identity.ca_certificates_file = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.728 37 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: neutron_tests 2020-11-06 17:58:36.728 40 DEBUG tempest [-] validation.ssh_timeout = 196 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.728 39 DEBUG tempest [-] identity.catalog_type = identity log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.728 37 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: cyborg_tempest_plugin 2020-11-06 17:58:36.729 40 DEBUG tempest [-] volume.backend_names = ['BACKEND_1', 'BACKEND_2'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.729 37 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: cinder_tests 2020-11-06 17:58:36.729 39 DEBUG tempest [-] identity.default_domain_id = default log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.729 40 DEBUG tempest [-] volume.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.729 37 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: patrole_tests 2020-11-06 17:58:36.729 39 DEBUG tempest [-] identity.disable_ssl_certificate_validation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.729 37 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: octavia-tempest-plugin 2020-11-06 17:58:36.729 40 DEBUG tempest [-] volume.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.729 39 DEBUG tempest [-] identity.region = RegionOne log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.729 40 DEBUG tempest [-] volume.catalog_type = volumev3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.729 39 DEBUG tempest [-] identity.uri = http://172.30.13.94/identity/v2.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.729 37 DEBUG tempest [-] ******************************************************************************** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2567 2020-11-06 17:58:36.729 40 DEBUG tempest [-] volume.disk_format = raw log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.729 39 DEBUG tempest [-] identity.uri_v3 = http://172.30.13.94/identity/v3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.729 37 DEBUG tempest [-] Configuration options gathered from: log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2568 2020-11-06 17:58:36.730 40 DEBUG tempest [-] volume.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.730 39 DEBUG tempest [-] identity.user_lockout_duration = 10 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.730 40 DEBUG tempest [-] volume.manage_snapshot_ref = ['source-name', 'snapshot-%s'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.730 37 DEBUG tempest [-] command line args: [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2569 2020-11-06 17:58:36.730 39 DEBUG tempest [-] identity.user_lockout_failure_attempts = 2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.730 40 DEBUG tempest [-] volume.manage_volume_ref = ['source-name', 'volume-%s'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.730 37 DEBUG tempest [-] config files: ['/root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/for-deployment-c46774b6-2b57-45ff-ba6b-cb9fd0bb0e7f/tempest.conf'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2570 2020-11-06 17:58:36.730 39 DEBUG tempest [-] identity.user_unique_last_password_count = 2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.730 37 DEBUG tempest [-] ================================================================================ log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2572 2020-11-06 17:58:36.730 40 DEBUG tempest [-] volume.max_microversion = latest log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.730 39 DEBUG tempest [-] identity.v2_admin_endpoint_type = adminURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.730 40 DEBUG tempest [-] volume.min_microversion = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.730 37 DEBUG tempest [-] config_dir = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.730 39 DEBUG tempest [-] identity.v2_public_endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.730 40 DEBUG tempest [-] volume.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.730 37 DEBUG tempest [-] config_file = ['/root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/for-deployment-c46774b6-2b57-45ff-ba6b-cb9fd0bb0e7f/tempest.conf'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.731 39 DEBUG tempest [-] identity.v3_endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.731 40 DEBUG tempest [-] volume.storage_protocol = ceph log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.731 37 DEBUG tempest [-] config_source = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.731 39 DEBUG tempest [-] service-clients.http_timeout = 60 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.731 37 DEBUG tempest [-] debug = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.731 40 DEBUG tempest [-] volume.vendor_name = Open Source log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.731 39 DEBUG tempest [-] service-clients.proxy_url = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.731 40 DEBUG tempest [-] volume.volume_size = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.731 37 DEBUG tempest [-] default_log_levels = ['amqp=WARN', 'amqplib=WARN', 'boto=WARN', 'qpid=WARN', 'sqlalchemy=WARN', 'suds=INFO', 'oslo.messaging=INFO', 'oslo_messaging=INFO', 'iso8601=WARN', 'requests.packages.urllib3.connectionpool=WARN', 'urllib3.connectionpool=WARN', 'websocket=WARN', 'requests.packages.urllib3.util.retry=WARN', 'urllib3.util.retry=WARN', 'keystonemiddleware=WARN', 'routes.middleware=WARN', 'stevedore=WARN', 'taskflow=WARN', 'keystoneauth=WARN', 'oslo.cache=INFO', 'oslo_policy=INFO', 'dogpile.core.dogpile=INFO'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.731 39 DEBUG tempest [-] identity-feature-enabled.access_rules = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.731 40 DEBUG tempest [-] volume-feature-enabled.api_extensions = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.731 37 DEBUG tempest [-] instance_format = [instance: %(uuid)s] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.731 39 DEBUG tempest [-] identity-feature-enabled.api_extensions = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.731 40 DEBUG tempest [-] volume-feature-enabled.api_v2 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.732 37 DEBUG tempest [-] instance_uuid_format = [instance: %(uuid)s] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.732 40 DEBUG tempest [-] volume-feature-enabled.api_v3 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.732 39 WARNING oslo_config.cfg [-] Deprecated: Option "api_v2" from group "identity-feature-enabled" is deprecated for removal (The identity v2.0 API was removed in the Queens release. Tests that exercise the v2.0 API will be removed from tempest in the v22.0.0 release. They are kept only to test stable branches.). Its value may be silently ignored in the future. 2020-11-06 17:58:36.732 37 DEBUG tempest [-] log_config_append = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.732 40 DEBUG tempest [-] volume-feature-enabled.backup = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.732 39 DEBUG tempest [-] identity-feature-enabled.api_v2 = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.732 37 DEBUG tempest [-] log_date_format = %Y-%m-%d %H:%M:%S log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.732 40 DEBUG tempest [-] volume-feature-enabled.clone = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.732 39 DEBUG tempest [-] identity-feature-enabled.api_v2_admin = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.732 37 DEBUG tempest [-] log_dir = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.732 40 DEBUG tempest [-] volume-feature-enabled.consistency_group = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.732 39 DEBUG tempest [-] identity-feature-enabled.api_v3 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.732 40 DEBUG tempest [-] volume-feature-enabled.extend_attached_encrypted_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.732 37 DEBUG tempest [-] log_file = /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/for-deployment-c46774b6-2b57-45ff-ba6b-cb9fd0bb0e7f/tempest.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.732 39 DEBUG tempest [-] identity-feature-enabled.application_credentials = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.732 40 DEBUG tempest [-] volume-feature-enabled.extend_attached_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.733 37 DEBUG tempest [-] log_rotate_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.733 39 DEBUG tempest [-] identity-feature-enabled.domain_specific_drivers = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.733 40 DEBUG tempest [-] volume-feature-enabled.manage_snapshot = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.733 37 DEBUG tempest [-] log_rotate_interval_type = days log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.733 39 DEBUG tempest [-] identity-feature-enabled.external_idp = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.733 40 DEBUG tempest [-] volume-feature-enabled.manage_volume = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.733 37 DEBUG tempest [-] log_rotation_type = none log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.733 39 DEBUG tempest [-] identity-feature-enabled.federation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.733 40 DEBUG tempest [-] volume-feature-enabled.multi_backend = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.733 37 DEBUG tempest [-] logging_context_format_string = %(asctime)s.%(msecs)03d %(process)d %(levelname)s %(name)s [%(request_id)s %(user_identity)s] %(instance)s%(message)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.733 39 DEBUG tempest [-] identity-feature-enabled.immutable_user_source = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.733 40 DEBUG tempest [-] volume-feature-enabled.snapshot = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.733 37 DEBUG tempest [-] logging_debug_format_suffix = %(funcName)s %(pathname)s:%(lineno)d log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.733 39 DEBUG tempest [-] identity-feature-enabled.project_tags = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.733 40 DEBUG tempest [-] volume-feature-enabled.volume_revert = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.733 37 DEBUG tempest [-] logging_default_format_string = %(asctime)s.%(msecs)03d %(process)d %(levelname)s %(name)s [-] %(instance)s%(message)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.734 39 DEBUG tempest [-] identity-feature-enabled.security_compliance = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.734 40 DEBUG tempest [-] object-storage.catalog_type = object-store log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.734 37 DEBUG tempest [-] logging_exception_prefix = %(asctime)s.%(msecs)03d %(process)d ERROR %(name)s %(instance)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.734 39 DEBUG tempest [-] identity-feature-enabled.trust = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.734 40 DEBUG tempest [-] object-storage.cluster_name = name1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.734 37 DEBUG tempest [-] logging_user_identity_format = %(user)s %(tenant)s %(domain)s %(user_domain)s %(project_domain)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.734 39 DEBUG tempest [-] image.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.734 40 DEBUG tempest [-] object-storage.container_sync_interval = 5 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.734 37 DEBUG tempest [-] max_logfile_count = 30 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.734 39 DEBUG tempest [-] image.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.734 40 DEBUG tempest [-] object-storage.container_sync_timeout = 600 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.734 37 DEBUG tempest [-] max_logfile_size_mb = 200 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.734 39 DEBUG tempest [-] image.catalog_type = image log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.734 40 DEBUG tempest [-] object-storage.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.734 37 DEBUG tempest [-] pause_teardown = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.735 40 DEBUG tempest [-] object-storage.operator_role = member log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.735 39 DEBUG tempest [-] image.container_formats = ['ami', 'ari', 'aki', 'bare', 'ovf', 'ova'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.735 37 DEBUG tempest [-] publish_errors = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.735 40 DEBUG tempest [-] object-storage.realm_name = realm1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.735 37 DEBUG tempest [-] rate_limit_burst = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.735 39 DEBUG tempest [-] image.disk_formats = ['ami', 'ari', 'aki', 'vhd', 'vmdk', 'raw', 'qcow2', 'vdi', 'iso', 'vhdx'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.735 40 DEBUG tempest [-] object-storage.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.735 37 DEBUG tempest [-] rate_limit_except_level = CRITICAL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.735 39 DEBUG tempest [-] image.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.735 40 DEBUG tempest [-] object-storage.reseller_admin_role = ResellerAdmin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.735 37 DEBUG tempest [-] rate_limit_interval = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.735 39 DEBUG tempest [-] image.http_image = http://download.cirros-cloud.net/0.3.1/cirros-0.3.1-x86_64-uec.tar.gz log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.735 40 DEBUG tempest [-] object-storage-feature-enabled.container_sync = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.735 37 DEBUG tempest [-] syslog_log_facility = LOG_USER log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.735 39 DEBUG tempest [-] image.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.736 40 DEBUG tempest [-] object-storage-feature-enabled.discoverability = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.736 37 DEBUG tempest [-] use_eventlog = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.736 40 DEBUG tempest [-] object-storage-feature-enabled.discoverable_apis = ['account_quotas', 'formpost', 'bulk_upload', 'bulk_delete', 'tempurl', 'crossdomain', 'container_quotas', 'staticweb', 'account_quotas', 'slo'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.736 39 WARNING oslo_config.cfg [-] Deprecated: Option "api_v1" from group "image-feature-enabled" is deprecated for removal (Glance v1 APIs are deprecated and v2 APIs are current one. In future, Tempest will test v2 APIs only so this config option will be removed.). Its value may be silently ignored in the future. 2020-11-06 17:58:36.736 37 DEBUG tempest [-] use_journal = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.736 40 DEBUG tempest [-] object-storage-feature-enabled.object_versioning = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.736 39 DEBUG tempest [-] image-feature-enabled.api_v1 = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.736 37 DEBUG tempest [-] use_json = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.736 40 DEBUG tempest [-] scenario.dhcp_client = udhcpc log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.736 37 DEBUG tempest [-] use_stderr = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.736 39 WARNING oslo_config.cfg [-] Deprecated: Option "api_v2" from group "image-feature-enabled" is deprecated for removal (Glance v1 APIs are deprecated and v2 APIs are current one. In future, Tempest will test v2 APIs only so this config option will be removed.). Its value may be silently ignored in the future. 2020-11-06 17:58:36.736 40 DEBUG tempest [-] scenario.img_container_format = bare log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.736 37 DEBUG tempest [-] use_syslog = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.736 39 DEBUG tempest [-] image-feature-enabled.api_v2 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.736 40 WARNING oslo_config.cfg [-] Deprecated: Option "img_dir" from group "scenario" is deprecated for removal. Its value may be silently ignored in the future. 2020-11-06 17:58:36.737 37 DEBUG tempest [-] watch_log_file = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.737 39 DEBUG tempest [-] image-feature-enabled.import_image = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.737 40 DEBUG tempest [-] scenario.img_dir = /home/opnfv/functest/images log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.737 37 DEBUG tempest [-] oslo_concurrency.disable_process_locking = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.737 39 DEBUG tempest [-] network.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.737 40 DEBUG tempest [-] scenario.img_disk_format = qcow2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.737 37 DEBUG tempest [-] oslo_concurrency.lock_path = /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/for-deployment-c46774b6-2b57-45ff-ba6b-cb9fd0bb0e7f/lock_files log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.737 39 DEBUG tempest [-] network.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.737 40 DEBUG tempest [-] scenario.img_file = cirros-0.4.0-x86_64-disk.img log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.737 37 DEBUG tempest [-] auth.admin_domain_name = Default log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.737 39 DEBUG tempest [-] network.catalog_type = network log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.737 40 DEBUG tempest [-] scenario.img_properties = {'hw_scsi_model': 'virtio-scsi', 'hw_disk_bus': 'scsi'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.738 37 DEBUG tempest [-] auth.admin_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.738 40 DEBUG tempest [-] scenario.protocol = icmp log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.738 39 DEBUG tempest [-] network.default_network = ['192.168.120.0/24'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.738 37 DEBUG tempest [-] auth.admin_project_name = patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.738 40 DEBUG tempest [-] service_available.aodh = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.738 39 DEBUG tempest [-] network.dns_servers = ['8.8.8.8', '8.8.4.4'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.738 37 DEBUG tempest [-] auth.admin_username = patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.738 40 DEBUG tempest [-] service_available.barbican = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.738 39 DEBUG tempest [-] network.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.738 40 DEBUG tempest [-] service_available.ceilometer = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.738 37 DEBUG tempest [-] auth.create_isolated_networks = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.738 39 DEBUG tempest [-] network.floating_network_name = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.738 40 DEBUG tempest [-] service_available.cinder = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.738 37 DEBUG tempest [-] auth.default_credentials_domain_name = Default log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.738 39 DEBUG tempest [-] network.port_profile = {} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.738 40 DEBUG tempest [-] service_available.cyborg = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.739 37 DEBUG tempest [-] auth.tempest_roles = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.739 39 DEBUG tempest [-] network.port_vnic_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.739 40 DEBUG tempest [-] service_available.glance = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.739 37 DEBUG tempest [-] auth.test_accounts_file = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.739 39 DEBUG tempest [-] network.project_network_cidr = 192.168.120.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.739 40 DEBUG tempest [-] service_available.gnocchi = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.739 39 DEBUG tempest [-] network.project_network_mask_bits = 28 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.739 37 DEBUG tempest [-] auth.use_dynamic_credentials = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.739 40 DEBUG tempest [-] service_available.heat = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.739 39 DEBUG tempest [-] network.project_network_v6_cidr = 2001:db8::/48 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.739 37 DEBUG tempest [-] compute.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.739 40 DEBUG tempest [-] service_available.load_balancer = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.739 39 DEBUG tempest [-] network.project_network_v6_mask_bits = 64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.739 40 DEBUG tempest [-] service_available.neutron = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.739 37 DEBUG tempest [-] compute.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.739 39 DEBUG tempest [-] network.project_networks_reachable = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.740 40 DEBUG tempest [-] service_available.nova = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.740 37 DEBUG tempest [-] compute.catalog_type = compute log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.740 39 DEBUG tempest [-] network.public_network_id = 3fe4fc32-89a3-4f72-b166-6eb7100e1fea log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.740 40 DEBUG tempest [-] service_available.panko = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.740 37 DEBUG tempest [-] compute.certified_image_ref = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.740 39 DEBUG tempest [-] network.public_router_id = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.740 40 DEBUG tempest [-] service_available.swift = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.740 37 DEBUG tempest [-] compute.certified_image_trusted_certs = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.740 39 DEBUG tempest [-] network.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.740 40 DEBUG tempest [-] debug.trace_requests = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.740 37 DEBUG tempest [-] compute.compute_volume_common_az = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.740 39 DEBUG tempest [-] network.shared_physical_network = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.740 40 DEBUG tempest [-] placement.catalog_type = placement log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.740 37 DEBUG tempest [-] compute.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.740 39 DEBUG tempest [-] network.subnet_id = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.740 40 DEBUG tempest [-] placement.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.740 37 DEBUG tempest [-] compute.fixed_network_name = patrole_reader-net_30048f18-b96b-4343-a720-1173982b59b8 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.741 40 DEBUG tempest [-] placement.max_microversion = latest log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.741 37 DEBUG tempest [-] compute.flavor_ref = fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.741 39 DEBUG tempest [-] network-feature-enabled.api_extensions = ['address-group', 'address-scope', 'router-admin-state-down-before-update', 'agent', 'agent-resources-synced', 'allowed-address-pairs', 'auto-allocated-topology', 'availability_zone', 'availability_zone_filter', 'default-subnetpools', 'dhcp_agent_scheduler', 'dns-integration', 'dns-domain-ports', 'dvr', 'empty-string-filtering', 'expose-port-forwarding-in-fip', 'external-net', 'extra_dhcp_opt', 'extraroute', 'extraroute-atomic', 'filter-validation', 'floating-ip-port-forwarding-description', 'fip-port-details', 'flavors', 'floating-ip-port-forwarding', 'floatingip-pools', 'ip_allocation', 'ip-substring-filtering', 'l2_adjacency', 'router', 'ext-gw-mode', 'l3-ha', 'l3-flavors', 'l3-port-ip-change-not-allowed', 'l3_agent_scheduler', 'logging', 'multi-provider', 'net-mtu', 'net-mtu-writable', 'network_availability_zone', 'network-ip-availability', 'pagination', 'port-mac-address-regenerate', 'port-resource-request', 'binding', 'binding-extended', 'port-security', 'project-id', 'provider', 'qos', 'qos-bw-limit-direction', 'qos-bw-minimum-ingress', 'qos-default', 'qos-fip', 'qos-gateway-ip', 'qos-port-network-policy', 'qos-rule-type-details', 'qos-rules-alias', 'quotas', 'quota_details', 'rbac-policies', 'rbac-address-scope', 'rbac-security-groups', 'rbac-subnetpool', 'revision-if-match', 'standard-attr-revisions', 'router_availability_zone', 'port-security-groups-filtering', 'security-group', 'segment', 'segments-peer-subnet-host-routes', 'service-type', 'sorting', 'standard-attr-segment', 'standard-attr-description', 'stateful-security-group', 'subnet-dns-publish-fixed-ip', 'subnet_onboard', 'subnet-segmentid-writable', 'subnet-service-types', 'subnet_allocation', 'subnetpool-prefix-ops', 'standard-attr-tag', 'standard-attr-timestamp', 'trunk', 'trunk-details'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.741 40 DEBUG tempest [-] placement.min_microversion = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.741 37 DEBUG tempest [-] compute.flavor_ref_alt = a93eb10f-c417-43d8-812c-06039356e038 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.741 40 DEBUG tempest [-] placement.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.741 39 DEBUG tempest [-] network-feature-enabled.available_features = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.741 37 DEBUG tempest [-] compute.hypervisor_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.741 40 DEBUG tempest [-] profiler.key = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.741 39 DEBUG tempest [-] network-feature-enabled.floating_ips = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.741 37 DEBUG tempest [-] compute.image_ref = 56b368f6-9136-40ec-a04c-564d02c95e42 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.741 40 DEBUG tempest [-] heat_plugin.admin_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.741 39 DEBUG tempest [-] network-feature-enabled.ipv6 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.742 37 DEBUG tempest [-] compute.image_ref_alt = de34e15c-369a-4038-89ed-d4de22d742c6 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.742 40 DEBUG tempest [-] heat_plugin.admin_project_name = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.742 39 DEBUG tempest [-] network-feature-enabled.ipv6_subnet_attributes = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.742 40 DEBUG tempest [-] heat_plugin.admin_username = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.742 37 DEBUG tempest [-] compute.max_microversion = latest log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.742 39 DEBUG tempest [-] network-feature-enabled.port_admin_state_change = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.742 40 DEBUG tempest [-] heat_plugin.auth_url = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.742 37 DEBUG tempest [-] compute.min_compute_nodes = 2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.742 39 DEBUG tempest [-] network-feature-enabled.port_security = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.742 40 DEBUG tempest [-] heat_plugin.auth_version = 3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.742 37 DEBUG tempest [-] compute.min_microversion = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.742 39 DEBUG tempest [-] network-feature-enabled.provider_net_base_segmentation_id = 3000 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.742 40 DEBUG tempest [-] heat_plugin.boot_config_env = /usr/lib/python3.8/site-packages/heat_tempest_plugin/tests/scenario/templates/boot_config_none_env.yaml log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.742 37 DEBUG tempest [-] compute.ready_wait = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.742 39 DEBUG tempest [-] network-feature-enabled.qos_placement_physnet = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.742 40 DEBUG tempest [-] heat_plugin.build_interval = 4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.742 37 DEBUG tempest [-] compute.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.743 39 DEBUG tempest [-] validation.auth_method = keypair log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.743 40 DEBUG tempest [-] heat_plugin.build_timeout = 1200 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.743 37 DEBUG tempest [-] compute.shelved_offload_time = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.743 39 DEBUG tempest [-] validation.connect_method = floating log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.743 40 DEBUG tempest [-] heat_plugin.ca_file = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.743 37 DEBUG tempest [-] compute.volume_device_name = sdb log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.743 39 DEBUG tempest [-] validation.connect_timeout = 60 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.743 40 DEBUG tempest [-] heat_plugin.catalog_type = orchestration log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.743 37 DEBUG tempest [-] compute-feature-enabled.api_extensions = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.743 39 DEBUG tempest [-] validation.floating_ip_range = 10.0.0.0/29 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.743 40 DEBUG tempest [-] heat_plugin.connectivity_timeout = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.743 40 DEBUG tempest [-] heat_plugin.convergence_engine_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.743 39 DEBUG tempest [-] validation.image_ssh_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.743 37 DEBUG tempest [-] compute-feature-enabled.attach_encrypted_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.743 40 DEBUG tempest [-] heat_plugin.credential_secret_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.744 39 DEBUG tempest [-] validation.image_ssh_user = cirros log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.744 40 DEBUG tempest [-] heat_plugin.disable_ssl_certificate_validation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.744 37 WARNING oslo_config.cfg [-] Deprecated: Option "block_migrate_cinder_iscsi" from group "compute-feature-enabled" is deprecated for removal (This option duplicates the more generic [compute-feature-enabled]/block_migration _for_live_migration now that MIN_LIBVIRT_VERSION is >= 1.2.17 on all branches from stable/rocky and will be removed in a future release.). Its value may be silently ignored in the future. 2020-11-06 17:58:36.744 39 DEBUG tempest [-] validation.ip_version_for_ssh = 4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.744 40 DEBUG tempest [-] heat_plugin.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.744 39 DEBUG tempest [-] validation.network_for_ssh = patrole_reader-net_30048f18-b96b-4343-a720-1173982b59b8 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.744 37 DEBUG tempest [-] compute-feature-enabled.block_migrate_cinder_iscsi = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.744 40 DEBUG tempest [-] heat_plugin.fixed_network_name = heat-net log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.744 39 DEBUG tempest [-] validation.ping_count = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.744 37 DEBUG tempest [-] compute-feature-enabled.block_migration_for_live_migration = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.744 40 DEBUG tempest [-] heat_plugin.fixed_subnet_name = heat-subnet log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.744 39 DEBUG tempest [-] validation.ping_size = 56 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.744 37 DEBUG tempest [-] compute-feature-enabled.can_migrate_between_any_hosts = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.744 40 DEBUG tempest [-] heat_plugin.floating_network_name = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.744 39 DEBUG tempest [-] validation.ping_timeout = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.744 37 DEBUG tempest [-] compute-feature-enabled.change_password = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.745 40 DEBUG tempest [-] heat_plugin.heat_config_notify_script = heat-config-notify log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.745 39 DEBUG tempest [-] validation.run_validation = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.745 37 DEBUG tempest [-] compute-feature-enabled.cold_migration = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.745 40 DEBUG tempest [-] heat_plugin.hidden_stack_tag = data-processing-cluster log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.745 39 DEBUG tempest [-] validation.security_group = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.745 37 DEBUG tempest [-] compute-feature-enabled.config_drive = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.745 40 DEBUG tempest [-] heat_plugin.image_ref = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.745 39 DEBUG tempest [-] validation.security_group_rules = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.745 40 DEBUG tempest [-] heat_plugin.instance_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.745 37 DEBUG tempest [-] compute-feature-enabled.console_output = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.745 39 DEBUG tempest [-] validation.ssh_shell_prologue = set -eu -o pipefail; PATH=$PATH:/sbin:/usr/sbin; log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.745 37 DEBUG tempest [-] compute-feature-enabled.disk_config = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.745 40 DEBUG tempest [-] heat_plugin.ip_version_for_ssh = 4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.745 39 DEBUG tempest [-] validation.ssh_timeout = 196 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.746 40 DEBUG tempest [-] heat_plugin.keypair_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.746 37 DEBUG tempest [-] compute-feature-enabled.enable_instance_password = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.746 40 DEBUG tempest [-] heat_plugin.minimal_image_ref = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.746 39 DEBUG tempest [-] volume.backend_names = ['BACKEND_1', 'BACKEND_2'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.746 37 DEBUG tempest [-] compute-feature-enabled.interface_attach = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.746 40 DEBUG tempest [-] heat_plugin.minimal_instance_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.746 39 DEBUG tempest [-] volume.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.746 37 DEBUG tempest [-] compute-feature-enabled.live_migrate_back_and_forth = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.746 40 DEBUG tempest [-] heat_plugin.network_for_ssh = heat-net log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.746 39 DEBUG tempest [-] volume.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.746 37 DEBUG tempest [-] compute-feature-enabled.live_migration = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.746 40 DEBUG tempest [-] heat_plugin.password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.746 39 DEBUG tempest [-] volume.catalog_type = volumev3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.746 37 DEBUG tempest [-] compute-feature-enabled.metadata_service = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.746 40 DEBUG tempest [-] heat_plugin.project_domain_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.746 39 DEBUG tempest [-] volume.disk_format = raw log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.747 40 DEBUG tempest [-] heat_plugin.project_domain_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.747 37 DEBUG tempest [-] compute-feature-enabled.nova_cert = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.747 39 DEBUG tempest [-] volume.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.747 40 DEBUG tempest [-] heat_plugin.project_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.747 37 DEBUG tempest [-] compute-feature-enabled.pause = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.747 39 DEBUG tempest [-] volume.manage_snapshot_ref = ['source-name', 'snapshot-%s'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.747 40 DEBUG tempest [-] heat_plugin.region = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.747 37 DEBUG tempest [-] compute-feature-enabled.personality = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.747 39 DEBUG tempest [-] volume.manage_volume_ref = ['source-name', 'volume-%s'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.747 40 DEBUG tempest [-] heat_plugin.skip_functional_test_list = ['EncryptionVolTypeTest'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.747 39 DEBUG tempest [-] volume.max_microversion = latest log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.747 40 DEBUG tempest [-] heat_plugin.skip_functional_tests = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.747 37 WARNING oslo_config.cfg [-] Deprecated: Option "rdp_console" from group "compute-feature-enabled" is deprecated for removal (This config option is not being used in Tempest, we can add it back when adding the test cases.). Its value may be silently ignored in the future. 2020-11-06 17:58:36.747 39 DEBUG tempest [-] volume.min_microversion = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.747 40 DEBUG tempest [-] heat_plugin.skip_scenario_test_list = ['AodhAlarmTest', 'SoftwareConfigIntegrationTest', 'VolumeBackupRestoreIntegrationTest', 'CfnInitIntegrationTest', 'LoadBalancerTest'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.747 37 DEBUG tempest [-] compute-feature-enabled.rdp_console = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.748 39 DEBUG tempest [-] volume.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.748 40 DEBUG tempest [-] heat_plugin.skip_scenario_tests = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.748 37 DEBUG tempest [-] compute-feature-enabled.rescue = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.748 39 DEBUG tempest [-] volume.storage_protocol = ceph log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.748 40 DEBUG tempest [-] heat_plugin.skip_test_stack_action_list = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.748 37 DEBUG tempest [-] compute-feature-enabled.resize = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.748 39 DEBUG tempest [-] volume.vendor_name = Open Source log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.748 40 DEBUG tempest [-] heat_plugin.ssh_channel_timeout = 60 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.748 39 DEBUG tempest [-] volume.volume_size = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.748 40 DEBUG tempest [-] heat_plugin.ssh_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.748 37 WARNING oslo_config.cfg [-] Deprecated: Option "scheduler_available_filters" from group "compute-feature-enabled" is deprecated. Use option "scheduler_enabled_filters" from group "compute-feature-enabled". 2020-11-06 17:58:36.748 40 DEBUG tempest [-] heat_plugin.user_domain_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.748 39 DEBUG tempest [-] volume-feature-enabled.api_extensions = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.748 37 DEBUG tempest [-] compute-feature-enabled.scheduler_enabled_filters = ['AvailabilityZoneFilter', 'ComputeFilter', 'ComputeCapabilitiesFilter', 'ImagePropertiesFilter', 'ServerGroupAntiAffinityFilter', 'ServerGroupAffinityFilter', 'SameHostFilter', 'DifferentHostFilter'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.748 40 DEBUG tempest [-] heat_plugin.user_domain_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.748 39 DEBUG tempest [-] volume-feature-enabled.api_v2 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.749 37 DEBUG tempest [-] compute-feature-enabled.serial_console = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.749 40 DEBUG tempest [-] heat_plugin.username = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.749 39 DEBUG tempest [-] volume-feature-enabled.api_v3 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.749 40 DEBUG tempest [-] heat_plugin.vm_to_heat_api_insecure = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.749 37 DEBUG tempest [-] compute-feature-enabled.shelve = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.749 39 DEBUG tempest [-] volume-feature-enabled.backup = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.749 40 DEBUG tempest [-] heat_plugin.volume_size = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.749 39 DEBUG tempest [-] volume-feature-enabled.clone = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.749 37 DEBUG tempest [-] compute-feature-enabled.snapshot = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.749 40 DEBUG tempest [-] heat_features_enabled.multi_cloud = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.749 39 DEBUG tempest [-] volume-feature-enabled.consistency_group = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.749 37 WARNING oslo_config.cfg [-] Deprecated: Option "spice_console" from group "compute-feature-enabled" is deprecated for removal (This config option is not being used in Tempest, we can add it back when adding the test cases.). Its value may be silently ignored in the future. 2020-11-06 17:58:36.749 40 DEBUG tempest [-] heat_features_enabled.stack_cancel = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.749 39 DEBUG tempest [-] volume-feature-enabled.extend_attached_encrypted_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.749 37 DEBUG tempest [-] compute-feature-enabled.spice_console = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.750 40 DEBUG tempest [-] fed_scenario.enable_k2k_groups_mapping = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.750 39 DEBUG tempest [-] volume-feature-enabled.extend_attached_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.750 40 DEBUG tempest [-] fed_scenario.idp_ecp_url = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.750 37 DEBUG tempest [-] compute-feature-enabled.stable_rescue = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.750 39 DEBUG tempest [-] volume-feature-enabled.manage_snapshot = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.750 40 DEBUG tempest [-] fed_scenario.idp_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.750 37 DEBUG tempest [-] compute-feature-enabled.suspend = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.750 39 DEBUG tempest [-] volume-feature-enabled.manage_volume = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.750 40 DEBUG tempest [-] fed_scenario.idp_password = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.750 37 DEBUG tempest [-] compute-feature-enabled.swap_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.750 39 DEBUG tempest [-] volume-feature-enabled.multi_backend = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.750 40 DEBUG tempest [-] fed_scenario.idp_remote_ids = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.750 37 DEBUG tempest [-] compute-feature-enabled.vnc_console = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.750 39 DEBUG tempest [-] volume-feature-enabled.snapshot = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.750 40 DEBUG tempest [-] fed_scenario.idp_username = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.751 37 DEBUG tempest [-] compute-feature-enabled.vnc_server_header = WebSockify log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.751 39 DEBUG tempest [-] volume-feature-enabled.volume_revert = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.751 40 DEBUG tempest [-] fed_scenario.mapping_group_domain_name = federated_domain log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.751 37 DEBUG tempest [-] compute-feature-enabled.volume_backed_live_migration = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.751 39 DEBUG tempest [-] object-storage.catalog_type = object-store log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.751 40 DEBUG tempest [-] fed_scenario.mapping_group_name = federated_users log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.751 37 DEBUG tempest [-] compute-feature-enabled.volume_multiattach = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.751 39 DEBUG tempest [-] object-storage.cluster_name = name1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.751 40 DEBUG tempest [-] fed_scenario.mapping_remote_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.751 39 DEBUG tempest [-] object-storage.container_sync_interval = 5 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.751 40 DEBUG tempest [-] fed_scenario.mapping_user_name = {0} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.751 37 DEBUG tempest [-] compute-feature-enabled.xenapi_apis = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.751 39 DEBUG tempest [-] object-storage.container_sync_timeout = 600 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.751 40 DEBUG tempest [-] fed_scenario.protocol_id = mapped log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.751 37 DEBUG tempest [-] identity.admin_domain_scope = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.752 39 DEBUG tempest [-] object-storage.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.752 40 DEBUG tempest [-] telemetry.alarm_aggregation_method = rate:mean log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.752 37 DEBUG tempest [-] identity.admin_role = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.752 39 DEBUG tempest [-] object-storage.operator_role = member log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.752 40 DEBUG tempest [-] telemetry.alarm_granularity = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.752 37 DEBUG tempest [-] identity.auth_version = v3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.752 39 DEBUG tempest [-] object-storage.realm_name = realm1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.752 40 DEBUG tempest [-] telemetry.alarm_metric_name = cpu log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.752 37 DEBUG tempest [-] identity.ca_certificates_file = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.752 40 DEBUG tempest [-] telemetry.alarm_threshold = 10 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.752 39 DEBUG tempest [-] object-storage.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.752 37 DEBUG tempest [-] identity.catalog_type = identity log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.752 40 DEBUG tempest [-] telemetry.disable_ssl_certificate_validation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.752 39 DEBUG tempest [-] object-storage.reseller_admin_role = ResellerAdmin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.752 37 DEBUG tempest [-] identity.default_domain_id = default log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.752 40 DEBUG tempest [-] telemetry.notification_sleep = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.752 39 DEBUG tempest [-] object-storage-feature-enabled.container_sync = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.753 37 DEBUG tempest [-] identity.disable_ssl_certificate_validation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.753 40 DEBUG tempest [-] telemetry.notification_wait = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.753 39 DEBUG tempest [-] object-storage-feature-enabled.discoverability = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.753 37 DEBUG tempest [-] identity.region = RegionOne log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.753 40 DEBUG tempest [-] event.catalog_type = event log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.753 39 DEBUG tempest [-] object-storage-feature-enabled.discoverable_apis = ['account_quotas', 'formpost', 'bulk_upload', 'bulk_delete', 'tempurl', 'crossdomain', 'container_quotas', 'staticweb', 'account_quotas', 'slo'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.753 37 DEBUG tempest [-] identity.uri = http://172.30.13.94/identity/v2.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.753 40 DEBUG tempest [-] event.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.753 39 DEBUG tempest [-] object-storage-feature-enabled.object_versioning = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.753 37 DEBUG tempest [-] identity.uri_v3 = http://172.30.13.94/identity/v3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.753 40 DEBUG tempest [-] alarming_plugin.catalog_type = alarming log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.753 39 DEBUG tempest [-] scenario.dhcp_client = udhcpc log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.753 37 DEBUG tempest [-] identity.user_lockout_duration = 10 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.753 40 DEBUG tempest [-] alarming_plugin.create_alarms = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.753 39 DEBUG tempest [-] scenario.img_container_format = bare log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.754 40 DEBUG tempest [-] alarming_plugin.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.754 37 DEBUG tempest [-] identity.user_lockout_failure_attempts = 2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.754 40 DEBUG tempest [-] metric.catalog_type = metric log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.754 39 WARNING oslo_config.cfg [-] Deprecated: Option "img_dir" from group "scenario" is deprecated for removal. Its value may be silently ignored in the future. 2020-11-06 17:58:36.754 37 DEBUG tempest [-] identity.user_unique_last_password_count = 2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.754 40 DEBUG tempest [-] metric.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.754 39 DEBUG tempest [-] scenario.img_dir = /home/opnfv/functest/images log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.754 37 DEBUG tempest [-] identity.v2_admin_endpoint_type = adminURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.754 40 DEBUG tempest [-] ephemeral_storage_encryption.cipher = aes-xts-plain64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.754 39 DEBUG tempest [-] scenario.img_disk_format = qcow2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.754 37 DEBUG tempest [-] identity.v2_public_endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.754 40 DEBUG tempest [-] ephemeral_storage_encryption.enabled = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.754 39 DEBUG tempest [-] scenario.img_file = cirros-0.4.0-x86_64-disk.img log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.754 37 DEBUG tempest [-] identity.v3_endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.754 40 DEBUG tempest [-] ephemeral_storage_encryption.key_size = 256 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.755 39 DEBUG tempest [-] scenario.img_properties = {'hw_scsi_model': 'virtio-scsi', 'hw_disk_bus': 'scsi'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.755 37 DEBUG tempest [-] service-clients.http_timeout = 60 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.755 40 DEBUG tempest [-] image_signature_verification.enforced = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.755 37 DEBUG tempest [-] service-clients.proxy_url = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.755 39 DEBUG tempest [-] scenario.protocol = icmp log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.755 40 DEBUG tempest [-] patrole.custom_policy_files = ['/etc/%s/policy.json'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.755 37 DEBUG tempest [-] identity-feature-enabled.access_rules = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.755 39 DEBUG tempest [-] service_available.aodh = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.755 40 DEBUG tempest [-] patrole.custom_requirements_file = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.755 39 DEBUG tempest [-] service_available.barbican = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.755 37 DEBUG tempest [-] identity-feature-enabled.api_extensions = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.755 40 DEBUG tempest [-] patrole.rbac_test_role = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.755 39 DEBUG tempest [-] service_available.ceilometer = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.755 40 DEBUG tempest [-] patrole.rbac_test_roles = ['admin'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.755 37 WARNING oslo_config.cfg [-] Deprecated: Option "api_v2" from group "identity-feature-enabled" is deprecated for removal (The identity v2.0 API was removed in the Queens release. Tests that exercise the v2.0 API will be removed from tempest in the v22.0.0 release. They are kept only to test stable branches.). Its value may be silently ignored in the future. 2020-11-06 17:58:36.755 39 DEBUG tempest [-] service_available.cinder = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.756 40 DEBUG tempest [-] patrole.test_custom_requirements = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.756 37 DEBUG tempest [-] identity-feature-enabled.api_v2 = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.756 39 DEBUG tempest [-] service_available.cyborg = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.756 40 DEBUG tempest [-] patrole.validate_deprecated_rules = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.756 39 DEBUG tempest [-] service_available.glance = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.756 37 DEBUG tempest [-] identity-feature-enabled.api_v2_admin = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.756 40 DEBUG tempest [-] patrole_log.enable_reporting = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.756 39 DEBUG tempest [-] service_available.gnocchi = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.756 40 DEBUG tempest [-] patrole_log.report_log_name = patrole.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.756 37 DEBUG tempest [-] identity-feature-enabled.api_v3 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.756 39 DEBUG tempest [-] service_available.heat = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.756 40 DEBUG tempest [-] patrole_log.report_log_path = . log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.756 37 DEBUG tempest [-] identity-feature-enabled.application_credentials = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.756 39 DEBUG tempest [-] service_available.load_balancer = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.756 40 DEBUG tempest [-] policy-feature-enabled.added_cinder_policies_stein = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.757 37 DEBUG tempest [-] identity-feature-enabled.domain_specific_drivers = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.757 39 DEBUG tempest [-] service_available.neutron = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.757 40 DEBUG tempest [-] policy-feature-enabled.changed_nova_policies_ussuri = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.757 37 DEBUG tempest [-] identity-feature-enabled.external_idp = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.757 39 DEBUG tempest [-] service_available.nova = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.757 40 DEBUG tempest [-] policy-feature-enabled.changed_nova_policies_victoria = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.757 37 DEBUG tempest [-] identity-feature-enabled.federation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.757 39 DEBUG tempest [-] service_available.panko = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.757 40 DEBUG tempest [-] policy-feature-enabled.create_port_fixed_ips_ip_address_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.757 40 DEBUG tempest [-] policy-feature-enabled.keystone_policy_enforcement_train = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.757 39 DEBUG tempest [-] service_available.swift = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.757 37 DEBUG tempest [-] identity-feature-enabled.immutable_user_source = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.757 40 DEBUG tempest [-] policy-feature-enabled.limits_extension_used_limits_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.757 39 DEBUG tempest [-] debug.trace_requests = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.757 37 DEBUG tempest [-] identity-feature-enabled.project_tags = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.758 40 DEBUG tempest [-] policy-feature-enabled.removed_keystone_policies_stein = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.758 39 DEBUG tempest [-] placement.catalog_type = placement log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.758 37 DEBUG tempest [-] identity-feature-enabled.security_compliance = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.758 40 DEBUG tempest [-] policy-feature-enabled.removed_nova_policies_stein = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.758 39 DEBUG tempest [-] placement.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.758 37 DEBUG tempest [-] identity-feature-enabled.trust = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.758 40 DEBUG tempest [-] policy-feature-enabled.update_port_fixed_ips_ip_address_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.758 39 DEBUG tempest [-] placement.max_microversion = latest log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.758 37 DEBUG tempest [-] image.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.758 40 DEBUG tempest [-] policy-feature-enabled.volume_extension_volume_actions_attach_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.758 39 DEBUG tempest [-] placement.min_microversion = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.758 37 DEBUG tempest [-] image.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.758 40 DEBUG tempest [-] policy-feature-enabled.volume_extension_volume_actions_reserve_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.758 39 DEBUG tempest [-] placement.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.758 37 DEBUG tempest [-] image.catalog_type = image log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.758 40 DEBUG tempest [-] policy-feature-enabled.volume_extension_volume_actions_unreserve_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.758 39 DEBUG tempest [-] profiler.key = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.759 40 DEBUG tempest [-] load_balancer.RBAC_test_type = advanced log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.759 37 DEBUG tempest [-] image.container_formats = ['ami', 'ari', 'aki', 'bare', 'ovf', 'ova'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.759 39 DEBUG tempest [-] heat_plugin.admin_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.759 40 DEBUG tempest [-] load_balancer.admin_role = load-balancer_admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.759 39 DEBUG tempest [-] heat_plugin.admin_project_name = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.759 37 DEBUG tempest [-] image.disk_formats = ['ami', 'ari', 'aki', 'vhd', 'vmdk', 'raw', 'qcow2', 'vdi', 'iso', 'vhdx'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.759 40 DEBUG tempest [-] load_balancer.amphora_admin_log_file = /var/log/octavia-amphora.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.759 39 DEBUG tempest [-] heat_plugin.admin_username = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.759 40 DEBUG tempest [-] load_balancer.amphora_ssh_key = /etc/octavia/.ssh/octavia_ssh_key log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.759 37 DEBUG tempest [-] image.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.759 39 DEBUG tempest [-] heat_plugin.auth_url = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.759 40 DEBUG tempest [-] load_balancer.amphora_ssh_user = ubuntu log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.759 37 DEBUG tempest [-] image.http_image = http://download.cirros-cloud.net/0.3.1/cirros-0.3.1-x86_64-uec.tar.gz log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.759 39 DEBUG tempest [-] heat_plugin.auth_version = 3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.759 40 DEBUG tempest [-] load_balancer.availability_zone = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.760 37 DEBUG tempest [-] image.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.760 39 DEBUG tempest [-] heat_plugin.boot_config_env = /usr/lib/python3.8/site-packages/heat_tempest_plugin/tests/scenario/templates/boot_config_none_env.yaml log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.760 40 DEBUG tempest [-] load_balancer.availability_zone2 = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.760 39 DEBUG tempest [-] heat_plugin.build_interval = 4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.760 40 DEBUG tempest [-] load_balancer.availability_zone3 = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.760 37 WARNING oslo_config.cfg [-] Deprecated: Option "api_v1" from group "image-feature-enabled" is deprecated for removal (Glance v1 APIs are deprecated and v2 APIs are current one. In future, Tempest will test v2 APIs only so this config option will be removed.). Its value may be silently ignored in the future. 2020-11-06 17:58:36.760 39 DEBUG tempest [-] heat_plugin.build_timeout = 1200 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.760 40 DEBUG tempest [-] load_balancer.build_interval = 5.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.760 37 DEBUG tempest [-] image-feature-enabled.api_v1 = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.760 39 DEBUG tempest [-] heat_plugin.ca_file = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.760 40 DEBUG tempest [-] load_balancer.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.760 39 DEBUG tempest [-] heat_plugin.catalog_type = orchestration log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.760 37 WARNING oslo_config.cfg [-] Deprecated: Option "api_v2" from group "image-feature-enabled" is deprecated for removal (Glance v1 APIs are deprecated and v2 APIs are current one. In future, Tempest will test v2 APIs only so this config option will be removed.). Its value may be silently ignored in the future. 2020-11-06 17:58:36.760 40 DEBUG tempest [-] load_balancer.catalog_type = load-balancer log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.760 39 DEBUG tempest [-] heat_plugin.connectivity_timeout = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.760 37 DEBUG tempest [-] image-feature-enabled.api_v2 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.761 40 DEBUG tempest [-] load_balancer.check_interval = 5.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.761 39 DEBUG tempest [-] heat_plugin.convergence_engine_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.761 40 DEBUG tempest [-] load_balancer.check_timeout = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.761 37 DEBUG tempest [-] image-feature-enabled.import_image = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.761 39 DEBUG tempest [-] heat_plugin.credential_secret_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.761 40 DEBUG tempest [-] load_balancer.disable_boot_network = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.761 37 DEBUG tempest [-] network.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.761 39 DEBUG tempest [-] heat_plugin.disable_ssl_certificate_validation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.761 40 DEBUG tempest [-] load_balancer.enable_security_groups = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.761 37 DEBUG tempest [-] network.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.761 39 DEBUG tempest [-] heat_plugin.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.761 40 DEBUG tempest [-] load_balancer.enabled_provider_drivers = {'amphora': 'The Octavia Amphora driver.', 'amphorav2': 'The Octavia Amphora driver that uses taskflow jobboard persistence.', 'octavia': 'Deprecated alias of the Octavia Amphora driver.'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.761 39 DEBUG tempest [-] heat_plugin.fixed_network_name = heat-net log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.761 37 DEBUG tempest [-] network.catalog_type = network log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.761 40 DEBUG tempest [-] load_balancer.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.762 39 DEBUG tempest [-] heat_plugin.fixed_subnet_name = heat-subnet log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.762 40 DEBUG tempest [-] load_balancer.expected_availability_zone_capability = {'compute_zone': 'The compute availability zone.'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.762 37 DEBUG tempest [-] network.default_network = ['192.168.120.0/24'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.762 39 DEBUG tempest [-] heat_plugin.floating_network_name = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.762 40 DEBUG tempest [-] load_balancer.expected_flavor_capability = {'loadbalancer_topology': 'The load balancer topology. One of: SINGLE - One amphora per load balancer. ACTIVE_STANDBY - Two amphora per load balancer.'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.762 37 DEBUG tempest [-] network.dns_servers = ['8.8.8.8', '8.8.4.4'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.762 39 DEBUG tempest [-] heat_plugin.heat_config_notify_script = heat-config-notify log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.762 40 DEBUG tempest [-] load_balancer.lb_build_interval = 10.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.762 37 DEBUG tempest [-] network.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.762 39 DEBUG tempest [-] heat_plugin.hidden_stack_tag = data-processing-cluster log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.762 40 DEBUG tempest [-] load_balancer.lb_build_timeout = 900 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.762 39 DEBUG tempest [-] heat_plugin.image_ref = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.762 37 DEBUG tempest [-] network.floating_network_name = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.762 40 DEBUG tempest [-] load_balancer.loadbalancer_topology = SINGLE log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.762 38 INFO tempest [-] Using tempest config file /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/for-deployment-c46774b6-2b57-45ff-ba6b-cb9fd0bb0e7f/tempest.conf 2020-11-06 17:58:36.763 39 DEBUG tempest [-] heat_plugin.instance_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.763 37 DEBUG tempest [-] network.port_profile = {} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.763 40 DEBUG tempest [-] load_balancer.member_1_ipv4_subnet_cidr = 10.2.1.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.763 39 DEBUG tempest [-] heat_plugin.ip_version_for_ssh = 4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.763 40 DEBUG tempest [-] load_balancer.member_1_ipv6_subnet_cidr = fd7b:f9f7:0fff:4eca::/64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.763 37 DEBUG tempest [-] network.port_vnic_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.763 39 DEBUG tempest [-] heat_plugin.keypair_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.763 40 DEBUG tempest [-] load_balancer.member_2_ipv4_subnet_cidr = 10.2.2.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.763 37 DEBUG tempest [-] network.project_network_cidr = 192.168.120.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.763 39 DEBUG tempest [-] heat_plugin.minimal_image_ref = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.763 40 DEBUG tempest [-] load_balancer.member_2_ipv6_subnet_cidr = fd77:1457:4cf0:26a8::/64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.763 37 DEBUG tempest [-] network.project_network_mask_bits = 28 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.763 39 DEBUG tempest [-] heat_plugin.minimal_instance_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.763 40 DEBUG tempest [-] load_balancer.member_role = load-balancer_member log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.763 37 DEBUG tempest [-] network.project_network_v6_cidr = 2001:db8::/48 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.763 39 DEBUG tempest [-] heat_plugin.network_for_ssh = heat-net log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.763 40 DEBUG tempest [-] load_balancer.octavia_svc_username = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.764 37 DEBUG tempest [-] network.project_network_v6_mask_bits = 64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.764 39 DEBUG tempest [-] heat_plugin.password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.764 40 DEBUG tempest [-] load_balancer.provider = octavia log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.764 39 DEBUG tempest [-] heat_plugin.project_domain_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.764 37 DEBUG tempest [-] network.project_networks_reachable = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.764 40 DEBUG tempest [-] load_balancer.random_server_name_length = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.764 39 DEBUG tempest [-] heat_plugin.project_domain_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.764 37 DEBUG tempest [-] network.public_network_id = 3fe4fc32-89a3-4f72-b166-6eb7100e1fea log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.764 40 DEBUG tempest [-] load_balancer.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.764 39 DEBUG tempest [-] heat_plugin.project_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.764 38 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: heat 2020-11-06 17:58:36.764 37 DEBUG tempest [-] network.public_router_id = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.764 40 DEBUG tempest [-] load_balancer.scp_connection_attempts = 20 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.764 39 DEBUG tempest [-] heat_plugin.region = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.764 37 DEBUG tempest [-] network.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.764 40 DEBUG tempest [-] load_balancer.scp_connection_timeout = 5 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.764 39 DEBUG tempest [-] heat_plugin.skip_functional_test_list = ['EncryptionVolTypeTest'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.765 37 DEBUG tempest [-] network.shared_physical_network = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.765 40 DEBUG tempest [-] load_balancer.tenant_flow_log_file = /var/log/octavia-tenant-traffic.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.765 38 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: keystone_tests 2020-11-06 17:58:36.765 39 DEBUG tempest [-] heat_plugin.skip_functional_tests = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.765 40 DEBUG tempest [-] load_balancer.test_ipv6_subnet_override = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.765 37 DEBUG tempest [-] network.subnet_id = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.765 39 DEBUG tempest [-] heat_plugin.skip_scenario_test_list = ['AodhAlarmTest', 'SoftwareConfigIntegrationTest', 'VolumeBackupRestoreIntegrationTest', 'CfnInitIntegrationTest', 'LoadBalancerTest'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.765 40 DEBUG tempest [-] load_balancer.test_network_override = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.765 38 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: telemetry_tests 2020-11-06 17:58:36.765 39 DEBUG tempest [-] heat_plugin.skip_scenario_tests = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.765 40 DEBUG tempest [-] load_balancer.test_reuse_connection = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.765 37 DEBUG tempest [-] network-feature-enabled.api_extensions = ['address-group', 'address-scope', 'router-admin-state-down-before-update', 'agent', 'agent-resources-synced', 'allowed-address-pairs', 'auto-allocated-topology', 'availability_zone', 'availability_zone_filter', 'default-subnetpools', 'dhcp_agent_scheduler', 'dns-integration', 'dns-domain-ports', 'dvr', 'empty-string-filtering', 'expose-port-forwarding-in-fip', 'external-net', 'extra_dhcp_opt', 'extraroute', 'extraroute-atomic', 'filter-validation', 'floating-ip-port-forwarding-description', 'fip-port-details', 'flavors', 'floating-ip-port-forwarding', 'floatingip-pools', 'ip_allocation', 'ip-substring-filtering', 'l2_adjacency', 'router', 'ext-gw-mode', 'l3-ha', 'l3-flavors', 'l3-port-ip-change-not-allowed', 'l3_agent_scheduler', 'logging', 'multi-provider', 'net-mtu', 'net-mtu-writable', 'network_availability_zone', 'network-ip-availability', 'pagination', 'port-mac-address-regenerate', 'port-resource-request', 'binding', 'binding-extended', 'port-security', 'project-id', 'provider', 'qos', 'qos-bw-limit-direction', 'qos-bw-minimum-ingress', 'qos-default', 'qos-fip', 'qos-gateway-ip', 'qos-port-network-policy', 'qos-rule-type-details', 'qos-rules-alias', 'quotas', 'quota_details', 'rbac-policies', 'rbac-address-scope', 'rbac-security-groups', 'rbac-subnetpool', 'revision-if-match', 'standard-attr-revisions', 'router_availability_zone', 'port-security-groups-filtering', 'security-group', 'segment', 'segments-peer-subnet-host-routes', 'service-type', 'sorting', 'standard-attr-segment', 'standard-attr-description', 'stateful-security-group', 'subnet-dns-publish-fixed-ip', 'subnet_onboard', 'subnet-segmentid-writable', 'subnet-service-types', 'subnet_allocation', 'subnetpool-prefix-ops', 'standard-attr-tag', 'standard-attr-timestamp', 'trunk', 'trunk-details'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.765 39 DEBUG tempest [-] heat_plugin.skip_test_stack_action_list = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.765 38 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: barbican_tests 2020-11-06 17:58:36.765 40 DEBUG tempest [-] load_balancer.test_subnet_override = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.765 37 DEBUG tempest [-] network-feature-enabled.available_features = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.765 39 DEBUG tempest [-] heat_plugin.ssh_channel_timeout = 60 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.766 40 DEBUG tempest [-] load_balancer.test_with_ipv6 = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.766 38 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: neutron_tests 2020-11-06 17:58:36.766 37 DEBUG tempest [-] network-feature-enabled.floating_ips = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.766 39 DEBUG tempest [-] heat_plugin.ssh_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.766 40 DEBUG tempest [-] load_balancer.test_with_noop = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.766 38 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: cyborg_tempest_plugin 2020-11-06 17:58:36.766 37 DEBUG tempest [-] network-feature-enabled.ipv6 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.766 39 DEBUG tempest [-] heat_plugin.user_domain_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.766 40 DEBUG tempest [-] load_balancer.vip_ipv6_subnet_cidr = fdde:1a92:7523:70a0::/64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.766 38 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: cinder_tests 2020-11-06 17:58:36.766 39 DEBUG tempest [-] heat_plugin.user_domain_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.766 37 DEBUG tempest [-] network-feature-enabled.ipv6_subnet_attributes = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.766 40 DEBUG tempest [-] load_balancer.vip_subnet_cidr = 10.1.1.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.766 38 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: patrole_tests 2020-11-06 17:58:36.766 39 DEBUG tempest [-] heat_plugin.username = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.766 37 DEBUG tempest [-] network-feature-enabled.port_admin_state_change = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.766 40 DEBUG tempest [-] loadbalancer-feature-enabled.health_monitor_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.766 39 DEBUG tempest [-] heat_plugin.vm_to_heat_api_insecure = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.766 37 DEBUG tempest [-] network-feature-enabled.port_security = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.767 40 DEBUG tempest [-] loadbalancer-feature-enabled.l4_protocol = TCP log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.767 39 DEBUG tempest [-] heat_plugin.volume_size = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.767 37 DEBUG tempest [-] network-feature-enabled.provider_net_base_segmentation_id = 3000 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.767 38 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: octavia-tempest-plugin 2020-11-06 17:58:36.767 40 DEBUG tempest [-] loadbalancer-feature-enabled.l7_protocol_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.767 39 DEBUG tempest [-] heat_features_enabled.multi_cloud = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.767 37 DEBUG tempest [-] network-feature-enabled.qos_placement_physnet = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.767 40 DEBUG tempest [-] loadbalancer-feature-enabled.log_offload_enabled = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.767 39 DEBUG tempest [-] heat_features_enabled.stack_cancel = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.767 40 DEBUG tempest [-] loadbalancer-feature-enabled.not_implemented_is_error = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.767 37 DEBUG tempest [-] validation.auth_method = keypair log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.767 39 DEBUG tempest [-] fed_scenario.enable_k2k_groups_mapping = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.767 40 DEBUG tempest [-] loadbalancer-feature-enabled.pool_algorithms_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.767 37 DEBUG tempest [-] validation.connect_method = floating log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.767 39 DEBUG tempest [-] fed_scenario.idp_ecp_url = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.767 38 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: heat 2020-11-06 17:58:36.767 40 DEBUG tempest [-] loadbalancer-feature-enabled.session_persistence_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.767 37 DEBUG tempest [-] validation.connect_timeout = 60 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.767 39 DEBUG tempest [-] fed_scenario.idp_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.768 38 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: keystone_tests 2020-11-06 17:58:36.768 40 DEBUG tempest [-] loadbalancer-feature-enabled.spare_pool_enabled = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.768 39 DEBUG tempest [-] fed_scenario.idp_password = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.768 37 DEBUG tempest [-] validation.floating_ip_range = 10.0.0.0/29 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.768 38 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: telemetry_tests 2020-11-06 17:58:36.768 40 DEBUG tempest [-] loadbalancer-feature-enabled.terminated_tls_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.768 38 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: barbican_tests 2020-11-06 17:58:36.768 39 DEBUG tempest [-] fed_scenario.idp_remote_ids = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.768 37 DEBUG tempest [-] validation.image_ssh_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.768 40 DEBUG tempest [-] ******************************************************************************** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2591 2020-11-06 17:58:36.768 38 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: neutron_tests 2020-11-06 17:58:36.768 39 DEBUG tempest [-] fed_scenario.idp_username = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.768 37 DEBUG tempest [-] validation.image_ssh_user = cirros log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.768 38 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: cyborg_tempest_plugin 2020-11-06 17:58:36.768 39 DEBUG tempest [-] fed_scenario.mapping_group_domain_name = federated_domain log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.768 38 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: cinder_tests 2020-11-06 17:58:36.768 37 DEBUG tempest [-] validation.ip_version_for_ssh = 4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.768 38 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: patrole_tests 2020-11-06 17:58:36.768 39 DEBUG tempest [-] fed_scenario.mapping_group_name = federated_users log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.768 37 DEBUG tempest [-] validation.network_for_ssh = patrole_reader-net_30048f18-b96b-4343-a720-1173982b59b8 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.768 38 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: octavia-tempest-plugin 2020-11-06 17:58:36.769 39 DEBUG tempest [-] fed_scenario.mapping_remote_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.769 37 DEBUG tempest [-] validation.ping_count = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.769 39 DEBUG tempest [-] fed_scenario.mapping_user_name = {0} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.769 38 DEBUG tempest [-] ******************************************************************************** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2567 2020-11-06 17:58:36.769 37 DEBUG tempest [-] validation.ping_size = 56 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.769 38 DEBUG tempest [-] Configuration options gathered from: log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2568 2020-11-06 17:58:36.769 39 DEBUG tempest [-] fed_scenario.protocol_id = mapped log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.769 37 DEBUG tempest [-] validation.ping_timeout = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.769 38 DEBUG tempest [-] command line args: [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2569 2020-11-06 17:58:36.769 39 DEBUG tempest [-] telemetry.alarm_aggregation_method = rate:mean log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.769 37 DEBUG tempest [-] validation.run_validation = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.769 39 DEBUG tempest [-] telemetry.alarm_granularity = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.769 38 DEBUG tempest [-] config files: ['/root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/for-deployment-c46774b6-2b57-45ff-ba6b-cb9fd0bb0e7f/tempest.conf'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2570 2020-11-06 17:58:36.769 37 DEBUG tempest [-] validation.security_group = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.770 38 DEBUG tempest [-] ================================================================================ log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2572 2020-11-06 17:58:36.770 39 DEBUG tempest [-] telemetry.alarm_metric_name = cpu log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.770 37 DEBUG tempest [-] validation.security_group_rules = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.770 39 DEBUG tempest [-] telemetry.alarm_threshold = 10 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.770 38 DEBUG tempest [-] config_dir = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.770 37 DEBUG tempest [-] validation.ssh_shell_prologue = set -eu -o pipefail; PATH=$PATH:/sbin:/usr/sbin; log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.770 38 DEBUG tempest [-] config_file = ['/root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/for-deployment-c46774b6-2b57-45ff-ba6b-cb9fd0bb0e7f/tempest.conf'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.770 39 DEBUG tempest [-] telemetry.disable_ssl_certificate_validation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.770 40 DEBUG tempest.lib.services.clients [-] Successfully registered plugin __tempest__ in the service client registry with configuration: [{'name': 'compute', 'service_version': 'compute', 'module_path': 'tempest.lib.services.compute', 'client_names': ['AgentsClient', 'AggregatesClient', 'AvailabilityZoneClient', 'BaremetalNodesClient', 'CertificatesClient', 'ExtensionsClient', 'FixedIPsClient', 'FlavorsClient', 'FloatingIPPoolsClient', 'FloatingIPsBulkClient', 'FloatingIPsClient', 'HostsClient', 'HypervisorClient', 'ImagesClient', 'InstanceUsagesAuditLogClient', 'InterfacesClient', 'KeyPairsClient', 'LimitsClient', 'MigrationsClient', 'NetworksClient', 'QuotaClassesClient', 'QuotasClient', 'SecurityGroupDefaultRulesClient', 'SecurityGroupRulesClient', 'SecurityGroupsClient', 'ServerGroupsClient', 'ServersClient', 'ServicesClient', 'SnapshotsClient', 'TenantNetworksClient', 'TenantUsagesClient', 'VersionsClient', 'VolumesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'compute'}, {'name': 'placement', 'service_version': 'placement', 'module_path': 'tempest.lib.services.placement', 'client_names': ['PlacementClient', 'ResourceProvidersClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'placement'}, {'name': 'identity_v2', 'service_version': 'identity.v2', 'module_path': 'tempest.lib.services.identity.v2', 'client_names': ['EndpointsClient', 'IdentityClient', 'RolesClient', 'ServicesClient', 'TenantsClient', 'TokenClient', 'UsersClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'identity'}, {'name': 'identity_v3', 'service_version': 'identity.v3', 'module_path': 'tempest.lib.services.identity.v3', 'client_names': ['AccessRulesClient', 'ApplicationCredentialsClient', 'CatalogClient', 'CredentialsClient', 'DomainsClient', 'DomainConfigurationClient', 'EndPointGroupsClient', 'EndPointsClient', 'EndPointsFilterClient', 'GroupsClient', 'IdentityClient', 'InheritedRolesClient', 'OAUTHConsumerClient', 'OAUTHTokenClient', 'PoliciesClient', 'ProjectsClient', 'ProjectTagsClient', 'RegionsClient', 'RoleAssignmentsClient', 'RolesClient', 'ServicesClient', 'V3TokenClient', 'TrustsClient', 'UsersClient', 'VersionsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'identity'}, {'name': 'image_v1', 'service_version': 'image.v1', 'module_path': 'tempest.lib.services.image.v1', 'client_names': ['ImageMembersClient', 'ImagesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'image'}, {'name': 'image_v2', 'service_version': 'image.v2', 'module_path': 'tempest.lib.services.image.v2', 'client_names': ['ImageMembersClient', 'ImagesClient', 'NamespaceObjectsClient', 'NamespacePropertiesClient', 'NamespaceTagsClient', 'NamespacesClient', 'ResourceTypesClient', 'SchemasClient', 'VersionsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'image'}, {'name': 'network', 'service_version': 'network', 'module_path': 'tempest.lib.services.network', 'client_names': ['AgentsClient', 'ExtensionsClient', 'FloatingIPsClient', 'MeteringLabelRulesClient', 'MeteringLabelsClient', 'NetworksClient', 'NetworkVersionsClient', 'PortsClient', 'QosClient', 'QosMinimumBandwidthRulesClient', 'QuotasClient', 'RoutersClient', 'SecurityGroupRulesClient', 'SecurityGroupsClient', 'SegmentsClient', 'ServiceProvidersClient', 'SubnetpoolsClient', 'SubnetsClient', 'TagsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'network'}, {'name': 'object_storage', 'service_version': 'object-storage', 'module_path': 'tempest.lib.services.object_storage', 'client_names': ['AccountClient', 'BulkMiddlewareClient', 'CapabilitiesClient', 'ContainerClient', 'ObjectClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'object-store'}, {'name': 'volume_v1', 'service_version': 'volume.v1', 'module_path': 'tempest.lib.services.volume.v1', 'client_names': ['AvailabilityZoneClient', 'BackupsClient', 'EncryptionTypesClient', 'ExtensionsClient', 'HostsClient', 'QosSpecsClient', 'QuotasClient', 'ServicesClient', 'SnapshotsClient', 'TypesClient', 'VolumesClient', 'LimitsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'volumev3'}, {'name': 'volume_v2', 'service_version': 'volume.v2', 'module_path': 'tempest.lib.services.volume.v2', 'client_names': ['AvailabilityZoneClient', 'BackupsClient', 'EncryptionTypesClient', 'ExtensionsClient', 'HostsClient', 'QosSpecsClient', 'QuotasClient', 'ServicesClient', 'SnapshotsClient', 'TypesClient', 'VolumesClient', 'LimitsClient', 'CapabilitiesClient', 'SchedulerStatsClient', 'SnapshotManageClient', 'VolumeManageClient', 'TransfersClient', 'QuotaClassesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'volumev3'}, {'name': 'volume_v3', 'service_version': 'volume.v3', 'module_path': 'tempest.lib.services.volume.v3', 'client_names': ['AttachmentsClient', 'AvailabilityZoneClient', 'BackupsClient', 'BaseClient', 'CapabilitiesClient', 'EncryptionTypesClient', 'ExtensionsClient', 'GroupSnapshotsClient', 'GroupTypesClient', 'GroupsClient', 'HostsClient', 'LimitsClient', 'MessagesClient', 'QosSpecsClient', 'QuotaClassesClient', 'QuotasClient', 'SchedulerStatsClient', 'ServicesClient', 'SnapshotManageClient', 'SnapshotsClient', 'TransfersClient', 'TypesClient', 'VersionsClient', 'VolumeManageClient', 'VolumesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'volumev3'}] register_service_client /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/services/clients.py:121 2020-11-06 17:58:36.770 37 DEBUG tempest [-] validation.ssh_timeout = 196 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.770 38 DEBUG tempest [-] config_source = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.770 40 DEBUG tempest.lib.services.clients [-] Successfully registered plugin barbican_tests in the service client registry with configuration: [{'name': 'secret_v1', 'service_version': 'secret.v1', 'module_path': 'barbican_tempest_plugin.services.key_manager.json', 'client_names': ['ConsumerClient', 'ContainerClient', 'OrderClient', 'QuotaClient', 'SecretClient', 'SecretMetadataClient']}] register_service_client /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/services/clients.py:121 2020-11-06 17:58:36.770 39 DEBUG tempest [-] telemetry.notification_sleep = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.770 38 DEBUG tempest [-] debug = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.770 37 DEBUG tempest [-] volume.backend_names = ['BACKEND_1', 'BACKEND_2'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.770 40 DEBUG tempest.lib.services.clients [-] Successfully registered plugin octavia-tempest-plugin in the service client registry with configuration: [{'name': 'load-balancer_v2', 'service_version': 'load-balancer.v2', 'module_path': 'octavia_tempest_plugin.services.load_balancer.v2', 'client_names': ['LoadbalancerClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'publicURL', 'build_timeout': 300, 'build_interval': 5.0, 'region': 'RegionOne', 'service': 'load-balancer'}] register_service_client /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/services/clients.py:121 2020-11-06 17:58:36.770 39 DEBUG tempest [-] telemetry.notification_wait = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.770 37 DEBUG tempest [-] volume.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.770 38 DEBUG tempest [-] default_log_levels = ['amqp=WARN', 'amqplib=WARN', 'boto=WARN', 'qpid=WARN', 'sqlalchemy=WARN', 'suds=INFO', 'oslo.messaging=INFO', 'oslo_messaging=INFO', 'iso8601=WARN', 'requests.packages.urllib3.connectionpool=WARN', 'urllib3.connectionpool=WARN', 'websocket=WARN', 'requests.packages.urllib3.util.retry=WARN', 'urllib3.util.retry=WARN', 'keystonemiddleware=WARN', 'routes.middleware=WARN', 'stevedore=WARN', 'taskflow=WARN', 'keystoneauth=WARN', 'oslo.cache=INFO', 'oslo_policy=INFO', 'dogpile.core.dogpile=INFO'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.771 39 DEBUG tempest [-] event.catalog_type = event log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.771 37 DEBUG tempest [-] volume.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.771 38 DEBUG tempest [-] instance_format = [instance: %(uuid)s] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.771 37 DEBUG tempest [-] volume.catalog_type = volumev3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.771 39 DEBUG tempest [-] event.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.771 38 DEBUG tempest [-] instance_uuid_format = [instance: %(uuid)s] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.771 39 DEBUG tempest [-] alarming_plugin.catalog_type = alarming log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.771 37 DEBUG tempest [-] volume.disk_format = raw log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.771 38 DEBUG tempest [-] log_config_append = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.771 39 DEBUG tempest [-] alarming_plugin.create_alarms = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.771 37 DEBUG tempest [-] volume.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.771 38 DEBUG tempest [-] log_date_format = %Y-%m-%d %H:%M:%S log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.771 39 DEBUG tempest [-] alarming_plugin.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.771 37 DEBUG tempest [-] volume.manage_snapshot_ref = ['source-name', 'snapshot-%s'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.771 38 DEBUG tempest [-] log_dir = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.772 39 DEBUG tempest [-] metric.catalog_type = metric log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.772 37 DEBUG tempest [-] volume.manage_volume_ref = ['source-name', 'volume-%s'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.772 38 DEBUG tempest [-] log_file = /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/for-deployment-c46774b6-2b57-45ff-ba6b-cb9fd0bb0e7f/tempest.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.772 39 DEBUG tempest [-] metric.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.772 37 DEBUG tempest [-] volume.max_microversion = latest log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.772 38 DEBUG tempest [-] log_rotate_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.772 39 DEBUG tempest [-] ephemeral_storage_encryption.cipher = aes-xts-plain64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.772 37 DEBUG tempest [-] volume.min_microversion = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.772 38 DEBUG tempest [-] log_rotate_interval_type = days log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.772 39 DEBUG tempest [-] ephemeral_storage_encryption.enabled = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.772 37 DEBUG tempest [-] volume.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.772 38 DEBUG tempest [-] log_rotation_type = none log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.772 39 DEBUG tempest [-] ephemeral_storage_encryption.key_size = 256 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.772 37 DEBUG tempest [-] volume.storage_protocol = ceph log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.772 38 DEBUG tempest [-] logging_context_format_string = %(asctime)s.%(msecs)03d %(process)d %(levelname)s %(name)s [%(request_id)s %(user_identity)s] %(instance)s%(message)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.772 39 DEBUG tempest [-] image_signature_verification.enforced = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.773 38 DEBUG tempest [-] logging_debug_format_suffix = %(funcName)s %(pathname)s:%(lineno)d log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.773 37 DEBUG tempest [-] volume.vendor_name = Open Source log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.773 38 DEBUG tempest [-] logging_default_format_string = %(asctime)s.%(msecs)03d %(process)d %(levelname)s %(name)s [-] %(instance)s%(message)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.773 39 DEBUG tempest [-] patrole.custom_policy_files = ['/etc/%s/policy.json'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.773 37 DEBUG tempest [-] volume.volume_size = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.773 38 DEBUG tempest [-] logging_exception_prefix = %(asctime)s.%(msecs)03d %(process)d ERROR %(name)s %(instance)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.773 39 DEBUG tempest [-] patrole.custom_requirements_file = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.773 37 DEBUG tempest [-] volume-feature-enabled.api_extensions = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.773 38 DEBUG tempest [-] logging_user_identity_format = %(user)s %(tenant)s %(domain)s %(user_domain)s %(project_domain)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.773 39 DEBUG tempest [-] patrole.rbac_test_role = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.773 37 DEBUG tempest [-] volume-feature-enabled.api_v2 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.773 38 DEBUG tempest [-] max_logfile_count = 30 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.773 39 DEBUG tempest [-] patrole.rbac_test_roles = ['admin'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.773 37 DEBUG tempest [-] volume-feature-enabled.api_v3 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.773 38 DEBUG tempest [-] max_logfile_size_mb = 200 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.774 39 DEBUG tempest [-] patrole.test_custom_requirements = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.774 37 DEBUG tempest [-] volume-feature-enabled.backup = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.774 38 DEBUG tempest [-] pause_teardown = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.774 39 DEBUG tempest [-] patrole.validate_deprecated_rules = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.774 37 DEBUG tempest [-] volume-feature-enabled.clone = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.774 38 DEBUG tempest [-] publish_errors = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.774 39 DEBUG tempest [-] patrole_log.enable_reporting = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.774 37 DEBUG tempest [-] volume-feature-enabled.consistency_group = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.774 38 DEBUG tempest [-] rate_limit_burst = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.774 39 DEBUG tempest [-] patrole_log.report_log_name = patrole.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.774 38 DEBUG tempest [-] rate_limit_except_level = CRITICAL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.774 37 DEBUG tempest [-] volume-feature-enabled.extend_attached_encrypted_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.774 38 DEBUG tempest [-] rate_limit_interval = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.774 39 DEBUG tempest [-] patrole_log.report_log_path = . log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.774 37 DEBUG tempest [-] volume-feature-enabled.extend_attached_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.774 38 DEBUG tempest [-] syslog_log_facility = LOG_USER log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.775 39 DEBUG tempest [-] policy-feature-enabled.added_cinder_policies_stein = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.775 37 DEBUG tempest [-] volume-feature-enabled.manage_snapshot = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.775 38 DEBUG tempest [-] use_eventlog = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.775 39 DEBUG tempest [-] policy-feature-enabled.changed_nova_policies_ussuri = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.775 37 DEBUG tempest [-] volume-feature-enabled.manage_volume = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.775 38 DEBUG tempest [-] use_journal = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.775 39 DEBUG tempest [-] policy-feature-enabled.changed_nova_policies_victoria = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.775 37 DEBUG tempest [-] volume-feature-enabled.multi_backend = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.775 38 DEBUG tempest [-] use_json = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.775 39 DEBUG tempest [-] policy-feature-enabled.create_port_fixed_ips_ip_address_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.775 37 DEBUG tempest [-] volume-feature-enabled.snapshot = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.775 38 DEBUG tempest [-] use_stderr = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.775 39 DEBUG tempest [-] policy-feature-enabled.keystone_policy_enforcement_train = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.775 37 DEBUG tempest [-] volume-feature-enabled.volume_revert = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.775 38 DEBUG tempest [-] use_syslog = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.775 39 DEBUG tempest [-] policy-feature-enabled.limits_extension_used_limits_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.775 37 DEBUG tempest [-] object-storage.catalog_type = object-store log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.776 38 DEBUG tempest [-] watch_log_file = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-11-06 17:58:36.776 39 DEBUG tempest [-] policy-feature-enabled.removed_keystone_policies_stein = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.776 37 DEBUG tempest [-] object-storage.cluster_name = name1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.776 38 DEBUG tempest [-] oslo_concurrency.disable_process_locking = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.776 39 DEBUG tempest [-] policy-feature-enabled.removed_nova_policies_stein = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.776 37 DEBUG tempest [-] object-storage.container_sync_interval = 5 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.776 38 DEBUG tempest [-] oslo_concurrency.lock_path = /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/for-deployment-c46774b6-2b57-45ff-ba6b-cb9fd0bb0e7f/lock_files log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.776 39 DEBUG tempest [-] policy-feature-enabled.update_port_fixed_ips_ip_address_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.776 37 DEBUG tempest [-] object-storage.container_sync_timeout = 600 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.776 39 DEBUG tempest [-] policy-feature-enabled.volume_extension_volume_actions_attach_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.776 38 DEBUG tempest [-] auth.admin_domain_name = Default log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.776 37 DEBUG tempest [-] object-storage.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.776 39 DEBUG tempest [-] policy-feature-enabled.volume_extension_volume_actions_reserve_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.776 38 DEBUG tempest [-] auth.admin_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.776 37 DEBUG tempest [-] object-storage.operator_role = member log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.776 38 DEBUG tempest [-] auth.admin_project_name = patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.776 39 DEBUG tempest [-] policy-feature-enabled.volume_extension_volume_actions_unreserve_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.777 37 DEBUG tempest [-] object-storage.realm_name = realm1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.777 38 DEBUG tempest [-] auth.admin_username = patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.777 39 DEBUG tempest [-] load_balancer.RBAC_test_type = advanced log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.777 37 DEBUG tempest [-] object-storage.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.777 38 DEBUG tempest [-] auth.create_isolated_networks = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.777 39 DEBUG tempest [-] load_balancer.admin_role = load-balancer_admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.777 37 DEBUG tempest [-] object-storage.reseller_admin_role = ResellerAdmin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.777 38 DEBUG tempest [-] auth.default_credentials_domain_name = Default log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.777 39 DEBUG tempest [-] load_balancer.amphora_admin_log_file = /var/log/octavia-amphora.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.777 37 DEBUG tempest [-] object-storage-feature-enabled.container_sync = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.777 38 DEBUG tempest [-] auth.tempest_roles = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.777 39 DEBUG tempest [-] load_balancer.amphora_ssh_key = /etc/octavia/.ssh/octavia_ssh_key log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.777 38 DEBUG tempest [-] auth.test_accounts_file = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.777 37 DEBUG tempest [-] object-storage-feature-enabled.discoverability = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.778 39 DEBUG tempest [-] load_balancer.amphora_ssh_user = ubuntu log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.778 38 DEBUG tempest [-] auth.use_dynamic_credentials = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.778 39 DEBUG tempest [-] load_balancer.availability_zone = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.778 37 DEBUG tempest [-] object-storage-feature-enabled.discoverable_apis = ['account_quotas', 'formpost', 'bulk_upload', 'bulk_delete', 'tempurl', 'crossdomain', 'container_quotas', 'staticweb', 'account_quotas', 'slo'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.778 38 DEBUG tempest [-] compute.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.778 39 DEBUG tempest [-] load_balancer.availability_zone2 = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.778 37 DEBUG tempest [-] object-storage-feature-enabled.object_versioning = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.778 39 DEBUG tempest [-] load_balancer.availability_zone3 = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.778 38 DEBUG tempest [-] compute.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.778 37 DEBUG tempest [-] scenario.dhcp_client = udhcpc log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.778 39 DEBUG tempest [-] load_balancer.build_interval = 5.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.778 38 DEBUG tempest [-] compute.catalog_type = compute log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.778 37 DEBUG tempest [-] scenario.img_container_format = bare log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.778 39 DEBUG tempest [-] load_balancer.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.778 38 DEBUG tempest [-] compute.certified_image_ref = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.779 39 DEBUG tempest [-] load_balancer.catalog_type = load-balancer log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.779 38 DEBUG tempest [-] compute.certified_image_trusted_certs = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.779 37 WARNING oslo_config.cfg [-] Deprecated: Option "img_dir" from group "scenario" is deprecated for removal. Its value may be silently ignored in the future. 2020-11-06 17:58:36.779 39 DEBUG tempest [-] load_balancer.check_interval = 5.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.779 38 DEBUG tempest [-] compute.compute_volume_common_az = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.779 37 DEBUG tempest [-] scenario.img_dir = /home/opnfv/functest/images log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.779 39 DEBUG tempest [-] load_balancer.check_timeout = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.779 38 DEBUG tempest [-] compute.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.779 37 DEBUG tempest [-] scenario.img_disk_format = qcow2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.779 39 DEBUG tempest [-] load_balancer.disable_boot_network = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.779 38 DEBUG tempest [-] compute.fixed_network_name = patrole_reader-net_30048f18-b96b-4343-a720-1173982b59b8 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.779 37 DEBUG tempest [-] scenario.img_file = cirros-0.4.0-x86_64-disk.img log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.779 39 DEBUG tempest [-] load_balancer.enable_security_groups = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.779 38 DEBUG tempest [-] compute.flavor_ref = fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.779 37 DEBUG tempest [-] scenario.img_properties = {'hw_scsi_model': 'virtio-scsi', 'hw_disk_bus': 'scsi'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.779 39 DEBUG tempest [-] load_balancer.enabled_provider_drivers = {'amphora': 'The Octavia Amphora driver.', 'amphorav2': 'The Octavia Amphora driver that uses taskflow jobboard persistence.', 'octavia': 'Deprecated alias of the Octavia Amphora driver.'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.779 38 DEBUG tempest [-] compute.flavor_ref_alt = a93eb10f-c417-43d8-812c-06039356e038 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.780 37 DEBUG tempest [-] scenario.protocol = icmp log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.780 39 DEBUG tempest [-] load_balancer.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.780 38 DEBUG tempest [-] compute.hypervisor_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.780 37 DEBUG tempest [-] service_available.aodh = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.780 39 DEBUG tempest [-] load_balancer.expected_availability_zone_capability = {'compute_zone': 'The compute availability zone.'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.780 38 DEBUG tempest [-] compute.image_ref = 56b368f6-9136-40ec-a04c-564d02c95e42 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.780 37 DEBUG tempest [-] service_available.barbican = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.780 38 DEBUG tempest [-] compute.image_ref_alt = de34e15c-369a-4038-89ed-d4de22d742c6 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.780 39 DEBUG tempest [-] load_balancer.expected_flavor_capability = {'loadbalancer_topology': 'The load balancer topology. One of: SINGLE - One amphora per load balancer. ACTIVE_STANDBY - Two amphora per load balancer.'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.780 37 DEBUG tempest [-] service_available.ceilometer = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.780 38 DEBUG tempest [-] compute.max_microversion = latest log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.780 39 DEBUG tempest [-] load_balancer.lb_build_interval = 10.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.780 37 DEBUG tempest [-] service_available.cinder = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.780 39 DEBUG tempest [-] load_balancer.lb_build_timeout = 900 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.780 38 DEBUG tempest [-] compute.min_compute_nodes = 2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.781 37 DEBUG tempest [-] service_available.cyborg = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.781 38 DEBUG tempest [-] compute.min_microversion = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.781 39 DEBUG tempest [-] load_balancer.loadbalancer_topology = SINGLE log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.781 37 DEBUG tempest [-] service_available.glance = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.781 38 DEBUG tempest [-] compute.ready_wait = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.781 39 DEBUG tempest [-] load_balancer.member_1_ipv4_subnet_cidr = 10.2.1.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.781 37 DEBUG tempest [-] service_available.gnocchi = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.781 38 DEBUG tempest [-] compute.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.781 39 DEBUG tempest [-] load_balancer.member_1_ipv6_subnet_cidr = fd7b:f9f7:0fff:4eca::/64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.781 37 DEBUG tempest [-] service_available.heat = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.781 38 DEBUG tempest [-] compute.shelved_offload_time = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.781 39 DEBUG tempest [-] load_balancer.member_2_ipv4_subnet_cidr = 10.2.2.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.781 37 DEBUG tempest [-] service_available.load_balancer = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.781 38 DEBUG tempest [-] compute.volume_device_name = sdb log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.781 39 DEBUG tempest [-] load_balancer.member_2_ipv6_subnet_cidr = fd77:1457:4cf0:26a8::/64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.782 37 DEBUG tempest [-] service_available.neutron = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.782 38 DEBUG tempest [-] compute-feature-enabled.api_extensions = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.782 39 DEBUG tempest [-] load_balancer.member_role = load-balancer_member log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.782 39 DEBUG tempest [-] load_balancer.octavia_svc_username = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.782 37 DEBUG tempest [-] service_available.nova = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.782 38 DEBUG tempest [-] compute-feature-enabled.attach_encrypted_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.782 39 DEBUG tempest [-] load_balancer.provider = octavia log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.782 37 DEBUG tempest [-] service_available.panko = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.782 38 WARNING oslo_config.cfg [-] Deprecated: Option "block_migrate_cinder_iscsi" from group "compute-feature-enabled" is deprecated for removal (This option duplicates the more generic [compute-feature-enabled]/block_migration _for_live_migration now that MIN_LIBVIRT_VERSION is >= 1.2.17 on all branches from stable/rocky and will be removed in a future release.). Its value may be silently ignored in the future. 2020-11-06 17:58:36.782 39 DEBUG tempest [-] load_balancer.random_server_name_length = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.782 37 DEBUG tempest [-] service_available.swift = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.782 39 DEBUG tempest [-] load_balancer.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.782 38 DEBUG tempest [-] compute-feature-enabled.block_migrate_cinder_iscsi = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.782 37 DEBUG tempest [-] debug.trace_requests = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.783 39 DEBUG tempest [-] load_balancer.scp_connection_attempts = 20 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.783 38 DEBUG tempest [-] compute-feature-enabled.block_migration_for_live_migration = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.783 37 DEBUG tempest [-] placement.catalog_type = placement log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.783 39 DEBUG tempest [-] load_balancer.scp_connection_timeout = 5 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.783 38 DEBUG tempest [-] compute-feature-enabled.can_migrate_between_any_hosts = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.783 37 DEBUG tempest [-] placement.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.783 39 DEBUG tempest [-] load_balancer.tenant_flow_log_file = /var/log/octavia-tenant-traffic.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.783 38 DEBUG tempest [-] compute-feature-enabled.change_password = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.783 37 DEBUG tempest [-] placement.max_microversion = latest log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.783 39 DEBUG tempest [-] load_balancer.test_ipv6_subnet_override = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.783 38 DEBUG tempest [-] compute-feature-enabled.cold_migration = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.783 37 DEBUG tempest [-] placement.min_microversion = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.783 39 DEBUG tempest [-] load_balancer.test_network_override = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.783 38 DEBUG tempest [-] compute-feature-enabled.config_drive = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.783 39 DEBUG tempest [-] load_balancer.test_reuse_connection = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.784 37 DEBUG tempest [-] placement.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.784 38 DEBUG tempest [-] compute-feature-enabled.console_output = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.784 39 DEBUG tempest [-] load_balancer.test_subnet_override = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.784 37 DEBUG tempest [-] profiler.key = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.784 38 DEBUG tempest [-] compute-feature-enabled.disk_config = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.784 39 DEBUG tempest [-] load_balancer.test_with_ipv6 = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.784 37 DEBUG tempest [-] heat_plugin.admin_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.784 38 DEBUG tempest [-] compute-feature-enabled.enable_instance_password = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.784 39 DEBUG tempest [-] load_balancer.test_with_noop = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.784 37 DEBUG tempest [-] heat_plugin.admin_project_name = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.784 38 DEBUG tempest [-] compute-feature-enabled.interface_attach = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.784 39 DEBUG tempest [-] load_balancer.vip_ipv6_subnet_cidr = fdde:1a92:7523:70a0::/64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.784 37 DEBUG tempest [-] heat_plugin.admin_username = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.784 38 DEBUG tempest [-] compute-feature-enabled.live_migrate_back_and_forth = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.784 39 DEBUG tempest [-] load_balancer.vip_subnet_cidr = 10.1.1.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.784 37 DEBUG tempest [-] heat_plugin.auth_url = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.784 38 DEBUG tempest [-] compute-feature-enabled.live_migration = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.785 39 DEBUG tempest [-] loadbalancer-feature-enabled.health_monitor_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.785 37 DEBUG tempest [-] heat_plugin.auth_version = 3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.785 38 DEBUG tempest [-] compute-feature-enabled.metadata_service = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.785 39 DEBUG tempest [-] loadbalancer-feature-enabled.l4_protocol = TCP log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.785 37 DEBUG tempest [-] heat_plugin.boot_config_env = /usr/lib/python3.8/site-packages/heat_tempest_plugin/tests/scenario/templates/boot_config_none_env.yaml log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.785 38 DEBUG tempest [-] compute-feature-enabled.nova_cert = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.785 37 DEBUG tempest [-] heat_plugin.build_interval = 4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.785 39 DEBUG tempest [-] loadbalancer-feature-enabled.l7_protocol_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.785 38 DEBUG tempest [-] compute-feature-enabled.pause = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.785 39 DEBUG tempest [-] loadbalancer-feature-enabled.log_offload_enabled = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.785 37 DEBUG tempest [-] heat_plugin.build_timeout = 1200 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.785 38 DEBUG tempest [-] compute-feature-enabled.personality = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.785 39 DEBUG tempest [-] loadbalancer-feature-enabled.not_implemented_is_error = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.785 37 DEBUG tempest [-] heat_plugin.ca_file = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.786 39 DEBUG tempest [-] loadbalancer-feature-enabled.pool_algorithms_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.786 38 WARNING oslo_config.cfg [-] Deprecated: Option "rdp_console" from group "compute-feature-enabled" is deprecated for removal (This config option is not being used in Tempest, we can add it back when adding the test cases.). Its value may be silently ignored in the future. 2020-11-06 17:58:36.786 37 DEBUG tempest [-] heat_plugin.catalog_type = orchestration log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.786 39 DEBUG tempest [-] loadbalancer-feature-enabled.session_persistence_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.786 38 DEBUG tempest [-] compute-feature-enabled.rdp_console = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.786 37 DEBUG tempest [-] heat_plugin.connectivity_timeout = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.786 39 DEBUG tempest [-] loadbalancer-feature-enabled.spare_pool_enabled = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.786 38 DEBUG tempest [-] compute-feature-enabled.rescue = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.786 37 DEBUG tempest [-] heat_plugin.convergence_engine_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.786 39 DEBUG tempest [-] loadbalancer-feature-enabled.terminated_tls_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.786 38 DEBUG tempest [-] compute-feature-enabled.resize = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.786 37 DEBUG tempest [-] heat_plugin.credential_secret_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.786 39 DEBUG tempest [-] ******************************************************************************** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2591 2020-11-06 17:58:36.786 37 DEBUG tempest [-] heat_plugin.disable_ssl_certificate_validation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.786 38 WARNING oslo_config.cfg [-] Deprecated: Option "scheduler_available_filters" from group "compute-feature-enabled" is deprecated. Use option "scheduler_enabled_filters" from group "compute-feature-enabled". 2020-11-06 17:58:36.787 37 DEBUG tempest [-] heat_plugin.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.787 38 DEBUG tempest [-] compute-feature-enabled.scheduler_enabled_filters = ['AvailabilityZoneFilter', 'ComputeFilter', 'ComputeCapabilitiesFilter', 'ImagePropertiesFilter', 'ServerGroupAntiAffinityFilter', 'ServerGroupAffinityFilter', 'SameHostFilter', 'DifferentHostFilter'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.787 37 DEBUG tempest [-] heat_plugin.fixed_network_name = heat-net log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.787 38 DEBUG tempest [-] compute-feature-enabled.serial_console = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.787 37 DEBUG tempest [-] heat_plugin.fixed_subnet_name = heat-subnet log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.787 38 DEBUG tempest [-] compute-feature-enabled.shelve = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.787 37 DEBUG tempest [-] heat_plugin.floating_network_name = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.787 38 DEBUG tempest [-] compute-feature-enabled.snapshot = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.787 37 DEBUG tempest [-] heat_plugin.heat_config_notify_script = heat-config-notify log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.788 38 WARNING oslo_config.cfg [-] Deprecated: Option "spice_console" from group "compute-feature-enabled" is deprecated for removal (This config option is not being used in Tempest, we can add it back when adding the test cases.). Its value may be silently ignored in the future. 2020-11-06 17:58:36.788 37 DEBUG tempest [-] heat_plugin.hidden_stack_tag = data-processing-cluster log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.788 37 DEBUG tempest [-] heat_plugin.image_ref = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.788 38 DEBUG tempest [-] compute-feature-enabled.spice_console = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.788 37 DEBUG tempest [-] heat_plugin.instance_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.788 38 DEBUG tempest [-] compute-feature-enabled.stable_rescue = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.788 37 DEBUG tempest [-] heat_plugin.ip_version_for_ssh = 4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.788 38 DEBUG tempest [-] compute-feature-enabled.suspend = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.788 37 DEBUG tempest [-] heat_plugin.keypair_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.788 38 DEBUG tempest [-] compute-feature-enabled.swap_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.788 39 DEBUG tempest.lib.services.clients [-] Successfully registered plugin __tempest__ in the service client registry with configuration: [{'name': 'compute', 'service_version': 'compute', 'module_path': 'tempest.lib.services.compute', 'client_names': ['AgentsClient', 'AggregatesClient', 'AvailabilityZoneClient', 'BaremetalNodesClient', 'CertificatesClient', 'ExtensionsClient', 'FixedIPsClient', 'FlavorsClient', 'FloatingIPPoolsClient', 'FloatingIPsBulkClient', 'FloatingIPsClient', 'HostsClient', 'HypervisorClient', 'ImagesClient', 'InstanceUsagesAuditLogClient', 'InterfacesClient', 'KeyPairsClient', 'LimitsClient', 'MigrationsClient', 'NetworksClient', 'QuotaClassesClient', 'QuotasClient', 'SecurityGroupDefaultRulesClient', 'SecurityGroupRulesClient', 'SecurityGroupsClient', 'ServerGroupsClient', 'ServersClient', 'ServicesClient', 'SnapshotsClient', 'TenantNetworksClient', 'TenantUsagesClient', 'VersionsClient', 'VolumesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'compute'}, {'name': 'placement', 'service_version': 'placement', 'module_path': 'tempest.lib.services.placement', 'client_names': ['PlacementClient', 'ResourceProvidersClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'placement'}, {'name': 'identity_v2', 'service_version': 'identity.v2', 'module_path': 'tempest.lib.services.identity.v2', 'client_names': ['EndpointsClient', 'IdentityClient', 'RolesClient', 'ServicesClient', 'TenantsClient', 'TokenClient', 'UsersClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'identity'}, {'name': 'identity_v3', 'service_version': 'identity.v3', 'module_path': 'tempest.lib.services.identity.v3', 'client_names': ['AccessRulesClient', 'ApplicationCredentialsClient', 'CatalogClient', 'CredentialsClient', 'DomainsClient', 'DomainConfigurationClient', 'EndPointGroupsClient', 'EndPointsClient', 'EndPointsFilterClient', 'GroupsClient', 'IdentityClient', 'InheritedRolesClient', 'OAUTHConsumerClient', 'OAUTHTokenClient', 'PoliciesClient', 'ProjectsClient', 'ProjectTagsClient', 'RegionsClient', 'RoleAssignmentsClient', 'RolesClient', 'ServicesClient', 'V3TokenClient', 'TrustsClient', 'UsersClient', 'VersionsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'identity'}, {'name': 'image_v1', 'service_version': 'image.v1', 'module_path': 'tempest.lib.services.image.v1', 'client_names': ['ImageMembersClient', 'ImagesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'image'}, {'name': 'image_v2', 'service_version': 'image.v2', 'module_path': 'tempest.lib.services.image.v2', 'client_names': ['ImageMembersClient', 'ImagesClient', 'NamespaceObjectsClient', 'NamespacePropertiesClient', 'NamespaceTagsClient', 'NamespacesClient', 'ResourceTypesClient', 'SchemasClient', 'VersionsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'image'}, {'name': 'network', 'service_version': 'network', 'module_path': 'tempest.lib.services.network', 'client_names': ['AgentsClient', 'ExtensionsClient', 'FloatingIPsClient', 'MeteringLabelRulesClient', 'MeteringLabelsClient', 'NetworksClient', 'NetworkVersionsClient', 'PortsClient', 'QosClient', 'QosMinimumBandwidthRulesClient', 'QuotasClient', 'RoutersClient', 'SecurityGroupRulesClient', 'SecurityGroupsClient', 'SegmentsClient', 'ServiceProvidersClient', 'SubnetpoolsClient', 'SubnetsClient', 'TagsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'network'}, {'name': 'object_storage', 'service_version': 'object-storage', 'module_path': 'tempest.lib.services.object_storage', 'client_names': ['AccountClient', 'BulkMiddlewareClient', 'CapabilitiesClient', 'ContainerClient', 'ObjectClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'object-store'}, {'name': 'volume_v1', 'service_version': 'volume.v1', 'module_path': 'tempest.lib.services.volume.v1', 'client_names': ['AvailabilityZoneClient', 'BackupsClient', 'EncryptionTypesClient', 'ExtensionsClient', 'HostsClient', 'QosSpecsClient', 'QuotasClient', 'ServicesClient', 'SnapshotsClient', 'TypesClient', 'VolumesClient', 'LimitsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'volumev3'}, {'name': 'volume_v2', 'service_version': 'volume.v2', 'module_path': 'tempest.lib.services.volume.v2', 'client_names': ['AvailabilityZoneClient', 'BackupsClient', 'EncryptionTypesClient', 'ExtensionsClient', 'HostsClient', 'QosSpecsClient', 'QuotasClient', 'ServicesClient', 'SnapshotsClient', 'TypesClient', 'VolumesClient', 'LimitsClient', 'CapabilitiesClient', 'SchedulerStatsClient', 'SnapshotManageClient', 'VolumeManageClient', 'TransfersClient', 'QuotaClassesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'volumev3'}, {'name': 'volume_v3', 'service_version': 'volume.v3', 'module_path': 'tempest.lib.services.volume.v3', 'client_names': ['AttachmentsClient', 'AvailabilityZoneClient', 'BackupsClient', 'BaseClient', 'CapabilitiesClient', 'EncryptionTypesClient', 'ExtensionsClient', 'GroupSnapshotsClient', 'GroupTypesClient', 'GroupsClient', 'HostsClient', 'LimitsClient', 'MessagesClient', 'QosSpecsClient', 'QuotaClassesClient', 'QuotasClient', 'SchedulerStatsClient', 'ServicesClient', 'SnapshotManageClient', 'SnapshotsClient', 'TransfersClient', 'TypesClient', 'VersionsClient', 'VolumeManageClient', 'VolumesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'volumev3'}] register_service_client /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/services/clients.py:121 2020-11-06 17:58:36.789 37 DEBUG tempest [-] heat_plugin.minimal_image_ref = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.789 38 DEBUG tempest [-] compute-feature-enabled.vnc_console = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.789 39 DEBUG tempest.lib.services.clients [-] Successfully registered plugin barbican_tests in the service client registry with configuration: [{'name': 'secret_v1', 'service_version': 'secret.v1', 'module_path': 'barbican_tempest_plugin.services.key_manager.json', 'client_names': ['ConsumerClient', 'ContainerClient', 'OrderClient', 'QuotaClient', 'SecretClient', 'SecretMetadataClient']}] register_service_client /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/services/clients.py:121 2020-11-06 17:58:36.789 37 DEBUG tempest [-] heat_plugin.minimal_instance_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.789 38 DEBUG tempest [-] compute-feature-enabled.vnc_server_header = WebSockify log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.789 39 DEBUG tempest.lib.services.clients [-] Successfully registered plugin octavia-tempest-plugin in the service client registry with configuration: [{'name': 'load-balancer_v2', 'service_version': 'load-balancer.v2', 'module_path': 'octavia_tempest_plugin.services.load_balancer.v2', 'client_names': ['LoadbalancerClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'publicURL', 'build_timeout': 300, 'build_interval': 5.0, 'region': 'RegionOne', 'service': 'load-balancer'}] register_service_client /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/services/clients.py:121 2020-11-06 17:58:36.789 37 DEBUG tempest [-] heat_plugin.network_for_ssh = heat-net log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.789 38 DEBUG tempest [-] compute-feature-enabled.volume_backed_live_migration = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.789 37 DEBUG tempest [-] heat_plugin.password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.789 38 DEBUG tempest [-] compute-feature-enabled.volume_multiattach = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.789 37 DEBUG tempest [-] heat_plugin.project_domain_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.790 38 DEBUG tempest [-] compute-feature-enabled.xenapi_apis = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.790 37 DEBUG tempest [-] heat_plugin.project_domain_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.790 38 DEBUG tempest [-] identity.admin_domain_scope = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.790 37 DEBUG tempest [-] heat_plugin.project_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.790 38 DEBUG tempest [-] identity.admin_role = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.790 37 DEBUG tempest [-] heat_plugin.region = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.790 38 DEBUG tempest [-] identity.auth_version = v3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.790 37 DEBUG tempest [-] heat_plugin.skip_functional_test_list = ['EncryptionVolTypeTest'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.790 38 DEBUG tempest [-] identity.ca_certificates_file = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.790 37 DEBUG tempest [-] heat_plugin.skip_functional_tests = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.790 38 DEBUG tempest [-] identity.catalog_type = identity log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.791 37 DEBUG tempest [-] heat_plugin.skip_scenario_test_list = ['AodhAlarmTest', 'SoftwareConfigIntegrationTest', 'VolumeBackupRestoreIntegrationTest', 'CfnInitIntegrationTest', 'LoadBalancerTest'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.791 38 DEBUG tempest [-] identity.default_domain_id = default log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.791 37 DEBUG tempest [-] heat_plugin.skip_scenario_tests = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.791 38 DEBUG tempest [-] identity.disable_ssl_certificate_validation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.791 37 DEBUG tempest [-] heat_plugin.skip_test_stack_action_list = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.791 38 DEBUG tempest [-] identity.region = RegionOne log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.791 37 DEBUG tempest [-] heat_plugin.ssh_channel_timeout = 60 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.791 38 DEBUG tempest [-] identity.uri = http://172.30.13.94/identity/v2.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.791 37 DEBUG tempest [-] heat_plugin.ssh_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.791 38 DEBUG tempest [-] identity.uri_v3 = http://172.30.13.94/identity/v3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.792 37 DEBUG tempest [-] heat_plugin.user_domain_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.792 38 DEBUG tempest [-] identity.user_lockout_duration = 10 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.792 37 DEBUG tempest [-] heat_plugin.user_domain_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.792 38 DEBUG tempest [-] identity.user_lockout_failure_attempts = 2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.792 37 DEBUG tempest [-] heat_plugin.username = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.792 38 DEBUG tempest [-] identity.user_unique_last_password_count = 2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.792 37 DEBUG tempest [-] heat_plugin.vm_to_heat_api_insecure = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.792 38 DEBUG tempest [-] identity.v2_admin_endpoint_type = adminURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.792 37 DEBUG tempest [-] heat_plugin.volume_size = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.792 38 DEBUG tempest [-] identity.v2_public_endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.793 37 DEBUG tempest [-] heat_features_enabled.multi_cloud = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.793 38 DEBUG tempest [-] identity.v3_endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.793 37 DEBUG tempest [-] heat_features_enabled.stack_cancel = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.793 38 DEBUG tempest [-] service-clients.http_timeout = 60 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.793 37 DEBUG tempest [-] fed_scenario.enable_k2k_groups_mapping = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.793 38 DEBUG tempest [-] service-clients.proxy_url = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.793 37 DEBUG tempest [-] fed_scenario.idp_ecp_url = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.793 38 DEBUG tempest [-] identity-feature-enabled.access_rules = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.793 37 DEBUG tempest [-] fed_scenario.idp_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.794 38 DEBUG tempest [-] identity-feature-enabled.api_extensions = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.794 37 DEBUG tempest [-] fed_scenario.idp_password = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.794 37 DEBUG tempest [-] fed_scenario.idp_remote_ids = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.794 38 WARNING oslo_config.cfg [-] Deprecated: Option "api_v2" from group "identity-feature-enabled" is deprecated for removal (The identity v2.0 API was removed in the Queens release. Tests that exercise the v2.0 API will be removed from tempest in the v22.0.0 release. They are kept only to test stable branches.). Its value may be silently ignored in the future. 2020-11-06 17:58:36.794 37 DEBUG tempest [-] fed_scenario.idp_username = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.794 38 DEBUG tempest [-] identity-feature-enabled.api_v2 = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.794 37 DEBUG tempest [-] fed_scenario.mapping_group_domain_name = federated_domain log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.794 38 DEBUG tempest [-] identity-feature-enabled.api_v2_admin = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.794 37 DEBUG tempest [-] fed_scenario.mapping_group_name = federated_users log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.794 38 DEBUG tempest [-] identity-feature-enabled.api_v3 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.795 37 DEBUG tempest [-] fed_scenario.mapping_remote_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.795 38 DEBUG tempest [-] identity-feature-enabled.application_credentials = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.795 37 DEBUG tempest [-] fed_scenario.mapping_user_name = {0} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.795 38 DEBUG tempest [-] identity-feature-enabled.domain_specific_drivers = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.795 37 DEBUG tempest [-] fed_scenario.protocol_id = mapped log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.795 38 DEBUG tempest [-] identity-feature-enabled.external_idp = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.795 37 DEBUG tempest [-] telemetry.alarm_aggregation_method = rate:mean log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.795 38 DEBUG tempest [-] identity-feature-enabled.federation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.795 37 DEBUG tempest [-] telemetry.alarm_granularity = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.795 38 DEBUG tempest [-] identity-feature-enabled.immutable_user_source = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.796 37 DEBUG tempest [-] telemetry.alarm_metric_name = cpu log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.796 38 DEBUG tempest [-] identity-feature-enabled.project_tags = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.796 37 DEBUG tempest [-] telemetry.alarm_threshold = 10 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.796 38 DEBUG tempest [-] identity-feature-enabled.security_compliance = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.796 37 DEBUG tempest [-] telemetry.disable_ssl_certificate_validation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.796 38 DEBUG tempest [-] identity-feature-enabled.trust = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.796 37 DEBUG tempest [-] telemetry.notification_sleep = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.796 38 DEBUG tempest [-] image.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.796 37 DEBUG tempest [-] telemetry.notification_wait = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.796 38 DEBUG tempest [-] image.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.797 37 DEBUG tempest [-] event.catalog_type = event log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.797 38 DEBUG tempest [-] image.catalog_type = image log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.797 37 DEBUG tempest [-] event.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.797 38 DEBUG tempest [-] image.container_formats = ['ami', 'ari', 'aki', 'bare', 'ovf', 'ova'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.797 37 DEBUG tempest [-] alarming_plugin.catalog_type = alarming log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.797 38 DEBUG tempest [-] image.disk_formats = ['ami', 'ari', 'aki', 'vhd', 'vmdk', 'raw', 'qcow2', 'vdi', 'iso', 'vhdx'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.797 37 DEBUG tempest [-] alarming_plugin.create_alarms = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.797 38 DEBUG tempest [-] image.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.797 37 DEBUG tempest [-] alarming_plugin.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.797 38 DEBUG tempest [-] image.http_image = http://download.cirros-cloud.net/0.3.1/cirros-0.3.1-x86_64-uec.tar.gz log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.798 37 DEBUG tempest [-] metric.catalog_type = metric log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.798 38 DEBUG tempest [-] image.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.798 37 DEBUG tempest [-] metric.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.798 37 DEBUG tempest [-] ephemeral_storage_encryption.cipher = aes-xts-plain64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.798 38 WARNING oslo_config.cfg [-] Deprecated: Option "api_v1" from group "image-feature-enabled" is deprecated for removal (Glance v1 APIs are deprecated and v2 APIs are current one. In future, Tempest will test v2 APIs only so this config option will be removed.). Its value may be silently ignored in the future. 2020-11-06 17:58:36.798 37 DEBUG tempest [-] ephemeral_storage_encryption.enabled = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.798 38 DEBUG tempest [-] image-feature-enabled.api_v1 = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.798 37 DEBUG tempest [-] ephemeral_storage_encryption.key_size = 256 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.798 38 WARNING oslo_config.cfg [-] Deprecated: Option "api_v2" from group "image-feature-enabled" is deprecated for removal (Glance v1 APIs are deprecated and v2 APIs are current one. In future, Tempest will test v2 APIs only so this config option will be removed.). Its value may be silently ignored in the future. 2020-11-06 17:58:36.799 37 DEBUG tempest [-] image_signature_verification.enforced = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.799 38 DEBUG tempest [-] image-feature-enabled.api_v2 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.799 37 DEBUG tempest [-] patrole.custom_policy_files = ['/etc/%s/policy.json'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.799 38 DEBUG tempest [-] image-feature-enabled.import_image = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.799 37 DEBUG tempest [-] patrole.custom_requirements_file = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.799 38 DEBUG tempest [-] network.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.799 37 DEBUG tempest [-] patrole.rbac_test_role = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.799 38 DEBUG tempest [-] network.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.799 37 DEBUG tempest [-] patrole.rbac_test_roles = ['admin'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.799 38 DEBUG tempest [-] network.catalog_type = network log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.800 37 DEBUG tempest [-] patrole.test_custom_requirements = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.800 38 DEBUG tempest [-] network.default_network = ['192.168.120.0/24'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.800 37 DEBUG tempest [-] patrole.validate_deprecated_rules = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.800 38 DEBUG tempest [-] network.dns_servers = ['8.8.8.8', '8.8.4.4'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.800 37 DEBUG tempest [-] patrole_log.enable_reporting = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.800 38 DEBUG tempest [-] network.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.800 37 DEBUG tempest [-] patrole_log.report_log_name = patrole.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.800 38 DEBUG tempest [-] network.floating_network_name = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.800 37 DEBUG tempest [-] patrole_log.report_log_path = . log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.801 38 DEBUG tempest [-] network.port_profile = {} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.801 37 DEBUG tempest [-] policy-feature-enabled.added_cinder_policies_stein = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.801 38 DEBUG tempest [-] network.port_vnic_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.801 37 DEBUG tempest [-] policy-feature-enabled.changed_nova_policies_ussuri = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.801 38 DEBUG tempest [-] network.project_network_cidr = 192.168.120.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.801 37 DEBUG tempest [-] policy-feature-enabled.changed_nova_policies_victoria = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.801 38 DEBUG tempest [-] network.project_network_mask_bits = 28 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.801 37 DEBUG tempest [-] policy-feature-enabled.create_port_fixed_ips_ip_address_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.801 38 DEBUG tempest [-] network.project_network_v6_cidr = 2001:db8::/48 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.801 37 DEBUG tempest [-] policy-feature-enabled.keystone_policy_enforcement_train = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.802 38 DEBUG tempest [-] network.project_network_v6_mask_bits = 64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.802 37 DEBUG tempest [-] policy-feature-enabled.limits_extension_used_limits_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.802 38 DEBUG tempest [-] network.project_networks_reachable = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.802 37 DEBUG tempest [-] policy-feature-enabled.removed_keystone_policies_stein = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.802 38 DEBUG tempest [-] network.public_network_id = 3fe4fc32-89a3-4f72-b166-6eb7100e1fea log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.802 37 DEBUG tempest [-] policy-feature-enabled.removed_nova_policies_stein = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.802 38 DEBUG tempest [-] network.public_router_id = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.802 37 DEBUG tempest [-] policy-feature-enabled.update_port_fixed_ips_ip_address_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.802 38 DEBUG tempest [-] network.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.802 37 DEBUG tempest [-] policy-feature-enabled.volume_extension_volume_actions_attach_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.803 38 DEBUG tempest [-] network.shared_physical_network = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.803 37 DEBUG tempest [-] policy-feature-enabled.volume_extension_volume_actions_reserve_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.803 38 DEBUG tempest [-] network.subnet_id = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.803 37 DEBUG tempest [-] policy-feature-enabled.volume_extension_volume_actions_unreserve_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.803 37 DEBUG tempest [-] load_balancer.RBAC_test_type = advanced log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.803 38 DEBUG tempest [-] network-feature-enabled.api_extensions = ['address-group', 'address-scope', 'router-admin-state-down-before-update', 'agent', 'agent-resources-synced', 'allowed-address-pairs', 'auto-allocated-topology', 'availability_zone', 'availability_zone_filter', 'default-subnetpools', 'dhcp_agent_scheduler', 'dns-integration', 'dns-domain-ports', 'dvr', 'empty-string-filtering', 'expose-port-forwarding-in-fip', 'external-net', 'extra_dhcp_opt', 'extraroute', 'extraroute-atomic', 'filter-validation', 'floating-ip-port-forwarding-description', 'fip-port-details', 'flavors', 'floating-ip-port-forwarding', 'floatingip-pools', 'ip_allocation', 'ip-substring-filtering', 'l2_adjacency', 'router', 'ext-gw-mode', 'l3-ha', 'l3-flavors', 'l3-port-ip-change-not-allowed', 'l3_agent_scheduler', 'logging', 'multi-provider', 'net-mtu', 'net-mtu-writable', 'network_availability_zone', 'network-ip-availability', 'pagination', 'port-mac-address-regenerate', 'port-resource-request', 'binding', 'binding-extended', 'port-security', 'project-id', 'provider', 'qos', 'qos-bw-limit-direction', 'qos-bw-minimum-ingress', 'qos-default', 'qos-fip', 'qos-gateway-ip', 'qos-port-network-policy', 'qos-rule-type-details', 'qos-rules-alias', 'quotas', 'quota_details', 'rbac-policies', 'rbac-address-scope', 'rbac-security-groups', 'rbac-subnetpool', 'revision-if-match', 'standard-attr-revisions', 'router_availability_zone', 'port-security-groups-filtering', 'security-group', 'segment', 'segments-peer-subnet-host-routes', 'service-type', 'sorting', 'standard-attr-segment', 'standard-attr-description', 'stateful-security-group', 'subnet-dns-publish-fixed-ip', 'subnet_onboard', 'subnet-segmentid-writable', 'subnet-service-types', 'subnet_allocation', 'subnetpool-prefix-ops', 'standard-attr-tag', 'standard-attr-timestamp', 'trunk', 'trunk-details'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.803 37 DEBUG tempest [-] load_balancer.admin_role = load-balancer_admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.803 38 DEBUG tempest [-] network-feature-enabled.available_features = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.803 37 DEBUG tempest [-] load_balancer.amphora_admin_log_file = /var/log/octavia-amphora.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.804 38 DEBUG tempest [-] network-feature-enabled.floating_ips = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.804 37 DEBUG tempest [-] load_balancer.amphora_ssh_key = /etc/octavia/.ssh/octavia_ssh_key log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.804 38 DEBUG tempest [-] network-feature-enabled.ipv6 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.804 37 DEBUG tempest [-] load_balancer.amphora_ssh_user = ubuntu log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.804 38 DEBUG tempest [-] network-feature-enabled.ipv6_subnet_attributes = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.804 37 DEBUG tempest [-] load_balancer.availability_zone = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.804 38 DEBUG tempest [-] network-feature-enabled.port_admin_state_change = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.804 37 DEBUG tempest [-] load_balancer.availability_zone2 = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.804 38 DEBUG tempest [-] network-feature-enabled.port_security = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.804 37 DEBUG tempest [-] load_balancer.availability_zone3 = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.805 38 DEBUG tempest [-] network-feature-enabled.provider_net_base_segmentation_id = 3000 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.805 37 DEBUG tempest [-] load_balancer.build_interval = 5.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.805 38 DEBUG tempest [-] network-feature-enabled.qos_placement_physnet = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.805 37 DEBUG tempest [-] load_balancer.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.805 38 DEBUG tempest [-] validation.auth_method = keypair log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.805 37 DEBUG tempest [-] load_balancer.catalog_type = load-balancer log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.805 38 DEBUG tempest [-] validation.connect_method = floating log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.805 37 DEBUG tempest [-] load_balancer.check_interval = 5.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.805 38 DEBUG tempest [-] validation.connect_timeout = 60 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.805 37 DEBUG tempest [-] load_balancer.check_timeout = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.806 38 DEBUG tempest [-] validation.floating_ip_range = 10.0.0.0/29 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.806 37 DEBUG tempest [-] load_balancer.disable_boot_network = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.806 38 DEBUG tempest [-] validation.image_ssh_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.806 37 DEBUG tempest [-] load_balancer.enable_security_groups = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.806 38 DEBUG tempest [-] validation.image_ssh_user = cirros log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.806 37 DEBUG tempest [-] load_balancer.enabled_provider_drivers = {'amphora': 'The Octavia Amphora driver.', 'amphorav2': 'The Octavia Amphora driver that uses taskflow jobboard persistence.', 'octavia': 'Deprecated alias of the Octavia Amphora driver.'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.806 38 DEBUG tempest [-] validation.ip_version_for_ssh = 4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.806 37 DEBUG tempest [-] load_balancer.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.806 38 DEBUG tempest [-] validation.network_for_ssh = patrole_reader-net_30048f18-b96b-4343-a720-1173982b59b8 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.806 37 DEBUG tempest [-] load_balancer.expected_availability_zone_capability = {'compute_zone': 'The compute availability zone.'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.806 38 DEBUG tempest [-] validation.ping_count = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.807 37 DEBUG tempest [-] load_balancer.expected_flavor_capability = {'loadbalancer_topology': 'The load balancer topology. One of: SINGLE - One amphora per load balancer. ACTIVE_STANDBY - Two amphora per load balancer.'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.807 38 DEBUG tempest [-] validation.ping_size = 56 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.807 37 DEBUG tempest [-] load_balancer.lb_build_interval = 10.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.807 38 DEBUG tempest [-] validation.ping_timeout = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.807 37 DEBUG tempest [-] load_balancer.lb_build_timeout = 900 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.807 38 DEBUG tempest [-] validation.run_validation = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.807 37 DEBUG tempest [-] load_balancer.loadbalancer_topology = SINGLE log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.807 38 DEBUG tempest [-] validation.security_group = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.807 37 DEBUG tempest [-] load_balancer.member_1_ipv4_subnet_cidr = 10.2.1.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.807 38 DEBUG tempest [-] validation.security_group_rules = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.808 37 DEBUG tempest [-] load_balancer.member_1_ipv6_subnet_cidr = fd7b:f9f7:0fff:4eca::/64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.808 38 DEBUG tempest [-] validation.ssh_shell_prologue = set -eu -o pipefail; PATH=$PATH:/sbin:/usr/sbin; log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.808 37 DEBUG tempest [-] load_balancer.member_2_ipv4_subnet_cidr = 10.2.2.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.808 38 DEBUG tempest [-] validation.ssh_timeout = 196 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.808 37 DEBUG tempest [-] load_balancer.member_2_ipv6_subnet_cidr = fd77:1457:4cf0:26a8::/64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.808 38 DEBUG tempest [-] volume.backend_names = ['BACKEND_1', 'BACKEND_2'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.808 37 DEBUG tempest [-] load_balancer.member_role = load-balancer_member log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.808 38 DEBUG tempest [-] volume.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.808 37 DEBUG tempest [-] load_balancer.octavia_svc_username = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.808 38 DEBUG tempest [-] volume.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.809 37 DEBUG tempest [-] load_balancer.provider = octavia log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.809 38 DEBUG tempest [-] volume.catalog_type = volumev3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.809 37 DEBUG tempest [-] load_balancer.random_server_name_length = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.809 38 DEBUG tempest [-] volume.disk_format = raw log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.809 38 DEBUG tempest [-] volume.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.809 37 DEBUG tempest [-] load_balancer.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.809 37 DEBUG tempest [-] load_balancer.scp_connection_attempts = 20 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.809 38 DEBUG tempest [-] volume.manage_snapshot_ref = ['source-name', 'snapshot-%s'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.809 37 DEBUG tempest [-] load_balancer.scp_connection_timeout = 5 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.809 38 DEBUG tempest [-] volume.manage_volume_ref = ['source-name', 'volume-%s'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.810 37 DEBUG tempest [-] load_balancer.tenant_flow_log_file = /var/log/octavia-tenant-traffic.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.810 38 DEBUG tempest [-] volume.max_microversion = latest log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.810 38 DEBUG tempest [-] volume.min_microversion = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.810 37 DEBUG tempest [-] load_balancer.test_ipv6_subnet_override = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.810 37 DEBUG tempest [-] load_balancer.test_network_override = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.810 38 DEBUG tempest [-] volume.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.810 37 DEBUG tempest [-] load_balancer.test_reuse_connection = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.810 38 DEBUG tempest [-] volume.storage_protocol = ceph log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.810 37 DEBUG tempest [-] load_balancer.test_subnet_override = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.810 38 DEBUG tempest [-] volume.vendor_name = Open Source log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.811 38 DEBUG tempest [-] volume.volume_size = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.811 37 DEBUG tempest [-] load_balancer.test_with_ipv6 = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.811 37 DEBUG tempest [-] load_balancer.test_with_noop = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.811 38 DEBUG tempest [-] volume-feature-enabled.api_extensions = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.811 38 DEBUG tempest [-] volume-feature-enabled.api_v2 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.811 37 DEBUG tempest [-] load_balancer.vip_ipv6_subnet_cidr = fdde:1a92:7523:70a0::/64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.811 38 DEBUG tempest [-] volume-feature-enabled.api_v3 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.811 37 DEBUG tempest [-] load_balancer.vip_subnet_cidr = 10.1.1.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.811 38 DEBUG tempest [-] volume-feature-enabled.backup = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.811 37 DEBUG tempest [-] loadbalancer-feature-enabled.health_monitor_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.812 38 DEBUG tempest [-] volume-feature-enabled.clone = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.812 37 DEBUG tempest [-] loadbalancer-feature-enabled.l4_protocol = TCP log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.812 38 DEBUG tempest [-] volume-feature-enabled.consistency_group = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.812 37 DEBUG tempest [-] loadbalancer-feature-enabled.l7_protocol_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.812 38 DEBUG tempest [-] volume-feature-enabled.extend_attached_encrypted_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.812 37 DEBUG tempest [-] loadbalancer-feature-enabled.log_offload_enabled = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.812 38 DEBUG tempest [-] volume-feature-enabled.extend_attached_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.812 37 DEBUG tempest [-] loadbalancer-feature-enabled.not_implemented_is_error = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.812 38 DEBUG tempest [-] volume-feature-enabled.manage_snapshot = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.812 37 DEBUG tempest [-] loadbalancer-feature-enabled.pool_algorithms_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.813 38 DEBUG tempest [-] volume-feature-enabled.manage_volume = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.813 37 DEBUG tempest [-] loadbalancer-feature-enabled.session_persistence_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.813 38 DEBUG tempest [-] volume-feature-enabled.multi_backend = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.813 37 DEBUG tempest [-] loadbalancer-feature-enabled.spare_pool_enabled = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.813 38 DEBUG tempest [-] volume-feature-enabled.snapshot = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.813 37 DEBUG tempest [-] loadbalancer-feature-enabled.terminated_tls_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.813 37 DEBUG tempest [-] ******************************************************************************** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2591 2020-11-06 17:58:36.813 38 DEBUG tempest [-] volume-feature-enabled.volume_revert = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.813 38 DEBUG tempest [-] object-storage.catalog_type = object-store log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.814 38 DEBUG tempest [-] object-storage.cluster_name = name1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.814 38 DEBUG tempest [-] object-storage.container_sync_interval = 5 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.814 38 DEBUG tempest [-] object-storage.container_sync_timeout = 600 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.814 38 DEBUG tempest [-] object-storage.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.814 38 DEBUG tempest [-] object-storage.operator_role = member log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.815 38 DEBUG tempest [-] object-storage.realm_name = realm1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.815 38 DEBUG tempest [-] object-storage.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.815 38 DEBUG tempest [-] object-storage.reseller_admin_role = ResellerAdmin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.815 38 DEBUG tempest [-] object-storage-feature-enabled.container_sync = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.815 38 DEBUG tempest [-] object-storage-feature-enabled.discoverability = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.815 37 DEBUG tempest.lib.services.clients [-] Successfully registered plugin __tempest__ in the service client registry with configuration: [{'name': 'compute', 'service_version': 'compute', 'module_path': 'tempest.lib.services.compute', 'client_names': ['AgentsClient', 'AggregatesClient', 'AvailabilityZoneClient', 'BaremetalNodesClient', 'CertificatesClient', 'ExtensionsClient', 'FixedIPsClient', 'FlavorsClient', 'FloatingIPPoolsClient', 'FloatingIPsBulkClient', 'FloatingIPsClient', 'HostsClient', 'HypervisorClient', 'ImagesClient', 'InstanceUsagesAuditLogClient', 'InterfacesClient', 'KeyPairsClient', 'LimitsClient', 'MigrationsClient', 'NetworksClient', 'QuotaClassesClient', 'QuotasClient', 'SecurityGroupDefaultRulesClient', 'SecurityGroupRulesClient', 'SecurityGroupsClient', 'ServerGroupsClient', 'ServersClient', 'ServicesClient', 'SnapshotsClient', 'TenantNetworksClient', 'TenantUsagesClient', 'VersionsClient', 'VolumesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'compute'}, {'name': 'placement', 'service_version': 'placement', 'module_path': 'tempest.lib.services.placement', 'client_names': ['PlacementClient', 'ResourceProvidersClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'placement'}, {'name': 'identity_v2', 'service_version': 'identity.v2', 'module_path': 'tempest.lib.services.identity.v2', 'client_names': ['EndpointsClient', 'IdentityClient', 'RolesClient', 'ServicesClient', 'TenantsClient', 'TokenClient', 'UsersClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'identity'}, {'name': 'identity_v3', 'service_version': 'identity.v3', 'module_path': 'tempest.lib.services.identity.v3', 'client_names': ['AccessRulesClient', 'ApplicationCredentialsClient', 'CatalogClient', 'CredentialsClient', 'DomainsClient', 'DomainConfigurationClient', 'EndPointGroupsClient', 'EndPointsClient', 'EndPointsFilterClient', 'GroupsClient', 'IdentityClient', 'InheritedRolesClient', 'OAUTHConsumerClient', 'OAUTHTokenClient', 'PoliciesClient', 'ProjectsClient', 'ProjectTagsClient', 'RegionsClient', 'RoleAssignmentsClient', 'RolesClient', 'ServicesClient', 'V3TokenClient', 'TrustsClient', 'UsersClient', 'VersionsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'identity'}, {'name': 'image_v1', 'service_version': 'image.v1', 'module_path': 'tempest.lib.services.image.v1', 'client_names': ['ImageMembersClient', 'ImagesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'image'}, {'name': 'image_v2', 'service_version': 'image.v2', 'module_path': 'tempest.lib.services.image.v2', 'client_names': ['ImageMembersClient', 'ImagesClient', 'NamespaceObjectsClient', 'NamespacePropertiesClient', 'NamespaceTagsClient', 'NamespacesClient', 'ResourceTypesClient', 'SchemasClient', 'VersionsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'image'}, {'name': 'network', 'service_version': 'network', 'module_path': 'tempest.lib.services.network', 'client_names': ['AgentsClient', 'ExtensionsClient', 'FloatingIPsClient', 'MeteringLabelRulesClient', 'MeteringLabelsClient', 'NetworksClient', 'NetworkVersionsClient', 'PortsClient', 'QosClient', 'QosMinimumBandwidthRulesClient', 'QuotasClient', 'RoutersClient', 'SecurityGroupRulesClient', 'SecurityGroupsClient', 'SegmentsClient', 'ServiceProvidersClient', 'SubnetpoolsClient', 'SubnetsClient', 'TagsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'network'}, {'name': 'object_storage', 'service_version': 'object-storage', 'module_path': 'tempest.lib.services.object_storage', 'client_names': ['AccountClient', 'BulkMiddlewareClient', 'CapabilitiesClient', 'ContainerClient', 'ObjectClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'object-store'}, {'name': 'volume_v1', 'service_version': 'volume.v1', 'module_path': 'tempest.lib.services.volume.v1', 'client_names': ['AvailabilityZoneClient', 'BackupsClient', 'EncryptionTypesClient', 'ExtensionsClient', 'HostsClient', 'QosSpecsClient', 'QuotasClient', 'ServicesClient', 'SnapshotsClient', 'TypesClient', 'VolumesClient', 'LimitsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'volumev3'}, {'name': 'volume_v2', 'service_version': 'volume.v2', 'module_path': 'tempest.lib.services.volume.v2', 'client_names': ['AvailabilityZoneClient', 'BackupsClient', 'EncryptionTypesClient', 'ExtensionsClient', 'HostsClient', 'QosSpecsClient', 'QuotasClient', 'ServicesClient', 'SnapshotsClient', 'TypesClient', 'VolumesClient', 'LimitsClient', 'CapabilitiesClient', 'SchedulerStatsClient', 'SnapshotManageClient', 'VolumeManageClient', 'TransfersClient', 'QuotaClassesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'volumev3'}, {'name': 'volume_v3', 'service_version': 'volume.v3', 'module_path': 'tempest.lib.services.volume.v3', 'client_names': ['AttachmentsClient', 'AvailabilityZoneClient', 'BackupsClient', 'BaseClient', 'CapabilitiesClient', 'EncryptionTypesClient', 'ExtensionsClient', 'GroupSnapshotsClient', 'GroupTypesClient', 'GroupsClient', 'HostsClient', 'LimitsClient', 'MessagesClient', 'QosSpecsClient', 'QuotaClassesClient', 'QuotasClient', 'SchedulerStatsClient', 'ServicesClient', 'SnapshotManageClient', 'SnapshotsClient', 'TransfersClient', 'TypesClient', 'VersionsClient', 'VolumeManageClient', 'VolumesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'volumev3'}] register_service_client /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/services/clients.py:121 2020-11-06 17:58:36.816 37 DEBUG tempest.lib.services.clients [-] Successfully registered plugin barbican_tests in the service client registry with configuration: [{'name': 'secret_v1', 'service_version': 'secret.v1', 'module_path': 'barbican_tempest_plugin.services.key_manager.json', 'client_names': ['ConsumerClient', 'ContainerClient', 'OrderClient', 'QuotaClient', 'SecretClient', 'SecretMetadataClient']}] register_service_client /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/services/clients.py:121 2020-11-06 17:58:36.816 38 DEBUG tempest [-] object-storage-feature-enabled.discoverable_apis = ['account_quotas', 'formpost', 'bulk_upload', 'bulk_delete', 'tempurl', 'crossdomain', 'container_quotas', 'staticweb', 'account_quotas', 'slo'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.816 38 DEBUG tempest [-] object-storage-feature-enabled.object_versioning = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.816 37 DEBUG tempest.lib.services.clients [-] Successfully registered plugin octavia-tempest-plugin in the service client registry with configuration: [{'name': 'load-balancer_v2', 'service_version': 'load-balancer.v2', 'module_path': 'octavia_tempest_plugin.services.load_balancer.v2', 'client_names': ['LoadbalancerClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'publicURL', 'build_timeout': 300, 'build_interval': 5.0, 'region': 'RegionOne', 'service': 'load-balancer'}] register_service_client /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/services/clients.py:121 2020-11-06 17:58:36.816 38 DEBUG tempest [-] scenario.dhcp_client = udhcpc log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.816 38 DEBUG tempest [-] scenario.img_container_format = bare log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.816 38 WARNING oslo_config.cfg [-] Deprecated: Option "img_dir" from group "scenario" is deprecated for removal. Its value may be silently ignored in the future. 2020-11-06 17:58:36.817 38 DEBUG tempest [-] scenario.img_dir = /home/opnfv/functest/images log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.817 38 DEBUG tempest [-] scenario.img_disk_format = qcow2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.817 38 DEBUG tempest [-] scenario.img_file = cirros-0.4.0-x86_64-disk.img log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.817 38 DEBUG tempest [-] scenario.img_properties = {'hw_scsi_model': 'virtio-scsi', 'hw_disk_bus': 'scsi'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.818 38 DEBUG tempest [-] scenario.protocol = icmp log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.818 38 DEBUG tempest [-] service_available.aodh = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.818 38 DEBUG tempest [-] service_available.barbican = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.818 38 DEBUG tempest [-] service_available.ceilometer = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.818 38 DEBUG tempest [-] service_available.cinder = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.819 38 DEBUG tempest [-] service_available.cyborg = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.819 38 DEBUG tempest [-] service_available.glance = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.819 38 DEBUG tempest [-] service_available.gnocchi = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.819 38 DEBUG tempest [-] service_available.heat = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.819 38 DEBUG tempest [-] service_available.load_balancer = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.819 38 DEBUG tempest [-] service_available.neutron = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.820 38 DEBUG tempest [-] service_available.nova = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.820 38 DEBUG tempest [-] service_available.panko = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.820 38 DEBUG tempest [-] service_available.swift = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.820 38 DEBUG tempest [-] debug.trace_requests = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.820 38 DEBUG tempest [-] placement.catalog_type = placement log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.821 38 DEBUG tempest [-] placement.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.821 38 DEBUG tempest [-] placement.max_microversion = latest log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.821 38 DEBUG tempest [-] placement.min_microversion = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.821 38 DEBUG tempest [-] placement.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.821 38 DEBUG tempest [-] profiler.key = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.822 38 DEBUG tempest [-] heat_plugin.admin_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.822 38 DEBUG tempest [-] heat_plugin.admin_project_name = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.822 38 DEBUG tempest [-] heat_plugin.admin_username = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.822 38 DEBUG tempest [-] heat_plugin.auth_url = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.822 38 DEBUG tempest [-] heat_plugin.auth_version = 3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.823 38 DEBUG tempest [-] heat_plugin.boot_config_env = /usr/lib/python3.8/site-packages/heat_tempest_plugin/tests/scenario/templates/boot_config_none_env.yaml log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.823 38 DEBUG tempest [-] heat_plugin.build_interval = 4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.823 38 DEBUG tempest [-] heat_plugin.build_timeout = 1200 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.823 38 DEBUG tempest [-] heat_plugin.ca_file = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.823 38 DEBUG tempest [-] heat_plugin.catalog_type = orchestration log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.824 38 DEBUG tempest [-] heat_plugin.connectivity_timeout = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.824 38 DEBUG tempest [-] heat_plugin.convergence_engine_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.824 38 DEBUG tempest [-] heat_plugin.credential_secret_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.825 38 DEBUG tempest [-] heat_plugin.disable_ssl_certificate_validation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.825 38 DEBUG tempest [-] heat_plugin.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.825 38 DEBUG tempest [-] heat_plugin.fixed_network_name = heat-net log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.825 38 DEBUG tempest [-] heat_plugin.fixed_subnet_name = heat-subnet log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.826 38 DEBUG tempest [-] heat_plugin.floating_network_name = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.826 38 DEBUG tempest [-] heat_plugin.heat_config_notify_script = heat-config-notify log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.826 38 DEBUG tempest [-] heat_plugin.hidden_stack_tag = data-processing-cluster log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.826 38 DEBUG tempest [-] heat_plugin.image_ref = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.826 38 DEBUG tempest [-] heat_plugin.instance_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.827 38 DEBUG tempest [-] heat_plugin.ip_version_for_ssh = 4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.827 38 DEBUG tempest [-] heat_plugin.keypair_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.827 38 DEBUG tempest [-] heat_plugin.minimal_image_ref = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.827 38 DEBUG tempest [-] heat_plugin.minimal_instance_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.827 38 DEBUG tempest [-] heat_plugin.network_for_ssh = heat-net log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.828 38 DEBUG tempest [-] heat_plugin.password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.828 38 DEBUG tempest [-] heat_plugin.project_domain_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.828 38 DEBUG tempest [-] heat_plugin.project_domain_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.828 38 DEBUG tempest [-] heat_plugin.project_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.828 38 DEBUG tempest [-] heat_plugin.region = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.829 38 DEBUG tempest [-] heat_plugin.skip_functional_test_list = ['EncryptionVolTypeTest'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.829 38 DEBUG tempest [-] heat_plugin.skip_functional_tests = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.829 38 DEBUG tempest [-] heat_plugin.skip_scenario_test_list = ['AodhAlarmTest', 'SoftwareConfigIntegrationTest', 'VolumeBackupRestoreIntegrationTest', 'CfnInitIntegrationTest', 'LoadBalancerTest'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.829 38 DEBUG tempest [-] heat_plugin.skip_scenario_tests = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.830 38 DEBUG tempest [-] heat_plugin.skip_test_stack_action_list = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.830 38 DEBUG tempest [-] heat_plugin.ssh_channel_timeout = 60 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.830 38 DEBUG tempest [-] heat_plugin.ssh_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.830 38 DEBUG tempest [-] heat_plugin.user_domain_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.830 38 DEBUG tempest [-] heat_plugin.user_domain_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.831 38 DEBUG tempest [-] heat_plugin.username = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.831 38 DEBUG tempest [-] heat_plugin.vm_to_heat_api_insecure = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.831 38 DEBUG tempest [-] heat_plugin.volume_size = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.831 38 DEBUG tempest [-] heat_features_enabled.multi_cloud = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.831 38 DEBUG tempest [-] heat_features_enabled.stack_cancel = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.832 38 DEBUG tempest [-] fed_scenario.enable_k2k_groups_mapping = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.832 38 DEBUG tempest [-] fed_scenario.idp_ecp_url = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.832 38 DEBUG tempest [-] fed_scenario.idp_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.832 38 DEBUG tempest [-] fed_scenario.idp_password = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.832 38 DEBUG tempest [-] fed_scenario.idp_remote_ids = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.832 38 DEBUG tempest [-] fed_scenario.idp_username = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.833 38 DEBUG tempest [-] fed_scenario.mapping_group_domain_name = federated_domain log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.833 38 DEBUG tempest [-] fed_scenario.mapping_group_name = federated_users log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.833 38 DEBUG tempest [-] fed_scenario.mapping_remote_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.833 38 DEBUG tempest [-] fed_scenario.mapping_user_name = {0} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.833 38 DEBUG tempest [-] fed_scenario.protocol_id = mapped log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.834 38 DEBUG tempest [-] telemetry.alarm_aggregation_method = rate:mean log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.834 38 DEBUG tempest [-] telemetry.alarm_granularity = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.834 38 DEBUG tempest [-] telemetry.alarm_metric_name = cpu log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.834 38 DEBUG tempest [-] telemetry.alarm_threshold = 10 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.834 38 DEBUG tempest [-] telemetry.disable_ssl_certificate_validation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.835 38 DEBUG tempest [-] telemetry.notification_sleep = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.835 38 DEBUG tempest [-] telemetry.notification_wait = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.835 38 DEBUG tempest [-] event.catalog_type = event log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.835 38 DEBUG tempest [-] event.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.835 38 DEBUG tempest [-] alarming_plugin.catalog_type = alarming log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.836 38 DEBUG tempest [-] alarming_plugin.create_alarms = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.836 38 DEBUG tempest [-] alarming_plugin.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.836 38 DEBUG tempest [-] metric.catalog_type = metric log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.836 38 DEBUG tempest [-] metric.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.836 38 DEBUG tempest [-] ephemeral_storage_encryption.cipher = aes-xts-plain64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.837 38 DEBUG tempest [-] ephemeral_storage_encryption.enabled = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.837 38 DEBUG tempest [-] ephemeral_storage_encryption.key_size = 256 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.837 38 DEBUG tempest [-] image_signature_verification.enforced = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.837 38 DEBUG tempest [-] patrole.custom_policy_files = ['/etc/%s/policy.json'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.837 38 DEBUG tempest [-] patrole.custom_requirements_file = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.838 38 DEBUG tempest [-] patrole.rbac_test_role = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.838 38 DEBUG tempest [-] patrole.rbac_test_roles = ['admin'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.838 38 DEBUG tempest [-] patrole.test_custom_requirements = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.838 38 DEBUG tempest [-] patrole.validate_deprecated_rules = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.839 38 DEBUG tempest [-] patrole_log.enable_reporting = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.839 38 DEBUG tempest [-] patrole_log.report_log_name = patrole.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.839 38 DEBUG tempest [-] patrole_log.report_log_path = . log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.839 38 DEBUG tempest [-] policy-feature-enabled.added_cinder_policies_stein = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.839 38 DEBUG tempest [-] policy-feature-enabled.changed_nova_policies_ussuri = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.840 38 DEBUG tempest [-] policy-feature-enabled.changed_nova_policies_victoria = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.840 38 DEBUG tempest [-] policy-feature-enabled.create_port_fixed_ips_ip_address_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.840 38 DEBUG tempest [-] policy-feature-enabled.keystone_policy_enforcement_train = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.840 38 DEBUG tempest [-] policy-feature-enabled.limits_extension_used_limits_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.840 38 DEBUG tempest [-] policy-feature-enabled.removed_keystone_policies_stein = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.841 38 DEBUG tempest [-] policy-feature-enabled.removed_nova_policies_stein = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.841 38 DEBUG tempest [-] policy-feature-enabled.update_port_fixed_ips_ip_address_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.841 38 DEBUG tempest [-] policy-feature-enabled.volume_extension_volume_actions_attach_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.841 38 DEBUG tempest [-] policy-feature-enabled.volume_extension_volume_actions_reserve_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.841 38 DEBUG tempest [-] policy-feature-enabled.volume_extension_volume_actions_unreserve_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.842 38 DEBUG tempest [-] load_balancer.RBAC_test_type = advanced log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.842 38 DEBUG tempest [-] load_balancer.admin_role = load-balancer_admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.842 38 DEBUG tempest [-] load_balancer.amphora_admin_log_file = /var/log/octavia-amphora.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.842 38 DEBUG tempest [-] load_balancer.amphora_ssh_key = /etc/octavia/.ssh/octavia_ssh_key log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.842 38 DEBUG tempest [-] load_balancer.amphora_ssh_user = ubuntu log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.843 38 DEBUG tempest [-] load_balancer.availability_zone = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.843 38 DEBUG tempest [-] load_balancer.availability_zone2 = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.843 38 DEBUG tempest [-] load_balancer.availability_zone3 = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.843 38 DEBUG tempest [-] load_balancer.build_interval = 5.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.843 38 DEBUG tempest [-] load_balancer.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.844 38 DEBUG tempest [-] load_balancer.catalog_type = load-balancer log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.844 38 DEBUG tempest [-] load_balancer.check_interval = 5.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.844 38 DEBUG tempest [-] load_balancer.check_timeout = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.844 38 DEBUG tempest [-] load_balancer.disable_boot_network = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.844 38 DEBUG tempest [-] load_balancer.enable_security_groups = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.845 38 DEBUG tempest [-] load_balancer.enabled_provider_drivers = {'amphora': 'The Octavia Amphora driver.', 'amphorav2': 'The Octavia Amphora driver that uses taskflow jobboard persistence.', 'octavia': 'Deprecated alias of the Octavia Amphora driver.'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.845 38 DEBUG tempest [-] load_balancer.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.845 38 DEBUG tempest [-] load_balancer.expected_availability_zone_capability = {'compute_zone': 'The compute availability zone.'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.845 38 DEBUG tempest [-] load_balancer.expected_flavor_capability = {'loadbalancer_topology': 'The load balancer topology. One of: SINGLE - One amphora per load balancer. ACTIVE_STANDBY - Two amphora per load balancer.'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.846 38 DEBUG tempest [-] load_balancer.lb_build_interval = 10.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.846 38 DEBUG tempest [-] load_balancer.lb_build_timeout = 900 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.846 38 DEBUG tempest [-] load_balancer.loadbalancer_topology = SINGLE log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.846 38 DEBUG tempest [-] load_balancer.member_1_ipv4_subnet_cidr = 10.2.1.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.846 38 DEBUG tempest [-] load_balancer.member_1_ipv6_subnet_cidr = fd7b:f9f7:0fff:4eca::/64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.847 38 DEBUG tempest [-] load_balancer.member_2_ipv4_subnet_cidr = 10.2.2.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.847 38 DEBUG tempest [-] load_balancer.member_2_ipv6_subnet_cidr = fd77:1457:4cf0:26a8::/64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.847 38 DEBUG tempest [-] load_balancer.member_role = load-balancer_member log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.847 38 DEBUG tempest [-] load_balancer.octavia_svc_username = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.847 38 DEBUG tempest [-] load_balancer.provider = octavia log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.848 38 DEBUG tempest [-] load_balancer.random_server_name_length = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.848 38 DEBUG tempest [-] load_balancer.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.848 38 DEBUG tempest [-] load_balancer.scp_connection_attempts = 20 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.848 38 DEBUG tempest [-] load_balancer.scp_connection_timeout = 5 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.848 38 DEBUG tempest [-] load_balancer.tenant_flow_log_file = /var/log/octavia-tenant-traffic.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.849 38 DEBUG tempest [-] load_balancer.test_ipv6_subnet_override = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.849 38 DEBUG tempest [-] load_balancer.test_network_override = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.849 38 DEBUG tempest [-] load_balancer.test_reuse_connection = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.849 38 DEBUG tempest [-] load_balancer.test_subnet_override = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.849 38 DEBUG tempest [-] load_balancer.test_with_ipv6 = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.850 38 DEBUG tempest [-] load_balancer.test_with_noop = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.850 38 DEBUG tempest [-] load_balancer.vip_ipv6_subnet_cidr = fdde:1a92:7523:70a0::/64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.850 38 DEBUG tempest [-] load_balancer.vip_subnet_cidr = 10.1.1.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.850 38 DEBUG tempest [-] loadbalancer-feature-enabled.health_monitor_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.850 38 DEBUG tempest [-] loadbalancer-feature-enabled.l4_protocol = TCP log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.851 38 DEBUG tempest [-] loadbalancer-feature-enabled.l7_protocol_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.851 38 DEBUG tempest [-] loadbalancer-feature-enabled.log_offload_enabled = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.851 38 DEBUG tempest [-] loadbalancer-feature-enabled.not_implemented_is_error = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.851 38 DEBUG tempest [-] loadbalancer-feature-enabled.pool_algorithms_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.851 38 DEBUG tempest [-] loadbalancer-feature-enabled.session_persistence_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.852 38 DEBUG tempest [-] loadbalancer-feature-enabled.spare_pool_enabled = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.852 38 DEBUG tempest [-] loadbalancer-feature-enabled.terminated_tls_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-11-06 17:58:36.852 38 DEBUG tempest [-] ******************************************************************************** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2591 2020-11-06 17:58:36.854 38 DEBUG tempest.lib.services.clients [-] Successfully registered plugin __tempest__ in the service client registry with configuration: [{'name': 'compute', 'service_version': 'compute', 'module_path': 'tempest.lib.services.compute', 'client_names': ['AgentsClient', 'AggregatesClient', 'AvailabilityZoneClient', 'BaremetalNodesClient', 'CertificatesClient', 'ExtensionsClient', 'FixedIPsClient', 'FlavorsClient', 'FloatingIPPoolsClient', 'FloatingIPsBulkClient', 'FloatingIPsClient', 'HostsClient', 'HypervisorClient', 'ImagesClient', 'InstanceUsagesAuditLogClient', 'InterfacesClient', 'KeyPairsClient', 'LimitsClient', 'MigrationsClient', 'NetworksClient', 'QuotaClassesClient', 'QuotasClient', 'SecurityGroupDefaultRulesClient', 'SecurityGroupRulesClient', 'SecurityGroupsClient', 'ServerGroupsClient', 'ServersClient', 'ServicesClient', 'SnapshotsClient', 'TenantNetworksClient', 'TenantUsagesClient', 'VersionsClient', 'VolumesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'compute'}, {'name': 'placement', 'service_version': 'placement', 'module_path': 'tempest.lib.services.placement', 'client_names': ['PlacementClient', 'ResourceProvidersClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'placement'}, {'name': 'identity_v2', 'service_version': 'identity.v2', 'module_path': 'tempest.lib.services.identity.v2', 'client_names': ['EndpointsClient', 'IdentityClient', 'RolesClient', 'ServicesClient', 'TenantsClient', 'TokenClient', 'UsersClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'identity'}, {'name': 'identity_v3', 'service_version': 'identity.v3', 'module_path': 'tempest.lib.services.identity.v3', 'client_names': ['AccessRulesClient', 'ApplicationCredentialsClient', 'CatalogClient', 'CredentialsClient', 'DomainsClient', 'DomainConfigurationClient', 'EndPointGroupsClient', 'EndPointsClient', 'EndPointsFilterClient', 'GroupsClient', 'IdentityClient', 'InheritedRolesClient', 'OAUTHConsumerClient', 'OAUTHTokenClient', 'PoliciesClient', 'ProjectsClient', 'ProjectTagsClient', 'RegionsClient', 'RoleAssignmentsClient', 'RolesClient', 'ServicesClient', 'V3TokenClient', 'TrustsClient', 'UsersClient', 'VersionsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'identity'}, {'name': 'image_v1', 'service_version': 'image.v1', 'module_path': 'tempest.lib.services.image.v1', 'client_names': ['ImageMembersClient', 'ImagesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'image'}, {'name': 'image_v2', 'service_version': 'image.v2', 'module_path': 'tempest.lib.services.image.v2', 'client_names': ['ImageMembersClient', 'ImagesClient', 'NamespaceObjectsClient', 'NamespacePropertiesClient', 'NamespaceTagsClient', 'NamespacesClient', 'ResourceTypesClient', 'SchemasClient', 'VersionsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'image'}, {'name': 'network', 'service_version': 'network', 'module_path': 'tempest.lib.services.network', 'client_names': ['AgentsClient', 'ExtensionsClient', 'FloatingIPsClient', 'MeteringLabelRulesClient', 'MeteringLabelsClient', 'NetworksClient', 'NetworkVersionsClient', 'PortsClient', 'QosClient', 'QosMinimumBandwidthRulesClient', 'QuotasClient', 'RoutersClient', 'SecurityGroupRulesClient', 'SecurityGroupsClient', 'SegmentsClient', 'ServiceProvidersClient', 'SubnetpoolsClient', 'SubnetsClient', 'TagsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'network'}, {'name': 'object_storage', 'service_version': 'object-storage', 'module_path': 'tempest.lib.services.object_storage', 'client_names': ['AccountClient', 'BulkMiddlewareClient', 'CapabilitiesClient', 'ContainerClient', 'ObjectClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'object-store'}, {'name': 'volume_v1', 'service_version': 'volume.v1', 'module_path': 'tempest.lib.services.volume.v1', 'client_names': ['AvailabilityZoneClient', 'BackupsClient', 'EncryptionTypesClient', 'ExtensionsClient', 'HostsClient', 'QosSpecsClient', 'QuotasClient', 'ServicesClient', 'SnapshotsClient', 'TypesClient', 'VolumesClient', 'LimitsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'volumev3'}, {'name': 'volume_v2', 'service_version': 'volume.v2', 'module_path': 'tempest.lib.services.volume.v2', 'client_names': ['AvailabilityZoneClient', 'BackupsClient', 'EncryptionTypesClient', 'ExtensionsClient', 'HostsClient', 'QosSpecsClient', 'QuotasClient', 'ServicesClient', 'SnapshotsClient', 'TypesClient', 'VolumesClient', 'LimitsClient', 'CapabilitiesClient', 'SchedulerStatsClient', 'SnapshotManageClient', 'VolumeManageClient', 'TransfersClient', 'QuotaClassesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'volumev3'}, {'name': 'volume_v3', 'service_version': 'volume.v3', 'module_path': 'tempest.lib.services.volume.v3', 'client_names': ['AttachmentsClient', 'AvailabilityZoneClient', 'BackupsClient', 'BaseClient', 'CapabilitiesClient', 'EncryptionTypesClient', 'ExtensionsClient', 'GroupSnapshotsClient', 'GroupTypesClient', 'GroupsClient', 'HostsClient', 'LimitsClient', 'MessagesClient', 'QosSpecsClient', 'QuotaClassesClient', 'QuotasClient', 'SchedulerStatsClient', 'ServicesClient', 'SnapshotManageClient', 'SnapshotsClient', 'TransfersClient', 'TypesClient', 'VersionsClient', 'VolumeManageClient', 'VolumesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'volumev3'}] register_service_client /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/services/clients.py:121 2020-11-06 17:58:36.854 38 DEBUG tempest.lib.services.clients [-] Successfully registered plugin barbican_tests in the service client registry with configuration: [{'name': 'secret_v1', 'service_version': 'secret.v1', 'module_path': 'barbican_tempest_plugin.services.key_manager.json', 'client_names': ['ConsumerClient', 'ContainerClient', 'OrderClient', 'QuotaClient', 'SecretClient', 'SecretMetadataClient']}] register_service_client /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/services/clients.py:121 2020-11-06 17:58:36.854 38 DEBUG tempest.lib.services.clients [-] Successfully registered plugin octavia-tempest-plugin in the service client registry with configuration: [{'name': 'load-balancer_v2', 'service_version': 'load-balancer.v2', 'module_path': 'octavia_tempest_plugin.services.load_balancer.v2', 'client_names': ['LoadbalancerClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'publicURL', 'build_timeout': 300, 'build_interval': 5.0, 'region': 'RegionOne', 'service': 'load-balancer'}] register_service_client /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/services/clients.py:121 2020-11-06 17:58:37.187 40 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: heat 2020-11-06 17:58:37.187 40 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: keystone_tests 2020-11-06 17:58:37.187 40 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: telemetry_tests 2020-11-06 17:58:37.188 40 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: barbican_tests 2020-11-06 17:58:37.188 40 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: neutron_tests 2020-11-06 17:58:37.188 40 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: cyborg_tempest_plugin 2020-11-06 17:58:37.188 40 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: cinder_tests 2020-11-06 17:58:37.188 40 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: patrole_tests 2020-11-06 17:58:37.188 40 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: octavia-tempest-plugin 2020-11-06 17:58:37.223 39 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: heat 2020-11-06 17:58:37.223 39 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: keystone_tests 2020-11-06 17:58:37.223 39 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: telemetry_tests 2020-11-06 17:58:37.224 39 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: barbican_tests 2020-11-06 17:58:37.224 39 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: neutron_tests 2020-11-06 17:58:37.224 39 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: cyborg_tempest_plugin 2020-11-06 17:58:37.224 39 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: cinder_tests 2020-11-06 17:58:37.224 39 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: patrole_tests 2020-11-06 17:58:37.225 39 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: octavia-tempest-plugin 2020-11-06 17:58:37.257 37 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: heat 2020-11-06 17:58:37.257 37 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: keystone_tests 2020-11-06 17:58:37.257 37 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: telemetry_tests 2020-11-06 17:58:37.257 37 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: barbican_tests 2020-11-06 17:58:37.258 37 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: neutron_tests 2020-11-06 17:58:37.258 37 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: cyborg_tempest_plugin 2020-11-06 17:58:37.258 37 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: cinder_tests 2020-11-06 17:58:37.258 37 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: patrole_tests 2020-11-06 17:58:37.258 37 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: octavia-tempest-plugin 2020-11-06 17:58:37.276 38 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: heat 2020-11-06 17:58:37.277 38 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: keystone_tests 2020-11-06 17:58:37.277 38 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: telemetry_tests 2020-11-06 17:58:37.277 38 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: barbican_tests 2020-11-06 17:58:37.277 38 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: neutron_tests 2020-11-06 17:58:37.278 38 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: cyborg_tempest_plugin 2020-11-06 17:58:37.278 38 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: cinder_tests 2020-11-06 17:58:37.278 38 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: patrole_tests 2020-11-06 17:58:37.278 38 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: octavia-tempest-plugin 2020-11-06 17:58:38.363 40 DEBUG oslo_concurrency.lockutils [-] Lock "context-manager" acquired by "neutron_lib.db.api._create_context_manager" :: waited 0.000s inner /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:355 2020-11-06 17:58:38.363 40 DEBUG oslo_concurrency.lockutils [-] Lock "context-manager" released by "neutron_lib.db.api._create_context_manager" :: held 0.000s inner /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:367 2020-11-06 17:58:38.424 39 DEBUG oslo_concurrency.lockutils [-] Lock "context-manager" acquired by "neutron_lib.db.api._create_context_manager" :: waited 0.000s inner /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:355 2020-11-06 17:58:38.425 39 DEBUG oslo_concurrency.lockutils [-] Lock "context-manager" released by "neutron_lib.db.api._create_context_manager" :: held 0.000s inner /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:367 2020-11-06 17:58:38.456 38 DEBUG oslo_concurrency.lockutils [-] Lock "context-manager" acquired by "neutron_lib.db.api._create_context_manager" :: waited 0.000s inner /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:355 2020-11-06 17:58:38.456 38 DEBUG oslo_concurrency.lockutils [-] Lock "context-manager" released by "neutron_lib.db.api._create_context_manager" :: held 0.000s inner /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:367 2020-11-06 17:58:38.472 37 DEBUG oslo_concurrency.lockutils [-] Lock "context-manager" acquired by "neutron_lib.db.api._create_context_manager" :: waited 0.000s inner /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:355 2020-11-06 17:58:38.472 37 DEBUG oslo_concurrency.lockutils [-] Lock "context-manager" released by "neutron_lib.db.api._create_context_manager" :: held 0.000s inner /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:367 2020-11-06 17:58:38.765 40 WARNING patrole_tempest_plugin.rbac_rule_validation [-] Deprecated: CONF.patrole.rbac_test_role is deprecated in favor of CONF.patrole.rbac_test_roles and will be removed in future. 2020-11-06 17:58:38.826 39 WARNING patrole_tempest_plugin.rbac_rule_validation [-] Deprecated: CONF.patrole.rbac_test_role is deprecated in favor of CONF.patrole.rbac_test_roles and will be removed in future. 2020-11-06 17:58:38.915 38 WARNING patrole_tempest_plugin.rbac_rule_validation [-] Deprecated: CONF.patrole.rbac_test_role is deprecated in favor of CONF.patrole.rbac_test_roles and will be removed in future. 2020-11-06 17:58:38.932 37 WARNING patrole_tempest_plugin.rbac_rule_validation [-] Deprecated: CONF.patrole.rbac_test_role is deprecated in favor of CONF.patrole.rbac_test_roles and will be removed in future. 2020-11-06 17:58:39.386 40 INFO tempest.lib.common.rest_client [req-60eb1ba9-f503-462f-bbd4-96acf59a3e8d ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.104s 2020-11-06 17:58:39.386 40 DEBUG tempest.lib.common.rest_client [req-60eb1ba9-f503-462f-bbd4-96acf59a3e8d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-60eb1ba9-f503-462f-bbd4-96acf59a3e8d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["P2LiDbM-RZOCmdYv7eJLLw"], "expires_at": "2020-11-06T18:58:39.000000Z", "issued_at": "2020-11-06T17:58:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:39.432 40 INFO tempest.lib.common.rest_client [req-c638ab84-212d-4a50-901a-e33bdb358994 ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 17:58:39.432 40 DEBUG tempest.lib.common.rest_client [req-c638ab84-212d-4a50-901a-e33bdb358994 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c638ab84-212d-4a50-901a-e33bdb358994', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["FysUi2ynTNm1rnfLP6c5SA"], "expires_at": "2020-11-06T18:58:39.000000Z", "issued_at": "2020-11-06T17:58:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:39.435 39 INFO tempest.lib.common.rest_client [req-40f92ea7-6dff-4e6f-a223-423d3a28c452 ] Request (AgentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-11-06 17:58:39.435 39 DEBUG tempest.lib.common.rest_client [req-40f92ea7-6dff-4e6f-a223-423d3a28c452 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-40f92ea7-6dff-4e6f-a223-423d3a28c452', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["lHUE51xjRLWXjB6w8QaLrQ"], "expires_at": "2020-11-06T18:58:39.000000Z", "issued_at": "2020-11-06T17:58:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:39.477 39 INFO tempest.lib.common.rest_client [req-d3f3fe97-a146-4855-a540-f830aeea9f68 ] Request (AgentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.029s 2020-11-06 17:58:39.478 39 DEBUG tempest.lib.common.rest_client [req-d3f3fe97-a146-4855-a540-f830aeea9f68 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d3f3fe97-a146-4855-a540-f830aeea9f68', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["CxsZxS9IRqSvISd2GcKHgQ"], "expires_at": "2020-11-06T18:58:39.000000Z", "issued_at": "2020-11-06T17:58:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:39.480 40 INFO tempest.lib.common.rest_client [req-d07c374b-4300-4e1f-8070-589e4e663eb3 ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.046s 2020-11-06 17:58:39.480 40 DEBUG tempest.lib.common.rest_client [req-d07c374b-4300-4e1f-8070-589e4e663eb3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d07c374b-4300-4e1f-8070-589e4e663eb3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:39.523 37 INFO tempest.test [-] raised in FixedIpsRbacTest.setUpClass. Invoking tearDownClass. 2020-11-06 17:58:39.531 39 INFO tempest.lib.common.rest_client [req-f5173657-0934-4a53-b655-1f3cd58520b0 ] Request (AgentsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.051s 2020-11-06 17:58:39.531 39 DEBUG tempest.lib.common.rest_client [req-f5173657-0934-4a53-b655-1f3cd58520b0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f5173657-0934-4a53-b655-1f3cd58520b0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:39.539 38 INFO tempest.lib.common.rest_client [req-90dfd952-0077-4889-ace6-d380355e38fc ] Request (AggregatesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 17:58:39.539 38 DEBUG tempest.lib.common.rest_client [req-90dfd952-0077-4889-ace6-d380355e38fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-90dfd952-0077-4889-ace6-d380355e38fc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["vuzAy75PThGtqZ1s4P-3ww"], "expires_at": "2020-11-06T18:58:39.000000Z", "issued_at": "2020-11-06T17:58:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:39.555 40 INFO tempest.lib.common.rest_client [req-d8bf3642-1a2a-491c-936f-81ca48390511 ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.070s 2020-11-06 17:58:39.555 40 DEBUG tempest.lib.common.rest_client [req-d8bf3642-1a2a-491c-936f-81ca48390511 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-NovaAvailabilityZoneRbacTest-777302255-desc", "domain_id": "default", "name": "tempest-NovaAvailabilityZoneRbacTest-777302255"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '392', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d8bf3642-1a2a-491c-936f-81ca48390511', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "7d6ec83579e04d32a1a39c04c9066c95", "name": "tempest-NovaAvailabilityZoneRbacTest-777302255", "domain_id": "default", "description": "tempest-NovaAvailabilityZoneRbacTest-777302255-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/7d6ec83579e04d32a1a39c04c9066c95"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:39.561 37 INFO tempest.lib.common.rest_client [req-cf4b66d4-3079-4834-bcc6-8da23c9c8b1f ] Request (FlavorAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 17:58:39.562 37 DEBUG tempest.lib.common.rest_client [req-cf4b66d4-3079-4834-bcc6-8da23c9c8b1f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cf4b66d4-3079-4834-bcc6-8da23c9c8b1f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["QkP8JKgIRR2JytWg9aU7Sg"], "expires_at": "2020-11-06T18:58:39.000000Z", "issued_at": "2020-11-06T17:58:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:39.602 39 INFO tempest.lib.common.rest_client [req-25f9623e-3633-4e31-a30e-bd3e0f174df7 ] Request (AgentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.062s 2020-11-06 17:58:39.602 39 DEBUG tempest.lib.common.rest_client [req-25f9623e-3633-4e31-a30e-bd3e0f174df7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-AgentsRbacTest-1121454842-desc", "domain_id": "default", "name": "tempest-AgentsRbacTest-1121454842"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '366', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-25f9623e-3633-4e31-a30e-bd3e0f174df7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "fa6a56ef86e74e97944c04fdfab296ed", "name": "tempest-AgentsRbacTest-1121454842", "domain_id": "default", "description": "tempest-AgentsRbacTest-1121454842-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/fa6a56ef86e74e97944c04fdfab296ed"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:39.634 38 INFO tempest.lib.common.rest_client [req-69539195-8145-4d40-904c-780ad930d902 ] Request (AggregatesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 17:58:39.635 38 DEBUG tempest.lib.common.rest_client [req-69539195-8145-4d40-904c-780ad930d902 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-69539195-8145-4d40-904c-780ad930d902', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["im-iVYpxTVWBRhJISrex8w"], "expires_at": "2020-11-06T18:58:39.000000Z", "issued_at": "2020-11-06T17:58:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:39.663 37 INFO tempest.lib.common.rest_client [req-be4f9016-24fb-4d75-ae4b-e7ba94b6e56c ] Request (FlavorAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 17:58:39.664 37 DEBUG tempest.lib.common.rest_client [req-be4f9016-24fb-4d75-ae4b-e7ba94b6e56c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-be4f9016-24fb-4d75-ae4b-e7ba94b6e56c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["XFVlUmA3T_264m4dRjK8xQ"], "expires_at": "2020-11-06T18:58:39.000000Z", "issued_at": "2020-11-06T17:58:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:39.678 40 INFO tempest.lib.common.rest_client [req-5624fd79-96b3-47a9-824f-312af91ee400 ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.122s 2020-11-06 17:58:39.678 40 DEBUG tempest.lib.common.rest_client [req-5624fd79-96b3-47a9-824f-312af91ee400 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-NovaAvailabilityZoneRbacTest-777302255", "password": "N5#Z9y068r+r9!u", "project_id": "7d6ec83579e04d32a1a39c04c9066c95", "email": "tempest-NovaAvailabilityZoneRbacTest-967817672@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '410', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5624fd79-96b3-47a9-824f-312af91ee400', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "7d6ec83579e04d32a1a39c04c9066c95", "email": "tempest-NovaAvailabilityZoneRbacTest-967817672@example.com", "id": "cf552f4ea0d54d2bb5d6b637cf9bf419", "name": "tempest-NovaAvailabilityZoneRbacTest-777302255", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/cf552f4ea0d54d2bb5d6b637cf9bf419"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:39.713 39 INFO tempest.lib.common.rest_client [req-638c8f6d-9f86-4a55-a3b2-4adf8b67f8f7 ] Request (AgentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.109s 2020-11-06 17:58:39.713 39 DEBUG tempest.lib.common.rest_client [req-638c8f6d-9f86-4a55-a3b2-4adf8b67f8f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-AgentsRbacTest-1121454842", "password": "Y3+p_#9ePWPaM*M", "project_id": "fa6a56ef86e74e97944c04fdfab296ed", "email": "tempest-AgentsRbacTest-481779258@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '383', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-638c8f6d-9f86-4a55-a3b2-4adf8b67f8f7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "fa6a56ef86e74e97944c04fdfab296ed", "email": "tempest-AgentsRbacTest-481779258@example.com", "id": "15a705d7e4894f189f405daf2f934cfc", "name": "tempest-AgentsRbacTest-1121454842", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/15a705d7e4894f189f405daf2f934cfc"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:39.715 37 INFO tempest.lib.common.rest_client [req-9aa22f90-63f7-41f6-8bcd-b202631eb3a3 ] Request (FlavorAccessRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.049s 2020-11-06 17:58:39.715 37 DEBUG tempest.lib.common.rest_client [req-9aa22f90-63f7-41f6-8bcd-b202631eb3a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9aa22f90-63f7-41f6-8bcd-b202631eb3a3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:39.727 40 INFO tempest.lib.common.rest_client [req-609d358d-ee02-469a-8d37-4393c17f4a18 ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.047s 2020-11-06 17:58:39.727 40 DEBUG tempest.lib.common.rest_client [req-609d358d-ee02-469a-8d37-4393c17f4a18 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-609d358d-ee02-469a-8d37-4393c17f4a18', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:39.733 38 INFO tempest.lib.common.rest_client [req-96dfec8d-f221-4689-87e9-5d0f3cb5efcd ] Request (AggregatesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.096s 2020-11-06 17:58:39.733 38 DEBUG tempest.lib.common.rest_client [req-96dfec8d-f221-4689-87e9-5d0f3cb5efcd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-96dfec8d-f221-4689-87e9-5d0f3cb5efcd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:39.766 39 INFO tempest.lib.common.rest_client [req-947204df-740d-4eef-978c-6338e7a7d471 ] Request (AgentsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.052s 2020-11-06 17:58:39.767 39 DEBUG tempest.lib.common.rest_client [req-947204df-740d-4eef-978c-6338e7a7d471 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-947204df-740d-4eef-978c-6338e7a7d471', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:39.775 40 INFO tempest.lib.common.rest_client [req-e05feb78-f56c-4f4f-8d8b-ab2b908ab8eb ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.047s 2020-11-06 17:58:39.775 40 DEBUG tempest.lib.common.rest_client [req-e05feb78-f56c-4f4f-8d8b-ab2b908ab8eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e05feb78-f56c-4f4f-8d8b-ab2b908ab8eb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:39.800 37 INFO tempest.lib.common.rest_client [req-7571bd35-8117-4e01-9c60-2fd94e43d0bb ] Request (FlavorAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.079s 2020-11-06 17:58:39.801 37 DEBUG tempest.lib.common.rest_client [req-7571bd35-8117-4e01-9c60-2fd94e43d0bb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-FlavorAccessRbacTest-1193074130-desc", "domain_id": "default", "name": "tempest-FlavorAccessRbacTest-1193074130"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '378', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7571bd35-8117-4e01-9c60-2fd94e43d0bb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "52c3dff7ef9f46f98e2c0e166df4f162", "name": "tempest-FlavorAccessRbacTest-1193074130", "domain_id": "default", "description": "tempest-FlavorAccessRbacTest-1193074130-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/52c3dff7ef9f46f98e2c0e166df4f162"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:39.802 38 INFO tempest.lib.common.rest_client [req-c9b485be-4d5a-47b0-a805-00eb9d0e918d ] Request (AggregatesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.062s 2020-11-06 17:58:39.803 38 DEBUG tempest.lib.common.rest_client [req-c9b485be-4d5a-47b0-a805-00eb9d0e918d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-AggregatesRbacTest-591314769-desc", "domain_id": "default", "name": "tempest-AggregatesRbacTest-591314769"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '372', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c9b485be-4d5a-47b0-a805-00eb9d0e918d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "da822d4027d545cc9eb5f098de258d1d", "name": "tempest-AggregatesRbacTest-591314769", "domain_id": "default", "description": "tempest-AggregatesRbacTest-591314769-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:39.816 39 INFO tempest.lib.common.rest_client [req-1aff6c2b-0e30-409a-a8dd-c86b8c86755d ] Request (AgentsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.048s 2020-11-06 17:58:39.816 39 DEBUG tempest.lib.common.rest_client [req-1aff6c2b-0e30-409a-a8dd-c86b8c86755d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1aff6c2b-0e30-409a-a8dd-c86b8c86755d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:39.837 40 INFO tempest.lib.common.rest_client [req-43111733-4461-4237-a09e-afe3d7f7d0a1 ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/7d6ec83579e04d32a1a39c04c9066c95/users/cf552f4ea0d54d2bb5d6b637cf9bf419/roles/72a4576c553448cd941b052c1ca0cf2d 0.061s 2020-11-06 17:58:39.838 40 DEBUG tempest.lib.common.rest_client [req-43111733-4461-4237-a09e-afe3d7f7d0a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-43111733-4461-4237-a09e-afe3d7f7d0a1', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/7d6ec83579e04d32a1a39c04c9066c95/users/cf552f4ea0d54d2bb5d6b637cf9bf419/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:39.838 40 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-NovaAvailabilityZoneRbacTest-777302255', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '7d6ec83579e04d32a1a39c04c9066c95', 'project_name': 'tempest-NovaAvailabilityZoneRbacTest-777302255', 'tenant_id': '7d6ec83579e04d32a1a39c04c9066c95', 'tenant_name': 'tempest-NovaAvailabilityZoneRbacTest-777302255', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'cf552f4ea0d54d2bb5d6b637cf9bf419'}, Network: None, Subnet: None, Router: None 2020-11-06 17:58:39.839 40 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-NovaAvailabilityZoneRbacTest-777302255', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '7d6ec83579e04d32a1a39c04c9066c95', 'project_name': 'tempest-NovaAvailabilityZoneRbacTest-777302255', 'tenant_id': '7d6ec83579e04d32a1a39c04c9066c95', 'tenant_name': 'tempest-NovaAvailabilityZoneRbacTest-777302255', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'cf552f4ea0d54d2bb5d6b637cf9bf419'}, Network: None, Subnet: None, Router: None 2020-11-06 17:58:39.918 37 INFO tempest.lib.common.rest_client [req-e9882c9f-e75a-4b15-a86e-2d69c069dfbc ] Request (FlavorAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.116s 2020-11-06 17:58:39.919 37 DEBUG tempest.lib.common.rest_client [req-e9882c9f-e75a-4b15-a86e-2d69c069dfbc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-FlavorAccessRbacTest-1193074130", "password": "K2~~Gb!*3NT~eMZ", "project_id": "52c3dff7ef9f46f98e2c0e166df4f162", "email": "tempest-FlavorAccessRbacTest-465263102@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '395', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e9882c9f-e75a-4b15-a86e-2d69c069dfbc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "52c3dff7ef9f46f98e2c0e166df4f162", "email": "tempest-FlavorAccessRbacTest-465263102@example.com", "id": "db7cf899ed5a40c5882522729a156930", "name": "tempest-FlavorAccessRbacTest-1193074130", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/db7cf899ed5a40c5882522729a156930"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:39.920 38 INFO tempest.lib.common.rest_client [req-589517b3-78d4-43a8-adf6-7b22b16f4763 ] Request (AggregatesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.116s 2020-11-06 17:58:39.920 38 DEBUG tempest.lib.common.rest_client [req-589517b3-78d4-43a8-adf6-7b22b16f4763 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-AggregatesRbacTest-591314769", "password": "C0^hHPYnt44kb*E", "project_id": "da822d4027d545cc9eb5f098de258d1d", "email": "tempest-AggregatesRbacTest-1096454439@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '391', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-589517b3-78d4-43a8-adf6-7b22b16f4763', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "da822d4027d545cc9eb5f098de258d1d", "email": "tempest-AggregatesRbacTest-1096454439@example.com", "id": "b9193b9c5b774f4598d6d6d5a73287c7", "name": "tempest-AggregatesRbacTest-591314769", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/b9193b9c5b774f4598d6d6d5a73287c7"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:39.953 40 INFO tempest.lib.common.rest_client [req-067d7657-85c6-4a0a-8583-cec1c3ccf47b ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.105s 2020-11-06 17:58:39.953 40 DEBUG tempest.lib.common.rest_client [req-067d7657-85c6-4a0a-8583-cec1c3ccf47b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6585', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-067d7657-85c6-4a0a-8583-cec1c3ccf47b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "cf552f4ea0d54d2bb5d6b637cf9bf419", "name": "tempest-NovaAvailabilityZoneRbacTest-777302255", "password_expires_at": null}, "audit_ids": ["9cZTaUNLS4SdFNsNc5c-wg"], "expires_at": "2020-11-06T18:58:39.000000Z", "issued_at": "2020-11-06T17:58:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7d6ec83579e04d32a1a39c04c9066c95", "name": "tempest-NovaAvailabilityZoneRbacTest-777302255"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7d6ec83579e04d32a1a39c04c9066c95", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7d6ec83579e04d32a1a39c04c9066c95", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7d6ec83579e04d32a1a39c04c9066c95", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7d6ec83579e04d32a1a39c04c9066c95", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7d6ec83579e04d32a1a39c04c9066c95", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7d6ec83579e04d32a1a39c04c9066c95", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:39.991 40 INFO tempest.lib.common.rest_client [req-a9361322-f45c-4c87-a641-1d38243ded0f ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 17:58:39.992 40 DEBUG tempest.lib.common.rest_client [req-a9361322-f45c-4c87-a641-1d38243ded0f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a9361322-f45c-4c87-a641-1d38243ded0f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["bwpAS7dnR2W4x7NoFkqr7Q"], "expires_at": "2020-11-06T18:58:39.000000Z", "issued_at": "2020-11-06T17:58:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:39.997 39 INFO tempest.lib.common.rest_client [req-c197a87e-4928-45c5-a0ce-df1657c4c43d ] Request (AgentsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/fa6a56ef86e74e97944c04fdfab296ed/users/15a705d7e4894f189f405daf2f934cfc/roles/72a4576c553448cd941b052c1ca0cf2d 0.180s 2020-11-06 17:58:39.997 39 DEBUG tempest.lib.common.rest_client [req-c197a87e-4928-45c5-a0ce-df1657c4c43d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c197a87e-4928-45c5-a0ce-df1657c4c43d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/fa6a56ef86e74e97944c04fdfab296ed/users/15a705d7e4894f189f405daf2f934cfc/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:39.998 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-AgentsRbacTest-1121454842', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'fa6a56ef86e74e97944c04fdfab296ed', 'project_name': 'tempest-AgentsRbacTest-1121454842', 'tenant_id': 'fa6a56ef86e74e97944c04fdfab296ed', 'tenant_name': 'tempest-AgentsRbacTest-1121454842', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '15a705d7e4894f189f405daf2f934cfc'}, Network: None, Subnet: None, Router: None 2020-11-06 17:58:39.998 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-AgentsRbacTest-1121454842', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'fa6a56ef86e74e97944c04fdfab296ed', 'project_name': 'tempest-AgentsRbacTest-1121454842', 'tenant_id': 'fa6a56ef86e74e97944c04fdfab296ed', 'tenant_name': 'tempest-AgentsRbacTest-1121454842', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '15a705d7e4894f189f405daf2f934cfc'}, Network: None, Subnet: None, Router: None 2020-11-06 17:58:40.023 37 INFO tempest.lib.common.rest_client [req-0c120dc5-ee41-47e6-8b18-e6a71f7b2118 ] Request (FlavorAccessRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.103s 2020-11-06 17:58:40.023 37 DEBUG tempest.lib.common.rest_client [req-0c120dc5-ee41-47e6-8b18-e6a71f7b2118 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0c120dc5-ee41-47e6-8b18-e6a71f7b2118', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:40.098 40 INFO tempest.lib.common.rest_client [req-69870bd3-8146-48ed-a869-58f59b2edf6b ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-11-06 17:58:40.098 40 DEBUG tempest.lib.common.rest_client [req-69870bd3-8146-48ed-a869-58f59b2edf6b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-69870bd3-8146-48ed-a869-58f59b2edf6b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["xweJIHKAQqeFiiYcItmZTg"], "expires_at": "2020-11-06T18:58:40.000000Z", "issued_at": "2020-11-06T17:58:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:40.108 39 INFO tempest.lib.common.rest_client [req-21eadf27-62f6-4a14-b836-307f6949ba2d ] Request (AgentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.101s 2020-11-06 17:58:40.109 39 DEBUG tempest.lib.common.rest_client [req-21eadf27-62f6-4a14-b836-307f6949ba2d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6559', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-21eadf27-62f6-4a14-b836-307f6949ba2d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "15a705d7e4894f189f405daf2f934cfc", "name": "tempest-AgentsRbacTest-1121454842", "password_expires_at": null}, "audit_ids": ["XX-P08BJTE6pToLc_y2aRw"], "expires_at": "2020-11-06T18:58:40.000000Z", "issued_at": "2020-11-06T17:58:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fa6a56ef86e74e97944c04fdfab296ed", "name": "tempest-AgentsRbacTest-1121454842"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/im _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:40.115 37 INFO tempest.lib.common.rest_client [req-bd896ceb-5dd5-427f-9388-212a0f7b8a25 ] Request (FlavorAccessRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.090s 2020-11-06 17:58:40.116 37 DEBUG tempest.lib.common.rest_client [req-bd896ceb-5dd5-427f-9388-212a0f7b8a25 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bd896ceb-5dd5-427f-9388-212a0f7b8a25', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:40.139 38 INFO tempest.lib.common.rest_client [req-6740358c-dd38-4cb1-a13a-feb635e8a48e ] Request (AggregatesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.217s 2020-11-06 17:58:40.139 38 DEBUG tempest.lib.common.rest_client [req-6740358c-dd38-4cb1-a13a-feb635e8a48e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6740358c-dd38-4cb1-a13a-feb635e8a48e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:40.147 39 INFO tempest.lib.common.rest_client [req-db4b0979-8e25-42f7-a2b3-bc25661c13d7 ] Request (AgentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 17:58:40.147 39 DEBUG tempest.lib.common.rest_client [req-db4b0979-8e25-42f7-a2b3-bc25661c13d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-db4b0979-8e25-42f7-a2b3-bc25661c13d7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["kr1GsTQLQ06hI4ZxtAcrPg"], "expires_at": "2020-11-06T18:58:40.000000Z", "issued_at": "2020-11-06T17:58:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:40.150 40 INFO tempest.lib.common.rest_client [req-8410df1f-bb04-4d0a-9e92-9f205b0c4593 ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.050s 2020-11-06 17:58:40.150 40 DEBUG tempest.lib.common.rest_client [req-8410df1f-bb04-4d0a-9e92-9f205b0c4593 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8410df1f-bb04-4d0a-9e92-9f205b0c4593', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:40.174 37 INFO tempest.lib.common.rest_client [req-15451165-d953-4cec-941c-b0520e7964c6 ] Request (FlavorAccessRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/52c3dff7ef9f46f98e2c0e166df4f162/users/db7cf899ed5a40c5882522729a156930/roles/72a4576c553448cd941b052c1ca0cf2d 0.057s 2020-11-06 17:58:40.174 37 DEBUG tempest.lib.common.rest_client [req-15451165-d953-4cec-941c-b0520e7964c6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-15451165-d953-4cec-941c-b0520e7964c6', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/52c3dff7ef9f46f98e2c0e166df4f162/users/db7cf899ed5a40c5882522729a156930/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:40.175 37 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FlavorAccessRbacTest-1193074130', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '52c3dff7ef9f46f98e2c0e166df4f162', 'project_name': 'tempest-FlavorAccessRbacTest-1193074130', 'tenant_id': '52c3dff7ef9f46f98e2c0e166df4f162', 'tenant_name': 'tempest-FlavorAccessRbacTest-1193074130', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'db7cf899ed5a40c5882522729a156930'}, Network: None, Subnet: None, Router: None 2020-11-06 17:58:40.176 37 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FlavorAccessRbacTest-1193074130', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '52c3dff7ef9f46f98e2c0e166df4f162', 'project_name': 'tempest-FlavorAccessRbacTest-1193074130', 'tenant_id': '52c3dff7ef9f46f98e2c0e166df4f162', 'tenant_name': 'tempest-FlavorAccessRbacTest-1193074130', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'db7cf899ed5a40c5882522729a156930'}, Network: None, Subnet: None, Router: None 2020-11-06 17:58:40.191 38 INFO tempest.lib.common.rest_client [req-e429e5e4-4918-425a-b45c-51a984591837 ] Request (AggregatesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.050s 2020-11-06 17:58:40.191 38 DEBUG tempest.lib.common.rest_client [req-e429e5e4-4918-425a-b45c-51a984591837 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e429e5e4-4918-425a-b45c-51a984591837', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:40.202 40 INFO tempest.lib.common.rest_client [req-1ff2ae0e-63c4-4735-91a4-8bee3a744244 ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.051s 2020-11-06 17:58:40.203 40 DEBUG tempest.lib.common.rest_client [req-1ff2ae0e-63c4-4735-91a4-8bee3a744244 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1ff2ae0e-63c4-4735-91a4-8bee3a744244', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:40.204 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 17:58:40.205 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:40.228 39 INFO tempest.lib.common.rest_client [req-e465d822-de92-44ed-be9d-a4c18d176819 ] Request (AgentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.074s 2020-11-06 17:58:40.228 39 DEBUG tempest.lib.common.rest_client [req-e465d822-de92-44ed-be9d-a4c18d176819 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e465d822-de92-44ed-be9d-a4c18d176819', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["LR2hfy6wSq2UYstih74Bbw"], "expires_at": "2020-11-06T18:58:40.000000Z", "issued_at": "2020-11-06T17:58:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:40.275 39 INFO tempest.lib.common.rest_client [req-b6ec22cb-a4ba-42ac-b349-5806f0e84047 ] Request (AgentsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.045s 2020-11-06 17:58:40.275 39 DEBUG tempest.lib.common.rest_client [req-b6ec22cb-a4ba-42ac-b349-5806f0e84047 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b6ec22cb-a4ba-42ac-b349-5806f0e84047', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:40.288 37 INFO tempest.lib.common.rest_client [req-e02739a1-88f7-4e53-a46a-1668084140b7 ] Request (FlavorAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-11-06 17:58:40.288 37 DEBUG tempest.lib.common.rest_client [req-e02739a1-88f7-4e53-a46a-1668084140b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6571', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e02739a1-88f7-4e53-a46a-1668084140b7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "db7cf899ed5a40c5882522729a156930", "name": "tempest-FlavorAccessRbacTest-1193074130", "password_expires_at": null}, "audit_ids": ["6RxDus7hSem6MEh0hOj1sg"], "expires_at": "2020-11-06T18:58:40.000000Z", "issued_at": "2020-11-06T17:58:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "52c3dff7ef9f46f98e2c0e166df4f162", "name": "tempest-FlavorAccessRbacTest-1193074130"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:40.298 40 INFO tempest.lib.common.rest_client [req-df9de409-3f60-4ebb-add7-4b500a9d4a12 ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/7d6ec83579e04d32a1a39c04c9066c95/users/cf552f4ea0d54d2bb5d6b637cf9bf419/roles 0.091s 2020-11-06 17:58:40.298 40 DEBUG tempest.lib.common.rest_client [req-df9de409-3f60-4ebb-add7-4b500a9d4a12 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-df9de409-3f60-4ebb-add7-4b500a9d4a12', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7d6ec83579e04d32a1a39c04c9066c95/users/cf552f4ea0d54d2bb5d6b637cf9bf419/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7d6ec83579e04d32a1a39c04c9066c95/users/cf552f4ea0d54d2bb5d6b637cf9bf419/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:40.301 38 INFO tempest.lib.common.rest_client [req-e8d4048f-5ab5-4b7c-8d2e-a99469e0f330 ] Request (AggregatesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles/72a4576c553448cd941b052c1ca0cf2d 0.109s 2020-11-06 17:58:40.302 38 DEBUG tempest.lib.common.rest_client [req-e8d4048f-5ab5-4b7c-8d2e-a99469e0f330 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e8d4048f-5ab5-4b7c-8d2e-a99469e0f330', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:40.302 38 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-AggregatesRbacTest-591314769', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'da822d4027d545cc9eb5f098de258d1d', 'project_name': 'tempest-AggregatesRbacTest-591314769', 'tenant_id': 'da822d4027d545cc9eb5f098de258d1d', 'tenant_name': 'tempest-AggregatesRbacTest-591314769', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'b9193b9c5b774f4598d6d6d5a73287c7'}, Network: None, Subnet: None, Router: None 2020-11-06 17:58:40.303 38 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-AggregatesRbacTest-591314769', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'da822d4027d545cc9eb5f098de258d1d', 'project_name': 'tempest-AggregatesRbacTest-591314769', 'tenant_id': 'da822d4027d545cc9eb5f098de258d1d', 'tenant_name': 'tempest-AggregatesRbacTest-591314769', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'b9193b9c5b774f4598d6d6d5a73287c7'}, Network: None, Subnet: None, Router: None 2020-11-06 17:58:40.329 39 INFO tempest.lib.common.rest_client [req-93feeb81-dd5c-4ba3-9a6e-9fbfde406254 ] Request (AgentsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.052s 2020-11-06 17:58:40.329 39 DEBUG tempest.lib.common.rest_client [req-93feeb81-dd5c-4ba3-9a6e-9fbfde406254 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-93feeb81-dd5c-4ba3-9a6e-9fbfde406254', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:40.330 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 17:58:40.331 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:40.366 37 INFO tempest.lib.common.rest_client [req-3613941c-df71-4aff-8166-e86ea7b323bc ] Request (FlavorAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.076s 2020-11-06 17:58:40.366 37 DEBUG tempest.lib.common.rest_client [req-3613941c-df71-4aff-8166-e86ea7b323bc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3613941c-df71-4aff-8166-e86ea7b323bc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["qG2f-SaWSbyUSl1VCDjQIA"], "expires_at": "2020-11-06T18:58:40.000000Z", "issued_at": "2020-11-06T17:58:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:40.407 40 INFO tempest.lib.common.rest_client [req-1ee3a7c9-8e39-4153-8344-e6b63bd8ec31 ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/7d6ec83579e04d32a1a39c04c9066c95/users/cf552f4ea0d54d2bb5d6b637cf9bf419/roles/72a4576c553448cd941b052c1ca0cf2d 0.108s 2020-11-06 17:58:40.407 40 DEBUG tempest.lib.common.rest_client [req-1ee3a7c9-8e39-4153-8344-e6b63bd8ec31 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1ee3a7c9-8e39-4153-8344-e6b63bd8ec31', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/7d6ec83579e04d32a1a39c04c9066c95/users/cf552f4ea0d54d2bb5d6b637cf9bf419/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:40.432 39 INFO tempest.lib.common.rest_client [req-656d4d9d-85a1-4745-b5f9-e300763e3f79 ] Request (AgentsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/fa6a56ef86e74e97944c04fdfab296ed/users/15a705d7e4894f189f405daf2f934cfc/roles 0.099s 2020-11-06 17:58:40.432 39 DEBUG tempest.lib.common.rest_client [req-656d4d9d-85a1-4745-b5f9-e300763e3f79 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-656d4d9d-85a1-4745-b5f9-e300763e3f79', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fa6a56ef86e74e97944c04fdfab296ed/users/15a705d7e4894f189f405daf2f934cfc/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fa6a56ef86e74e97944c04fdfab296ed/users/15a705d7e4894f189f405daf2f934cfc/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:40.470 37 INFO tempest.lib.common.rest_client [req-43adab01-7a9e-4a26-acf2-4ae50e2c7795 ] Request (FlavorAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-11-06 17:58:40.471 37 DEBUG tempest.lib.common.rest_client [req-43adab01-7a9e-4a26-acf2-4ae50e2c7795 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-43adab01-7a9e-4a26-acf2-4ae50e2c7795', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["bPwrwyJyRvyj6cQEdOmssg"], "expires_at": "2020-11-06T18:58:40.000000Z", "issued_at": "2020-11-06T17:58:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:40.506 38 INFO tempest.lib.common.rest_client [req-b729e7b0-4478-433d-9895-65c7aba052e5 ] Request (AggregatesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.192s 2020-11-06 17:58:40.507 38 DEBUG tempest.lib.common.rest_client [req-b729e7b0-4478-433d-9895-65c7aba052e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6565', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b729e7b0-4478-433d-9895-65c7aba052e5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b9193b9c5b774f4598d6d6d5a73287c7", "name": "tempest-AggregatesRbacTest-591314769", "password_expires_at": null}, "audit_ids": ["VTQaJS4kRuOeun6vElU51g"], "expires_at": "2020-11-06T18:58:40.000000Z", "issued_at": "2020-11-06T17:58:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "da822d4027d545cc9eb5f098de258d1d", "name": "tempest-AggregatesRbacTest-591314769"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:40.523 40 INFO tempest.lib.common.rest_client [req-123d7a92-bbdf-4845-aa35-3ebbf31b0cb5 ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/7d6ec83579e04d32a1a39c04c9066c95/users/cf552f4ea0d54d2bb5d6b637cf9bf419/roles/a629c95d64b3416fb80ae90af4f69c05 0.114s 2020-11-06 17:58:40.524 40 DEBUG tempest.lib.common.rest_client [req-123d7a92-bbdf-4845-aa35-3ebbf31b0cb5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-123d7a92-bbdf-4845-aa35-3ebbf31b0cb5', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/7d6ec83579e04d32a1a39c04c9066c95/users/cf552f4ea0d54d2bb5d6b637cf9bf419/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:40.528 37 INFO tempest.lib.common.rest_client [req-ca32522d-6786-4f5d-9560-9e9d3262e5eb ] Request (FlavorAccessRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.056s 2020-11-06 17:58:40.529 37 DEBUG tempest.lib.common.rest_client [req-ca32522d-6786-4f5d-9560-9e9d3262e5eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ca32522d-6786-4f5d-9560-9e9d3262e5eb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:40.534 39 INFO tempest.lib.common.rest_client [req-e05026aa-e0a3-401c-b58e-3a839e5976d6 ] Request (AgentsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/fa6a56ef86e74e97944c04fdfab296ed/users/15a705d7e4894f189f405daf2f934cfc/roles/72a4576c553448cd941b052c1ca0cf2d 0.100s 2020-11-06 17:58:40.534 39 DEBUG tempest.lib.common.rest_client [req-e05026aa-e0a3-401c-b58e-3a839e5976d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e05026aa-e0a3-401c-b58e-3a839e5976d6', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/fa6a56ef86e74e97944c04fdfab296ed/users/15a705d7e4894f189f405daf2f934cfc/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:40.591 38 INFO tempest.lib.common.rest_client [req-b26c2f16-2fd2-412f-8fea-04e569d21c31 ] Request (AggregatesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 17:58:40.591 38 DEBUG tempest.lib.common.rest_client [req-b26c2f16-2fd2-412f-8fea-04e569d21c31 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b26c2f16-2fd2-412f-8fea-04e569d21c31', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["3ome-BfGQ4K8YyIIKhdizw"], "expires_at": "2020-11-06T18:58:40.000000Z", "issued_at": "2020-11-06T17:58:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:40.632 38 INFO tempest.lib.common.rest_client [req-46497a74-a036-42a5-a051-c681b6b1ba0c ] Request (AggregatesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 17:58:40.633 38 DEBUG tempest.lib.common.rest_client [req-46497a74-a036-42a5-a051-c681b6b1ba0c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-46497a74-a036-42a5-a051-c681b6b1ba0c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["DDePAvw8QTyCJV8VGNTzbQ"], "expires_at": "2020-11-06T18:58:40.000000Z", "issued_at": "2020-11-06T17:58:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:40.645 39 INFO tempest.lib.common.rest_client [req-bd330485-f085-4c97-b579-1b9e5300b569 ] Request (AgentsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/fa6a56ef86e74e97944c04fdfab296ed/users/15a705d7e4894f189f405daf2f934cfc/roles/a629c95d64b3416fb80ae90af4f69c05 0.110s 2020-11-06 17:58:40.646 39 DEBUG tempest.lib.common.rest_client [req-bd330485-f085-4c97-b579-1b9e5300b569 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bd330485-f085-4c97-b579-1b9e5300b569', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/fa6a56ef86e74e97944c04fdfab296ed/users/15a705d7e4894f189f405daf2f934cfc/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:40.648 37 INFO tempest.lib.common.rest_client [req-2b1e160b-8591-4cba-9033-81ddceb14bfd ] Request (FlavorAccessRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.118s 2020-11-06 17:58:40.649 37 DEBUG tempest.lib.common.rest_client [req-2b1e160b-8591-4cba-9033-81ddceb14bfd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2b1e160b-8591-4cba-9033-81ddceb14bfd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:40.649 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 17:58:40.651 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:40.728 38 INFO tempest.lib.common.rest_client [req-0917dbbb-5113-43cb-9e45-41caae309728 ] Request (AggregatesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.094s 2020-11-06 17:58:40.728 38 DEBUG tempest.lib.common.rest_client [req-0917dbbb-5113-43cb-9e45-41caae309728 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0917dbbb-5113-43cb-9e45-41caae309728', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:40.756 37 INFO tempest.lib.common.rest_client [req-63c4a8b4-fdae-4dcd-97a2-b8fd859d01bc ] Request (FlavorAccessRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/52c3dff7ef9f46f98e2c0e166df4f162/users/db7cf899ed5a40c5882522729a156930/roles 0.104s 2020-11-06 17:58:40.756 37 DEBUG tempest.lib.common.rest_client [req-63c4a8b4-fdae-4dcd-97a2-b8fd859d01bc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-63c4a8b4-fdae-4dcd-97a2-b8fd859d01bc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/52c3dff7ef9f46f98e2c0e166df4f162/users/db7cf899ed5a40c5882522729a156930/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/52c3dff7ef9f46f98e2c0e166df4f162/users/db7cf899ed5a40c5882522729a156930/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:40.776 38 INFO tempest.lib.common.rest_client [req-79779551-9f64-4fb4-af64-f0b431af9b10 ] Request (AggregatesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.046s 2020-11-06 17:58:40.776 38 DEBUG tempest.lib.common.rest_client [req-79779551-9f64-4fb4-af64-f0b431af9b10 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-79779551-9f64-4fb4-af64-f0b431af9b10', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:40.777 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 17:58:40.778 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:40.819 37 INFO tempest.lib.common.rest_client [req-fdf61e0b-748a-43fa-8524-26ba96ed6840 ] Request (FlavorAccessRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/52c3dff7ef9f46f98e2c0e166df4f162/users/db7cf899ed5a40c5882522729a156930/roles/72a4576c553448cd941b052c1ca0cf2d 0.061s 2020-11-06 17:58:40.819 37 DEBUG tempest.lib.common.rest_client [req-fdf61e0b-748a-43fa-8524-26ba96ed6840 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fdf61e0b-748a-43fa-8524-26ba96ed6840', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/52c3dff7ef9f46f98e2c0e166df4f162/users/db7cf899ed5a40c5882522729a156930/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:40.824 38 INFO tempest.lib.common.rest_client [req-3e8bd609-49c4-4a8f-944b-b004bd36314a ] Request (AggregatesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles 0.046s 2020-11-06 17:58:40.825 38 DEBUG tempest.lib.common.rest_client [req-3e8bd609-49c4-4a8f-944b-b004bd36314a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3e8bd609-49c4-4a8f-944b-b004bd36314a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:40.938 37 INFO tempest.lib.common.rest_client [req-00ac2fe1-0406-4aab-8732-6d86dc4ca365 ] Request (FlavorAccessRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/52c3dff7ef9f46f98e2c0e166df4f162/users/db7cf899ed5a40c5882522729a156930/roles/a629c95d64b3416fb80ae90af4f69c05 0.118s 2020-11-06 17:58:40.939 37 DEBUG tempest.lib.common.rest_client [req-00ac2fe1-0406-4aab-8732-6d86dc4ca365 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-00ac2fe1-0406-4aab-8732-6d86dc4ca365', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/52c3dff7ef9f46f98e2c0e166df4f162/users/db7cf899ed5a40c5882522729a156930/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:40.946 38 INFO tempest.lib.common.rest_client [req-11a212fa-74e8-462a-a5d7-9331c1c86e92 ] Request (AggregatesRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles/72a4576c553448cd941b052c1ca0cf2d 0.121s 2020-11-06 17:58:40.947 38 DEBUG tempest.lib.common.rest_client [req-11a212fa-74e8-462a-a5d7-9331c1c86e92 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-11a212fa-74e8-462a-a5d7-9331c1c86e92', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:41.059 38 INFO tempest.lib.common.rest_client [req-1ffd0a53-022d-4cbf-952b-9c6615b4e5a1 ] Request (AggregatesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles/a629c95d64b3416fb80ae90af4f69c05 0.112s 2020-11-06 17:58:41.060 38 DEBUG tempest.lib.common.rest_client [req-1ffd0a53-022d-4cbf-952b-9c6615b4e5a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1ffd0a53-022d-4cbf-952b-9c6615b4e5a1', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:41.609 40 INFO tempest.lib.common.rest_client [req-f1deb981-ef17-4610-83c5-43525367fec4 ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 17:58:41.609 40 DEBUG tempest.lib.common.rest_client [req-f1deb981-ef17-4610-83c5-43525367fec4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6646', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f1deb981-ef17-4610-83c5-43525367fec4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "cf552f4ea0d54d2bb5d6b637cf9bf419", "name": "tempest-NovaAvailabilityZoneRbacTest-777302255", "password_expires_at": null}, "audit_ids": ["vdKgZYirQxi8eJ3qK0XN8w"], "expires_at": "2020-11-06T18:58:41.000000Z", "issued_at": "2020-11-06T17:58:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7d6ec83579e04d32a1a39c04c9066c95", "name": "tempest-NovaAvailabilityZoneRbacTest-777302255"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7d6ec83579e04d32a1a39c04c9066c95", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7d6ec83579e04d32a1a39c04c9066c95", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7d6ec83579e04d32a1a39c04c9066c95", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7d6ec83579e04d32a1a39c04c9066c95", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7d6ec83579e04d32a1a39c04c9066c95", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7d6ec83579e04d32a1a39c04c9066c95", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5baf _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:41.613 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:58:41.708 40 INFO tempest.lib.common.rest_client [req-22dd8727-0d4a-4f17-be79-aac81557e2d5 ] Request (main): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-11-06 17:58:41.708 40 DEBUG tempest.lib.common.rest_client [req-22dd8727-0d4a-4f17-be79-aac81557e2d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-22dd8727-0d4a-4f17-be79-aac81557e2d5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["m39fTGc3Rx6JCieBco9djg"], "expires_at": "2020-11-06T18:58:41.000000Z", "issued_at": "2020-11-06T17:58:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:41.733 39 INFO tempest.lib.common.rest_client [req-b7dd75f1-2da8-45d7-9a6e-40661cfd6ccc ] Request (AgentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-11-06 17:58:41.733 39 DEBUG tempest.lib.common.rest_client [req-b7dd75f1-2da8-45d7-9a6e-40661cfd6ccc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b7dd75f1-2da8-45d7-9a6e-40661cfd6ccc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "15a705d7e4894f189f405daf2f934cfc", "name": "tempest-AgentsRbacTest-1121454842", "password_expires_at": null}, "audit_ids": ["L_TDuavwT1WY9DehzGaRyA"], "expires_at": "2020-11-06T18:58:41.000000Z", "issued_at": "2020-11-06T17:58:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fa6a56ef86e74e97944c04fdfab296ed", "name": "tempest-AgentsRbacTest-1121454842"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:41.737 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:58:41.753 40 INFO tempest.lib.common.rest_client [req-ce0d8307-c328-4073-ab81-0e29e8a72137 ] Request (main): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 17:58:41.754 40 DEBUG tempest.lib.common.rest_client [req-ce0d8307-c328-4073-ab81-0e29e8a72137 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ce0d8307-c328-4073-ab81-0e29e8a72137', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["gN4knGiuRCeTkwrwiK6o7w"], "expires_at": "2020-11-06T18:58:41.000000Z", "issued_at": "2020-11-06T17:58:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:41.771 39 INFO tempest.lib.common.rest_client [req-6428d4ba-a254-4386-8108-0ad9f5dcd9f9 ] Request (main): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 17:58:41.772 39 DEBUG tempest.lib.common.rest_client [req-6428d4ba-a254-4386-8108-0ad9f5dcd9f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6428d4ba-a254-4386-8108-0ad9f5dcd9f9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["fNw84L3lQnyem2Oivs4J-g"], "expires_at": "2020-11-06T18:58:41.000000Z", "issued_at": "2020-11-06T17:58:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:41.803 40 INFO tempest.lib.common.rest_client [req-888dbd9d-0acc-4092-9a83-693a7c8b683b ] Request (main): 200 GET http://172.30.13.94/identity/v3/services 0.048s 2020-11-06 17:58:41.804 40 DEBUG tempest.lib.common.rest_client [req-888dbd9d-0acc-4092-9a83-693a7c8b683b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '3880', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-888dbd9d-0acc-4092-9a83-693a7c8b683b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/services'} Body: b'{"services": [{"name": "heat", "description": "Heat Orchestration Service", "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/2dd99a84fcfe4d4c902af3c7e3370547"}}, {"name": "cinderv3", "description": "Cinder Volume Service V3", "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/4f0aec6b5f2347eeaf7987d5e52c15ee"}}, {"name": "heat-cfn", "description": "Heat CloudFormation Service", "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/5635f75247b445dd8c099f6dae4391e9"}}, {"name": "neutron", "description": "Neutron Service", "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/5b112e1f9f554e9ea13076091373ba24"}}, {"name": "placement", "description": "Placement Service", "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/7e47b727207a4e4e806b20fab1e17997"}}, {"name": "nova_legacy", "description": "Nova Compute Service (Legacy 2.0)", "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/8f2830f7e6d24fe0b8bf0b4df9612609"}}, {"name": "swift", "description": "Swift Service", "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/943b628f9f61458d9ef457915c0a4842"}}, {"name": "keystone", "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/a2db5aab3c1d485cbf6ccd92ea7a2995"}}, {"name": "aodh", "description": "OpenStack Alarming Service", "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/a372e5d5aaed47178d6bd28e25c4ed16"}}, {"name": "glance", "description": "Glance Image Service", "id": "b28a3fc2818546fd87c2e4c7f28b1ee2", "type": "image", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/b28a3fc2818546fd87c2e4c7f28b1ee2"}}, {"name": "cinder", "description": "Cinder Volume Service", "id": "b29b4d43197d4c0b829c6cf8d8b39bf0", "type": "block-storage", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/b29b4d43197d4c0b829c6cf8d8b39bf0"}}, {"name": "cinderv2", "description": "Cinder Volume Service V2", "id": "db8f8625cffe4b818eb0c765296f5282", "type": "volumev2", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/db8f8625cffe4b818eb0c765296f5282"}}, {"name": "gnocchi", "description": "OpenStack Metric Service", "id": "de459e19dc284669a50e9c8274d0ec7f", "type": "metric", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/de459e19dc284669a50e9c8274d0ec7f"}}, {"name": "barbican", "description": "Barbican Service", "id": "ee548e94135646b6a64be1daf30191d1", "type": "key-manager", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/ee548e94135646b6a64be1daf30191d1"}}, {"name": "nova", "description": "Nova Compute Service", "id": "f4181cc470594a9e82e091cd6ff52ad7", "type": "compute", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/f4181cc470594a9e82e091cd6ff52ad7"}}, {"name": "panko", "description": "OpenStack Telemetry Service", "id": "f9b2abba6c934357b57aaf5757557344", "type": "event", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/f9b2abba6c934357b57aaf5757557344"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/services", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:41.816 39 INFO tempest.lib.common.rest_client [req-845fec2c-8dc4-4135-8446-62e0b73e4ce8 ] Request (main): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 17:58:41.817 39 DEBUG tempest.lib.common.rest_client [req-845fec2c-8dc4-4135-8446-62e0b73e4ce8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-845fec2c-8dc4-4135-8446-62e0b73e4ce8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["cMHAo__6Qwu1h0E2KwvrmQ"], "expires_at": "2020-11-06T18:58:41.000000Z", "issued_at": "2020-11-06T17:58:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:41.842 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.842 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.843 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.843 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.843 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.844 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.844 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.844 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.845 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.845 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.845 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.846 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.846 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.846 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.846 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.847 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.847 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.848 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.848 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.848 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.848 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.849 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.849 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.849 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.850 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.850 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.850 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.850 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.850 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.851 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.851 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.851 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.851 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.852 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.852 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.852 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.852 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.853 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.853 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.853 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.853 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.854 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.854 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.854 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.854 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.855 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.855 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.855 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.855 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.856 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.856 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.856 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.856 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.856 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.857 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.857 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.857 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.857 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.858 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.858 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.858 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.858 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.859 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.859 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.859 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.859 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.860 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.860 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.860 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.860 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.861 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.861 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.861 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.861 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.861 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.862 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-availability-zone:detail, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:58:41.862 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:41.866 39 INFO tempest.lib.common.rest_client [req-af87088c-3bfc-40bc-9408-74ca5951ae31 ] Request (main): 200 GET http://172.30.13.94/identity/v3/services 0.047s 2020-11-06 17:58:41.866 39 DEBUG tempest.lib.common.rest_client [req-af87088c-3bfc-40bc-9408-74ca5951ae31 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '3880', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-af87088c-3bfc-40bc-9408-74ca5951ae31', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/services'} Body: b'{"services": [{"name": "heat", "description": "Heat Orchestration Service", "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/2dd99a84fcfe4d4c902af3c7e3370547"}}, {"name": "cinderv3", "description": "Cinder Volume Service V3", "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/4f0aec6b5f2347eeaf7987d5e52c15ee"}}, {"name": "heat-cfn", "description": "Heat CloudFormation Service", "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/5635f75247b445dd8c099f6dae4391e9"}}, {"name": "neutron", "description": "Neutron Service", "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/5b112e1f9f554e9ea13076091373ba24"}}, {"name": "placement", "description": "Placement Service", "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/7e47b727207a4e4e806b20fab1e17997"}}, {"name": "nova_legacy", "description": "Nova Compute Service (Legacy 2.0)", "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/8f2830f7e6d24fe0b8bf0b4df9612609"}}, {"name": "swift", "description": "Swift Service", "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/943b628f9f61458d9ef457915c0a4842"}}, {"name": "keystone", "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/a2db5aab3c1d485cbf6ccd92ea7a2995"}}, {"name": "aodh", "description": "OpenStack Alarming Service", "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/a372e5d5aaed47178d6bd28e25c4ed16"}}, {"name": "glance", "description": "Glance Image Service", "id": "b28a3fc2818546fd87c2e4c7f28b1ee2", "type": "image", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/b28a3fc2818546fd87c2e4c7f28b1ee2"}}, {"name": "cinder", "description": "Cinder Volume Service", "id": "b29b4d43197d4c0b829c6cf8d8b39bf0", "type": "block-storage", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/b29b4d43197d4c0b829c6cf8d8b39bf0"}}, {"name": "cinderv2", "description": "Cinder Volume Service V2", "id": "db8f8625cffe4b818eb0c765296f5282", "type": "volumev2", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/db8f8625cffe4b818eb0c765296f5282"}}, {"name": "gnocchi", "description": "OpenStack Metric Service", "id": "de459e19dc284669a50e9c8274d0ec7f", "type": "metric", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/de459e19dc284669a50e9c8274d0ec7f"}}, {"name": "barbican", "description": "Barbican Service", "id": "ee548e94135646b6a64be1daf30191d1", "type": "key-manager", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/ee548e94135646b6a64be1daf30191d1"}}, {"name": "nova", "description": "Nova Compute Service", "id": "f4181cc470594a9e82e091cd6ff52ad7", "type": "compute", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/f4181cc470594a9e82e091cd6ff52ad7"}}, {"name": "panko", "description": "OpenStack Telemetry Service", "id": "f9b2abba6c934357b57aaf5757557344", "type": "event", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/f9b2abba6c934357b57aaf5757557344"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/services", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:41.903 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.904 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.904 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.904 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.905 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.905 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.906 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.906 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.906 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.907 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.907 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.907 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.908 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.908 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.908 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.908 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.909 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.909 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.909 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.910 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.910 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.910 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.911 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.911 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.911 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.911 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.912 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.912 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.912 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.913 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.913 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.913 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.913 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.914 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.914 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.914 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.915 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.915 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.915 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.915 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.916 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.916 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.916 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.917 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.917 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.917 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.918 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.918 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.918 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.919 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.919 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.919 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.919 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.920 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.920 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.920 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.921 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.921 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.921 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.922 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.922 40 INFO tempest.lib.common.rest_client [req-cdceb21e-7511-4321-befd-7ef30b4c6275 ] Request (NovaAvailabilityZoneRbacTest:test_get_availability_zone_list_detail_rbac): 200 GET http://172.30.13.94/identity/v3/projects/7d6ec83579e04d32a1a39c04c9066c95/users/cf552f4ea0d54d2bb5d6b637cf9bf419/roles 0.059s 2020-11-06 17:58:41.922 40 DEBUG tempest.lib.common.rest_client [req-cdceb21e-7511-4321-befd-7ef30b4c6275 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cdceb21e-7511-4321-befd-7ef30b4c6275', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7d6ec83579e04d32a1a39c04c9066c95/users/cf552f4ea0d54d2bb5d6b637cf9bf419/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7d6ec83579e04d32a1a39c04c9066c95/users/cf552f4ea0d54d2bb5d6b637cf9bf419/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:41.922 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.922 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.923 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.923 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.923 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.924 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.924 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.924 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.924 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.925 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.925 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.925 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.926 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.926 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.926 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:41.927 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-agents:create, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:58:41.928 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:41.956 40 INFO tempest.lib.common.rest_client [req-e0529367-2b14-4bd9-b09d-67863b70fb43 ] Request (NovaAvailabilityZoneRbacTest:test_get_availability_zone_list_detail_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 17:58:41.957 40 DEBUG tempest.lib.common.rest_client [req-e0529367-2b14-4bd9-b09d-67863b70fb43 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6646', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e0529367-2b14-4bd9-b09d-67863b70fb43', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "cf552f4ea0d54d2bb5d6b637cf9bf419", "name": "tempest-NovaAvailabilityZoneRbacTest-777302255", "password_expires_at": null}, "audit_ids": ["d-PQLPr1SYeE_qHIscz1EA"], "expires_at": "2020-11-06T18:58:41.000000Z", "issued_at": "2020-11-06T17:58:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7d6ec83579e04d32a1a39c04c9066c95", "name": "tempest-NovaAvailabilityZoneRbacTest-777302255"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7d6ec83579e04d32a1a39c04c9066c95", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7d6ec83579e04d32a1a39c04c9066c95", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7d6ec83579e04d32a1a39c04c9066c95", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7d6ec83579e04d32a1a39c04c9066c95", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7d6ec83579e04d32a1a39c04c9066c95", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7d6ec83579e04d32a1a39c04c9066c95", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5baf _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:41.978 39 INFO tempest.lib.common.rest_client [req-77c07b6c-e4e6-4167-aea3-37d30f7bc3c8 ] Request (AgentsRbacTest:test_create_agent): 200 GET http://172.30.13.94/identity/v3/projects/fa6a56ef86e74e97944c04fdfab296ed/users/15a705d7e4894f189f405daf2f934cfc/roles 0.049s 2020-11-06 17:58:41.978 39 DEBUG tempest.lib.common.rest_client [req-77c07b6c-e4e6-4167-aea3-37d30f7bc3c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-77c07b6c-e4e6-4167-aea3-37d30f7bc3c8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fa6a56ef86e74e97944c04fdfab296ed/users/15a705d7e4894f189f405daf2f934cfc/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fa6a56ef86e74e97944c04fdfab296ed/users/15a705d7e4894f189f405daf2f934cfc/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.011 39 INFO tempest.lib.common.rest_client [req-59c9f7ef-ed3d-499c-b081-63010fee64c3 ] Request (AgentsRbacTest:test_create_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 17:58:42.012 39 DEBUG tempest.lib.common.rest_client [req-59c9f7ef-ed3d-499c-b081-63010fee64c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-59c9f7ef-ed3d-499c-b081-63010fee64c3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "15a705d7e4894f189f405daf2f934cfc", "name": "tempest-AgentsRbacTest-1121454842", "password_expires_at": null}, "audit_ids": ["ts7p1bA-RQ6RJybn52viSQ"], "expires_at": "2020-11-06T18:58:42.000000Z", "issued_at": "2020-11-06T17:58:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fa6a56ef86e74e97944c04fdfab296ed", "name": "tempest-AgentsRbacTest-1121454842"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.037 37 INFO tempest.lib.common.rest_client [req-ee0ee2c5-1e39-4d71-9568-19aac1958290 ] Request (FlavorAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-11-06 17:58:42.037 37 DEBUG tempest.lib.common.rest_client [req-ee0ee2c5-1e39-4d71-9568-19aac1958290 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ee0ee2c5-1e39-4d71-9568-19aac1958290', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "db7cf899ed5a40c5882522729a156930", "name": "tempest-FlavorAccessRbacTest-1193074130", "password_expires_at": null}, "audit_ids": ["2iOmrJt7TFCuXVvvJua9kA"], "expires_at": "2020-11-06T18:58:41.000000Z", "issued_at": "2020-11-06T17:58:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "52c3dff7ef9f46f98e2c0e166df4f162", "name": "tempest-FlavorAccessRbacTest-1193074130"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.116 39 INFO tempest.lib.common.rest_client [req-6b13b41c-aa59-4464-9560-cb49acaaafa7 ] Request (AgentsRbacTest:test_create_agent): 200 POST http://172.30.13.94/compute/v2.1/os-agents 0.103s 2020-11-06 17:58:42.116 39 DEBUG tempest.lib.common.rest_client [req-6b13b41c-aa59-4464-9560-cb49acaaafa7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"agent": {"hypervisor": "kvm", "os": "win", "architecture": "x86", "version": "7.0", "url": "xxx://xxxx/xxx/xxx", "md5hash": "add6bb58e139be103324d04d82d8f545"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '179', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6b13b41c-aa59-4464-9560-cb49acaaafa7', 'x-compute-request-id': 'req-6b13b41c-aa59-4464-9560-cb49acaaafa7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-agents'} Body: b'{"agent": {"hypervisor": "kvm", "os": "win", "architecture": "x86", "version": "7.0", "url": "xxx://xxxx/xxx/xxx", "md5hash": "add6bb58e139be103324d04d82d8f545", "agent_id": 322}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.120 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:42.131 40 INFO tempest.lib.common.rest_client [req-c699805a-08aa-4ba9-9979-1fc2a521eb51 ] Request (NovaAvailabilityZoneRbacTest:test_get_availability_zone_list_detail_rbac): 200 GET http://172.30.13.94/compute/v2.1/os-availability-zone/detail 0.173s 2020-11-06 17:58:42.132 38 INFO tempest.lib.common.rest_client [req-7ed4e198-f38e-4b58-aba6-6d293b8a645c ] Request (AggregatesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.070s 2020-11-06 17:58:42.132 40 DEBUG tempest.lib.common.rest_client [req-c699805a-08aa-4ba9-9979-1fc2a521eb51 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '607', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c699805a-08aa-4ba9-9979-1fc2a521eb51', 'x-compute-request-id': 'req-c699805a-08aa-4ba9-9979-1fc2a521eb51', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-availability-zone/detail'} Body: b'{"availabilityZoneInfo": [{"zoneName": "internal", "zoneState": {"available": true}, "hosts": {"lf-virtual9": {"nova-scheduler": {"available": true, "active": true, "updated_at": "2020-11-06T17:58:40.000000"}, "nova-conductor": {"available": true, "active": true, "updated_at": "2020-11-06T17:58:36.000000"}}}}, {"zoneName": "nova", "zoneState": {"available": true}, "hosts": {"lf-virtual9": {"nova-compute": {"available": true, "active": true, "updated_at": "2020-11-06T17:58:32.000000"}}, "lf-virtual8": {"nova-compute": {"available": true, "active": true, "updated_at": "2020-11-06T17:58:39.000000"}}}}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.132 38 DEBUG tempest.lib.common.rest_client [req-7ed4e198-f38e-4b58-aba6-6d293b8a645c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7ed4e198-f38e-4b58-aba6-6d293b8a645c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b9193b9c5b774f4598d6d6d5a73287c7", "name": "tempest-AggregatesRbacTest-591314769", "password_expires_at": null}, "audit_ids": ["O_dpFLGmTnSr24582FqpAQ"], "expires_at": "2020-11-06T18:58:42.000000Z", "issued_at": "2020-11-06T17:58:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "da822d4027d545cc9eb5f098de258d1d", "name": "tempest-AggregatesRbacTest-591314769"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.137 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:42.145 37 INFO tempest.lib.common.rest_client [req-669aaef4-92dc-49f8-b3f0-ca8c0f706126 ] Request (FlavorAccessRbacTest:setUpClass): 200 POST http://172.30.13.94/compute/v2.1/flavors 0.106s 2020-11-06 17:58:42.146 37 DEBUG tempest.lib.common.rest_client [req-669aaef4-92dc-49f8-b3f0-ca8c0f706126 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"flavor": {"name": "tempest-FlavorAccessRbacTest-flavor-1237637024", "ram": 10, "vcpus": 3, "disk": 9, "id": "b989d49c-4410-4776-970e-08a53996c20a", "os-flavor-access:is_public": false}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '508', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-669aaef4-92dc-49f8-b3f0-ca8c0f706126', 'x-compute-request-id': 'req-669aaef4-92dc-49f8-b3f0-ca8c0f706126', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors'} Body: b'{"flavor": {"id": "b989d49c-4410-4776-970e-08a53996c20a", "name": "tempest-FlavorAccessRbacTest-flavor-1237637024", "ram": 10, "disk": 9, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 3, "os-flavor-access:is_public": false, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/b989d49c-4410-4776-970e-08a53996c20a"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/b989d49c-4410-4776-970e-08a53996c20a"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.151 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:58:42.170 39 INFO tempest.lib.common.rest_client [req-142cb55b-ff8f-4514-b439-04c41ff51efe ] Request (AgentsRbacTest:test_create_agent): 200 GET http://172.30.13.94/identity/v3/projects/fa6a56ef86e74e97944c04fdfab296ed/users/15a705d7e4894f189f405daf2f934cfc/roles 0.049s 2020-11-06 17:58:42.170 39 DEBUG tempest.lib.common.rest_client [req-142cb55b-ff8f-4514-b439-04c41ff51efe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-142cb55b-ff8f-4514-b439-04c41ff51efe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fa6a56ef86e74e97944c04fdfab296ed/users/15a705d7e4894f189f405daf2f934cfc/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fa6a56ef86e74e97944c04fdfab296ed/users/15a705d7e4894f189f405daf2f934cfc/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.184 37 INFO tempest.lib.common.rest_client [req-0e1180a7-0ea8-4982-af60-48dde046870d ] Request (main): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 17:58:42.185 37 DEBUG tempest.lib.common.rest_client [req-0e1180a7-0ea8-4982-af60-48dde046870d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0e1180a7-0ea8-4982-af60-48dde046870d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["MpOSJ9loQ6uKHSvx01IISA"], "expires_at": "2020-11-06T18:58:42.000000Z", "issued_at": "2020-11-06T17:58:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.196 40 INFO tempest.lib.common.rest_client [req-90de51ed-adbc-4a22-872e-18cdcc243072 ] Request (NovaAvailabilityZoneRbacTest:test_get_availability_zone_list_detail_rbac): 200 GET http://172.30.13.94/identity/v3/projects/7d6ec83579e04d32a1a39c04c9066c95/users/cf552f4ea0d54d2bb5d6b637cf9bf419/roles 0.057s 2020-11-06 17:58:42.196 40 DEBUG tempest.lib.common.rest_client [req-90de51ed-adbc-4a22-872e-18cdcc243072 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-90de51ed-adbc-4a22-872e-18cdcc243072', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7d6ec83579e04d32a1a39c04c9066c95/users/cf552f4ea0d54d2bb5d6b637cf9bf419/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7d6ec83579e04d32a1a39c04c9066c95/users/cf552f4ea0d54d2bb5d6b637cf9bf419/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.208 39 INFO tempest.lib.common.rest_client [req-a72cb39a-fcc5-4a47-9286-85697493a2d8 ] Request (AgentsRbacTest:test_create_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 17:58:42.209 39 DEBUG tempest.lib.common.rest_client [req-a72cb39a-fcc5-4a47-9286-85697493a2d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a72cb39a-fcc5-4a47-9286-85697493a2d8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "15a705d7e4894f189f405daf2f934cfc", "name": "tempest-AgentsRbacTest-1121454842", "password_expires_at": null}, "audit_ids": ["-fC7IO2ESzyJ7wUqZn7wdA"], "expires_at": "2020-11-06T18:58:42.000000Z", "issued_at": "2020-11-06T17:58:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fa6a56ef86e74e97944c04fdfab296ed", "name": "tempest-AgentsRbacTest-1121454842"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.228 37 INFO tempest.lib.common.rest_client [req-6eb77201-502f-414b-9d41-f1072a5f1942 ] Request (main): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 17:58:42.228 37 DEBUG tempest.lib.common.rest_client [req-6eb77201-502f-414b-9d41-f1072a5f1942 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6eb77201-502f-414b-9d41-f1072a5f1942', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["a8woewHKTQmDojJYnbOFlA"], "expires_at": "2020-11-06T18:58:42.000000Z", "issued_at": "2020-11-06T17:58:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.229 40 INFO tempest.lib.common.rest_client [req-46f62834-509b-4cb6-8475-cabec416014d ] Request (NovaAvailabilityZoneRbacTest:test_get_availability_zone_list_detail_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 17:58:42.229 40 DEBUG tempest.lib.common.rest_client [req-46f62834-509b-4cb6-8475-cabec416014d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6646', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-46f62834-509b-4cb6-8475-cabec416014d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "cf552f4ea0d54d2bb5d6b637cf9bf419", "name": "tempest-NovaAvailabilityZoneRbacTest-777302255", "password_expires_at": null}, "audit_ids": ["UPT9Z1GSSzWpD5FbsS4zLQ"], "expires_at": "2020-11-06T18:58:42.000000Z", "issued_at": "2020-11-06T17:58:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7d6ec83579e04d32a1a39c04c9066c95", "name": "tempest-NovaAvailabilityZoneRbacTest-777302255"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7d6ec83579e04d32a1a39c04c9066c95", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7d6ec83579e04d32a1a39c04c9066c95", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7d6ec83579e04d32a1a39c04c9066c95", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7d6ec83579e04d32a1a39c04c9066c95", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7d6ec83579e04d32a1a39c04c9066c95", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7d6ec83579e04d32a1a39c04c9066c95", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5baf _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.236 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:58:42.236 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.237 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.237 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.238 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.238 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.238 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.239 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.239 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.239 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.240 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.240 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.241 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.241 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.241 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.242 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.242 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.242 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.242 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.243 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.243 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.243 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.244 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.244 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.244 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.245 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.245 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.245 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.245 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.246 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.246 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.246 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.246 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.247 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.247 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.247 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.247 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.248 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.248 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.248 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.248 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.249 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.249 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.249 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.249 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.250 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.250 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.250 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.250 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.251 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.251 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.251 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.251 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.252 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.252 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.252 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.252 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.253 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.253 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.253 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.253 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.254 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.254 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.254 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.255 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.255 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.255 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.255 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.256 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.256 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.256 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.256 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.257 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.257 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.257 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.257 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.258 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-availability-zone:list, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:58:42.258 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:42.264 38 INFO tempest.lib.common.rest_client [req-808b1907-c40e-448f-9fde-58e46cbb8508 ] Request (AggregatesRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/os-hypervisors/detail 0.129s 2020-11-06 17:58:42.264 38 DEBUG tempest.lib.common.rest_client [req-808b1907-c40e-448f-9fde-58e46cbb8508 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '3115', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-808b1907-c40e-448f-9fde-58e46cbb8508', 'x-compute-request-id': 'req-808b1907-c40e-448f-9fde-58e46cbb8508', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hypervisors/detail'} Body: b'{"hypervisors": [{"id": 1, "hypervisor_hostname": "lf-virtual9", "state": "up", "status": "enabled", "vcpus": 88, "memory_mb": 64312, "local_gb": 100, "vcpus_used": 0, "memory_mb_used": 512, "local_gb_used": 0, "hypervisor_type": "QEMU", "hypervisor_version": 4000000, "free_ram_mb": 63800, "free_disk_gb": 100, "current_workload": 0, "running_vms": 0, "disk_available_least": 60, "host_ip": "172.30.13.94", "service": {"id": 2, "host": "lf-virtual9", "disabled_reason": null}, "cpu_info": "{\\"arch\\": \\"x86_64\\", \\"model\\": \\"Broadwell-IBRS\\", \\"vendor\\": \\"Intel\\", \\"topology\\": {\\"cells\\": 2, \\"sockets\\": 1, \\"cores\\": 22, \\"threads\\": 2}, \\"features\\": [\\"fxsr\\", \\"syscall\\", \\"hle\\", \\"aes\\", \\"cx16\\", \\"avx2\\", \\"cmov\\", \\"smap\\", \\"pse\\", \\"ssse3\\", \\"xsave\\", \\"f16c\\", \\"rdrand\\", \\"vmx\\", \\"smx\\", \\"apic\\", \\"bmi2\\", \\"tsc_adjust\\", \\"rdtscp\\", \\"osxsave\\", \\"mca\\", \\"vme\\", \\"rdseed\\", \\"monitor\\", \\"spec-ctrl\\", \\"dtes64\\", \\"erms\\", \\"rtm\\", \\"invpcid\\", \\"popcnt\\", \\"pat\\", \\"x2apic\\", \\"pae\\", \\"ssbd\\", \\"arat\\", \\"ss\\", \\"tsc-deadline\\", \\"ds_cpl\\", \\"bmi1\\", \\"pcid\\", \\"pdpe1gb\\", \\"invtsc\\", \\"cx8\\", \\"dca\\", \\"smep\\", \\"mce\\", \\"ht\\", \\"fsgsbase\\", \\"intel-pt\\", \\"fma\\", \\"md-clear\\", \\"pge\\", \\"adx\\", \\"est\\", \\"lm\\", \\"abm\\", \\"lahf_lm\\", \\"acpi\\", \\"sse2\\", \\"tm2\\", \\"pni\\", \\"ds\\", \\"clflush\\", \\"xtpr\\", \\"msr\\", \\"sep\\", \\"pdcm\\", \\"tm\\", \\"nx\\", \\"sse4.1\\", \\"xsaveopt\\", \\"de\\", \\"tsc\\", \\"stibp\\", \\"3dnowprefetch\\", \\"sse4.2\\", \\"avx\\", \\"pbe\\", \\"pse36\\", \\"mmx\\", \\"pclmuldq\\", \\"mtrr\\", \\"movbe\\", \\"sse\\", \\"fpu\\"]}"}, {"id": 2, "hypervisor_hostname": "lf-virtual8", "state": "up", "status": "enabled", "vcpus": 88, "memory_mb": 64312, "local_gb": 100, "vcpus_used": 2, "memory_mb_used": 1536, "local_gb_used": 2, "hypervisor_type": "QEMU", "hypervisor_version": 4000000, "free_ram_mb": 62776, "free_disk_gb": 98, "current_workload": 0, "running_vms": 2, "disk_available_least": 60, "host_ip": "172.30.13.93", "service": {"id": 3, "host": "lf-virtual8", "disabled_reason": null}, "cpu_info": "{\\"arch\\": \\"x86_64\\", \\"model\\": \\"Broadwell-IBRS\\", \\"vendor\\": \\"Intel\\", \\"topology\\": {\\"cells\\": 2, \\"sockets\\": 1, \\"cores\\": 22, \\"threads\\": 2}, \\"features\\": [\\"f16c\\", \\"xsave\\", \\"pclmuldq\\", \\"rdtscp\\", \\"ds_cpl\\", \\"pdcm\\", \\"lm\\", \\"sse\\", \\"erms\\", \\"3dnowprefetch\\", \\"pdpe1gb\\", \\"adx\\", \\"apic\\", \\"ssse3\\", \\"bmi1\\", \\"stibp\\", \\"invpcid\\", \\"mmx\\", \\"avx2\\", \\"intel-pt\\", \\"pse36\\", \\"rdrand\\", \\"vmx\\", \\"pcid\\", \\"cx8\\", \\"est\\", \\"tsc-deadline\\", \\"cx16\\", \\"vme\\", \\"pni\\", \\"acpi\\", \\"pse\\", \\"x2apic\\", \\"dtes64\\", \\"de\\", \\"rtm\\", \\"smep\\", \\"mce\\", \\"ssbd\\", \\"xtpr\\", \\"monitor\\", \\"tsc\\", \\"xsaveopt\\", \\"movbe\\", \\"spec-ctrl\\", \\"osxsave\\", \\"ht\\", \\"tm\\", \\"arat\\", \\"abm\\", \\"smx\\", \\"fxsr\\", \\"pbe\\", \\"clflush\\", \\"ds\\", \\"md-clear\\", \\"ss\\", \\"sse4.1\\", \\"invtsc\\", \\"popcnt\\", \\"sse2\\", \\"sse4.2\\", \\"fpu\\", \\"fsgsbase\\", \\"smap\\", \\"pae\\", \\"aes\\", \\"avx\\", \\"tsc_adjust\\", \\"pge\\", \\"nx\\", \\"rdseed\\", \\"lahf_lm\\", \\"cmov\\", \\"fma\\", \\"msr\\", \\"tm2\\", \\"bmi2\\", \\"mtrr\\", \\"dca\\", \\"mca\\", \\"hle\\", \\"pat\\", \\"sep\\", \\"syscall\\"]}"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.273 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:58:42.275 37 INFO tempest.lib.common.rest_client [req-58c67151-66f6-4d0a-abfc-51de107545f1 ] Request (main): 200 GET http://172.30.13.94/identity/v3/services 0.045s 2020-11-06 17:58:42.275 37 DEBUG tempest.lib.common.rest_client [req-58c67151-66f6-4d0a-abfc-51de107545f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '3880', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-58c67151-66f6-4d0a-abfc-51de107545f1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/services'} Body: b'{"services": [{"name": "heat", "description": "Heat Orchestration Service", "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/2dd99a84fcfe4d4c902af3c7e3370547"}}, {"name": "cinderv3", "description": "Cinder Volume Service V3", "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/4f0aec6b5f2347eeaf7987d5e52c15ee"}}, {"name": "heat-cfn", "description": "Heat CloudFormation Service", "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/5635f75247b445dd8c099f6dae4391e9"}}, {"name": "neutron", "description": "Neutron Service", "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/5b112e1f9f554e9ea13076091373ba24"}}, {"name": "placement", "description": "Placement Service", "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/7e47b727207a4e4e806b20fab1e17997"}}, {"name": "nova_legacy", "description": "Nova Compute Service (Legacy 2.0)", "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/8f2830f7e6d24fe0b8bf0b4df9612609"}}, {"name": "swift", "description": "Swift Service", "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/943b628f9f61458d9ef457915c0a4842"}}, {"name": "keystone", "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/a2db5aab3c1d485cbf6ccd92ea7a2995"}}, {"name": "aodh", "description": "OpenStack Alarming Service", "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/a372e5d5aaed47178d6bd28e25c4ed16"}}, {"name": "glance", "description": "Glance Image Service", "id": "b28a3fc2818546fd87c2e4c7f28b1ee2", "type": "image", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/b28a3fc2818546fd87c2e4c7f28b1ee2"}}, {"name": "cinder", "description": "Cinder Volume Service", "id": "b29b4d43197d4c0b829c6cf8d8b39bf0", "type": "block-storage", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/b29b4d43197d4c0b829c6cf8d8b39bf0"}}, {"name": "cinderv2", "description": "Cinder Volume Service V2", "id": "db8f8625cffe4b818eb0c765296f5282", "type": "volumev2", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/db8f8625cffe4b818eb0c765296f5282"}}, {"name": "gnocchi", "description": "OpenStack Metric Service", "id": "de459e19dc284669a50e9c8274d0ec7f", "type": "metric", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/de459e19dc284669a50e9c8274d0ec7f"}}, {"name": "barbican", "description": "Barbican Service", "id": "ee548e94135646b6a64be1daf30191d1", "type": "key-manager", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/ee548e94135646b6a64be1daf30191d1"}}, {"name": "nova", "description": "Nova Compute Service", "id": "f4181cc470594a9e82e091cd6ff52ad7", "type": "compute", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/f4181cc470594a9e82e091cd6ff52ad7"}}, {"name": "panko", "description": "OpenStack Telemetry Service", "id": "f9b2abba6c934357b57aaf5757557344", "type": "event", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/f9b2abba6c934357b57aaf5757557344"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/services", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.301 40 INFO tempest.lib.common.rest_client [req-2858f261-6adb-4ae2-b1fd-f9f6bf449efa ] Request (NovaAvailabilityZoneRbacTest:test_get_availability_zone_list_rbac): 200 GET http://172.30.13.94/identity/v3/projects/7d6ec83579e04d32a1a39c04c9066c95/users/cf552f4ea0d54d2bb5d6b637cf9bf419/roles 0.043s 2020-11-06 17:58:42.302 40 DEBUG tempest.lib.common.rest_client [req-2858f261-6adb-4ae2-b1fd-f9f6bf449efa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2858f261-6adb-4ae2-b1fd-f9f6bf449efa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7d6ec83579e04d32a1a39c04c9066c95/users/cf552f4ea0d54d2bb5d6b637cf9bf419/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7d6ec83579e04d32a1a39c04c9066c95/users/cf552f4ea0d54d2bb5d6b637cf9bf419/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.309 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.310 38 INFO tempest.lib.common.rest_client [req-dc326255-11ae-4aa0-b785-9064064139a3 ] Request (main): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 17:58:42.310 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.310 38 DEBUG tempest.lib.common.rest_client [req-dc326255-11ae-4aa0-b785-9064064139a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dc326255-11ae-4aa0-b785-9064064139a3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["fPVGDgNnS_yIWcEf87xPmQ"], "expires_at": "2020-11-06T18:58:42.000000Z", "issued_at": "2020-11-06T17:58:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.310 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.310 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.311 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.311 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.312 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.312 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.312 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.313 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.313 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.313 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.314 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.314 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.314 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.314 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.315 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.315 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.315 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.316 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.316 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.316 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.316 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.317 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.317 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.317 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.318 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.318 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.318 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.318 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.319 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.319 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.319 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.320 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.320 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.320 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.320 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.321 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.321 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.321 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.322 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.322 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.322 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.323 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.323 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.323 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.323 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.324 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.324 39 INFO tempest.lib.common.rest_client [req-43277d68-3a79-4451-bcd7-e92bb9a47dd3 ] Request (AgentsRbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/compute/v2.1/os-agents/322 0.113s 2020-11-06 17:58:42.324 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.324 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.324 39 DEBUG tempest.lib.common.rest_client [req-43277d68-3a79-4451-bcd7-e92bb9a47dd3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-43277d68-3a79-4451-bcd7-e92bb9a47dd3', 'x-compute-request-id': 'req-43277d68-3a79-4451-bcd7-e92bb9a47dd3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-agents/322'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.325 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.325 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.325 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.325 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.326 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.326 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.326 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.326 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.327 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.327 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.328 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.328 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.328 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.328 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.329 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.329 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.329 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.330 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.330 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.330 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:58:42.330 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.331 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.331 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.331 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.331 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.331 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.331 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.331 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.332 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.332 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.332 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.332 40 INFO tempest.lib.common.rest_client [req-3a0a51a6-624f-4a99-99d1-3e4828d2db94 ] Request (NovaAvailabilityZoneRbacTest:test_get_availability_zone_list_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.030s 2020-11-06 17:58:42.333 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.333 40 DEBUG tempest.lib.common.rest_client [req-3a0a51a6-624f-4a99-99d1-3e4828d2db94 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6646', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3a0a51a6-624f-4a99-99d1-3e4828d2db94', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "cf552f4ea0d54d2bb5d6b637cf9bf419", "name": "tempest-NovaAvailabilityZoneRbacTest-777302255", "password_expires_at": null}, "audit_ids": ["nKo7NrE6R9WZk9QGubV1lQ"], "expires_at": "2020-11-06T18:58:42.000000Z", "issued_at": "2020-11-06T17:58:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7d6ec83579e04d32a1a39c04c9066c95", "name": "tempest-NovaAvailabilityZoneRbacTest-777302255"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7d6ec83579e04d32a1a39c04c9066c95", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7d6ec83579e04d32a1a39c04c9066c95", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7d6ec83579e04d32a1a39c04c9066c95", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7d6ec83579e04d32a1a39c04c9066c95", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7d6ec83579e04d32a1a39c04c9066c95", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7d6ec83579e04d32a1a39c04c9066c95", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5baf _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.333 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-flavor-access:add_tenant_access, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:58:42.333 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.333 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:42.333 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.334 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.334 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.334 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.335 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.335 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.335 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.335 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.336 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.336 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.336 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.337 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.337 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.337 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.338 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.338 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.338 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.338 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.339 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.339 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.339 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.340 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.340 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.340 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.340 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.340 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.341 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.341 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.341 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.341 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.341 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.342 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.342 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.342 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.342 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.343 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.343 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.343 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.343 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.344 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.344 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.344 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.344 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.345 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.345 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.345 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.345 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.345 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.346 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.346 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.346 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.346 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.347 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.347 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.347 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.348 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.348 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.348 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.348 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.349 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.349 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.349 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.349 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.350 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.350 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.350 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.350 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.350 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.351 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-agents:delete, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:58:42.354 38 INFO tempest.lib.common.rest_client [req-4304151a-2f33-46e1-890d-fdfa2cb5f54b ] Request (main): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 17:58:42.354 38 DEBUG tempest.lib.common.rest_client [req-4304151a-2f33-46e1-890d-fdfa2cb5f54b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4304151a-2f33-46e1-890d-fdfa2cb5f54b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["o2oVBqEaQi-r7R1KP3Emqg"], "expires_at": "2020-11-06T18:58:42.000000Z", "issued_at": "2020-11-06T17:58:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.376 39 INFO tempest.lib.common.rest_client [req-69614a35-480c-44cc-9212-a6cc2bd12bf1 ] Request (AgentsRbacTest:test_delete_agent): 200 POST http://172.30.13.94/compute/v2.1/os-agents 0.024s 2020-11-06 17:58:42.377 39 DEBUG tempest.lib.common.rest_client [req-69614a35-480c-44cc-9212-a6cc2bd12bf1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"agent": {"hypervisor": "common", "os": "linux", "architecture": "tempest-x86_64-789370862", "version": "7.0", "url": "xxx://xxxx/xxx/xxx", "md5hash": "add6bb58e139be103324d04d82d8f545"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '205', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-69614a35-480c-44cc-9212-a6cc2bd12bf1', 'x-compute-request-id': 'req-69614a35-480c-44cc-9212-a6cc2bd12bf1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-agents'} Body: b'{"agent": {"hypervisor": "common", "os": "linux", "architecture": "tempest-x86_64-789370862", "version": "7.0", "url": "xxx://xxxx/xxx/xxx", "md5hash": "add6bb58e139be103324d04d82d8f545", "agent_id": 323}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.381 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:42.394 37 INFO tempest.lib.common.rest_client [req-8e60fed7-a61a-40df-b6c8-9983a55173d2 ] Request (FlavorAccessRbacTest:test_add_flavor_access): 200 GET http://172.30.13.94/identity/v3/projects/52c3dff7ef9f46f98e2c0e166df4f162/users/db7cf899ed5a40c5882522729a156930/roles 0.060s 2020-11-06 17:58:42.395 37 DEBUG tempest.lib.common.rest_client [req-8e60fed7-a61a-40df-b6c8-9983a55173d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8e60fed7-a61a-40df-b6c8-9983a55173d2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/52c3dff7ef9f46f98e2c0e166df4f162/users/db7cf899ed5a40c5882522729a156930/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/52c3dff7ef9f46f98e2c0e166df4f162/users/db7cf899ed5a40c5882522729a156930/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.401 38 INFO tempest.lib.common.rest_client [req-6e3049e6-8271-4008-b92f-e2bc51ed1b49 ] Request (main): 200 GET http://172.30.13.94/identity/v3/services 0.046s 2020-11-06 17:58:42.402 38 DEBUG tempest.lib.common.rest_client [req-6e3049e6-8271-4008-b92f-e2bc51ed1b49 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '3880', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6e3049e6-8271-4008-b92f-e2bc51ed1b49', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/services'} Body: b'{"services": [{"name": "heat", "description": "Heat Orchestration Service", "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/2dd99a84fcfe4d4c902af3c7e3370547"}}, {"name": "cinderv3", "description": "Cinder Volume Service V3", "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/4f0aec6b5f2347eeaf7987d5e52c15ee"}}, {"name": "heat-cfn", "description": "Heat CloudFormation Service", "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/5635f75247b445dd8c099f6dae4391e9"}}, {"name": "neutron", "description": "Neutron Service", "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/5b112e1f9f554e9ea13076091373ba24"}}, {"name": "placement", "description": "Placement Service", "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/7e47b727207a4e4e806b20fab1e17997"}}, {"name": "nova_legacy", "description": "Nova Compute Service (Legacy 2.0)", "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/8f2830f7e6d24fe0b8bf0b4df9612609"}}, {"name": "swift", "description": "Swift Service", "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/943b628f9f61458d9ef457915c0a4842"}}, {"name": "keystone", "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/a2db5aab3c1d485cbf6ccd92ea7a2995"}}, {"name": "aodh", "description": "OpenStack Alarming Service", "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/a372e5d5aaed47178d6bd28e25c4ed16"}}, {"name": "glance", "description": "Glance Image Service", "id": "b28a3fc2818546fd87c2e4c7f28b1ee2", "type": "image", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/b28a3fc2818546fd87c2e4c7f28b1ee2"}}, {"name": "cinder", "description": "Cinder Volume Service", "id": "b29b4d43197d4c0b829c6cf8d8b39bf0", "type": "block-storage", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/b29b4d43197d4c0b829c6cf8d8b39bf0"}}, {"name": "cinderv2", "description": "Cinder Volume Service V2", "id": "db8f8625cffe4b818eb0c765296f5282", "type": "volumev2", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/db8f8625cffe4b818eb0c765296f5282"}}, {"name": "gnocchi", "description": "OpenStack Metric Service", "id": "de459e19dc284669a50e9c8274d0ec7f", "type": "metric", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/de459e19dc284669a50e9c8274d0ec7f"}}, {"name": "barbican", "description": "Barbican Service", "id": "ee548e94135646b6a64be1daf30191d1", "type": "key-manager", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/ee548e94135646b6a64be1daf30191d1"}}, {"name": "nova", "description": "Nova Compute Service", "id": "f4181cc470594a9e82e091cd6ff52ad7", "type": "compute", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/f4181cc470594a9e82e091cd6ff52ad7"}}, {"name": "panko", "description": "OpenStack Telemetry Service", "id": "f9b2abba6c934357b57aaf5757557344", "type": "event", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/f9b2abba6c934357b57aaf5757557344"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/services", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.427 37 INFO tempest.lib.common.rest_client [req-fc74f7cf-a494-4528-aada-5a8083ea5bb4 ] Request (FlavorAccessRbacTest:test_add_flavor_access): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 17:58:42.428 37 DEBUG tempest.lib.common.rest_client [req-fc74f7cf-a494-4528-aada-5a8083ea5bb4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fc74f7cf-a494-4528-aada-5a8083ea5bb4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "db7cf899ed5a40c5882522729a156930", "name": "tempest-FlavorAccessRbacTest-1193074130", "password_expires_at": null}, "audit_ids": ["_eM04QJpQR62U-9lRRgt1A"], "expires_at": "2020-11-06T18:58:42.000000Z", "issued_at": "2020-11-06T17:58:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "52c3dff7ef9f46f98e2c0e166df4f162", "name": "tempest-FlavorAccessRbacTest-1193074130"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.437 39 INFO tempest.lib.common.rest_client [req-572d8a19-51e4-4d18-bc70-95fd8416d9a1 ] Request (AgentsRbacTest:test_delete_agent): 200 GET http://172.30.13.94/identity/v3/projects/fa6a56ef86e74e97944c04fdfab296ed/users/15a705d7e4894f189f405daf2f934cfc/roles 0.054s 2020-11-06 17:58:42.437 40 INFO tempest.lib.common.rest_client [req-1c607057-d43b-4c3e-b2e2-515d04116761 ] Request (NovaAvailabilityZoneRbacTest:test_get_availability_zone_list_rbac): 200 GET http://172.30.13.94/compute/v2.1/os-availability-zone 0.104s 2020-11-06 17:58:42.437 39 DEBUG tempest.lib.common.rest_client [req-572d8a19-51e4-4d18-bc70-95fd8416d9a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-572d8a19-51e4-4d18-bc70-95fd8416d9a1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fa6a56ef86e74e97944c04fdfab296ed/users/15a705d7e4894f189f405daf2f934cfc/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fa6a56ef86e74e97944c04fdfab296ed/users/15a705d7e4894f189f405daf2f934cfc/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.437 40 DEBUG tempest.lib.common.rest_client [req-1c607057-d43b-4c3e-b2e2-515d04116761 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '97', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1c607057-d43b-4c3e-b2e2-515d04116761', 'x-compute-request-id': 'req-1c607057-d43b-4c3e-b2e2-515d04116761', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-availability-zone'} Body: b'{"availabilityZoneInfo": [{"zoneName": "nova", "zoneState": {"available": true}, "hosts": null}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.438 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.439 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.439 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.439 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.440 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.440 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:42.440 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.441 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.441 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.441 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.441 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.442 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.442 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.442 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.443 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.443 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.443 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.444 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.444 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.444 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.445 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.445 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.445 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.445 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.446 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.446 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.446 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.447 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.447 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.447 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.447 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.448 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.448 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.448 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.448 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.449 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.449 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.449 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.450 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.450 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.450 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.451 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.451 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.451 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.451 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.452 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.452 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.452 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.453 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.453 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.453 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.454 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.454 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.454 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.454 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.455 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.455 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.455 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.456 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.456 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.456 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.457 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.457 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.457 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.458 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.458 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.458 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.458 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.459 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.459 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.459 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.460 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.460 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.460 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.461 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.461 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.462 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-aggregates:add_host, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:58:42.476 39 INFO tempest.lib.common.rest_client [req-5ef34a25-1fb5-4853-8521-3d0e6225c83c ] Request (AgentsRbacTest:test_delete_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 17:58:42.476 39 DEBUG tempest.lib.common.rest_client [req-5ef34a25-1fb5-4853-8521-3d0e6225c83c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5ef34a25-1fb5-4853-8521-3d0e6225c83c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "15a705d7e4894f189f405daf2f934cfc", "name": "tempest-AgentsRbacTest-1121454842", "password_expires_at": null}, "audit_ids": ["EiupxVCgQBOgApDb6CgONQ"], "expires_at": "2020-11-06T18:58:42.000000Z", "issued_at": "2020-11-06T17:58:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fa6a56ef86e74e97944c04fdfab296ed", "name": "tempest-AgentsRbacTest-1121454842"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.490 40 INFO tempest.lib.common.rest_client [req-1be090c4-7891-470d-8130-ffd327bd030f ] Request (NovaAvailabilityZoneRbacTest:test_get_availability_zone_list_rbac): 200 GET http://172.30.13.94/identity/v3/projects/7d6ec83579e04d32a1a39c04c9066c95/users/cf552f4ea0d54d2bb5d6b637cf9bf419/roles 0.049s 2020-11-06 17:58:42.490 40 DEBUG tempest.lib.common.rest_client [req-1be090c4-7891-470d-8130-ffd327bd030f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1be090c4-7891-470d-8130-ffd327bd030f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7d6ec83579e04d32a1a39c04c9066c95/users/cf552f4ea0d54d2bb5d6b637cf9bf419/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7d6ec83579e04d32a1a39c04c9066c95/users/cf552f4ea0d54d2bb5d6b637cf9bf419/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.499 38 INFO tempest.lib.common.rest_client [req-83f79810-1519-4a40-abd3-112d5736a8f0 ] Request (AggregatesRbacTest:test_add_host_to_aggregate_rbac): 200 POST http://172.30.13.94/compute/v2.1/os-aggregates 0.037s 2020-11-06 17:58:42.500 38 DEBUG tempest.lib.common.rest_client [req-83f79810-1519-4a40-abd3-112d5736a8f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"aggregate": {"name": "tempest-AggregatesRbacTest-aggregate-1677845574"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '215', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-83f79810-1519-4a40-abd3-112d5736a8f0', 'x-compute-request-id': 'req-83f79810-1519-4a40-abd3-112d5736a8f0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates'} Body: b'{"aggregate": {"id": 1048, "name": "tempest-AggregatesRbacTest-aggregate-1677845574", "created_at": "2020-11-06T17:58:42.487515", "updated_at": null, "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.503 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:42.527 40 INFO tempest.lib.common.rest_client [req-b84ddf28-18b5-49e4-9fa0-141d44f12b8e ] Request (NovaAvailabilityZoneRbacTest:test_get_availability_zone_list_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 17:58:42.528 40 DEBUG tempest.lib.common.rest_client [req-b84ddf28-18b5-49e4-9fa0-141d44f12b8e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6646', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b84ddf28-18b5-49e4-9fa0-141d44f12b8e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "cf552f4ea0d54d2bb5d6b637cf9bf419", "name": "tempest-NovaAvailabilityZoneRbacTest-777302255", "password_expires_at": null}, "audit_ids": ["zNNJ1DDfRlCoSl5Q5hjDJQ"], "expires_at": "2020-11-06T18:58:42.000000Z", "issued_at": "2020-11-06T17:58:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7d6ec83579e04d32a1a39c04c9066c95", "name": "tempest-NovaAvailabilityZoneRbacTest-777302255"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7d6ec83579e04d32a1a39c04c9066c95", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7d6ec83579e04d32a1a39c04c9066c95", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7d6ec83579e04d32a1a39c04c9066c95", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7d6ec83579e04d32a1a39c04c9066c95", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7d6ec83579e04d32a1a39c04c9066c95", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7d6ec83579e04d32a1a39c04c9066c95", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5baf _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.559 38 INFO tempest.lib.common.rest_client [req-ec547b3e-387d-4dca-910e-8aea10662897 ] Request (AggregatesRbacTest:test_add_host_to_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles 0.055s 2020-11-06 17:58:42.559 38 DEBUG tempest.lib.common.rest_client [req-ec547b3e-387d-4dca-910e-8aea10662897 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ec547b3e-387d-4dca-910e-8aea10662897', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.572 39 INFO tempest.lib.common.rest_client [req-24123f85-e312-49c9-9c9f-c16636831bc5 ] Request (AgentsRbacTest:test_delete_agent): 200 DELETE http://172.30.13.94/compute/v2.1/os-agents/323 0.093s 2020-11-06 17:58:42.572 39 DEBUG tempest.lib.common.rest_client [req-24123f85-e312-49c9-9c9f-c16636831bc5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-24123f85-e312-49c9-9c9f-c16636831bc5', 'x-compute-request-id': 'req-24123f85-e312-49c9-9c9f-c16636831bc5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-agents/323'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.572 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:42.596 38 INFO tempest.lib.common.rest_client [req-58858101-c5e4-48a0-ad31-7ca142e8359b ] Request (AggregatesRbacTest:test_add_host_to_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 17:58:42.597 38 DEBUG tempest.lib.common.rest_client [req-58858101-c5e4-48a0-ad31-7ca142e8359b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-58858101-c5e4-48a0-ad31-7ca142e8359b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b9193b9c5b774f4598d6d6d5a73287c7", "name": "tempest-AggregatesRbacTest-591314769", "password_expires_at": null}, "audit_ids": ["hbMDRZ1KTkuO_mmOWIWkow"], "expires_at": "2020-11-06T18:58:42.000000Z", "issued_at": "2020-11-06T17:58:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "da822d4027d545cc9eb5f098de258d1d", "name": "tempest-AggregatesRbacTest-591314769"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.625 39 INFO tempest.lib.common.rest_client [req-5cdd6c22-c6d2-4cc7-b56c-d63b58397df9 ] Request (AgentsRbacTest:test_delete_agent): 200 GET http://172.30.13.94/identity/v3/projects/fa6a56ef86e74e97944c04fdfab296ed/users/15a705d7e4894f189f405daf2f934cfc/roles 0.052s 2020-11-06 17:58:42.626 39 DEBUG tempest.lib.common.rest_client [req-5cdd6c22-c6d2-4cc7-b56c-d63b58397df9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5cdd6c22-c6d2-4cc7-b56c-d63b58397df9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fa6a56ef86e74e97944c04fdfab296ed/users/15a705d7e4894f189f405daf2f934cfc/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fa6a56ef86e74e97944c04fdfab296ed/users/15a705d7e4894f189f405daf2f934cfc/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.631 37 INFO tempest.lib.common.rest_client [req-a9f53575-aba9-43aa-aa63-dea56f2d9fc3 ] Request (FlavorAccessRbacTest:test_add_flavor_access): 200 POST http://172.30.13.94/compute/v2.1/flavors/b989d49c-4410-4776-970e-08a53996c20a/action 0.201s 2020-11-06 17:58:42.632 37 DEBUG tempest.lib.common.rest_client [req-a9f53575-aba9-43aa-aa63-dea56f2d9fc3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"addTenantAccess": {"tenant": "52c3dff7ef9f46f98e2c0e166df4f162"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '123', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a9f53575-aba9-43aa-aa63-dea56f2d9fc3', 'x-compute-request-id': 'req-a9f53575-aba9-43aa-aa63-dea56f2d9fc3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/b989d49c-4410-4776-970e-08a53996c20a/action'} Body: b'{"flavor_access": [{"flavor_id": "b989d49c-4410-4776-970e-08a53996c20a", "tenant_id": "52c3dff7ef9f46f98e2c0e166df4f162"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.635 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:42.660 39 INFO tempest.lib.common.rest_client [req-7cb01d48-fc28-4e6f-b620-605f6245b529 ] Request (AgentsRbacTest:test_delete_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 17:58:42.661 39 DEBUG tempest.lib.common.rest_client [req-7cb01d48-fc28-4e6f-b620-605f6245b529 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7cb01d48-fc28-4e6f-b620-605f6245b529', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "15a705d7e4894f189f405daf2f934cfc", "name": "tempest-AgentsRbacTest-1121454842", "password_expires_at": null}, "audit_ids": ["W0Xv7ga4TcWf-M2Yw2Jy4w"], "expires_at": "2020-11-06T18:58:42.000000Z", "issued_at": "2020-11-06T17:58:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fa6a56ef86e74e97944c04fdfab296ed", "name": "tempest-AgentsRbacTest-1121454842"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.671 40 INFO tempest.lib.common.rest_client [req-32cb3fca-a0c3-40f1-87c0-e14b80d33116 ] Request (NovaAvailabilityZoneRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/cf552f4ea0d54d2bb5d6b637cf9bf419 0.138s 2020-11-06 17:58:42.671 40 DEBUG tempest.lib.common.rest_client [req-32cb3fca-a0c3-40f1-87c0-e14b80d33116 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-32cb3fca-a0c3-40f1-87c0-e14b80d33116', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/cf552f4ea0d54d2bb5d6b637cf9bf419'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.677 37 INFO tempest.lib.common.rest_client [req-c45834a5-a20b-4c22-8f6a-3e2de4735370 ] Request (FlavorAccessRbacTest:test_add_flavor_access): 200 GET http://172.30.13.94/identity/v3/projects/52c3dff7ef9f46f98e2c0e166df4f162/users/db7cf899ed5a40c5882522729a156930/roles 0.041s 2020-11-06 17:58:42.678 37 DEBUG tempest.lib.common.rest_client [req-c45834a5-a20b-4c22-8f6a-3e2de4735370 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c45834a5-a20b-4c22-8f6a-3e2de4735370', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/52c3dff7ef9f46f98e2c0e166df4f162/users/db7cf899ed5a40c5882522729a156930/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/52c3dff7ef9f46f98e2c0e166df4f162/users/db7cf899ed5a40c5882522729a156930/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.753 40 INFO tempest.lib.common.rest_client [req-c1d28e79-8d4e-44bb-97af-56a706a0d47c ] Request (NovaAvailabilityZoneRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-11-06 17:58:42.753 40 DEBUG tempest.lib.common.rest_client [req-c1d28e79-8d4e-44bb-97af-56a706a0d47c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c1d28e79-8d4e-44bb-97af-56a706a0d47c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["iUp31IZLQzGmtqSNUCg1xQ"], "expires_at": "2020-11-06T18:58:42.000000Z", "issued_at": "2020-11-06T17:58:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.773 37 INFO tempest.lib.common.rest_client [req-67cde47c-b7b3-4507-9b97-d2c6c6b27581 ] Request (FlavorAccessRbacTest:test_add_flavor_access): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-11-06 17:58:42.774 37 DEBUG tempest.lib.common.rest_client [req-67cde47c-b7b3-4507-9b97-d2c6c6b27581 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-67cde47c-b7b3-4507-9b97-d2c6c6b27581', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "db7cf899ed5a40c5882522729a156930", "name": "tempest-FlavorAccessRbacTest-1193074130", "password_expires_at": null}, "audit_ids": ["lYDWiHAaTxiwgn9l0g3K3w"], "expires_at": "2020-11-06T18:58:42.000000Z", "issued_at": "2020-11-06T17:58:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "52c3dff7ef9f46f98e2c0e166df4f162", "name": "tempest-FlavorAccessRbacTest-1193074130"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.884 39 INFO tempest.lib.common.rest_client [req-20baa282-7a88-497c-bdd3-24d27f244f03 ] Request (AgentsRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/compute/v2.1/os-agents/323 0.221s 2020-11-06 17:58:42.884 39 DEBUG tempest.lib.common.rest_client [req-20baa282-7a88-497c-bdd3-24d27f244f03 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '84', 'x-openstack-request-id': 'req-20baa282-7a88-497c-bdd3-24d27f244f03', 'x-compute-request-id': 'req-20baa282-7a88-497c-bdd3-24d27f244f03', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/os-agents/323'} Body: b'{"itemNotFound": {"code": 404, "message": "No agent-build associated with id 323."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.888 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:58:42.889 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.889 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.890 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.890 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.891 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.891 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.892 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.892 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.892 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.893 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.893 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.893 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.894 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.894 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.894 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.895 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.895 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.895 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.896 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.896 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.897 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.897 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.897 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.897 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.898 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.898 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.898 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.899 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.899 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.899 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.899 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.900 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.900 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.900 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.901 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.901 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.901 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.901 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.902 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.902 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.902 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.903 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.903 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.903 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.904 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.904 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.904 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.904 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.905 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.905 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.905 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.906 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.906 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.906 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.906 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.907 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.907 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.907 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.908 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.908 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.908 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.909 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.909 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.909 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.910 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.910 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.910 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.910 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.911 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.911 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.911 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.912 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.912 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.912 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.912 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.914 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-agents:list, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:58:42.914 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:42.947 37 INFO tempest.lib.common.rest_client [req-c8ab0170-caea-4d9b-a00b-2847ba5008b1 ] Request (FlavorAccessRbacTest:_run_cleanups): 200 POST http://172.30.13.94/compute/v2.1/flavors/b989d49c-4410-4776-970e-08a53996c20a/action 0.171s 2020-11-06 17:58:42.947 37 DEBUG tempest.lib.common.rest_client [req-c8ab0170-caea-4d9b-a00b-2847ba5008b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"removeTenantAccess": {"tenant": "52c3dff7ef9f46f98e2c0e166df4f162"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '21', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c8ab0170-caea-4d9b-a00b-2847ba5008b1', 'x-compute-request-id': 'req-c8ab0170-caea-4d9b-a00b-2847ba5008b1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/b989d49c-4410-4776-970e-08a53996c20a/action'} Body: b'{"flavor_access": []}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.956 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:58:42.957 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.957 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.958 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.959 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.959 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.960 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.961 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.961 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.961 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.962 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.962 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.962 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.963 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.963 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.963 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.963 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.964 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.964 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.964 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.965 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.965 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.965 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.966 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.966 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.966 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.966 39 INFO tempest.lib.common.rest_client [req-68aafb06-5f05-405f-aa39-9c35c3c99cf1 ] Request (AgentsRbacTest:test_list_agents_rbac): 200 GET http://172.30.13.94/identity/v3/projects/fa6a56ef86e74e97944c04fdfab296ed/users/15a705d7e4894f189f405daf2f934cfc/roles 0.051s 2020-11-06 17:58:42.966 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.966 39 DEBUG tempest.lib.common.rest_client [req-68aafb06-5f05-405f-aa39-9c35c3c99cf1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-68aafb06-5f05-405f-aa39-9c35c3c99cf1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fa6a56ef86e74e97944c04fdfab296ed/users/15a705d7e4894f189f405daf2f934cfc/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fa6a56ef86e74e97944c04fdfab296ed/users/15a705d7e4894f189f405daf2f934cfc/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:42.967 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.967 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.967 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.967 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.968 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.968 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.968 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.969 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.969 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.969 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.969 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.970 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.970 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.970 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.970 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.971 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.971 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.971 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.972 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.972 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.972 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.973 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.973 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.973 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.974 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.974 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.974 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.974 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.975 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.975 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.975 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.975 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.976 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.976 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.977 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.977 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.977 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.977 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.978 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.978 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.978 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.979 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.979 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.979 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.979 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.980 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.980 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.980 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.981 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:42.982 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-flavor-access, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:58:43.012 38 INFO tempest.lib.common.rest_client [req-85fb884a-a774-420c-a593-4ca2b6131fed ] Request (AggregatesRbacTest:test_add_host_to_aggregate_rbac): 200 POST http://172.30.13.94/compute/v2.1/os-aggregates/1048/action 0.414s 2020-11-06 17:58:43.013 38 DEBUG tempest.lib.common.rest_client [req-85fb884a-a774-420c-a593-4ca2b6131fed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"add_host": {"host": "lf-virtual9"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '257', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-85fb884a-a774-420c-a593-4ca2b6131fed', 'x-compute-request-id': 'req-85fb884a-a774-420c-a593-4ca2b6131fed', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/1048/action'} Body: b'{"aggregate": {"id": 1048, "name": "tempest-AggregatesRbacTest-aggregate-1677845574", "hosts": ["lf-virtual9"], "metadata": {}, "created_at": "2020-11-06T17:58:42.000000", "updated_at": null, "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:43.018 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:43.060 39 INFO tempest.lib.common.rest_client [req-8ecc43e8-0ca5-4ad6-a13a-7b801e542a9b ] Request (AgentsRbacTest:test_list_agents_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-11-06 17:58:43.061 39 DEBUG tempest.lib.common.rest_client [req-8ecc43e8-0ca5-4ad6-a13a-7b801e542a9b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8ecc43e8-0ca5-4ad6-a13a-7b801e542a9b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "15a705d7e4894f189f405daf2f934cfc", "name": "tempest-AgentsRbacTest-1121454842", "password_expires_at": null}, "audit_ids": ["itixfZWeRlK39J6p7uZPSw"], "expires_at": "2020-11-06T18:58:42.000000Z", "issued_at": "2020-11-06T17:58:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fa6a56ef86e74e97944c04fdfab296ed", "name": "tempest-AgentsRbacTest-1121454842"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:43.073 40 INFO tempest.lib.common.rest_client [req-4a93e62f-edfd-4f94-be06-4d576df670ce ] Request (NovaAvailabilityZoneRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=7d6ec83579e04d32a1a39c04c9066c95&name=default 0.318s 2020-11-06 17:58:43.073 40 DEBUG tempest.lib.common.rest_client [req-4a93e62f-edfd-4f94-be06-4d576df670ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-4a93e62f-edfd-4f94-be06-4d576df670ce', 'date': 'Fri, 06 Nov 2020 17:58:43 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=7d6ec83579e04d32a1a39c04c9066c95&name=default'} Body: b'{"security_groups": [{"id": "daafab4d-4fd6-46dc-9792-cb0351fd0fc9", "name": "default", "stateful": true, "tenant_id": "7d6ec83579e04d32a1a39c04c9066c95", "description": "Default security group", "security_group_rules": [{"id": "24389abf-ef6e-46fd-b3cb-772609ce9308", "tenant_id": "7d6ec83579e04d32a1a39c04c9066c95", "security_group_id": "daafab4d-4fd6-46dc-9792-cb0351fd0fc9", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:58:42Z", "updated_at": "2020-11-06T17:58:42Z", "revision_number": 0, "project_id": "7d6ec83579e04d32a1a39c04c9066c95"}, {"id": "5d5338e0-0ced-4645-b98d-15a89591a40d", "tenant_id": "7d6ec83579e04d32a1a39c04c9066c95", "security_group_id": "daafab4d-4fd6-46dc-9792-cb0351fd0fc9", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "daafab4d-4fd6-46dc-9792-cb0351fd0fc9", "description": null, "tags": [], "created_at": "2020-11-06T17:58:42Z", "updated_at": "2020-11-06T17:58:42Z", "revision_number": 0, "project_id": "7d6ec83579e04d32a1a39c04c9066c95"}, {"id": "83508a43-96bf-4065-8c31-71b456fd1ba7", "tenant_id": "7d6ec83579e04d32a1a39c04c9066c95", "security_group_id": "daafab4d-4fd6-46dc-9792-cb0351fd0fc9", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:58:42Z", "updated_at": "2020-11-06T17:58:42Z", "revision_number": 0, "project_id": "7d6ec83579e04d32a1a39c04c9066c95"}, {"id": "d3cb9cb9-9c2e-4adc-90a9-5c5dc2532f40", "tenant_id": "7d6ec83579e04d32a1a39c04c9066c95", "security_group_id": "daafab4d-4fd6-46dc-9792-cb0351fd0fc9", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "daafab4d-4fd6-46dc-9792-cb0351fd0fc9", "description": null, "tags": [], "created_at": "2020-11-06T17:58:42Z", "updated_at": "2020-11-06T17:58:42Z", "revision_number": 0, "project_id": "7d6ec83579e04d32a1a39c04c9066c95"}], "tags": [], "created_at": "2020-11-06T17:58:42Z", "updated_at": "2020-11-06T17:58:42Z", "revision_number": 1, "project_id": "7d6ec83579e04d32a1a39c04c9066c95"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:43.122 38 INFO tempest.lib.common.rest_client [req-cfdc8c5b-9b3b-45c9-baa7-b197cbb83a59 ] Request (AggregatesRbacTest:test_add_host_to_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles 0.102s 2020-11-06 17:58:43.122 38 DEBUG tempest.lib.common.rest_client [req-cfdc8c5b-9b3b-45c9-baa7-b197cbb83a59 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cfdc8c5b-9b3b-45c9-baa7-b197cbb83a59', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:43.153 37 INFO tempest.lib.common.rest_client [req-663bb002-8c01-4319-b6f7-2ab400b335bd ] Request (FlavorAccessRbacTest:test_list_flavor_access): 200 POST http://172.30.13.94/compute/v2.1/flavors/b989d49c-4410-4776-970e-08a53996c20a/action 0.171s 2020-11-06 17:58:43.154 37 DEBUG tempest.lib.common.rest_client [req-663bb002-8c01-4319-b6f7-2ab400b335bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"addTenantAccess": {"tenant": "52c3dff7ef9f46f98e2c0e166df4f162"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '123', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-663bb002-8c01-4319-b6f7-2ab400b335bd', 'x-compute-request-id': 'req-663bb002-8c01-4319-b6f7-2ab400b335bd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/b989d49c-4410-4776-970e-08a53996c20a/action'} Body: b'{"flavor_access": [{"flavor_id": "b989d49c-4410-4776-970e-08a53996c20a", "tenant_id": "52c3dff7ef9f46f98e2c0e166df4f162"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:43.156 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:43.203 38 INFO tempest.lib.common.rest_client [req-9a109274-0614-4e66-b4e3-04cb77f91a67 ] Request (AggregatesRbacTest:test_add_host_to_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.079s 2020-11-06 17:58:43.204 38 DEBUG tempest.lib.common.rest_client [req-9a109274-0614-4e66-b4e3-04cb77f91a67 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9a109274-0614-4e66-b4e3-04cb77f91a67', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b9193b9c5b774f4598d6d6d5a73287c7", "name": "tempest-AggregatesRbacTest-591314769", "password_expires_at": null}, "audit_ids": ["4ZeboqFbQnuBwWB8U72mzg"], "expires_at": "2020-11-06T18:58:43.000000Z", "issued_at": "2020-11-06T17:58:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "da822d4027d545cc9eb5f098de258d1d", "name": "tempest-AggregatesRbacTest-591314769"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:43.219 40 INFO tempest.lib.common.rest_client [req-c72ced10-12d9-4183-a376-70fb2ac662be ] Request (NovaAvailabilityZoneRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/daafab4d-4fd6-46dc-9792-cb0351fd0fc9 0.144s 2020-11-06 17:58:43.220 40 DEBUG tempest.lib.common.rest_client [req-c72ced10-12d9-4183-a376-70fb2ac662be ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-c72ced10-12d9-4183-a376-70fb2ac662be', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 17:58:43 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/daafab4d-4fd6-46dc-9792-cb0351fd0fc9'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:43.266 37 INFO tempest.lib.common.rest_client [req-19dbe94a-8242-4bb4-b17f-383e68237ea8 ] Request (FlavorAccessRbacTest:test_list_flavor_access): 200 GET http://172.30.13.94/identity/v3/projects/52c3dff7ef9f46f98e2c0e166df4f162/users/db7cf899ed5a40c5882522729a156930/roles 0.109s 2020-11-06 17:58:43.266 37 DEBUG tempest.lib.common.rest_client [req-19dbe94a-8242-4bb4-b17f-383e68237ea8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-19dbe94a-8242-4bb4-b17f-383e68237ea8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/52c3dff7ef9f46f98e2c0e166df4f162/users/db7cf899ed5a40c5882522729a156930/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/52c3dff7ef9f46f98e2c0e166df4f162/users/db7cf899ed5a40c5882522729a156930/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:43.321 39 INFO tempest.lib.common.rest_client [req-c0e60f97-3888-4842-89eb-08694d1e4efc ] Request (AgentsRbacTest:test_list_agents_rbac): 200 GET http://172.30.13.94/compute/v2.1/os-agents 0.258s 2020-11-06 17:58:43.321 39 DEBUG tempest.lib.common.rest_client [req-c0e60f97-3888-4842-89eb-08694d1e4efc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '14', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c0e60f97-3888-4842-89eb-08694d1e4efc', 'x-compute-request-id': 'req-c0e60f97-3888-4842-89eb-08694d1e4efc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-agents'} Body: b'{"agents": []}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:43.326 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:43.327 40 INFO tempest.lib.common.rest_client [req-32232a62-ba68-4b8d-a85b-0a0cb060af2f ] Request (NovaAvailabilityZoneRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/7d6ec83579e04d32a1a39c04c9066c95 0.106s 2020-11-06 17:58:43.328 40 DEBUG tempest.lib.common.rest_client [req-32232a62-ba68-4b8d-a85b-0a0cb060af2f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-32232a62-ba68-4b8d-a85b-0a0cb060af2f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/7d6ec83579e04d32a1a39c04c9066c95'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:43.355 37 INFO tempest.lib.common.rest_client [req-7df4bafb-8390-42db-b835-fc4216d9af9d ] Request (FlavorAccessRbacTest:test_list_flavor_access): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-11-06 17:58:43.356 37 DEBUG tempest.lib.common.rest_client [req-7df4bafb-8390-42db-b835-fc4216d9af9d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7df4bafb-8390-42db-b835-fc4216d9af9d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "db7cf899ed5a40c5882522729a156930", "name": "tempest-FlavorAccessRbacTest-1193074130", "password_expires_at": null}, "audit_ids": ["-isdvsSYTDOc5Idi1a4Cfw"], "expires_at": "2020-11-06T18:58:43.000000Z", "issued_at": "2020-11-06T17:58:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "52c3dff7ef9f46f98e2c0e166df4f162", "name": "tempest-FlavorAccessRbacTest-1193074130"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:43.422 40 INFO tempest.lib.common.rest_client [req-5f7548cc-0b13-46e3-8f7d-826b20a77bde ] Request (FloatingIpPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-11-06 17:58:43.423 40 DEBUG tempest.lib.common.rest_client [req-5f7548cc-0b13-46e3-8f7d-826b20a77bde ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5f7548cc-0b13-46e3-8f7d-826b20a77bde', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["noXt0BoSRfygFE94f7xh9g"], "expires_at": "2020-11-06T18:58:43.000000Z", "issued_at": "2020-11-06T17:58:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:43.439 39 INFO tempest.lib.common.rest_client [req-8b2cf3fd-188e-49cc-9a6b-5b6671d6a6fa ] Request (AgentsRbacTest:test_list_agents_rbac): 200 GET http://172.30.13.94/identity/v3/projects/fa6a56ef86e74e97944c04fdfab296ed/users/15a705d7e4894f189f405daf2f934cfc/roles 0.111s 2020-11-06 17:58:43.440 39 DEBUG tempest.lib.common.rest_client [req-8b2cf3fd-188e-49cc-9a6b-5b6671d6a6fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8b2cf3fd-188e-49cc-9a6b-5b6671d6a6fa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fa6a56ef86e74e97944c04fdfab296ed/users/15a705d7e4894f189f405daf2f934cfc/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fa6a56ef86e74e97944c04fdfab296ed/users/15a705d7e4894f189f405daf2f934cfc/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:43.460 40 INFO tempest.lib.common.rest_client [req-ff2999f9-df11-412f-b890-11922847cd62 ] Request (FloatingIpPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 17:58:43.461 40 DEBUG tempest.lib.common.rest_client [req-ff2999f9-df11-412f-b890-11922847cd62 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ff2999f9-df11-412f-b890-11922847cd62', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["u4DzJZ5mRMCDamWdkvv8Xw"], "expires_at": "2020-11-06T18:58:43.000000Z", "issued_at": "2020-11-06T17:58:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:43.509 40 INFO tempest.lib.common.rest_client [req-8bbae45c-3e4f-45e1-b439-0e59ea9cc21d ] Request (FloatingIpPoolsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.047s 2020-11-06 17:58:43.509 40 DEBUG tempest.lib.common.rest_client [req-8bbae45c-3e4f-45e1-b439-0e59ea9cc21d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8bbae45c-3e4f-45e1-b439-0e59ea9cc21d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:43.521 39 INFO tempest.lib.common.rest_client [req-c823c29e-f3b1-40d5-b184-f79dc553e61b ] Request (AgentsRbacTest:test_list_agents_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-11-06 17:58:43.522 39 DEBUG tempest.lib.common.rest_client [req-c823c29e-f3b1-40d5-b184-f79dc553e61b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c823c29e-f3b1-40d5-b184-f79dc553e61b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "15a705d7e4894f189f405daf2f934cfc", "name": "tempest-AgentsRbacTest-1121454842", "password_expires_at": null}, "audit_ids": ["EnF21bcZSbqoLEqm8GnNQw"], "expires_at": "2020-11-06T18:58:43.000000Z", "issued_at": "2020-11-06T17:58:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fa6a56ef86e74e97944c04fdfab296ed", "name": "tempest-AgentsRbacTest-1121454842"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:43.522 37 INFO tempest.lib.common.rest_client [req-a4bd1c45-be48-4d6f-a0f3-b9bcdd82a6e5 ] Request (FlavorAccessRbacTest:test_list_flavor_access): 200 GET http://172.30.13.94/compute/v2.1/flavors/b989d49c-4410-4776-970e-08a53996c20a/os-flavor-access 0.165s 2020-11-06 17:58:43.523 37 DEBUG tempest.lib.common.rest_client [req-a4bd1c45-be48-4d6f-a0f3-b9bcdd82a6e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '123', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a4bd1c45-be48-4d6f-a0f3-b9bcdd82a6e5', 'x-compute-request-id': 'req-a4bd1c45-be48-4d6f-a0f3-b9bcdd82a6e5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/b989d49c-4410-4776-970e-08a53996c20a/os-flavor-access'} Body: b'{"flavor_access": [{"flavor_id": "b989d49c-4410-4776-970e-08a53996c20a", "tenant_id": "52c3dff7ef9f46f98e2c0e166df4f162"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:43.526 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:43.526 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:58:43.527 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.528 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.528 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.529 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.530 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.530 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.531 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.531 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.532 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.532 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.533 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.533 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.534 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.534 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.535 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.535 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.536 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.536 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.537 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.537 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.538 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.538 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.538 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.538 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.539 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.539 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.539 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.539 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.540 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.540 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.540 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.541 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.541 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.541 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.541 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.542 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.542 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.542 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.542 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.543 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.543 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.543 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.544 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.544 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.544 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.545 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.545 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.545 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.545 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.546 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.546 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.546 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.547 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.547 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.547 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.547 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.548 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.548 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.548 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.549 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.549 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.549 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.550 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.550 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.550 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.551 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.551 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.551 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.551 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.552 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.552 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.552 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.553 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.553 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.553 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.554 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-agents:update, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:58:43.580 37 INFO tempest.lib.common.rest_client [req-60e85d28-dda6-471d-8f62-385bdf781b77 ] Request (FlavorAccessRbacTest:test_list_flavor_access): 200 GET http://172.30.13.94/identity/v3/projects/52c3dff7ef9f46f98e2c0e166df4f162/users/db7cf899ed5a40c5882522729a156930/roles 0.053s 2020-11-06 17:58:43.581 37 DEBUG tempest.lib.common.rest_client [req-60e85d28-dda6-471d-8f62-385bdf781b77 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-60e85d28-dda6-471d-8f62-385bdf781b77', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/52c3dff7ef9f46f98e2c0e166df4f162/users/db7cf899ed5a40c5882522729a156930/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/52c3dff7ef9f46f98e2c0e166df4f162/users/db7cf899ed5a40c5882522729a156930/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:43.591 40 INFO tempest.lib.common.rest_client [req-977942a8-810e-4614-8c57-bf66223510de ] Request (FloatingIpPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.081s 2020-11-06 17:58:43.592 40 DEBUG tempest.lib.common.rest_client [req-977942a8-810e-4614-8c57-bf66223510de ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-FloatingIpPoolsRbacTest-2067506740-desc", "domain_id": "default", "name": "tempest-FloatingIpPoolsRbacTest-2067506740"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '384', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-977942a8-810e-4614-8c57-bf66223510de', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "96f87d7b4aef486fbaef2d93fc9de92a", "name": "tempest-FloatingIpPoolsRbacTest-2067506740", "domain_id": "default", "description": "tempest-FloatingIpPoolsRbacTest-2067506740-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/96f87d7b4aef486fbaef2d93fc9de92a"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:43.610 38 INFO tempest.lib.common.rest_client [req-e62fba97-f3ef-4579-84cc-6e1d6df9c150 ] Request (AggregatesRbacTest:_run_cleanups): 200 POST http://172.30.13.94/compute/v2.1/os-aggregates/1048/action 0.404s 2020-11-06 17:58:43.611 38 DEBUG tempest.lib.common.rest_client [req-e62fba97-f3ef-4579-84cc-6e1d6df9c150 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"remove_host": {"host": "lf-virtual9"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '244', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e62fba97-f3ef-4579-84cc-6e1d6df9c150', 'x-compute-request-id': 'req-e62fba97-f3ef-4579-84cc-6e1d6df9c150', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/1048/action'} Body: b'{"aggregate": {"id": 1048, "name": "tempest-AggregatesRbacTest-aggregate-1677845574", "hosts": [], "metadata": {}, "created_at": "2020-11-06T17:58:42.000000", "updated_at": null, "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:43.653 38 INFO tempest.lib.common.rest_client [req-5a7e6ac6-b3fa-431b-8f39-6369927a97c4 ] Request (AggregatesRbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/compute/v2.1/os-aggregates/1048 0.037s 2020-11-06 17:58:43.654 38 DEBUG tempest.lib.common.rest_client [req-5a7e6ac6-b3fa-431b-8f39-6369927a97c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5a7e6ac6-b3fa-431b-8f39-6369927a97c4', 'x-compute-request-id': 'req-5a7e6ac6-b3fa-431b-8f39-6369927a97c4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/1048'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:43.658 39 INFO tempest.lib.common.rest_client [req-f98ab445-7b83-4a27-b3d3-9d09b7b6a12f ] Request (AgentsRbacTest:test_update_agent): 200 POST http://172.30.13.94/compute/v2.1/os-agents 0.103s 2020-11-06 17:58:43.659 39 DEBUG tempest.lib.common.rest_client [req-f98ab445-7b83-4a27-b3d3-9d09b7b6a12f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"agent": {"hypervisor": "common", "os": "linux", "architecture": "tempest-x86_64-334363604", "version": "7.0", "url": "xxx://xxxx/xxx/xxx", "md5hash": "add6bb58e139be103324d04d82d8f545"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '205', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f98ab445-7b83-4a27-b3d3-9d09b7b6a12f', 'x-compute-request-id': 'req-f98ab445-7b83-4a27-b3d3-9d09b7b6a12f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-agents'} Body: b'{"agent": {"hypervisor": "common", "os": "linux", "architecture": "tempest-x86_64-334363604", "version": "7.0", "url": "xxx://xxxx/xxx/xxx", "md5hash": "add6bb58e139be103324d04d82d8f545", "agent_id": 324}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:43.660 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:58:43.660 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.661 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.661 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.662 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.662 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.662 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:43.662 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.663 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.663 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.664 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.664 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.664 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.665 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.665 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.665 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.666 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.666 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.666 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.667 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.667 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.667 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.668 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.668 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.668 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.668 37 INFO tempest.lib.common.rest_client [req-589ac84d-fea6-4ac9-b52d-966785c4d87c ] Request (FlavorAccessRbacTest:test_list_flavor_access): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-11-06 17:58:43.669 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.669 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.669 37 DEBUG tempest.lib.common.rest_client [req-589ac84d-fea6-4ac9-b52d-966785c4d87c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-589ac84d-fea6-4ac9-b52d-966785c4d87c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "db7cf899ed5a40c5882522729a156930", "name": "tempest-FlavorAccessRbacTest-1193074130", "password_expires_at": null}, "audit_ids": ["xwjNgn6PSj-HLmfmE6l6FA"], "expires_at": "2020-11-06T18:58:43.000000Z", "issued_at": "2020-11-06T17:58:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "52c3dff7ef9f46f98e2c0e166df4f162", "name": "tempest-FlavorAccessRbacTest-1193074130"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:43.669 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.670 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.670 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.670 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.670 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.671 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.671 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.671 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.672 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.672 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.672 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.672 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.673 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.673 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.673 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.674 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.674 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.674 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.675 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.675 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.675 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.676 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.676 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.676 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.676 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.677 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.677 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.677 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.678 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.678 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.678 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.679 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.679 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.679 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.679 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.680 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.680 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.681 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.681 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.681 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.682 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.682 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.682 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.682 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.683 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.683 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.683 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.684 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.684 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.684 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.685 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-aggregates:create, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:58:43.686 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:43.766 39 INFO tempest.lib.common.rest_client [req-ce21f605-691f-46be-a02f-dd06f23ca43e ] Request (AgentsRbacTest:test_update_agent): 200 GET http://172.30.13.94/identity/v3/projects/fa6a56ef86e74e97944c04fdfab296ed/users/15a705d7e4894f189f405daf2f934cfc/roles 0.102s 2020-11-06 17:58:43.766 39 DEBUG tempest.lib.common.rest_client [req-ce21f605-691f-46be-a02f-dd06f23ca43e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ce21f605-691f-46be-a02f-dd06f23ca43e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fa6a56ef86e74e97944c04fdfab296ed/users/15a705d7e4894f189f405daf2f934cfc/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fa6a56ef86e74e97944c04fdfab296ed/users/15a705d7e4894f189f405daf2f934cfc/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:43.798 38 INFO tempest.lib.common.rest_client [req-ea041090-a844-458f-b326-56cd2d81db89 ] Request (AggregatesRbacTest:test_create_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles 0.111s 2020-11-06 17:58:43.798 38 DEBUG tempest.lib.common.rest_client [req-ea041090-a844-458f-b326-56cd2d81db89 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ea041090-a844-458f-b326-56cd2d81db89', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:43.816 40 INFO tempest.lib.common.rest_client [req-296aa0ac-0b80-43bf-9a87-0942a2b2af1f ] Request (FloatingIpPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.222s 2020-11-06 17:58:43.817 40 DEBUG tempest.lib.common.rest_client [req-296aa0ac-0b80-43bf-9a87-0942a2b2af1f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-FloatingIpPoolsRbacTest-2067506740", "password": "F0=vJm7a#qaxP^5", "project_id": "96f87d7b4aef486fbaef2d93fc9de92a", "email": "tempest-FloatingIpPoolsRbacTest-1417234015@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '402', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-296aa0ac-0b80-43bf-9a87-0942a2b2af1f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "96f87d7b4aef486fbaef2d93fc9de92a", "email": "tempest-FloatingIpPoolsRbacTest-1417234015@example.com", "id": "3c59cd65dd144d7198d09f4cced5c802", "name": "tempest-FloatingIpPoolsRbacTest-2067506740", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/3c59cd65dd144d7198d09f4cced5c802"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:43.850 39 INFO tempest.lib.common.rest_client [req-0f7efe4b-e78b-42a9-a045-7654dae3e842 ] Request (AgentsRbacTest:test_update_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 17:58:43.851 39 DEBUG tempest.lib.common.rest_client [req-0f7efe4b-e78b-42a9-a045-7654dae3e842 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0f7efe4b-e78b-42a9-a045-7654dae3e842', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "15a705d7e4894f189f405daf2f934cfc", "name": "tempest-AgentsRbacTest-1121454842", "password_expires_at": null}, "audit_ids": ["fHnQl-WZTpOVGQpcxDnUuQ"], "expires_at": "2020-11-06T18:58:43.000000Z", "issued_at": "2020-11-06T17:58:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fa6a56ef86e74e97944c04fdfab296ed", "name": "tempest-AgentsRbacTest-1121454842"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:43.863 40 INFO tempest.lib.common.rest_client [req-b6511554-1c3f-4f4e-b304-bbacf2e43d9e ] Request (FloatingIpPoolsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.045s 2020-11-06 17:58:43.864 40 DEBUG tempest.lib.common.rest_client [req-b6511554-1c3f-4f4e-b304-bbacf2e43d9e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b6511554-1c3f-4f4e-b304-bbacf2e43d9e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:43.884 38 INFO tempest.lib.common.rest_client [req-8b8ae983-025a-42d7-8b6c-d42e233fbd17 ] Request (AggregatesRbacTest:test_create_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-11-06 17:58:43.884 38 DEBUG tempest.lib.common.rest_client [req-8b8ae983-025a-42d7-8b6c-d42e233fbd17 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8b8ae983-025a-42d7-8b6c-d42e233fbd17', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b9193b9c5b774f4598d6d6d5a73287c7", "name": "tempest-AggregatesRbacTest-591314769", "password_expires_at": null}, "audit_ids": ["iC_QWiSOSGSntjQUYNKK4w"], "expires_at": "2020-11-06T18:58:43.000000Z", "issued_at": "2020-11-06T17:58:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "da822d4027d545cc9eb5f098de258d1d", "name": "tempest-AggregatesRbacTest-591314769"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:43.909 37 INFO tempest.lib.common.rest_client [req-2c3896bb-e6f3-4b2e-b358-cfed614d301f ] Request (FlavorAccessRbacTest:_run_cleanups): 200 POST http://172.30.13.94/compute/v2.1/flavors/b989d49c-4410-4776-970e-08a53996c20a/action 0.238s 2020-11-06 17:58:43.909 37 DEBUG tempest.lib.common.rest_client [req-2c3896bb-e6f3-4b2e-b358-cfed614d301f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"removeTenantAccess": {"tenant": "52c3dff7ef9f46f98e2c0e166df4f162"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '21', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2c3896bb-e6f3-4b2e-b358-cfed614d301f', 'x-compute-request-id': 'req-2c3896bb-e6f3-4b2e-b358-cfed614d301f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/b989d49c-4410-4776-970e-08a53996c20a/action'} Body: b'{"flavor_access": []}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:43.915 40 INFO tempest.lib.common.rest_client [req-632a458a-b654-467f-8c7d-69eae2ae6f20 ] Request (FloatingIpPoolsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.050s 2020-11-06 17:58:43.916 40 DEBUG tempest.lib.common.rest_client [req-632a458a-b654-467f-8c7d-69eae2ae6f20 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-632a458a-b654-467f-8c7d-69eae2ae6f20', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:43.917 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:58:43.918 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.918 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.919 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.920 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.920 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.921 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.921 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.922 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.922 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.922 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.922 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.923 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.923 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.923 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.924 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.924 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.924 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.924 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.925 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.925 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.925 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.926 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.926 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.926 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.927 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.927 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.927 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.927 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.928 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.928 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.928 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.928 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.929 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.929 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.929 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.930 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.930 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.930 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.930 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.931 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.931 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.931 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.932 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.932 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.932 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.932 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.933 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.933 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.933 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.934 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.934 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.934 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.935 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.935 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.935 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.935 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.936 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.936 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.936 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.937 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.937 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.937 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.938 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.938 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.938 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.939 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.939 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.939 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.940 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.940 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.940 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.940 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.941 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.941 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.941 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:43.942 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-flavor-access:remove_tenant_access, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:58:43.957 39 INFO tempest.lib.common.rest_client [req-e8258b3e-66e2-4e62-9538-d8f7e4f2a9f7 ] Request (AgentsRbacTest:test_update_agent): 200 PUT http://172.30.13.94/compute/v2.1/os-agents/324 0.105s 2020-11-06 17:58:43.957 39 DEBUG tempest.lib.common.rest_client [req-e8258b3e-66e2-4e62-9538-d8f7e4f2a9f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"para": {"version": "8.0", "url": "xxx://xxxx/xxx/xxx2", "md5hash": "add6bb58e139be103324d04d82d8f547"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '125', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e8258b3e-66e2-4e62-9538-d8f7e4f2a9f7', 'x-compute-request-id': 'req-e8258b3e-66e2-4e62-9538-d8f7e4f2a9f7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-agents/324'} Body: b'{"agent": {"agent_id": "324", "version": "8.0", "url": "xxx://xxxx/xxx/xxx2", "md5hash": "add6bb58e139be103324d04d82d8f547"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:43.960 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:43.981 40 INFO tempest.lib.common.rest_client [req-5c0a875c-83aa-438c-8973-3919813573ea ] Request (FloatingIpPoolsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/96f87d7b4aef486fbaef2d93fc9de92a/users/3c59cd65dd144d7198d09f4cced5c802/roles/72a4576c553448cd941b052c1ca0cf2d 0.064s 2020-11-06 17:58:43.982 40 DEBUG tempest.lib.common.rest_client [req-5c0a875c-83aa-438c-8973-3919813573ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5c0a875c-83aa-438c-8973-3919813573ea', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/96f87d7b4aef486fbaef2d93fc9de92a/users/3c59cd65dd144d7198d09f4cced5c802/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:43.982 40 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FloatingIpPoolsRbacTest-2067506740', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '96f87d7b4aef486fbaef2d93fc9de92a', 'project_name': 'tempest-FloatingIpPoolsRbacTest-2067506740', 'tenant_id': '96f87d7b4aef486fbaef2d93fc9de92a', 'tenant_name': 'tempest-FloatingIpPoolsRbacTest-2067506740', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '3c59cd65dd144d7198d09f4cced5c802'}, Network: None, Subnet: None, Router: None 2020-11-06 17:58:43.983 40 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FloatingIpPoolsRbacTest-2067506740', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '96f87d7b4aef486fbaef2d93fc9de92a', 'project_name': 'tempest-FloatingIpPoolsRbacTest-2067506740', 'tenant_id': '96f87d7b4aef486fbaef2d93fc9de92a', 'tenant_name': 'tempest-FloatingIpPoolsRbacTest-2067506740', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '3c59cd65dd144d7198d09f4cced5c802'}, Network: None, Subnet: None, Router: None 2020-11-06 17:58:43.986 38 INFO tempest.lib.common.rest_client [req-0b76075f-59ba-4375-b41a-fadd202d2119 ] Request (AggregatesRbacTest:test_create_aggregate_rbac): 200 POST http://172.30.13.94/compute/v2.1/os-aggregates 0.100s 2020-11-06 17:58:43.987 38 DEBUG tempest.lib.common.rest_client [req-0b76075f-59ba-4375-b41a-fadd202d2119 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"aggregate": {"name": "tempest-AggregatesRbacTest-aggregate-1796400699"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '215', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0b76075f-59ba-4375-b41a-fadd202d2119', 'x-compute-request-id': 'req-0b76075f-59ba-4375-b41a-fadd202d2119', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates'} Body: b'{"aggregate": {"id": 1049, "name": "tempest-AggregatesRbacTest-aggregate-1796400699", "created_at": "2020-11-06T17:58:43.972027", "updated_at": null, "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:43.992 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:44.055 39 INFO tempest.lib.common.rest_client [req-42528911-8457-4007-a6c4-83bbf9dc2927 ] Request (AgentsRbacTest:test_update_agent): 200 GET http://172.30.13.94/identity/v3/projects/fa6a56ef86e74e97944c04fdfab296ed/users/15a705d7e4894f189f405daf2f934cfc/roles 0.094s 2020-11-06 17:58:44.055 39 DEBUG tempest.lib.common.rest_client [req-42528911-8457-4007-a6c4-83bbf9dc2927 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-42528911-8457-4007-a6c4-83bbf9dc2927', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fa6a56ef86e74e97944c04fdfab296ed/users/15a705d7e4894f189f405daf2f934cfc/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fa6a56ef86e74e97944c04fdfab296ed/users/15a705d7e4894f189f405daf2f934cfc/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:44.099 38 INFO tempest.lib.common.rest_client [req-17a8f4ac-6f76-465f-9f04-902e9db52457 ] Request (AggregatesRbacTest:test_create_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles 0.106s 2020-11-06 17:58:44.100 38 DEBUG tempest.lib.common.rest_client [req-17a8f4ac-6f76-465f-9f04-902e9db52457 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-17a8f4ac-6f76-465f-9f04-902e9db52457', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:44.100 40 INFO tempest.lib.common.rest_client [req-9a73409e-c5f3-49ce-8f6f-ca5e9e4e976f ] Request (FloatingIpPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.108s 2020-11-06 17:58:44.100 40 DEBUG tempest.lib.common.rest_client [req-9a73409e-c5f3-49ce-8f6f-ca5e9e4e976f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6577', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9a73409e-c5f3-49ce-8f6f-ca5e9e4e976f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3c59cd65dd144d7198d09f4cced5c802", "name": "tempest-FloatingIpPoolsRbacTest-2067506740", "password_expires_at": null}, "audit_ids": ["Mn6RrIxMSduHFa-UrC0OFQ"], "expires_at": "2020-11-06T18:58:44.000000Z", "issued_at": "2020-11-06T17:58:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "96f87d7b4aef486fbaef2d93fc9de92a", "name": "tempest-FloatingIpPoolsRbacTest-2067506740"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/96f87d7b4aef486fbaef2d93fc9de92a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/96f87d7b4aef486fbaef2d93fc9de92a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/96f87d7b4aef486fbaef2d93fc9de92a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_96f87d7b4aef486fbaef2d93fc9de92a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_96f87d7b4aef486fbaef2d93fc9de92a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_96f87d7b4aef486fbaef2d93fc9de92a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:44.101 37 INFO tempest.lib.common.rest_client [req-d0e2e501-47e1-4b4d-8b82-b42f42eb7566 ] Request (FlavorAccessRbacTest:test_remove_flavor_access): 200 POST http://172.30.13.94/compute/v2.1/flavors/b989d49c-4410-4776-970e-08a53996c20a/action 0.158s 2020-11-06 17:58:44.102 37 DEBUG tempest.lib.common.rest_client [req-d0e2e501-47e1-4b4d-8b82-b42f42eb7566 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"addTenantAccess": {"tenant": "52c3dff7ef9f46f98e2c0e166df4f162"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '123', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d0e2e501-47e1-4b4d-8b82-b42f42eb7566', 'x-compute-request-id': 'req-d0e2e501-47e1-4b4d-8b82-b42f42eb7566', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/b989d49c-4410-4776-970e-08a53996c20a/action'} Body: b'{"flavor_access": [{"flavor_id": "b989d49c-4410-4776-970e-08a53996c20a", "tenant_id": "52c3dff7ef9f46f98e2c0e166df4f162"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:44.105 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:44.133 39 INFO tempest.lib.common.rest_client [req-bb27177c-93ad-4344-9002-debba5c3f313 ] Request (AgentsRbacTest:test_update_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.077s 2020-11-06 17:58:44.134 39 DEBUG tempest.lib.common.rest_client [req-bb27177c-93ad-4344-9002-debba5c3f313 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bb27177c-93ad-4344-9002-debba5c3f313', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "15a705d7e4894f189f405daf2f934cfc", "name": "tempest-AgentsRbacTest-1121454842", "password_expires_at": null}, "audit_ids": ["XIPYQFmOSEWmVXMh9M2CtA"], "expires_at": "2020-11-06T18:58:44.000000Z", "issued_at": "2020-11-06T17:58:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fa6a56ef86e74e97944c04fdfab296ed", "name": "tempest-AgentsRbacTest-1121454842"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fa6a56ef86e74e97944c04fdfab296ed", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:44.140 40 INFO tempest.lib.common.rest_client [req-c0782bb8-0cc1-4ac7-9ed1-3514df0732d9 ] Request (FloatingIpPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 17:58:44.141 40 DEBUG tempest.lib.common.rest_client [req-c0782bb8-0cc1-4ac7-9ed1-3514df0732d9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c0782bb8-0cc1-4ac7-9ed1-3514df0732d9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["ZjX69Y8KTru9Mamia4NmxQ"], "expires_at": "2020-11-06T18:58:44.000000Z", "issued_at": "2020-11-06T17:58:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:44.157 37 INFO tempest.lib.common.rest_client [req-7735231d-6291-44c1-8271-6b30349f2c28 ] Request (FlavorAccessRbacTest:test_remove_flavor_access): 200 GET http://172.30.13.94/identity/v3/projects/52c3dff7ef9f46f98e2c0e166df4f162/users/db7cf899ed5a40c5882522729a156930/roles 0.052s 2020-11-06 17:58:44.158 37 DEBUG tempest.lib.common.rest_client [req-7735231d-6291-44c1-8271-6b30349f2c28 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7735231d-6291-44c1-8271-6b30349f2c28', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/52c3dff7ef9f46f98e2c0e166df4f162/users/db7cf899ed5a40c5882522729a156930/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/52c3dff7ef9f46f98e2c0e166df4f162/users/db7cf899ed5a40c5882522729a156930/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:44.181 40 INFO tempest.lib.common.rest_client [req-acc008ae-4e8d-4c17-8dd9-a6a937ada500 ] Request (FloatingIpPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 17:58:44.182 40 DEBUG tempest.lib.common.rest_client [req-acc008ae-4e8d-4c17-8dd9-a6a937ada500 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-acc008ae-4e8d-4c17-8dd9-a6a937ada500', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["48nitW_GSTyXPMVCT_aBdw"], "expires_at": "2020-11-06T18:58:44.000000Z", "issued_at": "2020-11-06T17:58:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:44.185 38 INFO tempest.lib.common.rest_client [req-1b31bd54-f673-4a67-bb4a-9c29dc1400b3 ] Request (AggregatesRbacTest:test_create_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 17:58:44.186 38 DEBUG tempest.lib.common.rest_client [req-1b31bd54-f673-4a67-bb4a-9c29dc1400b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1b31bd54-f673-4a67-bb4a-9c29dc1400b3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b9193b9c5b774f4598d6d6d5a73287c7", "name": "tempest-AggregatesRbacTest-591314769", "password_expires_at": null}, "audit_ids": ["BZF3zYVnS0yUTVI1CqlDzg"], "expires_at": "2020-11-06T18:58:44.000000Z", "issued_at": "2020-11-06T17:58:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "da822d4027d545cc9eb5f098de258d1d", "name": "tempest-AggregatesRbacTest-591314769"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:44.190 37 INFO tempest.lib.common.rest_client [req-3661babc-56a0-45f7-bf36-60749d169a3f ] Request (FlavorAccessRbacTest:test_remove_flavor_access): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 17:58:44.191 37 DEBUG tempest.lib.common.rest_client [req-3661babc-56a0-45f7-bf36-60749d169a3f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3661babc-56a0-45f7-bf36-60749d169a3f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "db7cf899ed5a40c5882522729a156930", "name": "tempest-FlavorAccessRbacTest-1193074130", "password_expires_at": null}, "audit_ids": ["AO8ojbvtSCuvdcWurmjYDA"], "expires_at": "2020-11-06T18:58:44.000000Z", "issued_at": "2020-11-06T17:58:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "52c3dff7ef9f46f98e2c0e166df4f162", "name": "tempest-FlavorAccessRbacTest-1193074130"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:44.226 40 INFO tempest.lib.common.rest_client [req-6d0b11f1-c385-4a4c-99d8-b8a003467a0d ] Request (FloatingIpPoolsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.043s 2020-11-06 17:58:44.226 40 DEBUG tempest.lib.common.rest_client [req-6d0b11f1-c385-4a4c-99d8-b8a003467a0d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6d0b11f1-c385-4a4c-99d8-b8a003467a0d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:44.273 40 INFO tempest.lib.common.rest_client [req-3af27d38-15d0-4329-90de-c913fc192b94 ] Request (FloatingIpPoolsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.046s 2020-11-06 17:58:44.274 40 DEBUG tempest.lib.common.rest_client [req-3af27d38-15d0-4329-90de-c913fc192b94 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3af27d38-15d0-4329-90de-c913fc192b94', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:44.274 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 17:58:44.275 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:44.282 39 INFO tempest.lib.common.rest_client [req-35611a1a-6219-44bf-8a92-3294975f1015 ] Request (AgentsRbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/compute/v2.1/os-agents/324 0.146s 2020-11-06 17:58:44.283 39 DEBUG tempest.lib.common.rest_client [req-35611a1a-6219-44bf-8a92-3294975f1015 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-35611a1a-6219-44bf-8a92-3294975f1015', 'x-compute-request-id': 'req-35611a1a-6219-44bf-8a92-3294975f1015', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-agents/324'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:44.326 40 INFO tempest.lib.common.rest_client [req-43727456-9335-4ef9-aa26-5344653903a5 ] Request (FloatingIpPoolsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/96f87d7b4aef486fbaef2d93fc9de92a/users/3c59cd65dd144d7198d09f4cced5c802/roles 0.050s 2020-11-06 17:58:44.327 40 DEBUG tempest.lib.common.rest_client [req-43727456-9335-4ef9-aa26-5344653903a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-43727456-9335-4ef9-aa26-5344653903a5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/96f87d7b4aef486fbaef2d93fc9de92a/users/3c59cd65dd144d7198d09f4cced5c802/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/96f87d7b4aef486fbaef2d93fc9de92a/users/3c59cd65dd144d7198d09f4cced5c802/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:44.354 38 INFO tempest.lib.common.rest_client [req-037439d9-3a3d-49ff-a138-b2827f17e12f ] Request (AggregatesRbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/compute/v2.1/os-aggregates/1049 0.166s 2020-11-06 17:58:44.355 38 DEBUG tempest.lib.common.rest_client [req-037439d9-3a3d-49ff-a138-b2827f17e12f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-037439d9-3a3d-49ff-a138-b2827f17e12f', 'x-compute-request-id': 'req-037439d9-3a3d-49ff-a138-b2827f17e12f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/1049'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:44.359 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:58:44.360 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.360 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.361 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.361 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.362 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.363 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.364 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.364 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.364 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.365 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.366 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.366 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.367 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.367 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.367 37 INFO tempest.lib.common.rest_client [req-1d3fa683-f8b6-429c-8562-8eac9b962149 ] Request (FlavorAccessRbacTest:test_remove_flavor_access): 200 POST http://172.30.13.94/compute/v2.1/flavors/b989d49c-4410-4776-970e-08a53996c20a/action 0.175s 2020-11-06 17:58:44.368 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.368 37 DEBUG tempest.lib.common.rest_client [req-1d3fa683-f8b6-429c-8562-8eac9b962149 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"removeTenantAccess": {"tenant": "52c3dff7ef9f46f98e2c0e166df4f162"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '21', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1d3fa683-f8b6-429c-8562-8eac9b962149', 'x-compute-request-id': 'req-1d3fa683-f8b6-429c-8562-8eac9b962149', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/b989d49c-4410-4776-970e-08a53996c20a/action'} Body: b'{"flavor_access": []}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:44.368 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.369 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.369 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.370 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:44.370 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.371 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.371 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.371 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.372 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.372 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.373 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.373 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.374 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.374 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.374 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.374 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.375 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.375 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.375 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.376 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.376 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.376 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.376 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.377 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.377 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.377 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.378 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.379 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.379 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.380 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.380 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.381 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.381 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.382 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.382 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.383 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.383 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.384 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.384 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.385 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.385 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.386 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.386 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.387 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.387 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.388 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.389 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.389 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.389 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.390 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.390 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.390 40 INFO tempest.lib.common.rest_client [req-8faa29f5-f7e5-4489-afc2-86e84c0a2abb ] Request (FloatingIpPoolsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/96f87d7b4aef486fbaef2d93fc9de92a/users/3c59cd65dd144d7198d09f4cced5c802/roles/72a4576c553448cd941b052c1ca0cf2d 0.062s 2020-11-06 17:58:44.390 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.390 40 DEBUG tempest.lib.common.rest_client [req-8faa29f5-f7e5-4489-afc2-86e84c0a2abb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8faa29f5-f7e5-4489-afc2-86e84c0a2abb', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/96f87d7b4aef486fbaef2d93fc9de92a/users/3c59cd65dd144d7198d09f4cced5c802/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:44.390 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.391 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.391 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.391 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.392 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.392 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.392 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.392 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.393 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.394 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-aggregates:delete, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:58:44.419 39 INFO tempest.lib.common.rest_client [req-1546b1df-4690-4df3-83e9-ef22e17a6f5c ] Request (AgentsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/15a705d7e4894f189f405daf2f934cfc 0.131s 2020-11-06 17:58:44.420 39 DEBUG tempest.lib.common.rest_client [req-1546b1df-4690-4df3-83e9-ef22e17a6f5c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1546b1df-4690-4df3-83e9-ef22e17a6f5c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/15a705d7e4894f189f405daf2f934cfc'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:44.430 38 INFO tempest.lib.common.rest_client [req-c444e5c3-9173-4167-9959-d6a4ad1c46cc ] Request (AggregatesRbacTest:test_delete_aggregate_rbac): 200 POST http://172.30.13.94/compute/v2.1/os-aggregates 0.036s 2020-11-06 17:58:44.431 38 DEBUG tempest.lib.common.rest_client [req-c444e5c3-9173-4167-9959-d6a4ad1c46cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"aggregate": {"name": "tempest-AggregatesRbacTest-aggregate-1275367073"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '215', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c444e5c3-9173-4167-9959-d6a4ad1c46cc', 'x-compute-request-id': 'req-c444e5c3-9173-4167-9959-d6a4ad1c46cc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates'} Body: b'{"aggregate": {"id": 1050, "name": "tempest-AggregatesRbacTest-aggregate-1275367073", "created_at": "2020-11-06T17:58:44.416779", "updated_at": null, "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:44.436 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:44.480 37 INFO tempest.lib.common.rest_client [req-fce4be6a-4097-4e54-bbd0-43bc0b8d8e7e ] Request (FlavorAccessRbacTest:test_remove_flavor_access): 200 GET http://172.30.13.94/identity/v3/projects/52c3dff7ef9f46f98e2c0e166df4f162/users/db7cf899ed5a40c5882522729a156930/roles 0.109s 2020-11-06 17:58:44.481 37 DEBUG tempest.lib.common.rest_client [req-fce4be6a-4097-4e54-bbd0-43bc0b8d8e7e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fce4be6a-4097-4e54-bbd0-43bc0b8d8e7e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/52c3dff7ef9f46f98e2c0e166df4f162/users/db7cf899ed5a40c5882522729a156930/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/52c3dff7ef9f46f98e2c0e166df4f162/users/db7cf899ed5a40c5882522729a156930/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:44.503 40 INFO tempest.lib.common.rest_client [req-df511169-a978-4281-a8f4-6bf53b1ed3ec ] Request (FloatingIpPoolsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/96f87d7b4aef486fbaef2d93fc9de92a/users/3c59cd65dd144d7198d09f4cced5c802/roles/a629c95d64b3416fb80ae90af4f69c05 0.112s 2020-11-06 17:58:44.504 40 DEBUG tempest.lib.common.rest_client [req-df511169-a978-4281-a8f4-6bf53b1ed3ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-df511169-a978-4281-a8f4-6bf53b1ed3ec', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/96f87d7b4aef486fbaef2d93fc9de92a/users/3c59cd65dd144d7198d09f4cced5c802/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:44.531 39 INFO tempest.lib.common.rest_client [req-fd536dce-b40a-4ea3-8ec9-1262a688cc3f ] Request (AgentsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.110s 2020-11-06 17:58:44.532 39 DEBUG tempest.lib.common.rest_client [req-fd536dce-b40a-4ea3-8ec9-1262a688cc3f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fd536dce-b40a-4ea3-8ec9-1262a688cc3f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["Of_NYuU0Tg-xWRcGCrEBpg"], "expires_at": "2020-11-06T18:58:44.000000Z", "issued_at": "2020-11-06T17:58:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:44.546 38 INFO tempest.lib.common.rest_client [req-84c4cead-24ba-4675-97f5-eaadae2989ce ] Request (AggregatesRbacTest:test_delete_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles 0.108s 2020-11-06 17:58:44.546 38 DEBUG tempest.lib.common.rest_client [req-84c4cead-24ba-4675-97f5-eaadae2989ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-84c4cead-24ba-4675-97f5-eaadae2989ce', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:44.564 37 INFO tempest.lib.common.rest_client [req-4e833714-01ab-4a30-9f52-2f8b3108bae1 ] Request (FlavorAccessRbacTest:test_remove_flavor_access): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 17:58:44.565 37 DEBUG tempest.lib.common.rest_client [req-4e833714-01ab-4a30-9f52-2f8b3108bae1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4e833714-01ab-4a30-9f52-2f8b3108bae1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "db7cf899ed5a40c5882522729a156930", "name": "tempest-FlavorAccessRbacTest-1193074130", "password_expires_at": null}, "audit_ids": ["ArGDeLIAT-Ol6pgkv1CueQ"], "expires_at": "2020-11-06T18:58:44.000000Z", "issued_at": "2020-11-06T17:58:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "52c3dff7ef9f46f98e2c0e166df4f162", "name": "tempest-FlavorAccessRbacTest-1193074130"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_52c3dff7ef9f46f98e2c0e166df4f162", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:44.636 38 INFO tempest.lib.common.rest_client [req-fc1577f0-e60d-45aa-8785-561b011e875e ] Request (AggregatesRbacTest:test_delete_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-11-06 17:58:44.637 38 DEBUG tempest.lib.common.rest_client [req-fc1577f0-e60d-45aa-8785-561b011e875e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fc1577f0-e60d-45aa-8785-561b011e875e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b9193b9c5b774f4598d6d6d5a73287c7", "name": "tempest-AggregatesRbacTest-591314769", "password_expires_at": null}, "audit_ids": ["zrj3awu7QaO8Vb0rLJ57yA"], "expires_at": "2020-11-06T18:58:44.000000Z", "issued_at": "2020-11-06T17:58:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "da822d4027d545cc9eb5f098de258d1d", "name": "tempest-AggregatesRbacTest-591314769"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:44.801 38 INFO tempest.lib.common.rest_client [req-baa40a30-1541-433d-9992-d9f25e2f336f ] Request (AggregatesRbacTest:test_delete_aggregate_rbac): 200 DELETE http://172.30.13.94/compute/v2.1/os-aggregates/1050 0.163s 2020-11-06 17:58:44.802 38 DEBUG tempest.lib.common.rest_client [req-baa40a30-1541-433d-9992-d9f25e2f336f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-baa40a30-1541-433d-9992-d9f25e2f336f', 'x-compute-request-id': 'req-baa40a30-1541-433d-9992-d9f25e2f336f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/1050'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:44.802 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:44.812 37 INFO tempest.lib.common.rest_client [req-82e3c9de-e10a-4067-a93a-83792ffbe279 ] Request (FlavorAccessRbacTest:_run_cleanups): 404 POST http://172.30.13.94/compute/v2.1/flavors/b989d49c-4410-4776-970e-08a53996c20a/action 0.246s 2020-11-06 17:58:44.813 37 DEBUG tempest.lib.common.rest_client [req-82e3c9de-e10a-4067-a93a-83792ffbe279 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"removeTenantAccess": {"tenant": "52c3dff7ef9f46f98e2c0e166df4f162"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '126', 'x-openstack-request-id': 'req-82e3c9de-e10a-4067-a93a-83792ffbe279', 'x-compute-request-id': 'req-82e3c9de-e10a-4067-a93a-83792ffbe279', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/b989d49c-4410-4776-970e-08a53996c20a/action'} Body: b'{"itemNotFound": {"code": 404, "message": "Flavor access not found for 2439 / 52c3dff7ef9f46f98e2c0e166df4f162 combination."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:44.848 37 INFO tempest.lib.common.rest_client [req-b1d2b53e-c867-432b-9501-a8b67b724c53 ] Request (FlavorAccessRbacTest:tearDownClass): 202 DELETE http://172.30.13.94/compute/v2.1/flavors/b989d49c-4410-4776-970e-08a53996c20a 0.030s 2020-11-06 17:58:44.848 37 DEBUG tempest.lib.common.rest_client [req-b1d2b53e-c867-432b-9501-a8b67b724c53 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b1d2b53e-c867-432b-9501-a8b67b724c53', 'x-compute-request-id': 'req-b1d2b53e-c867-432b-9501-a8b67b724c53', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/b989d49c-4410-4776-970e-08a53996c20a'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:44.857 38 INFO tempest.lib.common.rest_client [req-668d7835-ee3b-4fe4-a64d-477af976ff42 ] Request (AggregatesRbacTest:test_delete_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles 0.054s 2020-11-06 17:58:44.858 38 DEBUG tempest.lib.common.rest_client [req-668d7835-ee3b-4fe4-a64d-477af976ff42 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-668d7835-ee3b-4fe4-a64d-477af976ff42', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:44.886 37 INFO tempest.lib.common.rest_client [req-16a1b399-3be1-4931-9f5f-ebfd134c6d6f ] Request (FlavorAccessRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/flavors/detail 0.037s 2020-11-06 17:58:44.886 37 DEBUG tempest.lib.common.rest_client [req-16a1b399-3be1-4931-9f5f-ebfd134c6d6f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '8777', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-16a1b399-3be1-4931-9f5f-ebfd134c6d6f', 'x-compute-request-id': 'req-16a1b399-3be1-4931-9f5f-ebfd134c6d6f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/detail'} Body: b'{"flavors": [{"id": "068070ea-870f-4f2e-b589-fd24aadca788", "name": "tempest_slow-flavor_alt_75eb3fa1-c659-4fc1-9b83-f5e47a8278c9", "ram": 1024, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/068070ea-870f-4f2e-b589-fd24aadca788"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/068070ea-870f-4f2e-b589-fd24aadca788"}]}, {"id": "1", "name": "m1.tiny", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1"}]}, {"id": "1c717c7c-492d-4048-893d-a51a30ef7bfa", "name": "rally_verify_32f1c0c7_UCSTCpLB", "ram": 64, "disk": 5, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/1c717c7c-492d-4048-893d-a51a30ef7bfa"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1c717c7c-492d-4048-893d-a51a30ef7bfa"}]}, {"id": "2", "name": "m1.small", "ram": 2048, "disk": 20, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/2"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/2"}]}, {"id": "29b55520-b9a3-4b97-a3ae-d9c83f854c93", "name": "m1.heat_micro", "ram": 128, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/29b55520-b9a3-4b97-a3ae-d9c83f854c93"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/29b55520-b9a3-4b97-a3ae-d9c83f854c93"}]}, {"id": "3", "name": "m1.medium", "ram": 4096, "disk": 40, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 2, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/3"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/3"}]}, {"id": "4", "name": "m1.large", "ram": 8192, "disk": 80, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 4, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/4"}]}, {"id": "42", "name": "m1.nano", "ram": 128, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/42"}]}, {"id": "49e14b85-dc09-4f88-bf7d-1f99419c2abf", "name": "patrole_member-flavor_29628109-ff86-4992-a718-2f4b83dd48b7", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/49e14b85-dc09-4f88-bf7d-1f99419c2abf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/49e14b85-dc09-4f88-bf7d-1f99419c2abf"}]}, {"id": "5", "name": "m1.xlarge", "ram": 16384, "disk": 160, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 8, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/5"}, {"rel": "bookmark", "href": "http://172.3 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:44.892 38 INFO tempest.lib.common.rest_client [req-252d5b82-8b27-45ae-9582-849091cf54c5 ] Request (AggregatesRbacTest:test_delete_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 17:58:44.893 38 DEBUG tempest.lib.common.rest_client [req-252d5b82-8b27-45ae-9582-849091cf54c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-252d5b82-8b27-45ae-9582-849091cf54c5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b9193b9c5b774f4598d6d6d5a73287c7", "name": "tempest-AggregatesRbacTest-591314769", "password_expires_at": null}, "audit_ids": ["5yo889JISvKOG8yWhroLpg"], "expires_at": "2020-11-06T18:58:44.000000Z", "issued_at": "2020-11-06T17:58:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "da822d4027d545cc9eb5f098de258d1d", "name": "tempest-AggregatesRbacTest-591314769"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:44.961 39 INFO tempest.lib.common.rest_client [req-a4b44007-2f40-429e-a040-565b9520b7f4 ] Request (AgentsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=fa6a56ef86e74e97944c04fdfab296ed&name=default 0.427s 2020-11-06 17:58:44.962 39 DEBUG tempest.lib.common.rest_client [req-a4b44007-2f40-429e-a040-565b9520b7f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-a4b44007-2f40-429e-a040-565b9520b7f4', 'date': 'Fri, 06 Nov 2020 17:58:44 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=fa6a56ef86e74e97944c04fdfab296ed&name=default'} Body: b'{"security_groups": [{"id": "7f841dfe-fc08-4db7-b0d6-da34af9f2095", "name": "default", "stateful": true, "tenant_id": "fa6a56ef86e74e97944c04fdfab296ed", "description": "Default security group", "security_group_rules": [{"id": "428f72b3-8878-49ae-b976-56e174be8bb8", "tenant_id": "fa6a56ef86e74e97944c04fdfab296ed", "security_group_id": "7f841dfe-fc08-4db7-b0d6-da34af9f2095", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:58:44Z", "updated_at": "2020-11-06T17:58:44Z", "revision_number": 0, "project_id": "fa6a56ef86e74e97944c04fdfab296ed"}, {"id": "908797e7-6508-480d-a2ac-f4c317878b97", "tenant_id": "fa6a56ef86e74e97944c04fdfab296ed", "security_group_id": "7f841dfe-fc08-4db7-b0d6-da34af9f2095", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:58:44Z", "updated_at": "2020-11-06T17:58:44Z", "revision_number": 0, "project_id": "fa6a56ef86e74e97944c04fdfab296ed"}, {"id": "eb384d6e-c042-4ca5-a45a-64abfd809931", "tenant_id": "fa6a56ef86e74e97944c04fdfab296ed", "security_group_id": "7f841dfe-fc08-4db7-b0d6-da34af9f2095", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "7f841dfe-fc08-4db7-b0d6-da34af9f2095", "description": null, "tags": [], "created_at": "2020-11-06T17:58:44Z", "updated_at": "2020-11-06T17:58:44Z", "revision_number": 0, "project_id": "fa6a56ef86e74e97944c04fdfab296ed"}, {"id": "efd69a31-e13b-43f7-b8d8-46ff71525fb4", "tenant_id": "fa6a56ef86e74e97944c04fdfab296ed", "security_group_id": "7f841dfe-fc08-4db7-b0d6-da34af9f2095", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "7f841dfe-fc08-4db7-b0d6-da34af9f2095", "description": null, "tags": [], "created_at": "2020-11-06T17:58:44Z", "updated_at": "2020-11-06T17:58:44Z", "revision_number": 0, "project_id": "fa6a56ef86e74e97944c04fdfab296ed"}], "tags": [], "created_at": "2020-11-06T17:58:44Z", "updated_at": "2020-11-06T17:58:44Z", "revision_number": 1, "project_id": "fa6a56ef86e74e97944c04fdfab296ed"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:44.989 38 INFO tempest.lib.common.rest_client [req-55352beb-d03b-43c7-b776-b771b08f01b5 ] Request (AggregatesRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/compute/v2.1/os-aggregates/1050 0.094s 2020-11-06 17:58:44.989 38 DEBUG tempest.lib.common.rest_client [req-55352beb-d03b-43c7-b776-b771b08f01b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '80', 'x-openstack-request-id': 'req-55352beb-d03b-43c7-b776-b771b08f01b5', 'x-compute-request-id': 'req-55352beb-d03b-43c7-b776-b771b08f01b5', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/1050'} Body: b'{"itemNotFound": {"code": 404, "message": "Aggregate 1050 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:44.994 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:58:44.994 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.995 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.995 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.995 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.996 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.996 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.997 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.997 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.997 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.998 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.998 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.998 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.999 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:44.999 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.000 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.000 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.000 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.001 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.001 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.001 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.002 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.002 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.002 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.003 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.003 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.003 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.003 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.004 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.004 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.004 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.005 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.005 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.005 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.006 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.006 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.006 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.006 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.007 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.007 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.007 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.008 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.008 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.008 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.009 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.009 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.009 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.010 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.010 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.010 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.011 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.011 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.011 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.011 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.012 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.012 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.012 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.013 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.013 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.013 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.014 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.014 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.014 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.015 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.015 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.016 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.017 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.017 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.018 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.018 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.019 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.019 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.020 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.020 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.021 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.021 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.023 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-aggregates:index, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:58:45.023 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:45.045 37 INFO tempest.lib.common.rest_client [req-f9a45957-eb23-4eba-8fd2-6d781bdf7c64 ] Request (FlavorAccessRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/db7cf899ed5a40c5882522729a156930 0.142s 2020-11-06 17:58:45.046 37 DEBUG tempest.lib.common.rest_client [req-f9a45957-eb23-4eba-8fd2-6d781bdf7c64 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f9a45957-eb23-4eba-8fd2-6d781bdf7c64', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/db7cf899ed5a40c5882522729a156930'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:45.079 38 INFO tempest.lib.common.rest_client [req-221efdbc-c709-4551-8bc2-b90a5baf651f ] Request (AggregatesRbacTest:test_list_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles 0.054s 2020-11-06 17:58:45.080 38 DEBUG tempest.lib.common.rest_client [req-221efdbc-c709-4551-8bc2-b90a5baf651f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-221efdbc-c709-4551-8bc2-b90a5baf651f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:45.130 37 INFO tempest.lib.common.rest_client [req-68fb6923-5bff-4ebf-b5f7-c4d01a199e0c ] Request (FlavorAccessRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 17:58:45.131 37 DEBUG tempest.lib.common.rest_client [req-68fb6923-5bff-4ebf-b5f7-c4d01a199e0c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-68fb6923-5bff-4ebf-b5f7-c4d01a199e0c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["uVuiMZq1TKCZZRbCM46GPw"], "expires_at": "2020-11-06T18:58:45.000000Z", "issued_at": "2020-11-06T17:58:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:45.177 38 INFO tempest.lib.common.rest_client [req-71dd8356-0307-47a1-8b4e-7b1cd449eee4 ] Request (AggregatesRbacTest:test_list_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-11-06 17:58:45.177 38 DEBUG tempest.lib.common.rest_client [req-71dd8356-0307-47a1-8b4e-7b1cd449eee4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-71dd8356-0307-47a1-8b4e-7b1cd449eee4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b9193b9c5b774f4598d6d6d5a73287c7", "name": "tempest-AggregatesRbacTest-591314769", "password_expires_at": null}, "audit_ids": ["Vl5fv2naQsuIIXvi3wp7Aw"], "expires_at": "2020-11-06T18:58:45.000000Z", "issued_at": "2020-11-06T17:58:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "da822d4027d545cc9eb5f098de258d1d", "name": "tempest-AggregatesRbacTest-591314769"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:45.328 38 INFO tempest.lib.common.rest_client [req-7a7fc72a-d279-4766-9ee3-58849ee77a2e ] Request (AggregatesRbacTest:test_list_aggregate_rbac): 200 GET http://172.30.13.94/compute/v2.1/os-aggregates 0.149s 2020-11-06 17:58:45.329 38 DEBUG tempest.lib.common.rest_client [req-7a7fc72a-d279-4766-9ee3-58849ee77a2e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '18', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7a7fc72a-d279-4766-9ee3-58849ee77a2e', 'x-compute-request-id': 'req-7a7fc72a-d279-4766-9ee3-58849ee77a2e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates'} Body: b'{"aggregates": []}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:45.335 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:45.395 38 INFO tempest.lib.common.rest_client [req-d6387425-ad74-49c1-b07c-eff4b068c176 ] Request (AggregatesRbacTest:test_list_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles 0.060s 2020-11-06 17:58:45.396 38 DEBUG tempest.lib.common.rest_client [req-d6387425-ad74-49c1-b07c-eff4b068c176 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d6387425-ad74-49c1-b07c-eff4b068c176', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:45.404 37 INFO tempest.lib.common.rest_client [req-cd94db94-e8d0-420d-98f0-cadfe6ba44c7 ] Request (FlavorAccessRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=52c3dff7ef9f46f98e2c0e166df4f162&name=default 0.272s 2020-11-06 17:58:45.404 37 DEBUG tempest.lib.common.rest_client [req-cd94db94-e8d0-420d-98f0-cadfe6ba44c7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-cd94db94-e8d0-420d-98f0-cadfe6ba44c7', 'date': 'Fri, 06 Nov 2020 17:58:45 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=52c3dff7ef9f46f98e2c0e166df4f162&name=default'} Body: b'{"security_groups": [{"id": "b13ad2e1-fa64-4a6a-90ca-bc8e38017a4a", "name": "default", "stateful": true, "tenant_id": "52c3dff7ef9f46f98e2c0e166df4f162", "description": "Default security group", "security_group_rules": [{"id": "44ad2128-9200-4985-9a3b-73bad50d7388", "tenant_id": "52c3dff7ef9f46f98e2c0e166df4f162", "security_group_id": "b13ad2e1-fa64-4a6a-90ca-bc8e38017a4a", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "b13ad2e1-fa64-4a6a-90ca-bc8e38017a4a", "description": null, "tags": [], "created_at": "2020-11-06T17:58:45Z", "updated_at": "2020-11-06T17:58:45Z", "revision_number": 0, "project_id": "52c3dff7ef9f46f98e2c0e166df4f162"}, {"id": "b5e5d2a0-be1b-444d-a69a-98aa30365630", "tenant_id": "52c3dff7ef9f46f98e2c0e166df4f162", "security_group_id": "b13ad2e1-fa64-4a6a-90ca-bc8e38017a4a", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "b13ad2e1-fa64-4a6a-90ca-bc8e38017a4a", "description": null, "tags": [], "created_at": "2020-11-06T17:58:45Z", "updated_at": "2020-11-06T17:58:45Z", "revision_number": 0, "project_id": "52c3dff7ef9f46f98e2c0e166df4f162"}, {"id": "c1301453-d5fe-46d2-956e-c4a34b199b19", "tenant_id": "52c3dff7ef9f46f98e2c0e166df4f162", "security_group_id": "b13ad2e1-fa64-4a6a-90ca-bc8e38017a4a", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:58:45Z", "updated_at": "2020-11-06T17:58:45Z", "revision_number": 0, "project_id": "52c3dff7ef9f46f98e2c0e166df4f162"}, {"id": "e98caf8f-5c44-4634-b6c0-cd432a944feb", "tenant_id": "52c3dff7ef9f46f98e2c0e166df4f162", "security_group_id": "b13ad2e1-fa64-4a6a-90ca-bc8e38017a4a", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:58:45Z", "updated_at": "2020-11-06T17:58:45Z", "revision_number": 0, "project_id": "52c3dff7ef9f46f98e2c0e166df4f162"}], "tags": [], "created_at": "2020-11-06T17:58:45Z", "updated_at": "2020-11-06T17:58:45Z", "revision_number": 1, "project_id": "52c3dff7ef9f46f98e2c0e166df4f162"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:45.435 38 INFO tempest.lib.common.rest_client [req-1a874b56-c0a3-48ab-a119-cbaf0bbd19c0 ] Request (AggregatesRbacTest:test_list_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 17:58:45.436 38 DEBUG tempest.lib.common.rest_client [req-1a874b56-c0a3-48ab-a119-cbaf0bbd19c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1a874b56-c0a3-48ab-a119-cbaf0bbd19c0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b9193b9c5b774f4598d6d6d5a73287c7", "name": "tempest-AggregatesRbacTest-591314769", "password_expires_at": null}, "audit_ids": ["qbFOEC0FSruEMRsQerunpw"], "expires_at": "2020-11-06T18:58:45.000000Z", "issued_at": "2020-11-06T17:58:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "da822d4027d545cc9eb5f098de258d1d", "name": "tempest-AggregatesRbacTest-591314769"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:45.440 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:58:45.441 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.442 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.442 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.443 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.444 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.444 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.445 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.445 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.446 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.446 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.446 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.447 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.447 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.447 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.448 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.448 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.449 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.449 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.450 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.450 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.451 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.451 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.451 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.452 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.452 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.453 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.453 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.453 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.454 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.454 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.454 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.455 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.455 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.455 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.456 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.456 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.456 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.456 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.457 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.457 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.457 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.458 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.458 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.458 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.459 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.459 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.459 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.460 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.460 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.460 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.461 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.461 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.461 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.462 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.462 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.462 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.463 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.463 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.463 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.464 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.464 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.465 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.465 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.465 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.465 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.466 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.466 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.466 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.467 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.467 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.467 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.467 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.468 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.468 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.468 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.469 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-aggregates:remove_host, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:58:45.591 38 INFO tempest.lib.common.rest_client [req-c522f272-a642-4eb8-bcb6-fd61a26e7cfe ] Request (AggregatesRbacTest:test_remove_host_from_aggregate_rbac): 200 POST http://172.30.13.94/compute/v2.1/os-aggregates 0.120s 2020-11-06 17:58:45.591 38 DEBUG tempest.lib.common.rest_client [req-c522f272-a642-4eb8-bcb6-fd61a26e7cfe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"aggregate": {"name": "tempest-AggregatesRbacTest-aggregate-388271973"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '214', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c522f272-a642-4eb8-bcb6-fd61a26e7cfe', 'x-compute-request-id': 'req-c522f272-a642-4eb8-bcb6-fd61a26e7cfe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates'} Body: b'{"aggregate": {"id": 1051, "name": "tempest-AggregatesRbacTest-aggregate-388271973", "created_at": "2020-11-06T17:58:45.573125", "updated_at": null, "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:45.598 40 INFO tempest.lib.common.rest_client [req-b1dfd800-1e7a-4cfa-af8b-9070495281a6 ] Request (FloatingIpPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-11-06 17:58:45.598 40 DEBUG tempest.lib.common.rest_client [req-b1dfd800-1e7a-4cfa-af8b-9070495281a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b1dfd800-1e7a-4cfa-af8b-9070495281a6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3c59cd65dd144d7198d09f4cced5c802", "name": "tempest-FloatingIpPoolsRbacTest-2067506740", "password_expires_at": null}, "audit_ids": ["oe8jMzfHSU-t5ngTmpc8yA"], "expires_at": "2020-11-06T18:58:45.000000Z", "issued_at": "2020-11-06T17:58:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "96f87d7b4aef486fbaef2d93fc9de92a", "name": "tempest-FloatingIpPoolsRbacTest-2067506740"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/96f87d7b4aef486fbaef2d93fc9de92a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/96f87d7b4aef486fbaef2d93fc9de92a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/96f87d7b4aef486fbaef2d93fc9de92a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_96f87d7b4aef486fbaef2d93fc9de92a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_96f87d7b4aef486fbaef2d93fc9de92a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_96f87d7b4aef486fbaef2d93fc9de92a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:45.601 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:58:45.602 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.602 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.602 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.603 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.603 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.604 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.604 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.604 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.605 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.605 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.605 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.606 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.606 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.606 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.606 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.607 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.607 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.607 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.608 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.608 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.608 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.609 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.609 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.609 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.609 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.610 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.610 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.610 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.611 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.611 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.611 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.611 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.612 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.612 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.612 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.613 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.613 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.613 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.614 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.614 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.614 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.614 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.615 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.615 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.615 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.616 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.616 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.616 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.617 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.617 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.617 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.617 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.618 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.618 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.618 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.619 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.619 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.619 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.620 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.620 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.620 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.621 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.621 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.621 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.622 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.622 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.622 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.623 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.623 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.623 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.623 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.624 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.624 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.624 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.625 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:45.625 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-floating-ip-pools, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:58:45.625 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:45.680 40 INFO tempest.lib.common.rest_client [req-781d71bc-93c0-4fdf-bb6d-930b8fd79ef8 ] Request (FloatingIpPoolsRbacTest:test_list_floating_ip_pools): 200 GET http://172.30.13.94/identity/v3/projects/96f87d7b4aef486fbaef2d93fc9de92a/users/3c59cd65dd144d7198d09f4cced5c802/roles 0.054s 2020-11-06 17:58:45.680 40 DEBUG tempest.lib.common.rest_client [req-781d71bc-93c0-4fdf-bb6d-930b8fd79ef8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-781d71bc-93c0-4fdf-bb6d-930b8fd79ef8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/96f87d7b4aef486fbaef2d93fc9de92a/users/3c59cd65dd144d7198d09f4cced5c802/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/96f87d7b4aef486fbaef2d93fc9de92a/users/3c59cd65dd144d7198d09f4cced5c802/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:45.717 40 INFO tempest.lib.common.rest_client [req-1c1ae028-5cab-4cbd-98ed-5bebd2ac3bd4 ] Request (FloatingIpPoolsRbacTest:test_list_floating_ip_pools): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 17:58:45.717 40 DEBUG tempest.lib.common.rest_client [req-1c1ae028-5cab-4cbd-98ed-5bebd2ac3bd4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1c1ae028-5cab-4cbd-98ed-5bebd2ac3bd4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3c59cd65dd144d7198d09f4cced5c802", "name": "tempest-FloatingIpPoolsRbacTest-2067506740", "password_expires_at": null}, "audit_ids": ["GprEZ6OLSaSjktkrPvC3-w"], "expires_at": "2020-11-06T18:58:45.000000Z", "issued_at": "2020-11-06T17:58:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "96f87d7b4aef486fbaef2d93fc9de92a", "name": "tempest-FloatingIpPoolsRbacTest-2067506740"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/96f87d7b4aef486fbaef2d93fc9de92a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/96f87d7b4aef486fbaef2d93fc9de92a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/96f87d7b4aef486fbaef2d93fc9de92a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_96f87d7b4aef486fbaef2d93fc9de92a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_96f87d7b4aef486fbaef2d93fc9de92a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_96f87d7b4aef486fbaef2d93fc9de92a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:45.721 38 INFO tempest.lib.common.rest_client [req-ced2cc8e-a730-4e6e-bae2-5ddffbd86be9 ] Request (AggregatesRbacTest:test_remove_host_from_aggregate_rbac): 200 POST http://172.30.13.94/compute/v2.1/os-aggregates/1051/action 0.124s 2020-11-06 17:58:45.722 38 DEBUG tempest.lib.common.rest_client [req-ced2cc8e-a730-4e6e-bae2-5ddffbd86be9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"add_host": {"host": "lf-virtual9"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '256', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ced2cc8e-a730-4e6e-bae2-5ddffbd86be9', 'x-compute-request-id': 'req-ced2cc8e-a730-4e6e-bae2-5ddffbd86be9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/1051/action'} Body: b'{"aggregate": {"id": 1051, "name": "tempest-AggregatesRbacTest-aggregate-388271973", "hosts": ["lf-virtual9"], "metadata": {}, "created_at": "2020-11-06T17:58:46.000000", "updated_at": null, "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:45.728 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:45.784 38 INFO tempest.lib.common.rest_client [req-5545fe02-8015-453a-b115-16e56788935e ] Request (AggregatesRbacTest:test_remove_host_from_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles 0.055s 2020-11-06 17:58:45.784 38 DEBUG tempest.lib.common.rest_client [req-5545fe02-8015-453a-b115-16e56788935e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5545fe02-8015-453a-b115-16e56788935e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:45.821 38 INFO tempest.lib.common.rest_client [req-454097e0-5dd9-485e-b764-999af6f2fcf8 ] Request (AggregatesRbacTest:test_remove_host_from_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 17:58:45.822 38 DEBUG tempest.lib.common.rest_client [req-454097e0-5dd9-485e-b764-999af6f2fcf8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-454097e0-5dd9-485e-b764-999af6f2fcf8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b9193b9c5b774f4598d6d6d5a73287c7", "name": "tempest-AggregatesRbacTest-591314769", "password_expires_at": null}, "audit_ids": ["sXoilhCIRzOdCjsRo9luew"], "expires_at": "2020-11-06T18:58:45.000000Z", "issued_at": "2020-11-06T17:58:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "da822d4027d545cc9eb5f098de258d1d", "name": "tempest-AggregatesRbacTest-591314769"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:45.954 40 INFO tempest.lib.common.rest_client [req-933778a9-910a-496f-a230-8b7de527b728 ] Request (FloatingIpPoolsRbacTest:test_list_floating_ip_pools): 200 GET http://172.30.13.94/compute/v2.1/os-floating-ip-pools 0.235s 2020-11-06 17:58:45.954 40 DEBUG tempest.lib.common.rest_client [req-933778a9-910a-496f-a230-8b7de527b728 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '43', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-933778a9-910a-496f-a230-8b7de527b728', 'x-compute-request-id': 'req-933778a9-910a-496f-a230-8b7de527b728', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-floating-ip-pools'} Body: b'{"floating_ip_pools": [{"name": "public"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:45.958 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:46.006 40 INFO tempest.lib.common.rest_client [req-e390d016-f519-4b60-ae01-6444677a9fa5 ] Request (FloatingIpPoolsRbacTest:test_list_floating_ip_pools): 200 GET http://172.30.13.94/identity/v3/projects/96f87d7b4aef486fbaef2d93fc9de92a/users/3c59cd65dd144d7198d09f4cced5c802/roles 0.047s 2020-11-06 17:58:46.007 40 DEBUG tempest.lib.common.rest_client [req-e390d016-f519-4b60-ae01-6444677a9fa5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e390d016-f519-4b60-ae01-6444677a9fa5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/96f87d7b4aef486fbaef2d93fc9de92a/users/3c59cd65dd144d7198d09f4cced5c802/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/96f87d7b4aef486fbaef2d93fc9de92a/users/3c59cd65dd144d7198d09f4cced5c802/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:46.022 38 INFO tempest.lib.common.rest_client [req-fc6bb319-4588-4f8a-b4fd-7115699a787a ] Request (AggregatesRbacTest:test_remove_host_from_aggregate_rbac): 200 POST http://172.30.13.94/compute/v2.1/os-aggregates/1051/action 0.199s 2020-11-06 17:58:46.023 38 DEBUG tempest.lib.common.rest_client [req-fc6bb319-4588-4f8a-b4fd-7115699a787a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"remove_host": {"host": "lf-virtual9"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '243', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fc6bb319-4588-4f8a-b4fd-7115699a787a', 'x-compute-request-id': 'req-fc6bb319-4588-4f8a-b4fd-7115699a787a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/1051/action'} Body: b'{"aggregate": {"id": 1051, "name": "tempest-AggregatesRbacTest-aggregate-388271973", "hosts": [], "metadata": {}, "created_at": "2020-11-06T17:58:46.000000", "updated_at": null, "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:46.028 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:46.042 40 INFO tempest.lib.common.rest_client [req-ac92f408-8c5f-4279-b1fc-2e6662e47378 ] Request (FloatingIpPoolsRbacTest:test_list_floating_ip_pools): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 17:58:46.042 40 DEBUG tempest.lib.common.rest_client [req-ac92f408-8c5f-4279-b1fc-2e6662e47378 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ac92f408-8c5f-4279-b1fc-2e6662e47378', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3c59cd65dd144d7198d09f4cced5c802", "name": "tempest-FloatingIpPoolsRbacTest-2067506740", "password_expires_at": null}, "audit_ids": ["K1MJIjQTRRyNHdS4vvzXrw"], "expires_at": "2020-11-06T18:58:46.000000Z", "issued_at": "2020-11-06T17:58:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "96f87d7b4aef486fbaef2d93fc9de92a", "name": "tempest-FloatingIpPoolsRbacTest-2067506740"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/96f87d7b4aef486fbaef2d93fc9de92a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/96f87d7b4aef486fbaef2d93fc9de92a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/96f87d7b4aef486fbaef2d93fc9de92a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_96f87d7b4aef486fbaef2d93fc9de92a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_96f87d7b4aef486fbaef2d93fc9de92a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_96f87d7b4aef486fbaef2d93fc9de92a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:46.081 38 INFO tempest.lib.common.rest_client [req-e72e3daa-869a-47f9-97b4-2896814c0430 ] Request (AggregatesRbacTest:test_remove_host_from_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles 0.052s 2020-11-06 17:58:46.082 38 DEBUG tempest.lib.common.rest_client [req-e72e3daa-869a-47f9-97b4-2896814c0430 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e72e3daa-869a-47f9-97b4-2896814c0430', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:46.128 38 INFO tempest.lib.common.rest_client [req-5f68c070-9a7c-46df-82cf-ece8097d2cb3 ] Request (AggregatesRbacTest:test_remove_host_from_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-11-06 17:58:46.129 38 DEBUG tempest.lib.common.rest_client [req-5f68c070-9a7c-46df-82cf-ece8097d2cb3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5f68c070-9a7c-46df-82cf-ece8097d2cb3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b9193b9c5b774f4598d6d6d5a73287c7", "name": "tempest-AggregatesRbacTest-591314769", "password_expires_at": null}, "audit_ids": ["uh5RPHF0SOuHSQj-ka8OpQ"], "expires_at": "2020-11-06T18:58:46.000000Z", "issued_at": "2020-11-06T17:58:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "da822d4027d545cc9eb5f098de258d1d", "name": "tempest-AggregatesRbacTest-591314769"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:46.179 40 INFO tempest.lib.common.rest_client [req-b0b75121-28b3-477e-b4cc-3b0221a063b1 ] Request (FloatingIpPoolsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/3c59cd65dd144d7198d09f4cced5c802 0.132s 2020-11-06 17:58:46.180 40 DEBUG tempest.lib.common.rest_client [req-b0b75121-28b3-477e-b4cc-3b0221a063b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b0b75121-28b3-477e-b4cc-3b0221a063b1', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/3c59cd65dd144d7198d09f4cced5c802'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:46.260 40 INFO tempest.lib.common.rest_client [req-eaf67493-935f-497b-bc61-72e630d6a67a ] Request (FloatingIpPoolsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.079s 2020-11-06 17:58:46.261 40 DEBUG tempest.lib.common.rest_client [req-eaf67493-935f-497b-bc61-72e630d6a67a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eaf67493-935f-497b-bc61-72e630d6a67a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["FxZ5oZGRRWCY8nliSCTUMg"], "expires_at": "2020-11-06T18:58:46.000000Z", "issued_at": "2020-11-06T17:58:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:46.351 39 INFO tempest.lib.common.rest_client [req-37c77a1c-2b03-4378-9b63-952d9f8a979d ] Request (AgentsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/7f841dfe-fc08-4db7-b0d6-da34af9f2095 1.388s 2020-11-06 17:58:46.352 39 DEBUG tempest.lib.common.rest_client [req-37c77a1c-2b03-4378-9b63-952d9f8a979d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-37c77a1c-2b03-4378-9b63-952d9f8a979d', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 17:58:46 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/7f841dfe-fc08-4db7-b0d6-da34af9f2095'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:46.476 39 INFO tempest.lib.common.rest_client [req-4d13a3b8-b091-421c-aa7a-07c5d92dbbf0 ] Request (AgentsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/fa6a56ef86e74e97944c04fdfab296ed 0.124s 2020-11-06 17:58:46.477 39 DEBUG tempest.lib.common.rest_client [req-4d13a3b8-b091-421c-aa7a-07c5d92dbbf0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4d13a3b8-b091-421c-aa7a-07c5d92dbbf0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/fa6a56ef86e74e97944c04fdfab296ed'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:46.497 38 INFO tempest.lib.common.rest_client [req-8570b2dc-2875-4037-bb20-5322c99be740 ] Request (AggregatesRbacTest:_run_cleanups): 404 POST http://172.30.13.94/compute/v2.1/os-aggregates/1051/action 0.367s 2020-11-06 17:58:46.498 38 DEBUG tempest.lib.common.rest_client [req-8570b2dc-2875-4037-bb20-5322c99be740 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"remove_host": {"host": "lf-virtual9"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '94', 'x-openstack-request-id': 'req-8570b2dc-2875-4037-bb20-5322c99be740', 'x-compute-request-id': 'req-8570b2dc-2875-4037-bb20-5322c99be740', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/1051/action'} Body: b'{"itemNotFound": {"code": 404, "message": "Cannot remove host lf-virtual9 in aggregate 1051"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:46.534 38 INFO tempest.lib.common.rest_client [req-8346817e-1ccc-4b95-b4c8-5cd94127d4d0 ] Request (AggregatesRbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/compute/v2.1/os-aggregates/1051 0.035s 2020-11-06 17:58:46.535 38 DEBUG tempest.lib.common.rest_client [req-8346817e-1ccc-4b95-b4c8-5cd94127d4d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8346817e-1ccc-4b95-b4c8-5cd94127d4d0', 'x-compute-request-id': 'req-8346817e-1ccc-4b95-b4c8-5cd94127d4d0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/1051'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:46.539 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:58:46.540 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.540 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.541 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.541 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.541 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.542 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.542 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.543 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.543 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.543 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.544 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.544 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.544 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.545 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.545 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.545 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.546 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.546 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.546 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.547 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.547 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.547 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.547 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.548 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.548 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.548 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.549 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.549 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.549 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.550 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.550 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.551 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.551 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.551 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.552 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.552 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.552 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.552 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.553 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.553 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.553 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.554 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.554 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.554 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.555 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.555 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.555 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.556 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.556 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.556 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.556 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.557 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.557 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.557 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.558 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.558 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.558 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.558 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.559 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.559 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.560 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.560 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.560 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.560 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.561 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.561 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.561 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.562 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.562 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.562 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.562 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.563 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.563 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.563 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.564 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:46.565 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-aggregates:set_metadata, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:58:46.574 39 INFO tempest.lib.common.rest_client [req-b8ee079b-d8cc-4b76-9240-1d6e6e8844b5 ] Request (FlavorManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-11-06 17:58:46.574 39 DEBUG tempest.lib.common.rest_client [req-b8ee079b-d8cc-4b76-9240-1d6e6e8844b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b8ee079b-d8cc-4b76-9240-1d6e6e8844b5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["mTC467_hQhqQHSahvb_Rfg"], "expires_at": "2020-11-06T18:58:46.000000Z", "issued_at": "2020-11-06T17:58:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:46.614 38 INFO tempest.lib.common.rest_client [req-b351e682-9a60-486b-ab8d-27acbf3c260c ] Request (AggregatesRbacTest:test_set_metadata_on_aggregate_rbac): 200 POST http://172.30.13.94/compute/v2.1/os-aggregates 0.048s 2020-11-06 17:58:46.614 38 DEBUG tempest.lib.common.rest_client [req-b351e682-9a60-486b-ab8d-27acbf3c260c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"aggregate": {"name": "tempest-AggregatesRbacTest-aggregate-225486877"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '214', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b351e682-9a60-486b-ab8d-27acbf3c260c', 'x-compute-request-id': 'req-b351e682-9a60-486b-ab8d-27acbf3c260c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates'} Body: b'{"aggregate": {"id": 1052, "name": "tempest-AggregatesRbacTest-aggregate-225486877", "created_at": "2020-11-06T17:58:46.597463", "updated_at": null, "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:46.619 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:46.622 39 INFO tempest.lib.common.rest_client [req-5ec22b02-4f95-41fa-80b7-36d5affd2415 ] Request (FlavorManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 17:58:46.622 39 DEBUG tempest.lib.common.rest_client [req-5ec22b02-4f95-41fa-80b7-36d5affd2415 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5ec22b02-4f95-41fa-80b7-36d5affd2415', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["lTrMH3anSMuLhbw7Pt7s0Q"], "expires_at": "2020-11-06T18:58:46.000000Z", "issued_at": "2020-11-06T17:58:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:46.673 38 INFO tempest.lib.common.rest_client [req-316d1ce4-b506-42a4-a26b-8447b62787ab ] Request (AggregatesRbacTest:test_set_metadata_on_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles 0.053s 2020-11-06 17:58:46.674 38 DEBUG tempest.lib.common.rest_client [req-316d1ce4-b506-42a4-a26b-8447b62787ab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-316d1ce4-b506-42a4-a26b-8447b62787ab', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:46.674 39 INFO tempest.lib.common.rest_client [req-4da869b3-9a82-4043-9a17-35d6f2c9b3fa ] Request (FlavorManageRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.051s 2020-11-06 17:58:46.675 39 DEBUG tempest.lib.common.rest_client [req-4da869b3-9a82-4043-9a17-35d6f2c9b3fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4da869b3-9a82-4043-9a17-35d6f2c9b3fa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:46.735 39 INFO tempest.lib.common.rest_client [req-a21690c9-6bcf-4c32-bf6f-e49957a5464a ] Request (FlavorManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.058s 2020-11-06 17:58:46.735 39 DEBUG tempest.lib.common.rest_client [req-a21690c9-6bcf-4c32-bf6f-e49957a5464a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-FlavorManageRbacTest-427098385-desc", "domain_id": "default", "name": "tempest-FlavorManageRbacTest-427098385"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '376', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a21690c9-6bcf-4c32-bf6f-e49957a5464a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "cda4859de50848d2b0a5d9dac32cc585", "name": "tempest-FlavorManageRbacTest-427098385", "domain_id": "default", "description": "tempest-FlavorManageRbacTest-427098385-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/cda4859de50848d2b0a5d9dac32cc585"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:46.754 38 INFO tempest.lib.common.rest_client [req-fd477683-5715-4b2d-b6be-0aef74faaf85 ] Request (AggregatesRbacTest:test_set_metadata_on_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.079s 2020-11-06 17:58:46.755 38 DEBUG tempest.lib.common.rest_client [req-fd477683-5715-4b2d-b6be-0aef74faaf85 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fd477683-5715-4b2d-b6be-0aef74faaf85', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b9193b9c5b774f4598d6d6d5a73287c7", "name": "tempest-AggregatesRbacTest-591314769", "password_expires_at": null}, "audit_ids": ["cGcAhqRLSzG67lY9u78vYw"], "expires_at": "2020-11-06T18:58:46.000000Z", "issued_at": "2020-11-06T17:58:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "da822d4027d545cc9eb5f098de258d1d", "name": "tempest-AggregatesRbacTest-591314769"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:46.830 37 INFO tempest.lib.common.rest_client [req-660cb2e5-6a5c-4bd0-8fae-07fdce735ae0 ] Request (FlavorAccessRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/b13ad2e1-fa64-4a6a-90ca-bc8e38017a4a 1.425s 2020-11-06 17:58:46.830 37 DEBUG tempest.lib.common.rest_client [req-660cb2e5-6a5c-4bd0-8fae-07fdce735ae0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-660cb2e5-6a5c-4bd0-8fae-07fdce735ae0', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 17:58:46 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/b13ad2e1-fa64-4a6a-90ca-bc8e38017a4a'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:46.846 39 INFO tempest.lib.common.rest_client [req-1f67c709-f2b9-49d4-ae0e-f1c77b6ae333 ] Request (FlavorManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.109s 2020-11-06 17:58:46.846 39 DEBUG tempest.lib.common.rest_client [req-1f67c709-f2b9-49d4-ae0e-f1c77b6ae333 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-FlavorManageRbacTest-427098385", "password": "N8^_*~gFCn5KnYW", "project_id": "cda4859de50848d2b0a5d9dac32cc585", "email": "tempest-FlavorManageRbacTest-2103117834@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '395', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1f67c709-f2b9-49d4-ae0e-f1c77b6ae333', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "cda4859de50848d2b0a5d9dac32cc585", "email": "tempest-FlavorManageRbacTest-2103117834@example.com", "id": "4bf3cd599dc947eeb67c52b55538edc2", "name": "tempest-FlavorManageRbacTest-427098385", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/4bf3cd599dc947eeb67c52b55538edc2"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:46.901 39 INFO tempest.lib.common.rest_client [req-0292bd4a-5fed-4e29-92ea-518a3d060266 ] Request (FlavorManageRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.054s 2020-11-06 17:58:46.902 39 DEBUG tempest.lib.common.rest_client [req-0292bd4a-5fed-4e29-92ea-518a3d060266 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0292bd4a-5fed-4e29-92ea-518a3d060266', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:46.931 40 INFO tempest.lib.common.rest_client [req-30350690-7fae-4293-95e6-3937f6fe9291 ] Request (FloatingIpPoolsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=96f87d7b4aef486fbaef2d93fc9de92a&name=default 0.669s 2020-11-06 17:58:46.932 40 DEBUG tempest.lib.common.rest_client [req-30350690-7fae-4293-95e6-3937f6fe9291 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-30350690-7fae-4293-95e6-3937f6fe9291', 'date': 'Fri, 06 Nov 2020 17:58:46 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=96f87d7b4aef486fbaef2d93fc9de92a&name=default'} Body: b'{"security_groups": [{"id": "7c0241e2-d724-4048-9682-a19ba15cf335", "name": "default", "stateful": true, "tenant_id": "96f87d7b4aef486fbaef2d93fc9de92a", "description": "Default security group", "security_group_rules": [{"id": "0d31acba-54e6-445e-8b62-1b851bfe5738", "tenant_id": "96f87d7b4aef486fbaef2d93fc9de92a", "security_group_id": "7c0241e2-d724-4048-9682-a19ba15cf335", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "7c0241e2-d724-4048-9682-a19ba15cf335", "description": null, "tags": [], "created_at": "2020-11-06T17:58:46Z", "updated_at": "2020-11-06T17:58:46Z", "revision_number": 0, "project_id": "96f87d7b4aef486fbaef2d93fc9de92a"}, {"id": "6b29f5f9-0355-4b56-a49a-6e61b9938c1c", "tenant_id": "96f87d7b4aef486fbaef2d93fc9de92a", "security_group_id": "7c0241e2-d724-4048-9682-a19ba15cf335", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:58:46Z", "updated_at": "2020-11-06T17:58:46Z", "revision_number": 0, "project_id": "96f87d7b4aef486fbaef2d93fc9de92a"}, {"id": "b47b8a5c-60f5-437a-a9e0-217544b632e5", "tenant_id": "96f87d7b4aef486fbaef2d93fc9de92a", "security_group_id": "7c0241e2-d724-4048-9682-a19ba15cf335", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:58:46Z", "updated_at": "2020-11-06T17:58:46Z", "revision_number": 0, "project_id": "96f87d7b4aef486fbaef2d93fc9de92a"}, {"id": "fbdd5908-acb3-4a27-a93e-0fd44dee581e", "tenant_id": "96f87d7b4aef486fbaef2d93fc9de92a", "security_group_id": "7c0241e2-d724-4048-9682-a19ba15cf335", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "7c0241e2-d724-4048-9682-a19ba15cf335", "description": null, "tags": [], "created_at": "2020-11-06T17:58:46Z", "updated_at": "2020-11-06T17:58:46Z", "revision_number": 0, "project_id": "96f87d7b4aef486fbaef2d93fc9de92a"}], "tags": [], "created_at": "2020-11-06T17:58:46Z", "updated_at": "2020-11-06T17:58:46Z", "revision_number": 1, "project_id": "96f87d7b4aef486fbaef2d93fc9de92a"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:46.937 37 INFO tempest.lib.common.rest_client [req-4753496f-cf5f-40a6-97a5-c71bd3eefb05 ] Request (FlavorAccessRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/52c3dff7ef9f46f98e2c0e166df4f162 0.106s 2020-11-06 17:58:46.938 37 DEBUG tempest.lib.common.rest_client [req-4753496f-cf5f-40a6-97a5-c71bd3eefb05 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4753496f-cf5f-40a6-97a5-c71bd3eefb05', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/52c3dff7ef9f46f98e2c0e166df4f162'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:46.998 39 INFO tempest.lib.common.rest_client [req-37809620-e742-4f0d-a780-8b10c1ee49d5 ] Request (FlavorManageRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.095s 2020-11-06 17:58:46.998 39 DEBUG tempest.lib.common.rest_client [req-37809620-e742-4f0d-a780-8b10c1ee49d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-37809620-e742-4f0d-a780-8b10c1ee49d5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.028 37 INFO tempest.lib.common.rest_client [req-479b64d0-ceb6-4048-832f-16bb794b0292 ] Request (FloatingIpsBulkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 17:58:47.028 37 DEBUG tempest.lib.common.rest_client [req-479b64d0-ceb6-4048-832f-16bb794b0292 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-479b64d0-ceb6-4048-832f-16bb794b0292', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["aKwWYI13RMatA50JO75y6A"], "expires_at": "2020-11-06T18:58:46.000000Z", "issued_at": "2020-11-06T17:58:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.058 40 INFO tempest.lib.common.rest_client [req-d4de3288-19d3-4b91-9bdc-bf626582a5d8 ] Request (FloatingIpPoolsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/7c0241e2-d724-4048-9682-a19ba15cf335 0.125s 2020-11-06 17:58:47.059 40 DEBUG tempest.lib.common.rest_client [req-d4de3288-19d3-4b91-9bdc-bf626582a5d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-d4de3288-19d3-4b91-9bdc-bf626582a5d8', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/7c0241e2-d724-4048-9682-a19ba15cf335'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.069 39 INFO tempest.lib.common.rest_client [req-eaea7f82-4dcd-4306-ac04-ae6cf29e1980 ] Request (FlavorManageRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/cda4859de50848d2b0a5d9dac32cc585/users/4bf3cd599dc947eeb67c52b55538edc2/roles/72a4576c553448cd941b052c1ca0cf2d 0.069s 2020-11-06 17:58:47.069 39 DEBUG tempest.lib.common.rest_client [req-eaea7f82-4dcd-4306-ac04-ae6cf29e1980 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eaea7f82-4dcd-4306-ac04-ae6cf29e1980', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/cda4859de50848d2b0a5d9dac32cc585/users/4bf3cd599dc947eeb67c52b55538edc2/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.070 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FlavorManageRbacTest-427098385', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'cda4859de50848d2b0a5d9dac32cc585', 'project_name': 'tempest-FlavorManageRbacTest-427098385', 'tenant_id': 'cda4859de50848d2b0a5d9dac32cc585', 'tenant_name': 'tempest-FlavorManageRbacTest-427098385', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '4bf3cd599dc947eeb67c52b55538edc2'}, Network: None, Subnet: None, Router: None 2020-11-06 17:58:47.071 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FlavorManageRbacTest-427098385', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'cda4859de50848d2b0a5d9dac32cc585', 'project_name': 'tempest-FlavorManageRbacTest-427098385', 'tenant_id': 'cda4859de50848d2b0a5d9dac32cc585', 'tenant_name': 'tempest-FlavorManageRbacTest-427098385', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '4bf3cd599dc947eeb67c52b55538edc2'}, Network: None, Subnet: None, Router: None 2020-11-06 17:58:47.103 38 INFO tempest.lib.common.rest_client [req-393fee4c-bc7b-4344-8996-e318cbb7621b ] Request (AggregatesRbacTest:test_set_metadata_on_aggregate_rbac): 200 POST http://172.30.13.94/compute/v2.1/os-aggregates/1052/action 0.347s 2020-11-06 17:58:47.104 38 DEBUG tempest.lib.common.rest_client [req-393fee4c-bc7b-4344-8996-e318cbb7621b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"set_metadata": {"metadata": {"tempest-AggregatesRbacTest-key-2031050908": "tempest-AggregatesRbacTest-val-1005083234"}}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '355', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-393fee4c-bc7b-4344-8996-e318cbb7621b', 'x-compute-request-id': 'req-393fee4c-bc7b-4344-8996-e318cbb7621b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/1052/action'} Body: b'{"aggregate": {"id": 1052, "name": "tempest-AggregatesRbacTest-aggregate-225486877", "hosts": [], "metadata": {"tempest-AggregatesRbacTest-key-2031050908": "tempest-AggregatesRbacTest-val-1005083234"}, "created_at": "2020-11-06T17:58:47.000000", "updated_at": "2020-11-06T17:58:47.100739", "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.109 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:47.133 37 INFO tempest.lib.common.rest_client [req-d443074e-463f-4a60-a63a-c975014abd53 ] Request (FloatingIpsBulkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-11-06 17:58:47.134 37 DEBUG tempest.lib.common.rest_client [req-d443074e-463f-4a60-a63a-c975014abd53 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d443074e-463f-4a60-a63a-c975014abd53', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["aLm9HdrtQuq9iQxi0LoAEg"], "expires_at": "2020-11-06T18:58:47.000000Z", "issued_at": "2020-11-06T17:58:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.163 38 INFO tempest.lib.common.rest_client [req-4d3c1fdb-1c47-4c1b-82ad-a980d192343f ] Request (AggregatesRbacTest:test_set_metadata_on_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles 0.053s 2020-11-06 17:58:47.163 38 DEBUG tempest.lib.common.rest_client [req-4d3c1fdb-1c47-4c1b-82ad-a980d192343f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4d3c1fdb-1c47-4c1b-82ad-a980d192343f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.181 37 INFO tempest.lib.common.rest_client [req-bb6bd3a4-1e0c-4949-9ba9-645b756438a2 ] Request (FloatingIpsBulkRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.046s 2020-11-06 17:58:47.181 37 DEBUG tempest.lib.common.rest_client [req-bb6bd3a4-1e0c-4949-9ba9-645b756438a2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bb6bd3a4-1e0c-4949-9ba9-645b756438a2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.229 40 INFO tempest.lib.common.rest_client [req-d28bb4fc-e8e0-4a9e-a75d-c26e98bdc1c4 ] Request (FloatingIpPoolsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/96f87d7b4aef486fbaef2d93fc9de92a 0.169s 2020-11-06 17:58:47.229 40 DEBUG tempest.lib.common.rest_client [req-d28bb4fc-e8e0-4a9e-a75d-c26e98bdc1c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d28bb4fc-e8e0-4a9e-a75d-c26e98bdc1c4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/96f87d7b4aef486fbaef2d93fc9de92a'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.236 38 INFO tempest.lib.common.rest_client [req-221bf69d-747f-4227-8c9e-4ec848780a63 ] Request (AggregatesRbacTest:test_set_metadata_on_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.072s 2020-11-06 17:58:47.237 38 DEBUG tempest.lib.common.rest_client [req-221bf69d-747f-4227-8c9e-4ec848780a63 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-221bf69d-747f-4227-8c9e-4ec848780a63', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b9193b9c5b774f4598d6d6d5a73287c7", "name": "tempest-AggregatesRbacTest-591314769", "password_expires_at": null}, "audit_ids": ["c5nbKbT-RQuer1M6uWjFig"], "expires_at": "2020-11-06T18:58:47.000000Z", "issued_at": "2020-11-06T17:58:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "da822d4027d545cc9eb5f098de258d1d", "name": "tempest-AggregatesRbacTest-591314769"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.270 39 INFO tempest.lib.common.rest_client [req-92393806-57f7-48a7-84df-a978c0d6438a ] Request (FlavorManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.189s 2020-11-06 17:58:47.270 39 DEBUG tempest.lib.common.rest_client [req-92393806-57f7-48a7-84df-a978c0d6438a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6569', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-92393806-57f7-48a7-84df-a978c0d6438a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4bf3cd599dc947eeb67c52b55538edc2", "name": "tempest-FlavorManageRbacTest-427098385", "password_expires_at": null}, "audit_ids": ["zyVFPgkkRxGFTdZVPibFow"], "expires_at": "2020-11-06T18:58:47.000000Z", "issued_at": "2020-11-06T17:58:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cda4859de50848d2b0a5d9dac32cc585", "name": "tempest-FlavorManageRbacTest-427098385"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cda4859de50848d2b0a5d9dac32cc585", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cda4859de50848d2b0a5d9dac32cc585", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cda4859de50848d2b0a5d9dac32cc585", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cda4859de50848d2b0a5d9dac32cc585", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cda4859de50848d2b0a5d9dac32cc585", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cda4859de50848d2b0a5d9dac32cc585", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.3 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.302 37 INFO tempest.lib.common.rest_client [req-d33dd3de-af8e-4edc-acdd-2819a4d070c8 ] Request (FloatingIpsBulkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.119s 2020-11-06 17:58:47.303 37 DEBUG tempest.lib.common.rest_client [req-d33dd3de-af8e-4edc-acdd-2819a4d070c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-FloatingIpsBulkRbacTest-1414384920-desc", "domain_id": "default", "name": "tempest-FloatingIpsBulkRbacTest-1414384920"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '384', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d33dd3de-af8e-4edc-acdd-2819a4d070c8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "718ff25b795b46c3b189e526c35eade2", "name": "tempest-FloatingIpsBulkRbacTest-1414384920", "domain_id": "default", "description": "tempest-FloatingIpsBulkRbacTest-1414384920-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/718ff25b795b46c3b189e526c35eade2"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.304 39 INFO tempest.lib.common.rest_client [req-470b2025-8d6a-4dce-aa33-40168b21d8ee ] Request (FlavorManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 17:58:47.304 39 DEBUG tempest.lib.common.rest_client [req-470b2025-8d6a-4dce-aa33-40168b21d8ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-470b2025-8d6a-4dce-aa33-40168b21d8ee', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["dKh1oMOpQiSbpjaC2dP-6Q"], "expires_at": "2020-11-06T18:58:47.000000Z", "issued_at": "2020-11-06T17:58:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.310 40 INFO tempest.lib.common.rest_client [req-bc1f9bbf-c26e-43a6-8489-f44c3e107c21 ] Request (ImageSizeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-11-06 17:58:47.311 40 DEBUG tempest.lib.common.rest_client [req-bc1f9bbf-c26e-43a6-8489-f44c3e107c21 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bc1f9bbf-c26e-43a6-8489-f44c3e107c21', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["DCrKvYXPQxiPZXW6_IwgKg"], "expires_at": "2020-11-06T18:58:47.000000Z", "issued_at": "2020-11-06T17:58:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.397 37 INFO tempest.lib.common.rest_client [req-df59d4f2-dda7-43ed-a809-d36fc76fbe13 ] Request (FloatingIpsBulkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.093s 2020-11-06 17:58:47.397 37 DEBUG tempest.lib.common.rest_client [req-df59d4f2-dda7-43ed-a809-d36fc76fbe13 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-FloatingIpsBulkRbacTest-1414384920", "password": "E7^QG75_~@#6pI2", "project_id": "718ff25b795b46c3b189e526c35eade2", "email": "tempest-FloatingIpsBulkRbacTest-1055481127@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '402', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-df59d4f2-dda7-43ed-a809-d36fc76fbe13', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "718ff25b795b46c3b189e526c35eade2", "email": "tempest-FloatingIpsBulkRbacTest-1055481127@example.com", "id": "bc08333e305f476590c851d4a6820020", "name": "tempest-FloatingIpsBulkRbacTest-1414384920", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/bc08333e305f476590c851d4a6820020"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.398 39 INFO tempest.lib.common.rest_client [req-40d5e418-70eb-4a33-8608-ea7c81d75c69 ] Request (FlavorManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 17:58:47.398 39 DEBUG tempest.lib.common.rest_client [req-40d5e418-70eb-4a33-8608-ea7c81d75c69 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-40d5e418-70eb-4a33-8608-ea7c81d75c69', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["5GaGE-64RPii3h7R__3Xgw"], "expires_at": "2020-11-06T18:58:47.000000Z", "issued_at": "2020-11-06T17:58:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.398 40 INFO tempest.lib.common.rest_client [req-db34b88d-32ed-4036-b689-15fcf876d53c ] Request (ImageSizeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.079s 2020-11-06 17:58:47.399 40 DEBUG tempest.lib.common.rest_client [req-db34b88d-32ed-4036-b689-15fcf876d53c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-db34b88d-32ed-4036-b689-15fcf876d53c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["gd0XKRIUTdKtnfYZwnlv8A"], "expires_at": "2020-11-06T18:58:47.000000Z", "issued_at": "2020-11-06T17:58:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.448 37 INFO tempest.lib.common.rest_client [req-15b0ef54-226b-4b30-8b46-81cd9a1d0ad9 ] Request (FloatingIpsBulkRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.049s 2020-11-06 17:58:47.448 40 INFO tempest.lib.common.rest_client [req-c0dc5d7d-c8c5-4446-a05e-5bf7300cd4e0 ] Request (ImageSizeRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.048s 2020-11-06 17:58:47.448 37 DEBUG tempest.lib.common.rest_client [req-15b0ef54-226b-4b30-8b46-81cd9a1d0ad9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-15b0ef54-226b-4b30-8b46-81cd9a1d0ad9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.449 40 DEBUG tempest.lib.common.rest_client [req-c0dc5d7d-c8c5-4446-a05e-5bf7300cd4e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c0dc5d7d-c8c5-4446-a05e-5bf7300cd4e0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.451 39 INFO tempest.lib.common.rest_client [req-5748af32-f45b-43a0-8bae-0e830d2907b8 ] Request (FlavorManageRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.052s 2020-11-06 17:58:47.452 39 DEBUG tempest.lib.common.rest_client [req-5748af32-f45b-43a0-8bae-0e830d2907b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5748af32-f45b-43a0-8bae-0e830d2907b8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.494 37 INFO tempest.lib.common.rest_client [req-30889132-e8f6-4100-a59c-6e6c6829e339 ] Request (FloatingIpsBulkRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.044s 2020-11-06 17:58:47.495 37 DEBUG tempest.lib.common.rest_client [req-30889132-e8f6-4100-a59c-6e6c6829e339 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-30889132-e8f6-4100-a59c-6e6c6829e339', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.501 39 INFO tempest.lib.common.rest_client [req-d1c10fdc-5c2f-4fe2-8595-37d8dd8d1866 ] Request (FlavorManageRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.049s 2020-11-06 17:58:47.502 39 DEBUG tempest.lib.common.rest_client [req-d1c10fdc-5c2f-4fe2-8595-37d8dd8d1866 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d1c10fdc-5c2f-4fe2-8595-37d8dd8d1866', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.503 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 17:58:47.503 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:47.522 38 INFO tempest.lib.common.rest_client [req-a461cb82-65cb-4835-bfa5-89bd463cdad6 ] Request (AggregatesRbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/compute/v2.1/os-aggregates/1052 0.283s 2020-11-06 17:58:47.522 38 DEBUG tempest.lib.common.rest_client [req-a461cb82-65cb-4835-bfa5-89bd463cdad6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a461cb82-65cb-4835-bfa5-89bd463cdad6', 'x-compute-request-id': 'req-a461cb82-65cb-4835-bfa5-89bd463cdad6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/1052'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.522 40 INFO tempest.lib.common.rest_client [req-b4168e6e-acfb-41c6-b1d3-10f06be3f9c9 ] Request (ImageSizeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.072s 2020-11-06 17:58:47.523 40 DEBUG tempest.lib.common.rest_client [req-b4168e6e-acfb-41c6-b1d3-10f06be3f9c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ImageSizeRbacTest-906855230-desc", "domain_id": "default", "name": "tempest-ImageSizeRbacTest-906855230"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '370', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b4168e6e-acfb-41c6-b1d3-10f06be3f9c9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "f963a49197e542539fb0c81dd0072602", "name": "tempest-ImageSizeRbacTest-906855230", "domain_id": "default", "description": "tempest-ImageSizeRbacTest-906855230-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/f963a49197e542539fb0c81dd0072602"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.525 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:58:47.526 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.526 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.527 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.527 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.527 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.528 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.528 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.529 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.529 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.529 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.530 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.530 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.530 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.530 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.531 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.531 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.531 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.532 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.532 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.532 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.533 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.533 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.533 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.533 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.534 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.534 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.534 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.535 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.535 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.535 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.535 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.536 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.536 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.536 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.537 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.537 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.538 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.538 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.538 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.538 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.539 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.539 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.539 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.540 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.540 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.540 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.541 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.541 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.541 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.542 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.542 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.542 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.543 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.543 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.543 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.543 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.544 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.544 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.545 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.545 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.545 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.546 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.546 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.546 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.547 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.547 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.547 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.548 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.548 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.548 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.549 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.549 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.549 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.549 39 INFO tempest.lib.common.rest_client [req-05b1c5ab-42bd-4e00-b08a-5df727eb6851 ] Request (FlavorManageRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/cda4859de50848d2b0a5d9dac32cc585/users/4bf3cd599dc947eeb67c52b55538edc2/roles 0.046s 2020-11-06 17:58:47.550 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.550 39 DEBUG tempest.lib.common.rest_client [req-05b1c5ab-42bd-4e00-b08a-5df727eb6851 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-05b1c5ab-42bd-4e00-b08a-5df727eb6851', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cda4859de50848d2b0a5d9dac32cc585/users/4bf3cd599dc947eeb67c52b55538edc2/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cda4859de50848d2b0a5d9dac32cc585/users/4bf3cd599dc947eeb67c52b55538edc2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.550 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:47.551 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-aggregates:show, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:58:47.560 37 INFO tempest.lib.common.rest_client [req-5552e525-6572-4b3e-8571-c9806343bdb1 ] Request (FloatingIpsBulkRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/718ff25b795b46c3b189e526c35eade2/users/bc08333e305f476590c851d4a6820020/roles/72a4576c553448cd941b052c1ca0cf2d 0.064s 2020-11-06 17:58:47.561 37 DEBUG tempest.lib.common.rest_client [req-5552e525-6572-4b3e-8571-c9806343bdb1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5552e525-6572-4b3e-8571-c9806343bdb1', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/718ff25b795b46c3b189e526c35eade2/users/bc08333e305f476590c851d4a6820020/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.562 37 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FloatingIpsBulkRbacTest-1414384920', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '718ff25b795b46c3b189e526c35eade2', 'project_name': 'tempest-FloatingIpsBulkRbacTest-1414384920', 'tenant_id': '718ff25b795b46c3b189e526c35eade2', 'tenant_name': 'tempest-FloatingIpsBulkRbacTest-1414384920', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'bc08333e305f476590c851d4a6820020'}, Network: None, Subnet: None, Router: None 2020-11-06 17:58:47.562 37 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FloatingIpsBulkRbacTest-1414384920', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '718ff25b795b46c3b189e526c35eade2', 'project_name': 'tempest-FloatingIpsBulkRbacTest-1414384920', 'tenant_id': '718ff25b795b46c3b189e526c35eade2', 'tenant_name': 'tempest-FloatingIpsBulkRbacTest-1414384920', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'bc08333e305f476590c851d4a6820020'}, Network: None, Subnet: None, Router: None 2020-11-06 17:58:47.603 38 INFO tempest.lib.common.rest_client [req-f7340bf4-2538-4abc-9dc1-163e44e14d67 ] Request (AggregatesRbacTest:test_show_aggregate_rbac): 200 POST http://172.30.13.94/compute/v2.1/os-aggregates 0.051s 2020-11-06 17:58:47.604 38 DEBUG tempest.lib.common.rest_client [req-f7340bf4-2538-4abc-9dc1-163e44e14d67 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"aggregate": {"name": "tempest-AggregatesRbacTest-aggregate-1472603873"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '215', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f7340bf4-2538-4abc-9dc1-163e44e14d67', 'x-compute-request-id': 'req-f7340bf4-2538-4abc-9dc1-163e44e14d67', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates'} Body: b'{"aggregate": {"id": 1053, "name": "tempest-AggregatesRbacTest-aggregate-1472603873", "created_at": "2020-11-06T17:58:47.576811", "updated_at": null, "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.610 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:47.633 40 INFO tempest.lib.common.rest_client [req-7cb9f503-63d7-4950-8048-a7a8f0a1bfb7 ] Request (ImageSizeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.109s 2020-11-06 17:58:47.633 40 DEBUG tempest.lib.common.rest_client [req-7cb9f503-63d7-4950-8048-a7a8f0a1bfb7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ImageSizeRbacTest-906855230", "password": "D1@g@fN!N&AwyJC", "project_id": "f963a49197e542539fb0c81dd0072602", "email": "tempest-ImageSizeRbacTest-1462558312@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '389', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7cb9f503-63d7-4950-8048-a7a8f0a1bfb7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "f963a49197e542539fb0c81dd0072602", "email": "tempest-ImageSizeRbacTest-1462558312@example.com", "id": "a39e0503c0f645ca9e8584057f3ab34c", "name": "tempest-ImageSizeRbacTest-906855230", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/a39e0503c0f645ca9e8584057f3ab34c"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.665 39 INFO tempest.lib.common.rest_client [req-a9f0d2cb-134d-4dcd-8557-51ab3d0470df ] Request (FlavorManageRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/cda4859de50848d2b0a5d9dac32cc585/users/4bf3cd599dc947eeb67c52b55538edc2/roles/72a4576c553448cd941b052c1ca0cf2d 0.114s 2020-11-06 17:58:47.665 39 DEBUG tempest.lib.common.rest_client [req-a9f0d2cb-134d-4dcd-8557-51ab3d0470df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a9f0d2cb-134d-4dcd-8557-51ab3d0470df', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/cda4859de50848d2b0a5d9dac32cc585/users/4bf3cd599dc947eeb67c52b55538edc2/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.667 37 INFO tempest.lib.common.rest_client [req-79d4b762-cc28-415b-99cb-7b6f210b9394 ] Request (FloatingIpsBulkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-11-06 17:58:47.668 37 DEBUG tempest.lib.common.rest_client [req-79d4b762-cc28-415b-99cb-7b6f210b9394 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6577', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-79d4b762-cc28-415b-99cb-7b6f210b9394', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bc08333e305f476590c851d4a6820020", "name": "tempest-FloatingIpsBulkRbacTest-1414384920", "password_expires_at": null}, "audit_ids": ["BEF9Va38SCG6BkLy4UjUSw"], "expires_at": "2020-11-06T18:58:47.000000Z", "issued_at": "2020-11-06T17:58:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "718ff25b795b46c3b189e526c35eade2", "name": "tempest-FloatingIpsBulkRbacTest-1414384920"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/718ff25b795b46c3b189e526c35eade2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/718ff25b795b46c3b189e526c35eade2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/718ff25b795b46c3b189e526c35eade2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_718ff25b795b46c3b189e526c35eade2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_718ff25b795b46c3b189e526c35eade2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_718ff25b795b46c3b189e526c35eade2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.669 38 INFO tempest.lib.common.rest_client [req-46daebbc-1832-4114-8d86-8fcabd429454 ] Request (AggregatesRbacTest:test_show_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles 0.057s 2020-11-06 17:58:47.669 38 DEBUG tempest.lib.common.rest_client [req-46daebbc-1832-4114-8d86-8fcabd429454 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-46daebbc-1832-4114-8d86-8fcabd429454', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.686 40 INFO tempest.lib.common.rest_client [req-4d459cef-f54e-4253-9eba-aa829b57a294 ] Request (ImageSizeRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.051s 2020-11-06 17:58:47.686 40 DEBUG tempest.lib.common.rest_client [req-4d459cef-f54e-4253-9eba-aa829b57a294 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4d459cef-f54e-4253-9eba-aa829b57a294', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.758 38 INFO tempest.lib.common.rest_client [req-979ac156-03a7-4930-81cc-71446dab42b1 ] Request (AggregatesRbacTest:test_show_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 17:58:47.758 37 INFO tempest.lib.common.rest_client [req-90c948a5-644f-42a1-8563-ab6aa821f722 ] Request (FloatingIpsBulkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-11-06 17:58:47.759 37 DEBUG tempest.lib.common.rest_client [req-90c948a5-644f-42a1-8563-ab6aa821f722 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-90c948a5-644f-42a1-8563-ab6aa821f722', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["IhsW1J2-STukRUc3oVA67g"], "expires_at": "2020-11-06T18:58:47.000000Z", "issued_at": "2020-11-06T17:58:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.759 38 DEBUG tempest.lib.common.rest_client [req-979ac156-03a7-4930-81cc-71446dab42b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-979ac156-03a7-4930-81cc-71446dab42b1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b9193b9c5b774f4598d6d6d5a73287c7", "name": "tempest-AggregatesRbacTest-591314769", "password_expires_at": null}, "audit_ids": ["qLj1gxreSHSVX0ifpyZCgA"], "expires_at": "2020-11-06T18:58:47.000000Z", "issued_at": "2020-11-06T17:58:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "da822d4027d545cc9eb5f098de258d1d", "name": "tempest-AggregatesRbacTest-591314769"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.777 39 INFO tempest.lib.common.rest_client [req-783d5275-22f7-4950-bbb8-0b2e86ca0157 ] Request (FlavorManageRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/cda4859de50848d2b0a5d9dac32cc585/users/4bf3cd599dc947eeb67c52b55538edc2/roles/a629c95d64b3416fb80ae90af4f69c05 0.110s 2020-11-06 17:58:47.777 39 DEBUG tempest.lib.common.rest_client [req-783d5275-22f7-4950-bbb8-0b2e86ca0157 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-783d5275-22f7-4950-bbb8-0b2e86ca0157', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/cda4859de50848d2b0a5d9dac32cc585/users/4bf3cd599dc947eeb67c52b55538edc2/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.783 40 INFO tempest.lib.common.rest_client [req-ec4b2cfd-d89e-4edf-acab-c736d87ff5ea ] Request (ImageSizeRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.096s 2020-11-06 17:58:47.784 40 DEBUG tempest.lib.common.rest_client [req-ec4b2cfd-d89e-4edf-acab-c736d87ff5ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ec4b2cfd-d89e-4edf-acab-c736d87ff5ea', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.847 37 INFO tempest.lib.common.rest_client [req-c97fbee9-5e20-421a-bb9b-aaacab0f6c12 ] Request (FloatingIpsBulkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.080s 2020-11-06 17:58:47.847 37 DEBUG tempest.lib.common.rest_client [req-c97fbee9-5e20-421a-bb9b-aaacab0f6c12 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c97fbee9-5e20-421a-bb9b-aaacab0f6c12', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["MkGQRp9tSlyVmYgILa8x6Q"], "expires_at": "2020-11-06T18:58:47.000000Z", "issued_at": "2020-11-06T17:58:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.901 37 INFO tempest.lib.common.rest_client [req-2da5cae8-2269-4b01-a83e-5bb2f2246240 ] Request (FloatingIpsBulkRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.052s 2020-11-06 17:58:47.901 37 DEBUG tempest.lib.common.rest_client [req-2da5cae8-2269-4b01-a83e-5bb2f2246240 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2da5cae8-2269-4b01-a83e-5bb2f2246240', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.903 40 INFO tempest.lib.common.rest_client [req-8a158731-5821-4d1d-884f-b4297ebccc4b ] Request (ImageSizeRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/f963a49197e542539fb0c81dd0072602/users/a39e0503c0f645ca9e8584057f3ab34c/roles/72a4576c553448cd941b052c1ca0cf2d 0.118s 2020-11-06 17:58:47.903 40 DEBUG tempest.lib.common.rest_client [req-8a158731-5821-4d1d-884f-b4297ebccc4b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8a158731-5821-4d1d-884f-b4297ebccc4b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/f963a49197e542539fb0c81dd0072602/users/a39e0503c0f645ca9e8584057f3ab34c/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:47.903 40 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImageSizeRbacTest-906855230', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'f963a49197e542539fb0c81dd0072602', 'project_name': 'tempest-ImageSizeRbacTest-906855230', 'tenant_id': 'f963a49197e542539fb0c81dd0072602', 'tenant_name': 'tempest-ImageSizeRbacTest-906855230', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'a39e0503c0f645ca9e8584057f3ab34c'}, Network: None, Subnet: None, Router: None 2020-11-06 17:58:47.904 40 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImageSizeRbacTest-906855230', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'f963a49197e542539fb0c81dd0072602', 'project_name': 'tempest-ImageSizeRbacTest-906855230', 'tenant_id': 'f963a49197e542539fb0c81dd0072602', 'tenant_name': 'tempest-ImageSizeRbacTest-906855230', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'a39e0503c0f645ca9e8584057f3ab34c'}, Network: None, Subnet: None, Router: None 2020-11-06 17:58:47.999 37 INFO tempest.lib.common.rest_client [req-b6c2cc51-1931-46bc-af0f-11fea19bf32d ] Request (FloatingIpsBulkRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.097s 2020-11-06 17:58:48.000 37 DEBUG tempest.lib.common.rest_client [req-b6c2cc51-1931-46bc-af0f-11fea19bf32d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b6c2cc51-1931-46bc-af0f-11fea19bf32d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:48.001 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 17:58:48.001 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:48.011 40 INFO tempest.lib.common.rest_client [req-15f46127-73cd-4edf-8ff0-ea8f62c9bfa4 ] Request (ImageSizeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.101s 2020-11-06 17:58:48.011 40 DEBUG tempest.lib.common.rest_client [req-15f46127-73cd-4edf-8ff0-ea8f62c9bfa4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6563', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-15f46127-73cd-4edf-8ff0-ea8f62c9bfa4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a39e0503c0f645ca9e8584057f3ab34c", "name": "tempest-ImageSizeRbacTest-906855230", "password_expires_at": null}, "audit_ids": ["9EGLS6nuQHuOk_-1HPtlKg"], "expires_at": "2020-11-06T18:58:47.000000Z", "issued_at": "2020-11-06T17:58:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f963a49197e542539fb0c81dd0072602", "name": "tempest-ImageSizeRbacTest-906855230"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f963a49197e542539fb0c81dd0072602", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f963a49197e542539fb0c81dd0072602", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f963a49197e542539fb0c81dd0072602", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f963a49197e542539fb0c81dd0072602", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f963a49197e542539fb0c81dd0072602", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f963a49197e542539fb0c81dd0072602", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:48.013 38 INFO tempest.lib.common.rest_client [req-94d4f596-927b-4272-a584-b36ee71801b4 ] Request (AggregatesRbacTest:test_show_aggregate_rbac): 200 GET http://172.30.13.94/compute/v2.1/os-aggregates/1053 0.253s 2020-11-06 17:58:48.013 38 DEBUG tempest.lib.common.rest_client [req-94d4f596-927b-4272-a584-b36ee71801b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '244', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-94d4f596-927b-4272-a584-b36ee71801b4', 'x-compute-request-id': 'req-94d4f596-927b-4272-a584-b36ee71801b4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/1053'} Body: b'{"aggregate": {"id": 1053, "name": "tempest-AggregatesRbacTest-aggregate-1472603873", "hosts": [], "metadata": {}, "created_at": "2020-11-06T17:58:48.000000", "updated_at": null, "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:48.019 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:48.045 40 INFO tempest.lib.common.rest_client [req-fd475215-0ae4-4415-8e85-70dd821850f5 ] Request (ImageSizeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 17:58:48.046 40 DEBUG tempest.lib.common.rest_client [req-fd475215-0ae4-4415-8e85-70dd821850f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fd475215-0ae4-4415-8e85-70dd821850f5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["FqDrExtBS2mupV8tJcOT3A"], "expires_at": "2020-11-06T18:58:48.000000Z", "issued_at": "2020-11-06T17:58:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:48.048 37 INFO tempest.lib.common.rest_client [req-092232f1-8722-481f-8cb1-46b6e983cfc3 ] Request (FloatingIpsBulkRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/718ff25b795b46c3b189e526c35eade2/users/bc08333e305f476590c851d4a6820020/roles 0.046s 2020-11-06 17:58:48.049 37 DEBUG tempest.lib.common.rest_client [req-092232f1-8722-481f-8cb1-46b6e983cfc3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-092232f1-8722-481f-8cb1-46b6e983cfc3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/718ff25b795b46c3b189e526c35eade2/users/bc08333e305f476590c851d4a6820020/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/718ff25b795b46c3b189e526c35eade2/users/bc08333e305f476590c851d4a6820020/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:48.077 38 INFO tempest.lib.common.rest_client [req-3a26e49b-e5aa-49e2-873e-29f8d2b53db0 ] Request (AggregatesRbacTest:test_show_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles 0.057s 2020-11-06 17:58:48.077 38 DEBUG tempest.lib.common.rest_client [req-3a26e49b-e5aa-49e2-873e-29f8d2b53db0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3a26e49b-e5aa-49e2-873e-29f8d2b53db0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:48.099 40 INFO tempest.lib.common.rest_client [req-f527e2eb-e4cb-4ca2-8120-3415002ef849 ] Request (ImageSizeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-11-06 17:58:48.100 40 DEBUG tempest.lib.common.rest_client [req-f527e2eb-e4cb-4ca2-8120-3415002ef849 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f527e2eb-e4cb-4ca2-8120-3415002ef849', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["PY-LhFWXQrKNRHC6XHabkA"], "expires_at": "2020-11-06T18:58:48.000000Z", "issued_at": "2020-11-06T17:58:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:48.108 37 INFO tempest.lib.common.rest_client [req-4ae56b17-55fc-4f1f-9c1f-667a4965b030 ] Request (FloatingIpsBulkRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/718ff25b795b46c3b189e526c35eade2/users/bc08333e305f476590c851d4a6820020/roles/72a4576c553448cd941b052c1ca0cf2d 0.058s 2020-11-06 17:58:48.108 37 DEBUG tempest.lib.common.rest_client [req-4ae56b17-55fc-4f1f-9c1f-667a4965b030 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4ae56b17-55fc-4f1f-9c1f-667a4965b030', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/718ff25b795b46c3b189e526c35eade2/users/bc08333e305f476590c851d4a6820020/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:48.156 38 INFO tempest.lib.common.rest_client [req-a1019493-2b9c-45b5-8018-656e4a27856a ] Request (AggregatesRbacTest:test_show_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.077s 2020-11-06 17:58:48.156 38 DEBUG tempest.lib.common.rest_client [req-a1019493-2b9c-45b5-8018-656e4a27856a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a1019493-2b9c-45b5-8018-656e4a27856a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b9193b9c5b774f4598d6d6d5a73287c7", "name": "tempest-AggregatesRbacTest-591314769", "password_expires_at": null}, "audit_ids": ["cSF8SCkiTTuEOgLw8Ysp0w"], "expires_at": "2020-11-06T18:58:48.000000Z", "issued_at": "2020-11-06T17:58:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "da822d4027d545cc9eb5f098de258d1d", "name": "tempest-AggregatesRbacTest-591314769"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:48.201 40 INFO tempest.lib.common.rest_client [req-b5f0f8f6-83de-4e42-9765-0e89374aa6e0 ] Request (ImageSizeRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.100s 2020-11-06 17:58:48.202 40 DEBUG tempest.lib.common.rest_client [req-b5f0f8f6-83de-4e42-9765-0e89374aa6e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b5f0f8f6-83de-4e42-9765-0e89374aa6e0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:48.215 37 INFO tempest.lib.common.rest_client [req-7aa436c0-200b-4175-80a4-182792e7affd ] Request (FloatingIpsBulkRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/718ff25b795b46c3b189e526c35eade2/users/bc08333e305f476590c851d4a6820020/roles/a629c95d64b3416fb80ae90af4f69c05 0.105s 2020-11-06 17:58:48.215 37 DEBUG tempest.lib.common.rest_client [req-7aa436c0-200b-4175-80a4-182792e7affd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7aa436c0-200b-4175-80a4-182792e7affd', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/718ff25b795b46c3b189e526c35eade2/users/bc08333e305f476590c851d4a6820020/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:48.310 40 INFO tempest.lib.common.rest_client [req-8db5a08c-e2e8-4934-a404-a754b9b03096 ] Request (ImageSizeRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.107s 2020-11-06 17:58:48.310 40 DEBUG tempest.lib.common.rest_client [req-8db5a08c-e2e8-4934-a404-a754b9b03096 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8db5a08c-e2e8-4934-a404-a754b9b03096', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:48.311 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 17:58:48.311 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:48.373 40 INFO tempest.lib.common.rest_client [req-503cefd4-6bac-49dd-a10f-ccc02df46ed7 ] Request (ImageSizeRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/f963a49197e542539fb0c81dd0072602/users/a39e0503c0f645ca9e8584057f3ab34c/roles 0.060s 2020-11-06 17:58:48.373 40 DEBUG tempest.lib.common.rest_client [req-503cefd4-6bac-49dd-a10f-ccc02df46ed7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-503cefd4-6bac-49dd-a10f-ccc02df46ed7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f963a49197e542539fb0c81dd0072602/users/a39e0503c0f645ca9e8584057f3ab34c/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f963a49197e542539fb0c81dd0072602/users/a39e0503c0f645ca9e8584057f3ab34c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:48.427 40 INFO tempest.lib.common.rest_client [req-6d0f9ff9-261d-4824-be30-e49b62cbc962 ] Request (ImageSizeRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/f963a49197e542539fb0c81dd0072602/users/a39e0503c0f645ca9e8584057f3ab34c/roles/72a4576c553448cd941b052c1ca0cf2d 0.053s 2020-11-06 17:58:48.428 40 DEBUG tempest.lib.common.rest_client [req-6d0f9ff9-261d-4824-be30-e49b62cbc962 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6d0f9ff9-261d-4824-be30-e49b62cbc962', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/f963a49197e542539fb0c81dd0072602/users/a39e0503c0f645ca9e8584057f3ab34c/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:48.435 38 INFO tempest.lib.common.rest_client [req-95c7b64e-4da4-4a5c-9913-f677e761a347 ] Request (AggregatesRbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/compute/v2.1/os-aggregates/1053 0.277s 2020-11-06 17:58:48.436 38 DEBUG tempest.lib.common.rest_client [req-95c7b64e-4da4-4a5c-9913-f677e761a347 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-95c7b64e-4da4-4a5c-9913-f677e761a347', 'x-compute-request-id': 'req-95c7b64e-4da4-4a5c-9913-f677e761a347', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/1053'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:48.440 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:58:48.441 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.441 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.441 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.442 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.442 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.443 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.443 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.443 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.444 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.444 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.444 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.444 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.445 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.445 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.445 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.446 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.446 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.446 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.447 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.447 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.447 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.448 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.448 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.448 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.448 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.449 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.449 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.449 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.450 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.450 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.450 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.451 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.451 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.451 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.452 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.452 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.452 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.452 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.453 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.453 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.453 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.454 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.454 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.454 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.455 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.455 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.455 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.455 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.456 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.456 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.456 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.457 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.457 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.457 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.457 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.458 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.458 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.458 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.459 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.459 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.460 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.460 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.460 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.460 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.461 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.461 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.461 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.462 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.462 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.462 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.462 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.463 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.463 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.463 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.464 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.465 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-aggregates:update, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:58:48.497 38 INFO tempest.lib.common.rest_client [req-0164de35-4e20-4a2e-aedc-652faec4a804 ] Request (AggregatesRbacTest:test_update_aggregate_rbac): 200 POST http://172.30.13.94/compute/v2.1/os-aggregates 0.032s 2020-11-06 17:58:48.497 38 DEBUG tempest.lib.common.rest_client [req-0164de35-4e20-4a2e-aedc-652faec4a804 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"aggregate": {"name": "tempest-AggregatesRbacTest-aggregate-484992779"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '214', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0164de35-4e20-4a2e-aedc-652faec4a804', 'x-compute-request-id': 'req-0164de35-4e20-4a2e-aedc-652faec4a804', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates'} Body: b'{"aggregate": {"id": 1054, "name": "tempest-AggregatesRbacTest-aggregate-484992779", "created_at": "2020-11-06T17:58:48.486347", "updated_at": null, "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:48.501 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:48.546 40 INFO tempest.lib.common.rest_client [req-77e95aa0-e745-429d-997e-66f41ac78ba9 ] Request (ImageSizeRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/f963a49197e542539fb0c81dd0072602/users/a39e0503c0f645ca9e8584057f3ab34c/roles/a629c95d64b3416fb80ae90af4f69c05 0.117s 2020-11-06 17:58:48.547 40 DEBUG tempest.lib.common.rest_client [req-77e95aa0-e745-429d-997e-66f41ac78ba9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-77e95aa0-e745-429d-997e-66f41ac78ba9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/f963a49197e542539fb0c81dd0072602/users/a39e0503c0f645ca9e8584057f3ab34c/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:48.561 38 INFO tempest.lib.common.rest_client [req-ea847d5b-5323-4c3d-9852-b3ba0c951485 ] Request (AggregatesRbacTest:test_update_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles 0.059s 2020-11-06 17:58:48.562 38 DEBUG tempest.lib.common.rest_client [req-ea847d5b-5323-4c3d-9852-b3ba0c951485 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ea847d5b-5323-4c3d-9852-b3ba0c951485', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:48.650 38 INFO tempest.lib.common.rest_client [req-44b5c96f-b71b-4e67-a1db-b1de8cf335d8 ] Request (AggregatesRbacTest:test_update_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-11-06 17:58:48.651 38 DEBUG tempest.lib.common.rest_client [req-44b5c96f-b71b-4e67-a1db-b1de8cf335d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-44b5c96f-b71b-4e67-a1db-b1de8cf335d8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b9193b9c5b774f4598d6d6d5a73287c7", "name": "tempest-AggregatesRbacTest-591314769", "password_expires_at": null}, "audit_ids": ["uGGtrpucSeC6MBWTD3Vm4A"], "expires_at": "2020-11-06T18:58:48.000000Z", "issued_at": "2020-11-06T17:58:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "da822d4027d545cc9eb5f098de258d1d", "name": "tempest-AggregatesRbacTest-591314769"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:48.812 38 INFO tempest.lib.common.rest_client [req-4c37640d-e5c4-4f66-9a5b-e11310971751 ] Request (AggregatesRbacTest:test_update_aggregate_rbac): 200 PUT http://172.30.13.94/compute/v2.1/os-aggregates/1054 0.160s 2020-11-06 17:58:48.813 38 DEBUG tempest.lib.common.rest_client [req-4c37640d-e5c4-4f66-9a5b-e11310971751 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"aggregate": {"name": "tempest-AggregatesRbacTest-aggregate-1343810194"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '268', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4c37640d-e5c4-4f66-9a5b-e11310971751', 'x-compute-request-id': 'req-4c37640d-e5c4-4f66-9a5b-e11310971751', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/1054'} Body: b'{"aggregate": {"id": 1054, "name": "tempest-AggregatesRbacTest-aggregate-1343810194", "hosts": [], "metadata": {}, "created_at": "2020-11-06T17:58:48.000000", "updated_at": "2020-11-06T17:58:48.798513", "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:48.818 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:48.872 39 INFO tempest.lib.common.rest_client [req-5124250c-3c40-41b6-802c-26fad475e5e4 ] Request (FlavorManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-11-06 17:58:48.873 39 DEBUG tempest.lib.common.rest_client [req-5124250c-3c40-41b6-802c-26fad475e5e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5124250c-3c40-41b6-802c-26fad475e5e4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4bf3cd599dc947eeb67c52b55538edc2", "name": "tempest-FlavorManageRbacTest-427098385", "password_expires_at": null}, "audit_ids": ["D1tOtGexQ660JT-JAhhdDg"], "expires_at": "2020-11-06T18:58:48.000000Z", "issued_at": "2020-11-06T17:58:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cda4859de50848d2b0a5d9dac32cc585", "name": "tempest-FlavorManageRbacTest-427098385"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cda4859de50848d2b0a5d9dac32cc585", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cda4859de50848d2b0a5d9dac32cc585", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cda4859de50848d2b0a5d9dac32cc585", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cda4859de50848d2b0a5d9dac32cc585", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cda4859de50848d2b0a5d9dac32cc585", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cda4859de50848d2b0a5d9dac32cc585", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:48.875 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:58:48.876 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.877 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.877 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.878 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.879 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.879 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.880 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.880 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.881 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.881 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.882 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.882 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.883 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.883 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.884 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.884 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.885 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.885 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.885 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.886 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.886 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.886 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.886 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.887 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.887 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.887 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.888 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.888 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.888 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.888 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.889 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.889 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.889 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.890 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.890 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.890 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.890 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.891 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.891 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.891 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.891 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.892 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.892 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.892 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.893 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.893 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.893 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.894 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.894 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.894 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.894 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.895 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.895 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.895 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.895 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.896 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.896 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.896 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.897 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.897 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.897 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.898 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.898 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.898 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.899 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.899 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.899 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.899 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.900 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.900 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.900 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.900 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.901 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.901 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.901 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:48.902 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-flavor-manage:create, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:58:48.902 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:48.916 38 INFO tempest.lib.common.rest_client [req-a231293b-99f3-4440-a556-d78e7a0f72b9 ] Request (AggregatesRbacTest:test_update_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles 0.097s 2020-11-06 17:58:48.917 38 DEBUG tempest.lib.common.rest_client [req-a231293b-99f3-4440-a556-d78e7a0f72b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a231293b-99f3-4440-a556-d78e7a0f72b9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d/users/b9193b9c5b774f4598d6d6d5a73287c7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:48.951 38 INFO tempest.lib.common.rest_client [req-63a43c2e-8597-413b-9e0c-e3ca2aeaf0df ] Request (AggregatesRbacTest:test_update_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 17:58:48.951 38 DEBUG tempest.lib.common.rest_client [req-63a43c2e-8597-413b-9e0c-e3ca2aeaf0df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-63a43c2e-8597-413b-9e0c-e3ca2aeaf0df', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b9193b9c5b774f4598d6d6d5a73287c7", "name": "tempest-AggregatesRbacTest-591314769", "password_expires_at": null}, "audit_ids": ["6HfcPlNnRLa3rHT5dBOogw"], "expires_at": "2020-11-06T18:58:48.000000Z", "issued_at": "2020-11-06T17:58:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "da822d4027d545cc9eb5f098de258d1d", "name": "tempest-AggregatesRbacTest-591314769"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_da822d4027d545cc9eb5f098de258d1d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:48.958 39 INFO tempest.lib.common.rest_client [req-14ab8161-7a94-472c-94de-ae819b3aad31 ] Request (FlavorManageRbacTest:test_create_flavor_manage): 200 GET http://172.30.13.94/identity/v3/projects/cda4859de50848d2b0a5d9dac32cc585/users/4bf3cd599dc947eeb67c52b55538edc2/roles 0.055s 2020-11-06 17:58:48.958 39 DEBUG tempest.lib.common.rest_client [req-14ab8161-7a94-472c-94de-ae819b3aad31 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-14ab8161-7a94-472c-94de-ae819b3aad31', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cda4859de50848d2b0a5d9dac32cc585/users/4bf3cd599dc947eeb67c52b55538edc2/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cda4859de50848d2b0a5d9dac32cc585/users/4bf3cd599dc947eeb67c52b55538edc2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:48.995 39 INFO tempest.lib.common.rest_client [req-2a297815-4d83-43bf-8dab-5c8aaae32203 ] Request (FlavorManageRbacTest:test_create_flavor_manage): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 17:58:48.996 39 DEBUG tempest.lib.common.rest_client [req-2a297815-4d83-43bf-8dab-5c8aaae32203 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2a297815-4d83-43bf-8dab-5c8aaae32203', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4bf3cd599dc947eeb67c52b55538edc2", "name": "tempest-FlavorManageRbacTest-427098385", "password_expires_at": null}, "audit_ids": ["aLWnMjmDQGWFK22WYcO3ig"], "expires_at": "2020-11-06T18:58:48.000000Z", "issued_at": "2020-11-06T17:58:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cda4859de50848d2b0a5d9dac32cc585", "name": "tempest-FlavorManageRbacTest-427098385"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cda4859de50848d2b0a5d9dac32cc585", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cda4859de50848d2b0a5d9dac32cc585", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cda4859de50848d2b0a5d9dac32cc585", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cda4859de50848d2b0a5d9dac32cc585", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cda4859de50848d2b0a5d9dac32cc585", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cda4859de50848d2b0a5d9dac32cc585", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:49.060 38 INFO tempest.lib.common.rest_client [req-38ad26e2-5e82-498b-98bf-8a430064bab5 ] Request (AggregatesRbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/compute/v2.1/os-aggregates/1054 0.107s 2020-11-06 17:58:49.061 38 DEBUG tempest.lib.common.rest_client [req-38ad26e2-5e82-498b-98bf-8a430064bab5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-38ad26e2-5e82-498b-98bf-8a430064bab5', 'x-compute-request-id': 'req-38ad26e2-5e82-498b-98bf-8a430064bab5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/1054'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:49.108 39 INFO tempest.lib.common.rest_client [req-51d32c48-b554-4554-a37b-a9c727d9b6d5 ] Request (FlavorManageRbacTest:test_create_flavor_manage): 200 POST http://172.30.13.94/compute/v2.1/flavors 0.110s 2020-11-06 17:58:49.108 39 DEBUG tempest.lib.common.rest_client [req-51d32c48-b554-4554-a37b-a9c727d9b6d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"flavor": {"name": "tempest-FlavorManageRbacTest-flavor-455574178", "ram": 7, "vcpus": 4, "disk": 6, "id": "8c784dd8-f737-4ef5-8dba-46cbde24eb2d"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '505', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-51d32c48-b554-4554-a37b-a9c727d9b6d5', 'x-compute-request-id': 'req-51d32c48-b554-4554-a37b-a9c727d9b6d5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors'} Body: b'{"flavor": {"id": "8c784dd8-f737-4ef5-8dba-46cbde24eb2d", "name": "tempest-FlavorManageRbacTest-flavor-455574178", "ram": 7, "disk": 6, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 4, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/8c784dd8-f737-4ef5-8dba-46cbde24eb2d"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8c784dd8-f737-4ef5-8dba-46cbde24eb2d"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:49.112 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:49.175 39 INFO tempest.lib.common.rest_client [req-0b94758a-7df9-481f-b70a-379250e898cc ] Request (FlavorManageRbacTest:test_create_flavor_manage): 200 GET http://172.30.13.94/identity/v3/projects/cda4859de50848d2b0a5d9dac32cc585/users/4bf3cd599dc947eeb67c52b55538edc2/roles 0.062s 2020-11-06 17:58:49.175 39 DEBUG tempest.lib.common.rest_client [req-0b94758a-7df9-481f-b70a-379250e898cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0b94758a-7df9-481f-b70a-379250e898cc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cda4859de50848d2b0a5d9dac32cc585/users/4bf3cd599dc947eeb67c52b55538edc2/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cda4859de50848d2b0a5d9dac32cc585/users/4bf3cd599dc947eeb67c52b55538edc2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:49.187 38 INFO tempest.lib.common.rest_client [req-93e767ef-82f8-4a01-bef8-73cf1f99f047 ] Request (AggregatesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/b9193b9c5b774f4598d6d6d5a73287c7 0.121s 2020-11-06 17:58:49.187 38 DEBUG tempest.lib.common.rest_client [req-93e767ef-82f8-4a01-bef8-73cf1f99f047 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-93e767ef-82f8-4a01-bef8-73cf1f99f047', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/b9193b9c5b774f4598d6d6d5a73287c7'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:49.267 39 INFO tempest.lib.common.rest_client [req-2f516968-be70-4122-ac08-e217d77c1b4f ] Request (FlavorManageRbacTest:test_create_flavor_manage): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-11-06 17:58:49.268 39 DEBUG tempest.lib.common.rest_client [req-2f516968-be70-4122-ac08-e217d77c1b4f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2f516968-be70-4122-ac08-e217d77c1b4f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4bf3cd599dc947eeb67c52b55538edc2", "name": "tempest-FlavorManageRbacTest-427098385", "password_expires_at": null}, "audit_ids": ["KMisjvBnRoqTyX--DH5YAQ"], "expires_at": "2020-11-06T18:58:49.000000Z", "issued_at": "2020-11-06T17:58:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cda4859de50848d2b0a5d9dac32cc585", "name": "tempest-FlavorManageRbacTest-427098385"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cda4859de50848d2b0a5d9dac32cc585", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cda4859de50848d2b0a5d9dac32cc585", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cda4859de50848d2b0a5d9dac32cc585", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cda4859de50848d2b0a5d9dac32cc585", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cda4859de50848d2b0a5d9dac32cc585", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cda4859de50848d2b0a5d9dac32cc585", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:49.272 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:58:49.273 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.274 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.274 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.274 38 INFO tempest.lib.common.rest_client [req-f87b5cbc-5bf4-4f6e-886f-0e7a0314fb7e ] Request (AggregatesRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-11-06 17:58:49.275 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.275 38 DEBUG tempest.lib.common.rest_client [req-f87b5cbc-5bf4-4f6e-886f-0e7a0314fb7e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f87b5cbc-5bf4-4f6e-886f-0e7a0314fb7e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["qX39gOO2TkmgCROrg-lOiA"], "expires_at": "2020-11-06T18:58:49.000000Z", "issued_at": "2020-11-06T17:58:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:49.276 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.276 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.277 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.277 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.278 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.278 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.279 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.279 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.280 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.280 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.281 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.281 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.281 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.282 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.282 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.282 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.283 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.283 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.283 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.283 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.284 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.284 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.284 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.285 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.285 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.285 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.285 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.286 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.286 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.286 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.287 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.287 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.287 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.287 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.288 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.288 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.288 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.288 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.289 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.289 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.289 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.290 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.290 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.290 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.291 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.291 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.291 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.291 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.292 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.292 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.292 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.292 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.293 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.293 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.293 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.294 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.294 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.294 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.295 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.295 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.295 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.296 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.296 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.296 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.296 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.297 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.297 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.297 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.298 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.298 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.298 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:49.299 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-flavor-manage:delete, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:58:49.301 37 INFO tempest.lib.common.rest_client [req-bd363d3f-0462-4e17-82e0-f73d9b4a96a9 ] Request (FloatingIpsBulkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-11-06 17:58:49.302 37 DEBUG tempest.lib.common.rest_client [req-bd363d3f-0462-4e17-82e0-f73d9b4a96a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bd363d3f-0462-4e17-82e0-f73d9b4a96a9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bc08333e305f476590c851d4a6820020", "name": "tempest-FloatingIpsBulkRbacTest-1414384920", "password_expires_at": null}, "audit_ids": ["k2ZEyB6tSJqMCGieknQ5Ag"], "expires_at": "2020-11-06T18:58:49.000000Z", "issued_at": "2020-11-06T17:58:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "718ff25b795b46c3b189e526c35eade2", "name": "tempest-FloatingIpsBulkRbacTest-1414384920"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/718ff25b795b46c3b189e526c35eade2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/718ff25b795b46c3b189e526c35eade2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/718ff25b795b46c3b189e526c35eade2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_718ff25b795b46c3b189e526c35eade2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_718ff25b795b46c3b189e526c35eade2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_718ff25b795b46c3b189e526c35eade2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:49.309 37 INFO tempest.lib.common.rest_client [-] Request (FloatingIpsBulkRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/ 0.006s 2020-11-06 17:58:49.310 37 DEBUG tempest.lib.common.rest_client [-] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '379', 'content-type': 'application/json', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/'} Body: b'{"versions": [{"id": "v2.0", "status": "SUPPORTED", "version": "", "min_version": "", "updated": "2011-01-21T11:33:21Z", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2/"}]}, {"id": "v2.1", "status": "CURRENT", "version": "2.87", "min_version": "2.1", "updated": "2013-07-23T11:33:21Z", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/"}]}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:49.316 37 INFO tempest.test [-] raised in FloatingIpsBulkRbacTest.setUpClass. Invoking tearDownClass. 2020-11-06 17:58:49.426 37 INFO tempest.lib.common.rest_client [req-4e7af8a9-e9a9-4e78-a8e6-2fb08bdcc347 ] Request (FloatingIpsBulkRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/bc08333e305f476590c851d4a6820020 0.109s 2020-11-06 17:58:49.426 37 DEBUG tempest.lib.common.rest_client [req-4e7af8a9-e9a9-4e78-a8e6-2fb08bdcc347 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4e7af8a9-e9a9-4e78-a8e6-2fb08bdcc347', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/bc08333e305f476590c851d4a6820020'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:49.514 37 INFO tempest.lib.common.rest_client [req-d1ba31bf-699f-4042-ac53-463b32111375 ] Request (FloatingIpsBulkRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-11-06 17:58:49.515 37 DEBUG tempest.lib.common.rest_client [req-d1ba31bf-699f-4042-ac53-463b32111375 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d1ba31bf-699f-4042-ac53-463b32111375', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["wKqUsK6tT5yNHNmzCZ72dA"], "expires_at": "2020-11-06T18:58:49.000000Z", "issued_at": "2020-11-06T17:58:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:49.520 39 INFO tempest.lib.common.rest_client [req-0fb57536-92ff-4278-a7df-2231fde9adbb ] Request (FlavorManageRbacTest:test_delete_flavor_manage): 200 POST http://172.30.13.94/compute/v2.1/flavors 0.220s 2020-11-06 17:58:49.520 39 DEBUG tempest.lib.common.rest_client [req-0fb57536-92ff-4278-a7df-2231fde9adbb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"flavor": {"name": "tempest-FlavorManageRbacTest-flavor-1145754566", "ram": 8, "vcpus": 3, "disk": 8, "id": "99ec12ed-2b86-4059-842b-f0614ba99b87"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '506', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0fb57536-92ff-4278-a7df-2231fde9adbb', 'x-compute-request-id': 'req-0fb57536-92ff-4278-a7df-2231fde9adbb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors'} Body: b'{"flavor": {"id": "99ec12ed-2b86-4059-842b-f0614ba99b87", "name": "tempest-FlavorManageRbacTest-flavor-1145754566", "ram": 8, "disk": 8, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 3, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/99ec12ed-2b86-4059-842b-f0614ba99b87"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/99ec12ed-2b86-4059-842b-f0614ba99b87"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:49.523 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:49.577 39 INFO tempest.lib.common.rest_client [req-3fa96e43-0306-4b6a-9438-ee126ef86d26 ] Request (FlavorManageRbacTest:test_delete_flavor_manage): 200 GET http://172.30.13.94/identity/v3/projects/cda4859de50848d2b0a5d9dac32cc585/users/4bf3cd599dc947eeb67c52b55538edc2/roles 0.053s 2020-11-06 17:58:49.578 39 DEBUG tempest.lib.common.rest_client [req-3fa96e43-0306-4b6a-9438-ee126ef86d26 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3fa96e43-0306-4b6a-9438-ee126ef86d26', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cda4859de50848d2b0a5d9dac32cc585/users/4bf3cd599dc947eeb67c52b55538edc2/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cda4859de50848d2b0a5d9dac32cc585/users/4bf3cd599dc947eeb67c52b55538edc2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:49.642 40 INFO tempest.lib.common.rest_client [req-7a251666-7a09-4812-9345-5121b879cb3a ] Request (ImageSizeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-11-06 17:58:49.643 40 DEBUG tempest.lib.common.rest_client [req-7a251666-7a09-4812-9345-5121b879cb3a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7a251666-7a09-4812-9345-5121b879cb3a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a39e0503c0f645ca9e8584057f3ab34c", "name": "tempest-ImageSizeRbacTest-906855230", "password_expires_at": null}, "audit_ids": ["-xsFx8wMRSGcMGQx0N7Oxw"], "expires_at": "2020-11-06T18:58:49.000000Z", "issued_at": "2020-11-06T17:58:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f963a49197e542539fb0c81dd0072602", "name": "tempest-ImageSizeRbacTest-906855230"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f963a49197e542539fb0c81dd0072602", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f963a49197e542539fb0c81dd0072602", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f963a49197e542539fb0c81dd0072602", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f963a49197e542539fb0c81dd0072602", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f963a49197e542539fb0c81dd0072602", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f963a49197e542539fb0c81dd0072602", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:49.666 39 INFO tempest.lib.common.rest_client [req-b9538d72-e74a-472c-8b4e-b9da1df200a3 ] Request (FlavorManageRbacTest:test_delete_flavor_manage): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-11-06 17:58:49.666 39 DEBUG tempest.lib.common.rest_client [req-b9538d72-e74a-472c-8b4e-b9da1df200a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b9538d72-e74a-472c-8b4e-b9da1df200a3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4bf3cd599dc947eeb67c52b55538edc2", "name": "tempest-FlavorManageRbacTest-427098385", "password_expires_at": null}, "audit_ids": ["g4MlAuFxT2Kez0Uum0UawA"], "expires_at": "2020-11-06T18:58:49.000000Z", "issued_at": "2020-11-06T17:58:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cda4859de50848d2b0a5d9dac32cc585", "name": "tempest-FlavorManageRbacTest-427098385"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cda4859de50848d2b0a5d9dac32cc585", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cda4859de50848d2b0a5d9dac32cc585", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cda4859de50848d2b0a5d9dac32cc585", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cda4859de50848d2b0a5d9dac32cc585", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cda4859de50848d2b0a5d9dac32cc585", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cda4859de50848d2b0a5d9dac32cc585", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:49.820 39 INFO tempest.lib.common.rest_client [req-6dd309ab-d913-4536-827b-e96f952035d1 ] Request (FlavorManageRbacTest:test_delete_flavor_manage): 202 DELETE http://172.30.13.94/compute/v2.1/flavors/99ec12ed-2b86-4059-842b-f0614ba99b87 0.153s 2020-11-06 17:58:49.821 39 DEBUG tempest.lib.common.rest_client [req-6dd309ab-d913-4536-827b-e96f952035d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6dd309ab-d913-4536-827b-e96f952035d1', 'x-compute-request-id': 'req-6dd309ab-d913-4536-827b-e96f952035d1', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/99ec12ed-2b86-4059-842b-f0614ba99b87'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:49.821 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:49.868 40 INFO tempest.lib.common.rest_client [req-741b232a-d2df-49fc-bb70-4b339365db8e ] Request (ImageSizeRbacTest:setUpClass): 201 POST http://172.30.13.94/image/v2/images 0.222s 2020-11-06 17:58:49.868 40 DEBUG tempest.lib.common.rest_client [req-741b232a-d2df-49fc-bb70-4b339365db8e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-ImageSizeRbacTest-image-463365586"} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '645', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/e2907f42-8e60-432a-bdb8-b2a3fdd4d240', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-741b232a-d2df-49fc-bb70-4b339365db8e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-ImageSizeRbacTest-image-463365586", "disk_format": null, "container_format": null, "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "f963a49197e542539fb0c81dd0072602", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "e2907f42-8e60-432a-bdb8-b2a3fdd4d240", "created_at": "2020-11-06T17:58:50Z", "updated_at": "2020-11-06T17:58:50Z", "tags": [], "self": "/v2/images/e2907f42-8e60-432a-bdb8-b2a3fdd4d240", "file": "/v2/images/e2907f42-8e60-432a-bdb8-b2a3fdd4d240/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:49.876 39 INFO tempest.lib.common.rest_client [req-6c5e8d4b-33eb-428e-9bc6-4dd58e3a5501 ] Request (FlavorManageRbacTest:test_delete_flavor_manage): 200 GET http://172.30.13.94/identity/v3/projects/cda4859de50848d2b0a5d9dac32cc585/users/4bf3cd599dc947eeb67c52b55538edc2/roles 0.054s 2020-11-06 17:58:49.877 39 DEBUG tempest.lib.common.rest_client [req-6c5e8d4b-33eb-428e-9bc6-4dd58e3a5501 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6c5e8d4b-33eb-428e-9bc6-4dd58e3a5501', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cda4859de50848d2b0a5d9dac32cc585/users/4bf3cd599dc947eeb67c52b55538edc2/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cda4859de50848d2b0a5d9dac32cc585/users/4bf3cd599dc947eeb67c52b55538edc2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:49.918 39 INFO tempest.lib.common.rest_client [req-5c0d5305-1c34-4000-b55d-8a87682126cc ] Request (FlavorManageRbacTest:test_delete_flavor_manage): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-11-06 17:58:49.919 39 DEBUG tempest.lib.common.rest_client [req-5c0d5305-1c34-4000-b55d-8a87682126cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5c0d5305-1c34-4000-b55d-8a87682126cc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4bf3cd599dc947eeb67c52b55538edc2", "name": "tempest-FlavorManageRbacTest-427098385", "password_expires_at": null}, "audit_ids": ["RnDJyiwpQhyfQ6eA-RsDaw"], "expires_at": "2020-11-06T18:58:49.000000Z", "issued_at": "2020-11-06T17:58:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cda4859de50848d2b0a5d9dac32cc585", "name": "tempest-FlavorManageRbacTest-427098385"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cda4859de50848d2b0a5d9dac32cc585", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cda4859de50848d2b0a5d9dac32cc585", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cda4859de50848d2b0a5d9dac32cc585", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cda4859de50848d2b0a5d9dac32cc585", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cda4859de50848d2b0a5d9dac32cc585", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cda4859de50848d2b0a5d9dac32cc585", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:49.945 40 INFO tempest.lib.common.rest_client [req-4ad6b278-456f-4479-a85d-a8548229f0df ] Request (ImageSizeRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/e2907f42-8e60-432a-bdb8-b2a3fdd4d240 0.074s 2020-11-06 17:58:49.946 40 DEBUG tempest.lib.common.rest_client [req-4ad6b278-456f-4479-a85d-a8548229f0df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-4ad6b278-456f-4479-a85d-a8548229f0df', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/e2907f42-8e60-432a-bdb8-b2a3fdd4d240'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:49.966 40 INFO tempest.lib.common.rest_client [req-5073e531-c327-4ae8-ac0b-69696e65041b ] Request (ImageSizeRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/e2907f42-8e60-432a-bdb8-b2a3fdd4d240 0.020s 2020-11-06 17:58:49.966 40 DEBUG tempest.lib.common.rest_client [req-5073e531-c327-4ae8-ac0b-69696e65041b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-5073e531-c327-4ae8-ac0b-69696e65041b', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/e2907f42-8e60-432a-bdb8-b2a3fdd4d240'} Body: b'{"message": "No image found with ID e2907f42-8e60-432a-bdb8-b2a3fdd4d240

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:50.034 39 INFO tempest.lib.common.rest_client [req-ef51c5b1-7192-463b-a57b-4990703f0ae3 ] Request (FlavorManageRbacTest:test_delete_flavor_manage): 200 GET http://172.30.13.94/compute/v2.1/flavors/detail 0.114s 2020-11-06 17:58:50.035 39 DEBUG tempest.lib.common.rest_client [req-ef51c5b1-7192-463b-a57b-4990703f0ae3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '9272', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ef51c5b1-7192-463b-a57b-4990703f0ae3', 'x-compute-request-id': 'req-ef51c5b1-7192-463b-a57b-4990703f0ae3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/detail'} Body: b'{"flavors": [{"id": "068070ea-870f-4f2e-b589-fd24aadca788", "name": "tempest_slow-flavor_alt_75eb3fa1-c659-4fc1-9b83-f5e47a8278c9", "ram": 1024, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/068070ea-870f-4f2e-b589-fd24aadca788"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/068070ea-870f-4f2e-b589-fd24aadca788"}]}, {"id": "1", "name": "m1.tiny", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1"}]}, {"id": "1c717c7c-492d-4048-893d-a51a30ef7bfa", "name": "rally_verify_32f1c0c7_UCSTCpLB", "ram": 64, "disk": 5, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/1c717c7c-492d-4048-893d-a51a30ef7bfa"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1c717c7c-492d-4048-893d-a51a30ef7bfa"}]}, {"id": "2", "name": "m1.small", "ram": 2048, "disk": 20, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/2"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/2"}]}, {"id": "29b55520-b9a3-4b97-a3ae-d9c83f854c93", "name": "m1.heat_micro", "ram": 128, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/29b55520-b9a3-4b97-a3ae-d9c83f854c93"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/29b55520-b9a3-4b97-a3ae-d9c83f854c93"}]}, {"id": "3", "name": "m1.medium", "ram": 4096, "disk": 40, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 2, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/3"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/3"}]}, {"id": "4", "name": "m1.large", "ram": 8192, "disk": 80, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 4, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/4"}]}, {"id": "42", "name": "m1.nano", "ram": 128, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/42"}]}, {"id": "49e14b85-dc09-4f88-bf7d-1f99419c2abf", "name": "patrole_member-flavor_29628109-ff86-4992-a718-2f4b83dd48b7", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/49e14b85-dc09-4f88-bf7d-1f99419c2abf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/49e14b85-dc09-4f88-bf7d-1f99419c2abf"}]}, {"id": "5", "name": "m1.xlarge", "ram": 16384, "disk": 160, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 8, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/5"}, {"rel": "bookmark", "href": "http://172.3 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:50.081 39 INFO tempest.lib.common.rest_client [req-85dfe3ed-1d5a-471f-80ea-a6fd4bed8385 ] Request (FlavorManageRbacTest:tearDownClass): 404 DELETE http://172.30.13.94/compute/v2.1/flavors/99ec12ed-2b86-4059-842b-f0614ba99b87 0.025s 2020-11-06 17:58:50.082 39 DEBUG tempest.lib.common.rest_client [req-85dfe3ed-1d5a-471f-80ea-a6fd4bed8385 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '109', 'x-openstack-request-id': 'req-85dfe3ed-1d5a-471f-80ea-a6fd4bed8385', 'x-compute-request-id': 'req-85dfe3ed-1d5a-471f-80ea-a6fd4bed8385', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/99ec12ed-2b86-4059-842b-f0614ba99b87'} Body: b'{"itemNotFound": {"code": 404, "message": "Flavor 99ec12ed-2b86-4059-842b-f0614ba99b87 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:50.110 40 INFO tempest.lib.common.rest_client [req-9ac2817c-bc8b-4594-b1b5-085e9e88eced ] Request (ImageSizeRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/a39e0503c0f645ca9e8584057f3ab34c 0.143s 2020-11-06 17:58:50.111 40 DEBUG tempest.lib.common.rest_client [req-9ac2817c-bc8b-4594-b1b5-085e9e88eced ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9ac2817c-bc8b-4594-b1b5-085e9e88eced', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/a39e0503c0f645ca9e8584057f3ab34c'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:50.120 39 INFO tempest.lib.common.rest_client [req-c7019418-54e5-41cf-bf08-ee4e0f5a7a99 ] Request (FlavorManageRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/flavors/detail 0.037s 2020-11-06 17:58:50.121 39 DEBUG tempest.lib.common.rest_client [req-c7019418-54e5-41cf-bf08-ee4e0f5a7a99 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '9272', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c7019418-54e5-41cf-bf08-ee4e0f5a7a99', 'x-compute-request-id': 'req-c7019418-54e5-41cf-bf08-ee4e0f5a7a99', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/detail'} Body: b'{"flavors": [{"id": "068070ea-870f-4f2e-b589-fd24aadca788", "name": "tempest_slow-flavor_alt_75eb3fa1-c659-4fc1-9b83-f5e47a8278c9", "ram": 1024, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/068070ea-870f-4f2e-b589-fd24aadca788"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/068070ea-870f-4f2e-b589-fd24aadca788"}]}, {"id": "1", "name": "m1.tiny", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1"}]}, {"id": "1c717c7c-492d-4048-893d-a51a30ef7bfa", "name": "rally_verify_32f1c0c7_UCSTCpLB", "ram": 64, "disk": 5, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/1c717c7c-492d-4048-893d-a51a30ef7bfa"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1c717c7c-492d-4048-893d-a51a30ef7bfa"}]}, {"id": "2", "name": "m1.small", "ram": 2048, "disk": 20, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/2"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/2"}]}, {"id": "29b55520-b9a3-4b97-a3ae-d9c83f854c93", "name": "m1.heat_micro", "ram": 128, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/29b55520-b9a3-4b97-a3ae-d9c83f854c93"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/29b55520-b9a3-4b97-a3ae-d9c83f854c93"}]}, {"id": "3", "name": "m1.medium", "ram": 4096, "disk": 40, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 2, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/3"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/3"}]}, {"id": "4", "name": "m1.large", "ram": 8192, "disk": 80, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 4, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/4"}]}, {"id": "42", "name": "m1.nano", "ram": 128, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/42"}]}, {"id": "49e14b85-dc09-4f88-bf7d-1f99419c2abf", "name": "patrole_member-flavor_29628109-ff86-4992-a718-2f4b83dd48b7", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/49e14b85-dc09-4f88-bf7d-1f99419c2abf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/49e14b85-dc09-4f88-bf7d-1f99419c2abf"}]}, {"id": "5", "name": "m1.xlarge", "ram": 16384, "disk": 160, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 8, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/5"}, {"rel": "bookmark", "href": "http://172.3 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:50.178 39 INFO tempest.lib.common.rest_client [req-d108e47e-d441-404b-8f2e-2aadfa77c040 ] Request (FlavorManageRbacTest:tearDownClass): 202 DELETE http://172.30.13.94/compute/v2.1/flavors/8c784dd8-f737-4ef5-8dba-46cbde24eb2d 0.040s 2020-11-06 17:58:50.178 39 DEBUG tempest.lib.common.rest_client [req-d108e47e-d441-404b-8f2e-2aadfa77c040 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d108e47e-d441-404b-8f2e-2aadfa77c040', 'x-compute-request-id': 'req-d108e47e-d441-404b-8f2e-2aadfa77c040', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/8c784dd8-f737-4ef5-8dba-46cbde24eb2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:50.190 40 INFO tempest.lib.common.rest_client [req-ce49eb1d-d0a0-4963-84d4-e2176a3fa694 ] Request (ImageSizeRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-11-06 17:58:50.190 40 DEBUG tempest.lib.common.rest_client [req-ce49eb1d-d0a0-4963-84d4-e2176a3fa694 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ce49eb1d-d0a0-4963-84d4-e2176a3fa694', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["dLRR_8ZcRuOjUsx8qlcidA"], "expires_at": "2020-11-06T18:58:50.000000Z", "issued_at": "2020-11-06T17:58:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:50.210 39 INFO tempest.lib.common.rest_client [req-80842fdd-2ed9-4f52-a6f1-ed362589752b ] Request (FlavorManageRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/flavors/detail 0.031s 2020-11-06 17:58:50.210 39 DEBUG tempest.lib.common.rest_client [req-80842fdd-2ed9-4f52-a6f1-ed362589752b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '8777', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-80842fdd-2ed9-4f52-a6f1-ed362589752b', 'x-compute-request-id': 'req-80842fdd-2ed9-4f52-a6f1-ed362589752b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/detail'} Body: b'{"flavors": [{"id": "068070ea-870f-4f2e-b589-fd24aadca788", "name": "tempest_slow-flavor_alt_75eb3fa1-c659-4fc1-9b83-f5e47a8278c9", "ram": 1024, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/068070ea-870f-4f2e-b589-fd24aadca788"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/068070ea-870f-4f2e-b589-fd24aadca788"}]}, {"id": "1", "name": "m1.tiny", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1"}]}, {"id": "1c717c7c-492d-4048-893d-a51a30ef7bfa", "name": "rally_verify_32f1c0c7_UCSTCpLB", "ram": 64, "disk": 5, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/1c717c7c-492d-4048-893d-a51a30ef7bfa"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1c717c7c-492d-4048-893d-a51a30ef7bfa"}]}, {"id": "2", "name": "m1.small", "ram": 2048, "disk": 20, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/2"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/2"}]}, {"id": "29b55520-b9a3-4b97-a3ae-d9c83f854c93", "name": "m1.heat_micro", "ram": 128, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/29b55520-b9a3-4b97-a3ae-d9c83f854c93"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/29b55520-b9a3-4b97-a3ae-d9c83f854c93"}]}, {"id": "3", "name": "m1.medium", "ram": 4096, "disk": 40, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 2, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/3"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/3"}]}, {"id": "4", "name": "m1.large", "ram": 8192, "disk": 80, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 4, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/4"}]}, {"id": "42", "name": "m1.nano", "ram": 128, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/42"}]}, {"id": "49e14b85-dc09-4f88-bf7d-1f99419c2abf", "name": "patrole_member-flavor_29628109-ff86-4992-a718-2f4b83dd48b7", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/49e14b85-dc09-4f88-bf7d-1f99419c2abf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/49e14b85-dc09-4f88-bf7d-1f99419c2abf"}]}, {"id": "5", "name": "m1.xlarge", "ram": 16384, "disk": 160, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 8, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/5"}, {"rel": "bookmark", "href": "http://172.3 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:50.345 39 INFO tempest.lib.common.rest_client [req-84ce1a1f-02c6-401b-8180-5dc5be80e150 ] Request (FlavorManageRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/4bf3cd599dc947eeb67c52b55538edc2 0.121s 2020-11-06 17:58:50.346 39 DEBUG tempest.lib.common.rest_client [req-84ce1a1f-02c6-401b-8180-5dc5be80e150 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-84ce1a1f-02c6-401b-8180-5dc5be80e150', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/4bf3cd599dc947eeb67c52b55538edc2'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:50.426 39 INFO tempest.lib.common.rest_client [req-46983f61-424f-48d5-82a8-dcf5dbe7218c ] Request (FlavorManageRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.079s 2020-11-06 17:58:50.426 39 DEBUG tempest.lib.common.rest_client [req-46983f61-424f-48d5-82a8-dcf5dbe7218c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-46983f61-424f-48d5-82a8-dcf5dbe7218c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["OCJ5nPKgReGF76_6ozLpgA"], "expires_at": "2020-11-06T18:58:50.000000Z", "issued_at": "2020-11-06T17:58:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:50.652 40 INFO tempest.lib.common.rest_client [req-26e6883a-616b-470f-a4a2-384e1ff2bd6d ] Request (ImageSizeRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=f963a49197e542539fb0c81dd0072602&name=default 0.460s 2020-11-06 17:58:50.653 40 DEBUG tempest.lib.common.rest_client [req-26e6883a-616b-470f-a4a2-384e1ff2bd6d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-26e6883a-616b-470f-a4a2-384e1ff2bd6d', 'date': 'Fri, 06 Nov 2020 17:58:50 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=f963a49197e542539fb0c81dd0072602&name=default'} Body: b'{"security_groups": [{"id": "97f8e3b8-dcc2-46d4-a56f-95b0746c7583", "name": "default", "stateful": true, "tenant_id": "f963a49197e542539fb0c81dd0072602", "description": "Default security group", "security_group_rules": [{"id": "350b1747-d8ec-40b3-af09-fc61c4fe9949", "tenant_id": "f963a49197e542539fb0c81dd0072602", "security_group_id": "97f8e3b8-dcc2-46d4-a56f-95b0746c7583", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "97f8e3b8-dcc2-46d4-a56f-95b0746c7583", "description": null, "tags": [], "created_at": "2020-11-06T17:58:50Z", "updated_at": "2020-11-06T17:58:50Z", "revision_number": 0, "project_id": "f963a49197e542539fb0c81dd0072602"}, {"id": "b9043a65-4ef9-49df-b929-495b45dfcd07", "tenant_id": "f963a49197e542539fb0c81dd0072602", "security_group_id": "97f8e3b8-dcc2-46d4-a56f-95b0746c7583", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "97f8e3b8-dcc2-46d4-a56f-95b0746c7583", "description": null, "tags": [], "created_at": "2020-11-06T17:58:50Z", "updated_at": "2020-11-06T17:58:50Z", "revision_number": 0, "project_id": "f963a49197e542539fb0c81dd0072602"}, {"id": "c7643de8-6cb1-4697-b010-2be98f37be3a", "tenant_id": "f963a49197e542539fb0c81dd0072602", "security_group_id": "97f8e3b8-dcc2-46d4-a56f-95b0746c7583", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:58:50Z", "updated_at": "2020-11-06T17:58:50Z", "revision_number": 0, "project_id": "f963a49197e542539fb0c81dd0072602"}, {"id": "e5df9326-770b-49bb-b677-41d2d781fb53", "tenant_id": "f963a49197e542539fb0c81dd0072602", "security_group_id": "97f8e3b8-dcc2-46d4-a56f-95b0746c7583", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:58:50Z", "updated_at": "2020-11-06T17:58:50Z", "revision_number": 0, "project_id": "f963a49197e542539fb0c81dd0072602"}], "tags": [], "created_at": "2020-11-06T17:58:50Z", "updated_at": "2020-11-06T17:58:50Z", "revision_number": 1, "project_id": "f963a49197e542539fb0c81dd0072602"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:50.694 39 INFO tempest.lib.common.rest_client [req-68f2f43b-196a-4939-921e-fc0561c16d88 ] Request (FlavorManageRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=cda4859de50848d2b0a5d9dac32cc585&name=default 0.267s 2020-11-06 17:58:50.695 39 DEBUG tempest.lib.common.rest_client [req-68f2f43b-196a-4939-921e-fc0561c16d88 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-68f2f43b-196a-4939-921e-fc0561c16d88', 'date': 'Fri, 06 Nov 2020 17:58:50 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=cda4859de50848d2b0a5d9dac32cc585&name=default'} Body: b'{"security_groups": [{"id": "412fefa0-91ff-483b-a457-ba0092980d49", "name": "default", "stateful": true, "tenant_id": "cda4859de50848d2b0a5d9dac32cc585", "description": "Default security group", "security_group_rules": [{"id": "0c724918-42ab-4497-a112-3d51d9cf947a", "tenant_id": "cda4859de50848d2b0a5d9dac32cc585", "security_group_id": "412fefa0-91ff-483b-a457-ba0092980d49", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:58:50Z", "updated_at": "2020-11-06T17:58:50Z", "revision_number": 0, "project_id": "cda4859de50848d2b0a5d9dac32cc585"}, {"id": "0ca60719-5bca-4189-b883-78219ebb32f7", "tenant_id": "cda4859de50848d2b0a5d9dac32cc585", "security_group_id": "412fefa0-91ff-483b-a457-ba0092980d49", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "412fefa0-91ff-483b-a457-ba0092980d49", "description": null, "tags": [], "created_at": "2020-11-06T17:58:50Z", "updated_at": "2020-11-06T17:58:50Z", "revision_number": 0, "project_id": "cda4859de50848d2b0a5d9dac32cc585"}, {"id": "382334a2-3c70-4fe5-9906-c6ceb130d74b", "tenant_id": "cda4859de50848d2b0a5d9dac32cc585", "security_group_id": "412fefa0-91ff-483b-a457-ba0092980d49", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "412fefa0-91ff-483b-a457-ba0092980d49", "description": null, "tags": [], "created_at": "2020-11-06T17:58:50Z", "updated_at": "2020-11-06T17:58:50Z", "revision_number": 0, "project_id": "cda4859de50848d2b0a5d9dac32cc585"}, {"id": "bc48b900-2733-4249-b671-07216798f4a1", "tenant_id": "cda4859de50848d2b0a5d9dac32cc585", "security_group_id": "412fefa0-91ff-483b-a457-ba0092980d49", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:58:50Z", "updated_at": "2020-11-06T17:58:50Z", "revision_number": 0, "project_id": "cda4859de50848d2b0a5d9dac32cc585"}], "tags": [], "created_at": "2020-11-06T17:58:50Z", "updated_at": "2020-11-06T17:58:50Z", "revision_number": 1, "project_id": "cda4859de50848d2b0a5d9dac32cc585"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:50.851 40 INFO tempest.lib.common.rest_client [req-2528b3d5-f3c7-4756-9bc5-88d970361532 ] Request (ImageSizeRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/97f8e3b8-dcc2-46d4-a56f-95b0746c7583 0.197s 2020-11-06 17:58:50.852 40 DEBUG tempest.lib.common.rest_client [req-2528b3d5-f3c7-4756-9bc5-88d970361532 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-2528b3d5-f3c7-4756-9bc5-88d970361532', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 17:58:50 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/97f8e3b8-dcc2-46d4-a56f-95b0746c7583'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:50.854 38 INFO tempest.lib.common.rest_client [req-187e5c1c-6e32-4074-a698-e3af47f952d4 ] Request (AggregatesRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=da822d4027d545cc9eb5f098de258d1d&name=default 1.578s 2020-11-06 17:58:50.854 38 DEBUG tempest.lib.common.rest_client [req-187e5c1c-6e32-4074-a698-e3af47f952d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-187e5c1c-6e32-4074-a698-e3af47f952d4', 'date': 'Fri, 06 Nov 2020 17:58:50 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=da822d4027d545cc9eb5f098de258d1d&name=default'} Body: b'{"security_groups": [{"id": "d4b4ebf2-5719-4115-9039-019e57bba8ca", "name": "default", "stateful": true, "tenant_id": "da822d4027d545cc9eb5f098de258d1d", "description": "Default security group", "security_group_rules": [{"id": "10f282aa-7a4d-4457-b44a-15a6d7bda225", "tenant_id": "da822d4027d545cc9eb5f098de258d1d", "security_group_id": "d4b4ebf2-5719-4115-9039-019e57bba8ca", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:58:49Z", "updated_at": "2020-11-06T17:58:49Z", "revision_number": 0, "project_id": "da822d4027d545cc9eb5f098de258d1d"}, {"id": "1303301d-1953-405f-aed0-745a56813f33", "tenant_id": "da822d4027d545cc9eb5f098de258d1d", "security_group_id": "d4b4ebf2-5719-4115-9039-019e57bba8ca", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:58:49Z", "updated_at": "2020-11-06T17:58:49Z", "revision_number": 0, "project_id": "da822d4027d545cc9eb5f098de258d1d"}, {"id": "4e481458-6917-48eb-93af-88012f70dda7", "tenant_id": "da822d4027d545cc9eb5f098de258d1d", "security_group_id": "d4b4ebf2-5719-4115-9039-019e57bba8ca", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "d4b4ebf2-5719-4115-9039-019e57bba8ca", "description": null, "tags": [], "created_at": "2020-11-06T17:58:49Z", "updated_at": "2020-11-06T17:58:49Z", "revision_number": 0, "project_id": "da822d4027d545cc9eb5f098de258d1d"}, {"id": "7dc83cac-4bbf-4f6b-93f3-37bcb981464b", "tenant_id": "da822d4027d545cc9eb5f098de258d1d", "security_group_id": "d4b4ebf2-5719-4115-9039-019e57bba8ca", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "d4b4ebf2-5719-4115-9039-019e57bba8ca", "description": null, "tags": [], "created_at": "2020-11-06T17:58:49Z", "updated_at": "2020-11-06T17:58:49Z", "revision_number": 0, "project_id": "da822d4027d545cc9eb5f098de258d1d"}], "tags": [], "created_at": "2020-11-06T17:58:49Z", "updated_at": "2020-11-06T17:58:49Z", "revision_number": 1, "project_id": "da822d4027d545cc9eb5f098de258d1d"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:50.865 39 INFO tempest.lib.common.rest_client [req-8a023df4-6196-4e0f-8d86-7e584da9285d ] Request (FlavorManageRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/412fefa0-91ff-483b-a457-ba0092980d49 0.168s 2020-11-06 17:58:50.865 39 DEBUG tempest.lib.common.rest_client [req-8a023df4-6196-4e0f-8d86-7e584da9285d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-8a023df4-6196-4e0f-8d86-7e584da9285d', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 17:58:50 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/412fefa0-91ff-483b-a457-ba0092980d49'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:50.961 37 INFO tempest.lib.common.rest_client [req-d3b61c9b-2d42-44e7-b64d-6c410cbd3e80 ] Request (FloatingIpsBulkRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=718ff25b795b46c3b189e526c35eade2&name=default 1.445s 2020-11-06 17:58:50.962 37 DEBUG tempest.lib.common.rest_client [req-d3b61c9b-2d42-44e7-b64d-6c410cbd3e80 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-d3b61c9b-2d42-44e7-b64d-6c410cbd3e80', 'date': 'Fri, 06 Nov 2020 17:58:50 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=718ff25b795b46c3b189e526c35eade2&name=default'} Body: b'{"security_groups": [{"id": "4890f832-0e3e-4939-a7a6-43668d5290ae", "name": "default", "stateful": true, "tenant_id": "718ff25b795b46c3b189e526c35eade2", "description": "Default security group", "security_group_rules": [{"id": "4245a706-96d4-4af2-8e4f-a6a1287d5d7e", "tenant_id": "718ff25b795b46c3b189e526c35eade2", "security_group_id": "4890f832-0e3e-4939-a7a6-43668d5290ae", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "4890f832-0e3e-4939-a7a6-43668d5290ae", "description": null, "tags": [], "created_at": "2020-11-06T17:58:50Z", "updated_at": "2020-11-06T17:58:50Z", "revision_number": 0, "project_id": "718ff25b795b46c3b189e526c35eade2"}, {"id": "539e1e97-8418-440a-b923-7d283dc1de8f", "tenant_id": "718ff25b795b46c3b189e526c35eade2", "security_group_id": "4890f832-0e3e-4939-a7a6-43668d5290ae", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:58:50Z", "updated_at": "2020-11-06T17:58:50Z", "revision_number": 0, "project_id": "718ff25b795b46c3b189e526c35eade2"}, {"id": "96d3b397-08b2-4060-8571-6d9306f5c5ea", "tenant_id": "718ff25b795b46c3b189e526c35eade2", "security_group_id": "4890f832-0e3e-4939-a7a6-43668d5290ae", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "4890f832-0e3e-4939-a7a6-43668d5290ae", "description": null, "tags": [], "created_at": "2020-11-06T17:58:50Z", "updated_at": "2020-11-06T17:58:50Z", "revision_number": 0, "project_id": "718ff25b795b46c3b189e526c35eade2"}, {"id": "f7e066e0-bcee-442e-a096-2f7e5f1b4d21", "tenant_id": "718ff25b795b46c3b189e526c35eade2", "security_group_id": "4890f832-0e3e-4939-a7a6-43668d5290ae", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:58:50Z", "updated_at": "2020-11-06T17:58:50Z", "revision_number": 0, "project_id": "718ff25b795b46c3b189e526c35eade2"}], "tags": [], "created_at": "2020-11-06T17:58:50Z", "updated_at": "2020-11-06T17:58:50Z", "revision_number": 1, "project_id": "718ff25b795b46c3b189e526c35eade2"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:50.976 40 INFO tempest.lib.common.rest_client [req-5002f8a8-da62-46da-9776-2fb0cb2220d4 ] Request (ImageSizeRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/f963a49197e542539fb0c81dd0072602 0.123s 2020-11-06 17:58:50.976 40 DEBUG tempest.lib.common.rest_client [req-5002f8a8-da62-46da-9776-2fb0cb2220d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5002f8a8-da62-46da-9776-2fb0cb2220d4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/f963a49197e542539fb0c81dd0072602'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:50.995 39 INFO tempest.lib.common.rest_client [req-9038d6fe-4e93-43e2-b4f4-4fbca524e7c7 ] Request (FlavorManageRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/cda4859de50848d2b0a5d9dac32cc585 0.128s 2020-11-06 17:58:50.995 39 DEBUG tempest.lib.common.rest_client [req-9038d6fe-4e93-43e2-b4f4-4fbca524e7c7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9038d6fe-4e93-43e2-b4f4-4fbca524e7c7', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/cda4859de50848d2b0a5d9dac32cc585'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.004 38 INFO tempest.lib.common.rest_client [req-5cbdd1da-d8a5-4437-852a-3ec1b247001e ] Request (AggregatesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/d4b4ebf2-5719-4115-9039-019e57bba8ca 0.148s 2020-11-06 17:58:51.004 38 DEBUG tempest.lib.common.rest_client [req-5cbdd1da-d8a5-4437-852a-3ec1b247001e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-5cbdd1da-d8a5-4437-852a-3ec1b247001e', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/d4b4ebf2-5719-4115-9039-019e57bba8ca'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.074 40 INFO tempest.lib.common.rest_client [req-ce21f3c7-0125-4ce9-9aa4-7d9767af9437 ] Request (LimitsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-11-06 17:58:51.074 40 DEBUG tempest.lib.common.rest_client [req-ce21f3c7-0125-4ce9-9aa4-7d9767af9437 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ce21f3c7-0125-4ce9-9aa4-7d9767af9437', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["uj8uPH3JQR-MqFXxyx0mJg"], "expires_at": "2020-11-06T18:58:51.000000Z", "issued_at": "2020-11-06T17:58:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.082 39 INFO tempest.lib.common.rest_client [req-d61f571d-c0b8-4c5d-9a93-f858811577ed ] Request (FlavorRxtxRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 17:58:51.082 39 DEBUG tempest.lib.common.rest_client [req-d61f571d-c0b8-4c5d-9a93-f858811577ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d61f571d-c0b8-4c5d-9a93-f858811577ed', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["E-3cwwKFQs6ookmwBN4i5g"], "expires_at": "2020-11-06T18:58:51.000000Z", "issued_at": "2020-11-06T17:58:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.118 40 INFO tempest.lib.common.rest_client [req-b16fec98-20c9-49ee-9ac0-63314ee5226a ] Request (LimitsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 17:58:51.119 40 DEBUG tempest.lib.common.rest_client [req-b16fec98-20c9-49ee-9ac0-63314ee5226a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b16fec98-20c9-49ee-9ac0-63314ee5226a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["zWYADE0xSsmZsKB_GYs2Sg"], "expires_at": "2020-11-06T18:58:51.000000Z", "issued_at": "2020-11-06T17:58:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.128 39 INFO tempest.lib.common.rest_client [req-23bfd8e4-4630-4169-81fb-00b20046c60f ] Request (FlavorRxtxRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 17:58:51.129 39 DEBUG tempest.lib.common.rest_client [req-23bfd8e4-4630-4169-81fb-00b20046c60f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-23bfd8e4-4630-4169-81fb-00b20046c60f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["bBffps_ITuiHFVyI13wXuA"], "expires_at": "2020-11-06T18:58:51.000000Z", "issued_at": "2020-11-06T17:58:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.174 37 INFO tempest.lib.common.rest_client [req-8066ec68-9550-4ad4-ac1b-46a6e7df5c81 ] Request (FloatingIpsBulkRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/4890f832-0e3e-4939-a7a6-43668d5290ae 0.212s 2020-11-06 17:58:51.175 37 DEBUG tempest.lib.common.rest_client [req-8066ec68-9550-4ad4-ac1b-46a6e7df5c81 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-8066ec68-9550-4ad4-ac1b-46a6e7df5c81', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/4890f832-0e3e-4939-a7a6-43668d5290ae'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.183 38 INFO tempest.lib.common.rest_client [req-7abb1a0b-9c56-4b61-9bce-105a15653e03 ] Request (AggregatesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d 0.178s 2020-11-06 17:58:51.184 38 DEBUG tempest.lib.common.rest_client [req-7abb1a0b-9c56-4b61-9bce-105a15653e03 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7abb1a0b-9c56-4b61-9bce-105a15653e03', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/da822d4027d545cc9eb5f098de258d1d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.220 38 INFO tempest.lib.common.rest_client [req-55aaaeee-a996-43dd-926b-43e10ea730f9 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 17:58:51.220 38 DEBUG tempest.lib.common.rest_client [req-55aaaeee-a996-43dd-926b-43e10ea730f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-55aaaeee-a996-43dd-926b-43e10ea730f9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["Bd0-hWmgT4ykiTL3j4XK0Q"], "expires_at": "2020-11-06T18:58:51.000000Z", "issued_at": "2020-11-06T17:58:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.228 40 INFO tempest.lib.common.rest_client [req-1a89ab4c-9cdf-4cd3-a866-e94ff7bbeb54 ] Request (LimitsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.108s 2020-11-06 17:58:51.229 40 DEBUG tempest.lib.common.rest_client [req-1a89ab4c-9cdf-4cd3-a866-e94ff7bbeb54 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1a89ab4c-9cdf-4cd3-a866-e94ff7bbeb54', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.229 39 INFO tempest.lib.common.rest_client [req-41aa051f-c706-4ca7-abf8-079a20489bdc ] Request (FlavorRxtxRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.099s 2020-11-06 17:58:51.229 39 DEBUG tempest.lib.common.rest_client [req-41aa051f-c706-4ca7-abf8-079a20489bdc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-41aa051f-c706-4ca7-abf8-079a20489bdc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.257 38 INFO tempest.lib.common.rest_client [req-5ed54116-eb55-4f13-86db-288c29207e46 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 17:58:51.258 38 DEBUG tempest.lib.common.rest_client [req-5ed54116-eb55-4f13-86db-288c29207e46 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5ed54116-eb55-4f13-86db-288c29207e46', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["GRckUP54SUuuW0u5SsndRw"], "expires_at": "2020-11-06T18:58:51.000000Z", "issued_at": "2020-11-06T17:58:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.294 37 INFO tempest.lib.common.rest_client [req-bf1a2123-eaef-497c-8219-20bfa030809a ] Request (FloatingIpsBulkRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/718ff25b795b46c3b189e526c35eade2 0.118s 2020-11-06 17:58:51.295 37 DEBUG tempest.lib.common.rest_client [req-bf1a2123-eaef-497c-8219-20bfa030809a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bf1a2123-eaef-497c-8219-20bfa030809a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/718ff25b795b46c3b189e526c35eade2'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.299 40 INFO tempest.lib.common.rest_client [req-b1fc55d8-792d-4500-8c37-0f0a3695c266 ] Request (LimitsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.069s 2020-11-06 17:58:51.300 40 DEBUG tempest.lib.common.rest_client [req-b1fc55d8-792d-4500-8c37-0f0a3695c266 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-LimitsRbacTest-367422543-desc", "domain_id": "default", "name": "tempest-LimitsRbacTest-367422543"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '364', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b1fc55d8-792d-4500-8c37-0f0a3695c266', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "ebc1a2f1e2fd49eb9df63bb338475731", "name": "tempest-LimitsRbacTest-367422543", "domain_id": "default", "description": "tempest-LimitsRbacTest-367422543-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/ebc1a2f1e2fd49eb9df63bb338475731"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.305 39 INFO tempest.lib.common.rest_client [req-bbad7aef-a8fe-48e8-b003-b6cc2daa73f5 ] Request (FlavorRxtxRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.074s 2020-11-06 17:58:51.306 39 DEBUG tempest.lib.common.rest_client [req-bbad7aef-a8fe-48e8-b003-b6cc2daa73f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-FlavorRxtxRbacTest-1984623823-desc", "domain_id": "default", "name": "tempest-FlavorRxtxRbacTest-1984623823"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '374', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bbad7aef-a8fe-48e8-b003-b6cc2daa73f5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "09e7b0af05af4ee99d41d6d439a3f8c8", "name": "tempest-FlavorRxtxRbacTest-1984623823", "domain_id": "default", "description": "tempest-FlavorRxtxRbacTest-1984623823-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/09e7b0af05af4ee99d41d6d439a3f8c8"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.352 38 INFO tempest.lib.common.rest_client [req-b9a452f0-fb1c-40b6-af5a-b3412250533e ] Request (FlavorExtraSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.093s 2020-11-06 17:58:51.353 38 DEBUG tempest.lib.common.rest_client [req-b9a452f0-fb1c-40b6-af5a-b3412250533e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b9a452f0-fb1c-40b6-af5a-b3412250533e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.390 37 INFO tempest.lib.common.rest_client [req-0eb07bcf-d50a-4cec-a736-c7ab73484d5d ] Request (KeypairsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-11-06 17:58:51.391 37 DEBUG tempest.lib.common.rest_client [req-0eb07bcf-d50a-4cec-a736-c7ab73484d5d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0eb07bcf-d50a-4cec-a736-c7ab73484d5d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["kMWIT8zPSruwV11WacBJTg"], "expires_at": "2020-11-06T18:58:51.000000Z", "issued_at": "2020-11-06T17:58:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.411 40 INFO tempest.lib.common.rest_client [req-26e86792-c7ca-4703-a24c-72ae2578c3c7 ] Request (LimitsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.110s 2020-11-06 17:58:51.412 40 DEBUG tempest.lib.common.rest_client [req-26e86792-c7ca-4703-a24c-72ae2578c3c7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-LimitsRbacTest-367422543", "password": "B2_SF&^yoB4S@2x", "project_id": "ebc1a2f1e2fd49eb9df63bb338475731", "email": "tempest-LimitsRbacTest-1935847730@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '383', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-26e86792-c7ca-4703-a24c-72ae2578c3c7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "ebc1a2f1e2fd49eb9df63bb338475731", "email": "tempest-LimitsRbacTest-1935847730@example.com", "id": "fc13eec0d5cb40b482cbec485db6a743", "name": "tempest-LimitsRbacTest-367422543", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/fc13eec0d5cb40b482cbec485db6a743"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.420 39 INFO tempest.lib.common.rest_client [req-51b00e16-128c-4703-9223-6d2f1f187d38 ] Request (FlavorRxtxRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.113s 2020-11-06 17:58:51.420 39 DEBUG tempest.lib.common.rest_client [req-51b00e16-128c-4703-9223-6d2f1f187d38 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-FlavorRxtxRbacTest-1984623823", "password": "L7%3XdhX@*U3FlE", "project_id": "09e7b0af05af4ee99d41d6d439a3f8c8", "email": "tempest-FlavorRxtxRbacTest-426860418@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '391', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-51b00e16-128c-4703-9223-6d2f1f187d38', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "09e7b0af05af4ee99d41d6d439a3f8c8", "email": "tempest-FlavorRxtxRbacTest-426860418@example.com", "id": "26dfa1ada6ad4232bc29d00322c5d02c", "name": "tempest-FlavorRxtxRbacTest-1984623823", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/26dfa1ada6ad4232bc29d00322c5d02c"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.438 37 INFO tempest.lib.common.rest_client [req-1ee2c871-7bb9-4b12-8cd9-f0cc59405a73 ] Request (KeypairsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 17:58:51.439 37 DEBUG tempest.lib.common.rest_client [req-1ee2c871-7bb9-4b12-8cd9-f0cc59405a73 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1ee2c871-7bb9-4b12-8cd9-f0cc59405a73', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["3aGTaThxQKi18vXRJrPO3g"], "expires_at": "2020-11-06T18:58:51.000000Z", "issued_at": "2020-11-06T17:58:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.461 40 INFO tempest.lib.common.rest_client [req-1369ee92-194f-49b2-b4fe-7421b0883770 ] Request (LimitsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.048s 2020-11-06 17:58:51.461 40 DEBUG tempest.lib.common.rest_client [req-1369ee92-194f-49b2-b4fe-7421b0883770 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1369ee92-194f-49b2-b4fe-7421b0883770', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.471 39 INFO tempest.lib.common.rest_client [req-aed33e72-e2c2-4e76-8132-d212d1bbf652 ] Request (FlavorRxtxRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.050s 2020-11-06 17:58:51.472 39 DEBUG tempest.lib.common.rest_client [req-aed33e72-e2c2-4e76-8132-d212d1bbf652 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aed33e72-e2c2-4e76-8132-d212d1bbf652', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.473 38 INFO tempest.lib.common.rest_client [req-bc03cf6e-cbbd-42af-912a-33cb611cb330 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.119s 2020-11-06 17:58:51.473 38 DEBUG tempest.lib.common.rest_client [req-bc03cf6e-cbbd-42af-912a-33cb611cb330 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-FlavorExtraSpecsRbacTest-948410924-desc", "domain_id": "default", "name": "tempest-FlavorExtraSpecsRbacTest-948410924"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '384', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bc03cf6e-cbbd-42af-912a-33cb611cb330', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "442586d60ab142eb92d79f82257c85a2", "name": "tempest-FlavorExtraSpecsRbacTest-948410924", "domain_id": "default", "description": "tempest-FlavorExtraSpecsRbacTest-948410924-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.489 37 INFO tempest.lib.common.rest_client [req-4f98422e-fd08-4b4f-b2fd-541d0ab863b7 ] Request (KeypairsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.049s 2020-11-06 17:58:51.489 37 DEBUG tempest.lib.common.rest_client [req-4f98422e-fd08-4b4f-b2fd-541d0ab863b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4f98422e-fd08-4b4f-b2fd-541d0ab863b7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.563 40 INFO tempest.lib.common.rest_client [req-7f63e14c-d6eb-4802-b644-ada2db15829d ] Request (LimitsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.100s 2020-11-06 17:58:51.563 40 DEBUG tempest.lib.common.rest_client [req-7f63e14c-d6eb-4802-b644-ada2db15829d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7f63e14c-d6eb-4802-b644-ada2db15829d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.581 39 INFO tempest.lib.common.rest_client [req-f4aa236a-92b1-4126-a592-000c7f7e53a0 ] Request (FlavorRxtxRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.107s 2020-11-06 17:58:51.581 38 INFO tempest.lib.common.rest_client [req-ee43e3c2-9321-4bc0-bc81-9d70f711c544 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.106s 2020-11-06 17:58:51.581 39 DEBUG tempest.lib.common.rest_client [req-f4aa236a-92b1-4126-a592-000c7f7e53a0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f4aa236a-92b1-4126-a592-000c7f7e53a0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.581 38 DEBUG tempest.lib.common.rest_client [req-ee43e3c2-9321-4bc0-bc81-9d70f711c544 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-FlavorExtraSpecsRbacTest-948410924", "password": "B6=icT4IAGUoSz#", "project_id": "442586d60ab142eb92d79f82257c85a2", "email": "tempest-FlavorExtraSpecsRbacTest-1824827571@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '403', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ee43e3c2-9321-4bc0-bc81-9d70f711c544', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "442586d60ab142eb92d79f82257c85a2", "email": "tempest-FlavorExtraSpecsRbacTest-1824827571@example.com", "id": "a48b438874604322a665d5cb77968d6b", "name": "tempest-FlavorExtraSpecsRbacTest-948410924", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/a48b438874604322a665d5cb77968d6b"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.614 37 INFO tempest.lib.common.rest_client [req-795cf863-86ec-4da1-a916-b3879309edb9 ] Request (KeypairsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.123s 2020-11-06 17:58:51.614 37 DEBUG tempest.lib.common.rest_client [req-795cf863-86ec-4da1-a916-b3879309edb9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-KeypairsRbacTest-410986106-desc", "domain_id": "default", "name": "tempest-KeypairsRbacTest-410986106"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '368', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-795cf863-86ec-4da1-a916-b3879309edb9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "d42b80fe0e66474aaf06abe5b593ff94", "name": "tempest-KeypairsRbacTest-410986106", "domain_id": "default", "description": "tempest-KeypairsRbacTest-410986106-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/d42b80fe0e66474aaf06abe5b593ff94"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.626 40 INFO tempest.lib.common.rest_client [req-ca0565ab-0705-476a-848f-598a37506c71 ] Request (LimitsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/ebc1a2f1e2fd49eb9df63bb338475731/users/fc13eec0d5cb40b482cbec485db6a743/roles/72a4576c553448cd941b052c1ca0cf2d 0.061s 2020-11-06 17:58:51.626 38 INFO tempest.lib.common.rest_client [req-d45f88ad-45bf-466b-b4be-bc64334a0952 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.043s 2020-11-06 17:58:51.626 40 DEBUG tempest.lib.common.rest_client [req-ca0565ab-0705-476a-848f-598a37506c71 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ca0565ab-0705-476a-848f-598a37506c71', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ebc1a2f1e2fd49eb9df63bb338475731/users/fc13eec0d5cb40b482cbec485db6a743/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.626 38 DEBUG tempest.lib.common.rest_client [req-d45f88ad-45bf-466b-b4be-bc64334a0952 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d45f88ad-45bf-466b-b4be-bc64334a0952', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.626 40 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-LimitsRbacTest-367422543', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'ebc1a2f1e2fd49eb9df63bb338475731', 'project_name': 'tempest-LimitsRbacTest-367422543', 'tenant_id': 'ebc1a2f1e2fd49eb9df63bb338475731', 'tenant_name': 'tempest-LimitsRbacTest-367422543', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'fc13eec0d5cb40b482cbec485db6a743'}, Network: None, Subnet: None, Router: None 2020-11-06 17:58:51.627 40 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-LimitsRbacTest-367422543', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'ebc1a2f1e2fd49eb9df63bb338475731', 'project_name': 'tempest-LimitsRbacTest-367422543', 'tenant_id': 'ebc1a2f1e2fd49eb9df63bb338475731', 'tenant_name': 'tempest-LimitsRbacTest-367422543', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'fc13eec0d5cb40b482cbec485db6a743'}, Network: None, Subnet: None, Router: None 2020-11-06 17:58:51.637 39 INFO tempest.lib.common.rest_client [req-61a074ae-0c6c-49e1-89fb-6396a932c7e3 ] Request (FlavorRxtxRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/09e7b0af05af4ee99d41d6d439a3f8c8/users/26dfa1ada6ad4232bc29d00322c5d02c/roles/72a4576c553448cd941b052c1ca0cf2d 0.054s 2020-11-06 17:58:51.637 39 DEBUG tempest.lib.common.rest_client [req-61a074ae-0c6c-49e1-89fb-6396a932c7e3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-61a074ae-0c6c-49e1-89fb-6396a932c7e3', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/09e7b0af05af4ee99d41d6d439a3f8c8/users/26dfa1ada6ad4232bc29d00322c5d02c/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.638 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FlavorRxtxRbacTest-1984623823', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '09e7b0af05af4ee99d41d6d439a3f8c8', 'project_name': 'tempest-FlavorRxtxRbacTest-1984623823', 'tenant_id': '09e7b0af05af4ee99d41d6d439a3f8c8', 'tenant_name': 'tempest-FlavorRxtxRbacTest-1984623823', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '26dfa1ada6ad4232bc29d00322c5d02c'}, Network: None, Subnet: None, Router: None 2020-11-06 17:58:51.638 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FlavorRxtxRbacTest-1984623823', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '09e7b0af05af4ee99d41d6d439a3f8c8', 'project_name': 'tempest-FlavorRxtxRbacTest-1984623823', 'tenant_id': '09e7b0af05af4ee99d41d6d439a3f8c8', 'tenant_name': 'tempest-FlavorRxtxRbacTest-1984623823', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '26dfa1ada6ad4232bc29d00322c5d02c'}, Network: None, Subnet: None, Router: None 2020-11-06 17:58:51.726 37 INFO tempest.lib.common.rest_client [req-934d55bd-fc24-47b5-8cdd-d693b962ff8b ] Request (KeypairsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.110s 2020-11-06 17:58:51.726 37 DEBUG tempest.lib.common.rest_client [req-934d55bd-fc24-47b5-8cdd-d693b962ff8b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-KeypairsRbacTest-410986106", "password": "I3@4bjppYQWigOo", "project_id": "d42b80fe0e66474aaf06abe5b593ff94", "email": "tempest-KeypairsRbacTest-1954928806@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '387', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-934d55bd-fc24-47b5-8cdd-d693b962ff8b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "d42b80fe0e66474aaf06abe5b593ff94", "email": "tempest-KeypairsRbacTest-1954928806@example.com", "id": "9ef898baa3bb4447931809e651131a7d", "name": "tempest-KeypairsRbacTest-410986106", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/9ef898baa3bb4447931809e651131a7d"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.729 40 INFO tempest.lib.common.rest_client [req-34ffba18-35be-4606-92ec-b2acf69eb073 ] Request (LimitsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-11-06 17:58:51.730 40 DEBUG tempest.lib.common.rest_client [req-34ffba18-35be-4606-92ec-b2acf69eb073 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6557', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-34ffba18-35be-4606-92ec-b2acf69eb073', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc13eec0d5cb40b482cbec485db6a743", "name": "tempest-LimitsRbacTest-367422543", "password_expires_at": null}, "audit_ids": ["qJz5_jg5SDe4ohbhE8QjFQ"], "expires_at": "2020-11-06T18:58:51.000000Z", "issued_at": "2020-11-06T17:58:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ebc1a2f1e2fd49eb9df63bb338475731", "name": "tempest-LimitsRbacTest-367422543"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ebc1a2f1e2fd49eb9df63bb338475731", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ebc1a2f1e2fd49eb9df63bb338475731", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ebc1a2f1e2fd49eb9df63bb338475731", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ebc1a2f1e2fd49eb9df63bb338475731", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ebc1a2f1e2fd49eb9df63bb338475731", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ebc1a2f1e2fd49eb9df63bb338475731", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/imag _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.752 39 INFO tempest.lib.common.rest_client [req-aa805d77-dd1b-4903-b12c-7996d68c1792 ] Request (FlavorRxtxRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.101s 2020-11-06 17:58:51.752 39 DEBUG tempest.lib.common.rest_client [req-aa805d77-dd1b-4903-b12c-7996d68c1792 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6567', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aa805d77-dd1b-4903-b12c-7996d68c1792', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "26dfa1ada6ad4232bc29d00322c5d02c", "name": "tempest-FlavorRxtxRbacTest-1984623823", "password_expires_at": null}, "audit_ids": ["Vje2DhTbRbmx3MD7JwnwfA"], "expires_at": "2020-11-06T18:58:51.000000Z", "issued_at": "2020-11-06T17:58:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "09e7b0af05af4ee99d41d6d439a3f8c8", "name": "tempest-FlavorRxtxRbacTest-1984623823"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/09e7b0af05af4ee99d41d6d439a3f8c8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/09e7b0af05af4ee99d41d6d439a3f8c8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/09e7b0af05af4ee99d41d6d439a3f8c8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09e7b0af05af4ee99d41d6d439a3f8c8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09e7b0af05af4ee99d41d6d439a3f8c8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09e7b0af05af4ee99d41d6d439a3f8c8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30. _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.763 40 INFO tempest.lib.common.rest_client [req-146adedc-0ab3-4499-b438-cab79fe75bd8 ] Request (LimitsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 17:58:51.763 40 DEBUG tempest.lib.common.rest_client [req-146adedc-0ab3-4499-b438-cab79fe75bd8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-146adedc-0ab3-4499-b438-cab79fe75bd8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["0PFEZSNJRkeduqluspYUnw"], "expires_at": "2020-11-06T18:58:51.000000Z", "issued_at": "2020-11-06T17:58:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.774 38 INFO tempest.lib.common.rest_client [req-aa11f436-21ed-4856-9416-4a6992a0a597 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.146s 2020-11-06 17:58:51.774 38 DEBUG tempest.lib.common.rest_client [req-aa11f436-21ed-4856-9416-4a6992a0a597 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aa11f436-21ed-4856-9416-4a6992a0a597', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.791 39 INFO tempest.lib.common.rest_client [req-9a8f6e6a-56c2-491c-947a-ad2ce77e2458 ] Request (FlavorRxtxRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 17:58:51.791 39 DEBUG tempest.lib.common.rest_client [req-9a8f6e6a-56c2-491c-947a-ad2ce77e2458 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9a8f6e6a-56c2-491c-947a-ad2ce77e2458', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["iwwj4XdXTTW4QPtUNw2-rg"], "expires_at": "2020-11-06T18:58:51.000000Z", "issued_at": "2020-11-06T17:58:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.809 40 INFO tempest.lib.common.rest_client [req-6765b7a9-e0b6-4a2c-b72c-a35af94c9e11 ] Request (LimitsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 17:58:51.810 40 DEBUG tempest.lib.common.rest_client [req-6765b7a9-e0b6-4a2c-b72c-a35af94c9e11 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6765b7a9-e0b6-4a2c-b72c-a35af94c9e11', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["11jTy4OwQpqfOxB5DRwq6g"], "expires_at": "2020-11-06T18:58:51.000000Z", "issued_at": "2020-11-06T17:58:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.821 37 INFO tempest.lib.common.rest_client [req-0cb58281-9b14-487a-b1aa-f276ee185d95 ] Request (KeypairsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.093s 2020-11-06 17:58:51.821 37 DEBUG tempest.lib.common.rest_client [req-0cb58281-9b14-487a-b1aa-f276ee185d95 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0cb58281-9b14-487a-b1aa-f276ee185d95', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.833 38 INFO tempest.lib.common.rest_client [req-3d04364b-dbcd-426d-9d14-54c2f07cf7c8 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles/72a4576c553448cd941b052c1ca0cf2d 0.058s 2020-11-06 17:58:51.834 38 DEBUG tempest.lib.common.rest_client [req-3d04364b-dbcd-426d-9d14-54c2f07cf7c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3d04364b-dbcd-426d-9d14-54c2f07cf7c8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.834 38 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FlavorExtraSpecsRbacTest-948410924', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '442586d60ab142eb92d79f82257c85a2', 'project_name': 'tempest-FlavorExtraSpecsRbacTest-948410924', 'tenant_id': '442586d60ab142eb92d79f82257c85a2', 'tenant_name': 'tempest-FlavorExtraSpecsRbacTest-948410924', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'a48b438874604322a665d5cb77968d6b'}, Network: None, Subnet: None, Router: None 2020-11-06 17:58:51.835 38 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FlavorExtraSpecsRbacTest-948410924', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '442586d60ab142eb92d79f82257c85a2', 'project_name': 'tempest-FlavorExtraSpecsRbacTest-948410924', 'tenant_id': '442586d60ab142eb92d79f82257c85a2', 'tenant_name': 'tempest-FlavorExtraSpecsRbacTest-948410924', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'a48b438874604322a665d5cb77968d6b'}, Network: None, Subnet: None, Router: None 2020-11-06 17:58:51.835 39 INFO tempest.lib.common.rest_client [req-4da6a0b5-f924-4184-9ffb-359f9f09b1e9 ] Request (FlavorRxtxRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 17:58:51.835 39 DEBUG tempest.lib.common.rest_client [req-4da6a0b5-f924-4184-9ffb-359f9f09b1e9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4da6a0b5-f924-4184-9ffb-359f9f09b1e9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["_L0coBNEQJK38VbIaPnIZg"], "expires_at": "2020-11-06T18:58:51.000000Z", "issued_at": "2020-11-06T17:58:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.865 40 INFO tempest.lib.common.rest_client [req-cbb229f2-ba54-429d-937b-4f5fee763bc1 ] Request (LimitsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.054s 2020-11-06 17:58:51.865 40 DEBUG tempest.lib.common.rest_client [req-cbb229f2-ba54-429d-937b-4f5fee763bc1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cbb229f2-ba54-429d-937b-4f5fee763bc1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.914 37 INFO tempest.lib.common.rest_client [req-e5eaf9aa-c149-4585-9217-1616dc323d59 ] Request (KeypairsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.092s 2020-11-06 17:58:51.914 37 DEBUG tempest.lib.common.rest_client [req-e5eaf9aa-c149-4585-9217-1616dc323d59 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e5eaf9aa-c149-4585-9217-1616dc323d59', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.929 39 INFO tempest.lib.common.rest_client [req-f37d688e-741b-43d0-92b9-c9e65247cb05 ] Request (FlavorRxtxRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.092s 2020-11-06 17:58:51.929 39 DEBUG tempest.lib.common.rest_client [req-f37d688e-741b-43d0-92b9-c9e65247cb05 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f37d688e-741b-43d0-92b9-c9e65247cb05', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.946 38 INFO tempest.lib.common.rest_client [req-e952623f-469c-4f02-8a05-c5d43b3da186 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.100s 2020-11-06 17:58:51.946 38 DEBUG tempest.lib.common.rest_client [req-e952623f-469c-4f02-8a05-c5d43b3da186 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6577', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e952623f-469c-4f02-8a05-c5d43b3da186', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a48b438874604322a665d5cb77968d6b", "name": "tempest-FlavorExtraSpecsRbacTest-948410924", "password_expires_at": null}, "audit_ids": ["_GTDSolcR1CF0Jx0Ro474g"], "expires_at": "2020-11-06T18:58:51.000000Z", "issued_at": "2020-11-06T17:58:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "442586d60ab142eb92d79f82257c85a2", "name": "tempest-FlavorExtraSpecsRbacTest-948410924"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.962 40 INFO tempest.lib.common.rest_client [req-d791de16-1e4a-44d4-9bbd-71d3ac85012e ] Request (LimitsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.095s 2020-11-06 17:58:51.962 40 DEBUG tempest.lib.common.rest_client [req-d791de16-1e4a-44d4-9bbd-71d3ac85012e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d791de16-1e4a-44d4-9bbd-71d3ac85012e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.963 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 17:58:51.964 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:51.979 38 INFO tempest.lib.common.rest_client [req-a654fe58-2140-4d38-9cd5-5eccfb5e09c1 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 17:58:51.979 38 DEBUG tempest.lib.common.rest_client [req-a654fe58-2140-4d38-9cd5-5eccfb5e09c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a654fe58-2140-4d38-9cd5-5eccfb5e09c1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["SHoO3yBcSw2oK-ezrVEDiA"], "expires_at": "2020-11-06T18:58:51.000000Z", "issued_at": "2020-11-06T17:58:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.981 37 INFO tempest.lib.common.rest_client [req-db61021d-d095-46a3-b306-2507fbf40c10 ] Request (KeypairsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/d42b80fe0e66474aaf06abe5b593ff94/users/9ef898baa3bb4447931809e651131a7d/roles/72a4576c553448cd941b052c1ca0cf2d 0.065s 2020-11-06 17:58:51.981 37 DEBUG tempest.lib.common.rest_client [req-db61021d-d095-46a3-b306-2507fbf40c10 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-db61021d-d095-46a3-b306-2507fbf40c10', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d42b80fe0e66474aaf06abe5b593ff94/users/9ef898baa3bb4447931809e651131a7d/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.982 37 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-KeypairsRbacTest-410986106', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'd42b80fe0e66474aaf06abe5b593ff94', 'project_name': 'tempest-KeypairsRbacTest-410986106', 'tenant_id': 'd42b80fe0e66474aaf06abe5b593ff94', 'tenant_name': 'tempest-KeypairsRbacTest-410986106', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '9ef898baa3bb4447931809e651131a7d'}, Network: None, Subnet: None, Router: None 2020-11-06 17:58:51.983 37 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-KeypairsRbacTest-410986106', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'd42b80fe0e66474aaf06abe5b593ff94', 'project_name': 'tempest-KeypairsRbacTest-410986106', 'tenant_id': 'd42b80fe0e66474aaf06abe5b593ff94', 'tenant_name': 'tempest-KeypairsRbacTest-410986106', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '9ef898baa3bb4447931809e651131a7d'}, Network: None, Subnet: None, Router: None 2020-11-06 17:58:51.984 39 INFO tempest.lib.common.rest_client [req-1af87bcb-dd95-46c9-aaad-101b2637c3ca ] Request (FlavorRxtxRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.053s 2020-11-06 17:58:51.984 39 DEBUG tempest.lib.common.rest_client [req-1af87bcb-dd95-46c9-aaad-101b2637c3ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1af87bcb-dd95-46c9-aaad-101b2637c3ca', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:51.985 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 17:58:51.985 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:52.058 40 INFO tempest.lib.common.rest_client [req-ae0d5655-2ffe-4481-9e89-7add3bd0c719 ] Request (LimitsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/ebc1a2f1e2fd49eb9df63bb338475731/users/fc13eec0d5cb40b482cbec485db6a743/roles 0.094s 2020-11-06 17:58:52.059 40 DEBUG tempest.lib.common.rest_client [req-ae0d5655-2ffe-4481-9e89-7add3bd0c719 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ae0d5655-2ffe-4481-9e89-7add3bd0c719', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ebc1a2f1e2fd49eb9df63bb338475731/users/fc13eec0d5cb40b482cbec485db6a743/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ebc1a2f1e2fd49eb9df63bb338475731/users/fc13eec0d5cb40b482cbec485db6a743/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:52.076 38 INFO tempest.lib.common.rest_client [req-71594895-4733-4bed-915f-d75037e72e68 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 17:58:52.076 38 DEBUG tempest.lib.common.rest_client [req-71594895-4733-4bed-915f-d75037e72e68 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-71594895-4733-4bed-915f-d75037e72e68', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["NALTq94oRAW-CtDC1dW4pg"], "expires_at": "2020-11-06T18:58:52.000000Z", "issued_at": "2020-11-06T17:58:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:52.082 39 INFO tempest.lib.common.rest_client [req-b34c4e86-f9cd-461c-ad55-b9e31abef01a ] Request (FlavorRxtxRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/09e7b0af05af4ee99d41d6d439a3f8c8/users/26dfa1ada6ad4232bc29d00322c5d02c/roles 0.096s 2020-11-06 17:58:52.083 39 DEBUG tempest.lib.common.rest_client [req-b34c4e86-f9cd-461c-ad55-b9e31abef01a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b34c4e86-f9cd-461c-ad55-b9e31abef01a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/09e7b0af05af4ee99d41d6d439a3f8c8/users/26dfa1ada6ad4232bc29d00322c5d02c/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/09e7b0af05af4ee99d41d6d439a3f8c8/users/26dfa1ada6ad4232bc29d00322c5d02c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:52.091 37 INFO tempest.lib.common.rest_client [req-bc490d66-8261-44bf-9935-10f2442bea23 ] Request (KeypairsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-11-06 17:58:52.092 37 DEBUG tempest.lib.common.rest_client [req-bc490d66-8261-44bf-9935-10f2442bea23 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6561', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bc490d66-8261-44bf-9935-10f2442bea23', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9ef898baa3bb4447931809e651131a7d", "name": "tempest-KeypairsRbacTest-410986106", "password_expires_at": null}, "audit_ids": ["aEIkjfKFSjmWPN7227a6cg"], "expires_at": "2020-11-06T18:58:52.000000Z", "issued_at": "2020-11-06T17:58:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d42b80fe0e66474aaf06abe5b593ff94", "name": "tempest-KeypairsRbacTest-410986106"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:52.120 40 INFO tempest.lib.common.rest_client [req-0744d7e8-a7b1-4427-9612-ea8032d03485 ] Request (LimitsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/ebc1a2f1e2fd49eb9df63bb338475731/users/fc13eec0d5cb40b482cbec485db6a743/roles/72a4576c553448cd941b052c1ca0cf2d 0.060s 2020-11-06 17:58:52.120 40 DEBUG tempest.lib.common.rest_client [req-0744d7e8-a7b1-4427-9612-ea8032d03485 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0744d7e8-a7b1-4427-9612-ea8032d03485', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ebc1a2f1e2fd49eb9df63bb338475731/users/fc13eec0d5cb40b482cbec485db6a743/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:52.125 38 INFO tempest.lib.common.rest_client [req-73417384-f16f-4919-982d-2461b3d602bc ] Request (FlavorExtraSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.048s 2020-11-06 17:58:52.126 38 DEBUG tempest.lib.common.rest_client [req-73417384-f16f-4919-982d-2461b3d602bc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-73417384-f16f-4919-982d-2461b3d602bc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:52.155 39 INFO tempest.lib.common.rest_client [req-7d30fdc7-3cee-471e-a831-5556b3747530 ] Request (FlavorRxtxRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/09e7b0af05af4ee99d41d6d439a3f8c8/users/26dfa1ada6ad4232bc29d00322c5d02c/roles/72a4576c553448cd941b052c1ca0cf2d 0.071s 2020-11-06 17:58:52.155 39 DEBUG tempest.lib.common.rest_client [req-7d30fdc7-3cee-471e-a831-5556b3747530 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7d30fdc7-3cee-471e-a831-5556b3747530', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/09e7b0af05af4ee99d41d6d439a3f8c8/users/26dfa1ada6ad4232bc29d00322c5d02c/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:52.181 37 INFO tempest.lib.common.rest_client [req-d7ed476f-40ac-4c20-9266-38e2640edbf2 ] Request (KeypairsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 17:58:52.181 37 DEBUG tempest.lib.common.rest_client [req-d7ed476f-40ac-4c20-9266-38e2640edbf2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d7ed476f-40ac-4c20-9266-38e2640edbf2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["OPS7nrfoQnuQNA0jyAsKyw"], "expires_at": "2020-11-06T18:58:52.000000Z", "issued_at": "2020-11-06T17:58:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:52.221 40 INFO tempest.lib.common.rest_client [req-92d9aacd-2a2b-4bbd-9f2a-132b16e07a20 ] Request (LimitsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/ebc1a2f1e2fd49eb9df63bb338475731/users/fc13eec0d5cb40b482cbec485db6a743/roles/a629c95d64b3416fb80ae90af4f69c05 0.099s 2020-11-06 17:58:52.221 40 DEBUG tempest.lib.common.rest_client [req-92d9aacd-2a2b-4bbd-9f2a-132b16e07a20 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-92d9aacd-2a2b-4bbd-9f2a-132b16e07a20', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ebc1a2f1e2fd49eb9df63bb338475731/users/fc13eec0d5cb40b482cbec485db6a743/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:52.228 38 INFO tempest.lib.common.rest_client [req-185e7892-45aa-4299-a0be-1002b99b19d1 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.101s 2020-11-06 17:58:52.228 38 DEBUG tempest.lib.common.rest_client [req-185e7892-45aa-4299-a0be-1002b99b19d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-185e7892-45aa-4299-a0be-1002b99b19d1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:52.229 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 17:58:52.229 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:52.278 37 INFO tempest.lib.common.rest_client [req-6b5c1e6d-013a-4d95-9556-27bb462f80fb ] Request (KeypairsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-11-06 17:58:52.278 37 DEBUG tempest.lib.common.rest_client [req-6b5c1e6d-013a-4d95-9556-27bb462f80fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6b5c1e6d-013a-4d95-9556-27bb462f80fb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["cVSDEt1WQHiOCxE8_n4vwg"], "expires_at": "2020-11-06T18:58:52.000000Z", "issued_at": "2020-11-06T17:58:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:52.309 39 INFO tempest.lib.common.rest_client [req-4d8d6f8d-dfd0-4998-9969-d3ff2e8d9670 ] Request (FlavorRxtxRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/09e7b0af05af4ee99d41d6d439a3f8c8/users/26dfa1ada6ad4232bc29d00322c5d02c/roles/a629c95d64b3416fb80ae90af4f69c05 0.153s 2020-11-06 17:58:52.310 39 DEBUG tempest.lib.common.rest_client [req-4d8d6f8d-dfd0-4998-9969-d3ff2e8d9670 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4d8d6f8d-dfd0-4998-9969-d3ff2e8d9670', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/09e7b0af05af4ee99d41d6d439a3f8c8/users/26dfa1ada6ad4232bc29d00322c5d02c/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:52.326 37 INFO tempest.lib.common.rest_client [req-fbb66c31-4208-4a0b-89cd-84034a2952da ] Request (KeypairsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.046s 2020-11-06 17:58:52.326 37 DEBUG tempest.lib.common.rest_client [req-fbb66c31-4208-4a0b-89cd-84034a2952da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fbb66c31-4208-4a0b-89cd-84034a2952da', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:52.389 38 INFO tempest.lib.common.rest_client [req-905d2b9b-e207-4524-83fd-239ff78475b1 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles 0.158s 2020-11-06 17:58:52.389 38 DEBUG tempest.lib.common.rest_client [req-905d2b9b-e207-4524-83fd-239ff78475b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-905d2b9b-e207-4524-83fd-239ff78475b1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:52.431 37 INFO tempest.lib.common.rest_client [req-216db665-4f6c-4412-b8c2-5ef4c31102d8 ] Request (KeypairsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.103s 2020-11-06 17:58:52.432 37 DEBUG tempest.lib.common.rest_client [req-216db665-4f6c-4412-b8c2-5ef4c31102d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-216db665-4f6c-4412-b8c2-5ef4c31102d8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:52.432 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 17:58:52.433 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:52.450 38 INFO tempest.lib.common.rest_client [req-33577e78-dff8-4df1-913f-9ab48f3d14d9 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles/72a4576c553448cd941b052c1ca0cf2d 0.060s 2020-11-06 17:58:52.451 38 DEBUG tempest.lib.common.rest_client [req-33577e78-dff8-4df1-913f-9ab48f3d14d9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-33577e78-dff8-4df1-913f-9ab48f3d14d9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:52.528 37 INFO tempest.lib.common.rest_client [req-3bee428f-5731-4861-a092-cca6a5180121 ] Request (KeypairsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/d42b80fe0e66474aaf06abe5b593ff94/users/9ef898baa3bb4447931809e651131a7d/roles 0.094s 2020-11-06 17:58:52.528 37 DEBUG tempest.lib.common.rest_client [req-3bee428f-5731-4861-a092-cca6a5180121 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3bee428f-5731-4861-a092-cca6a5180121', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d42b80fe0e66474aaf06abe5b593ff94/users/9ef898baa3bb4447931809e651131a7d/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d42b80fe0e66474aaf06abe5b593ff94/users/9ef898baa3bb4447931809e651131a7d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:52.568 38 INFO tempest.lib.common.rest_client [req-ea157209-d6c1-479e-8b82-d9b76756744b ] Request (FlavorExtraSpecsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles/a629c95d64b3416fb80ae90af4f69c05 0.116s 2020-11-06 17:58:52.568 38 DEBUG tempest.lib.common.rest_client [req-ea157209-d6c1-479e-8b82-d9b76756744b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ea157209-d6c1-479e-8b82-d9b76756744b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:52.585 37 INFO tempest.lib.common.rest_client [req-b1882b37-b8a1-436e-a2e0-6fd1765a8c1f ] Request (KeypairsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/d42b80fe0e66474aaf06abe5b593ff94/users/9ef898baa3bb4447931809e651131a7d/roles/72a4576c553448cd941b052c1ca0cf2d 0.056s 2020-11-06 17:58:52.586 37 DEBUG tempest.lib.common.rest_client [req-b1882b37-b8a1-436e-a2e0-6fd1765a8c1f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b1882b37-b8a1-436e-a2e0-6fd1765a8c1f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d42b80fe0e66474aaf06abe5b593ff94/users/9ef898baa3bb4447931809e651131a7d/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:52.698 37 INFO tempest.lib.common.rest_client [req-647aa38e-1626-4749-bc47-2a771a73c3af ] Request (KeypairsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/d42b80fe0e66474aaf06abe5b593ff94/users/9ef898baa3bb4447931809e651131a7d/roles/a629c95d64b3416fb80ae90af4f69c05 0.111s 2020-11-06 17:58:52.699 37 DEBUG tempest.lib.common.rest_client [req-647aa38e-1626-4749-bc47-2a771a73c3af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-647aa38e-1626-4749-bc47-2a771a73c3af', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d42b80fe0e66474aaf06abe5b593ff94/users/9ef898baa3bb4447931809e651131a7d/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:53.315 40 INFO tempest.lib.common.rest_client [req-35185a74-a572-410f-b53f-a1abb1ae033b ] Request (LimitsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-11-06 17:58:53.316 40 DEBUG tempest.lib.common.rest_client [req-35185a74-a572-410f-b53f-a1abb1ae033b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-35185a74-a572-410f-b53f-a1abb1ae033b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc13eec0d5cb40b482cbec485db6a743", "name": "tempest-LimitsRbacTest-367422543", "password_expires_at": null}, "audit_ids": ["ZySezrQnSKObZOMrdmJDLw"], "expires_at": "2020-11-06T18:58:53.000000Z", "issued_at": "2020-11-06T17:58:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ebc1a2f1e2fd49eb9df63bb338475731", "name": "tempest-LimitsRbacTest-367422543"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ebc1a2f1e2fd49eb9df63bb338475731", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ebc1a2f1e2fd49eb9df63bb338475731", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ebc1a2f1e2fd49eb9df63bb338475731", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ebc1a2f1e2fd49eb9df63bb338475731", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ebc1a2f1e2fd49eb9df63bb338475731", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ebc1a2f1e2fd49eb9df63bb338475731", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:53.318 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:58:53.319 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.320 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.321 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.321 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.322 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.323 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.323 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.324 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.325 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.325 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.326 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.326 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.327 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.327 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.328 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.328 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.329 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.329 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.329 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.330 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.330 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.330 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.331 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.331 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.331 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.332 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.332 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.332 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.333 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.333 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.333 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.333 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.334 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.334 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.334 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.335 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.335 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.335 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.336 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.336 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.336 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.336 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.337 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.337 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.337 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.338 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.338 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.338 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.339 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.339 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.339 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.340 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.340 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.340 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.341 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.341 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.341 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.342 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.342 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.342 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.343 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.343 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.344 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.344 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.344 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.344 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.345 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.345 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.345 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.346 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.346 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.346 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.347 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.347 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.347 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.348 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:limits, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:58:53.348 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:53.410 39 INFO tempest.lib.common.rest_client [req-a17dc2e9-2024-413a-9007-d4dd19f84157 ] Request (FlavorRxtxRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-11-06 17:58:53.410 39 DEBUG tempest.lib.common.rest_client [req-a17dc2e9-2024-413a-9007-d4dd19f84157 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a17dc2e9-2024-413a-9007-d4dd19f84157', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "26dfa1ada6ad4232bc29d00322c5d02c", "name": "tempest-FlavorRxtxRbacTest-1984623823", "password_expires_at": null}, "audit_ids": ["mEGa5PIkRYGorzuYk9KmrA"], "expires_at": "2020-11-06T18:58:53.000000Z", "issued_at": "2020-11-06T17:58:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "09e7b0af05af4ee99d41d6d439a3f8c8", "name": "tempest-FlavorRxtxRbacTest-1984623823"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/09e7b0af05af4ee99d41d6d439a3f8c8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/09e7b0af05af4ee99d41d6d439a3f8c8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/09e7b0af05af4ee99d41d6d439a3f8c8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09e7b0af05af4ee99d41d6d439a3f8c8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09e7b0af05af4ee99d41d6d439a3f8c8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09e7b0af05af4ee99d41d6d439a3f8c8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:53.459 40 INFO tempest.lib.common.rest_client [req-adba4c20-4ea2-452a-a2e8-328b6a00e979 ] Request (LimitsRbacTest:test_show_limits): 200 GET http://172.30.13.94/identity/v3/projects/ebc1a2f1e2fd49eb9df63bb338475731/users/fc13eec0d5cb40b482cbec485db6a743/roles 0.110s 2020-11-06 17:58:53.459 40 DEBUG tempest.lib.common.rest_client [req-adba4c20-4ea2-452a-a2e8-328b6a00e979 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-adba4c20-4ea2-452a-a2e8-328b6a00e979', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ebc1a2f1e2fd49eb9df63bb338475731/users/fc13eec0d5cb40b482cbec485db6a743/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ebc1a2f1e2fd49eb9df63bb338475731/users/fc13eec0d5cb40b482cbec485db6a743/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:53.496 40 INFO tempest.lib.common.rest_client [req-63acb26c-acd4-412c-94d2-216001a755f6 ] Request (LimitsRbacTest:test_show_limits): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 17:58:53.496 40 DEBUG tempest.lib.common.rest_client [req-63acb26c-acd4-412c-94d2-216001a755f6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-63acb26c-acd4-412c-94d2-216001a755f6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc13eec0d5cb40b482cbec485db6a743", "name": "tempest-LimitsRbacTest-367422543", "password_expires_at": null}, "audit_ids": ["YhF1qbMTRgClCvs291HX7A"], "expires_at": "2020-11-06T18:58:53.000000Z", "issued_at": "2020-11-06T17:58:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ebc1a2f1e2fd49eb9df63bb338475731", "name": "tempest-LimitsRbacTest-367422543"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ebc1a2f1e2fd49eb9df63bb338475731", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ebc1a2f1e2fd49eb9df63bb338475731", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ebc1a2f1e2fd49eb9df63bb338475731", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ebc1a2f1e2fd49eb9df63bb338475731", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ebc1a2f1e2fd49eb9df63bb338475731", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ebc1a2f1e2fd49eb9df63bb338475731", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:53.587 39 INFO tempest.lib.common.rest_client [req-551a4438-4959-46d4-aeb3-7c4505330eb0 ] Request (FlavorRxtxRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/26dfa1ada6ad4232bc29d00322c5d02c 0.173s 2020-11-06 17:58:53.588 39 DEBUG tempest.lib.common.rest_client [req-551a4438-4959-46d4-aeb3-7c4505330eb0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-551a4438-4959-46d4-aeb3-7c4505330eb0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/26dfa1ada6ad4232bc29d00322c5d02c'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:53.655 38 INFO tempest.lib.common.rest_client [req-ec3bf32c-a0b9-49fb-be2d-b9e56e5e00bb ] Request (FlavorExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 17:58:53.655 40 INFO tempest.lib.common.rest_client [req-bc4187f8-00eb-4159-8c28-8025c712ba3f ] Request (LimitsRbacTest:test_show_limits): 200 GET http://172.30.13.94/compute/v2.1/limits 0.157s 2020-11-06 17:58:53.656 38 DEBUG tempest.lib.common.rest_client [req-ec3bf32c-a0b9-49fb-be2d-b9e56e5e00bb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ec3bf32c-a0b9-49fb-be2d-b9e56e5e00bb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a48b438874604322a665d5cb77968d6b", "name": "tempest-FlavorExtraSpecsRbacTest-948410924", "password_expires_at": null}, "audit_ids": ["g_Ds9BStS66xij5fnqoM-A"], "expires_at": "2020-11-06T18:58:53.000000Z", "issued_at": "2020-11-06T17:58:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "442586d60ab142eb92d79f82257c85a2", "name": "tempest-FlavorExtraSpecsRbacTest-948410924"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:53.656 40 DEBUG tempest.lib.common.rest_client [req-bc4187f8-00eb-4159-8c28-8025c712ba3f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '511', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bc4187f8-00eb-4159-8c28-8025c712ba3f', 'x-compute-request-id': 'req-bc4187f8-00eb-4159-8c28-8025c712ba3f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/limits'} Body: b'{"limits": {"rate": [], "absolute": {"maxTotalInstances": 10, "maxTotalCores": 20, "maxTotalRAMSize": 51200, "maxServerMeta": 128, "maxImageMeta": 128, "maxPersonality": 5, "maxPersonalitySize": 10240, "maxTotalKeypairs": 100, "maxServerGroups": 10, "maxServerGroupMembers": 10, "maxTotalFloatingIps": -1, "maxSecurityGroups": -1, "maxSecurityGroupRules": -1, "totalRAMUsed": 0, "totalCoresUsed": 0, "totalInstancesUsed": 0, "totalFloatingIpsUsed": 0, "totalSecurityGroupsUsed": 0, "totalServerGroupsUsed": 0}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:53.665 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:53.676 39 INFO tempest.lib.common.rest_client [req-16f42571-1952-4b76-aeb6-ec1db845a340 ] Request (FlavorRxtxRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-11-06 17:58:53.676 39 DEBUG tempest.lib.common.rest_client [req-16f42571-1952-4b76-aeb6-ec1db845a340 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-16f42571-1952-4b76-aeb6-ec1db845a340', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["E4SI9Wy-Sze4wZt5IORPjg"], "expires_at": "2020-11-06T18:58:53.000000Z", "issued_at": "2020-11-06T17:58:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:53.718 40 INFO tempest.lib.common.rest_client [req-3c544351-f2ad-407b-9e26-fd87907ca8c1 ] Request (LimitsRbacTest:test_show_limits): 200 GET http://172.30.13.94/identity/v3/projects/ebc1a2f1e2fd49eb9df63bb338475731/users/fc13eec0d5cb40b482cbec485db6a743/roles 0.052s 2020-11-06 17:58:53.719 40 DEBUG tempest.lib.common.rest_client [req-3c544351-f2ad-407b-9e26-fd87907ca8c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3c544351-f2ad-407b-9e26-fd87907ca8c1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ebc1a2f1e2fd49eb9df63bb338475731/users/fc13eec0d5cb40b482cbec485db6a743/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ebc1a2f1e2fd49eb9df63bb338475731/users/fc13eec0d5cb40b482cbec485db6a743/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:53.784 37 INFO tempest.lib.common.rest_client [req-a9f71fa3-e90e-4ba9-a852-c04f778010eb ] Request (KeypairsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 17:58:53.784 37 DEBUG tempest.lib.common.rest_client [req-a9f71fa3-e90e-4ba9-a852-c04f778010eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a9f71fa3-e90e-4ba9-a852-c04f778010eb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9ef898baa3bb4447931809e651131a7d", "name": "tempest-KeypairsRbacTest-410986106", "password_expires_at": null}, "audit_ids": ["HBfYyB1iQbWBfJ4aYU7qBQ"], "expires_at": "2020-11-06T18:58:53.000000Z", "issued_at": "2020-11-06T17:58:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d42b80fe0e66474aaf06abe5b593ff94", "name": "tempest-KeypairsRbacTest-410986106"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:53.787 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:58:53.788 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.789 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.790 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.790 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.791 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.791 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.792 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.793 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.793 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.794 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.794 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.795 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.795 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.796 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.796 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.797 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.797 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.798 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.798 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.799 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.799 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.800 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.800 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.801 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.801 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.801 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.802 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.802 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.802 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.802 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.803 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.803 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.803 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.804 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.804 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.804 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.805 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.805 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.805 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.805 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.806 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.806 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.806 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.807 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.807 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.807 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.807 40 INFO tempest.lib.common.rest_client [req-27184652-a819-4639-987c-e13ea48107f3 ] Request (LimitsRbacTest:test_show_limits): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 17:58:53.808 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.808 40 DEBUG tempest.lib.common.rest_client [req-27184652-a819-4639-987c-e13ea48107f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-27184652-a819-4639-987c-e13ea48107f3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc13eec0d5cb40b482cbec485db6a743", "name": "tempest-LimitsRbacTest-367422543", "password_expires_at": null}, "audit_ids": ["l1QqvFYbS5i-iqA3kUFOMA"], "expires_at": "2020-11-06T18:58:53.000000Z", "issued_at": "2020-11-06T17:58:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ebc1a2f1e2fd49eb9df63bb338475731", "name": "tempest-LimitsRbacTest-367422543"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ebc1a2f1e2fd49eb9df63bb338475731", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ebc1a2f1e2fd49eb9df63bb338475731", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ebc1a2f1e2fd49eb9df63bb338475731", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ebc1a2f1e2fd49eb9df63bb338475731", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ebc1a2f1e2fd49eb9df63bb338475731", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ebc1a2f1e2fd49eb9df63bb338475731", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:53.808 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.808 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.809 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.809 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.809 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.809 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.810 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.810 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.810 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.811 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.811 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.811 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.812 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.812 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.813 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.813 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.813 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.813 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.814 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.814 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.814 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.815 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.815 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.815 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.815 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.816 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.816 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.816 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.817 38 INFO tempest.lib.common.rest_client [req-3ec5d982-0b0f-449a-bd23-fa055d52f6ae ] Request (FlavorExtraSpecsRbacTest:setUpClass): 200 POST http://172.30.13.94/compute/v2.1/flavors 0.158s 2020-11-06 17:58:53.817 38 DEBUG tempest.lib.common.rest_client [req-3ec5d982-0b0f-449a-bd23-fa055d52f6ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"flavor": {"name": "tempest-FlavorExtraSpecsRbacTest-flavor-892998962", "ram": 4, "vcpus": 10, "disk": 1, "id": "f2373073-43f1-4b3f-94d6-4a91fb3d87a4"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '510', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3ec5d982-0b0f-449a-bd23-fa055d52f6ae', 'x-compute-request-id': 'req-3ec5d982-0b0f-449a-bd23-fa055d52f6ae', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors'} Body: b'{"flavor": {"id": "f2373073-43f1-4b3f-94d6-4a91fb3d87a4", "name": "tempest-FlavorExtraSpecsRbacTest-flavor-892998962", "ram": 4, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 10, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/f2373073-43f1-4b3f-94d6-4a91fb3d87a4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/f2373073-43f1-4b3f-94d6-4a91fb3d87a4"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:53.817 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-keypairs:create, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:58:53.818 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:53.825 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:58:53.826 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.827 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.827 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.828 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.829 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.829 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.830 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.831 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.831 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.832 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.832 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.833 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.833 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.833 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.834 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.834 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.834 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.834 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.835 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.835 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.835 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.835 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.836 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.836 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.836 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.836 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.836 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.837 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.837 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.837 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.837 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.838 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.838 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.838 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.838 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.838 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.838 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.839 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.839 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.839 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.839 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.840 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.840 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.840 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.840 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.840 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.841 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.841 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.841 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.841 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.842 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.842 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.842 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.842 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.843 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.843 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.843 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.843 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.843 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.844 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.844 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.844 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.844 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.845 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.845 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.845 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.846 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.846 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.846 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.846 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.846 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.847 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.847 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.847 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.847 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:53.848 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-flavor-extra-specs:index, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:58:53.875 37 INFO tempest.lib.common.rest_client [req-61340f3c-4bde-4d82-908a-b29815335e22 ] Request (KeypairsRbacTest:test_create_keypair): 200 GET http://172.30.13.94/identity/v3/projects/d42b80fe0e66474aaf06abe5b593ff94/users/9ef898baa3bb4447931809e651131a7d/roles 0.056s 2020-11-06 17:58:53.876 37 DEBUG tempest.lib.common.rest_client [req-61340f3c-4bde-4d82-908a-b29815335e22 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-61340f3c-4bde-4d82-908a-b29815335e22', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d42b80fe0e66474aaf06abe5b593ff94/users/9ef898baa3bb4447931809e651131a7d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d42b80fe0e66474aaf06abe5b593ff94/users/9ef898baa3bb4447931809e651131a7d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:53.899 38 INFO tempest.lib.common.rest_client [req-2881fc2b-2caf-4a32-aef7-6edb0600a555 ] Request (FlavorExtraSpecsRbacTest:test_list_flavor_extra_specs): 200 POST http://172.30.13.94/compute/v2.1/flavors/f2373073-43f1-4b3f-94d6-4a91fb3d87a4/os-extra_specs 0.050s 2020-11-06 17:58:53.899 38 DEBUG tempest.lib.common.rest_client [req-2881fc2b-2caf-4a32-aef7-6edb0600a555 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"extra_specs": {"tempest-FlavorExtraSpecsRbacTest-key-49253124": "tempest-FlavorExtraSpecsRbacTest-val-239817099"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '116', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2881fc2b-2caf-4a32-aef7-6edb0600a555', 'x-compute-request-id': 'req-2881fc2b-2caf-4a32-aef7-6edb0600a555', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/f2373073-43f1-4b3f-94d6-4a91fb3d87a4/os-extra_specs'} Body: b'{"extra_specs": {"tempest-FlavorExtraSpecsRbacTest-key-49253124": "tempest-FlavorExtraSpecsRbacTest-val-239817099"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:53.902 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:53.908 37 INFO tempest.lib.common.rest_client [req-94a91d84-ec85-4a16-98bd-0bb3e6c91c98 ] Request (KeypairsRbacTest:test_create_keypair): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 17:58:53.909 37 DEBUG tempest.lib.common.rest_client [req-94a91d84-ec85-4a16-98bd-0bb3e6c91c98 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-94a91d84-ec85-4a16-98bd-0bb3e6c91c98', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9ef898baa3bb4447931809e651131a7d", "name": "tempest-KeypairsRbacTest-410986106", "password_expires_at": null}, "audit_ids": ["IYMBcObHRMS9Pm-_Q-Su2Q"], "expires_at": "2020-11-06T18:58:53.000000Z", "issued_at": "2020-11-06T17:58:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d42b80fe0e66474aaf06abe5b593ff94", "name": "tempest-KeypairsRbacTest-410986106"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:53.938 40 INFO tempest.lib.common.rest_client [req-bff47247-3e02-48a0-9422-565937db0d05 ] Request (LimitsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/fc13eec0d5cb40b482cbec485db6a743 0.127s 2020-11-06 17:58:53.938 40 DEBUG tempest.lib.common.rest_client [req-bff47247-3e02-48a0-9422-565937db0d05 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bff47247-3e02-48a0-9422-565937db0d05', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/fc13eec0d5cb40b482cbec485db6a743'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:53.963 38 INFO tempest.lib.common.rest_client [req-7ee206f1-57d9-49f9-8214-9a5eca2d5933 ] Request (FlavorExtraSpecsRbacTest:test_list_flavor_extra_specs): 200 GET http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles 0.060s 2020-11-06 17:58:53.964 38 DEBUG tempest.lib.common.rest_client [req-7ee206f1-57d9-49f9-8214-9a5eca2d5933 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7ee206f1-57d9-49f9-8214-9a5eca2d5933', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:54.023 40 INFO tempest.lib.common.rest_client [req-fcd6d37a-de2e-486a-9506-b4b76b41d810 ] Request (LimitsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-11-06 17:58:54.023 40 DEBUG tempest.lib.common.rest_client [req-fcd6d37a-de2e-486a-9506-b4b76b41d810 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fcd6d37a-de2e-486a-9506-b4b76b41d810', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["EotI3v9hTlCLXX91yGadgA"], "expires_at": "2020-11-06T18:58:53.000000Z", "issued_at": "2020-11-06T17:58:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:54.052 38 INFO tempest.lib.common.rest_client [req-8c07faac-a1ce-47f6-8a85-c02ece0b50f1 ] Request (FlavorExtraSpecsRbacTest:test_list_flavor_extra_specs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-11-06 17:58:54.053 38 DEBUG tempest.lib.common.rest_client [req-8c07faac-a1ce-47f6-8a85-c02ece0b50f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8c07faac-a1ce-47f6-8a85-c02ece0b50f1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a48b438874604322a665d5cb77968d6b", "name": "tempest-FlavorExtraSpecsRbacTest-948410924", "password_expires_at": null}, "audit_ids": ["MdyEmCxfRi6AjuCPzym6Rw"], "expires_at": "2020-11-06T18:58:53.000000Z", "issued_at": "2020-11-06T17:58:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "442586d60ab142eb92d79f82257c85a2", "name": "tempest-FlavorExtraSpecsRbacTest-948410924"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:54.154 38 INFO tempest.lib.common.rest_client [req-317cd5e6-a29e-4cd1-a6a7-3221ff3323d1 ] Request (FlavorExtraSpecsRbacTest:test_list_flavor_extra_specs): 200 GET http://172.30.13.94/compute/v2.1/flavors/f2373073-43f1-4b3f-94d6-4a91fb3d87a4/os-extra_specs 0.100s 2020-11-06 17:58:54.155 38 DEBUG tempest.lib.common.rest_client [req-317cd5e6-a29e-4cd1-a6a7-3221ff3323d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '116', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-317cd5e6-a29e-4cd1-a6a7-3221ff3323d1', 'x-compute-request-id': 'req-317cd5e6-a29e-4cd1-a6a7-3221ff3323d1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/f2373073-43f1-4b3f-94d6-4a91fb3d87a4/os-extra_specs'} Body: b'{"extra_specs": {"tempest-FlavorExtraSpecsRbacTest-key-49253124": "tempest-FlavorExtraSpecsRbacTest-val-239817099"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:54.157 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:54.171 39 INFO tempest.lib.common.rest_client [req-44b7c5f4-f189-4eef-a911-01022477d41a ] Request (FlavorRxtxRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=09e7b0af05af4ee99d41d6d439a3f8c8&name=default 0.494s 2020-11-06 17:58:54.172 39 DEBUG tempest.lib.common.rest_client [req-44b7c5f4-f189-4eef-a911-01022477d41a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-44b7c5f4-f189-4eef-a911-01022477d41a', 'date': 'Fri, 06 Nov 2020 17:58:54 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=09e7b0af05af4ee99d41d6d439a3f8c8&name=default'} Body: b'{"security_groups": [{"id": "a978a07d-1092-458e-b382-e0acebe5e761", "name": "default", "stateful": true, "tenant_id": "09e7b0af05af4ee99d41d6d439a3f8c8", "description": "Default security group", "security_group_rules": [{"id": "5fb3cee6-4e74-4831-bae0-7a863f46f024", "tenant_id": "09e7b0af05af4ee99d41d6d439a3f8c8", "security_group_id": "a978a07d-1092-458e-b382-e0acebe5e761", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "a978a07d-1092-458e-b382-e0acebe5e761", "description": null, "tags": [], "created_at": "2020-11-06T17:58:53Z", "updated_at": "2020-11-06T17:58:53Z", "revision_number": 0, "project_id": "09e7b0af05af4ee99d41d6d439a3f8c8"}, {"id": "9260b2f3-6eb0-4752-bfc9-e3cd2c82a533", "tenant_id": "09e7b0af05af4ee99d41d6d439a3f8c8", "security_group_id": "a978a07d-1092-458e-b382-e0acebe5e761", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:58:54Z", "updated_at": "2020-11-06T17:58:54Z", "revision_number": 0, "project_id": "09e7b0af05af4ee99d41d6d439a3f8c8"}, {"id": "ad72b576-1b32-4dd2-824b-845ef915ab0c", "tenant_id": "09e7b0af05af4ee99d41d6d439a3f8c8", "security_group_id": "a978a07d-1092-458e-b382-e0acebe5e761", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:58:53Z", "updated_at": "2020-11-06T17:58:53Z", "revision_number": 0, "project_id": "09e7b0af05af4ee99d41d6d439a3f8c8"}, {"id": "e2d2329d-e589-4036-9653-d533dc6629f9", "tenant_id": "09e7b0af05af4ee99d41d6d439a3f8c8", "security_group_id": "a978a07d-1092-458e-b382-e0acebe5e761", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "a978a07d-1092-458e-b382-e0acebe5e761", "description": null, "tags": [], "created_at": "2020-11-06T17:58:53Z", "updated_at": "2020-11-06T17:58:53Z", "revision_number": 0, "project_id": "09e7b0af05af4ee99d41d6d439a3f8c8"}], "tags": [], "created_at": "2020-11-06T17:58:53Z", "updated_at": "2020-11-06T17:58:53Z", "revision_number": 1, "project_id": "09e7b0af05af4ee99d41d6d439a3f8c8"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:54.215 38 INFO tempest.lib.common.rest_client [req-b08a5339-bf8f-4de6-af26-afa5ac67b944 ] Request (FlavorExtraSpecsRbacTest:test_list_flavor_extra_specs): 200 GET http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles 0.057s 2020-11-06 17:58:54.216 38 DEBUG tempest.lib.common.rest_client [req-b08a5339-bf8f-4de6-af26-afa5ac67b944 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b08a5339-bf8f-4de6-af26-afa5ac67b944', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:54.251 37 INFO tempest.lib.common.rest_client [req-63e553dc-55f8-472a-a3a0-440ea489ab54 ] Request (KeypairsRbacTest:test_create_keypair): 200 POST http://172.30.13.94/compute/v2.1/os-keypairs 0.341s 2020-11-06 17:58:54.251 38 INFO tempest.lib.common.rest_client [req-3bf5bedd-cdae-4548-b292-bc49713e009e ] Request (FlavorExtraSpecsRbacTest:test_list_flavor_extra_specs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 17:58:54.252 37 DEBUG tempest.lib.common.rest_client [req-63e553dc-55f8-472a-a3a0-440ea489ab54 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"keypair": {"name": "tempest-KeypairsRbacTest-key-495819029"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2317', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-63e553dc-55f8-472a-a3a0-440ea489ab54', 'x-compute-request-id': 'req-63e553dc-55f8-472a-a3a0-440ea489ab54', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-keypairs'} Body: b'{"keypair": {"private_key": "-----BEGIN RSA PRIVATE KEY-----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\\n6Az3SREjRTspTFO9XMzuIDIBU90FsQ0Q5/Rc63J1VN0ZfHmTyPXqug==\\n-----END RSA PRIVATE KEY-----\\n", "name": "tempest-KeypairsRbacTest-key-495819029", "public_key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDCRd68k4a+uox+qM1ofh9MOO3ZBdOvMHIhX2FHCJxtSXGDCCMlf6Pun9UsTYnFaEnhgY3p64nDTZ6aVx/+TajWS4qUKp0eGMQTaGZsLTDxH2jY0BzH/iK4Lw+7CN+MPNE2wLKXigmUhAd4QGhDQku+UqUYduxe18L8gAfArJDgGq38NF0aHJlR38KuFbeN5J5BAArLjSXNns1cfHK3bKfVVbyVenK4y9Dp9wnjIMvXs8i0TVQt6Ni8jaLCzhT6cszGz2okU38TWbNcXBBVKeal2Pf5/U5/Oil4mbLwmKJyRvW8K6nNYBuw02T6jGZ+irwFC5or572MWeld2j+s27sD Generated-by-Nova", "fingerprint": "79:e4:f1:87:88:3c:c5:7f:ad:9b:3c:02:5a:d9:c0:34", "user_id": "9ef898baa3bb4447931809e651131a7d"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:54.252 38 DEBUG tempest.lib.common.rest_client [req-3bf5bedd-cdae-4548-b292-bc49713e009e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3bf5bedd-cdae-4548-b292-bc49713e009e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a48b438874604322a665d5cb77968d6b", "name": "tempest-FlavorExtraSpecsRbacTest-948410924", "password_expires_at": null}, "audit_ids": ["wjbT4cYTTYenP3OcNRonuw"], "expires_at": "2020-11-06T18:58:54.000000Z", "issued_at": "2020-11-06T17:58:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "442586d60ab142eb92d79f82257c85a2", "name": "tempest-FlavorExtraSpecsRbacTest-948410924"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:54.255 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:54.318 37 INFO tempest.lib.common.rest_client [req-2a1cecb8-1dd2-4ffc-8706-bf50cbb2c4fa ] Request (KeypairsRbacTest:test_create_keypair): 200 GET http://172.30.13.94/identity/v3/projects/d42b80fe0e66474aaf06abe5b593ff94/users/9ef898baa3bb4447931809e651131a7d/roles 0.061s 2020-11-06 17:58:54.318 37 DEBUG tempest.lib.common.rest_client [req-2a1cecb8-1dd2-4ffc-8706-bf50cbb2c4fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2a1cecb8-1dd2-4ffc-8706-bf50cbb2c4fa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d42b80fe0e66474aaf06abe5b593ff94/users/9ef898baa3bb4447931809e651131a7d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d42b80fe0e66474aaf06abe5b593ff94/users/9ef898baa3bb4447931809e651131a7d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:54.342 40 INFO tempest.lib.common.rest_client [req-98cb40e7-6c20-4dbe-b2d9-1955279c2b38 ] Request (LimitsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=ebc1a2f1e2fd49eb9df63bb338475731&name=default 0.317s 2020-11-06 17:58:54.342 40 DEBUG tempest.lib.common.rest_client [req-98cb40e7-6c20-4dbe-b2d9-1955279c2b38 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-98cb40e7-6c20-4dbe-b2d9-1955279c2b38', 'date': 'Fri, 06 Nov 2020 17:58:54 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=ebc1a2f1e2fd49eb9df63bb338475731&name=default'} Body: b'{"security_groups": [{"id": "a76564b3-9eb9-4986-ab15-4f1e29cec8c6", "name": "default", "stateful": true, "tenant_id": "ebc1a2f1e2fd49eb9df63bb338475731", "description": "Default security group", "security_group_rules": [{"id": "450c55dd-a506-4957-a3b2-ed5457f3a305", "tenant_id": "ebc1a2f1e2fd49eb9df63bb338475731", "security_group_id": "a76564b3-9eb9-4986-ab15-4f1e29cec8c6", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:58:54Z", "updated_at": "2020-11-06T17:58:54Z", "revision_number": 0, "project_id": "ebc1a2f1e2fd49eb9df63bb338475731"}, {"id": "4e95ea96-c913-4755-8324-efe8a61d481c", "tenant_id": "ebc1a2f1e2fd49eb9df63bb338475731", "security_group_id": "a76564b3-9eb9-4986-ab15-4f1e29cec8c6", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:58:54Z", "updated_at": "2020-11-06T17:58:54Z", "revision_number": 0, "project_id": "ebc1a2f1e2fd49eb9df63bb338475731"}, {"id": "599e4dd2-efa4-4d8b-b976-dc56913498e7", "tenant_id": "ebc1a2f1e2fd49eb9df63bb338475731", "security_group_id": "a76564b3-9eb9-4986-ab15-4f1e29cec8c6", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "a76564b3-9eb9-4986-ab15-4f1e29cec8c6", "description": null, "tags": [], "created_at": "2020-11-06T17:58:54Z", "updated_at": "2020-11-06T17:58:54Z", "revision_number": 0, "project_id": "ebc1a2f1e2fd49eb9df63bb338475731"}, {"id": "a0059ee6-e4aa-41b0-b021-98179746923c", "tenant_id": "ebc1a2f1e2fd49eb9df63bb338475731", "security_group_id": "a76564b3-9eb9-4986-ab15-4f1e29cec8c6", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "a76564b3-9eb9-4986-ab15-4f1e29cec8c6", "description": null, "tags": [], "created_at": "2020-11-06T17:58:54Z", "updated_at": "2020-11-06T17:58:54Z", "revision_number": 0, "project_id": "ebc1a2f1e2fd49eb9df63bb338475731"}], "tags": [], "created_at": "2020-11-06T17:58:54Z", "updated_at": "2020-11-06T17:58:54Z", "revision_number": 1, "project_id": "ebc1a2f1e2fd49eb9df63bb338475731"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:54.348 39 INFO tempest.lib.common.rest_client [req-6bd08261-3326-477a-9601-8d30300a9ce2 ] Request (FlavorRxtxRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/a978a07d-1092-458e-b382-e0acebe5e761 0.174s 2020-11-06 17:58:54.348 39 DEBUG tempest.lib.common.rest_client [req-6bd08261-3326-477a-9601-8d30300a9ce2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-6bd08261-3326-477a-9601-8d30300a9ce2', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 17:58:54 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/a978a07d-1092-458e-b382-e0acebe5e761'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:54.354 37 INFO tempest.lib.common.rest_client [req-f67465e4-30b8-47ec-b2fc-edab4ff40c4f ] Request (KeypairsRbacTest:test_create_keypair): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 17:58:54.354 37 DEBUG tempest.lib.common.rest_client [req-f67465e4-30b8-47ec-b2fc-edab4ff40c4f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f67465e4-30b8-47ec-b2fc-edab4ff40c4f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9ef898baa3bb4447931809e651131a7d", "name": "tempest-KeypairsRbacTest-410986106", "password_expires_at": null}, "audit_ids": ["4lByQ3QtTH2oaubiU2m9ug"], "expires_at": "2020-11-06T18:58:54.000000Z", "issued_at": "2020-11-06T17:58:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d42b80fe0e66474aaf06abe5b593ff94", "name": "tempest-KeypairsRbacTest-410986106"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:54.365 38 INFO tempest.lib.common.rest_client [req-d8a37cc5-eb95-45dc-a4eb-4ba6f1abe1e2 ] Request (FlavorExtraSpecsRbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/compute/v2.1/flavors/f2373073-43f1-4b3f-94d6-4a91fb3d87a4/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-49253124 0.111s 2020-11-06 17:58:54.366 38 DEBUG tempest.lib.common.rest_client [req-d8a37cc5-eb95-45dc-a4eb-4ba6f1abe1e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d8a37cc5-eb95-45dc-a4eb-4ba6f1abe1e2', 'x-compute-request-id': 'req-d8a37cc5-eb95-45dc-a4eb-4ba6f1abe1e2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/f2373073-43f1-4b3f-94d6-4a91fb3d87a4/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-49253124'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:54.369 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:58:54.370 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.370 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.371 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.371 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.372 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.372 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.373 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.373 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.373 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.374 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.374 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.374 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.374 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.375 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.375 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.375 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.376 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.376 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.376 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.376 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.377 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.377 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.377 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.378 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.378 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.378 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.378 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.379 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.379 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.379 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.379 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.380 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.380 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.380 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.380 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.381 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.381 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.381 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.382 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.382 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.382 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.382 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.383 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.383 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.383 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.383 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.384 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.384 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.384 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.385 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.385 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.385 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.385 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.386 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.386 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.386 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.386 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.387 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.387 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.387 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.388 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.388 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.388 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.389 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.389 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.389 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.390 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.390 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.390 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.390 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.391 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.391 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.391 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.392 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.392 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.393 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-flavor-extra-specs:create, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:58:54.393 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:54.442 38 INFO tempest.lib.common.rest_client [req-63d159b2-222b-4352-8b15-7a2e694f38f1 ] Request (FlavorExtraSpecsRbacTest:test_set_flavor_extra_spec): 200 GET http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles 0.048s 2020-11-06 17:58:54.442 38 DEBUG tempest.lib.common.rest_client [req-63d159b2-222b-4352-8b15-7a2e694f38f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-63d159b2-222b-4352-8b15-7a2e694f38f1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:54.468 39 INFO tempest.lib.common.rest_client [req-95a33961-06e6-4b9d-ac7a-53fb1787a2da ] Request (FlavorRxtxRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/09e7b0af05af4ee99d41d6d439a3f8c8 0.119s 2020-11-06 17:58:54.468 39 DEBUG tempest.lib.common.rest_client [req-95a33961-06e6-4b9d-ac7a-53fb1787a2da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-95a33961-06e6-4b9d-ac7a-53fb1787a2da', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/09e7b0af05af4ee99d41d6d439a3f8c8'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:54.472 37 INFO tempest.lib.common.rest_client [req-adaadb12-f432-4a68-97a3-7d4b7f8f926d ] Request (KeypairsRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/compute/v2.1/os-keypairs/tempest-KeypairsRbacTest-key-495819029 0.116s 2020-11-06 17:58:54.472 37 DEBUG tempest.lib.common.rest_client [req-adaadb12-f432-4a68-97a3-7d4b7f8f926d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-adaadb12-f432-4a68-97a3-7d4b7f8f926d', 'x-compute-request-id': 'req-adaadb12-f432-4a68-97a3-7d4b7f8f926d', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/os-keypairs/tempest-KeypairsRbacTest-key-495819029'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:54.477 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:58:54.477 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.478 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.478 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.478 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.479 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.479 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.480 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.480 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.480 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.481 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.481 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.481 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.482 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.482 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.482 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.483 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.483 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.483 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.484 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.484 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.484 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.484 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.485 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.485 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.485 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.486 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.486 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.486 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.487 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.487 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.487 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.487 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.488 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.488 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.488 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.489 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.489 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.489 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.489 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.490 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.490 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.490 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.491 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.491 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.491 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.492 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.492 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.492 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.493 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.493 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.493 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.493 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.494 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.494 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.494 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.495 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.495 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.495 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.496 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.496 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.496 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.497 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.497 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.497 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.498 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.498 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.498 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.499 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.499 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.499 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.499 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.500 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.500 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.500 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.501 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:54.502 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-keypairs:delete, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:58:54.522 38 INFO tempest.lib.common.rest_client [req-601ab2b2-1dc1-4a7f-ac58-bbfdb375d7a7 ] Request (FlavorExtraSpecsRbacTest:test_set_flavor_extra_spec): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-11-06 17:58:54.523 38 DEBUG tempest.lib.common.rest_client [req-601ab2b2-1dc1-4a7f-ac58-bbfdb375d7a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-601ab2b2-1dc1-4a7f-ac58-bbfdb375d7a7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a48b438874604322a665d5cb77968d6b", "name": "tempest-FlavorExtraSpecsRbacTest-948410924", "password_expires_at": null}, "audit_ids": ["B20SXfGNTeyA_GqUiDv75A"], "expires_at": "2020-11-06T18:58:54.000000Z", "issued_at": "2020-11-06T17:58:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "442586d60ab142eb92d79f82257c85a2", "name": "tempest-FlavorExtraSpecsRbacTest-948410924"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:54.554 39 INFO tempest.lib.common.rest_client [req-a0909e2b-e505-40aa-8682-85fd07fee9e7 ] Request (HostsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 17:58:54.554 39 DEBUG tempest.lib.common.rest_client [req-a0909e2b-e505-40aa-8682-85fd07fee9e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a0909e2b-e505-40aa-8682-85fd07fee9e7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["EVAF1x_yQHqdGoW9QY21Pg"], "expires_at": "2020-11-06T18:58:54.000000Z", "issued_at": "2020-11-06T17:58:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:54.593 39 INFO tempest.lib.common.rest_client [req-034496ac-bb02-4488-9b3e-ff7627bcede1 ] Request (HostsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 17:58:54.594 39 DEBUG tempest.lib.common.rest_client [req-034496ac-bb02-4488-9b3e-ff7627bcede1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-034496ac-bb02-4488-9b3e-ff7627bcede1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["zXmt7Cp-TKOUYbCYLvbmRg"], "expires_at": "2020-11-06T18:58:54.000000Z", "issued_at": "2020-11-06T17:58:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:54.641 39 INFO tempest.lib.common.rest_client [req-a3aa99a9-62c5-4868-8eca-1e8533c5e0cd ] Request (HostsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.046s 2020-11-06 17:58:54.641 39 DEBUG tempest.lib.common.rest_client [req-a3aa99a9-62c5-4868-8eca-1e8533c5e0cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a3aa99a9-62c5-4868-8eca-1e8533c5e0cd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:54.678 37 INFO tempest.lib.common.rest_client [req-08efdbf4-f68e-4b3d-9571-3d001ddbf5ca ] Request (KeypairsRbacTest:test_delete_keypair): 200 POST http://172.30.13.94/compute/v2.1/os-keypairs 0.175s 2020-11-06 17:58:54.678 37 DEBUG tempest.lib.common.rest_client [req-08efdbf4-f68e-4b3d-9571-3d001ddbf5ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"keypair": {"name": "tempest-KeypairsRbacTest-key-1991921545"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2318', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-08efdbf4-f68e-4b3d-9571-3d001ddbf5ca', 'x-compute-request-id': 'req-08efdbf4-f68e-4b3d-9571-3d001ddbf5ca', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-keypairs'} Body: b'{"keypair": {"private_key": "-----BEGIN RSA PRIVATE KEY-----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\\nMDc4MGNsn/RpXKOD/zSJvFBaKleeHRoqf5HGC3oHa8j6IRx/f0ADaQ==\\n-----END RSA PRIVATE KEY-----\\n", "name": "tempest-KeypairsRbacTest-key-1991921545", "public_key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDOlfa0HYi/3MDLYGunIaoyfv8k08fiDvYtFVDonnuUE++pg+BM8xmER1bxRSBqt4QsDfLdLcK3e1B8FefOGGidRm7wGU/S2dWoTcWyphw7i6dMqJTAcknZFsR/Tl5xuN7PT9Kd9gQtsPJtrcjGnXy2XQEx59wOJUu58SZghCK7PmA9K0QXKsjjpb9Oe9q/dU8RInnA/umpdw5YR6+t6+NePMJFYB214pEj8S1pYZg8LFKKxc/xE11Dr8j7zmR87IoGx5Qw3RYvdgtT3RqCEAvXv2XxZOj+Eq+WnnSqkEv9lv6gmNBSeQ5130CcJ4+cOdvIH5qjO1iah5ujGD1UesEr Generated-by-Nova", "fingerprint": "e8:b0:21:86:75:c7:3f:d1:eb:a1:7d:d5:85:ad:d9:16", "user_id": "9ef898baa3bb4447931809e651131a7d"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:54.681 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:54.689 38 INFO tempest.lib.common.rest_client [req-01bb9563-a276-46ae-84ca-413122dc4cf5 ] Request (FlavorExtraSpecsRbacTest:test_set_flavor_extra_spec): 200 POST http://172.30.13.94/compute/v2.1/flavors/f2373073-43f1-4b3f-94d6-4a91fb3d87a4/os-extra_specs 0.165s 2020-11-06 17:58:54.690 38 DEBUG tempest.lib.common.rest_client [req-01bb9563-a276-46ae-84ca-413122dc4cf5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"extra_specs": {"tempest-FlavorExtraSpecsRbacTest-key-199103544": "tempest-FlavorExtraSpecsRbacTest-val-1243118091"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '118', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-01bb9563-a276-46ae-84ca-413122dc4cf5', 'x-compute-request-id': 'req-01bb9563-a276-46ae-84ca-413122dc4cf5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/f2373073-43f1-4b3f-94d6-4a91fb3d87a4/os-extra_specs'} Body: b'{"extra_specs": {"tempest-FlavorExtraSpecsRbacTest-key-199103544": "tempest-FlavorExtraSpecsRbacTest-val-1243118091"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:54.692 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:54.706 39 INFO tempest.lib.common.rest_client [req-3c037bcd-3453-4d00-a133-ed7b415bcdfc ] Request (HostsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.064s 2020-11-06 17:58:54.707 39 DEBUG tempest.lib.common.rest_client [req-3c037bcd-3453-4d00-a133-ed7b415bcdfc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-HostsRbacTest-98478993-desc", "domain_id": "default", "name": "tempest-HostsRbacTest-98478993"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '360', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3c037bcd-3453-4d00-a133-ed7b415bcdfc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "81082b06cc6941c2b169f2ca0ecd01d3", "name": "tempest-HostsRbacTest-98478993", "domain_id": "default", "description": "tempest-HostsRbacTest-98478993-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/81082b06cc6941c2b169f2ca0ecd01d3"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:54.737 37 INFO tempest.lib.common.rest_client [req-df02c81b-7c8a-4a6a-ab33-d3b81fd2ead4 ] Request (KeypairsRbacTest:test_delete_keypair): 200 GET http://172.30.13.94/identity/v3/projects/d42b80fe0e66474aaf06abe5b593ff94/users/9ef898baa3bb4447931809e651131a7d/roles 0.055s 2020-11-06 17:58:54.737 37 DEBUG tempest.lib.common.rest_client [req-df02c81b-7c8a-4a6a-ab33-d3b81fd2ead4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-df02c81b-7c8a-4a6a-ab33-d3b81fd2ead4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d42b80fe0e66474aaf06abe5b593ff94/users/9ef898baa3bb4447931809e651131a7d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d42b80fe0e66474aaf06abe5b593ff94/users/9ef898baa3bb4447931809e651131a7d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:54.804 38 INFO tempest.lib.common.rest_client [req-8c26978a-2aa1-44f1-8f93-4ed4df146007 ] Request (FlavorExtraSpecsRbacTest:test_set_flavor_extra_spec): 200 GET http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles 0.110s 2020-11-06 17:58:54.804 38 DEBUG tempest.lib.common.rest_client [req-8c26978a-2aa1-44f1-8f93-4ed4df146007 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8c26978a-2aa1-44f1-8f93-4ed4df146007', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:54.814 39 INFO tempest.lib.common.rest_client [req-cd96ce8b-eec5-462d-9a42-4d68232e68d5 ] Request (HostsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.106s 2020-11-06 17:58:54.814 39 DEBUG tempest.lib.common.rest_client [req-cd96ce8b-eec5-462d-9a42-4d68232e68d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-HostsRbacTest-98478993", "password": "R2=IeCCfSaAJAw@", "project_id": "81082b06cc6941c2b169f2ca0ecd01d3", "email": "tempest-HostsRbacTest-1526614984@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '380', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cd96ce8b-eec5-462d-9a42-4d68232e68d5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "81082b06cc6941c2b169f2ca0ecd01d3", "email": "tempest-HostsRbacTest-1526614984@example.com", "id": "9e15439fdfcd454d936a9f5b2e2b98d6", "name": "tempest-HostsRbacTest-98478993", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/9e15439fdfcd454d936a9f5b2e2b98d6"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:54.825 37 INFO tempest.lib.common.rest_client [req-b5d7271f-45be-45c5-9403-141dde40f28d ] Request (KeypairsRbacTest:test_delete_keypair): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-11-06 17:58:54.826 37 DEBUG tempest.lib.common.rest_client [req-b5d7271f-45be-45c5-9403-141dde40f28d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b5d7271f-45be-45c5-9403-141dde40f28d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9ef898baa3bb4447931809e651131a7d", "name": "tempest-KeypairsRbacTest-410986106", "password_expires_at": null}, "audit_ids": ["d5ZsVNSvTtaQYx-m25H1xg"], "expires_at": "2020-11-06T18:58:54.000000Z", "issued_at": "2020-11-06T17:58:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d42b80fe0e66474aaf06abe5b593ff94", "name": "tempest-KeypairsRbacTest-410986106"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:54.867 39 INFO tempest.lib.common.rest_client [req-e49e101d-aa4a-49d0-b41e-1701c14118b5 ] Request (HostsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.051s 2020-11-06 17:58:54.868 39 DEBUG tempest.lib.common.rest_client [req-e49e101d-aa4a-49d0-b41e-1701c14118b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e49e101d-aa4a-49d0-b41e-1701c14118b5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:54.883 38 INFO tempest.lib.common.rest_client [req-630f1be0-e87f-4550-8524-a36acc9c8f7b ] Request (FlavorExtraSpecsRbacTest:test_set_flavor_extra_spec): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-11-06 17:58:54.884 38 DEBUG tempest.lib.common.rest_client [req-630f1be0-e87f-4550-8524-a36acc9c8f7b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-630f1be0-e87f-4550-8524-a36acc9c8f7b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a48b438874604322a665d5cb77968d6b", "name": "tempest-FlavorExtraSpecsRbacTest-948410924", "password_expires_at": null}, "audit_ids": ["ObrJxJ8KTw6E-fuWn2Uq6w"], "expires_at": "2020-11-06T18:58:54.000000Z", "issued_at": "2020-11-06T17:58:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "442586d60ab142eb92d79f82257c85a2", "name": "tempest-FlavorExtraSpecsRbacTest-948410924"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:54.916 39 INFO tempest.lib.common.rest_client [req-787e0ae2-45d3-4272-8b85-2f5eff56c654 ] Request (HostsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.046s 2020-11-06 17:58:54.916 39 DEBUG tempest.lib.common.rest_client [req-787e0ae2-45d3-4272-8b85-2f5eff56c654 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-787e0ae2-45d3-4272-8b85-2f5eff56c654', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:54.992 39 INFO tempest.lib.common.rest_client [req-e52ca87f-1b79-4e02-8972-9cad62b6372e ] Request (HostsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/81082b06cc6941c2b169f2ca0ecd01d3/users/9e15439fdfcd454d936a9f5b2e2b98d6/roles/72a4576c553448cd941b052c1ca0cf2d 0.075s 2020-11-06 17:58:54.993 39 DEBUG tempest.lib.common.rest_client [req-e52ca87f-1b79-4e02-8972-9cad62b6372e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e52ca87f-1b79-4e02-8972-9cad62b6372e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/81082b06cc6941c2b169f2ca0ecd01d3/users/9e15439fdfcd454d936a9f5b2e2b98d6/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:54.993 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-HostsRbacTest-98478993', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '81082b06cc6941c2b169f2ca0ecd01d3', 'project_name': 'tempest-HostsRbacTest-98478993', 'tenant_id': '81082b06cc6941c2b169f2ca0ecd01d3', 'tenant_name': 'tempest-HostsRbacTest-98478993', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '9e15439fdfcd454d936a9f5b2e2b98d6'}, Network: None, Subnet: None, Router: None 2020-11-06 17:58:54.994 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-HostsRbacTest-98478993', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '81082b06cc6941c2b169f2ca0ecd01d3', 'project_name': 'tempest-HostsRbacTest-98478993', 'tenant_id': '81082b06cc6941c2b169f2ca0ecd01d3', 'tenant_name': 'tempest-HostsRbacTest-98478993', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '9e15439fdfcd454d936a9f5b2e2b98d6'}, Network: None, Subnet: None, Router: None 2020-11-06 17:58:55.025 37 INFO tempest.lib.common.rest_client [req-3e21d308-951b-41c4-acbb-a856892c1649 ] Request (KeypairsRbacTest:test_delete_keypair): 202 DELETE http://172.30.13.94/compute/v2.1/os-keypairs/tempest-KeypairsRbacTest-key-1991921545 0.198s 2020-11-06 17:58:55.025 37 DEBUG tempest.lib.common.rest_client [req-3e21d308-951b-41c4-acbb-a856892c1649 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3e21d308-951b-41c4-acbb-a856892c1649', 'x-compute-request-id': 'req-3e21d308-951b-41c4-acbb-a856892c1649', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/os-keypairs/tempest-KeypairsRbacTest-key-1991921545'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:55.026 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:55.054 38 INFO tempest.lib.common.rest_client [req-baecfefa-4bdd-49ad-bdec-91fca661cdb4 ] Request (FlavorExtraSpecsRbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/compute/v2.1/flavors/f2373073-43f1-4b3f-94d6-4a91fb3d87a4/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-199103544 0.168s 2020-11-06 17:58:55.055 38 DEBUG tempest.lib.common.rest_client [req-baecfefa-4bdd-49ad-bdec-91fca661cdb4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-baecfefa-4bdd-49ad-bdec-91fca661cdb4', 'x-compute-request-id': 'req-baecfefa-4bdd-49ad-bdec-91fca661cdb4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/f2373073-43f1-4b3f-94d6-4a91fb3d87a4/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-199103544'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:55.058 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:58:55.059 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.060 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.061 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.061 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.062 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.063 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.063 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.064 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.064 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.065 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.065 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.066 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.066 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.067 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.067 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.068 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.068 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.069 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.069 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.070 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.070 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.070 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.071 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.071 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.071 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.071 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.072 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.072 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.072 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.073 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.073 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.073 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.074 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.074 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.074 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.074 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.075 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.075 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.075 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.076 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.076 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.076 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.076 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.077 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.077 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.077 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.078 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.078 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.078 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.079 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.079 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.079 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.079 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.080 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.080 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.080 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.081 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.081 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.081 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.082 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.082 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.082 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.083 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.083 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.083 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.084 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.084 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.084 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.085 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.085 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.085 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.085 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.086 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.086 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.086 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.088 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-flavor-extra-specs:show, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:58:55.112 39 INFO tempest.lib.common.rest_client [req-899a090d-2a7b-4cad-babd-a260593940c9 ] Request (HostsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.108s 2020-11-06 17:58:55.112 39 DEBUG tempest.lib.common.rest_client [req-899a090d-2a7b-4cad-babd-a260593940c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6553', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-899a090d-2a7b-4cad-babd-a260593940c9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9e15439fdfcd454d936a9f5b2e2b98d6", "name": "tempest-HostsRbacTest-98478993", "password_expires_at": null}, "audit_ids": ["n-8LBVeyRFKoFZ1i3r1Hvw"], "expires_at": "2020-11-06T18:58:55.000000Z", "issued_at": "2020-11-06T17:58:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "81082b06cc6941c2b169f2ca0ecd01d3", "name": "tempest-HostsRbacTest-98478993"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/81082b06cc6941c2b169f2ca0ecd01d3", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/81082b06cc6941c2b169f2ca0ecd01d3", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/81082b06cc6941c2b169f2ca0ecd01d3", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_81082b06cc6941c2b169f2ca0ecd01d3", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_81082b06cc6941c2b169f2ca0ecd01d3", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_81082b06cc6941c2b169f2ca0ecd01d3", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/image", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:55.129 37 INFO tempest.lib.common.rest_client [req-28eec6bb-8433-4760-b8b5-986a99d632b2 ] Request (KeypairsRbacTest:test_delete_keypair): 200 GET http://172.30.13.94/identity/v3/projects/d42b80fe0e66474aaf06abe5b593ff94/users/9ef898baa3bb4447931809e651131a7d/roles 0.101s 2020-11-06 17:58:55.129 37 DEBUG tempest.lib.common.rest_client [req-28eec6bb-8433-4760-b8b5-986a99d632b2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-28eec6bb-8433-4760-b8b5-986a99d632b2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d42b80fe0e66474aaf06abe5b593ff94/users/9ef898baa3bb4447931809e651131a7d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d42b80fe0e66474aaf06abe5b593ff94/users/9ef898baa3bb4447931809e651131a7d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:55.130 38 INFO tempest.lib.common.rest_client [req-f03404a9-1a9e-4feb-ac36-ca748893b9b9 ] Request (FlavorExtraSpecsRbacTest:test_show_flavor_extra_spec): 200 POST http://172.30.13.94/compute/v2.1/flavors/f2373073-43f1-4b3f-94d6-4a91fb3d87a4/os-extra_specs 0.041s 2020-11-06 17:58:55.130 38 DEBUG tempest.lib.common.rest_client [req-f03404a9-1a9e-4feb-ac36-ca748893b9b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"extra_specs": {"tempest-FlavorExtraSpecsRbacTest-key-470558066": "tempest-FlavorExtraSpecsRbacTest-val-1606685232"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '118', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f03404a9-1a9e-4feb-ac36-ca748893b9b9', 'x-compute-request-id': 'req-f03404a9-1a9e-4feb-ac36-ca748893b9b9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/f2373073-43f1-4b3f-94d6-4a91fb3d87a4/os-extra_specs'} Body: b'{"extra_specs": {"tempest-FlavorExtraSpecsRbacTest-key-470558066": "tempest-FlavorExtraSpecsRbacTest-val-1606685232"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:55.133 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:55.150 39 INFO tempest.lib.common.rest_client [req-1eca31ce-5f98-4d7d-86dc-222bbbe60c64 ] Request (HostsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 17:58:55.150 39 DEBUG tempest.lib.common.rest_client [req-1eca31ce-5f98-4d7d-86dc-222bbbe60c64 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1eca31ce-5f98-4d7d-86dc-222bbbe60c64', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["6os_Cr6DSSqBxNHyjM6uwA"], "expires_at": "2020-11-06T18:58:55.000000Z", "issued_at": "2020-11-06T17:58:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:55.186 38 INFO tempest.lib.common.rest_client [req-047b2c1e-24c2-4fa1-b2af-310cf9165954 ] Request (FlavorExtraSpecsRbacTest:test_show_flavor_extra_spec): 200 GET http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles 0.052s 2020-11-06 17:58:55.186 38 DEBUG tempest.lib.common.rest_client [req-047b2c1e-24c2-4fa1-b2af-310cf9165954 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-047b2c1e-24c2-4fa1-b2af-310cf9165954', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:55.193 39 INFO tempest.lib.common.rest_client [req-0a0dac42-e73d-4c7a-ab56-2ad3c12fe991 ] Request (HostsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 17:58:55.194 39 DEBUG tempest.lib.common.rest_client [req-0a0dac42-e73d-4c7a-ab56-2ad3c12fe991 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0a0dac42-e73d-4c7a-ab56-2ad3c12fe991', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["KbBNHseEQ-ut_wfeJBTcHg"], "expires_at": "2020-11-06T18:58:55.000000Z", "issued_at": "2020-11-06T17:58:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:55.209 37 INFO tempest.lib.common.rest_client [req-059b3f88-f9d3-4ccf-ad66-a0a352d85c4b ] Request (KeypairsRbacTest:test_delete_keypair): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-11-06 17:58:55.209 37 DEBUG tempest.lib.common.rest_client [req-059b3f88-f9d3-4ccf-ad66-a0a352d85c4b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-059b3f88-f9d3-4ccf-ad66-a0a352d85c4b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9ef898baa3bb4447931809e651131a7d", "name": "tempest-KeypairsRbacTest-410986106", "password_expires_at": null}, "audit_ids": ["6x2cw4k2TTSj0GLr4q73cg"], "expires_at": "2020-11-06T18:58:55.000000Z", "issued_at": "2020-11-06T17:58:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d42b80fe0e66474aaf06abe5b593ff94", "name": "tempest-KeypairsRbacTest-410986106"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:55.246 39 INFO tempest.lib.common.rest_client [req-e14f9751-ec88-45b3-bf95-36b4d1198fe9 ] Request (HostsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.051s 2020-11-06 17:58:55.246 39 DEBUG tempest.lib.common.rest_client [req-e14f9751-ec88-45b3-bf95-36b4d1198fe9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e14f9751-ec88-45b3-bf95-36b4d1198fe9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:55.268 38 INFO tempest.lib.common.rest_client [req-3e47e71c-25fc-4dca-9d00-10b6120d9a49 ] Request (FlavorExtraSpecsRbacTest:test_show_flavor_extra_spec): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-11-06 17:58:55.268 38 DEBUG tempest.lib.common.rest_client [req-3e47e71c-25fc-4dca-9d00-10b6120d9a49 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3e47e71c-25fc-4dca-9d00-10b6120d9a49', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a48b438874604322a665d5cb77968d6b", "name": "tempest-FlavorExtraSpecsRbacTest-948410924", "password_expires_at": null}, "audit_ids": ["4oN131gVQBO84d0XfqazAQ"], "expires_at": "2020-11-06T18:58:55.000000Z", "issued_at": "2020-11-06T17:58:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "442586d60ab142eb92d79f82257c85a2", "name": "tempest-FlavorExtraSpecsRbacTest-948410924"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:55.297 39 INFO tempest.lib.common.rest_client [req-39cfadce-02ed-4b72-af1e-dbcf872652f8 ] Request (HostsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.049s 2020-11-06 17:58:55.297 39 DEBUG tempest.lib.common.rest_client [req-39cfadce-02ed-4b72-af1e-dbcf872652f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-39cfadce-02ed-4b72-af1e-dbcf872652f8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:55.298 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 17:58:55.298 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:55.352 39 INFO tempest.lib.common.rest_client [req-7662e050-7c2f-4a4a-b9d8-c054fe95391c ] Request (HostsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/81082b06cc6941c2b169f2ca0ecd01d3/users/9e15439fdfcd454d936a9f5b2e2b98d6/roles 0.052s 2020-11-06 17:58:55.352 39 DEBUG tempest.lib.common.rest_client [req-7662e050-7c2f-4a4a-b9d8-c054fe95391c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7662e050-7c2f-4a4a-b9d8-c054fe95391c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/81082b06cc6941c2b169f2ca0ecd01d3/users/9e15439fdfcd454d936a9f5b2e2b98d6/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/81082b06cc6941c2b169f2ca0ecd01d3/users/9e15439fdfcd454d936a9f5b2e2b98d6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:55.360 37 INFO tempest.lib.common.rest_client [req-e3d6427e-6c8e-460b-bf22-e7cfd1f407a1 ] Request (KeypairsRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/compute/v2.1/os-keypairs/tempest-KeypairsRbacTest-key-1991921545 0.150s 2020-11-06 17:58:55.361 37 DEBUG tempest.lib.common.rest_client [req-e3d6427e-6c8e-460b-bf22-e7cfd1f407a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '145', 'x-openstack-request-id': 'req-e3d6427e-6c8e-460b-bf22-e7cfd1f407a1', 'x-compute-request-id': 'req-e3d6427e-6c8e-460b-bf22-e7cfd1f407a1', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/os-keypairs/tempest-KeypairsRbacTest-key-1991921545'} Body: b'{"itemNotFound": {"code": 404, "message": "Keypair tempest-KeypairsRbacTest-key-1991921545 not found for user 9ef898baa3bb4447931809e651131a7d"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:55.362 38 INFO tempest.lib.common.rest_client [req-0010002d-031c-45ef-9ff4-7bd906558844 ] Request (FlavorExtraSpecsRbacTest:test_show_flavor_extra_spec): 200 GET http://172.30.13.94/compute/v2.1/flavors/f2373073-43f1-4b3f-94d6-4a91fb3d87a4/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-470558066 0.092s 2020-11-06 17:58:55.363 38 DEBUG tempest.lib.common.rest_client [req-0010002d-031c-45ef-9ff4-7bd906558844 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '101', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0010002d-031c-45ef-9ff4-7bd906558844', 'x-compute-request-id': 'req-0010002d-031c-45ef-9ff4-7bd906558844', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/f2373073-43f1-4b3f-94d6-4a91fb3d87a4/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-470558066'} Body: b'{"tempest-FlavorExtraSpecsRbacTest-key-470558066": "tempest-FlavorExtraSpecsRbacTest-val-1606685232"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:55.365 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:55.365 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:58:55.366 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.367 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.367 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.368 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.369 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.369 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.370 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.370 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.370 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.370 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.371 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.371 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.371 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.372 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.372 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.372 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.373 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.373 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.374 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.374 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.374 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.375 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.375 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.375 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.375 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.376 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.376 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.376 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.377 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.377 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.377 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.377 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.378 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.378 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.378 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.379 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.379 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.379 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.379 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.380 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.380 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.380 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.381 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.381 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.381 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.382 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.382 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.382 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.383 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.383 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.383 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.383 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.384 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.384 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.384 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.385 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.385 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.385 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.386 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.386 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.386 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.387 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.387 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.387 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.388 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.388 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.388 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.389 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.389 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.389 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.389 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.390 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.390 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.390 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.391 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.392 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-keypairs:index, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:58:55.392 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:55.404 39 INFO tempest.lib.common.rest_client [req-c67ee927-14c9-41ae-be45-1c0020a67227 ] Request (HostsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/81082b06cc6941c2b169f2ca0ecd01d3/users/9e15439fdfcd454d936a9f5b2e2b98d6/roles/72a4576c553448cd941b052c1ca0cf2d 0.051s 2020-11-06 17:58:55.404 39 DEBUG tempest.lib.common.rest_client [req-c67ee927-14c9-41ae-be45-1c0020a67227 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c67ee927-14c9-41ae-be45-1c0020a67227', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/81082b06cc6941c2b169f2ca0ecd01d3/users/9e15439fdfcd454d936a9f5b2e2b98d6/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:55.413 38 INFO tempest.lib.common.rest_client [req-fcea7e4e-ca16-4e65-b805-293c34be8b50 ] Request (FlavorExtraSpecsRbacTest:test_show_flavor_extra_spec): 200 GET http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles 0.047s 2020-11-06 17:58:55.414 38 DEBUG tempest.lib.common.rest_client [req-fcea7e4e-ca16-4e65-b805-293c34be8b50 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fcea7e4e-ca16-4e65-b805-293c34be8b50', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:55.485 37 INFO tempest.lib.common.rest_client [req-ba42ae7b-aea4-43bf-b825-a4de4920f2fe ] Request (KeypairsRbacTest:test_index_keypair): 200 GET http://172.30.13.94/identity/v3/projects/d42b80fe0e66474aaf06abe5b593ff94/users/9ef898baa3bb4447931809e651131a7d/roles 0.093s 2020-11-06 17:58:55.486 37 DEBUG tempest.lib.common.rest_client [req-ba42ae7b-aea4-43bf-b825-a4de4920f2fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ba42ae7b-aea4-43bf-b825-a4de4920f2fe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d42b80fe0e66474aaf06abe5b593ff94/users/9ef898baa3bb4447931809e651131a7d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d42b80fe0e66474aaf06abe5b593ff94/users/9ef898baa3bb4447931809e651131a7d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:55.496 38 INFO tempest.lib.common.rest_client [req-45381edc-c742-41c9-8fa4-59de886a28e8 ] Request (FlavorExtraSpecsRbacTest:test_show_flavor_extra_spec): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-11-06 17:58:55.496 38 DEBUG tempest.lib.common.rest_client [req-45381edc-c742-41c9-8fa4-59de886a28e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-45381edc-c742-41c9-8fa4-59de886a28e8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a48b438874604322a665d5cb77968d6b", "name": "tempest-FlavorExtraSpecsRbacTest-948410924", "password_expires_at": null}, "audit_ids": ["1oqazofkSjGzPhZfnVGT7A"], "expires_at": "2020-11-06T18:58:55.000000Z", "issued_at": "2020-11-06T17:58:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "442586d60ab142eb92d79f82257c85a2", "name": "tempest-FlavorExtraSpecsRbacTest-948410924"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:55.499 39 INFO tempest.lib.common.rest_client [req-e4a8661a-add5-445f-8840-272127198d3e ] Request (HostsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/81082b06cc6941c2b169f2ca0ecd01d3/users/9e15439fdfcd454d936a9f5b2e2b98d6/roles/a629c95d64b3416fb80ae90af4f69c05 0.094s 2020-11-06 17:58:55.499 39 DEBUG tempest.lib.common.rest_client [req-e4a8661a-add5-445f-8840-272127198d3e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e4a8661a-add5-445f-8840-272127198d3e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/81082b06cc6941c2b169f2ca0ecd01d3/users/9e15439fdfcd454d936a9f5b2e2b98d6/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:55.568 37 INFO tempest.lib.common.rest_client [req-c790335e-5c5b-43fe-8c07-6f05e65e1ee7 ] Request (KeypairsRbacTest:test_index_keypair): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 17:58:55.569 37 DEBUG tempest.lib.common.rest_client [req-c790335e-5c5b-43fe-8c07-6f05e65e1ee7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c790335e-5c5b-43fe-8c07-6f05e65e1ee7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9ef898baa3bb4447931809e651131a7d", "name": "tempest-KeypairsRbacTest-410986106", "password_expires_at": null}, "audit_ids": ["AnCI3ohTThGVA2lhLcc4LA"], "expires_at": "2020-11-06T18:58:55.000000Z", "issued_at": "2020-11-06T17:58:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d42b80fe0e66474aaf06abe5b593ff94", "name": "tempest-KeypairsRbacTest-410986106"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:55.616 40 INFO tempest.lib.common.rest_client [req-062ce6e5-1f99-43e8-9f7a-296ec7a1de1a ] Request (LimitsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/a76564b3-9eb9-4986-ab15-4f1e29cec8c6 1.273s 2020-11-06 17:58:55.617 40 DEBUG tempest.lib.common.rest_client [req-062ce6e5-1f99-43e8-9f7a-296ec7a1de1a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-062ce6e5-1f99-43e8-9f7a-296ec7a1de1a', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 17:58:55 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/a76564b3-9eb9-4986-ab15-4f1e29cec8c6'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:55.711 37 INFO tempest.lib.common.rest_client [req-f82d3be5-5e7e-4f11-972a-5f4f33290e96 ] Request (KeypairsRbacTest:test_index_keypair): 200 GET http://172.30.13.94/compute/v2.1/os-keypairs 0.141s 2020-11-06 17:58:55.712 37 DEBUG tempest.lib.common.rest_client [req-f82d3be5-5e7e-4f11-972a-5f4f33290e96 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '16', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f82d3be5-5e7e-4f11-972a-5f4f33290e96', 'x-compute-request-id': 'req-f82d3be5-5e7e-4f11-972a-5f4f33290e96', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-keypairs'} Body: b'{"keypairs": []}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:55.715 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:55.750 38 INFO tempest.lib.common.rest_client [req-7440ff16-007a-45d7-99ba-39aa5b1d6cf0 ] Request (FlavorExtraSpecsRbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/compute/v2.1/flavors/f2373073-43f1-4b3f-94d6-4a91fb3d87a4/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-470558066 0.252s 2020-11-06 17:58:55.751 38 DEBUG tempest.lib.common.rest_client [req-7440ff16-007a-45d7-99ba-39aa5b1d6cf0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7440ff16-007a-45d7-99ba-39aa5b1d6cf0', 'x-compute-request-id': 'req-7440ff16-007a-45d7-99ba-39aa5b1d6cf0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/f2373073-43f1-4b3f-94d6-4a91fb3d87a4/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-470558066'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:55.755 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:58:55.755 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.756 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.756 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.757 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.757 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.757 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.758 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.758 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.758 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.759 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.759 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.759 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.760 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.760 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.760 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.761 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.761 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.761 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.761 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.762 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.762 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.762 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.763 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.763 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.763 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.764 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.764 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.764 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.764 37 INFO tempest.lib.common.rest_client [req-3b72e81d-2044-4d5d-b795-ea8c266f59a8 ] Request (KeypairsRbacTest:test_index_keypair): 200 GET http://172.30.13.94/identity/v3/projects/d42b80fe0e66474aaf06abe5b593ff94/users/9ef898baa3bb4447931809e651131a7d/roles 0.048s 2020-11-06 17:58:55.764 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.765 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.765 37 DEBUG tempest.lib.common.rest_client [req-3b72e81d-2044-4d5d-b795-ea8c266f59a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3b72e81d-2044-4d5d-b795-ea8c266f59a8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d42b80fe0e66474aaf06abe5b593ff94/users/9ef898baa3bb4447931809e651131a7d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d42b80fe0e66474aaf06abe5b593ff94/users/9ef898baa3bb4447931809e651131a7d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:55.765 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.765 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.766 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.766 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.766 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.766 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.767 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.767 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.767 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.768 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.768 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.768 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.768 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.769 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.769 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.769 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.770 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.770 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.770 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.771 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.771 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.771 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.771 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.772 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.772 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.772 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.773 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.773 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.774 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.775 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.775 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.776 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.776 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.777 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.777 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.777 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.778 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.778 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.779 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.780 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.780 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.780 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.780 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.781 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.781 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.782 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-flavor-extra-specs:delete, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:58:55.785 40 INFO tempest.lib.common.rest_client [req-868fab94-d173-475b-bf9a-4013a9d80481 ] Request (LimitsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/ebc1a2f1e2fd49eb9df63bb338475731 0.167s 2020-11-06 17:58:55.785 40 DEBUG tempest.lib.common.rest_client [req-868fab94-d173-475b-bf9a-4013a9d80481 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-868fab94-d173-475b-bf9a-4013a9d80481', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ebc1a2f1e2fd49eb9df63bb338475731'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:55.833 38 INFO tempest.lib.common.rest_client [req-8e175eb6-df93-4262-823d-02467683320f ] Request (FlavorExtraSpecsRbacTest:test_unset_flavor_extra_spec): 200 POST http://172.30.13.94/compute/v2.1/flavors/f2373073-43f1-4b3f-94d6-4a91fb3d87a4/os-extra_specs 0.050s 2020-11-06 17:58:55.833 38 DEBUG tempest.lib.common.rest_client [req-8e175eb6-df93-4262-823d-02467683320f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"extra_specs": {"tempest-FlavorExtraSpecsRbacTest-key-1535893790": "tempest-FlavorExtraSpecsRbacTest-val-1350521410"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '119', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8e175eb6-df93-4262-823d-02467683320f', 'x-compute-request-id': 'req-8e175eb6-df93-4262-823d-02467683320f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/f2373073-43f1-4b3f-94d6-4a91fb3d87a4/os-extra_specs'} Body: b'{"extra_specs": {"tempest-FlavorExtraSpecsRbacTest-key-1535893790": "tempest-FlavorExtraSpecsRbacTest-val-1350521410"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:55.835 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:55.846 37 INFO tempest.lib.common.rest_client [req-4c46b406-656e-4f34-ba22-8bdbf057d7f3 ] Request (KeypairsRbacTest:test_index_keypair): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.080s 2020-11-06 17:58:55.846 37 DEBUG tempest.lib.common.rest_client [req-4c46b406-656e-4f34-ba22-8bdbf057d7f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4c46b406-656e-4f34-ba22-8bdbf057d7f3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9ef898baa3bb4447931809e651131a7d", "name": "tempest-KeypairsRbacTest-410986106", "password_expires_at": null}, "audit_ids": ["shk_HZLiRnWk6Trkj4X5jg"], "expires_at": "2020-11-06T18:58:55.000000Z", "issued_at": "2020-11-06T17:58:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d42b80fe0e66474aaf06abe5b593ff94", "name": "tempest-KeypairsRbacTest-410986106"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:55.851 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:58:55.852 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.852 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.853 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.853 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.854 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.855 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.855 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.856 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.856 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.857 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.857 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.858 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.858 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.859 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.859 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.860 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.860 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.861 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.861 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.862 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.862 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.862 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.862 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.863 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.863 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.863 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.863 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.864 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.864 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.864 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.865 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.865 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.865 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.866 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.866 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.866 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.866 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.867 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.867 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.867 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.868 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.868 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.868 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.868 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.869 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.869 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.869 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.870 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.870 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.870 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.871 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.871 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.871 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.872 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.872 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.872 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.872 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.873 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.873 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.873 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.874 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.874 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.875 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.875 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.875 40 INFO tempest.lib.common.rest_client [req-56619ba0-89d0-4849-88d0-77829426bd17 ] Request (QuotaClassesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-11-06 17:58:55.875 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.875 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.875 40 DEBUG tempest.lib.common.rest_client [req-56619ba0-89d0-4849-88d0-77829426bd17 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-56619ba0-89d0-4849-88d0-77829426bd17', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["Ffx4YsvNTX-JcG1IQpt77g"], "expires_at": "2020-11-06T18:58:55.000000Z", "issued_at": "2020-11-06T17:58:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:55.876 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.876 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.876 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.877 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.877 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.877 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.878 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.878 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.878 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:55.879 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-keypairs:show, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:58:55.920 40 INFO tempest.lib.common.rest_client [req-ad88386a-7f69-4a85-bf31-96708ffb5b7f ] Request (QuotaClassesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 17:58:55.920 40 DEBUG tempest.lib.common.rest_client [req-ad88386a-7f69-4a85-bf31-96708ffb5b7f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ad88386a-7f69-4a85-bf31-96708ffb5b7f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["rAHQzte1S8mzNjq7GCvyvg"], "expires_at": "2020-11-06T18:58:55.000000Z", "issued_at": "2020-11-06T17:58:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:55.952 38 INFO tempest.lib.common.rest_client [req-1614e530-76da-423f-9e69-ac7dc6c5cbc0 ] Request (FlavorExtraSpecsRbacTest:test_unset_flavor_extra_spec): 200 GET http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles 0.116s 2020-11-06 17:58:55.952 38 DEBUG tempest.lib.common.rest_client [req-1614e530-76da-423f-9e69-ac7dc6c5cbc0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1614e530-76da-423f-9e69-ac7dc6c5cbc0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:55.972 40 INFO tempest.lib.common.rest_client [req-d72d0a57-bd64-49d8-92b6-59d00628e51f ] Request (QuotaClassesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.050s 2020-11-06 17:58:55.972 40 DEBUG tempest.lib.common.rest_client [req-d72d0a57-bd64-49d8-92b6-59d00628e51f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d72d0a57-bd64-49d8-92b6-59d00628e51f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:56.026 38 INFO tempest.lib.common.rest_client [req-9b6e1fff-a3b1-4b2c-a165-f48b7c978ec6 ] Request (FlavorExtraSpecsRbacTest:test_unset_flavor_extra_spec): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.073s 2020-11-06 17:58:56.027 38 DEBUG tempest.lib.common.rest_client [req-9b6e1fff-a3b1-4b2c-a165-f48b7c978ec6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9b6e1fff-a3b1-4b2c-a165-f48b7c978ec6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a48b438874604322a665d5cb77968d6b", "name": "tempest-FlavorExtraSpecsRbacTest-948410924", "password_expires_at": null}, "audit_ids": ["mzIeW5qkQXe2i_tMu2OeDg"], "expires_at": "2020-11-06T18:58:55.000000Z", "issued_at": "2020-11-06T17:58:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "442586d60ab142eb92d79f82257c85a2", "name": "tempest-FlavorExtraSpecsRbacTest-948410924"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:56.037 40 INFO tempest.lib.common.rest_client [req-00d52a87-7532-4c8e-9468-e980497eb581 ] Request (QuotaClassesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.064s 2020-11-06 17:58:56.038 40 DEBUG tempest.lib.common.rest_client [req-00d52a87-7532-4c8e-9468-e980497eb581 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-QuotaClassesRbacTest-129085586-desc", "domain_id": "default", "name": "tempest-QuotaClassesRbacTest-129085586"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '376', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-00d52a87-7532-4c8e-9468-e980497eb581', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "5a878a85d5c548ceb8fd3302a8a6990d", "name": "tempest-QuotaClassesRbacTest-129085586", "domain_id": "default", "description": "tempest-QuotaClassesRbacTest-129085586-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/5a878a85d5c548ceb8fd3302a8a6990d"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:56.149 40 INFO tempest.lib.common.rest_client [req-283edbc9-22f6-4e1a-99a4-f14b3651026b ] Request (QuotaClassesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.110s 2020-11-06 17:58:56.149 40 DEBUG tempest.lib.common.rest_client [req-283edbc9-22f6-4e1a-99a4-f14b3651026b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-QuotaClassesRbacTest-129085586", "password": "V7*^U~c3d3zYuGe", "project_id": "5a878a85d5c548ceb8fd3302a8a6990d", "email": "tempest-QuotaClassesRbacTest-2145357348@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '395', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-283edbc9-22f6-4e1a-99a4-f14b3651026b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "5a878a85d5c548ceb8fd3302a8a6990d", "email": "tempest-QuotaClassesRbacTest-2145357348@example.com", "id": "eba557a38a694f069804b1cd2d357b4e", "name": "tempest-QuotaClassesRbacTest-129085586", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/eba557a38a694f069804b1cd2d357b4e"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:56.204 40 INFO tempest.lib.common.rest_client [req-08cb0479-4dda-4bc1-9b15-d8ac1813fece ] Request (QuotaClassesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.053s 2020-11-06 17:58:56.204 40 DEBUG tempest.lib.common.rest_client [req-08cb0479-4dda-4bc1-9b15-d8ac1813fece ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-08cb0479-4dda-4bc1-9b15-d8ac1813fece', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:56.204 37 INFO tempest.lib.common.rest_client [req-9fe2989a-49c1-46ee-af89-e8d2406071a2 ] Request (KeypairsRbacTest:test_show_keypair): 200 POST http://172.30.13.94/compute/v2.1/os-keypairs 0.324s 2020-11-06 17:58:56.205 37 DEBUG tempest.lib.common.rest_client [req-9fe2989a-49c1-46ee-af89-e8d2406071a2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"keypair": {"name": "tempest-KeypairsRbacTest-key-1099472811"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2318', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9fe2989a-49c1-46ee-af89-e8d2406071a2', 'x-compute-request-id': 'req-9fe2989a-49c1-46ee-af89-e8d2406071a2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-keypairs'} Body: b'{"keypair": {"private_key": "-----BEGIN RSA PRIVATE KEY-----\\nMIIEpQIBAAKCAQEAtPUdjm89zhFDDY91eo4zw9Fnv/+zMXUK2Ly6aqo0OPERW6Mn\\nSXDYPvLZNS6Y5h9ZhqVK8ClfW99w2UH2J28NEgr0qeHaELbpjS0wmxdoYOOzkZxS\\n7h+6x42qB/CKkSAYA8kVZZGuwteLfI4WZCmq+18GMdA53s40NRMtV34s4nn+ihcu\\nLkkjhbuK89CfQJNNtEexsAThphfAsjiVIinE0+6B+JjsYoOObnKGhgU0Gohz/gBG\\nBvsFnHs0zQbSEVBL2O+FAb5kv0nu1ulR/ygtLawHsBNTyFHEtdOBRv7WHbjWml//\\nrMwbO1mQ65p2GBt5gHfHEWSwgbVE96WSh26mQwIDAQABAoIBAQCmh80jf4xJT+l9\\nWUCsAKHy24u3TgICycupmkWUU/6rSG7I/mTxWUAo7iSmpLNhVAh3uTY1vl1bl02r\\nIuD9eV119U8j6A1exHY6zhOlJu2P/P0MS+il691gOCb6F4vt8rMnCK8AQgmqleJw\\nRfKlSxNnMhPpU89uFCZHkdZwZlW4NTB+2BtqqWebPqDynKobhkXWmmg0A39AAH2Z\\nUguhDsbqTYgAnt/C7Yxg4VHbZVAKfKK+t4R+EDB2iPvqCPX4tV+jEWNJWznGFm7I\\nMKwR09axUb9i+tzwFpCPMBgvQjeq6LwEP1fTQWlKPT77haifh4k0xWZ4/vvBCIhi\\nfBf906JBAoGBAN7Sgz9H94PKuQgD7V9/wfDm7boQ9GdglyKPX2w3VPSOL3SLoI+r\\nqhx2ViD+k0wuEdluNcI2DEEIXnyl8qfR4ST5kPC+wgSNJqhgQiopBywjSMll7Qe6\\nsMadyFxAS7fAI7AHZufw9D72yW44Sy0cD/vICz32JBt1XkGEYSY+2jkFAoGBAM/m\\nzyTpwxBYaCkDqSEFgr8wKiCUdEM/J1JWQqR5CDC0fo8L5H7vXWdzApye8lDZ1cva\\nSFhT6wFDw6yg5RnW718ATZuVrUb13RmUGITmu/JQvoQeXqpoEycFd2bE6k2LL1Gk\\n408j4aeV3JnZ931BhQ2cYbCJfJj8s5uHn1CRD+SnAoGBAJmB8gXAsNbM7NiGzBwE\\nyjoK/jA3ygkGVFjs6VKGdDLfWfYy03TnURS2ufOVLylGe+mNsd+QmLSc7Wt2cEwJ\\nndB5Vs9kvAmirMVHO44MIfLYhCar37Z5eZv7y7MyYHfBGVUGZHDaYYqXPoJ+qdvz\\n/1b4pDYVwx5fp4X/i2Zr2q95AoGAZhv6iSq2v4RsRBikLK/EM5q4ViATqiOOcIYl\\nXRqEx0cfEarJov51ZaW7FqmKYeNbei/PcHJm7cwWgubTHwnNr186vruYy01eNn3i\\nPQQGM1EtAT7ZR+Ct53Br4HG+ki9WIkdVzTzWS7TzEC1ZvI89hh3UbRxZsdoLbMwD\\nl1Jn9+kCgYEAgwuYVQK1rSj4s3Rxis3zUrRpL1UrQfIzAkroxLNAFXjUDEdTRcLt\\nn6w9n6D0FTFRqILKs1jcCRxSXZyHeDyFrDDHMku5vMhq5+aFzhUVbhEO/LNyP7/j\\nv+uyQgo8r17PlkR/AIh9vaesXUmV36smLZMbfGgxH2I4T0ybnKP5rlY=\\n-----END RSA PRIVATE KEY-----\\n", "name": "tempest-KeypairsRbacTest-key-1099472811", "public_key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC09R2Obz3OEUMNj3V6jjPD0We//7MxdQrYvLpqqjQ48RFboydJcNg+8tk1LpjmH1mGpUrwKV9b33DZQfYnbw0SCvSp4doQtumNLTCbF2hg47ORnFLuH7rHjaoH8IqRIBgDyRVlka7C14t8jhZkKar7XwYx0DnezjQ1Ey1Xfizief6KFy4uSSOFu4rz0J9Ak020R7GwBOGmF8CyOJUiKcTT7oH4mOxig45ucoaGBTQaiHP+AEYG+wWcezTNBtIRUEvY74UBvmS/Se7W6VH/KC0trAewE1PIUcS104FG/tYduNaaX/+szBs7WZDrmnYYG3mAd8cRZLCBtUT3pZKHbqZD Generated-by-Nova", "fingerprint": "8c:7d:04:57:2f:23:f1:28:8f:b4:8a:24:98:1c:ae:97", "user_id": "9ef898baa3bb4447931809e651131a7d"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:56.209 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:56.253 38 INFO tempest.lib.common.rest_client [req-4c5914a3-b343-4624-82b9-b764ac89383f ] Request (FlavorExtraSpecsRbacTest:test_unset_flavor_extra_spec): 200 DELETE http://172.30.13.94/compute/v2.1/flavors/f2373073-43f1-4b3f-94d6-4a91fb3d87a4/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-1535893790 0.226s 2020-11-06 17:58:56.254 38 DEBUG tempest.lib.common.rest_client [req-4c5914a3-b343-4624-82b9-b764ac89383f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4c5914a3-b343-4624-82b9-b764ac89383f', 'x-compute-request-id': 'req-4c5914a3-b343-4624-82b9-b764ac89383f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/f2373073-43f1-4b3f-94d6-4a91fb3d87a4/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-1535893790'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:56.254 40 INFO tempest.lib.common.rest_client [req-385730fd-5154-4eb1-9227-7098931e8e30 ] Request (QuotaClassesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.049s 2020-11-06 17:58:56.254 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:56.255 40 DEBUG tempest.lib.common.rest_client [req-385730fd-5154-4eb1-9227-7098931e8e30 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-385730fd-5154-4eb1-9227-7098931e8e30', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:56.267 37 INFO tempest.lib.common.rest_client [req-fe70d51a-b487-497f-b5f3-6cbfcd8467ec ] Request (KeypairsRbacTest:test_show_keypair): 200 GET http://172.30.13.94/identity/v3/projects/d42b80fe0e66474aaf06abe5b593ff94/users/9ef898baa3bb4447931809e651131a7d/roles 0.057s 2020-11-06 17:58:56.267 37 DEBUG tempest.lib.common.rest_client [req-fe70d51a-b487-497f-b5f3-6cbfcd8467ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fe70d51a-b487-497f-b5f3-6cbfcd8467ec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d42b80fe0e66474aaf06abe5b593ff94/users/9ef898baa3bb4447931809e651131a7d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d42b80fe0e66474aaf06abe5b593ff94/users/9ef898baa3bb4447931809e651131a7d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:56.300 38 INFO tempest.lib.common.rest_client [req-041ceeaf-463f-4442-9edd-e51be71bd324 ] Request (FlavorExtraSpecsRbacTest:test_unset_flavor_extra_spec): 200 GET http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles 0.045s 2020-11-06 17:58:56.300 38 DEBUG tempest.lib.common.rest_client [req-041ceeaf-463f-4442-9edd-e51be71bd324 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-041ceeaf-463f-4442-9edd-e51be71bd324', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:56.320 40 INFO tempest.lib.common.rest_client [req-8f88bd5d-83c0-4768-9072-6b1ff70cbea1 ] Request (QuotaClassesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/5a878a85d5c548ceb8fd3302a8a6990d/users/eba557a38a694f069804b1cd2d357b4e/roles/72a4576c553448cd941b052c1ca0cf2d 0.064s 2020-11-06 17:58:56.320 40 DEBUG tempest.lib.common.rest_client [req-8f88bd5d-83c0-4768-9072-6b1ff70cbea1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8f88bd5d-83c0-4768-9072-6b1ff70cbea1', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/5a878a85d5c548ceb8fd3302a8a6990d/users/eba557a38a694f069804b1cd2d357b4e/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:56.321 40 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-QuotaClassesRbacTest-129085586', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '5a878a85d5c548ceb8fd3302a8a6990d', 'project_name': 'tempest-QuotaClassesRbacTest-129085586', 'tenant_id': '5a878a85d5c548ceb8fd3302a8a6990d', 'tenant_name': 'tempest-QuotaClassesRbacTest-129085586', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'eba557a38a694f069804b1cd2d357b4e'}, Network: None, Subnet: None, Router: None 2020-11-06 17:58:56.321 40 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-QuotaClassesRbacTest-129085586', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '5a878a85d5c548ceb8fd3302a8a6990d', 'project_name': 'tempest-QuotaClassesRbacTest-129085586', 'tenant_id': '5a878a85d5c548ceb8fd3302a8a6990d', 'tenant_name': 'tempest-QuotaClassesRbacTest-129085586', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'eba557a38a694f069804b1cd2d357b4e'}, Network: None, Subnet: None, Router: None 2020-11-06 17:58:56.359 37 INFO tempest.lib.common.rest_client [req-8a84abfd-5372-425e-8ee7-589f9d09229a ] Request (KeypairsRbacTest:test_show_keypair): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-11-06 17:58:56.359 37 DEBUG tempest.lib.common.rest_client [req-8a84abfd-5372-425e-8ee7-589f9d09229a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8a84abfd-5372-425e-8ee7-589f9d09229a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9ef898baa3bb4447931809e651131a7d", "name": "tempest-KeypairsRbacTest-410986106", "password_expires_at": null}, "audit_ids": ["JM0JjwDQQmqxnsnet1IkWA"], "expires_at": "2020-11-06T18:58:56.000000Z", "issued_at": "2020-11-06T17:58:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d42b80fe0e66474aaf06abe5b593ff94", "name": "tempest-KeypairsRbacTest-410986106"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:56.382 38 INFO tempest.lib.common.rest_client [req-cade3eff-5289-47e0-a43c-31db69dbe19a ] Request (FlavorExtraSpecsRbacTest:test_unset_flavor_extra_spec): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-11-06 17:58:56.382 38 DEBUG tempest.lib.common.rest_client [req-cade3eff-5289-47e0-a43c-31db69dbe19a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cade3eff-5289-47e0-a43c-31db69dbe19a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a48b438874604322a665d5cb77968d6b", "name": "tempest-FlavorExtraSpecsRbacTest-948410924", "password_expires_at": null}, "audit_ids": ["NOmEU1x-SwSdzFLqyF9Gjw"], "expires_at": "2020-11-06T18:58:56.000000Z", "issued_at": "2020-11-06T17:58:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "442586d60ab142eb92d79f82257c85a2", "name": "tempest-FlavorExtraSpecsRbacTest-948410924"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:56.439 40 INFO tempest.lib.common.rest_client [req-4048003e-59f3-4208-ae01-783d13ce6886 ] Request (QuotaClassesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.107s 2020-11-06 17:58:56.439 40 DEBUG tempest.lib.common.rest_client [req-4048003e-59f3-4208-ae01-783d13ce6886 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6569', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4048003e-59f3-4208-ae01-783d13ce6886', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eba557a38a694f069804b1cd2d357b4e", "name": "tempest-QuotaClassesRbacTest-129085586", "password_expires_at": null}, "audit_ids": ["4pNLpMR8TDq7Vhh25FEU6Q"], "expires_at": "2020-11-06T18:58:56.000000Z", "issued_at": "2020-11-06T17:58:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5a878a85d5c548ceb8fd3302a8a6990d", "name": "tempest-QuotaClassesRbacTest-129085586"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5a878a85d5c548ceb8fd3302a8a6990d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5a878a85d5c548ceb8fd3302a8a6990d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5a878a85d5c548ceb8fd3302a8a6990d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5a878a85d5c548ceb8fd3302a8a6990d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5a878a85d5c548ceb8fd3302a8a6990d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5a878a85d5c548ceb8fd3302a8a6990d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.3 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:56.531 38 INFO tempest.lib.common.rest_client [req-f5bce484-2c87-4fbb-a44b-5e6b527a6a3e ] Request (FlavorExtraSpecsRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/compute/v2.1/flavors/f2373073-43f1-4b3f-94d6-4a91fb3d87a4/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-1535893790 0.147s 2020-11-06 17:58:56.532 38 DEBUG tempest.lib.common.rest_client [req-f5bce484-2c87-4fbb-a44b-5e6b527a6a3e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '166', 'x-openstack-request-id': 'req-f5bce484-2c87-4fbb-a44b-5e6b527a6a3e', 'x-compute-request-id': 'req-f5bce484-2c87-4fbb-a44b-5e6b527a6a3e', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/f2373073-43f1-4b3f-94d6-4a91fb3d87a4/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-1535893790'} Body: b'{"itemNotFound": {"code": 404, "message": "Flavor f2373073-43f1-4b3f-94d6-4a91fb3d87a4 has no extra specs with key tempest-FlavorExtraSpecsRbacTest-key-1535893790."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:56.536 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:58:56.537 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.538 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.538 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.539 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.539 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.540 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.541 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.541 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.542 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.542 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.543 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.543 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.544 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.544 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.544 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.545 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.545 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.546 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.546 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.546 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.546 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.547 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.547 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.547 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.548 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.548 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.548 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.548 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.549 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.549 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.549 40 INFO tempest.lib.common.rest_client [req-f6e5bf75-dc8b-4eb6-b488-1957b61b9af3 ] Request (QuotaClassesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.108s 2020-11-06 17:58:56.549 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.549 40 DEBUG tempest.lib.common.rest_client [req-f6e5bf75-dc8b-4eb6-b488-1957b61b9af3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-QuotaClassesRbacTest-708404606-desc", "domain_id": "default", "name": "tempest-QuotaClassesRbacTest-708404606"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '376', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f6e5bf75-dc8b-4eb6-b488-1957b61b9af3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "2b6e7876e599475bbd7551d55b98dfbe", "name": "tempest-QuotaClassesRbacTest-708404606", "domain_id": "default", "description": "tempest-QuotaClassesRbacTest-708404606-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/2b6e7876e599475bbd7551d55b98dfbe"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:56.550 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.550 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.550 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.550 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.551 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.551 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.551 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.552 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.552 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.552 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.552 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.553 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.553 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.553 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.554 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.554 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.554 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.555 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.555 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.555 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.555 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.556 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.556 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.556 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.556 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.557 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.557 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.557 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.558 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.558 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.559 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.559 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.559 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.560 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.560 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.560 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.560 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.561 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.561 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.561 37 INFO tempest.lib.common.rest_client [req-099ac56f-0ce7-47d9-ae01-1ad41acc9c89 ] Request (KeypairsRbacTest:test_show_keypair): 200 GET http://172.30.13.94/compute/v2.1/os-keypairs/tempest-KeypairsRbacTest-key-1099472811 0.201s 2020-11-06 17:58:56.561 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.562 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.562 37 DEBUG tempest.lib.common.rest_client [req-099ac56f-0ce7-47d9-ae01-1ad41acc9c89 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '707', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-099ac56f-0ce7-47d9-ae01-1ad41acc9c89', 'x-compute-request-id': 'req-099ac56f-0ce7-47d9-ae01-1ad41acc9c89', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-keypairs/tempest-KeypairsRbacTest-key-1099472811'} Body: b'{"keypair": {"name": "tempest-KeypairsRbacTest-key-1099472811", "public_key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC09R2Obz3OEUMNj3V6jjPD0We//7MxdQrYvLpqqjQ48RFboydJcNg+8tk1LpjmH1mGpUrwKV9b33DZQfYnbw0SCvSp4doQtumNLTCbF2hg47ORnFLuH7rHjaoH8IqRIBgDyRVlka7C14t8jhZkKar7XwYx0DnezjQ1Ey1Xfizief6KFy4uSSOFu4rz0J9Ak020R7GwBOGmF8CyOJUiKcTT7oH4mOxig45ucoaGBTQaiHP+AEYG+wWcezTNBtIRUEvY74UBvmS/Se7W6VH/KC0trAewE1PIUcS104FG/tYduNaaX/+szBs7WZDrmnYYG3mAd8cRZLCBtUT3pZKHbqZD Generated-by-Nova", "fingerprint": "8c:7d:04:57:2f:23:f1:28:8f:b4:8a:24:98:1c:ae:97", "user_id": "9ef898baa3bb4447931809e651131a7d", "created_at": "2020-11-06T17:58:56.000000", "deleted": false, "deleted_at": null, "id": 3898, "updated_at": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:56.562 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.562 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.563 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.564 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-flavor-extra-specs:update, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:58:56.567 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:56.582 39 INFO tempest.lib.common.rest_client [req-46903ad1-d653-4afc-be65-d75eb6bc0bdb ] Request (HostsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-11-06 17:58:56.583 39 DEBUG tempest.lib.common.rest_client [req-46903ad1-d653-4afc-be65-d75eb6bc0bdb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-46903ad1-d653-4afc-be65-d75eb6bc0bdb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9e15439fdfcd454d936a9f5b2e2b98d6", "name": "tempest-HostsRbacTest-98478993", "password_expires_at": null}, "audit_ids": ["sLxhYI_4S32ubho49KU80w"], "expires_at": "2020-11-06T18:58:56.000000Z", "issued_at": "2020-11-06T17:58:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "81082b06cc6941c2b169f2ca0ecd01d3", "name": "tempest-HostsRbacTest-98478993"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/81082b06cc6941c2b169f2ca0ecd01d3", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/81082b06cc6941c2b169f2ca0ecd01d3", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/81082b06cc6941c2b169f2ca0ecd01d3", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_81082b06cc6941c2b169f2ca0ecd01d3", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_81082b06cc6941c2b169f2ca0ecd01d3", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_81082b06cc6941c2b169f2ca0ecd01d3", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:56.585 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:58:56.586 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.587 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.587 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.588 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.588 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.589 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.589 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.590 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.590 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.591 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.591 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.592 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.592 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.592 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.593 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.593 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.593 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.594 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.594 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.595 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.595 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.595 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.596 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.596 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.597 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.597 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.597 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.598 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.598 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.598 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.598 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.599 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.599 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.599 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.599 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.600 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.600 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.600 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.601 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.601 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.601 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.601 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.602 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.602 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.602 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.603 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.603 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.603 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.603 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.604 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.604 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.604 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.605 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.605 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.605 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.605 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.606 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.606 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.606 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.607 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.607 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.607 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.608 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.608 38 INFO tempest.lib.common.rest_client [req-442135b9-1349-41b3-8364-e89448dc625b ] Request (FlavorExtraSpecsRbacTest:test_update_flavor_extra_spec): 200 POST http://172.30.13.94/compute/v2.1/flavors/f2373073-43f1-4b3f-94d6-4a91fb3d87a4/os-extra_specs 0.043s 2020-11-06 17:58:56.608 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.608 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.608 38 DEBUG tempest.lib.common.rest_client [req-442135b9-1349-41b3-8364-e89448dc625b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"extra_specs": {"tempest-FlavorExtraSpecsRbacTest-key-1932973394": "tempest-FlavorExtraSpecsRbacTest-val-832701493"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '118', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-442135b9-1349-41b3-8364-e89448dc625b', 'x-compute-request-id': 'req-442135b9-1349-41b3-8364-e89448dc625b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/f2373073-43f1-4b3f-94d6-4a91fb3d87a4/os-extra_specs'} Body: b'{"extra_specs": {"tempest-FlavorExtraSpecsRbacTest-key-1932973394": "tempest-FlavorExtraSpecsRbacTest-val-832701493"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:56.609 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.609 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.609 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.609 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.610 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.610 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.610 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.610 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.611 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.611 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:56.612 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-hosts:list, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:58:56.613 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:56.613 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:56.654 40 INFO tempest.lib.common.rest_client [req-30edae40-6b3c-41bd-bdf8-adf3f471f48c ] Request (QuotaClassesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.103s 2020-11-06 17:58:56.654 40 DEBUG tempest.lib.common.rest_client [req-30edae40-6b3c-41bd-bdf8-adf3f471f48c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-QuotaClassesRbacTest-708404606", "password": "S0@qI4ZQH_LgT3V", "project_id": "2b6e7876e599475bbd7551d55b98dfbe", "email": "tempest-QuotaClassesRbacTest-1950761648@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '395', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-30edae40-6b3c-41bd-bdf8-adf3f471f48c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "2b6e7876e599475bbd7551d55b98dfbe", "email": "tempest-QuotaClassesRbacTest-1950761648@example.com", "id": "32dc4245abce49ebabe3ee880ae45d0a", "name": "tempest-QuotaClassesRbacTest-708404606", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/32dc4245abce49ebabe3ee880ae45d0a"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:56.662 38 INFO tempest.lib.common.rest_client [req-cb214b67-74f7-4e72-9e53-4fcab168011a ] Request (FlavorExtraSpecsRbacTest:test_update_flavor_extra_spec): 200 GET http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles 0.048s 2020-11-06 17:58:56.663 38 DEBUG tempest.lib.common.rest_client [req-cb214b67-74f7-4e72-9e53-4fcab168011a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cb214b67-74f7-4e72-9e53-4fcab168011a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:56.665 37 INFO tempest.lib.common.rest_client [req-61a0e8af-e479-4632-91fe-e738cde2fbdc ] Request (KeypairsRbacTest:test_show_keypair): 200 GET http://172.30.13.94/identity/v3/projects/d42b80fe0e66474aaf06abe5b593ff94/users/9ef898baa3bb4447931809e651131a7d/roles 0.096s 2020-11-06 17:58:56.665 37 DEBUG tempest.lib.common.rest_client [req-61a0e8af-e479-4632-91fe-e738cde2fbdc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-61a0e8af-e479-4632-91fe-e738cde2fbdc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d42b80fe0e66474aaf06abe5b593ff94/users/9ef898baa3bb4447931809e651131a7d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d42b80fe0e66474aaf06abe5b593ff94/users/9ef898baa3bb4447931809e651131a7d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:56.681 39 INFO tempest.lib.common.rest_client [req-a804f4aa-6404-4513-8df4-fff527e1b940 ] Request (HostsRbacTest:test_list_hosts): 200 GET http://172.30.13.94/identity/v3/projects/81082b06cc6941c2b169f2ca0ecd01d3/users/9e15439fdfcd454d936a9f5b2e2b98d6/roles 0.068s 2020-11-06 17:58:56.682 39 DEBUG tempest.lib.common.rest_client [req-a804f4aa-6404-4513-8df4-fff527e1b940 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a804f4aa-6404-4513-8df4-fff527e1b940', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/81082b06cc6941c2b169f2ca0ecd01d3/users/9e15439fdfcd454d936a9f5b2e2b98d6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/81082b06cc6941c2b169f2ca0ecd01d3/users/9e15439fdfcd454d936a9f5b2e2b98d6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:56.699 40 INFO tempest.lib.common.rest_client [req-4e91f2e5-437a-47c7-9efb-42be9d70d090 ] Request (QuotaClassesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.043s 2020-11-06 17:58:56.699 40 DEBUG tempest.lib.common.rest_client [req-4e91f2e5-437a-47c7-9efb-42be9d70d090 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4e91f2e5-437a-47c7-9efb-42be9d70d090', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:56.740 38 INFO tempest.lib.common.rest_client [req-51a1e358-c809-4b0d-8f8d-88cc1b55aa40 ] Request (FlavorExtraSpecsRbacTest:test_update_flavor_extra_spec): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.076s 2020-11-06 17:58:56.741 38 DEBUG tempest.lib.common.rest_client [req-51a1e358-c809-4b0d-8f8d-88cc1b55aa40 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-51a1e358-c809-4b0d-8f8d-88cc1b55aa40', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a48b438874604322a665d5cb77968d6b", "name": "tempest-FlavorExtraSpecsRbacTest-948410924", "password_expires_at": null}, "audit_ids": ["1H6MSp5xQKyExp7GpuSW2Q"], "expires_at": "2020-11-06T18:58:56.000000Z", "issued_at": "2020-11-06T17:58:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "442586d60ab142eb92d79f82257c85a2", "name": "tempest-FlavorExtraSpecsRbacTest-948410924"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:56.742 37 INFO tempest.lib.common.rest_client [req-f35df7b0-b03c-4ab1-8bf1-d3f22d91d2cd ] Request (KeypairsRbacTest:test_show_keypair): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.076s 2020-11-06 17:58:56.743 37 DEBUG tempest.lib.common.rest_client [req-f35df7b0-b03c-4ab1-8bf1-d3f22d91d2cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f35df7b0-b03c-4ab1-8bf1-d3f22d91d2cd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9ef898baa3bb4447931809e651131a7d", "name": "tempest-KeypairsRbacTest-410986106", "password_expires_at": null}, "audit_ids": ["5HikZbp8S6GyOY09eqY3Dg"], "expires_at": "2020-11-06T18:58:56.000000Z", "issued_at": "2020-11-06T17:58:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d42b80fe0e66474aaf06abe5b593ff94", "name": "tempest-KeypairsRbacTest-410986106"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d42b80fe0e66474aaf06abe5b593ff94", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:56.757 39 INFO tempest.lib.common.rest_client [req-1d14cadb-c75a-4aab-818d-1d26829db971 ] Request (HostsRbacTest:test_list_hosts): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.075s 2020-11-06 17:58:56.758 39 DEBUG tempest.lib.common.rest_client [req-1d14cadb-c75a-4aab-818d-1d26829db971 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1d14cadb-c75a-4aab-818d-1d26829db971', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9e15439fdfcd454d936a9f5b2e2b98d6", "name": "tempest-HostsRbacTest-98478993", "password_expires_at": null}, "audit_ids": ["3b8lqW14RpyMPjh6IdeRPg"], "expires_at": "2020-11-06T18:58:56.000000Z", "issued_at": "2020-11-06T17:58:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "81082b06cc6941c2b169f2ca0ecd01d3", "name": "tempest-HostsRbacTest-98478993"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/81082b06cc6941c2b169f2ca0ecd01d3", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/81082b06cc6941c2b169f2ca0ecd01d3", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/81082b06cc6941c2b169f2ca0ecd01d3", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_81082b06cc6941c2b169f2ca0ecd01d3", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_81082b06cc6941c2b169f2ca0ecd01d3", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_81082b06cc6941c2b169f2ca0ecd01d3", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:56.772 40 INFO tempest.lib.common.rest_client [req-8cce18b8-d60e-4f28-9e19-ab899946e712 ] Request (QuotaClassesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/2b6e7876e599475bbd7551d55b98dfbe/users/32dc4245abce49ebabe3ee880ae45d0a/roles/a629c95d64b3416fb80ae90af4f69c05 0.071s 2020-11-06 17:58:56.772 40 DEBUG tempest.lib.common.rest_client [req-8cce18b8-d60e-4f28-9e19-ab899946e712 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8cce18b8-d60e-4f28-9e19-ab899946e712', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/2b6e7876e599475bbd7551d55b98dfbe/users/32dc4245abce49ebabe3ee880ae45d0a/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:56.773 40 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-QuotaClassesRbacTest-708404606', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '2b6e7876e599475bbd7551d55b98dfbe', 'project_name': 'tempest-QuotaClassesRbacTest-708404606', 'tenant_id': '2b6e7876e599475bbd7551d55b98dfbe', 'tenant_name': 'tempest-QuotaClassesRbacTest-708404606', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '32dc4245abce49ebabe3ee880ae45d0a'}, Network: None, Subnet: None, Router: None 2020-11-06 17:58:56.773 40 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-QuotaClassesRbacTest-708404606', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '2b6e7876e599475bbd7551d55b98dfbe', 'project_name': 'tempest-QuotaClassesRbacTest-708404606', 'tenant_id': '2b6e7876e599475bbd7551d55b98dfbe', 'tenant_name': 'tempest-QuotaClassesRbacTest-708404606', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '32dc4245abce49ebabe3ee880ae45d0a'}, Network: None, Subnet: None, Router: None 2020-11-06 17:58:56.897 40 INFO tempest.lib.common.rest_client [req-7e4a6ad0-1ca4-4c9f-86b6-e689d869083e ] Request (QuotaClassesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.113s 2020-11-06 17:58:56.898 40 DEBUG tempest.lib.common.rest_client [req-7e4a6ad0-1ca4-4c9f-86b6-e689d869083e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7e4a6ad0-1ca4-4c9f-86b6-e689d869083e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "32dc4245abce49ebabe3ee880ae45d0a", "name": "tempest-QuotaClassesRbacTest-708404606", "password_expires_at": null}, "audit_ids": ["jqAtHY34SueHAbSFi-L7JA"], "expires_at": "2020-11-06T18:58:56.000000Z", "issued_at": "2020-11-06T17:58:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "2b6e7876e599475bbd7551d55b98dfbe", "name": "tempest-QuotaClassesRbacTest-708404606"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/2b6e7876e599475bbd7551d55b98dfbe", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/2b6e7876e599475bbd7551d55b98dfbe", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/2b6e7876e599475bbd7551d55b98dfbe", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2b6e7876e599475bbd7551d55b98dfbe", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2b6e7876e599475bbd7551d55b98dfbe", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2b6e7876e599475bbd7551d55b98dfbe", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:56.982 40 INFO tempest.lib.common.rest_client [req-e5ede617-664a-4b1b-8c33-dc11222c4052 ] Request (QuotaClassesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-11-06 17:58:56.983 40 DEBUG tempest.lib.common.rest_client [req-e5ede617-664a-4b1b-8c33-dc11222c4052 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e5ede617-664a-4b1b-8c33-dc11222c4052', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["vJ7yvISNTgG5lpUjtwP-sQ"], "expires_at": "2020-11-06T18:58:56.000000Z", "issued_at": "2020-11-06T17:58:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:56.996 37 INFO tempest.lib.common.rest_client [req-f0e3c597-c17a-4c83-af81-5ff3c85c7d21 ] Request (KeypairsRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/compute/v2.1/os-keypairs/tempest-KeypairsRbacTest-key-1099472811 0.251s 2020-11-06 17:58:56.996 37 DEBUG tempest.lib.common.rest_client [req-f0e3c597-c17a-4c83-af81-5ff3c85c7d21 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f0e3c597-c17a-4c83-af81-5ff3c85c7d21', 'x-compute-request-id': 'req-f0e3c597-c17a-4c83-af81-5ff3c85c7d21', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/os-keypairs/tempest-KeypairsRbacTest-key-1099472811'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:57.011 39 INFO tempest.lib.common.rest_client [req-0a6d9252-74ec-47df-ac8b-172729e457c3 ] Request (HostsRbacTest:test_list_hosts): 200 GET http://172.30.13.94/compute/v2.1/os-hosts 0.252s 2020-11-06 17:58:57.012 39 DEBUG tempest.lib.common.rest_client [req-0a6d9252-74ec-47df-ac8b-172729e457c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '369', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0a6d9252-74ec-47df-ac8b-172729e457c3', 'x-compute-request-id': 'req-0a6d9252-74ec-47df-ac8b-172729e457c3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hosts'} Body: b'{"hosts": [{"host_name": "lf-virtual9", "service": "scheduler", "zone": "internal"}, {"host_name": "lf-virtual9", "service": "conductor", "zone": "internal"}, {"host_name": "lf-virtual9", "service": "conductor", "zone": "internal"}, {"host_name": "lf-virtual9", "service": "compute", "zone": "nova"}, {"host_name": "lf-virtual8", "service": "compute", "zone": "nova"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:57.014 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:57.021 38 INFO tempest.lib.common.rest_client [req-8b03953c-e1c2-4b3b-a8d5-675daa7917f2 ] Request (FlavorExtraSpecsRbacTest:test_update_flavor_extra_spec): 200 PUT http://172.30.13.94/compute/v2.1/flavors/f2373073-43f1-4b3f-94d6-4a91fb3d87a4/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-1932973394 0.279s 2020-11-06 17:58:57.022 38 DEBUG tempest.lib.common.rest_client [req-8b03953c-e1c2-4b3b-a8d5-675daa7917f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"tempest-FlavorExtraSpecsRbacTest-key-1932973394": "tempest-FlavorExtraSpecsRbacTest-val-84652992"} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '100', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8b03953c-e1c2-4b3b-a8d5-675daa7917f2', 'x-compute-request-id': 'req-8b03953c-e1c2-4b3b-a8d5-675daa7917f2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/f2373073-43f1-4b3f-94d6-4a91fb3d87a4/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-1932973394'} Body: b'{"tempest-FlavorExtraSpecsRbacTest-key-1932973394": "tempest-FlavorExtraSpecsRbacTest-val-84652992"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:57.023 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:57.029 40 INFO tempest.lib.common.rest_client [req-52b62d66-686b-4598-a461-1205c84768ca ] Request (QuotaClassesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 17:58:57.030 40 DEBUG tempest.lib.common.rest_client [req-52b62d66-686b-4598-a461-1205c84768ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-52b62d66-686b-4598-a461-1205c84768ca', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["wpTeYBk_Q6Or1L6-YcEFYA"], "expires_at": "2020-11-06T18:58:57.000000Z", "issued_at": "2020-11-06T17:58:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:57.068 39 INFO tempest.lib.common.rest_client [req-adf867b9-679a-4a09-a6ec-b387768187c1 ] Request (HostsRbacTest:test_list_hosts): 200 GET http://172.30.13.94/identity/v3/projects/81082b06cc6941c2b169f2ca0ecd01d3/users/9e15439fdfcd454d936a9f5b2e2b98d6/roles 0.052s 2020-11-06 17:58:57.068 39 DEBUG tempest.lib.common.rest_client [req-adf867b9-679a-4a09-a6ec-b387768187c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-adf867b9-679a-4a09-a6ec-b387768187c1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/81082b06cc6941c2b169f2ca0ecd01d3/users/9e15439fdfcd454d936a9f5b2e2b98d6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/81082b06cc6941c2b169f2ca0ecd01d3/users/9e15439fdfcd454d936a9f5b2e2b98d6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:57.076 38 INFO tempest.lib.common.rest_client [req-cf30ea16-d775-4ecb-81d0-07361432cb01 ] Request (FlavorExtraSpecsRbacTest:test_update_flavor_extra_spec): 200 GET http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles 0.052s 2020-11-06 17:58:57.077 38 DEBUG tempest.lib.common.rest_client [req-cf30ea16-d775-4ecb-81d0-07361432cb01 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cf30ea16-d775-4ecb-81d0-07361432cb01', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2/users/a48b438874604322a665d5cb77968d6b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:57.082 40 INFO tempest.lib.common.rest_client [req-9c5efc02-7a90-4216-aaa6-889daa34e075 ] Request (QuotaClassesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.051s 2020-11-06 17:58:57.082 40 DEBUG tempest.lib.common.rest_client [req-9c5efc02-7a90-4216-aaa6-889daa34e075 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9c5efc02-7a90-4216-aaa6-889daa34e075', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:57.103 39 INFO tempest.lib.common.rest_client [req-3bbaca6b-6715-447a-a4fd-5786b612388e ] Request (HostsRbacTest:test_list_hosts): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 17:58:57.103 39 DEBUG tempest.lib.common.rest_client [req-3bbaca6b-6715-447a-a4fd-5786b612388e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3bbaca6b-6715-447a-a4fd-5786b612388e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9e15439fdfcd454d936a9f5b2e2b98d6", "name": "tempest-HostsRbacTest-98478993", "password_expires_at": null}, "audit_ids": ["O-QHODrdRoSSG7CzEJq6mg"], "expires_at": "2020-11-06T18:58:57.000000Z", "issued_at": "2020-11-06T17:58:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "81082b06cc6941c2b169f2ca0ecd01d3", "name": "tempest-HostsRbacTest-98478993"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/81082b06cc6941c2b169f2ca0ecd01d3", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/81082b06cc6941c2b169f2ca0ecd01d3", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/81082b06cc6941c2b169f2ca0ecd01d3", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_81082b06cc6941c2b169f2ca0ecd01d3", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_81082b06cc6941c2b169f2ca0ecd01d3", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_81082b06cc6941c2b169f2ca0ecd01d3", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:57.107 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:58:57.108 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.109 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.110 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.110 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.111 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.112 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.112 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.113 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.113 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.113 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.114 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.114 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.114 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.114 38 INFO tempest.lib.common.rest_client [req-1d8f9a2e-6252-46de-bf8e-357509908b23 ] Request (FlavorExtraSpecsRbacTest:test_update_flavor_extra_spec): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 17:58:57.115 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.115 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.115 38 DEBUG tempest.lib.common.rest_client [req-1d8f9a2e-6252-46de-bf8e-357509908b23 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1d8f9a2e-6252-46de-bf8e-357509908b23', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a48b438874604322a665d5cb77968d6b", "name": "tempest-FlavorExtraSpecsRbacTest-948410924", "password_expires_at": null}, "audit_ids": ["UzTJtdYOTsabv0YKDf6itw"], "expires_at": "2020-11-06T18:58:57.000000Z", "issued_at": "2020-11-06T17:58:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "442586d60ab142eb92d79f82257c85a2", "name": "tempest-FlavorExtraSpecsRbacTest-948410924"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_442586d60ab142eb92d79f82257c85a2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:57.115 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.115 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.116 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.116 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.116 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.117 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.117 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.117 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.117 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.118 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.118 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.118 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.118 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.119 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.119 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.119 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.120 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.120 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.120 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.120 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.121 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.121 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.121 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.122 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.122 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.122 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.122 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.123 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.123 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.124 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.124 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.124 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.125 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.126 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.126 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.126 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.126 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.127 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.127 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.127 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.127 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.128 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.128 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.128 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.129 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.129 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.129 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.130 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.130 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.130 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.131 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.131 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.131 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.131 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.132 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.132 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.132 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.132 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.133 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.133 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:57.134 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-hosts:show, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:58:57.137 40 INFO tempest.lib.common.rest_client [req-ec3df924-eb87-41ef-bdf4-52ec42b9d770 ] Request (QuotaClassesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.053s 2020-11-06 17:58:57.137 40 DEBUG tempest.lib.common.rest_client [req-ec3df924-eb87-41ef-bdf4-52ec42b9d770 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ec3df924-eb87-41ef-bdf4-52ec42b9d770', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:57.138 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 17:58:57.138 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:57.140 37 INFO tempest.lib.common.rest_client [req-5dc56e51-87ce-444d-8ad0-c5b3eba419fd ] Request (KeypairsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/9ef898baa3bb4447931809e651131a7d 0.138s 2020-11-06 17:58:57.141 37 DEBUG tempest.lib.common.rest_client [req-5dc56e51-87ce-444d-8ad0-c5b3eba419fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5dc56e51-87ce-444d-8ad0-c5b3eba419fd', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/9ef898baa3bb4447931809e651131a7d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:57.228 37 INFO tempest.lib.common.rest_client [req-3e8b3f8a-72b5-4466-b45e-27cf1fa8372f ] Request (KeypairsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-11-06 17:58:57.229 37 DEBUG tempest.lib.common.rest_client [req-3e8b3f8a-72b5-4466-b45e-27cf1fa8372f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3e8b3f8a-72b5-4466-b45e-27cf1fa8372f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["fmtGptskQ1qMzBtprOYxCA"], "expires_at": "2020-11-06T18:58:57.000000Z", "issued_at": "2020-11-06T17:58:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:57.244 40 INFO tempest.lib.common.rest_client [req-f8176aef-b985-4f3f-8ca9-1e9abf547c02 ] Request (QuotaClassesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/5a878a85d5c548ceb8fd3302a8a6990d/users/eba557a38a694f069804b1cd2d357b4e/roles 0.105s 2020-11-06 17:58:57.245 40 DEBUG tempest.lib.common.rest_client [req-f8176aef-b985-4f3f-8ca9-1e9abf547c02 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f8176aef-b985-4f3f-8ca9-1e9abf547c02', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5a878a85d5c548ceb8fd3302a8a6990d/users/eba557a38a694f069804b1cd2d357b4e/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5a878a85d5c548ceb8fd3302a8a6990d/users/eba557a38a694f069804b1cd2d357b4e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:57.301 40 INFO tempest.lib.common.rest_client [req-8732ce53-93d4-4ada-bf43-a04b19cfd915 ] Request (QuotaClassesRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/5a878a85d5c548ceb8fd3302a8a6990d/users/eba557a38a694f069804b1cd2d357b4e/roles/72a4576c553448cd941b052c1ca0cf2d 0.055s 2020-11-06 17:58:57.302 40 DEBUG tempest.lib.common.rest_client [req-8732ce53-93d4-4ada-bf43-a04b19cfd915 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8732ce53-93d4-4ada-bf43-a04b19cfd915', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/5a878a85d5c548ceb8fd3302a8a6990d/users/eba557a38a694f069804b1cd2d357b4e/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:57.322 38 INFO tempest.lib.common.rest_client [req-30640829-d377-4064-aa34-ed2230e6ec70 ] Request (FlavorExtraSpecsRbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/compute/v2.1/flavors/f2373073-43f1-4b3f-94d6-4a91fb3d87a4/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-1932973394 0.206s 2020-11-06 17:58:57.322 38 DEBUG tempest.lib.common.rest_client [req-30640829-d377-4064-aa34-ed2230e6ec70 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-30640829-d377-4064-aa34-ed2230e6ec70', 'x-compute-request-id': 'req-30640829-d377-4064-aa34-ed2230e6ec70', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/f2373073-43f1-4b3f-94d6-4a91fb3d87a4/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-1932973394'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:57.347 39 INFO tempest.lib.common.rest_client [req-4dafaffe-e67c-45bc-a09f-21c91ab50242 ] Request (HostsRbacTest:test_show_host_details): 200 GET http://172.30.13.94/compute/v2.1/os-hosts 0.212s 2020-11-06 17:58:57.348 39 DEBUG tempest.lib.common.rest_client [req-4dafaffe-e67c-45bc-a09f-21c91ab50242 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '369', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4dafaffe-e67c-45bc-a09f-21c91ab50242', 'x-compute-request-id': 'req-4dafaffe-e67c-45bc-a09f-21c91ab50242', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hosts'} Body: b'{"hosts": [{"host_name": "lf-virtual9", "service": "scheduler", "zone": "internal"}, {"host_name": "lf-virtual9", "service": "conductor", "zone": "internal"}, {"host_name": "lf-virtual9", "service": "conductor", "zone": "internal"}, {"host_name": "lf-virtual9", "service": "compute", "zone": "nova"}, {"host_name": "lf-virtual8", "service": "compute", "zone": "nova"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:57.352 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:57.355 38 INFO tempest.lib.common.rest_client [req-926ffa8b-58ec-48ce-bb0d-7a1fb01ca51d ] Request (FlavorExtraSpecsRbacTest:tearDownClass): 202 DELETE http://172.30.13.94/compute/v2.1/flavors/f2373073-43f1-4b3f-94d6-4a91fb3d87a4 0.028s 2020-11-06 17:58:57.355 38 DEBUG tempest.lib.common.rest_client [req-926ffa8b-58ec-48ce-bb0d-7a1fb01ca51d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-926ffa8b-58ec-48ce-bb0d-7a1fb01ca51d', 'x-compute-request-id': 'req-926ffa8b-58ec-48ce-bb0d-7a1fb01ca51d', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/f2373073-43f1-4b3f-94d6-4a91fb3d87a4'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:57.391 38 INFO tempest.lib.common.rest_client [req-79980931-fb02-4dd1-ae0b-350048dbf8fb ] Request (FlavorExtraSpecsRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/flavors/detail 0.036s 2020-11-06 17:58:57.392 38 DEBUG tempest.lib.common.rest_client [req-79980931-fb02-4dd1-ae0b-350048dbf8fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '8777', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-79980931-fb02-4dd1-ae0b-350048dbf8fb', 'x-compute-request-id': 'req-79980931-fb02-4dd1-ae0b-350048dbf8fb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/detail'} Body: b'{"flavors": [{"id": "068070ea-870f-4f2e-b589-fd24aadca788", "name": "tempest_slow-flavor_alt_75eb3fa1-c659-4fc1-9b83-f5e47a8278c9", "ram": 1024, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/068070ea-870f-4f2e-b589-fd24aadca788"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/068070ea-870f-4f2e-b589-fd24aadca788"}]}, {"id": "1", "name": "m1.tiny", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1"}]}, {"id": "1c717c7c-492d-4048-893d-a51a30ef7bfa", "name": "rally_verify_32f1c0c7_UCSTCpLB", "ram": 64, "disk": 5, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/1c717c7c-492d-4048-893d-a51a30ef7bfa"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1c717c7c-492d-4048-893d-a51a30ef7bfa"}]}, {"id": "2", "name": "m1.small", "ram": 2048, "disk": 20, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/2"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/2"}]}, {"id": "29b55520-b9a3-4b97-a3ae-d9c83f854c93", "name": "m1.heat_micro", "ram": 128, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/29b55520-b9a3-4b97-a3ae-d9c83f854c93"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/29b55520-b9a3-4b97-a3ae-d9c83f854c93"}]}, {"id": "3", "name": "m1.medium", "ram": 4096, "disk": 40, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 2, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/3"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/3"}]}, {"id": "4", "name": "m1.large", "ram": 8192, "disk": 80, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 4, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/4"}]}, {"id": "42", "name": "m1.nano", "ram": 128, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/42"}]}, {"id": "49e14b85-dc09-4f88-bf7d-1f99419c2abf", "name": "patrole_member-flavor_29628109-ff86-4992-a718-2f4b83dd48b7", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/49e14b85-dc09-4f88-bf7d-1f99419c2abf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/49e14b85-dc09-4f88-bf7d-1f99419c2abf"}]}, {"id": "5", "name": "m1.xlarge", "ram": 16384, "disk": 160, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 8, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/5"}, {"rel": "bookmark", "href": "http://172.3 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:57.402 40 INFO tempest.lib.common.rest_client [req-552ad8fa-cd55-4784-afd7-018cb3ec8b18 ] Request (QuotaClassesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/5a878a85d5c548ceb8fd3302a8a6990d/users/eba557a38a694f069804b1cd2d357b4e/roles/a629c95d64b3416fb80ae90af4f69c05 0.099s 2020-11-06 17:58:57.402 40 DEBUG tempest.lib.common.rest_client [req-552ad8fa-cd55-4784-afd7-018cb3ec8b18 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-552ad8fa-cd55-4784-afd7-018cb3ec8b18', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/5a878a85d5c548ceb8fd3302a8a6990d/users/eba557a38a694f069804b1cd2d357b4e/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:57.407 39 INFO tempest.lib.common.rest_client [req-4022870c-baff-46fb-ae95-b3b3ed160126 ] Request (HostsRbacTest:test_show_host_details): 200 GET http://172.30.13.94/identity/v3/projects/81082b06cc6941c2b169f2ca0ecd01d3/users/9e15439fdfcd454d936a9f5b2e2b98d6/roles 0.054s 2020-11-06 17:58:57.408 39 DEBUG tempest.lib.common.rest_client [req-4022870c-baff-46fb-ae95-b3b3ed160126 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4022870c-baff-46fb-ae95-b3b3ed160126', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/81082b06cc6941c2b169f2ca0ecd01d3/users/9e15439fdfcd454d936a9f5b2e2b98d6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/81082b06cc6941c2b169f2ca0ecd01d3/users/9e15439fdfcd454d936a9f5b2e2b98d6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:57.494 39 INFO tempest.lib.common.rest_client [req-8c92833b-65a8-4cd6-ba24-98fd4a7ef51b ] Request (HostsRbacTest:test_show_host_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-11-06 17:58:57.495 39 DEBUG tempest.lib.common.rest_client [req-8c92833b-65a8-4cd6-ba24-98fd4a7ef51b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8c92833b-65a8-4cd6-ba24-98fd4a7ef51b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9e15439fdfcd454d936a9f5b2e2b98d6", "name": "tempest-HostsRbacTest-98478993", "password_expires_at": null}, "audit_ids": ["2MqxVbz7TMeaWiRmM-Pp6Q"], "expires_at": "2020-11-06T18:58:57.000000Z", "issued_at": "2020-11-06T17:58:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "81082b06cc6941c2b169f2ca0ecd01d3", "name": "tempest-HostsRbacTest-98478993"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/81082b06cc6941c2b169f2ca0ecd01d3", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/81082b06cc6941c2b169f2ca0ecd01d3", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/81082b06cc6941c2b169f2ca0ecd01d3", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_81082b06cc6941c2b169f2ca0ecd01d3", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_81082b06cc6941c2b169f2ca0ecd01d3", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_81082b06cc6941c2b169f2ca0ecd01d3", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:57.582 38 INFO tempest.lib.common.rest_client [req-775b4672-ab53-46dd-8ac9-1b0cfa8114e9 ] Request (FlavorExtraSpecsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/a48b438874604322a665d5cb77968d6b 0.173s 2020-11-06 17:58:57.583 38 DEBUG tempest.lib.common.rest_client [req-775b4672-ab53-46dd-8ac9-1b0cfa8114e9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-775b4672-ab53-46dd-8ac9-1b0cfa8114e9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/a48b438874604322a665d5cb77968d6b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:57.618 37 INFO tempest.lib.common.rest_client [req-58909d9f-ab51-4616-a39e-209d8410e006 ] Request (KeypairsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=d42b80fe0e66474aaf06abe5b593ff94&name=default 0.388s 2020-11-06 17:58:57.619 37 DEBUG tempest.lib.common.rest_client [req-58909d9f-ab51-4616-a39e-209d8410e006 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-58909d9f-ab51-4616-a39e-209d8410e006', 'date': 'Fri, 06 Nov 2020 17:58:57 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=d42b80fe0e66474aaf06abe5b593ff94&name=default'} Body: b'{"security_groups": [{"id": "39f9fd6a-94b4-416b-9f95-3ce9b58a3739", "name": "default", "stateful": true, "tenant_id": "d42b80fe0e66474aaf06abe5b593ff94", "description": "Default security group", "security_group_rules": [{"id": "620a3a92-0ee6-496f-aacf-038668eb5312", "tenant_id": "d42b80fe0e66474aaf06abe5b593ff94", "security_group_id": "39f9fd6a-94b4-416b-9f95-3ce9b58a3739", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:58:57Z", "updated_at": "2020-11-06T17:58:57Z", "revision_number": 0, "project_id": "d42b80fe0e66474aaf06abe5b593ff94"}, {"id": "d04c6365-a3de-4348-8fb6-491017b7fc5f", "tenant_id": "d42b80fe0e66474aaf06abe5b593ff94", "security_group_id": "39f9fd6a-94b4-416b-9f95-3ce9b58a3739", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:58:57Z", "updated_at": "2020-11-06T17:58:57Z", "revision_number": 0, "project_id": "d42b80fe0e66474aaf06abe5b593ff94"}, {"id": "ee266fc1-a262-4223-b22b-b3853b468806", "tenant_id": "d42b80fe0e66474aaf06abe5b593ff94", "security_group_id": "39f9fd6a-94b4-416b-9f95-3ce9b58a3739", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "39f9fd6a-94b4-416b-9f95-3ce9b58a3739", "description": null, "tags": [], "created_at": "2020-11-06T17:58:57Z", "updated_at": "2020-11-06T17:58:57Z", "revision_number": 0, "project_id": "d42b80fe0e66474aaf06abe5b593ff94"}, {"id": "f70e10c5-4bc5-47c9-b556-1bfe97313477", "tenant_id": "d42b80fe0e66474aaf06abe5b593ff94", "security_group_id": "39f9fd6a-94b4-416b-9f95-3ce9b58a3739", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "39f9fd6a-94b4-416b-9f95-3ce9b58a3739", "description": null, "tags": [], "created_at": "2020-11-06T17:58:57Z", "updated_at": "2020-11-06T17:58:57Z", "revision_number": 0, "project_id": "d42b80fe0e66474aaf06abe5b593ff94"}], "tags": [], "created_at": "2020-11-06T17:58:57Z", "updated_at": "2020-11-06T17:58:57Z", "revision_number": 1, "project_id": "d42b80fe0e66474aaf06abe5b593ff94"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:57.666 38 INFO tempest.lib.common.rest_client [req-e333ce0a-23a9-4329-a294-36c770a2c8ff ] Request (FlavorExtraSpecsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 17:58:57.667 38 DEBUG tempest.lib.common.rest_client [req-e333ce0a-23a9-4329-a294-36c770a2c8ff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e333ce0a-23a9-4329-a294-36c770a2c8ff', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["PgBOBEYARpKEyjQOrI7X1Q"], "expires_at": "2020-11-06T18:58:57.000000Z", "issued_at": "2020-11-06T17:58:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:57.671 39 INFO tempest.lib.common.rest_client [req-abc1535e-16e2-49ff-b06e-80ca51077b28 ] Request (HostsRbacTest:test_show_host_details): 200 GET http://172.30.13.94/compute/v2.1/os-hosts/lf-virtual9 0.175s 2020-11-06 17:58:57.672 39 DEBUG tempest.lib.common.rest_client [req-abc1535e-16e2-49ff-b06e-80ca51077b28 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '328', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-abc1535e-16e2-49ff-b06e-80ca51077b28', 'x-compute-request-id': 'req-abc1535e-16e2-49ff-b06e-80ca51077b28', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hosts/lf-virtual9'} Body: b'{"host": [{"resource": {"host": "lf-virtual9", "project": "(total)", "cpu": 88, "memory_mb": 64312, "disk_gb": 100}}, {"resource": {"host": "lf-virtual9", "project": "(used_now)", "cpu": 0, "memory_mb": 512, "disk_gb": 0}}, {"resource": {"host": "lf-virtual9", "project": "(used_max)", "cpu": 0, "memory_mb": 0, "disk_gb": 0}}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:57.674 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:57.723 39 INFO tempest.lib.common.rest_client [req-0ac34f6c-1c52-4073-a430-b7e4a7bfed61 ] Request (HostsRbacTest:test_show_host_details): 200 GET http://172.30.13.94/identity/v3/projects/81082b06cc6941c2b169f2ca0ecd01d3/users/9e15439fdfcd454d936a9f5b2e2b98d6/roles 0.047s 2020-11-06 17:58:57.723 39 DEBUG tempest.lib.common.rest_client [req-0ac34f6c-1c52-4073-a430-b7e4a7bfed61 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0ac34f6c-1c52-4073-a430-b7e4a7bfed61', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/81082b06cc6941c2b169f2ca0ecd01d3/users/9e15439fdfcd454d936a9f5b2e2b98d6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/81082b06cc6941c2b169f2ca0ecd01d3/users/9e15439fdfcd454d936a9f5b2e2b98d6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:57.764 37 INFO tempest.lib.common.rest_client [req-48d63879-43e8-457c-bbcf-5afb577d8dbb ] Request (KeypairsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/39f9fd6a-94b4-416b-9f95-3ce9b58a3739 0.144s 2020-11-06 17:58:57.764 37 DEBUG tempest.lib.common.rest_client [req-48d63879-43e8-457c-bbcf-5afb577d8dbb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-48d63879-43e8-457c-bbcf-5afb577d8dbb', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 17:58:57 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/39f9fd6a-94b4-416b-9f95-3ce9b58a3739'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:57.809 39 INFO tempest.lib.common.rest_client [req-43de2245-b010-49ef-99ec-9d41b0aa1df4 ] Request (HostsRbacTest:test_show_host_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 17:58:57.809 39 DEBUG tempest.lib.common.rest_client [req-43de2245-b010-49ef-99ec-9d41b0aa1df4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-43de2245-b010-49ef-99ec-9d41b0aa1df4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9e15439fdfcd454d936a9f5b2e2b98d6", "name": "tempest-HostsRbacTest-98478993", "password_expires_at": null}, "audit_ids": ["BWQI965mTnWwQrZGUhgavA"], "expires_at": "2020-11-06T18:58:57.000000Z", "issued_at": "2020-11-06T17:58:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "81082b06cc6941c2b169f2ca0ecd01d3", "name": "tempest-HostsRbacTest-98478993"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/81082b06cc6941c2b169f2ca0ecd01d3", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/81082b06cc6941c2b169f2ca0ecd01d3", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/81082b06cc6941c2b169f2ca0ecd01d3", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_81082b06cc6941c2b169f2ca0ecd01d3", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_81082b06cc6941c2b169f2ca0ecd01d3", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_81082b06cc6941c2b169f2ca0ecd01d3", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:57.883 37 INFO tempest.lib.common.rest_client [req-734544a5-b7aa-4f0d-a0ff-8228c905b5a6 ] Request (KeypairsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/d42b80fe0e66474aaf06abe5b593ff94 0.117s 2020-11-06 17:58:57.883 37 DEBUG tempest.lib.common.rest_client [req-734544a5-b7aa-4f0d-a0ff-8228c905b5a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-734544a5-b7aa-4f0d-a0ff-8228c905b5a6', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d42b80fe0e66474aaf06abe5b593ff94'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:57.938 39 INFO tempest.lib.common.rest_client [req-8996831b-ebbc-4fc3-b448-2ff9fec0218f ] Request (HostsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/9e15439fdfcd454d936a9f5b2e2b98d6 0.125s 2020-11-06 17:58:57.939 39 DEBUG tempest.lib.common.rest_client [req-8996831b-ebbc-4fc3-b448-2ff9fec0218f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8996831b-ebbc-4fc3-b448-2ff9fec0218f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/9e15439fdfcd454d936a9f5b2e2b98d6'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:57.940 38 INFO tempest.lib.common.rest_client [req-354c40f3-af72-47de-9ea5-7293341b3c42 ] Request (FlavorExtraSpecsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=442586d60ab142eb92d79f82257c85a2&name=default 0.272s 2020-11-06 17:58:57.940 38 DEBUG tempest.lib.common.rest_client [req-354c40f3-af72-47de-9ea5-7293341b3c42 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-354c40f3-af72-47de-9ea5-7293341b3c42', 'date': 'Fri, 06 Nov 2020 17:58:57 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=442586d60ab142eb92d79f82257c85a2&name=default'} Body: b'{"security_groups": [{"id": "bf33414b-0457-4ef6-bd7a-afc81fdccd14", "name": "default", "stateful": true, "tenant_id": "442586d60ab142eb92d79f82257c85a2", "description": "Default security group", "security_group_rules": [{"id": "28616371-b019-472c-a836-59251e5ccb90", "tenant_id": "442586d60ab142eb92d79f82257c85a2", "security_group_id": "bf33414b-0457-4ef6-bd7a-afc81fdccd14", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "bf33414b-0457-4ef6-bd7a-afc81fdccd14", "description": null, "tags": [], "created_at": "2020-11-06T17:58:57Z", "updated_at": "2020-11-06T17:58:57Z", "revision_number": 0, "project_id": "442586d60ab142eb92d79f82257c85a2"}, {"id": "3709c7e3-7181-4140-9261-24fdcad3883d", "tenant_id": "442586d60ab142eb92d79f82257c85a2", "security_group_id": "bf33414b-0457-4ef6-bd7a-afc81fdccd14", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:58:57Z", "updated_at": "2020-11-06T17:58:57Z", "revision_number": 0, "project_id": "442586d60ab142eb92d79f82257c85a2"}, {"id": "9a01c7a2-f700-4579-8253-70cdaf84e0a1", "tenant_id": "442586d60ab142eb92d79f82257c85a2", "security_group_id": "bf33414b-0457-4ef6-bd7a-afc81fdccd14", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:58:57Z", "updated_at": "2020-11-06T17:58:57Z", "revision_number": 0, "project_id": "442586d60ab142eb92d79f82257c85a2"}, {"id": "9ce2b7f3-1a4d-4272-8ba6-e846e19777ca", "tenant_id": "442586d60ab142eb92d79f82257c85a2", "security_group_id": "bf33414b-0457-4ef6-bd7a-afc81fdccd14", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "bf33414b-0457-4ef6-bd7a-afc81fdccd14", "description": null, "tags": [], "created_at": "2020-11-06T17:58:57Z", "updated_at": "2020-11-06T17:58:57Z", "revision_number": 0, "project_id": "442586d60ab142eb92d79f82257c85a2"}], "tags": [], "created_at": "2020-11-06T17:58:57Z", "updated_at": "2020-11-06T17:58:57Z", "revision_number": 1, "project_id": "442586d60ab142eb92d79f82257c85a2"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:57.975 37 INFO tempest.lib.common.rest_client [req-70012e0e-499f-42a4-849e-2237b2d82ca7 ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-11-06 17:58:57.975 37 DEBUG tempest.lib.common.rest_client [req-70012e0e-499f-42a4-849e-2237b2d82ca7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-70012e0e-499f-42a4-849e-2237b2d82ca7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["1yieYXvEQE6o-ti0GipZ9Q"], "expires_at": "2020-11-06T18:58:57.000000Z", "issued_at": "2020-11-06T17:58:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.027 39 INFO tempest.lib.common.rest_client [req-639ae146-03e9-4ff2-8ad9-8c815356109b ] Request (HostsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-11-06 17:58:58.028 39 DEBUG tempest.lib.common.rest_client [req-639ae146-03e9-4ff2-8ad9-8c815356109b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-639ae146-03e9-4ff2-8ad9-8c815356109b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["kHLwgeOOScOOt7AF0Zgkhg"], "expires_at": "2020-11-06T18:58:57.000000Z", "issued_at": "2020-11-06T17:58:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.058 38 INFO tempest.lib.common.rest_client [req-b2883026-c336-4fc1-8e47-6f38785b2383 ] Request (FlavorExtraSpecsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/bf33414b-0457-4ef6-bd7a-afc81fdccd14 0.117s 2020-11-06 17:58:58.059 38 DEBUG tempest.lib.common.rest_client [req-b2883026-c336-4fc1-8e47-6f38785b2383 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-b2883026-c336-4fc1-8e47-6f38785b2383', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/bf33414b-0457-4ef6-bd7a-afc81fdccd14'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.077 37 INFO tempest.lib.common.rest_client [req-a5c937e0-b644-435b-936e-91c4482ec4cc ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-11-06 17:58:58.077 37 DEBUG tempest.lib.common.rest_client [req-a5c937e0-b644-435b-936e-91c4482ec4cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a5c937e0-b644-435b-936e-91c4482ec4cc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["b6wxxCXuRT64eyGPQ8nWHg"], "expires_at": "2020-11-06T18:58:58.000000Z", "issued_at": "2020-11-06T17:58:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.137 37 INFO tempest.lib.common.rest_client [req-39557461-db85-40eb-b5bf-5186f4a66fc1 ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.059s 2020-11-06 17:58:58.138 37 DEBUG tempest.lib.common.rest_client [req-39557461-db85-40eb-b5bf-5186f4a66fc1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-39557461-db85-40eb-b5bf-5186f4a66fc1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.183 38 INFO tempest.lib.common.rest_client [req-844fe21a-960d-48dd-8d56-a77144c703ab ] Request (FlavorExtraSpecsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2 0.123s 2020-11-06 17:58:58.184 38 DEBUG tempest.lib.common.rest_client [req-844fe21a-960d-48dd-8d56-a77144c703ab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-844fe21a-960d-48dd-8d56-a77144c703ab', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/442586d60ab142eb92d79f82257c85a2'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.240 38 INFO tempest.lib.common.rest_client [req-6117a084-2c71-4e97-a150-9d10a4f34c70 ] Request (HypervisorRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.053s 2020-11-06 17:58:58.241 38 DEBUG tempest.lib.common.rest_client [req-6117a084-2c71-4e97-a150-9d10a4f34c70 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6117a084-2c71-4e97-a150-9d10a4f34c70', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["cViJdDJhQvugAnmIphwQ3A"], "expires_at": "2020-11-06T18:58:58.000000Z", "issued_at": "2020-11-06T17:58:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.255 37 INFO tempest.lib.common.rest_client [req-6ae6f69a-f6af-4fde-a5f2-1685bf912f63 ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.116s 2020-11-06 17:58:58.255 37 DEBUG tempest.lib.common.rest_client [req-6ae6f69a-f6af-4fde-a5f2-1685bf912f63 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-SecurityGroupsRbacMaxV235Test-286729549-desc", "domain_id": "default", "name": "tempest-SecurityGroupsRbacMaxV235Test-286729549"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '394', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6ae6f69a-f6af-4fde-a5f2-1685bf912f63', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "c371fd7e9e8b429ba2cde7387ed618ac", "name": "tempest-SecurityGroupsRbacMaxV235Test-286729549", "domain_id": "default", "description": "tempest-SecurityGroupsRbacMaxV235Test-286729549-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.318 39 INFO tempest.lib.common.rest_client [req-ee76de56-e0d0-4898-aea3-9aba1712edf5 ] Request (HostsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=81082b06cc6941c2b169f2ca0ecd01d3&name=default 0.289s 2020-11-06 17:58:58.318 39 DEBUG tempest.lib.common.rest_client [req-ee76de56-e0d0-4898-aea3-9aba1712edf5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-ee76de56-e0d0-4898-aea3-9aba1712edf5', 'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=81082b06cc6941c2b169f2ca0ecd01d3&name=default'} Body: b'{"security_groups": [{"id": "472a0429-f38c-4d15-82aa-d4b4b404415a", "name": "default", "stateful": true, "tenant_id": "81082b06cc6941c2b169f2ca0ecd01d3", "description": "Default security group", "security_group_rules": [{"id": "194ad98f-6d07-443e-8e9a-2c9a12bed4e2", "tenant_id": "81082b06cc6941c2b169f2ca0ecd01d3", "security_group_id": "472a0429-f38c-4d15-82aa-d4b4b404415a", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "472a0429-f38c-4d15-82aa-d4b4b404415a", "description": null, "tags": [], "created_at": "2020-11-06T17:58:58Z", "updated_at": "2020-11-06T17:58:58Z", "revision_number": 0, "project_id": "81082b06cc6941c2b169f2ca0ecd01d3"}, {"id": "600dd93c-6613-4e83-b9b0-d3fa6a0aa672", "tenant_id": "81082b06cc6941c2b169f2ca0ecd01d3", "security_group_id": "472a0429-f38c-4d15-82aa-d4b4b404415a", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "472a0429-f38c-4d15-82aa-d4b4b404415a", "description": null, "tags": [], "created_at": "2020-11-06T17:58:58Z", "updated_at": "2020-11-06T17:58:58Z", "revision_number": 0, "project_id": "81082b06cc6941c2b169f2ca0ecd01d3"}, {"id": "a4928c00-1cd1-4442-9437-bdf07e001c03", "tenant_id": "81082b06cc6941c2b169f2ca0ecd01d3", "security_group_id": "472a0429-f38c-4d15-82aa-d4b4b404415a", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:58:58Z", "updated_at": "2020-11-06T17:58:58Z", "revision_number": 0, "project_id": "81082b06cc6941c2b169f2ca0ecd01d3"}, {"id": "cdf1a84a-aff1-4cc0-8291-a573f2def1d9", "tenant_id": "81082b06cc6941c2b169f2ca0ecd01d3", "security_group_id": "472a0429-f38c-4d15-82aa-d4b4b404415a", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:58:58Z", "updated_at": "2020-11-06T17:58:58Z", "revision_number": 0, "project_id": "81082b06cc6941c2b169f2ca0ecd01d3"}], "tags": [], "created_at": "2020-11-06T17:58:58Z", "updated_at": "2020-11-06T17:58:58Z", "revision_number": 1, "project_id": "81082b06cc6941c2b169f2ca0ecd01d3"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.333 38 INFO tempest.lib.common.rest_client [req-a2db3705-a061-4ffa-9169-dd816b46d843 ] Request (HypervisorRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 17:58:58.334 38 DEBUG tempest.lib.common.rest_client [req-a2db3705-a061-4ffa-9169-dd816b46d843 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a2db3705-a061-4ffa-9169-dd816b46d843', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["X1tV9HYeQvyfE4WNK6zWDg"], "expires_at": "2020-11-06T18:58:58.000000Z", "issued_at": "2020-11-06T17:58:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.367 37 INFO tempest.lib.common.rest_client [req-83700ee2-179a-434d-aae8-cb187fd222b7 ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.110s 2020-11-06 17:58:58.367 37 DEBUG tempest.lib.common.rest_client [req-83700ee2-179a-434d-aae8-cb187fd222b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-SecurityGroupsRbacMaxV235Test-286729549", "password": "Y9#jjlFwhej2X^m", "project_id": "c371fd7e9e8b429ba2cde7387ed618ac", "email": "tempest-SecurityGroupsRbacMaxV235Test-1577514622@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '413', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-83700ee2-179a-434d-aae8-cb187fd222b7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "c371fd7e9e8b429ba2cde7387ed618ac", "email": "tempest-SecurityGroupsRbacMaxV235Test-1577514622@example.com", "id": "d466f0c3f71946b7b235d860e4117827", "name": "tempest-SecurityGroupsRbacMaxV235Test-286729549", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/d466f0c3f71946b7b235d860e4117827"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.379 38 INFO tempest.lib.common.rest_client [req-b66ea9c8-f69b-4ceb-854d-1ed82a2e3024 ] Request (HypervisorRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.044s 2020-11-06 17:58:58.379 38 DEBUG tempest.lib.common.rest_client [req-b66ea9c8-f69b-4ceb-854d-1ed82a2e3024 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b66ea9c8-f69b-4ceb-854d-1ed82a2e3024', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.407 37 INFO tempest.lib.common.rest_client [req-345de587-c45b-4431-8ab3-550a54a533f3 ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.038s 2020-11-06 17:58:58.407 37 DEBUG tempest.lib.common.rest_client [req-345de587-c45b-4431-8ab3-550a54a533f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-345de587-c45b-4431-8ab3-550a54a533f3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.452 38 INFO tempest.lib.common.rest_client [req-d8a7a126-1f79-4ae4-92dd-02ac7832fdab ] Request (HypervisorRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.071s 2020-11-06 17:58:58.452 38 DEBUG tempest.lib.common.rest_client [req-d8a7a126-1f79-4ae4-92dd-02ac7832fdab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-HypervisorRbacTest-198680886-desc", "domain_id": "default", "name": "tempest-HypervisorRbacTest-198680886"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '372', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d8a7a126-1f79-4ae4-92dd-02ac7832fdab', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "e2b28ebe598a46feba79544044f0aa60", "name": "tempest-HypervisorRbacTest-198680886", "domain_id": "default", "description": "tempest-HypervisorRbacTest-198680886-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.463 37 INFO tempest.lib.common.rest_client [req-eebe5c7b-0762-4f37-81f5-c06ae4efbe46 ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-11-06 17:58:58.464 39 INFO tempest.lib.common.rest_client [req-c9e9ec6c-6816-4271-beb2-1abab9fc9cd4 ] Request (HostsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/472a0429-f38c-4d15-82aa-d4b4b404415a 0.144s 2020-11-06 17:58:58.464 37 DEBUG tempest.lib.common.rest_client [req-eebe5c7b-0762-4f37-81f5-c06ae4efbe46 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eebe5c7b-0762-4f37-81f5-c06ae4efbe46', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.464 39 DEBUG tempest.lib.common.rest_client [req-c9e9ec6c-6816-4271-beb2-1abab9fc9cd4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-c9e9ec6c-6816-4271-beb2-1abab9fc9cd4', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/472a0429-f38c-4d15-82aa-d4b4b404415a'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.494 40 INFO tempest.lib.common.rest_client [req-3d11e24c-2eb0-45f6-bb5a-a62351729277 ] Request (QuotaClassesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-11-06 17:58:58.494 40 DEBUG tempest.lib.common.rest_client [req-3d11e24c-2eb0-45f6-bb5a-a62351729277 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3d11e24c-2eb0-45f6-bb5a-a62351729277', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eba557a38a694f069804b1cd2d357b4e", "name": "tempest-QuotaClassesRbacTest-129085586", "password_expires_at": null}, "audit_ids": ["TzKcdUkiSAmgn6WN-sbNxA"], "expires_at": "2020-11-06T18:58:58.000000Z", "issued_at": "2020-11-06T17:58:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5a878a85d5c548ceb8fd3302a8a6990d", "name": "tempest-QuotaClassesRbacTest-129085586"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5a878a85d5c548ceb8fd3302a8a6990d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5a878a85d5c548ceb8fd3302a8a6990d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5a878a85d5c548ceb8fd3302a8a6990d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5a878a85d5c548ceb8fd3302a8a6990d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5a878a85d5c548ceb8fd3302a8a6990d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5a878a85d5c548ceb8fd3302a8a6990d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.557 38 INFO tempest.lib.common.rest_client [req-1351b7ba-790e-4b27-bbee-4802de14649e ] Request (HypervisorRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.104s 2020-11-06 17:58:58.558 38 DEBUG tempest.lib.common.rest_client [req-1351b7ba-790e-4b27-bbee-4802de14649e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-HypervisorRbacTest-198680886", "password": "Z7&Fhl=_nyNh258", "project_id": "e2b28ebe598a46feba79544044f0aa60", "email": "tempest-HypervisorRbacTest-1644390530@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '391', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1351b7ba-790e-4b27-bbee-4802de14649e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "e2b28ebe598a46feba79544044f0aa60", "email": "tempest-HypervisorRbacTest-1644390530@example.com", "id": "0f9d52f1d8944e59abc2ba18ba743717", "name": "tempest-HypervisorRbacTest-198680886", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/0f9d52f1d8944e59abc2ba18ba743717"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.573 37 INFO tempest.lib.common.rest_client [req-4f75cbf0-7d91-46ce-8027-015e8d9d777e ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles/72a4576c553448cd941b052c1ca0cf2d 0.108s 2020-11-06 17:58:58.574 37 DEBUG tempest.lib.common.rest_client [req-4f75cbf0-7d91-46ce-8027-015e8d9d777e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4f75cbf0-7d91-46ce-8027-015e8d9d777e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.574 37 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SecurityGroupsRbacMaxV235Test-286729549', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'c371fd7e9e8b429ba2cde7387ed618ac', 'project_name': 'tempest-SecurityGroupsRbacMaxV235Test-286729549', 'tenant_id': 'c371fd7e9e8b429ba2cde7387ed618ac', 'tenant_name': 'tempest-SecurityGroupsRbacMaxV235Test-286729549', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'd466f0c3f71946b7b235d860e4117827'}, Network: None, Subnet: None, Router: None 2020-11-06 17:58:58.575 37 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SecurityGroupsRbacMaxV235Test-286729549', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'c371fd7e9e8b429ba2cde7387ed618ac', 'project_name': 'tempest-SecurityGroupsRbacMaxV235Test-286729549', 'tenant_id': 'c371fd7e9e8b429ba2cde7387ed618ac', 'tenant_name': 'tempest-SecurityGroupsRbacMaxV235Test-286729549', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'd466f0c3f71946b7b235d860e4117827'}, Network: None, Subnet: None, Router: None 2020-11-06 17:58:58.599 40 INFO tempest.lib.common.rest_client [req-6cdb3f09-27c1-4beb-b82d-573de6d984f5 ] Request (QuotaClassesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.103s 2020-11-06 17:58:58.600 40 DEBUG tempest.lib.common.rest_client [req-6cdb3f09-27c1-4beb-b82d-573de6d984f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6cdb3f09-27c1-4beb-b82d-573de6d984f5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.622 39 INFO tempest.lib.common.rest_client [req-06a1ea13-ecc2-4ffa-9459-236a4e330b23 ] Request (HostsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/81082b06cc6941c2b169f2ca0ecd01d3 0.157s 2020-11-06 17:58:58.623 39 DEBUG tempest.lib.common.rest_client [req-06a1ea13-ecc2-4ffa-9459-236a4e330b23 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-06a1ea13-ecc2-4ffa-9459-236a4e330b23', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/81082b06cc6941c2b169f2ca0ecd01d3'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.658 38 INFO tempest.lib.common.rest_client [req-46768fdc-35e0-4c47-a609-931258c942dc ] Request (HypervisorRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.099s 2020-11-06 17:58:58.658 38 DEBUG tempest.lib.common.rest_client [req-46768fdc-35e0-4c47-a609-931258c942dc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-46768fdc-35e0-4c47-a609-931258c942dc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.687 37 INFO tempest.lib.common.rest_client [req-8e6bf47d-3283-4ec6-b37b-5bc33b2f4915 ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.102s 2020-11-06 17:58:58.688 37 DEBUG tempest.lib.common.rest_client [req-8e6bf47d-3283-4ec6-b37b-5bc33b2f4915 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6587', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8e6bf47d-3283-4ec6-b37b-5bc33b2f4915', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d466f0c3f71946b7b235d860e4117827", "name": "tempest-SecurityGroupsRbacMaxV235Test-286729549", "password_expires_at": null}, "audit_ids": ["-uyysLEpS_GsBx8LgVgLwA"], "expires_at": "2020-11-06T18:58:58.000000Z", "issued_at": "2020-11-06T17:58:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c371fd7e9e8b429ba2cde7387ed618ac", "name": "tempest-SecurityGroupsRbacMaxV235Test-286729549"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "u _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.701 39 INFO tempest.lib.common.rest_client [req-1e2af05c-2dc7-415b-ab47-706695e7163d ] Request (HypervisorMaxv252RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.075s 2020-11-06 17:58:58.701 39 DEBUG tempest.lib.common.rest_client [req-1e2af05c-2dc7-415b-ab47-706695e7163d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1e2af05c-2dc7-415b-ab47-706695e7163d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["RrtJqDxRTcuYEv0eG0XHyA"], "expires_at": "2020-11-06T18:58:58.000000Z", "issued_at": "2020-11-06T17:58:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.718 40 INFO tempest.lib.common.rest_client [req-d2ae5edc-d428-4b9e-a1ae-4746e56059aa ] Request (QuotaClassesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.117s 2020-11-06 17:58:58.719 40 DEBUG tempest.lib.common.rest_client [req-d2ae5edc-d428-4b9e-a1ae-4746e56059aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-QuotaClassesRbacTest-1529664648-desc", "domain_id": "default", "name": "tempest-QuotaClassesRbacTest-1529664648"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '378', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d2ae5edc-d428-4b9e-a1ae-4746e56059aa', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "31bf3456c72a41ca9ffe7fde33a58799", "name": "tempest-QuotaClassesRbacTest-1529664648", "domain_id": "default", "description": "tempest-QuotaClassesRbacTest-1529664648-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/31bf3456c72a41ca9ffe7fde33a58799"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.761 38 INFO tempest.lib.common.rest_client [req-a5e3235f-b678-4423-bac2-a248405e0c7b ] Request (HypervisorRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.102s 2020-11-06 17:58:58.762 38 DEBUG tempest.lib.common.rest_client [req-a5e3235f-b678-4423-bac2-a248405e0c7b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a5e3235f-b678-4423-bac2-a248405e0c7b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.774 37 INFO tempest.lib.common.rest_client [req-7724b0eb-b532-4954-9a57-936a26549598 ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-11-06 17:58:58.775 37 DEBUG tempest.lib.common.rest_client [req-7724b0eb-b532-4954-9a57-936a26549598 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7724b0eb-b532-4954-9a57-936a26549598', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["jQMaSN02TCmVxDJanWxM_Q"], "expires_at": "2020-11-06T18:58:58.000000Z", "issued_at": "2020-11-06T17:58:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.787 39 INFO tempest.lib.common.rest_client [req-97fb512d-678b-4b3f-8b70-07094b11c2ff ] Request (HypervisorMaxv252RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.077s 2020-11-06 17:58:58.787 39 DEBUG tempest.lib.common.rest_client [req-97fb512d-678b-4b3f-8b70-07094b11c2ff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-97fb512d-678b-4b3f-8b70-07094b11c2ff', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["CwD5m4WLSKO3suvvIhUBXA"], "expires_at": "2020-11-06T18:58:58.000000Z", "issued_at": "2020-11-06T17:58:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.814 40 INFO tempest.lib.common.rest_client [req-db42981d-bce7-4b99-b7b1-0815fdcec3ff ] Request (QuotaClassesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.094s 2020-11-06 17:58:58.814 40 DEBUG tempest.lib.common.rest_client [req-db42981d-bce7-4b99-b7b1-0815fdcec3ff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-db42981d-bce7-4b99-b7b1-0815fdcec3ff', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.815 40 DEBUG oslo_concurrency.lockutils [-] Acquired lock "compute_quotas" lock /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:266 2020-11-06 17:58:58.816 40 DEBUG oslo_concurrency.lockutils [-] Acquired external semaphore "compute_quotas" lock /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:272 2020-11-06 17:58:58.817 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:58:58.818 37 INFO tempest.lib.common.rest_client [req-2902e5b1-6f70-445c-8120-ec38ee6cf012 ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 17:58:58.818 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.818 37 DEBUG tempest.lib.common.rest_client [req-2902e5b1-6f70-445c-8120-ec38ee6cf012 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2902e5b1-6f70-445c-8120-ec38ee6cf012', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["1yoaUxnsTaq-82nhC7Yu9g"], "expires_at": "2020-11-06T18:58:58.000000Z", "issued_at": "2020-11-06T17:58:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.819 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.819 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.820 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.821 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.821 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.821 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.822 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.822 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.822 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.823 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.823 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.823 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.823 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.824 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.824 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.824 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.825 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.825 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.825 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.826 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.826 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.826 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.826 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.827 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.827 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.827 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.827 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.828 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.828 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.828 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.829 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.829 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.829 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.829 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.830 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.830 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.830 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.830 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.830 38 INFO tempest.lib.common.rest_client [req-78f9c0f5-ebcf-4910-8e3f-199445bc959a ] Request (HypervisorRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles/72a4576c553448cd941b052c1ca0cf2d 0.067s 2020-11-06 17:58:58.831 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.831 38 DEBUG tempest.lib.common.rest_client [req-78f9c0f5-ebcf-4910-8e3f-199445bc959a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-78f9c0f5-ebcf-4910-8e3f-199445bc959a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.831 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.831 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.831 38 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-HypervisorRbacTest-198680886', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'e2b28ebe598a46feba79544044f0aa60', 'project_name': 'tempest-HypervisorRbacTest-198680886', 'tenant_id': 'e2b28ebe598a46feba79544044f0aa60', 'tenant_name': 'tempest-HypervisorRbacTest-198680886', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '0f9d52f1d8944e59abc2ba18ba743717'}, Network: None, Subnet: None, Router: None 2020-11-06 17:58:58.832 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.832 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.832 38 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-HypervisorRbacTest-198680886', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'e2b28ebe598a46feba79544044f0aa60', 'project_name': 'tempest-HypervisorRbacTest-198680886', 'tenant_id': 'e2b28ebe598a46feba79544044f0aa60', 'tenant_name': 'tempest-HypervisorRbacTest-198680886', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '0f9d52f1d8944e59abc2ba18ba743717'}, Network: None, Subnet: None, Router: None 2020-11-06 17:58:58.832 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.832 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.833 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.833 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.833 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.834 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.834 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.834 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.834 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.835 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.835 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.835 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.835 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.836 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.836 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.836 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.837 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.837 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.838 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.838 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.838 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.838 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.839 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.839 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.839 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.840 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.840 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.840 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.840 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.841 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.841 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:58.842 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-quota-class-sets:show, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:58:58.842 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:58.844 39 INFO tempest.lib.common.rest_client [req-b67564aa-304c-43d5-b18d-1ee8b6e9c43b ] Request (HypervisorMaxv252RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.055s 2020-11-06 17:58:58.844 39 DEBUG tempest.lib.common.rest_client [req-b67564aa-304c-43d5-b18d-1ee8b6e9c43b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b67564aa-304c-43d5-b18d-1ee8b6e9c43b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.923 37 INFO tempest.lib.common.rest_client [req-4d2dfe3e-b165-4a26-85eb-705129f4801c ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.103s 2020-11-06 17:58:58.923 37 DEBUG tempest.lib.common.rest_client [req-4d2dfe3e-b165-4a26-85eb-705129f4801c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4d2dfe3e-b165-4a26-85eb-705129f4801c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.948 40 INFO tempest.lib.common.rest_client [req-b9706404-0fd4-4863-8106-43998979307c ] Request (QuotaClassesRbacTest:test_show_quota_class_set): 200 GET http://172.30.13.94/identity/v3/projects/5a878a85d5c548ceb8fd3302a8a6990d/users/eba557a38a694f069804b1cd2d357b4e/roles 0.105s 2020-11-06 17:58:58.949 40 DEBUG tempest.lib.common.rest_client [req-b9706404-0fd4-4863-8106-43998979307c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b9706404-0fd4-4863-8106-43998979307c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5a878a85d5c548ceb8fd3302a8a6990d/users/eba557a38a694f069804b1cd2d357b4e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5a878a85d5c548ceb8fd3302a8a6990d/users/eba557a38a694f069804b1cd2d357b4e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.952 39 INFO tempest.lib.common.rest_client [req-8fb7d93e-0d01-4b68-8745-bce988f56cc3 ] Request (HypervisorMaxv252RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.106s 2020-11-06 17:58:58.952 39 DEBUG tempest.lib.common.rest_client [req-8fb7d93e-0d01-4b68-8745-bce988f56cc3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-HypervisorMaxv252RbacTest-1839273528-desc", "domain_id": "default", "name": "tempest-HypervisorMaxv252RbacTest-1839273528"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '388', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8fb7d93e-0d01-4b68-8745-bce988f56cc3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "a0907040e5734b09b2dfe9314064b904", "name": "tempest-HypervisorMaxv252RbacTest-1839273528", "domain_id": "default", "description": "tempest-HypervisorMaxv252RbacTest-1839273528-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/a0907040e5734b09b2dfe9314064b904"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.953 38 INFO tempest.lib.common.rest_client [req-a97707b5-124b-406f-8852-ebf3a4597e02 ] Request (HypervisorRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.108s 2020-11-06 17:58:58.954 38 DEBUG tempest.lib.common.rest_client [req-a97707b5-124b-406f-8852-ebf3a4597e02 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6565', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a97707b5-124b-406f-8852-ebf3a4597e02', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0f9d52f1d8944e59abc2ba18ba743717", "name": "tempest-HypervisorRbacTest-198680886", "password_expires_at": null}, "audit_ids": ["btfXOhIYSTqhCBQOx5L4aA"], "expires_at": "2020-11-06T18:58:58.000000Z", "issued_at": "2020-11-06T17:58:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e2b28ebe598a46feba79544044f0aa60", "name": "tempest-HypervisorRbacTest-198680886"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.968 37 INFO tempest.lib.common.rest_client [req-1ffbf378-0470-433a-8081-2322ad3990b5 ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.043s 2020-11-06 17:58:58.968 37 DEBUG tempest.lib.common.rest_client [req-1ffbf378-0470-433a-8081-2322ad3990b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1ffbf378-0470-433a-8081-2322ad3990b5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:58.969 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 17:58:58.969 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:59.027 40 INFO tempest.lib.common.rest_client [req-8c306ef9-e05e-4e87-83ca-4987f97391f9 ] Request (QuotaClassesRbacTest:test_show_quota_class_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.077s 2020-11-06 17:58:59.028 40 DEBUG tempest.lib.common.rest_client [req-8c306ef9-e05e-4e87-83ca-4987f97391f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8c306ef9-e05e-4e87-83ca-4987f97391f9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eba557a38a694f069804b1cd2d357b4e", "name": "tempest-QuotaClassesRbacTest-129085586", "password_expires_at": null}, "audit_ids": ["assS3GQXRKOrtEX-zEQDGg"], "expires_at": "2020-11-06T18:58:58.000000Z", "issued_at": "2020-11-06T17:58:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5a878a85d5c548ceb8fd3302a8a6990d", "name": "tempest-QuotaClassesRbacTest-129085586"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5a878a85d5c548ceb8fd3302a8a6990d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5a878a85d5c548ceb8fd3302a8a6990d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5a878a85d5c548ceb8fd3302a8a6990d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5a878a85d5c548ceb8fd3302a8a6990d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5a878a85d5c548ceb8fd3302a8a6990d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5a878a85d5c548ceb8fd3302a8a6990d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:59.032 38 INFO tempest.lib.common.rest_client [req-ea1dc720-5226-46c7-b252-25bc33761714 ] Request (HypervisorRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.077s 2020-11-06 17:58:59.033 38 DEBUG tempest.lib.common.rest_client [req-ea1dc720-5226-46c7-b252-25bc33761714 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ea1dc720-5226-46c7-b252-25bc33761714', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["d4GWvFgVS6ewFDJdi_Z7pw"], "expires_at": "2020-11-06T18:58:58.000000Z", "issued_at": "2020-11-06T17:58:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:59.056 39 INFO tempest.lib.common.rest_client [req-19695116-4bd9-4e75-a9e2-86f1f66a0f44 ] Request (HypervisorMaxv252RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.103s 2020-11-06 17:58:59.057 39 DEBUG tempest.lib.common.rest_client [req-19695116-4bd9-4e75-a9e2-86f1f66a0f44 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-HypervisorMaxv252RbacTest-1839273528", "password": "M0~L5zg8pJ8A^6O", "project_id": "a0907040e5734b09b2dfe9314064b904", "email": "tempest-HypervisorMaxv252RbacTest-1835699848@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '406', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-19695116-4bd9-4e75-a9e2-86f1f66a0f44', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "a0907040e5734b09b2dfe9314064b904", "email": "tempest-HypervisorMaxv252RbacTest-1835699848@example.com", "id": "4865a751b50e42dea8c767d317b639ee", "name": "tempest-HypervisorMaxv252RbacTest-1839273528", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/4865a751b50e42dea8c767d317b639ee"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:59.073 38 INFO tempest.lib.common.rest_client [req-53e35bf8-b770-4d38-988d-a29be9d68101 ] Request (HypervisorRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.030s 2020-11-06 17:58:59.073 38 DEBUG tempest.lib.common.rest_client [req-53e35bf8-b770-4d38-988d-a29be9d68101 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-53e35bf8-b770-4d38-988d-a29be9d68101', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["ODOoNdP1R5a-0TbZaU8FIQ"], "expires_at": "2020-11-06T18:58:59.000000Z", "issued_at": "2020-11-06T17:58:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:59.075 37 INFO tempest.lib.common.rest_client [req-9c6f22cb-61d5-490e-b615-ece97084a59f ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles 0.105s 2020-11-06 17:58:59.075 37 DEBUG tempest.lib.common.rest_client [req-9c6f22cb-61d5-490e-b615-ece97084a59f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9c6f22cb-61d5-490e-b615-ece97084a59f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:59.101 39 INFO tempest.lib.common.rest_client [req-e05d10b4-d58b-4d9e-81f0-b161bf279b2a ] Request (HypervisorMaxv252RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.044s 2020-11-06 17:58:59.102 39 DEBUG tempest.lib.common.rest_client [req-e05d10b4-d58b-4d9e-81f0-b161bf279b2a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e05d10b4-d58b-4d9e-81f0-b161bf279b2a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:59.118 38 INFO tempest.lib.common.rest_client [req-e174e2a3-2268-43fd-8941-3192dde54044 ] Request (HypervisorRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.044s 2020-11-06 17:58:59.119 38 DEBUG tempest.lib.common.rest_client [req-e174e2a3-2268-43fd-8941-3192dde54044 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e174e2a3-2268-43fd-8941-3192dde54044', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:59.132 37 INFO tempest.lib.common.rest_client [req-8674b05b-6cc5-4d78-8d0c-3c29e6a3a471 ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles/72a4576c553448cd941b052c1ca0cf2d 0.056s 2020-11-06 17:58:59.133 37 DEBUG tempest.lib.common.rest_client [req-8674b05b-6cc5-4d78-8d0c-3c29e6a3a471 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8674b05b-6cc5-4d78-8d0c-3c29e6a3a471', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:59.151 39 INFO tempest.lib.common.rest_client [req-14ff6edb-884b-4fde-905d-fcd09e4e3cff ] Request (HypervisorMaxv252RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.048s 2020-11-06 17:58:59.151 39 DEBUG tempest.lib.common.rest_client [req-14ff6edb-884b-4fde-905d-fcd09e4e3cff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-14ff6edb-884b-4fde-905d-fcd09e4e3cff', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:59.228 38 INFO tempest.lib.common.rest_client [req-8033318b-53ca-4d44-8647-0e2c7d3a568c ] Request (HypervisorRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.108s 2020-11-06 17:58:59.228 38 DEBUG tempest.lib.common.rest_client [req-8033318b-53ca-4d44-8647-0e2c7d3a568c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8033318b-53ca-4d44-8647-0e2c7d3a568c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:59.229 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 17:58:59.229 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:59.237 40 INFO tempest.lib.common.rest_client [req-55d3104c-f45e-4389-9a4b-10707a34b42c ] Request (QuotaClassesRbacTest:test_show_quota_class_set): 200 GET http://172.30.13.94/compute/v2.1/os-quota-class-sets/default 0.208s 2020-11-06 17:58:59.238 40 DEBUG tempest.lib.common.rest_client [req-55d3104c-f45e-4389-9a4b-10707a34b42c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '303', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-55d3104c-f45e-4389-9a4b-10707a34b42c', 'x-compute-request-id': 'req-55d3104c-f45e-4389-9a4b-10707a34b42c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-quota-class-sets/default'} Body: b'{"quota_class_set": {"id": "default", "cores": 20, "fixed_ips": -1, "floating_ips": -1, "injected_file_content_bytes": 10240, "injected_file_path_bytes": 255, "injected_files": 5, "instances": 10, "key_pairs": 100, "metadata_items": 128, "ram": 51200, "security_group_rules": -1, "security_groups": -1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:59.241 37 INFO tempest.lib.common.rest_client [req-14623ef0-4192-4b93-a0bd-4d1c93d243ff ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles/a629c95d64b3416fb80ae90af4f69c05 0.106s 2020-11-06 17:58:59.241 37 DEBUG tempest.lib.common.rest_client [req-14623ef0-4192-4b93-a0bd-4d1c93d243ff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-14623ef0-4192-4b93-a0bd-4d1c93d243ff', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:59.244 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:59.272 39 INFO tempest.lib.common.rest_client [req-daf8647f-99ec-4335-badf-e418fc9b80fe ] Request (HypervisorMaxv252RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/a0907040e5734b09b2dfe9314064b904/users/4865a751b50e42dea8c767d317b639ee/roles/72a4576c553448cd941b052c1ca0cf2d 0.119s 2020-11-06 17:58:59.272 39 DEBUG tempest.lib.common.rest_client [req-daf8647f-99ec-4335-badf-e418fc9b80fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-daf8647f-99ec-4335-badf-e418fc9b80fe', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a0907040e5734b09b2dfe9314064b904/users/4865a751b50e42dea8c767d317b639ee/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:59.273 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-HypervisorMaxv252RbacTest-1839273528', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'a0907040e5734b09b2dfe9314064b904', 'project_name': 'tempest-HypervisorMaxv252RbacTest-1839273528', 'tenant_id': 'a0907040e5734b09b2dfe9314064b904', 'tenant_name': 'tempest-HypervisorMaxv252RbacTest-1839273528', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '4865a751b50e42dea8c767d317b639ee'}, Network: None, Subnet: None, Router: None 2020-11-06 17:58:59.273 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-HypervisorMaxv252RbacTest-1839273528', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'a0907040e5734b09b2dfe9314064b904', 'project_name': 'tempest-HypervisorMaxv252RbacTest-1839273528', 'tenant_id': 'a0907040e5734b09b2dfe9314064b904', 'tenant_name': 'tempest-HypervisorMaxv252RbacTest-1839273528', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '4865a751b50e42dea8c767d317b639ee'}, Network: None, Subnet: None, Router: None 2020-11-06 17:58:59.340 38 INFO tempest.lib.common.rest_client [req-c2329fec-f25f-4c26-a526-f2b05737e7bf ] Request (HypervisorRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles 0.109s 2020-11-06 17:58:59.340 38 DEBUG tempest.lib.common.rest_client [req-c2329fec-f25f-4c26-a526-f2b05737e7bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c2329fec-f25f-4c26-a526-f2b05737e7bf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:59.349 40 INFO tempest.lib.common.rest_client [req-3d02a616-54bf-4b5e-a26d-fa9a6c1eecad ] Request (QuotaClassesRbacTest:test_show_quota_class_set): 200 GET http://172.30.13.94/identity/v3/projects/5a878a85d5c548ceb8fd3302a8a6990d/users/eba557a38a694f069804b1cd2d357b4e/roles 0.103s 2020-11-06 17:58:59.349 40 DEBUG tempest.lib.common.rest_client [req-3d02a616-54bf-4b5e-a26d-fa9a6c1eecad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3d02a616-54bf-4b5e-a26d-fa9a6c1eecad', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5a878a85d5c548ceb8fd3302a8a6990d/users/eba557a38a694f069804b1cd2d357b4e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5a878a85d5c548ceb8fd3302a8a6990d/users/eba557a38a694f069804b1cd2d357b4e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:59.389 39 INFO tempest.lib.common.rest_client [req-d679a059-194e-4410-9dc7-b5df0bf083e2 ] Request (HypervisorMaxv252RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.108s 2020-11-06 17:58:59.390 39 DEBUG tempest.lib.common.rest_client [req-d679a059-194e-4410-9dc7-b5df0bf083e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6581', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d679a059-194e-4410-9dc7-b5df0bf083e2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4865a751b50e42dea8c767d317b639ee", "name": "tempest-HypervisorMaxv252RbacTest-1839273528", "password_expires_at": null}, "audit_ids": ["G4BxW1JZQTGvUAd0fykBJg"], "expires_at": "2020-11-06T18:58:59.000000Z", "issued_at": "2020-11-06T17:58:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a0907040e5734b09b2dfe9314064b904", "name": "tempest-HypervisorMaxv252RbacTest-1839273528"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a0907040e5734b09b2dfe9314064b904", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a0907040e5734b09b2dfe9314064b904", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a0907040e5734b09b2dfe9314064b904", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a0907040e5734b09b2dfe9314064b904", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a0907040e5734b09b2dfe9314064b904", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a0907040e5734b09b2dfe9314064b904", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:59.425 39 INFO tempest.lib.common.rest_client [req-bc0f649d-b923-45e4-b371-45d1d27d6e4c ] Request (HypervisorMaxv252RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 17:58:59.425 39 DEBUG tempest.lib.common.rest_client [req-bc0f649d-b923-45e4-b371-45d1d27d6e4c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bc0f649d-b923-45e4-b371-45d1d27d6e4c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["wZ8DjLhwRZCZC5P7if1SPQ"], "expires_at": "2020-11-06T18:58:59.000000Z", "issued_at": "2020-11-06T17:58:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:59.425 40 INFO tempest.lib.common.rest_client [req-e68d3a9e-52af-451a-9df2-e20a1199e7f5 ] Request (QuotaClassesRbacTest:test_show_quota_class_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.075s 2020-11-06 17:58:59.426 40 DEBUG tempest.lib.common.rest_client [req-e68d3a9e-52af-451a-9df2-e20a1199e7f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e68d3a9e-52af-451a-9df2-e20a1199e7f5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eba557a38a694f069804b1cd2d357b4e", "name": "tempest-QuotaClassesRbacTest-129085586", "password_expires_at": null}, "audit_ids": ["xRUFWElSTaSQhfBKgP4s1A"], "expires_at": "2020-11-06T18:58:59.000000Z", "issued_at": "2020-11-06T17:58:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5a878a85d5c548ceb8fd3302a8a6990d", "name": "tempest-QuotaClassesRbacTest-129085586"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5a878a85d5c548ceb8fd3302a8a6990d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5a878a85d5c548ceb8fd3302a8a6990d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5a878a85d5c548ceb8fd3302a8a6990d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5a878a85d5c548ceb8fd3302a8a6990d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5a878a85d5c548ceb8fd3302a8a6990d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5a878a85d5c548ceb8fd3302a8a6990d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:59.427 40 DEBUG oslo_concurrency.lockutils [-] Releasing lock "compute_quotas" lock /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:282 2020-11-06 17:58:59.430 40 DEBUG oslo_concurrency.lockutils [-] Acquired lock "compute_quotas" lock /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:266 2020-11-06 17:58:59.431 40 DEBUG oslo_concurrency.lockutils [-] Acquired external semaphore "compute_quotas" lock /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:272 2020-11-06 17:58:59.432 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:58:59.433 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.434 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.434 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.435 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.435 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.436 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.437 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.437 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.437 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.438 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.438 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.438 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.438 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.439 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.439 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.439 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.440 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.440 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.440 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.441 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.441 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.441 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.441 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.442 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.442 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.442 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.443 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.443 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.443 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.443 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.444 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.444 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.444 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.444 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.445 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.445 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.445 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.446 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.446 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.446 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.446 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.447 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.447 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.447 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.448 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.448 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.448 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.449 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.449 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.449 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.450 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.450 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.450 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.451 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.451 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.451 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.451 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.452 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.452 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.452 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.453 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.453 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.454 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.454 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.454 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.454 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.455 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.455 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.455 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.456 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.456 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.456 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.456 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.457 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.457 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:58:59.458 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-quota-class-sets:update, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:58:59.458 38 INFO tempest.lib.common.rest_client [req-fe458bab-7817-4570-ad39-c06d48d8c7ab ] Request (HypervisorRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles/72a4576c553448cd941b052c1ca0cf2d 0.116s 2020-11-06 17:58:59.459 38 DEBUG tempest.lib.common.rest_client [req-fe458bab-7817-4570-ad39-c06d48d8c7ab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fe458bab-7817-4570-ad39-c06d48d8c7ab', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:59.538 39 INFO tempest.lib.common.rest_client [req-39fa720a-725c-435d-85ea-f4f70fedd73d ] Request (HypervisorMaxv252RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.101s 2020-11-06 17:58:59.538 39 DEBUG tempest.lib.common.rest_client [req-39fa720a-725c-435d-85ea-f4f70fedd73d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-39fa720a-725c-435d-85ea-f4f70fedd73d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["rFmqYcubTYqfmoY_gf0Ttg"], "expires_at": "2020-11-06T18:58:59.000000Z", "issued_at": "2020-11-06T17:58:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:59.566 38 INFO tempest.lib.common.rest_client [req-dd608ac1-e9e4-4653-a12f-174667d49c7a ] Request (HypervisorRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles/a629c95d64b3416fb80ae90af4f69c05 0.106s 2020-11-06 17:58:59.566 38 DEBUG tempest.lib.common.rest_client [req-dd608ac1-e9e4-4653-a12f-174667d49c7a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dd608ac1-e9e4-4653-a12f-174667d49c7a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:59.594 39 INFO tempest.lib.common.rest_client [req-4fcec1e0-1813-4922-abc6-482a37621d3e ] Request (HypervisorMaxv252RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.054s 2020-11-06 17:58:59.594 39 DEBUG tempest.lib.common.rest_client [req-4fcec1e0-1813-4922-abc6-482a37621d3e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4fcec1e0-1813-4922-abc6-482a37621d3e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:59.696 39 INFO tempest.lib.common.rest_client [req-0e85de3a-118b-420c-9262-23aaaeb98d3d ] Request (HypervisorMaxv252RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.101s 2020-11-06 17:58:59.697 39 DEBUG tempest.lib.common.rest_client [req-0e85de3a-118b-420c-9262-23aaaeb98d3d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0e85de3a-118b-420c-9262-23aaaeb98d3d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:59.698 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 17:58:59.698 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:59.728 40 INFO tempest.lib.common.rest_client [req-0670d6f7-d284-482c-b24e-a71483f8bb83 ] Request (QuotaClassesRbacTest:test_update_quota_class_set): 200 GET http://172.30.13.94/compute/v2.1/os-quota-class-sets/31bf3456c72a41ca9ffe7fde33a58799 0.269s 2020-11-06 17:58:59.728 40 DEBUG tempest.lib.common.rest_client [req-0670d6f7-d284-482c-b24e-a71483f8bb83 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '328', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0670d6f7-d284-482c-b24e-a71483f8bb83', 'x-compute-request-id': 'req-0670d6f7-d284-482c-b24e-a71483f8bb83', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-quota-class-sets/31bf3456c72a41ca9ffe7fde33a58799'} Body: b'{"quota_class_set": {"id": "31bf3456c72a41ca9ffe7fde33a58799", "cores": 20, "fixed_ips": -1, "floating_ips": -1, "injected_file_content_bytes": 10240, "injected_file_path_bytes": 255, "injected_files": 5, "instances": 10, "key_pairs": 100, "metadata_items": 128, "ram": 51200, "security_group_rules": -1, "security_groups": -1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:59.731 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:58:59.754 39 INFO tempest.lib.common.rest_client [req-e4d73c73-cc34-4b40-9de6-1dfccde5053d ] Request (HypervisorMaxv252RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/a0907040e5734b09b2dfe9314064b904/users/4865a751b50e42dea8c767d317b639ee/roles 0.054s 2020-11-06 17:58:59.754 39 DEBUG tempest.lib.common.rest_client [req-e4d73c73-cc34-4b40-9de6-1dfccde5053d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e4d73c73-cc34-4b40-9de6-1dfccde5053d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a0907040e5734b09b2dfe9314064b904/users/4865a751b50e42dea8c767d317b639ee/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a0907040e5734b09b2dfe9314064b904/users/4865a751b50e42dea8c767d317b639ee/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:59.796 40 INFO tempest.lib.common.rest_client [req-53bac64e-553d-480f-a9f5-1868c801d7dd ] Request (QuotaClassesRbacTest:test_update_quota_class_set): 200 GET http://172.30.13.94/identity/v3/projects/5a878a85d5c548ceb8fd3302a8a6990d/users/eba557a38a694f069804b1cd2d357b4e/roles 0.064s 2020-11-06 17:58:59.797 40 DEBUG tempest.lib.common.rest_client [req-53bac64e-553d-480f-a9f5-1868c801d7dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-53bac64e-553d-480f-a9f5-1868c801d7dd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5a878a85d5c548ceb8fd3302a8a6990d/users/eba557a38a694f069804b1cd2d357b4e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5a878a85d5c548ceb8fd3302a8a6990d/users/eba557a38a694f069804b1cd2d357b4e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:59.826 39 INFO tempest.lib.common.rest_client [req-99004fb6-7099-422b-a65d-382a69e2ee0c ] Request (HypervisorMaxv252RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/a0907040e5734b09b2dfe9314064b904/users/4865a751b50e42dea8c767d317b639ee/roles/72a4576c553448cd941b052c1ca0cf2d 0.070s 2020-11-06 17:58:59.826 39 DEBUG tempest.lib.common.rest_client [req-99004fb6-7099-422b-a65d-382a69e2ee0c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-99004fb6-7099-422b-a65d-382a69e2ee0c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a0907040e5734b09b2dfe9314064b904/users/4865a751b50e42dea8c767d317b639ee/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:59.881 40 INFO tempest.lib.common.rest_client [req-88ef8ce6-4ddc-42f7-aa30-f261c5f8fc3f ] Request (QuotaClassesRbacTest:test_update_quota_class_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-11-06 17:58:59.882 40 DEBUG tempest.lib.common.rest_client [req-88ef8ce6-4ddc-42f7-aa30-f261c5f8fc3f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-88ef8ce6-4ddc-42f7-aa30-f261c5f8fc3f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eba557a38a694f069804b1cd2d357b4e", "name": "tempest-QuotaClassesRbacTest-129085586", "password_expires_at": null}, "audit_ids": ["nFwRhSuKRP6gBLa9bCf-Dg"], "expires_at": "2020-11-06T18:58:59.000000Z", "issued_at": "2020-11-06T17:58:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5a878a85d5c548ceb8fd3302a8a6990d", "name": "tempest-QuotaClassesRbacTest-129085586"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5a878a85d5c548ceb8fd3302a8a6990d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5a878a85d5c548ceb8fd3302a8a6990d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5a878a85d5c548ceb8fd3302a8a6990d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5a878a85d5c548ceb8fd3302a8a6990d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5a878a85d5c548ceb8fd3302a8a6990d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5a878a85d5c548ceb8fd3302a8a6990d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:58:59.932 39 INFO tempest.lib.common.rest_client [req-7f18ad63-a8a3-4dc6-80d5-d93357c29cc1 ] Request (HypervisorMaxv252RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/a0907040e5734b09b2dfe9314064b904/users/4865a751b50e42dea8c767d317b639ee/roles/a629c95d64b3416fb80ae90af4f69c05 0.104s 2020-11-06 17:58:59.932 39 DEBUG tempest.lib.common.rest_client [req-7f18ad63-a8a3-4dc6-80d5-d93357c29cc1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7f18ad63-a8a3-4dc6-80d5-d93357c29cc1', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a0907040e5734b09b2dfe9314064b904/users/4865a751b50e42dea8c767d317b639ee/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:00.237 40 INFO tempest.lib.common.rest_client [req-98405f22-b967-49d9-8ad7-7d2ad839ff38 ] Request (QuotaClassesRbacTest:test_update_quota_class_set): 200 PUT http://172.30.13.94/compute/v2.1/os-quota-class-sets/31bf3456c72a41ca9ffe7fde33a58799 0.354s 2020-11-06 17:59:00.238 40 DEBUG tempest.lib.common.rest_client [req-98405f22-b967-49d9-8ad7-7d2ad839ff38 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"quota_class_set": {"cores": 120, "fixed_ips": 99, "floating_ips": 99, "injected_file_content_bytes": 10340, "injected_file_path_bytes": 355, "injected_files": 105, "instances": 110, "key_pairs": 200, "metadata_items": 228, "ram": 51300, "security_group_rules": 99, "security_groups": 99}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:58:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '290', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-98405f22-b967-49d9-8ad7-7d2ad839ff38', 'x-compute-request-id': 'req-98405f22-b967-49d9-8ad7-7d2ad839ff38', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-quota-class-sets/31bf3456c72a41ca9ffe7fde33a58799'} Body: b'{"quota_class_set": {"cores": 120, "fixed_ips": 99, "floating_ips": 99, "injected_file_content_bytes": 10340, "injected_file_path_bytes": 355, "injected_files": 105, "instances": 110, "key_pairs": 200, "metadata_items": 228, "ram": 51300, "security_group_rules": 99, "security_groups": 99}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:00.243 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:00.338 37 INFO tempest.lib.common.rest_client [req-8a52c5b0-2892-4b04-8e7d-20a57bf0c60f ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-11-06 17:59:00.339 37 DEBUG tempest.lib.common.rest_client [req-8a52c5b0-2892-4b04-8e7d-20a57bf0c60f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8a52c5b0-2892-4b04-8e7d-20a57bf0c60f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d466f0c3f71946b7b235d860e4117827", "name": "tempest-SecurityGroupsRbacMaxV235Test-286729549", "password_expires_at": null}, "audit_ids": ["KbFMo7IgSxa61pinXXARRA"], "expires_at": "2020-11-06T18:59:00.000000Z", "issued_at": "2020-11-06T17:59:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c371fd7e9e8b429ba2cde7387ed618ac", "name": "tempest-SecurityGroupsRbacMaxV235Test-286729549"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:00.342 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:00.343 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.344 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.345 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.345 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.346 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.347 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.348 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.348 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.349 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.349 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.349 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.349 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.350 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.350 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.350 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.350 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.351 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.351 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.351 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.351 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.352 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.352 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.352 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.352 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.353 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.353 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.353 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.353 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.354 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.354 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.354 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.354 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.355 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.355 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.355 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.355 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.356 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.356 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.356 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.356 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.357 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.357 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.357 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.357 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.358 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.358 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.358 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.358 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.359 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.359 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.359 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.359 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.360 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.360 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.360 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.360 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.361 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.361 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.361 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.361 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.362 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.362 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.362 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.363 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.363 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.363 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.363 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.364 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.364 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.364 40 INFO tempest.lib.common.rest_client [req-6236b6fe-3a20-4d27-bb8e-b59bbd9eac3c ] Request (QuotaClassesRbacTest:test_update_quota_class_set): 200 GET http://172.30.13.94/identity/v3/projects/5a878a85d5c548ceb8fd3302a8a6990d/users/eba557a38a694f069804b1cd2d357b4e/roles 0.120s 2020-11-06 17:59:00.364 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.364 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.364 40 DEBUG tempest.lib.common.rest_client [req-6236b6fe-3a20-4d27-bb8e-b59bbd9eac3c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6236b6fe-3a20-4d27-bb8e-b59bbd9eac3c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5a878a85d5c548ceb8fd3302a8a6990d/users/eba557a38a694f069804b1cd2d357b4e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5a878a85d5c548ceb8fd3302a8a6990d/users/eba557a38a694f069804b1cd2d357b4e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:00.365 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.365 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.365 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.365 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.366 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-security-groups:create, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:00.367 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:00.427 37 INFO tempest.lib.common.rest_client [req-cc2c043d-07d4-4f87-8ba8-1f62be61c18f ] Request (SecurityGroupsRbacMaxV235Test:test_create_security_groups): 200 GET http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles 0.060s 2020-11-06 17:59:00.428 37 DEBUG tempest.lib.common.rest_client [req-cc2c043d-07d4-4f87-8ba8-1f62be61c18f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cc2c043d-07d4-4f87-8ba8-1f62be61c18f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:00.459 40 INFO tempest.lib.common.rest_client [req-58505f51-c74d-484a-9696-b38398f37733 ] Request (QuotaClassesRbacTest:test_update_quota_class_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-11-06 17:59:00.460 40 DEBUG tempest.lib.common.rest_client [req-58505f51-c74d-484a-9696-b38398f37733 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-58505f51-c74d-484a-9696-b38398f37733', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eba557a38a694f069804b1cd2d357b4e", "name": "tempest-QuotaClassesRbacTest-129085586", "password_expires_at": null}, "audit_ids": ["1Ep4d3lLT06hIRy573d36g"], "expires_at": "2020-11-06T18:59:00.000000Z", "issued_at": "2020-11-06T17:59:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5a878a85d5c548ceb8fd3302a8a6990d", "name": "tempest-QuotaClassesRbacTest-129085586"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5a878a85d5c548ceb8fd3302a8a6990d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5a878a85d5c548ceb8fd3302a8a6990d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5a878a85d5c548ceb8fd3302a8a6990d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5a878a85d5c548ceb8fd3302a8a6990d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5a878a85d5c548ceb8fd3302a8a6990d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5a878a85d5c548ceb8fd3302a8a6990d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:00.461 40 DEBUG oslo_concurrency.lockutils [-] Releasing lock "compute_quotas" lock /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:282 2020-11-06 17:59:00.465 37 INFO tempest.lib.common.rest_client [req-fc0da212-8cb3-49e0-9795-f7f7414bdfc1 ] Request (SecurityGroupsRbacMaxV235Test:test_create_security_groups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 17:59:00.465 37 DEBUG tempest.lib.common.rest_client [req-fc0da212-8cb3-49e0-9795-f7f7414bdfc1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fc0da212-8cb3-49e0-9795-f7f7414bdfc1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d466f0c3f71946b7b235d860e4117827", "name": "tempest-SecurityGroupsRbacMaxV235Test-286729549", "password_expires_at": null}, "audit_ids": ["cxaC1t6YTp2M-OoCt2RyEQ"], "expires_at": "2020-11-06T18:59:00.000000Z", "issued_at": "2020-11-06T17:59:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c371fd7e9e8b429ba2cde7387ed618ac", "name": "tempest-SecurityGroupsRbacMaxV235Test-286729549"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:00.656 38 INFO tempest.lib.common.rest_client [req-f515d000-2bd7-4d97-a9eb-37426dc68b2d ] Request (HypervisorRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-11-06 17:59:00.656 38 DEBUG tempest.lib.common.rest_client [req-f515d000-2bd7-4d97-a9eb-37426dc68b2d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f515d000-2bd7-4d97-a9eb-37426dc68b2d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0f9d52f1d8944e59abc2ba18ba743717", "name": "tempest-HypervisorRbacTest-198680886", "password_expires_at": null}, "audit_ids": ["rCnWV3yySb2WwYWTuCbQ0g"], "expires_at": "2020-11-06T18:59:00.000000Z", "issued_at": "2020-11-06T17:59:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e2b28ebe598a46feba79544044f0aa60", "name": "tempest-HypervisorRbacTest-198680886"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:00.699 40 INFO tempest.lib.common.rest_client [req-628f89ea-9275-4352-9d76-dc7e9c5ba411 ] Request (QuotaClassesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/31bf3456c72a41ca9ffe7fde33a58799 0.234s 2020-11-06 17:59:00.700 40 DEBUG tempest.lib.common.rest_client [req-628f89ea-9275-4352-9d76-dc7e9c5ba411 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-628f89ea-9275-4352-9d76-dc7e9c5ba411', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/31bf3456c72a41ca9ffe7fde33a58799'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:00.880 40 INFO tempest.lib.common.rest_client [req-f64bc4ef-698e-49f6-8389-aa58a8907580 ] Request (QuotaClassesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/eba557a38a694f069804b1cd2d357b4e 0.179s 2020-11-06 17:59:00.881 40 DEBUG tempest.lib.common.rest_client [req-f64bc4ef-698e-49f6-8389-aa58a8907580 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f64bc4ef-698e-49f6-8389-aa58a8907580', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/eba557a38a694f069804b1cd2d357b4e'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:00.893 38 INFO tempest.lib.common.rest_client [req-fee5a34b-7ec2-4e22-b372-15010114aaa0 ] Request (HypervisorRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/os-hypervisors 0.235s 2020-11-06 17:59:00.894 38 DEBUG tempest.lib.common.rest_client [req-fee5a34b-7ec2-4e22-b372-15010114aaa0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '187', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fee5a34b-7ec2-4e22-b372-15010114aaa0', 'x-compute-request-id': 'req-fee5a34b-7ec2-4e22-b372-15010114aaa0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hypervisors'} Body: b'{"hypervisors": [{"id": 1, "hypervisor_hostname": "lf-virtual9", "state": "up", "status": "enabled"}, {"id": 2, "hypervisor_hostname": "lf-virtual8", "state": "up", "status": "enabled"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:00.898 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:00.899 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.899 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.900 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.900 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.900 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.901 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.901 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.902 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.902 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.903 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.903 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.904 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.904 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.904 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.905 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.905 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.906 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.906 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.907 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.907 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.907 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.908 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.908 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.908 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.909 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.909 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.910 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.910 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.910 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.911 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.911 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.912 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.912 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.912 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.912 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.913 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.913 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.913 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.913 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.913 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.914 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.914 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.914 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.914 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.915 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.915 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.915 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.915 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.916 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.916 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.916 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.916 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.917 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.917 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.917 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.917 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.918 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.918 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.918 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.918 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.919 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.919 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.919 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.919 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.920 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.920 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.920 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.921 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.921 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.921 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.921 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.921 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.922 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.922 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.922 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:00.923 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-hypervisors:list, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:00.923 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:00.935 37 INFO tempest.lib.common.rest_client [req-65c1f692-2818-4a02-9479-63332f3c2d47 ] Request (SecurityGroupsRbacMaxV235Test:test_create_security_groups): 200 POST http://172.30.13.94/compute/v2.1/os-security-groups 0.468s 2020-11-06 17:59:00.936 37 DEBUG tempest.lib.common.rest_client [req-65c1f692-2818-4a02-9479-63332f3c2d47 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group": {"name": "tempest-SecurityGroupsRbacMaxV235Test-securitygroup-73542661", "description": "tempest-description-1713540570"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '249', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-65c1f692-2818-4a02-9479-63332f3c2d47', 'x-compute-request-id': 'req-65c1f692-2818-4a02-9479-63332f3c2d47', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-security-groups'} Body: b'{"security_group": {"id": "2bf1ef9e-1b60-4aea-85d6-a32520c48ec8", "description": "tempest-description-1713540570", "name": "tempest-SecurityGroupsRbacMaxV235Test-securitygroup-73542661", "tenant_id": "c371fd7e9e8b429ba2cde7387ed618ac", "rules": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:00.944 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:00.977 40 INFO tempest.lib.common.rest_client [req-260870bc-5098-4ce7-91e0-71090ae5bbe4 ] Request (QuotaClassesRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-11-06 17:59:00.978 40 DEBUG tempest.lib.common.rest_client [req-260870bc-5098-4ce7-91e0-71090ae5bbe4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-260870bc-5098-4ce7-91e0-71090ae5bbe4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["qI_J5XpzTo2Ds30QZWBybA"], "expires_at": "2020-11-06T18:59:00.000000Z", "issued_at": "2020-11-06T17:59:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:01.022 39 INFO tempest.lib.common.rest_client [req-0970c38f-6d8b-4f6f-b0ca-951f54a148db ] Request (HypervisorMaxv252RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 17:59:01.023 39 DEBUG tempest.lib.common.rest_client [req-0970c38f-6d8b-4f6f-b0ca-951f54a148db ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0970c38f-6d8b-4f6f-b0ca-951f54a148db', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4865a751b50e42dea8c767d317b639ee", "name": "tempest-HypervisorMaxv252RbacTest-1839273528", "password_expires_at": null}, "audit_ids": ["KZjyJ3RRQI2ay6YenYieVg"], "expires_at": "2020-11-06T18:59:00.000000Z", "issued_at": "2020-11-06T17:59:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a0907040e5734b09b2dfe9314064b904", "name": "tempest-HypervisorMaxv252RbacTest-1839273528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a0907040e5734b09b2dfe9314064b904", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a0907040e5734b09b2dfe9314064b904", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a0907040e5734b09b2dfe9314064b904", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a0907040e5734b09b2dfe9314064b904", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a0907040e5734b09b2dfe9314064b904", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a0907040e5734b09b2dfe9314064b904", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:01.038 38 INFO tempest.lib.common.rest_client [req-cfadc140-12b4-47e7-b362-e4ae0d3b7c8d ] Request (HypervisorRbacTest:test_list_hypervisors): 200 GET http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles 0.114s 2020-11-06 17:59:01.038 38 DEBUG tempest.lib.common.rest_client [req-cfadc140-12b4-47e7-b362-e4ae0d3b7c8d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cfadc140-12b4-47e7-b362-e4ae0d3b7c8d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:01.072 37 INFO tempest.lib.common.rest_client [req-7ad7d042-ef3c-4794-9eb9-8f2bb64af50e ] Request (SecurityGroupsRbacMaxV235Test:test_create_security_groups): 200 GET http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles 0.126s 2020-11-06 17:59:01.073 37 DEBUG tempest.lib.common.rest_client [req-7ad7d042-ef3c-4794-9eb9-8f2bb64af50e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7ad7d042-ef3c-4794-9eb9-8f2bb64af50e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:01.121 38 INFO tempest.lib.common.rest_client [req-6e482ea7-b062-4a21-a9b1-80e94af265d7 ] Request (HypervisorRbacTest:test_list_hypervisors): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-11-06 17:59:01.122 38 DEBUG tempest.lib.common.rest_client [req-6e482ea7-b062-4a21-a9b1-80e94af265d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6e482ea7-b062-4a21-a9b1-80e94af265d7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0f9d52f1d8944e59abc2ba18ba743717", "name": "tempest-HypervisorRbacTest-198680886", "password_expires_at": null}, "audit_ids": ["syMspsq8RkmIPbOlFkSiIA"], "expires_at": "2020-11-06T18:59:01.000000Z", "issued_at": "2020-11-06T17:59:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e2b28ebe598a46feba79544044f0aa60", "name": "tempest-HypervisorRbacTest-198680886"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:01.152 37 INFO tempest.lib.common.rest_client [req-b05a83b7-cd3b-4472-a4a7-05ed91544d7c ] Request (SecurityGroupsRbacMaxV235Test:test_create_security_groups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.077s 2020-11-06 17:59:01.153 37 DEBUG tempest.lib.common.rest_client [req-b05a83b7-cd3b-4472-a4a7-05ed91544d7c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b05a83b7-cd3b-4472-a4a7-05ed91544d7c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d466f0c3f71946b7b235d860e4117827", "name": "tempest-SecurityGroupsRbacMaxV235Test-286729549", "password_expires_at": null}, "audit_ids": ["RsGhCNj8SYueYA_skkJFSA"], "expires_at": "2020-11-06T18:59:01.000000Z", "issued_at": "2020-11-06T17:59:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c371fd7e9e8b429ba2cde7387ed618ac", "name": "tempest-SecurityGroupsRbacMaxV235Test-286729549"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:01.157 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:01.158 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.159 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.159 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.160 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.160 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.161 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.162 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.162 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.163 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.163 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.164 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.164 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.165 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.165 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.165 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.166 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.166 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.166 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.167 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.167 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.167 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.168 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.168 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.168 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.168 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.169 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.169 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.169 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.170 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.170 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.170 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.170 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.171 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.171 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.171 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.172 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.172 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.172 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.172 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.173 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.173 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.173 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.174 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.174 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.174 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.174 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.175 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.175 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.175 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.176 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.176 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.176 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.177 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.177 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.177 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.177 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.178 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.178 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.178 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.179 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.179 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.179 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.180 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.180 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.180 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.181 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.181 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.181 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.182 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.182 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.182 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.182 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.183 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.183 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.183 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.184 39 INFO tempest.lib.common.rest_client [req-e2edacdf-e87b-4064-85b0-e661df61bf11 ] Request (HypervisorMaxv252RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/os-hypervisors 0.159s 2020-11-06 17:59:01.184 39 DEBUG tempest.lib.common.rest_client [req-e2edacdf-e87b-4064-85b0-e661df61bf11 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '187', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e2edacdf-e87b-4064-85b0-e661df61bf11', 'x-compute-request-id': 'req-e2edacdf-e87b-4064-85b0-e661df61bf11', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hypervisors'} Body: b'{"hypervisors": [{"id": 1, "hypervisor_hostname": "lf-virtual9", "state": "up", "status": "enabled"}, {"id": 2, "hypervisor_hostname": "lf-virtual8", "state": "up", "status": "enabled"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:01.185 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-security-groups:delete, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:01.190 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:01.190 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.191 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.192 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.192 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.193 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.194 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.194 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.195 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.195 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.196 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.196 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.197 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.197 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.197 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.198 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.198 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.198 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.198 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.199 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.199 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.199 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.200 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.200 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.200 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.201 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.201 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.201 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.201 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.202 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.202 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.202 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.202 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.203 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.203 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.203 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.204 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.204 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.204 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.204 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.205 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.205 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.205 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.206 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.206 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.206 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.206 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.207 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.207 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.207 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.208 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.208 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.208 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.208 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.209 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.209 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.209 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.210 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.210 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.210 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.210 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.211 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.211 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.212 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.212 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.212 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.212 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.213 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.213 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.213 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.214 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.214 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.214 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.214 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.215 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.215 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.216 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-hypervisors:servers, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:01.216 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:01.230 38 INFO tempest.lib.common.rest_client [req-570c729b-f9d6-45a5-949b-bea224e7067d ] Request (HypervisorRbacTest:test_list_hypervisors): 200 GET http://172.30.13.94/compute/v2.1/os-hypervisors 0.107s 2020-11-06 17:59:01.231 38 DEBUG tempest.lib.common.rest_client [req-570c729b-f9d6-45a5-949b-bea224e7067d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '187', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-570c729b-f9d6-45a5-949b-bea224e7067d', 'x-compute-request-id': 'req-570c729b-f9d6-45a5-949b-bea224e7067d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hypervisors'} Body: b'{"hypervisors": [{"id": 1, "hypervisor_hostname": "lf-virtual9", "state": "up", "status": "enabled"}, {"id": 2, "hypervisor_hostname": "lf-virtual8", "state": "up", "status": "enabled"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:01.235 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:01.272 39 INFO tempest.lib.common.rest_client [req-31fb4584-5a40-4080-afaa-2655a6a9a8a0 ] Request (HypervisorMaxv252RbacTest:test_list_servers_on_hypervisor): 200 GET http://172.30.13.94/identity/v3/projects/a0907040e5734b09b2dfe9314064b904/users/4865a751b50e42dea8c767d317b639ee/roles 0.055s 2020-11-06 17:59:01.272 39 DEBUG tempest.lib.common.rest_client [req-31fb4584-5a40-4080-afaa-2655a6a9a8a0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-31fb4584-5a40-4080-afaa-2655a6a9a8a0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a0907040e5734b09b2dfe9314064b904/users/4865a751b50e42dea8c767d317b639ee/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a0907040e5734b09b2dfe9314064b904/users/4865a751b50e42dea8c767d317b639ee/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:01.291 38 INFO tempest.lib.common.rest_client [req-5cc3ea70-ef09-4000-8a02-8f5789608225 ] Request (HypervisorRbacTest:test_list_hypervisors): 200 GET http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles 0.055s 2020-11-06 17:59:01.291 38 DEBUG tempest.lib.common.rest_client [req-5cc3ea70-ef09-4000-8a02-8f5789608225 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5cc3ea70-ef09-4000-8a02-8f5789608225', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:01.303 40 INFO tempest.lib.common.rest_client [req-1faaf7b2-3939-4673-b899-61b4b3a9f6cb ] Request (QuotaClassesRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=5a878a85d5c548ceb8fd3302a8a6990d&name=default 0.324s 2020-11-06 17:59:01.304 40 DEBUG tempest.lib.common.rest_client [req-1faaf7b2-3939-4673-b899-61b4b3a9f6cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-1faaf7b2-3939-4673-b899-61b4b3a9f6cb', 'date': 'Fri, 06 Nov 2020 17:59:01 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=5a878a85d5c548ceb8fd3302a8a6990d&name=default'} Body: b'{"security_groups": [{"id": "2c659c60-298f-4c95-a952-1ceffef2315c", "name": "default", "stateful": true, "tenant_id": "5a878a85d5c548ceb8fd3302a8a6990d", "description": "Default security group", "security_group_rules": [{"id": "08bf0b63-100d-4e6b-a97f-d45527d67340", "tenant_id": "5a878a85d5c548ceb8fd3302a8a6990d", "security_group_id": "2c659c60-298f-4c95-a952-1ceffef2315c", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "2c659c60-298f-4c95-a952-1ceffef2315c", "description": null, "tags": [], "created_at": "2020-11-06T17:59:01Z", "updated_at": "2020-11-06T17:59:01Z", "revision_number": 0, "project_id": "5a878a85d5c548ceb8fd3302a8a6990d"}, {"id": "4b42e8ce-1aaa-47ec-ae71-b2e4568e8b6e", "tenant_id": "5a878a85d5c548ceb8fd3302a8a6990d", "security_group_id": "2c659c60-298f-4c95-a952-1ceffef2315c", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:59:01Z", "updated_at": "2020-11-06T17:59:01Z", "revision_number": 0, "project_id": "5a878a85d5c548ceb8fd3302a8a6990d"}, {"id": "658764ea-0b7b-42d0-badc-3a228a3a98ed", "tenant_id": "5a878a85d5c548ceb8fd3302a8a6990d", "security_group_id": "2c659c60-298f-4c95-a952-1ceffef2315c", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:59:01Z", "updated_at": "2020-11-06T17:59:01Z", "revision_number": 0, "project_id": "5a878a85d5c548ceb8fd3302a8a6990d"}, {"id": "8474d1d4-194e-46db-80a5-117ebb5cb16a", "tenant_id": "5a878a85d5c548ceb8fd3302a8a6990d", "security_group_id": "2c659c60-298f-4c95-a952-1ceffef2315c", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "2c659c60-298f-4c95-a952-1ceffef2315c", "description": null, "tags": [], "created_at": "2020-11-06T17:59:01Z", "updated_at": "2020-11-06T17:59:01Z", "revision_number": 0, "project_id": "5a878a85d5c548ceb8fd3302a8a6990d"}], "tags": [], "created_at": "2020-11-06T17:59:01Z", "updated_at": "2020-11-06T17:59:01Z", "revision_number": 1, "project_id": "5a878a85d5c548ceb8fd3302a8a6990d"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:01.306 39 INFO tempest.lib.common.rest_client [req-8de2b383-a6eb-4f2b-82ad-98e9b910c18e ] Request (HypervisorMaxv252RbacTest:test_list_servers_on_hypervisor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 17:59:01.307 39 DEBUG tempest.lib.common.rest_client [req-8de2b383-a6eb-4f2b-82ad-98e9b910c18e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8de2b383-a6eb-4f2b-82ad-98e9b910c18e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4865a751b50e42dea8c767d317b639ee", "name": "tempest-HypervisorMaxv252RbacTest-1839273528", "password_expires_at": null}, "audit_ids": ["_cotWL6cQd6QaKtqkotJbg"], "expires_at": "2020-11-06T18:59:01.000000Z", "issued_at": "2020-11-06T17:59:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a0907040e5734b09b2dfe9314064b904", "name": "tempest-HypervisorMaxv252RbacTest-1839273528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a0907040e5734b09b2dfe9314064b904", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a0907040e5734b09b2dfe9314064b904", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a0907040e5734b09b2dfe9314064b904", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a0907040e5734b09b2dfe9314064b904", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a0907040e5734b09b2dfe9314064b904", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a0907040e5734b09b2dfe9314064b904", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:01.330 38 INFO tempest.lib.common.rest_client [req-694bdcb2-e455-4f21-95ad-78f4f37ab8c6 ] Request (HypervisorRbacTest:test_list_hypervisors): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 17:59:01.331 38 DEBUG tempest.lib.common.rest_client [req-694bdcb2-e455-4f21-95ad-78f4f37ab8c6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-694bdcb2-e455-4f21-95ad-78f4f37ab8c6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0f9d52f1d8944e59abc2ba18ba743717", "name": "tempest-HypervisorRbacTest-198680886", "password_expires_at": null}, "audit_ids": ["DrR8_zEdS5GB94QKf3gfgA"], "expires_at": "2020-11-06T18:59:01.000000Z", "issued_at": "2020-11-06T17:59:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e2b28ebe598a46feba79544044f0aa60", "name": "tempest-HypervisorRbacTest-198680886"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:01.334 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:01.334 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.335 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.335 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.336 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.336 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.336 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.337 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.337 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.338 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.338 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.338 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.339 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.339 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.339 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.340 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.340 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.340 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.340 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.341 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.341 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.342 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.342 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.342 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.343 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.343 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.343 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.343 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.344 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.344 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.344 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.345 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.345 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.345 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.346 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.346 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.346 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.347 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.347 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.347 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.348 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.348 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.348 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.349 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.349 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.349 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.350 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.350 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.350 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.350 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.351 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.351 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.351 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.352 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.352 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.352 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.353 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.353 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.353 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.353 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.354 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.354 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.355 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.355 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.355 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.356 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.356 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.356 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.357 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.357 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.357 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.357 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.358 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.358 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.358 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.359 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.360 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-hypervisors:list-detail, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:01.360 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:01.414 38 INFO tempest.lib.common.rest_client [req-8ed8713c-c630-4b80-8853-ee4c29e45dd4 ] Request (HypervisorRbacTest:test_list_hypervisors_with_details): 200 GET http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles 0.053s 2020-11-06 17:59:01.415 38 DEBUG tempest.lib.common.rest_client [req-8ed8713c-c630-4b80-8853-ee4c29e45dd4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8ed8713c-c630-4b80-8853-ee4c29e45dd4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:01.419 40 INFO tempest.lib.common.rest_client [req-5ec4b3aa-ecea-4477-9b8f-6bcedab8cacd ] Request (QuotaClassesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/2c659c60-298f-4c95-a952-1ceffef2315c 0.114s 2020-11-06 17:59:01.420 40 DEBUG tempest.lib.common.rest_client [req-5ec4b3aa-ecea-4477-9b8f-6bcedab8cacd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-5ec4b3aa-ecea-4477-9b8f-6bcedab8cacd', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 17:59:01 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/2c659c60-298f-4c95-a952-1ceffef2315c'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:01.450 38 INFO tempest.lib.common.rest_client [req-ae29fb31-59fa-4a24-a71a-267075852e64 ] Request (HypervisorRbacTest:test_list_hypervisors_with_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 17:59:01.450 38 DEBUG tempest.lib.common.rest_client [req-ae29fb31-59fa-4a24-a71a-267075852e64 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ae29fb31-59fa-4a24-a71a-267075852e64', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0f9d52f1d8944e59abc2ba18ba743717", "name": "tempest-HypervisorRbacTest-198680886", "password_expires_at": null}, "audit_ids": ["vE7myy7GSPudGvw_JMTHSQ"], "expires_at": "2020-11-06T18:59:01.000000Z", "issued_at": "2020-11-06T17:59:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e2b28ebe598a46feba79544044f0aa60", "name": "tempest-HypervisorRbacTest-198680886"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:01.453 39 INFO tempest.lib.common.rest_client [req-905c3480-4030-430b-bcd1-9ef85121e1f7 ] Request (HypervisorMaxv252RbacTest:test_list_servers_on_hypervisor): 200 GET http://172.30.13.94/compute/v2.1/os-hypervisors/lf-virtual9/servers 0.144s 2020-11-06 17:59:01.453 39 DEBUG tempest.lib.common.rest_client [req-905c3480-4030-430b-bcd1-9ef85121e1f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '102', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-905c3480-4030-430b-bcd1-9ef85121e1f7', 'x-compute-request-id': 'req-905c3480-4030-430b-bcd1-9ef85121e1f7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hypervisors/lf-virtual9/servers'} Body: b'{"hypervisors": [{"id": 1, "hypervisor_hostname": "lf-virtual9", "state": "up", "status": "enabled"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:01.456 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:01.483 37 INFO tempest.lib.common.rest_client [req-2c99818f-56b3-468d-8436-dca27ac32ca7 ] Request (SecurityGroupsRbacMaxV235Test:test_delete_security_groups): 200 POST http://172.30.13.94/compute/v2.1/os-security-groups 0.297s 2020-11-06 17:59:01.483 37 DEBUG tempest.lib.common.rest_client [req-2c99818f-56b3-468d-8436-dca27ac32ca7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group": {"name": "tempest-SecurityGroupsRbacMaxV235Test-securitygroup-17046567", "description": "tempest-description-1492963738"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '249', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2c99818f-56b3-468d-8436-dca27ac32ca7', 'x-compute-request-id': 'req-2c99818f-56b3-468d-8436-dca27ac32ca7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-security-groups'} Body: b'{"security_group": {"id": "ea637dd6-2d22-4945-ac6b-175b286a5b3e", "description": "tempest-description-1492963738", "name": "tempest-SecurityGroupsRbacMaxV235Test-securitygroup-17046567", "tenant_id": "c371fd7e9e8b429ba2cde7387ed618ac", "rules": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:01.491 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:01.509 39 INFO tempest.lib.common.rest_client [req-42742c36-3e11-46ed-86f7-d710675b32b8 ] Request (HypervisorMaxv252RbacTest:test_list_servers_on_hypervisor): 200 GET http://172.30.13.94/identity/v3/projects/a0907040e5734b09b2dfe9314064b904/users/4865a751b50e42dea8c767d317b639ee/roles 0.053s 2020-11-06 17:59:01.510 39 DEBUG tempest.lib.common.rest_client [req-42742c36-3e11-46ed-86f7-d710675b32b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-42742c36-3e11-46ed-86f7-d710675b32b8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a0907040e5734b09b2dfe9314064b904/users/4865a751b50e42dea8c767d317b639ee/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a0907040e5734b09b2dfe9314064b904/users/4865a751b50e42dea8c767d317b639ee/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:01.545 40 INFO tempest.lib.common.rest_client [req-739b3b52-c1f9-49bd-ae64-719298f5fb3b ] Request (QuotaClassesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/5a878a85d5c548ceb8fd3302a8a6990d 0.124s 2020-11-06 17:59:01.545 40 DEBUG tempest.lib.common.rest_client [req-739b3b52-c1f9-49bd-ae64-719298f5fb3b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-739b3b52-c1f9-49bd-ae64-719298f5fb3b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/5a878a85d5c548ceb8fd3302a8a6990d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:01.560 38 INFO tempest.lib.common.rest_client [req-501d7d6e-79d5-4ca7-aa51-ccedccca0b04 ] Request (HypervisorRbacTest:test_list_hypervisors_with_details): 200 GET http://172.30.13.94/compute/v2.1/os-hypervisors/detail 0.109s 2020-11-06 17:59:01.561 38 DEBUG tempest.lib.common.rest_client [req-501d7d6e-79d5-4ca7-aa51-ccedccca0b04 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '3115', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-501d7d6e-79d5-4ca7-aa51-ccedccca0b04', 'x-compute-request-id': 'req-501d7d6e-79d5-4ca7-aa51-ccedccca0b04', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hypervisors/detail'} Body: b'{"hypervisors": [{"id": 1, "hypervisor_hostname": "lf-virtual9", "state": "up", "status": "enabled", "vcpus": 88, "memory_mb": 64312, "local_gb": 100, "vcpus_used": 0, "memory_mb_used": 512, "local_gb_used": 0, "hypervisor_type": "QEMU", "hypervisor_version": 4000000, "free_ram_mb": 63800, "free_disk_gb": 100, "current_workload": 0, "running_vms": 0, "disk_available_least": 60, "host_ip": "172.30.13.94", "service": {"id": 2, "host": "lf-virtual9", "disabled_reason": null}, "cpu_info": "{\\"arch\\": \\"x86_64\\", \\"model\\": \\"Broadwell-IBRS\\", \\"vendor\\": \\"Intel\\", \\"topology\\": {\\"cells\\": 2, \\"sockets\\": 1, \\"cores\\": 22, \\"threads\\": 2}, \\"features\\": [\\"fxsr\\", \\"syscall\\", \\"hle\\", \\"aes\\", \\"cx16\\", \\"avx2\\", \\"cmov\\", \\"smap\\", \\"pse\\", \\"ssse3\\", \\"xsave\\", \\"f16c\\", \\"rdrand\\", \\"vmx\\", \\"smx\\", \\"apic\\", \\"bmi2\\", \\"tsc_adjust\\", \\"rdtscp\\", \\"osxsave\\", \\"mca\\", \\"vme\\", \\"rdseed\\", \\"monitor\\", \\"spec-ctrl\\", \\"dtes64\\", \\"erms\\", \\"rtm\\", \\"invpcid\\", \\"popcnt\\", \\"pat\\", \\"x2apic\\", \\"pae\\", \\"ssbd\\", \\"arat\\", \\"ss\\", \\"tsc-deadline\\", \\"ds_cpl\\", \\"bmi1\\", \\"pcid\\", \\"pdpe1gb\\", \\"invtsc\\", \\"cx8\\", \\"dca\\", \\"smep\\", \\"mce\\", \\"ht\\", \\"fsgsbase\\", \\"intel-pt\\", \\"fma\\", \\"md-clear\\", \\"pge\\", \\"adx\\", \\"est\\", \\"lm\\", \\"abm\\", \\"lahf_lm\\", \\"acpi\\", \\"sse2\\", \\"tm2\\", \\"pni\\", \\"ds\\", \\"clflush\\", \\"xtpr\\", \\"msr\\", \\"sep\\", \\"pdcm\\", \\"tm\\", \\"nx\\", \\"sse4.1\\", \\"xsaveopt\\", \\"de\\", \\"tsc\\", \\"stibp\\", \\"3dnowprefetch\\", \\"sse4.2\\", \\"avx\\", \\"pbe\\", \\"pse36\\", \\"mmx\\", \\"pclmuldq\\", \\"mtrr\\", \\"movbe\\", \\"sse\\", \\"fpu\\"]}"}, {"id": 2, "hypervisor_hostname": "lf-virtual8", "state": "up", "status": "enabled", "vcpus": 88, "memory_mb": 64312, "local_gb": 100, "vcpus_used": 3, "memory_mb_used": 2048, "local_gb_used": 3, "hypervisor_type": "QEMU", "hypervisor_version": 4000000, "free_ram_mb": 62264, "free_disk_gb": 97, "current_workload": 0, "running_vms": 3, "disk_available_least": 60, "host_ip": "172.30.13.93", "service": {"id": 3, "host": "lf-virtual8", "disabled_reason": null}, "cpu_info": "{\\"arch\\": \\"x86_64\\", \\"model\\": \\"Broadwell-IBRS\\", \\"vendor\\": \\"Intel\\", \\"topology\\": {\\"cells\\": 2, \\"sockets\\": 1, \\"cores\\": 22, \\"threads\\": 2}, \\"features\\": [\\"f16c\\", \\"xsave\\", \\"pclmuldq\\", \\"rdtscp\\", \\"ds_cpl\\", \\"pdcm\\", \\"lm\\", \\"sse\\", \\"erms\\", \\"3dnowprefetch\\", \\"pdpe1gb\\", \\"adx\\", \\"apic\\", \\"ssse3\\", \\"bmi1\\", \\"stibp\\", \\"invpcid\\", \\"mmx\\", \\"avx2\\", \\"intel-pt\\", \\"pse36\\", \\"rdrand\\", \\"vmx\\", \\"pcid\\", \\"cx8\\", \\"est\\", \\"tsc-deadline\\", \\"cx16\\", \\"vme\\", \\"pni\\", \\"acpi\\", \\"pse\\", \\"x2apic\\", \\"dtes64\\", \\"de\\", \\"rtm\\", \\"smep\\", \\"mce\\", \\"ssbd\\", \\"xtpr\\", \\"monitor\\", \\"tsc\\", \\"xsaveopt\\", \\"movbe\\", \\"spec-ctrl\\", \\"osxsave\\", \\"ht\\", \\"tm\\", \\"arat\\", \\"abm\\", \\"smx\\", \\"fxsr\\", \\"pbe\\", \\"clflush\\", \\"ds\\", \\"md-clear\\", \\"ss\\", \\"sse4.1\\", \\"invtsc\\", \\"popcnt\\", \\"sse2\\", \\"sse4.2\\", \\"fpu\\", \\"fsgsbase\\", \\"smap\\", \\"pae\\", \\"aes\\", \\"avx\\", \\"tsc_adjust\\", \\"pge\\", \\"nx\\", \\"rdseed\\", \\"lahf_lm\\", \\"cmov\\", \\"fma\\", \\"msr\\", \\"tm2\\", \\"bmi2\\", \\"mtrr\\", \\"dca\\", \\"mca\\", \\"hle\\", \\"pat\\", \\"sep\\", \\"syscall\\"]}"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:01.571 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:01.588 37 INFO tempest.lib.common.rest_client [req-e9e472be-2063-41af-ae77-0aab2a4be061 ] Request (SecurityGroupsRbacMaxV235Test:test_delete_security_groups): 200 GET http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles 0.096s 2020-11-06 17:59:01.588 37 DEBUG tempest.lib.common.rest_client [req-e9e472be-2063-41af-ae77-0aab2a4be061 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e9e472be-2063-41af-ae77-0aab2a4be061', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:01.596 39 INFO tempest.lib.common.rest_client [req-75c58ed6-c2a7-4e5a-8dab-c9a526d230ad ] Request (HypervisorMaxv252RbacTest:test_list_servers_on_hypervisor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 17:59:01.597 39 DEBUG tempest.lib.common.rest_client [req-75c58ed6-c2a7-4e5a-8dab-c9a526d230ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-75c58ed6-c2a7-4e5a-8dab-c9a526d230ad', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4865a751b50e42dea8c767d317b639ee", "name": "tempest-HypervisorMaxv252RbacTest-1839273528", "password_expires_at": null}, "audit_ids": ["P-7TcNGKSxyj2tqjkuEGIw"], "expires_at": "2020-11-06T18:59:01.000000Z", "issued_at": "2020-11-06T17:59:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a0907040e5734b09b2dfe9314064b904", "name": "tempest-HypervisorMaxv252RbacTest-1839273528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a0907040e5734b09b2dfe9314064b904", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a0907040e5734b09b2dfe9314064b904", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a0907040e5734b09b2dfe9314064b904", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a0907040e5734b09b2dfe9314064b904", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a0907040e5734b09b2dfe9314064b904", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a0907040e5734b09b2dfe9314064b904", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:01.600 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:01.601 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.601 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.601 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.602 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.602 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.602 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.603 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.603 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.603 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.604 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.604 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.604 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.604 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.605 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.605 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.605 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.606 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.606 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.606 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.606 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.607 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.607 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.608 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.608 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.608 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.609 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.609 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.609 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.610 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.610 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.610 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.611 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.611 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.611 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.611 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.612 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.612 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.612 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.613 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.613 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.613 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.613 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.614 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.614 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.615 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.615 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.615 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.616 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.616 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.616 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.617 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.617 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.617 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.617 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.618 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.618 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.618 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.619 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.619 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.619 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.620 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.620 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.620 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.620 38 INFO tempest.lib.common.rest_client [req-8010c0e5-04a3-454d-8f29-bf47e5128496 ] Request (HypervisorRbacTest:test_list_hypervisors_with_details): 200 GET http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles 0.048s 2020-11-06 17:59:01.621 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.621 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.621 38 DEBUG tempest.lib.common.rest_client [req-8010c0e5-04a3-454d-8f29-bf47e5128496 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8010c0e5-04a3-454d-8f29-bf47e5128496', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:01.621 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.621 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.622 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.622 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.622 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.623 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.623 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.623 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.623 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.624 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.625 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-hypervisors:search, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:01.625 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:01.659 40 INFO tempest.lib.common.rest_client [req-f7cd088b-8742-4a3c-9cbf-2f738ec944fb ] Request (QuotaClassesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/32dc4245abce49ebabe3ee880ae45d0a 0.113s 2020-11-06 17:59:01.659 40 DEBUG tempest.lib.common.rest_client [req-f7cd088b-8742-4a3c-9cbf-2f738ec944fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f7cd088b-8742-4a3c-9cbf-2f738ec944fb', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/32dc4245abce49ebabe3ee880ae45d0a'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:01.678 39 INFO tempest.lib.common.rest_client [req-2d3cf182-0f67-42aa-893b-6d12a620176c ] Request (HypervisorMaxv252RbacTest:test_search_hypervisor): 200 GET http://172.30.13.94/identity/v3/projects/a0907040e5734b09b2dfe9314064b904/users/4865a751b50e42dea8c767d317b639ee/roles 0.052s 2020-11-06 17:59:01.678 39 DEBUG tempest.lib.common.rest_client [req-2d3cf182-0f67-42aa-893b-6d12a620176c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2d3cf182-0f67-42aa-893b-6d12a620176c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a0907040e5734b09b2dfe9314064b904/users/4865a751b50e42dea8c767d317b639ee/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a0907040e5734b09b2dfe9314064b904/users/4865a751b50e42dea8c767d317b639ee/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:01.698 38 INFO tempest.lib.common.rest_client [req-a8413fa9-8c8a-4b17-a28e-987e4cba211f ] Request (HypervisorRbacTest:test_list_hypervisors_with_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.076s 2020-11-06 17:59:01.698 38 DEBUG tempest.lib.common.rest_client [req-a8413fa9-8c8a-4b17-a28e-987e4cba211f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a8413fa9-8c8a-4b17-a28e-987e4cba211f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0f9d52f1d8944e59abc2ba18ba743717", "name": "tempest-HypervisorRbacTest-198680886", "password_expires_at": null}, "audit_ids": ["zIqcpG5TQH6ildaV2j9mLw"], "expires_at": "2020-11-06T18:59:01.000000Z", "issued_at": "2020-11-06T17:59:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e2b28ebe598a46feba79544044f0aa60", "name": "tempest-HypervisorRbacTest-198680886"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:01.702 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:01.703 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.703 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.704 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.704 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.704 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.705 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.705 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.705 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.706 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.706 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.706 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.707 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.707 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.707 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.707 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.708 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.708 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.708 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.709 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.709 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.709 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.710 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.710 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.710 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.710 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.711 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.711 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.711 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.711 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.712 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.712 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.712 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.713 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.713 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.713 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.713 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.714 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.714 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.714 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.715 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.715 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.715 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.715 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.716 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.716 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.716 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.717 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.717 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.717 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.718 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.718 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.718 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.718 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.719 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.719 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.719 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.719 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.720 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.720 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.720 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.721 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.722 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.722 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.722 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.722 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.723 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.723 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.723 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.724 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.724 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.724 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.724 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.725 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.725 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.725 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:01.726 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-hypervisors:show, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:01.727 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:01.735 37 INFO tempest.lib.common.rest_client [req-40737a5f-0642-43f1-864d-75f3691065ce ] Request (SecurityGroupsRbacMaxV235Test:test_delete_security_groups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.145s 2020-11-06 17:59:01.735 37 DEBUG tempest.lib.common.rest_client [req-40737a5f-0642-43f1-864d-75f3691065ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-40737a5f-0642-43f1-864d-75f3691065ce', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d466f0c3f71946b7b235d860e4117827", "name": "tempest-SecurityGroupsRbacMaxV235Test-286729549", "password_expires_at": null}, "audit_ids": ["37c6G2ZKSjG_wqLHyRGiYg"], "expires_at": "2020-11-06T18:59:01.000000Z", "issued_at": "2020-11-06T17:59:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c371fd7e9e8b429ba2cde7387ed618ac", "name": "tempest-SecurityGroupsRbacMaxV235Test-286729549"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:01.773 39 INFO tempest.lib.common.rest_client [req-e3eb7645-0d77-41c4-8a87-202cd58af88f ] Request (HypervisorMaxv252RbacTest:test_search_hypervisor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-11-06 17:59:01.774 39 DEBUG tempest.lib.common.rest_client [req-e3eb7645-0d77-41c4-8a87-202cd58af88f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e3eb7645-0d77-41c4-8a87-202cd58af88f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4865a751b50e42dea8c767d317b639ee", "name": "tempest-HypervisorMaxv252RbacTest-1839273528", "password_expires_at": null}, "audit_ids": ["N7jrw1HnRM-SoUatzt31bA"], "expires_at": "2020-11-06T18:59:01.000000Z", "issued_at": "2020-11-06T17:59:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a0907040e5734b09b2dfe9314064b904", "name": "tempest-HypervisorMaxv252RbacTest-1839273528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a0907040e5734b09b2dfe9314064b904", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a0907040e5734b09b2dfe9314064b904", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a0907040e5734b09b2dfe9314064b904", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a0907040e5734b09b2dfe9314064b904", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a0907040e5734b09b2dfe9314064b904", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a0907040e5734b09b2dfe9314064b904", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:01.790 40 INFO tempest.lib.common.rest_client [req-384553d2-48f8-4c39-81f0-c2b1388dd16c ] Request (QuotaClassesRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=2b6e7876e599475bbd7551d55b98dfbe&name=default 0.130s 2020-11-06 17:59:01.791 40 DEBUG tempest.lib.common.rest_client [req-384553d2-48f8-4c39-81f0-c2b1388dd16c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-384553d2-48f8-4c39-81f0-c2b1388dd16c', 'date': 'Fri, 06 Nov 2020 17:59:01 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=2b6e7876e599475bbd7551d55b98dfbe&name=default'} Body: b'{"security_groups": [{"id": "2571f00b-238d-4f3e-a38e-7f8ff8518426", "name": "default", "stateful": true, "tenant_id": "2b6e7876e599475bbd7551d55b98dfbe", "description": "Default security group", "security_group_rules": [{"id": "4516c774-bb24-4a60-be9f-0aeb17727cf7", "tenant_id": "2b6e7876e599475bbd7551d55b98dfbe", "security_group_id": "2571f00b-238d-4f3e-a38e-7f8ff8518426", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:59:01Z", "updated_at": "2020-11-06T17:59:01Z", "revision_number": 0, "project_id": "2b6e7876e599475bbd7551d55b98dfbe"}, {"id": "7d060ac3-acec-45df-bff0-0f4fcbedd46b", "tenant_id": "2b6e7876e599475bbd7551d55b98dfbe", "security_group_id": "2571f00b-238d-4f3e-a38e-7f8ff8518426", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "2571f00b-238d-4f3e-a38e-7f8ff8518426", "description": null, "tags": [], "created_at": "2020-11-06T17:59:01Z", "updated_at": "2020-11-06T17:59:01Z", "revision_number": 0, "project_id": "2b6e7876e599475bbd7551d55b98dfbe"}, {"id": "b4fe26a5-d8c6-4912-8c61-4ac7863fa511", "tenant_id": "2b6e7876e599475bbd7551d55b98dfbe", "security_group_id": "2571f00b-238d-4f3e-a38e-7f8ff8518426", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "2571f00b-238d-4f3e-a38e-7f8ff8518426", "description": null, "tags": [], "created_at": "2020-11-06T17:59:01Z", "updated_at": "2020-11-06T17:59:01Z", "revision_number": 0, "project_id": "2b6e7876e599475bbd7551d55b98dfbe"}, {"id": "bfbee630-d36e-4b66-9a67-28b05b31f67f", "tenant_id": "2b6e7876e599475bbd7551d55b98dfbe", "security_group_id": "2571f00b-238d-4f3e-a38e-7f8ff8518426", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:59:01Z", "updated_at": "2020-11-06T17:59:01Z", "revision_number": 0, "project_id": "2b6e7876e599475bbd7551d55b98dfbe"}], "tags": [], "created_at": "2020-11-06T17:59:01Z", "updated_at": "2020-11-06T17:59:01Z", "revision_number": 1, "project_id": "2b6e7876e599475bbd7551d55b98dfbe"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:01.845 38 INFO tempest.lib.common.rest_client [req-63ff00dc-5245-4a47-b18c-8aba27c5fb82 ] Request (HypervisorRbacTest:test_show_hypervisor): 200 GET http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles 0.117s 2020-11-06 17:59:01.845 38 DEBUG tempest.lib.common.rest_client [req-63ff00dc-5245-4a47-b18c-8aba27c5fb82 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-63ff00dc-5245-4a47-b18c-8aba27c5fb82', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:01.938 38 INFO tempest.lib.common.rest_client [req-aa25ef00-356b-4557-97c7-ee93c0a80a19 ] Request (HypervisorRbacTest:test_show_hypervisor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-11-06 17:59:01.938 38 DEBUG tempest.lib.common.rest_client [req-aa25ef00-356b-4557-97c7-ee93c0a80a19 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aa25ef00-356b-4557-97c7-ee93c0a80a19', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0f9d52f1d8944e59abc2ba18ba743717", "name": "tempest-HypervisorRbacTest-198680886", "password_expires_at": null}, "audit_ids": ["2jzGC87kQMmhKjLv5JUGPw"], "expires_at": "2020-11-06T18:59:01.000000Z", "issued_at": "2020-11-06T17:59:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e2b28ebe598a46feba79544044f0aa60", "name": "tempest-HypervisorRbacTest-198680886"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:01.957 40 INFO tempest.lib.common.rest_client [req-e79f54e6-f96d-4f8c-8532-ff4bdf7016e1 ] Request (QuotaClassesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/2571f00b-238d-4f3e-a38e-7f8ff8518426 0.165s 2020-11-06 17:59:01.958 40 DEBUG tempest.lib.common.rest_client [req-e79f54e6-f96d-4f8c-8532-ff4bdf7016e1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-e79f54e6-f96d-4f8c-8532-ff4bdf7016e1', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 17:59:01 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/2571f00b-238d-4f3e-a38e-7f8ff8518426'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:01.999 39 INFO tempest.lib.common.rest_client [req-99c61fe1-1798-4a2d-afd5-c093d8ca5313 ] Request (HypervisorMaxv252RbacTest:test_search_hypervisor): 200 GET http://172.30.13.94/compute/v2.1/os-hypervisors/lf-virtual9/search 0.224s 2020-11-06 17:59:02.000 39 DEBUG tempest.lib.common.rest_client [req-99c61fe1-1798-4a2d-afd5-c093d8ca5313 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '102', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-99c61fe1-1798-4a2d-afd5-c093d8ca5313', 'x-compute-request-id': 'req-99c61fe1-1798-4a2d-afd5-c093d8ca5313', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hypervisors/lf-virtual9/search'} Body: b'{"hypervisors": [{"id": 1, "hypervisor_hostname": "lf-virtual9", "state": "up", "status": "enabled"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:02.004 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:02.040 38 INFO tempest.lib.common.rest_client [req-f68fadf9-4c8b-418a-9363-e9845b515425 ] Request (HypervisorRbacTest:test_show_hypervisor): 200 GET http://172.30.13.94/compute/v2.1/os-hypervisors/1 0.100s 2020-11-06 17:59:02.040 38 DEBUG tempest.lib.common.rest_client [req-f68fadf9-4c8b-418a-9363-e9845b515425 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1563', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f68fadf9-4c8b-418a-9363-e9845b515425', 'x-compute-request-id': 'req-f68fadf9-4c8b-418a-9363-e9845b515425', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hypervisors/1'} Body: b'{"hypervisor": {"id": 1, "hypervisor_hostname": "lf-virtual9", "state": "up", "status": "enabled", "vcpus": 88, "memory_mb": 64312, "local_gb": 100, "vcpus_used": 0, "memory_mb_used": 512, "local_gb_used": 0, "hypervisor_type": "QEMU", "hypervisor_version": 4000000, "free_ram_mb": 63800, "free_disk_gb": 100, "current_workload": 0, "running_vms": 0, "disk_available_least": 60, "host_ip": "172.30.13.94", "service": {"id": 2, "host": "lf-virtual9", "disabled_reason": null}, "cpu_info": "{\\"arch\\": \\"x86_64\\", \\"model\\": \\"Broadwell-IBRS\\", \\"vendor\\": \\"Intel\\", \\"topology\\": {\\"cells\\": 2, \\"sockets\\": 1, \\"cores\\": 22, \\"threads\\": 2}, \\"features\\": [\\"fxsr\\", \\"syscall\\", \\"hle\\", \\"aes\\", \\"cx16\\", \\"avx2\\", \\"cmov\\", \\"smap\\", \\"pse\\", \\"ssse3\\", \\"xsave\\", \\"f16c\\", \\"rdrand\\", \\"vmx\\", \\"smx\\", \\"apic\\", \\"bmi2\\", \\"tsc_adjust\\", \\"rdtscp\\", \\"osxsave\\", \\"mca\\", \\"vme\\", \\"rdseed\\", \\"monitor\\", \\"spec-ctrl\\", \\"dtes64\\", \\"erms\\", \\"rtm\\", \\"invpcid\\", \\"popcnt\\", \\"pat\\", \\"x2apic\\", \\"pae\\", \\"ssbd\\", \\"arat\\", \\"ss\\", \\"tsc-deadline\\", \\"ds_cpl\\", \\"bmi1\\", \\"pcid\\", \\"pdpe1gb\\", \\"invtsc\\", \\"cx8\\", \\"dca\\", \\"smep\\", \\"mce\\", \\"ht\\", \\"fsgsbase\\", \\"intel-pt\\", \\"fma\\", \\"md-clear\\", \\"pge\\", \\"adx\\", \\"est\\", \\"lm\\", \\"abm\\", \\"lahf_lm\\", \\"acpi\\", \\"sse2\\", \\"tm2\\", \\"pni\\", \\"ds\\", \\"clflush\\", \\"xtpr\\", \\"msr\\", \\"sep\\", \\"pdcm\\", \\"tm\\", \\"nx\\", \\"sse4.1\\", \\"xsaveopt\\", \\"de\\", \\"tsc\\", \\"stibp\\", \\"3dnowprefetch\\", \\"sse4.2\\", \\"avx\\", \\"pbe\\", \\"pse36\\", \\"mmx\\", \\"pclmuldq\\", \\"mtrr\\", \\"movbe\\", \\"sse\\", \\"fpu\\"]}"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:02.045 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:02.059 39 INFO tempest.lib.common.rest_client [req-9111285f-cd5a-42de-a392-a86aaec09643 ] Request (HypervisorMaxv252RbacTest:test_search_hypervisor): 200 GET http://172.30.13.94/identity/v3/projects/a0907040e5734b09b2dfe9314064b904/users/4865a751b50e42dea8c767d317b639ee/roles 0.054s 2020-11-06 17:59:02.059 39 DEBUG tempest.lib.common.rest_client [req-9111285f-cd5a-42de-a392-a86aaec09643 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9111285f-cd5a-42de-a392-a86aaec09643', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a0907040e5734b09b2dfe9314064b904/users/4865a751b50e42dea8c767d317b639ee/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a0907040e5734b09b2dfe9314064b904/users/4865a751b50e42dea8c767d317b639ee/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:02.075 40 INFO tempest.lib.common.rest_client [req-f7cb1745-7390-485d-b796-d8f1e4deb4d2 ] Request (QuotaClassesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/2b6e7876e599475bbd7551d55b98dfbe 0.117s 2020-11-06 17:59:02.076 40 DEBUG tempest.lib.common.rest_client [req-f7cb1745-7390-485d-b796-d8f1e4deb4d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f7cb1745-7390-485d-b796-d8f1e4deb4d2', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/2b6e7876e599475bbd7551d55b98dfbe'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:02.149 38 INFO tempest.lib.common.rest_client [req-61d723d4-18a6-4236-af81-33fca4f32dca ] Request (HypervisorRbacTest:test_show_hypervisor): 200 GET http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles 0.103s 2020-11-06 17:59:02.150 38 DEBUG tempest.lib.common.rest_client [req-61d723d4-18a6-4236-af81-33fca4f32dca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-61d723d4-18a6-4236-af81-33fca4f32dca', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:02.154 39 INFO tempest.lib.common.rest_client [req-11633fc8-5bc5-4d1e-bc7a-c93cedbcc3d2 ] Request (HypervisorMaxv252RbacTest:test_search_hypervisor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-11-06 17:59:02.155 39 DEBUG tempest.lib.common.rest_client [req-11633fc8-5bc5-4d1e-bc7a-c93cedbcc3d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-11633fc8-5bc5-4d1e-bc7a-c93cedbcc3d2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4865a751b50e42dea8c767d317b639ee", "name": "tempest-HypervisorMaxv252RbacTest-1839273528", "password_expires_at": null}, "audit_ids": ["JZg4wvswQbmlmFtXEDJ6kA"], "expires_at": "2020-11-06T18:59:02.000000Z", "issued_at": "2020-11-06T17:59:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a0907040e5734b09b2dfe9314064b904", "name": "tempest-HypervisorMaxv252RbacTest-1839273528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a0907040e5734b09b2dfe9314064b904", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a0907040e5734b09b2dfe9314064b904", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a0907040e5734b09b2dfe9314064b904", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a0907040e5734b09b2dfe9314064b904", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a0907040e5734b09b2dfe9314064b904", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a0907040e5734b09b2dfe9314064b904", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:02.173 40 INFO tempest.lib.common.rest_client [req-044b8102-f4a3-4f3f-9057-058f289f8f05 ] Request (ServerConsolesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-11-06 17:59:02.173 40 DEBUG tempest.lib.common.rest_client [req-044b8102-f4a3-4f3f-9057-058f289f8f05 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-044b8102-f4a3-4f3f-9057-058f289f8f05', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["Umj4DkDWRPWPZL_eUTw6rw"], "expires_at": "2020-11-06T18:59:02.000000Z", "issued_at": "2020-11-06T17:59:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:02.192 37 INFO tempest.lib.common.rest_client [req-d891409d-9281-40ca-b993-3204007bc2d7 ] Request (SecurityGroupsRbacMaxV235Test:test_delete_security_groups): 202 DELETE http://172.30.13.94/compute/v2.1/os-security-groups/ea637dd6-2d22-4945-ac6b-175b286a5b3e 0.455s 2020-11-06 17:59:02.193 37 DEBUG tempest.lib.common.rest_client [req-d891409d-9281-40ca-b993-3204007bc2d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d891409d-9281-40ca-b993-3204007bc2d7', 'x-compute-request-id': 'req-d891409d-9281-40ca-b993-3204007bc2d7', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/os-security-groups/ea637dd6-2d22-4945-ac6b-175b286a5b3e'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:02.193 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:02.220 40 INFO tempest.lib.common.rest_client [req-2533dbcc-d916-407e-9baa-5eb5537366ed ] Request (ServerConsolesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 17:59:02.221 40 DEBUG tempest.lib.common.rest_client [req-2533dbcc-d916-407e-9baa-5eb5537366ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2533dbcc-d916-407e-9baa-5eb5537366ed', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["Rc_oAeKaSMKOxSGIn-qOVA"], "expires_at": "2020-11-06T18:59:02.000000Z", "issued_at": "2020-11-06T17:59:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:02.234 38 INFO tempest.lib.common.rest_client [req-29250b5a-127b-4bf4-a914-67e8f3d92bbd ] Request (HypervisorRbacTest:test_show_hypervisor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 17:59:02.235 38 DEBUG tempest.lib.common.rest_client [req-29250b5a-127b-4bf4-a914-67e8f3d92bbd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-29250b5a-127b-4bf4-a914-67e8f3d92bbd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0f9d52f1d8944e59abc2ba18ba743717", "name": "tempest-HypervisorRbacTest-198680886", "password_expires_at": null}, "audit_ids": ["q8Ah-lOnStyolfwORgJnIA"], "expires_at": "2020-11-06T18:59:02.000000Z", "issued_at": "2020-11-06T17:59:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e2b28ebe598a46feba79544044f0aa60", "name": "tempest-HypervisorRbacTest-198680886"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:02.240 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:02.240 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.241 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.241 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.242 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.242 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.242 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.243 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.243 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.243 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.244 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.244 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.244 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.244 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.245 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.245 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.245 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.246 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.246 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.246 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.247 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.247 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.247 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.247 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.248 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.248 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.248 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.249 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.249 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.249 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.249 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.250 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.250 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.250 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.251 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.251 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.251 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.251 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.252 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.252 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.252 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.253 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.253 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.253 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.254 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.254 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.254 37 INFO tempest.lib.common.rest_client [req-69dd1974-dd7d-4240-84f2-72a2892683e8 ] Request (SecurityGroupsRbacMaxV235Test:test_delete_security_groups): 200 GET http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles 0.059s 2020-11-06 17:59:02.254 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.254 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.254 37 DEBUG tempest.lib.common.rest_client [req-69dd1974-dd7d-4240-84f2-72a2892683e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-69dd1974-dd7d-4240-84f2-72a2892683e8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:02.255 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.255 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.255 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.256 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.256 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.256 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.256 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.257 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.257 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.257 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.257 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.258 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.258 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.259 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.259 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.259 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.260 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.260 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.260 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.260 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.261 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.261 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.261 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.262 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.262 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.262 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.262 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.263 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.264 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-hypervisors:statistics, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:02.264 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:02.274 40 INFO tempest.lib.common.rest_client [req-0e15c78d-4d9e-4014-a2ae-66df8633f5ae ] Request (ServerConsolesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.052s 2020-11-06 17:59:02.275 40 DEBUG tempest.lib.common.rest_client [req-0e15c78d-4d9e-4014-a2ae-66df8633f5ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0e15c78d-4d9e-4014-a2ae-66df8633f5ae', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:02.296 39 INFO tempest.lib.common.rest_client [req-9a75d03e-6ad0-413c-a436-08dbb4173ad5 ] Request (HypervisorMaxv252RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/4865a751b50e42dea8c767d317b639ee 0.137s 2020-11-06 17:59:02.297 39 DEBUG tempest.lib.common.rest_client [req-9a75d03e-6ad0-413c-a436-08dbb4173ad5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9a75d03e-6ad0-413c-a436-08dbb4173ad5', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/4865a751b50e42dea8c767d317b639ee'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:02.326 38 INFO tempest.lib.common.rest_client [req-76064f2d-ad99-42e1-af53-1c03a0f2270a ] Request (HypervisorRbacTest:test_show_hypervisor_statistics): 200 GET http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles 0.061s 2020-11-06 17:59:02.327 38 DEBUG tempest.lib.common.rest_client [req-76064f2d-ad99-42e1-af53-1c03a0f2270a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-76064f2d-ad99-42e1-af53-1c03a0f2270a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:02.333 40 INFO tempest.lib.common.rest_client [req-b03b29f7-484e-4933-9354-b9e835effd93 ] Request (ServerConsolesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.058s 2020-11-06 17:59:02.334 40 DEBUG tempest.lib.common.rest_client [req-b03b29f7-484e-4933-9354-b9e835effd93 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ServerConsolesRbacTest-101764086-desc", "domain_id": "default", "name": "tempest-ServerConsolesRbacTest-101764086"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '380', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b03b29f7-484e-4933-9354-b9e835effd93', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "0cd9895a4bd84f8a859ddbcbf39a0d72", "name": "tempest-ServerConsolesRbacTest-101764086", "domain_id": "default", "description": "tempest-ServerConsolesRbacTest-101764086-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/0cd9895a4bd84f8a859ddbcbf39a0d72"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:02.340 37 INFO tempest.lib.common.rest_client [req-64fa452d-568e-44b6-bd0b-2013dd047888 ] Request (SecurityGroupsRbacMaxV235Test:test_delete_security_groups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 17:59:02.341 37 DEBUG tempest.lib.common.rest_client [req-64fa452d-568e-44b6-bd0b-2013dd047888 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-64fa452d-568e-44b6-bd0b-2013dd047888', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d466f0c3f71946b7b235d860e4117827", "name": "tempest-SecurityGroupsRbacMaxV235Test-286729549", "password_expires_at": null}, "audit_ids": ["OwzXkFlAToi-B_PIuUbPdA"], "expires_at": "2020-11-06T18:59:02.000000Z", "issued_at": "2020-11-06T17:59:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c371fd7e9e8b429ba2cde7387ed618ac", "name": "tempest-SecurityGroupsRbacMaxV235Test-286729549"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:02.346 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:02.347 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.348 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.348 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.349 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.350 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.350 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.351 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.352 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.352 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.353 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.353 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.354 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.354 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.354 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.354 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.355 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.355 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.355 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.356 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.356 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.356 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.357 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.357 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.357 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.357 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.358 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.358 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.358 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.359 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.359 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.359 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.359 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.360 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.360 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.360 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.360 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.361 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.361 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.361 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.362 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.362 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.362 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.363 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.363 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.363 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.363 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.364 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.364 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.364 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.365 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.365 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.365 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.365 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.366 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.366 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.366 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.367 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.367 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.367 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.367 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.368 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.368 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.369 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.369 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.369 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.370 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.370 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.370 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.370 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.371 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.371 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.371 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.372 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.372 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.372 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.373 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-security-groups:get, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:02.374 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:02.380 39 INFO tempest.lib.common.rest_client [req-36430a5c-600c-4501-afb1-250b06385f37 ] Request (HypervisorMaxv252RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 17:59:02.381 39 DEBUG tempest.lib.common.rest_client [req-36430a5c-600c-4501-afb1-250b06385f37 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-36430a5c-600c-4501-afb1-250b06385f37', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["__S3-Us-RvOKtlOY5_eh-Q"], "expires_at": "2020-11-06T18:59:02.000000Z", "issued_at": "2020-11-06T17:59:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:02.409 38 INFO tempest.lib.common.rest_client [req-0a0a901c-070b-4b63-a30c-404c9b9929d0 ] Request (HypervisorRbacTest:test_show_hypervisor_statistics): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-11-06 17:59:02.410 38 DEBUG tempest.lib.common.rest_client [req-0a0a901c-070b-4b63-a30c-404c9b9929d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0a0a901c-070b-4b63-a30c-404c9b9929d0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0f9d52f1d8944e59abc2ba18ba743717", "name": "tempest-HypervisorRbacTest-198680886", "password_expires_at": null}, "audit_ids": ["mhbgZwEVTiOjkHIP7Kao0g"], "expires_at": "2020-11-06T18:59:02.000000Z", "issued_at": "2020-11-06T17:59:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e2b28ebe598a46feba79544044f0aa60", "name": "tempest-HypervisorRbacTest-198680886"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:02.464 40 INFO tempest.lib.common.rest_client [req-1e66336b-de33-41db-8de2-853998889d5c ] Request (ServerConsolesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.128s 2020-11-06 17:59:02.464 40 DEBUG tempest.lib.common.rest_client [req-1e66336b-de33-41db-8de2-853998889d5c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ServerConsolesRbacTest-101764086", "password": "X6&~^9x2JwXDCW1", "project_id": "0cd9895a4bd84f8a859ddbcbf39a0d72", "email": "tempest-ServerConsolesRbacTest-129373409@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '398', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1e66336b-de33-41db-8de2-853998889d5c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "0cd9895a4bd84f8a859ddbcbf39a0d72", "email": "tempest-ServerConsolesRbacTest-129373409@example.com", "id": "d83a612e30aa42b18d464c0b2cbd4044", "name": "tempest-ServerConsolesRbacTest-101764086", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/d83a612e30aa42b18d464c0b2cbd4044"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:02.487 37 INFO tempest.lib.common.rest_client [req-5d723681-ecf5-4d40-8667-2a9cd10ed78f ] Request (SecurityGroupsRbacMaxV235Test:test_list_security_groups): 200 GET http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles 0.113s 2020-11-06 17:59:02.488 37 DEBUG tempest.lib.common.rest_client [req-5d723681-ecf5-4d40-8667-2a9cd10ed78f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5d723681-ecf5-4d40-8667-2a9cd10ed78f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:02.519 40 INFO tempest.lib.common.rest_client [req-f53c771a-15ff-4898-ab40-193a2388b34e ] Request (ServerConsolesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.054s 2020-11-06 17:59:02.520 40 DEBUG tempest.lib.common.rest_client [req-f53c771a-15ff-4898-ab40-193a2388b34e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f53c771a-15ff-4898-ab40-193a2388b34e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:02.569 38 INFO tempest.lib.common.rest_client [req-f768a98e-eccf-46c9-9ff4-81d1594249ba ] Request (HypervisorRbacTest:test_show_hypervisor_statistics): 200 GET http://172.30.13.94/compute/v2.1/os-hypervisors/statistics 0.157s 2020-11-06 17:59:02.569 38 DEBUG tempest.lib.common.rest_client [req-f768a98e-eccf-46c9-9ff4-81d1594249ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '266', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f768a98e-eccf-46c9-9ff4-81d1594249ba', 'x-compute-request-id': 'req-f768a98e-eccf-46c9-9ff4-81d1594249ba', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hypervisors/statistics'} Body: b'{"hypervisor_statistics": {"count": 2, "vcpus": 176, "memory_mb": 128624, "local_gb": 200, "vcpus_used": 3, "memory_mb_used": 2560, "local_gb_used": 3, "free_ram_mb": 126064, "free_disk_gb": 197, "current_workload": 0, "running_vms": 3, "disk_available_least": 120}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:02.571 40 INFO tempest.lib.common.rest_client [req-ce08e71e-0f5b-4717-b3c3-8669c6f45148 ] Request (ServerConsolesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.050s 2020-11-06 17:59:02.572 40 DEBUG tempest.lib.common.rest_client [req-ce08e71e-0f5b-4717-b3c3-8669c6f45148 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ce08e71e-0f5b-4717-b3c3-8669c6f45148', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:02.574 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:02.575 37 INFO tempest.lib.common.rest_client [req-84708a41-c1c6-42ad-b9b5-1b5ed9579563 ] Request (SecurityGroupsRbacMaxV235Test:test_list_security_groups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-11-06 17:59:02.576 37 DEBUG tempest.lib.common.rest_client [req-84708a41-c1c6-42ad-b9b5-1b5ed9579563 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-84708a41-c1c6-42ad-b9b5-1b5ed9579563', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d466f0c3f71946b7b235d860e4117827", "name": "tempest-SecurityGroupsRbacMaxV235Test-286729549", "password_expires_at": null}, "audit_ids": ["mEnZ4wy1Th2c_qCsOot8pg"], "expires_at": "2020-11-06T18:59:02.000000Z", "issued_at": "2020-11-06T17:59:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c371fd7e9e8b429ba2cde7387ed618ac", "name": "tempest-SecurityGroupsRbacMaxV235Test-286729549"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:02.631 38 INFO tempest.lib.common.rest_client [req-cb9b7417-41c0-4640-af97-f09d2f06c89b ] Request (HypervisorRbacTest:test_show_hypervisor_statistics): 200 GET http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles 0.056s 2020-11-06 17:59:02.631 38 DEBUG tempest.lib.common.rest_client [req-cb9b7417-41c0-4640-af97-f09d2f06c89b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cb9b7417-41c0-4640-af97-f09d2f06c89b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:02.644 40 INFO tempest.lib.common.rest_client [req-c073287b-33a1-4076-aa2b-58fc30c78032 ] Request (ServerConsolesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/0cd9895a4bd84f8a859ddbcbf39a0d72/users/d83a612e30aa42b18d464c0b2cbd4044/roles/72a4576c553448cd941b052c1ca0cf2d 0.071s 2020-11-06 17:59:02.645 40 DEBUG tempest.lib.common.rest_client [req-c073287b-33a1-4076-aa2b-58fc30c78032 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c073287b-33a1-4076-aa2b-58fc30c78032', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/0cd9895a4bd84f8a859ddbcbf39a0d72/users/d83a612e30aa42b18d464c0b2cbd4044/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:02.646 40 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerConsolesRbacTest-101764086', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '0cd9895a4bd84f8a859ddbcbf39a0d72', 'project_name': 'tempest-ServerConsolesRbacTest-101764086', 'tenant_id': '0cd9895a4bd84f8a859ddbcbf39a0d72', 'tenant_name': 'tempest-ServerConsolesRbacTest-101764086', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'd83a612e30aa42b18d464c0b2cbd4044'}, Network: None, Subnet: None, Router: None 2020-11-06 17:59:02.707 39 INFO tempest.lib.common.rest_client [req-12785115-0b8e-4281-9d0d-dcadea4a1074 ] Request (HypervisorMaxv252RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=a0907040e5734b09b2dfe9314064b904&name=default 0.325s 2020-11-06 17:59:02.708 39 DEBUG tempest.lib.common.rest_client [req-12785115-0b8e-4281-9d0d-dcadea4a1074 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-12785115-0b8e-4281-9d0d-dcadea4a1074', 'date': 'Fri, 06 Nov 2020 17:59:02 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=a0907040e5734b09b2dfe9314064b904&name=default'} Body: b'{"security_groups": [{"id": "15cda4c1-5e9b-47e5-b038-66135c861ba6", "name": "default", "stateful": true, "tenant_id": "a0907040e5734b09b2dfe9314064b904", "description": "Default security group", "security_group_rules": [{"id": "235cfb9f-7243-4578-9c60-783c38d61b61", "tenant_id": "a0907040e5734b09b2dfe9314064b904", "security_group_id": "15cda4c1-5e9b-47e5-b038-66135c861ba6", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "15cda4c1-5e9b-47e5-b038-66135c861ba6", "description": null, "tags": [], "created_at": "2020-11-06T17:59:02Z", "updated_at": "2020-11-06T17:59:02Z", "revision_number": 0, "project_id": "a0907040e5734b09b2dfe9314064b904"}, {"id": "7d26d046-f076-4f51-9cd4-ad91d82b3acb", "tenant_id": "a0907040e5734b09b2dfe9314064b904", "security_group_id": "15cda4c1-5e9b-47e5-b038-66135c861ba6", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:59:02Z", "updated_at": "2020-11-06T17:59:02Z", "revision_number": 0, "project_id": "a0907040e5734b09b2dfe9314064b904"}, {"id": "f1e73964-6e2d-46a7-9674-a0808bd40257", "tenant_id": "a0907040e5734b09b2dfe9314064b904", "security_group_id": "15cda4c1-5e9b-47e5-b038-66135c861ba6", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "15cda4c1-5e9b-47e5-b038-66135c861ba6", "description": null, "tags": [], "created_at": "2020-11-06T17:59:02Z", "updated_at": "2020-11-06T17:59:02Z", "revision_number": 0, "project_id": "a0907040e5734b09b2dfe9314064b904"}, {"id": "f5c0804b-c7c5-4aac-bbe8-8545bf419eb4", "tenant_id": "a0907040e5734b09b2dfe9314064b904", "security_group_id": "15cda4c1-5e9b-47e5-b038-66135c861ba6", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:59:02Z", "updated_at": "2020-11-06T17:59:02Z", "revision_number": 0, "project_id": "a0907040e5734b09b2dfe9314064b904"}], "tags": [], "created_at": "2020-11-06T17:59:02Z", "updated_at": "2020-11-06T17:59:02Z", "revision_number": 1, "project_id": "a0907040e5734b09b2dfe9314064b904"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:02.725 38 INFO tempest.lib.common.rest_client [req-26eb70d0-1b5f-4009-98f4-2131916cc9a5 ] Request (HypervisorRbacTest:test_show_hypervisor_statistics): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-11-06 17:59:02.726 38 DEBUG tempest.lib.common.rest_client [req-26eb70d0-1b5f-4009-98f4-2131916cc9a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-26eb70d0-1b5f-4009-98f4-2131916cc9a5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0f9d52f1d8944e59abc2ba18ba743717", "name": "tempest-HypervisorRbacTest-198680886", "password_expires_at": null}, "audit_ids": ["NlAlOmzXT2azaBQNxVG-1Q"], "expires_at": "2020-11-06T18:59:02.000000Z", "issued_at": "2020-11-06T17:59:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e2b28ebe598a46feba79544044f0aa60", "name": "tempest-HypervisorRbacTest-198680886"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:02.730 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:02.730 40 INFO tempest.lib.common.rest_client [req-5947efae-168b-47fe-bf34-1fe6676ec449 ] Request (ServerConsolesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 17:59:02.731 40 DEBUG tempest.lib.common.rest_client [req-5947efae-168b-47fe-bf34-1fe6676ec449 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5947efae-168b-47fe-bf34-1fe6676ec449', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["z3LoZGbORumqZWthvBR1TQ"], "expires_at": "2020-11-06T18:59:02.000000Z", "issued_at": "2020-11-06T17:59:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:02.731 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.731 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.732 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.732 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.733 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.734 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.735 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.735 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.736 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.736 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.737 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.738 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.739 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.739 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.740 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.740 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.741 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.741 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.742 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.743 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.743 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.744 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.744 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.744 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.745 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.745 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.745 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.746 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.746 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.746 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.746 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.747 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.747 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.747 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.748 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.748 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.748 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.748 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.749 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.749 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.749 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.750 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.750 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.750 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.751 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.751 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.751 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.751 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.752 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.752 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.752 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.752 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.753 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.753 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.753 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.754 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.755 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.755 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.755 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.756 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.756 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.756 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.757 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.757 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.757 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.758 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.758 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.759 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.759 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.760 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.760 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.760 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.761 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.761 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.761 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:02.762 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-hypervisors:uptime, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:02.763 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:02.819 38 INFO tempest.lib.common.rest_client [req-f70355a8-0eed-4dad-8d6e-3c0a8dc3f397 ] Request (HypervisorRbacTest:test_show_hypervisor_uptime): 200 GET http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles 0.055s 2020-11-06 17:59:02.819 38 DEBUG tempest.lib.common.rest_client [req-f70355a8-0eed-4dad-8d6e-3c0a8dc3f397 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f70355a8-0eed-4dad-8d6e-3c0a8dc3f397', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:02.851 37 INFO tempest.lib.common.rest_client [req-5431b2a5-017c-4876-ad53-322d36bb1780 ] Request (SecurityGroupsRbacMaxV235Test:test_list_security_groups): 200 GET http://172.30.13.94/compute/v2.1/os-security-groups 0.273s 2020-11-06 17:59:02.851 37 DEBUG tempest.lib.common.rest_client [req-5431b2a5-017c-4876-ad53-322d36bb1780 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '938', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5431b2a5-017c-4876-ad53-322d36bb1780', 'x-compute-request-id': 'req-5431b2a5-017c-4876-ad53-322d36bb1780', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-security-groups'} Body: b'{"security_groups": [{"id": "449cfdc2-f285-4825-8a5f-eed747238829", "description": "Default security group", "name": "default", "tenant_id": "c371fd7e9e8b429ba2cde7387ed618ac", "rules": [{"id": "ee95ba05-e993-47d4-b797-95ef7c369e88", "parent_group_id": "449cfdc2-f285-4825-8a5f-eed747238829", "ip_protocol": null, "from_port": null, "to_port": null, "group": {"name": "default", "tenant_id": "c371fd7e9e8b429ba2cde7387ed618ac"}, "ip_range": {}}, {"id": "fa875ebc-a123-4128-a68e-08e158e28f54", "parent_group_id": "449cfdc2-f285-4825-8a5f-eed747238829", "ip_protocol": null, "from_port": null, "to_port": null, "group": {"name": "default", "tenant_id": "c371fd7e9e8b429ba2cde7387ed618ac"}, "ip_range": {}}]}, {"id": "2bf1ef9e-1b60-4aea-85d6-a32520c48ec8", "description": "tempest-description-1713540570", "name": "tempest-SecurityGroupsRbacMaxV235Test-securitygroup-73542661", "tenant_id": "c371fd7e9e8b429ba2cde7387ed618ac", "rules": []}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:02.855 38 INFO tempest.lib.common.rest_client [req-10cb63c0-66a0-4ae1-a945-cb86801c4885 ] Request (HypervisorRbacTest:test_show_hypervisor_uptime): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 17:59:02.856 38 DEBUG tempest.lib.common.rest_client [req-10cb63c0-66a0-4ae1-a945-cb86801c4885 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-10cb63c0-66a0-4ae1-a945-cb86801c4885', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0f9d52f1d8944e59abc2ba18ba743717", "name": "tempest-HypervisorRbacTest-198680886", "password_expires_at": null}, "audit_ids": ["b80TJNW1Tj-Ls-rdJfwjcg"], "expires_at": "2020-11-06T18:59:02.000000Z", "issued_at": "2020-11-06T17:59:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e2b28ebe598a46feba79544044f0aa60", "name": "tempest-HypervisorRbacTest-198680886"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:02.858 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:02.890 39 INFO tempest.lib.common.rest_client [req-2556ed4f-359d-4ffe-bf3d-387c30307248 ] Request (HypervisorMaxv252RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/15cda4c1-5e9b-47e5-b038-66135c861ba6 0.181s 2020-11-06 17:59:02.891 39 DEBUG tempest.lib.common.rest_client [req-2556ed4f-359d-4ffe-bf3d-387c30307248 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-2556ed4f-359d-4ffe-bf3d-387c30307248', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 17:59:02 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/15cda4c1-5e9b-47e5-b038-66135c861ba6'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:02.910 37 INFO tempest.lib.common.rest_client [req-2afbd3fa-ac8a-48d4-b622-ca042bfffc64 ] Request (SecurityGroupsRbacMaxV235Test:test_list_security_groups): 200 GET http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles 0.050s 2020-11-06 17:59:02.910 37 DEBUG tempest.lib.common.rest_client [req-2afbd3fa-ac8a-48d4-b622-ca042bfffc64 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2afbd3fa-ac8a-48d4-b622-ca042bfffc64', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:03.024 39 INFO tempest.lib.common.rest_client [req-a3c5bf37-0677-472a-879f-78ceb7ee8ff8 ] Request (HypervisorMaxv252RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/a0907040e5734b09b2dfe9314064b904 0.131s 2020-11-06 17:59:03.024 39 DEBUG tempest.lib.common.rest_client [req-a3c5bf37-0677-472a-879f-78ceb7ee8ff8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a3c5bf37-0677-472a-879f-78ceb7ee8ff8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a0907040e5734b09b2dfe9314064b904'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:03.086 38 INFO tempest.lib.common.rest_client [req-a5626425-4ed4-4c9c-9066-f6868ae679bf ] Request (HypervisorRbacTest:test_show_hypervisor_uptime): 200 GET http://172.30.13.94/compute/v2.1/os-hypervisors/1/uptime 0.228s 2020-11-06 17:59:03.086 38 DEBUG tempest.lib.common.rest_client [req-a5626425-4ed4-4c9c-9066-f6868ae679bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '184', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a5626425-4ed4-4c9c-9066-f6868ae679bf', 'x-compute-request-id': 'req-a5626425-4ed4-4c9c-9066-f6868ae679bf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hypervisors/1/uptime'} Body: b'{"hypervisor": {"id": 1, "hypervisor_hostname": "lf-virtual9", "state": "up", "status": "enabled", "uptime": " 09:59:03 up 30 days, 21:33, 1 user, load average: 7.82, 7.26, 7.70\\n"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:03.090 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:03.100 37 INFO tempest.lib.common.rest_client [req-25ecb745-2d87-4fb7-8d67-262f9247f6c5 ] Request (SecurityGroupsRbacMaxV235Test:test_list_security_groups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.188s 2020-11-06 17:59:03.101 37 DEBUG tempest.lib.common.rest_client [req-25ecb745-2d87-4fb7-8d67-262f9247f6c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-25ecb745-2d87-4fb7-8d67-262f9247f6c5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d466f0c3f71946b7b235d860e4117827", "name": "tempest-SecurityGroupsRbacMaxV235Test-286729549", "password_expires_at": null}, "audit_ids": ["CdKzJhLHTOa7HtnuHJfMzg"], "expires_at": "2020-11-06T18:59:02.000000Z", "issued_at": "2020-11-06T17:59:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c371fd7e9e8b429ba2cde7387ed618ac", "name": "tempest-SecurityGroupsRbacMaxV235Test-286729549"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:03.106 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:03.107 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.107 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.108 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.108 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.109 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.110 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.110 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.111 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.111 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.112 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.112 39 INFO tempest.lib.common.rest_client [req-5fba9311-18cd-4252-bf7e-30b8083cf964 ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-11-06 17:59:03.112 39 DEBUG tempest.lib.common.rest_client [req-5fba9311-18cd-4252-bf7e-30b8083cf964 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5fba9311-18cd-4252-bf7e-30b8083cf964', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["6nigw-PmSHeGMub2ypU2dg"], "expires_at": "2020-11-06T18:59:03.000000Z", "issued_at": "2020-11-06T17:59:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:03.112 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.113 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.113 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.113 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.114 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.114 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.114 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.115 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.115 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.115 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.115 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.116 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.116 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.116 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.117 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.117 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.117 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.117 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.118 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.118 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.118 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.119 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.119 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.119 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.119 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.120 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.120 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.120 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.121 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.121 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.121 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.122 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.122 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.122 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.123 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.123 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.124 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.124 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.125 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.125 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.125 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.126 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.126 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.127 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.127 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.127 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.128 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.128 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.128 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.129 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.129 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.129 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.130 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.130 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.130 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.131 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.131 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.131 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.132 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.132 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.132 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.132 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.133 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.133 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.133 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:03.135 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-security-groups:show, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:03.152 38 INFO tempest.lib.common.rest_client [req-8b5a45e7-4454-4a7a-b95d-7402a01b5b9f ] Request (HypervisorRbacTest:test_show_hypervisor_uptime): 200 GET http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles 0.060s 2020-11-06 17:59:03.152 38 DEBUG tempest.lib.common.rest_client [req-8b5a45e7-4454-4a7a-b95d-7402a01b5b9f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8b5a45e7-4454-4a7a-b95d-7402a01b5b9f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60/users/0f9d52f1d8944e59abc2ba18ba743717/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:03.157 39 INFO tempest.lib.common.rest_client [req-91b00776-e3dc-4206-8bd5-1038048fedd1 ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 17:59:03.158 39 DEBUG tempest.lib.common.rest_client [req-91b00776-e3dc-4206-8bd5-1038048fedd1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-91b00776-e3dc-4206-8bd5-1038048fedd1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["090dRtBTRueNdRlOoq6s8A"], "expires_at": "2020-11-06T18:59:03.000000Z", "issued_at": "2020-11-06T17:59:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:03.205 39 INFO tempest.lib.common.rest_client [req-d36cd345-96b9-4871-9ed3-16f365dea135 ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.045s 2020-11-06 17:59:03.205 39 DEBUG tempest.lib.common.rest_client [req-d36cd345-96b9-4871-9ed3-16f365dea135 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d36cd345-96b9-4871-9ed3-16f365dea135', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:03.214 40 INFO tempest.lib.common.rest_client [req-d333ccae-79c8-4a15-bdbf-11a2776856a2 ] Request (ServerConsolesRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.482s 2020-11-06 17:59:03.214 40 DEBUG tempest.lib.common.rest_client [req-d333ccae-79c8-4a15-bdbf-11a2776856a2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-ServerConsolesRbacTest-1753510296-network", "tenant_id": "0cd9895a4bd84f8a859ddbcbf39a0d72"}} Response - Headers: {'content-type': 'application/json', 'content-length': '738', 'x-openstack-request-id': 'req-d333ccae-79c8-4a15-bdbf-11a2776856a2', 'date': 'Fri, 06 Nov 2020 17:59:03 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"bb0f3cc3-8583-431c-af3d-9b99d0b951fd","name":"tempest-ServerConsolesRbacTest-1753510296-network","tenant_id":"0cd9895a4bd84f8a859ddbcbf39a0d72","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"0cd9895a4bd84f8a859ddbcbf39a0d72","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":49,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T17:59:03Z","updated_at":"2020-11-06T17:59:03Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:03.236 38 INFO tempest.lib.common.rest_client [req-1090df60-a5f6-405f-a95a-7efce9909124 ] Request (HypervisorRbacTest:test_show_hypervisor_uptime): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 17:59:03.237 38 DEBUG tempest.lib.common.rest_client [req-1090df60-a5f6-405f-a95a-7efce9909124 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1090df60-a5f6-405f-a95a-7efce9909124', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0f9d52f1d8944e59abc2ba18ba743717", "name": "tempest-HypervisorRbacTest-198680886", "password_expires_at": null}, "audit_ids": ["bwVhB0t5TtePaIqpp2CPTg"], "expires_at": "2020-11-06T18:59:03.000000Z", "issued_at": "2020-11-06T17:59:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e2b28ebe598a46feba79544044f0aa60", "name": "tempest-HypervisorRbacTest-198680886"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e2b28ebe598a46feba79544044f0aa60", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:03.268 39 INFO tempest.lib.common.rest_client [req-b9f23386-a4a8-404d-8a36-f0b9e8c1e2f2 ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.062s 2020-11-06 17:59:03.269 39 DEBUG tempest.lib.common.rest_client [req-b9f23386-a4a8-404d-8a36-f0b9e8c1e2f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-InstanceUsagesAuditLogRbacTest-1697263994-desc", "domain_id": "default", "name": "tempest-InstanceUsagesAuditLogRbacTest-1697263994"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '398', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b9f23386-a4a8-404d-8a36-f0b9e8c1e2f2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "f5101f43b3fd460dbc59fcc07f9b955d", "name": "tempest-InstanceUsagesAuditLogRbacTest-1697263994", "domain_id": "default", "description": "tempest-InstanceUsagesAuditLogRbacTest-1697263994-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/f5101f43b3fd460dbc59fcc07f9b955d"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:03.376 38 INFO tempest.lib.common.rest_client [req-5b1f3479-c4f3-4c58-adb7-e5f87b9ffb91 ] Request (HypervisorRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/0f9d52f1d8944e59abc2ba18ba743717 0.135s 2020-11-06 17:59:03.376 38 DEBUG tempest.lib.common.rest_client [req-5b1f3479-c4f3-4c58-adb7-e5f87b9ffb91 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5b1f3479-c4f3-4c58-adb7-e5f87b9ffb91', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/0f9d52f1d8944e59abc2ba18ba743717'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:03.393 39 INFO tempest.lib.common.rest_client [req-34bbd45c-fbc2-40a4-af01-65ce0f0352c8 ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.124s 2020-11-06 17:59:03.394 39 DEBUG tempest.lib.common.rest_client [req-34bbd45c-fbc2-40a4-af01-65ce0f0352c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-InstanceUsagesAuditLogRbacTest-1697263994", "password": "H0^Gkl4QxX~!E~J", "project_id": "f5101f43b3fd460dbc59fcc07f9b955d", "email": "tempest-InstanceUsagesAuditLogRbacTest-977204105@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '415', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-34bbd45c-fbc2-40a4-af01-65ce0f0352c8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "f5101f43b3fd460dbc59fcc07f9b955d", "email": "tempest-InstanceUsagesAuditLogRbacTest-977204105@example.com", "id": "93089830fe874163be502d2170187468", "name": "tempest-InstanceUsagesAuditLogRbacTest-1697263994", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/93089830fe874163be502d2170187468"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:03.463 38 INFO tempest.lib.common.rest_client [req-791ca777-230a-42ee-a406-2d61664a1e5a ] Request (HypervisorRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-11-06 17:59:03.464 38 DEBUG tempest.lib.common.rest_client [req-791ca777-230a-42ee-a406-2d61664a1e5a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-791ca777-230a-42ee-a406-2d61664a1e5a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["IaTuPF1BRcaEIcmZ5ToM9A"], "expires_at": "2020-11-06T18:59:03.000000Z", "issued_at": "2020-11-06T17:59:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:03.498 39 INFO tempest.lib.common.rest_client [req-46507537-64be-4159-942a-3391c0ebba68 ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.103s 2020-11-06 17:59:03.498 39 DEBUG tempest.lib.common.rest_client [req-46507537-64be-4159-942a-3391c0ebba68 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-46507537-64be-4159-942a-3391c0ebba68', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:03.558 39 INFO tempest.lib.common.rest_client [req-aa79f77b-a209-42a2-8833-82c9b90a7a44 ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.058s 2020-11-06 17:59:03.558 39 DEBUG tempest.lib.common.rest_client [req-aa79f77b-a209-42a2-8833-82c9b90a7a44 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aa79f77b-a209-42a2-8833-82c9b90a7a44', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:03.604 37 INFO tempest.lib.common.rest_client [req-a3f92134-ade0-404e-9d53-5869d8fd0999 ] Request (SecurityGroupsRbacMaxV235Test:test_show_security_groups): 200 POST http://172.30.13.94/compute/v2.1/os-security-groups 0.469s 2020-11-06 17:59:03.605 37 DEBUG tempest.lib.common.rest_client [req-a3f92134-ade0-404e-9d53-5869d8fd0999 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group": {"name": "tempest-SecurityGroupsRbacMaxV235Test-securitygroup-1059973926", "description": "tempest-description-1627305668"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '251', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a3f92134-ade0-404e-9d53-5869d8fd0999', 'x-compute-request-id': 'req-a3f92134-ade0-404e-9d53-5869d8fd0999', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-security-groups'} Body: b'{"security_group": {"id": "8fcda28c-2fdf-4d70-87b6-216f27917830", "description": "tempest-description-1627305668", "name": "tempest-SecurityGroupsRbacMaxV235Test-securitygroup-1059973926", "tenant_id": "c371fd7e9e8b429ba2cde7387ed618ac", "rules": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:03.612 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:03.625 39 INFO tempest.lib.common.rest_client [req-a46473da-9953-40d8-997d-9f8291a63f6a ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/f5101f43b3fd460dbc59fcc07f9b955d/users/93089830fe874163be502d2170187468/roles/72a4576c553448cd941b052c1ca0cf2d 0.066s 2020-11-06 17:59:03.625 39 DEBUG tempest.lib.common.rest_client [req-a46473da-9953-40d8-997d-9f8291a63f6a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a46473da-9953-40d8-997d-9f8291a63f6a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/f5101f43b3fd460dbc59fcc07f9b955d/users/93089830fe874163be502d2170187468/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:03.626 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-InstanceUsagesAuditLogRbacTest-1697263994', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'f5101f43b3fd460dbc59fcc07f9b955d', 'project_name': 'tempest-InstanceUsagesAuditLogRbacTest-1697263994', 'tenant_id': 'f5101f43b3fd460dbc59fcc07f9b955d', 'tenant_name': 'tempest-InstanceUsagesAuditLogRbacTest-1697263994', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '93089830fe874163be502d2170187468'}, Network: None, Subnet: None, Router: None 2020-11-06 17:59:03.626 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-InstanceUsagesAuditLogRbacTest-1697263994', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'f5101f43b3fd460dbc59fcc07f9b955d', 'project_name': 'tempest-InstanceUsagesAuditLogRbacTest-1697263994', 'tenant_id': 'f5101f43b3fd460dbc59fcc07f9b955d', 'tenant_name': 'tempest-InstanceUsagesAuditLogRbacTest-1697263994', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '93089830fe874163be502d2170187468'}, Network: None, Subnet: None, Router: None 2020-11-06 17:59:03.730 37 INFO tempest.lib.common.rest_client [req-df537304-3ce4-4cd1-86b6-ef7edcd5ba6c ] Request (SecurityGroupsRbacMaxV235Test:test_show_security_groups): 200 GET http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles 0.116s 2020-11-06 17:59:03.730 37 DEBUG tempest.lib.common.rest_client [req-df537304-3ce4-4cd1-86b6-ef7edcd5ba6c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-df537304-3ce4-4cd1-86b6-ef7edcd5ba6c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:03.731 39 INFO tempest.lib.common.rest_client [req-d22844f0-5fdf-4a1c-911f-dc6164a4f825 ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-11-06 17:59:03.731 39 DEBUG tempest.lib.common.rest_client [req-d22844f0-5fdf-4a1c-911f-dc6164a4f825 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6591', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d22844f0-5fdf-4a1c-911f-dc6164a4f825', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "93089830fe874163be502d2170187468", "name": "tempest-InstanceUsagesAuditLogRbacTest-1697263994", "password_expires_at": null}, "audit_ids": ["DbBVByDcStO25ml8WaZacA"], "expires_at": "2020-11-06T18:59:03.000000Z", "issued_at": "2020-11-06T17:59:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f5101f43b3fd460dbc59fcc07f9b955d", "name": "tempest-InstanceUsagesAuditLogRbacTest-1697263994"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f5101f43b3fd460dbc59fcc07f9b955d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f5101f43b3fd460dbc59fcc07f9b955d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f5101f43b3fd460dbc59fcc07f9b955d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f5101f43b3fd460dbc59fcc07f9b955d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f5101f43b3fd460dbc59fcc07f9b955d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f5101f43b3fd460dbc59fcc07f9b955d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:03.768 39 INFO tempest.lib.common.rest_client [req-0aa6e84c-4bfb-4676-beb8-c8948d8523b1 ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 17:59:03.768 39 DEBUG tempest.lib.common.rest_client [req-0aa6e84c-4bfb-4676-beb8-c8948d8523b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0aa6e84c-4bfb-4676-beb8-c8948d8523b1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["_gjB1M6YTG2V1g7HkW0U7A"], "expires_at": "2020-11-06T18:59:03.000000Z", "issued_at": "2020-11-06T17:59:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:03.805 40 INFO tempest.lib.common.rest_client [req-2d995658-ab32-4c29-b1f9-89d217eee1c6 ] Request (ServerConsolesRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.589s 2020-11-06 17:59:03.805 40 DEBUG tempest.lib.common.rest_client [req-2d995658-ab32-4c29-b1f9-89d217eee1c6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "bb0f3cc3-8583-431c-af3d-9b99d0b951fd", "cidr": "192.168.120.0/28", "name": "tempest-ServerConsolesRbacTest-1753510296-subnet", "tenant_id": "0cd9895a4bd84f8a859ddbcbf39a0d72", "enable_dhcp": false, "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '710', 'x-openstack-request-id': 'req-2d995658-ab32-4c29-b1f9-89d217eee1c6', 'date': 'Fri, 06 Nov 2020 17:59:03 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"6b7d443e-3e96-4e22-be53-fcf373c2c13b","name":"tempest-ServerConsolesRbacTest-1753510296-subnet","tenant_id":"0cd9895a4bd84f8a859ddbcbf39a0d72","network_id":"bb0f3cc3-8583-431c-af3d-9b99d0b951fd","ip_version":4,"subnetpool_id":null,"enable_dhcp":false,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-11-06T17:59:03Z","updated_at":"2020-11-06T17:59:03Z","revision_number":0,"project_id":"0cd9895a4bd84f8a859ddbcbf39a0d72"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:03.809 39 INFO tempest.lib.common.rest_client [req-a38f6afe-a7fd-4595-9414-f9c73eda7958 ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.030s 2020-11-06 17:59:03.809 39 DEBUG tempest.lib.common.rest_client [req-a38f6afe-a7fd-4595-9414-f9c73eda7958 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a38f6afe-a7fd-4595-9414-f9c73eda7958', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["YSsqTRFhSo-mRyWtaVo2BA"], "expires_at": "2020-11-06T18:59:03.000000Z", "issued_at": "2020-11-06T17:59:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:03.817 37 INFO tempest.lib.common.rest_client [req-c09fdd2c-e9fc-4799-ad60-f7ed00925a36 ] Request (SecurityGroupsRbacMaxV235Test:test_show_security_groups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-11-06 17:59:03.818 37 DEBUG tempest.lib.common.rest_client [req-c09fdd2c-e9fc-4799-ad60-f7ed00925a36 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c09fdd2c-e9fc-4799-ad60-f7ed00925a36', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d466f0c3f71946b7b235d860e4117827", "name": "tempest-SecurityGroupsRbacMaxV235Test-286729549", "password_expires_at": null}, "audit_ids": ["JpVYW6FpR7-TUO1LOUUWXQ"], "expires_at": "2020-11-06T18:59:03.000000Z", "issued_at": "2020-11-06T17:59:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c371fd7e9e8b429ba2cde7387ed618ac", "name": "tempest-SecurityGroupsRbacMaxV235Test-286729549"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:03.828 38 INFO tempest.lib.common.rest_client [req-ed340af1-c257-4329-9368-54dd257590c2 ] Request (HypervisorRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=e2b28ebe598a46feba79544044f0aa60&name=default 0.363s 2020-11-06 17:59:03.828 38 DEBUG tempest.lib.common.rest_client [req-ed340af1-c257-4329-9368-54dd257590c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-ed340af1-c257-4329-9368-54dd257590c2', 'date': 'Fri, 06 Nov 2020 17:59:03 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=e2b28ebe598a46feba79544044f0aa60&name=default'} Body: b'{"security_groups": [{"id": "9b2c8a3c-9366-4940-b5f9-7705c8359a24", "name": "default", "stateful": true, "tenant_id": "e2b28ebe598a46feba79544044f0aa60", "description": "Default security group", "security_group_rules": [{"id": "6a642383-5f80-49d3-b55f-046dc63d176c", "tenant_id": "e2b28ebe598a46feba79544044f0aa60", "security_group_id": "9b2c8a3c-9366-4940-b5f9-7705c8359a24", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:59:03Z", "updated_at": "2020-11-06T17:59:03Z", "revision_number": 0, "project_id": "e2b28ebe598a46feba79544044f0aa60"}, {"id": "7bd8e889-1ab7-446e-bb74-c1823ad50031", "tenant_id": "e2b28ebe598a46feba79544044f0aa60", "security_group_id": "9b2c8a3c-9366-4940-b5f9-7705c8359a24", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "9b2c8a3c-9366-4940-b5f9-7705c8359a24", "description": null, "tags": [], "created_at": "2020-11-06T17:59:03Z", "updated_at": "2020-11-06T17:59:03Z", "revision_number": 0, "project_id": "e2b28ebe598a46feba79544044f0aa60"}, {"id": "b00e8e0c-161e-478b-85ff-5227f57e1966", "tenant_id": "e2b28ebe598a46feba79544044f0aa60", "security_group_id": "9b2c8a3c-9366-4940-b5f9-7705c8359a24", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "9b2c8a3c-9366-4940-b5f9-7705c8359a24", "description": null, "tags": [], "created_at": "2020-11-06T17:59:03Z", "updated_at": "2020-11-06T17:59:03Z", "revision_number": 0, "project_id": "e2b28ebe598a46feba79544044f0aa60"}, {"id": "e3ecd1c9-0067-4d29-866c-ee9158f9290c", "tenant_id": "e2b28ebe598a46feba79544044f0aa60", "security_group_id": "9b2c8a3c-9366-4940-b5f9-7705c8359a24", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:59:03Z", "updated_at": "2020-11-06T17:59:03Z", "revision_number": 0, "project_id": "e2b28ebe598a46feba79544044f0aa60"}], "tags": [], "created_at": "2020-11-06T17:59:03Z", "updated_at": "2020-11-06T17:59:03Z", "revision_number": 1, "project_id": "e2b28ebe598a46feba79544044f0aa60"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:03.857 39 INFO tempest.lib.common.rest_client [req-7ccb4cf8-1fa5-41ab-834e-df237c23f6fc ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.048s 2020-11-06 17:59:03.858 39 DEBUG tempest.lib.common.rest_client [req-7ccb4cf8-1fa5-41ab-834e-df237c23f6fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7ccb4cf8-1fa5-41ab-834e-df237c23f6fc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:03.906 39 INFO tempest.lib.common.rest_client [req-3cfb9829-35a7-4fd6-8d8f-07bbe242d7a1 ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.047s 2020-11-06 17:59:03.906 39 DEBUG tempest.lib.common.rest_client [req-3cfb9829-35a7-4fd6-8d8f-07bbe242d7a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3cfb9829-35a7-4fd6-8d8f-07bbe242d7a1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:03.907 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 17:59:03.907 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:03.954 39 INFO tempest.lib.common.rest_client [req-de0c815c-421a-4e2a-ba9c-48aab417bba2 ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/f5101f43b3fd460dbc59fcc07f9b955d/users/93089830fe874163be502d2170187468/roles 0.046s 2020-11-06 17:59:03.954 39 DEBUG tempest.lib.common.rest_client [req-de0c815c-421a-4e2a-ba9c-48aab417bba2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-de0c815c-421a-4e2a-ba9c-48aab417bba2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f5101f43b3fd460dbc59fcc07f9b955d/users/93089830fe874163be502d2170187468/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f5101f43b3fd460dbc59fcc07f9b955d/users/93089830fe874163be502d2170187468/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:04.005 39 INFO tempest.lib.common.rest_client [req-834c6aec-2cc0-4795-bb75-dbe5d195f964 ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/f5101f43b3fd460dbc59fcc07f9b955d/users/93089830fe874163be502d2170187468/roles/72a4576c553448cd941b052c1ca0cf2d 0.050s 2020-11-06 17:59:04.005 39 DEBUG tempest.lib.common.rest_client [req-834c6aec-2cc0-4795-bb75-dbe5d195f964 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-834c6aec-2cc0-4795-bb75-dbe5d195f964', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/f5101f43b3fd460dbc59fcc07f9b955d/users/93089830fe874163be502d2170187468/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:04.024 38 INFO tempest.lib.common.rest_client [req-45c78958-906a-45ce-96d8-4a1e5471d921 ] Request (HypervisorRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/9b2c8a3c-9366-4940-b5f9-7705c8359a24 0.195s 2020-11-06 17:59:04.025 38 DEBUG tempest.lib.common.rest_client [req-45c78958-906a-45ce-96d8-4a1e5471d921 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-45c78958-906a-45ce-96d8-4a1e5471d921', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 17:59:04 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/9b2c8a3c-9366-4940-b5f9-7705c8359a24'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:04.043 37 INFO tempest.lib.common.rest_client [req-d983d02c-9428-4481-8976-3a3b0870a502 ] Request (SecurityGroupsRbacMaxV235Test:test_show_security_groups): 200 GET http://172.30.13.94/compute/v2.1/os-security-groups/8fcda28c-2fdf-4d70-87b6-216f27917830 0.224s 2020-11-06 17:59:04.043 37 DEBUG tempest.lib.common.rest_client [req-d983d02c-9428-4481-8976-3a3b0870a502 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '251', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d983d02c-9428-4481-8976-3a3b0870a502', 'x-compute-request-id': 'req-d983d02c-9428-4481-8976-3a3b0870a502', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-security-groups/8fcda28c-2fdf-4d70-87b6-216f27917830'} Body: b'{"security_group": {"id": "8fcda28c-2fdf-4d70-87b6-216f27917830", "description": "tempest-description-1627305668", "name": "tempest-SecurityGroupsRbacMaxV235Test-securitygroup-1059973926", "tenant_id": "c371fd7e9e8b429ba2cde7387ed618ac", "rules": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:04.047 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:04.114 39 INFO tempest.lib.common.rest_client [req-f251a1ba-a2bf-498d-b2f9-51cd7291a1da ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/f5101f43b3fd460dbc59fcc07f9b955d/users/93089830fe874163be502d2170187468/roles/a629c95d64b3416fb80ae90af4f69c05 0.108s 2020-11-06 17:59:04.115 39 DEBUG tempest.lib.common.rest_client [req-f251a1ba-a2bf-498d-b2f9-51cd7291a1da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f251a1ba-a2bf-498d-b2f9-51cd7291a1da', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/f5101f43b3fd460dbc59fcc07f9b955d/users/93089830fe874163be502d2170187468/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:04.156 37 INFO tempest.lib.common.rest_client [req-1a37b4b5-6aa8-4e8b-8c65-de0ddcebf6e8 ] Request (SecurityGroupsRbacMaxV235Test:test_show_security_groups): 200 GET http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles 0.108s 2020-11-06 17:59:04.156 37 DEBUG tempest.lib.common.rest_client [req-1a37b4b5-6aa8-4e8b-8c65-de0ddcebf6e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1a37b4b5-6aa8-4e8b-8c65-de0ddcebf6e8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:04.190 38 INFO tempest.lib.common.rest_client [req-e1fbc265-71e1-4c15-9eda-a46f47a08caa ] Request (HypervisorRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60 0.164s 2020-11-06 17:59:04.190 38 DEBUG tempest.lib.common.rest_client [req-e1fbc265-71e1-4c15-9eda-a46f47a08caa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e1fbc265-71e1-4c15-9eda-a46f47a08caa', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e2b28ebe598a46feba79544044f0aa60'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:04.241 37 INFO tempest.lib.common.rest_client [req-dadc5d45-57bc-4428-b085-e45b9d256e35 ] Request (SecurityGroupsRbacMaxV235Test:test_show_security_groups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-11-06 17:59:04.241 37 DEBUG tempest.lib.common.rest_client [req-dadc5d45-57bc-4428-b085-e45b9d256e35 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dadc5d45-57bc-4428-b085-e45b9d256e35', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d466f0c3f71946b7b235d860e4117827", "name": "tempest-SecurityGroupsRbacMaxV235Test-286729549", "password_expires_at": null}, "audit_ids": ["5OIHDHsuRkyjf4MNzhiGSQ"], "expires_at": "2020-11-06T18:59:04.000000Z", "issued_at": "2020-11-06T17:59:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c371fd7e9e8b429ba2cde7387ed618ac", "name": "tempest-SecurityGroupsRbacMaxV235Test-286729549"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:04.246 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:04.246 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.247 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.247 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.248 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.248 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.248 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.249 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.249 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.249 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.250 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.250 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.250 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.251 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.251 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.251 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.252 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.252 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.252 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.252 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.253 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.253 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.253 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.254 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.254 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.254 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.255 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.255 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.255 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.256 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.256 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.256 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.256 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.257 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.257 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.257 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.258 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.258 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.258 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.258 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.259 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.259 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.259 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.260 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.260 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.260 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.261 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.261 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.261 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.262 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.262 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.262 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.262 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.263 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.263 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.263 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.264 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.264 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.264 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.265 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.265 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.265 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.266 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.266 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.266 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.267 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.267 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.267 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.268 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.268 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.268 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.269 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.269 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.269 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.270 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.270 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:04.271 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-security-groups:update, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:04.288 38 INFO tempest.lib.common.rest_client [req-1aa0e2a1-e096-4a5e-83b2-63928873306e ] Request (ImagesMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-11-06 17:59:04.289 38 DEBUG tempest.lib.common.rest_client [req-1aa0e2a1-e096-4a5e-83b2-63928873306e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1aa0e2a1-e096-4a5e-83b2-63928873306e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["HsJIk4tmRZKkUWbkJnqUHA"], "expires_at": "2020-11-06T18:59:04.000000Z", "issued_at": "2020-11-06T17:59:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:04.331 38 INFO tempest.lib.common.rest_client [req-b8b6a950-5c00-4ae7-96b7-76b8ad0e8b47 ] Request (ImagesMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 17:59:04.332 38 DEBUG tempest.lib.common.rest_client [req-b8b6a950-5c00-4ae7-96b7-76b8ad0e8b47 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b8b6a950-5c00-4ae7-96b7-76b8ad0e8b47', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["vCn1V4O3SC-gpH5VzlQGaA"], "expires_at": "2020-11-06T18:59:04.000000Z", "issued_at": "2020-11-06T17:59:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:04.379 38 INFO tempest.lib.common.rest_client [req-e623ed66-529a-49ad-973f-c1f115c682fa ] Request (ImagesMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.047s 2020-11-06 17:59:04.380 38 DEBUG tempest.lib.common.rest_client [req-e623ed66-529a-49ad-973f-c1f115c682fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e623ed66-529a-49ad-973f-c1f115c682fa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:04.446 38 INFO tempest.lib.common.rest_client [req-a5bd8368-42ab-454f-83f0-d4b24bfed7fa ] Request (ImagesMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.065s 2020-11-06 17:59:04.447 38 DEBUG tempest.lib.common.rest_client [req-a5bd8368-42ab-454f-83f0-d4b24bfed7fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ImagesMetadataRbacTest-1966058629-desc", "domain_id": "default", "name": "tempest-ImagesMetadataRbacTest-1966058629"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '382', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a5bd8368-42ab-454f-83f0-d4b24bfed7fa', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "c6fa733c16f543edbc0ec536de535378", "name": "tempest-ImagesMetadataRbacTest-1966058629", "domain_id": "default", "description": "tempest-ImagesMetadataRbacTest-1966058629-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:04.581 38 INFO tempest.lib.common.rest_client [req-7e175ebe-9af3-48c3-8744-afce5db185f9 ] Request (ImagesMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.134s 2020-11-06 17:59:04.581 38 DEBUG tempest.lib.common.rest_client [req-7e175ebe-9af3-48c3-8744-afce5db185f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ImagesMetadataRbacTest-1966058629", "password": "I1^do%@tV@QZdNk", "project_id": "c6fa733c16f543edbc0ec536de535378", "email": "tempest-ImagesMetadataRbacTest-1291639654@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '400', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7e175ebe-9af3-48c3-8744-afce5db185f9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "c6fa733c16f543edbc0ec536de535378", "email": "tempest-ImagesMetadataRbacTest-1291639654@example.com", "id": "c088001f96a442489a91e768768598d4", "name": "tempest-ImagesMetadataRbacTest-1966058629", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/c088001f96a442489a91e768768598d4"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:04.632 38 INFO tempest.lib.common.rest_client [req-43daea3e-a031-41d5-ae1b-27420aff96a9 ] Request (ImagesMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.050s 2020-11-06 17:59:04.633 38 DEBUG tempest.lib.common.rest_client [req-43daea3e-a031-41d5-ae1b-27420aff96a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-43daea3e-a031-41d5-ae1b-27420aff96a9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:04.674 38 INFO tempest.lib.common.rest_client [req-ac179a6b-a1fa-437f-91be-81b1e7048fd9 ] Request (ImagesMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.041s 2020-11-06 17:59:04.675 38 DEBUG tempest.lib.common.rest_client [req-ac179a6b-a1fa-437f-91be-81b1e7048fd9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ac179a6b-a1fa-437f-91be-81b1e7048fd9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:04.683 37 INFO tempest.lib.common.rest_client [req-fc5fd06a-4347-46ec-93a9-bcab9d42815f ] Request (SecurityGroupsRbacMaxV235Test:test_update_security_groups): 200 POST http://172.30.13.94/compute/v2.1/os-security-groups 0.411s 2020-11-06 17:59:04.683 37 DEBUG tempest.lib.common.rest_client [req-fc5fd06a-4347-46ec-93a9-bcab9d42815f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group": {"name": "tempest-SecurityGroupsRbacMaxV235Test-securitygroup-923932168", "description": "tempest-description-1250175463"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '250', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fc5fd06a-4347-46ec-93a9-bcab9d42815f', 'x-compute-request-id': 'req-fc5fd06a-4347-46ec-93a9-bcab9d42815f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-security-groups'} Body: b'{"security_group": {"id": "a87016dd-ee7b-483a-99c0-f14a01838376", "description": "tempest-description-1250175463", "name": "tempest-SecurityGroupsRbacMaxV235Test-securitygroup-923932168", "tenant_id": "c371fd7e9e8b429ba2cde7387ed618ac", "rules": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:04.691 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:04.742 37 INFO tempest.lib.common.rest_client [req-dda78745-c3c0-4f5f-80ff-db69db9bf753 ] Request (SecurityGroupsRbacMaxV235Test:test_update_security_groups): 200 GET http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles 0.049s 2020-11-06 17:59:04.742 37 DEBUG tempest.lib.common.rest_client [req-dda78745-c3c0-4f5f-80ff-db69db9bf753 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dda78745-c3c0-4f5f-80ff-db69db9bf753', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:04.743 38 INFO tempest.lib.common.rest_client [req-e854d8d3-a1af-4c45-a898-4e60d7ef7257 ] Request (ImagesMetadataRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles/72a4576c553448cd941b052c1ca0cf2d 0.067s 2020-11-06 17:59:04.743 38 DEBUG tempest.lib.common.rest_client [req-e854d8d3-a1af-4c45-a898-4e60d7ef7257 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e854d8d3-a1af-4c45-a898-4e60d7ef7257', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:04.744 38 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImagesMetadataRbacTest-1966058629', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'c6fa733c16f543edbc0ec536de535378', 'project_name': 'tempest-ImagesMetadataRbacTest-1966058629', 'tenant_id': 'c6fa733c16f543edbc0ec536de535378', 'tenant_name': 'tempest-ImagesMetadataRbacTest-1966058629', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'c088001f96a442489a91e768768598d4'}, Network: None, Subnet: None, Router: None 2020-11-06 17:59:04.744 38 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImagesMetadataRbacTest-1966058629', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'c6fa733c16f543edbc0ec536de535378', 'project_name': 'tempest-ImagesMetadataRbacTest-1966058629', 'tenant_id': 'c6fa733c16f543edbc0ec536de535378', 'tenant_name': 'tempest-ImagesMetadataRbacTest-1966058629', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'c088001f96a442489a91e768768598d4'}, Network: None, Subnet: None, Router: None 2020-11-06 17:59:04.829 37 INFO tempest.lib.common.rest_client [req-f1ed8f2c-1440-4bc8-9ebd-1cf71ea546ae ] Request (SecurityGroupsRbacMaxV235Test:test_update_security_groups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-11-06 17:59:04.830 37 DEBUG tempest.lib.common.rest_client [req-f1ed8f2c-1440-4bc8-9ebd-1cf71ea546ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f1ed8f2c-1440-4bc8-9ebd-1cf71ea546ae', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d466f0c3f71946b7b235d860e4117827", "name": "tempest-SecurityGroupsRbacMaxV235Test-286729549", "password_expires_at": null}, "audit_ids": ["BBk24BFCQKq1HaYHQ5pyeA"], "expires_at": "2020-11-06T18:59:04.000000Z", "issued_at": "2020-11-06T17:59:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c371fd7e9e8b429ba2cde7387ed618ac", "name": "tempest-SecurityGroupsRbacMaxV235Test-286729549"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:04.871 38 INFO tempest.lib.common.rest_client [req-d27f12d6-0153-48a5-881f-945bcf10f4e0 ] Request (ImagesMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.116s 2020-11-06 17:59:04.872 38 DEBUG tempest.lib.common.rest_client [req-d27f12d6-0153-48a5-881f-945bcf10f4e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6575', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d27f12d6-0153-48a5-881f-945bcf10f4e0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c088001f96a442489a91e768768598d4", "name": "tempest-ImagesMetadataRbacTest-1966058629", "password_expires_at": null}, "audit_ids": ["xiYSQHIiRqWj6rY2sT4qKA"], "expires_at": "2020-11-06T18:59:04.000000Z", "issued_at": "2020-11-06T17:59:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c6fa733c16f543edbc0ec536de535378", "name": "tempest-ImagesMetadataRbacTest-1966058629"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http:/ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:04.962 38 INFO tempest.lib.common.rest_client [req-dff6ccda-7ba6-4a36-9107-601924a63524 ] Request (ImagesMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-11-06 17:59:04.963 38 DEBUG tempest.lib.common.rest_client [req-dff6ccda-7ba6-4a36-9107-601924a63524 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dff6ccda-7ba6-4a36-9107-601924a63524', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["tsKMJtSJSGGELgQhDhbMlA"], "expires_at": "2020-11-06T18:59:04.000000Z", "issued_at": "2020-11-06T17:59:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:05.008 38 INFO tempest.lib.common.rest_client [req-0d749167-90bd-4586-a75b-e2da07910ca7 ] Request (ImagesMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 17:59:05.008 38 DEBUG tempest.lib.common.rest_client [req-0d749167-90bd-4586-a75b-e2da07910ca7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0d749167-90bd-4586-a75b-e2da07910ca7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["J8_ytQRjSQmgNVbGG2ittQ"], "expires_at": "2020-11-06T18:59:05.000000Z", "issued_at": "2020-11-06T17:59:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:05.059 38 INFO tempest.lib.common.rest_client [req-df165bcb-5e57-40b4-be3b-781ba3cdfe50 ] Request (ImagesMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.049s 2020-11-06 17:59:05.060 38 DEBUG tempest.lib.common.rest_client [req-df165bcb-5e57-40b4-be3b-781ba3cdfe50 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-df165bcb-5e57-40b4-be3b-781ba3cdfe50', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:05.116 38 INFO tempest.lib.common.rest_client [req-fbf5cb3c-c31f-4924-848e-670007cb4edf ] Request (ImagesMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-11-06 17:59:05.117 38 DEBUG tempest.lib.common.rest_client [req-fbf5cb3c-c31f-4924-848e-670007cb4edf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fbf5cb3c-c31f-4924-848e-670007cb4edf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:05.117 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 17:59:05.118 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:05.144 37 INFO tempest.lib.common.rest_client [req-8fba2197-e408-4ad0-8fa0-1eba8f872843 ] Request (SecurityGroupsRbacMaxV235Test:test_update_security_groups): 200 PUT http://172.30.13.94/compute/v2.1/os-security-groups/a87016dd-ee7b-483a-99c0-f14a01838376 0.312s 2020-11-06 17:59:05.145 37 DEBUG tempest.lib.common.rest_client [req-8fba2197-e408-4ad0-8fa0-1eba8f872843 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group": {"name": "tempest-2137659977", "description": "tempest-52751727"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '193', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8fba2197-e408-4ad0-8fa0-1eba8f872843', 'x-compute-request-id': 'req-8fba2197-e408-4ad0-8fa0-1eba8f872843', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-security-groups/a87016dd-ee7b-483a-99c0-f14a01838376'} Body: b'{"security_group": {"id": "a87016dd-ee7b-483a-99c0-f14a01838376", "description": "tempest-52751727", "name": "tempest-2137659977", "tenant_id": "c371fd7e9e8b429ba2cde7387ed618ac", "rules": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:05.152 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:05.167 40 INFO tempest.lib.common.rest_client [req-32d4e8f5-4ccd-450e-a3d4-b146b9a8ebb2 ] Request (ServerConsolesRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/routers 1.360s 2020-11-06 17:59:05.168 40 DEBUG tempest.lib.common.rest_client [req-32d4e8f5-4ccd-450e-a3d4-b146b9a8ebb2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-ServerConsolesRbacTest-1753510296-router", "tenant_id": "0cd9895a4bd84f8a859ddbcbf39a0d72", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea"}}} Response - Headers: {'content-type': 'application/json', 'content-length': '811', 'x-openstack-request-id': 'req-32d4e8f5-4ccd-450e-a3d4-b146b9a8ebb2', 'date': 'Fri, 06 Nov 2020 17:59:05 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "7b3ebe7e-933d-45f9-a55d-aa8f1670eaf7", "name": "tempest-ServerConsolesRbacTest-1753510296-router", "tenant_id": "0cd9895a4bd84f8a859ddbcbf39a0d72", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.126"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::df"}], "enable_snat": true}, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T17:59:03Z", "updated_at": "2020-11-06T17:59:04Z", "revision_number": 3, "project_id": "0cd9895a4bd84f8a859ddbcbf39a0d72"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:05.173 38 INFO tempest.lib.common.rest_client [req-8eb9ca44-32e5-4c92-9a12-d6f7acf53f16 ] Request (ImagesMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles 0.054s 2020-11-06 17:59:05.174 38 DEBUG tempest.lib.common.rest_client [req-8eb9ca44-32e5-4c92-9a12-d6f7acf53f16 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8eb9ca44-32e5-4c92-9a12-d6f7acf53f16', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:05.201 39 INFO tempest.lib.common.rest_client [req-54e14940-6d24-45a1-a3fe-63b4a3598d52 ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-11-06 17:59:05.201 39 DEBUG tempest.lib.common.rest_client [req-54e14940-6d24-45a1-a3fe-63b4a3598d52 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6652', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-54e14940-6d24-45a1-a3fe-63b4a3598d52', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "93089830fe874163be502d2170187468", "name": "tempest-InstanceUsagesAuditLogRbacTest-1697263994", "password_expires_at": null}, "audit_ids": ["l-_CkzYVRCyH7KK-XQyIFQ"], "expires_at": "2020-11-06T18:59:05.000000Z", "issued_at": "2020-11-06T17:59:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f5101f43b3fd460dbc59fcc07f9b955d", "name": "tempest-InstanceUsagesAuditLogRbacTest-1697263994"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f5101f43b3fd460dbc59fcc07f9b955d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f5101f43b3fd460dbc59fcc07f9b955d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f5101f43b3fd460dbc59fcc07f9b955d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f5101f43b3fd460dbc59fcc07f9b955d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f5101f43b3fd460dbc59fcc07f9b955d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f5101f43b3fd460dbc59fcc07f9b955d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:05.204 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:05.205 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.205 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.206 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.207 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.207 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.208 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.209 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.209 37 INFO tempest.lib.common.rest_client [req-7cf77170-05a1-42c0-96b8-c511b35c674f ] Request (SecurityGroupsRbacMaxV235Test:test_update_security_groups): 200 GET http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles 0.056s 2020-11-06 17:59:05.209 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.209 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.209 37 DEBUG tempest.lib.common.rest_client [req-7cf77170-05a1-42c0-96b8-c511b35c674f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7cf77170-05a1-42c0-96b8-c511b35c674f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac/users/d466f0c3f71946b7b235d860e4117827/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:05.209 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.210 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.210 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.210 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.211 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.211 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.211 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.211 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.212 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.212 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.212 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.213 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.213 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.213 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.213 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.214 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.214 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.214 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.215 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.215 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.215 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.215 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.216 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.216 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.216 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.216 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.217 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.217 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.217 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.218 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.218 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.218 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.218 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.219 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.219 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.220 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.220 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.220 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.221 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.221 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.221 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.222 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.222 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.222 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.222 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.223 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.223 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.223 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.223 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.224 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.224 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.225 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.225 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.225 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.225 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.226 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.226 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.226 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.227 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.227 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.227 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.227 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.227 38 INFO tempest.lib.common.rest_client [req-320fe85d-8801-4f48-acca-899d100d0019 ] Request (ImagesMetadataRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles/72a4576c553448cd941b052c1ca0cf2d 0.052s 2020-11-06 17:59:05.228 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.228 38 DEBUG tempest.lib.common.rest_client [req-320fe85d-8801-4f48-acca-899d100d0019 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-320fe85d-8801-4f48-acca-899d100d0019', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:05.228 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.228 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.229 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.230 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-instance-usage-audit-log:list, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:05.230 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:05.293 37 INFO tempest.lib.common.rest_client [req-246b4d02-aa69-47b7-9315-38565b8977fa ] Request (SecurityGroupsRbacMaxV235Test:test_update_security_groups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 17:59:05.294 37 DEBUG tempest.lib.common.rest_client [req-246b4d02-aa69-47b7-9315-38565b8977fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-246b4d02-aa69-47b7-9315-38565b8977fa', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d466f0c3f71946b7b235d860e4117827", "name": "tempest-SecurityGroupsRbacMaxV235Test-286729549", "password_expires_at": null}, "audit_ids": ["z4dbyEPsRvSz3oNKrhqk2A"], "expires_at": "2020-11-06T18:59:05.000000Z", "issued_at": "2020-11-06T17:59:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c371fd7e9e8b429ba2cde7387ed618ac", "name": "tempest-SecurityGroupsRbacMaxV235Test-286729549"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c371fd7e9e8b429ba2cde7387ed618ac", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:05.335 39 INFO tempest.lib.common.rest_client [req-1f18c7dc-8cb1-44d5-b00a-77e68e8e632d ] Request (InstanceUsagesAuditLogRbacTest:test_list_instance_usage_audit_logs): 200 GET http://172.30.13.94/identity/v3/projects/f5101f43b3fd460dbc59fcc07f9b955d/users/93089830fe874163be502d2170187468/roles 0.104s 2020-11-06 17:59:05.335 39 DEBUG tempest.lib.common.rest_client [req-1f18c7dc-8cb1-44d5-b00a-77e68e8e632d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1f18c7dc-8cb1-44d5-b00a-77e68e8e632d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f5101f43b3fd460dbc59fcc07f9b955d/users/93089830fe874163be502d2170187468/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f5101f43b3fd460dbc59fcc07f9b955d/users/93089830fe874163be502d2170187468/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:05.337 38 INFO tempest.lib.common.rest_client [req-45d3b1d2-9e1f-4965-a006-14f666d3fc06 ] Request (ImagesMetadataRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles/a629c95d64b3416fb80ae90af4f69c05 0.109s 2020-11-06 17:59:05.338 38 DEBUG tempest.lib.common.rest_client [req-45d3b1d2-9e1f-4965-a006-14f666d3fc06 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-45d3b1d2-9e1f-4965-a006-14f666d3fc06', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:05.418 39 INFO tempest.lib.common.rest_client [req-d5ea04e6-03b1-42e7-bde3-696f1b35ec72 ] Request (InstanceUsagesAuditLogRbacTest:test_list_instance_usage_audit_logs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 17:59:05.419 39 DEBUG tempest.lib.common.rest_client [req-d5ea04e6-03b1-42e7-bde3-696f1b35ec72 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6652', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d5ea04e6-03b1-42e7-bde3-696f1b35ec72', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "93089830fe874163be502d2170187468", "name": "tempest-InstanceUsagesAuditLogRbacTest-1697263994", "password_expires_at": null}, "audit_ids": ["cscAOgD8TjWoB2j4MWbe3g"], "expires_at": "2020-11-06T18:59:05.000000Z", "issued_at": "2020-11-06T17:59:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f5101f43b3fd460dbc59fcc07f9b955d", "name": "tempest-InstanceUsagesAuditLogRbacTest-1697263994"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f5101f43b3fd460dbc59fcc07f9b955d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f5101f43b3fd460dbc59fcc07f9b955d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f5101f43b3fd460dbc59fcc07f9b955d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f5101f43b3fd460dbc59fcc07f9b955d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f5101f43b3fd460dbc59fcc07f9b955d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f5101f43b3fd460dbc59fcc07f9b955d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:05.528 39 INFO tempest.lib.common.rest_client [req-2f60fb1b-62c4-46f8-802b-c80513853262 ] Request (InstanceUsagesAuditLogRbacTest:test_list_instance_usage_audit_logs): 200 GET http://172.30.13.94/compute/v2.1/os-instance_usage_audit_log 0.108s 2020-11-06 17:59:05.529 39 DEBUG tempest.lib.common.rest_client [req-2f60fb1b-62c4-46f8-802b-c80513853262 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '319', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2f60fb1b-62c4-46f8-802b-c80513853262', 'x-compute-request-id': 'req-2f60fb1b-62c4-46f8-802b-c80513853262', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-instance_usage_audit_log'} Body: b'{"instance_usage_audit_logs": {"period_beginning": "2020-11-06 16:00:00", "period_ending": "2020-11-06 17:00:00", "num_hosts": 0, "num_hosts_done": 0, "num_hosts_running": 0, "num_hosts_not_run": 0, "hosts_not_run": [], "total_instances": 0, "total_errors": 0, "overall_status": "ALL hosts done. 0 errors.", "log": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:05.535 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:05.639 39 INFO tempest.lib.common.rest_client [req-c41ce0b0-161e-455c-bfd9-95e6c9095100 ] Request (InstanceUsagesAuditLogRbacTest:test_list_instance_usage_audit_logs): 200 GET http://172.30.13.94/identity/v3/projects/f5101f43b3fd460dbc59fcc07f9b955d/users/93089830fe874163be502d2170187468/roles 0.103s 2020-11-06 17:59:05.640 39 DEBUG tempest.lib.common.rest_client [req-c41ce0b0-161e-455c-bfd9-95e6c9095100 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c41ce0b0-161e-455c-bfd9-95e6c9095100', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f5101f43b3fd460dbc59fcc07f9b955d/users/93089830fe874163be502d2170187468/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f5101f43b3fd460dbc59fcc07f9b955d/users/93089830fe874163be502d2170187468/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:05.676 39 INFO tempest.lib.common.rest_client [req-8ff8db22-8762-48a4-a8ce-6045dd049773 ] Request (InstanceUsagesAuditLogRbacTest:test_list_instance_usage_audit_logs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 17:59:05.676 39 DEBUG tempest.lib.common.rest_client [req-8ff8db22-8762-48a4-a8ce-6045dd049773 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6652', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8ff8db22-8762-48a4-a8ce-6045dd049773', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "93089830fe874163be502d2170187468", "name": "tempest-InstanceUsagesAuditLogRbacTest-1697263994", "password_expires_at": null}, "audit_ids": ["pOGIkTixSja8X_te9wsB1A"], "expires_at": "2020-11-06T18:59:05.000000Z", "issued_at": "2020-11-06T17:59:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f5101f43b3fd460dbc59fcc07f9b955d", "name": "tempest-InstanceUsagesAuditLogRbacTest-1697263994"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f5101f43b3fd460dbc59fcc07f9b955d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f5101f43b3fd460dbc59fcc07f9b955d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f5101f43b3fd460dbc59fcc07f9b955d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f5101f43b3fd460dbc59fcc07f9b955d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f5101f43b3fd460dbc59fcc07f9b955d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f5101f43b3fd460dbc59fcc07f9b955d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:05.681 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:05.681 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.682 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.682 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.682 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.683 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.683 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.684 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.684 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.684 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.684 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.685 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.685 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.685 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.686 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.686 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.686 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.686 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.687 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.687 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.687 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.688 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.688 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.688 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.688 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.689 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.689 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.689 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.690 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.690 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.690 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.690 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.691 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.691 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.691 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.691 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.692 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.692 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.692 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.693 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.693 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.693 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.693 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.694 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.694 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.694 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.694 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.695 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.695 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.695 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.696 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.696 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.696 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.696 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.697 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.697 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.697 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.698 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.698 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.698 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.698 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.699 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.699 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.699 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.700 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.700 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.700 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.701 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.701 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.701 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.701 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.702 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.702 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.702 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.703 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.703 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:05.704 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-instance-usage-audit-log:show, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:05.704 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:05.725 37 INFO tempest.lib.common.rest_client [req-9989254c-95ca-4c53-a3e9-b0cad01d47be ] Request (SecurityGroupsRbacMaxV235Test:tearDownClass): 202 DELETE http://172.30.13.94/compute/v2.1/os-security-groups/a87016dd-ee7b-483a-99c0-f14a01838376 0.426s 2020-11-06 17:59:05.725 37 DEBUG tempest.lib.common.rest_client [req-9989254c-95ca-4c53-a3e9-b0cad01d47be ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9989254c-95ca-4c53-a3e9-b0cad01d47be', 'x-compute-request-id': 'req-9989254c-95ca-4c53-a3e9-b0cad01d47be', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/os-security-groups/a87016dd-ee7b-483a-99c0-f14a01838376'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:05.754 39 INFO tempest.lib.common.rest_client [req-cf94fd9a-2e4b-474c-85ec-eddb693a9361 ] Request (InstanceUsagesAuditLogRbacTest:test_show_instance_usage_audit_log): 200 GET http://172.30.13.94/identity/v3/projects/f5101f43b3fd460dbc59fcc07f9b955d/users/93089830fe874163be502d2170187468/roles 0.049s 2020-11-06 17:59:05.754 39 DEBUG tempest.lib.common.rest_client [req-cf94fd9a-2e4b-474c-85ec-eddb693a9361 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cf94fd9a-2e4b-474c-85ec-eddb693a9361', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f5101f43b3fd460dbc59fcc07f9b955d/users/93089830fe874163be502d2170187468/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f5101f43b3fd460dbc59fcc07f9b955d/users/93089830fe874163be502d2170187468/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:05.789 39 INFO tempest.lib.common.rest_client [req-e77df1cc-eb9c-491b-a511-76277c8b8b8b ] Request (InstanceUsagesAuditLogRbacTest:test_show_instance_usage_audit_log): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 17:59:05.790 39 DEBUG tempest.lib.common.rest_client [req-e77df1cc-eb9c-491b-a511-76277c8b8b8b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6652', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e77df1cc-eb9c-491b-a511-76277c8b8b8b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "93089830fe874163be502d2170187468", "name": "tempest-InstanceUsagesAuditLogRbacTest-1697263994", "password_expires_at": null}, "audit_ids": ["tHT5XTQARBGn1d0giYmmEg"], "expires_at": "2020-11-06T18:59:05.000000Z", "issued_at": "2020-11-06T17:59:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f5101f43b3fd460dbc59fcc07f9b955d", "name": "tempest-InstanceUsagesAuditLogRbacTest-1697263994"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f5101f43b3fd460dbc59fcc07f9b955d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f5101f43b3fd460dbc59fcc07f9b955d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f5101f43b3fd460dbc59fcc07f9b955d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f5101f43b3fd460dbc59fcc07f9b955d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f5101f43b3fd460dbc59fcc07f9b955d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f5101f43b3fd460dbc59fcc07f9b955d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:05.893 39 INFO tempest.lib.common.rest_client [req-551d75ae-faf6-43c7-b6b7-8bcc0d32e8aa ] Request (InstanceUsagesAuditLogRbacTest:test_show_instance_usage_audit_log): 200 GET http://172.30.13.94/compute/v2.1/os-instance_usage_audit_log/2020-11-06%2017%3A59%3A05 0.103s 2020-11-06 17:59:05.894 39 DEBUG tempest.lib.common.rest_client [req-551d75ae-faf6-43c7-b6b7-8bcc0d32e8aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '318', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-551d75ae-faf6-43c7-b6b7-8bcc0d32e8aa', 'x-compute-request-id': 'req-551d75ae-faf6-43c7-b6b7-8bcc0d32e8aa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-instance_usage_audit_log/2020-11-06%2017%3A59%3A05'} Body: b'{"instance_usage_audit_log": {"period_beginning": "2020-11-06 16:00:00", "period_ending": "2020-11-06 17:00:00", "num_hosts": 0, "num_hosts_done": 0, "num_hosts_running": 0, "num_hosts_not_run": 0, "hosts_not_run": [], "total_instances": 0, "total_errors": 0, "overall_status": "ALL hosts done. 0 errors.", "log": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:05.900 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:05.958 39 INFO tempest.lib.common.rest_client [req-34671964-8bbd-4862-bd09-6a920fa43145 ] Request (InstanceUsagesAuditLogRbacTest:test_show_instance_usage_audit_log): 200 GET http://172.30.13.94/identity/v3/projects/f5101f43b3fd460dbc59fcc07f9b955d/users/93089830fe874163be502d2170187468/roles 0.057s 2020-11-06 17:59:05.958 39 DEBUG tempest.lib.common.rest_client [req-34671964-8bbd-4862-bd09-6a920fa43145 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-34671964-8bbd-4862-bd09-6a920fa43145', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f5101f43b3fd460dbc59fcc07f9b955d/users/93089830fe874163be502d2170187468/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f5101f43b3fd460dbc59fcc07f9b955d/users/93089830fe874163be502d2170187468/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:05.977 37 INFO tempest.lib.common.rest_client [req-474d52ad-b256-48d0-955a-7aa7d6d0b2ba ] Request (SecurityGroupsRbacMaxV235Test:tearDownClass): 202 DELETE http://172.30.13.94/compute/v2.1/os-security-groups/8fcda28c-2fdf-4d70-87b6-216f27917830 0.251s 2020-11-06 17:59:05.977 37 DEBUG tempest.lib.common.rest_client [req-474d52ad-b256-48d0-955a-7aa7d6d0b2ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-474d52ad-b256-48d0-955a-7aa7d6d0b2ba', 'x-compute-request-id': 'req-474d52ad-b256-48d0-955a-7aa7d6d0b2ba', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/os-security-groups/8fcda28c-2fdf-4d70-87b6-216f27917830'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:06.000 39 INFO tempest.lib.common.rest_client [req-8a2c44f0-64f3-40fc-b904-a38fee1d395b ] Request (InstanceUsagesAuditLogRbacTest:test_show_instance_usage_audit_log): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-11-06 17:59:06.001 39 DEBUG tempest.lib.common.rest_client [req-8a2c44f0-64f3-40fc-b904-a38fee1d395b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6652', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8a2c44f0-64f3-40fc-b904-a38fee1d395b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "93089830fe874163be502d2170187468", "name": "tempest-InstanceUsagesAuditLogRbacTest-1697263994", "password_expires_at": null}, "audit_ids": ["b2ApmZzhQPqEucb9A25ylw"], "expires_at": "2020-11-06T18:59:05.000000Z", "issued_at": "2020-11-06T17:59:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f5101f43b3fd460dbc59fcc07f9b955d", "name": "tempest-InstanceUsagesAuditLogRbacTest-1697263994"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f5101f43b3fd460dbc59fcc07f9b955d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f5101f43b3fd460dbc59fcc07f9b955d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f5101f43b3fd460dbc59fcc07f9b955d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f5101f43b3fd460dbc59fcc07f9b955d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f5101f43b3fd460dbc59fcc07f9b955d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f5101f43b3fd460dbc59fcc07f9b955d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:06.023 37 INFO tempest.lib.common.rest_client [req-b738340c-eedd-42b7-9d7a-c267a96e08d3 ] Request (SecurityGroupsRbacMaxV235Test:tearDownClass): 404 DELETE http://172.30.13.94/compute/v2.1/os-security-groups/ea637dd6-2d22-4945-ac6b-175b286a5b3e 0.045s 2020-11-06 17:59:06.024 37 DEBUG tempest.lib.common.rest_client [req-b738340c-eedd-42b7-9d7a-c267a96e08d3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '194', 'x-openstack-request-id': 'req-b738340c-eedd-42b7-9d7a-c267a96e08d3', 'x-compute-request-id': 'req-b738340c-eedd-42b7-9d7a-c267a96e08d3', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/os-security-groups/ea637dd6-2d22-4945-ac6b-175b286a5b3e'} Body: b'{"itemNotFound": {"code": 404, "message": "Security group ea637dd6-2d22-4945-ac6b-175b286a5b3e does not exist\\nNeutron server returns request_ids: [\'req-3acce485-6779-48ea-acce-c87316d404f2\']"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:06.163 39 INFO tempest.lib.common.rest_client [req-97148f1f-4372-4d55-90a9-7569521a905e ] Request (InstanceUsagesAuditLogRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/93089830fe874163be502d2170187468 0.158s 2020-11-06 17:59:06.163 39 DEBUG tempest.lib.common.rest_client [req-97148f1f-4372-4d55-90a9-7569521a905e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-97148f1f-4372-4d55-90a9-7569521a905e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/93089830fe874163be502d2170187468'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:06.243 39 INFO tempest.lib.common.rest_client [req-88f85bbb-9434-4994-8b69-0ab4ca642445 ] Request (InstanceUsagesAuditLogRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-11-06 17:59:06.243 39 DEBUG tempest.lib.common.rest_client [req-88f85bbb-9434-4994-8b69-0ab4ca642445 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-88f85bbb-9434-4994-8b69-0ab4ca642445', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["V1f7i-ewTsyJAlkXE9qt0A"], "expires_at": "2020-11-06T18:59:06.000000Z", "issued_at": "2020-11-06T17:59:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:06.277 37 INFO tempest.lib.common.rest_client [req-077df79d-8ad7-4ad0-8fc1-31859974367c ] Request (SecurityGroupsRbacMaxV235Test:tearDownClass): 202 DELETE http://172.30.13.94/compute/v2.1/os-security-groups/2bf1ef9e-1b60-4aea-85d6-a32520c48ec8 0.251s 2020-11-06 17:59:06.277 37 DEBUG tempest.lib.common.rest_client [req-077df79d-8ad7-4ad0-8fc1-31859974367c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-077df79d-8ad7-4ad0-8fc1-31859974367c', 'x-compute-request-id': 'req-077df79d-8ad7-4ad0-8fc1-31859974367c', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/os-security-groups/2bf1ef9e-1b60-4aea-85d6-a32520c48ec8'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:06.394 37 INFO tempest.lib.common.rest_client [req-cd93f9b2-24fd-439e-82cd-656f3665808a ] Request (SecurityGroupsRbacMaxV235Test:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/d466f0c3f71946b7b235d860e4117827 0.115s 2020-11-06 17:59:06.394 37 DEBUG tempest.lib.common.rest_client [req-cd93f9b2-24fd-439e-82cd-656f3665808a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cd93f9b2-24fd-439e-82cd-656f3665808a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/d466f0c3f71946b7b235d860e4117827'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:06.426 38 INFO tempest.lib.common.rest_client [req-1ab584c6-bdce-4c97-bfaf-6272ee500f9c ] Request (ImagesMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-11-06 17:59:06.427 38 DEBUG tempest.lib.common.rest_client [req-1ab584c6-bdce-4c97-bfaf-6272ee500f9c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1ab584c6-bdce-4c97-bfaf-6272ee500f9c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c088001f96a442489a91e768768598d4", "name": "tempest-ImagesMetadataRbacTest-1966058629", "password_expires_at": null}, "audit_ids": ["wemnTxHoQDKaCaCbYojHhg"], "expires_at": "2020-11-06T18:59:06.000000Z", "issued_at": "2020-11-06T17:59:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c6fa733c16f543edbc0ec536de535378", "name": "tempest-ImagesMetadataRbacTest-1966058629"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:06.489 37 INFO tempest.lib.common.rest_client [req-13f3af21-dac9-4888-ada5-11ca6d041505 ] Request (SecurityGroupsRbacMaxV235Test:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-11-06 17:59:06.490 37 DEBUG tempest.lib.common.rest_client [req-13f3af21-dac9-4888-ada5-11ca6d041505 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-13f3af21-dac9-4888-ada5-11ca6d041505', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["8hyx5YfoS5-y8e_YIFDeYQ"], "expires_at": "2020-11-06T18:59:06.000000Z", "issued_at": "2020-11-06T17:59:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:06.545 39 INFO tempest.lib.common.rest_client [req-687a4e03-8284-43ee-91e1-14e01052e825 ] Request (InstanceUsagesAuditLogRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=f5101f43b3fd460dbc59fcc07f9b955d&name=default 0.300s 2020-11-06 17:59:06.545 39 DEBUG tempest.lib.common.rest_client [req-687a4e03-8284-43ee-91e1-14e01052e825 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-687a4e03-8284-43ee-91e1-14e01052e825', 'date': 'Fri, 06 Nov 2020 17:59:06 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=f5101f43b3fd460dbc59fcc07f9b955d&name=default'} Body: b'{"security_groups": [{"id": "4409d0a7-7063-41de-a448-e5bcfb908dec", "name": "default", "stateful": true, "tenant_id": "f5101f43b3fd460dbc59fcc07f9b955d", "description": "Default security group", "security_group_rules": [{"id": "828908ac-c72d-42d8-abde-e5aa3486edb4", "tenant_id": "f5101f43b3fd460dbc59fcc07f9b955d", "security_group_id": "4409d0a7-7063-41de-a448-e5bcfb908dec", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "4409d0a7-7063-41de-a448-e5bcfb908dec", "description": null, "tags": [], "created_at": "2020-11-06T17:59:06Z", "updated_at": "2020-11-06T17:59:06Z", "revision_number": 0, "project_id": "f5101f43b3fd460dbc59fcc07f9b955d"}, {"id": "85f3c4e5-6020-4c31-97d7-928b73534ac8", "tenant_id": "f5101f43b3fd460dbc59fcc07f9b955d", "security_group_id": "4409d0a7-7063-41de-a448-e5bcfb908dec", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:59:06Z", "updated_at": "2020-11-06T17:59:06Z", "revision_number": 0, "project_id": "f5101f43b3fd460dbc59fcc07f9b955d"}, {"id": "8cb124d1-728b-42c3-bbca-bbf34869879d", "tenant_id": "f5101f43b3fd460dbc59fcc07f9b955d", "security_group_id": "4409d0a7-7063-41de-a448-e5bcfb908dec", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:59:06Z", "updated_at": "2020-11-06T17:59:06Z", "revision_number": 0, "project_id": "f5101f43b3fd460dbc59fcc07f9b955d"}, {"id": "a254d073-4081-439f-a9f5-0dff99d321a5", "tenant_id": "f5101f43b3fd460dbc59fcc07f9b955d", "security_group_id": "4409d0a7-7063-41de-a448-e5bcfb908dec", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "4409d0a7-7063-41de-a448-e5bcfb908dec", "description": null, "tags": [], "created_at": "2020-11-06T17:59:06Z", "updated_at": "2020-11-06T17:59:06Z", "revision_number": 0, "project_id": "f5101f43b3fd460dbc59fcc07f9b955d"}], "tags": [], "created_at": "2020-11-06T17:59:06Z", "updated_at": "2020-11-06T17:59:06Z", "revision_number": 1, "project_id": "f5101f43b3fd460dbc59fcc07f9b955d"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:06.656 39 INFO tempest.lib.common.rest_client [req-93c7bf6a-b5f1-4bcc-934e-24f43f99e3ee ] Request (InstanceUsagesAuditLogRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/4409d0a7-7063-41de-a448-e5bcfb908dec 0.110s 2020-11-06 17:59:06.657 39 DEBUG tempest.lib.common.rest_client [req-93c7bf6a-b5f1-4bcc-934e-24f43f99e3ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-93c7bf6a-b5f1-4bcc-934e-24f43f99e3ee', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 17:59:06 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/4409d0a7-7063-41de-a448-e5bcfb908dec'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:06.681 37 INFO tempest.lib.common.rest_client [req-dc419571-5144-458a-9355-605e36903069 ] Request (SecurityGroupsRbacMaxV235Test:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=c371fd7e9e8b429ba2cde7387ed618ac&name=default 0.189s 2020-11-06 17:59:06.681 37 DEBUG tempest.lib.common.rest_client [req-dc419571-5144-458a-9355-605e36903069 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-dc419571-5144-458a-9355-605e36903069', 'date': 'Fri, 06 Nov 2020 17:59:06 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=c371fd7e9e8b429ba2cde7387ed618ac&name=default'} Body: b'{"security_groups": [{"id": "449cfdc2-f285-4825-8a5f-eed747238829", "name": "default", "stateful": true, "tenant_id": "c371fd7e9e8b429ba2cde7387ed618ac", "description": "Default security group", "security_group_rules": [{"id": "5e147b1f-144f-4e9e-8192-3bb0c02452b2", "tenant_id": "c371fd7e9e8b429ba2cde7387ed618ac", "security_group_id": "449cfdc2-f285-4825-8a5f-eed747238829", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:59:00Z", "updated_at": "2020-11-06T17:59:00Z", "revision_number": 0, "project_id": "c371fd7e9e8b429ba2cde7387ed618ac"}, {"id": "a2ff22d4-daf1-42dc-afad-2361e05d0664", "tenant_id": "c371fd7e9e8b429ba2cde7387ed618ac", "security_group_id": "449cfdc2-f285-4825-8a5f-eed747238829", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:59:00Z", "updated_at": "2020-11-06T17:59:00Z", "revision_number": 0, "project_id": "c371fd7e9e8b429ba2cde7387ed618ac"}, {"id": "ee95ba05-e993-47d4-b797-95ef7c369e88", "tenant_id": "c371fd7e9e8b429ba2cde7387ed618ac", "security_group_id": "449cfdc2-f285-4825-8a5f-eed747238829", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "449cfdc2-f285-4825-8a5f-eed747238829", "description": null, "tags": [], "created_at": "2020-11-06T17:59:00Z", "updated_at": "2020-11-06T17:59:00Z", "revision_number": 0, "project_id": "c371fd7e9e8b429ba2cde7387ed618ac"}, {"id": "fa875ebc-a123-4128-a68e-08e158e28f54", "tenant_id": "c371fd7e9e8b429ba2cde7387ed618ac", "security_group_id": "449cfdc2-f285-4825-8a5f-eed747238829", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "449cfdc2-f285-4825-8a5f-eed747238829", "description": null, "tags": [], "created_at": "2020-11-06T17:59:00Z", "updated_at": "2020-11-06T17:59:00Z", "revision_number": 0, "project_id": "c371fd7e9e8b429ba2cde7387ed618ac"}], "tags": [], "created_at": "2020-11-06T17:59:00Z", "updated_at": "2020-11-06T17:59:00Z", "revision_number": 1, "project_id": "c371fd7e9e8b429ba2cde7387ed618ac"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:06.682 38 INFO tempest.lib.common.rest_client [req-972cf3c1-da4a-46a4-bb42-09bea42aba39 ] Request (ImagesMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/image/v2/images 0.253s 2020-11-06 17:59:06.683 38 DEBUG tempest.lib.common.rest_client [req-972cf3c1-da4a-46a4-bb42-09bea42aba39 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-ImagesMetadataRbacTest-image-1378875188"} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '651', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/f509770f-c3cc-4d83-ac33-eae114f1d0c8', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-972cf3c1-da4a-46a4-bb42-09bea42aba39', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-ImagesMetadataRbacTest-image-1378875188", "disk_format": null, "container_format": null, "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "c6fa733c16f543edbc0ec536de535378", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "f509770f-c3cc-4d83-ac33-eae114f1d0c8", "created_at": "2020-11-06T17:59:07Z", "updated_at": "2020-11-06T17:59:07Z", "tags": [], "self": "/v2/images/f509770f-c3cc-4d83-ac33-eae114f1d0c8", "file": "/v2/images/f509770f-c3cc-4d83-ac33-eae114f1d0c8/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:06.685 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:06.692 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:06.693 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: modify_image, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:06.694 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:06.744 38 INFO tempest.lib.common.rest_client [req-3763eb79-53c2-47dd-afa0-4c8ef7d431d2 ] Request (ImagesMetadataRbacTest:test_create_image_metadata): 200 GET http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles 0.050s 2020-11-06 17:59:06.745 38 DEBUG tempest.lib.common.rest_client [req-3763eb79-53c2-47dd-afa0-4c8ef7d431d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3763eb79-53c2-47dd-afa0-4c8ef7d431d2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:06.782 39 INFO tempest.lib.common.rest_client [req-ae74472a-4593-46b5-b4dc-099f3a80bbec ] Request (InstanceUsagesAuditLogRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/f5101f43b3fd460dbc59fcc07f9b955d 0.124s 2020-11-06 17:59:06.782 39 DEBUG tempest.lib.common.rest_client [req-ae74472a-4593-46b5-b4dc-099f3a80bbec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ae74472a-4593-46b5-b4dc-099f3a80bbec', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/f5101f43b3fd460dbc59fcc07f9b955d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:06.824 38 INFO tempest.lib.common.rest_client [req-213ed052-1fda-46c1-8dce-edfb5ab01250 ] Request (ImagesMetadataRbacTest:test_create_image_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-11-06 17:59:06.824 38 DEBUG tempest.lib.common.rest_client [req-213ed052-1fda-46c1-8dce-edfb5ab01250 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-213ed052-1fda-46c1-8dce-edfb5ab01250', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c088001f96a442489a91e768768598d4", "name": "tempest-ImagesMetadataRbacTest-1966058629", "password_expires_at": null}, "audit_ids": ["cxJD0FLxQXWClSYy14oyvw"], "expires_at": "2020-11-06T18:59:06.000000Z", "issued_at": "2020-11-06T17:59:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c6fa733c16f543edbc0ec536de535378", "name": "tempest-ImagesMetadataRbacTest-1966058629"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:06.862 37 INFO tempest.lib.common.rest_client [req-920d62f3-7904-4147-815a-6ed569478044 ] Request (SecurityGroupsRbacMaxV235Test:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/449cfdc2-f285-4825-8a5f-eed747238829 0.180s 2020-11-06 17:59:06.863 37 DEBUG tempest.lib.common.rest_client [req-920d62f3-7904-4147-815a-6ed569478044 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-920d62f3-7904-4147-815a-6ed569478044', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 17:59:06 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/449cfdc2-f285-4825-8a5f-eed747238829'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:06.870 39 INFO tempest.lib.common.rest_client [req-f1755b66-bdfc-4b69-aa9e-9f4e130cceec ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 17:59:06.871 39 DEBUG tempest.lib.common.rest_client [req-f1755b66-bdfc-4b69-aa9e-9f4e130cceec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f1755b66-bdfc-4b69-aa9e-9f4e130cceec', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["w6r-wUYxQvqdXtugvt9R3g"], "expires_at": "2020-11-06T18:59:06.000000Z", "issued_at": "2020-11-06T17:59:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:06.923 39 INFO tempest.lib.common.rest_client [req-061b4281-4934-476c-9d26-0f2ff7bd5c07 ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-11-06 17:59:06.924 39 DEBUG tempest.lib.common.rest_client [req-061b4281-4934-476c-9d26-0f2ff7bd5c07 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-061b4281-4934-476c-9d26-0f2ff7bd5c07', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["Nxz9NwQSR_OHMgMbfag7-A"], "expires_at": "2020-11-06T18:59:06.000000Z", "issued_at": "2020-11-06T17:59:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:06.973 39 INFO tempest.lib.common.rest_client [req-7ddcacae-e308-4c9a-836e-4b5c5dd85db3 ] Request (ServerActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.048s 2020-11-06 17:59:06.974 39 DEBUG tempest.lib.common.rest_client [req-7ddcacae-e308-4c9a-836e-4b5c5dd85db3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7ddcacae-e308-4c9a-836e-4b5c5dd85db3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:07.001 37 INFO tempest.lib.common.rest_client [req-ba72e120-808e-417e-b501-5e2fb81fb739 ] Request (SecurityGroupsRbacMaxV235Test:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac 0.138s 2020-11-06 17:59:07.002 37 DEBUG tempest.lib.common.rest_client [req-ba72e120-808e-417e-b501-5e2fb81fb739 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ba72e120-808e-417e-b501-5e2fb81fb739', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c371fd7e9e8b429ba2cde7387ed618ac'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:07.078 39 INFO tempest.lib.common.rest_client [req-c1742af6-9fab-465f-aefc-728ab282466f ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.103s 2020-11-06 17:59:07.079 39 DEBUG tempest.lib.common.rest_client [req-c1742af6-9fab-465f-aefc-728ab282466f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ServerActionsRbacTest-1280955528-desc", "domain_id": "default", "name": "tempest-ServerActionsRbacTest-1280955528"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '380', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c1742af6-9fab-465f-aefc-728ab282466f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528", "domain_id": "default", "description": "tempest-ServerActionsRbacTest-1280955528-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:07.102 37 INFO tempest.lib.common.rest_client [req-d1eb03ef-0e3f-40e7-82ba-f4a8f38cdc89 ] Request (SecurtiyGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-11-06 17:59:07.103 37 DEBUG tempest.lib.common.rest_client [req-d1eb03ef-0e3f-40e7-82ba-f4a8f38cdc89 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d1eb03ef-0e3f-40e7-82ba-f4a8f38cdc89', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["qMtVVEvSRD-CBsddqLszHQ"], "expires_at": "2020-11-06T18:59:07.000000Z", "issued_at": "2020-11-06T17:59:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:07.200 40 INFO tempest.lib.common.rest_client [req-b97f3f53-35e5-4aec-8176-bdc9cc129b6c ] Request (ServerConsolesRbacTest:setUpClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/7b3ebe7e-933d-45f9-a55d-aa8f1670eaf7/add_router_interface 2.031s 2020-11-06 17:59:07.201 39 INFO tempest.lib.common.rest_client [req-d503f24d-476c-4f3e-8447-5b4b950c028c ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.120s 2020-11-06 17:59:07.201 39 DEBUG tempest.lib.common.rest_client [req-d503f24d-476c-4f3e-8447-5b4b950c028c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ServerActionsRbacTest-1280955528", "password": "F7=GvF62zqq7Rz&", "project_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "email": "tempest-ServerActionsRbacTest-351682520@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '397', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d503f24d-476c-4f3e-8447-5b4b950c028c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "email": "tempest-ServerActionsRbacTest-351682520@example.com", "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/13cdadce7fc24a938ce27cd5ee7c066f"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:07.201 40 DEBUG tempest.lib.common.rest_client [req-b97f3f53-35e5-4aec-8176-bdc9cc129b6c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "6b7d443e-3e96-4e22-be53-fcf373c2c13b"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-b97f3f53-35e5-4aec-8176-bdc9cc129b6c', 'date': 'Fri, 06 Nov 2020 17:59:07 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/7b3ebe7e-933d-45f9-a55d-aa8f1670eaf7/add_router_interface'} Body: b'{"id": "7b3ebe7e-933d-45f9-a55d-aa8f1670eaf7", "tenant_id": "0cd9895a4bd84f8a859ddbcbf39a0d72", "port_id": "b4793e86-6761-45bf-aa34-a6c250a2b5b5", "network_id": "bb0f3cc3-8583-431c-af3d-9b99d0b951fd", "subnet_id": "6b7d443e-3e96-4e22-be53-fcf373c2c13b", "subnet_ids": ["6b7d443e-3e96-4e22-be53-fcf373c2c13b"]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:07.201 40 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerConsolesRbacTest-101764086', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '0cd9895a4bd84f8a859ddbcbf39a0d72', 'project_name': 'tempest-ServerConsolesRbacTest-101764086', 'tenant_id': '0cd9895a4bd84f8a859ddbcbf39a0d72', 'tenant_name': 'tempest-ServerConsolesRbacTest-101764086', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'd83a612e30aa42b18d464c0b2cbd4044'}, Network: {'id': 'bb0f3cc3-8583-431c-af3d-9b99d0b951fd', 'name': 'tempest-ServerConsolesRbacTest-1753510296-network', 'tenant_id': '0cd9895a4bd84f8a859ddbcbf39a0d72', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '0cd9895a4bd84f8a859ddbcbf39a0d72', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 49, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T17:59:03Z', 'updated_at': '2020-11-06T17:59:03Z', 'revision_number': 1}, Subnet: {'id': '6b7d443e-3e96-4e22-be53-fcf373c2c13b', 'name': 'tempest-ServerConsolesRbacTest-1753510296-subnet', 'tenant_id': '0cd9895a4bd84f8a859ddbcbf39a0d72', 'network_id': 'bb0f3cc3-8583-431c-af3d-9b99d0b951fd', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-11-06T17:59:03Z', 'updated_at': '2020-11-06T17:59:03Z', 'revision_number': 0, 'project_id': '0cd9895a4bd84f8a859ddbcbf39a0d72'}, Router: {'id': '7b3ebe7e-933d-45f9-a55d-aa8f1670eaf7', 'name': 'tempest-ServerConsolesRbacTest-1753510296-router', 'tenant_id': '0cd9895a4bd84f8a859ddbcbf39a0d72', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.126'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::df'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-11-06T17:59:03Z', 'updated_at': '2020-11-06T17:59:04Z', 'revision_number': 3, 'project_id': '0cd9895a4bd84f8a859ddbcbf39a0d72'} 2020-11-06 17:59:07.208 37 INFO tempest.lib.common.rest_client [req-4298ce90-e9ea-4789-8060-4f50f082f038 ] Request (SecurtiyGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-11-06 17:59:07.208 37 DEBUG tempest.lib.common.rest_client [req-4298ce90-e9ea-4789-8060-4f50f082f038 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4298ce90-e9ea-4789-8060-4f50f082f038', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["7GRCpa3sQi6wePWXffQh9g"], "expires_at": "2020-11-06T18:59:07.000000Z", "issued_at": "2020-11-06T17:59:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:07.257 39 INFO tempest.lib.common.rest_client [req-afb15c78-8fa4-4239-abee-3aae1e8844ed ] Request (ServerActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-11-06 17:59:07.258 39 DEBUG tempest.lib.common.rest_client [req-afb15c78-8fa4-4239-abee-3aae1e8844ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-afb15c78-8fa4-4239-abee-3aae1e8844ed', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:07.262 37 INFO tempest.lib.common.rest_client [req-67417c9a-be34-4f0c-917c-ed8e79a83845 ] Request (SecurtiyGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.053s 2020-11-06 17:59:07.263 37 DEBUG tempest.lib.common.rest_client [req-67417c9a-be34-4f0c-917c-ed8e79a83845 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-67417c9a-be34-4f0c-917c-ed8e79a83845', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:07.314 39 INFO tempest.lib.common.rest_client [req-b8fbe3e8-f4d7-4247-9dea-3147245274a5 ] Request (ServerActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-11-06 17:59:07.314 39 DEBUG tempest.lib.common.rest_client [req-b8fbe3e8-f4d7-4247-9dea-3147245274a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b8fbe3e8-f4d7-4247-9dea-3147245274a5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:07.316 40 INFO tempest.lib.common.rest_client [req-0ca16b05-1cf1-42af-8b05-b74b5a91a670 ] Request (ServerConsolesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.103s 2020-11-06 17:59:07.317 40 DEBUG tempest.lib.common.rest_client [req-0ca16b05-1cf1-42af-8b05-b74b5a91a670 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6573', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0ca16b05-1cf1-42af-8b05-b74b5a91a670', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d83a612e30aa42b18d464c0b2cbd4044", "name": "tempest-ServerConsolesRbacTest-101764086", "password_expires_at": null}, "audit_ids": ["RhOoN4rrS_OzlrIezy_6fQ"], "expires_at": "2020-11-06T18:59:07.000000Z", "issued_at": "2020-11-06T17:59:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0cd9895a4bd84f8a859ddbcbf39a0d72", "name": "tempest-ServerConsolesRbacTest-101764086"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0cd9895a4bd84f8a859ddbcbf39a0d72", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0cd9895a4bd84f8a859ddbcbf39a0d72", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0cd9895a4bd84f8a859ddbcbf39a0d72", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cd9895a4bd84f8a859ddbcbf39a0d72", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cd9895a4bd84f8a859ddbcbf39a0d72", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cd9895a4bd84f8a859ddbcbf39a0d72", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://1 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:07.336 37 INFO tempest.lib.common.rest_client [req-3342acb5-2b32-47b4-85b0-e12e04967b6a ] Request (SecurtiyGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.072s 2020-11-06 17:59:07.337 37 DEBUG tempest.lib.common.rest_client [req-3342acb5-2b32-47b4-85b0-e12e04967b6a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-SecurtiyGroupsRbacTest-66962389-desc", "domain_id": "default", "name": "tempest-SecurtiyGroupsRbacTest-66962389"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '378', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3342acb5-2b32-47b4-85b0-e12e04967b6a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "d73ae082cf2c4889915adb0d4efc6f2e", "name": "tempest-SecurtiyGroupsRbacTest-66962389", "domain_id": "default", "description": "tempest-SecurtiyGroupsRbacTest-66962389-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/d73ae082cf2c4889915adb0d4efc6f2e"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:07.339 38 INFO tempest.lib.common.rest_client [req-a14e324a-75a3-4dbd-82d3-eaa130078f3f ] Request (ImagesMetadataRbacTest:test_create_image_metadata): 200 POST http://172.30.13.94/compute/v2.1/images/f509770f-c3cc-4d83-ac33-eae114f1d0c8/metadata 0.513s 2020-11-06 17:59:07.339 38 DEBUG tempest.lib.common.rest_client [req-a14e324a-75a3-4dbd-82d3-eaa130078f3f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"foo": "bar"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '28', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a14e324a-75a3-4dbd-82d3-eaa130078f3f', 'x-compute-request-id': 'req-a14e324a-75a3-4dbd-82d3-eaa130078f3f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/f509770f-c3cc-4d83-ac33-eae114f1d0c8/metadata'} Body: b'{"metadata": {"foo": "bar"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:07.341 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:07.376 39 INFO tempest.lib.common.rest_client [req-38b8687b-c358-41df-b77b-57081ed9e218 ] Request (ServerActionsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles/72a4576c553448cd941b052c1ca0cf2d 0.061s 2020-11-06 17:59:07.377 39 DEBUG tempest.lib.common.rest_client [req-38b8687b-c358-41df-b77b-57081ed9e218 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-38b8687b-c358-41df-b77b-57081ed9e218', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:07.377 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerActionsRbacTest-1280955528', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '21ea54a8c99a458890dbfde9b6dc3e3b', 'project_name': 'tempest-ServerActionsRbacTest-1280955528', 'tenant_id': '21ea54a8c99a458890dbfde9b6dc3e3b', 'tenant_name': 'tempest-ServerActionsRbacTest-1280955528', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '13cdadce7fc24a938ce27cd5ee7c066f'}, Network: None, Subnet: None, Router: None 2020-11-06 17:59:07.401 40 INFO tempest.lib.common.rest_client [req-2d4069a5-6d58-4ea0-9b78-b97a108199e5 ] Request (ServerConsolesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 17:59:07.402 40 DEBUG tempest.lib.common.rest_client [req-2d4069a5-6d58-4ea0-9b78-b97a108199e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2d4069a5-6d58-4ea0-9b78-b97a108199e5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["G9qiSgscTLClXSzEvnH2vQ"], "expires_at": "2020-11-06T18:59:07.000000Z", "issued_at": "2020-11-06T17:59:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:07.452 38 INFO tempest.lib.common.rest_client [req-b3f74671-5979-406e-ba03-432127ef3934 ] Request (ImagesMetadataRbacTest:test_create_image_metadata): 200 GET http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles 0.110s 2020-11-06 17:59:07.452 38 DEBUG tempest.lib.common.rest_client [req-b3f74671-5979-406e-ba03-432127ef3934 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b3f74671-5979-406e-ba03-432127ef3934', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:07.457 39 INFO tempest.lib.common.rest_client [req-1806823d-b67c-436f-9c9d-9068e4cc4902 ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.079s 2020-11-06 17:59:07.458 39 DEBUG tempest.lib.common.rest_client [req-1806823d-b67c-436f-9c9d-9068e4cc4902 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1806823d-b67c-436f-9c9d-9068e4cc4902', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["K_HM5aIyS2yeniIzOEohOA"], "expires_at": "2020-11-06T18:59:07.000000Z", "issued_at": "2020-11-06T17:59:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:07.461 37 INFO tempest.lib.common.rest_client [req-f1fd9304-fd47-48c4-93ef-93c1cd0a48a4 ] Request (SecurtiyGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.123s 2020-11-06 17:59:07.462 37 DEBUG tempest.lib.common.rest_client [req-f1fd9304-fd47-48c4-93ef-93c1cd0a48a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-SecurtiyGroupsRbacTest-66962389", "password": "S7#wRPC_gR_4K41", "project_id": "d73ae082cf2c4889915adb0d4efc6f2e", "email": "tempest-SecurtiyGroupsRbacTest-1926020371@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '398', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f1fd9304-fd47-48c4-93ef-93c1cd0a48a4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "d73ae082cf2c4889915adb0d4efc6f2e", "email": "tempest-SecurtiyGroupsRbacTest-1926020371@example.com", "id": "eabd533369674823b012ab299376bbb3", "name": "tempest-SecurtiyGroupsRbacTest-66962389", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/eabd533369674823b012ab299376bbb3"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:07.506 37 INFO tempest.lib.common.rest_client [req-be08184d-edeb-46fc-a385-fbd04e26718e ] Request (SecurtiyGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.043s 2020-11-06 17:59:07.506 37 DEBUG tempest.lib.common.rest_client [req-be08184d-edeb-46fc-a385-fbd04e26718e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-be08184d-edeb-46fc-a385-fbd04e26718e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:07.508 40 INFO tempest.lib.common.rest_client [req-6b6a2131-9378-43be-834c-bb04230b1c1a ] Request (ServerConsolesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-11-06 17:59:07.509 40 DEBUG tempest.lib.common.rest_client [req-6b6a2131-9378-43be-834c-bb04230b1c1a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6b6a2131-9378-43be-834c-bb04230b1c1a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["GRlHwqclSri7XJepbc23kg"], "expires_at": "2020-11-06T18:59:07.000000Z", "issued_at": "2020-11-06T17:59:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:07.532 38 INFO tempest.lib.common.rest_client [req-e9b0e7ce-678f-42bd-9908-9ebc18454ba8 ] Request (ImagesMetadataRbacTest:test_create_image_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-11-06 17:59:07.533 38 DEBUG tempest.lib.common.rest_client [req-e9b0e7ce-678f-42bd-9908-9ebc18454ba8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e9b0e7ce-678f-42bd-9908-9ebc18454ba8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c088001f96a442489a91e768768598d4", "name": "tempest-ImagesMetadataRbacTest-1966058629", "password_expires_at": null}, "audit_ids": ["fw3d0cjqThGBAwEfQqILLg"], "expires_at": "2020-11-06T18:59:07.000000Z", "issued_at": "2020-11-06T17:59:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c6fa733c16f543edbc0ec536de535378", "name": "tempest-ImagesMetadataRbacTest-1966058629"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:07.550 37 INFO tempest.lib.common.rest_client [req-2e829b5b-e652-47c5-b8bb-16cb11db6352 ] Request (SecurtiyGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.043s 2020-11-06 17:59:07.551 37 DEBUG tempest.lib.common.rest_client [req-2e829b5b-e652-47c5-b8bb-16cb11db6352 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2e829b5b-e652-47c5-b8bb-16cb11db6352', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:07.556 40 INFO tempest.lib.common.rest_client [req-0a9f7377-5969-43b4-a1da-0dc6f9b0c99e ] Request (ServerConsolesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.046s 2020-11-06 17:59:07.557 40 DEBUG tempest.lib.common.rest_client [req-0a9f7377-5969-43b4-a1da-0dc6f9b0c99e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0a9f7377-5969-43b4-a1da-0dc6f9b0c99e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:07.600 40 INFO tempest.lib.common.rest_client [req-acaf1fea-d786-4c5e-a8fc-894681b86bb0 ] Request (ServerConsolesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.042s 2020-11-06 17:59:07.600 40 DEBUG tempest.lib.common.rest_client [req-acaf1fea-d786-4c5e-a8fc-894681b86bb0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-acaf1fea-d786-4c5e-a8fc-894681b86bb0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:07.601 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 17:59:07.601 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:07.611 37 INFO tempest.lib.common.rest_client [req-5500ec36-0b4c-4201-ab79-fda180ba5258 ] Request (SecurtiyGroupsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/d73ae082cf2c4889915adb0d4efc6f2e/users/eabd533369674823b012ab299376bbb3/roles/72a4576c553448cd941b052c1ca0cf2d 0.059s 2020-11-06 17:59:07.611 37 DEBUG tempest.lib.common.rest_client [req-5500ec36-0b4c-4201-ab79-fda180ba5258 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5500ec36-0b4c-4201-ab79-fda180ba5258', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d73ae082cf2c4889915adb0d4efc6f2e/users/eabd533369674823b012ab299376bbb3/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:07.612 37 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SecurtiyGroupsRbacTest-66962389', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'd73ae082cf2c4889915adb0d4efc6f2e', 'project_name': 'tempest-SecurtiyGroupsRbacTest-66962389', 'tenant_id': 'd73ae082cf2c4889915adb0d4efc6f2e', 'tenant_name': 'tempest-SecurtiyGroupsRbacTest-66962389', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'eabd533369674823b012ab299376bbb3'}, Network: None, Subnet: None, Router: None 2020-11-06 17:59:07.694 40 INFO tempest.lib.common.rest_client [req-73cc6f90-0592-4cb9-a881-be8d1908fb02 ] Request (ServerConsolesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/0cd9895a4bd84f8a859ddbcbf39a0d72/users/d83a612e30aa42b18d464c0b2cbd4044/roles 0.092s 2020-11-06 17:59:07.694 40 DEBUG tempest.lib.common.rest_client [req-73cc6f90-0592-4cb9-a881-be8d1908fb02 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-73cc6f90-0592-4cb9-a881-be8d1908fb02', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0cd9895a4bd84f8a859ddbcbf39a0d72/users/d83a612e30aa42b18d464c0b2cbd4044/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0cd9895a4bd84f8a859ddbcbf39a0d72/users/d83a612e30aa42b18d464c0b2cbd4044/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:07.696 37 INFO tempest.lib.common.rest_client [req-3c5a6aee-c244-4cc9-809a-d3c5872c60ae ] Request (SecurtiyGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 17:59:07.697 37 DEBUG tempest.lib.common.rest_client [req-3c5a6aee-c244-4cc9-809a-d3c5872c60ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3c5a6aee-c244-4cc9-809a-d3c5872c60ae', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["HRQ7XjUfRG6wSxreFtcF1Q"], "expires_at": "2020-11-06T18:59:07.000000Z", "issued_at": "2020-11-06T17:59:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:07.754 40 INFO tempest.lib.common.rest_client [req-cf13df3e-a8c8-4990-a879-7a944d34ad7a ] Request (ServerConsolesRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/0cd9895a4bd84f8a859ddbcbf39a0d72/users/d83a612e30aa42b18d464c0b2cbd4044/roles/72a4576c553448cd941b052c1ca0cf2d 0.059s 2020-11-06 17:59:07.754 40 DEBUG tempest.lib.common.rest_client [req-cf13df3e-a8c8-4990-a879-7a944d34ad7a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cf13df3e-a8c8-4990-a879-7a944d34ad7a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/0cd9895a4bd84f8a859ddbcbf39a0d72/users/d83a612e30aa42b18d464c0b2cbd4044/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:07.857 40 INFO tempest.lib.common.rest_client [req-9567df91-504b-4ef9-9619-df53a4b9bb18 ] Request (ServerConsolesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/0cd9895a4bd84f8a859ddbcbf39a0d72/users/d83a612e30aa42b18d464c0b2cbd4044/roles/a629c95d64b3416fb80ae90af4f69c05 0.102s 2020-11-06 17:59:07.857 40 DEBUG tempest.lib.common.rest_client [req-9567df91-504b-4ef9-9619-df53a4b9bb18 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9567df91-504b-4ef9-9619-df53a4b9bb18', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/0cd9895a4bd84f8a859ddbcbf39a0d72/users/d83a612e30aa42b18d464c0b2cbd4044/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:08.033 38 INFO tempest.lib.common.rest_client [req-fdf88bf7-e86f-407d-96b9-2a193e74d8c4 ] Request (ImagesMetadataRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/compute/v2.1/images/f509770f-c3cc-4d83-ac33-eae114f1d0c8/metadata/foo 0.498s 2020-11-06 17:59:08.034 38 DEBUG tempest.lib.common.rest_client [req-fdf88bf7-e86f-407d-96b9-2a193e74d8c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fdf88bf7-e86f-407d-96b9-2a193e74d8c4', 'x-compute-request-id': 'req-fdf88bf7-e86f-407d-96b9-2a193e74d8c4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/images/f509770f-c3cc-4d83-ac33-eae114f1d0c8/metadata/foo'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:08.036 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:08.037 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:08.039 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: modify_image, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:08.078 39 INFO tempest.lib.common.rest_client [req-a52364d6-b147-43a0-81df-bb0bb6f4417e ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.619s 2020-11-06 17:59:08.079 39 DEBUG tempest.lib.common.rest_client [req-a52364d6-b147-43a0-81df-bb0bb6f4417e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-ServerActionsRbacTest-1359272422-network", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b"}} Response - Headers: {'content-type': 'application/json', 'content-length': '737', 'x-openstack-request-id': 'req-a52364d6-b147-43a0-81df-bb0bb6f4417e', 'date': 'Fri, 06 Nov 2020 17:59:08 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"795afc26-787e-4d38-9bc1-bc29e5b00fbc","name":"tempest-ServerActionsRbacTest-1359272422-network","tenant_id":"21ea54a8c99a458890dbfde9b6dc3e3b","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"21ea54a8c99a458890dbfde9b6dc3e3b","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":55,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T17:59:07Z","updated_at":"2020-11-06T17:59:07Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:08.352 38 INFO tempest.lib.common.rest_client [req-7b977fce-1620-4624-bc0b-85e63dccf9db ] Request (ImagesMetadataRbacTest:test_delete_image_metadata_item): 200 PUT http://172.30.13.94/compute/v2.1/images/f509770f-c3cc-4d83-ac33-eae114f1d0c8/metadata 0.312s 2020-11-06 17:59:08.353 38 DEBUG tempest.lib.common.rest_client [req-7b977fce-1620-4624-bc0b-85e63dccf9db ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"foo": "bar"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '28', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7b977fce-1620-4624-bc0b-85e63dccf9db', 'x-compute-request-id': 'req-7b977fce-1620-4624-bc0b-85e63dccf9db', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/f509770f-c3cc-4d83-ac33-eae114f1d0c8/metadata'} Body: b'{"metadata": {"foo": "bar"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:08.355 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:08.474 38 INFO tempest.lib.common.rest_client [req-3da3872e-081e-4f87-aa2c-bb917aff0759 ] Request (ImagesMetadataRbacTest:test_delete_image_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles 0.118s 2020-11-06 17:59:08.475 38 DEBUG tempest.lib.common.rest_client [req-3da3872e-081e-4f87-aa2c-bb917aff0759 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3da3872e-081e-4f87-aa2c-bb917aff0759', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:08.520 37 INFO tempest.lib.common.rest_client [req-897b46cb-3c3f-4635-934d-71b5a914b7bd ] Request (SecurtiyGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.822s 2020-11-06 17:59:08.521 37 DEBUG tempest.lib.common.rest_client [req-897b46cb-3c3f-4635-934d-71b5a914b7bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-SecurtiyGroupsRbacTest-1104925326-network", "tenant_id": "d73ae082cf2c4889915adb0d4efc6f2e"}} Response - Headers: {'content-type': 'application/json', 'content-length': '738', 'x-openstack-request-id': 'req-897b46cb-3c3f-4635-934d-71b5a914b7bd', 'date': 'Fri, 06 Nov 2020 17:59:08 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"944260dd-14a1-4951-9ec4-bb4b5b78dd75","name":"tempest-SecurtiyGroupsRbacTest-1104925326-network","tenant_id":"d73ae082cf2c4889915adb0d4efc6f2e","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"d73ae082cf2c4889915adb0d4efc6f2e","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":57,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T17:59:08Z","updated_at":"2020-11-06T17:59:08Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:08.562 38 INFO tempest.lib.common.rest_client [req-2b43fc95-fa09-497a-9590-ada20a612a80 ] Request (ImagesMetadataRbacTest:test_delete_image_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-11-06 17:59:08.563 38 DEBUG tempest.lib.common.rest_client [req-2b43fc95-fa09-497a-9590-ada20a612a80 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2b43fc95-fa09-497a-9590-ada20a612a80', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c088001f96a442489a91e768768598d4", "name": "tempest-ImagesMetadataRbacTest-1966058629", "password_expires_at": null}, "audit_ids": ["WSvODyazTP6gD17PimScnA"], "expires_at": "2020-11-06T18:59:08.000000Z", "issued_at": "2020-11-06T17:59:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c6fa733c16f543edbc0ec536de535378", "name": "tempest-ImagesMetadataRbacTest-1966058629"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:08.751 39 INFO tempest.lib.common.rest_client [req-ba1a5819-05ca-4485-b531-ca5e9e17dd47 ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.670s 2020-11-06 17:59:08.751 39 DEBUG tempest.lib.common.rest_client [req-ba1a5819-05ca-4485-b531-ca5e9e17dd47 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "795afc26-787e-4d38-9bc1-bc29e5b00fbc", "cidr": "192.168.120.0/28", "name": "tempest-ServerActionsRbacTest-1359272422-subnet", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "enable_dhcp": false, "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '709', 'x-openstack-request-id': 'req-ba1a5819-05ca-4485-b531-ca5e9e17dd47', 'date': 'Fri, 06 Nov 2020 17:59:08 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"ce5d50db-7303-44dd-a6d4-e1f97375f5b1","name":"tempest-ServerActionsRbacTest-1359272422-subnet","tenant_id":"21ea54a8c99a458890dbfde9b6dc3e3b","network_id":"795afc26-787e-4d38-9bc1-bc29e5b00fbc","ip_version":4,"subnetpool_id":null,"enable_dhcp":false,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-11-06T17:59:08Z","updated_at":"2020-11-06T17:59:08Z","revision_number":0,"project_id":"21ea54a8c99a458890dbfde9b6dc3e3b"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:08.942 40 INFO tempest.lib.common.rest_client [req-edda17cb-8879-4a14-8c39-64b28dab9434 ] Request (ServerConsolesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 17:59:08.942 40 DEBUG tempest.lib.common.rest_client [req-edda17cb-8879-4a14-8c39-64b28dab9434 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-edda17cb-8879-4a14-8c39-64b28dab9434', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d83a612e30aa42b18d464c0b2cbd4044", "name": "tempest-ServerConsolesRbacTest-101764086", "password_expires_at": null}, "audit_ids": ["Vg3uc8ZQSjiEBFinFB7j8w"], "expires_at": "2020-11-06T18:59:08.000000Z", "issued_at": "2020-11-06T17:59:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0cd9895a4bd84f8a859ddbcbf39a0d72", "name": "tempest-ServerConsolesRbacTest-101764086"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0cd9895a4bd84f8a859ddbcbf39a0d72", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0cd9895a4bd84f8a859ddbcbf39a0d72", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0cd9895a4bd84f8a859ddbcbf39a0d72", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cd9895a4bd84f8a859ddbcbf39a0d72", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cd9895a4bd84f8a859ddbcbf39a0d72", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cd9895a4bd84f8a859ddbcbf39a0d72", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:08.994 40 INFO tempest.lib.common.rest_client [req-59e51ab8-47bc-4e67-b73d-304b895d97e4 ] Request (ServerConsolesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 17:59:08.995 40 DEBUG tempest.lib.common.rest_client [req-59e51ab8-47bc-4e67-b73d-304b895d97e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-59e51ab8-47bc-4e67-b73d-304b895d97e4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d83a612e30aa42b18d464c0b2cbd4044", "name": "tempest-ServerConsolesRbacTest-101764086", "password_expires_at": null}, "audit_ids": ["QV_wdi9jSLenphzb1mFCtw"], "expires_at": "2020-11-06T18:59:08.000000Z", "issued_at": "2020-11-06T17:59:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0cd9895a4bd84f8a859ddbcbf39a0d72", "name": "tempest-ServerConsolesRbacTest-101764086"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0cd9895a4bd84f8a859ddbcbf39a0d72", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0cd9895a4bd84f8a859ddbcbf39a0d72", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0cd9895a4bd84f8a859ddbcbf39a0d72", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cd9895a4bd84f8a859ddbcbf39a0d72", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cd9895a4bd84f8a859ddbcbf39a0d72", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cd9895a4bd84f8a859ddbcbf39a0d72", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:08.996 40 INFO tempest.lib.common.fixed_network [-] (ServerConsolesRbacTest:setUpClass) Found network {'id': 'bb0f3cc3-8583-431c-af3d-9b99d0b951fd', 'name': 'tempest-ServerConsolesRbacTest-1753510296-network', 'tenant_id': '0cd9895a4bd84f8a859ddbcbf39a0d72', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '0cd9895a4bd84f8a859ddbcbf39a0d72', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 49, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T17:59:03Z', 'updated_at': '2020-11-06T17:59:03Z', 'revision_number': 1} available for tenant 2020-11-06 17:59:09.087 38 INFO tempest.lib.common.rest_client [req-4bf7b7a8-2ec1-44dd-925d-365084c400f3 ] Request (ImagesMetadataRbacTest:test_delete_image_metadata_item): 204 DELETE http://172.30.13.94/compute/v2.1/images/f509770f-c3cc-4d83-ac33-eae114f1d0c8/metadata/foo 0.523s 2020-11-06 17:59:09.088 38 DEBUG tempest.lib.common.rest_client [req-4bf7b7a8-2ec1-44dd-925d-365084c400f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4bf7b7a8-2ec1-44dd-925d-365084c400f3', 'x-compute-request-id': 'req-4bf7b7a8-2ec1-44dd-925d-365084c400f3', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/images/f509770f-c3cc-4d83-ac33-eae114f1d0c8/metadata/foo'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:09.089 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:09.151 38 INFO tempest.lib.common.rest_client [req-4a0aa31a-5090-4c79-a2fb-aabb75597169 ] Request (ImagesMetadataRbacTest:test_delete_image_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles 0.061s 2020-11-06 17:59:09.151 38 DEBUG tempest.lib.common.rest_client [req-4a0aa31a-5090-4c79-a2fb-aabb75597169 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4a0aa31a-5090-4c79-a2fb-aabb75597169', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:09.187 38 INFO tempest.lib.common.rest_client [req-61552471-8bd2-4fc3-8833-b45c68152aef ] Request (ImagesMetadataRbacTest:test_delete_image_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 17:59:09.187 38 DEBUG tempest.lib.common.rest_client [req-61552471-8bd2-4fc3-8833-b45c68152aef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-61552471-8bd2-4fc3-8833-b45c68152aef', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c088001f96a442489a91e768768598d4", "name": "tempest-ImagesMetadataRbacTest-1966058629", "password_expires_at": null}, "audit_ids": ["HT0X6DZtQPyhut6e-CxGdg"], "expires_at": "2020-11-06T18:59:09.000000Z", "issued_at": "2020-11-06T17:59:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c6fa733c16f543edbc0ec536de535378", "name": "tempest-ImagesMetadataRbacTest-1966058629"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:09.311 38 INFO tempest.lib.common.rest_client [req-1f12fb4f-f8e8-47d5-9184-151bec15fe72 ] Request (ImagesMetadataRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/compute/v2.1/images/f509770f-c3cc-4d83-ac33-eae114f1d0c8/metadata/foo 0.121s 2020-11-06 17:59:09.311 38 DEBUG tempest.lib.common.rest_client [req-1f12fb4f-f8e8-47d5-9184-151bec15fe72 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '66', 'x-openstack-request-id': 'req-1f12fb4f-f8e8-47d5-9184-151bec15fe72', 'x-compute-request-id': 'req-1f12fb4f-f8e8-47d5-9184-151bec15fe72', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/images/f509770f-c3cc-4d83-ac33-eae114f1d0c8/metadata/foo'} Body: b'{"itemNotFound": {"code": 404, "message": "Invalid metadata key"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:09.314 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:09.314 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:09.315 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_image, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:09.315 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:09.367 38 INFO tempest.lib.common.rest_client [req-fe43c379-3943-48ff-a631-30fa4bf057a2 ] Request (ImagesMetadataRbacTest:test_list_image_metadata): 200 GET http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles 0.051s 2020-11-06 17:59:09.368 38 DEBUG tempest.lib.common.rest_client [req-fe43c379-3943-48ff-a631-30fa4bf057a2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fe43c379-3943-48ff-a631-30fa4bf057a2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:09.403 38 INFO tempest.lib.common.rest_client [req-c26ff2cf-332d-4391-b4bf-d5ee5acd4919 ] Request (ImagesMetadataRbacTest:test_list_image_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 17:59:09.404 38 DEBUG tempest.lib.common.rest_client [req-c26ff2cf-332d-4391-b4bf-d5ee5acd4919 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c26ff2cf-332d-4391-b4bf-d5ee5acd4919', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c088001f96a442489a91e768768598d4", "name": "tempest-ImagesMetadataRbacTest-1966058629", "password_expires_at": null}, "audit_ids": ["RdDlZ71SRAmXNsceMWmxsg"], "expires_at": "2020-11-06T18:59:09.000000Z", "issued_at": "2020-11-06T17:59:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c6fa733c16f543edbc0ec536de535378", "name": "tempest-ImagesMetadataRbacTest-1966058629"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:09.499 37 INFO tempest.lib.common.rest_client [req-5d6eb30a-c397-48c6-81ee-9dd1984c65c2 ] Request (SecurtiyGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.977s 2020-11-06 17:59:09.500 37 DEBUG tempest.lib.common.rest_client [req-5d6eb30a-c397-48c6-81ee-9dd1984c65c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "944260dd-14a1-4951-9ec4-bb4b5b78dd75", "cidr": "192.168.120.0/28", "name": "tempest-SecurtiyGroupsRbacTest-1104925326-subnet", "tenant_id": "d73ae082cf2c4889915adb0d4efc6f2e", "enable_dhcp": false, "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '710', 'x-openstack-request-id': 'req-5d6eb30a-c397-48c6-81ee-9dd1984c65c2', 'date': 'Fri, 06 Nov 2020 17:59:09 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"89b8726c-972f-44ae-a421-f10ed9d5036c","name":"tempest-SecurtiyGroupsRbacTest-1104925326-subnet","tenant_id":"d73ae082cf2c4889915adb0d4efc6f2e","network_id":"944260dd-14a1-4951-9ec4-bb4b5b78dd75","ip_version":4,"subnetpool_id":null,"enable_dhcp":false,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-11-06T17:59:08Z","updated_at":"2020-11-06T17:59:08Z","revision_number":0,"project_id":"d73ae082cf2c4889915adb0d4efc6f2e"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:09.500 37 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SecurtiyGroupsRbacTest-66962389', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'd73ae082cf2c4889915adb0d4efc6f2e', 'project_name': 'tempest-SecurtiyGroupsRbacTest-66962389', 'tenant_id': 'd73ae082cf2c4889915adb0d4efc6f2e', 'tenant_name': 'tempest-SecurtiyGroupsRbacTest-66962389', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'eabd533369674823b012ab299376bbb3'}, Network: {'id': '944260dd-14a1-4951-9ec4-bb4b5b78dd75', 'name': 'tempest-SecurtiyGroupsRbacTest-1104925326-network', 'tenant_id': 'd73ae082cf2c4889915adb0d4efc6f2e', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': 'd73ae082cf2c4889915adb0d4efc6f2e', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 57, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T17:59:08Z', 'updated_at': '2020-11-06T17:59:08Z', 'revision_number': 1}, Subnet: {'id': '89b8726c-972f-44ae-a421-f10ed9d5036c', 'name': 'tempest-SecurtiyGroupsRbacTest-1104925326-subnet', 'tenant_id': 'd73ae082cf2c4889915adb0d4efc6f2e', 'network_id': '944260dd-14a1-4951-9ec4-bb4b5b78dd75', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-11-06T17:59:08Z', 'updated_at': '2020-11-06T17:59:08Z', 'revision_number': 0, 'project_id': 'd73ae082cf2c4889915adb0d4efc6f2e'}, Router: None 2020-11-06 17:59:09.536 38 INFO tempest.lib.common.rest_client [req-a7e02c89-aae7-4de4-8f25-ecb9a274cf8c ] Request (ImagesMetadataRbacTest:test_list_image_metadata): 200 GET http://172.30.13.94/compute/v2.1/images/f509770f-c3cc-4d83-ac33-eae114f1d0c8/metadata 0.130s 2020-11-06 17:59:09.536 38 DEBUG tempest.lib.common.rest_client [req-a7e02c89-aae7-4de4-8f25-ecb9a274cf8c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '16', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a7e02c89-aae7-4de4-8f25-ecb9a274cf8c', 'x-compute-request-id': 'req-a7e02c89-aae7-4de4-8f25-ecb9a274cf8c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/f509770f-c3cc-4d83-ac33-eae114f1d0c8/metadata'} Body: b'{"metadata": {}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:09.540 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:09.591 38 INFO tempest.lib.common.rest_client [req-2b1c9bfc-4853-47ed-8817-38281ed30347 ] Request (ImagesMetadataRbacTest:test_list_image_metadata): 200 GET http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles 0.050s 2020-11-06 17:59:09.592 38 DEBUG tempest.lib.common.rest_client [req-2b1c9bfc-4853-47ed-8817-38281ed30347 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2b1c9bfc-4853-47ed-8817-38281ed30347', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:09.632 37 INFO tempest.lib.common.rest_client [req-eadff00b-1b53-4320-9d5c-dab5b84dc41c ] Request (SecurtiyGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.122s 2020-11-06 17:59:09.633 37 DEBUG tempest.lib.common.rest_client [req-eadff00b-1b53-4320-9d5c-dab5b84dc41c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6571', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eadff00b-1b53-4320-9d5c-dab5b84dc41c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eabd533369674823b012ab299376bbb3", "name": "tempest-SecurtiyGroupsRbacTest-66962389", "password_expires_at": null}, "audit_ids": ["UR5Vg5EiSR2YSvD-hpmSoA"], "expires_at": "2020-11-06T18:59:09.000000Z", "issued_at": "2020-11-06T17:59:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d73ae082cf2c4889915adb0d4efc6f2e", "name": "tempest-SecurtiyGroupsRbacTest-66962389"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:09.635 38 INFO tempest.lib.common.rest_client [req-ecbf5186-f34b-498f-9a53-40a04a09e81f ] Request (ImagesMetadataRbacTest:test_list_image_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-11-06 17:59:09.635 38 DEBUG tempest.lib.common.rest_client [req-ecbf5186-f34b-498f-9a53-40a04a09e81f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ecbf5186-f34b-498f-9a53-40a04a09e81f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c088001f96a442489a91e768768598d4", "name": "tempest-ImagesMetadataRbacTest-1966058629", "password_expires_at": null}, "audit_ids": ["hyFT3eV8SyOfcJJ33oOLSg"], "expires_at": "2020-11-06T18:59:09.000000Z", "issued_at": "2020-11-06T17:59:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c6fa733c16f543edbc0ec536de535378", "name": "tempest-ImagesMetadataRbacTest-1966058629"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:09.638 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:09.639 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:09.641 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_image, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:09.677 37 INFO tempest.lib.common.rest_client [req-2591f223-f077-435b-b63d-ab118b9726cb ] Request (SecurtiyGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-11-06 17:59:09.677 37 DEBUG tempest.lib.common.rest_client [req-2591f223-f077-435b-b63d-ab118b9726cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2591f223-f077-435b-b63d-ab118b9726cb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["Q7onIA8aQVOw4-QgnDqXHA"], "expires_at": "2020-11-06T18:59:09.000000Z", "issued_at": "2020-11-06T17:59:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:09.726 37 INFO tempest.lib.common.rest_client [req-77d27136-5cc9-4136-85bc-e3573d663768 ] Request (SecurtiyGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 17:59:09.727 37 DEBUG tempest.lib.common.rest_client [req-77d27136-5cc9-4136-85bc-e3573d663768 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-77d27136-5cc9-4136-85bc-e3573d663768', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["yFdMlcsCQkyu8XCPMeoy_Q"], "expires_at": "2020-11-06T18:59:09.000000Z", "issued_at": "2020-11-06T17:59:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:09.780 37 INFO tempest.lib.common.rest_client [req-c4e5cec5-9808-4106-8cb8-25d7972e3a75 ] Request (SecurtiyGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.052s 2020-11-06 17:59:09.781 37 DEBUG tempest.lib.common.rest_client [req-c4e5cec5-9808-4106-8cb8-25d7972e3a75 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c4e5cec5-9808-4106-8cb8-25d7972e3a75', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:09.797 40 INFO tempest.lib.common.rest_client [req-20ff2656-b5c4-418c-b71c-17117c4bde8b ] Request (ServerConsolesRbacTest:setUpClass): 202 POST http://172.30.13.94/compute/v2.1/servers 0.800s 2020-11-06 17:59:09.798 40 DEBUG tempest.lib.common.rest_client [req-20ff2656-b5c4-418c-b71c-17117c4bde8b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-ServerConsolesRbacTest-server-1714121832", "imageRef": "56b368f6-9136-40ec-a04c-564d02c95e42", "flavorRef": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "networks": [{"uuid": "bb0f3cc3-8583-431c-af3d-9b99d0b951fd"}]}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-20ff2656-b5c4-418c-b71c-17117c4bde8b', 'x-compute-request-id': 'req-20ff2656-b5c4-418c-b71c-17117c4bde8b', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "91c916c9-7f91-4941-b349-0e62b28deaa9", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/91c916c9-7f91-4941-b349-0e62b28deaa9"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "8JRbJBBv88ZZ"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:09.835 37 INFO tempest.lib.common.rest_client [req-f3b8f366-9081-4c7f-ba8a-347dcbac40b0 ] Request (SecurtiyGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.054s 2020-11-06 17:59:09.836 37 DEBUG tempest.lib.common.rest_client [req-f3b8f366-9081-4c7f-ba8a-347dcbac40b0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f3b8f366-9081-4c7f-ba8a-347dcbac40b0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:09.837 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 17:59:09.837 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:09.891 37 INFO tempest.lib.common.rest_client [req-8c8a7a51-eda9-4eeb-8d37-cff5537543f2 ] Request (SecurtiyGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/d73ae082cf2c4889915adb0d4efc6f2e/users/eabd533369674823b012ab299376bbb3/roles 0.053s 2020-11-06 17:59:09.892 37 DEBUG tempest.lib.common.rest_client [req-8c8a7a51-eda9-4eeb-8d37-cff5537543f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8c8a7a51-eda9-4eeb-8d37-cff5537543f2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d73ae082cf2c4889915adb0d4efc6f2e/users/eabd533369674823b012ab299376bbb3/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d73ae082cf2c4889915adb0d4efc6f2e/users/eabd533369674823b012ab299376bbb3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:09.920 40 INFO tempest.lib.common.rest_client [req-563c3296-0bde-4e0e-8fbf-02f71cb939a1 ] Request (ServerConsolesRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9 0.116s 2020-11-06 17:59:09.920 40 DEBUG tempest.lib.common.rest_client [req-563c3296-0bde-4e0e-8fbf-02f71cb939a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1398', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-563c3296-0bde-4e0e-8fbf-02f71cb939a1', 'x-compute-request-id': 'req-563c3296-0bde-4e0e-8fbf-02f71cb939a1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9'} Body: b'{"server": {"id": "91c916c9-7f91-4941-b349-0e62b28deaa9", "name": "tempest-ServerConsolesRbacTest-server-1714121832", "status": "BUILD", "tenant_id": "0cd9895a4bd84f8a859ddbcbf39a0d72", "user_id": "d83a612e30aa42b18d464c0b2cbd4044", "metadata": {}, "hostId": "", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:10Z", "updated": "2020-11-06T17:59:09Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/91c916c9-7f91-4941-b349-0e62b28deaa9"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:09.952 37 INFO tempest.lib.common.rest_client [req-fe1524a0-0c81-43ec-b914-1ec0e86fa83c ] Request (SecurtiyGroupsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/d73ae082cf2c4889915adb0d4efc6f2e/users/eabd533369674823b012ab299376bbb3/roles/72a4576c553448cd941b052c1ca0cf2d 0.059s 2020-11-06 17:59:09.953 37 DEBUG tempest.lib.common.rest_client [req-fe1524a0-0c81-43ec-b914-1ec0e86fa83c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fe1524a0-0c81-43ec-b914-1ec0e86fa83c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d73ae082cf2c4889915adb0d4efc6f2e/users/eabd533369674823b012ab299376bbb3/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:10.024 38 INFO tempest.lib.common.rest_client [req-571960a1-0c78-4bba-907a-73b923564a15 ] Request (ImagesMetadataRbacTest:test_show_image_metadata_item): 200 PUT http://172.30.13.94/compute/v2.1/images/f509770f-c3cc-4d83-ac33-eae114f1d0c8/metadata 0.382s 2020-11-06 17:59:10.025 38 DEBUG tempest.lib.common.rest_client [req-571960a1-0c78-4bba-907a-73b923564a15 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"foo": "bar"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '28', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-571960a1-0c78-4bba-907a-73b923564a15', 'x-compute-request-id': 'req-571960a1-0c78-4bba-907a-73b923564a15', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/f509770f-c3cc-4d83-ac33-eae114f1d0c8/metadata'} Body: b'{"metadata": {"foo": "bar"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:10.027 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:10.077 39 INFO tempest.lib.common.rest_client [req-a80ae3a0-3be0-402c-b8b7-1e18df6e9af8 ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/routers 1.324s 2020-11-06 17:59:10.078 39 DEBUG tempest.lib.common.rest_client [req-a80ae3a0-3be0-402c-b8b7-1e18df6e9af8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-ServerActionsRbacTest-1359272422-router", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea"}}} Response - Headers: {'content-type': 'application/json', 'content-length': '810', 'x-openstack-request-id': 'req-a80ae3a0-3be0-402c-b8b7-1e18df6e9af8', 'date': 'Fri, 06 Nov 2020 17:59:10 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "22e042aa-7bfd-41c7-9427-707624ddf3ce", "name": "tempest-ServerActionsRbacTest-1359272422-router", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.17"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::3bd"}], "enable_snat": true}, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T17:59:08Z", "updated_at": "2020-11-06T17:59:09Z", "revision_number": 3, "project_id": "21ea54a8c99a458890dbfde9b6dc3e3b"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:10.092 37 INFO tempest.lib.common.rest_client [req-93902c1c-c84b-4a60-9785-93adc6deb10c ] Request (SecurtiyGroupsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/d73ae082cf2c4889915adb0d4efc6f2e/users/eabd533369674823b012ab299376bbb3/roles/a629c95d64b3416fb80ae90af4f69c05 0.138s 2020-11-06 17:59:10.092 37 DEBUG tempest.lib.common.rest_client [req-93902c1c-c84b-4a60-9785-93adc6deb10c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-93902c1c-c84b-4a60-9785-93adc6deb10c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d73ae082cf2c4889915adb0d4efc6f2e/users/eabd533369674823b012ab299376bbb3/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:10.136 38 INFO tempest.lib.common.rest_client [req-f6472f94-771f-476f-883d-2b5f3c3bcf01 ] Request (ImagesMetadataRbacTest:test_show_image_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles 0.108s 2020-11-06 17:59:10.137 38 DEBUG tempest.lib.common.rest_client [req-f6472f94-771f-476f-883d-2b5f3c3bcf01 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f6472f94-771f-476f-883d-2b5f3c3bcf01', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:10.229 38 INFO tempest.lib.common.rest_client [req-c97b5343-9e7c-4e1b-bcb9-356d0ba7837a ] Request (ImagesMetadataRbacTest:test_show_image_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-11-06 17:59:10.230 38 DEBUG tempest.lib.common.rest_client [req-c97b5343-9e7c-4e1b-bcb9-356d0ba7837a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c97b5343-9e7c-4e1b-bcb9-356d0ba7837a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c088001f96a442489a91e768768598d4", "name": "tempest-ImagesMetadataRbacTest-1966058629", "password_expires_at": null}, "audit_ids": ["Pm9kwPUATkmHkLInIMvzHQ"], "expires_at": "2020-11-06T18:59:10.000000Z", "issued_at": "2020-11-06T17:59:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c6fa733c16f543edbc0ec536de535378", "name": "tempest-ImagesMetadataRbacTest-1966058629"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:10.431 38 INFO tempest.lib.common.rest_client [req-6017adb2-86c5-43f4-bc1a-52dfcbb900e8 ] Request (ImagesMetadataRbacTest:test_show_image_metadata_item): 200 GET http://172.30.13.94/compute/v2.1/images/f509770f-c3cc-4d83-ac33-eae114f1d0c8/metadata/foo 0.199s 2020-11-06 17:59:10.432 38 DEBUG tempest.lib.common.rest_client [req-6017adb2-86c5-43f4-bc1a-52dfcbb900e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '24', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6017adb2-86c5-43f4-bc1a-52dfcbb900e8', 'x-compute-request-id': 'req-6017adb2-86c5-43f4-bc1a-52dfcbb900e8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/f509770f-c3cc-4d83-ac33-eae114f1d0c8/metadata/foo'} Body: b'{"meta": {"foo": "bar"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:10.434 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:10.542 38 INFO tempest.lib.common.rest_client [req-74489d91-f762-44bd-9dff-cf41dc8950af ] Request (ImagesMetadataRbacTest:test_show_image_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles 0.107s 2020-11-06 17:59:10.543 38 DEBUG tempest.lib.common.rest_client [req-74489d91-f762-44bd-9dff-cf41dc8950af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-74489d91-f762-44bd-9dff-cf41dc8950af', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:10.673 38 INFO tempest.lib.common.rest_client [req-60dbb277-658e-432d-bffd-789522936181 ] Request (ImagesMetadataRbacTest:test_show_image_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.129s 2020-11-06 17:59:10.674 38 DEBUG tempest.lib.common.rest_client [req-60dbb277-658e-432d-bffd-789522936181 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-60dbb277-658e-432d-bffd-789522936181', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c088001f96a442489a91e768768598d4", "name": "tempest-ImagesMetadataRbacTest-1966058629", "password_expires_at": null}, "audit_ids": ["EZyLaQxMSwa5VWGZxkIngg"], "expires_at": "2020-11-06T18:59:10.000000Z", "issued_at": "2020-11-06T17:59:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c6fa733c16f543edbc0ec536de535378", "name": "tempest-ImagesMetadataRbacTest-1966058629"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:11.063 38 INFO tempest.lib.common.rest_client [req-d51f6c37-e368-4af5-9832-016b84e7ff0c ] Request (ImagesMetadataRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/compute/v2.1/images/f509770f-c3cc-4d83-ac33-eae114f1d0c8/metadata/foo 0.387s 2020-11-06 17:59:11.064 38 DEBUG tempest.lib.common.rest_client [req-d51f6c37-e368-4af5-9832-016b84e7ff0c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d51f6c37-e368-4af5-9832-016b84e7ff0c', 'x-compute-request-id': 'req-d51f6c37-e368-4af5-9832-016b84e7ff0c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/images/f509770f-c3cc-4d83-ac33-eae114f1d0c8/metadata/foo'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:11.065 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:11.066 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:11.067 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: modify_image, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:11.067 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:11.091 40 INFO tempest.lib.common.rest_client [req-41ea3e25-6fcb-4f0c-9301-cd2d1e8f6c02 ] Request (ServerConsolesRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9 0.157s 2020-11-06 17:59:11.092 40 DEBUG tempest.lib.common.rest_client [req-41ea3e25-6fcb-4f0c-9301-cd2d1e8f6c02 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1485', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-41ea3e25-6fcb-4f0c-9301-cd2d1e8f6c02', 'x-compute-request-id': 'req-41ea3e25-6fcb-4f0c-9301-cd2d1e8f6c02', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9'} Body: b'{"server": {"id": "91c916c9-7f91-4941-b349-0e62b28deaa9", "name": "tempest-ServerConsolesRbacTest-server-1714121832", "status": "BUILD", "tenant_id": "0cd9895a4bd84f8a859ddbcbf39a0d72", "user_id": "d83a612e30aa42b18d464c0b2cbd4044", "metadata": {}, "hostId": "1c6caf91203d31288fb481147bb6ec456942b48a789c1a8e4f462b48", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:09Z", "updated": "2020-11-06T17:59:10Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/91c916c9-7f91-4941-b349-0e62b28deaa9"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:11.106 40 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/None" after 2 second wait 2020-11-06 17:59:11.126 38 INFO tempest.lib.common.rest_client [req-b55073c6-f6bb-4938-9702-af61446465d9 ] Request (ImagesMetadataRbacTest:test_update_image_metadata): 200 GET http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles 0.057s 2020-11-06 17:59:11.126 38 DEBUG tempest.lib.common.rest_client [req-b55073c6-f6bb-4938-9702-af61446465d9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b55073c6-f6bb-4938-9702-af61446465d9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:11.156 38 INFO tempest.lib.common.rest_client [req-6e1440ff-07b9-4228-af15-d2cd11714cbc ] Request (ImagesMetadataRbacTest:test_update_image_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.028s 2020-11-06 17:59:11.156 38 DEBUG tempest.lib.common.rest_client [req-6e1440ff-07b9-4228-af15-d2cd11714cbc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6e1440ff-07b9-4228-af15-d2cd11714cbc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c088001f96a442489a91e768768598d4", "name": "tempest-ImagesMetadataRbacTest-1966058629", "password_expires_at": null}, "audit_ids": ["pbyn-mMnS_qi8midxc_VCA"], "expires_at": "2020-11-06T18:59:11.000000Z", "issued_at": "2020-11-06T17:59:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c6fa733c16f543edbc0ec536de535378", "name": "tempest-ImagesMetadataRbacTest-1966058629"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:11.183 37 INFO tempest.lib.common.rest_client [req-b004c630-4334-403e-9865-b2ed537319b3 ] Request (SecurtiyGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-11-06 17:59:11.183 37 DEBUG tempest.lib.common.rest_client [req-b004c630-4334-403e-9865-b2ed537319b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b004c630-4334-403e-9865-b2ed537319b3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eabd533369674823b012ab299376bbb3", "name": "tempest-SecurtiyGroupsRbacTest-66962389", "password_expires_at": null}, "audit_ids": ["rlA0rz1dQ5agltObW22XNw"], "expires_at": "2020-11-06T18:59:11.000000Z", "issued_at": "2020-11-06T17:59:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d73ae082cf2c4889915adb0d4efc6f2e", "name": "tempest-SecurtiyGroupsRbacTest-66962389"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:11.235 37 INFO tempest.lib.common.rest_client [req-0b84dc3a-bd5b-47a2-87a8-acadd6af0a1f ] Request (SecurtiyGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 17:59:11.235 37 DEBUG tempest.lib.common.rest_client [req-0b84dc3a-bd5b-47a2-87a8-acadd6af0a1f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0b84dc3a-bd5b-47a2-87a8-acadd6af0a1f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eabd533369674823b012ab299376bbb3", "name": "tempest-SecurtiyGroupsRbacTest-66962389", "password_expires_at": null}, "audit_ids": ["g67jxEHvTxau-2Fcf_wMqQ"], "expires_at": "2020-11-06T18:59:11.000000Z", "issued_at": "2020-11-06T17:59:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d73ae082cf2c4889915adb0d4efc6f2e", "name": "tempest-SecurtiyGroupsRbacTest-66962389"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:11.236 37 INFO tempest.lib.common.fixed_network [-] (SecurtiyGroupsRbacTest:setUpClass) Found network {'id': '944260dd-14a1-4951-9ec4-bb4b5b78dd75', 'name': 'tempest-SecurtiyGroupsRbacTest-1104925326-network', 'tenant_id': 'd73ae082cf2c4889915adb0d4efc6f2e', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': 'd73ae082cf2c4889915adb0d4efc6f2e', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 57, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T17:59:08Z', 'updated_at': '2020-11-06T17:59:08Z', 'revision_number': 1} available for tenant 2020-11-06 17:59:11.543 38 INFO tempest.lib.common.rest_client [req-9a3c9794-e8ee-4b5a-9cd7-523dfc3f0b03 ] Request (ImagesMetadataRbacTest:test_update_image_metadata): 200 PUT http://172.30.13.94/compute/v2.1/images/f509770f-c3cc-4d83-ac33-eae114f1d0c8/metadata 0.386s 2020-11-06 17:59:11.544 38 DEBUG tempest.lib.common.rest_client [req-9a3c9794-e8ee-4b5a-9cd7-523dfc3f0b03 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"foo": "bar"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '28', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9a3c9794-e8ee-4b5a-9cd7-523dfc3f0b03', 'x-compute-request-id': 'req-9a3c9794-e8ee-4b5a-9cd7-523dfc3f0b03', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/f509770f-c3cc-4d83-ac33-eae114f1d0c8/metadata'} Body: b'{"metadata": {"foo": "bar"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:11.547 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:11.595 38 INFO tempest.lib.common.rest_client [req-c2a7b45d-692e-4adb-990f-4cfc8fc692e7 ] Request (ImagesMetadataRbacTest:test_update_image_metadata): 200 GET http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles 0.047s 2020-11-06 17:59:11.595 38 DEBUG tempest.lib.common.rest_client [req-c2a7b45d-692e-4adb-990f-4cfc8fc692e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c2a7b45d-692e-4adb-990f-4cfc8fc692e7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:11.629 38 INFO tempest.lib.common.rest_client [req-b8e1e24e-76e0-4c96-9f7a-0e9ec577b728 ] Request (ImagesMetadataRbacTest:test_update_image_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 17:59:11.630 38 DEBUG tempest.lib.common.rest_client [req-b8e1e24e-76e0-4c96-9f7a-0e9ec577b728 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b8e1e24e-76e0-4c96-9f7a-0e9ec577b728', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c088001f96a442489a91e768768598d4", "name": "tempest-ImagesMetadataRbacTest-1966058629", "password_expires_at": null}, "audit_ids": ["HF_nvdp1RPm96r4cxvdr1Q"], "expires_at": "2020-11-06T18:59:11.000000Z", "issued_at": "2020-11-06T17:59:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c6fa733c16f543edbc0ec536de535378", "name": "tempest-ImagesMetadataRbacTest-1966058629"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:11.970 38 INFO tempest.lib.common.rest_client [req-968de7e1-80b8-4d5f-afdd-b53b1314285f ] Request (ImagesMetadataRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/compute/v2.1/images/f509770f-c3cc-4d83-ac33-eae114f1d0c8/metadata/foo 0.339s 2020-11-06 17:59:11.971 38 DEBUG tempest.lib.common.rest_client [req-968de7e1-80b8-4d5f-afdd-b53b1314285f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-968de7e1-80b8-4d5f-afdd-b53b1314285f', 'x-compute-request-id': 'req-968de7e1-80b8-4d5f-afdd-b53b1314285f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/images/f509770f-c3cc-4d83-ac33-eae114f1d0c8/metadata/foo'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:11.973 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:11.974 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:11.976 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: modify_image, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:11.976 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:12.036 38 INFO tempest.lib.common.rest_client [req-4195b4b0-5327-42b3-bfe7-e5d45e2f3cb7 ] Request (ImagesMetadataRbacTest:test_update_image_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles 0.058s 2020-11-06 17:59:12.036 38 DEBUG tempest.lib.common.rest_client [req-4195b4b0-5327-42b3-bfe7-e5d45e2f3cb7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4195b4b0-5327-42b3-bfe7-e5d45e2f3cb7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:12.075 38 INFO tempest.lib.common.rest_client [req-6ce3e554-a789-4564-bccf-c247a4f13d17 ] Request (ImagesMetadataRbacTest:test_update_image_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 17:59:12.075 38 DEBUG tempest.lib.common.rest_client [req-6ce3e554-a789-4564-bccf-c247a4f13d17 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6ce3e554-a789-4564-bccf-c247a4f13d17', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c088001f96a442489a91e768768598d4", "name": "tempest-ImagesMetadataRbacTest-1966058629", "password_expires_at": null}, "audit_ids": ["Tuf3Lq4BTfyHgo5F4NK0Gw"], "expires_at": "2020-11-06T18:59:12.000000Z", "issued_at": "2020-11-06T17:59:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c6fa733c16f543edbc0ec536de535378", "name": "tempest-ImagesMetadataRbacTest-1966058629"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:12.106 39 INFO tempest.lib.common.rest_client [req-5325ece2-dfde-497c-8c3a-47fb238117ad ] Request (ServerActionsRbacTest:setUpClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/22e042aa-7bfd-41c7-9427-707624ddf3ce/add_router_interface 2.027s 2020-11-06 17:59:12.107 39 DEBUG tempest.lib.common.rest_client [req-5325ece2-dfde-497c-8c3a-47fb238117ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "ce5d50db-7303-44dd-a6d4-e1f97375f5b1"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-5325ece2-dfde-497c-8c3a-47fb238117ad', 'date': 'Fri, 06 Nov 2020 17:59:12 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/22e042aa-7bfd-41c7-9427-707624ddf3ce/add_router_interface'} Body: b'{"id": "22e042aa-7bfd-41c7-9427-707624ddf3ce", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "port_id": "53a4337b-bc36-4308-9dd6-73ef91c8bd27", "network_id": "795afc26-787e-4d38-9bc1-bc29e5b00fbc", "subnet_id": "ce5d50db-7303-44dd-a6d4-e1f97375f5b1", "subnet_ids": ["ce5d50db-7303-44dd-a6d4-e1f97375f5b1"]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:12.107 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerActionsRbacTest-1280955528', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '21ea54a8c99a458890dbfde9b6dc3e3b', 'project_name': 'tempest-ServerActionsRbacTest-1280955528', 'tenant_id': '21ea54a8c99a458890dbfde9b6dc3e3b', 'tenant_name': 'tempest-ServerActionsRbacTest-1280955528', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '13cdadce7fc24a938ce27cd5ee7c066f'}, Network: {'id': '795afc26-787e-4d38-9bc1-bc29e5b00fbc', 'name': 'tempest-ServerActionsRbacTest-1359272422-network', 'tenant_id': '21ea54a8c99a458890dbfde9b6dc3e3b', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '21ea54a8c99a458890dbfde9b6dc3e3b', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 55, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T17:59:07Z', 'updated_at': '2020-11-06T17:59:07Z', 'revision_number': 1}, Subnet: {'id': 'ce5d50db-7303-44dd-a6d4-e1f97375f5b1', 'name': 'tempest-ServerActionsRbacTest-1359272422-subnet', 'tenant_id': '21ea54a8c99a458890dbfde9b6dc3e3b', 'network_id': '795afc26-787e-4d38-9bc1-bc29e5b00fbc', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-11-06T17:59:08Z', 'updated_at': '2020-11-06T17:59:08Z', 'revision_number': 0, 'project_id': '21ea54a8c99a458890dbfde9b6dc3e3b'}, Router: {'id': '22e042aa-7bfd-41c7-9427-707624ddf3ce', 'name': 'tempest-ServerActionsRbacTest-1359272422-router', 'tenant_id': '21ea54a8c99a458890dbfde9b6dc3e3b', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.17'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::3bd'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-11-06T17:59:08Z', 'updated_at': '2020-11-06T17:59:09Z', 'revision_number': 3, 'project_id': '21ea54a8c99a458890dbfde9b6dc3e3b'} 2020-11-06 17:59:12.221 39 INFO tempest.lib.common.rest_client [req-0353f6cd-beeb-4639-8010-8e232930b8fd ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-11-06 17:59:12.222 39 DEBUG tempest.lib.common.rest_client [req-0353f6cd-beeb-4639-8010-8e232930b8fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6573', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0353f6cd-beeb-4639-8010-8e232930b8fd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["5cAMzDF5S7OHk2DT1QDL7g"], "expires_at": "2020-11-06T18:59:12.000000Z", "issued_at": "2020-11-06T17:59:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://1 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:12.283 39 INFO tempest.lib.common.rest_client [req-7f594493-b676-43e0-a717-f0148615fdb0 ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.060s 2020-11-06 17:59:12.284 39 DEBUG tempest.lib.common.rest_client [req-7f594493-b676-43e0-a717-f0148615fdb0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ServerActionsRbacTest-627976037-desc", "domain_id": "default", "name": "tempest-ServerActionsRbacTest-627976037"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '378', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7f594493-b676-43e0-a717-f0148615fdb0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "c58012c4ddf74aae9fa1e0ca958b3b2f", "name": "tempest-ServerActionsRbacTest-627976037", "domain_id": "default", "description": "tempest-ServerActionsRbacTest-627976037-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/c58012c4ddf74aae9fa1e0ca958b3b2f"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:12.369 40 INFO tempest.lib.common.rest_client [req-7866f0d4-8ca5-4fac-8b74-c16974a17bb9 ] Request (ServerConsolesRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9 0.261s 2020-11-06 17:59:12.370 40 DEBUG tempest.lib.common.rest_client [req-7866f0d4-8ca5-4fac-8b74-c16974a17bb9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1533', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7866f0d4-8ca5-4fac-8b74-c16974a17bb9', 'x-compute-request-id': 'req-7866f0d4-8ca5-4fac-8b74-c16974a17bb9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9'} Body: b'{"server": {"id": "91c916c9-7f91-4941-b349-0e62b28deaa9", "name": "tempest-ServerConsolesRbacTest-server-1714121832", "status": "BUILD", "tenant_id": "0cd9895a4bd84f8a859ddbcbf39a0d72", "user_id": "d83a612e30aa42b18d464c0b2cbd4044", "metadata": {}, "hostId": "1c6caf91203d31288fb481147bb6ec456942b48a789c1a8e4f462b48", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:09Z", "updated": "2020-11-06T17:59:11Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/91c916c9-7f91-4941-b349-0e62b28deaa9"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:12.380 40 INFO tempest.common.waiters [-] State transition "BUILD/None" ==> "BUILD/spawning" after 3 second wait 2020-11-06 17:59:12.417 39 INFO tempest.lib.common.rest_client [req-f652486e-b9ac-49fa-8225-ec9fda557af1 ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.131s 2020-11-06 17:59:12.418 39 DEBUG tempest.lib.common.rest_client [req-f652486e-b9ac-49fa-8225-ec9fda557af1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ServerActionsRbacTest-627976037", "password": "J7@UvdPZEK%NV*^", "project_id": "c58012c4ddf74aae9fa1e0ca958b3b2f", "email": "tempest-ServerActionsRbacTest-806535701@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '396', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f652486e-b9ac-49fa-8225-ec9fda557af1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "c58012c4ddf74aae9fa1e0ca958b3b2f", "email": "tempest-ServerActionsRbacTest-806535701@example.com", "id": "9f78862a1d93489cb8b26f599b4ca6db", "name": "tempest-ServerActionsRbacTest-627976037", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/9f78862a1d93489cb8b26f599b4ca6db"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:12.452 38 INFO tempest.lib.common.rest_client [req-905be3da-e276-49d7-b6c6-42a46775c8a3 ] Request (ImagesMetadataRbacTest:test_update_image_metadata_item): 200 PUT http://172.30.13.94/compute/v2.1/images/f509770f-c3cc-4d83-ac33-eae114f1d0c8/metadata/foo 0.375s 2020-11-06 17:59:12.452 38 DEBUG tempest.lib.common.rest_client [req-905be3da-e276-49d7-b6c6-42a46775c8a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"meta": {"foo": "bar"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '24', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-905be3da-e276-49d7-b6c6-42a46775c8a3', 'x-compute-request-id': 'req-905be3da-e276-49d7-b6c6-42a46775c8a3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/f509770f-c3cc-4d83-ac33-eae114f1d0c8/metadata/foo'} Body: b'{"meta": {"foo": "bar"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:12.455 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:12.466 39 INFO tempest.lib.common.rest_client [req-3f099c62-0ded-4000-802a-0799befaaf74 ] Request (ServerActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.047s 2020-11-06 17:59:12.467 39 DEBUG tempest.lib.common.rest_client [req-3f099c62-0ded-4000-802a-0799befaaf74 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3f099c62-0ded-4000-802a-0799befaaf74', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:12.504 38 INFO tempest.lib.common.rest_client [req-4478ee84-96aa-40ef-90cf-4a6f926fb4d2 ] Request (ImagesMetadataRbacTest:test_update_image_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles 0.048s 2020-11-06 17:59:12.504 38 DEBUG tempest.lib.common.rest_client [req-4478ee84-96aa-40ef-90cf-4a6f926fb4d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4478ee84-96aa-40ef-90cf-4a6f926fb4d2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378/users/c088001f96a442489a91e768768598d4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:12.531 39 INFO tempest.lib.common.rest_client [req-d0eacc26-e6bb-4d49-9813-681e865e75c3 ] Request (ServerActionsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/c58012c4ddf74aae9fa1e0ca958b3b2f/users/9f78862a1d93489cb8b26f599b4ca6db/roles/a629c95d64b3416fb80ae90af4f69c05 0.063s 2020-11-06 17:59:12.532 39 DEBUG tempest.lib.common.rest_client [req-d0eacc26-e6bb-4d49-9813-681e865e75c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d0eacc26-e6bb-4d49-9813-681e865e75c3', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c58012c4ddf74aae9fa1e0ca958b3b2f/users/9f78862a1d93489cb8b26f599b4ca6db/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:12.532 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerActionsRbacTest-627976037', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'c58012c4ddf74aae9fa1e0ca958b3b2f', 'project_name': 'tempest-ServerActionsRbacTest-627976037', 'tenant_id': 'c58012c4ddf74aae9fa1e0ca958b3b2f', 'tenant_name': 'tempest-ServerActionsRbacTest-627976037', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '9f78862a1d93489cb8b26f599b4ca6db'}, Network: None, Subnet: None, Router: None 2020-11-06 17:59:12.588 38 INFO tempest.lib.common.rest_client [req-be34a5b0-d701-4b9c-a246-adc40c31e71a ] Request (ImagesMetadataRbacTest:test_update_image_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 17:59:12.589 38 DEBUG tempest.lib.common.rest_client [req-be34a5b0-d701-4b9c-a246-adc40c31e71a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-be34a5b0-d701-4b9c-a246-adc40c31e71a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c088001f96a442489a91e768768598d4", "name": "tempest-ImagesMetadataRbacTest-1966058629", "password_expires_at": null}, "audit_ids": ["tJIZrawwSDCX9UooVNysOg"], "expires_at": "2020-11-06T18:59:12.000000Z", "issued_at": "2020-11-06T17:59:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c6fa733c16f543edbc0ec536de535378", "name": "tempest-ImagesMetadataRbacTest-1966058629"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6fa733c16f543edbc0ec536de535378", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:12.921 39 INFO tempest.lib.common.rest_client [req-18419830-11c7-4735-88d9-2e171211f5fe ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.387s 2020-11-06 17:59:12.921 39 DEBUG tempest.lib.common.rest_client [req-18419830-11c7-4735-88d9-2e171211f5fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-ServerActionsRbacTest-1107501304-network", "tenant_id": "c58012c4ddf74aae9fa1e0ca958b3b2f"}} Response - Headers: {'content-type': 'application/json', 'content-length': '737', 'x-openstack-request-id': 'req-18419830-11c7-4735-88d9-2e171211f5fe', 'date': 'Fri, 06 Nov 2020 17:59:12 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"529aec4e-dc4d-461e-835f-1ce0fc52633a","name":"tempest-ServerActionsRbacTest-1107501304-network","tenant_id":"c58012c4ddf74aae9fa1e0ca958b3b2f","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"c58012c4ddf74aae9fa1e0ca958b3b2f","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":59,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T17:59:12Z","updated_at":"2020-11-06T17:59:12Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:13.056 38 INFO tempest.lib.common.rest_client [req-7249e498-a55c-4445-b599-1aa9a7cd4bd9 ] Request (ImagesMetadataRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/compute/v2.1/images/f509770f-c3cc-4d83-ac33-eae114f1d0c8/metadata/foo 0.466s 2020-11-06 17:59:13.057 38 DEBUG tempest.lib.common.rest_client [req-7249e498-a55c-4445-b599-1aa9a7cd4bd9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7249e498-a55c-4445-b599-1aa9a7cd4bd9', 'x-compute-request-id': 'req-7249e498-a55c-4445-b599-1aa9a7cd4bd9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/images/f509770f-c3cc-4d83-ac33-eae114f1d0c8/metadata/foo'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:13.070 37 INFO tempest.lib.common.rest_client [req-5ba3cff3-54c5-4a0e-88c9-9573d93f8fd2 ] Request (SecurtiyGroupsRbacTest:setUpClass): 202 POST http://172.30.13.94/compute/v2.1/servers 1.832s 2020-11-06 17:59:13.070 37 DEBUG tempest.lib.common.rest_client [req-5ba3cff3-54c5-4a0e-88c9-9573d93f8fd2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-SecurtiyGroupsRbacTest-server-684714768", "imageRef": "56b368f6-9136-40ec-a04c-564d02c95e42", "flavorRef": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "networks": [{"uuid": "944260dd-14a1-4951-9ec4-bb4b5b78dd75"}]}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5ba3cff3-54c5-4a0e-88c9-9573d93f8fd2', 'x-compute-request-id': 'req-5ba3cff3-54c5-4a0e-88c9-9573d93f8fd2', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "53da6d79-4555-422b-bb06-07e620333161", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/53da6d79-4555-422b-bb06-07e620333161"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "TUaAGii94ct6"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:13.138 38 INFO tempest.lib.common.rest_client [req-f8c6195b-a74d-469c-8a6c-5d331c14176f ] Request (ImagesMetadataRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/f509770f-c3cc-4d83-ac33-eae114f1d0c8 0.078s 2020-11-06 17:59:13.138 38 DEBUG tempest.lib.common.rest_client [req-f8c6195b-a74d-469c-8a6c-5d331c14176f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-f8c6195b-a74d-469c-8a6c-5d331c14176f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/f509770f-c3cc-4d83-ac33-eae114f1d0c8'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:13.157 38 INFO tempest.lib.common.rest_client [req-3c305d89-ce77-4a83-a98c-dfed5602e92c ] Request (ImagesMetadataRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/f509770f-c3cc-4d83-ac33-eae114f1d0c8 0.018s 2020-11-06 17:59:13.157 38 DEBUG tempest.lib.common.rest_client [req-3c305d89-ce77-4a83-a98c-dfed5602e92c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-3c305d89-ce77-4a83-a98c-dfed5602e92c', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/f509770f-c3cc-4d83-ac33-eae114f1d0c8'} Body: b'{"message": "No image found with ID f509770f-c3cc-4d83-ac33-eae114f1d0c8

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:13.161 37 INFO tempest.lib.common.rest_client [req-3bbefce4-17b7-445d-84a8-49fd9595575b ] Request (SecurtiyGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161 0.088s 2020-11-06 17:59:13.162 37 DEBUG tempest.lib.common.rest_client [req-3bbefce4-17b7-445d-84a8-49fd9595575b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1397', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3bbefce4-17b7-445d-84a8-49fd9595575b', 'x-compute-request-id': 'req-3bbefce4-17b7-445d-84a8-49fd9595575b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161'} Body: b'{"server": {"id": "53da6d79-4555-422b-bb06-07e620333161", "name": "tempest-SecurtiyGroupsRbacTest-server-684714768", "status": "BUILD", "tenant_id": "d73ae082cf2c4889915adb0d4efc6f2e", "user_id": "eabd533369674823b012ab299376bbb3", "metadata": {}, "hostId": "", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:13Z", "updated": "2020-11-06T17:59:13Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/53da6d79-4555-422b-bb06-07e620333161"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:13.325 38 INFO tempest.lib.common.rest_client [req-426ee475-8928-4890-a591-9d3f027ff848 ] Request (ImagesMetadataRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/c088001f96a442489a91e768768598d4 0.167s 2020-11-06 17:59:13.325 38 DEBUG tempest.lib.common.rest_client [req-426ee475-8928-4890-a591-9d3f027ff848 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-426ee475-8928-4890-a591-9d3f027ff848', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/c088001f96a442489a91e768768598d4'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:13.388 38 INFO tempest.lib.common.rest_client [req-71ec1ff4-d332-40ca-896f-c10cfa665752 ] Request (ImagesMetadataRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.062s 2020-11-06 17:59:13.389 38 DEBUG tempest.lib.common.rest_client [req-71ec1ff4-d332-40ca-896f-c10cfa665752 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-71ec1ff4-d332-40ca-896f-c10cfa665752', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["QHXxkEZnQ-yCuK-iawoyog"], "expires_at": "2020-11-06T18:59:13.000000Z", "issued_at": "2020-11-06T17:59:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:13.432 39 INFO tempest.lib.common.rest_client [req-a3521911-55c5-443d-9b42-9d2b59b9feee ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.509s 2020-11-06 17:59:13.433 39 DEBUG tempest.lib.common.rest_client [req-a3521911-55c5-443d-9b42-9d2b59b9feee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "529aec4e-dc4d-461e-835f-1ce0fc52633a", "cidr": "192.168.120.0/28", "name": "tempest-ServerActionsRbacTest-1107501304-subnet", "tenant_id": "c58012c4ddf74aae9fa1e0ca958b3b2f", "enable_dhcp": false, "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '709', 'x-openstack-request-id': 'req-a3521911-55c5-443d-9b42-9d2b59b9feee', 'date': 'Fri, 06 Nov 2020 17:59:13 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"3756fe18-1911-45a0-a2ec-1e0376b1efba","name":"tempest-ServerActionsRbacTest-1107501304-subnet","tenant_id":"c58012c4ddf74aae9fa1e0ca958b3b2f","network_id":"529aec4e-dc4d-461e-835f-1ce0fc52633a","ip_version":4,"subnetpool_id":null,"enable_dhcp":false,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-11-06T17:59:13Z","updated_at":"2020-11-06T17:59:13Z","revision_number":0,"project_id":"c58012c4ddf74aae9fa1e0ca958b3b2f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:13.559 40 INFO tempest.lib.common.rest_client [req-f018e005-22df-495f-bc28-d31efb6d2d05 ] Request (ServerConsolesRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9 0.178s 2020-11-06 17:59:13.560 40 DEBUG tempest.lib.common.rest_client [req-f018e005-22df-495f-bc28-d31efb6d2d05 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1533', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f018e005-22df-495f-bc28-d31efb6d2d05', 'x-compute-request-id': 'req-f018e005-22df-495f-bc28-d31efb6d2d05', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9'} Body: b'{"server": {"id": "91c916c9-7f91-4941-b349-0e62b28deaa9", "name": "tempest-ServerConsolesRbacTest-server-1714121832", "status": "BUILD", "tenant_id": "0cd9895a4bd84f8a859ddbcbf39a0d72", "user_id": "d83a612e30aa42b18d464c0b2cbd4044", "metadata": {}, "hostId": "1c6caf91203d31288fb481147bb6ec456942b48a789c1a8e4f462b48", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:09Z", "updated": "2020-11-06T17:59:11Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/91c916c9-7f91-4941-b349-0e62b28deaa9"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:13.830 38 INFO tempest.lib.common.rest_client [req-9939599d-f662-4fe7-a6a3-40f855196f08 ] Request (ImagesMetadataRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=c6fa733c16f543edbc0ec536de535378&name=default 0.441s 2020-11-06 17:59:13.831 38 DEBUG tempest.lib.common.rest_client [req-9939599d-f662-4fe7-a6a3-40f855196f08 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-9939599d-f662-4fe7-a6a3-40f855196f08', 'date': 'Fri, 06 Nov 2020 17:59:13 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=c6fa733c16f543edbc0ec536de535378&name=default'} Body: b'{"security_groups": [{"id": "0a982c9f-fe67-4fb5-b046-476cde63af97", "name": "default", "stateful": true, "tenant_id": "c6fa733c16f543edbc0ec536de535378", "description": "Default security group", "security_group_rules": [{"id": "7d670370-4398-48c2-b8e5-93d9737d2d80", "tenant_id": "c6fa733c16f543edbc0ec536de535378", "security_group_id": "0a982c9f-fe67-4fb5-b046-476cde63af97", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "0a982c9f-fe67-4fb5-b046-476cde63af97", "description": null, "tags": [], "created_at": "2020-11-06T17:59:13Z", "updated_at": "2020-11-06T17:59:13Z", "revision_number": 0, "project_id": "c6fa733c16f543edbc0ec536de535378"}, {"id": "8852e154-a875-48c3-b2da-7256106d008d", "tenant_id": "c6fa733c16f543edbc0ec536de535378", "security_group_id": "0a982c9f-fe67-4fb5-b046-476cde63af97", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:59:13Z", "updated_at": "2020-11-06T17:59:13Z", "revision_number": 0, "project_id": "c6fa733c16f543edbc0ec536de535378"}, {"id": "9a25d50f-898b-4790-bfb7-38bc013e910a", "tenant_id": "c6fa733c16f543edbc0ec536de535378", "security_group_id": "0a982c9f-fe67-4fb5-b046-476cde63af97", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "0a982c9f-fe67-4fb5-b046-476cde63af97", "description": null, "tags": [], "created_at": "2020-11-06T17:59:13Z", "updated_at": "2020-11-06T17:59:13Z", "revision_number": 0, "project_id": "c6fa733c16f543edbc0ec536de535378"}, {"id": "e0a39a91-88bd-42a4-87e3-e0453ed35006", "tenant_id": "c6fa733c16f543edbc0ec536de535378", "security_group_id": "0a982c9f-fe67-4fb5-b046-476cde63af97", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:59:13Z", "updated_at": "2020-11-06T17:59:13Z", "revision_number": 0, "project_id": "c6fa733c16f543edbc0ec536de535378"}], "tags": [], "created_at": "2020-11-06T17:59:13Z", "updated_at": "2020-11-06T17:59:13Z", "revision_number": 1, "project_id": "c6fa733c16f543edbc0ec536de535378"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:14.114 38 INFO tempest.lib.common.rest_client [req-e2512879-1cb9-4a34-a50a-1038042bb279 ] Request (ImagesMetadataRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/0a982c9f-fe67-4fb5-b046-476cde63af97 0.283s 2020-11-06 17:59:14.115 38 DEBUG tempest.lib.common.rest_client [req-e2512879-1cb9-4a34-a50a-1038042bb279 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-e2512879-1cb9-4a34-a50a-1038042bb279', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 17:59:14 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/0a982c9f-fe67-4fb5-b046-476cde63af97'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:14.254 38 INFO tempest.lib.common.rest_client [req-d08c9330-bea8-4686-91bc-66936f172fea ] Request (ImagesMetadataRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378 0.138s 2020-11-06 17:59:14.255 38 DEBUG tempest.lib.common.rest_client [req-d08c9330-bea8-4686-91bc-66936f172fea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d08c9330-bea8-4686-91bc-66936f172fea', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c6fa733c16f543edbc0ec536de535378'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:14.334 38 INFO tempest.lib.common.rest_client [req-bd839bce-42cd-469b-b6d2-69fe3a7693fc ] Request (ImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-11-06 17:59:14.335 38 DEBUG tempest.lib.common.rest_client [req-bd839bce-42cd-469b-b6d2-69fe3a7693fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bd839bce-42cd-469b-b6d2-69fe3a7693fc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["4h_S98F0Stqk6Sefud9uVA"], "expires_at": "2020-11-06T18:59:14.000000Z", "issued_at": "2020-11-06T17:59:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:14.373 37 INFO tempest.lib.common.rest_client [req-5324c83f-0ab7-43fe-bbba-8336273d0f17 ] Request (SecurtiyGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161 0.194s 2020-11-06 17:59:14.374 37 DEBUG tempest.lib.common.rest_client [req-5324c83f-0ab7-43fe-bbba-8336273d0f17 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1492', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5324c83f-0ab7-43fe-bbba-8336273d0f17', 'x-compute-request-id': 'req-5324c83f-0ab7-43fe-bbba-8336273d0f17', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161'} Body: b'{"server": {"id": "53da6d79-4555-422b-bb06-07e620333161", "name": "tempest-SecurtiyGroupsRbacTest-server-684714768", "status": "BUILD", "tenant_id": "d73ae082cf2c4889915adb0d4efc6f2e", "user_id": "eabd533369674823b012ab299376bbb3", "metadata": {}, "hostId": "66bc7addb145ae6ae0381ad01ab057fa2344ebcf5635095860cf236c", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:13Z", "updated": "2020-11-06T17:59:14Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/53da6d79-4555-422b-bb06-07e620333161"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033be", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "networking", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:14.379 38 INFO tempest.lib.common.rest_client [req-46e93b7d-d8c8-4972-92bf-915a12b229a4 ] Request (ImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 17:59:14.380 38 DEBUG tempest.lib.common.rest_client [req-46e93b7d-d8c8-4972-92bf-915a12b229a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-46e93b7d-d8c8-4972-92bf-915a12b229a4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["gehnCQdTTdajAagE_ZaLOg"], "expires_at": "2020-11-06T18:59:14.000000Z", "issued_at": "2020-11-06T17:59:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:14.387 37 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/networking" after 1 second wait 2020-11-06 17:59:14.440 38 INFO tempest.lib.common.rest_client [req-a9ee0ec5-2ce9-4dde-8e1a-992758f797b7 ] Request (ImagesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.059s 2020-11-06 17:59:14.440 38 DEBUG tempest.lib.common.rest_client [req-a9ee0ec5-2ce9-4dde-8e1a-992758f797b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a9ee0ec5-2ce9-4dde-8e1a-992758f797b7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:14.502 38 INFO tempest.lib.common.rest_client [req-36e95314-e8ee-42ae-8f0f-1db292d734a4 ] Request (ImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.061s 2020-11-06 17:59:14.503 38 DEBUG tempest.lib.common.rest_client [req-36e95314-e8ee-42ae-8f0f-1db292d734a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ImagesRbacTest-199531719-desc", "domain_id": "default", "name": "tempest-ImagesRbacTest-199531719"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '364', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-36e95314-e8ee-42ae-8f0f-1db292d734a4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "de56e503820949e99d6d463d5f10ba23", "name": "tempest-ImagesRbacTest-199531719", "domain_id": "default", "description": "tempest-ImagesRbacTest-199531719-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/de56e503820949e99d6d463d5f10ba23"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:14.617 38 INFO tempest.lib.common.rest_client [req-dafbeb41-d773-47c3-ae46-ed62dec8a445 ] Request (ImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.113s 2020-11-06 17:59:14.618 38 DEBUG tempest.lib.common.rest_client [req-dafbeb41-d773-47c3-ae46-ed62dec8a445 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ImagesRbacTest-199531719", "password": "W1@+GH!I94hmF_I", "project_id": "de56e503820949e99d6d463d5f10ba23", "email": "tempest-ImagesRbacTest-77481539@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '381', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dafbeb41-d773-47c3-ae46-ed62dec8a445', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "de56e503820949e99d6d463d5f10ba23", "email": "tempest-ImagesRbacTest-77481539@example.com", "id": "25dc6c54a2c2402c8e7d7ddc26efeda6", "name": "tempest-ImagesRbacTest-199531719", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/25dc6c54a2c2402c8e7d7ddc26efeda6"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:14.671 38 INFO tempest.lib.common.rest_client [req-01e58cb0-dbaa-4441-8ff9-a3b8fb836493 ] Request (ImagesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.052s 2020-11-06 17:59:14.672 38 DEBUG tempest.lib.common.rest_client [req-01e58cb0-dbaa-4441-8ff9-a3b8fb836493 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-01e58cb0-dbaa-4441-8ff9-a3b8fb836493', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:14.718 38 INFO tempest.lib.common.rest_client [req-9af6aa9b-60a3-4d71-a7e9-0150a6002848 ] Request (ImagesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.045s 2020-11-06 17:59:14.719 38 DEBUG tempest.lib.common.rest_client [req-9af6aa9b-60a3-4d71-a7e9-0150a6002848 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9af6aa9b-60a3-4d71-a7e9-0150a6002848', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:14.779 38 INFO tempest.lib.common.rest_client [req-7fe9c9b8-6a7c-452e-9b09-cb5b2829dce6 ] Request (ImagesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/de56e503820949e99d6d463d5f10ba23/users/25dc6c54a2c2402c8e7d7ddc26efeda6/roles/72a4576c553448cd941b052c1ca0cf2d 0.059s 2020-11-06 17:59:14.780 38 DEBUG tempest.lib.common.rest_client [req-7fe9c9b8-6a7c-452e-9b09-cb5b2829dce6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7fe9c9b8-6a7c-452e-9b09-cb5b2829dce6', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/de56e503820949e99d6d463d5f10ba23/users/25dc6c54a2c2402c8e7d7ddc26efeda6/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:14.781 38 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImagesRbacTest-199531719', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'de56e503820949e99d6d463d5f10ba23', 'project_name': 'tempest-ImagesRbacTest-199531719', 'tenant_id': 'de56e503820949e99d6d463d5f10ba23', 'tenant_name': 'tempest-ImagesRbacTest-199531719', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '25dc6c54a2c2402c8e7d7ddc26efeda6'}, Network: None, Subnet: None, Router: None 2020-11-06 17:59:14.781 38 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImagesRbacTest-199531719', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'de56e503820949e99d6d463d5f10ba23', 'project_name': 'tempest-ImagesRbacTest-199531719', 'tenant_id': 'de56e503820949e99d6d463d5f10ba23', 'tenant_name': 'tempest-ImagesRbacTest-199531719', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '25dc6c54a2c2402c8e7d7ddc26efeda6'}, Network: None, Subnet: None, Router: None 2020-11-06 17:59:14.884 38 INFO tempest.lib.common.rest_client [req-7c295d13-c938-4310-867c-f71a5385c5af ] Request (ImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-11-06 17:59:14.885 38 DEBUG tempest.lib.common.rest_client [req-7c295d13-c938-4310-867c-f71a5385c5af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6557', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7c295d13-c938-4310-867c-f71a5385c5af', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "25dc6c54a2c2402c8e7d7ddc26efeda6", "name": "tempest-ImagesRbacTest-199531719", "password_expires_at": null}, "audit_ids": ["mYznLVCtQZuf6noLTtKB8Q"], "expires_at": "2020-11-06T18:59:14.000000Z", "issued_at": "2020-11-06T17:59:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "de56e503820949e99d6d463d5f10ba23", "name": "tempest-ImagesRbacTest-199531719"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/imag _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:14.967 38 INFO tempest.lib.common.rest_client [req-29580d8d-53c1-45d0-86c3-aea238a4d26a ] Request (ImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-11-06 17:59:14.967 38 DEBUG tempest.lib.common.rest_client [req-29580d8d-53c1-45d0-86c3-aea238a4d26a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-29580d8d-53c1-45d0-86c3-aea238a4d26a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["geLYOHwRR9S0cMz_gbH2Fg"], "expires_at": "2020-11-06T18:59:14.000000Z", "issued_at": "2020-11-06T17:59:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:15.016 38 INFO tempest.lib.common.rest_client [req-a8489294-a476-47b3-8c7d-61f30dee3bbb ] Request (ImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 17:59:15.017 38 DEBUG tempest.lib.common.rest_client [req-a8489294-a476-47b3-8c7d-61f30dee3bbb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a8489294-a476-47b3-8c7d-61f30dee3bbb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["90jGVL4lS--QJ5gPYDMf6A"], "expires_at": "2020-11-06T18:59:15.000000Z", "issued_at": "2020-11-06T17:59:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:15.062 38 INFO tempest.lib.common.rest_client [req-92aa7595-f0d5-48f3-bc79-f5ae540c7794 ] Request (ImagesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.044s 2020-11-06 17:59:15.062 38 DEBUG tempest.lib.common.rest_client [req-92aa7595-f0d5-48f3-bc79-f5ae540c7794 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-92aa7595-f0d5-48f3-bc79-f5ae540c7794', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:15.087 40 INFO tempest.lib.common.rest_client [req-4a0a0225-4f21-45dc-b318-2d9bf7dc69f4 ] Request (ServerConsolesRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9 0.511s 2020-11-06 17:59:15.087 40 DEBUG tempest.lib.common.rest_client [req-4a0a0225-4f21-45dc-b318-2d9bf7dc69f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1533', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4a0a0225-4f21-45dc-b318-2d9bf7dc69f4', 'x-compute-request-id': 'req-4a0a0225-4f21-45dc-b318-2d9bf7dc69f4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9'} Body: b'{"server": {"id": "91c916c9-7f91-4941-b349-0e62b28deaa9", "name": "tempest-ServerConsolesRbacTest-server-1714121832", "status": "BUILD", "tenant_id": "0cd9895a4bd84f8a859ddbcbf39a0d72", "user_id": "d83a612e30aa42b18d464c0b2cbd4044", "metadata": {}, "hostId": "1c6caf91203d31288fb481147bb6ec456942b48a789c1a8e4f462b48", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:09Z", "updated": "2020-11-06T17:59:11Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/91c916c9-7f91-4941-b349-0e62b28deaa9"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:15.107 38 INFO tempest.lib.common.rest_client [req-04c32580-570f-4ae2-ba87-9916dfb95721 ] Request (ImagesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.044s 2020-11-06 17:59:15.108 38 DEBUG tempest.lib.common.rest_client [req-04c32580-570f-4ae2-ba87-9916dfb95721 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-04c32580-570f-4ae2-ba87-9916dfb95721', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:15.108 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 17:59:15.109 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:15.161 38 INFO tempest.lib.common.rest_client [req-8edb514e-272b-41af-932b-f0b12a21e146 ] Request (ImagesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/de56e503820949e99d6d463d5f10ba23/users/25dc6c54a2c2402c8e7d7ddc26efeda6/roles 0.051s 2020-11-06 17:59:15.161 38 DEBUG tempest.lib.common.rest_client [req-8edb514e-272b-41af-932b-f0b12a21e146 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8edb514e-272b-41af-932b-f0b12a21e146', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/de56e503820949e99d6d463d5f10ba23/users/25dc6c54a2c2402c8e7d7ddc26efeda6/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/de56e503820949e99d6d463d5f10ba23/users/25dc6c54a2c2402c8e7d7ddc26efeda6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:15.214 38 INFO tempest.lib.common.rest_client [req-fd7f7e18-fcf8-4e45-954b-8d04ff3b3ffc ] Request (ImagesRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/de56e503820949e99d6d463d5f10ba23/users/25dc6c54a2c2402c8e7d7ddc26efeda6/roles/72a4576c553448cd941b052c1ca0cf2d 0.052s 2020-11-06 17:59:15.214 38 DEBUG tempest.lib.common.rest_client [req-fd7f7e18-fcf8-4e45-954b-8d04ff3b3ffc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fd7f7e18-fcf8-4e45-954b-8d04ff3b3ffc', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/de56e503820949e99d6d463d5f10ba23/users/25dc6c54a2c2402c8e7d7ddc26efeda6/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:15.309 38 INFO tempest.lib.common.rest_client [req-4b882cd2-044d-4bf4-8ba2-9db5a113eeb0 ] Request (ImagesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/de56e503820949e99d6d463d5f10ba23/users/25dc6c54a2c2402c8e7d7ddc26efeda6/roles/a629c95d64b3416fb80ae90af4f69c05 0.093s 2020-11-06 17:59:15.309 38 DEBUG tempest.lib.common.rest_client [req-4b882cd2-044d-4bf4-8ba2-9db5a113eeb0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4b882cd2-044d-4bf4-8ba2-9db5a113eeb0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/de56e503820949e99d6d463d5f10ba23/users/25dc6c54a2c2402c8e7d7ddc26efeda6/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:15.666 37 INFO tempest.lib.common.rest_client [req-f1a7c0d8-d238-461b-9515-dc47cc07ee59 ] Request (SecurtiyGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161 0.277s 2020-11-06 17:59:15.667 37 DEBUG tempest.lib.common.rest_client [req-f1a7c0d8-d238-461b-9515-dc47cc07ee59 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f1a7c0d8-d238-461b-9515-dc47cc07ee59', 'x-compute-request-id': 'req-f1a7c0d8-d238-461b-9515-dc47cc07ee59', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161'} Body: b'{"server": {"id": "53da6d79-4555-422b-bb06-07e620333161", "name": "tempest-SecurtiyGroupsRbacTest-server-684714768", "status": "BUILD", "tenant_id": "d73ae082cf2c4889915adb0d4efc6f2e", "user_id": "eabd533369674823b012ab299376bbb3", "metadata": {}, "hostId": "66bc7addb145ae6ae0381ad01ab057fa2344ebcf5635095860cf236c", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:13Z", "updated": "2020-11-06T17:59:14Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/53da6d79-4555-422b-bb06-07e620333161"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033be", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:15.682 37 INFO tempest.common.waiters [-] State transition "BUILD/networking" ==> "BUILD/spawning" after 2 second wait 2020-11-06 17:59:16.114 39 INFO tempest.lib.common.rest_client [req-e8b5364f-4dd7-44e9-93ec-64ca3f16685b ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/routers 2.680s 2020-11-06 17:59:16.115 39 DEBUG tempest.lib.common.rest_client [req-e8b5364f-4dd7-44e9-93ec-64ca3f16685b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-ServerActionsRbacTest-1107501304-router", "tenant_id": "c58012c4ddf74aae9fa1e0ca958b3b2f", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea"}}} Response - Headers: {'content-type': 'application/json', 'content-length': '811', 'x-openstack-request-id': 'req-e8b5364f-4dd7-44e9-93ec-64ca3f16685b', 'date': 'Fri, 06 Nov 2020 17:59:16 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "906603d5-36c3-4c3f-b745-9192f15886cf", "name": "tempest-ServerActionsRbacTest-1107501304-router", "tenant_id": "c58012c4ddf74aae9fa1e0ca958b3b2f", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.152"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::12b"}], "enable_snat": true}, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T17:59:13Z", "updated_at": "2020-11-06T17:59:14Z", "revision_number": 3, "project_id": "c58012c4ddf74aae9fa1e0ca958b3b2f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:16.394 38 INFO tempest.lib.common.rest_client [req-9710607d-8ef5-4d5b-bd0a-1cbba2a2a15a ] Request (ImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 17:59:16.395 38 DEBUG tempest.lib.common.rest_client [req-9710607d-8ef5-4d5b-bd0a-1cbba2a2a15a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9710607d-8ef5-4d5b-bd0a-1cbba2a2a15a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "25dc6c54a2c2402c8e7d7ddc26efeda6", "name": "tempest-ImagesRbacTest-199531719", "password_expires_at": null}, "audit_ids": ["PoI3iJoOQV-CfcsThiV9tw"], "expires_at": "2020-11-06T18:59:16.000000Z", "issued_at": "2020-11-06T17:59:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "de56e503820949e99d6d463d5f10ba23", "name": "tempest-ImagesRbacTest-199531719"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:16.615 38 INFO tempest.lib.common.rest_client [req-34a2140f-cbbc-428d-9213-2a7ab62865a5 ] Request (ImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/image/v2/images 0.218s 2020-11-06 17:59:16.616 38 DEBUG tempest.lib.common.rest_client [req-34a2140f-cbbc-428d-9213-2a7ab62865a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-ImagesRbacTest-image-1285866100"} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '643', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/79857242-51d5-482b-98a4-c43b23ecaf63', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-34a2140f-cbbc-428d-9213-2a7ab62865a5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-ImagesRbacTest-image-1285866100", "disk_format": null, "container_format": null, "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "de56e503820949e99d6d463d5f10ba23", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "79857242-51d5-482b-98a4-c43b23ecaf63", "created_at": "2020-11-06T17:59:17Z", "updated_at": "2020-11-06T17:59:17Z", "tags": [], "self": "/v2/images/79857242-51d5-482b-98a4-c43b23ecaf63", "file": "/v2/images/79857242-51d5-482b-98a4-c43b23ecaf63/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:16.617 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:16.618 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:16.620 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_image, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:16.656 38 INFO tempest.lib.common.rest_client [req-e01373f2-b1bc-4668-85c8-07ff4de256c8 ] Request (ImagesRbacTest:test_delete_image): 201 POST http://172.30.13.94/image/v2/images 0.035s 2020-11-06 17:59:16.656 38 DEBUG tempest.lib.common.rest_client [req-e01373f2-b1bc-4668-85c8-07ff4de256c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-ImagesRbacTest-image-849058111"} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '642', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/d8244118-e467-43e7-8c4f-064c2f3acee7', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-e01373f2-b1bc-4668-85c8-07ff4de256c8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-ImagesRbacTest-image-849058111", "disk_format": null, "container_format": null, "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "de56e503820949e99d6d463d5f10ba23", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "d8244118-e467-43e7-8c4f-064c2f3acee7", "created_at": "2020-11-06T17:59:17Z", "updated_at": "2020-11-06T17:59:17Z", "tags": [], "self": "/v2/images/d8244118-e467-43e7-8c4f-064c2f3acee7", "file": "/v2/images/d8244118-e467-43e7-8c4f-064c2f3acee7/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:16.657 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:16.754 38 INFO tempest.lib.common.rest_client [req-7b36c9de-72ea-4c01-af83-10d1141f9eb6 ] Request (ImagesRbacTest:test_delete_image): 200 GET http://172.30.13.94/identity/v3/projects/de56e503820949e99d6d463d5f10ba23/users/25dc6c54a2c2402c8e7d7ddc26efeda6/roles 0.095s 2020-11-06 17:59:16.755 38 DEBUG tempest.lib.common.rest_client [req-7b36c9de-72ea-4c01-af83-10d1141f9eb6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7b36c9de-72ea-4c01-af83-10d1141f9eb6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/de56e503820949e99d6d463d5f10ba23/users/25dc6c54a2c2402c8e7d7ddc26efeda6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/de56e503820949e99d6d463d5f10ba23/users/25dc6c54a2c2402c8e7d7ddc26efeda6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:16.784 38 INFO tempest.lib.common.rest_client [req-bd400b03-11d2-403f-bc73-96536147d292 ] Request (ImagesRbacTest:test_delete_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.028s 2020-11-06 17:59:16.784 38 DEBUG tempest.lib.common.rest_client [req-bd400b03-11d2-403f-bc73-96536147d292 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bd400b03-11d2-403f-bc73-96536147d292', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "25dc6c54a2c2402c8e7d7ddc26efeda6", "name": "tempest-ImagesRbacTest-199531719", "password_expires_at": null}, "audit_ids": ["__06uSSOTJyKO-GG5Tc37Q"], "expires_at": "2020-11-06T18:59:16.000000Z", "issued_at": "2020-11-06T17:59:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "de56e503820949e99d6d463d5f10ba23", "name": "tempest-ImagesRbacTest-199531719"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:16.899 37 INFO tempest.lib.common.rest_client [req-be64a9b1-984f-4362-a3ff-c49678bb67fd ] Request (SecurtiyGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161 0.215s 2020-11-06 17:59:16.900 37 DEBUG tempest.lib.common.rest_client [req-be64a9b1-984f-4362-a3ff-c49678bb67fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-be64a9b1-984f-4362-a3ff-c49678bb67fd', 'x-compute-request-id': 'req-be64a9b1-984f-4362-a3ff-c49678bb67fd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161'} Body: b'{"server": {"id": "53da6d79-4555-422b-bb06-07e620333161", "name": "tempest-SecurtiyGroupsRbacTest-server-684714768", "status": "BUILD", "tenant_id": "d73ae082cf2c4889915adb0d4efc6f2e", "user_id": "eabd533369674823b012ab299376bbb3", "metadata": {}, "hostId": "66bc7addb145ae6ae0381ad01ab057fa2344ebcf5635095860cf236c", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:13Z", "updated": "2020-11-06T17:59:14Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/53da6d79-4555-422b-bb06-07e620333161"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033be", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:17.039 38 INFO tempest.lib.common.rest_client [req-7697e91f-d55f-431e-9566-21c9dad2cfa7 ] Request (ImagesRbacTest:test_delete_image): 204 DELETE http://172.30.13.94/compute/v2.1/images/d8244118-e467-43e7-8c4f-064c2f3acee7 0.254s 2020-11-06 17:59:17.040 38 DEBUG tempest.lib.common.rest_client [req-7697e91f-d55f-431e-9566-21c9dad2cfa7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7697e91f-d55f-431e-9566-21c9dad2cfa7', 'x-compute-request-id': 'req-7697e91f-d55f-431e-9566-21c9dad2cfa7', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/images/d8244118-e467-43e7-8c4f-064c2f3acee7'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:17.041 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:17.091 38 INFO tempest.lib.common.rest_client [req-04c4b659-4670-411f-8396-667fd924a3d7 ] Request (ImagesRbacTest:test_delete_image): 200 GET http://172.30.13.94/identity/v3/projects/de56e503820949e99d6d463d5f10ba23/users/25dc6c54a2c2402c8e7d7ddc26efeda6/roles 0.050s 2020-11-06 17:59:17.092 38 DEBUG tempest.lib.common.rest_client [req-04c4b659-4670-411f-8396-667fd924a3d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-04c4b659-4670-411f-8396-667fd924a3d7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/de56e503820949e99d6d463d5f10ba23/users/25dc6c54a2c2402c8e7d7ddc26efeda6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/de56e503820949e99d6d463d5f10ba23/users/25dc6c54a2c2402c8e7d7ddc26efeda6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:17.134 38 INFO tempest.lib.common.rest_client [req-4d9229f9-ea4f-4064-8f66-c6bb3a7387d9 ] Request (ImagesRbacTest:test_delete_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-11-06 17:59:17.135 38 DEBUG tempest.lib.common.rest_client [req-4d9229f9-ea4f-4064-8f66-c6bb3a7387d9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4d9229f9-ea4f-4064-8f66-c6bb3a7387d9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "25dc6c54a2c2402c8e7d7ddc26efeda6", "name": "tempest-ImagesRbacTest-199531719", "password_expires_at": null}, "audit_ids": ["jeWqr6XZQo2GaeKAiYNphA"], "expires_at": "2020-11-06T18:59:17.000000Z", "issued_at": "2020-11-06T17:59:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "de56e503820949e99d6d463d5f10ba23", "name": "tempest-ImagesRbacTest-199531719"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:17.212 38 INFO tempest.lib.common.rest_client [req-3302a8a9-63d7-4a16-93d1-db2d7a4a7008 ] Request (ImagesRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/image/v2/images/d8244118-e467-43e7-8c4f-064c2f3acee7 0.076s 2020-11-06 17:59:17.212 38 DEBUG tempest.lib.common.rest_client [req-3302a8a9-63d7-4a16-93d1-db2d7a4a7008 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '147', 'content-type': 'application/json', 'x-openstack-request-id': 'req-3302a8a9-63d7-4a16-93d1-db2d7a4a7008', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/d8244118-e467-43e7-8c4f-064c2f3acee7'} Body: b'{"message": "Failed to find image d8244118-e467-43e7-8c4f-064c2f3acee7 to delete

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:17.215 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:17.216 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:17.217 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_images, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:17.217 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:17.262 38 INFO tempest.lib.common.rest_client [req-e47f246d-e901-4ec7-bb51-097e58d1dc04 ] Request (ImagesRbacTest:test_list_images): 200 GET http://172.30.13.94/identity/v3/projects/de56e503820949e99d6d463d5f10ba23/users/25dc6c54a2c2402c8e7d7ddc26efeda6/roles 0.044s 2020-11-06 17:59:17.263 38 DEBUG tempest.lib.common.rest_client [req-e47f246d-e901-4ec7-bb51-097e58d1dc04 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e47f246d-e901-4ec7-bb51-097e58d1dc04', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/de56e503820949e99d6d463d5f10ba23/users/25dc6c54a2c2402c8e7d7ddc26efeda6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/de56e503820949e99d6d463d5f10ba23/users/25dc6c54a2c2402c8e7d7ddc26efeda6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:17.295 38 INFO tempest.lib.common.rest_client [req-297dc22e-2e5f-4a83-9802-2dfd41b1a6c1 ] Request (ImagesRbacTest:test_list_images): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 17:59:17.295 38 DEBUG tempest.lib.common.rest_client [req-297dc22e-2e5f-4a83-9802-2dfd41b1a6c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-297dc22e-2e5f-4a83-9802-2dfd41b1a6c1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "25dc6c54a2c2402c8e7d7ddc26efeda6", "name": "tempest-ImagesRbacTest-199531719", "password_expires_at": null}, "audit_ids": ["Un9rgrjySF-V2L5HfxHWiQ"], "expires_at": "2020-11-06T18:59:17.000000Z", "issued_at": "2020-11-06T17:59:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "de56e503820949e99d6d463d5f10ba23", "name": "tempest-ImagesRbacTest-199531719"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:17.371 40 INFO tempest.lib.common.rest_client [req-36f98a57-e4b9-4ae5-bcff-ff109bf9f591 ] Request (ServerConsolesRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9 1.266s 2020-11-06 17:59:17.372 40 DEBUG tempest.lib.common.rest_client [req-36f98a57-e4b9-4ae5-bcff-ff109bf9f591 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1533', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-36f98a57-e4b9-4ae5-bcff-ff109bf9f591', 'x-compute-request-id': 'req-36f98a57-e4b9-4ae5-bcff-ff109bf9f591', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9'} Body: b'{"server": {"id": "91c916c9-7f91-4941-b349-0e62b28deaa9", "name": "tempest-ServerConsolesRbacTest-server-1714121832", "status": "BUILD", "tenant_id": "0cd9895a4bd84f8a859ddbcbf39a0d72", "user_id": "d83a612e30aa42b18d464c0b2cbd4044", "metadata": {}, "hostId": "1c6caf91203d31288fb481147bb6ec456942b48a789c1a8e4f462b48", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:09Z", "updated": "2020-11-06T17:59:11Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/91c916c9-7f91-4941-b349-0e62b28deaa9"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:17.463 38 INFO tempest.lib.common.rest_client [req-5150ed79-6beb-44ba-973c-bd2b053947dd ] Request (ImagesRbacTest:test_list_images): 200 GET http://172.30.13.94/compute/v2.1/images 0.167s 2020-11-06 17:59:17.464 38 DEBUG tempest.lib.common.rest_client [req-5150ed79-6beb-44ba-973c-bd2b053947dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '4749', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5150ed79-6beb-44ba-973c-bd2b053947dd', 'x-compute-request-id': 'req-5150ed79-6beb-44ba-973c-bd2b053947dd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images'} Body: b'{"images": [{"id": "79857242-51d5-482b-98a4-c43b23ecaf63", "name": "tempest-ImagesRbacTest-image-1285866100", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/79857242-51d5-482b-98a4-c43b23ecaf63"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/79857242-51d5-482b-98a4-c43b23ecaf63"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/79857242-51d5-482b-98a4-c43b23ecaf63"}]}, {"id": "de34e15c-369a-4038-89ed-d4de22d742c6", "name": "patrole_reader-img_alt_30048f18-b96b-4343-a720-1173982b59b8", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/de34e15c-369a-4038-89ed-d4de22d742c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/de34e15c-369a-4038-89ed-d4de22d742c6"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/de34e15c-369a-4038-89ed-d4de22d742c6"}]}, {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "name": "patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/56b368f6-9136-40ec-a04c-564d02c95e42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, {"id": "8055b7b0-b803-4fed-8862-03824d953a2e", "name": "tempest-ServerActionsRbacTest-image-763620719", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/8055b7b0-b803-4fed-8862-03824d953a2e"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/8055b7b0-b803-4fed-8862-03824d953a2e"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/8055b7b0-b803-4fed-8862-03824d953a2e"}]}, {"id": "0390e552-e912-4804-ab0d-d6bfcaf3e8f8", "name": "patrole_member-img_alt_29628109-ff86-4992-a718-2f4b83dd48b7", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/0390e552-e912-4804-ab0d-d6bfcaf3e8f8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/0390e552-e912-4804-ab0d-d6bfcaf3e8f8"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/0390e552-e912-4804-ab0d-d6bfcaf3e8f8"}]}, {"id": "55e4eaa7-0735-4ff6-869f-f6bbf0aa5457", "name": "patrole_member-img_29628109-ff86-4992-a718-2f4b83dd48b7", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/55e4eaa7-0735-4ff6-869f-f6bbf0aa5457"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/55e4eaa7-0735-4ff6-869f-f6bbf0aa5457"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/55e4eaa7-0735-4ff6-869f-f6bbf0aa5457"}]}, {"id": "301dd458-58f0-43ef-953f-156d6495a935", "name": "tempest_slow-img_alt_75eb3fa1-c659-4fc1-9b83-f5e47a8278c9", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/301dd458-58f0-43ef-953f-156d6495a935"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/301dd458-58f0-43ef-953f-156d6495a935"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/301dd458-58f0-43ef-953f-156d6495a935"}]}, {"id": "886d8440-9368-43b3-b3f7-a358cd9db453", "name": "tempest_slow-img_75eb3fa1-c659-4fc1-9b83-f5e47a8278c9", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/886d8440-9368-43b3-b3f7-a358cd9db453"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/886d8440-9368-43b3-b3f7-a358cd9db453"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/886d8440-9368-43b3-b3f7-a358cd9db453"}]}, {"id": "70a7dd5d-fc3c-401c-994c-cdb25660a12f", "name": "Fedora-Cloud-Base-31-1.9.x86_64", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/70a7dd5d-fc3c-401c-994c-cdb25660a12f"}, {"rel": "bookmark", "href": "http://172.30.13.9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:17.474 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:17.525 38 INFO tempest.lib.common.rest_client [req-2492fba1-bb6b-426d-991a-f9c1bf89cfd5 ] Request (ImagesRbacTest:test_list_images): 200 GET http://172.30.13.94/identity/v3/projects/de56e503820949e99d6d463d5f10ba23/users/25dc6c54a2c2402c8e7d7ddc26efeda6/roles 0.050s 2020-11-06 17:59:17.525 38 DEBUG tempest.lib.common.rest_client [req-2492fba1-bb6b-426d-991a-f9c1bf89cfd5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2492fba1-bb6b-426d-991a-f9c1bf89cfd5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/de56e503820949e99d6d463d5f10ba23/users/25dc6c54a2c2402c8e7d7ddc26efeda6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/de56e503820949e99d6d463d5f10ba23/users/25dc6c54a2c2402c8e7d7ddc26efeda6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:17.563 38 INFO tempest.lib.common.rest_client [req-d44b73cc-8abc-4a12-9f78-2a11a0eb8db3 ] Request (ImagesRbacTest:test_list_images): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 17:59:17.564 38 DEBUG tempest.lib.common.rest_client [req-d44b73cc-8abc-4a12-9f78-2a11a0eb8db3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d44b73cc-8abc-4a12-9f78-2a11a0eb8db3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "25dc6c54a2c2402c8e7d7ddc26efeda6", "name": "tempest-ImagesRbacTest-199531719", "password_expires_at": null}, "audit_ids": ["jKNzd7bbSYGBF9_h3rK9MA"], "expires_at": "2020-11-06T18:59:17.000000Z", "issued_at": "2020-11-06T17:59:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "de56e503820949e99d6d463d5f10ba23", "name": "tempest-ImagesRbacTest-199531719"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:17.567 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:17.568 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:17.569 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_images, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:17.570 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:17.627 38 INFO tempest.lib.common.rest_client [req-531b31d7-43cf-4a99-a462-ca6a64697da8 ] Request (ImagesRbacTest:test_list_images_with_details): 200 GET http://172.30.13.94/identity/v3/projects/de56e503820949e99d6d463d5f10ba23/users/25dc6c54a2c2402c8e7d7ddc26efeda6/roles 0.056s 2020-11-06 17:59:17.627 38 DEBUG tempest.lib.common.rest_client [req-531b31d7-43cf-4a99-a462-ca6a64697da8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-531b31d7-43cf-4a99-a462-ca6a64697da8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/de56e503820949e99d6d463d5f10ba23/users/25dc6c54a2c2402c8e7d7ddc26efeda6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/de56e503820949e99d6d463d5f10ba23/users/25dc6c54a2c2402c8e7d7ddc26efeda6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:17.666 38 INFO tempest.lib.common.rest_client [req-535dd631-4002-4162-9ef3-7ef9f23ec0ed ] Request (ImagesRbacTest:test_list_images_with_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 17:59:17.666 38 DEBUG tempest.lib.common.rest_client [req-535dd631-4002-4162-9ef3-7ef9f23ec0ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-535dd631-4002-4162-9ef3-7ef9f23ec0ed', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "25dc6c54a2c2402c8e7d7ddc26efeda6", "name": "tempest-ImagesRbacTest-199531719", "password_expires_at": null}, "audit_ids": ["MwMsyMOvTn2fDn6ZamEl7Q"], "expires_at": "2020-11-06T18:59:17.000000Z", "issued_at": "2020-11-06T17:59:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "de56e503820949e99d6d463d5f10ba23", "name": "tempest-ImagesRbacTest-199531719"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:17.853 38 INFO tempest.lib.common.rest_client [req-c7d72a27-5b1b-4522-86d8-c9af4b72694a ] Request (ImagesRbacTest:test_list_images_with_details): 200 GET http://172.30.13.94/compute/v2.1/images/detail 0.186s 2020-11-06 17:59:17.854 38 DEBUG tempest.lib.common.rest_client [req-c7d72a27-5b1b-4522-86d8-c9af4b72694a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '9895', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c7d72a27-5b1b-4522-86d8-c9af4b72694a', 'x-compute-request-id': 'req-c7d72a27-5b1b-4522-86d8-c9af4b72694a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/detail'} Body: b'{"images": [{"id": "79857242-51d5-482b-98a4-c43b23ecaf63", "name": "tempest-ImagesRbacTest-image-1285866100", "minRam": 0, "minDisk": 0, "metadata": {}, "created": "2020-11-06T17:59:17Z", "updated": "2020-11-06T17:59:17Z", "status": "SAVING", "progress": 25, "OS-EXT-IMG-SIZE:size": 0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/79857242-51d5-482b-98a4-c43b23ecaf63"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/79857242-51d5-482b-98a4-c43b23ecaf63"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/79857242-51d5-482b-98a4-c43b23ecaf63"}]}, {"id": "de34e15c-369a-4038-89ed-d4de22d742c6", "name": "patrole_reader-img_alt_30048f18-b96b-4343-a720-1173982b59b8", "minRam": 0, "minDisk": 0, "metadata": {"hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_alt_30048f18-b96b-4343-a720-1173982b59b8", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8"}, "created": "2020-11-06T17:58:16Z", "updated": "2020-11-06T17:58:16Z", "status": "ACTIVE", "progress": 100, "OS-EXT-IMG-SIZE:size": 12716032, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/de34e15c-369a-4038-89ed-d4de22d742c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/de34e15c-369a-4038-89ed-d4de22d742c6"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/de34e15c-369a-4038-89ed-d4de22d742c6"}]}, {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "name": "patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "minRam": 0, "minDisk": 0, "metadata": {"hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8"}, "created": "2020-11-06T17:57:44Z", "updated": "2020-11-06T17:57:45Z", "status": "ACTIVE", "progress": 100, "OS-EXT-IMG-SIZE:size": 12716032, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/56b368f6-9136-40ec-a04c-564d02c95e42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, {"id": "8055b7b0-b803-4fed-8862-03824d953a2e", "name": "tempest-ServerActionsRbacTest-image-763620719", "minRam": 0, "minDisk": 1, "metadata": {"base_image_ref": "55e4eaa7-0735-4ff6-869f-f6bbf0aa5457", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_location": "snapshot", "image_state": "available", "image_type": "snapshot", "instance_uuid": "e4859202-4b2a-4998-8c65-da02e723e408", "owner_id": "6502bfc083b44ec9b5492d8b1dbb452b", "owner_project_name": "tempest-ServerActionsRbacTest-1147666685", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_member-img_29628109-ff86-4992-a718-2f4b83dd48b7", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1147666685", "user_id": "db9d72d2a52f485a9d48320fa6aca86c"}, "created": "2020-11-06T17:51:20Z", "updated": "2020-11-06T17:51:31Z", "status": "ACTIVE", "progress": 100, "OS-EXT-IMG-SIZE:size": 1073741824, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/8055b7b0-b803-4fed-8862-03824d953a2e"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/8055b7b0-b803-4fed-8862-03824d953a2e"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/8055b7b0-b803-4fed-8862-03824d953a2e"}], "server": {"id": "e4859202-4b2a-4998-8c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:17.864 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:17.919 38 INFO tempest.lib.common.rest_client [req-393b077a-e082-4007-80eb-b956cce6c51b ] Request (ImagesRbacTest:test_list_images_with_details): 200 GET http://172.30.13.94/identity/v3/projects/de56e503820949e99d6d463d5f10ba23/users/25dc6c54a2c2402c8e7d7ddc26efeda6/roles 0.055s 2020-11-06 17:59:17.920 38 DEBUG tempest.lib.common.rest_client [req-393b077a-e082-4007-80eb-b956cce6c51b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-393b077a-e082-4007-80eb-b956cce6c51b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/de56e503820949e99d6d463d5f10ba23/users/25dc6c54a2c2402c8e7d7ddc26efeda6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/de56e503820949e99d6d463d5f10ba23/users/25dc6c54a2c2402c8e7d7ddc26efeda6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:17.956 38 INFO tempest.lib.common.rest_client [req-4913bd79-325b-455f-9c0a-087329bae7c8 ] Request (ImagesRbacTest:test_list_images_with_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 17:59:17.956 38 DEBUG tempest.lib.common.rest_client [req-4913bd79-325b-455f-9c0a-087329bae7c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4913bd79-325b-455f-9c0a-087329bae7c8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "25dc6c54a2c2402c8e7d7ddc26efeda6", "name": "tempest-ImagesRbacTest-199531719", "password_expires_at": null}, "audit_ids": ["kUI2O2dJQDCsNxwmp-iiwA"], "expires_at": "2020-11-06T18:59:17.000000Z", "issued_at": "2020-11-06T17:59:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "de56e503820949e99d6d463d5f10ba23", "name": "tempest-ImagesRbacTest-199531719"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:17.959 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:17.960 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:17.961 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_image, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:17.961 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:18.022 38 INFO tempest.lib.common.rest_client [req-6705696b-23ea-401b-bfa6-33090666464d ] Request (ImagesRbacTest:test_show_image_details): 200 GET http://172.30.13.94/identity/v3/projects/de56e503820949e99d6d463d5f10ba23/users/25dc6c54a2c2402c8e7d7ddc26efeda6/roles 0.060s 2020-11-06 17:59:18.022 38 DEBUG tempest.lib.common.rest_client [req-6705696b-23ea-401b-bfa6-33090666464d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6705696b-23ea-401b-bfa6-33090666464d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/de56e503820949e99d6d463d5f10ba23/users/25dc6c54a2c2402c8e7d7ddc26efeda6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/de56e503820949e99d6d463d5f10ba23/users/25dc6c54a2c2402c8e7d7ddc26efeda6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:18.061 38 INFO tempest.lib.common.rest_client [req-b4b3dbab-a1f0-4bc1-bd15-ef87e7a410a0 ] Request (ImagesRbacTest:test_show_image_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 17:59:18.062 38 DEBUG tempest.lib.common.rest_client [req-b4b3dbab-a1f0-4bc1-bd15-ef87e7a410a0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b4b3dbab-a1f0-4bc1-bd15-ef87e7a410a0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "25dc6c54a2c2402c8e7d7ddc26efeda6", "name": "tempest-ImagesRbacTest-199531719", "password_expires_at": null}, "audit_ids": ["Mkz2QNZTRGuc3rGD5GlNbw"], "expires_at": "2020-11-06T18:59:18.000000Z", "issued_at": "2020-11-06T17:59:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "de56e503820949e99d6d463d5f10ba23", "name": "tempest-ImagesRbacTest-199531719"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:18.117 37 INFO tempest.lib.common.rest_client [req-bc51c8c0-cfd2-41bb-9d39-482c82028dee ] Request (SecurtiyGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161 0.198s 2020-11-06 17:59:18.118 37 DEBUG tempest.lib.common.rest_client [req-bc51c8c0-cfd2-41bb-9d39-482c82028dee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bc51c8c0-cfd2-41bb-9d39-482c82028dee', 'x-compute-request-id': 'req-bc51c8c0-cfd2-41bb-9d39-482c82028dee', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161'} Body: b'{"server": {"id": "53da6d79-4555-422b-bb06-07e620333161", "name": "tempest-SecurtiyGroupsRbacTest-server-684714768", "status": "BUILD", "tenant_id": "d73ae082cf2c4889915adb0d4efc6f2e", "user_id": "eabd533369674823b012ab299376bbb3", "metadata": {}, "hostId": "66bc7addb145ae6ae0381ad01ab057fa2344ebcf5635095860cf236c", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:13Z", "updated": "2020-11-06T17:59:14Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/53da6d79-4555-422b-bb06-07e620333161"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033be", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:18.133 39 INFO tempest.lib.common.rest_client [req-e7d57752-7f5c-48a8-87e0-431955494af6 ] Request (ServerActionsRbacTest:setUpClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/906603d5-36c3-4c3f-b745-9192f15886cf/add_router_interface 2.017s 2020-11-06 17:59:18.134 39 DEBUG tempest.lib.common.rest_client [req-e7d57752-7f5c-48a8-87e0-431955494af6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "3756fe18-1911-45a0-a2ec-1e0376b1efba"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-e7d57752-7f5c-48a8-87e0-431955494af6', 'date': 'Fri, 06 Nov 2020 17:59:18 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/906603d5-36c3-4c3f-b745-9192f15886cf/add_router_interface'} Body: b'{"id": "906603d5-36c3-4c3f-b745-9192f15886cf", "tenant_id": "c58012c4ddf74aae9fa1e0ca958b3b2f", "port_id": "be9e5fbd-4b5d-488b-b829-275013a330aa", "network_id": "529aec4e-dc4d-461e-835f-1ce0fc52633a", "subnet_id": "3756fe18-1911-45a0-a2ec-1e0376b1efba", "subnet_ids": ["3756fe18-1911-45a0-a2ec-1e0376b1efba"]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:18.134 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerActionsRbacTest-627976037', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'c58012c4ddf74aae9fa1e0ca958b3b2f', 'project_name': 'tempest-ServerActionsRbacTest-627976037', 'tenant_id': 'c58012c4ddf74aae9fa1e0ca958b3b2f', 'tenant_name': 'tempest-ServerActionsRbacTest-627976037', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '9f78862a1d93489cb8b26f599b4ca6db'}, Network: {'id': '529aec4e-dc4d-461e-835f-1ce0fc52633a', 'name': 'tempest-ServerActionsRbacTest-1107501304-network', 'tenant_id': 'c58012c4ddf74aae9fa1e0ca958b3b2f', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': 'c58012c4ddf74aae9fa1e0ca958b3b2f', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 59, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T17:59:12Z', 'updated_at': '2020-11-06T17:59:12Z', 'revision_number': 1}, Subnet: {'id': '3756fe18-1911-45a0-a2ec-1e0376b1efba', 'name': 'tempest-ServerActionsRbacTest-1107501304-subnet', 'tenant_id': 'c58012c4ddf74aae9fa1e0ca958b3b2f', 'network_id': '529aec4e-dc4d-461e-835f-1ce0fc52633a', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-11-06T17:59:13Z', 'updated_at': '2020-11-06T17:59:13Z', 'revision_number': 0, 'project_id': 'c58012c4ddf74aae9fa1e0ca958b3b2f'}, Router: {'id': '906603d5-36c3-4c3f-b745-9192f15886cf', 'name': 'tempest-ServerActionsRbacTest-1107501304-router', 'tenant_id': 'c58012c4ddf74aae9fa1e0ca958b3b2f', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.152'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::12b'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-11-06T17:59:13Z', 'updated_at': '2020-11-06T17:59:14Z', 'revision_number': 3, 'project_id': 'c58012c4ddf74aae9fa1e0ca958b3b2f'} 2020-11-06 17:59:18.195 38 INFO tempest.lib.common.rest_client [req-4991a2e2-58c8-41ab-8255-7b98fbd4d9fb ] Request (ImagesRbacTest:test_show_image_details): 200 GET http://172.30.13.94/compute/v2.1/images/79857242-51d5-482b-98a4-c43b23ecaf63 0.132s 2020-11-06 17:59:18.196 38 DEBUG tempest.lib.common.rest_client [req-4991a2e2-58c8-41ab-8255-7b98fbd4d9fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '650', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4991a2e2-58c8-41ab-8255-7b98fbd4d9fb', 'x-compute-request-id': 'req-4991a2e2-58c8-41ab-8255-7b98fbd4d9fb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/79857242-51d5-482b-98a4-c43b23ecaf63'} Body: b'{"image": {"id": "79857242-51d5-482b-98a4-c43b23ecaf63", "name": "tempest-ImagesRbacTest-image-1285866100", "minRam": 0, "minDisk": 0, "metadata": {}, "created": "2020-11-06T17:59:17Z", "updated": "2020-11-06T17:59:17Z", "status": "SAVING", "progress": 25, "OS-EXT-IMG-SIZE:size": 0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/79857242-51d5-482b-98a4-c43b23ecaf63"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/79857242-51d5-482b-98a4-c43b23ecaf63"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/79857242-51d5-482b-98a4-c43b23ecaf63"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:18.203 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:18.250 38 INFO tempest.lib.common.rest_client [req-18fbecd7-18ac-4458-9f80-79fdd176a800 ] Request (ImagesRbacTest:test_show_image_details): 200 GET http://172.30.13.94/identity/v3/projects/de56e503820949e99d6d463d5f10ba23/users/25dc6c54a2c2402c8e7d7ddc26efeda6/roles 0.046s 2020-11-06 17:59:18.251 38 DEBUG tempest.lib.common.rest_client [req-18fbecd7-18ac-4458-9f80-79fdd176a800 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-18fbecd7-18ac-4458-9f80-79fdd176a800', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/de56e503820949e99d6d463d5f10ba23/users/25dc6c54a2c2402c8e7d7ddc26efeda6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/de56e503820949e99d6d463d5f10ba23/users/25dc6c54a2c2402c8e7d7ddc26efeda6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:18.256 39 INFO tempest.lib.common.rest_client [req-bc4f50ad-2c6c-4bfa-95bd-5a0ce1990d35 ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.111s 2020-11-06 17:59:18.257 39 DEBUG tempest.lib.common.rest_client [req-bc4f50ad-2c6c-4bfa-95bd-5a0ce1990d35 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bc4f50ad-2c6c-4bfa-95bd-5a0ce1990d35', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9f78862a1d93489cb8b26f599b4ca6db", "name": "tempest-ServerActionsRbacTest-627976037", "password_expires_at": null}, "audit_ids": ["49Pnv-76Rkah82hoiKI0Fg"], "expires_at": "2020-11-06T18:59:18.000000Z", "issued_at": "2020-11-06T17:59:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c58012c4ddf74aae9fa1e0ca958b3b2f", "name": "tempest-ServerActionsRbacTest-627976037"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c58012c4ddf74aae9fa1e0ca958b3b2f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c58012c4ddf74aae9fa1e0ca958b3b2f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c58012c4ddf74aae9fa1e0ca958b3b2f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c58012c4ddf74aae9fa1e0ca958b3b2f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c58012c4ddf74aae9fa1e0ca958b3b2f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c58012c4ddf74aae9fa1e0ca958b3b2f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:18.282 38 INFO tempest.lib.common.rest_client [req-d895fa8d-5c9e-4e91-9373-a90fb2dbb551 ] Request (ImagesRbacTest:test_show_image_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.030s 2020-11-06 17:59:18.283 38 DEBUG tempest.lib.common.rest_client [req-d895fa8d-5c9e-4e91-9373-a90fb2dbb551 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d895fa8d-5c9e-4e91-9373-a90fb2dbb551', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "25dc6c54a2c2402c8e7d7ddc26efeda6", "name": "tempest-ImagesRbacTest-199531719", "password_expires_at": null}, "audit_ids": ["g547zyWERw6kfD6V4L8yig"], "expires_at": "2020-11-06T18:59:18.000000Z", "issued_at": "2020-11-06T17:59:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "de56e503820949e99d6d463d5f10ba23", "name": "tempest-ImagesRbacTest-199531719"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de56e503820949e99d6d463d5f10ba23", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:18.292 39 INFO tempest.lib.common.rest_client [req-d22df3ec-fae6-4ba6-93ff-976d76e8a999 ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 17:59:18.292 39 DEBUG tempest.lib.common.rest_client [req-d22df3ec-fae6-4ba6-93ff-976d76e8a999 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d22df3ec-fae6-4ba6-93ff-976d76e8a999', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["nXxeQjCkQ0aKbBdN2Epubw"], "expires_at": "2020-11-06T18:59:18.000000Z", "issued_at": "2020-11-06T17:59:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:18.344 39 INFO tempest.lib.common.rest_client [req-f735781a-dc02-497c-8a61-384e20474e8f ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 17:59:18.344 39 DEBUG tempest.lib.common.rest_client [req-f735781a-dc02-497c-8a61-384e20474e8f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f735781a-dc02-497c-8a61-384e20474e8f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["Cg3-lnK1TNKwqB6GoGkKnA"], "expires_at": "2020-11-06T18:59:18.000000Z", "issued_at": "2020-11-06T17:59:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:18.402 39 INFO tempest.lib.common.rest_client [req-ac5a4a4d-f2c0-4cdc-a348-0f5cb678207b ] Request (ServerActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.056s 2020-11-06 17:59:18.403 39 DEBUG tempest.lib.common.rest_client [req-ac5a4a4d-f2c0-4cdc-a348-0f5cb678207b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ac5a4a4d-f2c0-4cdc-a348-0f5cb678207b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:18.430 38 INFO tempest.lib.common.rest_client [req-469e13d1-0eff-4215-a882-5468242d30e7 ] Request (ImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/79857242-51d5-482b-98a4-c43b23ecaf63 0.145s 2020-11-06 17:59:18.431 38 DEBUG tempest.lib.common.rest_client [req-469e13d1-0eff-4215-a882-5468242d30e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-469e13d1-0eff-4215-a882-5468242d30e7', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/79857242-51d5-482b-98a4-c43b23ecaf63'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:18.452 38 INFO tempest.lib.common.rest_client [req-d8b7f228-c60c-4973-a848-2d409a9a910d ] Request (ImagesRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/79857242-51d5-482b-98a4-c43b23ecaf63 0.020s 2020-11-06 17:59:18.452 38 DEBUG tempest.lib.common.rest_client [req-d8b7f228-c60c-4973-a848-2d409a9a910d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-d8b7f228-c60c-4973-a848-2d409a9a910d', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/79857242-51d5-482b-98a4-c43b23ecaf63'} Body: b'{"message": "No image found with ID 79857242-51d5-482b-98a4-c43b23ecaf63

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:18.452 39 INFO tempest.lib.common.rest_client [req-6a655723-b653-4620-a9b1-80ff3c7873e7 ] Request (ServerActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.049s 2020-11-06 17:59:18.453 39 DEBUG tempest.lib.common.rest_client [req-6a655723-b653-4620-a9b1-80ff3c7873e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6a655723-b653-4620-a9b1-80ff3c7873e7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:18.454 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 17:59:18.454 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:18.508 39 INFO tempest.lib.common.rest_client [req-438f1969-f68d-4415-aa9a-2ecd9bc4a7b3 ] Request (ServerActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.053s 2020-11-06 17:59:18.509 39 DEBUG tempest.lib.common.rest_client [req-438f1969-f68d-4415-aa9a-2ecd9bc4a7b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-438f1969-f68d-4415-aa9a-2ecd9bc4a7b3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:18.569 39 INFO tempest.lib.common.rest_client [req-2a6636f9-6597-4379-a87e-07652f53512d ] Request (ServerActionsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles/72a4576c553448cd941b052c1ca0cf2d 0.059s 2020-11-06 17:59:18.570 39 DEBUG tempest.lib.common.rest_client [req-2a6636f9-6597-4379-a87e-07652f53512d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2a6636f9-6597-4379-a87e-07652f53512d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:18.610 38 INFO tempest.lib.common.rest_client [req-e9441408-07c4-45bc-98e8-41e7fa6c536f ] Request (ImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/25dc6c54a2c2402c8e7d7ddc26efeda6 0.157s 2020-11-06 17:59:18.611 38 DEBUG tempest.lib.common.rest_client [req-e9441408-07c4-45bc-98e8-41e7fa6c536f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e9441408-07c4-45bc-98e8-41e7fa6c536f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/25dc6c54a2c2402c8e7d7ddc26efeda6'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:18.680 39 INFO tempest.lib.common.rest_client [req-e7aca447-9006-435d-acdf-ed0f9864572b ] Request (ServerActionsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles/a629c95d64b3416fb80ae90af4f69c05 0.109s 2020-11-06 17:59:18.681 39 DEBUG tempest.lib.common.rest_client [req-e7aca447-9006-435d-acdf-ed0f9864572b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e7aca447-9006-435d-acdf-ed0f9864572b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:18.685 40 INFO tempest.lib.common.rest_client [req-7f4a4205-bf59-4620-b40d-b317c9eeeb8b ] Request (ServerConsolesRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9 0.296s 2020-11-06 17:59:18.685 40 DEBUG tempest.lib.common.rest_client [req-7f4a4205-bf59-4620-b40d-b317c9eeeb8b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1720', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7f4a4205-bf59-4620-b40d-b317c9eeeb8b', 'x-compute-request-id': 'req-7f4a4205-bf59-4620-b40d-b317c9eeeb8b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9'} Body: b'{"server": {"id": "91c916c9-7f91-4941-b349-0e62b28deaa9", "name": "tempest-ServerConsolesRbacTest-server-1714121832", "status": "ACTIVE", "tenant_id": "0cd9895a4bd84f8a859ddbcbf39a0d72", "user_id": "d83a612e30aa42b18d464c0b2cbd4044", "metadata": {}, "hostId": "1c6caf91203d31288fb481147bb6ec456942b48a789c1a8e4f462b48", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:09Z", "updated": "2020-11-06T17:59:17Z", "addresses": {"tempest-ServerConsolesRbacTest-1753510296-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:e5:b1:c3"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/91c916c9-7f91-4941-b349-0e62b28deaa9"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:16.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:18.701 40 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 9 second wait 2020-11-06 17:59:18.702 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:18.702 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.703 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.703 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.703 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.704 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.704 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.704 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.705 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.705 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.705 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.706 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.706 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.706 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.707 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.707 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.707 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.707 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.708 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.708 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.708 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.708 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.709 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.709 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.709 38 INFO tempest.lib.common.rest_client [req-81678d90-6ece-4e1a-bc03-b396183e41cf ] Request (ImagesRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-11-06 17:59:18.709 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.709 38 DEBUG tempest.lib.common.rest_client [req-81678d90-6ece-4e1a-bc03-b396183e41cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-81678d90-6ece-4e1a-bc03-b396183e41cf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["VAG5m6vUQLiM4zBY28AzKQ"], "expires_at": "2020-11-06T18:59:18.000000Z", "issued_at": "2020-11-06T17:59:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:18.710 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.710 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.710 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.710 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.711 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.711 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.711 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.711 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.712 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.712 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.712 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.712 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.713 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.713 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.713 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.714 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.714 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.714 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.714 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.715 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.715 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.715 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.716 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.716 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.716 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.716 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.717 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.717 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.717 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.718 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.718 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.718 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.718 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.719 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.719 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.719 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.720 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.720 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.720 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.721 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.721 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.721 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.721 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.722 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.722 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.722 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.722 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.723 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.723 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.723 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.724 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:18.725 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-console-output, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:18.725 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:18.837 40 INFO tempest.lib.common.rest_client [req-db418206-6620-443d-bd28-82d92e9b7383 ] Request (ServerConsolesRbacTest:test_get_console_output): 200 GET http://172.30.13.94/identity/v3/projects/0cd9895a4bd84f8a859ddbcbf39a0d72/users/d83a612e30aa42b18d464c0b2cbd4044/roles 0.111s 2020-11-06 17:59:18.837 40 DEBUG tempest.lib.common.rest_client [req-db418206-6620-443d-bd28-82d92e9b7383 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-db418206-6620-443d-bd28-82d92e9b7383', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0cd9895a4bd84f8a859ddbcbf39a0d72/users/d83a612e30aa42b18d464c0b2cbd4044/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0cd9895a4bd84f8a859ddbcbf39a0d72/users/d83a612e30aa42b18d464c0b2cbd4044/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:18.927 40 INFO tempest.lib.common.rest_client [req-92fc0bec-d519-439d-847a-24e76bea29bb ] Request (ServerConsolesRbacTest:test_get_console_output): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 17:59:18.927 40 DEBUG tempest.lib.common.rest_client [req-92fc0bec-d519-439d-847a-24e76bea29bb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-92fc0bec-d519-439d-847a-24e76bea29bb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d83a612e30aa42b18d464c0b2cbd4044", "name": "tempest-ServerConsolesRbacTest-101764086", "password_expires_at": null}, "audit_ids": ["aI9U2_wiTRmJ2cHepuApPQ"], "expires_at": "2020-11-06T18:59:18.000000Z", "issued_at": "2020-11-06T17:59:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0cd9895a4bd84f8a859ddbcbf39a0d72", "name": "tempest-ServerConsolesRbacTest-101764086"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0cd9895a4bd84f8a859ddbcbf39a0d72", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0cd9895a4bd84f8a859ddbcbf39a0d72", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0cd9895a4bd84f8a859ddbcbf39a0d72", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cd9895a4bd84f8a859ddbcbf39a0d72", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cd9895a4bd84f8a859ddbcbf39a0d72", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cd9895a4bd84f8a859ddbcbf39a0d72", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:19.049 38 INFO tempest.lib.common.rest_client [req-348df4e4-5662-4816-9ed2-b399bd01f9ec ] Request (ImagesRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=de56e503820949e99d6d463d5f10ba23&name=default 0.339s 2020-11-06 17:59:19.050 38 DEBUG tempest.lib.common.rest_client [req-348df4e4-5662-4816-9ed2-b399bd01f9ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-348df4e4-5662-4816-9ed2-b399bd01f9ec', 'date': 'Fri, 06 Nov 2020 17:59:19 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=de56e503820949e99d6d463d5f10ba23&name=default'} Body: b'{"security_groups": [{"id": "5f0c468c-8e8c-4837-91dd-9c55cb3844ef", "name": "default", "stateful": true, "tenant_id": "de56e503820949e99d6d463d5f10ba23", "description": "Default security group", "security_group_rules": [{"id": "23b3e0e5-c2e3-458b-879a-2a9cf629be1f", "tenant_id": "de56e503820949e99d6d463d5f10ba23", "security_group_id": "5f0c468c-8e8c-4837-91dd-9c55cb3844ef", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:59:18Z", "updated_at": "2020-11-06T17:59:18Z", "revision_number": 0, "project_id": "de56e503820949e99d6d463d5f10ba23"}, {"id": "a2c0a402-471f-4284-b5b7-ff282316b7f9", "tenant_id": "de56e503820949e99d6d463d5f10ba23", "security_group_id": "5f0c468c-8e8c-4837-91dd-9c55cb3844ef", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "5f0c468c-8e8c-4837-91dd-9c55cb3844ef", "description": null, "tags": [], "created_at": "2020-11-06T17:59:18Z", "updated_at": "2020-11-06T17:59:18Z", "revision_number": 0, "project_id": "de56e503820949e99d6d463d5f10ba23"}, {"id": "d90840e2-575d-455f-87d5-acf5d00323bc", "tenant_id": "de56e503820949e99d6d463d5f10ba23", "security_group_id": "5f0c468c-8e8c-4837-91dd-9c55cb3844ef", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "5f0c468c-8e8c-4837-91dd-9c55cb3844ef", "description": null, "tags": [], "created_at": "2020-11-06T17:59:18Z", "updated_at": "2020-11-06T17:59:18Z", "revision_number": 0, "project_id": "de56e503820949e99d6d463d5f10ba23"}, {"id": "f4967562-c4db-4f17-8201-fe3a7d46a328", "tenant_id": "de56e503820949e99d6d463d5f10ba23", "security_group_id": "5f0c468c-8e8c-4837-91dd-9c55cb3844ef", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:59:18Z", "updated_at": "2020-11-06T17:59:18Z", "revision_number": 0, "project_id": "de56e503820949e99d6d463d5f10ba23"}], "tags": [], "created_at": "2020-11-06T17:59:18Z", "updated_at": "2020-11-06T17:59:18Z", "revision_number": 1, "project_id": "de56e503820949e99d6d463d5f10ba23"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:19.169 38 INFO tempest.lib.common.rest_client [req-6cd57d3b-fb33-4c6f-98cd-0997539678bc ] Request (ImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/5f0c468c-8e8c-4837-91dd-9c55cb3844ef 0.118s 2020-11-06 17:59:19.169 38 DEBUG tempest.lib.common.rest_client [req-6cd57d3b-fb33-4c6f-98cd-0997539678bc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-6cd57d3b-fb33-4c6f-98cd-0997539678bc', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 17:59:19 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/5f0c468c-8e8c-4837-91dd-9c55cb3844ef'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:19.198 40 INFO tempest.lib.common.rest_client [req-8271f006-d08e-44ec-abb4-02ec2a4d4108 ] Request (ServerConsolesRbacTest:test_get_console_output): 200 POST http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9/action 0.268s 2020-11-06 17:59:19.199 40 DEBUG tempest.lib.common.rest_client [req-8271f006-d08e-44ec-abb4-02ec2a4d4108 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-getConsoleOutput": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '22114', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8271f006-d08e-44ec-abb4-02ec2a4d4108', 'x-compute-request-id': 'req-8271f006-d08e-44ec-abb4-02ec2a4d4108', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9/action'} Body: b'{"output": "[ 0.000000] Initializing cgroup subsys cpuset\\n[ 0.000000] Initializing cgroup subsys cpu\\n[ 0.000000] Initializing cgroup subsys cpuacct\\n[ 0.000000] Linux version 4.4.0-28-generic (buildd@lcy01-13) (gcc version 5.3.1 20160413 (Ubuntu 5.3.1-14ubuntu2.1) ) #47-Ubuntu SMP Fri Jun 24 10:09:13 UTC 2016 (Ubuntu 4.4.0-28.47-generic 4.4.13)\\n[ 0.000000] Command line: LABEL=cirros-rootfs ro console=tty1 console=ttyS0\\n[ 0.000000] KERNEL supported cpus:\\n[ 0.000000] Intel GenuineIntel\\n[ 0.000000] AMD AuthenticAMD\\n[ 0.000000] Centaur CentaurHauls\\n[ 0.000000] x86/fpu: Legacy x87 FPU detected.\\n[ 0.000000] x86/fpu: Using \'lazy\' FPU context switches.\\n[ 0.000000] e820: BIOS-provided physical RAM map:\\n[ 0.000000] BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable\\n[ 0.000000] BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved\\n[ 0.000000] BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved\\n[ 0.000000] BIOS-e820: [mem 0x0000000000100000-0x000000001ffdbfff] usable\\n[ 0.000000] BIOS-e820: [mem 0x000000001ffdc000-0x000000001fffffff] reserved\\n[ 0.000000] BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved\\n[ 0.000000] BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved\\n[ 0.000000] NX (Execute Disable) protection: active\\n[ 0.000000] SMBIOS 2.8 present.\\n[ 0.000000] Hypervisor detected: KVM\\n[ 0.000000] e820: last_pfn = 0x1ffdc max_arch_pfn = 0x400000000\\n[ 0.000000] x86/PAT: PAT not supported by CPU.\\n[ 0.000000] found SMP MP-table at [mem 0x000f6a80-0x000f6a8f] mapped at [ffff8800000f6a80]\\n[ 0.000000] Scanning 1 areas for low memory corruption\\n[ 0.000000] RAMDISK: [mem 0x1fb16000-0x1ffcbfff]\\n[ 0.000000] ACPI: Early table checksum verification disabled\\n[ 0.000000] ACPI: RSDP 0x00000000000F6890 000014 (v00 BOCHS )\\n[ 0.000000] ACPI: RSDT 0x000000001FFE1504 00002C (v01 BOCHS BXPCRSDT 00000001 BXPC 00000001)\\n[ 0.000000] ACPI: FACP 0x000000001FFE1418 000074 (v01 BOCHS BXPCFACP 00000001 BXPC 00000001)\\n[ 0.000000] ACPI: DSDT 0x000000001FFE0040 0013D8 (v01 BOCHS BXPCDSDT 00000001 BXPC 00000001)\\n[ 0.000000] ACPI: FACS 0x000000001FFE0000 000040\\n[ 0.000000] ACPI: APIC 0x000000001FFE148C 000078 (v01 BOCHS BXPCAPIC 00000001 BXPC 00000001)\\n[ 0.000000] No NUMA configuration found\\n[ 0.000000] Faking a node at [mem 0x0000000000000000-0x000000001ffdbfff]\\n[ 0.000000] NODE_DATA(0) allocated [mem 0x1ffd7000-0x1ffdbfff]\\n[ 0.000000] kvm-clock: Using msrs 4b564d01 and 4b564d00\\n[ 0.000000] kvm-clock: cpu 0, msr 0:1ffd3001, primary cpu clock\\n[ 0.000000] kvm-clock: using sched offset of 885816803 cycles\\n[ 0.000000] clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns\\n[ 0.000000] Zone ranges:\\n[ 0.000000] DMA [mem 0x0000000000001000-0x0000000000ffffff]\\n[ 0.000000] DMA32 [mem 0x0000000001000000-0x000000001ffdbfff]\\n[ 0.000000] Normal empty\\n[ 0.000000] Device empty\\n[ 0.000000] Movable zone start for each node\\n[ 0.000000] Early memory node ranges\\n[ 0.000000] node 0: [mem 0x0000000000001000-0x000000000009efff]\\n[ 0.000000] node 0: [mem 0x0000000000100000-0x000000001ffdbfff]\\n[ 0.000000] Initmem setup node 0 [mem 0x0000000000001000-0x000000001ffdbfff]\\n[ 0.000000] ACPI: PM-Timer IO Port: 0x608\\n[ 0.000000] ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1])\\n[ 0.000000] IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23\\n[ 0.000000] ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)\\n[ 0.000000] ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level)\\n[ 0.000000] ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)\\n[ 0.000000] ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level)\\n[ 0.000000] ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level)\\n[ 0.000000] Using ACPI (MADT) for SMP configuration info _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:19.201 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:19.247 40 INFO tempest.lib.common.rest_client [req-42d874ef-9337-4323-90c1-a40c31f480d0 ] Request (ServerConsolesRbacTest:test_get_console_output): 200 GET http://172.30.13.94/identity/v3/projects/0cd9895a4bd84f8a859ddbcbf39a0d72/users/d83a612e30aa42b18d464c0b2cbd4044/roles 0.044s 2020-11-06 17:59:19.247 40 DEBUG tempest.lib.common.rest_client [req-42d874ef-9337-4323-90c1-a40c31f480d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-42d874ef-9337-4323-90c1-a40c31f480d0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0cd9895a4bd84f8a859ddbcbf39a0d72/users/d83a612e30aa42b18d464c0b2cbd4044/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0cd9895a4bd84f8a859ddbcbf39a0d72/users/d83a612e30aa42b18d464c0b2cbd4044/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:19.283 38 INFO tempest.lib.common.rest_client [req-9dd6fd76-28f8-48c7-9a0d-0739ad509bef ] Request (ImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/de56e503820949e99d6d463d5f10ba23 0.112s 2020-11-06 17:59:19.283 38 DEBUG tempest.lib.common.rest_client [req-9dd6fd76-28f8-48c7-9a0d-0739ad509bef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9dd6fd76-28f8-48c7-9a0d-0739ad509bef', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/de56e503820949e99d6d463d5f10ba23'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:19.339 40 INFO tempest.lib.common.rest_client [req-7659e625-10f3-4861-826d-18882d3bf3ba ] Request (ServerConsolesRbacTest:test_get_console_output): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-11-06 17:59:19.339 40 DEBUG tempest.lib.common.rest_client [req-7659e625-10f3-4861-826d-18882d3bf3ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7659e625-10f3-4861-826d-18882d3bf3ba', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d83a612e30aa42b18d464c0b2cbd4044", "name": "tempest-ServerConsolesRbacTest-101764086", "password_expires_at": null}, "audit_ids": ["I41gIX3LRwKssM8rBNCosg"], "expires_at": "2020-11-06T18:59:19.000000Z", "issued_at": "2020-11-06T17:59:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0cd9895a4bd84f8a859ddbcbf39a0d72", "name": "tempest-ServerConsolesRbacTest-101764086"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0cd9895a4bd84f8a859ddbcbf39a0d72", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0cd9895a4bd84f8a859ddbcbf39a0d72", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0cd9895a4bd84f8a859ddbcbf39a0d72", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cd9895a4bd84f8a859ddbcbf39a0d72", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cd9895a4bd84f8a859ddbcbf39a0d72", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cd9895a4bd84f8a859ddbcbf39a0d72", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:19.379 38 INFO tempest.lib.common.rest_client [req-3c7c781c-d69f-43ac-b84e-0db9100a181e ] Request (MigrationsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-11-06 17:59:19.379 38 DEBUG tempest.lib.common.rest_client [req-3c7c781c-d69f-43ac-b84e-0db9100a181e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3c7c781c-d69f-43ac-b84e-0db9100a181e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["TKZJJE2gS3u_jnElM0lS2A"], "expires_at": "2020-11-06T18:59:19.000000Z", "issued_at": "2020-11-06T17:59:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:19.424 38 INFO tempest.lib.common.rest_client [req-6434c02a-7543-4e65-bb24-9d64f53e6f9a ] Request (MigrationsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 17:59:19.425 38 DEBUG tempest.lib.common.rest_client [req-6434c02a-7543-4e65-bb24-9d64f53e6f9a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6434c02a-7543-4e65-bb24-9d64f53e6f9a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["RzF1dHwURPilhykbIwVXFQ"], "expires_at": "2020-11-06T18:59:19.000000Z", "issued_at": "2020-11-06T17:59:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:19.469 37 INFO tempest.lib.common.rest_client [req-7b949431-fd69-45aa-9566-23250072b0c8 ] Request (SecurtiyGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161 0.336s 2020-11-06 17:59:19.470 37 DEBUG tempest.lib.common.rest_client [req-7b949431-fd69-45aa-9566-23250072b0c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7b949431-fd69-45aa-9566-23250072b0c8', 'x-compute-request-id': 'req-7b949431-fd69-45aa-9566-23250072b0c8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161'} Body: b'{"server": {"id": "53da6d79-4555-422b-bb06-07e620333161", "name": "tempest-SecurtiyGroupsRbacTest-server-684714768", "status": "BUILD", "tenant_id": "d73ae082cf2c4889915adb0d4efc6f2e", "user_id": "eabd533369674823b012ab299376bbb3", "metadata": {}, "hostId": "66bc7addb145ae6ae0381ad01ab057fa2344ebcf5635095860cf236c", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:13Z", "updated": "2020-11-06T17:59:14Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/53da6d79-4555-422b-bb06-07e620333161"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033be", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:19.475 38 INFO tempest.lib.common.rest_client [req-7089fffb-ba2e-4641-b432-574e9a75dea2 ] Request (MigrationsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.048s 2020-11-06 17:59:19.475 38 DEBUG tempest.lib.common.rest_client [req-7089fffb-ba2e-4641-b432-574e9a75dea2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7089fffb-ba2e-4641-b432-574e9a75dea2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:19.537 38 INFO tempest.lib.common.rest_client [req-b303fada-e66c-49b7-b924-c2fc7f8cf031 ] Request (MigrationsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.060s 2020-11-06 17:59:19.537 38 DEBUG tempest.lib.common.rest_client [req-b303fada-e66c-49b7-b924-c2fc7f8cf031 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-MigrationsRbacTest-878640565-desc", "domain_id": "default", "name": "tempest-MigrationsRbacTest-878640565"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '372', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b303fada-e66c-49b7-b924-c2fc7f8cf031', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "ee3fbde688fc48ed9a40e991243e7fc4", "name": "tempest-MigrationsRbacTest-878640565", "domain_id": "default", "description": "tempest-MigrationsRbacTest-878640565-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/ee3fbde688fc48ed9a40e991243e7fc4"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:19.627 40 INFO tempest.lib.common.rest_client [req-290bdcc4-eabe-489a-8118-d4d5a53e9f12 ] Request (ServerConsolesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9 0.283s 2020-11-06 17:59:19.627 40 DEBUG tempest.lib.common.rest_client [req-290bdcc4-eabe-489a-8118-d4d5a53e9f12 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-290bdcc4-eabe-489a-8118-d4d5a53e9f12', 'x-compute-request-id': 'req-290bdcc4-eabe-489a-8118-d4d5a53e9f12', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:19.684 38 INFO tempest.lib.common.rest_client [req-a93f7da1-a896-49c2-a77d-5ddd3e105441 ] Request (MigrationsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.145s 2020-11-06 17:59:19.684 38 DEBUG tempest.lib.common.rest_client [req-a93f7da1-a896-49c2-a77d-5ddd3e105441 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-MigrationsRbacTest-878640565", "password": "V6^eeB71fapIQ8p", "project_id": "ee3fbde688fc48ed9a40e991243e7fc4", "email": "tempest-MigrationsRbacTest-400787639@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '390', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a93f7da1-a896-49c2-a77d-5ddd3e105441', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "ee3fbde688fc48ed9a40e991243e7fc4", "email": "tempest-MigrationsRbacTest-400787639@example.com", "id": "21650b8adc15421690a4a5902c4b370f", "name": "tempest-MigrationsRbacTest-878640565", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/21650b8adc15421690a4a5902c4b370f"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:19.734 38 INFO tempest.lib.common.rest_client [req-cb8441d2-16ef-4b27-a6ea-e6bd8ed8f3bf ] Request (MigrationsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.049s 2020-11-06 17:59:19.734 38 DEBUG tempest.lib.common.rest_client [req-cb8441d2-16ef-4b27-a6ea-e6bd8ed8f3bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cb8441d2-16ef-4b27-a6ea-e6bd8ed8f3bf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:19.763 39 INFO tempest.lib.common.rest_client [req-c967f4ba-e198-49e6-86a1-8a6c8f89dad2 ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-11-06 17:59:19.764 39 DEBUG tempest.lib.common.rest_client [req-c967f4ba-e198-49e6-86a1-8a6c8f89dad2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c967f4ba-e198-49e6-86a1-8a6c8f89dad2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["KG23OG5TSr2hmYwuMYPBTw"], "expires_at": "2020-11-06T18:59:19.000000Z", "issued_at": "2020-11-06T17:59:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:19.780 38 INFO tempest.lib.common.rest_client [req-25f9d938-44d8-4560-ac2c-5eb470653474 ] Request (MigrationsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.045s 2020-11-06 17:59:19.781 38 DEBUG tempest.lib.common.rest_client [req-25f9d938-44d8-4560-ac2c-5eb470653474 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-25f9d938-44d8-4560-ac2c-5eb470653474', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:19.804 39 INFO tempest.lib.common.rest_client [req-18ffa5e6-661d-41ca-aa24-ad67e617d87c ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 17:59:19.804 39 DEBUG tempest.lib.common.rest_client [req-18ffa5e6-661d-41ca-aa24-ad67e617d87c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-18ffa5e6-661d-41ca-aa24-ad67e617d87c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["FBkR_KtjQhesz2727oraOw"], "expires_at": "2020-11-06T18:59:19.000000Z", "issued_at": "2020-11-06T17:59:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:19.805 39 INFO tempest.lib.common.fixed_network [-] (ServerActionsRbacTest:setUpClass) Found network {'id': '795afc26-787e-4d38-9bc1-bc29e5b00fbc', 'name': 'tempest-ServerActionsRbacTest-1359272422-network', 'tenant_id': '21ea54a8c99a458890dbfde9b6dc3e3b', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '21ea54a8c99a458890dbfde9b6dc3e3b', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 55, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T17:59:07Z', 'updated_at': '2020-11-06T17:59:07Z', 'revision_number': 1} available for tenant 2020-11-06 17:59:19.852 38 INFO tempest.lib.common.rest_client [req-13fcfe47-0c5c-4a8f-86f8-2812815c4cdf ] Request (MigrationsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/ee3fbde688fc48ed9a40e991243e7fc4/users/21650b8adc15421690a4a5902c4b370f/roles/72a4576c553448cd941b052c1ca0cf2d 0.070s 2020-11-06 17:59:19.852 38 DEBUG tempest.lib.common.rest_client [req-13fcfe47-0c5c-4a8f-86f8-2812815c4cdf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-13fcfe47-0c5c-4a8f-86f8-2812815c4cdf', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ee3fbde688fc48ed9a40e991243e7fc4/users/21650b8adc15421690a4a5902c4b370f/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:19.853 38 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-MigrationsRbacTest-878640565', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'ee3fbde688fc48ed9a40e991243e7fc4', 'project_name': 'tempest-MigrationsRbacTest-878640565', 'tenant_id': 'ee3fbde688fc48ed9a40e991243e7fc4', 'tenant_name': 'tempest-MigrationsRbacTest-878640565', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '21650b8adc15421690a4a5902c4b370f'}, Network: None, Subnet: None, Router: None 2020-11-06 17:59:19.853 38 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-MigrationsRbacTest-878640565', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'ee3fbde688fc48ed9a40e991243e7fc4', 'project_name': 'tempest-MigrationsRbacTest-878640565', 'tenant_id': 'ee3fbde688fc48ed9a40e991243e7fc4', 'tenant_name': 'tempest-MigrationsRbacTest-878640565', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '21650b8adc15421690a4a5902c4b370f'}, Network: None, Subnet: None, Router: None 2020-11-06 17:59:19.864 40 INFO tempest.lib.common.rest_client [req-4590ea82-52ba-486e-af3f-2c75b6f889d7 ] Request (ServerConsolesRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9 0.236s 2020-11-06 17:59:19.865 40 DEBUG tempest.lib.common.rest_client [req-4590ea82-52ba-486e-af3f-2c75b6f889d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4590ea82-52ba-486e-af3f-2c75b6f889d7', 'x-compute-request-id': 'req-4590ea82-52ba-486e-af3f-2c75b6f889d7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9'} Body: b'{"server": {"id": "91c916c9-7f91-4941-b349-0e62b28deaa9", "name": "tempest-ServerConsolesRbacTest-server-1714121832", "status": "ACTIVE", "tenant_id": "0cd9895a4bd84f8a859ddbcbf39a0d72", "user_id": "d83a612e30aa42b18d464c0b2cbd4044", "metadata": {}, "hostId": "1c6caf91203d31288fb481147bb6ec456942b48a789c1a8e4f462b48", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:09Z", "updated": "2020-11-06T17:59:20Z", "addresses": {"tempest-ServerConsolesRbacTest-1753510296-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:e5:b1:c3"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/91c916c9-7f91-4941-b349-0e62b28deaa9"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:16.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:19.963 38 INFO tempest.lib.common.rest_client [req-10486f51-522c-415b-ad5d-033ddcff5f2d ] Request (MigrationsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.102s 2020-11-06 17:59:19.964 38 DEBUG tempest.lib.common.rest_client [req-10486f51-522c-415b-ad5d-033ddcff5f2d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6565', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-10486f51-522c-415b-ad5d-033ddcff5f2d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "21650b8adc15421690a4a5902c4b370f", "name": "tempest-MigrationsRbacTest-878640565", "password_expires_at": null}, "audit_ids": ["tQ7r2JjjSgmiMZ63ayXrWA"], "expires_at": "2020-11-06T18:59:19.000000Z", "issued_at": "2020-11-06T17:59:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ee3fbde688fc48ed9a40e991243e7fc4", "name": "tempest-MigrationsRbacTest-878640565"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ee3fbde688fc48ed9a40e991243e7fc4", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ee3fbde688fc48ed9a40e991243e7fc4", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ee3fbde688fc48ed9a40e991243e7fc4", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ee3fbde688fc48ed9a40e991243e7fc4", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ee3fbde688fc48ed9a40e991243e7fc4", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ee3fbde688fc48ed9a40e991243e7fc4", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:20.048 38 INFO tempest.lib.common.rest_client [req-97cd0ada-b426-4484-be6e-ae389a6c8cce ] Request (MigrationsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 17:59:20.049 38 DEBUG tempest.lib.common.rest_client [req-97cd0ada-b426-4484-be6e-ae389a6c8cce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-97cd0ada-b426-4484-be6e-ae389a6c8cce', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["rO4Bc38tSGSe01H9TsISKg"], "expires_at": "2020-11-06T18:59:19.000000Z", "issued_at": "2020-11-06T17:59:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:20.088 38 INFO tempest.lib.common.rest_client [req-ccf1e4aa-7ee6-4f71-8b79-0c2626632f5b ] Request (MigrationsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.029s 2020-11-06 17:59:20.088 38 DEBUG tempest.lib.common.rest_client [req-ccf1e4aa-7ee6-4f71-8b79-0c2626632f5b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ccf1e4aa-7ee6-4f71-8b79-0c2626632f5b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["NsfKxYzzTJygM5otSOVU7w"], "expires_at": "2020-11-06T18:59:20.000000Z", "issued_at": "2020-11-06T17:59:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:20.140 38 INFO tempest.lib.common.rest_client [req-e2777e31-62a8-4d9c-8b5c-dc83216e8f05 ] Request (MigrationsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.051s 2020-11-06 17:59:20.141 38 DEBUG tempest.lib.common.rest_client [req-e2777e31-62a8-4d9c-8b5c-dc83216e8f05 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e2777e31-62a8-4d9c-8b5c-dc83216e8f05', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:20.239 38 INFO tempest.lib.common.rest_client [req-cb58d3b5-4fa5-4658-b1df-49aea597ffeb ] Request (MigrationsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.097s 2020-11-06 17:59:20.239 38 DEBUG tempest.lib.common.rest_client [req-cb58d3b5-4fa5-4658-b1df-49aea597ffeb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cb58d3b5-4fa5-4658-b1df-49aea597ffeb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:20.240 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 17:59:20.240 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:20.290 38 INFO tempest.lib.common.rest_client [req-d9ce46d1-4b9b-4a4a-92a3-20c748e9d889 ] Request (MigrationsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/ee3fbde688fc48ed9a40e991243e7fc4/users/21650b8adc15421690a4a5902c4b370f/roles 0.048s 2020-11-06 17:59:20.290 38 DEBUG tempest.lib.common.rest_client [req-d9ce46d1-4b9b-4a4a-92a3-20c748e9d889 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d9ce46d1-4b9b-4a4a-92a3-20c748e9d889', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ee3fbde688fc48ed9a40e991243e7fc4/users/21650b8adc15421690a4a5902c4b370f/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ee3fbde688fc48ed9a40e991243e7fc4/users/21650b8adc15421690a4a5902c4b370f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:20.349 38 INFO tempest.lib.common.rest_client [req-5b6b65fd-cefb-4a92-ab21-4cc3adc0e7b3 ] Request (MigrationsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/ee3fbde688fc48ed9a40e991243e7fc4/users/21650b8adc15421690a4a5902c4b370f/roles/72a4576c553448cd941b052c1ca0cf2d 0.057s 2020-11-06 17:59:20.349 38 DEBUG tempest.lib.common.rest_client [req-5b6b65fd-cefb-4a92-ab21-4cc3adc0e7b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5b6b65fd-cefb-4a92-ab21-4cc3adc0e7b3', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ee3fbde688fc48ed9a40e991243e7fc4/users/21650b8adc15421690a4a5902c4b370f/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:20.470 38 INFO tempest.lib.common.rest_client [req-d0bebfc5-4c5d-4e7b-826d-deff287ab074 ] Request (MigrationsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/ee3fbde688fc48ed9a40e991243e7fc4/users/21650b8adc15421690a4a5902c4b370f/roles/a629c95d64b3416fb80ae90af4f69c05 0.120s 2020-11-06 17:59:20.471 38 DEBUG tempest.lib.common.rest_client [req-d0bebfc5-4c5d-4e7b-826d-deff287ab074 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d0bebfc5-4c5d-4e7b-826d-deff287ab074', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ee3fbde688fc48ed9a40e991243e7fc4/users/21650b8adc15421690a4a5902c4b370f/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:20.725 37 INFO tempest.lib.common.rest_client [req-6cb3a8aa-f620-4f4b-80ab-feacb733e100 ] Request (SecurtiyGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161 0.240s 2020-11-06 17:59:20.726 37 DEBUG tempest.lib.common.rest_client [req-6cb3a8aa-f620-4f4b-80ab-feacb733e100 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6cb3a8aa-f620-4f4b-80ab-feacb733e100', 'x-compute-request-id': 'req-6cb3a8aa-f620-4f4b-80ab-feacb733e100', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161'} Body: b'{"server": {"id": "53da6d79-4555-422b-bb06-07e620333161", "name": "tempest-SecurtiyGroupsRbacTest-server-684714768", "status": "BUILD", "tenant_id": "d73ae082cf2c4889915adb0d4efc6f2e", "user_id": "eabd533369674823b012ab299376bbb3", "metadata": {}, "hostId": "66bc7addb145ae6ae0381ad01ab057fa2344ebcf5635095860cf236c", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:13Z", "updated": "2020-11-06T17:59:14Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/53da6d79-4555-422b-bb06-07e620333161"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033be", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:20.736 39 INFO tempest.lib.common.rest_client [req-c85a1927-043f-4c1d-bec9-d5ce7ab88458 ] Request (ServerActionsRbacTest:setUpClass): 202 POST http://172.30.13.94/compute/v2.1/servers 0.930s 2020-11-06 17:59:20.736 39 DEBUG tempest.lib.common.rest_client [req-c85a1927-043f-4c1d-bec9-d5ce7ab88458 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-ServerActionsRbacTest-server-1406125582", "imageRef": "56b368f6-9136-40ec-a04c-564d02c95e42", "flavorRef": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "networks": [{"uuid": "795afc26-787e-4d38-9bc1-bc29e5b00fbc"}]}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c85a1927-043f-4c1d-bec9-d5ce7ab88458', 'x-compute-request-id': 'req-c85a1927-043f-4c1d-bec9-d5ce7ab88458', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "gPmWaiLkrT3x"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:20.840 39 INFO tempest.lib.common.rest_client [req-15b65d73-0bb6-4cc6-ab17-cd6b61a5190a ] Request (ServerActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.098s 2020-11-06 17:59:20.840 39 DEBUG tempest.lib.common.rest_client [req-15b65d73-0bb6-4cc6-ab17-cd6b61a5190a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1397', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-15b65d73-0bb6-4cc6-ab17-cd6b61a5190a', 'x-compute-request-id': 'req-15b65d73-0bb6-4cc6-ab17-cd6b61a5190a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "BUILD", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:21Z", "updated": "2020-11-06T17:59:20Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:21.067 40 INFO tempest.lib.common.rest_client [req-2b5be2bb-4d29-4858-bdb0-0b8061b38106 ] Request (ServerConsolesRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9 0.190s 2020-11-06 17:59:21.068 40 DEBUG tempest.lib.common.rest_client [req-2b5be2bb-4d29-4858-bdb0-0b8061b38106 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2b5be2bb-4d29-4858-bdb0-0b8061b38106', 'x-compute-request-id': 'req-2b5be2bb-4d29-4858-bdb0-0b8061b38106', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9'} Body: b'{"server": {"id": "91c916c9-7f91-4941-b349-0e62b28deaa9", "name": "tempest-ServerConsolesRbacTest-server-1714121832", "status": "ACTIVE", "tenant_id": "0cd9895a4bd84f8a859ddbcbf39a0d72", "user_id": "d83a612e30aa42b18d464c0b2cbd4044", "metadata": {}, "hostId": "1c6caf91203d31288fb481147bb6ec456942b48a789c1a8e4f462b48", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:09Z", "updated": "2020-11-06T17:59:21Z", "addresses": {"tempest-ServerConsolesRbacTest-1753510296-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:e5:b1:c3"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/91c916c9-7f91-4941-b349-0e62b28deaa9"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:16.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:21.557 38 INFO tempest.lib.common.rest_client [req-e4fa7c70-2293-4b3b-afcf-77f6eda011bc ] Request (MigrationsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 17:59:21.558 38 DEBUG tempest.lib.common.rest_client [req-e4fa7c70-2293-4b3b-afcf-77f6eda011bc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e4fa7c70-2293-4b3b-afcf-77f6eda011bc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "21650b8adc15421690a4a5902c4b370f", "name": "tempest-MigrationsRbacTest-878640565", "password_expires_at": null}, "audit_ids": ["OT_t99T6QEeYFxW9MtzElw"], "expires_at": "2020-11-06T18:59:21.000000Z", "issued_at": "2020-11-06T17:59:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ee3fbde688fc48ed9a40e991243e7fc4", "name": "tempest-MigrationsRbacTest-878640565"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ee3fbde688fc48ed9a40e991243e7fc4", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ee3fbde688fc48ed9a40e991243e7fc4", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ee3fbde688fc48ed9a40e991243e7fc4", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ee3fbde688fc48ed9a40e991243e7fc4", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ee3fbde688fc48ed9a40e991243e7fc4", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ee3fbde688fc48ed9a40e991243e7fc4", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:21.560 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:21.561 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.562 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.562 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.563 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.564 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.564 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.565 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.566 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.566 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.567 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.567 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.568 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.568 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.569 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.569 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.570 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.570 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.571 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.571 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.572 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.572 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.573 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.573 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.573 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.573 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.574 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.574 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.574 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.575 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.575 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.575 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.575 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.576 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.576 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.576 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.576 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.577 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.577 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.577 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.578 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.578 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.578 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.578 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.579 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.579 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.579 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.580 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.580 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.580 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.580 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.581 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.581 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.581 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.582 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.582 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.582 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.582 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.583 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.583 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.583 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.584 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.584 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.584 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.585 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.585 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.585 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.586 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.586 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.586 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.586 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.587 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.587 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.587 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.588 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.588 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:21.589 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-migrations:index, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:21.589 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:21.761 38 INFO tempest.lib.common.rest_client [req-11da1c20-2888-42fd-8192-1b9ed08b30e3 ] Request (MigrationsRbacTest:test_list_services): 200 GET http://172.30.13.94/identity/v3/projects/ee3fbde688fc48ed9a40e991243e7fc4/users/21650b8adc15421690a4a5902c4b370f/roles 0.171s 2020-11-06 17:59:21.762 38 DEBUG tempest.lib.common.rest_client [req-11da1c20-2888-42fd-8192-1b9ed08b30e3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-11da1c20-2888-42fd-8192-1b9ed08b30e3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ee3fbde688fc48ed9a40e991243e7fc4/users/21650b8adc15421690a4a5902c4b370f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ee3fbde688fc48ed9a40e991243e7fc4/users/21650b8adc15421690a4a5902c4b370f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:21.799 38 INFO tempest.lib.common.rest_client [req-33d32995-2421-4f91-ab7c-ca4d52f66ea7 ] Request (MigrationsRbacTest:test_list_services): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 17:59:21.800 38 DEBUG tempest.lib.common.rest_client [req-33d32995-2421-4f91-ab7c-ca4d52f66ea7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-33d32995-2421-4f91-ab7c-ca4d52f66ea7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "21650b8adc15421690a4a5902c4b370f", "name": "tempest-MigrationsRbacTest-878640565", "password_expires_at": null}, "audit_ids": ["9XktmaHQQVujfklt74d_kQ"], "expires_at": "2020-11-06T18:59:21.000000Z", "issued_at": "2020-11-06T17:59:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ee3fbde688fc48ed9a40e991243e7fc4", "name": "tempest-MigrationsRbacTest-878640565"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ee3fbde688fc48ed9a40e991243e7fc4", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ee3fbde688fc48ed9a40e991243e7fc4", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ee3fbde688fc48ed9a40e991243e7fc4", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ee3fbde688fc48ed9a40e991243e7fc4", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ee3fbde688fc48ed9a40e991243e7fc4", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ee3fbde688fc48ed9a40e991243e7fc4", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:21.992 37 INFO tempest.lib.common.rest_client [req-676d8788-0223-4147-9ca6-a54a9cf638bb ] Request (SecurtiyGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161 0.249s 2020-11-06 17:59:21.992 37 DEBUG tempest.lib.common.rest_client [req-676d8788-0223-4147-9ca6-a54a9cf638bb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-676d8788-0223-4147-9ca6-a54a9cf638bb', 'x-compute-request-id': 'req-676d8788-0223-4147-9ca6-a54a9cf638bb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161'} Body: b'{"server": {"id": "53da6d79-4555-422b-bb06-07e620333161", "name": "tempest-SecurtiyGroupsRbacTest-server-684714768", "status": "BUILD", "tenant_id": "d73ae082cf2c4889915adb0d4efc6f2e", "user_id": "eabd533369674823b012ab299376bbb3", "metadata": {}, "hostId": "66bc7addb145ae6ae0381ad01ab057fa2344ebcf5635095860cf236c", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:13Z", "updated": "2020-11-06T17:59:14Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/53da6d79-4555-422b-bb06-07e620333161"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033be", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:21.995 39 INFO tempest.lib.common.rest_client [req-f8eb76eb-b265-411a-af3e-06b7b69abcd6 ] Request (ServerActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.138s 2020-11-06 17:59:21.996 39 DEBUG tempest.lib.common.rest_client [req-f8eb76eb-b265-411a-af3e-06b7b69abcd6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1492', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f8eb76eb-b265-411a-af3e-06b7b69abcd6', 'x-compute-request-id': 'req-f8eb76eb-b265-411a-af3e-06b7b69abcd6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "BUILD", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T17:59:22Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "networking", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:22.012 39 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/networking" after 2 second wait 2020-11-06 17:59:22.024 38 INFO tempest.lib.common.rest_client [req-1c377d2e-e757-462d-ad5d-239f3dbf8984 ] Request (MigrationsRbacTest:test_list_services): 200 GET http://172.30.13.94/compute/v2.1/os-migrations 0.222s 2020-11-06 17:59:22.024 38 DEBUG tempest.lib.common.rest_client [req-1c377d2e-e757-462d-ad5d-239f3dbf8984 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '408', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1c377d2e-e757-462d-ad5d-239f3dbf8984', 'x-compute-request-id': 'req-1c377d2e-e757-462d-ad5d-239f3dbf8984', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-migrations'} Body: b'{"migrations": [{"id": 1493, "source_compute": "lf-virtual8", "dest_compute": "lf-virtual9", "source_node": "lf-virtual8", "dest_node": "lf-virtual9", "dest_host": "172.30.13.94", "old_instance_type_id": 2430, "new_instance_type_id": 2431, "instance_uuid": "b092e3ab-eb4b-4557-aa1b-6f61d879b3a7", "status": "reverted", "created_at": "2020-11-06T17:57:24.000000", "updated_at": "2020-11-06T17:57:38.000000"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:22.028 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:22.129 38 INFO tempest.lib.common.rest_client [req-db5c304c-f27d-434a-bb6e-c72a69710fd7 ] Request (MigrationsRbacTest:test_list_services): 200 GET http://172.30.13.94/identity/v3/projects/ee3fbde688fc48ed9a40e991243e7fc4/users/21650b8adc15421690a4a5902c4b370f/roles 0.100s 2020-11-06 17:59:22.130 38 DEBUG tempest.lib.common.rest_client [req-db5c304c-f27d-434a-bb6e-c72a69710fd7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-db5c304c-f27d-434a-bb6e-c72a69710fd7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ee3fbde688fc48ed9a40e991243e7fc4/users/21650b8adc15421690a4a5902c4b370f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ee3fbde688fc48ed9a40e991243e7fc4/users/21650b8adc15421690a4a5902c4b370f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:22.161 38 INFO tempest.lib.common.rest_client [req-51d63dc6-acfd-4367-93a4-064e0cb5feaa ] Request (MigrationsRbacTest:test_list_services): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.030s 2020-11-06 17:59:22.162 38 DEBUG tempest.lib.common.rest_client [req-51d63dc6-acfd-4367-93a4-064e0cb5feaa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-51d63dc6-acfd-4367-93a4-064e0cb5feaa', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "21650b8adc15421690a4a5902c4b370f", "name": "tempest-MigrationsRbacTest-878640565", "password_expires_at": null}, "audit_ids": ["OvhUDHggS3u3LHZBHjdDhQ"], "expires_at": "2020-11-06T18:59:22.000000Z", "issued_at": "2020-11-06T17:59:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ee3fbde688fc48ed9a40e991243e7fc4", "name": "tempest-MigrationsRbacTest-878640565"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ee3fbde688fc48ed9a40e991243e7fc4", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ee3fbde688fc48ed9a40e991243e7fc4", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ee3fbde688fc48ed9a40e991243e7fc4", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ee3fbde688fc48ed9a40e991243e7fc4", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ee3fbde688fc48ed9a40e991243e7fc4", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ee3fbde688fc48ed9a40e991243e7fc4", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:22.257 40 INFO tempest.lib.common.rest_client [req-a0afae4c-5253-4c3f-a9a5-9f17390768c9 ] Request (ServerConsolesRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9 0.175s 2020-11-06 17:59:22.257 40 DEBUG tempest.lib.common.rest_client [req-a0afae4c-5253-4c3f-a9a5-9f17390768c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1519', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a0afae4c-5253-4c3f-a9a5-9f17390768c9', 'x-compute-request-id': 'req-a0afae4c-5253-4c3f-a9a5-9f17390768c9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9'} Body: b'{"server": {"id": "91c916c9-7f91-4941-b349-0e62b28deaa9", "name": "tempest-ServerConsolesRbacTest-server-1714121832", "status": "DELETED", "tenant_id": "0cd9895a4bd84f8a859ddbcbf39a0d72", "user_id": "d83a612e30aa42b18d464c0b2cbd4044", "metadata": {}, "hostId": "1c6caf91203d31288fb481147bb6ec456942b48a789c1a8e4f462b48", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:09Z", "updated": "2020-11-06T17:59:21Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/91c916c9-7f91-4941-b349-0e62b28deaa9"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:16.000000", "OS-SRV-USG:terminated_at": "2020-11-06T17:59:21.000000", "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "deleted", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:22.272 40 INFO tempest.common.waiters [-] State transition "ACTIVE/deleting" ==> "DELETED/None" after 3 second wait 2020-11-06 17:59:22.284 38 INFO tempest.lib.common.rest_client [req-556cabec-b2ce-40f9-80ad-cd56fc56db80 ] Request (MigrationsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/21650b8adc15421690a4a5902c4b370f 0.118s 2020-11-06 17:59:22.285 38 DEBUG tempest.lib.common.rest_client [req-556cabec-b2ce-40f9-80ad-cd56fc56db80 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-556cabec-b2ce-40f9-80ad-cd56fc56db80', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/21650b8adc15421690a4a5902c4b370f'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:22.370 38 INFO tempest.lib.common.rest_client [req-72db1b74-6999-45c7-a8b7-6578f4d16dae ] Request (MigrationsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-11-06 17:59:22.371 38 DEBUG tempest.lib.common.rest_client [req-72db1b74-6999-45c7-a8b7-6578f4d16dae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-72db1b74-6999-45c7-a8b7-6578f4d16dae', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["sLBA1lqHTKO9JPQjn1pPkA"], "expires_at": "2020-11-06T18:59:22.000000Z", "issued_at": "2020-11-06T17:59:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:22.695 38 INFO tempest.lib.common.rest_client [req-4bbff488-d07f-4247-a983-d0c76e96274d ] Request (MigrationsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=ee3fbde688fc48ed9a40e991243e7fc4&name=default 0.323s 2020-11-06 17:59:22.696 38 DEBUG tempest.lib.common.rest_client [req-4bbff488-d07f-4247-a983-d0c76e96274d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-4bbff488-d07f-4247-a983-d0c76e96274d', 'date': 'Fri, 06 Nov 2020 17:59:22 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=ee3fbde688fc48ed9a40e991243e7fc4&name=default'} Body: b'{"security_groups": [{"id": "44bc6b43-f2ba-4dcf-b753-58ada2b03404", "name": "default", "stateful": true, "tenant_id": "ee3fbde688fc48ed9a40e991243e7fc4", "description": "Default security group", "security_group_rules": [{"id": "7ee63cc9-c755-403f-a1f2-d129f86fb5bb", "tenant_id": "ee3fbde688fc48ed9a40e991243e7fc4", "security_group_id": "44bc6b43-f2ba-4dcf-b753-58ada2b03404", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "44bc6b43-f2ba-4dcf-b753-58ada2b03404", "description": null, "tags": [], "created_at": "2020-11-06T17:59:22Z", "updated_at": "2020-11-06T17:59:22Z", "revision_number": 0, "project_id": "ee3fbde688fc48ed9a40e991243e7fc4"}, {"id": "b62d2c13-c8fa-4751-ad1c-7cf7db4770bb", "tenant_id": "ee3fbde688fc48ed9a40e991243e7fc4", "security_group_id": "44bc6b43-f2ba-4dcf-b753-58ada2b03404", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "44bc6b43-f2ba-4dcf-b753-58ada2b03404", "description": null, "tags": [], "created_at": "2020-11-06T17:59:22Z", "updated_at": "2020-11-06T17:59:22Z", "revision_number": 0, "project_id": "ee3fbde688fc48ed9a40e991243e7fc4"}, {"id": "b823b5e3-f5f8-4f52-9a8a-8fd8779c82f2", "tenant_id": "ee3fbde688fc48ed9a40e991243e7fc4", "security_group_id": "44bc6b43-f2ba-4dcf-b753-58ada2b03404", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:59:22Z", "updated_at": "2020-11-06T17:59:22Z", "revision_number": 0, "project_id": "ee3fbde688fc48ed9a40e991243e7fc4"}, {"id": "ec8d1bb6-7f27-471c-98d7-03c6c5cc490f", "tenant_id": "ee3fbde688fc48ed9a40e991243e7fc4", "security_group_id": "44bc6b43-f2ba-4dcf-b753-58ada2b03404", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:59:22Z", "updated_at": "2020-11-06T17:59:22Z", "revision_number": 0, "project_id": "ee3fbde688fc48ed9a40e991243e7fc4"}], "tags": [], "created_at": "2020-11-06T17:59:22Z", "updated_at": "2020-11-06T17:59:22Z", "revision_number": 1, "project_id": "ee3fbde688fc48ed9a40e991243e7fc4"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:22.827 38 INFO tempest.lib.common.rest_client [req-432abe58-fdbf-40d1-a7dc-d400b4b5df2e ] Request (MigrationsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/44bc6b43-f2ba-4dcf-b753-58ada2b03404 0.130s 2020-11-06 17:59:22.828 38 DEBUG tempest.lib.common.rest_client [req-432abe58-fdbf-40d1-a7dc-d400b4b5df2e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-432abe58-fdbf-40d1-a7dc-d400b4b5df2e', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 17:59:22 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/44bc6b43-f2ba-4dcf-b753-58ada2b03404'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:22.964 38 INFO tempest.lib.common.rest_client [req-eb1c19d3-7411-4eed-b39f-661bcec16183 ] Request (MigrationsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/ee3fbde688fc48ed9a40e991243e7fc4 0.135s 2020-11-06 17:59:22.965 38 DEBUG tempest.lib.common.rest_client [req-eb1c19d3-7411-4eed-b39f-661bcec16183 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eb1c19d3-7411-4eed-b39f-661bcec16183', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ee3fbde688fc48ed9a40e991243e7fc4'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:23.058 38 INFO tempest.lib.common.rest_client [req-33051a04-5e7b-4cce-b450-66375a161ae0 ] Request (QuotaSetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-11-06 17:59:23.058 38 DEBUG tempest.lib.common.rest_client [req-33051a04-5e7b-4cce-b450-66375a161ae0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-33051a04-5e7b-4cce-b450-66375a161ae0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["zROdCa_xSZWM6F2AMRe-WQ"], "expires_at": "2020-11-06T18:59:22.000000Z", "issued_at": "2020-11-06T17:59:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:23.101 38 INFO tempest.lib.common.rest_client [req-cb3a239c-79c0-41dc-8436-e6aad0f4c311 ] Request (QuotaSetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 17:59:23.101 38 DEBUG tempest.lib.common.rest_client [req-cb3a239c-79c0-41dc-8436-e6aad0f4c311 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cb3a239c-79c0-41dc-8436-e6aad0f4c311', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["eRRl6cfWRRqFuVVPP_b8Cw"], "expires_at": "2020-11-06T18:59:23.000000Z", "issued_at": "2020-11-06T17:59:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:23.155 38 INFO tempest.lib.common.rest_client [req-5d4b8722-ec0d-4d01-a7d2-cc583dab842f ] Request (QuotaSetsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.053s 2020-11-06 17:59:23.156 38 DEBUG tempest.lib.common.rest_client [req-5d4b8722-ec0d-4d01-a7d2-cc583dab842f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5d4b8722-ec0d-4d01-a7d2-cc583dab842f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:23.226 38 INFO tempest.lib.common.rest_client [req-2ac9612e-f94b-487a-b506-6e7162423fdc ] Request (QuotaSetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.068s 2020-11-06 17:59:23.226 38 DEBUG tempest.lib.common.rest_client [req-2ac9612e-f94b-487a-b506-6e7162423fdc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-QuotaSetsRbacTest-1643369407-desc", "domain_id": "default", "name": "tempest-QuotaSetsRbacTest-1643369407"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '372', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2ac9612e-f94b-487a-b506-6e7162423fdc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "5f612dd5e45e48558079cac6a303993a", "name": "tempest-QuotaSetsRbacTest-1643369407", "domain_id": "default", "description": "tempest-QuotaSetsRbacTest-1643369407-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:23.291 39 INFO tempest.lib.common.rest_client [req-7244a821-a468-4f41-8119-2300b85f5b72 ] Request (ServerActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.277s 2020-11-06 17:59:23.292 39 DEBUG tempest.lib.common.rest_client [req-7244a821-a468-4f41-8119-2300b85f5b72 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7244a821-a468-4f41-8119-2300b85f5b72', 'x-compute-request-id': 'req-7244a821-a468-4f41-8119-2300b85f5b72', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "BUILD", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T17:59:22Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:23.294 37 INFO tempest.lib.common.rest_client [req-57ce29fb-59da-4600-a884-5b7e2c802308 ] Request (SecurtiyGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161 0.285s 2020-11-06 17:59:23.295 37 DEBUG tempest.lib.common.rest_client [req-57ce29fb-59da-4600-a884-5b7e2c802308 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1720', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-57ce29fb-59da-4600-a884-5b7e2c802308', 'x-compute-request-id': 'req-57ce29fb-59da-4600-a884-5b7e2c802308', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161'} Body: b'{"server": {"id": "53da6d79-4555-422b-bb06-07e620333161", "name": "tempest-SecurtiyGroupsRbacTest-server-684714768", "status": "ACTIVE", "tenant_id": "d73ae082cf2c4889915adb0d4efc6f2e", "user_id": "eabd533369674823b012ab299376bbb3", "metadata": {}, "hostId": "66bc7addb145ae6ae0381ad01ab057fa2344ebcf5635095860cf236c", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:13Z", "updated": "2020-11-06T17:59:22Z", "addresses": {"tempest-SecurtiyGroupsRbacTest-1104925326-network": [{"version": 4, "addr": "192.168.120.10", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:49:47:e2"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/53da6d79-4555-422b-bb06-07e620333161"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:21.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033be", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:23.307 39 INFO tempest.common.waiters [-] State transition "BUILD/networking" ==> "BUILD/spawning" after 3 second wait 2020-11-06 17:59:23.308 37 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 10 second wait 2020-11-06 17:59:23.309 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:23.310 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.310 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.311 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.311 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.311 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.312 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.312 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.313 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.313 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.313 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.313 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.314 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.314 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.314 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.315 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.315 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.315 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.315 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.316 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.316 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.316 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.317 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.317 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.317 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.317 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.318 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.318 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.318 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.319 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.319 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.319 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.319 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.320 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.320 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.320 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.320 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.321 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.321 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.321 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.322 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.322 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.322 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.322 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.323 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.323 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.323 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.324 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.324 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.324 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.325 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.325 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.325 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.325 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.326 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.326 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.326 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.327 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.327 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.327 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.327 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.328 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.328 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.329 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.329 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.329 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.330 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.330 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.330 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.330 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.331 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.331 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.331 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.331 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.332 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.332 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:23.333 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-security-groups:add, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:23.342 38 INFO tempest.lib.common.rest_client [req-df284251-99a6-4563-89c2-0ef4dc5671e0 ] Request (QuotaSetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.114s 2020-11-06 17:59:23.343 38 DEBUG tempest.lib.common.rest_client [req-df284251-99a6-4563-89c2-0ef4dc5671e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-QuotaSetsRbacTest-1643369407", "password": "C3+oYouCrTH9&o1", "project_id": "5f612dd5e45e48558079cac6a303993a", "email": "tempest-QuotaSetsRbacTest-2024136597@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '390', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-df284251-99a6-4563-89c2-0ef4dc5671e0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "5f612dd5e45e48558079cac6a303993a", "email": "tempest-QuotaSetsRbacTest-2024136597@example.com", "id": "72082469207f4c5f8aa6bacf3cdc8b20", "name": "tempest-QuotaSetsRbacTest-1643369407", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/72082469207f4c5f8aa6bacf3cdc8b20"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:23.344 40 INFO tempest.lib.common.rest_client [req-c03b46cc-2d63-4d62-8c11-496243e64e63 ] Request (ServerConsolesRbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9 0.071s 2020-11-06 17:59:23.345 40 DEBUG tempest.lib.common.rest_client [req-c03b46cc-2d63-4d62-8c11-496243e64e63 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-c03b46cc-2d63-4d62-8c11-496243e64e63', 'x-compute-request-id': 'req-c03b46cc-2d63-4d62-8c11-496243e64e63', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/91c916c9-7f91-4941-b349-0e62b28deaa9'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 91c916c9-7f91-4941-b349-0e62b28deaa9 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:23.345 40 DEBUG tempest.lib.common.dynamic_creds [-] Clearing network: {'id': 'bb0f3cc3-8583-431c-af3d-9b99d0b951fd', 'name': 'tempest-ServerConsolesRbacTest-1753510296-network', 'tenant_id': '0cd9895a4bd84f8a859ddbcbf39a0d72', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '0cd9895a4bd84f8a859ddbcbf39a0d72', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 49, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T17:59:03Z', 'updated_at': '2020-11-06T17:59:03Z', 'revision_number': 1}, subnet: {'id': '6b7d443e-3e96-4e22-be53-fcf373c2c13b', 'name': 'tempest-ServerConsolesRbacTest-1753510296-subnet', 'tenant_id': '0cd9895a4bd84f8a859ddbcbf39a0d72', 'network_id': 'bb0f3cc3-8583-431c-af3d-9b99d0b951fd', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-11-06T17:59:03Z', 'updated_at': '2020-11-06T17:59:03Z', 'revision_number': 0, 'project_id': '0cd9895a4bd84f8a859ddbcbf39a0d72'}, router: {'id': '7b3ebe7e-933d-45f9-a55d-aa8f1670eaf7', 'name': 'tempest-ServerConsolesRbacTest-1753510296-router', 'tenant_id': '0cd9895a4bd84f8a859ddbcbf39a0d72', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.126'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::df'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-11-06T17:59:03Z', 'updated_at': '2020-11-06T17:59:04Z', 'revision_number': 3, 'project_id': '0cd9895a4bd84f8a859ddbcbf39a0d72'} _clear_isolated_net_resources /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/dynamic_creds.py:418 2020-11-06 17:59:23.396 38 INFO tempest.lib.common.rest_client [req-f0be2cac-74d4-4120-a86f-9e6c78486474 ] Request (QuotaSetsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.051s 2020-11-06 17:59:23.396 38 DEBUG tempest.lib.common.rest_client [req-f0be2cac-74d4-4120-a86f-9e6c78486474 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f0be2cac-74d4-4120-a86f-9e6c78486474', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:23.448 38 INFO tempest.lib.common.rest_client [req-291aaa90-3729-46e2-ac1d-13c1ac536668 ] Request (QuotaSetsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.050s 2020-11-06 17:59:23.448 38 DEBUG tempest.lib.common.rest_client [req-291aaa90-3729-46e2-ac1d-13c1ac536668 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-291aaa90-3729-46e2-ac1d-13c1ac536668', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:23.511 38 INFO tempest.lib.common.rest_client [req-3a5d178e-c663-4553-8df4-5105fb93ea3c ] Request (QuotaSetsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles/72a4576c553448cd941b052c1ca0cf2d 0.061s 2020-11-06 17:59:23.512 38 DEBUG tempest.lib.common.rest_client [req-3a5d178e-c663-4553-8df4-5105fb93ea3c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3a5d178e-c663-4553-8df4-5105fb93ea3c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:23.512 38 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-QuotaSetsRbacTest-1643369407', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '5f612dd5e45e48558079cac6a303993a', 'project_name': 'tempest-QuotaSetsRbacTest-1643369407', 'tenant_id': '5f612dd5e45e48558079cac6a303993a', 'tenant_name': 'tempest-QuotaSetsRbacTest-1643369407', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '72082469207f4c5f8aa6bacf3cdc8b20'}, Network: None, Subnet: None, Router: None 2020-11-06 17:59:23.513 38 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-QuotaSetsRbacTest-1643369407', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '5f612dd5e45e48558079cac6a303993a', 'project_name': 'tempest-QuotaSetsRbacTest-1643369407', 'tenant_id': '5f612dd5e45e48558079cac6a303993a', 'tenant_name': 'tempest-QuotaSetsRbacTest-1643369407', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '72082469207f4c5f8aa6bacf3cdc8b20'}, Network: None, Subnet: None, Router: None 2020-11-06 17:59:23.628 38 INFO tempest.lib.common.rest_client [req-66edc996-b387-4767-b3cc-242c51a48c64 ] Request (QuotaSetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.105s 2020-11-06 17:59:23.629 38 DEBUG tempest.lib.common.rest_client [req-66edc996-b387-4767-b3cc-242c51a48c64 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6565', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-66edc996-b387-4767-b3cc-242c51a48c64', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "72082469207f4c5f8aa6bacf3cdc8b20", "name": "tempest-QuotaSetsRbacTest-1643369407", "password_expires_at": null}, "audit_ids": ["KuXMDDLxQxqMurbBC5e0aw"], "expires_at": "2020-11-06T18:59:23.000000Z", "issued_at": "2020-11-06T17:59:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5f612dd5e45e48558079cac6a303993a", "name": "tempest-QuotaSetsRbacTest-1643369407"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:23.743 38 INFO tempest.lib.common.rest_client [req-1d700d75-489f-4714-8f89-f183a0ca5913 ] Request (QuotaSetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.112s 2020-11-06 17:59:23.744 38 DEBUG tempest.lib.common.rest_client [req-1d700d75-489f-4714-8f89-f183a0ca5913 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-QuotaSetsRbacTest-1255499047-desc", "domain_id": "default", "name": "tempest-QuotaSetsRbacTest-1255499047"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '372', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1d700d75-489f-4714-8f89-f183a0ca5913', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "60065855c7094b0f954c62a1ed1be27b", "name": "tempest-QuotaSetsRbacTest-1255499047", "domain_id": "default", "description": "tempest-QuotaSetsRbacTest-1255499047-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/60065855c7094b0f954c62a1ed1be27b"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:23.746 37 INFO tempest.lib.common.rest_client [req-f0f1c2b5-93cc-490e-bff4-711c2b5b8d8f ] Request (SecurtiyGroupsRbacTest:test_create_security_group_for_server): 200 POST http://172.30.13.94/compute/v2.1/os-security-groups 0.411s 2020-11-06 17:59:23.746 37 DEBUG tempest.lib.common.rest_client [req-f0f1c2b5-93cc-490e-bff4-711c2b5b8d8f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group": {"name": "tempest-SecurtiyGroupsRbacTest-securitygroup-282130036", "description": "tempest-description-901550552"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '242', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f0f1c2b5-93cc-490e-bff4-711c2b5b8d8f', 'x-compute-request-id': 'req-f0f1c2b5-93cc-490e-bff4-711c2b5b8d8f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-security-groups'} Body: b'{"security_group": {"id": "90f36ae4-10af-44be-ab81-3624fd864380", "description": "tempest-description-901550552", "name": "tempest-SecurtiyGroupsRbacTest-securitygroup-282130036", "tenant_id": "d73ae082cf2c4889915adb0d4efc6f2e", "rules": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:23.753 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:23.850 38 INFO tempest.lib.common.rest_client [req-42a04a2b-3d7d-487d-a4f5-68a349b01414 ] Request (QuotaSetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.104s 2020-11-06 17:59:23.850 38 DEBUG tempest.lib.common.rest_client [req-42a04a2b-3d7d-487d-a4f5-68a349b01414 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-QuotaSetsRbacTest-1255499047", "password": "I6*Vh&m9ctW+GCt", "project_id": "60065855c7094b0f954c62a1ed1be27b", "email": "tempest-QuotaSetsRbacTest-1035140865@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '390', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-42a04a2b-3d7d-487d-a4f5-68a349b01414', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "60065855c7094b0f954c62a1ed1be27b", "email": "tempest-QuotaSetsRbacTest-1035140865@example.com", "id": "6d42d1f7d86c4241bb174e40c31413d0", "name": "tempest-QuotaSetsRbacTest-1255499047", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/6d42d1f7d86c4241bb174e40c31413d0"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:23.859 37 INFO tempest.lib.common.rest_client [req-f8937aca-9b32-4a79-b456-e7b07051cc5c ] Request (SecurtiyGroupsRbacTest:test_create_security_group_for_server): 200 GET http://172.30.13.94/identity/v3/projects/d73ae082cf2c4889915adb0d4efc6f2e/users/eabd533369674823b012ab299376bbb3/roles 0.105s 2020-11-06 17:59:23.859 37 DEBUG tempest.lib.common.rest_client [req-f8937aca-9b32-4a79-b456-e7b07051cc5c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f8937aca-9b32-4a79-b456-e7b07051cc5c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d73ae082cf2c4889915adb0d4efc6f2e/users/eabd533369674823b012ab299376bbb3/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d73ae082cf2c4889915adb0d4efc6f2e/users/eabd533369674823b012ab299376bbb3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:23.907 38 INFO tempest.lib.common.rest_client [req-ca8d961a-ef53-4061-bcbf-fa6e14083c27 ] Request (QuotaSetsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-11-06 17:59:23.908 38 DEBUG tempest.lib.common.rest_client [req-ca8d961a-ef53-4061-bcbf-fa6e14083c27 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ca8d961a-ef53-4061-bcbf-fa6e14083c27', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:23.936 37 INFO tempest.lib.common.rest_client [req-bc938518-e492-43b0-81e1-e36ad33755a8 ] Request (SecurtiyGroupsRbacTest:test_create_security_group_for_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.075s 2020-11-06 17:59:23.936 37 DEBUG tempest.lib.common.rest_client [req-bc938518-e492-43b0-81e1-e36ad33755a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bc938518-e492-43b0-81e1-e36ad33755a8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eabd533369674823b012ab299376bbb3", "name": "tempest-SecurtiyGroupsRbacTest-66962389", "password_expires_at": null}, "audit_ids": ["-liJ6_x_QCSA3WfQxUAsJw"], "expires_at": "2020-11-06T18:59:23.000000Z", "issued_at": "2020-11-06T17:59:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d73ae082cf2c4889915adb0d4efc6f2e", "name": "tempest-SecurtiyGroupsRbacTest-66962389"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:23.971 38 INFO tempest.lib.common.rest_client [req-3cceefc0-c693-4141-a505-e26710db1fe1 ] Request (QuotaSetsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/60065855c7094b0f954c62a1ed1be27b/users/6d42d1f7d86c4241bb174e40c31413d0/roles/a629c95d64b3416fb80ae90af4f69c05 0.062s 2020-11-06 17:59:23.972 38 DEBUG tempest.lib.common.rest_client [req-3cceefc0-c693-4141-a505-e26710db1fe1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3cceefc0-c693-4141-a505-e26710db1fe1', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/60065855c7094b0f954c62a1ed1be27b/users/6d42d1f7d86c4241bb174e40c31413d0/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:23.972 38 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-QuotaSetsRbacTest-1255499047', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '60065855c7094b0f954c62a1ed1be27b', 'project_name': 'tempest-QuotaSetsRbacTest-1255499047', 'tenant_id': '60065855c7094b0f954c62a1ed1be27b', 'tenant_name': 'tempest-QuotaSetsRbacTest-1255499047', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '6d42d1f7d86c4241bb174e40c31413d0'}, Network: None, Subnet: None, Router: None 2020-11-06 17:59:23.973 38 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-QuotaSetsRbacTest-1255499047', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '60065855c7094b0f954c62a1ed1be27b', 'project_name': 'tempest-QuotaSetsRbacTest-1255499047', 'tenant_id': '60065855c7094b0f954c62a1ed1be27b', 'tenant_name': 'tempest-QuotaSetsRbacTest-1255499047', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '6d42d1f7d86c4241bb174e40c31413d0'}, Network: None, Subnet: None, Router: None 2020-11-06 17:59:24.083 38 INFO tempest.lib.common.rest_client [req-9deadfca-5ab9-4fda-a9a7-9aac16d17348 ] Request (QuotaSetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.101s 2020-11-06 17:59:24.084 38 DEBUG tempest.lib.common.rest_client [req-9deadfca-5ab9-4fda-a9a7-9aac16d17348 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9deadfca-5ab9-4fda-a9a7-9aac16d17348', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6d42d1f7d86c4241bb174e40c31413d0", "name": "tempest-QuotaSetsRbacTest-1255499047", "password_expires_at": null}, "audit_ids": ["jMvdXrpUTNaXkydA-BNu9w"], "expires_at": "2020-11-06T18:59:24.000000Z", "issued_at": "2020-11-06T17:59:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "60065855c7094b0f954c62a1ed1be27b", "name": "tempest-QuotaSetsRbacTest-1255499047"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/60065855c7094b0f954c62a1ed1be27b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/60065855c7094b0f954c62a1ed1be27b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/60065855c7094b0f954c62a1ed1be27b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_60065855c7094b0f954c62a1ed1be27b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_60065855c7094b0f954c62a1ed1be27b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_60065855c7094b0f954c62a1ed1be27b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:24.169 38 INFO tempest.lib.common.rest_client [req-23c6666a-a7e9-4b50-b54f-e6fe86b97953 ] Request (QuotaSetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 17:59:24.169 38 DEBUG tempest.lib.common.rest_client [req-23c6666a-a7e9-4b50-b54f-e6fe86b97953 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-23c6666a-a7e9-4b50-b54f-e6fe86b97953', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["Kn_f6KbVTwSGoUhpYFCCUw"], "expires_at": "2020-11-06T18:59:24.000000Z", "issued_at": "2020-11-06T17:59:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:24.214 38 INFO tempest.lib.common.rest_client [req-1c3e7b44-f988-40cf-b64c-bb37c652e99d ] Request (QuotaSetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 17:59:24.215 38 DEBUG tempest.lib.common.rest_client [req-1c3e7b44-f988-40cf-b64c-bb37c652e99d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1c3e7b44-f988-40cf-b64c-bb37c652e99d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["CX2aeoBUSs-8fFh79_8PMQ"], "expires_at": "2020-11-06T18:59:24.000000Z", "issued_at": "2020-11-06T17:59:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:24.265 38 INFO tempest.lib.common.rest_client [req-88563fd9-c094-490e-8737-fc9223eea9eb ] Request (QuotaSetsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.049s 2020-11-06 17:59:24.265 38 DEBUG tempest.lib.common.rest_client [req-88563fd9-c094-490e-8737-fc9223eea9eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-88563fd9-c094-490e-8737-fc9223eea9eb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:24.309 38 INFO tempest.lib.common.rest_client [req-d1e229b2-9317-4e6f-80bf-89d931ced4b9 ] Request (QuotaSetsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.043s 2020-11-06 17:59:24.310 38 DEBUG tempest.lib.common.rest_client [req-d1e229b2-9317-4e6f-80bf-89d931ced4b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d1e229b2-9317-4e6f-80bf-89d931ced4b9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:24.310 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 17:59:24.311 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:24.358 38 INFO tempest.lib.common.rest_client [req-87d89b03-41b1-4f2b-b433-7e77033a8707 ] Request (QuotaSetsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles 0.046s 2020-11-06 17:59:24.359 38 DEBUG tempest.lib.common.rest_client [req-87d89b03-41b1-4f2b-b433-7e77033a8707 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-87d89b03-41b1-4f2b-b433-7e77033a8707', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:24.410 38 INFO tempest.lib.common.rest_client [req-bb2e1b70-53ef-400e-8571-09969de8b112 ] Request (QuotaSetsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles/72a4576c553448cd941b052c1ca0cf2d 0.050s 2020-11-06 17:59:24.410 38 DEBUG tempest.lib.common.rest_client [req-bb2e1b70-53ef-400e-8571-09969de8b112 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bb2e1b70-53ef-400e-8571-09969de8b112', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:24.508 38 INFO tempest.lib.common.rest_client [req-35e3cf7c-f0ca-4a0f-a609-859c1df17047 ] Request (QuotaSetsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles/a629c95d64b3416fb80ae90af4f69c05 0.097s 2020-11-06 17:59:24.508 38 DEBUG tempest.lib.common.rest_client [req-35e3cf7c-f0ca-4a0f-a609-859c1df17047 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-35e3cf7c-f0ca-4a0f-a609-859c1df17047', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:24.614 39 INFO tempest.lib.common.rest_client [req-3a3d4cec-240f-48a2-add6-a98ddd488c3f ] Request (ServerActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.305s 2020-11-06 17:59:24.615 39 DEBUG tempest.lib.common.rest_client [req-3a3d4cec-240f-48a2-add6-a98ddd488c3f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3a3d4cec-240f-48a2-add6-a98ddd488c3f', 'x-compute-request-id': 'req-3a3d4cec-240f-48a2-add6-a98ddd488c3f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "BUILD", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T17:59:22Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:25.598 38 INFO tempest.lib.common.rest_client [req-45573db6-65ab-470e-bc30-80e464f342a1 ] Request (QuotaSetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-11-06 17:59:25.598 38 DEBUG tempest.lib.common.rest_client [req-45573db6-65ab-470e-bc30-80e464f342a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-45573db6-65ab-470e-bc30-80e464f342a1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "72082469207f4c5f8aa6bacf3cdc8b20", "name": "tempest-QuotaSetsRbacTest-1643369407", "password_expires_at": null}, "audit_ids": ["DdrGUQupQ5GLcePPJbqqGw"], "expires_at": "2020-11-06T18:59:25.000000Z", "issued_at": "2020-11-06T17:59:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5f612dd5e45e48558079cac6a303993a", "name": "tempest-QuotaSetsRbacTest-1643369407"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:25.600 38 WARNING tempest.lib.common.rest_client [-] Deprecated: "tenant_id" property is deprecated for removal, use "project_id" instead 2020-11-06 17:59:25.602 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:25.603 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.604 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.605 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.605 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.606 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.607 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.607 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.608 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.608 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.609 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.609 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.610 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.610 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.611 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.611 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.612 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.612 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.613 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.613 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.614 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.614 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.614 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.614 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.615 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.615 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.615 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.615 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.616 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.616 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.616 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.617 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.617 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.617 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.617 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.618 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.618 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.618 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.619 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.619 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.619 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.619 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.620 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.620 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.621 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.621 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.621 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.621 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.622 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.622 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.622 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.623 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.623 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.623 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.623 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.624 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.624 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.624 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.625 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.625 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.625 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.626 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.626 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.626 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.627 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.627 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.627 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.628 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.628 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.628 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.628 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.629 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.629 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.630 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.631 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.631 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:25.633 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-quota-sets:delete, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:25.797 38 INFO tempest.lib.common.rest_client [req-5a71ad25-520a-4dfc-9842-7d793619c669 ] Request (QuotaSetsRbacTest:test_delete_quota_set): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.162s 2020-11-06 17:59:25.798 38 DEBUG tempest.lib.common.rest_client [req-5a71ad25-520a-4dfc-9842-7d793619c669 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5a71ad25-520a-4dfc-9842-7d793619c669', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:25.854 38 INFO tempest.lib.common.rest_client [req-85849237-182f-4c19-b962-fa37ce4550c6 ] Request (QuotaSetsRbacTest:test_delete_quota_set): 201 POST http://172.30.13.94/identity/v3/projects 0.055s 2020-11-06 17:59:25.854 38 DEBUG tempest.lib.common.rest_client [req-85849237-182f-4c19-b962-fa37ce4550c6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-QuotaSetsRbacTest-136747260-desc", "domain_id": "default", "name": "tempest-QuotaSetsRbacTest-136747260"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '370', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-85849237-182f-4c19-b962-fa37ce4550c6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "a30d20896e344814934c0c074811efd3", "name": "tempest-QuotaSetsRbacTest-136747260", "domain_id": "default", "description": "tempest-QuotaSetsRbacTest-136747260-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/a30d20896e344814934c0c074811efd3"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:25.959 38 INFO tempest.lib.common.rest_client [req-428452b2-1ee2-4e47-925a-8d8c1de91117 ] Request (QuotaSetsRbacTest:test_delete_quota_set): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.104s 2020-11-06 17:59:25.960 38 DEBUG tempest.lib.common.rest_client [req-428452b2-1ee2-4e47-925a-8d8c1de91117 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-428452b2-1ee2-4e47-925a-8d8c1de91117', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:25.960 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:26.132 38 INFO tempest.lib.common.rest_client [req-ecd85077-fd7c-4687-8ad2-1334418221d5 ] Request (QuotaSetsRbacTest:test_delete_quota_set): 200 GET http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles 0.171s 2020-11-06 17:59:26.133 38 DEBUG tempest.lib.common.rest_client [req-ecd85077-fd7c-4687-8ad2-1334418221d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ecd85077-fd7c-4687-8ad2-1334418221d5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:26.213 38 INFO tempest.lib.common.rest_client [req-09c6200b-ec58-4add-a2e8-079de04bead7 ] Request (QuotaSetsRbacTest:test_delete_quota_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-11-06 17:59:26.213 38 DEBUG tempest.lib.common.rest_client [req-09c6200b-ec58-4add-a2e8-079de04bead7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-09c6200b-ec58-4add-a2e8-079de04bead7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "72082469207f4c5f8aa6bacf3cdc8b20", "name": "tempest-QuotaSetsRbacTest-1643369407", "password_expires_at": null}, "audit_ids": ["WlGxah__SBCdGrxKdtwiOA"], "expires_at": "2020-11-06T18:59:26.000000Z", "issued_at": "2020-11-06T17:59:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5f612dd5e45e48558079cac6a303993a", "name": "tempest-QuotaSetsRbacTest-1643369407"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:26.482 38 INFO tempest.lib.common.rest_client [req-6bd1f51d-2aeb-4d95-aa7a-5446ecc34575 ] Request (QuotaSetsRbacTest:test_delete_quota_set): 202 DELETE http://172.30.13.94/compute/v2.1/os-quota-sets/a30d20896e344814934c0c074811efd3 0.267s 2020-11-06 17:59:26.482 38 DEBUG tempest.lib.common.rest_client [req-6bd1f51d-2aeb-4d95-aa7a-5446ecc34575 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6bd1f51d-2aeb-4d95-aa7a-5446ecc34575', 'x-compute-request-id': 'req-6bd1f51d-2aeb-4d95-aa7a-5446ecc34575', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/os-quota-sets/a30d20896e344814934c0c074811efd3'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:26.483 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:26.582 38 INFO tempest.lib.common.rest_client [req-b2414b75-0032-4454-8816-1c01a6daa99f ] Request (QuotaSetsRbacTest:test_delete_quota_set): 200 GET http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles 0.098s 2020-11-06 17:59:26.583 38 DEBUG tempest.lib.common.rest_client [req-b2414b75-0032-4454-8816-1c01a6daa99f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b2414b75-0032-4454-8816-1c01a6daa99f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:26.643 37 INFO tempest.lib.common.rest_client [req-74cfedb8-4ca1-4e4e-84c7-add19f99b64f ] Request (SecurtiyGroupsRbacTest:test_create_security_group_for_server): 202 POST http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161/action 2.705s 2020-11-06 17:59:26.644 37 DEBUG tempest.lib.common.rest_client [req-74cfedb8-4ca1-4e4e-84c7-add19f99b64f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"addSecurityGroup": {"name": "tempest-SecurtiyGroupsRbacTest-securitygroup-282130036"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-74cfedb8-4ca1-4e4e-84c7-add19f99b64f', 'x-compute-request-id': 'req-74cfedb8-4ca1-4e4e-84c7-add19f99b64f', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:26.644 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:26.669 38 INFO tempest.lib.common.rest_client [req-5a1d96e2-8132-44ec-9996-b39c0ec35914 ] Request (QuotaSetsRbacTest:test_delete_quota_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 17:59:26.670 38 DEBUG tempest.lib.common.rest_client [req-5a1d96e2-8132-44ec-9996-b39c0ec35914 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5a1d96e2-8132-44ec-9996-b39c0ec35914', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "72082469207f4c5f8aa6bacf3cdc8b20", "name": "tempest-QuotaSetsRbacTest-1643369407", "password_expires_at": null}, "audit_ids": ["5gR3nZE1S4eg5OW7jQnlQQ"], "expires_at": "2020-11-06T18:59:26.000000Z", "issued_at": "2020-11-06T17:59:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5f612dd5e45e48558079cac6a303993a", "name": "tempest-QuotaSetsRbacTest-1643369407"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:26.746 39 INFO tempest.lib.common.rest_client [req-832ac3e9-dac8-4574-9862-50b545413395 ] Request (ServerActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 1.115s 2020-11-06 17:59:26.746 39 DEBUG tempest.lib.common.rest_client [req-832ac3e9-dac8-4574-9862-50b545413395 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-832ac3e9-dac8-4574-9862-50b545413395', 'x-compute-request-id': 'req-832ac3e9-dac8-4574-9862-50b545413395', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "BUILD", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T17:59:22Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:26.756 37 INFO tempest.lib.common.rest_client [req-2df8e760-c84f-47bb-acb3-16317428d220 ] Request (SecurtiyGroupsRbacTest:test_create_security_group_for_server): 200 GET http://172.30.13.94/identity/v3/projects/d73ae082cf2c4889915adb0d4efc6f2e/users/eabd533369674823b012ab299376bbb3/roles 0.110s 2020-11-06 17:59:26.757 37 DEBUG tempest.lib.common.rest_client [req-2df8e760-c84f-47bb-acb3-16317428d220 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2df8e760-c84f-47bb-acb3-16317428d220', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d73ae082cf2c4889915adb0d4efc6f2e/users/eabd533369674823b012ab299376bbb3/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d73ae082cf2c4889915adb0d4efc6f2e/users/eabd533369674823b012ab299376bbb3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:26.821 40 INFO tempest.lib.common.rest_client [req-e692213a-6a47-4a06-939d-9c8fc55e1853 ] Request (ServerConsolesRbacTest:tearDownClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/7b3ebe7e-933d-45f9-a55d-aa8f1670eaf7/remove_router_interface 3.474s 2020-11-06 17:59:26.821 40 DEBUG tempest.lib.common.rest_client [req-e692213a-6a47-4a06-939d-9c8fc55e1853 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "6b7d443e-3e96-4e22-be53-fcf373c2c13b"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-e692213a-6a47-4a06-939d-9c8fc55e1853', 'date': 'Fri, 06 Nov 2020 17:59:26 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/7b3ebe7e-933d-45f9-a55d-aa8f1670eaf7/remove_router_interface'} Body: b'{"id": "7b3ebe7e-933d-45f9-a55d-aa8f1670eaf7", "tenant_id": "0cd9895a4bd84f8a859ddbcbf39a0d72", "port_id": "b4793e86-6761-45bf-aa34-a6c250a2b5b5", "network_id": "bb0f3cc3-8583-431c-af3d-9b99d0b951fd", "subnet_id": "6b7d443e-3e96-4e22-be53-fcf373c2c13b", "subnet_ids": ["6b7d443e-3e96-4e22-be53-fcf373c2c13b"]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:26.842 37 INFO tempest.lib.common.rest_client [req-d7e40614-89cf-4b87-a7d8-9e90fc8454bc ] Request (SecurtiyGroupsRbacTest:test_create_security_group_for_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-11-06 17:59:26.843 37 DEBUG tempest.lib.common.rest_client [req-d7e40614-89cf-4b87-a7d8-9e90fc8454bc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d7e40614-89cf-4b87-a7d8-9e90fc8454bc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eabd533369674823b012ab299376bbb3", "name": "tempest-SecurtiyGroupsRbacTest-66962389", "password_expires_at": null}, "audit_ids": ["F2J0uaRkSR6zoM4vx8O28Q"], "expires_at": "2020-11-06T18:59:26.000000Z", "issued_at": "2020-11-06T17:59:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d73ae082cf2c4889915adb0d4efc6f2e", "name": "tempest-SecurtiyGroupsRbacTest-66962389"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:26.845 38 INFO tempest.lib.common.rest_client [req-cc0db734-5f83-4159-8014-7a79202a5b33 ] Request (QuotaSetsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/identity/v3/projects/a30d20896e344814934c0c074811efd3 0.172s 2020-11-06 17:59:26.845 38 DEBUG tempest.lib.common.rest_client [req-cc0db734-5f83-4159-8014-7a79202a5b33 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cc0db734-5f83-4159-8014-7a79202a5b33', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a30d20896e344814934c0c074811efd3'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:26.849 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:26.850 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.850 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.850 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.851 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.851 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.851 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.852 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.852 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.852 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.853 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.853 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.853 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.854 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.854 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.854 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.854 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.855 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.855 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.855 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.856 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.856 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.856 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.856 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.857 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.857 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.857 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.858 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.858 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.858 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.858 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.859 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.859 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.859 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.859 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.860 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.860 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.860 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.861 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.861 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.861 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.861 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.862 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.862 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.862 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.863 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.863 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.863 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.864 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.864 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.864 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.864 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.865 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.865 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.865 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.866 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.866 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.866 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.866 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.867 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.867 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.868 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.868 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.868 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.869 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.869 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.869 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.869 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.870 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.870 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.870 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.870 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.871 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.871 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.871 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.871 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:26.872 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-quota-sets:defaults, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:26.872 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:26.976 38 INFO tempest.lib.common.rest_client [req-1e7776b7-9690-47a8-86dc-3d1bbebbb869 ] Request (QuotaSetsRbacTest:test_show_default_quota_set): 200 GET http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles 0.103s 2020-11-06 17:59:26.977 38 DEBUG tempest.lib.common.rest_client [req-1e7776b7-9690-47a8-86dc-3d1bbebbb869 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1e7776b7-9690-47a8-86dc-3d1bbebbb869', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:27.059 38 INFO tempest.lib.common.rest_client [req-4d83c52b-9810-48c5-af2c-6ee49d1bfdf8 ] Request (QuotaSetsRbacTest:test_show_default_quota_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 17:59:27.060 38 DEBUG tempest.lib.common.rest_client [req-4d83c52b-9810-48c5-af2c-6ee49d1bfdf8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4d83c52b-9810-48c5-af2c-6ee49d1bfdf8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "72082469207f4c5f8aa6bacf3cdc8b20", "name": "tempest-QuotaSetsRbacTest-1643369407", "password_expires_at": null}, "audit_ids": ["r6_V1UVKQ3mAhPHfWC38nw"], "expires_at": "2020-11-06T18:59:27.000000Z", "issued_at": "2020-11-06T17:59:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5f612dd5e45e48558079cac6a303993a", "name": "tempest-QuotaSetsRbacTest-1643369407"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:27.232 38 INFO tempest.lib.common.rest_client [req-a36e1c62-5a45-4b83-9897-f49f799d79a8 ] Request (QuotaSetsRbacTest:test_show_default_quota_set): 200 GET http://172.30.13.94/compute/v2.1/os-quota-sets/5f612dd5e45e48558079cac6a303993a/defaults 0.171s 2020-11-06 17:59:27.233 38 DEBUG tempest.lib.common.rest_client [req-a36e1c62-5a45-4b83-9897-f49f799d79a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '371', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a36e1c62-5a45-4b83-9897-f49f799d79a8', 'x-compute-request-id': 'req-a36e1c62-5a45-4b83-9897-f49f799d79a8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-quota-sets/5f612dd5e45e48558079cac6a303993a/defaults'} Body: b'{"quota_set": {"id": "5f612dd5e45e48558079cac6a303993a", "cores": 20, "fixed_ips": -1, "floating_ips": -1, "injected_file_content_bytes": 10240, "injected_file_path_bytes": 255, "injected_files": 5, "instances": 10, "key_pairs": 100, "metadata_items": 128, "ram": 51200, "security_group_rules": -1, "security_groups": -1, "server_group_members": 10, "server_groups": 10}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:27.236 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:27.283 38 INFO tempest.lib.common.rest_client [req-3d8d1de2-1551-4107-952e-a6bd52e74427 ] Request (QuotaSetsRbacTest:test_show_default_quota_set): 200 GET http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles 0.046s 2020-11-06 17:59:27.283 38 DEBUG tempest.lib.common.rest_client [req-3d8d1de2-1551-4107-952e-a6bd52e74427 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3d8d1de2-1551-4107-952e-a6bd52e74427', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:27.318 38 INFO tempest.lib.common.rest_client [req-bc3e1ea8-a042-4329-ae86-55a0a61b1ecc ] Request (QuotaSetsRbacTest:test_show_default_quota_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 17:59:27.318 38 DEBUG tempest.lib.common.rest_client [req-bc3e1ea8-a042-4329-ae86-55a0a61b1ecc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bc3e1ea8-a042-4329-ae86-55a0a61b1ecc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "72082469207f4c5f8aa6bacf3cdc8b20", "name": "tempest-QuotaSetsRbacTest-1643369407", "password_expires_at": null}, "audit_ids": ["_VVgf4l_SJGBc2vm-8WAHA"], "expires_at": "2020-11-06T18:59:27.000000Z", "issued_at": "2020-11-06T17:59:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5f612dd5e45e48558079cac6a303993a", "name": "tempest-QuotaSetsRbacTest-1643369407"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:27.322 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:27.323 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.324 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.324 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.325 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.325 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.326 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.326 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.327 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.327 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.328 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.328 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.329 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.329 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.329 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.330 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.330 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.331 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.331 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.332 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.332 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.333 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.333 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.334 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.334 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.334 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.334 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.335 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.335 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.335 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.335 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.336 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.336 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.336 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.337 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.337 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.337 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.338 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.338 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.338 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.338 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.339 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.339 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.339 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.340 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.340 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.340 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.340 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.341 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.341 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.341 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.342 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.342 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.342 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.343 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.343 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.343 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.343 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.344 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.344 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.344 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.345 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.345 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.346 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.346 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.346 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.346 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.347 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.347 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.347 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.348 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.348 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.348 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.349 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.349 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.349 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:27.351 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-quota-sets:show, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:27.351 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:27.454 38 INFO tempest.lib.common.rest_client [req-ed6fd3b3-d3b5-447f-8b07-b7222115e58a ] Request (QuotaSetsRbacTest:test_show_quota_set): 200 GET http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles 0.103s 2020-11-06 17:59:27.455 38 DEBUG tempest.lib.common.rest_client [req-ed6fd3b3-d3b5-447f-8b07-b7222115e58a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ed6fd3b3-d3b5-447f-8b07-b7222115e58a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:27.536 38 INFO tempest.lib.common.rest_client [req-f47d51f7-1bf1-4fee-9d2d-5e9ca9960c28 ] Request (QuotaSetsRbacTest:test_show_quota_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.080s 2020-11-06 17:59:27.537 38 DEBUG tempest.lib.common.rest_client [req-f47d51f7-1bf1-4fee-9d2d-5e9ca9960c28 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f47d51f7-1bf1-4fee-9d2d-5e9ca9960c28', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "72082469207f4c5f8aa6bacf3cdc8b20", "name": "tempest-QuotaSetsRbacTest-1643369407", "password_expires_at": null}, "audit_ids": ["A2Xp0O5KSHGECb0JzZh1AA"], "expires_at": "2020-11-06T18:59:27.000000Z", "issued_at": "2020-11-06T17:59:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5f612dd5e45e48558079cac6a303993a", "name": "tempest-QuotaSetsRbacTest-1643369407"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:27.864 38 INFO tempest.lib.common.rest_client [req-d9dbaa69-e843-42a4-80ce-746b843525f9 ] Request (QuotaSetsRbacTest:test_show_quota_set): 200 GET http://172.30.13.94/compute/v2.1/os-quota-sets/5f612dd5e45e48558079cac6a303993a 0.326s 2020-11-06 17:59:27.865 38 DEBUG tempest.lib.common.rest_client [req-d9dbaa69-e843-42a4-80ce-746b843525f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '371', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d9dbaa69-e843-42a4-80ce-746b843525f9', 'x-compute-request-id': 'req-d9dbaa69-e843-42a4-80ce-746b843525f9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-quota-sets/5f612dd5e45e48558079cac6a303993a'} Body: b'{"quota_set": {"id": "5f612dd5e45e48558079cac6a303993a", "cores": 20, "fixed_ips": -1, "floating_ips": -1, "injected_file_content_bytes": 10240, "injected_file_path_bytes": 255, "injected_files": 5, "instances": 10, "key_pairs": 100, "metadata_items": 128, "ram": 51200, "security_group_rules": -1, "security_groups": -1, "server_group_members": 10, "server_groups": 10}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:27.870 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:27.966 38 INFO tempest.lib.common.rest_client [req-7b11bbdf-f042-4916-8eca-a17e65c5a5c2 ] Request (QuotaSetsRbacTest:test_show_quota_set): 200 GET http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles 0.094s 2020-11-06 17:59:27.966 38 DEBUG tempest.lib.common.rest_client [req-7b11bbdf-f042-4916-8eca-a17e65c5a5c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7b11bbdf-f042-4916-8eca-a17e65c5a5c2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:28.086 38 INFO tempest.lib.common.rest_client [req-e13058ba-5998-4471-b576-d776102bd85b ] Request (QuotaSetsRbacTest:test_show_quota_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.119s 2020-11-06 17:59:28.087 38 DEBUG tempest.lib.common.rest_client [req-e13058ba-5998-4471-b576-d776102bd85b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e13058ba-5998-4471-b576-d776102bd85b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "72082469207f4c5f8aa6bacf3cdc8b20", "name": "tempest-QuotaSetsRbacTest-1643369407", "password_expires_at": null}, "audit_ids": ["iIGvLsPuSlqLgzlfkr_KwQ"], "expires_at": "2020-11-06T18:59:28.000000Z", "issued_at": "2020-11-06T17:59:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5f612dd5e45e48558079cac6a303993a", "name": "tempest-QuotaSetsRbacTest-1643369407"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:28.091 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:28.092 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.093 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.094 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.094 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.095 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.095 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.096 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.097 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.097 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.098 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.098 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.099 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.099 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.100 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.100 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.101 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.101 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.101 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.101 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.102 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.102 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.102 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.103 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.103 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.103 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.103 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.104 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.104 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.104 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.105 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.105 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.105 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.105 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.106 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.106 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.106 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.106 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.107 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.107 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.107 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.108 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.108 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.108 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.109 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.109 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.109 37 INFO tempest.lib.common.rest_client [req-cd7cd43e-b939-45ca-b4d2-84c79bc56668 ] Request (SecurtiyGroupsRbacTest:_run_cleanups): 202 POST http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161/action 1.264s 2020-11-06 17:59:28.109 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.110 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.110 37 DEBUG tempest.lib.common.rest_client [req-cd7cd43e-b939-45ca-b4d2-84c79bc56668 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"removeSecurityGroup": {"name": "tempest-SecurtiyGroupsRbacTest-securitygroup-282130036"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cd7cd43e-b939-45ca-b4d2-84c79bc56668', 'x-compute-request-id': 'req-cd7cd43e-b939-45ca-b4d2-84c79bc56668', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:28.110 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.110 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.111 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.111 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.111 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.111 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.112 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.112 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.112 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.112 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.113 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.113 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.113 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.114 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.114 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.114 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:28.114 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.115 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.115 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.115 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.115 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.116 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.116 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.116 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.116 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.116 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.116 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.117 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.117 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.117 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.117 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.117 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.118 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.118 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.118 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.119 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-quota-sets:detail, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:28.119 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:28.119 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.120 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.120 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.121 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.121 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.121 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.122 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.122 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.122 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.122 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.123 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.123 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.123 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.124 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.124 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.124 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.124 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.125 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.125 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.125 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.126 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.126 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.126 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.126 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.127 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.127 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.127 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.127 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.128 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.128 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.128 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.128 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.129 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.129 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.129 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.129 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.129 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.130 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.130 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.130 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.130 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.131 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.131 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.131 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.131 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.132 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.132 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.132 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.132 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.132 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.133 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.133 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.133 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.133 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.134 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.134 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.134 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.135 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.135 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.135 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.135 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.136 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.136 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.136 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.136 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.136 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.137 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.137 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.137 39 INFO tempest.lib.common.rest_client [req-eaa9d869-3bd5-4c09-a1de-f693218f299b ] Request (ServerActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.377s 2020-11-06 17:59:28.137 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.137 39 DEBUG tempest.lib.common.rest_client [req-eaa9d869-3bd5-4c09-a1de-f693218f299b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-eaa9d869-3bd5-4c09-a1de-f693218f299b', 'x-compute-request-id': 'req-eaa9d869-3bd5-4c09-a1de-f693218f299b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "BUILD", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T17:59:22Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:28.138 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-security-groups:list, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:28.138 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:28.173 38 INFO tempest.lib.common.rest_client [req-6677ff6a-4abe-4b40-8085-a5686fd86f1d ] Request (QuotaSetsRbacTest:test_show_quota_set_details): 200 GET http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles 0.053s 2020-11-06 17:59:28.174 38 DEBUG tempest.lib.common.rest_client [req-6677ff6a-4abe-4b40-8085-a5686fd86f1d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6677ff6a-4abe-4b40-8085-a5686fd86f1d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:28.197 37 INFO tempest.lib.common.rest_client [req-55732a0e-6a61-466c-ac4d-00aa8dfc64cb ] Request (SecurtiyGroupsRbacTest:test_list_security_groups_by_server): 200 GET http://172.30.13.94/identity/v3/projects/d73ae082cf2c4889915adb0d4efc6f2e/users/eabd533369674823b012ab299376bbb3/roles 0.058s 2020-11-06 17:59:28.198 37 DEBUG tempest.lib.common.rest_client [req-55732a0e-6a61-466c-ac4d-00aa8dfc64cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-55732a0e-6a61-466c-ac4d-00aa8dfc64cb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d73ae082cf2c4889915adb0d4efc6f2e/users/eabd533369674823b012ab299376bbb3/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d73ae082cf2c4889915adb0d4efc6f2e/users/eabd533369674823b012ab299376bbb3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:28.199 40 INFO tempest.lib.common.rest_client [req-df628046-1b69-4da3-ad1a-ae9dd8ca231e ] Request (ServerConsolesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/7b3ebe7e-933d-45f9-a55d-aa8f1670eaf7 1.377s 2020-11-06 17:59:28.200 40 DEBUG tempest.lib.common.rest_client [req-df628046-1b69-4da3-ad1a-ae9dd8ca231e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-df628046-1b69-4da3-ad1a-ae9dd8ca231e', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 17:59:28 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/7b3ebe7e-933d-45f9-a55d-aa8f1670eaf7'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:28.208 38 INFO tempest.lib.common.rest_client [req-101e2dc6-3e6f-4a34-bf31-166e3ab9fa64 ] Request (QuotaSetsRbacTest:test_show_quota_set_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 17:59:28.209 38 DEBUG tempest.lib.common.rest_client [req-101e2dc6-3e6f-4a34-bf31-166e3ab9fa64 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-101e2dc6-3e6f-4a34-bf31-166e3ab9fa64', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "72082469207f4c5f8aa6bacf3cdc8b20", "name": "tempest-QuotaSetsRbacTest-1643369407", "password_expires_at": null}, "audit_ids": ["JVb54dqERH-42bhZWxvOVg"], "expires_at": "2020-11-06T18:59:28.000000Z", "issued_at": "2020-11-06T17:59:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5f612dd5e45e48558079cac6a303993a", "name": "tempest-QuotaSetsRbacTest-1643369407"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:28.286 37 INFO tempest.lib.common.rest_client [req-21b1eea9-e3d1-45c4-aa87-4f156dec7a46 ] Request (SecurtiyGroupsRbacTest:test_list_security_groups_by_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-11-06 17:59:28.287 37 DEBUG tempest.lib.common.rest_client [req-21b1eea9-e3d1-45c4-aa87-4f156dec7a46 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-21b1eea9-e3d1-45c4-aa87-4f156dec7a46', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eabd533369674823b012ab299376bbb3", "name": "tempest-SecurtiyGroupsRbacTest-66962389", "password_expires_at": null}, "audit_ids": ["uhoeu4vlQ4KMPaiNtJDk6g"], "expires_at": "2020-11-06T18:59:28.000000Z", "issued_at": "2020-11-06T17:59:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d73ae082cf2c4889915adb0d4efc6f2e", "name": "tempest-SecurtiyGroupsRbacTest-66962389"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:28.405 38 INFO tempest.lib.common.rest_client [req-8f8c0207-76c5-4da3-aea4-7928a401c893 ] Request (QuotaSetsRbacTest:test_show_quota_set_details): 200 GET http://172.30.13.94/compute/v2.1/os-quota-sets/5f612dd5e45e48558079cac6a303993a/detail 0.194s 2020-11-06 17:59:28.405 38 DEBUG tempest.lib.common.rest_client [req-8f8c0207-76c5-4da3-aea4-7928a401c893 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '917', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8f8c0207-76c5-4da3-aea4-7928a401c893', 'x-compute-request-id': 'req-8f8c0207-76c5-4da3-aea4-7928a401c893', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-quota-sets/5f612dd5e45e48558079cac6a303993a/detail'} Body: b'{"quota_set": {"id": "5f612dd5e45e48558079cac6a303993a", "cores": {"limit": 20, "in_use": 0, "reserved": 0}, "fixed_ips": {"limit": -1, "in_use": 0, "reserved": 0}, "floating_ips": {"limit": -1, "in_use": 0, "reserved": 0}, "injected_file_content_bytes": {"limit": 10240, "in_use": 0, "reserved": 0}, "injected_file_path_bytes": {"limit": 255, "in_use": 0, "reserved": 0}, "injected_files": {"limit": 5, "in_use": 0, "reserved": 0}, "instances": {"limit": 10, "in_use": 0, "reserved": 0}, "key_pairs": {"limit": 100, "in_use": 0, "reserved": 0}, "metadata_items": {"limit": 128, "in_use": 0, "reserved": 0}, "ram": {"limit": 51200, "in_use": 0, "reserved": 0}, "security_group_rules": {"limit": -1, "in_use": 0, "reserved": 0}, "security_groups": {"limit": -1, "in_use": 0, "reserved": 0}, "server_group_members": {"limit": 10, "in_use": 0, "reserved": 0}, "server_groups": {"limit": 10, "in_use": 0, "reserved": 0}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:28.416 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:28.488 38 INFO tempest.lib.common.rest_client [req-ea2a0df8-a825-4692-83d1-b5e5afb263a7 ] Request (QuotaSetsRbacTest:test_show_quota_set_details): 200 GET http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles 0.071s 2020-11-06 17:59:28.489 38 DEBUG tempest.lib.common.rest_client [req-ea2a0df8-a825-4692-83d1-b5e5afb263a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ea2a0df8-a825-4692-83d1-b5e5afb263a7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:28.526 38 INFO tempest.lib.common.rest_client [req-e011215b-932e-4582-bcab-f49ceb205928 ] Request (QuotaSetsRbacTest:test_show_quota_set_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 17:59:28.527 38 DEBUG tempest.lib.common.rest_client [req-e011215b-932e-4582-bcab-f49ceb205928 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e011215b-932e-4582-bcab-f49ceb205928', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "72082469207f4c5f8aa6bacf3cdc8b20", "name": "tempest-QuotaSetsRbacTest-1643369407", "password_expires_at": null}, "audit_ids": ["65pquGNITCiOuM7_1mR1ag"], "expires_at": "2020-11-06T18:59:28.000000Z", "issued_at": "2020-11-06T17:59:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5f612dd5e45e48558079cac6a303993a", "name": "tempest-QuotaSetsRbacTest-1643369407"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:28.531 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:28.532 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.533 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.534 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.534 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.535 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.536 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.536 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.537 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.537 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.538 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.538 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.539 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.539 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.540 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.540 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.541 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.541 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.542 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.542 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.542 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.542 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.543 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.543 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.543 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.544 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.544 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.544 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.544 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.545 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.545 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.545 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.546 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.546 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.546 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.546 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.547 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.547 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.547 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.547 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.548 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.548 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.548 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.549 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.549 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.549 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.549 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.550 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.550 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.550 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.551 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.551 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.551 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.551 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.552 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.552 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.552 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.553 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.553 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.553 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.553 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.554 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.554 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.555 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.555 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.555 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.555 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.556 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.556 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.556 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.557 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.557 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.557 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.557 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.558 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.558 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.559 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-quota-sets:update, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:28.578 37 INFO tempest.lib.common.rest_client [req-c4c8544d-fad1-4d7f-8def-cf6e507d0f7f ] Request (SecurtiyGroupsRbacTest:test_list_security_groups_by_server): 200 GET http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161/os-security-groups 0.290s 2020-11-06 17:59:28.578 37 DEBUG tempest.lib.common.rest_client [req-c4c8544d-fad1-4d7f-8def-cf6e507d0f7f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '707', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c4c8544d-fad1-4d7f-8def-cf6e507d0f7f', 'x-compute-request-id': 'req-c4c8544d-fad1-4d7f-8def-cf6e507d0f7f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161/os-security-groups'} Body: b'{"security_groups": [{"id": "c53b2eee-f0f2-4ba3-993b-5d55a76ff19a", "description": "Default security group", "name": "default", "tenant_id": "d73ae082cf2c4889915adb0d4efc6f2e", "rules": [{"id": "9c69ea94-8035-4d48-80a8-317ecef494d9", "parent_group_id": "c53b2eee-f0f2-4ba3-993b-5d55a76ff19a", "ip_protocol": null, "from_port": null, "to_port": null, "group": {"name": "default", "tenant_id": "d73ae082cf2c4889915adb0d4efc6f2e"}, "ip_range": {}}, {"id": "9f7854b2-70e9-41a6-b82d-e7da49deeec4", "parent_group_id": "c53b2eee-f0f2-4ba3-993b-5d55a76ff19a", "ip_protocol": null, "from_port": null, "to_port": null, "group": {"name": "default", "tenant_id": "d73ae082cf2c4889915adb0d4efc6f2e"}, "ip_range": {}}]}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:28.585 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:28.640 37 INFO tempest.lib.common.rest_client [req-d61a3128-1171-46b9-a1e3-9774249dbfd2 ] Request (SecurtiyGroupsRbacTest:test_list_security_groups_by_server): 200 GET http://172.30.13.94/identity/v3/projects/d73ae082cf2c4889915adb0d4efc6f2e/users/eabd533369674823b012ab299376bbb3/roles 0.054s 2020-11-06 17:59:28.641 37 DEBUG tempest.lib.common.rest_client [req-d61a3128-1171-46b9-a1e3-9774249dbfd2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d61a3128-1171-46b9-a1e3-9774249dbfd2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d73ae082cf2c4889915adb0d4efc6f2e/users/eabd533369674823b012ab299376bbb3/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d73ae082cf2c4889915adb0d4efc6f2e/users/eabd533369674823b012ab299376bbb3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:28.678 37 INFO tempest.lib.common.rest_client [req-2b83382e-9ca6-41ae-a754-6ef1bb7a1f67 ] Request (SecurtiyGroupsRbacTest:test_list_security_groups_by_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 17:59:28.678 37 DEBUG tempest.lib.common.rest_client [req-2b83382e-9ca6-41ae-a754-6ef1bb7a1f67 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2b83382e-9ca6-41ae-a754-6ef1bb7a1f67', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eabd533369674823b012ab299376bbb3", "name": "tempest-SecurtiyGroupsRbacTest-66962389", "password_expires_at": null}, "audit_ids": ["yyHVStymSP6-c6BS1dYlJw"], "expires_at": "2020-11-06T18:59:28.000000Z", "issued_at": "2020-11-06T17:59:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d73ae082cf2c4889915adb0d4efc6f2e", "name": "tempest-SecurtiyGroupsRbacTest-66962389"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:28.683 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:28.683 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.684 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.684 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.685 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.685 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.686 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.687 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.687 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.687 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.688 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.688 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.689 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.689 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.689 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.690 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.690 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.690 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.690 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.691 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.691 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.691 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.692 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.692 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.692 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.692 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.693 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.693 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.693 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.694 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.694 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.694 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.694 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.695 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.695 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.695 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.696 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.696 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.696 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.696 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.697 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.697 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.697 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.698 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.698 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.698 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.698 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.699 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.699 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.699 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.700 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.700 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.700 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.700 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.701 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.701 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.701 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.701 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.702 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.702 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.702 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.703 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.703 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.703 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.704 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.704 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.704 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.705 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.705 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.705 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.705 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.706 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.706 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.706 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.707 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.707 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:28.708 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-security-groups:remove, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:28.712 40 INFO tempest.lib.common.rest_client [req-e3518893-9d3c-4c5a-aedb-7bf78fbc0646 ] Request (ServerConsolesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/6b7d443e-3e96-4e22-be53-fcf373c2c13b 0.511s 2020-11-06 17:59:28.712 40 DEBUG tempest.lib.common.rest_client [req-e3518893-9d3c-4c5a-aedb-7bf78fbc0646 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-e3518893-9d3c-4c5a-aedb-7bf78fbc0646', 'date': 'Fri, 06 Nov 2020 17:59:28 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/6b7d443e-3e96-4e22-be53-fcf373c2c13b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:28.735 38 INFO tempest.lib.common.rest_client [req-81480326-fd35-4d6f-b697-327f3f1fa7df ] Request (QuotaSetsRbacTest:test_update_quota_set): 200 GET http://172.30.13.94/compute/v2.1/os-quota-sets/5f612dd5e45e48558079cac6a303993a/defaults 0.175s 2020-11-06 17:59:28.736 38 DEBUG tempest.lib.common.rest_client [req-81480326-fd35-4d6f-b697-327f3f1fa7df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '371', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-81480326-fd35-4d6f-b697-327f3f1fa7df', 'x-compute-request-id': 'req-81480326-fd35-4d6f-b697-327f3f1fa7df', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-quota-sets/5f612dd5e45e48558079cac6a303993a/defaults'} Body: b'{"quota_set": {"id": "5f612dd5e45e48558079cac6a303993a", "cores": 20, "fixed_ips": -1, "floating_ips": -1, "injected_file_content_bytes": 10240, "injected_file_path_bytes": 255, "injected_files": 5, "instances": 10, "key_pairs": 100, "metadata_items": 128, "ram": 51200, "security_group_rules": -1, "security_groups": -1, "server_group_members": 10, "server_groups": 10}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:28.741 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:28.793 38 INFO tempest.lib.common.rest_client [req-3ab7bc01-c3d0-4cd5-8fab-a0d99f19d572 ] Request (QuotaSetsRbacTest:test_update_quota_set): 200 GET http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles 0.051s 2020-11-06 17:59:28.794 38 DEBUG tempest.lib.common.rest_client [req-3ab7bc01-c3d0-4cd5-8fab-a0d99f19d572 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3ab7bc01-c3d0-4cd5-8fab-a0d99f19d572', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:28.826 38 INFO tempest.lib.common.rest_client [req-e3b97ac3-406e-40e6-8824-cafec40a30e6 ] Request (QuotaSetsRbacTest:test_update_quota_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 17:59:28.826 38 DEBUG tempest.lib.common.rest_client [req-e3b97ac3-406e-40e6-8824-cafec40a30e6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e3b97ac3-406e-40e6-8824-cafec40a30e6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "72082469207f4c5f8aa6bacf3cdc8b20", "name": "tempest-QuotaSetsRbacTest-1643369407", "password_expires_at": null}, "audit_ids": ["SDkIjx_cRBe3RNXgHy4GxQ"], "expires_at": "2020-11-06T18:59:28.000000Z", "issued_at": "2020-11-06T17:59:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5f612dd5e45e48558079cac6a303993a", "name": "tempest-QuotaSetsRbacTest-1643369407"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:29.022 38 INFO tempest.lib.common.rest_client [req-352d83b0-130d-42e6-a46c-40d2377f8d37 ] Request (QuotaSetsRbacTest:test_update_quota_set): 200 PUT http://172.30.13.94/compute/v2.1/os-quota-sets/5f612dd5e45e48558079cac6a303993a 0.194s 2020-11-06 17:59:29.023 38 DEBUG tempest.lib.common.rest_client [req-352d83b0-130d-42e6-a46c-40d2377f8d37 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"quota_set": {"force": true, "injected_file_content_bytes": 20480}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '329', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-352d83b0-130d-42e6-a46c-40d2377f8d37', 'x-compute-request-id': 'req-352d83b0-130d-42e6-a46c-40d2377f8d37', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-quota-sets/5f612dd5e45e48558079cac6a303993a'} Body: b'{"quota_set": {"cores": 20, "fixed_ips": -1, "floating_ips": -1, "injected_file_content_bytes": 20480, "injected_file_path_bytes": 255, "injected_files": 5, "instances": 10, "key_pairs": 100, "metadata_items": 128, "ram": 51200, "security_group_rules": -1, "security_groups": -1, "server_group_members": 10, "server_groups": 10}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:29.028 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:29.075 38 INFO tempest.lib.common.rest_client [req-2990b773-b5cd-48ad-9ed7-3f3306bb4e64 ] Request (QuotaSetsRbacTest:test_update_quota_set): 200 GET http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles 0.045s 2020-11-06 17:59:29.075 38 DEBUG tempest.lib.common.rest_client [req-2990b773-b5cd-48ad-9ed7-3f3306bb4e64 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2990b773-b5cd-48ad-9ed7-3f3306bb4e64', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a/users/72082469207f4c5f8aa6bacf3cdc8b20/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:29.109 38 INFO tempest.lib.common.rest_client [req-70fd610f-05fd-4aaf-895d-9085c42dc42a ] Request (QuotaSetsRbacTest:test_update_quota_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 17:59:29.110 38 DEBUG tempest.lib.common.rest_client [req-70fd610f-05fd-4aaf-895d-9085c42dc42a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-70fd610f-05fd-4aaf-895d-9085c42dc42a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "72082469207f4c5f8aa6bacf3cdc8b20", "name": "tempest-QuotaSetsRbacTest-1643369407", "password_expires_at": null}, "audit_ids": ["mZygrDksS_-eD8odGFLuPg"], "expires_at": "2020-11-06T18:59:29.000000Z", "issued_at": "2020-11-06T17:59:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5f612dd5e45e48558079cac6a303993a", "name": "tempest-QuotaSetsRbacTest-1643369407"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f612dd5e45e48558079cac6a303993a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:29.194 37 INFO tempest.lib.common.rest_client [req-db31f57f-dc97-494c-9f6a-0e7e5cacc23d ] Request (SecurtiyGroupsRbacTest:test_remove_security_group_from_server): 200 POST http://172.30.13.94/compute/v2.1/os-security-groups 0.485s 2020-11-06 17:59:29.194 37 DEBUG tempest.lib.common.rest_client [req-db31f57f-dc97-494c-9f6a-0e7e5cacc23d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group": {"name": "tempest-SecurtiyGroupsRbacTest-securitygroup-64737499", "description": "tempest-description-1567733258"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '242', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-db31f57f-dc97-494c-9f6a-0e7e5cacc23d', 'x-compute-request-id': 'req-db31f57f-dc97-494c-9f6a-0e7e5cacc23d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-security-groups'} Body: b'{"security_group": {"id": "286c8d34-d79f-4e40-8207-b2c222658c29", "description": "tempest-description-1567733258", "name": "tempest-SecurtiyGroupsRbacTest-securitygroup-64737499", "tenant_id": "d73ae082cf2c4889915adb0d4efc6f2e", "rules": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:29.401 40 INFO tempest.lib.common.rest_client [req-0cc099fb-0b88-4b38-b70f-fceeab1e6c61 ] Request (ServerConsolesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/bb0f3cc3-8583-431c-af3d-9b99d0b951fd 0.688s 2020-11-06 17:59:29.401 40 DEBUG tempest.lib.common.rest_client [req-0cc099fb-0b88-4b38-b70f-fceeab1e6c61 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-0cc099fb-0b88-4b38-b70f-fceeab1e6c61', 'date': 'Fri, 06 Nov 2020 17:59:29 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/bb0f3cc3-8583-431c-af3d-9b99d0b951fd'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:29.442 38 INFO tempest.lib.common.rest_client [req-409dad3c-0388-49a5-a096-0c16ba6279fe ] Request (QuotaSetsRbacTest:_run_cleanups): 200 PUT http://172.30.13.94/compute/v2.1/os-quota-sets/5f612dd5e45e48558079cac6a303993a 0.330s 2020-11-06 17:59:29.443 38 DEBUG tempest.lib.common.rest_client [req-409dad3c-0388-49a5-a096-0c16ba6279fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"quota_set": {"cores": 20, "fixed_ips": -1, "floating_ips": -1, "injected_file_content_bytes": 10240, "injected_file_path_bytes": 255, "injected_files": 5, "instances": 10, "key_pairs": 100, "metadata_items": 128, "ram": 51200, "security_group_rules": -1, "security_groups": -1, "server_group_members": 10, "server_groups": 10}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '329', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-409dad3c-0388-49a5-a096-0c16ba6279fe', 'x-compute-request-id': 'req-409dad3c-0388-49a5-a096-0c16ba6279fe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-quota-sets/5f612dd5e45e48558079cac6a303993a'} Body: b'{"quota_set": {"cores": 20, "fixed_ips": -1, "floating_ips": -1, "injected_file_content_bytes": 10240, "injected_file_path_bytes": 255, "injected_files": 5, "instances": 10, "key_pairs": 100, "metadata_items": 128, "ram": 51200, "security_group_rules": -1, "security_groups": -1, "server_group_members": 10, "server_groups": 10}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:29.465 39 INFO tempest.lib.common.rest_client [req-ec4dc08a-5335-45d0-b9dd-47bf82cbb952 ] Request (ServerActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.312s 2020-11-06 17:59:29.465 39 DEBUG tempest.lib.common.rest_client [req-ec4dc08a-5335-45d0-b9dd-47bf82cbb952 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ec4dc08a-5335-45d0-b9dd-47bf82cbb952', 'x-compute-request-id': 'req-ec4dc08a-5335-45d0-b9dd-47bf82cbb952', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T17:59:28Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:28.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:29.477 39 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 9 second wait 2020-11-06 17:59:29.531 40 INFO tempest.lib.common.rest_client [req-60183191-b4a8-4ed7-a3ce-9b5ada236d8c ] Request (ServerConsolesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/d83a612e30aa42b18d464c0b2cbd4044 0.129s 2020-11-06 17:59:29.532 40 DEBUG tempest.lib.common.rest_client [req-60183191-b4a8-4ed7-a3ce-9b5ada236d8c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-60183191-b4a8-4ed7-a3ce-9b5ada236d8c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/d83a612e30aa42b18d464c0b2cbd4044'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:29.563 38 INFO tempest.lib.common.rest_client [req-ea7c9cc0-97f6-438c-8183-d321ee158b32 ] Request (QuotaSetsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/72082469207f4c5f8aa6bacf3cdc8b20 0.112s 2020-11-06 17:59:29.564 38 DEBUG tempest.lib.common.rest_client [req-ea7c9cc0-97f6-438c-8183-d321ee158b32 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ea7c9cc0-97f6-438c-8183-d321ee158b32', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/72082469207f4c5f8aa6bacf3cdc8b20'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:29.576 40 INFO tempest.lib.common.rest_client [req-86c04966-a1a9-4153-a3ce-65103c092fe0 ] Request (ServerConsolesRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=0cd9895a4bd84f8a859ddbcbf39a0d72&name=default 0.043s 2020-11-06 17:59:29.576 40 DEBUG tempest.lib.common.rest_client [req-86c04966-a1a9-4153-a3ce-65103c092fe0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-86c04966-a1a9-4153-a3ce-65103c092fe0', 'date': 'Fri, 06 Nov 2020 17:59:29 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=0cd9895a4bd84f8a859ddbcbf39a0d72&name=default'} Body: b'{"security_groups": [{"id": "1de3afac-3db5-4b98-ab0f-79f6cd1db4cb", "name": "default", "stateful": true, "tenant_id": "0cd9895a4bd84f8a859ddbcbf39a0d72", "description": "Default security group", "security_group_rules": [{"id": "17996c98-226c-474a-84b5-8f2af50eea44", "tenant_id": "0cd9895a4bd84f8a859ddbcbf39a0d72", "security_group_id": "1de3afac-3db5-4b98-ab0f-79f6cd1db4cb", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:59:02Z", "updated_at": "2020-11-06T17:59:02Z", "revision_number": 0, "project_id": "0cd9895a4bd84f8a859ddbcbf39a0d72"}, {"id": "38f7dd97-f671-40e3-9d72-bc18c8f73a69", "tenant_id": "0cd9895a4bd84f8a859ddbcbf39a0d72", "security_group_id": "1de3afac-3db5-4b98-ab0f-79f6cd1db4cb", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:59:02Z", "updated_at": "2020-11-06T17:59:02Z", "revision_number": 0, "project_id": "0cd9895a4bd84f8a859ddbcbf39a0d72"}, {"id": "8c79db2e-e5ab-43f0-9cc2-e919fc620306", "tenant_id": "0cd9895a4bd84f8a859ddbcbf39a0d72", "security_group_id": "1de3afac-3db5-4b98-ab0f-79f6cd1db4cb", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "1de3afac-3db5-4b98-ab0f-79f6cd1db4cb", "description": null, "tags": [], "created_at": "2020-11-06T17:59:02Z", "updated_at": "2020-11-06T17:59:02Z", "revision_number": 0, "project_id": "0cd9895a4bd84f8a859ddbcbf39a0d72"}, {"id": "ea2ef330-0f70-4b37-8dd8-d8fd9c3c01ce", "tenant_id": "0cd9895a4bd84f8a859ddbcbf39a0d72", "security_group_id": "1de3afac-3db5-4b98-ab0f-79f6cd1db4cb", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "1de3afac-3db5-4b98-ab0f-79f6cd1db4cb", "description": null, "tags": [], "created_at": "2020-11-06T17:59:02Z", "updated_at": "2020-11-06T17:59:02Z", "revision_number": 0, "project_id": "0cd9895a4bd84f8a859ddbcbf39a0d72"}], "tags": [], "created_at": "2020-11-06T17:59:02Z", "updated_at": "2020-11-06T17:59:02Z", "revision_number": 1, "project_id": "0cd9895a4bd84f8a859ddbcbf39a0d72"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:29.648 38 INFO tempest.lib.common.rest_client [req-597b4fbc-aa72-4274-a1e4-ddfa2f4dbb1d ] Request (QuotaSetsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 17:59:29.648 38 DEBUG tempest.lib.common.rest_client [req-597b4fbc-aa72-4274-a1e4-ddfa2f4dbb1d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-597b4fbc-aa72-4274-a1e4-ddfa2f4dbb1d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["TWby6-36QsGEOHrYshl0Lw"], "expires_at": "2020-11-06T18:59:29.000000Z", "issued_at": "2020-11-06T17:59:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:29.684 40 INFO tempest.lib.common.rest_client [req-cd52f3f9-a8bb-48a9-8840-08579a47aaaa ] Request (ServerConsolesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/1de3afac-3db5-4b98-ab0f-79f6cd1db4cb 0.106s 2020-11-06 17:59:29.684 40 DEBUG tempest.lib.common.rest_client [req-cd52f3f9-a8bb-48a9-8840-08579a47aaaa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-cd52f3f9-a8bb-48a9-8840-08579a47aaaa', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 17:59:29 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/1de3afac-3db5-4b98-ab0f-79f6cd1db4cb'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:29.794 39 INFO tempest.lib.common.rest_client [req-fa2049bf-b3c5-4f52-ad37-3dc86610c9b6 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.316s 2020-11-06 17:59:29.795 39 DEBUG tempest.lib.common.rest_client [req-fa2049bf-b3c5-4f52-ad37-3dc86610c9b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fa2049bf-b3c5-4f52-ad37-3dc86610c9b6', 'x-compute-request-id': 'req-fa2049bf-b3c5-4f52-ad37-3dc86610c9b6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T17:59:28Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:28.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:29.808 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:29.809 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.809 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.810 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.810 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.810 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.811 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.811 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.812 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.812 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.812 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.813 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.813 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.813 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.814 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.814 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.814 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.814 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.815 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.815 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.815 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.816 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.816 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.816 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.817 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.817 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.817 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.818 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.818 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.818 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.819 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.819 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.819 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.819 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.819 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.820 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.820 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.820 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.820 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.821 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.821 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.821 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.821 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.822 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.822 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.822 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.823 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.823 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.823 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.823 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.824 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.824 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.824 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.824 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.824 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.825 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.825 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.825 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.825 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.826 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.826 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.826 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.826 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.827 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.827 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.827 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.827 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.828 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.828 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.828 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.828 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.829 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.829 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.829 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.829 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.830 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:29.830 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:confirm_resize, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:29.867 40 INFO tempest.lib.common.rest_client [req-893cd3dc-451c-4596-be5c-4a330dba0ee5 ] Request (ServerConsolesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/0cd9895a4bd84f8a859ddbcbf39a0d72 0.181s 2020-11-06 17:59:29.868 40 DEBUG tempest.lib.common.rest_client [req-893cd3dc-451c-4596-be5c-4a330dba0ee5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-893cd3dc-451c-4596-be5c-4a330dba0ee5', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/0cd9895a4bd84f8a859ddbcbf39a0d72'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:29.933 38 INFO tempest.lib.common.rest_client [req-d8b2c562-94d8-44b6-abee-b60092b6ae70 ] Request (QuotaSetsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=5f612dd5e45e48558079cac6a303993a&name=default 0.283s 2020-11-06 17:59:29.934 38 DEBUG tempest.lib.common.rest_client [req-d8b2c562-94d8-44b6-abee-b60092b6ae70 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-d8b2c562-94d8-44b6-abee-b60092b6ae70', 'date': 'Fri, 06 Nov 2020 17:59:29 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=5f612dd5e45e48558079cac6a303993a&name=default'} Body: b'{"security_groups": [{"id": "1c3cdc2b-0912-4dd3-b907-71a324966d88", "name": "default", "stateful": true, "tenant_id": "5f612dd5e45e48558079cac6a303993a", "description": "Default security group", "security_group_rules": [{"id": "5acba8ec-fa54-4bed-8051-90f585cc2657", "tenant_id": "5f612dd5e45e48558079cac6a303993a", "security_group_id": "1c3cdc2b-0912-4dd3-b907-71a324966d88", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "1c3cdc2b-0912-4dd3-b907-71a324966d88", "description": null, "tags": [], "created_at": "2020-11-06T17:59:29Z", "updated_at": "2020-11-06T17:59:29Z", "revision_number": 0, "project_id": "5f612dd5e45e48558079cac6a303993a"}, {"id": "67020ab5-904f-4027-b60e-b3d5dfb70ef7", "tenant_id": "5f612dd5e45e48558079cac6a303993a", "security_group_id": "1c3cdc2b-0912-4dd3-b907-71a324966d88", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:59:29Z", "updated_at": "2020-11-06T17:59:29Z", "revision_number": 0, "project_id": "5f612dd5e45e48558079cac6a303993a"}, {"id": "cb7cfcfc-4f95-47eb-8c23-b7e0b6949949", "tenant_id": "5f612dd5e45e48558079cac6a303993a", "security_group_id": "1c3cdc2b-0912-4dd3-b907-71a324966d88", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "1c3cdc2b-0912-4dd3-b907-71a324966d88", "description": null, "tags": [], "created_at": "2020-11-06T17:59:29Z", "updated_at": "2020-11-06T17:59:29Z", "revision_number": 0, "project_id": "5f612dd5e45e48558079cac6a303993a"}, {"id": "d93b3e9e-2f7c-4dde-8d24-92583f3e443f", "tenant_id": "5f612dd5e45e48558079cac6a303993a", "security_group_id": "1c3cdc2b-0912-4dd3-b907-71a324966d88", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:59:29Z", "updated_at": "2020-11-06T17:59:29Z", "revision_number": 0, "project_id": "5f612dd5e45e48558079cac6a303993a"}], "tags": [], "created_at": "2020-11-06T17:59:29Z", "updated_at": "2020-11-06T17:59:29Z", "revision_number": 1, "project_id": "5f612dd5e45e48558079cac6a303993a"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:29.953 40 INFO tempest.lib.common.rest_client [req-b426a3e6-875c-475a-8f9a-af75c757f3cd ] Request (ServerConsolesV26RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 17:59:29.954 40 DEBUG tempest.lib.common.rest_client [req-b426a3e6-875c-475a-8f9a-af75c757f3cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b426a3e6-875c-475a-8f9a-af75c757f3cd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["-KQeeNS8SD-Q7za_4NQcdQ"], "expires_at": "2020-11-06T18:59:29.000000Z", "issued_at": "2020-11-06T17:59:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:29.991 37 INFO tempest.lib.common.rest_client [req-7ab1a118-be08-48bf-97ec-0d074fd93adf ] Request (SecurtiyGroupsRbacTest:test_remove_security_group_from_server): 202 POST http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161/action 0.792s 2020-11-06 17:59:29.992 37 DEBUG tempest.lib.common.rest_client [req-7ab1a118-be08-48bf-97ec-0d074fd93adf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"addSecurityGroup": {"name": "tempest-SecurtiyGroupsRbacTest-securitygroup-64737499"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7ab1a118-be08-48bf-97ec-0d074fd93adf', 'x-compute-request-id': 'req-7ab1a118-be08-48bf-97ec-0d074fd93adf', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:29.992 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:29.994 40 INFO tempest.lib.common.rest_client [req-2448722f-f84d-446f-b8c9-a82ae99b45aa ] Request (ServerConsolesV26RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 17:59:29.994 40 DEBUG tempest.lib.common.rest_client [req-2448722f-f84d-446f-b8c9-a82ae99b45aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2448722f-f84d-446f-b8c9-a82ae99b45aa', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["Z3k_vQcUSJqHEPQGREVajw"], "expires_at": "2020-11-06T18:59:29.000000Z", "issued_at": "2020-11-06T17:59:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:30.040 37 INFO tempest.lib.common.rest_client [req-b2c830d5-2df8-4c49-8e50-112c627f7844 ] Request (SecurtiyGroupsRbacTest:test_remove_security_group_from_server): 200 GET http://172.30.13.94/identity/v3/projects/d73ae082cf2c4889915adb0d4efc6f2e/users/eabd533369674823b012ab299376bbb3/roles 0.047s 2020-11-06 17:59:30.041 40 INFO tempest.lib.common.rest_client [req-5862a720-aa1a-46cd-a5a6-899d1aff0cfa ] Request (ServerConsolesV26RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.046s 2020-11-06 17:59:30.041 40 DEBUG tempest.lib.common.rest_client [req-5862a720-aa1a-46cd-a5a6-899d1aff0cfa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5862a720-aa1a-46cd-a5a6-899d1aff0cfa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:30.041 37 DEBUG tempest.lib.common.rest_client [req-b2c830d5-2df8-4c49-8e50-112c627f7844 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b2c830d5-2df8-4c49-8e50-112c627f7844', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d73ae082cf2c4889915adb0d4efc6f2e/users/eabd533369674823b012ab299376bbb3/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d73ae082cf2c4889915adb0d4efc6f2e/users/eabd533369674823b012ab299376bbb3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:30.083 38 INFO tempest.lib.common.rest_client [req-4a538776-80a9-483d-8e32-57d7680e530d ] Request (QuotaSetsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/1c3cdc2b-0912-4dd3-b907-71a324966d88 0.148s 2020-11-06 17:59:30.083 38 DEBUG tempest.lib.common.rest_client [req-4a538776-80a9-483d-8e32-57d7680e530d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-4a538776-80a9-483d-8e32-57d7680e530d', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 17:59:30 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/1c3cdc2b-0912-4dd3-b907-71a324966d88'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:30.099 40 INFO tempest.lib.common.rest_client [req-865094a7-7f3b-42f4-857b-605177fb9690 ] Request (ServerConsolesV26RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.057s 2020-11-06 17:59:30.099 40 DEBUG tempest.lib.common.rest_client [req-865094a7-7f3b-42f4-857b-605177fb9690 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ServerConsolesV26RbacTest-667342185-desc", "domain_id": "default", "name": "tempest-ServerConsolesV26RbacTest-667342185"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '386', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-865094a7-7f3b-42f4-857b-605177fb9690', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "11d8c5c0046c4310b47e5021f23c2165", "name": "tempest-ServerConsolesV26RbacTest-667342185", "domain_id": "default", "description": "tempest-ServerConsolesV26RbacTest-667342185-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/11d8c5c0046c4310b47e5021f23c2165"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:30.120 37 INFO tempest.lib.common.rest_client [req-fb3857ef-d4d1-439c-8b61-d0b5344427cb ] Request (SecurtiyGroupsRbacTest:test_remove_security_group_from_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-11-06 17:59:30.121 37 DEBUG tempest.lib.common.rest_client [req-fb3857ef-d4d1-439c-8b61-d0b5344427cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fb3857ef-d4d1-439c-8b61-d0b5344427cb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eabd533369674823b012ab299376bbb3", "name": "tempest-SecurtiyGroupsRbacTest-66962389", "password_expires_at": null}, "audit_ids": ["4MvDMmiySMatJRSNqol8lg"], "expires_at": "2020-11-06T18:59:30.000000Z", "issued_at": "2020-11-06T17:59:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d73ae082cf2c4889915adb0d4efc6f2e", "name": "tempest-SecurtiyGroupsRbacTest-66962389"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:30.220 40 INFO tempest.lib.common.rest_client [req-95b137e9-2494-44e0-aff6-01c135fcfb09 ] Request (ServerConsolesV26RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.120s 2020-11-06 17:59:30.220 40 DEBUG tempest.lib.common.rest_client [req-95b137e9-2494-44e0-aff6-01c135fcfb09 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ServerConsolesV26RbacTest-667342185", "password": "Y7*T2WNjjNa&NCg", "project_id": "11d8c5c0046c4310b47e5021f23c2165", "email": "tempest-ServerConsolesV26RbacTest-805471828@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '404', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-95b137e9-2494-44e0-aff6-01c135fcfb09', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "11d8c5c0046c4310b47e5021f23c2165", "email": "tempest-ServerConsolesV26RbacTest-805471828@example.com", "id": "4f96bc7b3083411387237edc9b80812d", "name": "tempest-ServerConsolesV26RbacTest-667342185", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/4f96bc7b3083411387237edc9b80812d"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:30.233 38 INFO tempest.lib.common.rest_client [req-d1969169-f74e-4abc-b34c-44bfaf3da3bc ] Request (QuotaSetsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a 0.149s 2020-11-06 17:59:30.233 38 DEBUG tempest.lib.common.rest_client [req-d1969169-f74e-4abc-b34c-44bfaf3da3bc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d1969169-f74e-4abc-b34c-44bfaf3da3bc', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/5f612dd5e45e48558079cac6a303993a'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:30.308 39 INFO tempest.lib.common.rest_client [req-1ea66f8b-f03e-4b3e-b08d-7b4e7211bcf4 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.477s 2020-11-06 17:59:30.309 39 DEBUG tempest.lib.common.rest_client [req-1ea66f8b-f03e-4b3e-b08d-7b4e7211bcf4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1ea66f8b-f03e-4b3e-b08d-7b4e7211bcf4', 'x-compute-request-id': 'req-1ea66f8b-f03e-4b3e-b08d-7b4e7211bcf4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T17:59:28Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:28.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:30.317 40 INFO tempest.lib.common.rest_client [req-e8ae82b6-f614-44ba-9be9-ca1b3ef3b51a ] Request (ServerConsolesV26RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.095s 2020-11-06 17:59:30.317 40 DEBUG tempest.lib.common.rest_client [req-e8ae82b6-f614-44ba-9be9-ca1b3ef3b51a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e8ae82b6-f614-44ba-9be9-ca1b3ef3b51a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:30.372 40 INFO tempest.lib.common.rest_client [req-d4101a7b-6f37-4484-8b0d-9459eed089e6 ] Request (ServerConsolesV26RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.053s 2020-11-06 17:59:30.372 40 DEBUG tempest.lib.common.rest_client [req-d4101a7b-6f37-4484-8b0d-9459eed089e6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d4101a7b-6f37-4484-8b0d-9459eed089e6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:30.393 38 INFO tempest.lib.common.rest_client [req-e06a3c14-2204-4b57-98d4-d4e24dd367c8 ] Request (QuotaSetsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/6d42d1f7d86c4241bb174e40c31413d0 0.159s 2020-11-06 17:59:30.394 38 DEBUG tempest.lib.common.rest_client [req-e06a3c14-2204-4b57-98d4-d4e24dd367c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e06a3c14-2204-4b57-98d4-d4e24dd367c8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/6d42d1f7d86c4241bb174e40c31413d0'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:30.449 40 INFO tempest.lib.common.rest_client [req-c388e8b0-ac88-4f71-a7d7-4afdf7d68fbf ] Request (ServerConsolesV26RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/11d8c5c0046c4310b47e5021f23c2165/users/4f96bc7b3083411387237edc9b80812d/roles/72a4576c553448cd941b052c1ca0cf2d 0.075s 2020-11-06 17:59:30.449 40 DEBUG tempest.lib.common.rest_client [req-c388e8b0-ac88-4f71-a7d7-4afdf7d68fbf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c388e8b0-ac88-4f71-a7d7-4afdf7d68fbf', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/11d8c5c0046c4310b47e5021f23c2165/users/4f96bc7b3083411387237edc9b80812d/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:30.450 40 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerConsolesV26RbacTest-667342185', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '11d8c5c0046c4310b47e5021f23c2165', 'project_name': 'tempest-ServerConsolesV26RbacTest-667342185', 'tenant_id': '11d8c5c0046c4310b47e5021f23c2165', 'tenant_name': 'tempest-ServerConsolesV26RbacTest-667342185', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '4f96bc7b3083411387237edc9b80812d'}, Network: None, Subnet: None, Router: None 2020-11-06 17:59:30.538 40 INFO tempest.lib.common.rest_client [req-4f7553c6-21b6-40d8-b3cb-0366f0ab0824 ] Request (ServerConsolesV26RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-11-06 17:59:30.539 40 DEBUG tempest.lib.common.rest_client [req-4f7553c6-21b6-40d8-b3cb-0366f0ab0824 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4f7553c6-21b6-40d8-b3cb-0366f0ab0824', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["eG4AYw_7SlG-kxmTLss6YA"], "expires_at": "2020-11-06T18:59:30.000000Z", "issued_at": "2020-11-06T17:59:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:30.557 38 INFO tempest.lib.common.rest_client [req-ea23520b-64b4-49f1-8b60-3a486c855e4b ] Request (QuotaSetsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=60065855c7094b0f954c62a1ed1be27b&name=default 0.162s 2020-11-06 17:59:30.558 38 DEBUG tempest.lib.common.rest_client [req-ea23520b-64b4-49f1-8b60-3a486c855e4b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-ea23520b-64b4-49f1-8b60-3a486c855e4b', 'date': 'Fri, 06 Nov 2020 17:59:30 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=60065855c7094b0f954c62a1ed1be27b&name=default'} Body: b'{"security_groups": [{"id": "ca6de22a-23f6-4111-8d36-a38b3bdb25b1", "name": "default", "stateful": true, "tenant_id": "60065855c7094b0f954c62a1ed1be27b", "description": "Default security group", "security_group_rules": [{"id": "14f87ed4-56b0-4173-8163-aeef28385324", "tenant_id": "60065855c7094b0f954c62a1ed1be27b", "security_group_id": "ca6de22a-23f6-4111-8d36-a38b3bdb25b1", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:59:30Z", "updated_at": "2020-11-06T17:59:30Z", "revision_number": 0, "project_id": "60065855c7094b0f954c62a1ed1be27b"}, {"id": "64fadad9-e82d-44df-8bd9-3c15cdf06745", "tenant_id": "60065855c7094b0f954c62a1ed1be27b", "security_group_id": "ca6de22a-23f6-4111-8d36-a38b3bdb25b1", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "ca6de22a-23f6-4111-8d36-a38b3bdb25b1", "description": null, "tags": [], "created_at": "2020-11-06T17:59:30Z", "updated_at": "2020-11-06T17:59:30Z", "revision_number": 0, "project_id": "60065855c7094b0f954c62a1ed1be27b"}, {"id": "9fd1ab9d-eec4-496a-9a65-02d89ef4d49c", "tenant_id": "60065855c7094b0f954c62a1ed1be27b", "security_group_id": "ca6de22a-23f6-4111-8d36-a38b3bdb25b1", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "ca6de22a-23f6-4111-8d36-a38b3bdb25b1", "description": null, "tags": [], "created_at": "2020-11-06T17:59:30Z", "updated_at": "2020-11-06T17:59:30Z", "revision_number": 0, "project_id": "60065855c7094b0f954c62a1ed1be27b"}, {"id": "f1331409-2986-452c-b515-82049567e3f2", "tenant_id": "60065855c7094b0f954c62a1ed1be27b", "security_group_id": "ca6de22a-23f6-4111-8d36-a38b3bdb25b1", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:59:30Z", "updated_at": "2020-11-06T17:59:30Z", "revision_number": 0, "project_id": "60065855c7094b0f954c62a1ed1be27b"}], "tags": [], "created_at": "2020-11-06T17:59:30Z", "updated_at": "2020-11-06T17:59:30Z", "revision_number": 1, "project_id": "60065855c7094b0f954c62a1ed1be27b"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:30.680 39 INFO tempest.lib.common.rest_client [req-f5a2fa97-26b7-49ba-bc90-65af362a6ea1 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 202 POST http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf/action 0.358s 2020-11-06 17:59:30.681 39 DEBUG tempest.lib.common.rest_client [req-f5a2fa97-26b7-49ba-bc90-65af362a6ea1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"resize": {"flavorRef": "a93eb10f-c417-43d8-812c-06039356e038"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f5a2fa97-26b7-49ba-bc90-65af362a6ea1', 'x-compute-request-id': 'req-f5a2fa97-26b7-49ba-bc90-65af362a6ea1', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:30.692 38 INFO tempest.lib.common.rest_client [req-dc95a41e-b655-4f14-b0df-1c3ebeac0454 ] Request (QuotaSetsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/ca6de22a-23f6-4111-8d36-a38b3bdb25b1 0.134s 2020-11-06 17:59:30.693 38 DEBUG tempest.lib.common.rest_client [req-dc95a41e-b655-4f14-b0df-1c3ebeac0454 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-dc95a41e-b655-4f14-b0df-1c3ebeac0454', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 17:59:30 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/ca6de22a-23f6-4111-8d36-a38b3bdb25b1'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:30.797 38 INFO tempest.lib.common.rest_client [req-8ad72e22-acf8-473d-93c8-d4d06f44c06f ] Request (QuotaSetsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/60065855c7094b0f954c62a1ed1be27b 0.102s 2020-11-06 17:59:30.797 38 DEBUG tempest.lib.common.rest_client [req-8ad72e22-acf8-473d-93c8-d4d06f44c06f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8ad72e22-acf8-473d-93c8-d4d06f44c06f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/60065855c7094b0f954c62a1ed1be27b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:30.867 38 INFO tempest.lib.common.rest_client [req-565a9b4f-07ec-4407-9ccc-fed31b8f1250 ] Request (ServerActionsV214RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.064s 2020-11-06 17:59:30.867 38 DEBUG tempest.lib.common.rest_client [req-565a9b4f-07ec-4407-9ccc-fed31b8f1250 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-565a9b4f-07ec-4407-9ccc-fed31b8f1250', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["6HChlUYvRv2tHjQtuvNhgg"], "expires_at": "2020-11-06T18:59:30.000000Z", "issued_at": "2020-11-06T17:59:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:30.910 38 INFO tempest.lib.common.rest_client [req-d0592fd3-e308-4eda-88cc-0e8f37791321 ] Request (ServerActionsV214RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 17:59:30.910 38 DEBUG tempest.lib.common.rest_client [req-d0592fd3-e308-4eda-88cc-0e8f37791321 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d0592fd3-e308-4eda-88cc-0e8f37791321', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["2G5GjGB0R4itvua3g8fyNg"], "expires_at": "2020-11-06T18:59:30.000000Z", "issued_at": "2020-11-06T17:59:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:30.955 38 INFO tempest.lib.common.rest_client [req-f318dc8a-04da-44f7-861c-39a0b22621e6 ] Request (ServerActionsV214RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.044s 2020-11-06 17:59:30.955 38 DEBUG tempest.lib.common.rest_client [req-f318dc8a-04da-44f7-861c-39a0b22621e6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f318dc8a-04da-44f7-861c-39a0b22621e6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:31.020 38 INFO tempest.lib.common.rest_client [req-0a1e0488-b0b0-4af8-94c1-2c7f2a2ee46f ] Request (ServerActionsV214RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.063s 2020-11-06 17:59:31.020 38 DEBUG tempest.lib.common.rest_client [req-0a1e0488-b0b0-4af8-94c1-2c7f2a2ee46f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ServerActionsV214RbacTest-1182336552-desc", "domain_id": "default", "name": "tempest-ServerActionsV214RbacTest-1182336552"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '388', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0a1e0488-b0b0-4af8-94c1-2c7f2a2ee46f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "79e251c532404a07bfb394356d71a893", "name": "tempest-ServerActionsV214RbacTest-1182336552", "domain_id": "default", "description": "tempest-ServerActionsV214RbacTest-1182336552-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/79e251c532404a07bfb394356d71a893"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:31.083 39 INFO tempest.lib.common.rest_client [req-1cfa8c6c-59d5-4224-b303-b350908b3829 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.401s 2020-11-06 17:59:31.084 39 DEBUG tempest.lib.common.rest_client [req-1cfa8c6c-59d5-4224-b303-b350908b3829 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1727', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1cfa8c6c-59d5-4224-b303-b350908b3829', 'x-compute-request-id': 'req-1cfa8c6c-59d5-4224-b303-b350908b3829', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T17:59:31Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:28.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_prep", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:31.101 37 INFO tempest.lib.common.rest_client [req-c05b75d4-2f11-4bb3-8f17-2355e7d0293c ] Request (SecurtiyGroupsRbacTest:test_remove_security_group_from_server): 202 POST http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161/action 0.978s 2020-11-06 17:59:31.102 37 DEBUG tempest.lib.common.rest_client [req-c05b75d4-2f11-4bb3-8f17-2355e7d0293c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"removeSecurityGroup": {"name": "tempest-SecurtiyGroupsRbacTest-securitygroup-64737499"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c05b75d4-2f11-4bb3-8f17-2355e7d0293c', 'x-compute-request-id': 'req-c05b75d4-2f11-4bb3-8f17-2355e7d0293c', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:31.102 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:31.133 40 INFO tempest.lib.common.rest_client [req-0f106c7e-1689-4b0d-83a3-b60b8f07ea71 ] Request (ServerConsolesV26RbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.594s 2020-11-06 17:59:31.133 40 DEBUG tempest.lib.common.rest_client [req-0f106c7e-1689-4b0d-83a3-b60b8f07ea71 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-ServerConsolesV26RbacTest-1057810739-network", "tenant_id": "11d8c5c0046c4310b47e5021f23c2165"}} Response - Headers: {'content-type': 'application/json', 'content-length': '741', 'x-openstack-request-id': 'req-0f106c7e-1689-4b0d-83a3-b60b8f07ea71', 'date': 'Fri, 06 Nov 2020 17:59:31 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"4c4c312b-b76e-4284-8638-ec9780811557","name":"tempest-ServerConsolesV26RbacTest-1057810739-network","tenant_id":"11d8c5c0046c4310b47e5021f23c2165","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"11d8c5c0046c4310b47e5021f23c2165","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":49,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T17:59:30Z","updated_at":"2020-11-06T17:59:30Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:31.135 38 INFO tempest.lib.common.rest_client [req-8630b456-9a20-411b-9096-3f3aa7fa8e6d ] Request (ServerActionsV214RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.114s 2020-11-06 17:59:31.136 38 DEBUG tempest.lib.common.rest_client [req-8630b456-9a20-411b-9096-3f3aa7fa8e6d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ServerActionsV214RbacTest-1182336552", "password": "M6+yJXslHZeN*pt", "project_id": "79e251c532404a07bfb394356d71a893", "email": "tempest-ServerActionsV214RbacTest-813815770@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '405', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8630b456-9a20-411b-9096-3f3aa7fa8e6d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "79e251c532404a07bfb394356d71a893", "email": "tempest-ServerActionsV214RbacTest-813815770@example.com", "id": "708ffe31f5b84e24ac524aff993e8444", "name": "tempest-ServerActionsV214RbacTest-1182336552", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/708ffe31f5b84e24ac524aff993e8444"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:31.157 37 INFO tempest.lib.common.rest_client [req-8376ab7a-3023-4633-b153-502e699003ce ] Request (SecurtiyGroupsRbacTest:test_remove_security_group_from_server): 200 GET http://172.30.13.94/identity/v3/projects/d73ae082cf2c4889915adb0d4efc6f2e/users/eabd533369674823b012ab299376bbb3/roles 0.053s 2020-11-06 17:59:31.157 37 DEBUG tempest.lib.common.rest_client [req-8376ab7a-3023-4633-b153-502e699003ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8376ab7a-3023-4633-b153-502e699003ce', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d73ae082cf2c4889915adb0d4efc6f2e/users/eabd533369674823b012ab299376bbb3/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d73ae082cf2c4889915adb0d4efc6f2e/users/eabd533369674823b012ab299376bbb3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:31.182 38 INFO tempest.lib.common.rest_client [req-5d90f162-b79a-4706-93d1-847e74be72ec ] Request (ServerActionsV214RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.045s 2020-11-06 17:59:31.183 38 DEBUG tempest.lib.common.rest_client [req-5d90f162-b79a-4706-93d1-847e74be72ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5d90f162-b79a-4706-93d1-847e74be72ec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:31.227 38 INFO tempest.lib.common.rest_client [req-4682ea12-bda0-4fcd-9315-86389a4aa8dd ] Request (ServerActionsV214RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.043s 2020-11-06 17:59:31.228 38 DEBUG tempest.lib.common.rest_client [req-4682ea12-bda0-4fcd-9315-86389a4aa8dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4682ea12-bda0-4fcd-9315-86389a4aa8dd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:31.251 37 INFO tempest.lib.common.rest_client [req-e08e3d6b-8cb6-40e0-a90f-ad92c265dc64 ] Request (SecurtiyGroupsRbacTest:test_remove_security_group_from_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-11-06 17:59:31.252 37 DEBUG tempest.lib.common.rest_client [req-e08e3d6b-8cb6-40e0-a90f-ad92c265dc64 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e08e3d6b-8cb6-40e0-a90f-ad92c265dc64', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eabd533369674823b012ab299376bbb3", "name": "tempest-SecurtiyGroupsRbacTest-66962389", "password_expires_at": null}, "audit_ids": ["yiDkCgwXTvKdyJNKhGIQ-Q"], "expires_at": "2020-11-06T18:59:31.000000Z", "issued_at": "2020-11-06T17:59:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d73ae082cf2c4889915adb0d4efc6f2e", "name": "tempest-SecurtiyGroupsRbacTest-66962389"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d73ae082cf2c4889915adb0d4efc6f2e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:31.296 38 INFO tempest.lib.common.rest_client [req-e840ac02-296b-4555-86b9-01add218d348 ] Request (ServerActionsV214RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/79e251c532404a07bfb394356d71a893/users/708ffe31f5b84e24ac524aff993e8444/roles/72a4576c553448cd941b052c1ca0cf2d 0.066s 2020-11-06 17:59:31.296 38 DEBUG tempest.lib.common.rest_client [req-e840ac02-296b-4555-86b9-01add218d348 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e840ac02-296b-4555-86b9-01add218d348', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/79e251c532404a07bfb394356d71a893/users/708ffe31f5b84e24ac524aff993e8444/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:31.297 38 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerActionsV214RbacTest-1182336552', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '79e251c532404a07bfb394356d71a893', 'project_name': 'tempest-ServerActionsV214RbacTest-1182336552', 'tenant_id': '79e251c532404a07bfb394356d71a893', 'tenant_name': 'tempest-ServerActionsV214RbacTest-1182336552', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '708ffe31f5b84e24ac524aff993e8444'}, Network: None, Subnet: None, Router: None 2020-11-06 17:59:31.382 38 INFO tempest.lib.common.rest_client [req-eb378c41-6d16-4cbc-9857-30bdb54c3717 ] Request (ServerActionsV214RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-11-06 17:59:31.383 38 DEBUG tempest.lib.common.rest_client [req-eb378c41-6d16-4cbc-9857-30bdb54c3717 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eb378c41-6d16-4cbc-9857-30bdb54c3717', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["sQuVe_wzRHyVVKjwOkPwwg"], "expires_at": "2020-11-06T18:59:31.000000Z", "issued_at": "2020-11-06T17:59:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:31.693 40 INFO tempest.lib.common.rest_client [req-dc9c6030-cc99-48a4-a9c6-50ade0c1dc04 ] Request (ServerConsolesV26RbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.558s 2020-11-06 17:59:31.694 40 DEBUG tempest.lib.common.rest_client [req-dc9c6030-cc99-48a4-a9c6-50ade0c1dc04 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "4c4c312b-b76e-4284-8638-ec9780811557", "cidr": "192.168.120.0/28", "name": "tempest-ServerConsolesV26RbacTest-1057810739-subnet", "tenant_id": "11d8c5c0046c4310b47e5021f23c2165", "enable_dhcp": false, "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '713', 'x-openstack-request-id': 'req-dc9c6030-cc99-48a4-a9c6-50ade0c1dc04', 'date': 'Fri, 06 Nov 2020 17:59:31 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"863312ca-8de5-48fd-9662-ee4644e1a73b","name":"tempest-ServerConsolesV26RbacTest-1057810739-subnet","tenant_id":"11d8c5c0046c4310b47e5021f23c2165","network_id":"4c4c312b-b76e-4284-8638-ec9780811557","ip_version":4,"subnetpool_id":null,"enable_dhcp":false,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-11-06T17:59:31Z","updated_at":"2020-11-06T17:59:31Z","revision_number":0,"project_id":"11d8c5c0046c4310b47e5021f23c2165"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:31.712 37 INFO tempest.lib.common.rest_client [req-ccf3944f-29da-4ece-b9f0-df9ea00a216c ] Request (SecurtiyGroupsRbacTest:_run_cleanups): 404 POST http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161/action 0.458s 2020-11-06 17:59:31.713 37 DEBUG tempest.lib.common.rest_client [req-ccf3944f-29da-4ece-b9f0-df9ea00a216c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"removeSecurityGroup": {"name": "tempest-SecurtiyGroupsRbacTest-securitygroup-64737499"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '184', 'x-openstack-request-id': 'req-ccf3944f-29da-4ece-b9f0-df9ea00a216c', 'x-compute-request-id': 'req-ccf3944f-29da-4ece-b9f0-df9ea00a216c', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161/action'} Body: b'{"itemNotFound": {"code": 404, "message": "Security group tempest-SecurtiyGroupsRbacTest-securitygroup-64737499 not associated with the instance 53da6d79-4555-422b-bb06-07e620333161"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:31.933 38 INFO tempest.lib.common.rest_client [req-34825983-27e3-4367-9c34-98f675876fd7 ] Request (ServerActionsV214RbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.549s 2020-11-06 17:59:31.933 38 DEBUG tempest.lib.common.rest_client [req-34825983-27e3-4367-9c34-98f675876fd7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-ServerActionsV214RbacTest-1487696410-network", "tenant_id": "79e251c532404a07bfb394356d71a893"}} Response - Headers: {'content-type': 'application/json', 'content-length': '741', 'x-openstack-request-id': 'req-34825983-27e3-4367-9c34-98f675876fd7', 'date': 'Fri, 06 Nov 2020 17:59:31 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"7a042e07-577f-466d-988f-357caa1a13d2","name":"tempest-ServerActionsV214RbacTest-1487696410-network","tenant_id":"79e251c532404a07bfb394356d71a893","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"79e251c532404a07bfb394356d71a893","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":53,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T17:59:31Z","updated_at":"2020-11-06T17:59:31Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:32.073 37 INFO tempest.lib.common.rest_client [req-6e877104-7bd6-4aec-82c4-0f313d0dd606 ] Request (SecurtiyGroupsRbacTest:tearDownClass): 202 DELETE http://172.30.13.94/compute/v2.1/os-security-groups/286c8d34-d79f-4e40-8207-b2c222658c29 0.356s 2020-11-06 17:59:32.074 37 DEBUG tempest.lib.common.rest_client [req-6e877104-7bd6-4aec-82c4-0f313d0dd606 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6e877104-7bd6-4aec-82c4-0f313d0dd606', 'x-compute-request-id': 'req-6e877104-7bd6-4aec-82c4-0f313d0dd606', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/os-security-groups/286c8d34-d79f-4e40-8207-b2c222658c29'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:32.340 37 INFO tempest.lib.common.rest_client [req-8fc93cf2-79c1-461a-9c22-8cb66fd761ce ] Request (SecurtiyGroupsRbacTest:tearDownClass): 202 DELETE http://172.30.13.94/compute/v2.1/os-security-groups/90f36ae4-10af-44be-ab81-3624fd864380 0.266s 2020-11-06 17:59:32.341 37 DEBUG tempest.lib.common.rest_client [req-8fc93cf2-79c1-461a-9c22-8cb66fd761ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8fc93cf2-79c1-461a-9c22-8cb66fd761ce', 'x-compute-request-id': 'req-8fc93cf2-79c1-461a-9c22-8cb66fd761ce', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/os-security-groups/90f36ae4-10af-44be-ab81-3624fd864380'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:32.344 39 INFO tempest.lib.common.rest_client [req-7245fd38-292c-4633-ac58-d1878aaea9f6 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.248s 2020-11-06 17:59:32.344 39 DEBUG tempest.lib.common.rest_client [req-7245fd38-292c-4633-ac58-d1878aaea9f6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1727', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7245fd38-292c-4633-ac58-d1878aaea9f6', 'x-compute-request-id': 'req-7245fd38-292c-4633-ac58-d1878aaea9f6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T17:59:31Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:28.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_prep", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:32.525 37 INFO tempest.lib.common.rest_client [req-f90c2d5f-0732-4513-9d3b-722f27777ba2 ] Request (SecurtiyGroupsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161 0.183s 2020-11-06 17:59:32.526 37 DEBUG tempest.lib.common.rest_client [req-f90c2d5f-0732-4513-9d3b-722f27777ba2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f90c2d5f-0732-4513-9d3b-722f27777ba2', 'x-compute-request-id': 'req-f90c2d5f-0732-4513-9d3b-722f27777ba2', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:32.616 38 INFO tempest.lib.common.rest_client [req-c19dc941-15f2-4847-b9e4-17d16339d3d7 ] Request (ServerActionsV214RbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.682s 2020-11-06 17:59:32.617 38 DEBUG tempest.lib.common.rest_client [req-c19dc941-15f2-4847-b9e4-17d16339d3d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "7a042e07-577f-466d-988f-357caa1a13d2", "cidr": "192.168.120.0/28", "name": "tempest-ServerActionsV214RbacTest-1487696410-subnet", "tenant_id": "79e251c532404a07bfb394356d71a893", "enable_dhcp": false, "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '713', 'x-openstack-request-id': 'req-c19dc941-15f2-4847-b9e4-17d16339d3d7', 'date': 'Fri, 06 Nov 2020 17:59:32 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"b4e2b597-747f-4552-b0d8-a5cc773c8dac","name":"tempest-ServerActionsV214RbacTest-1487696410-subnet","tenant_id":"79e251c532404a07bfb394356d71a893","network_id":"7a042e07-577f-466d-988f-357caa1a13d2","ip_version":4,"subnetpool_id":null,"enable_dhcp":false,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-11-06T17:59:32Z","updated_at":"2020-11-06T17:59:32Z","revision_number":0,"project_id":"79e251c532404a07bfb394356d71a893"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:32.737 37 INFO tempest.lib.common.rest_client [req-7154fa47-06ef-46b3-8959-fb5be27f1d19 ] Request (SecurtiyGroupsRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161 0.209s 2020-11-06 17:59:32.737 37 DEBUG tempest.lib.common.rest_client [req-7154fa47-06ef-46b3-8959-fb5be27f1d19 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7154fa47-06ef-46b3-8959-fb5be27f1d19', 'x-compute-request-id': 'req-7154fa47-06ef-46b3-8959-fb5be27f1d19', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161'} Body: b'{"server": {"id": "53da6d79-4555-422b-bb06-07e620333161", "name": "tempest-SecurtiyGroupsRbacTest-server-684714768", "status": "ACTIVE", "tenant_id": "d73ae082cf2c4889915adb0d4efc6f2e", "user_id": "eabd533369674823b012ab299376bbb3", "metadata": {}, "hostId": "66bc7addb145ae6ae0381ad01ab057fa2344ebcf5635095860cf236c", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:13Z", "updated": "2020-11-06T17:59:32Z", "addresses": {"tempest-SecurtiyGroupsRbacTest-1104925326-network": [{"version": 4, "addr": "192.168.120.10", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:49:47:e2"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/53da6d79-4555-422b-bb06-07e620333161"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:21.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033be", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:33.950 38 INFO tempest.lib.common.rest_client [req-cf8aebd0-abf2-4a82-bd5b-2eb3df123ce3 ] Request (ServerActionsV214RbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/routers 1.332s 2020-11-06 17:59:33.951 38 DEBUG tempest.lib.common.rest_client [req-cf8aebd0-abf2-4a82-bd5b-2eb3df123ce3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-ServerActionsV214RbacTest-1487696410-router", "tenant_id": "79e251c532404a07bfb394356d71a893", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea"}}} Response - Headers: {'content-type': 'application/json', 'content-length': '815', 'x-openstack-request-id': 'req-cf8aebd0-abf2-4a82-bd5b-2eb3df123ce3', 'date': 'Fri, 06 Nov 2020 17:59:33 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "b4b20f70-fd5d-47b3-bf94-9cb1169f3fb4", "name": "tempest-ServerActionsV214RbacTest-1487696410-router", "tenant_id": "79e251c532404a07bfb394356d71a893", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.232"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::2fa"}], "enable_snat": true}, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T17:59:32Z", "updated_at": "2020-11-06T17:59:33Z", "revision_number": 3, "project_id": "79e251c532404a07bfb394356d71a893"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:34.079 39 INFO tempest.lib.common.rest_client [req-6a79e1ec-a539-40c6-9620-a8d92fda9008 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.717s 2020-11-06 17:59:34.079 37 INFO tempest.lib.common.rest_client [req-2aa7f6ef-b64a-4464-a0e0-6dc95793faa8 ] Request (SecurtiyGroupsRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161 0.327s 2020-11-06 17:59:34.080 37 DEBUG tempest.lib.common.rest_client [req-2aa7f6ef-b64a-4464-a0e0-6dc95793faa8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2aa7f6ef-b64a-4464-a0e0-6dc95793faa8', 'x-compute-request-id': 'req-2aa7f6ef-b64a-4464-a0e0-6dc95793faa8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161'} Body: b'{"server": {"id": "53da6d79-4555-422b-bb06-07e620333161", "name": "tempest-SecurtiyGroupsRbacTest-server-684714768", "status": "ACTIVE", "tenant_id": "d73ae082cf2c4889915adb0d4efc6f2e", "user_id": "eabd533369674823b012ab299376bbb3", "metadata": {}, "hostId": "66bc7addb145ae6ae0381ad01ab057fa2344ebcf5635095860cf236c", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:13Z", "updated": "2020-11-06T17:59:34Z", "addresses": {"tempest-SecurtiyGroupsRbacTest-1104925326-network": [{"version": 4, "addr": "192.168.120.10", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:49:47:e2"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/53da6d79-4555-422b-bb06-07e620333161"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:21.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033be", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:34.080 39 DEBUG tempest.lib.common.rest_client [req-6a79e1ec-a539-40c6-9620-a8d92fda9008 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6a79e1ec-a539-40c6-9620-a8d92fda9008', 'x-compute-request-id': 'req-6a79e1ec-a539-40c6-9620-a8d92fda9008', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T17:59:33Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:28.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:34.093 39 INFO tempest.common.waiters [-] State transition "RESIZE/resize_prep" ==> "RESIZE/resize_migrating" after 3 second wait 2020-11-06 17:59:34.591 40 INFO tempest.lib.common.rest_client [req-a7f86692-e9b3-438c-8b3a-ca98ca79bc7a ] Request (ServerConsolesV26RbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/routers 2.895s 2020-11-06 17:59:34.591 40 DEBUG tempest.lib.common.rest_client [req-a7f86692-e9b3-438c-8b3a-ca98ca79bc7a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-ServerConsolesV26RbacTest-1057810739-router", "tenant_id": "11d8c5c0046c4310b47e5021f23c2165", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea"}}} Response - Headers: {'content-type': 'application/json', 'content-length': '814', 'x-openstack-request-id': 'req-a7f86692-e9b3-438c-8b3a-ca98ca79bc7a', 'date': 'Fri, 06 Nov 2020 17:59:34 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "a1b0288e-5076-4f35-bcce-94897c26310b", "name": "tempest-ServerConsolesV26RbacTest-1057810739-router", "tenant_id": "11d8c5c0046c4310b47e5021f23c2165", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.34"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::3a9"}], "enable_snat": true}, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T17:59:31Z", "updated_at": "2020-11-06T17:59:32Z", "revision_number": 3, "project_id": "11d8c5c0046c4310b47e5021f23c2165"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:35.236 37 INFO tempest.lib.common.rest_client [req-52e5fbaf-e1f4-4191-b0f2-ce49d4fbf328 ] Request (SecurtiyGroupsRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161 0.139s 2020-11-06 17:59:35.236 37 DEBUG tempest.lib.common.rest_client [req-52e5fbaf-e1f4-4191-b0f2-ce49d4fbf328 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1689', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-52e5fbaf-e1f4-4191-b0f2-ce49d4fbf328', 'x-compute-request-id': 'req-52e5fbaf-e1f4-4191-b0f2-ce49d4fbf328', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161'} Body: b'{"server": {"id": "53da6d79-4555-422b-bb06-07e620333161", "name": "tempest-SecurtiyGroupsRbacTest-server-684714768", "status": "DELETED", "tenant_id": "d73ae082cf2c4889915adb0d4efc6f2e", "user_id": "eabd533369674823b012ab299376bbb3", "metadata": {}, "hostId": "66bc7addb145ae6ae0381ad01ab057fa2344ebcf5635095860cf236c", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:13Z", "updated": "2020-11-06T17:59:35Z", "addresses": {"tempest-SecurtiyGroupsRbacTest-1104925326-network": [{"version": 4, "addr": "192.168.120.10", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:49:47:e2"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/53da6d79-4555-422b-bb06-07e620333161"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:21.000000", "OS-SRV-USG:terminated_at": "2020-11-06T17:59:34.000000", "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033be", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "deleted", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:35.248 37 INFO tempest.common.waiters [-] State transition "ACTIVE/deleting" ==> "DELETED/None" after 3 second wait 2020-11-06 17:59:35.359 39 INFO tempest.lib.common.rest_client [req-99b94b35-e2f6-481b-a7a4-cb0ad9ab2d95 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.264s 2020-11-06 17:59:35.360 39 DEBUG tempest.lib.common.rest_client [req-99b94b35-e2f6-481b-a7a4-cb0ad9ab2d95 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-99b94b35-e2f6-481b-a7a4-cb0ad9ab2d95', 'x-compute-request-id': 'req-99b94b35-e2f6-481b-a7a4-cb0ad9ab2d95', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T17:59:33Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:28.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:36.314 37 INFO tempest.lib.common.rest_client [req-5fbb0e23-1a9c-4f5c-8bb4-a1e1cdade868 ] Request (SecurtiyGroupsRbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161 0.063s 2020-11-06 17:59:36.315 37 DEBUG tempest.lib.common.rest_client [req-5fbb0e23-1a9c-4f5c-8bb4-a1e1cdade868 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-5fbb0e23-1a9c-4f5c-8bb4-a1e1cdade868', 'x-compute-request-id': 'req-5fbb0e23-1a9c-4f5c-8bb4-a1e1cdade868', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/53da6d79-4555-422b-bb06-07e620333161'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 53da6d79-4555-422b-bb06-07e620333161 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:36.316 37 DEBUG tempest.lib.common.dynamic_creds [-] Clearing network: {'id': '944260dd-14a1-4951-9ec4-bb4b5b78dd75', 'name': 'tempest-SecurtiyGroupsRbacTest-1104925326-network', 'tenant_id': 'd73ae082cf2c4889915adb0d4efc6f2e', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': 'd73ae082cf2c4889915adb0d4efc6f2e', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 57, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T17:59:08Z', 'updated_at': '2020-11-06T17:59:08Z', 'revision_number': 1}, subnet: {'id': '89b8726c-972f-44ae-a421-f10ed9d5036c', 'name': 'tempest-SecurtiyGroupsRbacTest-1104925326-subnet', 'tenant_id': 'd73ae082cf2c4889915adb0d4efc6f2e', 'network_id': '944260dd-14a1-4951-9ec4-bb4b5b78dd75', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-11-06T17:59:08Z', 'updated_at': '2020-11-06T17:59:08Z', 'revision_number': 0, 'project_id': 'd73ae082cf2c4889915adb0d4efc6f2e'}, router: None _clear_isolated_net_resources /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/dynamic_creds.py:418 2020-11-06 17:59:36.658 39 INFO tempest.lib.common.rest_client [req-8a93a5a2-d48a-4ba0-ab32-ae24e4880f31 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.286s 2020-11-06 17:59:36.659 39 DEBUG tempest.lib.common.rest_client [req-8a93a5a2-d48a-4ba0-ab32-ae24e4880f31 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8a93a5a2-d48a-4ba0-ab32-ae24e4880f31', 'x-compute-request-id': 'req-8a93a5a2-d48a-4ba0-ab32-ae24e4880f31', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T17:59:36Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:28.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_migrated", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:36.660 40 INFO tempest.lib.common.rest_client [req-09c4520e-4e3d-4575-8165-27fcb124ed2c ] Request (ServerConsolesV26RbacTest:setUpClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/a1b0288e-5076-4f35-bcce-94897c26310b/add_router_interface 2.068s 2020-11-06 17:59:36.661 40 DEBUG tempest.lib.common.rest_client [req-09c4520e-4e3d-4575-8165-27fcb124ed2c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "863312ca-8de5-48fd-9662-ee4644e1a73b"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-09c4520e-4e3d-4575-8165-27fcb124ed2c', 'date': 'Fri, 06 Nov 2020 17:59:36 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/a1b0288e-5076-4f35-bcce-94897c26310b/add_router_interface'} Body: b'{"id": "a1b0288e-5076-4f35-bcce-94897c26310b", "tenant_id": "11d8c5c0046c4310b47e5021f23c2165", "port_id": "188314c6-f86e-43b3-b3f6-1bafb04d1e1d", "network_id": "4c4c312b-b76e-4284-8638-ec9780811557", "subnet_id": "863312ca-8de5-48fd-9662-ee4644e1a73b", "subnet_ids": ["863312ca-8de5-48fd-9662-ee4644e1a73b"]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:36.661 40 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerConsolesV26RbacTest-667342185', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '11d8c5c0046c4310b47e5021f23c2165', 'project_name': 'tempest-ServerConsolesV26RbacTest-667342185', 'tenant_id': '11d8c5c0046c4310b47e5021f23c2165', 'tenant_name': 'tempest-ServerConsolesV26RbacTest-667342185', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '4f96bc7b3083411387237edc9b80812d'}, Network: {'id': '4c4c312b-b76e-4284-8638-ec9780811557', 'name': 'tempest-ServerConsolesV26RbacTest-1057810739-network', 'tenant_id': '11d8c5c0046c4310b47e5021f23c2165', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '11d8c5c0046c4310b47e5021f23c2165', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 49, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T17:59:30Z', 'updated_at': '2020-11-06T17:59:30Z', 'revision_number': 1}, Subnet: {'id': '863312ca-8de5-48fd-9662-ee4644e1a73b', 'name': 'tempest-ServerConsolesV26RbacTest-1057810739-subnet', 'tenant_id': '11d8c5c0046c4310b47e5021f23c2165', 'network_id': '4c4c312b-b76e-4284-8638-ec9780811557', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-11-06T17:59:31Z', 'updated_at': '2020-11-06T17:59:31Z', 'revision_number': 0, 'project_id': '11d8c5c0046c4310b47e5021f23c2165'}, Router: {'id': 'a1b0288e-5076-4f35-bcce-94897c26310b', 'name': 'tempest-ServerConsolesV26RbacTest-1057810739-router', 'tenant_id': '11d8c5c0046c4310b47e5021f23c2165', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.34'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::3a9'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-11-06T17:59:31Z', 'updated_at': '2020-11-06T17:59:32Z', 'revision_number': 3, 'project_id': '11d8c5c0046c4310b47e5021f23c2165'} 2020-11-06 17:59:36.675 39 INFO tempest.common.waiters [-] State transition "RESIZE/resize_migrating" ==> "RESIZE/resize_migrated" after 5 second wait 2020-11-06 17:59:36.767 40 INFO tempest.lib.common.rest_client [req-da7167f4-7d59-412f-b182-e9d50e2870cc ] Request (ServerConsolesV26RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-11-06 17:59:36.768 40 DEBUG tempest.lib.common.rest_client [req-da7167f4-7d59-412f-b182-e9d50e2870cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6579', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-da7167f4-7d59-412f-b182-e9d50e2870cc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4f96bc7b3083411387237edc9b80812d", "name": "tempest-ServerConsolesV26RbacTest-667342185", "password_expires_at": null}, "audit_ids": ["adJ-f3o1Tp2wtHuiv6UOKA"], "expires_at": "2020-11-06T18:59:36.000000Z", "issued_at": "2020-11-06T17:59:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "11d8c5c0046c4310b47e5021f23c2165", "name": "tempest-ServerConsolesV26RbacTest-667342185"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/11d8c5c0046c4310b47e5021f23c2165", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/11d8c5c0046c4310b47e5021f23c2165", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/11d8c5c0046c4310b47e5021f23c2165", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_11d8c5c0046c4310b47e5021f23c2165", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_11d8c5c0046c4310b47e5021f23c2165", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_11d8c5c0046c4310b47e5021f23c2165", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "ht _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:36.820 37 INFO tempest.lib.common.rest_client [req-91d72266-b739-475c-a0c2-f59cbaf8b829 ] Request (SecurtiyGroupsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/89b8726c-972f-44ae-a421-f10ed9d5036c 0.502s 2020-11-06 17:59:36.820 37 DEBUG tempest.lib.common.rest_client [req-91d72266-b739-475c-a0c2-f59cbaf8b829 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-91d72266-b739-475c-a0c2-f59cbaf8b829', 'date': 'Fri, 06 Nov 2020 17:59:36 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/89b8726c-972f-44ae-a421-f10ed9d5036c'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:36.876 40 INFO tempest.lib.common.rest_client [req-dffb58f2-f5be-47c7-b24f-6dc206e7fab2 ] Request (ServerConsolesV26RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.106s 2020-11-06 17:59:36.876 40 DEBUG tempest.lib.common.rest_client [req-dffb58f2-f5be-47c7-b24f-6dc206e7fab2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dffb58f2-f5be-47c7-b24f-6dc206e7fab2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["_GH3TdkYQ3erJ_rUa9akeg"], "expires_at": "2020-11-06T18:59:36.000000Z", "issued_at": "2020-11-06T17:59:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:36.971 40 INFO tempest.lib.common.rest_client [req-0e1e0db4-5582-49cb-9d1b-58a166343b6c ] Request (ServerConsolesV26RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-11-06 17:59:36.972 40 DEBUG tempest.lib.common.rest_client [req-0e1e0db4-5582-49cb-9d1b-58a166343b6c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0e1e0db4-5582-49cb-9d1b-58a166343b6c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["6Jc6U3bvQBW-b2UhUi8ufw"], "expires_at": "2020-11-06T18:59:36.000000Z", "issued_at": "2020-11-06T17:59:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:37.015 40 INFO tempest.lib.common.rest_client [req-7e935123-1c7f-4c2e-a99b-4bd389bb6ec7 ] Request (ServerConsolesV26RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.042s 2020-11-06 17:59:37.015 40 DEBUG tempest.lib.common.rest_client [req-7e935123-1c7f-4c2e-a99b-4bd389bb6ec7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7e935123-1c7f-4c2e-a99b-4bd389bb6ec7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:37.060 40 INFO tempest.lib.common.rest_client [req-93aa3624-1f08-4b76-a978-5b5f4d975cfc ] Request (ServerConsolesV26RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.044s 2020-11-06 17:59:37.060 40 DEBUG tempest.lib.common.rest_client [req-93aa3624-1f08-4b76-a978-5b5f4d975cfc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-93aa3624-1f08-4b76-a978-5b5f4d975cfc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:37.061 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 17:59:37.062 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:37.111 40 INFO tempest.lib.common.rest_client [req-462daae4-0ee1-444c-89e7-d74a54a22003 ] Request (ServerConsolesV26RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/11d8c5c0046c4310b47e5021f23c2165/users/4f96bc7b3083411387237edc9b80812d/roles 0.048s 2020-11-06 17:59:37.111 40 DEBUG tempest.lib.common.rest_client [req-462daae4-0ee1-444c-89e7-d74a54a22003 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-462daae4-0ee1-444c-89e7-d74a54a22003', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/11d8c5c0046c4310b47e5021f23c2165/users/4f96bc7b3083411387237edc9b80812d/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/11d8c5c0046c4310b47e5021f23c2165/users/4f96bc7b3083411387237edc9b80812d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:37.165 40 INFO tempest.lib.common.rest_client [req-5f357d18-9816-4a3b-a131-e430ca9fc652 ] Request (ServerConsolesV26RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/11d8c5c0046c4310b47e5021f23c2165/users/4f96bc7b3083411387237edc9b80812d/roles/72a4576c553448cd941b052c1ca0cf2d 0.053s 2020-11-06 17:59:37.166 40 DEBUG tempest.lib.common.rest_client [req-5f357d18-9816-4a3b-a131-e430ca9fc652 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5f357d18-9816-4a3b-a131-e430ca9fc652', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/11d8c5c0046c4310b47e5021f23c2165/users/4f96bc7b3083411387237edc9b80812d/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:37.180 38 INFO tempest.lib.common.rest_client [req-7a7c1f63-dda7-461a-a969-355bb6badb8d ] Request (ServerActionsV214RbacTest:setUpClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/b4b20f70-fd5d-47b3-bf94-9cb1169f3fb4/add_router_interface 3.228s 2020-11-06 17:59:37.181 38 DEBUG tempest.lib.common.rest_client [req-7a7c1f63-dda7-461a-a969-355bb6badb8d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "b4e2b597-747f-4552-b0d8-a5cc773c8dac"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-7a7c1f63-dda7-461a-a969-355bb6badb8d', 'date': 'Fri, 06 Nov 2020 17:59:37 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/b4b20f70-fd5d-47b3-bf94-9cb1169f3fb4/add_router_interface'} Body: b'{"id": "b4b20f70-fd5d-47b3-bf94-9cb1169f3fb4", "tenant_id": "79e251c532404a07bfb394356d71a893", "port_id": "6e53c83c-4539-4442-9e6b-6fc9d983425d", "network_id": "7a042e07-577f-466d-988f-357caa1a13d2", "subnet_id": "b4e2b597-747f-4552-b0d8-a5cc773c8dac", "subnet_ids": ["b4e2b597-747f-4552-b0d8-a5cc773c8dac"]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:37.181 38 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerActionsV214RbacTest-1182336552', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '79e251c532404a07bfb394356d71a893', 'project_name': 'tempest-ServerActionsV214RbacTest-1182336552', 'tenant_id': '79e251c532404a07bfb394356d71a893', 'tenant_name': 'tempest-ServerActionsV214RbacTest-1182336552', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '708ffe31f5b84e24ac524aff993e8444'}, Network: {'id': '7a042e07-577f-466d-988f-357caa1a13d2', 'name': 'tempest-ServerActionsV214RbacTest-1487696410-network', 'tenant_id': '79e251c532404a07bfb394356d71a893', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '79e251c532404a07bfb394356d71a893', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 53, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T17:59:31Z', 'updated_at': '2020-11-06T17:59:31Z', 'revision_number': 1}, Subnet: {'id': 'b4e2b597-747f-4552-b0d8-a5cc773c8dac', 'name': 'tempest-ServerActionsV214RbacTest-1487696410-subnet', 'tenant_id': '79e251c532404a07bfb394356d71a893', 'network_id': '7a042e07-577f-466d-988f-357caa1a13d2', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-11-06T17:59:32Z', 'updated_at': '2020-11-06T17:59:32Z', 'revision_number': 0, 'project_id': '79e251c532404a07bfb394356d71a893'}, Router: {'id': 'b4b20f70-fd5d-47b3-bf94-9cb1169f3fb4', 'name': 'tempest-ServerActionsV214RbacTest-1487696410-router', 'tenant_id': '79e251c532404a07bfb394356d71a893', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.232'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::2fa'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-11-06T17:59:32Z', 'updated_at': '2020-11-06T17:59:33Z', 'revision_number': 3, 'project_id': '79e251c532404a07bfb394356d71a893'} 2020-11-06 17:59:37.264 40 INFO tempest.lib.common.rest_client [req-96433bac-d673-4879-9544-f455e6447df0 ] Request (ServerConsolesV26RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/11d8c5c0046c4310b47e5021f23c2165/users/4f96bc7b3083411387237edc9b80812d/roles/a629c95d64b3416fb80ae90af4f69c05 0.097s 2020-11-06 17:59:37.264 40 DEBUG tempest.lib.common.rest_client [req-96433bac-d673-4879-9544-f455e6447df0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-96433bac-d673-4879-9544-f455e6447df0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/11d8c5c0046c4310b47e5021f23c2165/users/4f96bc7b3083411387237edc9b80812d/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:37.289 38 INFO tempest.lib.common.rest_client [req-1f3b0609-40b4-49b5-a4e5-b576eb7da230 ] Request (ServerActionsV214RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-11-06 17:59:37.289 38 DEBUG tempest.lib.common.rest_client [req-1f3b0609-40b4-49b5-a4e5-b576eb7da230 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6581', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1f3b0609-40b4-49b5-a4e5-b576eb7da230', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "708ffe31f5b84e24ac524aff993e8444", "name": "tempest-ServerActionsV214RbacTest-1182336552", "password_expires_at": null}, "audit_ids": ["ei4QvE9_Rgmy_pPccn2ILA"], "expires_at": "2020-11-06T18:59:37.000000Z", "issued_at": "2020-11-06T17:59:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "79e251c532404a07bfb394356d71a893", "name": "tempest-ServerActionsV214RbacTest-1182336552"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/79e251c532404a07bfb394356d71a893", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/79e251c532404a07bfb394356d71a893", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/79e251c532404a07bfb394356d71a893", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_79e251c532404a07bfb394356d71a893", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_79e251c532404a07bfb394356d71a893", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_79e251c532404a07bfb394356d71a893", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:37.369 38 INFO tempest.lib.common.rest_client [req-352ba4a9-f169-4fc8-a6dc-89a8e3a77186 ] Request (ServerActionsV214RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.079s 2020-11-06 17:59:37.370 38 DEBUG tempest.lib.common.rest_client [req-352ba4a9-f169-4fc8-a6dc-89a8e3a77186 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-352ba4a9-f169-4fc8-a6dc-89a8e3a77186', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["M2yKCF11Q3KGVoWbZW-yuA"], "expires_at": "2020-11-06T18:59:37.000000Z", "issued_at": "2020-11-06T17:59:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:37.415 38 INFO tempest.lib.common.rest_client [req-24dd680a-7c9a-491c-a9b9-f9ec68f5f11f ] Request (ServerActionsV214RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 17:59:37.416 38 DEBUG tempest.lib.common.rest_client [req-24dd680a-7c9a-491c-a9b9-f9ec68f5f11f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-24dd680a-7c9a-491c-a9b9-f9ec68f5f11f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["_H5PJ06oR2qv5a0GQp9rYQ"], "expires_at": "2020-11-06T18:59:37.000000Z", "issued_at": "2020-11-06T17:59:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:37.460 38 INFO tempest.lib.common.rest_client [req-77e07fe7-6344-4754-969e-9f6583d291d4 ] Request (ServerActionsV214RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.044s 2020-11-06 17:59:37.461 38 DEBUG tempest.lib.common.rest_client [req-77e07fe7-6344-4754-969e-9f6583d291d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-77e07fe7-6344-4754-969e-9f6583d291d4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:37.504 37 INFO tempest.lib.common.rest_client [req-3ba6151c-33ac-4cbd-8153-6dade0fbf4bf ] Request (SecurtiyGroupsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/944260dd-14a1-4951-9ec4-bb4b5b78dd75 0.683s 2020-11-06 17:59:37.505 37 DEBUG tempest.lib.common.rest_client [req-3ba6151c-33ac-4cbd-8153-6dade0fbf4bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-3ba6151c-33ac-4cbd-8153-6dade0fbf4bf', 'date': 'Fri, 06 Nov 2020 17:59:37 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/944260dd-14a1-4951-9ec4-bb4b5b78dd75'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:37.508 38 INFO tempest.lib.common.rest_client [req-d52f0e29-179c-43c7-92c8-6635ae416ee7 ] Request (ServerActionsV214RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.046s 2020-11-06 17:59:37.509 38 DEBUG tempest.lib.common.rest_client [req-d52f0e29-179c-43c7-92c8-6635ae416ee7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d52f0e29-179c-43c7-92c8-6635ae416ee7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:37.509 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 17:59:37.510 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:37.607 38 INFO tempest.lib.common.rest_client [req-d6756b7f-fa1a-4a39-a6c1-3e3431d675f2 ] Request (ServerActionsV214RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/79e251c532404a07bfb394356d71a893/users/708ffe31f5b84e24ac524aff993e8444/roles 0.096s 2020-11-06 17:59:37.607 38 DEBUG tempest.lib.common.rest_client [req-d6756b7f-fa1a-4a39-a6c1-3e3431d675f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d6756b7f-fa1a-4a39-a6c1-3e3431d675f2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/79e251c532404a07bfb394356d71a893/users/708ffe31f5b84e24ac524aff993e8444/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/79e251c532404a07bfb394356d71a893/users/708ffe31f5b84e24ac524aff993e8444/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:37.662 37 INFO tempest.lib.common.rest_client [req-30ebd2d0-35da-40bc-b759-45e7000f3ad7 ] Request (SecurtiyGroupsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/eabd533369674823b012ab299376bbb3 0.156s 2020-11-06 17:59:37.662 37 DEBUG tempest.lib.common.rest_client [req-30ebd2d0-35da-40bc-b759-45e7000f3ad7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-30ebd2d0-35da-40bc-b759-45e7000f3ad7', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/eabd533369674823b012ab299376bbb3'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:37.683 38 INFO tempest.lib.common.rest_client [req-052ce002-7f9d-4fdd-b00e-9de3086db08d ] Request (ServerActionsV214RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/79e251c532404a07bfb394356d71a893/users/708ffe31f5b84e24ac524aff993e8444/roles/72a4576c553448cd941b052c1ca0cf2d 0.074s 2020-11-06 17:59:37.683 38 DEBUG tempest.lib.common.rest_client [req-052ce002-7f9d-4fdd-b00e-9de3086db08d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-052ce002-7f9d-4fdd-b00e-9de3086db08d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/79e251c532404a07bfb394356d71a893/users/708ffe31f5b84e24ac524aff993e8444/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:37.718 37 INFO tempest.lib.common.rest_client [req-0b67fb3c-340f-40a3-9f7f-0196f99bd99f ] Request (SecurtiyGroupsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=d73ae082cf2c4889915adb0d4efc6f2e&name=default 0.055s 2020-11-06 17:59:37.719 37 DEBUG tempest.lib.common.rest_client [req-0b67fb3c-340f-40a3-9f7f-0196f99bd99f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-0b67fb3c-340f-40a3-9f7f-0196f99bd99f', 'date': 'Fri, 06 Nov 2020 17:59:37 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=d73ae082cf2c4889915adb0d4efc6f2e&name=default'} Body: b'{"security_groups": [{"id": "c53b2eee-f0f2-4ba3-993b-5d55a76ff19a", "name": "default", "stateful": true, "tenant_id": "d73ae082cf2c4889915adb0d4efc6f2e", "description": "Default security group", "security_group_rules": [{"id": "974a9f7c-62b1-4887-9a6a-daef94d6bfdd", "tenant_id": "d73ae082cf2c4889915adb0d4efc6f2e", "security_group_id": "c53b2eee-f0f2-4ba3-993b-5d55a76ff19a", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:59:08Z", "updated_at": "2020-11-06T17:59:08Z", "revision_number": 0, "project_id": "d73ae082cf2c4889915adb0d4efc6f2e"}, {"id": "9c69ea94-8035-4d48-80a8-317ecef494d9", "tenant_id": "d73ae082cf2c4889915adb0d4efc6f2e", "security_group_id": "c53b2eee-f0f2-4ba3-993b-5d55a76ff19a", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "c53b2eee-f0f2-4ba3-993b-5d55a76ff19a", "description": null, "tags": [], "created_at": "2020-11-06T17:59:08Z", "updated_at": "2020-11-06T17:59:08Z", "revision_number": 0, "project_id": "d73ae082cf2c4889915adb0d4efc6f2e"}, {"id": "9f7854b2-70e9-41a6-b82d-e7da49deeec4", "tenant_id": "d73ae082cf2c4889915adb0d4efc6f2e", "security_group_id": "c53b2eee-f0f2-4ba3-993b-5d55a76ff19a", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "c53b2eee-f0f2-4ba3-993b-5d55a76ff19a", "description": null, "tags": [], "created_at": "2020-11-06T17:59:08Z", "updated_at": "2020-11-06T17:59:08Z", "revision_number": 0, "project_id": "d73ae082cf2c4889915adb0d4efc6f2e"}, {"id": "d8d12963-3d74-4951-8543-3bf93d21a328", "tenant_id": "d73ae082cf2c4889915adb0d4efc6f2e", "security_group_id": "c53b2eee-f0f2-4ba3-993b-5d55a76ff19a", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:59:08Z", "updated_at": "2020-11-06T17:59:08Z", "revision_number": 0, "project_id": "d73ae082cf2c4889915adb0d4efc6f2e"}], "tags": [], "created_at": "2020-11-06T17:59:08Z", "updated_at": "2020-11-06T17:59:08Z", "revision_number": 1, "project_id": "d73ae082cf2c4889915adb0d4efc6f2e"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:37.803 38 INFO tempest.lib.common.rest_client [req-f684514b-9a78-4c41-b963-1ec68a93fa13 ] Request (ServerActionsV214RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/79e251c532404a07bfb394356d71a893/users/708ffe31f5b84e24ac524aff993e8444/roles/a629c95d64b3416fb80ae90af4f69c05 0.119s 2020-11-06 17:59:37.804 38 DEBUG tempest.lib.common.rest_client [req-f684514b-9a78-4c41-b963-1ec68a93fa13 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f684514b-9a78-4c41-b963-1ec68a93fa13', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/79e251c532404a07bfb394356d71a893/users/708ffe31f5b84e24ac524aff993e8444/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:37.840 37 INFO tempest.lib.common.rest_client [req-f0c1df22-b508-47fe-9239-999d98e74da8 ] Request (SecurtiyGroupsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/c53b2eee-f0f2-4ba3-993b-5d55a76ff19a 0.121s 2020-11-06 17:59:37.841 37 DEBUG tempest.lib.common.rest_client [req-f0c1df22-b508-47fe-9239-999d98e74da8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-f0c1df22-b508-47fe-9239-999d98e74da8', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 17:59:37 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/c53b2eee-f0f2-4ba3-993b-5d55a76ff19a'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:38.011 37 INFO tempest.lib.common.rest_client [req-226a0d21-3bb9-4514-8409-d470db43f29a ] Request (SecurtiyGroupsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/d73ae082cf2c4889915adb0d4efc6f2e 0.170s 2020-11-06 17:59:38.012 37 DEBUG tempest.lib.common.rest_client [req-226a0d21-3bb9-4514-8409-d470db43f29a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-226a0d21-3bb9-4514-8409-d470db43f29a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d73ae082cf2c4889915adb0d4efc6f2e'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:38.116 37 INFO tempest.lib.common.rest_client [req-3aadc38c-0310-42d7-9859-b97aff5a8cec ] Request (ServerActionsV216RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.100s 2020-11-06 17:59:38.116 37 DEBUG tempest.lib.common.rest_client [req-3aadc38c-0310-42d7-9859-b97aff5a8cec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3aadc38c-0310-42d7-9859-b97aff5a8cec', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["PoJXY-8IQgqVfFy-FYHHBA"], "expires_at": "2020-11-06T18:59:38.000000Z", "issued_at": "2020-11-06T17:59:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:38.140 39 INFO tempest.lib.common.rest_client [req-7ee1ff2e-9e86-4bc2-be33-8e7e2825af72 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.462s 2020-11-06 17:59:38.140 39 DEBUG tempest.lib.common.rest_client [req-7ee1ff2e-9e86-4bc2-be33-8e7e2825af72 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7ee1ff2e-9e86-4bc2-be33-8e7e2825af72', 'x-compute-request-id': 'req-7ee1ff2e-9e86-4bc2-be33-8e7e2825af72', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T17:59:36Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:28.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_migrated", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:38.160 37 INFO tempest.lib.common.rest_client [req-6e58138e-a2a3-49b5-bb9e-bd7a110a86a7 ] Request (ServerActionsV216RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 17:59:38.161 37 DEBUG tempest.lib.common.rest_client [req-6e58138e-a2a3-49b5-bb9e-bd7a110a86a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6e58138e-a2a3-49b5-bb9e-bd7a110a86a7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["A3vnYu2WRhuF0QEDDk4Rlw"], "expires_at": "2020-11-06T18:59:38.000000Z", "issued_at": "2020-11-06T17:59:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:38.218 37 INFO tempest.lib.common.rest_client [req-541b613f-c134-4eed-ae49-56a6d0f24f38 ] Request (ServerActionsV216RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.056s 2020-11-06 17:59:38.219 37 DEBUG tempest.lib.common.rest_client [req-541b613f-c134-4eed-ae49-56a6d0f24f38 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-541b613f-c134-4eed-ae49-56a6d0f24f38', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:38.292 37 INFO tempest.lib.common.rest_client [req-746ef8e2-19f9-475c-a546-9bdadd2e5f76 ] Request (ServerActionsV216RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.072s 2020-11-06 17:59:38.292 37 DEBUG tempest.lib.common.rest_client [req-746ef8e2-19f9-475c-a546-9bdadd2e5f76 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ServerActionsV216RbacTest-495437355-desc", "domain_id": "default", "name": "tempest-ServerActionsV216RbacTest-495437355"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '386', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-746ef8e2-19f9-475c-a546-9bdadd2e5f76', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "884ab13bc413480c92edb8dc45d539a6", "name": "tempest-ServerActionsV216RbacTest-495437355", "domain_id": "default", "description": "tempest-ServerActionsV216RbacTest-495437355-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/884ab13bc413480c92edb8dc45d539a6"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:38.353 40 INFO tempest.lib.common.rest_client [req-60c9ed2d-0470-4deb-a2d9-5dd0e8f4082b ] Request (ServerConsolesV26RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-11-06 17:59:38.353 40 DEBUG tempest.lib.common.rest_client [req-60c9ed2d-0470-4deb-a2d9-5dd0e8f4082b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-60c9ed2d-0470-4deb-a2d9-5dd0e8f4082b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4f96bc7b3083411387237edc9b80812d", "name": "tempest-ServerConsolesV26RbacTest-667342185", "password_expires_at": null}, "audit_ids": ["aIJhxjDISMeKbTEVzeLaEQ"], "expires_at": "2020-11-06T18:59:38.000000Z", "issued_at": "2020-11-06T17:59:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "11d8c5c0046c4310b47e5021f23c2165", "name": "tempest-ServerConsolesV26RbacTest-667342185"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/11d8c5c0046c4310b47e5021f23c2165", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/11d8c5c0046c4310b47e5021f23c2165", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/11d8c5c0046c4310b47e5021f23c2165", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_11d8c5c0046c4310b47e5021f23c2165", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_11d8c5c0046c4310b47e5021f23c2165", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_11d8c5c0046c4310b47e5021f23c2165", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:38.408 37 INFO tempest.lib.common.rest_client [req-fdeedb9f-e739-46ac-8019-0cad1c1ebd43 ] Request (ServerActionsV216RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.114s 2020-11-06 17:59:38.409 37 DEBUG tempest.lib.common.rest_client [req-fdeedb9f-e739-46ac-8019-0cad1c1ebd43 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ServerActionsV216RbacTest-495437355", "password": "G0#1jQFF^9LeMAl", "project_id": "884ab13bc413480c92edb8dc45d539a6", "email": "tempest-ServerActionsV216RbacTest-1908008811@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '405', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fdeedb9f-e739-46ac-8019-0cad1c1ebd43', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "884ab13bc413480c92edb8dc45d539a6", "email": "tempest-ServerActionsV216RbacTest-1908008811@example.com", "id": "8c55d99458a44d07a7d6d6c1d923b979", "name": "tempest-ServerActionsV216RbacTest-495437355", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/8c55d99458a44d07a7d6d6c1d923b979"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:38.453 40 INFO tempest.lib.common.rest_client [req-0254284f-ecce-4a38-8843-c5c83cef6e21 ] Request (ServerConsolesV26RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-11-06 17:59:38.454 40 DEBUG tempest.lib.common.rest_client [req-0254284f-ecce-4a38-8843-c5c83cef6e21 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0254284f-ecce-4a38-8843-c5c83cef6e21', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4f96bc7b3083411387237edc9b80812d", "name": "tempest-ServerConsolesV26RbacTest-667342185", "password_expires_at": null}, "audit_ids": ["cm43sOjVRH2un5oXOxdC4w"], "expires_at": "2020-11-06T18:59:38.000000Z", "issued_at": "2020-11-06T17:59:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "11d8c5c0046c4310b47e5021f23c2165", "name": "tempest-ServerConsolesV26RbacTest-667342185"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/11d8c5c0046c4310b47e5021f23c2165", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/11d8c5c0046c4310b47e5021f23c2165", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/11d8c5c0046c4310b47e5021f23c2165", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_11d8c5c0046c4310b47e5021f23c2165", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_11d8c5c0046c4310b47e5021f23c2165", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_11d8c5c0046c4310b47e5021f23c2165", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:38.455 40 INFO tempest.lib.common.fixed_network [-] (ServerConsolesV26RbacTest:setUpClass) Found network {'id': '4c4c312b-b76e-4284-8638-ec9780811557', 'name': 'tempest-ServerConsolesV26RbacTest-1057810739-network', 'tenant_id': '11d8c5c0046c4310b47e5021f23c2165', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '11d8c5c0046c4310b47e5021f23c2165', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 49, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T17:59:30Z', 'updated_at': '2020-11-06T17:59:30Z', 'revision_number': 1} available for tenant 2020-11-06 17:59:38.561 37 INFO tempest.lib.common.rest_client [req-d454c2c6-5506-4d48-9e14-eda171053c5f ] Request (ServerActionsV216RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.151s 2020-11-06 17:59:38.562 37 DEBUG tempest.lib.common.rest_client [req-d454c2c6-5506-4d48-9e14-eda171053c5f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d454c2c6-5506-4d48-9e14-eda171053c5f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:38.612 37 INFO tempest.lib.common.rest_client [req-6c3cf4ae-601b-488c-aff5-b4478a7b9c1a ] Request (ServerActionsV216RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.049s 2020-11-06 17:59:38.613 37 DEBUG tempest.lib.common.rest_client [req-6c3cf4ae-601b-488c-aff5-b4478a7b9c1a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6c3cf4ae-601b-488c-aff5-b4478a7b9c1a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:38.688 37 INFO tempest.lib.common.rest_client [req-6fc6db94-e527-4957-89b3-10d18ad5390b ] Request (ServerActionsV216RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/884ab13bc413480c92edb8dc45d539a6/users/8c55d99458a44d07a7d6d6c1d923b979/roles/72a4576c553448cd941b052c1ca0cf2d 0.074s 2020-11-06 17:59:38.689 37 DEBUG tempest.lib.common.rest_client [req-6fc6db94-e527-4957-89b3-10d18ad5390b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6fc6db94-e527-4957-89b3-10d18ad5390b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/884ab13bc413480c92edb8dc45d539a6/users/8c55d99458a44d07a7d6d6c1d923b979/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:38.690 37 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerActionsV216RbacTest-495437355', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '884ab13bc413480c92edb8dc45d539a6', 'project_name': 'tempest-ServerActionsV216RbacTest-495437355', 'tenant_id': '884ab13bc413480c92edb8dc45d539a6', 'tenant_name': 'tempest-ServerActionsV216RbacTest-495437355', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '8c55d99458a44d07a7d6d6c1d923b979'}, Network: None, Subnet: None, Router: None 2020-11-06 17:59:38.777 37 INFO tempest.lib.common.rest_client [req-f81f64e5-4368-4dff-9028-f5faf9538251 ] Request (ServerActionsV216RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 17:59:38.777 37 DEBUG tempest.lib.common.rest_client [req-f81f64e5-4368-4dff-9028-f5faf9538251 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f81f64e5-4368-4dff-9028-f5faf9538251', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["itSCj2bUTLWEik4dE0Umrg"], "expires_at": "2020-11-06T18:59:38.000000Z", "issued_at": "2020-11-06T17:59:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:38.895 38 INFO tempest.lib.common.rest_client [req-26389287-bd53-42b9-b69f-7e35132502c5 ] Request (ServerActionsV214RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-11-06 17:59:38.895 38 DEBUG tempest.lib.common.rest_client [req-26389287-bd53-42b9-b69f-7e35132502c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-26389287-bd53-42b9-b69f-7e35132502c5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "708ffe31f5b84e24ac524aff993e8444", "name": "tempest-ServerActionsV214RbacTest-1182336552", "password_expires_at": null}, "audit_ids": ["o6h25EPWT8qkDxHPDx2MjA"], "expires_at": "2020-11-06T18:59:38.000000Z", "issued_at": "2020-11-06T17:59:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "79e251c532404a07bfb394356d71a893", "name": "tempest-ServerActionsV214RbacTest-1182336552"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/79e251c532404a07bfb394356d71a893", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/79e251c532404a07bfb394356d71a893", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/79e251c532404a07bfb394356d71a893", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_79e251c532404a07bfb394356d71a893", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_79e251c532404a07bfb394356d71a893", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_79e251c532404a07bfb394356d71a893", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:38.940 38 INFO tempest.lib.common.rest_client [req-03fc2ce5-fa0b-4061-a68c-93b980806aa4 ] Request (ServerActionsV214RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 17:59:38.941 38 DEBUG tempest.lib.common.rest_client [req-03fc2ce5-fa0b-4061-a68c-93b980806aa4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-03fc2ce5-fa0b-4061-a68c-93b980806aa4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "708ffe31f5b84e24ac524aff993e8444", "name": "tempest-ServerActionsV214RbacTest-1182336552", "password_expires_at": null}, "audit_ids": ["XQk4p76MTJKW4hpL5PDWNA"], "expires_at": "2020-11-06T18:59:38.000000Z", "issued_at": "2020-11-06T17:59:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "79e251c532404a07bfb394356d71a893", "name": "tempest-ServerActionsV214RbacTest-1182336552"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/79e251c532404a07bfb394356d71a893", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/79e251c532404a07bfb394356d71a893", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/79e251c532404a07bfb394356d71a893", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_79e251c532404a07bfb394356d71a893", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_79e251c532404a07bfb394356d71a893", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_79e251c532404a07bfb394356d71a893", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:38.942 38 INFO tempest.lib.common.fixed_network [-] (ServerActionsV214RbacTest:setUpClass) Found network {'id': '7a042e07-577f-466d-988f-357caa1a13d2', 'name': 'tempest-ServerActionsV214RbacTest-1487696410-network', 'tenant_id': '79e251c532404a07bfb394356d71a893', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '79e251c532404a07bfb394356d71a893', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 53, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T17:59:31Z', 'updated_at': '2020-11-06T17:59:31Z', 'revision_number': 1} available for tenant 2020-11-06 17:59:39.355 37 INFO tempest.lib.common.rest_client [req-85f6bcc9-0ea6-4789-8d1f-d580c4fcd24f ] Request (ServerActionsV216RbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.577s 2020-11-06 17:59:39.355 37 DEBUG tempest.lib.common.rest_client [req-85f6bcc9-0ea6-4789-8d1f-d580c4fcd24f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-ServerActionsV216RbacTest-2120824806-network", "tenant_id": "884ab13bc413480c92edb8dc45d539a6"}} Response - Headers: {'content-type': 'application/json', 'content-length': '741', 'x-openstack-request-id': 'req-85f6bcc9-0ea6-4789-8d1f-d580c4fcd24f', 'date': 'Fri, 06 Nov 2020 17:59:39 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"fa1e4d54-7458-492c-ada5-33319c182af0","name":"tempest-ServerActionsV216RbacTest-2120824806-network","tenant_id":"884ab13bc413480c92edb8dc45d539a6","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"884ab13bc413480c92edb8dc45d539a6","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":57,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T17:59:39Z","updated_at":"2020-11-06T17:59:39Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:39.653 39 INFO tempest.lib.common.rest_client [req-e6e30c2b-8aa0-4cf4-bc93-2080dfc0aa56 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.496s 2020-11-06 17:59:39.654 39 DEBUG tempest.lib.common.rest_client [req-e6e30c2b-8aa0-4cf4-bc93-2080dfc0aa56 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1729', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e6e30c2b-8aa0-4cf4-bc93-2080dfc0aa56', 'x-compute-request-id': 'req-e6e30c2b-8aa0-4cf4-bc93-2080dfc0aa56', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T17:59:39Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:28.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_finish", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:39.668 39 INFO tempest.common.waiters [-] State transition "RESIZE/resize_migrated" ==> "RESIZE/resize_finish" after 8 second wait 2020-11-06 17:59:39.775 38 INFO tempest.lib.common.rest_client [req-99a1d7dd-ab53-4525-a825-31fc81f663cb ] Request (ServerActionsV214RbacTest:setUpClass): 202 POST http://172.30.13.94/compute/v2.1/servers 0.831s 2020-11-06 17:59:39.776 38 DEBUG tempest.lib.common.rest_client [req-99a1d7dd-ab53-4525-a825-31fc81f663cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-ServerActionsV214RbacTest-server-2028834099", "imageRef": "56b368f6-9136-40ec-a04c-564d02c95e42", "flavorRef": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "networks": [{"uuid": "7a042e07-577f-466d-988f-357caa1a13d2"}]}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-99a1d7dd-ab53-4525-a825-31fc81f663cb', 'x-compute-request-id': 'req-99a1d7dd-ab53-4525-a825-31fc81f663cb', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "19ea5259-9739-44d1-8002-28282d3f12f8", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/19ea5259-9739-44d1-8002-28282d3f12f8"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "kFDdsJuVFy3R"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:39.893 38 INFO tempest.lib.common.rest_client [req-5df8a9da-85a0-4258-9976-89d2b14493e5 ] Request (ServerActionsV214RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8 0.111s 2020-11-06 17:59:39.893 38 DEBUG tempest.lib.common.rest_client [req-5df8a9da-85a0-4258-9976-89d2b14493e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1401', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5df8a9da-85a0-4258-9976-89d2b14493e5', 'x-compute-request-id': 'req-5df8a9da-85a0-4258-9976-89d2b14493e5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8'} Body: b'{"server": {"id": "19ea5259-9739-44d1-8002-28282d3f12f8", "name": "tempest-ServerActionsV214RbacTest-server-2028834099", "status": "BUILD", "tenant_id": "79e251c532404a07bfb394356d71a893", "user_id": "708ffe31f5b84e24ac524aff993e8444", "metadata": {}, "hostId": "", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:40Z", "updated": "2020-11-06T17:59:39Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/19ea5259-9739-44d1-8002-28282d3f12f8"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:39.906 37 INFO tempest.lib.common.rest_client [req-cc985a24-d77b-45df-aef4-9a770b79bcab ] Request (ServerActionsV216RbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.548s 2020-11-06 17:59:39.906 37 DEBUG tempest.lib.common.rest_client [req-cc985a24-d77b-45df-aef4-9a770b79bcab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "fa1e4d54-7458-492c-ada5-33319c182af0", "cidr": "192.168.120.0/28", "name": "tempest-ServerActionsV216RbacTest-2120824806-subnet", "tenant_id": "884ab13bc413480c92edb8dc45d539a6", "enable_dhcp": false, "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '713', 'x-openstack-request-id': 'req-cc985a24-d77b-45df-aef4-9a770b79bcab', 'date': 'Fri, 06 Nov 2020 17:59:39 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"778ea396-6658-4ce8-98b8-390b7d5ccc39","name":"tempest-ServerActionsV216RbacTest-2120824806-subnet","tenant_id":"884ab13bc413480c92edb8dc45d539a6","network_id":"fa1e4d54-7458-492c-ada5-33319c182af0","ip_version":4,"subnetpool_id":null,"enable_dhcp":false,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-11-06T17:59:39Z","updated_at":"2020-11-06T17:59:39Z","revision_number":0,"project_id":"884ab13bc413480c92edb8dc45d539a6"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:40.249 40 INFO tempest.lib.common.rest_client [req-877696aa-46a9-488d-9892-805e694ce29c ] Request (ServerConsolesV26RbacTest:setUpClass): 202 POST http://172.30.13.94/compute/v2.1/servers 1.793s 2020-11-06 17:59:40.250 40 DEBUG tempest.lib.common.rest_client [req-877696aa-46a9-488d-9892-805e694ce29c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-ServerConsolesV26RbacTest-server-1387653545", "imageRef": "56b368f6-9136-40ec-a04c-564d02c95e42", "flavorRef": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "networks": [{"uuid": "4c4c312b-b76e-4284-8638-ec9780811557"}]}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-877696aa-46a9-488d-9892-805e694ce29c', 'x-compute-request-id': 'req-877696aa-46a9-488d-9892-805e694ce29c', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "9d68a0c4-6553-4814-9988-3e3146822e9f", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/9d68a0c4-6553-4814-9988-3e3146822e9f"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "FcC3wBScqWt9"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:40.354 40 INFO tempest.lib.common.rest_client [req-40772fde-3f85-46d7-a791-00a7a7b2caca ] Request (ServerConsolesV26RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f 0.100s 2020-11-06 17:59:40.355 40 DEBUG tempest.lib.common.rest_client [req-40772fde-3f85-46d7-a791-00a7a7b2caca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1401', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-40772fde-3f85-46d7-a791-00a7a7b2caca', 'x-compute-request-id': 'req-40772fde-3f85-46d7-a791-00a7a7b2caca', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f'} Body: b'{"server": {"id": "9d68a0c4-6553-4814-9988-3e3146822e9f", "name": "tempest-ServerConsolesV26RbacTest-server-1387653545", "status": "BUILD", "tenant_id": "11d8c5c0046c4310b47e5021f23c2165", "user_id": "4f96bc7b3083411387237edc9b80812d", "metadata": {}, "hostId": "", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:40Z", "updated": "2020-11-06T17:59:40Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/9d68a0c4-6553-4814-9988-3e3146822e9f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:40.870 39 INFO tempest.lib.common.rest_client [req-e82d652b-b3c3-4a29-a707-7a9f02280bac ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.200s 2020-11-06 17:59:40.871 39 DEBUG tempest.lib.common.rest_client [req-e82d652b-b3c3-4a29-a707-7a9f02280bac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1729', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e82d652b-b3c3-4a29-a707-7a9f02280bac', 'x-compute-request-id': 'req-e82d652b-b3c3-4a29-a707-7a9f02280bac', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T17:59:39Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:28.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_finish", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:41.083 38 INFO tempest.lib.common.rest_client [req-deee1457-1dab-4cea-bede-418c4a11a354 ] Request (ServerActionsV214RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8 0.174s 2020-11-06 17:59:41.083 38 DEBUG tempest.lib.common.rest_client [req-deee1457-1dab-4cea-bede-418c4a11a354 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1496', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-deee1457-1dab-4cea-bede-418c4a11a354', 'x-compute-request-id': 'req-deee1457-1dab-4cea-bede-418c4a11a354', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8'} Body: b'{"server": {"id": "19ea5259-9739-44d1-8002-28282d3f12f8", "name": "tempest-ServerActionsV214RbacTest-server-2028834099", "status": "BUILD", "tenant_id": "79e251c532404a07bfb394356d71a893", "user_id": "708ffe31f5b84e24ac524aff993e8444", "metadata": {}, "hostId": "6618c5af52ef8b7faa5dfe54810e754ddce9341d930a3a29ca406870", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:39Z", "updated": "2020-11-06T17:59:41Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/19ea5259-9739-44d1-8002-28282d3f12f8"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c1", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "networking", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:41.097 38 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/networking" after 2 second wait 2020-11-06 17:59:41.310 37 INFO tempest.lib.common.rest_client [req-ddf6c267-3acf-4e55-acb4-ebc1c53a871f ] Request (ServerActionsV216RbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/routers 1.403s 2020-11-06 17:59:41.310 37 DEBUG tempest.lib.common.rest_client [req-ddf6c267-3acf-4e55-acb4-ebc1c53a871f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-ServerActionsV216RbacTest-2120824806-router", "tenant_id": "884ab13bc413480c92edb8dc45d539a6", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea"}}} Response - Headers: {'content-type': 'application/json', 'content-length': '814', 'x-openstack-request-id': 'req-ddf6c267-3acf-4e55-acb4-ebc1c53a871f', 'date': 'Fri, 06 Nov 2020 17:59:41 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "cb619f8a-527f-4128-9ee8-7429ab354e39", "name": "tempest-ServerActionsV216RbacTest-2120824806-router", "tenant_id": "884ab13bc413480c92edb8dc45d539a6", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.28"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::128"}], "enable_snat": true}, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T17:59:39Z", "updated_at": "2020-11-06T17:59:40Z", "revision_number": 3, "project_id": "884ab13bc413480c92edb8dc45d539a6"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:42.067 40 INFO tempest.lib.common.rest_client [req-c0187060-0337-4bbf-97fd-2a6896411bea ] Request (ServerConsolesV26RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f 0.698s 2020-11-06 17:59:42.067 40 DEBUG tempest.lib.common.rest_client [req-c0187060-0337-4bbf-97fd-2a6896411bea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1488', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c0187060-0337-4bbf-97fd-2a6896411bea', 'x-compute-request-id': 'req-c0187060-0337-4bbf-97fd-2a6896411bea', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f'} Body: b'{"server": {"id": "9d68a0c4-6553-4814-9988-3e3146822e9f", "name": "tempest-ServerConsolesV26RbacTest-server-1387653545", "status": "BUILD", "tenant_id": "11d8c5c0046c4310b47e5021f23c2165", "user_id": "4f96bc7b3083411387237edc9b80812d", "metadata": {}, "hostId": "315e95811821ebeafdf8ac4b5523f2c940aa93b816bfb47eb9a37351", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:40Z", "updated": "2020-11-06T17:59:41Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/9d68a0c4-6553-4814-9988-3e3146822e9f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:42.079 40 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/None" after 2 second wait 2020-11-06 17:59:42.116 39 INFO tempest.lib.common.rest_client [req-41008734-9051-4af8-a7b0-49c4a34cf010 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.223s 2020-11-06 17:59:42.116 39 DEBUG tempest.lib.common.rest_client [req-41008734-9051-4af8-a7b0-49c4a34cf010 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-41008734-9051-4af8-a7b0-49c4a34cf010', 'x-compute-request-id': 'req-41008734-9051-4af8-a7b0-49c4a34cf010', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T17:59:41Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:41.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:42.131 39 INFO tempest.common.waiters [-] State transition "RESIZE/resize_finish" ==> "VERIFY_RESIZE/None" after 11 second wait 2020-11-06 17:59:42.131 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:42.253 38 INFO tempest.lib.common.rest_client [req-dfd2882a-679a-43c9-a2fa-2b3e33534907 ] Request (ServerActionsV214RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8 0.154s 2020-11-06 17:59:42.253 38 DEBUG tempest.lib.common.rest_client [req-dfd2882a-679a-43c9-a2fa-2b3e33534907 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1494', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dfd2882a-679a-43c9-a2fa-2b3e33534907', 'x-compute-request-id': 'req-dfd2882a-679a-43c9-a2fa-2b3e33534907', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8'} Body: b'{"server": {"id": "19ea5259-9739-44d1-8002-28282d3f12f8", "name": "tempest-ServerActionsV214RbacTest-server-2028834099", "status": "BUILD", "tenant_id": "79e251c532404a07bfb394356d71a893", "user_id": "708ffe31f5b84e24ac524aff993e8444", "metadata": {}, "hostId": "6618c5af52ef8b7faa5dfe54810e754ddce9341d930a3a29ca406870", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:39Z", "updated": "2020-11-06T17:59:41Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/19ea5259-9739-44d1-8002-28282d3f12f8"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c1", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:42.262 38 INFO tempest.common.waiters [-] State transition "BUILD/networking" ==> "BUILD/spawning" after 3 second wait 2020-11-06 17:59:42.293 39 INFO tempest.lib.common.rest_client [req-9f41c2ab-6e8f-4b46-83d6-38c9f29db33b ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.161s 2020-11-06 17:59:42.294 39 DEBUG tempest.lib.common.rest_client [req-9f41c2ab-6e8f-4b46-83d6-38c9f29db33b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9f41c2ab-6e8f-4b46-83d6-38c9f29db33b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:42.371 39 INFO tempest.lib.common.rest_client [req-d35f45d6-be77-4273-b3a3-6a24c3640dd8 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.076s 2020-11-06 17:59:42.371 39 DEBUG tempest.lib.common.rest_client [req-d35f45d6-be77-4273-b3a3-6a24c3640dd8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d35f45d6-be77-4273-b3a3-6a24c3640dd8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["0AEyMUoHTFSFW8R5uEl-gA"], "expires_at": "2020-11-06T18:59:42.000000Z", "issued_at": "2020-11-06T17:59:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:42.686 39 INFO tempest.lib.common.rest_client [req-ae1cb626-7b3f-4e28-9cfe-eceb1d388432 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.314s 2020-11-06 17:59:42.687 39 DEBUG tempest.lib.common.rest_client [req-ae1cb626-7b3f-4e28-9cfe-eceb1d388432 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ae1cb626-7b3f-4e28-9cfe-eceb1d388432', 'x-compute-request-id': 'req-ae1cb626-7b3f-4e28-9cfe-eceb1d388432', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T17:59:41Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:41.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:42.964 39 INFO tempest.lib.common.rest_client [req-5599cced-5f70-42db-99b8-cb573ec18f9e ] Request (ServerActionsRbacTest:test_confirm_resize_server): 204 POST http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf/action 0.265s 2020-11-06 17:59:42.965 39 DEBUG tempest.lib.common.rest_client [req-5599cced-5f70-42db-99b8-cb573ec18f9e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"confirmResize": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5599cced-5f70-42db-99b8-cb573ec18f9e', 'x-compute-request-id': 'req-5599cced-5f70-42db-99b8-cb573ec18f9e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:43.258 39 INFO tempest.lib.common.rest_client [req-559f176d-f67a-4054-8033-acf9572c0646 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.292s 2020-11-06 17:59:43.259 39 DEBUG tempest.lib.common.rest_client [req-559f176d-f67a-4054-8033-acf9572c0646 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-559f176d-f67a-4054-8033-acf9572c0646', 'x-compute-request-id': 'req-559f176d-f67a-4054-8033-acf9572c0646', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T17:59:41Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:41.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:43.451 40 INFO tempest.lib.common.rest_client [req-67370e3a-bc5e-4dbd-9621-f2afa2ac1795 ] Request (ServerConsolesV26RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f 0.370s 2020-11-06 17:59:43.452 40 DEBUG tempest.lib.common.rest_client [req-67370e3a-bc5e-4dbd-9621-f2afa2ac1795 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-67370e3a-bc5e-4dbd-9621-f2afa2ac1795', 'x-compute-request-id': 'req-67370e3a-bc5e-4dbd-9621-f2afa2ac1795', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f'} Body: b'{"server": {"id": "9d68a0c4-6553-4814-9988-3e3146822e9f", "name": "tempest-ServerConsolesV26RbacTest-server-1387653545", "status": "BUILD", "tenant_id": "11d8c5c0046c4310b47e5021f23c2165", "user_id": "4f96bc7b3083411387237edc9b80812d", "metadata": {}, "hostId": "315e95811821ebeafdf8ac4b5523f2c940aa93b816bfb47eb9a37351", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:40Z", "updated": "2020-11-06T17:59:42Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/9d68a0c4-6553-4814-9988-3e3146822e9f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:43.463 40 INFO tempest.common.waiters [-] State transition "BUILD/None" ==> "BUILD/spawning" after 3 second wait 2020-11-06 17:59:43.611 38 INFO tempest.lib.common.rest_client [req-dd086832-0e80-4a75-af69-ced01036dfbe ] Request (ServerActionsV214RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8 0.347s 2020-11-06 17:59:43.612 38 DEBUG tempest.lib.common.rest_client [req-dd086832-0e80-4a75-af69-ced01036dfbe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dd086832-0e80-4a75-af69-ced01036dfbe', 'x-compute-request-id': 'req-dd086832-0e80-4a75-af69-ced01036dfbe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8'} Body: b'{"server": {"id": "19ea5259-9739-44d1-8002-28282d3f12f8", "name": "tempest-ServerActionsV214RbacTest-server-2028834099", "status": "BUILD", "tenant_id": "79e251c532404a07bfb394356d71a893", "user_id": "708ffe31f5b84e24ac524aff993e8444", "metadata": {}, "hostId": "6618c5af52ef8b7faa5dfe54810e754ddce9341d930a3a29ca406870", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:39Z", "updated": "2020-11-06T17:59:41Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/19ea5259-9739-44d1-8002-28282d3f12f8"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c1", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:44.452 37 INFO tempest.lib.common.rest_client [req-5fc021a1-9cda-4ecd-afb7-f944248dbc05 ] Request (ServerActionsV216RbacTest:setUpClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/cb619f8a-527f-4128-9ee8-7429ab354e39/add_router_interface 3.141s 2020-11-06 17:59:44.453 37 DEBUG tempest.lib.common.rest_client [req-5fc021a1-9cda-4ecd-afb7-f944248dbc05 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "778ea396-6658-4ce8-98b8-390b7d5ccc39"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-5fc021a1-9cda-4ecd-afb7-f944248dbc05', 'date': 'Fri, 06 Nov 2020 17:59:44 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/cb619f8a-527f-4128-9ee8-7429ab354e39/add_router_interface'} Body: b'{"id": "cb619f8a-527f-4128-9ee8-7429ab354e39", "tenant_id": "884ab13bc413480c92edb8dc45d539a6", "port_id": "b1011dc1-9963-49f4-9ff3-60dddfe13bda", "network_id": "fa1e4d54-7458-492c-ada5-33319c182af0", "subnet_id": "778ea396-6658-4ce8-98b8-390b7d5ccc39", "subnet_ids": ["778ea396-6658-4ce8-98b8-390b7d5ccc39"]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:44.453 37 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerActionsV216RbacTest-495437355', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '884ab13bc413480c92edb8dc45d539a6', 'project_name': 'tempest-ServerActionsV216RbacTest-495437355', 'tenant_id': '884ab13bc413480c92edb8dc45d539a6', 'tenant_name': 'tempest-ServerActionsV216RbacTest-495437355', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '8c55d99458a44d07a7d6d6c1d923b979'}, Network: {'id': 'fa1e4d54-7458-492c-ada5-33319c182af0', 'name': 'tempest-ServerActionsV216RbacTest-2120824806-network', 'tenant_id': '884ab13bc413480c92edb8dc45d539a6', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '884ab13bc413480c92edb8dc45d539a6', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 57, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T17:59:39Z', 'updated_at': '2020-11-06T17:59:39Z', 'revision_number': 1}, Subnet: {'id': '778ea396-6658-4ce8-98b8-390b7d5ccc39', 'name': 'tempest-ServerActionsV216RbacTest-2120824806-subnet', 'tenant_id': '884ab13bc413480c92edb8dc45d539a6', 'network_id': 'fa1e4d54-7458-492c-ada5-33319c182af0', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-11-06T17:59:39Z', 'updated_at': '2020-11-06T17:59:39Z', 'revision_number': 0, 'project_id': '884ab13bc413480c92edb8dc45d539a6'}, Router: {'id': 'cb619f8a-527f-4128-9ee8-7429ab354e39', 'name': 'tempest-ServerActionsV216RbacTest-2120824806-router', 'tenant_id': '884ab13bc413480c92edb8dc45d539a6', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.28'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::128'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-11-06T17:59:39Z', 'updated_at': '2020-11-06T17:59:40Z', 'revision_number': 3, 'project_id': '884ab13bc413480c92edb8dc45d539a6'} 2020-11-06 17:59:44.468 39 INFO tempest.lib.common.rest_client [req-c749d646-6be5-4f9a-9351-c661e88e4237 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.195s 2020-11-06 17:59:44.468 39 DEBUG tempest.lib.common.rest_client [req-c749d646-6be5-4f9a-9351-c661e88e4237 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c749d646-6be5-4f9a-9351-c661e88e4237', 'x-compute-request-id': 'req-c749d646-6be5-4f9a-9351-c661e88e4237', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T17:59:41Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:41.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:44.562 37 INFO tempest.lib.common.rest_client [req-e1c8a0aa-92e9-4702-8e04-3c3b1d310e87 ] Request (ServerActionsV216RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.101s 2020-11-06 17:59:44.563 37 DEBUG tempest.lib.common.rest_client [req-e1c8a0aa-92e9-4702-8e04-3c3b1d310e87 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6579', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e1c8a0aa-92e9-4702-8e04-3c3b1d310e87', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8c55d99458a44d07a7d6d6c1d923b979", "name": "tempest-ServerActionsV216RbacTest-495437355", "password_expires_at": null}, "audit_ids": ["dUtFDG_lQ_C-GtHQAdfVcg"], "expires_at": "2020-11-06T18:59:44.000000Z", "issued_at": "2020-11-06T17:59:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "884ab13bc413480c92edb8dc45d539a6", "name": "tempest-ServerActionsV216RbacTest-495437355"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/884ab13bc413480c92edb8dc45d539a6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/884ab13bc413480c92edb8dc45d539a6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/884ab13bc413480c92edb8dc45d539a6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_884ab13bc413480c92edb8dc45d539a6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_884ab13bc413480c92edb8dc45d539a6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_884ab13bc413480c92edb8dc45d539a6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "ht _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:44.687 37 INFO tempest.lib.common.rest_client [req-735b2656-a799-4f6a-8231-1b14014282b6 ] Request (ServerActionsV216RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.123s 2020-11-06 17:59:44.688 37 DEBUG tempest.lib.common.rest_client [req-735b2656-a799-4f6a-8231-1b14014282b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-735b2656-a799-4f6a-8231-1b14014282b6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["YlRoyKo1QzWbknEvKImhTQ"], "expires_at": "2020-11-06T18:59:44.000000Z", "issued_at": "2020-11-06T17:59:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:44.735 40 INFO tempest.lib.common.rest_client [req-a2310b5c-481d-418f-bdbb-d5f1259603f5 ] Request (ServerConsolesV26RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f 0.270s 2020-11-06 17:59:44.736 40 DEBUG tempest.lib.common.rest_client [req-a2310b5c-481d-418f-bdbb-d5f1259603f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a2310b5c-481d-418f-bdbb-d5f1259603f5', 'x-compute-request-id': 'req-a2310b5c-481d-418f-bdbb-d5f1259603f5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f'} Body: b'{"server": {"id": "9d68a0c4-6553-4814-9988-3e3146822e9f", "name": "tempest-ServerConsolesV26RbacTest-server-1387653545", "status": "BUILD", "tenant_id": "11d8c5c0046c4310b47e5021f23c2165", "user_id": "4f96bc7b3083411387237edc9b80812d", "metadata": {}, "hostId": "315e95811821ebeafdf8ac4b5523f2c940aa93b816bfb47eb9a37351", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:40Z", "updated": "2020-11-06T17:59:42Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/9d68a0c4-6553-4814-9988-3e3146822e9f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:44.736 37 INFO tempest.lib.common.rest_client [req-4ef5a5a9-8900-4939-b925-e914505e5666 ] Request (ServerActionsV216RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 17:59:44.737 37 DEBUG tempest.lib.common.rest_client [req-4ef5a5a9-8900-4939-b925-e914505e5666 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4ef5a5a9-8900-4939-b925-e914505e5666', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["1FO3E8FdQY6hDZu7bqayOw"], "expires_at": "2020-11-06T18:59:44.000000Z", "issued_at": "2020-11-06T17:59:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:44.800 37 INFO tempest.lib.common.rest_client [req-a895129a-09a7-42af-a1f7-a8f179a6ffc1 ] Request (ServerActionsV216RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.061s 2020-11-06 17:59:44.800 37 DEBUG tempest.lib.common.rest_client [req-a895129a-09a7-42af-a1f7-a8f179a6ffc1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a895129a-09a7-42af-a1f7-a8f179a6ffc1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:44.850 37 INFO tempest.lib.common.rest_client [req-ef03aac8-ecb9-42d4-82e1-ab07713125e2 ] Request (ServerActionsV216RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.049s 2020-11-06 17:59:44.851 37 DEBUG tempest.lib.common.rest_client [req-ef03aac8-ecb9-42d4-82e1-ab07713125e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ef03aac8-ecb9-42d4-82e1-ab07713125e2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:44.851 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 17:59:44.852 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:44.888 38 INFO tempest.lib.common.rest_client [req-7847fe1a-47ae-49f2-bc66-a39a0b322332 ] Request (ServerActionsV214RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8 0.263s 2020-11-06 17:59:44.889 38 DEBUG tempest.lib.common.rest_client [req-7847fe1a-47ae-49f2-bc66-a39a0b322332 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7847fe1a-47ae-49f2-bc66-a39a0b322332', 'x-compute-request-id': 'req-7847fe1a-47ae-49f2-bc66-a39a0b322332', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8'} Body: b'{"server": {"id": "19ea5259-9739-44d1-8002-28282d3f12f8", "name": "tempest-ServerActionsV214RbacTest-server-2028834099", "status": "BUILD", "tenant_id": "79e251c532404a07bfb394356d71a893", "user_id": "708ffe31f5b84e24ac524aff993e8444", "metadata": {}, "hostId": "6618c5af52ef8b7faa5dfe54810e754ddce9341d930a3a29ca406870", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:39Z", "updated": "2020-11-06T17:59:41Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/19ea5259-9739-44d1-8002-28282d3f12f8"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c1", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:44.897 37 INFO tempest.lib.common.rest_client [req-5864c712-aace-4c1f-ba52-0a3b8d403436 ] Request (ServerActionsV216RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/884ab13bc413480c92edb8dc45d539a6/users/8c55d99458a44d07a7d6d6c1d923b979/roles 0.044s 2020-11-06 17:59:44.898 37 DEBUG tempest.lib.common.rest_client [req-5864c712-aace-4c1f-ba52-0a3b8d403436 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5864c712-aace-4c1f-ba52-0a3b8d403436', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/884ab13bc413480c92edb8dc45d539a6/users/8c55d99458a44d07a7d6d6c1d923b979/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/884ab13bc413480c92edb8dc45d539a6/users/8c55d99458a44d07a7d6d6c1d923b979/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:44.954 37 INFO tempest.lib.common.rest_client [req-224c527c-be93-4b56-aae8-dbfebbdde6b4 ] Request (ServerActionsV216RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/884ab13bc413480c92edb8dc45d539a6/users/8c55d99458a44d07a7d6d6c1d923b979/roles/72a4576c553448cd941b052c1ca0cf2d 0.055s 2020-11-06 17:59:44.955 37 DEBUG tempest.lib.common.rest_client [req-224c527c-be93-4b56-aae8-dbfebbdde6b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-224c527c-be93-4b56-aae8-dbfebbdde6b4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/884ab13bc413480c92edb8dc45d539a6/users/8c55d99458a44d07a7d6d6c1d923b979/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:45.064 37 INFO tempest.lib.common.rest_client [req-5ca5c2d5-d9fe-48d5-b036-989aa0367474 ] Request (ServerActionsV216RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/884ab13bc413480c92edb8dc45d539a6/users/8c55d99458a44d07a7d6d6c1d923b979/roles/a629c95d64b3416fb80ae90af4f69c05 0.108s 2020-11-06 17:59:45.064 37 DEBUG tempest.lib.common.rest_client [req-5ca5c2d5-d9fe-48d5-b036-989aa0367474 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5ca5c2d5-d9fe-48d5-b036-989aa0367474', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/884ab13bc413480c92edb8dc45d539a6/users/8c55d99458a44d07a7d6d6c1d923b979/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:45.687 39 INFO tempest.lib.common.rest_client [req-cfef9b18-4b3d-4689-9375-ed116577936d ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.203s 2020-11-06 17:59:45.687 39 DEBUG tempest.lib.common.rest_client [req-cfef9b18-4b3d-4689-9375-ed116577936d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cfef9b18-4b3d-4689-9375-ed116577936d', 'x-compute-request-id': 'req-cfef9b18-4b3d-4689-9375-ed116577936d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T17:59:41Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:41.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:45.960 40 INFO tempest.lib.common.rest_client [req-0dfa5e02-5de0-49a2-abf2-e0d5e96e7ef9 ] Request (ServerConsolesV26RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f 0.207s 2020-11-06 17:59:45.961 40 DEBUG tempest.lib.common.rest_client [req-0dfa5e02-5de0-49a2-abf2-e0d5e96e7ef9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0dfa5e02-5de0-49a2-abf2-e0d5e96e7ef9', 'x-compute-request-id': 'req-0dfa5e02-5de0-49a2-abf2-e0d5e96e7ef9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f'} Body: b'{"server": {"id": "9d68a0c4-6553-4814-9988-3e3146822e9f", "name": "tempest-ServerConsolesV26RbacTest-server-1387653545", "status": "BUILD", "tenant_id": "11d8c5c0046c4310b47e5021f23c2165", "user_id": "4f96bc7b3083411387237edc9b80812d", "metadata": {}, "hostId": "315e95811821ebeafdf8ac4b5523f2c940aa93b816bfb47eb9a37351", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:40Z", "updated": "2020-11-06T17:59:42Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/9d68a0c4-6553-4814-9988-3e3146822e9f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:46.155 37 INFO tempest.lib.common.rest_client [req-6c74ac73-9fca-4eb7-9b89-5ea76cadae5e ] Request (ServerActionsV216RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 17:59:46.156 37 DEBUG tempest.lib.common.rest_client [req-6c74ac73-9fca-4eb7-9b89-5ea76cadae5e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6c74ac73-9fca-4eb7-9b89-5ea76cadae5e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8c55d99458a44d07a7d6d6c1d923b979", "name": "tempest-ServerActionsV216RbacTest-495437355", "password_expires_at": null}, "audit_ids": ["Lk_8W9CYRhSZc34NNaESTg"], "expires_at": "2020-11-06T18:59:46.000000Z", "issued_at": "2020-11-06T17:59:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "884ab13bc413480c92edb8dc45d539a6", "name": "tempest-ServerActionsV216RbacTest-495437355"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/884ab13bc413480c92edb8dc45d539a6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/884ab13bc413480c92edb8dc45d539a6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/884ab13bc413480c92edb8dc45d539a6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_884ab13bc413480c92edb8dc45d539a6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_884ab13bc413480c92edb8dc45d539a6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_884ab13bc413480c92edb8dc45d539a6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:46.171 38 INFO tempest.lib.common.rest_client [req-7cbb97eb-88ab-4b18-b307-52f8d0113fda ] Request (ServerActionsV214RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8 0.270s 2020-11-06 17:59:46.172 38 DEBUG tempest.lib.common.rest_client [req-7cbb97eb-88ab-4b18-b307-52f8d0113fda ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7cbb97eb-88ab-4b18-b307-52f8d0113fda', 'x-compute-request-id': 'req-7cbb97eb-88ab-4b18-b307-52f8d0113fda', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8'} Body: b'{"server": {"id": "19ea5259-9739-44d1-8002-28282d3f12f8", "name": "tempest-ServerActionsV214RbacTest-server-2028834099", "status": "BUILD", "tenant_id": "79e251c532404a07bfb394356d71a893", "user_id": "708ffe31f5b84e24ac524aff993e8444", "metadata": {}, "hostId": "6618c5af52ef8b7faa5dfe54810e754ddce9341d930a3a29ca406870", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:39Z", "updated": "2020-11-06T17:59:41Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/19ea5259-9739-44d1-8002-28282d3f12f8"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c1", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:46.200 37 INFO tempest.lib.common.rest_client [req-e28be3a2-6672-4643-80ed-ca412d9a2efd ] Request (ServerActionsV216RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 17:59:46.201 37 DEBUG tempest.lib.common.rest_client [req-e28be3a2-6672-4643-80ed-ca412d9a2efd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e28be3a2-6672-4643-80ed-ca412d9a2efd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8c55d99458a44d07a7d6d6c1d923b979", "name": "tempest-ServerActionsV216RbacTest-495437355", "password_expires_at": null}, "audit_ids": ["EX24_3GdTfm3Y7_JXW3bTA"], "expires_at": "2020-11-06T18:59:46.000000Z", "issued_at": "2020-11-06T17:59:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "884ab13bc413480c92edb8dc45d539a6", "name": "tempest-ServerActionsV216RbacTest-495437355"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/884ab13bc413480c92edb8dc45d539a6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/884ab13bc413480c92edb8dc45d539a6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/884ab13bc413480c92edb8dc45d539a6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_884ab13bc413480c92edb8dc45d539a6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_884ab13bc413480c92edb8dc45d539a6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_884ab13bc413480c92edb8dc45d539a6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:46.201 37 INFO tempest.lib.common.fixed_network [-] (ServerActionsV216RbacTest:setUpClass) Found network {'id': 'fa1e4d54-7458-492c-ada5-33319c182af0', 'name': 'tempest-ServerActionsV216RbacTest-2120824806-network', 'tenant_id': '884ab13bc413480c92edb8dc45d539a6', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '884ab13bc413480c92edb8dc45d539a6', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 57, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T17:59:39Z', 'updated_at': '2020-11-06T17:59:39Z', 'revision_number': 1} available for tenant 2020-11-06 17:59:46.979 37 INFO tempest.lib.common.rest_client [req-9187420b-b616-4fef-9b63-56ac9d20af9d ] Request (ServerActionsV216RbacTest:setUpClass): 202 POST http://172.30.13.94/compute/v2.1/servers 0.776s 2020-11-06 17:59:46.979 37 DEBUG tempest.lib.common.rest_client [req-9187420b-b616-4fef-9b63-56ac9d20af9d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-ServerActionsV216RbacTest-server-1075524905", "imageRef": "56b368f6-9136-40ec-a04c-564d02c95e42", "flavorRef": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "networks": [{"uuid": "fa1e4d54-7458-492c-ada5-33319c182af0"}]}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9187420b-b616-4fef-9b63-56ac9d20af9d', 'x-compute-request-id': 'req-9187420b-b616-4fef-9b63-56ac9d20af9d', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "f2ffe3ab-14b4-4784-9a5e-5162d3196e9d", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "3XsiHz8DzjV4"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:47.020 39 INFO tempest.lib.common.rest_client [req-f69baf64-4dc6-4795-a1a8-b504f0208e9b ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.321s 2020-11-06 17:59:47.021 39 DEBUG tempest.lib.common.rest_client [req-f69baf64-4dc6-4795-a1a8-b504f0208e9b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f69baf64-4dc6-4795-a1a8-b504f0208e9b', 'x-compute-request-id': 'req-f69baf64-4dc6-4795-a1a8-b504f0208e9b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T17:59:46Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:41.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:47.036 39 INFO tempest.common.waiters [-] State transition "VERIFY_RESIZE/None" ==> "ACTIVE/None" after 4 second wait 2020-11-06 17:59:47.036 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:47.127 37 INFO tempest.lib.common.rest_client [req-e5a554f2-1edb-4bd3-961b-011a875693b0 ] Request (ServerActionsV216RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d 0.143s 2020-11-06 17:59:47.128 37 DEBUG tempest.lib.common.rest_client [req-e5a554f2-1edb-4bd3-961b-011a875693b0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1401', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e5a554f2-1edb-4bd3-961b-011a875693b0', 'x-compute-request-id': 'req-e5a554f2-1edb-4bd3-961b-011a875693b0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d'} Body: b'{"server": {"id": "f2ffe3ab-14b4-4784-9a5e-5162d3196e9d", "name": "tempest-ServerActionsV216RbacTest-server-1075524905", "status": "BUILD", "tenant_id": "884ab13bc413480c92edb8dc45d539a6", "user_id": "8c55d99458a44d07a7d6d6c1d923b979", "metadata": {}, "hostId": "", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:47Z", "updated": "2020-11-06T17:59:47Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:47.192 40 INFO tempest.lib.common.rest_client [req-1879c2f5-4364-47b9-b57f-3d6ce7af8615 ] Request (ServerConsolesV26RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f 0.216s 2020-11-06 17:59:47.193 40 DEBUG tempest.lib.common.rest_client [req-1879c2f5-4364-47b9-b57f-3d6ce7af8615 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1879c2f5-4364-47b9-b57f-3d6ce7af8615', 'x-compute-request-id': 'req-1879c2f5-4364-47b9-b57f-3d6ce7af8615', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f'} Body: b'{"server": {"id": "9d68a0c4-6553-4814-9988-3e3146822e9f", "name": "tempest-ServerConsolesV26RbacTest-server-1387653545", "status": "BUILD", "tenant_id": "11d8c5c0046c4310b47e5021f23c2165", "user_id": "4f96bc7b3083411387237edc9b80812d", "metadata": {}, "hostId": "315e95811821ebeafdf8ac4b5523f2c940aa93b816bfb47eb9a37351", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:40Z", "updated": "2020-11-06T17:59:42Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/9d68a0c4-6553-4814-9988-3e3146822e9f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:47.221 39 INFO tempest.lib.common.rest_client [req-421dac18-c0b4-42a4-bfa9-a093b3f4c6a4 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.184s 2020-11-06 17:59:47.222 39 DEBUG tempest.lib.common.rest_client [req-421dac18-c0b4-42a4-bfa9-a093b3f4c6a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-421dac18-c0b4-42a4-bfa9-a093b3f4c6a4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:47.307 39 INFO tempest.lib.common.rest_client [req-54e9b695-064c-4eac-84d3-a939fa4425c6 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 17:59:47.308 39 DEBUG tempest.lib.common.rest_client [req-54e9b695-064c-4eac-84d3-a939fa4425c6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-54e9b695-064c-4eac-84d3-a939fa4425c6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["iLp07Y7BSFaoTuBRJSPiEg"], "expires_at": "2020-11-06T18:59:47.000000Z", "issued_at": "2020-11-06T17:59:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:47.375 38 INFO tempest.lib.common.rest_client [req-c8c6ec54-ed3e-46cb-b4d4-91414b777ae9 ] Request (ServerActionsV214RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8 0.190s 2020-11-06 17:59:47.376 38 DEBUG tempest.lib.common.rest_client [req-c8c6ec54-ed3e-46cb-b4d4-91414b777ae9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c8c6ec54-ed3e-46cb-b4d4-91414b777ae9', 'x-compute-request-id': 'req-c8c6ec54-ed3e-46cb-b4d4-91414b777ae9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8'} Body: b'{"server": {"id": "19ea5259-9739-44d1-8002-28282d3f12f8", "name": "tempest-ServerActionsV214RbacTest-server-2028834099", "status": "BUILD", "tenant_id": "79e251c532404a07bfb394356d71a893", "user_id": "708ffe31f5b84e24ac524aff993e8444", "metadata": {}, "hostId": "6618c5af52ef8b7faa5dfe54810e754ddce9341d930a3a29ca406870", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:39Z", "updated": "2020-11-06T17:59:41Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/19ea5259-9739-44d1-8002-28282d3f12f8"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c1", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:47.527 39 INFO tempest.lib.common.rest_client [req-beaf1d3c-a14f-4ecd-b6e6-ea6c3ef07b5d ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.217s 2020-11-06 17:59:47.528 39 DEBUG tempest.lib.common.rest_client [req-beaf1d3c-a14f-4ecd-b6e6-ea6c3ef07b5d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-beaf1d3c-a14f-4ecd-b6e6-ea6c3ef07b5d', 'x-compute-request-id': 'req-beaf1d3c-a14f-4ecd-b6e6-ea6c3ef07b5d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T17:59:46Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:41.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:47.712 39 INFO tempest.lib.common.rest_client [req-3aa1461e-0e00-4534-996c-500cc3fff4a0 ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.167s 2020-11-06 17:59:47.712 39 DEBUG tempest.lib.common.rest_client [req-3aa1461e-0e00-4534-996c-500cc3fff4a0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3aa1461e-0e00-4534-996c-500cc3fff4a0', 'x-compute-request-id': 'req-3aa1461e-0e00-4534-996c-500cc3fff4a0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T17:59:46Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:41.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:47.930 39 INFO tempest.lib.common.rest_client [req-1d7949df-d9ba-44b9-a1d7-fc161dcb7a74 ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.205s 2020-11-06 17:59:47.931 39 DEBUG tempest.lib.common.rest_client [req-1d7949df-d9ba-44b9-a1d7-fc161dcb7a74 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1d7949df-d9ba-44b9-a1d7-fc161dcb7a74', 'x-compute-request-id': 'req-1d7949df-d9ba-44b9-a1d7-fc161dcb7a74', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T17:59:46Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:41.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:48.294 37 INFO tempest.lib.common.rest_client [req-8211f5f6-f7fe-44eb-8c3b-f67927b441df ] Request (ServerActionsV216RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d 0.151s 2020-11-06 17:59:48.294 37 DEBUG tempest.lib.common.rest_client [req-8211f5f6-f7fe-44eb-8c3b-f67927b441df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1496', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8211f5f6-f7fe-44eb-8c3b-f67927b441df', 'x-compute-request-id': 'req-8211f5f6-f7fe-44eb-8c3b-f67927b441df', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d'} Body: b'{"server": {"id": "f2ffe3ab-14b4-4784-9a5e-5162d3196e9d", "name": "tempest-ServerActionsV216RbacTest-server-1075524905", "status": "BUILD", "tenant_id": "884ab13bc413480c92edb8dc45d539a6", "user_id": "8c55d99458a44d07a7d6d6c1d923b979", "metadata": {}, "hostId": "b0c3b35f7bbf2d883f6e5a7293f4b0735017a628ca794fdf658af59e", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:46Z", "updated": "2020-11-06T17:59:48Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c3", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "networking", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:48.308 37 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/networking" after 1 second wait 2020-11-06 17:59:48.376 40 INFO tempest.lib.common.rest_client [req-2717a38c-3087-4747-9ba5-688893645e0c ] Request (ServerConsolesV26RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f 0.166s 2020-11-06 17:59:48.377 40 DEBUG tempest.lib.common.rest_client [req-2717a38c-3087-4747-9ba5-688893645e0c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2717a38c-3087-4747-9ba5-688893645e0c', 'x-compute-request-id': 'req-2717a38c-3087-4747-9ba5-688893645e0c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f'} Body: b'{"server": {"id": "9d68a0c4-6553-4814-9988-3e3146822e9f", "name": "tempest-ServerConsolesV26RbacTest-server-1387653545", "status": "BUILD", "tenant_id": "11d8c5c0046c4310b47e5021f23c2165", "user_id": "4f96bc7b3083411387237edc9b80812d", "metadata": {}, "hostId": "315e95811821ebeafdf8ac4b5523f2c940aa93b816bfb47eb9a37351", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:40Z", "updated": "2020-11-06T17:59:42Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/9d68a0c4-6553-4814-9988-3e3146822e9f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:48.496 39 INFO tempest.lib.common.rest_client [req-56d42e7d-ecb6-431f-ba0a-497d7ea928c2 ] Request (ServerActionsRbacTest:_run_cleanups): 202 POST http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf/action 0.550s 2020-11-06 17:59:48.496 39 DEBUG tempest.lib.common.rest_client [req-56d42e7d-ecb6-431f-ba0a-497d7ea928c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"resize": {"flavorRef": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-56d42e7d-ecb6-431f-ba0a-497d7ea928c2', 'x-compute-request-id': 'req-56d42e7d-ecb6-431f-ba0a-497d7ea928c2', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:48.584 38 INFO tempest.lib.common.rest_client [req-1a590313-7129-4f45-84ac-fcb65784c76c ] Request (ServerActionsV214RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8 0.191s 2020-11-06 17:59:48.585 38 DEBUG tempest.lib.common.rest_client [req-1a590313-7129-4f45-84ac-fcb65784c76c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1a590313-7129-4f45-84ac-fcb65784c76c', 'x-compute-request-id': 'req-1a590313-7129-4f45-84ac-fcb65784c76c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8'} Body: b'{"server": {"id": "19ea5259-9739-44d1-8002-28282d3f12f8", "name": "tempest-ServerActionsV214RbacTest-server-2028834099", "status": "BUILD", "tenant_id": "79e251c532404a07bfb394356d71a893", "user_id": "708ffe31f5b84e24ac524aff993e8444", "metadata": {}, "hostId": "6618c5af52ef8b7faa5dfe54810e754ddce9341d930a3a29ca406870", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:39Z", "updated": "2020-11-06T17:59:41Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/19ea5259-9739-44d1-8002-28282d3f12f8"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c1", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:48.730 39 INFO tempest.lib.common.rest_client [req-9acebba1-ac01-4d81-b6e6-689aa2e494ee ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.232s 2020-11-06 17:59:48.731 39 DEBUG tempest.lib.common.rest_client [req-9acebba1-ac01-4d81-b6e6-689aa2e494ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1727', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9acebba1-ac01-4d81-b6e6-689aa2e494ee', 'x-compute-request-id': 'req-9acebba1-ac01-4d81-b6e6-689aa2e494ee', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T17:59:48Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:41.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_prep", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:49.534 37 INFO tempest.lib.common.rest_client [req-0592c29b-e017-43e6-8362-f0ba2d800613 ] Request (ServerActionsV216RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d 0.224s 2020-11-06 17:59:49.534 37 DEBUG tempest.lib.common.rest_client [req-0592c29b-e017-43e6-8362-f0ba2d800613 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0592c29b-e017-43e6-8362-f0ba2d800613', 'x-compute-request-id': 'req-0592c29b-e017-43e6-8362-f0ba2d800613', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d'} Body: b'{"server": {"id": "f2ffe3ab-14b4-4784-9a5e-5162d3196e9d", "name": "tempest-ServerActionsV216RbacTest-server-1075524905", "status": "BUILD", "tenant_id": "884ab13bc413480c92edb8dc45d539a6", "user_id": "8c55d99458a44d07a7d6d6c1d923b979", "metadata": {}, "hostId": "b0c3b35f7bbf2d883f6e5a7293f4b0735017a628ca794fdf658af59e", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:46Z", "updated": "2020-11-06T17:59:48Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c3", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:49.549 37 INFO tempest.common.waiters [-] State transition "BUILD/networking" ==> "BUILD/spawning" after 2 second wait 2020-11-06 17:59:49.629 40 INFO tempest.lib.common.rest_client [req-2c50bda9-dc9a-4e81-a6b9-c33271374bfc ] Request (ServerConsolesV26RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f 0.235s 2020-11-06 17:59:49.629 40 DEBUG tempest.lib.common.rest_client [req-2c50bda9-dc9a-4e81-a6b9-c33271374bfc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2c50bda9-dc9a-4e81-a6b9-c33271374bfc', 'x-compute-request-id': 'req-2c50bda9-dc9a-4e81-a6b9-c33271374bfc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f'} Body: b'{"server": {"id": "9d68a0c4-6553-4814-9988-3e3146822e9f", "name": "tempest-ServerConsolesV26RbacTest-server-1387653545", "status": "BUILD", "tenant_id": "11d8c5c0046c4310b47e5021f23c2165", "user_id": "4f96bc7b3083411387237edc9b80812d", "metadata": {}, "hostId": "315e95811821ebeafdf8ac4b5523f2c940aa93b816bfb47eb9a37351", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:40Z", "updated": "2020-11-06T17:59:42Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/9d68a0c4-6553-4814-9988-3e3146822e9f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:49.792 38 INFO tempest.lib.common.rest_client [req-2556515c-5974-4761-8ab0-863f39f238eb ] Request (ServerActionsV214RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8 0.194s 2020-11-06 17:59:49.793 38 DEBUG tempest.lib.common.rest_client [req-2556515c-5974-4761-8ab0-863f39f238eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2556515c-5974-4761-8ab0-863f39f238eb', 'x-compute-request-id': 'req-2556515c-5974-4761-8ab0-863f39f238eb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8'} Body: b'{"server": {"id": "19ea5259-9739-44d1-8002-28282d3f12f8", "name": "tempest-ServerActionsV214RbacTest-server-2028834099", "status": "ACTIVE", "tenant_id": "79e251c532404a07bfb394356d71a893", "user_id": "708ffe31f5b84e24ac524aff993e8444", "metadata": {}, "hostId": "6618c5af52ef8b7faa5dfe54810e754ddce9341d930a3a29ca406870", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:39Z", "updated": "2020-11-06T17:59:49Z", "addresses": {"tempest-ServerActionsV214RbacTest-1487696410-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:08:99:5c"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/19ea5259-9739-44d1-8002-28282d3f12f8"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:48.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c1", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:49.809 38 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 10 second wait 2020-11-06 17:59:49.810 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:49.811 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.811 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.811 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.812 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.812 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.813 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.813 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.813 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.814 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.814 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.814 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.815 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.815 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.815 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.815 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.816 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.816 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.817 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.817 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.817 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.818 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.818 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.818 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.819 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.819 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.819 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.819 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.820 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.820 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.820 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.820 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.821 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.821 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.821 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.822 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.822 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.822 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.823 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.823 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.823 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.823 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.824 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.824 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.825 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.825 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.825 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.826 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.826 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.826 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.827 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.827 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.827 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.827 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.828 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.828 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.828 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.829 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.829 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.829 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.830 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.830 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.831 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.831 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.831 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.832 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.832 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.832 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.832 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.833 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.833 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.833 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.834 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.834 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.834 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.834 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:49.835 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-evacuate, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:49.836 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:49.957 39 INFO tempest.lib.common.rest_client [req-bc8b9f29-c909-4510-a5b0-609732b70aaa ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.207s 2020-11-06 17:59:49.958 39 DEBUG tempest.lib.common.rest_client [req-bc8b9f29-c909-4510-a5b0-609732b70aaa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1727', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bc8b9f29-c909-4510-a5b0-609732b70aaa', 'x-compute-request-id': 'req-bc8b9f29-c909-4510-a5b0-609732b70aaa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T17:59:49Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:41.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_prep", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:49.969 38 INFO tempest.lib.common.rest_client [req-ecc8b189-00d1-4ad6-9411-8ad3dd47ecce ] Request (ServerActionsV214RbacTest:test_evacuate_server): 200 GET http://172.30.13.94/identity/v3/projects/79e251c532404a07bfb394356d71a893/users/708ffe31f5b84e24ac524aff993e8444/roles 0.132s 2020-11-06 17:59:49.970 38 DEBUG tempest.lib.common.rest_client [req-ecc8b189-00d1-4ad6-9411-8ad3dd47ecce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ecc8b189-00d1-4ad6-9411-8ad3dd47ecce', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/79e251c532404a07bfb394356d71a893/users/708ffe31f5b84e24ac524aff993e8444/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/79e251c532404a07bfb394356d71a893/users/708ffe31f5b84e24ac524aff993e8444/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:50.051 38 INFO tempest.lib.common.rest_client [req-8c6bf850-fce8-4211-b8a1-25fd52b3c40c ] Request (ServerActionsV214RbacTest:test_evacuate_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.080s 2020-11-06 17:59:50.052 38 DEBUG tempest.lib.common.rest_client [req-8c6bf850-fce8-4211-b8a1-25fd52b3c40c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8c6bf850-fce8-4211-b8a1-25fd52b3c40c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "708ffe31f5b84e24ac524aff993e8444", "name": "tempest-ServerActionsV214RbacTest-1182336552", "password_expires_at": null}, "audit_ids": ["SwTJ4r6hSGqOBaABfVKduQ"], "expires_at": "2020-11-06T18:59:49.000000Z", "issued_at": "2020-11-06T17:59:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "79e251c532404a07bfb394356d71a893", "name": "tempest-ServerActionsV214RbacTest-1182336552"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/79e251c532404a07bfb394356d71a893", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/79e251c532404a07bfb394356d71a893", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/79e251c532404a07bfb394356d71a893", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_79e251c532404a07bfb394356d71a893", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_79e251c532404a07bfb394356d71a893", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_79e251c532404a07bfb394356d71a893", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:50.188 38 INFO tempest.lib.common.rest_client [req-be41ab1f-ae76-462f-82bf-25d340457bf0 ] Request (ServerActionsV214RbacTest:test_evacuate_server): 404 POST http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8/action 0.133s 2020-11-06 17:59:50.189 38 DEBUG tempest.lib.common.rest_client [req-be41ab1f-ae76-462f-82bf-25d340457bf0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.14', 'X-Auth-Token': ''} Body: {"evacuate": {"host": "tempest-ServerActionsV214RbacTest-fake-host-1546805705"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.14', 'x-openstack-nova-api-version': '2.14', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '124', 'x-openstack-request-id': 'req-be41ab1f-ae76-462f-82bf-25d340457bf0', 'x-compute-request-id': 'req-be41ab1f-ae76-462f-82bf-25d340457bf0', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8/action'} Body: b'{"itemNotFound": {"code": 404, "message": "Compute host tempest-ServerActionsV214RbacTest-fake-host-1546805705 not found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:50.190 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:50.236 38 INFO tempest.lib.common.rest_client [req-9f19e78f-5254-4ab4-a2a6-4ab24a8d9f12 ] Request (ServerActionsV214RbacTest:test_evacuate_server): 200 GET http://172.30.13.94/identity/v3/projects/79e251c532404a07bfb394356d71a893/users/708ffe31f5b84e24ac524aff993e8444/roles 0.046s 2020-11-06 17:59:50.237 38 DEBUG tempest.lib.common.rest_client [req-9f19e78f-5254-4ab4-a2a6-4ab24a8d9f12 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9f19e78f-5254-4ab4-a2a6-4ab24a8d9f12', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/79e251c532404a07bfb394356d71a893/users/708ffe31f5b84e24ac524aff993e8444/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/79e251c532404a07bfb394356d71a893/users/708ffe31f5b84e24ac524aff993e8444/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:50.269 38 INFO tempest.lib.common.rest_client [req-f7ee3127-fd61-411b-ac23-d10bd44e0411 ] Request (ServerActionsV214RbacTest:test_evacuate_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.030s 2020-11-06 17:59:50.269 38 DEBUG tempest.lib.common.rest_client [req-f7ee3127-fd61-411b-ac23-d10bd44e0411 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f7ee3127-fd61-411b-ac23-d10bd44e0411', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "708ffe31f5b84e24ac524aff993e8444", "name": "tempest-ServerActionsV214RbacTest-1182336552", "password_expires_at": null}, "audit_ids": ["dJPjRST7TKarp19kM8QAdw"], "expires_at": "2020-11-06T18:59:50.000000Z", "issued_at": "2020-11-06T17:59:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "79e251c532404a07bfb394356d71a893", "name": "tempest-ServerActionsV214RbacTest-1182336552"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/79e251c532404a07bfb394356d71a893", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/79e251c532404a07bfb394356d71a893", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/79e251c532404a07bfb394356d71a893", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_79e251c532404a07bfb394356d71a893", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_79e251c532404a07bfb394356d71a893", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_79e251c532404a07bfb394356d71a893", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:50.510 38 INFO tempest.lib.common.rest_client [req-477a24b4-6335-4c5d-af0c-130f84761b5e ] Request (ServerActionsV214RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8 0.236s 2020-11-06 17:59:50.511 38 DEBUG tempest.lib.common.rest_client [req-477a24b4-6335-4c5d-af0c-130f84761b5e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-477a24b4-6335-4c5d-af0c-130f84761b5e', 'x-compute-request-id': 'req-477a24b4-6335-4c5d-af0c-130f84761b5e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:50.884 38 INFO tempest.lib.common.rest_client [req-f4bd47b5-af1b-4d4d-a74e-43b17d188145 ] Request (ServerActionsV214RbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8 0.372s 2020-11-06 17:59:50.884 38 DEBUG tempest.lib.common.rest_client [req-f4bd47b5-af1b-4d4d-a74e-43b17d188145 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f4bd47b5-af1b-4d4d-a74e-43b17d188145', 'x-compute-request-id': 'req-f4bd47b5-af1b-4d4d-a74e-43b17d188145', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8'} Body: b'{"server": {"id": "19ea5259-9739-44d1-8002-28282d3f12f8", "name": "tempest-ServerActionsV214RbacTest-server-2028834099", "status": "ACTIVE", "tenant_id": "79e251c532404a07bfb394356d71a893", "user_id": "708ffe31f5b84e24ac524aff993e8444", "metadata": {}, "hostId": "6618c5af52ef8b7faa5dfe54810e754ddce9341d930a3a29ca406870", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:39Z", "updated": "2020-11-06T17:59:50Z", "addresses": {"tempest-ServerActionsV214RbacTest-1487696410-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:08:99:5c"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/19ea5259-9739-44d1-8002-28282d3f12f8"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:48.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c1", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:50.885 37 INFO tempest.lib.common.rest_client [req-dfa42fbe-bfa7-4e83-8c10-dfd5bc54469f ] Request (ServerActionsV216RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d 0.333s 2020-11-06 17:59:50.885 37 DEBUG tempest.lib.common.rest_client [req-dfa42fbe-bfa7-4e83-8c10-dfd5bc54469f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dfa42fbe-bfa7-4e83-8c10-dfd5bc54469f', 'x-compute-request-id': 'req-dfa42fbe-bfa7-4e83-8c10-dfd5bc54469f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d'} Body: b'{"server": {"id": "f2ffe3ab-14b4-4784-9a5e-5162d3196e9d", "name": "tempest-ServerActionsV216RbacTest-server-1075524905", "status": "BUILD", "tenant_id": "884ab13bc413480c92edb8dc45d539a6", "user_id": "8c55d99458a44d07a7d6d6c1d923b979", "metadata": {}, "hostId": "b0c3b35f7bbf2d883f6e5a7293f4b0735017a628ca794fdf658af59e", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:46Z", "updated": "2020-11-06T17:59:48Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c3", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:50.896 40 INFO tempest.lib.common.rest_client [req-dea4f60f-0d6c-4bc0-a90c-251aee34fcaa ] Request (ServerConsolesV26RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f 0.256s 2020-11-06 17:59:50.897 40 DEBUG tempest.lib.common.rest_client [req-dea4f60f-0d6c-4bc0-a90c-251aee34fcaa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1727', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dea4f60f-0d6c-4bc0-a90c-251aee34fcaa', 'x-compute-request-id': 'req-dea4f60f-0d6c-4bc0-a90c-251aee34fcaa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f'} Body: b'{"server": {"id": "9d68a0c4-6553-4814-9988-3e3146822e9f", "name": "tempest-ServerConsolesV26RbacTest-server-1387653545", "status": "ACTIVE", "tenant_id": "11d8c5c0046c4310b47e5021f23c2165", "user_id": "4f96bc7b3083411387237edc9b80812d", "metadata": {}, "hostId": "315e95811821ebeafdf8ac4b5523f2c940aa93b816bfb47eb9a37351", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:40Z", "updated": "2020-11-06T17:59:50Z", "addresses": {"tempest-ServerConsolesV26RbacTest-1057810739-network": [{"version": 4, "addr": "192.168.120.12", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:66:92:b3"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/9d68a0c4-6553-4814-9988-3e3146822e9f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:50.907 40 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 10 second wait 2020-11-06 17:59:50.908 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:50.908 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.909 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.909 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.909 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.910 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.910 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.911 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.911 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.911 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.912 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.912 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.912 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.912 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.913 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.913 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.913 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.914 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.914 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.914 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.914 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.915 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.915 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.915 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.916 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.916 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.916 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.916 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.917 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.917 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.917 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.918 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.918 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.918 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.918 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.919 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.919 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.919 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.920 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.920 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.920 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.920 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.921 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.921 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.921 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.922 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.922 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.922 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.923 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.923 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.923 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.924 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.924 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.924 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.924 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.925 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.925 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.925 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.926 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.926 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.926 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.927 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.927 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.927 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.928 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.928 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.928 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.929 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.929 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.929 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.929 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.930 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.930 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.930 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.931 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.931 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:50.932 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-remote-consoles, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:50.932 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:50.989 40 INFO tempest.lib.common.rest_client [req-72339cef-d137-44c5-b50e-489f3a3bacfb ] Request (ServerConsolesV26RbacTest:test_get_remote_console_output): 200 GET http://172.30.13.94/identity/v3/projects/11d8c5c0046c4310b47e5021f23c2165/users/4f96bc7b3083411387237edc9b80812d/roles 0.056s 2020-11-06 17:59:50.990 40 DEBUG tempest.lib.common.rest_client [req-72339cef-d137-44c5-b50e-489f3a3bacfb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-72339cef-d137-44c5-b50e-489f3a3bacfb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/11d8c5c0046c4310b47e5021f23c2165/users/4f96bc7b3083411387237edc9b80812d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/11d8c5c0046c4310b47e5021f23c2165/users/4f96bc7b3083411387237edc9b80812d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:51.070 40 INFO tempest.lib.common.rest_client [req-14f2845d-367f-4343-ba93-950a2075552d ] Request (ServerConsolesV26RbacTest:test_get_remote_console_output): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.080s 2020-11-06 17:59:51.071 40 DEBUG tempest.lib.common.rest_client [req-14f2845d-367f-4343-ba93-950a2075552d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-14f2845d-367f-4343-ba93-950a2075552d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4f96bc7b3083411387237edc9b80812d", "name": "tempest-ServerConsolesV26RbacTest-667342185", "password_expires_at": null}, "audit_ids": ["7b6P8o8CTNGvp8ox2OIEwA"], "expires_at": "2020-11-06T18:59:51.000000Z", "issued_at": "2020-11-06T17:59:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "11d8c5c0046c4310b47e5021f23c2165", "name": "tempest-ServerConsolesV26RbacTest-667342185"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/11d8c5c0046c4310b47e5021f23c2165", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/11d8c5c0046c4310b47e5021f23c2165", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/11d8c5c0046c4310b47e5021f23c2165", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_11d8c5c0046c4310b47e5021f23c2165", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_11d8c5c0046c4310b47e5021f23c2165", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_11d8c5c0046c4310b47e5021f23c2165", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:51.273 40 INFO tempest.lib.common.rest_client [req-a295ca22-b27d-4a41-92b5-f3eaf2d36fd6 ] Request (ServerConsolesV26RbacTest:test_get_remote_console_output): 200 POST http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f/remote-consoles 0.200s 2020-11-06 17:59:51.273 40 DEBUG tempest.lib.common.rest_client [req-a295ca22-b27d-4a41-92b5-f3eaf2d36fd6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.6', 'X-Auth-Token': ''} Body: {"remote_console": {"type": "novnc", "protocol": "vnc"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '158', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.6', 'x-openstack-nova-api-version': '2.6', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a295ca22-b27d-4a41-92b5-f3eaf2d36fd6', 'x-compute-request-id': 'req-a295ca22-b27d-4a41-92b5-f3eaf2d36fd6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f/remote-consoles'} Body: b'{"remote_console": {"protocol": "vnc", "type": "novnc", "url": "http://172.30.13.94:6080/vnc_auto.html?path=%3Ftoken%3D6f5d4bde-9db6-4140-8a41-b0b13b294f6a"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:51.276 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:51.322 40 INFO tempest.lib.common.rest_client [req-e51a2fd0-8a3e-4734-bff5-c5453f4f1293 ] Request (ServerConsolesV26RbacTest:test_get_remote_console_output): 200 GET http://172.30.13.94/identity/v3/projects/11d8c5c0046c4310b47e5021f23c2165/users/4f96bc7b3083411387237edc9b80812d/roles 0.045s 2020-11-06 17:59:51.322 40 DEBUG tempest.lib.common.rest_client [req-e51a2fd0-8a3e-4734-bff5-c5453f4f1293 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e51a2fd0-8a3e-4734-bff5-c5453f4f1293', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/11d8c5c0046c4310b47e5021f23c2165/users/4f96bc7b3083411387237edc9b80812d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/11d8c5c0046c4310b47e5021f23c2165/users/4f96bc7b3083411387237edc9b80812d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:51.357 40 INFO tempest.lib.common.rest_client [req-3996ef66-2861-4e6d-b417-98cba704b0e4 ] Request (ServerConsolesV26RbacTest:test_get_remote_console_output): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 17:59:51.357 40 DEBUG tempest.lib.common.rest_client [req-3996ef66-2861-4e6d-b417-98cba704b0e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3996ef66-2861-4e6d-b417-98cba704b0e4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4f96bc7b3083411387237edc9b80812d", "name": "tempest-ServerConsolesV26RbacTest-667342185", "password_expires_at": null}, "audit_ids": ["3BUyk6F0QLyJfKrZOSytZQ"], "expires_at": "2020-11-06T18:59:51.000000Z", "issued_at": "2020-11-06T17:59:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "11d8c5c0046c4310b47e5021f23c2165", "name": "tempest-ServerConsolesV26RbacTest-667342185"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/11d8c5c0046c4310b47e5021f23c2165", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/11d8c5c0046c4310b47e5021f23c2165", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/11d8c5c0046c4310b47e5021f23c2165", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_11d8c5c0046c4310b47e5021f23c2165", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_11d8c5c0046c4310b47e5021f23c2165", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_11d8c5c0046c4310b47e5021f23c2165", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:51.576 40 INFO tempest.lib.common.rest_client [req-5249768f-90c5-416d-a193-26bf40b862e8 ] Request (ServerConsolesV26RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f 0.215s 2020-11-06 17:59:51.577 40 DEBUG tempest.lib.common.rest_client [req-5249768f-90c5-416d-a193-26bf40b862e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5249768f-90c5-416d-a193-26bf40b862e8', 'x-compute-request-id': 'req-5249768f-90c5-416d-a193-26bf40b862e8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:51.777 40 INFO tempest.lib.common.rest_client [req-d53f6aa5-e2b5-41a2-845e-62e96b62bbd2 ] Request (ServerConsolesV26RbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f 0.199s 2020-11-06 17:59:51.777 40 DEBUG tempest.lib.common.rest_client [req-d53f6aa5-e2b5-41a2-845e-62e96b62bbd2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1733', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d53f6aa5-e2b5-41a2-845e-62e96b62bbd2', 'x-compute-request-id': 'req-d53f6aa5-e2b5-41a2-845e-62e96b62bbd2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f'} Body: b'{"server": {"id": "9d68a0c4-6553-4814-9988-3e3146822e9f", "name": "tempest-ServerConsolesV26RbacTest-server-1387653545", "status": "ACTIVE", "tenant_id": "11d8c5c0046c4310b47e5021f23c2165", "user_id": "4f96bc7b3083411387237edc9b80812d", "metadata": {}, "hostId": "315e95811821ebeafdf8ac4b5523f2c940aa93b816bfb47eb9a37351", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:40Z", "updated": "2020-11-06T17:59:52Z", "addresses": {"tempest-ServerConsolesV26RbacTest-1057810739-network": [{"version": 4, "addr": "192.168.120.12", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:66:92:b3"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/9d68a0c4-6553-4814-9988-3e3146822e9f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:52.245 37 INFO tempest.lib.common.rest_client [req-cb08b20c-2d7e-4f06-8420-9fc594b4f890 ] Request (ServerActionsV216RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d 0.347s 2020-11-06 17:59:52.246 37 DEBUG tempest.lib.common.rest_client [req-cb08b20c-2d7e-4f06-8420-9fc594b4f890 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cb08b20c-2d7e-4f06-8420-9fc594b4f890', 'x-compute-request-id': 'req-cb08b20c-2d7e-4f06-8420-9fc594b4f890', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d'} Body: b'{"server": {"id": "f2ffe3ab-14b4-4784-9a5e-5162d3196e9d", "name": "tempest-ServerActionsV216RbacTest-server-1075524905", "status": "BUILD", "tenant_id": "884ab13bc413480c92edb8dc45d539a6", "user_id": "8c55d99458a44d07a7d6d6c1d923b979", "metadata": {}, "hostId": "b0c3b35f7bbf2d883f6e5a7293f4b0735017a628ca794fdf658af59e", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:46Z", "updated": "2020-11-06T17:59:48Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c3", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:52.629 38 INFO tempest.lib.common.rest_client [req-e2fc1d50-f396-4fa5-ac9a-f0bd967f0dde ] Request (ServerActionsV214RbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8 0.732s 2020-11-06 17:59:52.630 38 DEBUG tempest.lib.common.rest_client [req-e2fc1d50-f396-4fa5-ac9a-f0bd967f0dde ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e2fc1d50-f396-4fa5-ac9a-f0bd967f0dde', 'x-compute-request-id': 'req-e2fc1d50-f396-4fa5-ac9a-f0bd967f0dde', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8'} Body: b'{"server": {"id": "19ea5259-9739-44d1-8002-28282d3f12f8", "name": "tempest-ServerActionsV214RbacTest-server-2028834099", "status": "ACTIVE", "tenant_id": "79e251c532404a07bfb394356d71a893", "user_id": "708ffe31f5b84e24ac524aff993e8444", "metadata": {}, "hostId": "6618c5af52ef8b7faa5dfe54810e754ddce9341d930a3a29ca406870", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:39Z", "updated": "2020-11-06T17:59:51Z", "addresses": {"tempest-ServerActionsV214RbacTest-1487696410-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:08:99:5c"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/19ea5259-9739-44d1-8002-28282d3f12f8"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:48.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c1", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:52.644 39 INFO tempest.lib.common.rest_client [req-a7001e07-0c03-459b-97c9-b0b9abddbe6d ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 1.673s 2020-11-06 17:59:52.645 39 DEBUG tempest.lib.common.rest_client [req-a7001e07-0c03-459b-97c9-b0b9abddbe6d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a7001e07-0c03-459b-97c9-b0b9abddbe6d', 'x-compute-request-id': 'req-a7001e07-0c03-459b-97c9-b0b9abddbe6d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T17:59:51Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:41.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:52.660 39 INFO tempest.common.waiters [-] State transition "RESIZE/resize_prep" ==> "RESIZE/resize_migrating" after 4 second wait 2020-11-06 17:59:52.992 40 INFO tempest.lib.common.rest_client [req-c853949b-ceda-41c8-9690-34c25ab4d6be ] Request (ServerConsolesV26RbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f 0.199s 2020-11-06 17:59:52.993 40 DEBUG tempest.lib.common.rest_client [req-c853949b-ceda-41c8-9690-34c25ab4d6be ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1733', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c853949b-ceda-41c8-9690-34c25ab4d6be', 'x-compute-request-id': 'req-c853949b-ceda-41c8-9690-34c25ab4d6be', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f'} Body: b'{"server": {"id": "9d68a0c4-6553-4814-9988-3e3146822e9f", "name": "tempest-ServerConsolesV26RbacTest-server-1387653545", "status": "ACTIVE", "tenant_id": "11d8c5c0046c4310b47e5021f23c2165", "user_id": "4f96bc7b3083411387237edc9b80812d", "metadata": {}, "hostId": "315e95811821ebeafdf8ac4b5523f2c940aa93b816bfb47eb9a37351", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:40Z", "updated": "2020-11-06T17:59:52Z", "addresses": {"tempest-ServerConsolesV26RbacTest-1057810739-network": [{"version": 4, "addr": "192.168.120.12", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:66:92:b3"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/9d68a0c4-6553-4814-9988-3e3146822e9f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:53.833 38 INFO tempest.lib.common.rest_client [req-ab832e7a-8002-4ab6-86fa-40439c6fefb3 ] Request (ServerActionsV214RbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8 0.188s 2020-11-06 17:59:53.834 38 DEBUG tempest.lib.common.rest_client [req-ab832e7a-8002-4ab6-86fa-40439c6fefb3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1522', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ab832e7a-8002-4ab6-86fa-40439c6fefb3', 'x-compute-request-id': 'req-ab832e7a-8002-4ab6-86fa-40439c6fefb3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8'} Body: b'{"server": {"id": "19ea5259-9739-44d1-8002-28282d3f12f8", "name": "tempest-ServerActionsV214RbacTest-server-2028834099", "status": "DELETED", "tenant_id": "79e251c532404a07bfb394356d71a893", "user_id": "708ffe31f5b84e24ac524aff993e8444", "metadata": {}, "hostId": "6618c5af52ef8b7faa5dfe54810e754ddce9341d930a3a29ca406870", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:39Z", "updated": "2020-11-06T17:59:53Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/19ea5259-9739-44d1-8002-28282d3f12f8"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:48.000000", "OS-SRV-USG:terminated_at": "2020-11-06T17:59:53.000000", "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c1", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "deleted", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:53.844 38 INFO tempest.common.waiters [-] State transition "ACTIVE/deleting" ==> "DELETED/None" after 3 second wait 2020-11-06 17:59:54.768 40 INFO tempest.lib.common.rest_client [req-c68044be-13f9-4dee-aa05-14147d8805af ] Request (ServerConsolesV26RbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f 0.758s 2020-11-06 17:59:54.769 40 DEBUG tempest.lib.common.rest_client [req-c68044be-13f9-4dee-aa05-14147d8805af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1522', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c68044be-13f9-4dee-aa05-14147d8805af', 'x-compute-request-id': 'req-c68044be-13f9-4dee-aa05-14147d8805af', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f'} Body: b'{"server": {"id": "9d68a0c4-6553-4814-9988-3e3146822e9f", "name": "tempest-ServerConsolesV26RbacTest-server-1387653545", "status": "DELETED", "tenant_id": "11d8c5c0046c4310b47e5021f23c2165", "user_id": "4f96bc7b3083411387237edc9b80812d", "metadata": {}, "hostId": "315e95811821ebeafdf8ac4b5523f2c940aa93b816bfb47eb9a37351", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:40Z", "updated": "2020-11-06T17:59:53Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/9d68a0c4-6553-4814-9988-3e3146822e9f"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:50.000000", "OS-SRV-USG:terminated_at": "2020-11-06T17:59:53.000000", "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "deleted", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:54.784 40 INFO tempest.common.waiters [-] State transition "ACTIVE/deleting" ==> "DELETED/None" after 3 second wait 2020-11-06 17:59:54.799 37 INFO tempest.lib.common.rest_client [req-bf4f781a-f7ba-47d5-83fb-7a28a0ac9bc9 ] Request (ServerActionsV216RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d 1.537s 2020-11-06 17:59:54.799 37 DEBUG tempest.lib.common.rest_client [req-bf4f781a-f7ba-47d5-83fb-7a28a0ac9bc9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bf4f781a-f7ba-47d5-83fb-7a28a0ac9bc9', 'x-compute-request-id': 'req-bf4f781a-f7ba-47d5-83fb-7a28a0ac9bc9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d'} Body: b'{"server": {"id": "f2ffe3ab-14b4-4784-9a5e-5162d3196e9d", "name": "tempest-ServerActionsV216RbacTest-server-1075524905", "status": "BUILD", "tenant_id": "884ab13bc413480c92edb8dc45d539a6", "user_id": "8c55d99458a44d07a7d6d6c1d923b979", "metadata": {}, "hostId": "b0c3b35f7bbf2d883f6e5a7293f4b0735017a628ca794fdf658af59e", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:46Z", "updated": "2020-11-06T17:59:48Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c3", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:54.907 38 INFO tempest.lib.common.rest_client [req-a1c0641f-e551-4c14-b06d-b046a75f801f ] Request (ServerActionsV214RbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8 0.061s 2020-11-06 17:59:54.907 38 DEBUG tempest.lib.common.rest_client [req-a1c0641f-e551-4c14-b06d-b046a75f801f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-a1c0641f-e551-4c14-b06d-b046a75f801f', 'x-compute-request-id': 'req-a1c0641f-e551-4c14-b06d-b046a75f801f', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/19ea5259-9739-44d1-8002-28282d3f12f8'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 19ea5259-9739-44d1-8002-28282d3f12f8 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:54.908 38 DEBUG tempest.lib.common.dynamic_creds [-] Clearing network: {'id': '7a042e07-577f-466d-988f-357caa1a13d2', 'name': 'tempest-ServerActionsV214RbacTest-1487696410-network', 'tenant_id': '79e251c532404a07bfb394356d71a893', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '79e251c532404a07bfb394356d71a893', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 53, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T17:59:31Z', 'updated_at': '2020-11-06T17:59:31Z', 'revision_number': 1}, subnet: {'id': 'b4e2b597-747f-4552-b0d8-a5cc773c8dac', 'name': 'tempest-ServerActionsV214RbacTest-1487696410-subnet', 'tenant_id': '79e251c532404a07bfb394356d71a893', 'network_id': '7a042e07-577f-466d-988f-357caa1a13d2', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-11-06T17:59:32Z', 'updated_at': '2020-11-06T17:59:32Z', 'revision_number': 0, 'project_id': '79e251c532404a07bfb394356d71a893'}, router: {'id': 'b4b20f70-fd5d-47b3-bf94-9cb1169f3fb4', 'name': 'tempest-ServerActionsV214RbacTest-1487696410-router', 'tenant_id': '79e251c532404a07bfb394356d71a893', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.232'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::2fa'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-11-06T17:59:32Z', 'updated_at': '2020-11-06T17:59:33Z', 'revision_number': 3, 'project_id': '79e251c532404a07bfb394356d71a893'} _clear_isolated_net_resources /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/dynamic_creds.py:418 2020-11-06 17:59:55.014 39 INFO tempest.lib.common.rest_client [req-e5402c0d-f15e-4551-94e4-82c22ca8f2e1 ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 1.351s 2020-11-06 17:59:55.014 39 DEBUG tempest.lib.common.rest_client [req-e5402c0d-f15e-4551-94e4-82c22ca8f2e1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e5402c0d-f15e-4551-94e4-82c22ca8f2e1', 'x-compute-request-id': 'req-e5402c0d-f15e-4551-94e4-82c22ca8f2e1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T17:59:51Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:41.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:55.844 40 INFO tempest.lib.common.rest_client [req-16de218d-9d8a-43ca-b63c-9f7566365c51 ] Request (ServerConsolesV26RbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f 0.058s 2020-11-06 17:59:55.845 40 DEBUG tempest.lib.common.rest_client [req-16de218d-9d8a-43ca-b63c-9f7566365c51 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-16de218d-9d8a-43ca-b63c-9f7566365c51', 'x-compute-request-id': 'req-16de218d-9d8a-43ca-b63c-9f7566365c51', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9d68a0c4-6553-4814-9988-3e3146822e9f'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 9d68a0c4-6553-4814-9988-3e3146822e9f could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:55.845 40 DEBUG tempest.lib.common.dynamic_creds [-] Clearing network: {'id': '4c4c312b-b76e-4284-8638-ec9780811557', 'name': 'tempest-ServerConsolesV26RbacTest-1057810739-network', 'tenant_id': '11d8c5c0046c4310b47e5021f23c2165', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '11d8c5c0046c4310b47e5021f23c2165', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 49, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T17:59:30Z', 'updated_at': '2020-11-06T17:59:30Z', 'revision_number': 1}, subnet: {'id': '863312ca-8de5-48fd-9662-ee4644e1a73b', 'name': 'tempest-ServerConsolesV26RbacTest-1057810739-subnet', 'tenant_id': '11d8c5c0046c4310b47e5021f23c2165', 'network_id': '4c4c312b-b76e-4284-8638-ec9780811557', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-11-06T17:59:31Z', 'updated_at': '2020-11-06T17:59:31Z', 'revision_number': 0, 'project_id': '11d8c5c0046c4310b47e5021f23c2165'}, router: {'id': 'a1b0288e-5076-4f35-bcce-94897c26310b', 'name': 'tempest-ServerConsolesV26RbacTest-1057810739-router', 'tenant_id': '11d8c5c0046c4310b47e5021f23c2165', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.34'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::3a9'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-11-06T17:59:31Z', 'updated_at': '2020-11-06T17:59:32Z', 'revision_number': 3, 'project_id': '11d8c5c0046c4310b47e5021f23c2165'} _clear_isolated_net_resources /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/dynamic_creds.py:418 2020-11-06 17:59:56.083 37 INFO tempest.lib.common.rest_client [req-333ca1c4-3b27-4e9f-a00b-08722b4600e8 ] Request (ServerActionsV216RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d 0.265s 2020-11-06 17:59:56.083 37 DEBUG tempest.lib.common.rest_client [req-333ca1c4-3b27-4e9f-a00b-08722b4600e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-333ca1c4-3b27-4e9f-a00b-08722b4600e8', 'x-compute-request-id': 'req-333ca1c4-3b27-4e9f-a00b-08722b4600e8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d'} Body: b'{"server": {"id": "f2ffe3ab-14b4-4784-9a5e-5162d3196e9d", "name": "tempest-ServerActionsV216RbacTest-server-1075524905", "status": "ACTIVE", "tenant_id": "884ab13bc413480c92edb8dc45d539a6", "user_id": "8c55d99458a44d07a7d6d6c1d923b979", "metadata": {}, "hostId": "b0c3b35f7bbf2d883f6e5a7293f4b0735017a628ca794fdf658af59e", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:46Z", "updated": "2020-11-06T17:59:55Z", "addresses": {"tempest-ServerActionsV216RbacTest-2120824806-network": [{"version": 4, "addr": "192.168.120.4", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:3d:ea:f8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:54.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c3", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:56.095 37 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 9 second wait 2020-11-06 17:59:56.096 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 17:59:56.097 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.098 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.098 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.098 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.099 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.099 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.100 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.100 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.100 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.100 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.101 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.101 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.101 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.102 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.102 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.102 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.103 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.103 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.103 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.103 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.104 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.104 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.104 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.105 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.105 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.105 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.106 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.106 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.106 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.106 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.107 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.107 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.107 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.108 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.108 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.108 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.108 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.109 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.109 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.109 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.110 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.110 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.110 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.110 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.111 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.111 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.111 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.112 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.112 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.112 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.112 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.113 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.113 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.113 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.114 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.114 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.114 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.114 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.115 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.115 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.116 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.116 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.116 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.117 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.117 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.117 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.117 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.118 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.118 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.118 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.119 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.119 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.119 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.119 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.120 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 17:59:56.121 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:show:host_status, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 17:59:56.121 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:56.178 37 INFO tempest.lib.common.rest_client [req-01bf3501-0d68-4c02-a5a6-fb872c96b632 ] Request (ServerActionsV216RbacTest:test_show_server_host_status): 200 GET http://172.30.13.94/identity/v3/projects/884ab13bc413480c92edb8dc45d539a6/users/8c55d99458a44d07a7d6d6c1d923b979/roles 0.056s 2020-11-06 17:59:56.179 37 DEBUG tempest.lib.common.rest_client [req-01bf3501-0d68-4c02-a5a6-fb872c96b632 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-01bf3501-0d68-4c02-a5a6-fb872c96b632', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/884ab13bc413480c92edb8dc45d539a6/users/8c55d99458a44d07a7d6d6c1d923b979/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/884ab13bc413480c92edb8dc45d539a6/users/8c55d99458a44d07a7d6d6c1d923b979/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:56.266 37 INFO tempest.lib.common.rest_client [req-b43c4901-1fc8-458b-9097-8598957af217 ] Request (ServerActionsV216RbacTest:test_show_server_host_status): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-11-06 17:59:56.266 37 DEBUG tempest.lib.common.rest_client [req-b43c4901-1fc8-458b-9097-8598957af217 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b43c4901-1fc8-458b-9097-8598957af217', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8c55d99458a44d07a7d6d6c1d923b979", "name": "tempest-ServerActionsV216RbacTest-495437355", "password_expires_at": null}, "audit_ids": ["IEq_BjcqSgGfaS4siBHsSQ"], "expires_at": "2020-11-06T18:59:56.000000Z", "issued_at": "2020-11-06T17:59:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "884ab13bc413480c92edb8dc45d539a6", "name": "tempest-ServerActionsV216RbacTest-495437355"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/884ab13bc413480c92edb8dc45d539a6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/884ab13bc413480c92edb8dc45d539a6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/884ab13bc413480c92edb8dc45d539a6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_884ab13bc413480c92edb8dc45d539a6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_884ab13bc413480c92edb8dc45d539a6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_884ab13bc413480c92edb8dc45d539a6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:56.273 39 INFO tempest.lib.common.rest_client [req-5e6cfea3-6fa7-4719-a35e-bca6461c81cd ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.244s 2020-11-06 17:59:56.274 39 DEBUG tempest.lib.common.rest_client [req-5e6cfea3-6fa7-4719-a35e-bca6461c81cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5e6cfea3-6fa7-4719-a35e-bca6461c81cd', 'x-compute-request-id': 'req-5e6cfea3-6fa7-4719-a35e-bca6461c81cd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T17:59:55Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:41.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_migrated", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:56.288 39 INFO tempest.common.waiters [-] State transition "RESIZE/resize_migrating" ==> "RESIZE/resize_migrated" after 8 second wait 2020-11-06 17:59:56.730 37 INFO tempest.lib.common.rest_client [req-dc03a156-8859-4682-89a0-345fdbf83e30 ] Request (ServerActionsV216RbacTest:test_show_server_host_status): 200 GET http://172.30.13.94/compute/v2.1/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d 0.462s 2020-11-06 17:59:56.730 37 DEBUG tempest.lib.common.rest_client [req-dc03a156-8859-4682-89a0-345fdbf83e30 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.16', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2080', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.16', 'x-openstack-nova-api-version': '2.16', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dc03a156-8859-4682-89a0-345fdbf83e30', 'x-compute-request-id': 'req-dc03a156-8859-4682-89a0-345fdbf83e30', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d'} Body: b'{"server": {"id": "f2ffe3ab-14b4-4784-9a5e-5162d3196e9d", "name": "tempest-ServerActionsV216RbacTest-server-1075524905", "status": "ACTIVE", "tenant_id": "884ab13bc413480c92edb8dc45d539a6", "user_id": "8c55d99458a44d07a7d6d6c1d923b979", "metadata": {}, "hostId": "b0c3b35f7bbf2d883f6e5a7293f4b0735017a628ca794fdf658af59e", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:46Z", "updated": "2020-11-06T17:59:55Z", "addresses": {"tempest-ServerActionsV216RbacTest-2120824806-network": [{"version": 4, "addr": "192.168.120.4", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:3d:ea:f8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:54.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c3", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-SRV-ATTR:reservation_id": "r-z6mtapqt", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-serveractionsv216rbactest-server-1075524905", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:56.750 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 17:59:56.807 37 INFO tempest.lib.common.rest_client [req-51d07ca5-8634-4ddf-93c1-2b8438538f38 ] Request (ServerActionsV216RbacTest:test_show_server_host_status): 200 GET http://172.30.13.94/identity/v3/projects/884ab13bc413480c92edb8dc45d539a6/users/8c55d99458a44d07a7d6d6c1d923b979/roles 0.056s 2020-11-06 17:59:56.807 37 DEBUG tempest.lib.common.rest_client [req-51d07ca5-8634-4ddf-93c1-2b8438538f38 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-51d07ca5-8634-4ddf-93c1-2b8438538f38', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/884ab13bc413480c92edb8dc45d539a6/users/8c55d99458a44d07a7d6d6c1d923b979/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/884ab13bc413480c92edb8dc45d539a6/users/8c55d99458a44d07a7d6d6c1d923b979/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:56.838 37 INFO tempest.lib.common.rest_client [req-8a0d84a0-a520-4e91-bed6-2a4943f8bb65 ] Request (ServerActionsV216RbacTest:test_show_server_host_status): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.029s 2020-11-06 17:59:56.838 37 DEBUG tempest.lib.common.rest_client [req-8a0d84a0-a520-4e91-bed6-2a4943f8bb65 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8a0d84a0-a520-4e91-bed6-2a4943f8bb65', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8c55d99458a44d07a7d6d6c1d923b979", "name": "tempest-ServerActionsV216RbacTest-495437355", "password_expires_at": null}, "audit_ids": ["3PKa8vn6RsWay5oeQCiIuw"], "expires_at": "2020-11-06T18:59:56.000000Z", "issued_at": "2020-11-06T17:59:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "884ab13bc413480c92edb8dc45d539a6", "name": "tempest-ServerActionsV216RbacTest-495437355"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/884ab13bc413480c92edb8dc45d539a6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/884ab13bc413480c92edb8dc45d539a6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/884ab13bc413480c92edb8dc45d539a6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_884ab13bc413480c92edb8dc45d539a6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_884ab13bc413480c92edb8dc45d539a6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_884ab13bc413480c92edb8dc45d539a6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:57.077 37 INFO tempest.lib.common.rest_client [req-c86a0ecb-9893-47a6-81c8-4745cde20d8f ] Request (ServerActionsV216RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/compute/v2.1/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d 0.235s 2020-11-06 17:59:57.078 37 DEBUG tempest.lib.common.rest_client [req-c86a0ecb-9893-47a6-81c8-4745cde20d8f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c86a0ecb-9893-47a6-81c8-4745cde20d8f', 'x-compute-request-id': 'req-c86a0ecb-9893-47a6-81c8-4745cde20d8f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:57.307 37 INFO tempest.lib.common.rest_client [req-f700b39a-7795-4488-af8d-f6efef61f3d8 ] Request (ServerActionsV216RbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d 0.229s 2020-11-06 17:59:57.307 37 DEBUG tempest.lib.common.rest_client [req-f700b39a-7795-4488-af8d-f6efef61f3d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f700b39a-7795-4488-af8d-f6efef61f3d8', 'x-compute-request-id': 'req-f700b39a-7795-4488-af8d-f6efef61f3d8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d'} Body: b'{"server": {"id": "f2ffe3ab-14b4-4784-9a5e-5162d3196e9d", "name": "tempest-ServerActionsV216RbacTest-server-1075524905", "status": "ACTIVE", "tenant_id": "884ab13bc413480c92edb8dc45d539a6", "user_id": "8c55d99458a44d07a7d6d6c1d923b979", "metadata": {}, "hostId": "b0c3b35f7bbf2d883f6e5a7293f4b0735017a628ca794fdf658af59e", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:46Z", "updated": "2020-11-06T17:59:57Z", "addresses": {"tempest-ServerActionsV216RbacTest-2120824806-network": [{"version": 4, "addr": "192.168.120.4", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:3d:ea:f8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:54.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c3", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:57.887 39 INFO tempest.lib.common.rest_client [req-e4889117-09bc-4c70-8e48-e2ade41c87ac ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.596s 2020-11-06 17:59:57.887 39 DEBUG tempest.lib.common.rest_client [req-e4889117-09bc-4c70-8e48-e2ade41c87ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e4889117-09bc-4c70-8e48-e2ade41c87ac', 'x-compute-request-id': 'req-e4889117-09bc-4c70-8e48-e2ade41c87ac', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T17:59:55Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:41.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_migrated", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:58.498 37 INFO tempest.lib.common.rest_client [req-ad89856e-49aa-474d-9b1e-646e55966fc3 ] Request (ServerActionsV216RbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d 0.177s 2020-11-06 17:59:58.499 37 DEBUG tempest.lib.common.rest_client [req-ad89856e-49aa-474d-9b1e-646e55966fc3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1690', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ad89856e-49aa-474d-9b1e-646e55966fc3', 'x-compute-request-id': 'req-ad89856e-49aa-474d-9b1e-646e55966fc3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d'} Body: b'{"server": {"id": "f2ffe3ab-14b4-4784-9a5e-5162d3196e9d", "name": "tempest-ServerActionsV216RbacTest-server-1075524905", "status": "ACTIVE", "tenant_id": "884ab13bc413480c92edb8dc45d539a6", "user_id": "8c55d99458a44d07a7d6d6c1d923b979", "metadata": {}, "hostId": "b0c3b35f7bbf2d883f6e5a7293f4b0735017a628ca794fdf658af59e", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:46Z", "updated": "2020-11-06T17:59:58Z", "addresses": {"tempest-ServerActionsV216RbacTest-2120824806-network": [{"version": 4, "addr": "192.168.120.4", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:3d:ea:f8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:54.000000", "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c3", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:59.165 38 INFO tempest.lib.common.rest_client [req-180265cd-38b3-410e-813b-c4e6ad3f5280 ] Request (ServerActionsV214RbacTest:tearDownClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/b4b20f70-fd5d-47b3-bf94-9cb1169f3fb4/remove_router_interface 4.256s 2020-11-06 17:59:59.165 38 DEBUG tempest.lib.common.rest_client [req-180265cd-38b3-410e-813b-c4e6ad3f5280 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "b4e2b597-747f-4552-b0d8-a5cc773c8dac"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-180265cd-38b3-410e-813b-c4e6ad3f5280', 'date': 'Fri, 06 Nov 2020 17:59:59 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/b4b20f70-fd5d-47b3-bf94-9cb1169f3fb4/remove_router_interface'} Body: b'{"id": "b4b20f70-fd5d-47b3-bf94-9cb1169f3fb4", "tenant_id": "79e251c532404a07bfb394356d71a893", "port_id": "6e53c83c-4539-4442-9e6b-6fc9d983425d", "network_id": "7a042e07-577f-466d-988f-357caa1a13d2", "subnet_id": "b4e2b597-747f-4552-b0d8-a5cc773c8dac", "subnet_ids": ["b4e2b597-747f-4552-b0d8-a5cc773c8dac"]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:59.167 39 INFO tempest.lib.common.rest_client [req-f488ffc9-6a6c-4f6f-a8d0-6cc6979390f3 ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.261s 2020-11-06 17:59:59.167 39 DEBUG tempest.lib.common.rest_client [req-f488ffc9-6a6c-4f6f-a8d0-6cc6979390f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f488ffc9-6a6c-4f6f-a8d0-6cc6979390f3', 'x-compute-request-id': 'req-f488ffc9-6a6c-4f6f-a8d0-6cc6979390f3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T17:59:55Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:41.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_migrated", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:59.580 37 INFO tempest.lib.common.rest_client [req-6005030c-0cc1-43b1-8c80-95f49b5fe448 ] Request (ServerActionsV216RbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d 0.067s 2020-11-06 17:59:59.581 37 DEBUG tempest.lib.common.rest_client [req-6005030c-0cc1-43b1-8c80-95f49b5fe448 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 17:59:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-6005030c-0cc1-43b1-8c80-95f49b5fe448', 'x-compute-request-id': 'req-6005030c-0cc1-43b1-8c80-95f49b5fe448', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/f2ffe3ab-14b4-4784-9a5e-5162d3196e9d'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance f2ffe3ab-14b4-4784-9a5e-5162d3196e9d could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 17:59:59.581 37 DEBUG tempest.lib.common.dynamic_creds [-] Clearing network: {'id': 'fa1e4d54-7458-492c-ada5-33319c182af0', 'name': 'tempest-ServerActionsV216RbacTest-2120824806-network', 'tenant_id': '884ab13bc413480c92edb8dc45d539a6', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '884ab13bc413480c92edb8dc45d539a6', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 57, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T17:59:39Z', 'updated_at': '2020-11-06T17:59:39Z', 'revision_number': 1}, subnet: {'id': '778ea396-6658-4ce8-98b8-390b7d5ccc39', 'name': 'tempest-ServerActionsV216RbacTest-2120824806-subnet', 'tenant_id': '884ab13bc413480c92edb8dc45d539a6', 'network_id': 'fa1e4d54-7458-492c-ada5-33319c182af0', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-11-06T17:59:39Z', 'updated_at': '2020-11-06T17:59:39Z', 'revision_number': 0, 'project_id': '884ab13bc413480c92edb8dc45d539a6'}, router: {'id': 'cb619f8a-527f-4128-9ee8-7429ab354e39', 'name': 'tempest-ServerActionsV216RbacTest-2120824806-router', 'tenant_id': '884ab13bc413480c92edb8dc45d539a6', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.28'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::128'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-11-06T17:59:39Z', 'updated_at': '2020-11-06T17:59:40Z', 'revision_number': 3, 'project_id': '884ab13bc413480c92edb8dc45d539a6'} _clear_isolated_net_resources /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/dynamic_creds.py:418 2020-11-06 17:59:59.600 40 INFO tempest.lib.common.rest_client [req-d0487dd3-203f-458a-bd22-b78dc270f4e9 ] Request (ServerConsolesV26RbacTest:tearDownClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/a1b0288e-5076-4f35-bcce-94897c26310b/remove_router_interface 3.753s 2020-11-06 17:59:59.600 40 DEBUG tempest.lib.common.rest_client [req-d0487dd3-203f-458a-bd22-b78dc270f4e9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "863312ca-8de5-48fd-9662-ee4644e1a73b"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-d0487dd3-203f-458a-bd22-b78dc270f4e9', 'date': 'Fri, 06 Nov 2020 17:59:59 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/a1b0288e-5076-4f35-bcce-94897c26310b/remove_router_interface'} Body: b'{"id": "a1b0288e-5076-4f35-bcce-94897c26310b", "tenant_id": "11d8c5c0046c4310b47e5021f23c2165", "port_id": "188314c6-f86e-43b3-b3f6-1bafb04d1e1d", "network_id": "4c4c312b-b76e-4284-8638-ec9780811557", "subnet_id": "863312ca-8de5-48fd-9662-ee4644e1a73b", "subnet_ids": ["863312ca-8de5-48fd-9662-ee4644e1a73b"]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:01.835 37 INFO tempest.lib.common.rest_client [req-f81e6c5a-30a6-4d53-991e-8c50f9c41654 ] Request (ServerActionsV216RbacTest:tearDownClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/cb619f8a-527f-4128-9ee8-7429ab354e39/remove_router_interface 2.252s 2020-11-06 18:00:01.835 37 DEBUG tempest.lib.common.rest_client [req-f81e6c5a-30a6-4d53-991e-8c50f9c41654 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "778ea396-6658-4ce8-98b8-390b7d5ccc39"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-f81e6c5a-30a6-4d53-991e-8c50f9c41654', 'date': 'Fri, 06 Nov 2020 18:00:01 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/cb619f8a-527f-4128-9ee8-7429ab354e39/remove_router_interface'} Body: b'{"id": "cb619f8a-527f-4128-9ee8-7429ab354e39", "tenant_id": "884ab13bc413480c92edb8dc45d539a6", "port_id": "b1011dc1-9963-49f4-9ff3-60dddfe13bda", "network_id": "fa1e4d54-7458-492c-ada5-33319c182af0", "subnet_id": "778ea396-6658-4ce8-98b8-390b7d5ccc39", "subnet_ids": ["778ea396-6658-4ce8-98b8-390b7d5ccc39"]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:01.977 39 INFO tempest.lib.common.rest_client [req-bc030454-618a-46a4-80aa-b2ef8b356835 ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 1.794s 2020-11-06 18:00:01.978 39 DEBUG tempest.lib.common.rest_client [req-bc030454-618a-46a4-80aa-b2ef8b356835 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1729', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bc030454-618a-46a4-80aa-b2ef8b356835', 'x-compute-request-id': 'req-bc030454-618a-46a4-80aa-b2ef8b356835', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T17:59:59Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T17:59:41.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_finish", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:01.991 39 INFO tempest.common.waiters [-] State transition "RESIZE/resize_migrated" ==> "RESIZE/resize_finish" after 13 second wait 2020-11-06 18:00:02.092 40 INFO tempest.lib.common.rest_client [req-1f39fed4-0571-4232-9ada-29e163462575 ] Request (ServerConsolesV26RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/a1b0288e-5076-4f35-bcce-94897c26310b 2.490s 2020-11-06 18:00:02.093 40 DEBUG tempest.lib.common.rest_client [req-1f39fed4-0571-4232-9ada-29e163462575 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-1f39fed4-0571-4232-9ada-29e163462575', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:00:02 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/a1b0288e-5076-4f35-bcce-94897c26310b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:02.530 40 INFO tempest.lib.common.rest_client [req-2e42d71f-c26e-4782-97d8-5a02e9859ee3 ] Request (ServerConsolesV26RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/863312ca-8de5-48fd-9662-ee4644e1a73b 0.436s 2020-11-06 18:00:02.530 40 DEBUG tempest.lib.common.rest_client [req-2e42d71f-c26e-4782-97d8-5a02e9859ee3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-2e42d71f-c26e-4782-97d8-5a02e9859ee3', 'date': 'Fri, 06 Nov 2020 18:00:02 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/863312ca-8de5-48fd-9662-ee4644e1a73b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:02.818 38 INFO tempest.lib.common.rest_client [req-a2d64c0d-8b0b-48f4-8daf-af0bdb75abaf ] Request (ServerActionsV214RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/b4b20f70-fd5d-47b3-bf94-9cb1169f3fb4 3.651s 2020-11-06 18:00:02.818 38 DEBUG tempest.lib.common.rest_client [req-a2d64c0d-8b0b-48f4-8daf-af0bdb75abaf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-a2d64c0d-8b0b-48f4-8daf-af0bdb75abaf', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:00:02 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/b4b20f70-fd5d-47b3-bf94-9cb1169f3fb4'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:03.186 37 INFO tempest.lib.common.rest_client [req-aed908bc-ac07-4374-952d-b2bda57b8ab9 ] Request (ServerActionsV216RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/cb619f8a-527f-4128-9ee8-7429ab354e39 1.350s 2020-11-06 18:00:03.187 37 DEBUG tempest.lib.common.rest_client [req-aed908bc-ac07-4374-952d-b2bda57b8ab9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-aed908bc-ac07-4374-952d-b2bda57b8ab9', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:00:03 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/cb619f8a-527f-4128-9ee8-7429ab354e39'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:03.221 40 INFO tempest.lib.common.rest_client [req-a32b03c0-d41b-4a76-87b5-40675b1619a2 ] Request (ServerConsolesV26RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/4c4c312b-b76e-4284-8638-ec9780811557 0.690s 2020-11-06 18:00:03.222 40 DEBUG tempest.lib.common.rest_client [req-a32b03c0-d41b-4a76-87b5-40675b1619a2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-a32b03c0-d41b-4a76-87b5-40675b1619a2', 'date': 'Fri, 06 Nov 2020 18:00:03 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/4c4c312b-b76e-4284-8638-ec9780811557'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:03.261 39 INFO tempest.lib.common.rest_client [req-2b86abd2-c345-4ca7-9299-2de305a187a2 ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.268s 2020-11-06 18:00:03.261 39 DEBUG tempest.lib.common.rest_client [req-2b86abd2-c345-4ca7-9299-2de305a187a2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2b86abd2-c345-4ca7-9299-2de305a187a2', 'x-compute-request-id': 'req-2b86abd2-c345-4ca7-9299-2de305a187a2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:00:02Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:02.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:03.273 39 INFO tempest.common.waiters [-] State transition "RESIZE/resize_finish" ==> "VERIFY_RESIZE/None" after 15 second wait 2020-11-06 18:00:03.350 40 INFO tempest.lib.common.rest_client [req-6bb621f1-8aa3-48f3-96b7-ecbc845feffd ] Request (ServerConsolesV26RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/4f96bc7b3083411387237edc9b80812d 0.127s 2020-11-06 18:00:03.350 40 DEBUG tempest.lib.common.rest_client [req-6bb621f1-8aa3-48f3-96b7-ecbc845feffd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6bb621f1-8aa3-48f3-96b7-ecbc845feffd', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/4f96bc7b3083411387237edc9b80812d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:03.396 40 INFO tempest.lib.common.rest_client [req-b7e64df7-d460-46b3-87bb-3bf42954ec4b ] Request (ServerConsolesV26RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=11d8c5c0046c4310b47e5021f23c2165&name=default 0.045s 2020-11-06 18:00:03.396 40 DEBUG tempest.lib.common.rest_client [req-b7e64df7-d460-46b3-87bb-3bf42954ec4b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-b7e64df7-d460-46b3-87bb-3bf42954ec4b', 'date': 'Fri, 06 Nov 2020 18:00:03 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=11d8c5c0046c4310b47e5021f23c2165&name=default'} Body: b'{"security_groups": [{"id": "f636f183-75e4-44b1-b67a-0a3058561dbd", "name": "default", "stateful": true, "tenant_id": "11d8c5c0046c4310b47e5021f23c2165", "description": "Default security group", "security_group_rules": [{"id": "20633525-3937-4c07-9434-9c3ddcab5a68", "tenant_id": "11d8c5c0046c4310b47e5021f23c2165", "security_group_id": "f636f183-75e4-44b1-b67a-0a3058561dbd", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:59:30Z", "updated_at": "2020-11-06T17:59:30Z", "revision_number": 0, "project_id": "11d8c5c0046c4310b47e5021f23c2165"}, {"id": "6078a58b-f1ac-4c92-b739-b28575e1a62f", "tenant_id": "11d8c5c0046c4310b47e5021f23c2165", "security_group_id": "f636f183-75e4-44b1-b67a-0a3058561dbd", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:59:30Z", "updated_at": "2020-11-06T17:59:30Z", "revision_number": 0, "project_id": "11d8c5c0046c4310b47e5021f23c2165"}, {"id": "a9b6d1a2-9252-418a-8f12-2fe7d04990ee", "tenant_id": "11d8c5c0046c4310b47e5021f23c2165", "security_group_id": "f636f183-75e4-44b1-b67a-0a3058561dbd", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "f636f183-75e4-44b1-b67a-0a3058561dbd", "description": null, "tags": [], "created_at": "2020-11-06T17:59:30Z", "updated_at": "2020-11-06T17:59:30Z", "revision_number": 0, "project_id": "11d8c5c0046c4310b47e5021f23c2165"}, {"id": "b5c51dd0-a97f-4ebb-8829-283475271fc3", "tenant_id": "11d8c5c0046c4310b47e5021f23c2165", "security_group_id": "f636f183-75e4-44b1-b67a-0a3058561dbd", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "f636f183-75e4-44b1-b67a-0a3058561dbd", "description": null, "tags": [], "created_at": "2020-11-06T17:59:30Z", "updated_at": "2020-11-06T17:59:30Z", "revision_number": 0, "project_id": "11d8c5c0046c4310b47e5021f23c2165"}], "tags": [], "created_at": "2020-11-06T17:59:30Z", "updated_at": "2020-11-06T17:59:30Z", "revision_number": 1, "project_id": "11d8c5c0046c4310b47e5021f23c2165"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:03.468 39 INFO tempest.lib.common.rest_client [req-1e5d204c-21c9-4541-93eb-d6985bf338b8 ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.194s 2020-11-06 18:00:03.468 39 DEBUG tempest.lib.common.rest_client [req-1e5d204c-21c9-4541-93eb-d6985bf338b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1e5d204c-21c9-4541-93eb-d6985bf338b8', 'x-compute-request-id': 'req-1e5d204c-21c9-4541-93eb-d6985bf338b8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:00:02Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:02.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:03.585 39 INFO tempest.lib.common.rest_client [req-d0980bf3-6ca1-4f8b-9f0e-16f42c8436ba ] Request (ServerActionsRbacTest:_run_cleanups): 204 POST http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf/action 0.101s 2020-11-06 18:00:03.585 39 DEBUG tempest.lib.common.rest_client [req-d0980bf3-6ca1-4f8b-9f0e-16f42c8436ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"confirmResize": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d0980bf3-6ca1-4f8b-9f0e-16f42c8436ba', 'x-compute-request-id': 'req-d0980bf3-6ca1-4f8b-9f0e-16f42c8436ba', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:03.594 38 INFO tempest.lib.common.rest_client [req-c108a22f-ce3f-49dc-a8c0-ed5d936c764f ] Request (ServerActionsV214RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/b4e2b597-747f-4552-b0d8-a5cc773c8dac 0.775s 2020-11-06 18:00:03.594 38 DEBUG tempest.lib.common.rest_client [req-c108a22f-ce3f-49dc-a8c0-ed5d936c764f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-c108a22f-ce3f-49dc-a8c0-ed5d936c764f', 'date': 'Fri, 06 Nov 2020 18:00:03 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/b4e2b597-747f-4552-b0d8-a5cc773c8dac'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:03.667 37 INFO tempest.lib.common.rest_client [req-235380fc-83ff-4474-bf96-c184a0ba1e63 ] Request (ServerActionsV216RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/778ea396-6658-4ce8-98b8-390b7d5ccc39 0.479s 2020-11-06 18:00:03.668 37 DEBUG tempest.lib.common.rest_client [req-235380fc-83ff-4474-bf96-c184a0ba1e63 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-235380fc-83ff-4474-bf96-c184a0ba1e63', 'date': 'Fri, 06 Nov 2020 18:00:03 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/778ea396-6658-4ce8-98b8-390b7d5ccc39'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:03.716 40 INFO tempest.lib.common.rest_client [req-f44a618e-109b-4267-b298-2dbf5c3fe4b6 ] Request (ServerConsolesV26RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/f636f183-75e4-44b1-b67a-0a3058561dbd 0.318s 2020-11-06 18:00:03.717 40 DEBUG tempest.lib.common.rest_client [req-f44a618e-109b-4267-b298-2dbf5c3fe4b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-f44a618e-109b-4267-b298-2dbf5c3fe4b6', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:00:03 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/f636f183-75e4-44b1-b67a-0a3058561dbd'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:03.880 40 INFO tempest.lib.common.rest_client [req-211f726b-b7c0-4e2b-8910-6bcf7fa2a911 ] Request (ServerConsolesV26RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/11d8c5c0046c4310b47e5021f23c2165 0.162s 2020-11-06 18:00:03.880 40 DEBUG tempest.lib.common.rest_client [req-211f726b-b7c0-4e2b-8910-6bcf7fa2a911 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-211f726b-b7c0-4e2b-8910-6bcf7fa2a911', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/11d8c5c0046c4310b47e5021f23c2165'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:03.964 40 INFO tempest.lib.common.rest_client [req-3ffdcd9e-7563-42a3-b1b5-2499d0883295 ] Request (ServerGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.080s 2020-11-06 18:00:03.965 40 DEBUG tempest.lib.common.rest_client [req-3ffdcd9e-7563-42a3-b1b5-2499d0883295 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3ffdcd9e-7563-42a3-b1b5-2499d0883295', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["S-r7eQj4RKmLFOm9EJNNZw"], "expires_at": "2020-11-06T19:00:03.000000Z", "issued_at": "2020-11-06T18:00:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:03.974 39 INFO tempest.lib.common.rest_client [req-6a6a36df-5ff2-424d-a8fa-7a73bedbe9f2 ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.387s 2020-11-06 18:00:03.974 39 DEBUG tempest.lib.common.rest_client [req-6a6a36df-5ff2-424d-a8fa-7a73bedbe9f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6a6a36df-5ff2-424d-a8fa-7a73bedbe9f2', 'x-compute-request-id': 'req-6a6a36df-5ff2-424d-a8fa-7a73bedbe9f2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:00:02Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:02.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:04.008 40 INFO tempest.lib.common.rest_client [req-f9ab78c5-31a6-4f53-9e35-c51f6bacf336 ] Request (ServerGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:00:04.008 40 DEBUG tempest.lib.common.rest_client [req-f9ab78c5-31a6-4f53-9e35-c51f6bacf336 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f9ab78c5-31a6-4f53-9e35-c51f6bacf336', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["m3NPTCT5RLiABNSkG4yDKg"], "expires_at": "2020-11-06T19:00:04.000000Z", "issued_at": "2020-11-06T18:00:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:04.057 40 INFO tempest.lib.common.rest_client [req-fec31f02-7c2e-400f-804e-3646048cc7cd ] Request (ServerGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.048s 2020-11-06 18:00:04.058 40 DEBUG tempest.lib.common.rest_client [req-fec31f02-7c2e-400f-804e-3646048cc7cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fec31f02-7c2e-400f-804e-3646048cc7cd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:04.122 40 INFO tempest.lib.common.rest_client [req-58fd0fe1-af32-49a9-8fa7-b16656c8e3f9 ] Request (ServerGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.062s 2020-11-06 18:00:04.122 40 DEBUG tempest.lib.common.rest_client [req-58fd0fe1-af32-49a9-8fa7-b16656c8e3f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ServerGroupsRbacTest-490497994-desc", "domain_id": "default", "name": "tempest-ServerGroupsRbacTest-490497994"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '376', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-58fd0fe1-af32-49a9-8fa7-b16656c8e3f9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "dd2fdbe1f0274f988fb448baad203af3", "name": "tempest-ServerGroupsRbacTest-490497994", "domain_id": "default", "description": "tempest-ServerGroupsRbacTest-490497994-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/dd2fdbe1f0274f988fb448baad203af3"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:04.224 40 INFO tempest.lib.common.rest_client [req-2644c94b-59cd-47cf-abbf-b7087c231ca8 ] Request (ServerGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.100s 2020-11-06 18:00:04.225 40 DEBUG tempest.lib.common.rest_client [req-2644c94b-59cd-47cf-abbf-b7087c231ca8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ServerGroupsRbacTest-490497994", "password": "F0##fQ5oCJg@2tc", "project_id": "dd2fdbe1f0274f988fb448baad203af3", "email": "tempest-ServerGroupsRbacTest-1834168259@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '395', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2644c94b-59cd-47cf-abbf-b7087c231ca8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "dd2fdbe1f0274f988fb448baad203af3", "email": "tempest-ServerGroupsRbacTest-1834168259@example.com", "id": "b337a41608e043d384a94e12c94195c7", "name": "tempest-ServerGroupsRbacTest-490497994", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/b337a41608e043d384a94e12c94195c7"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:04.292 37 INFO tempest.lib.common.rest_client [req-305d4d22-d565-4801-a984-c83eb30397c3 ] Request (ServerActionsV216RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/fa1e4d54-7458-492c-ada5-33319c182af0 0.623s 2020-11-06 18:00:04.292 40 INFO tempest.lib.common.rest_client [req-f5e7f721-791f-414e-ab39-6947c034ec72 ] Request (ServerGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.066s 2020-11-06 18:00:04.292 37 DEBUG tempest.lib.common.rest_client [req-305d4d22-d565-4801-a984-c83eb30397c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-305d4d22-d565-4801-a984-c83eb30397c3', 'date': 'Fri, 06 Nov 2020 18:00:04 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/fa1e4d54-7458-492c-ada5-33319c182af0'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:04.293 40 DEBUG tempest.lib.common.rest_client [req-f5e7f721-791f-414e-ab39-6947c034ec72 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f5e7f721-791f-414e-ab39-6947c034ec72', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:04.345 40 INFO tempest.lib.common.rest_client [req-97d4a5c4-14aa-4096-a326-ee7f19e3cb3e ] Request (ServerGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.051s 2020-11-06 18:00:04.346 40 DEBUG tempest.lib.common.rest_client [req-97d4a5c4-14aa-4096-a326-ee7f19e3cb3e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-97d4a5c4-14aa-4096-a326-ee7f19e3cb3e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:04.434 40 INFO tempest.lib.common.rest_client [req-4d2da647-3aee-450d-adba-39ba7d823394 ] Request (ServerGroupsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/dd2fdbe1f0274f988fb448baad203af3/users/b337a41608e043d384a94e12c94195c7/roles/72a4576c553448cd941b052c1ca0cf2d 0.087s 2020-11-06 18:00:04.434 40 DEBUG tempest.lib.common.rest_client [req-4d2da647-3aee-450d-adba-39ba7d823394 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4d2da647-3aee-450d-adba-39ba7d823394', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/dd2fdbe1f0274f988fb448baad203af3/users/b337a41608e043d384a94e12c94195c7/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:04.434 40 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerGroupsRbacTest-490497994', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'dd2fdbe1f0274f988fb448baad203af3', 'project_name': 'tempest-ServerGroupsRbacTest-490497994', 'tenant_id': 'dd2fdbe1f0274f988fb448baad203af3', 'tenant_name': 'tempest-ServerGroupsRbacTest-490497994', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'b337a41608e043d384a94e12c94195c7'}, Network: None, Subnet: None, Router: None 2020-11-06 18:00:04.435 40 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerGroupsRbacTest-490497994', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'dd2fdbe1f0274f988fb448baad203af3', 'project_name': 'tempest-ServerGroupsRbacTest-490497994', 'tenant_id': 'dd2fdbe1f0274f988fb448baad203af3', 'tenant_name': 'tempest-ServerGroupsRbacTest-490497994', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'b337a41608e043d384a94e12c94195c7'}, Network: None, Subnet: None, Router: None 2020-11-06 18:00:04.445 37 INFO tempest.lib.common.rest_client [req-d8cb694f-cdb9-40e3-a8f3-c400e88a1a90 ] Request (ServerActionsV216RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/8c55d99458a44d07a7d6d6c1d923b979 0.152s 2020-11-06 18:00:04.445 37 DEBUG tempest.lib.common.rest_client [req-d8cb694f-cdb9-40e3-a8f3-c400e88a1a90 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d8cb694f-cdb9-40e3-a8f3-c400e88a1a90', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/8c55d99458a44d07a7d6d6c1d923b979'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:04.512 37 INFO tempest.lib.common.rest_client [req-b1f1d82f-a98c-498c-9b51-45e4c85e5d00 ] Request (ServerActionsV216RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=884ab13bc413480c92edb8dc45d539a6&name=default 0.066s 2020-11-06 18:00:04.513 37 DEBUG tempest.lib.common.rest_client [req-b1f1d82f-a98c-498c-9b51-45e4c85e5d00 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-b1f1d82f-a98c-498c-9b51-45e4c85e5d00', 'date': 'Fri, 06 Nov 2020 18:00:04 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=884ab13bc413480c92edb8dc45d539a6&name=default'} Body: b'{"security_groups": [{"id": "857935cd-5629-4dc5-b51a-580cc17d1828", "name": "default", "stateful": true, "tenant_id": "884ab13bc413480c92edb8dc45d539a6", "description": "Default security group", "security_group_rules": [{"id": "01411dae-e643-44ac-affe-35b7e66eff3f", "tenant_id": "884ab13bc413480c92edb8dc45d539a6", "security_group_id": "857935cd-5629-4dc5-b51a-580cc17d1828", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "857935cd-5629-4dc5-b51a-580cc17d1828", "description": null, "tags": [], "created_at": "2020-11-06T17:59:39Z", "updated_at": "2020-11-06T17:59:39Z", "revision_number": 0, "project_id": "884ab13bc413480c92edb8dc45d539a6"}, {"id": "09b14f49-c9cd-4a21-bba3-7dbe96b08f28", "tenant_id": "884ab13bc413480c92edb8dc45d539a6", "security_group_id": "857935cd-5629-4dc5-b51a-580cc17d1828", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:59:39Z", "updated_at": "2020-11-06T17:59:39Z", "revision_number": 0, "project_id": "884ab13bc413480c92edb8dc45d539a6"}, {"id": "3967e12e-a773-4faa-9aab-4008e76a5938", "tenant_id": "884ab13bc413480c92edb8dc45d539a6", "security_group_id": "857935cd-5629-4dc5-b51a-580cc17d1828", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "857935cd-5629-4dc5-b51a-580cc17d1828", "description": null, "tags": [], "created_at": "2020-11-06T17:59:39Z", "updated_at": "2020-11-06T17:59:39Z", "revision_number": 0, "project_id": "884ab13bc413480c92edb8dc45d539a6"}, {"id": "9c3f0372-7713-4f40-a6c9-5a026b49702d", "tenant_id": "884ab13bc413480c92edb8dc45d539a6", "security_group_id": "857935cd-5629-4dc5-b51a-580cc17d1828", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:59:39Z", "updated_at": "2020-11-06T17:59:39Z", "revision_number": 0, "project_id": "884ab13bc413480c92edb8dc45d539a6"}], "tags": [], "created_at": "2020-11-06T17:59:39Z", "updated_at": "2020-11-06T17:59:39Z", "revision_number": 1, "project_id": "884ab13bc413480c92edb8dc45d539a6"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:04.526 38 INFO tempest.lib.common.rest_client [req-5ea26a18-40e0-4639-a81c-598377cbf567 ] Request (ServerActionsV214RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/7a042e07-577f-466d-988f-357caa1a13d2 0.931s 2020-11-06 18:00:04.526 38 DEBUG tempest.lib.common.rest_client [req-5ea26a18-40e0-4639-a81c-598377cbf567 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-5ea26a18-40e0-4639-a81c-598377cbf567', 'date': 'Fri, 06 Nov 2020 18:00:04 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/7a042e07-577f-466d-988f-357caa1a13d2'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:04.544 40 INFO tempest.lib.common.rest_client [req-ff5d07e1-c5d4-4967-b49d-f2728d3dbdba ] Request (ServerGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.101s 2020-11-06 18:00:04.545 40 DEBUG tempest.lib.common.rest_client [req-ff5d07e1-c5d4-4967-b49d-f2728d3dbdba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6569', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ff5d07e1-c5d4-4967-b49d-f2728d3dbdba', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b337a41608e043d384a94e12c94195c7", "name": "tempest-ServerGroupsRbacTest-490497994", "password_expires_at": null}, "audit_ids": ["IdRpIdxpT7KwHvzRuEafng"], "expires_at": "2020-11-06T19:00:04.000000Z", "issued_at": "2020-11-06T18:00:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "dd2fdbe1f0274f988fb448baad203af3", "name": "tempest-ServerGroupsRbacTest-490497994"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.3 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:04.633 40 INFO tempest.lib.common.rest_client [req-e876338f-0a39-4c51-9fbe-3f166846776c ] Request (ServerGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-11-06 18:00:04.633 40 DEBUG tempest.lib.common.rest_client [req-e876338f-0a39-4c51-9fbe-3f166846776c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e876338f-0a39-4c51-9fbe-3f166846776c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["0R3We8koTze7XzPzyzvOWw"], "expires_at": "2020-11-06T19:00:04.000000Z", "issued_at": "2020-11-06T18:00:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:04.651 37 INFO tempest.lib.common.rest_client [req-405dda1f-cf11-4ecb-a737-cc7a628be303 ] Request (ServerActionsV216RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/857935cd-5629-4dc5-b51a-580cc17d1828 0.137s 2020-11-06 18:00:04.652 37 DEBUG tempest.lib.common.rest_client [req-405dda1f-cf11-4ecb-a737-cc7a628be303 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-405dda1f-cf11-4ecb-a737-cc7a628be303', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:00:04 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/857935cd-5629-4dc5-b51a-580cc17d1828'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:04.683 40 INFO tempest.lib.common.rest_client [req-deca8517-6d36-4cf1-bef0-08c13f5d235f ] Request (ServerGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-11-06 18:00:04.684 40 DEBUG tempest.lib.common.rest_client [req-deca8517-6d36-4cf1-bef0-08c13f5d235f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-deca8517-6d36-4cf1-bef0-08c13f5d235f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["kBE4nT33TBaQYZs2hePYpg"], "expires_at": "2020-11-06T19:00:04.000000Z", "issued_at": "2020-11-06T18:00:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:04.699 38 INFO tempest.lib.common.rest_client [req-2606d3f8-dd5f-47fe-9d75-aace678a5241 ] Request (ServerActionsV214RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/708ffe31f5b84e24ac524aff993e8444 0.171s 2020-11-06 18:00:04.699 38 DEBUG tempest.lib.common.rest_client [req-2606d3f8-dd5f-47fe-9d75-aace678a5241 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2606d3f8-dd5f-47fe-9d75-aace678a5241', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/708ffe31f5b84e24ac524aff993e8444'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:04.754 38 INFO tempest.lib.common.rest_client [req-4764b290-f227-4d98-ad83-2b58ec09b0ca ] Request (ServerActionsV214RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=79e251c532404a07bfb394356d71a893&name=default 0.053s 2020-11-06 18:00:04.754 38 DEBUG tempest.lib.common.rest_client [req-4764b290-f227-4d98-ad83-2b58ec09b0ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-4764b290-f227-4d98-ad83-2b58ec09b0ca', 'date': 'Fri, 06 Nov 2020 18:00:04 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=79e251c532404a07bfb394356d71a893&name=default'} Body: b'{"security_groups": [{"id": "dd8d4b18-79e0-4d45-a2d8-5b6360d1d574", "name": "default", "stateful": true, "tenant_id": "79e251c532404a07bfb394356d71a893", "description": "Default security group", "security_group_rules": [{"id": "0f0dfe81-1606-459f-b783-90824124af1a", "tenant_id": "79e251c532404a07bfb394356d71a893", "security_group_id": "dd8d4b18-79e0-4d45-a2d8-5b6360d1d574", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:59:31Z", "updated_at": "2020-11-06T17:59:31Z", "revision_number": 0, "project_id": "79e251c532404a07bfb394356d71a893"}, {"id": "58145f8b-3b09-4874-a59e-42d5690decf0", "tenant_id": "79e251c532404a07bfb394356d71a893", "security_group_id": "dd8d4b18-79e0-4d45-a2d8-5b6360d1d574", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "dd8d4b18-79e0-4d45-a2d8-5b6360d1d574", "description": null, "tags": [], "created_at": "2020-11-06T17:59:31Z", "updated_at": "2020-11-06T17:59:31Z", "revision_number": 0, "project_id": "79e251c532404a07bfb394356d71a893"}, {"id": "ac513ecd-13ce-4093-b3a6-053e9b1bebb9", "tenant_id": "79e251c532404a07bfb394356d71a893", "security_group_id": "dd8d4b18-79e0-4d45-a2d8-5b6360d1d574", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:59:31Z", "updated_at": "2020-11-06T17:59:31Z", "revision_number": 0, "project_id": "79e251c532404a07bfb394356d71a893"}, {"id": "ad858bf1-7e17-465c-ab1e-07852d21a119", "tenant_id": "79e251c532404a07bfb394356d71a893", "security_group_id": "dd8d4b18-79e0-4d45-a2d8-5b6360d1d574", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "dd8d4b18-79e0-4d45-a2d8-5b6360d1d574", "description": null, "tags": [], "created_at": "2020-11-06T17:59:31Z", "updated_at": "2020-11-06T17:59:31Z", "revision_number": 0, "project_id": "79e251c532404a07bfb394356d71a893"}], "tags": [], "created_at": "2020-11-06T17:59:31Z", "updated_at": "2020-11-06T17:59:31Z", "revision_number": 1, "project_id": "79e251c532404a07bfb394356d71a893"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:04.789 40 INFO tempest.lib.common.rest_client [req-756e8a92-763b-4b9d-b479-ce7f2eb890fd ] Request (ServerGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.104s 2020-11-06 18:00:04.790 40 DEBUG tempest.lib.common.rest_client [req-756e8a92-763b-4b9d-b479-ce7f2eb890fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-756e8a92-763b-4b9d-b479-ce7f2eb890fd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:04.838 40 INFO tempest.lib.common.rest_client [req-7e1a4f6d-4900-4073-9348-3e479c952d59 ] Request (ServerGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.047s 2020-11-06 18:00:04.838 40 DEBUG tempest.lib.common.rest_client [req-7e1a4f6d-4900-4073-9348-3e479c952d59 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7e1a4f6d-4900-4073-9348-3e479c952d59', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:04.839 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:00:04.840 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:04.870 37 INFO tempest.lib.common.rest_client [req-eb6290e6-3984-48e2-b720-206adf2c7f39 ] Request (ServerActionsV216RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/884ab13bc413480c92edb8dc45d539a6 0.217s 2020-11-06 18:00:04.871 37 DEBUG tempest.lib.common.rest_client [req-eb6290e6-3984-48e2-b720-206adf2c7f39 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eb6290e6-3984-48e2-b720-206adf2c7f39', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/884ab13bc413480c92edb8dc45d539a6'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:04.871 38 INFO tempest.lib.common.rest_client [req-c4c86dba-ed99-419e-8fda-edf307683527 ] Request (ServerActionsV214RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/dd8d4b18-79e0-4d45-a2d8-5b6360d1d574 0.116s 2020-11-06 18:00:04.871 38 DEBUG tempest.lib.common.rest_client [req-c4c86dba-ed99-419e-8fda-edf307683527 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-c4c86dba-ed99-419e-8fda-edf307683527', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:00:04 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/dd8d4b18-79e0-4d45-a2d8-5b6360d1d574'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:04.935 40 INFO tempest.lib.common.rest_client [req-f6ef120f-fb84-4e9b-a67c-bb4c2a057392 ] Request (ServerGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/dd2fdbe1f0274f988fb448baad203af3/users/b337a41608e043d384a94e12c94195c7/roles 0.095s 2020-11-06 18:00:04.936 40 DEBUG tempest.lib.common.rest_client [req-f6ef120f-fb84-4e9b-a67c-bb4c2a057392 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f6ef120f-fb84-4e9b-a67c-bb4c2a057392', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/dd2fdbe1f0274f988fb448baad203af3/users/b337a41608e043d384a94e12c94195c7/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/dd2fdbe1f0274f988fb448baad203af3/users/b337a41608e043d384a94e12c94195c7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:04.960 37 INFO tempest.lib.common.rest_client [req-0270309a-c223-4292-8ba1-3ce2ef5c8a6d ] Request (MigrateServerV225RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:00:04.961 37 DEBUG tempest.lib.common.rest_client [req-0270309a-c223-4292-8ba1-3ce2ef5c8a6d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0270309a-c223-4292-8ba1-3ce2ef5c8a6d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["gAl61xVTSZalzhG6LNQ8Kw"], "expires_at": "2020-11-06T19:00:04.000000Z", "issued_at": "2020-11-06T18:00:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:05.002 37 INFO tempest.lib.common.rest_client [req-782f782b-82c1-4633-9a91-b7c1da9d4ca8 ] Request (MigrateServerV225RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:00:05.003 37 DEBUG tempest.lib.common.rest_client [req-782f782b-82c1-4633-9a91-b7c1da9d4ca8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-782f782b-82c1-4633-9a91-b7c1da9d4ca8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["D6BDtsrrQjia1JH-MM5CmA"], "expires_at": "2020-11-06T19:00:04.000000Z", "issued_at": "2020-11-06T18:00:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:05.006 40 INFO tempest.lib.common.rest_client [req-c7896201-aa01-45da-9211-68eba3f02012 ] Request (ServerGroupsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/dd2fdbe1f0274f988fb448baad203af3/users/b337a41608e043d384a94e12c94195c7/roles/72a4576c553448cd941b052c1ca0cf2d 0.069s 2020-11-06 18:00:05.007 40 DEBUG tempest.lib.common.rest_client [req-c7896201-aa01-45da-9211-68eba3f02012 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c7896201-aa01-45da-9211-68eba3f02012', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/dd2fdbe1f0274f988fb448baad203af3/users/b337a41608e043d384a94e12c94195c7/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:05.049 38 INFO tempest.lib.common.rest_client [req-1d0e8547-bdb9-4171-99db-c895f167fad4 ] Request (ServerActionsV214RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/79e251c532404a07bfb394356d71a893 0.176s 2020-11-06 18:00:05.049 38 DEBUG tempest.lib.common.rest_client [req-1d0e8547-bdb9-4171-99db-c895f167fad4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1d0e8547-bdb9-4171-99db-c895f167fad4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/79e251c532404a07bfb394356d71a893'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:05.088 38 INFO tempest.lib.common.rest_client [req-ae4933ee-e516-44f0-a010-42043f6bf751 ] Request (ServerMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:00:05.089 38 DEBUG tempest.lib.common.rest_client [req-ae4933ee-e516-44f0-a010-42043f6bf751 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ae4933ee-e516-44f0-a010-42043f6bf751', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["xWEmjWsRQhaKAZR9JBLeiw"], "expires_at": "2020-11-06T19:00:05.000000Z", "issued_at": "2020-11-06T18:00:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:05.104 37 INFO tempest.lib.common.rest_client [req-4edcbf3a-890b-44a9-aafd-f8c1af315383 ] Request (MigrateServerV225RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.100s 2020-11-06 18:00:05.105 37 DEBUG tempest.lib.common.rest_client [req-4edcbf3a-890b-44a9-aafd-f8c1af315383 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4edcbf3a-890b-44a9-aafd-f8c1af315383', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:05.118 40 INFO tempest.lib.common.rest_client [req-384bde34-3109-4028-add6-0c1d537c6b02 ] Request (ServerGroupsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/dd2fdbe1f0274f988fb448baad203af3/users/b337a41608e043d384a94e12c94195c7/roles/a629c95d64b3416fb80ae90af4f69c05 0.110s 2020-11-06 18:00:05.119 40 DEBUG tempest.lib.common.rest_client [req-384bde34-3109-4028-add6-0c1d537c6b02 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-384bde34-3109-4028-add6-0c1d537c6b02', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/dd2fdbe1f0274f988fb448baad203af3/users/b337a41608e043d384a94e12c94195c7/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:05.185 38 INFO tempest.lib.common.rest_client [req-9a84c4c5-4875-40cf-91dd-cb05905e6843 ] Request (ServerMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-11-06 18:00:05.185 38 DEBUG tempest.lib.common.rest_client [req-9a84c4c5-4875-40cf-91dd-cb05905e6843 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9a84c4c5-4875-40cf-91dd-cb05905e6843', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["Ndsz2dR1QyWjOj7Q_8MyFQ"], "expires_at": "2020-11-06T19:00:05.000000Z", "issued_at": "2020-11-06T18:00:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:05.193 39 INFO tempest.lib.common.rest_client [req-be6221a1-0af4-475f-82a5-4628e0088051 ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.200s 2020-11-06 18:00:05.193 39 DEBUG tempest.lib.common.rest_client [req-be6221a1-0af4-475f-82a5-4628e0088051 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-be6221a1-0af4-475f-82a5-4628e0088051', 'x-compute-request-id': 'req-be6221a1-0af4-475f-82a5-4628e0088051', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:00:02Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:02.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:05.239 38 INFO tempest.lib.common.rest_client [req-16a64a5a-2f53-4198-a07d-4aa2d6c561eb ] Request (ServerMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.052s 2020-11-06 18:00:05.240 38 DEBUG tempest.lib.common.rest_client [req-16a64a5a-2f53-4198-a07d-4aa2d6c561eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-16a64a5a-2f53-4198-a07d-4aa2d6c561eb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:05.260 37 INFO tempest.lib.common.rest_client [req-8103d403-2602-4c37-ba04-adab8fdc5925 ] Request (MigrateServerV225RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.154s 2020-11-06 18:00:05.260 37 DEBUG tempest.lib.common.rest_client [req-8103d403-2602-4c37-ba04-adab8fdc5925 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-MigrateServerV225RbacTest-107357711-desc", "domain_id": "default", "name": "tempest-MigrateServerV225RbacTest-107357711"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '386', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8103d403-2602-4c37-ba04-adab8fdc5925', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "e8c4ea0aa616438d84be2a246c718bc3", "name": "tempest-MigrateServerV225RbacTest-107357711", "domain_id": "default", "description": "tempest-MigrateServerV225RbacTest-107357711-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/e8c4ea0aa616438d84be2a246c718bc3"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:05.303 38 INFO tempest.lib.common.rest_client [req-de2a5bc0-4696-440b-8d85-29d183ace558 ] Request (ServerMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.063s 2020-11-06 18:00:05.304 38 DEBUG tempest.lib.common.rest_client [req-de2a5bc0-4696-440b-8d85-29d183ace558 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ServerMetadataRbacTest-600743015-desc", "domain_id": "default", "name": "tempest-ServerMetadataRbacTest-600743015"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '380', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-de2a5bc0-4696-440b-8d85-29d183ace558', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "915ccc983b9341ed85216c7d9ac7bfa7", "name": "tempest-ServerMetadataRbacTest-600743015", "domain_id": "default", "description": "tempest-ServerMetadataRbacTest-600743015-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:05.374 37 INFO tempest.lib.common.rest_client [req-7ab3bc1d-cc11-4060-b4bf-e1849c19bda8 ] Request (MigrateServerV225RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.112s 2020-11-06 18:00:05.374 37 DEBUG tempest.lib.common.rest_client [req-7ab3bc1d-cc11-4060-b4bf-e1849c19bda8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-MigrateServerV225RbacTest-107357711", "password": "S1@nG_LMBELd@br", "project_id": "e8c4ea0aa616438d84be2a246c718bc3", "email": "tempest-MigrateServerV225RbacTest-600642934@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '404', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7ab3bc1d-cc11-4060-b4bf-e1849c19bda8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "e8c4ea0aa616438d84be2a246c718bc3", "email": "tempest-MigrateServerV225RbacTest-600642934@example.com", "id": "99a9d4e6d0ca480d8f91548cce415d39", "name": "tempest-MigrateServerV225RbacTest-107357711", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/99a9d4e6d0ca480d8f91548cce415d39"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:05.423 38 INFO tempest.lib.common.rest_client [req-08823103-5221-47ca-9466-c7ba0aef23d6 ] Request (ServerMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.118s 2020-11-06 18:00:05.423 38 DEBUG tempest.lib.common.rest_client [req-08823103-5221-47ca-9466-c7ba0aef23d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ServerMetadataRbacTest-600743015", "password": "S5_vuYo7KioNdHa", "project_id": "915ccc983b9341ed85216c7d9ac7bfa7", "email": "tempest-ServerMetadataRbacTest-2108674817@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '399', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-08823103-5221-47ca-9466-c7ba0aef23d6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "915ccc983b9341ed85216c7d9ac7bfa7", "email": "tempest-ServerMetadataRbacTest-2108674817@example.com", "id": "3c1ff96f31b04e82bb3fb98702adee0b", "name": "tempest-ServerMetadataRbacTest-600743015", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/3c1ff96f31b04e82bb3fb98702adee0b"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:05.427 37 INFO tempest.lib.common.rest_client [req-7d59d716-fd83-4aee-bffa-dcc31184f5cf ] Request (MigrateServerV225RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.052s 2020-11-06 18:00:05.428 37 DEBUG tempest.lib.common.rest_client [req-7d59d716-fd83-4aee-bffa-dcc31184f5cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7d59d716-fd83-4aee-bffa-dcc31184f5cf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:05.476 37 INFO tempest.lib.common.rest_client [req-e4ac65d5-5dc1-4da6-bdc3-70377500fd04 ] Request (MigrateServerV225RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.047s 2020-11-06 18:00:05.477 37 DEBUG tempest.lib.common.rest_client [req-e4ac65d5-5dc1-4da6-bdc3-70377500fd04 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e4ac65d5-5dc1-4da6-bdc3-70377500fd04', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:05.478 38 INFO tempest.lib.common.rest_client [req-0ff22659-e81f-47e4-804a-712ca9a92e24 ] Request (ServerMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.053s 2020-11-06 18:00:05.478 38 DEBUG tempest.lib.common.rest_client [req-0ff22659-e81f-47e4-804a-712ca9a92e24 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0ff22659-e81f-47e4-804a-712ca9a92e24', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:05.529 38 INFO tempest.lib.common.rest_client [req-1c72cdb9-72de-46e9-b428-c569cc38555c ] Request (ServerMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.049s 2020-11-06 18:00:05.529 38 DEBUG tempest.lib.common.rest_client [req-1c72cdb9-72de-46e9-b428-c569cc38555c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1c72cdb9-72de-46e9-b428-c569cc38555c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:05.545 37 INFO tempest.lib.common.rest_client [req-59739a25-cbfb-4d40-bc39-ba85b25324cc ] Request (MigrateServerV225RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/e8c4ea0aa616438d84be2a246c718bc3/users/99a9d4e6d0ca480d8f91548cce415d39/roles/72a4576c553448cd941b052c1ca0cf2d 0.067s 2020-11-06 18:00:05.545 37 DEBUG tempest.lib.common.rest_client [req-59739a25-cbfb-4d40-bc39-ba85b25324cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-59739a25-cbfb-4d40-bc39-ba85b25324cc', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e8c4ea0aa616438d84be2a246c718bc3/users/99a9d4e6d0ca480d8f91548cce415d39/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:05.546 37 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-MigrateServerV225RbacTest-107357711', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'e8c4ea0aa616438d84be2a246c718bc3', 'project_name': 'tempest-MigrateServerV225RbacTest-107357711', 'tenant_id': 'e8c4ea0aa616438d84be2a246c718bc3', 'tenant_name': 'tempest-MigrateServerV225RbacTest-107357711', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '99a9d4e6d0ca480d8f91548cce415d39'}, Network: None, Subnet: None, Router: None 2020-11-06 18:00:05.546 37 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-MigrateServerV225RbacTest-107357711', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'e8c4ea0aa616438d84be2a246c718bc3', 'project_name': 'tempest-MigrateServerV225RbacTest-107357711', 'tenant_id': 'e8c4ea0aa616438d84be2a246c718bc3', 'tenant_name': 'tempest-MigrateServerV225RbacTest-107357711', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '99a9d4e6d0ca480d8f91548cce415d39'}, Network: None, Subnet: None, Router: None 2020-11-06 18:00:05.640 38 INFO tempest.lib.common.rest_client [req-bde92a96-4f51-4783-a5e0-7f7f1cfaad9b ] Request (ServerMetadataRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles/72a4576c553448cd941b052c1ca0cf2d 0.110s 2020-11-06 18:00:05.641 38 DEBUG tempest.lib.common.rest_client [req-bde92a96-4f51-4783-a5e0-7f7f1cfaad9b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bde92a96-4f51-4783-a5e0-7f7f1cfaad9b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:05.642 38 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerMetadataRbacTest-600743015', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '915ccc983b9341ed85216c7d9ac7bfa7', 'project_name': 'tempest-ServerMetadataRbacTest-600743015', 'tenant_id': '915ccc983b9341ed85216c7d9ac7bfa7', 'tenant_name': 'tempest-ServerMetadataRbacTest-600743015', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '3c1ff96f31b04e82bb3fb98702adee0b'}, Network: None, Subnet: None, Router: None 2020-11-06 18:00:05.663 37 INFO tempest.lib.common.rest_client [req-2845b405-ad90-452f-ba08-acda9a781f85 ] Request (MigrateServerV225RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.104s 2020-11-06 18:00:05.663 37 DEBUG tempest.lib.common.rest_client [req-2845b405-ad90-452f-ba08-acda9a781f85 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6579', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2845b405-ad90-452f-ba08-acda9a781f85', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "99a9d4e6d0ca480d8f91548cce415d39", "name": "tempest-MigrateServerV225RbacTest-107357711", "password_expires_at": null}, "audit_ids": ["CpL_IapBSIGS96GjmnhkWQ"], "expires_at": "2020-11-06T19:00:05.000000Z", "issued_at": "2020-11-06T18:00:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e8c4ea0aa616438d84be2a246c718bc3", "name": "tempest-MigrateServerV225RbacTest-107357711"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "ht _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:05.833 38 INFO tempest.lib.common.rest_client [req-ac8218b3-262a-43ba-a1b4-e6667cb8d253 ] Request (ServerMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.190s 2020-11-06 18:00:05.834 38 DEBUG tempest.lib.common.rest_client [req-ac8218b3-262a-43ba-a1b4-e6667cb8d253 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ac8218b3-262a-43ba-a1b4-e6667cb8d253', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["ddz60xUpR5CzPa4qbGvX7Q"], "expires_at": "2020-11-06T19:00:05.000000Z", "issued_at": "2020-11-06T18:00:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:05.851 37 INFO tempest.lib.common.rest_client [req-7e04dc3e-05b1-4ada-9b85-a493d14885df ] Request (MigrateServerV225RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.186s 2020-11-06 18:00:05.852 37 DEBUG tempest.lib.common.rest_client [req-7e04dc3e-05b1-4ada-9b85-a493d14885df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7e04dc3e-05b1-4ada-9b85-a493d14885df', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["615SAZRZTuSkkXJ0uAVfyw"], "expires_at": "2020-11-06T19:00:05.000000Z", "issued_at": "2020-11-06T18:00:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:05.897 37 INFO tempest.lib.common.rest_client [req-5bc4afbd-ef4f-443e-a435-8e2b4667c173 ] Request (MigrateServerV225RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:00:05.897 37 DEBUG tempest.lib.common.rest_client [req-5bc4afbd-ef4f-443e-a435-8e2b4667c173 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5bc4afbd-ef4f-443e-a435-8e2b4667c173', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["hjKi1OOLS1mKtIoXhxuNuA"], "expires_at": "2020-11-06T19:00:05.000000Z", "issued_at": "2020-11-06T18:00:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:05.944 37 INFO tempest.lib.common.rest_client [req-8453d467-8436-4113-98d1-c8eb4d1f750a ] Request (MigrateServerV225RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.046s 2020-11-06 18:00:05.945 37 DEBUG tempest.lib.common.rest_client [req-8453d467-8436-4113-98d1-c8eb4d1f750a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8453d467-8436-4113-98d1-c8eb4d1f750a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:05.992 37 INFO tempest.lib.common.rest_client [req-0774f503-1a31-4299-ba5a-f44679fe9f3e ] Request (MigrateServerV225RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.046s 2020-11-06 18:00:05.993 37 DEBUG tempest.lib.common.rest_client [req-0774f503-1a31-4299-ba5a-f44679fe9f3e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0774f503-1a31-4299-ba5a-f44679fe9f3e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:05.993 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:00:05.993 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:06.041 37 INFO tempest.lib.common.rest_client [req-137394bf-e592-4d2e-b811-555d8c70f723 ] Request (MigrateServerV225RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/e8c4ea0aa616438d84be2a246c718bc3/users/99a9d4e6d0ca480d8f91548cce415d39/roles 0.046s 2020-11-06 18:00:06.041 37 DEBUG tempest.lib.common.rest_client [req-137394bf-e592-4d2e-b811-555d8c70f723 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-137394bf-e592-4d2e-b811-555d8c70f723', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e8c4ea0aa616438d84be2a246c718bc3/users/99a9d4e6d0ca480d8f91548cce415d39/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e8c4ea0aa616438d84be2a246c718bc3/users/99a9d4e6d0ca480d8f91548cce415d39/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:06.101 37 INFO tempest.lib.common.rest_client [req-abebfbdb-8848-43f8-a086-7e2bb275d3a7 ] Request (MigrateServerV225RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/e8c4ea0aa616438d84be2a246c718bc3/users/99a9d4e6d0ca480d8f91548cce415d39/roles/72a4576c553448cd941b052c1ca0cf2d 0.059s 2020-11-06 18:00:06.102 37 DEBUG tempest.lib.common.rest_client [req-abebfbdb-8848-43f8-a086-7e2bb275d3a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-abebfbdb-8848-43f8-a086-7e2bb275d3a7', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e8c4ea0aa616438d84be2a246c718bc3/users/99a9d4e6d0ca480d8f91548cce415d39/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:06.203 40 INFO tempest.lib.common.rest_client [req-8b52fccb-369d-43a0-b322-290e7b09ea52 ] Request (ServerGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 18:00:06.203 40 DEBUG tempest.lib.common.rest_client [req-8b52fccb-369d-43a0-b322-290e7b09ea52 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8b52fccb-369d-43a0-b322-290e7b09ea52', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b337a41608e043d384a94e12c94195c7", "name": "tempest-ServerGroupsRbacTest-490497994", "password_expires_at": null}, "audit_ids": ["4DgMkAFBRDGHjPYssPfpLg"], "expires_at": "2020-11-06T19:00:06.000000Z", "issued_at": "2020-11-06T18:00:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "dd2fdbe1f0274f988fb448baad203af3", "name": "tempest-ServerGroupsRbacTest-490497994"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:06.206 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:00:06.207 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.207 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.208 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.209 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.209 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.210 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.210 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.211 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.211 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.212 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.212 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.213 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.213 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.214 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.214 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.215 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.215 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.216 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.216 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.217 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.218 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.218 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.219 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.219 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.219 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.220 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.220 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.222 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.222 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.223 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.223 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.224 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.224 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.225 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.226 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.226 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.227 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.227 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.228 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.228 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.229 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.229 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.230 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.230 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.231 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.231 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.232 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.232 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.233 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.233 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.234 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.234 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.235 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.235 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.236 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.236 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.237 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.238 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.238 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.239 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.240 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.240 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.241 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.241 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.242 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.242 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.243 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.243 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.244 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.244 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.245 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.245 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.246 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.246 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.247 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.248 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-server-groups:create, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:00:06.249 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:06.260 37 INFO tempest.lib.common.rest_client [req-d1ee8a63-c3cd-49f1-ad8d-0ff3e0ba4f7c ] Request (MigrateServerV225RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/e8c4ea0aa616438d84be2a246c718bc3/users/99a9d4e6d0ca480d8f91548cce415d39/roles/a629c95d64b3416fb80ae90af4f69c05 0.157s 2020-11-06 18:00:06.260 37 DEBUG tempest.lib.common.rest_client [req-d1ee8a63-c3cd-49f1-ad8d-0ff3e0ba4f7c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d1ee8a63-c3cd-49f1-ad8d-0ff3e0ba4f7c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e8c4ea0aa616438d84be2a246c718bc3/users/99a9d4e6d0ca480d8f91548cce415d39/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:06.354 38 INFO tempest.lib.common.rest_client [req-b3d93277-722f-48c9-8789-bcc7be95a4b4 ] Request (ServerMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.519s 2020-11-06 18:00:06.355 38 DEBUG tempest.lib.common.rest_client [req-b3d93277-722f-48c9-8789-bcc7be95a4b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-ServerMetadataRbacTest-1567801355-network", "tenant_id": "915ccc983b9341ed85216c7d9ac7bfa7"}} Response - Headers: {'content-type': 'application/json', 'content-length': '738', 'x-openstack-request-id': 'req-b3d93277-722f-48c9-8789-bcc7be95a4b4', 'date': 'Fri, 06 Nov 2020 18:00:06 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"baa469fe-6923-4d8f-bf23-30791ce8fab6","name":"tempest-ServerMetadataRbacTest-1567801355-network","tenant_id":"915ccc983b9341ed85216c7d9ac7bfa7","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"915ccc983b9341ed85216c7d9ac7bfa7","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":49,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:00:06Z","updated_at":"2020-11-06T18:00:06Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:06.365 40 INFO tempest.lib.common.rest_client [req-cc3c634c-4eaf-4f5e-9f1f-6c21c51c834b ] Request (ServerGroupsRbacTest:test_create_server_group): 200 GET http://172.30.13.94/identity/v3/projects/dd2fdbe1f0274f988fb448baad203af3/users/b337a41608e043d384a94e12c94195c7/roles 0.115s 2020-11-06 18:00:06.366 40 DEBUG tempest.lib.common.rest_client [req-cc3c634c-4eaf-4f5e-9f1f-6c21c51c834b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cc3c634c-4eaf-4f5e-9f1f-6c21c51c834b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/dd2fdbe1f0274f988fb448baad203af3/users/b337a41608e043d384a94e12c94195c7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/dd2fdbe1f0274f988fb448baad203af3/users/b337a41608e043d384a94e12c94195c7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:06.415 39 INFO tempest.lib.common.rest_client [req-0cd6f21d-9c17-43cd-bb2f-14980332f313 ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.205s 2020-11-06 18:00:06.416 39 DEBUG tempest.lib.common.rest_client [req-0cd6f21d-9c17-43cd-bb2f-14980332f313 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0cd6f21d-9c17-43cd-bb2f-14980332f313', 'x-compute-request-id': 'req-0cd6f21d-9c17-43cd-bb2f-14980332f313', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:00:06Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:02.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:06.428 39 INFO tempest.common.waiters [-] State transition "VERIFY_RESIZE/None" ==> "ACTIVE/None" after 3 second wait 2020-11-06 18:00:06.457 40 INFO tempest.lib.common.rest_client [req-677eab9e-a866-4fc8-b5ee-85a10fb0fbd8 ] Request (ServerGroupsRbacTest:test_create_server_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-11-06 18:00:06.458 40 DEBUG tempest.lib.common.rest_client [req-677eab9e-a866-4fc8-b5ee-85a10fb0fbd8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-677eab9e-a866-4fc8-b5ee-85a10fb0fbd8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b337a41608e043d384a94e12c94195c7", "name": "tempest-ServerGroupsRbacTest-490497994", "password_expires_at": null}, "audit_ids": ["soucNek7Rbq0osyP9Qje2A"], "expires_at": "2020-11-06T19:00:06.000000Z", "issued_at": "2020-11-06T18:00:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "dd2fdbe1f0274f988fb448baad203af3", "name": "tempest-ServerGroupsRbacTest-490497994"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:06.659 39 INFO tempest.lib.common.rest_client [req-08581e15-5ecc-4c83-a77d-e7f90e7e9965 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.217s 2020-11-06 18:00:06.660 39 DEBUG tempest.lib.common.rest_client [req-08581e15-5ecc-4c83-a77d-e7f90e7e9965 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-08581e15-5ecc-4c83-a77d-e7f90e7e9965', 'x-compute-request-id': 'req-08581e15-5ecc-4c83-a77d-e7f90e7e9965', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:00:06Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:02.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:06.672 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:00:06.673 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.673 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.674 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.674 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.674 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.675 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.675 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.676 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.676 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.676 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.676 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.677 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.677 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.677 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.678 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.678 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.678 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.678 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.679 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.679 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.679 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.680 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.680 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.680 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.680 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.681 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.681 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.681 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.682 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.682 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.682 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.682 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.683 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.683 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.683 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.683 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.684 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.684 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.684 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.685 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.685 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.685 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.685 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.686 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.686 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.686 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.687 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.687 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.688 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.688 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.688 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.689 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.689 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.689 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.690 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.690 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.690 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.690 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.691 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.691 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.692 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.692 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.692 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.693 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.693 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.693 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.693 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.694 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.694 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.694 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.695 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.695 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.695 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.695 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.696 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.697 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-create-backup, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:00:06.698 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:06.724 40 INFO tempest.lib.common.rest_client [req-924a4e45-75ac-4b41-8c3a-5b7fbc56192b ] Request (ServerGroupsRbacTest:test_create_server_group): 200 POST http://172.30.13.94/compute/v2.1/os-server-groups 0.265s 2020-11-06 18:00:06.724 40 DEBUG tempest.lib.common.rest_client [req-924a4e45-75ac-4b41-8c3a-5b7fbc56192b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server_group": {"name": "tempest-ServerGroupsRbacTest-Server-Group-1693177862", "policies": ["affinity"]}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '185', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-924a4e45-75ac-4b41-8c3a-5b7fbc56192b', 'x-compute-request-id': 'req-924a4e45-75ac-4b41-8c3a-5b7fbc56192b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-server-groups'} Body: b'{"server_group": {"id": "a059d418-8391-442a-9904-39e22567b9ea", "name": "tempest-ServerGroupsRbacTest-Server-Group-1693177862", "policies": ["affinity"], "metadata": {}, "members": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:06.728 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:06.756 39 INFO tempest.lib.common.rest_client [req-f466ece0-2032-47fe-91ea-59aaf5db957d ] Request (ServerActionsRbacTest:test_create_backup): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.058s 2020-11-06 18:00:06.757 39 DEBUG tempest.lib.common.rest_client [req-f466ece0-2032-47fe-91ea-59aaf5db957d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f466ece0-2032-47fe-91ea-59aaf5db957d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:06.782 40 INFO tempest.lib.common.rest_client [req-54a86445-ea38-4f8f-b3e7-59b7553edabd ] Request (ServerGroupsRbacTest:test_create_server_group): 200 GET http://172.30.13.94/identity/v3/projects/dd2fdbe1f0274f988fb448baad203af3/users/b337a41608e043d384a94e12c94195c7/roles 0.053s 2020-11-06 18:00:06.783 40 DEBUG tempest.lib.common.rest_client [req-54a86445-ea38-4f8f-b3e7-59b7553edabd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-54a86445-ea38-4f8f-b3e7-59b7553edabd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/dd2fdbe1f0274f988fb448baad203af3/users/b337a41608e043d384a94e12c94195c7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/dd2fdbe1f0274f988fb448baad203af3/users/b337a41608e043d384a94e12c94195c7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:06.814 40 INFO tempest.lib.common.rest_client [req-c75cd73b-4711-4fe9-ac0f-47b566debcfe ] Request (ServerGroupsRbacTest:test_create_server_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:00:06.816 40 DEBUG tempest.lib.common.rest_client [req-c75cd73b-4711-4fe9-ac0f-47b566debcfe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c75cd73b-4711-4fe9-ac0f-47b566debcfe', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b337a41608e043d384a94e12c94195c7", "name": "tempest-ServerGroupsRbacTest-490497994", "password_expires_at": null}, "audit_ids": ["NLuKJSJXQL2T9y1j5maDeg"], "expires_at": "2020-11-06T19:00:06.000000Z", "issued_at": "2020-11-06T18:00:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "dd2fdbe1f0274f988fb448baad203af3", "name": "tempest-ServerGroupsRbacTest-490497994"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:06.821 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:00:06.822 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.823 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.823 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.824 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.825 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.826 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.827 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.828 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.828 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.829 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.830 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.830 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.830 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.831 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.831 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.831 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.832 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.832 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.832 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.832 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.833 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.833 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.833 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.834 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.834 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.834 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.835 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.835 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.835 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.835 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.836 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.836 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.836 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.837 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.837 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.837 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.837 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.838 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.838 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.838 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.839 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.839 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.839 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.839 39 INFO tempest.lib.common.rest_client [req-7a886645-f2b7-4c38-b559-c2265818c26d ] Request (ServerActionsRbacTest:test_create_backup): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 18:00:06.840 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.840 39 DEBUG tempest.lib.common.rest_client [req-7a886645-f2b7-4c38-b559-c2265818c26d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7a886645-f2b7-4c38-b559-c2265818c26d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["qApTGDNVTPaQ5pXddAeOTA"], "expires_at": "2020-11-06T19:00:06.000000Z", "issued_at": "2020-11-06T18:00:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:06.840 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.841 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.841 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.842 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.842 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.842 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.843 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.843 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.843 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.843 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.844 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.844 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.844 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.845 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.845 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.845 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.846 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.846 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.846 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.847 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.847 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.847 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.848 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.848 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.848 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.848 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.849 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.849 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.849 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.850 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.850 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:06.851 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-server-groups:delete, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:00:06.919 38 INFO tempest.lib.common.rest_client [req-841b2b8a-8beb-4601-9116-fbf53a801454 ] Request (ServerMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.563s 2020-11-06 18:00:06.920 38 DEBUG tempest.lib.common.rest_client [req-841b2b8a-8beb-4601-9116-fbf53a801454 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "baa469fe-6923-4d8f-bf23-30791ce8fab6", "cidr": "192.168.120.0/28", "name": "tempest-ServerMetadataRbacTest-1567801355-subnet", "tenant_id": "915ccc983b9341ed85216c7d9ac7bfa7", "enable_dhcp": false, "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '710', 'x-openstack-request-id': 'req-841b2b8a-8beb-4601-9116-fbf53a801454', 'date': 'Fri, 06 Nov 2020 18:00:06 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"2e54fc0f-3b7c-44cc-bfb3-df05984efd40","name":"tempest-ServerMetadataRbacTest-1567801355-subnet","tenant_id":"915ccc983b9341ed85216c7d9ac7bfa7","network_id":"baa469fe-6923-4d8f-bf23-30791ce8fab6","ip_version":4,"subnetpool_id":null,"enable_dhcp":false,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-11-06T18:00:06Z","updated_at":"2020-11-06T18:00:06Z","revision_number":0,"project_id":"915ccc983b9341ed85216c7d9ac7bfa7"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:07.019 40 INFO tempest.lib.common.rest_client [req-5072f1ec-923e-4fb8-9445-8254a38b2934 ] Request (ServerGroupsRbacTest:test_delete_server_group): 200 POST http://172.30.13.94/compute/v2.1/os-server-groups 0.168s 2020-11-06 18:00:07.020 40 DEBUG tempest.lib.common.rest_client [req-5072f1ec-923e-4fb8-9445-8254a38b2934 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server_group": {"name": "tempest-ServerGroupsRbacTest-Server-Group-1248208301", "policies": ["affinity"]}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '185', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5072f1ec-923e-4fb8-9445-8254a38b2934', 'x-compute-request-id': 'req-5072f1ec-923e-4fb8-9445-8254a38b2934', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-server-groups'} Body: b'{"server_group": {"id": "cc36510b-818c-4fd8-b477-f2eea35e8272", "name": "tempest-ServerGroupsRbacTest-Server-Group-1248208301", "policies": ["affinity"], "metadata": {}, "members": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:07.024 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:07.076 40 INFO tempest.lib.common.rest_client [req-a5606c65-4580-4f15-9dbc-6485e5ff5fe4 ] Request (ServerGroupsRbacTest:test_delete_server_group): 200 GET http://172.30.13.94/identity/v3/projects/dd2fdbe1f0274f988fb448baad203af3/users/b337a41608e043d384a94e12c94195c7/roles 0.051s 2020-11-06 18:00:07.077 40 DEBUG tempest.lib.common.rest_client [req-a5606c65-4580-4f15-9dbc-6485e5ff5fe4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a5606c65-4580-4f15-9dbc-6485e5ff5fe4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/dd2fdbe1f0274f988fb448baad203af3/users/b337a41608e043d384a94e12c94195c7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/dd2fdbe1f0274f988fb448baad203af3/users/b337a41608e043d384a94e12c94195c7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:07.112 40 INFO tempest.lib.common.rest_client [req-4f044a05-a9d0-4cb7-bf06-30912c6888da ] Request (ServerGroupsRbacTest:test_delete_server_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:00:07.113 40 DEBUG tempest.lib.common.rest_client [req-4f044a05-a9d0-4cb7-bf06-30912c6888da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4f044a05-a9d0-4cb7-bf06-30912c6888da', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b337a41608e043d384a94e12c94195c7", "name": "tempest-ServerGroupsRbacTest-490497994", "password_expires_at": null}, "audit_ids": ["bI3WUUM1S5SQbIw_2Ptszw"], "expires_at": "2020-11-06T19:00:07.000000Z", "issued_at": "2020-11-06T18:00:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "dd2fdbe1f0274f988fb448baad203af3", "name": "tempest-ServerGroupsRbacTest-490497994"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:07.235 40 INFO tempest.lib.common.rest_client [req-a162fbe5-93a0-4209-a2c8-3abca7b83f43 ] Request (ServerGroupsRbacTest:test_delete_server_group): 204 DELETE http://172.30.13.94/compute/v2.1/os-server-groups/cc36510b-818c-4fd8-b477-f2eea35e8272 0.121s 2020-11-06 18:00:07.236 40 DEBUG tempest.lib.common.rest_client [req-a162fbe5-93a0-4209-a2c8-3abca7b83f43 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a162fbe5-93a0-4209-a2c8-3abca7b83f43', 'x-compute-request-id': 'req-a162fbe5-93a0-4209-a2c8-3abca7b83f43', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/os-server-groups/cc36510b-818c-4fd8-b477-f2eea35e8272'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:07.236 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:07.281 39 INFO tempest.lib.common.rest_client [req-4fc1f583-9c57-4047-92b8-67e1c3f972dd ] Request (ServerActionsRbacTest:test_create_backup): 202 POST http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf/action 0.440s 2020-11-06 18:00:07.281 39 DEBUG tempest.lib.common.rest_client [req-4fc1f583-9c57-4047-92b8-67e1c3f972dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"createBackup": {"backup_type": "daily", "rotation": 1, "name": "tempest-ServerActionsRbacTest-Backup-143992893"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'content-length': '0', 'location': 'http://172.30.13.94/compute/v2.1/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4fc1f583-9c57-4047-92b8-67e1c3f972dd', 'x-compute-request-id': 'req-4fc1f583-9c57-4047-92b8-67e1c3f972dd', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:07.282 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:07.285 40 INFO tempest.lib.common.rest_client [req-0d4e6cd2-6898-426b-821f-b798a5adad45 ] Request (ServerGroupsRbacTest:test_delete_server_group): 200 GET http://172.30.13.94/identity/v3/projects/dd2fdbe1f0274f988fb448baad203af3/users/b337a41608e043d384a94e12c94195c7/roles 0.048s 2020-11-06 18:00:07.286 40 DEBUG tempest.lib.common.rest_client [req-0d4e6cd2-6898-426b-821f-b798a5adad45 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0d4e6cd2-6898-426b-821f-b798a5adad45', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/dd2fdbe1f0274f988fb448baad203af3/users/b337a41608e043d384a94e12c94195c7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/dd2fdbe1f0274f988fb448baad203af3/users/b337a41608e043d384a94e12c94195c7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:07.325 40 INFO tempest.lib.common.rest_client [req-356fccc3-4833-4546-b647-07a2d3976ead ] Request (ServerGroupsRbacTest:test_delete_server_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:00:07.325 40 DEBUG tempest.lib.common.rest_client [req-356fccc3-4833-4546-b647-07a2d3976ead ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-356fccc3-4833-4546-b647-07a2d3976ead', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b337a41608e043d384a94e12c94195c7", "name": "tempest-ServerGroupsRbacTest-490497994", "password_expires_at": null}, "audit_ids": ["VqoJtlutTl6usMiHulvMBw"], "expires_at": "2020-11-06T19:00:07.000000Z", "issued_at": "2020-11-06T18:00:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "dd2fdbe1f0274f988fb448baad203af3", "name": "tempest-ServerGroupsRbacTest-490497994"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:07.331 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:00:07.332 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.333 39 INFO tempest.lib.common.rest_client [req-5d93fbf3-792c-4b3c-9a5f-71b5def732bc ] Request (ServerActionsRbacTest:test_create_backup): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.050s 2020-11-06 18:00:07.333 39 DEBUG tempest.lib.common.rest_client [req-5d93fbf3-792c-4b3c-9a5f-71b5def732bc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5d93fbf3-792c-4b3c-9a5f-71b5def732bc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:07.333 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.334 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.334 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.335 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.336 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.337 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.337 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.338 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.338 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.339 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.339 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.339 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.340 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.340 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.341 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.341 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.341 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.342 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.342 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.342 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.343 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.343 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.343 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.343 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.344 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.344 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.344 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.344 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.345 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.345 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.345 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.346 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.346 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.346 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.346 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.347 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.347 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.347 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.347 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.348 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.348 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.348 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.349 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.349 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.349 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.350 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.350 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.350 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.351 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.351 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.351 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.351 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.351 37 INFO tempest.lib.common.rest_client [req-b2fdbf63-ca85-436c-8505-114b7aaa1c4e ] Request (MigrateServerV225RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-11-06 18:00:07.352 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.352 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.352 37 DEBUG tempest.lib.common.rest_client [req-b2fdbf63-ca85-436c-8505-114b7aaa1c4e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b2fdbf63-ca85-436c-8505-114b7aaa1c4e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "99a9d4e6d0ca480d8f91548cce415d39", "name": "tempest-MigrateServerV225RbacTest-107357711", "password_expires_at": null}, "audit_ids": ["F-DffZEbSryxgOlutDfdQg"], "expires_at": "2020-11-06T19:00:07.000000Z", "issued_at": "2020-11-06T18:00:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e8c4ea0aa616438d84be2a246c718bc3", "name": "tempest-MigrateServerV225RbacTest-107357711"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:07.352 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.353 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.353 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.353 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.354 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.354 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.354 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.355 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.355 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:00:07.355 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.355 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.356 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.356 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.356 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.356 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.356 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.356 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.357 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.357 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.357 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.357 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.357 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.358 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.358 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.358 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.358 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.359 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.359 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-server-groups:index, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:00:07.360 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:07.360 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.360 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.361 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.361 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.362 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.362 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.363 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.363 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.364 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.365 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.365 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.365 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.366 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.366 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.366 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.367 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.367 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.367 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.367 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.368 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.368 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.368 39 INFO tempest.lib.common.rest_client [req-4c200739-8021-4b89-97ca-ab47e7b30548 ] Request (ServerActionsRbacTest:test_create_backup): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:00:07.368 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.369 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.369 39 DEBUG tempest.lib.common.rest_client [req-4c200739-8021-4b89-97ca-ab47e7b30548 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4c200739-8021-4b89-97ca-ab47e7b30548', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["sdRJz1OkTKGG0LPyaCvR7Q"], "expires_at": "2020-11-06T19:00:07.000000Z", "issued_at": "2020-11-06T18:00:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:07.369 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.369 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.370 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.370 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.370 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.370 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.371 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.371 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.371 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.371 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.372 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.372 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.372 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.373 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.373 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.374 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.374 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.374 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.375 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.375 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.375 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.376 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.376 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.376 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.376 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.377 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.377 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.377 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.378 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.378 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.378 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.379 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.379 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.379 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.380 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.380 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.380 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.381 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.381 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.381 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.382 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.382 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.382 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.382 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.383 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.383 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.384 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-migrate-server:migrate, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:00:07.413 40 INFO tempest.lib.common.rest_client [req-37f699e7-947a-4362-a107-5b7bd65e81c3 ] Request (ServerGroupsRbacTest:test_list_server_groups): 200 GET http://172.30.13.94/identity/v3/projects/dd2fdbe1f0274f988fb448baad203af3/users/b337a41608e043d384a94e12c94195c7/roles 0.052s 2020-11-06 18:00:07.413 40 DEBUG tempest.lib.common.rest_client [req-37f699e7-947a-4362-a107-5b7bd65e81c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-37f699e7-947a-4362-a107-5b7bd65e81c3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/dd2fdbe1f0274f988fb448baad203af3/users/b337a41608e043d384a94e12c94195c7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/dd2fdbe1f0274f988fb448baad203af3/users/b337a41608e043d384a94e12c94195c7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:07.425 37 INFO tempest.lib.common.rest_client [req-8552ece3-6310-4c6e-80c1-8e2465c905ee ] Request (MigrateServerV225RbacTest:test_cold_migration): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:00:07.426 37 DEBUG tempest.lib.common.rest_client [req-8552ece3-6310-4c6e-80c1-8e2465c905ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8552ece3-6310-4c6e-80c1-8e2465c905ee', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "99a9d4e6d0ca480d8f91548cce415d39", "name": "tempest-MigrateServerV225RbacTest-107357711", "password_expires_at": null}, "audit_ids": ["k5T2lBRKSdqhT8xs5O99AQ"], "expires_at": "2020-11-06T19:00:07.000000Z", "issued_at": "2020-11-06T18:00:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e8c4ea0aa616438d84be2a246c718bc3", "name": "tempest-MigrateServerV225RbacTest-107357711"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:07.427 37 DEBUG tempest.lib.common.fixed_network [-] (MigrateServerV225RbacTest:test_cold_migration) No valid network provided or created, defaulting to fixed_network_name get_tenant_network /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/fixed_network.py:102 2020-11-06 18:00:07.447 40 INFO tempest.lib.common.rest_client [req-3e7cace7-78d6-4c49-9279-3fb1d48aa541 ] Request (ServerGroupsRbacTest:test_list_server_groups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:00:07.447 40 DEBUG tempest.lib.common.rest_client [req-3e7cace7-78d6-4c49-9279-3fb1d48aa541 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3e7cace7-78d6-4c49-9279-3fb1d48aa541', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b337a41608e043d384a94e12c94195c7", "name": "tempest-ServerGroupsRbacTest-490497994", "password_expires_at": null}, "audit_ids": ["PDZM4jbHRG6IECx9eA1T4g"], "expires_at": "2020-11-06T19:00:07.000000Z", "issued_at": "2020-11-06T18:00:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "dd2fdbe1f0274f988fb448baad203af3", "name": "tempest-ServerGroupsRbacTest-490497994"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:07.518 39 INFO tempest.lib.common.rest_client [req-b9879bc4-d3fb-47c9-8319-0c9b72328bc0 ] Request (ServerActionsRbacTest:test_create_backup): 200 GET http://172.30.13.94/image/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0 0.148s 2020-11-06 18:00:07.519 39 DEBUG tempest.lib.common.rest_client [req-b9879bc4-d3fb-47c9-8319-0c9b72328bc0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1350', 'content-type': 'application/json', 'x-openstack-request-id': 'req-b9879bc4-d3fb-47c9-8319-0c9b72328bc0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0'} Body: b'{"backup_type": "daily", "base_image_ref": "56b368f6-9136-40ec-a04c-564d02c95e42", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_type": "backup", "instance_uuid": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "owner_project_name": "tempest-ServerActionsRbacTest-1280955528", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1280955528", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-Backup-143992893", "disk_format": "qcow2", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 1, "owner": "21ea54a8c99a458890dbfde9b6dc3e3b", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0", "created_at": "2020-11-06T18:00:07Z", "updated_at": "2020-11-06T18:00:07Z", "tags": [], "self": "/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0", "file": "/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:07.546 40 INFO tempest.lib.common.rest_client [req-b4da2ed7-fc32-45b1-b9d9-4c3a0a4b672b ] Request (ServerGroupsRbacTest:test_list_server_groups): 200 GET http://172.30.13.94/compute/v2.1/os-server-groups 0.097s 2020-11-06 18:00:07.547 40 DEBUG tempest.lib.common.rest_client [req-b4da2ed7-fc32-45b1-b9d9-4c3a0a4b672b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '188', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b4da2ed7-fc32-45b1-b9d9-4c3a0a4b672b', 'x-compute-request-id': 'req-b4da2ed7-fc32-45b1-b9d9-4c3a0a4b672b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-server-groups'} Body: b'{"server_groups": [{"id": "a059d418-8391-442a-9904-39e22567b9ea", "name": "tempest-ServerGroupsRbacTest-Server-Group-1693177862", "policies": ["affinity"], "metadata": {}, "members": []}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:07.551 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:07.610 40 INFO tempest.lib.common.rest_client [req-e597c686-2e07-4a35-a4b8-e46edc95bf60 ] Request (ServerGroupsRbacTest:test_list_server_groups): 200 GET http://172.30.13.94/identity/v3/projects/dd2fdbe1f0274f988fb448baad203af3/users/b337a41608e043d384a94e12c94195c7/roles 0.058s 2020-11-06 18:00:07.611 40 DEBUG tempest.lib.common.rest_client [req-e597c686-2e07-4a35-a4b8-e46edc95bf60 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e597c686-2e07-4a35-a4b8-e46edc95bf60', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/dd2fdbe1f0274f988fb448baad203af3/users/b337a41608e043d384a94e12c94195c7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/dd2fdbe1f0274f988fb448baad203af3/users/b337a41608e043d384a94e12c94195c7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:07.653 40 INFO tempest.lib.common.rest_client [req-8356fbd2-513f-4e7f-b022-74f973c4da6d ] Request (ServerGroupsRbacTest:test_list_server_groups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-11-06 18:00:07.654 40 DEBUG tempest.lib.common.rest_client [req-8356fbd2-513f-4e7f-b022-74f973c4da6d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8356fbd2-513f-4e7f-b022-74f973c4da6d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b337a41608e043d384a94e12c94195c7", "name": "tempest-ServerGroupsRbacTest-490497994", "password_expires_at": null}, "audit_ids": ["KA92GeueSemyLRMmYaxzKw"], "expires_at": "2020-11-06T19:00:07.000000Z", "issued_at": "2020-11-06T18:00:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "dd2fdbe1f0274f988fb448baad203af3", "name": "tempest-ServerGroupsRbacTest-490497994"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:07.658 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:00:07.659 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.660 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.660 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.661 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.662 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.663 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.663 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.664 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.664 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.664 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.665 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.665 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.665 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.666 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.666 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.666 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.667 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.667 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.667 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.668 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.668 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.668 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.669 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.669 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.669 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.670 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.670 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.670 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.671 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.671 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.671 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.672 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.672 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.672 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.672 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.673 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.673 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.673 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.674 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.674 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.674 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.674 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.675 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.675 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.675 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.676 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.676 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.676 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.677 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.677 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.677 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.677 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.678 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.678 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.678 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.679 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.679 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.679 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.680 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.680 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.681 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.681 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.681 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.682 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.682 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.682 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.682 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.683 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.683 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.683 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.684 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.684 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.684 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.684 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.685 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:07.686 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-server-groups:show, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:00:07.714 37 INFO tempest.lib.common.rest_client [req-d69d8be6-fb1b-46ab-8fa3-93868b406e76 ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94:9696/v2.0/networks 0.286s 2020-11-06 18:00:07.716 37 DEBUG tempest.lib.common.rest_client [req-d69d8be6-fb1b-46ab-8fa3-93868b406e76 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '46510', 'x-openstack-request-id': 'req-d69d8be6-fb1b-46ab-8fa3-93868b406e76', 'date': 'Fri, 06 Nov 2020 18:00:07 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"networks":[{"id":"075e5ee8-b0b4-4574-81a3-c3210ea79d71","name":"tempest-MultipleCreateTestJSON-683767456-network","tenant_id":"e8d23ff83aff43a6830320c63bdbdbd8","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["066b37a3-1660-4b06-bef8-73963e0a421c"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-10-23T17:10:54Z","updated_at":"2020-10-23T17:10:54Z","revision_number":2,"project_id":"e8d23ff83aff43a6830320c63bdbdbd8","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":32},{"id":"12b51787-2098-4ad2-adec-89879e4e9a8f","name":"tempest-PortsRbacTest-test-network-1366426066","tenant_id":"6327cab58a074eb8ad4ca78c04e95df3","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["18a37c17-6038-4819-8099-d98b8388fc25"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T17:59:49Z","updated_at":"2020-11-06T17:59:50Z","revision_number":2,"project_id":"6327cab58a074eb8ad4ca78c04e95df3","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":60},{"id":"13682051-c16d-4418-88ee-1a180a4cfc15","name":"tempest-MultipleCreateTestJSON-1346316559-network","tenant_id":"70c2f48fcaf343ceb2657220e064d31c","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["d9e144c5-9735-4711-b3a1-0d367753c7f6"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-03T09:04:32Z","updated_at":"2020-11-03T09:04:33Z","revision_number":2,"project_id":"70c2f48fcaf343ceb2657220e064d31c","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":12},{"id":"13969b3e-1458-4017-97b3-6dc65a2e1f8c","name":"tempest-MultipleCreateTestJSON-80353040-network","tenant_id":"143eaf18da0d441fb68df29b15aea9c4","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["68cade25-ac24-411c-bbea-7ccfd23b16b3"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-03T08:54:27Z","updated_at":"2020-11-03T08:54:28Z","revision_number":2,"project_id":"143eaf18da0d441fb68df29b15aea9c4","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":54},{"id":"17d7963c-2bb9-4b6c-aa1a-40527525c1b8","name":"tempest-MultipleCreateTestJSON-1331327385-network","tenant_id":"5062fdae248541b4b2745b81a243b3ac","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["dd45b7d9-27bb-43cd-94c7-f0d86d72311d"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-10-17T12:35:00Z","updated_at":"2020-10-17T12:35:00Z","revision_number":2,"project_id":"5062fdae248541b4b2745b81a243b3ac","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":42},{"id":"1c02029e-3385-4b0f-8ea8-64f5a5e9c878","name":"private","tenant_id":"76550dbb2e094ea8b53f0ef35fc93342","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["026ed5dd-3740-4409-bbff-427502b63344","91f28f82-50f3-4858-baa0-c00af5a09fba"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:07.718 37 INFO tempest.lib.common.fixed_network [-] (MigrateServerV225RbacTest:test_cold_migration) Found network {'id': '33ad4e1b-dd49-4d7f-951f-1d19a3d44add', 'name': 'patrole_reader-net_30048f18-b96b-4343-a720-1173982b59b8', 'tenant_id': 'd3e694f4541e406a85c66c35fb3f05ea', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': ['feec1188-d62d-4267-ba87-551ab4fd62c2'], 'shared': True, 'availability_zone_hints': [], 'availability_zones': ['nova'], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'router:external': False, 'description': '', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T17:57:35Z', 'updated_at': '2020-11-06T17:57:37Z', 'revision_number': 2, 'project_id': 'd3e694f4541e406a85c66c35fb3f05ea', 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 43} available for tenant 2020-11-06 18:00:07.844 40 INFO tempest.lib.common.rest_client [req-e5e53de4-3fa0-46cf-8da0-a8591f90a871 ] Request (ServerGroupsRbacTest:test_show_server_group): 200 POST http://172.30.13.94/compute/v2.1/os-server-groups 0.157s 2020-11-06 18:00:07.844 40 DEBUG tempest.lib.common.rest_client [req-e5e53de4-3fa0-46cf-8da0-a8591f90a871 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server_group": {"name": "tempest-ServerGroupsRbacTest-Server-Group-1335451515", "policies": ["affinity"]}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '185', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e5e53de4-3fa0-46cf-8da0-a8591f90a871', 'x-compute-request-id': 'req-e5e53de4-3fa0-46cf-8da0-a8591f90a871', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-server-groups'} Body: b'{"server_group": {"id": "2a5b548e-b1ba-4bec-9846-dd643a9cce34", "name": "tempest-ServerGroupsRbacTest-Server-Group-1335451515", "policies": ["affinity"], "metadata": {}, "members": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:07.848 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:07.905 40 INFO tempest.lib.common.rest_client [req-e5c9ab27-a338-46a3-a48c-f8d26ace4dd1 ] Request (ServerGroupsRbacTest:test_show_server_group): 200 GET http://172.30.13.94/identity/v3/projects/dd2fdbe1f0274f988fb448baad203af3/users/b337a41608e043d384a94e12c94195c7/roles 0.057s 2020-11-06 18:00:07.906 40 DEBUG tempest.lib.common.rest_client [req-e5c9ab27-a338-46a3-a48c-f8d26ace4dd1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e5c9ab27-a338-46a3-a48c-f8d26ace4dd1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/dd2fdbe1f0274f988fb448baad203af3/users/b337a41608e043d384a94e12c94195c7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/dd2fdbe1f0274f988fb448baad203af3/users/b337a41608e043d384a94e12c94195c7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:07.941 40 INFO tempest.lib.common.rest_client [req-5dcaf028-0f9c-47e8-9a8c-392619575386 ] Request (ServerGroupsRbacTest:test_show_server_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:00:07.941 40 DEBUG tempest.lib.common.rest_client [req-5dcaf028-0f9c-47e8-9a8c-392619575386 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5dcaf028-0f9c-47e8-9a8c-392619575386', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b337a41608e043d384a94e12c94195c7", "name": "tempest-ServerGroupsRbacTest-490497994", "password_expires_at": null}, "audit_ids": ["j97OmczEQhSMgHilbXu0jQ"], "expires_at": "2020-11-06T19:00:07.000000Z", "issued_at": "2020-11-06T18:00:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "dd2fdbe1f0274f988fb448baad203af3", "name": "tempest-ServerGroupsRbacTest-490497994"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:08.024 40 INFO tempest.lib.common.rest_client [req-5af90595-51db-49fe-a26b-aaf40985dcc1 ] Request (ServerGroupsRbacTest:test_show_server_group): 200 GET http://172.30.13.94/compute/v2.1/os-server-groups/2a5b548e-b1ba-4bec-9846-dd643a9cce34 0.082s 2020-11-06 18:00:08.024 40 DEBUG tempest.lib.common.rest_client [req-5af90595-51db-49fe-a26b-aaf40985dcc1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '185', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5af90595-51db-49fe-a26b-aaf40985dcc1', 'x-compute-request-id': 'req-5af90595-51db-49fe-a26b-aaf40985dcc1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-server-groups/2a5b548e-b1ba-4bec-9846-dd643a9cce34'} Body: b'{"server_group": {"id": "2a5b548e-b1ba-4bec-9846-dd643a9cce34", "name": "tempest-ServerGroupsRbacTest-Server-Group-1335451515", "policies": ["affinity"], "metadata": {}, "members": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:08.027 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:08.078 40 INFO tempest.lib.common.rest_client [req-4d9ca172-8732-4f8e-975e-0c5c41aae32e ] Request (ServerGroupsRbacTest:test_show_server_group): 200 GET http://172.30.13.94/identity/v3/projects/dd2fdbe1f0274f988fb448baad203af3/users/b337a41608e043d384a94e12c94195c7/roles 0.050s 2020-11-06 18:00:08.078 40 DEBUG tempest.lib.common.rest_client [req-4d9ca172-8732-4f8e-975e-0c5c41aae32e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4d9ca172-8732-4f8e-975e-0c5c41aae32e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/dd2fdbe1f0274f988fb448baad203af3/users/b337a41608e043d384a94e12c94195c7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/dd2fdbe1f0274f988fb448baad203af3/users/b337a41608e043d384a94e12c94195c7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:08.119 40 INFO tempest.lib.common.rest_client [req-8da0b32d-632b-42ad-8dbc-9ab5f252378c ] Request (ServerGroupsRbacTest:test_show_server_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:00:08.119 40 DEBUG tempest.lib.common.rest_client [req-8da0b32d-632b-42ad-8dbc-9ab5f252378c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8da0b32d-632b-42ad-8dbc-9ab5f252378c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b337a41608e043d384a94e12c94195c7", "name": "tempest-ServerGroupsRbacTest-490497994", "password_expires_at": null}, "audit_ids": ["IBBy8YPlTP2z2-317pIDRg"], "expires_at": "2020-11-06T19:00:08.000000Z", "issued_at": "2020-11-06T18:00:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "dd2fdbe1f0274f988fb448baad203af3", "name": "tempest-ServerGroupsRbacTest-490497994"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dd2fdbe1f0274f988fb448baad203af3", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:08.244 40 INFO tempest.lib.common.rest_client [req-d5aeb486-c0a6-435d-af9e-8aba326e44e9 ] Request (ServerGroupsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/compute/v2.1/os-server-groups/2a5b548e-b1ba-4bec-9846-dd643a9cce34 0.118s 2020-11-06 18:00:08.244 40 DEBUG tempest.lib.common.rest_client [req-d5aeb486-c0a6-435d-af9e-8aba326e44e9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d5aeb486-c0a6-435d-af9e-8aba326e44e9', 'x-compute-request-id': 'req-d5aeb486-c0a6-435d-af9e-8aba326e44e9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/os-server-groups/2a5b548e-b1ba-4bec-9846-dd643a9cce34'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:08.272 40 INFO tempest.lib.common.rest_client [req-01ae77dd-640d-4bec-b807-4d807d6b3228 ] Request (ServerGroupsRbacTest:tearDownClass): 404 DELETE http://172.30.13.94/compute/v2.1/os-server-groups/cc36510b-818c-4fd8-b477-f2eea35e8272 0.027s 2020-11-06 18:00:08.272 40 DEBUG tempest.lib.common.rest_client [req-01ae77dd-640d-4bec-b807-4d807d6b3228 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '117', 'x-openstack-request-id': 'req-01ae77dd-640d-4bec-b807-4d807d6b3228', 'x-compute-request-id': 'req-01ae77dd-640d-4bec-b807-4d807d6b3228', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/os-server-groups/cc36510b-818c-4fd8-b477-f2eea35e8272'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance group cc36510b-818c-4fd8-b477-f2eea35e8272 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:08.325 40 INFO tempest.lib.common.rest_client [req-d9464442-f495-4256-b96b-d7bf43dd333e ] Request (ServerGroupsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/compute/v2.1/os-server-groups/a059d418-8391-442a-9904-39e22567b9ea 0.052s 2020-11-06 18:00:08.325 40 DEBUG tempest.lib.common.rest_client [req-d9464442-f495-4256-b96b-d7bf43dd333e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d9464442-f495-4256-b96b-d7bf43dd333e', 'x-compute-request-id': 'req-d9464442-f495-4256-b96b-d7bf43dd333e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/os-server-groups/a059d418-8391-442a-9904-39e22567b9ea'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:08.471 40 INFO tempest.lib.common.rest_client [req-0c197587-2ced-4818-a249-44f3d8250d3e ] Request (ServerGroupsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/b337a41608e043d384a94e12c94195c7 0.145s 2020-11-06 18:00:08.472 40 DEBUG tempest.lib.common.rest_client [req-0c197587-2ced-4818-a249-44f3d8250d3e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0c197587-2ced-4818-a249-44f3d8250d3e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/b337a41608e043d384a94e12c94195c7'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:08.476 38 INFO tempest.lib.common.rest_client [req-3860b8e4-2442-4051-a7e3-967a0847fb30 ] Request (ServerMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/routers 1.555s 2020-11-06 18:00:08.477 38 DEBUG tempest.lib.common.rest_client [req-3860b8e4-2442-4051-a7e3-967a0847fb30 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-ServerMetadataRbacTest-1567801355-router", "tenant_id": "915ccc983b9341ed85216c7d9ac7bfa7", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea"}}} Response - Headers: {'content-type': 'application/json', 'content-length': '810', 'x-openstack-request-id': 'req-3860b8e4-2442-4051-a7e3-967a0847fb30', 'date': 'Fri, 06 Nov 2020 18:00:08 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "e00d4c88-9473-4f84-80e8-d00e6e78ceeb", "name": "tempest-ServerMetadataRbacTest-1567801355-router", "tenant_id": "915ccc983b9341ed85216c7d9ac7bfa7", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.44"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::fe"}], "enable_snat": true}, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T18:00:06Z", "updated_at": "2020-11-06T18:00:08Z", "revision_number": 3, "project_id": "915ccc983b9341ed85216c7d9ac7bfa7"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:08.536 37 INFO tempest.lib.common.rest_client [req-2e5279b9-e5f7-4f38-8c3f-467c48d70ddc ] Request (MigrateServerV225RbacTest:test_cold_migration): 202 POST http://172.30.13.94/compute/v2.1/servers 0.816s 2020-11-06 18:00:08.536 37 DEBUG tempest.lib.common.rest_client [req-2e5279b9-e5f7-4f38-8c3f-467c48d70ddc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-MigrateServerV225RbacTest-server-1545629045", "imageRef": "56b368f6-9136-40ec-a04c-564d02c95e42", "flavorRef": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "networks": [{"uuid": "33ad4e1b-dd49-4d7f-951f-1d19a3d44add"}]}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2e5279b9-e5f7-4f38-8c3f-467c48d70ddc', 'x-compute-request-id': 'req-2e5279b9-e5f7-4f38-8c3f-467c48d70ddc', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "d609c5d7-7c53-4853-a874-e6a5b166ad45", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "DBHVjsatEAZ9"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:08.551 39 INFO tempest.lib.common.rest_client [req-39b60fa7-43f3-4a60-8340-946c5246cfe7 ] Request (ServerActionsRbacTest:test_create_backup): 200 GET http://172.30.13.94/image/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0 0.029s 2020-11-06 18:00:08.552 39 DEBUG tempest.lib.common.rest_client [req-39b60fa7-43f3-4a60-8340-946c5246cfe7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1350', 'content-type': 'application/json', 'x-openstack-request-id': 'req-39b60fa7-43f3-4a60-8340-946c5246cfe7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0'} Body: b'{"backup_type": "daily", "base_image_ref": "56b368f6-9136-40ec-a04c-564d02c95e42", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_type": "backup", "instance_uuid": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "owner_project_name": "tempest-ServerActionsRbacTest-1280955528", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1280955528", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-Backup-143992893", "disk_format": "qcow2", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 1, "owner": "21ea54a8c99a458890dbfde9b6dc3e3b", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0", "created_at": "2020-11-06T18:00:07Z", "updated_at": "2020-11-06T18:00:07Z", "tags": [], "self": "/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0", "file": "/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:08.559 40 INFO tempest.lib.common.rest_client [req-f64d4c12-9067-4775-a86f-7bba05d5f0b5 ] Request (ServerGroupsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-11-06 18:00:08.560 40 DEBUG tempest.lib.common.rest_client [req-f64d4c12-9067-4775-a86f-7bba05d5f0b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f64d4c12-9067-4775-a86f-7bba05d5f0b5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["UDjjlibgQYKkUM5JFNi2hg"], "expires_at": "2020-11-06T19:00:08.000000Z", "issued_at": "2020-11-06T18:00:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:08.645 37 INFO tempest.lib.common.rest_client [req-b2d9aed1-108c-4c97-ab6d-8887294d9b10 ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45 0.104s 2020-11-06 18:00:08.646 37 DEBUG tempest.lib.common.rest_client [req-b2d9aed1-108c-4c97-ab6d-8887294d9b10 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1768', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b2d9aed1-108c-4c97-ab6d-8887294d9b10', 'x-compute-request-id': 'req-b2d9aed1-108c-4c97-ab6d-8887294d9b10', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45'} Body: b'{"server": {"id": "d609c5d7-7c53-4853-a874-e6a5b166ad45", "name": "tempest-MigrateServerV225RbacTest-server-1545629045", "status": "BUILD", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:09Z", "updated": "2020-11-06T18:00:08Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-SRV-ATTR:reservation_id": "r-fqm7bxkb", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1545629045", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": null, "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [], "host_status": "", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:08.829 40 INFO tempest.lib.common.rest_client [req-3e336177-db67-4710-90c8-c4a9146c6c8f ] Request (ServerGroupsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=dd2fdbe1f0274f988fb448baad203af3&name=default 0.267s 2020-11-06 18:00:08.829 40 DEBUG tempest.lib.common.rest_client [req-3e336177-db67-4710-90c8-c4a9146c6c8f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-3e336177-db67-4710-90c8-c4a9146c6c8f', 'date': 'Fri, 06 Nov 2020 18:00:08 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=dd2fdbe1f0274f988fb448baad203af3&name=default'} Body: b'{"security_groups": [{"id": "721f5128-0a73-482e-9a1c-67bff6d36c92", "name": "default", "stateful": true, "tenant_id": "dd2fdbe1f0274f988fb448baad203af3", "description": "Default security group", "security_group_rules": [{"id": "93b31fd5-3eb2-4dfe-99c5-66e09e98f170", "tenant_id": "dd2fdbe1f0274f988fb448baad203af3", "security_group_id": "721f5128-0a73-482e-9a1c-67bff6d36c92", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "721f5128-0a73-482e-9a1c-67bff6d36c92", "description": null, "tags": [], "created_at": "2020-11-06T18:00:08Z", "updated_at": "2020-11-06T18:00:08Z", "revision_number": 0, "project_id": "dd2fdbe1f0274f988fb448baad203af3"}, {"id": "a2b5bd9a-9d9f-45f5-a381-e90522fcff3f", "tenant_id": "dd2fdbe1f0274f988fb448baad203af3", "security_group_id": "721f5128-0a73-482e-9a1c-67bff6d36c92", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:00:08Z", "updated_at": "2020-11-06T18:00:08Z", "revision_number": 0, "project_id": "dd2fdbe1f0274f988fb448baad203af3"}, {"id": "a9b523c2-44df-457e-ade2-2b6842b70fb5", "tenant_id": "dd2fdbe1f0274f988fb448baad203af3", "security_group_id": "721f5128-0a73-482e-9a1c-67bff6d36c92", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "721f5128-0a73-482e-9a1c-67bff6d36c92", "description": null, "tags": [], "created_at": "2020-11-06T18:00:08Z", "updated_at": "2020-11-06T18:00:08Z", "revision_number": 0, "project_id": "dd2fdbe1f0274f988fb448baad203af3"}, {"id": "f0fdaf08-5802-436c-8574-9676c83e6166", "tenant_id": "dd2fdbe1f0274f988fb448baad203af3", "security_group_id": "721f5128-0a73-482e-9a1c-67bff6d36c92", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:00:08Z", "updated_at": "2020-11-06T18:00:08Z", "revision_number": 0, "project_id": "dd2fdbe1f0274f988fb448baad203af3"}], "tags": [], "created_at": "2020-11-06T18:00:08Z", "updated_at": "2020-11-06T18:00:08Z", "revision_number": 1, "project_id": "dd2fdbe1f0274f988fb448baad203af3"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:09.038 40 INFO tempest.lib.common.rest_client [req-99eb1627-e0dd-46ea-b734-c8713192f2cc ] Request (ServerGroupsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/721f5128-0a73-482e-9a1c-67bff6d36c92 0.207s 2020-11-06 18:00:09.038 40 DEBUG tempest.lib.common.rest_client [req-99eb1627-e0dd-46ea-b734-c8713192f2cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-99eb1627-e0dd-46ea-b734-c8713192f2cc', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:00:09 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/721f5128-0a73-482e-9a1c-67bff6d36c92'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:09.166 40 INFO tempest.lib.common.rest_client [req-4302a57c-45fb-43f6-88bd-a602e34a1b85 ] Request (ServerGroupsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/dd2fdbe1f0274f988fb448baad203af3 0.127s 2020-11-06 18:00:09.167 40 DEBUG tempest.lib.common.rest_client [req-4302a57c-45fb-43f6-88bd-a602e34a1b85 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4302a57c-45fb-43f6-88bd-a602e34a1b85', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/dd2fdbe1f0274f988fb448baad203af3'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:09.252 40 INFO tempest.lib.common.rest_client [req-07f44be6-2c61-47bb-949b-997b9d2ff639 ] Request (ServerTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 18:00:09.253 40 DEBUG tempest.lib.common.rest_client [req-07f44be6-2c61-47bb-949b-997b9d2ff639 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-07f44be6-2c61-47bb-949b-997b9d2ff639', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["Uy3omgj1TkSreIohAWIcTg"], "expires_at": "2020-11-06T19:00:09.000000Z", "issued_at": "2020-11-06T18:00:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:09.298 40 INFO tempest.lib.common.rest_client [req-45fdbe2b-e75f-4487-a89e-d60a28a3688d ] Request (ServerTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:00:09.299 40 DEBUG tempest.lib.common.rest_client [req-45fdbe2b-e75f-4487-a89e-d60a28a3688d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-45fdbe2b-e75f-4487-a89e-d60a28a3688d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["Zh87AVp6QCGMQ1GSync7cw"], "expires_at": "2020-11-06T19:00:09.000000Z", "issued_at": "2020-11-06T18:00:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:09.355 40 INFO tempest.lib.common.rest_client [req-a7d874a2-a8a9-44c7-aa5d-32c084ab4c34 ] Request (ServerTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.055s 2020-11-06 18:00:09.356 40 DEBUG tempest.lib.common.rest_client [req-a7d874a2-a8a9-44c7-aa5d-32c084ab4c34 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a7d874a2-a8a9-44c7-aa5d-32c084ab4c34', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:09.434 40 INFO tempest.lib.common.rest_client [req-f47000cd-0042-4bc7-b3a6-4db9e1481dd6 ] Request (ServerTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.077s 2020-11-06 18:00:09.434 40 DEBUG tempest.lib.common.rest_client [req-f47000cd-0042-4bc7-b3a6-4db9e1481dd6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ServerTagsRbacTest-1477164779-desc", "domain_id": "default", "name": "tempest-ServerTagsRbacTest-1477164779"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '374', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f47000cd-0042-4bc7-b3a6-4db9e1481dd6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "01712c7a73f8464a8cda41cbd4399038", "name": "tempest-ServerTagsRbacTest-1477164779", "domain_id": "default", "description": "tempest-ServerTagsRbacTest-1477164779-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:09.560 40 INFO tempest.lib.common.rest_client [req-209e243b-e2ae-47ee-bcca-6133edcb6fa2 ] Request (ServerTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.124s 2020-11-06 18:00:09.560 40 DEBUG tempest.lib.common.rest_client [req-209e243b-e2ae-47ee-bcca-6133edcb6fa2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ServerTagsRbacTest-1477164779", "password": "L5!MSVU8Ho4ENd=", "project_id": "01712c7a73f8464a8cda41cbd4399038", "email": "tempest-ServerTagsRbacTest-123793616@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '391', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-209e243b-e2ae-47ee-bcca-6133edcb6fa2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "01712c7a73f8464a8cda41cbd4399038", "email": "tempest-ServerTagsRbacTest-123793616@example.com", "id": "059542b3d55e4690abcee46249e52f8e", "name": "tempest-ServerTagsRbacTest-1477164779", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/059542b3d55e4690abcee46249e52f8e"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:09.584 39 INFO tempest.lib.common.rest_client [req-3f0fbed3-545c-4752-a119-5ff7c0c5d7e6 ] Request (ServerActionsRbacTest:test_create_backup): 200 GET http://172.30.13.94/image/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0 0.029s 2020-11-06 18:00:09.584 39 DEBUG tempest.lib.common.rest_client [req-3f0fbed3-545c-4752-a119-5ff7c0c5d7e6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1350', 'content-type': 'application/json', 'x-openstack-request-id': 'req-3f0fbed3-545c-4752-a119-5ff7c0c5d7e6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0'} Body: b'{"backup_type": "daily", "base_image_ref": "56b368f6-9136-40ec-a04c-564d02c95e42", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_type": "backup", "instance_uuid": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "owner_project_name": "tempest-ServerActionsRbacTest-1280955528", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1280955528", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-Backup-143992893", "disk_format": "qcow2", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 1, "owner": "21ea54a8c99a458890dbfde9b6dc3e3b", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0", "created_at": "2020-11-06T18:00:07Z", "updated_at": "2020-11-06T18:00:07Z", "tags": [], "self": "/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0", "file": "/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:09.616 40 INFO tempest.lib.common.rest_client [req-fe8ea84b-7a85-45b8-ba96-6fa45fd07aa7 ] Request (ServerTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-11-06 18:00:09.617 40 DEBUG tempest.lib.common.rest_client [req-fe8ea84b-7a85-45b8-ba96-6fa45fd07aa7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fe8ea84b-7a85-45b8-ba96-6fa45fd07aa7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:09.674 40 INFO tempest.lib.common.rest_client [req-3eed0748-a744-425a-bf54-71a85eafe2ca ] Request (ServerTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-11-06 18:00:09.674 40 DEBUG tempest.lib.common.rest_client [req-3eed0748-a744-425a-bf54-71a85eafe2ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3eed0748-a744-425a-bf54-71a85eafe2ca', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:09.751 40 INFO tempest.lib.common.rest_client [req-7a1e8fa4-fb04-4f47-ab45-f8dd515e69ba ] Request (ServerTagsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles/72a4576c553448cd941b052c1ca0cf2d 0.076s 2020-11-06 18:00:09.752 40 DEBUG tempest.lib.common.rest_client [req-7a1e8fa4-fb04-4f47-ab45-f8dd515e69ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7a1e8fa4-fb04-4f47-ab45-f8dd515e69ba', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:09.752 40 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerTagsRbacTest-1477164779', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '01712c7a73f8464a8cda41cbd4399038', 'project_name': 'tempest-ServerTagsRbacTest-1477164779', 'tenant_id': '01712c7a73f8464a8cda41cbd4399038', 'tenant_name': 'tempest-ServerTagsRbacTest-1477164779', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '059542b3d55e4690abcee46249e52f8e'}, Network: None, Subnet: None, Router: None 2020-11-06 18:00:09.836 40 INFO tempest.lib.common.rest_client [req-8dd0908c-7db7-4c8e-b2ec-840224773f3f ] Request (ServerTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 18:00:09.837 40 DEBUG tempest.lib.common.rest_client [req-8dd0908c-7db7-4c8e-b2ec-840224773f3f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8dd0908c-7db7-4c8e-b2ec-840224773f3f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["kcfsHqxAQXeIrwy38sk1iA"], "expires_at": "2020-11-06T19:00:09.000000Z", "issued_at": "2020-11-06T18:00:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:09.850 37 INFO tempest.lib.common.rest_client [req-147df57a-cf80-4215-9f6d-1d19707c91d5 ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45 0.182s 2020-11-06 18:00:09.851 37 DEBUG tempest.lib.common.rest_client [req-147df57a-cf80-4215-9f6d-1d19707c91d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1857', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-147df57a-cf80-4215-9f6d-1d19707c91d5', 'x-compute-request-id': 'req-147df57a-cf80-4215-9f6d-1d19707c91d5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45'} Body: b'{"server": {"id": "d609c5d7-7c53-4853-a874-e6a5b166ad45", "name": "tempest-MigrateServerV225RbacTest-server-1545629045", "status": "BUILD", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "2d746f1ab29074f3f929b1892e496ee0de7b1451dab2a8ca922b6c38", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:08Z", "updated": "2020-11-06T18:00:09Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-SRV-ATTR:reservation_id": "r-fqm7bxkb", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1545629045", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": null, "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:09.867 37 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/None" after 1 second wait 2020-11-06 18:00:10.344 40 INFO tempest.lib.common.rest_client [req-73dd597b-2963-4169-84f7-4ef537f11aaf ] Request (ServerTagsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.506s 2020-11-06 18:00:10.345 40 DEBUG tempest.lib.common.rest_client [req-73dd597b-2963-4169-84f7-4ef537f11aaf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-ServerTagsRbacTest-898134328-network", "tenant_id": "01712c7a73f8464a8cda41cbd4399038"}} Response - Headers: {'content-type': 'application/json', 'content-length': '733', 'x-openstack-request-id': 'req-73dd597b-2963-4169-84f7-4ef537f11aaf', 'date': 'Fri, 06 Nov 2020 18:00:10 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"faa756a0-4f6d-4c31-b9d9-1787dee4c317","name":"tempest-ServerTagsRbacTest-898134328-network","tenant_id":"01712c7a73f8464a8cda41cbd4399038","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"01712c7a73f8464a8cda41cbd4399038","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":53,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:00:10Z","updated_at":"2020-11-06T18:00:10Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:10.610 39 INFO tempest.lib.common.rest_client [req-0a491eb1-66c2-4069-8a30-0317267a3b2a ] Request (ServerActionsRbacTest:test_create_backup): 200 GET http://172.30.13.94/image/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0 0.023s 2020-11-06 18:00:10.611 39 DEBUG tempest.lib.common.rest_client [req-0a491eb1-66c2-4069-8a30-0317267a3b2a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1350', 'content-type': 'application/json', 'x-openstack-request-id': 'req-0a491eb1-66c2-4069-8a30-0317267a3b2a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0'} Body: b'{"backup_type": "daily", "base_image_ref": "56b368f6-9136-40ec-a04c-564d02c95e42", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_type": "backup", "instance_uuid": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "owner_project_name": "tempest-ServerActionsRbacTest-1280955528", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1280955528", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-Backup-143992893", "disk_format": "qcow2", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 1, "owner": "21ea54a8c99a458890dbfde9b6dc3e3b", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0", "created_at": "2020-11-06T18:00:07Z", "updated_at": "2020-11-06T18:00:07Z", "tags": [], "self": "/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0", "file": "/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:10.930 40 INFO tempest.lib.common.rest_client [req-9ec94af9-6f90-4479-a8f5-5ad11ca072a7 ] Request (ServerTagsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.584s 2020-11-06 18:00:10.931 40 DEBUG tempest.lib.common.rest_client [req-9ec94af9-6f90-4479-a8f5-5ad11ca072a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "faa756a0-4f6d-4c31-b9d9-1787dee4c317", "cidr": "192.168.120.0/28", "name": "tempest-ServerTagsRbacTest-898134328-subnet", "tenant_id": "01712c7a73f8464a8cda41cbd4399038", "enable_dhcp": false, "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '705', 'x-openstack-request-id': 'req-9ec94af9-6f90-4479-a8f5-5ad11ca072a7', 'date': 'Fri, 06 Nov 2020 18:00:10 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"d9339805-ddc2-420a-a2ba-92c7b5bd8022","name":"tempest-ServerTagsRbacTest-898134328-subnet","tenant_id":"01712c7a73f8464a8cda41cbd4399038","network_id":"faa756a0-4f6d-4c31-b9d9-1787dee4c317","ip_version":4,"subnetpool_id":null,"enable_dhcp":false,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-11-06T18:00:10Z","updated_at":"2020-11-06T18:00:10Z","revision_number":0,"project_id":"01712c7a73f8464a8cda41cbd4399038"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:11.060 37 INFO tempest.lib.common.rest_client [req-dcf2052d-bf3f-4a76-825a-ae4b4f6c8abc ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45 0.191s 2020-11-06 18:00:11.061 37 DEBUG tempest.lib.common.rest_client [req-dcf2052d-bf3f-4a76-825a-ae4b4f6c8abc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1869', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dcf2052d-bf3f-4a76-825a-ae4b4f6c8abc', 'x-compute-request-id': 'req-dcf2052d-bf3f-4a76-825a-ae4b4f6c8abc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45'} Body: b'{"server": {"id": "d609c5d7-7c53-4853-a874-e6a5b166ad45", "name": "tempest-MigrateServerV225RbacTest-server-1545629045", "status": "BUILD", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "2d746f1ab29074f3f929b1892e496ee0de7b1451dab2a8ca922b6c38", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:08Z", "updated": "2020-11-06T18:00:10Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-SRV-ATTR:reservation_id": "r-fqm7bxkb", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1545629045", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:11.078 37 INFO tempest.common.waiters [-] State transition "BUILD/None" ==> "BUILD/spawning" after 3 second wait 2020-11-06 18:00:11.637 39 INFO tempest.lib.common.rest_client [req-3399963b-35c2-47a1-b2a3-3eada50d26a1 ] Request (ServerActionsRbacTest:test_create_backup): 200 GET http://172.30.13.94/image/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0 0.023s 2020-11-06 18:00:11.637 39 DEBUG tempest.lib.common.rest_client [req-3399963b-35c2-47a1-b2a3-3eada50d26a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1350', 'content-type': 'application/json', 'x-openstack-request-id': 'req-3399963b-35c2-47a1-b2a3-3eada50d26a1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0'} Body: b'{"backup_type": "daily", "base_image_ref": "56b368f6-9136-40ec-a04c-564d02c95e42", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_type": "backup", "instance_uuid": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "owner_project_name": "tempest-ServerActionsRbacTest-1280955528", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1280955528", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-Backup-143992893", "disk_format": "qcow2", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 1, "owner": "21ea54a8c99a458890dbfde9b6dc3e3b", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0", "created_at": "2020-11-06T18:00:07Z", "updated_at": "2020-11-06T18:00:07Z", "tags": [], "self": "/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0", "file": "/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:11.758 38 INFO tempest.lib.common.rest_client [req-7de907c3-0153-48a1-86b2-0a37ee2f05a9 ] Request (ServerMetadataRbacTest:setUpClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/e00d4c88-9473-4f84-80e8-d00e6e78ceeb/add_router_interface 3.279s 2020-11-06 18:00:11.758 38 DEBUG tempest.lib.common.rest_client [req-7de907c3-0153-48a1-86b2-0a37ee2f05a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "2e54fc0f-3b7c-44cc-bfb3-df05984efd40"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-7de907c3-0153-48a1-86b2-0a37ee2f05a9', 'date': 'Fri, 06 Nov 2020 18:00:11 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/e00d4c88-9473-4f84-80e8-d00e6e78ceeb/add_router_interface'} Body: b'{"id": "e00d4c88-9473-4f84-80e8-d00e6e78ceeb", "tenant_id": "915ccc983b9341ed85216c7d9ac7bfa7", "port_id": "ec6e5889-9034-43d9-8b7f-ae7d5cf8e125", "network_id": "baa469fe-6923-4d8f-bf23-30791ce8fab6", "subnet_id": "2e54fc0f-3b7c-44cc-bfb3-df05984efd40", "subnet_ids": ["2e54fc0f-3b7c-44cc-bfb3-df05984efd40"]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:11.759 38 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerMetadataRbacTest-600743015', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '915ccc983b9341ed85216c7d9ac7bfa7', 'project_name': 'tempest-ServerMetadataRbacTest-600743015', 'tenant_id': '915ccc983b9341ed85216c7d9ac7bfa7', 'tenant_name': 'tempest-ServerMetadataRbacTest-600743015', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '3c1ff96f31b04e82bb3fb98702adee0b'}, Network: {'id': 'baa469fe-6923-4d8f-bf23-30791ce8fab6', 'name': 'tempest-ServerMetadataRbacTest-1567801355-network', 'tenant_id': '915ccc983b9341ed85216c7d9ac7bfa7', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '915ccc983b9341ed85216c7d9ac7bfa7', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 49, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T18:00:06Z', 'updated_at': '2020-11-06T18:00:06Z', 'revision_number': 1}, Subnet: {'id': '2e54fc0f-3b7c-44cc-bfb3-df05984efd40', 'name': 'tempest-ServerMetadataRbacTest-1567801355-subnet', 'tenant_id': '915ccc983b9341ed85216c7d9ac7bfa7', 'network_id': 'baa469fe-6923-4d8f-bf23-30791ce8fab6', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-11-06T18:00:06Z', 'updated_at': '2020-11-06T18:00:06Z', 'revision_number': 0, 'project_id': '915ccc983b9341ed85216c7d9ac7bfa7'}, Router: {'id': 'e00d4c88-9473-4f84-80e8-d00e6e78ceeb', 'name': 'tempest-ServerMetadataRbacTest-1567801355-router', 'tenant_id': '915ccc983b9341ed85216c7d9ac7bfa7', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.44'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::fe'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-11-06T18:00:06Z', 'updated_at': '2020-11-06T18:00:08Z', 'revision_number': 3, 'project_id': '915ccc983b9341ed85216c7d9ac7bfa7'} 2020-11-06 18:00:11.872 38 INFO tempest.lib.common.rest_client [req-4027e84b-c9f6-42a4-9a58-6ea847684e7b ] Request (ServerMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.106s 2020-11-06 18:00:11.873 38 DEBUG tempest.lib.common.rest_client [req-4027e84b-c9f6-42a4-9a58-6ea847684e7b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6573', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4027e84b-c9f6-42a4-9a58-6ea847684e7b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3c1ff96f31b04e82bb3fb98702adee0b", "name": "tempest-ServerMetadataRbacTest-600743015", "password_expires_at": null}, "audit_ids": ["QedAJz-mTnuylgo-YNTJkw"], "expires_at": "2020-11-06T19:00:11.000000Z", "issued_at": "2020-11-06T18:00:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "915ccc983b9341ed85216c7d9ac7bfa7", "name": "tempest-ServerMetadataRbacTest-600743015"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://1 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:11.905 38 INFO tempest.lib.common.rest_client [req-460bb078-9a6c-430d-9e74-e750549b1456 ] Request (ServerMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:00:11.906 38 DEBUG tempest.lib.common.rest_client [req-460bb078-9a6c-430d-9e74-e750549b1456 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-460bb078-9a6c-430d-9e74-e750549b1456', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["A-hN_F9OSaGURLBXfN2x5Q"], "expires_at": "2020-11-06T19:00:11.000000Z", "issued_at": "2020-11-06T18:00:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:11.951 38 INFO tempest.lib.common.rest_client [req-fd8c54ff-7b44-4ff0-8544-788a9dd67900 ] Request (ServerMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:00:11.952 38 DEBUG tempest.lib.common.rest_client [req-fd8c54ff-7b44-4ff0-8544-788a9dd67900 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fd8c54ff-7b44-4ff0-8544-788a9dd67900', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["o50f05vNQOywZhrFPRcgDA"], "expires_at": "2020-11-06T19:00:11.000000Z", "issued_at": "2020-11-06T18:00:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:11.999 38 INFO tempest.lib.common.rest_client [req-1d5a2ccf-2d3e-4870-b0e0-46976542656f ] Request (ServerMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.046s 2020-11-06 18:00:11.999 38 DEBUG tempest.lib.common.rest_client [req-1d5a2ccf-2d3e-4870-b0e0-46976542656f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1d5a2ccf-2d3e-4870-b0e0-46976542656f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:12.052 38 INFO tempest.lib.common.rest_client [req-c178649f-d42a-4db8-b767-576d25564f6a ] Request (ServerMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.052s 2020-11-06 18:00:12.053 38 DEBUG tempest.lib.common.rest_client [req-c178649f-d42a-4db8-b767-576d25564f6a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c178649f-d42a-4db8-b767-576d25564f6a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:12.053 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:00:12.054 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:12.103 38 INFO tempest.lib.common.rest_client [req-3a11c89d-0441-4132-98c0-213ea87867a9 ] Request (ServerMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles 0.048s 2020-11-06 18:00:12.104 38 DEBUG tempest.lib.common.rest_client [req-3a11c89d-0441-4132-98c0-213ea87867a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3a11c89d-0441-4132-98c0-213ea87867a9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:12.159 38 INFO tempest.lib.common.rest_client [req-4bc6969f-5665-4642-9b80-dde05b1bde9a ] Request (ServerMetadataRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles/72a4576c553448cd941b052c1ca0cf2d 0.054s 2020-11-06 18:00:12.159 38 DEBUG tempest.lib.common.rest_client [req-4bc6969f-5665-4642-9b80-dde05b1bde9a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4bc6969f-5665-4642-9b80-dde05b1bde9a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:12.262 38 INFO tempest.lib.common.rest_client [req-d583f5f5-4e09-46ec-8487-0b0d130b93e7 ] Request (ServerMetadataRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles/a629c95d64b3416fb80ae90af4f69c05 0.101s 2020-11-06 18:00:12.262 38 DEBUG tempest.lib.common.rest_client [req-d583f5f5-4e09-46ec-8487-0b0d130b93e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d583f5f5-4e09-46ec-8487-0b0d130b93e7', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:12.324 40 INFO tempest.lib.common.rest_client [req-9a80d00b-70cf-451e-88ce-fe717d00b82f ] Request (ServerTagsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/routers 1.391s 2020-11-06 18:00:12.324 40 DEBUG tempest.lib.common.rest_client [req-9a80d00b-70cf-451e-88ce-fe717d00b82f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-ServerTagsRbacTest-898134328-router", "tenant_id": "01712c7a73f8464a8cda41cbd4399038", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea"}}} Response - Headers: {'content-type': 'application/json', 'content-length': '806', 'x-openstack-request-id': 'req-9a80d00b-70cf-451e-88ce-fe717d00b82f', 'date': 'Fri, 06 Nov 2020 18:00:12 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "7ee93e84-0654-4099-bd73-5fa2f4216602", "name": "tempest-ServerTagsRbacTest-898134328-router", "tenant_id": "01712c7a73f8464a8cda41cbd4399038", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.70"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::3ec"}], "enable_snat": true}, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T18:00:11Z", "updated_at": "2020-11-06T18:00:11Z", "revision_number": 3, "project_id": "01712c7a73f8464a8cda41cbd4399038"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:12.580 37 INFO tempest.lib.common.rest_client [req-2fa20836-f142-4c08-8aaa-c592698eb98d ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45 0.501s 2020-11-06 18:00:12.581 37 DEBUG tempest.lib.common.rest_client [req-2fa20836-f142-4c08-8aaa-c592698eb98d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1911', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2fa20836-f142-4c08-8aaa-c592698eb98d', 'x-compute-request-id': 'req-2fa20836-f142-4c08-8aaa-c592698eb98d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45'} Body: b'{"server": {"id": "d609c5d7-7c53-4853-a874-e6a5b166ad45", "name": "tempest-MigrateServerV225RbacTest-server-1545629045", "status": "BUILD", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "2d746f1ab29074f3f929b1892e496ee0de7b1451dab2a8ca922b6c38", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:08Z", "updated": "2020-11-06T18:00:10Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-SRV-ATTR:reservation_id": "r-fqm7bxkb", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1545629045", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:12.663 39 INFO tempest.lib.common.rest_client [req-e862dd4c-0f90-4c0f-8da4-a0305ab63524 ] Request (ServerActionsRbacTest:test_create_backup): 200 GET http://172.30.13.94/image/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0 0.023s 2020-11-06 18:00:12.664 39 DEBUG tempest.lib.common.rest_client [req-e862dd4c-0f90-4c0f-8da4-a0305ab63524 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1454', 'content-type': 'application/json', 'x-openstack-request-id': 'req-e862dd4c-0f90-4c0f-8da4-a0305ab63524', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0'} Body: b'{"backup_type": "daily", "base_image_ref": "56b368f6-9136-40ec-a04c-564d02c95e42", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_location": "snapshot", "image_state": "available", "image_type": "backup", "instance_uuid": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "owner_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "owner_project_name": "tempest-ServerActionsRbacTest-1280955528", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1280955528", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-Backup-143992893", "disk_format": "raw", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 1, "owner": "21ea54a8c99a458890dbfde9b6dc3e3b", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0", "created_at": "2020-11-06T18:00:07Z", "updated_at": "2020-11-06T18:00:12Z", "tags": [], "self": "/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0", "file": "/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:13.352 38 INFO tempest.lib.common.rest_client [req-51f8b836-d88a-4b57-a00f-dc29dfabebd4 ] Request (ServerMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 18:00:13.353 38 DEBUG tempest.lib.common.rest_client [req-51f8b836-d88a-4b57-a00f-dc29dfabebd4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-51f8b836-d88a-4b57-a00f-dc29dfabebd4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3c1ff96f31b04e82bb3fb98702adee0b", "name": "tempest-ServerMetadataRbacTest-600743015", "password_expires_at": null}, "audit_ids": ["gC5n8VXPRKKipkoeQLmCdQ"], "expires_at": "2020-11-06T19:00:13.000000Z", "issued_at": "2020-11-06T18:00:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "915ccc983b9341ed85216c7d9ac7bfa7", "name": "tempest-ServerMetadataRbacTest-600743015"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:13.403 38 INFO tempest.lib.common.rest_client [req-38927642-ddea-4c14-8d70-6fdedbbfe3cc ] Request (ServerMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:00:13.404 38 DEBUG tempest.lib.common.rest_client [req-38927642-ddea-4c14-8d70-6fdedbbfe3cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-38927642-ddea-4c14-8d70-6fdedbbfe3cc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3c1ff96f31b04e82bb3fb98702adee0b", "name": "tempest-ServerMetadataRbacTest-600743015", "password_expires_at": null}, "audit_ids": ["-HCJAcP3QrmPW1YUDtMarA"], "expires_at": "2020-11-06T19:00:13.000000Z", "issued_at": "2020-11-06T18:00:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "915ccc983b9341ed85216c7d9ac7bfa7", "name": "tempest-ServerMetadataRbacTest-600743015"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:13.405 38 INFO tempest.lib.common.fixed_network [-] (ServerMetadataRbacTest:setUpClass) Found network {'id': 'baa469fe-6923-4d8f-bf23-30791ce8fab6', 'name': 'tempest-ServerMetadataRbacTest-1567801355-network', 'tenant_id': '915ccc983b9341ed85216c7d9ac7bfa7', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '915ccc983b9341ed85216c7d9ac7bfa7', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 49, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T18:00:06Z', 'updated_at': '2020-11-06T18:00:06Z', 'revision_number': 1} available for tenant 2020-11-06 18:00:13.691 39 INFO tempest.lib.common.rest_client [req-f2b40110-3e11-4812-8560-1ea1a2f000b3 ] Request (ServerActionsRbacTest:test_create_backup): 200 GET http://172.30.13.94/image/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0 0.025s 2020-11-06 18:00:13.692 39 DEBUG tempest.lib.common.rest_client [req-f2b40110-3e11-4812-8560-1ea1a2f000b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1454', 'content-type': 'application/json', 'x-openstack-request-id': 'req-f2b40110-3e11-4812-8560-1ea1a2f000b3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0'} Body: b'{"backup_type": "daily", "base_image_ref": "56b368f6-9136-40ec-a04c-564d02c95e42", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_location": "snapshot", "image_state": "available", "image_type": "backup", "instance_uuid": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "owner_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "owner_project_name": "tempest-ServerActionsRbacTest-1280955528", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1280955528", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-Backup-143992893", "disk_format": "raw", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 1, "owner": "21ea54a8c99a458890dbfde9b6dc3e3b", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0", "created_at": "2020-11-06T18:00:07Z", "updated_at": "2020-11-06T18:00:12Z", "tags": [], "self": "/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0", "file": "/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:14.010 37 INFO tempest.lib.common.rest_client [req-8c6f2298-68e6-4299-a1c6-6b68ab12875a ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45 0.415s 2020-11-06 18:00:14.010 37 DEBUG tempest.lib.common.rest_client [req-8c6f2298-68e6-4299-a1c6-6b68ab12875a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1911', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8c6f2298-68e6-4299-a1c6-6b68ab12875a', 'x-compute-request-id': 'req-8c6f2298-68e6-4299-a1c6-6b68ab12875a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45'} Body: b'{"server": {"id": "d609c5d7-7c53-4853-a874-e6a5b166ad45", "name": "tempest-MigrateServerV225RbacTest-server-1545629045", "status": "BUILD", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "2d746f1ab29074f3f929b1892e496ee0de7b1451dab2a8ca922b6c38", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:08Z", "updated": "2020-11-06T18:00:10Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-SRV-ATTR:reservation_id": "r-fqm7bxkb", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1545629045", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:14.294 38 INFO tempest.lib.common.rest_client [req-7f3df2f1-abe0-4631-b590-bebee896eccf ] Request (ServerMetadataRbacTest:setUpClass): 202 POST http://172.30.13.94/compute/v2.1/servers 0.888s 2020-11-06 18:00:14.295 38 DEBUG tempest.lib.common.rest_client [req-7f3df2f1-abe0-4631-b590-bebee896eccf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-ServerMetadataRbacTest-server-1570620911", "imageRef": "56b368f6-9136-40ec-a04c-564d02c95e42", "flavorRef": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "metadata": {}, "networks": [{"uuid": "baa469fe-6923-4d8f-bf23-30791ce8fab6"}]}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7f3df2f1-abe0-4631-b590-bebee896eccf', 'x-compute-request-id': 'req-7f3df2f1-abe0-4631-b590-bebee896eccf', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "c69462d2-ab7c-4ae9-9572-13ad098c921b", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "6uiC73QWtpLY"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:14.389 38 INFO tempest.lib.common.rest_client [req-a4f5954e-1c1c-4e92-b18e-55695f7656b5 ] Request (ServerMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b 0.088s 2020-11-06 18:00:14.389 38 DEBUG tempest.lib.common.rest_client [req-a4f5954e-1c1c-4e92-b18e-55695f7656b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1398', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a4f5954e-1c1c-4e92-b18e-55695f7656b5', 'x-compute-request-id': 'req-a4f5954e-1c1c-4e92-b18e-55695f7656b5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b'} Body: b'{"server": {"id": "c69462d2-ab7c-4ae9-9572-13ad098c921b", "name": "tempest-ServerMetadataRbacTest-server-1570620911", "status": "BUILD", "tenant_id": "915ccc983b9341ed85216c7d9ac7bfa7", "user_id": "3c1ff96f31b04e82bb3fb98702adee0b", "metadata": {}, "hostId": "", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:14Z", "updated": "2020-11-06T18:00:14Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:14.540 40 INFO tempest.lib.common.rest_client [req-e1ba1758-1a76-4db9-8ea6-248923982b33 ] Request (ServerTagsRbacTest:setUpClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/7ee93e84-0654-4099-bd73-5fa2f4216602/add_router_interface 2.215s 2020-11-06 18:00:14.541 40 DEBUG tempest.lib.common.rest_client [req-e1ba1758-1a76-4db9-8ea6-248923982b33 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "d9339805-ddc2-420a-a2ba-92c7b5bd8022"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-e1ba1758-1a76-4db9-8ea6-248923982b33', 'date': 'Fri, 06 Nov 2020 18:00:14 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/7ee93e84-0654-4099-bd73-5fa2f4216602/add_router_interface'} Body: b'{"id": "7ee93e84-0654-4099-bd73-5fa2f4216602", "tenant_id": "01712c7a73f8464a8cda41cbd4399038", "port_id": "ff94abe0-ec56-4107-8d47-bd74b0a98cd1", "network_id": "faa756a0-4f6d-4c31-b9d9-1787dee4c317", "subnet_id": "d9339805-ddc2-420a-a2ba-92c7b5bd8022", "subnet_ids": ["d9339805-ddc2-420a-a2ba-92c7b5bd8022"]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:14.541 40 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerTagsRbacTest-1477164779', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '01712c7a73f8464a8cda41cbd4399038', 'project_name': 'tempest-ServerTagsRbacTest-1477164779', 'tenant_id': '01712c7a73f8464a8cda41cbd4399038', 'tenant_name': 'tempest-ServerTagsRbacTest-1477164779', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '059542b3d55e4690abcee46249e52f8e'}, Network: {'id': 'faa756a0-4f6d-4c31-b9d9-1787dee4c317', 'name': 'tempest-ServerTagsRbacTest-898134328-network', 'tenant_id': '01712c7a73f8464a8cda41cbd4399038', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '01712c7a73f8464a8cda41cbd4399038', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 53, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T18:00:10Z', 'updated_at': '2020-11-06T18:00:10Z', 'revision_number': 1}, Subnet: {'id': 'd9339805-ddc2-420a-a2ba-92c7b5bd8022', 'name': 'tempest-ServerTagsRbacTest-898134328-subnet', 'tenant_id': '01712c7a73f8464a8cda41cbd4399038', 'network_id': 'faa756a0-4f6d-4c31-b9d9-1787dee4c317', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-11-06T18:00:10Z', 'updated_at': '2020-11-06T18:00:10Z', 'revision_number': 0, 'project_id': '01712c7a73f8464a8cda41cbd4399038'}, Router: {'id': '7ee93e84-0654-4099-bd73-5fa2f4216602', 'name': 'tempest-ServerTagsRbacTest-898134328-router', 'tenant_id': '01712c7a73f8464a8cda41cbd4399038', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.70'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::3ec'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-11-06T18:00:11Z', 'updated_at': '2020-11-06T18:00:11Z', 'revision_number': 3, 'project_id': '01712c7a73f8464a8cda41cbd4399038'} 2020-11-06 18:00:14.636 40 INFO tempest.lib.common.rest_client [req-cb84b924-b298-4f8f-8dc0-f219664a0e31 ] Request (ServerTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 18:00:14.636 40 DEBUG tempest.lib.common.rest_client [req-cb84b924-b298-4f8f-8dc0-f219664a0e31 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6567', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cb84b924-b298-4f8f-8dc0-f219664a0e31', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "059542b3d55e4690abcee46249e52f8e", "name": "tempest-ServerTagsRbacTest-1477164779", "password_expires_at": null}, "audit_ids": ["aROJk798Q2W2JGYjZnxXXg"], "expires_at": "2020-11-06T19:00:14.000000Z", "issued_at": "2020-11-06T18:00:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "01712c7a73f8464a8cda41cbd4399038", "name": "tempest-ServerTagsRbacTest-1477164779"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30. _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:14.718 39 INFO tempest.lib.common.rest_client [req-d8eb260c-96b7-4c94-843d-cd5f5a5a5bac ] Request (ServerActionsRbacTest:test_create_backup): 200 GET http://172.30.13.94/image/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0 0.025s 2020-11-06 18:00:14.719 39 DEBUG tempest.lib.common.rest_client [req-d8eb260c-96b7-4c94-843d-cd5f5a5a5bac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1454', 'content-type': 'application/json', 'x-openstack-request-id': 'req-d8eb260c-96b7-4c94-843d-cd5f5a5a5bac', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0'} Body: b'{"backup_type": "daily", "base_image_ref": "56b368f6-9136-40ec-a04c-564d02c95e42", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_location": "snapshot", "image_state": "available", "image_type": "backup", "instance_uuid": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "owner_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "owner_project_name": "tempest-ServerActionsRbacTest-1280955528", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1280955528", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-Backup-143992893", "disk_format": "raw", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 1, "owner": "21ea54a8c99a458890dbfde9b6dc3e3b", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0", "created_at": "2020-11-06T18:00:07Z", "updated_at": "2020-11-06T18:00:12Z", "tags": [], "self": "/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0", "file": "/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:14.731 40 INFO tempest.lib.common.rest_client [req-4b97be70-2a67-41ea-8e54-749f49da5ad5 ] Request (ServerTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-11-06 18:00:14.731 40 DEBUG tempest.lib.common.rest_client [req-4b97be70-2a67-41ea-8e54-749f49da5ad5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4b97be70-2a67-41ea-8e54-749f49da5ad5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["1fOP14VDRNCIc8fZgUPopg"], "expires_at": "2020-11-06T19:00:14.000000Z", "issued_at": "2020-11-06T18:00:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:14.779 40 INFO tempest.lib.common.rest_client [req-07a56406-ea0b-46d7-a469-01c66a59ff43 ] Request (ServerTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:00:14.780 40 DEBUG tempest.lib.common.rest_client [req-07a56406-ea0b-46d7-a469-01c66a59ff43 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-07a56406-ea0b-46d7-a469-01c66a59ff43', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["5F95zKCXSjKeNzoOW27bSA"], "expires_at": "2020-11-06T19:00:14.000000Z", "issued_at": "2020-11-06T18:00:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:14.826 40 INFO tempest.lib.common.rest_client [req-674a20db-9a18-4da1-af42-d8a3eb34db41 ] Request (ServerTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.045s 2020-11-06 18:00:14.827 40 DEBUG tempest.lib.common.rest_client [req-674a20db-9a18-4da1-af42-d8a3eb34db41 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-674a20db-9a18-4da1-af42-d8a3eb34db41', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:14.880 40 INFO tempest.lib.common.rest_client [req-694bf0a8-e0dd-4642-a2c7-3948ce966350 ] Request (ServerTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.053s 2020-11-06 18:00:14.880 40 DEBUG tempest.lib.common.rest_client [req-694bf0a8-e0dd-4642-a2c7-3948ce966350 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-694bf0a8-e0dd-4642-a2c7-3948ce966350', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:14.881 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:00:14.881 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:14.930 40 INFO tempest.lib.common.rest_client [req-83e64dc8-1ac5-48ba-84c9-cc21b02b28a6 ] Request (ServerTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles 0.048s 2020-11-06 18:00:14.930 40 DEBUG tempest.lib.common.rest_client [req-83e64dc8-1ac5-48ba-84c9-cc21b02b28a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-83e64dc8-1ac5-48ba-84c9-cc21b02b28a6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:14.996 40 INFO tempest.lib.common.rest_client [req-2ac1536c-ecec-4899-92d4-29f96e8b8343 ] Request (ServerTagsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles/72a4576c553448cd941b052c1ca0cf2d 0.065s 2020-11-06 18:00:14.996 40 DEBUG tempest.lib.common.rest_client [req-2ac1536c-ecec-4899-92d4-29f96e8b8343 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2ac1536c-ecec-4899-92d4-29f96e8b8343', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:15.084 40 INFO tempest.lib.common.rest_client [req-0202448e-a70d-4025-847c-2ded2a2907af ] Request (ServerTagsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles/a629c95d64b3416fb80ae90af4f69c05 0.087s 2020-11-06 18:00:15.085 40 DEBUG tempest.lib.common.rest_client [req-0202448e-a70d-4025-847c-2ded2a2907af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0202448e-a70d-4025-847c-2ded2a2907af', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:15.311 37 INFO tempest.lib.common.rest_client [req-cc61fc2a-241b-4e57-ba38-aa96089f4a7f ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45 0.282s 2020-11-06 18:00:15.311 37 DEBUG tempest.lib.common.rest_client [req-cc61fc2a-241b-4e57-ba38-aa96089f4a7f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1911', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cc61fc2a-241b-4e57-ba38-aa96089f4a7f', 'x-compute-request-id': 'req-cc61fc2a-241b-4e57-ba38-aa96089f4a7f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45'} Body: b'{"server": {"id": "d609c5d7-7c53-4853-a874-e6a5b166ad45", "name": "tempest-MigrateServerV225RbacTest-server-1545629045", "status": "BUILD", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "2d746f1ab29074f3f929b1892e496ee0de7b1451dab2a8ca922b6c38", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:08Z", "updated": "2020-11-06T18:00:10Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-SRV-ATTR:reservation_id": "r-fqm7bxkb", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1545629045", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:15.747 39 INFO tempest.lib.common.rest_client [req-4add0f7f-86da-4308-96cb-14a26f9fac60 ] Request (ServerActionsRbacTest:test_create_backup): 200 GET http://172.30.13.94/image/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0 0.025s 2020-11-06 18:00:15.747 39 DEBUG tempest.lib.common.rest_client [req-4add0f7f-86da-4308-96cb-14a26f9fac60 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1454', 'content-type': 'application/json', 'x-openstack-request-id': 'req-4add0f7f-86da-4308-96cb-14a26f9fac60', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0'} Body: b'{"backup_type": "daily", "base_image_ref": "56b368f6-9136-40ec-a04c-564d02c95e42", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_location": "snapshot", "image_state": "available", "image_type": "backup", "instance_uuid": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "owner_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "owner_project_name": "tempest-ServerActionsRbacTest-1280955528", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1280955528", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-Backup-143992893", "disk_format": "raw", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 1, "owner": "21ea54a8c99a458890dbfde9b6dc3e3b", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0", "created_at": "2020-11-06T18:00:07Z", "updated_at": "2020-11-06T18:00:12Z", "tags": [], "self": "/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0", "file": "/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:16.193 40 INFO tempest.lib.common.rest_client [req-11fda6bc-e827-4624-b3a2-9901a130965d ] Request (ServerTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.106s 2020-11-06 18:00:16.194 40 DEBUG tempest.lib.common.rest_client [req-11fda6bc-e827-4624-b3a2-9901a130965d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-11fda6bc-e827-4624-b3a2-9901a130965d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "059542b3d55e4690abcee46249e52f8e", "name": "tempest-ServerTagsRbacTest-1477164779", "password_expires_at": null}, "audit_ids": ["HmeqOJoOTV-ZpWB7ceO3_Q"], "expires_at": "2020-11-06T19:00:16.000000Z", "issued_at": "2020-11-06T18:00:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "01712c7a73f8464a8cda41cbd4399038", "name": "tempest-ServerTagsRbacTest-1477164779"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:16.234 40 INFO tempest.lib.common.rest_client [req-ed7fd3ba-1c20-466a-941b-4f35cfe98c0a ] Request (ServerTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.029s 2020-11-06 18:00:16.234 40 DEBUG tempest.lib.common.rest_client [req-ed7fd3ba-1c20-466a-941b-4f35cfe98c0a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ed7fd3ba-1c20-466a-941b-4f35cfe98c0a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "059542b3d55e4690abcee46249e52f8e", "name": "tempest-ServerTagsRbacTest-1477164779", "password_expires_at": null}, "audit_ids": ["VY32tn7RQS-5NuNoH7T9yA"], "expires_at": "2020-11-06T19:00:16.000000Z", "issued_at": "2020-11-06T18:00:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "01712c7a73f8464a8cda41cbd4399038", "name": "tempest-ServerTagsRbacTest-1477164779"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:16.235 40 INFO tempest.lib.common.fixed_network [-] (ServerTagsRbacTest:setUpClass) Found network {'id': 'faa756a0-4f6d-4c31-b9d9-1787dee4c317', 'name': 'tempest-ServerTagsRbacTest-898134328-network', 'tenant_id': '01712c7a73f8464a8cda41cbd4399038', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '01712c7a73f8464a8cda41cbd4399038', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 53, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T18:00:10Z', 'updated_at': '2020-11-06T18:00:10Z', 'revision_number': 1} available for tenant 2020-11-06 18:00:16.776 39 INFO tempest.lib.common.rest_client [req-9824557f-d2e5-4709-9bc3-20b18f1e838c ] Request (ServerActionsRbacTest:test_create_backup): 200 GET http://172.30.13.94/image/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0 0.026s 2020-11-06 18:00:16.776 39 DEBUG tempest.lib.common.rest_client [req-9824557f-d2e5-4709-9bc3-20b18f1e838c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1454', 'content-type': 'application/json', 'x-openstack-request-id': 'req-9824557f-d2e5-4709-9bc3-20b18f1e838c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0'} Body: b'{"backup_type": "daily", "base_image_ref": "56b368f6-9136-40ec-a04c-564d02c95e42", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_location": "snapshot", "image_state": "available", "image_type": "backup", "instance_uuid": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "owner_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "owner_project_name": "tempest-ServerActionsRbacTest-1280955528", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1280955528", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-Backup-143992893", "disk_format": "raw", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 1, "owner": "21ea54a8c99a458890dbfde9b6dc3e3b", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0", "created_at": "2020-11-06T18:00:07Z", "updated_at": "2020-11-06T18:00:12Z", "tags": [], "self": "/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0", "file": "/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:17.049 38 INFO tempest.lib.common.rest_client [req-37da0125-c330-4a7b-ab0d-8fc40a4c261a ] Request (ServerMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b 1.642s 2020-11-06 18:00:17.049 38 DEBUG tempest.lib.common.rest_client [req-37da0125-c330-4a7b-ab0d-8fc40a4c261a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1527', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-37da0125-c330-4a7b-ab0d-8fc40a4c261a', 'x-compute-request-id': 'req-37da0125-c330-4a7b-ab0d-8fc40a4c261a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b'} Body: b'{"server": {"id": "c69462d2-ab7c-4ae9-9572-13ad098c921b", "name": "tempest-ServerMetadataRbacTest-server-1570620911", "status": "BUILD", "tenant_id": "915ccc983b9341ed85216c7d9ac7bfa7", "user_id": "3c1ff96f31b04e82bb3fb98702adee0b", "metadata": {}, "hostId": "0b84e656eca0c1d4032c518cd6ae78d054280549da0a88200b7c2a04", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:14Z", "updated": "2020-11-06T18:00:15Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c6", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:17.060 38 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/None" after 3 second wait 2020-11-06 18:00:17.079 37 INFO tempest.lib.common.rest_client [req-1a761930-71b9-4768-bb0f-101cfe58421b ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45 0.749s 2020-11-06 18:00:17.080 37 DEBUG tempest.lib.common.rest_client [req-1a761930-71b9-4768-bb0f-101cfe58421b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2106', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1a761930-71b9-4768-bb0f-101cfe58421b', 'x-compute-request-id': 'req-1a761930-71b9-4768-bb0f-101cfe58421b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45'} Body: b'{"server": {"id": "d609c5d7-7c53-4853-a874-e6a5b166ad45", "name": "tempest-MigrateServerV225RbacTest-server-1545629045", "status": "ACTIVE", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "2d746f1ab29074f3f929b1892e496ee0de7b1451dab2a8ca922b6c38", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:08Z", "updated": "2020-11-06T18:00:16Z", "addresses": {"patrole_reader-net_30048f18-b96b-4343-a720-1173982b59b8": [{"version": 4, "addr": "192.168.120.180", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:54:42:29"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:16.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-SRV-ATTR:reservation_id": "r-fqm7bxkb", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1545629045", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:17.093 37 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 9 second wait 2020-11-06 18:00:17.094 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:17.198 37 INFO tempest.lib.common.rest_client [req-22c35d0e-d79d-44d6-88bf-353eb0057047 ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94/identity/v3/projects/e8c4ea0aa616438d84be2a246c718bc3/users/99a9d4e6d0ca480d8f91548cce415d39/roles 0.103s 2020-11-06 18:00:17.199 37 DEBUG tempest.lib.common.rest_client [req-22c35d0e-d79d-44d6-88bf-353eb0057047 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-22c35d0e-d79d-44d6-88bf-353eb0057047', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e8c4ea0aa616438d84be2a246c718bc3/users/99a9d4e6d0ca480d8f91548cce415d39/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e8c4ea0aa616438d84be2a246c718bc3/users/99a9d4e6d0ca480d8f91548cce415d39/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:17.277 37 INFO tempest.lib.common.rest_client [req-8ac40ecc-ed2d-4f00-8fd8-c49c4ec7c421 ] Request (MigrateServerV225RbacTest:test_cold_migration): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-11-06 18:00:17.278 37 DEBUG tempest.lib.common.rest_client [req-8ac40ecc-ed2d-4f00-8fd8-c49c4ec7c421 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8ac40ecc-ed2d-4f00-8fd8-c49c4ec7c421', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "99a9d4e6d0ca480d8f91548cce415d39", "name": "tempest-MigrateServerV225RbacTest-107357711", "password_expires_at": null}, "audit_ids": ["ExuZVTG1SxStKB8kT7N1lg"], "expires_at": "2020-11-06T19:00:17.000000Z", "issued_at": "2020-11-06T18:00:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e8c4ea0aa616438d84be2a246c718bc3", "name": "tempest-MigrateServerV225RbacTest-107357711"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:17.514 40 INFO tempest.lib.common.rest_client [req-eae065da-d9df-4d71-b3d4-f7490b79163a ] Request (ServerTagsRbacTest:setUpClass): 202 POST http://172.30.13.94/compute/v2.1/servers 1.277s 2020-11-06 18:00:17.514 40 DEBUG tempest.lib.common.rest_client [req-eae065da-d9df-4d71-b3d4-f7490b79163a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-ServerTagsRbacTest-server-610909107", "imageRef": "56b368f6-9136-40ec-a04c-564d02c95e42", "flavorRef": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "networks": [{"uuid": "faa756a0-4f6d-4c31-b9d9-1787dee4c317"}]}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-eae065da-d9df-4d71-b3d4-f7490b79163a', 'x-compute-request-id': 'req-eae065da-d9df-4d71-b3d4-f7490b79163a', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "37373f5f-0e45-4a02-aea3-c804446204f8", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/37373f5f-0e45-4a02-aea3-c804446204f8"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "eoHPpvehTy2r"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:17.630 40 INFO tempest.lib.common.rest_client [req-616eae42-3fdb-4647-a345-d45c62d07a8b ] Request (ServerTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8 0.113s 2020-11-06 18:00:17.630 40 DEBUG tempest.lib.common.rest_client [req-616eae42-3fdb-4647-a345-d45c62d07a8b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1393', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-616eae42-3fdb-4647-a345-d45c62d07a8b', 'x-compute-request-id': 'req-616eae42-3fdb-4647-a345-d45c62d07a8b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8'} Body: b'{"server": {"id": "37373f5f-0e45-4a02-aea3-c804446204f8", "name": "tempest-ServerTagsRbacTest-server-610909107", "status": "BUILD", "tenant_id": "01712c7a73f8464a8cda41cbd4399038", "user_id": "059542b3d55e4690abcee46249e52f8e", "metadata": {}, "hostId": "", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:17Z", "updated": "2020-11-06T18:00:17Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/37373f5f-0e45-4a02-aea3-c804446204f8"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:17.804 39 INFO tempest.lib.common.rest_client [req-53cbfec7-5b49-4d66-a8f8-60e203a28d27 ] Request (ServerActionsRbacTest:test_create_backup): 200 GET http://172.30.13.94/image/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0 0.025s 2020-11-06 18:00:17.805 39 DEBUG tempest.lib.common.rest_client [req-53cbfec7-5b49-4d66-a8f8-60e203a28d27 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1454', 'content-type': 'application/json', 'x-openstack-request-id': 'req-53cbfec7-5b49-4d66-a8f8-60e203a28d27', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0'} Body: b'{"backup_type": "daily", "base_image_ref": "56b368f6-9136-40ec-a04c-564d02c95e42", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_location": "snapshot", "image_state": "available", "image_type": "backup", "instance_uuid": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "owner_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "owner_project_name": "tempest-ServerActionsRbacTest-1280955528", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1280955528", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-Backup-143992893", "disk_format": "raw", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 1, "owner": "21ea54a8c99a458890dbfde9b6dc3e3b", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0", "created_at": "2020-11-06T18:00:07Z", "updated_at": "2020-11-06T18:00:12Z", "tags": [], "self": "/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0", "file": "/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:17.962 37 INFO tempest.lib.common.rest_client [req-da285080-c7ba-4149-9c5d-44faa69fb0c0 ] Request (MigrateServerV225RbacTest:test_cold_migration): 202 POST http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45/action 0.683s 2020-11-06 18:00:17.963 37 DEBUG tempest.lib.common.rest_client [req-da285080-c7ba-4149-9c5d-44faa69fb0c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: {"migrate": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-da285080-c7ba-4149-9c5d-44faa69fb0c0', 'x-compute-request-id': 'req-da285080-c7ba-4149-9c5d-44faa69fb0c0', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:17.964 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:18.020 37 INFO tempest.lib.common.rest_client [req-2591db9f-f805-4651-834a-64d64c65b41b ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94/identity/v3/projects/e8c4ea0aa616438d84be2a246c718bc3/users/99a9d4e6d0ca480d8f91548cce415d39/roles 0.056s 2020-11-06 18:00:18.021 37 DEBUG tempest.lib.common.rest_client [req-2591db9f-f805-4651-834a-64d64c65b41b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2591db9f-f805-4651-834a-64d64c65b41b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e8c4ea0aa616438d84be2a246c718bc3/users/99a9d4e6d0ca480d8f91548cce415d39/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e8c4ea0aa616438d84be2a246c718bc3/users/99a9d4e6d0ca480d8f91548cce415d39/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:18.058 37 INFO tempest.lib.common.rest_client [req-20cebb77-2459-4698-b95e-65da5ba5f2ee ] Request (MigrateServerV225RbacTest:test_cold_migration): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:00:18.059 37 DEBUG tempest.lib.common.rest_client [req-20cebb77-2459-4698-b95e-65da5ba5f2ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-20cebb77-2459-4698-b95e-65da5ba5f2ee', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "99a9d4e6d0ca480d8f91548cce415d39", "name": "tempest-MigrateServerV225RbacTest-107357711", "password_expires_at": null}, "audit_ids": ["4j_gIUSBRxa3_j9X2_qVZA"], "expires_at": "2020-11-06T19:00:18.000000Z", "issued_at": "2020-11-06T18:00:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e8c4ea0aa616438d84be2a246c718bc3", "name": "tempest-MigrateServerV225RbacTest-107357711"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:18.390 38 INFO tempest.lib.common.rest_client [req-3b3f90d1-407e-44a4-896d-1b088cadd208 ] Request (ServerMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b 0.327s 2020-11-06 18:00:18.390 38 DEBUG tempest.lib.common.rest_client [req-3b3f90d1-407e-44a4-896d-1b088cadd208 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1533', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3b3f90d1-407e-44a4-896d-1b088cadd208', 'x-compute-request-id': 'req-3b3f90d1-407e-44a4-896d-1b088cadd208', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b'} Body: b'{"server": {"id": "c69462d2-ab7c-4ae9-9572-13ad098c921b", "name": "tempest-ServerMetadataRbacTest-server-1570620911", "status": "BUILD", "tenant_id": "915ccc983b9341ed85216c7d9ac7bfa7", "user_id": "3c1ff96f31b04e82bb3fb98702adee0b", "metadata": {}, "hostId": "0b84e656eca0c1d4032c518cd6ae78d054280549da0a88200b7c2a04", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:14Z", "updated": "2020-11-06T18:00:16Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c6", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:18.401 38 INFO tempest.common.waiters [-] State transition "BUILD/None" ==> "BUILD/spawning" after 4 second wait 2020-11-06 18:00:18.439 37 INFO tempest.lib.common.rest_client [req-aaf25546-50a7-4f0f-9ee4-4d38d69c0de9 ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45 0.378s 2020-11-06 18:00:18.440 37 DEBUG tempest.lib.common.rest_client [req-aaf25546-50a7-4f0f-9ee4-4d38d69c0de9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2115', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-aaf25546-50a7-4f0f-9ee4-4d38d69c0de9', 'x-compute-request-id': 'req-aaf25546-50a7-4f0f-9ee4-4d38d69c0de9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45'} Body: b'{"server": {"id": "d609c5d7-7c53-4853-a874-e6a5b166ad45", "name": "tempest-MigrateServerV225RbacTest-server-1545629045", "status": "RESIZE", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "2d746f1ab29074f3f929b1892e496ee0de7b1451dab2a8ca922b6c38", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:08Z", "updated": "2020-11-06T18:00:18Z", "addresses": {"patrole_reader-net_30048f18-b96b-4343-a720-1173982b59b8": [{"version": 4, "addr": "192.168.120.180", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:54:42:29"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:16.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-SRV-ATTR:reservation_id": "r-fqm7bxkb", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1545629045", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "resize_prep", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:18.803 40 INFO tempest.lib.common.rest_client [req-a426c372-f99b-424b-ad30-3d2887e70fbb ] Request (ServerTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8 0.155s 2020-11-06 18:00:18.804 40 DEBUG tempest.lib.common.rest_client [req-a426c372-f99b-424b-ad30-3d2887e70fbb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1480', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a426c372-f99b-424b-ad30-3d2887e70fbb', 'x-compute-request-id': 'req-a426c372-f99b-424b-ad30-3d2887e70fbb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8'} Body: b'{"server": {"id": "37373f5f-0e45-4a02-aea3-c804446204f8", "name": "tempest-ServerTagsRbacTest-server-610909107", "status": "BUILD", "tenant_id": "01712c7a73f8464a8cda41cbd4399038", "user_id": "059542b3d55e4690abcee46249e52f8e", "metadata": {}, "hostId": "496d52bb57d5371371e5a6735c1fd7fd74fb37e35ce9991e70b600ac", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:17Z", "updated": "2020-11-06T18:00:18Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/37373f5f-0e45-4a02-aea3-c804446204f8"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:18.813 40 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/None" after 1 second wait 2020-11-06 18:00:18.832 39 INFO tempest.lib.common.rest_client [req-6bf92bd7-8efd-49cc-90d7-814a4f97c70e ] Request (ServerActionsRbacTest:test_create_backup): 200 GET http://172.30.13.94/image/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0 0.024s 2020-11-06 18:00:18.833 39 DEBUG tempest.lib.common.rest_client [req-6bf92bd7-8efd-49cc-90d7-814a4f97c70e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1626', 'content-type': 'application/json', 'x-openstack-request-id': 'req-6bf92bd7-8efd-49cc-90d7-814a4f97c70e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0'} Body: b'{"backup_type": "daily", "base_image_ref": "56b368f6-9136-40ec-a04c-564d02c95e42", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_location": "snapshot", "image_state": "available", "image_type": "backup", "instance_uuid": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "owner_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "owner_project_name": "tempest-ServerActionsRbacTest-1280955528", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1280955528", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-Backup-143992893", "disk_format": "raw", "container_format": "bare", "visibility": "private", "size": 1073741824, "virtual_size": 1073741824, "status": "active", "checksum": "fba1b7233ecc9ed1b5eb52d6de5e9444", "protected": false, "min_ram": 0, "min_disk": 1, "owner": "21ea54a8c99a458890dbfde9b6dc3e3b", "os_hidden": false, "os_hash_algo": "sha512", "os_hash_value": "508ddaa23b24e150c943cf7d1fe3a06b85b0e1af0bf91509b106d272cd3818b8cec76b52ebee21ae8b85a4debe834b5a7c2074013251572d0567986b793ef2be", "id": "46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0", "created_at": "2020-11-06T18:00:07Z", "updated_at": "2020-11-06T18:00:19Z", "tags": [], "self": "/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0", "file": "/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:19.375 39 INFO tempest.lib.common.rest_client [req-cb643b8e-a83b-4eb1-87d3-7e71edf46eae ] Request (ServerActionsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0 0.541s 2020-11-06 18:00:19.375 39 DEBUG tempest.lib.common.rest_client [req-cb643b8e-a83b-4eb1-87d3-7e71edf46eae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-cb643b8e-a83b-4eb1-87d3-7e71edf46eae', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/46f2cd33-57a4-4a01-8af7-ab1ff00ad4a0'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:19.767 38 INFO tempest.lib.common.rest_client [req-96d4a2c9-c0de-4bda-a8e0-1a4bcaf0a01b ] Request (ServerMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b 0.364s 2020-11-06 18:00:19.768 38 DEBUG tempest.lib.common.rest_client [req-96d4a2c9-c0de-4bda-a8e0-1a4bcaf0a01b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1533', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-96d4a2c9-c0de-4bda-a8e0-1a4bcaf0a01b', 'x-compute-request-id': 'req-96d4a2c9-c0de-4bda-a8e0-1a4bcaf0a01b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b'} Body: b'{"server": {"id": "c69462d2-ab7c-4ae9-9572-13ad098c921b", "name": "tempest-ServerMetadataRbacTest-server-1570620911", "status": "BUILD", "tenant_id": "915ccc983b9341ed85216c7d9ac7bfa7", "user_id": "3c1ff96f31b04e82bb3fb98702adee0b", "metadata": {}, "hostId": "0b84e656eca0c1d4032c518cd6ae78d054280549da0a88200b7c2a04", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:14Z", "updated": "2020-11-06T18:00:16Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c6", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:19.955 40 INFO tempest.lib.common.rest_client [req-b60f7e2f-b531-4534-82ac-9c46b6c698c1 ] Request (ServerTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8 0.140s 2020-11-06 18:00:19.956 40 DEBUG tempest.lib.common.rest_client [req-b60f7e2f-b531-4534-82ac-9c46b6c698c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1486', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b60f7e2f-b531-4534-82ac-9c46b6c698c1', 'x-compute-request-id': 'req-b60f7e2f-b531-4534-82ac-9c46b6c698c1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8'} Body: b'{"server": {"id": "37373f5f-0e45-4a02-aea3-c804446204f8", "name": "tempest-ServerTagsRbacTest-server-610909107", "status": "BUILD", "tenant_id": "01712c7a73f8464a8cda41cbd4399038", "user_id": "059542b3d55e4690abcee46249e52f8e", "metadata": {}, "hostId": "496d52bb57d5371371e5a6735c1fd7fd74fb37e35ce9991e70b600ac", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:17Z", "updated": "2020-11-06T18:00:19Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/37373f5f-0e45-4a02-aea3-c804446204f8"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:19.965 40 INFO tempest.common.waiters [-] State transition "BUILD/None" ==> "BUILD/spawning" after 2 second wait 2020-11-06 18:00:20.233 39 INFO tempest.lib.common.rest_client [req-9f66556a-6af8-415f-9928-69d7e4e201df ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.847s 2020-11-06 18:00:20.233 39 DEBUG tempest.lib.common.rest_client [req-9f66556a-6af8-415f-9928-69d7e4e201df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9f66556a-6af8-415f-9928-69d7e4e201df', 'x-compute-request-id': 'req-9f66556a-6af8-415f-9928-69d7e4e201df', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:00:19Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:02.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:20.244 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:00:20.245 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.245 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.245 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.246 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.246 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.246 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.247 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.247 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.247 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.248 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.248 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.248 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.249 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.249 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.249 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.250 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.250 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.250 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.250 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.251 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.251 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.251 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.252 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.252 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.252 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.252 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.253 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.253 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.253 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.253 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.254 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.254 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.254 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.255 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.255 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.255 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.255 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.256 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.256 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.256 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.256 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.257 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.257 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.257 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.258 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.258 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.258 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.259 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.259 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.259 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.259 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.260 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.260 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.260 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.260 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.261 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.261 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.261 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.262 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.262 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.262 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.263 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.263 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.263 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.264 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.264 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.264 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.264 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.265 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.265 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.265 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.266 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.266 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.266 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.267 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:20.268 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:create_image, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:00:20.268 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:20.290 37 INFO tempest.lib.common.rest_client [req-348ecbe0-c3f6-4a6a-9b0f-d07ace5b2e9b ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45 0.830s 2020-11-06 18:00:20.291 37 DEBUG tempest.lib.common.rest_client [req-348ecbe0-c3f6-4a6a-9b0f-d07ace5b2e9b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2115', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-348ecbe0-c3f6-4a6a-9b0f-d07ace5b2e9b', 'x-compute-request-id': 'req-348ecbe0-c3f6-4a6a-9b0f-d07ace5b2e9b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45'} Body: b'{"server": {"id": "d609c5d7-7c53-4853-a874-e6a5b166ad45", "name": "tempest-MigrateServerV225RbacTest-server-1545629045", "status": "RESIZE", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "2d746f1ab29074f3f929b1892e496ee0de7b1451dab2a8ca922b6c38", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:08Z", "updated": "2020-11-06T18:00:19Z", "addresses": {"patrole_reader-net_30048f18-b96b-4343-a720-1173982b59b8": [{"version": 4, "addr": "192.168.120.180", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:54:42:29"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:16.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-SRV-ATTR:reservation_id": "r-fqm7bxkb", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1545629045", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "resize_prep", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:20.333 39 INFO tempest.lib.common.rest_client [req-e0c59244-6447-4031-b994-619b546cf8da ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.064s 2020-11-06 18:00:20.333 39 DEBUG tempest.lib.common.rest_client [req-e0c59244-6447-4031-b994-619b546cf8da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e0c59244-6447-4031-b994-619b546cf8da', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:20.433 39 INFO tempest.lib.common.rest_client [req-e1fb4c02-18e5-4a6a-a058-39652e39798c ] Request (ServerActionsRbacTest:test_create_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.099s 2020-11-06 18:00:20.434 39 DEBUG tempest.lib.common.rest_client [req-e1fb4c02-18e5-4a6a-a058-39652e39798c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e1fb4c02-18e5-4a6a-a058-39652e39798c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["IvtkhtvuREOc3kyxqj8U7w"], "expires_at": "2020-11-06T19:00:20.000000Z", "issued_at": "2020-11-06T18:00:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:20.942 39 INFO tempest.lib.common.rest_client [req-89922dfb-e792-45fb-a739-743520da296f ] Request (ServerActionsRbacTest:test_create_image): 202 POST http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf/action 0.507s 2020-11-06 18:00:20.943 39 DEBUG tempest.lib.common.rest_client [req-89922dfb-e792-45fb-a739-743520da296f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"createImage": {"name": "tempest-ServerActionsRbacTest-image-1763093907"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'content-length': '0', 'location': 'http://172.30.13.94/image/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-89922dfb-e792-45fb-a739-743520da296f', 'x-compute-request-id': 'req-89922dfb-e792-45fb-a739-743520da296f', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:21.007 39 INFO tempest.lib.common.rest_client [req-fb6ea0b0-ee69-453f-8713-94c99a6cc85a ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6 0.062s 2020-11-06 18:00:21.008 39 DEBUG tempest.lib.common.rest_client [req-fb6ea0b0-ee69-453f-8713-94c99a6cc85a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1607', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fb6ea0b0-ee69-453f-8713-94c99a6cc85a', 'x-compute-request-id': 'req-fb6ea0b0-ee69-453f-8713-94c99a6cc85a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6'} Body: b'{"image": {"id": "4b82337b-9afd-41e8-a1d3-ce32a594dca6", "name": "tempest-ServerActionsRbacTest-image-1763093907", "minRam": 0, "minDisk": 1, "metadata": {"base_image_ref": "56b368f6-9136-40ec-a04c-564d02c95e42", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_type": "snapshot", "instance_uuid": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "owner_project_name": "tempest-ServerActionsRbacTest-1280955528", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1280955528", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f"}, "created": "2020-11-06T18:00:21Z", "updated": "2020-11-06T18:00:21Z", "status": "SAVING", "progress": 25, "OS-EXT-IMG-SIZE:size": 0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}], "server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}]}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:21.061 38 INFO tempest.lib.common.rest_client [req-76a5e69e-ac5c-46fa-88e9-ec6336c82462 ] Request (ServerMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b 0.280s 2020-11-06 18:00:21.062 38 DEBUG tempest.lib.common.rest_client [req-76a5e69e-ac5c-46fa-88e9-ec6336c82462 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1533', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-76a5e69e-ac5c-46fa-88e9-ec6336c82462', 'x-compute-request-id': 'req-76a5e69e-ac5c-46fa-88e9-ec6336c82462', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b'} Body: b'{"server": {"id": "c69462d2-ab7c-4ae9-9572-13ad098c921b", "name": "tempest-ServerMetadataRbacTest-server-1570620911", "status": "BUILD", "tenant_id": "915ccc983b9341ed85216c7d9ac7bfa7", "user_id": "3c1ff96f31b04e82bb3fb98702adee0b", "metadata": {}, "hostId": "0b84e656eca0c1d4032c518cd6ae78d054280549da0a88200b7c2a04", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:14Z", "updated": "2020-11-06T18:00:16Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c6", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:21.174 40 INFO tempest.lib.common.rest_client [req-6699a45f-7193-4e81-8dc5-c472f023dc60 ] Request (ServerTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8 0.206s 2020-11-06 18:00:21.174 40 DEBUG tempest.lib.common.rest_client [req-6699a45f-7193-4e81-8dc5-c472f023dc60 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1528', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6699a45f-7193-4e81-8dc5-c472f023dc60', 'x-compute-request-id': 'req-6699a45f-7193-4e81-8dc5-c472f023dc60', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8'} Body: b'{"server": {"id": "37373f5f-0e45-4a02-aea3-c804446204f8", "name": "tempest-ServerTagsRbacTest-server-610909107", "status": "BUILD", "tenant_id": "01712c7a73f8464a8cda41cbd4399038", "user_id": "059542b3d55e4690abcee46249e52f8e", "metadata": {}, "hostId": "496d52bb57d5371371e5a6735c1fd7fd74fb37e35ce9991e70b600ac", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:17Z", "updated": "2020-11-06T18:00:19Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/37373f5f-0e45-4a02-aea3-c804446204f8"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:21.538 37 INFO tempest.lib.common.rest_client [req-dec0cea3-dc94-4f65-96ac-7a3b71332204 ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45 0.232s 2020-11-06 18:00:21.538 37 DEBUG tempest.lib.common.rest_client [req-dec0cea3-dc94-4f65-96ac-7a3b71332204 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2120', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dec0cea3-dc94-4f65-96ac-7a3b71332204', 'x-compute-request-id': 'req-dec0cea3-dc94-4f65-96ac-7a3b71332204', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45'} Body: b'{"server": {"id": "d609c5d7-7c53-4853-a874-e6a5b166ad45", "name": "tempest-MigrateServerV225RbacTest-server-1545629045", "status": "RESIZE", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "2d746f1ab29074f3f929b1892e496ee0de7b1451dab2a8ca922b6c38", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:08Z", "updated": "2020-11-06T18:00:21Z", "addresses": {"patrole_reader-net_30048f18-b96b-4343-a720-1173982b59b8": [{"version": 4, "addr": "192.168.120.180", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:54:42:29"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:16.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-SRV-ATTR:reservation_id": "r-fqm7bxkb", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1545629045", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "resize_migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:21.553 37 INFO tempest.common.waiters [-] State transition "RESIZE/resize_prep" ==> "RESIZE/resize_migrating" after 3 second wait 2020-11-06 18:00:22.082 39 INFO tempest.lib.common.rest_client [req-8e13d545-cfe1-4605-87fb-09b8ae644c46 ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6 0.063s 2020-11-06 18:00:22.082 39 DEBUG tempest.lib.common.rest_client [req-8e13d545-cfe1-4605-87fb-09b8ae644c46 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1607', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8e13d545-cfe1-4605-87fb-09b8ae644c46', 'x-compute-request-id': 'req-8e13d545-cfe1-4605-87fb-09b8ae644c46', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6'} Body: b'{"image": {"id": "4b82337b-9afd-41e8-a1d3-ce32a594dca6", "name": "tempest-ServerActionsRbacTest-image-1763093907", "minRam": 0, "minDisk": 1, "metadata": {"base_image_ref": "56b368f6-9136-40ec-a04c-564d02c95e42", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_type": "snapshot", "instance_uuid": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "owner_project_name": "tempest-ServerActionsRbacTest-1280955528", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1280955528", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f"}, "created": "2020-11-06T18:00:21Z", "updated": "2020-11-06T18:00:21Z", "status": "SAVING", "progress": 25, "OS-EXT-IMG-SIZE:size": 0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}], "server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}]}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:22.309 38 INFO tempest.lib.common.rest_client [req-ec6b71e8-f0ed-4124-807c-a843c38e8ef1 ] Request (ServerMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b 0.232s 2020-11-06 18:00:22.309 38 DEBUG tempest.lib.common.rest_client [req-ec6b71e8-f0ed-4124-807c-a843c38e8ef1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1720', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ec6b71e8-f0ed-4124-807c-a843c38e8ef1', 'x-compute-request-id': 'req-ec6b71e8-f0ed-4124-807c-a843c38e8ef1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b'} Body: b'{"server": {"id": "c69462d2-ab7c-4ae9-9572-13ad098c921b", "name": "tempest-ServerMetadataRbacTest-server-1570620911", "status": "ACTIVE", "tenant_id": "915ccc983b9341ed85216c7d9ac7bfa7", "user_id": "3c1ff96f31b04e82bb3fb98702adee0b", "metadata": {}, "hostId": "0b84e656eca0c1d4032c518cd6ae78d054280549da0a88200b7c2a04", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:14Z", "updated": "2020-11-06T18:00:22Z", "addresses": {"tempest-ServerMetadataRbacTest-1567801355-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:da:e5:f6"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:21.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c6", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:22.319 38 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 8 second wait 2020-11-06 18:00:22.391 40 INFO tempest.lib.common.rest_client [req-35c16605-fae2-4eff-81b3-eb5ff2ccd23d ] Request (ServerTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8 0.203s 2020-11-06 18:00:22.392 40 DEBUG tempest.lib.common.rest_client [req-35c16605-fae2-4eff-81b3-eb5ff2ccd23d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1528', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-35c16605-fae2-4eff-81b3-eb5ff2ccd23d', 'x-compute-request-id': 'req-35c16605-fae2-4eff-81b3-eb5ff2ccd23d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8'} Body: b'{"server": {"id": "37373f5f-0e45-4a02-aea3-c804446204f8", "name": "tempest-ServerTagsRbacTest-server-610909107", "status": "BUILD", "tenant_id": "01712c7a73f8464a8cda41cbd4399038", "user_id": "059542b3d55e4690abcee46249e52f8e", "metadata": {}, "hostId": "496d52bb57d5371371e5a6735c1fd7fd74fb37e35ce9991e70b600ac", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:17Z", "updated": "2020-11-06T18:00:19Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/37373f5f-0e45-4a02-aea3-c804446204f8"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:22.495 38 INFO tempest.lib.common.rest_client [req-93a661f7-5613-4210-8ac9-4d676f35fd98 ] Request (ServerMetadataRbacTest:setUp): 200 PUT http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b/metadata 0.175s 2020-11-06 18:00:22.496 38 DEBUG tempest.lib.common.rest_client [req-93a661f7-5613-4210-8ac9-4d676f35fd98 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"default_key": "value1", "delete_key": "value2"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '63', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-93a661f7-5613-4210-8ac9-4d676f35fd98', 'x-compute-request-id': 'req-93a661f7-5613-4210-8ac9-4d676f35fd98', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b/metadata'} Body: b'{"metadata": {"default_key": "value1", "delete_key": "value2"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:22.498 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:00:22.499 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.500 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.500 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.500 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.501 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.501 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.502 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.502 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.502 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.502 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.503 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.503 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.503 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.504 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.504 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.504 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.504 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.505 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.505 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.505 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.506 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.506 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.506 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.507 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.507 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.507 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.507 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.508 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.508 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.508 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.509 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.509 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.509 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.509 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.510 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.510 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.510 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.511 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.511 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.511 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.511 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.512 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.512 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.512 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.513 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.513 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.514 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.514 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.514 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.515 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.515 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.515 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.516 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.516 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.516 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.516 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.517 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.517 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.517 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.518 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.518 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.518 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.519 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.519 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.519 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.520 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.520 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.520 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.521 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.521 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.521 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.521 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.522 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.522 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.522 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:22.524 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:server-metadata:delete, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:00:22.524 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:22.590 38 INFO tempest.lib.common.rest_client [req-bbc0ee46-76f7-4e57-b5f0-fb9f2782ca15 ] Request (ServerMetadataRbacTest:test_delete_server_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles 0.066s 2020-11-06 18:00:22.591 38 DEBUG tempest.lib.common.rest_client [req-bbc0ee46-76f7-4e57-b5f0-fb9f2782ca15 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bbc0ee46-76f7-4e57-b5f0-fb9f2782ca15', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:22.679 38 INFO tempest.lib.common.rest_client [req-0f0a8734-d841-4104-a4f3-eb70e8c3f08d ] Request (ServerMetadataRbacTest:test_delete_server_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-11-06 18:00:22.679 38 DEBUG tempest.lib.common.rest_client [req-0f0a8734-d841-4104-a4f3-eb70e8c3f08d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0f0a8734-d841-4104-a4f3-eb70e8c3f08d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3c1ff96f31b04e82bb3fb98702adee0b", "name": "tempest-ServerMetadataRbacTest-600743015", "password_expires_at": null}, "audit_ids": ["4tiVm0UvQAG9cPLomJhkqQ"], "expires_at": "2020-11-06T19:00:22.000000Z", "issued_at": "2020-11-06T18:00:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "915ccc983b9341ed85216c7d9ac7bfa7", "name": "tempest-ServerMetadataRbacTest-600743015"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:22.760 37 INFO tempest.lib.common.rest_client [req-bf78c0ef-b6a3-431c-978a-794c2476e246 ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45 0.205s 2020-11-06 18:00:22.761 37 DEBUG tempest.lib.common.rest_client [req-bf78c0ef-b6a3-431c-978a-794c2476e246 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2120', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bf78c0ef-b6a3-431c-978a-794c2476e246', 'x-compute-request-id': 'req-bf78c0ef-b6a3-431c-978a-794c2476e246', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45'} Body: b'{"server": {"id": "d609c5d7-7c53-4853-a874-e6a5b166ad45", "name": "tempest-MigrateServerV225RbacTest-server-1545629045", "status": "RESIZE", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "2d746f1ab29074f3f929b1892e496ee0de7b1451dab2a8ca922b6c38", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:08Z", "updated": "2020-11-06T18:00:21Z", "addresses": {"patrole_reader-net_30048f18-b96b-4343-a720-1173982b59b8": [{"version": 4, "addr": "192.168.120.180", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:54:42:29"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:16.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-SRV-ATTR:reservation_id": "r-fqm7bxkb", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1545629045", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "resize_migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:22.870 38 INFO tempest.lib.common.rest_client [req-de2d050b-b47f-4e83-b3f6-eead1d5c4ed5 ] Request (ServerMetadataRbacTest:test_delete_server_metadata_item): 204 DELETE http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b/metadata/delete_key 0.190s 2020-11-06 18:00:22.871 38 DEBUG tempest.lib.common.rest_client [req-de2d050b-b47f-4e83-b3f6-eead1d5c4ed5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-de2d050b-b47f-4e83-b3f6-eead1d5c4ed5', 'x-compute-request-id': 'req-de2d050b-b47f-4e83-b3f6-eead1d5c4ed5', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b/metadata/delete_key'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:22.872 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:22.928 38 INFO tempest.lib.common.rest_client [req-6b51978f-1daf-4b06-9b24-380974609c11 ] Request (ServerMetadataRbacTest:test_delete_server_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles 0.054s 2020-11-06 18:00:22.928 38 DEBUG tempest.lib.common.rest_client [req-6b51978f-1daf-4b06-9b24-380974609c11 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6b51978f-1daf-4b06-9b24-380974609c11', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:22.967 38 INFO tempest.lib.common.rest_client [req-297bf41e-8076-4c49-b1e3-ce697ad15a6e ] Request (ServerMetadataRbacTest:test_delete_server_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:00:22.968 38 DEBUG tempest.lib.common.rest_client [req-297bf41e-8076-4c49-b1e3-ce697ad15a6e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-297bf41e-8076-4c49-b1e3-ce697ad15a6e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3c1ff96f31b04e82bb3fb98702adee0b", "name": "tempest-ServerMetadataRbacTest-600743015", "password_expires_at": null}, "audit_ids": ["xFtkwVSBRIaVK5k3L-djEg"], "expires_at": "2020-11-06T19:00:22.000000Z", "issued_at": "2020-11-06T18:00:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "915ccc983b9341ed85216c7d9ac7bfa7", "name": "tempest-ServerMetadataRbacTest-600743015"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:23.159 39 INFO tempest.lib.common.rest_client [req-33a8067d-cb24-4478-bc8d-1a7557abc92d ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6 0.066s 2020-11-06 18:00:23.159 39 DEBUG tempest.lib.common.rest_client [req-33a8067d-cb24-4478-bc8d-1a7557abc92d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1607', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-33a8067d-cb24-4478-bc8d-1a7557abc92d', 'x-compute-request-id': 'req-33a8067d-cb24-4478-bc8d-1a7557abc92d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6'} Body: b'{"image": {"id": "4b82337b-9afd-41e8-a1d3-ce32a594dca6", "name": "tempest-ServerActionsRbacTest-image-1763093907", "minRam": 0, "minDisk": 1, "metadata": {"base_image_ref": "56b368f6-9136-40ec-a04c-564d02c95e42", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_type": "snapshot", "instance_uuid": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "owner_project_name": "tempest-ServerActionsRbacTest-1280955528", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1280955528", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f"}, "created": "2020-11-06T18:00:21Z", "updated": "2020-11-06T18:00:21Z", "status": "SAVING", "progress": 25, "OS-EXT-IMG-SIZE:size": 0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}], "server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}]}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:23.250 38 INFO tempest.lib.common.rest_client [req-1e0da686-ea59-45e2-9e5a-8f3a64b48132 ] Request (ServerMetadataRbacTest:setUp): 200 PUT http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b/metadata 0.262s 2020-11-06 18:00:23.251 38 DEBUG tempest.lib.common.rest_client [req-1e0da686-ea59-45e2-9e5a-8f3a64b48132 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"default_key": "value1", "delete_key": "value2"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '63', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1e0da686-ea59-45e2-9e5a-8f3a64b48132', 'x-compute-request-id': 'req-1e0da686-ea59-45e2-9e5a-8f3a64b48132', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b/metadata'} Body: b'{"metadata": {"default_key": "value1", "delete_key": "value2"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:23.255 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:00:23.257 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.258 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.258 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.258 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.259 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.259 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.260 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.260 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.260 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.261 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.261 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.262 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.262 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.262 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.263 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.263 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.263 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.264 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.264 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.265 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.265 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.265 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.266 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.266 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.266 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.267 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.267 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.267 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.268 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.268 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.268 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.269 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.269 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.269 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.270 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.270 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.270 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.271 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.271 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.271 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.272 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.272 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.272 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.273 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.273 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.273 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.274 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.274 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.274 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.275 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.275 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.275 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.276 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.276 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.276 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.277 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.277 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.277 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.278 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.278 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.279 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.279 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.279 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.280 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.280 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.280 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.281 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.281 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.281 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.282 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.282 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.282 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.283 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.283 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.283 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.285 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:server-metadata:index, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:00:23.286 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:23.331 38 INFO tempest.lib.common.rest_client [req-e5025da6-acac-4eee-9eeb-fccc944f9945 ] Request (ServerMetadataRbacTest:test_list_server_metadata): 200 GET http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles 0.044s 2020-11-06 18:00:23.331 38 DEBUG tempest.lib.common.rest_client [req-e5025da6-acac-4eee-9eeb-fccc944f9945 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e5025da6-acac-4eee-9eeb-fccc944f9945', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:23.365 38 INFO tempest.lib.common.rest_client [req-c510cf4a-1555-4284-a309-31b4ccd09fb7 ] Request (ServerMetadataRbacTest:test_list_server_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:00:23.366 38 DEBUG tempest.lib.common.rest_client [req-c510cf4a-1555-4284-a309-31b4ccd09fb7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c510cf4a-1555-4284-a309-31b4ccd09fb7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3c1ff96f31b04e82bb3fb98702adee0b", "name": "tempest-ServerMetadataRbacTest-600743015", "password_expires_at": null}, "audit_ids": ["QfUo3md8TzWcPZ_6MpoOcA"], "expires_at": "2020-11-06T19:00:23.000000Z", "issued_at": "2020-11-06T18:00:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "915ccc983b9341ed85216c7d9ac7bfa7", "name": "tempest-ServerMetadataRbacTest-600743015"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:23.514 38 INFO tempest.lib.common.rest_client [req-632f0968-1b5a-4eeb-a759-7d090ace9300 ] Request (ServerMetadataRbacTest:test_list_server_metadata): 200 GET http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b/metadata 0.147s 2020-11-06 18:00:23.515 38 DEBUG tempest.lib.common.rest_client [req-632f0968-1b5a-4eeb-a759-7d090ace9300 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '63', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-632f0968-1b5a-4eeb-a759-7d090ace9300', 'x-compute-request-id': 'req-632f0968-1b5a-4eeb-a759-7d090ace9300', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b/metadata'} Body: b'{"metadata": {"default_key": "value1", "delete_key": "value2"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:23.518 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:23.569 38 INFO tempest.lib.common.rest_client [req-0cfeb289-3336-4109-b256-c0ba549c1c89 ] Request (ServerMetadataRbacTest:test_list_server_metadata): 200 GET http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles 0.050s 2020-11-06 18:00:23.570 38 DEBUG tempest.lib.common.rest_client [req-0cfeb289-3336-4109-b256-c0ba549c1c89 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0cfeb289-3336-4109-b256-c0ba549c1c89', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:23.607 38 INFO tempest.lib.common.rest_client [req-cb17a749-f192-49b0-8b77-ea94925dc03d ] Request (ServerMetadataRbacTest:test_list_server_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:00:23.608 38 DEBUG tempest.lib.common.rest_client [req-cb17a749-f192-49b0-8b77-ea94925dc03d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cb17a749-f192-49b0-8b77-ea94925dc03d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3c1ff96f31b04e82bb3fb98702adee0b", "name": "tempest-ServerMetadataRbacTest-600743015", "password_expires_at": null}, "audit_ids": ["wMVMvUzES2qvbU1f8LqW8w"], "expires_at": "2020-11-06T19:00:23.000000Z", "issued_at": "2020-11-06T18:00:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "915ccc983b9341ed85216c7d9ac7bfa7", "name": "tempest-ServerMetadataRbacTest-600743015"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:23.685 40 INFO tempest.lib.common.rest_client [req-2e019c18-aae9-4f32-9040-e0cbeb663685 ] Request (ServerTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8 0.275s 2020-11-06 18:00:23.685 40 DEBUG tempest.lib.common.rest_client [req-2e019c18-aae9-4f32-9040-e0cbeb663685 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1528', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2e019c18-aae9-4f32-9040-e0cbeb663685', 'x-compute-request-id': 'req-2e019c18-aae9-4f32-9040-e0cbeb663685', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8'} Body: b'{"server": {"id": "37373f5f-0e45-4a02-aea3-c804446204f8", "name": "tempest-ServerTagsRbacTest-server-610909107", "status": "BUILD", "tenant_id": "01712c7a73f8464a8cda41cbd4399038", "user_id": "059542b3d55e4690abcee46249e52f8e", "metadata": {}, "hostId": "496d52bb57d5371371e5a6735c1fd7fd74fb37e35ce9991e70b600ac", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:17Z", "updated": "2020-11-06T18:00:19Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/37373f5f-0e45-4a02-aea3-c804446204f8"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:23.875 38 INFO tempest.lib.common.rest_client [req-89d14d8b-5517-4144-8bb3-be6562791ef9 ] Request (ServerMetadataRbacTest:setUp): 200 PUT http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b/metadata 0.263s 2020-11-06 18:00:23.876 38 DEBUG tempest.lib.common.rest_client [req-89d14d8b-5517-4144-8bb3-be6562791ef9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"default_key": "value1", "delete_key": "value2"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '63', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-89d14d8b-5517-4144-8bb3-be6562791ef9', 'x-compute-request-id': 'req-89d14d8b-5517-4144-8bb3-be6562791ef9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b/metadata'} Body: b'{"metadata": {"default_key": "value1", "delete_key": "value2"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:23.878 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:00:23.878 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.879 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.879 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.879 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.880 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.880 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.881 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.881 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.881 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.881 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.882 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.882 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.882 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.883 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.883 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.883 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.884 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.884 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.884 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.885 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.885 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.885 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.886 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.886 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.886 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.886 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.887 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.887 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.887 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.888 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.888 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.888 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.889 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.889 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.889 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.890 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.890 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.890 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.890 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.891 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.891 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.891 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.892 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.892 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.892 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.892 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.893 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.893 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.893 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.894 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.894 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.894 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.895 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.895 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.895 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.896 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.896 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.896 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.896 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.897 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.897 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.898 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.898 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.898 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.899 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.899 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.899 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.900 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.900 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.900 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.900 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.901 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.901 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.901 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.902 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:23.903 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:server-metadata:update_all, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:00:23.903 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:23.975 38 INFO tempest.lib.common.rest_client [req-6d476c00-3e85-492e-969d-eb0649167733 ] Request (ServerMetadataRbacTest:test_set_server_metadata): 200 GET http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles 0.071s 2020-11-06 18:00:23.976 38 DEBUG tempest.lib.common.rest_client [req-6d476c00-3e85-492e-969d-eb0649167733 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6d476c00-3e85-492e-969d-eb0649167733', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:24.012 38 INFO tempest.lib.common.rest_client [req-58bc0156-beac-40f5-ad33-bd094ed31b83 ] Request (ServerMetadataRbacTest:test_set_server_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:00:24.012 38 DEBUG tempest.lib.common.rest_client [req-58bc0156-beac-40f5-ad33-bd094ed31b83 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-58bc0156-beac-40f5-ad33-bd094ed31b83', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3c1ff96f31b04e82bb3fb98702adee0b", "name": "tempest-ServerMetadataRbacTest-600743015", "password_expires_at": null}, "audit_ids": ["tVJS7D9iQ6mG5XBaYQXrbg"], "expires_at": "2020-11-06T19:00:24.000000Z", "issued_at": "2020-11-06T18:00:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "915ccc983b9341ed85216c7d9ac7bfa7", "name": "tempest-ServerMetadataRbacTest-600743015"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:24.020 37 INFO tempest.lib.common.rest_client [req-ad92f5d8-8d34-47a0-acf4-591a5793c551 ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45 0.242s 2020-11-06 18:00:24.021 37 DEBUG tempest.lib.common.rest_client [req-ad92f5d8-8d34-47a0-acf4-591a5793c551 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2120', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ad92f5d8-8d34-47a0-acf4-591a5793c551', 'x-compute-request-id': 'req-ad92f5d8-8d34-47a0-acf4-591a5793c551', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45'} Body: b'{"server": {"id": "d609c5d7-7c53-4853-a874-e6a5b166ad45", "name": "tempest-MigrateServerV225RbacTest-server-1545629045", "status": "RESIZE", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "2d746f1ab29074f3f929b1892e496ee0de7b1451dab2a8ca922b6c38", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:08Z", "updated": "2020-11-06T18:00:21Z", "addresses": {"patrole_reader-net_30048f18-b96b-4343-a720-1173982b59b8": [{"version": 4, "addr": "192.168.120.180", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:54:42:29"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:16.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-SRV-ATTR:reservation_id": "r-fqm7bxkb", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1545629045", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "resize_migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:24.236 39 INFO tempest.lib.common.rest_client [req-250e0110-7fda-4892-adb4-30bc295d5f9d ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6 0.067s 2020-11-06 18:00:24.236 39 DEBUG tempest.lib.common.rest_client [req-250e0110-7fda-4892-adb4-30bc295d5f9d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1607', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-250e0110-7fda-4892-adb4-30bc295d5f9d', 'x-compute-request-id': 'req-250e0110-7fda-4892-adb4-30bc295d5f9d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6'} Body: b'{"image": {"id": "4b82337b-9afd-41e8-a1d3-ce32a594dca6", "name": "tempest-ServerActionsRbacTest-image-1763093907", "minRam": 0, "minDisk": 1, "metadata": {"base_image_ref": "56b368f6-9136-40ec-a04c-564d02c95e42", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_type": "snapshot", "instance_uuid": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "owner_project_name": "tempest-ServerActionsRbacTest-1280955528", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1280955528", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f"}, "created": "2020-11-06T18:00:21Z", "updated": "2020-11-06T18:00:21Z", "status": "SAVING", "progress": 25, "OS-EXT-IMG-SIZE:size": 0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}], "server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}]}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:24.277 38 INFO tempest.lib.common.rest_client [req-49e401a4-5982-411d-93fe-32260dcc9a0b ] Request (ServerMetadataRbacTest:test_set_server_metadata): 200 PUT http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b/metadata 0.263s 2020-11-06 18:00:24.277 38 DEBUG tempest.lib.common.rest_client [req-49e401a4-5982-411d-93fe-32260dcc9a0b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '16', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-49e401a4-5982-411d-93fe-32260dcc9a0b', 'x-compute-request-id': 'req-49e401a4-5982-411d-93fe-32260dcc9a0b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b/metadata'} Body: b'{"metadata": {}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:24.280 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:24.329 38 INFO tempest.lib.common.rest_client [req-9d90f331-3494-4b39-9336-8e0e2bb205b5 ] Request (ServerMetadataRbacTest:test_set_server_metadata): 200 GET http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles 0.047s 2020-11-06 18:00:24.329 38 DEBUG tempest.lib.common.rest_client [req-9d90f331-3494-4b39-9336-8e0e2bb205b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9d90f331-3494-4b39-9336-8e0e2bb205b5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:24.364 38 INFO tempest.lib.common.rest_client [req-25353115-00ee-4404-85d0-62a04d72566a ] Request (ServerMetadataRbacTest:test_set_server_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:00:24.365 38 DEBUG tempest.lib.common.rest_client [req-25353115-00ee-4404-85d0-62a04d72566a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-25353115-00ee-4404-85d0-62a04d72566a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3c1ff96f31b04e82bb3fb98702adee0b", "name": "tempest-ServerMetadataRbacTest-600743015", "password_expires_at": null}, "audit_ids": ["-ruUm7JFSmyHeIqr3dlAwA"], "expires_at": "2020-11-06T19:00:24.000000Z", "issued_at": "2020-11-06T18:00:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "915ccc983b9341ed85216c7d9ac7bfa7", "name": "tempest-ServerMetadataRbacTest-600743015"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:24.619 38 INFO tempest.lib.common.rest_client [req-6cd52b26-0ca8-4eaf-85c6-f027e10c840b ] Request (ServerMetadataRbacTest:setUp): 200 PUT http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b/metadata 0.250s 2020-11-06 18:00:24.620 38 DEBUG tempest.lib.common.rest_client [req-6cd52b26-0ca8-4eaf-85c6-f027e10c840b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"default_key": "value1", "delete_key": "value2"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '63', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6cd52b26-0ca8-4eaf-85c6-f027e10c840b', 'x-compute-request-id': 'req-6cd52b26-0ca8-4eaf-85c6-f027e10c840b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b/metadata'} Body: b'{"metadata": {"default_key": "value1", "delete_key": "value2"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:24.624 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:00:24.626 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.627 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.628 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.629 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.629 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.630 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.630 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.631 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.631 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.632 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.632 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.633 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.633 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.634 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.634 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.634 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.635 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.635 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.635 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.636 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.636 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.636 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.637 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.637 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.637 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.637 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.638 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.638 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.638 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.639 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.639 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.639 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.640 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.640 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.640 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.640 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.641 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.641 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.641 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.642 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.642 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.642 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.642 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.643 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.643 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.643 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.644 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.644 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.644 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.645 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.645 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.645 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.645 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.646 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.646 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.646 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.647 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.647 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.647 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.648 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.648 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.648 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.649 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.649 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.649 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.650 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.650 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.650 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.651 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.651 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.651 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.651 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.652 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.652 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.652 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:24.654 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:server-metadata:update, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:00:24.654 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:24.710 38 INFO tempest.lib.common.rest_client [req-961fadbf-9eb1-4d20-a4aa-38ffde4e25d1 ] Request (ServerMetadataRbacTest:test_set_server_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles 0.055s 2020-11-06 18:00:24.710 38 DEBUG tempest.lib.common.rest_client [req-961fadbf-9eb1-4d20-a4aa-38ffde4e25d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-961fadbf-9eb1-4d20-a4aa-38ffde4e25d1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:24.743 38 INFO tempest.lib.common.rest_client [req-bf42c11a-5336-4c2a-987d-23aec1ccb9fd ] Request (ServerMetadataRbacTest:test_set_server_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:00:24.744 38 DEBUG tempest.lib.common.rest_client [req-bf42c11a-5336-4c2a-987d-23aec1ccb9fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bf42c11a-5336-4c2a-987d-23aec1ccb9fd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3c1ff96f31b04e82bb3fb98702adee0b", "name": "tempest-ServerMetadataRbacTest-600743015", "password_expires_at": null}, "audit_ids": ["U6-U8djzSGyutIu5DNtS9A"], "expires_at": "2020-11-06T19:00:24.000000Z", "issued_at": "2020-11-06T18:00:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "915ccc983b9341ed85216c7d9ac7bfa7", "name": "tempest-ServerMetadataRbacTest-600743015"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:25.001 40 INFO tempest.lib.common.rest_client [req-6f795d7d-742a-49c9-a357-f3770237b879 ] Request (ServerTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8 0.301s 2020-11-06 18:00:25.002 40 DEBUG tempest.lib.common.rest_client [req-6f795d7d-742a-49c9-a357-f3770237b879 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1528', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6f795d7d-742a-49c9-a357-f3770237b879', 'x-compute-request-id': 'req-6f795d7d-742a-49c9-a357-f3770237b879', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8'} Body: b'{"server": {"id": "37373f5f-0e45-4a02-aea3-c804446204f8", "name": "tempest-ServerTagsRbacTest-server-610909107", "status": "BUILD", "tenant_id": "01712c7a73f8464a8cda41cbd4399038", "user_id": "059542b3d55e4690abcee46249e52f8e", "metadata": {}, "hostId": "496d52bb57d5371371e5a6735c1fd7fd74fb37e35ce9991e70b600ac", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:17Z", "updated": "2020-11-06T18:00:19Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/37373f5f-0e45-4a02-aea3-c804446204f8"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:25.007 38 INFO tempest.lib.common.rest_client [req-463885a3-27d5-4aab-af26-fd1898fa9ac3 ] Request (ServerMetadataRbacTest:test_set_server_metadata_item): 200 PUT http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b/metadata/default_key 0.262s 2020-11-06 18:00:25.008 38 DEBUG tempest.lib.common.rest_client [req-463885a3-27d5-4aab-af26-fd1898fa9ac3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"meta": {"default_key": "value2"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '35', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-463885a3-27d5-4aab-af26-fd1898fa9ac3', 'x-compute-request-id': 'req-463885a3-27d5-4aab-af26-fd1898fa9ac3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b/metadata/default_key'} Body: b'{"meta": {"default_key": "value2"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:25.011 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:25.059 38 INFO tempest.lib.common.rest_client [req-8102bbd7-039d-49d4-ac55-ad06cc50bcda ] Request (ServerMetadataRbacTest:test_set_server_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles 0.047s 2020-11-06 18:00:25.060 38 DEBUG tempest.lib.common.rest_client [req-8102bbd7-039d-49d4-ac55-ad06cc50bcda ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8102bbd7-039d-49d4-ac55-ad06cc50bcda', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:25.092 38 INFO tempest.lib.common.rest_client [req-eb470351-c12d-481f-b3d0-96fa8ea4c85d ] Request (ServerMetadataRbacTest:test_set_server_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:00:25.093 38 DEBUG tempest.lib.common.rest_client [req-eb470351-c12d-481f-b3d0-96fa8ea4c85d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eb470351-c12d-481f-b3d0-96fa8ea4c85d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3c1ff96f31b04e82bb3fb98702adee0b", "name": "tempest-ServerMetadataRbacTest-600743015", "password_expires_at": null}, "audit_ids": ["cp1ZnFADS1-vNiijhMxB4A"], "expires_at": "2020-11-06T19:00:25.000000Z", "issued_at": "2020-11-06T18:00:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "915ccc983b9341ed85216c7d9ac7bfa7", "name": "tempest-ServerMetadataRbacTest-600743015"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:25.308 39 INFO tempest.lib.common.rest_client [req-d6264e51-fcd9-4906-8502-8249ac10b3c9 ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6 0.062s 2020-11-06 18:00:25.309 39 DEBUG tempest.lib.common.rest_client [req-d6264e51-fcd9-4906-8502-8249ac10b3c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1607', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d6264e51-fcd9-4906-8502-8249ac10b3c9', 'x-compute-request-id': 'req-d6264e51-fcd9-4906-8502-8249ac10b3c9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6'} Body: b'{"image": {"id": "4b82337b-9afd-41e8-a1d3-ce32a594dca6", "name": "tempest-ServerActionsRbacTest-image-1763093907", "minRam": 0, "minDisk": 1, "metadata": {"base_image_ref": "56b368f6-9136-40ec-a04c-564d02c95e42", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_type": "snapshot", "instance_uuid": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "owner_project_name": "tempest-ServerActionsRbacTest-1280955528", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1280955528", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f"}, "created": "2020-11-06T18:00:21Z", "updated": "2020-11-06T18:00:21Z", "status": "SAVING", "progress": 25, "OS-EXT-IMG-SIZE:size": 0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}], "server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}]}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:25.333 37 INFO tempest.lib.common.rest_client [req-d2ba617a-95d5-48e8-b2d3-2a247765f70d ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45 0.295s 2020-11-06 18:00:25.334 37 DEBUG tempest.lib.common.rest_client [req-d2ba617a-95d5-48e8-b2d3-2a247765f70d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2119', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d2ba617a-95d5-48e8-b2d3-2a247765f70d', 'x-compute-request-id': 'req-d2ba617a-95d5-48e8-b2d3-2a247765f70d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45'} Body: b'{"server": {"id": "d609c5d7-7c53-4853-a874-e6a5b166ad45", "name": "tempest-MigrateServerV225RbacTest-server-1545629045", "status": "RESIZE", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "11963b972eb6d09f2649fda4ffdcbc396a903c992fbb1e9c0e251a47", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:08Z", "updated": "2020-11-06T18:00:24Z", "addresses": {"patrole_reader-net_30048f18-b96b-4343-a720-1173982b59b8": [{"version": 4, "addr": "192.168.120.180", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:54:42:29"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:16.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-SRV-ATTR:reservation_id": "r-fqm7bxkb", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1545629045", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "resize_migrated", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:25.347 37 INFO tempest.common.waiters [-] State transition "RESIZE/resize_migrating" ==> "RESIZE/resize_migrated" after 7 second wait 2020-11-06 18:00:25.348 38 INFO tempest.lib.common.rest_client [req-03e8bcf6-4ff5-43e9-be39-f1dfd76ac227 ] Request (ServerMetadataRbacTest:setUp): 200 PUT http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b/metadata 0.250s 2020-11-06 18:00:25.348 38 DEBUG tempest.lib.common.rest_client [req-03e8bcf6-4ff5-43e9-be39-f1dfd76ac227 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"default_key": "value1", "delete_key": "value2"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '63', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-03e8bcf6-4ff5-43e9-be39-f1dfd76ac227', 'x-compute-request-id': 'req-03e8bcf6-4ff5-43e9-be39-f1dfd76ac227', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b/metadata'} Body: b'{"metadata": {"default_key": "value1", "delete_key": "value2"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:25.353 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:00:25.354 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.355 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.356 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.357 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.358 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.358 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.359 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.359 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.360 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.360 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.361 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.361 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.362 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.362 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.363 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.363 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.363 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.364 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.364 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.364 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.365 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.365 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.365 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.365 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.366 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.366 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.366 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.367 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.367 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.367 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.367 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.368 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.368 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.368 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.368 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.369 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.369 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.369 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.370 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.370 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.370 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.371 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.371 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.371 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.372 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.372 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.372 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.372 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.373 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.373 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.373 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.374 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.374 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.374 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.374 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.375 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.375 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.375 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.376 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.376 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.376 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.377 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.377 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.377 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.378 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.378 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.378 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.378 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.379 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.379 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.379 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.380 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.380 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.380 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.380 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.383 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:server-metadata:show, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:00:25.383 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:25.440 38 INFO tempest.lib.common.rest_client [req-75210d42-86db-48eb-8816-c9508367ca64 ] Request (ServerMetadataRbacTest:test_show_server_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles 0.055s 2020-11-06 18:00:25.441 38 DEBUG tempest.lib.common.rest_client [req-75210d42-86db-48eb-8816-c9508367ca64 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-75210d42-86db-48eb-8816-c9508367ca64', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:25.473 38 INFO tempest.lib.common.rest_client [req-fa17fa17-3be5-4f20-8e9b-84f57572a18d ] Request (ServerMetadataRbacTest:test_show_server_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:00:25.473 38 DEBUG tempest.lib.common.rest_client [req-fa17fa17-3be5-4f20-8e9b-84f57572a18d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fa17fa17-3be5-4f20-8e9b-84f57572a18d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3c1ff96f31b04e82bb3fb98702adee0b", "name": "tempest-ServerMetadataRbacTest-600743015", "password_expires_at": null}, "audit_ids": ["ndy06ENeRr-Kxvft-OgOCQ"], "expires_at": "2020-11-06T19:00:25.000000Z", "issued_at": "2020-11-06T18:00:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "915ccc983b9341ed85216c7d9ac7bfa7", "name": "tempest-ServerMetadataRbacTest-600743015"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:25.616 38 INFO tempest.lib.common.rest_client [req-0dcceb6b-f3fb-41d6-bfe9-0f4239d30a4f ] Request (ServerMetadataRbacTest:test_show_server_metadata_item): 200 GET http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b/metadata/default_key 0.142s 2020-11-06 18:00:25.617 38 DEBUG tempest.lib.common.rest_client [req-0dcceb6b-f3fb-41d6-bfe9-0f4239d30a4f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '35', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0dcceb6b-f3fb-41d6-bfe9-0f4239d30a4f', 'x-compute-request-id': 'req-0dcceb6b-f3fb-41d6-bfe9-0f4239d30a4f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b/metadata/default_key'} Body: b'{"meta": {"default_key": "value1"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:25.620 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:25.675 38 INFO tempest.lib.common.rest_client [req-151f4a2f-9b91-421f-9dbf-bd09e516d517 ] Request (ServerMetadataRbacTest:test_show_server_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles 0.054s 2020-11-06 18:00:25.676 38 DEBUG tempest.lib.common.rest_client [req-151f4a2f-9b91-421f-9dbf-bd09e516d517 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-151f4a2f-9b91-421f-9dbf-bd09e516d517', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:25.709 38 INFO tempest.lib.common.rest_client [req-e07f33e6-3086-4626-992e-c20bdbf776d1 ] Request (ServerMetadataRbacTest:test_show_server_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:00:25.710 38 DEBUG tempest.lib.common.rest_client [req-e07f33e6-3086-4626-992e-c20bdbf776d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e07f33e6-3086-4626-992e-c20bdbf776d1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3c1ff96f31b04e82bb3fb98702adee0b", "name": "tempest-ServerMetadataRbacTest-600743015", "password_expires_at": null}, "audit_ids": ["v3A6zWiARUaJlHz52SZ69g"], "expires_at": "2020-11-06T19:00:25.000000Z", "issued_at": "2020-11-06T18:00:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "915ccc983b9341ed85216c7d9ac7bfa7", "name": "tempest-ServerMetadataRbacTest-600743015"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:25.984 38 INFO tempest.lib.common.rest_client [req-1fc01795-9eb1-41f9-a5d8-c21d6afcc47f ] Request (ServerMetadataRbacTest:setUp): 200 PUT http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b/metadata 0.268s 2020-11-06 18:00:25.985 38 DEBUG tempest.lib.common.rest_client [req-1fc01795-9eb1-41f9-a5d8-c21d6afcc47f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"default_key": "value1", "delete_key": "value2"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '63', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1fc01795-9eb1-41f9-a5d8-c21d6afcc47f', 'x-compute-request-id': 'req-1fc01795-9eb1-41f9-a5d8-c21d6afcc47f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b/metadata'} Body: b'{"metadata": {"default_key": "value1", "delete_key": "value2"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:25.988 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:00:25.989 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.990 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.990 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.991 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.992 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.992 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.993 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.994 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.994 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.994 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.995 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.995 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.995 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.996 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.996 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.997 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.997 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.997 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.998 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.998 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.998 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.999 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.999 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.999 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:25.999 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.000 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.000 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.000 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.001 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.001 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.001 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.002 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.002 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.002 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.003 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.003 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.003 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.004 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.004 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.004 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.004 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.005 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.005 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.005 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.006 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.006 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.006 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.007 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.007 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.007 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.007 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.008 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.008 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.008 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.009 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.009 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.009 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.010 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.010 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.010 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.011 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.011 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.012 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.012 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.012 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.012 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.013 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.013 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.014 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.014 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.014 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.015 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.015 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.016 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.016 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:26.017 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:server-metadata:create, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:00:26.018 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:26.080 38 INFO tempest.lib.common.rest_client [req-28474524-f682-4a2e-8154-541c1090b24a ] Request (ServerMetadataRbacTest:test_update_server_metadata): 200 GET http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles 0.061s 2020-11-06 18:00:26.080 38 DEBUG tempest.lib.common.rest_client [req-28474524-f682-4a2e-8154-541c1090b24a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-28474524-f682-4a2e-8154-541c1090b24a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:26.116 38 INFO tempest.lib.common.rest_client [req-0fc61279-a02e-42f7-b32f-b24a350ad4a0 ] Request (ServerMetadataRbacTest:test_update_server_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:00:26.116 38 DEBUG tempest.lib.common.rest_client [req-0fc61279-a02e-42f7-b32f-b24a350ad4a0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0fc61279-a02e-42f7-b32f-b24a350ad4a0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3c1ff96f31b04e82bb3fb98702adee0b", "name": "tempest-ServerMetadataRbacTest-600743015", "password_expires_at": null}, "audit_ids": ["rwWyZkeiSXmgPC1sZv7Okw"], "expires_at": "2020-11-06T19:00:26.000000Z", "issued_at": "2020-11-06T18:00:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "915ccc983b9341ed85216c7d9ac7bfa7", "name": "tempest-ServerMetadataRbacTest-600743015"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:26.360 38 INFO tempest.lib.common.rest_client [req-a04ae47f-be8b-4169-955f-2d69199ac50c ] Request (ServerMetadataRbacTest:test_update_server_metadata): 200 POST http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b/metadata 0.241s 2020-11-06 18:00:26.361 38 DEBUG tempest.lib.common.rest_client [req-a04ae47f-be8b-4169-955f-2d69199ac50c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '63', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a04ae47f-be8b-4169-955f-2d69199ac50c', 'x-compute-request-id': 'req-a04ae47f-be8b-4169-955f-2d69199ac50c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b/metadata'} Body: b'{"metadata": {"default_key": "value1", "delete_key": "value2"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:26.364 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:26.390 39 INFO tempest.lib.common.rest_client [req-5d4340cd-f6a0-403e-9f43-d425f09dd823 ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6 0.070s 2020-11-06 18:00:26.390 39 DEBUG tempest.lib.common.rest_client [req-5d4340cd-f6a0-403e-9f43-d425f09dd823 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1607', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5d4340cd-f6a0-403e-9f43-d425f09dd823', 'x-compute-request-id': 'req-5d4340cd-f6a0-403e-9f43-d425f09dd823', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6'} Body: b'{"image": {"id": "4b82337b-9afd-41e8-a1d3-ce32a594dca6", "name": "tempest-ServerActionsRbacTest-image-1763093907", "minRam": 0, "minDisk": 1, "metadata": {"base_image_ref": "56b368f6-9136-40ec-a04c-564d02c95e42", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_type": "snapshot", "instance_uuid": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "owner_project_name": "tempest-ServerActionsRbacTest-1280955528", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1280955528", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f"}, "created": "2020-11-06T18:00:21Z", "updated": "2020-11-06T18:00:21Z", "status": "SAVING", "progress": 25, "OS-EXT-IMG-SIZE:size": 0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}], "server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}]}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:26.414 38 INFO tempest.lib.common.rest_client [req-ab61ab7b-836f-4d2a-aab9-fd9561eaa88f ] Request (ServerMetadataRbacTest:test_update_server_metadata): 200 GET http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles 0.049s 2020-11-06 18:00:26.414 38 DEBUG tempest.lib.common.rest_client [req-ab61ab7b-836f-4d2a-aab9-fd9561eaa88f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ab61ab7b-836f-4d2a-aab9-fd9561eaa88f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7/users/3c1ff96f31b04e82bb3fb98702adee0b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:26.450 38 INFO tempest.lib.common.rest_client [req-8c7b6188-758d-4daa-a913-fb8c8942f6da ] Request (ServerMetadataRbacTest:test_update_server_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:00:26.450 38 DEBUG tempest.lib.common.rest_client [req-8c7b6188-758d-4daa-a913-fb8c8942f6da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8c7b6188-758d-4daa-a913-fb8c8942f6da', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3c1ff96f31b04e82bb3fb98702adee0b", "name": "tempest-ServerMetadataRbacTest-600743015", "password_expires_at": null}, "audit_ids": ["BiH1Egp2RB26jmtXXDZA0Q"], "expires_at": "2020-11-06T19:00:26.000000Z", "issued_at": "2020-11-06T18:00:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "915ccc983b9341ed85216c7d9ac7bfa7", "name": "tempest-ServerMetadataRbacTest-600743015"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_915ccc983b9341ed85216c7d9ac7bfa7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:26.610 37 INFO tempest.lib.common.rest_client [req-962e2245-b043-4354-8933-2f7d6dabea6b ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45 0.261s 2020-11-06 18:00:26.611 37 DEBUG tempest.lib.common.rest_client [req-962e2245-b043-4354-8933-2f7d6dabea6b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2117', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-962e2245-b043-4354-8933-2f7d6dabea6b', 'x-compute-request-id': 'req-962e2245-b043-4354-8933-2f7d6dabea6b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45'} Body: b'{"server": {"id": "d609c5d7-7c53-4853-a874-e6a5b166ad45", "name": "tempest-MigrateServerV225RbacTest-server-1545629045", "status": "RESIZE", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "11963b972eb6d09f2649fda4ffdcbc396a903c992fbb1e9c0e251a47", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:08Z", "updated": "2020-11-06T18:00:26Z", "addresses": {"patrole_reader-net_30048f18-b96b-4343-a720-1173982b59b8": [{"version": 4, "addr": "192.168.120.180", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:54:42:29"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:16.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-SRV-ATTR:reservation_id": "r-fqm7bxkb", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1545629045", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "resize_finish", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:26.623 37 INFO tempest.common.waiters [-] State transition "RESIZE/resize_migrated" ==> "RESIZE/resize_finish" after 8 second wait 2020-11-06 18:00:26.709 38 INFO tempest.lib.common.rest_client [req-02c7c6fa-7e5b-414f-9a0d-1dd2fb6a8f1b ] Request (ServerMetadataRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b 0.254s 2020-11-06 18:00:26.710 38 DEBUG tempest.lib.common.rest_client [req-02c7c6fa-7e5b-414f-9a0d-1dd2fb6a8f1b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-02c7c6fa-7e5b-414f-9a0d-1dd2fb6a8f1b', 'x-compute-request-id': 'req-02c7c6fa-7e5b-414f-9a0d-1dd2fb6a8f1b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:27.458 39 INFO tempest.lib.common.rest_client [req-8adda440-e8ef-4678-864d-7fd18852f2cd ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6 0.060s 2020-11-06 18:00:27.459 39 DEBUG tempest.lib.common.rest_client [req-8adda440-e8ef-4678-864d-7fd18852f2cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1713', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8adda440-e8ef-4678-864d-7fd18852f2cd', 'x-compute-request-id': 'req-8adda440-e8ef-4678-864d-7fd18852f2cd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6'} Body: b'{"image": {"id": "4b82337b-9afd-41e8-a1d3-ce32a594dca6", "name": "tempest-ServerActionsRbacTest-image-1763093907", "minRam": 0, "minDisk": 1, "metadata": {"base_image_ref": "56b368f6-9136-40ec-a04c-564d02c95e42", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_location": "snapshot", "image_state": "available", "image_type": "snapshot", "instance_uuid": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "owner_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "owner_project_name": "tempest-ServerActionsRbacTest-1280955528", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1280955528", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f"}, "created": "2020-11-06T18:00:21Z", "updated": "2020-11-06T18:00:27Z", "status": "SAVING", "progress": 50, "OS-EXT-IMG-SIZE:size": 0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}], "server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}]}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:27.663 40 INFO tempest.lib.common.rest_client [req-3b53bb74-3db4-4444-abc6-aa2657053ef4 ] Request (ServerTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8 1.645s 2020-11-06 18:00:27.664 40 DEBUG tempest.lib.common.rest_client [req-3b53bb74-3db4-4444-abc6-aa2657053ef4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1528', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3b53bb74-3db4-4444-abc6-aa2657053ef4', 'x-compute-request-id': 'req-3b53bb74-3db4-4444-abc6-aa2657053ef4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8'} Body: b'{"server": {"id": "37373f5f-0e45-4a02-aea3-c804446204f8", "name": "tempest-ServerTagsRbacTest-server-610909107", "status": "BUILD", "tenant_id": "01712c7a73f8464a8cda41cbd4399038", "user_id": "059542b3d55e4690abcee46249e52f8e", "metadata": {}, "hostId": "496d52bb57d5371371e5a6735c1fd7fd74fb37e35ce9991e70b600ac", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:17Z", "updated": "2020-11-06T18:00:19Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/37373f5f-0e45-4a02-aea3-c804446204f8"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:27.679 38 INFO tempest.lib.common.rest_client [req-c24bc559-c106-44fa-9124-e0cf1f71471a ] Request (ServerMetadataRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b 0.968s 2020-11-06 18:00:27.679 38 DEBUG tempest.lib.common.rest_client [req-c24bc559-c106-44fa-9124-e0cf1f71471a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1773', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c24bc559-c106-44fa-9124-e0cf1f71471a', 'x-compute-request-id': 'req-c24bc559-c106-44fa-9124-e0cf1f71471a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b'} Body: b'{"server": {"id": "c69462d2-ab7c-4ae9-9572-13ad098c921b", "name": "tempest-ServerMetadataRbacTest-server-1570620911", "status": "ACTIVE", "tenant_id": "915ccc983b9341ed85216c7d9ac7bfa7", "user_id": "3c1ff96f31b04e82bb3fb98702adee0b", "metadata": {"default_key": "value1", "delete_key": "value2"}, "hostId": "0b84e656eca0c1d4032c518cd6ae78d054280549da0a88200b7c2a04", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:14Z", "updated": "2020-11-06T18:00:27Z", "addresses": {"tempest-ServerMetadataRbacTest-1567801355-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:da:e5:f6"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:21.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c6", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:28.216 37 INFO tempest.lib.common.rest_client [req-11063391-3a5a-42a3-9edb-09f9af5184c4 ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45 0.591s 2020-11-06 18:00:28.217 37 DEBUG tempest.lib.common.rest_client [req-11063391-3a5a-42a3-9edb-09f9af5184c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2117', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-11063391-3a5a-42a3-9edb-09f9af5184c4', 'x-compute-request-id': 'req-11063391-3a5a-42a3-9edb-09f9af5184c4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45'} Body: b'{"server": {"id": "d609c5d7-7c53-4853-a874-e6a5b166ad45", "name": "tempest-MigrateServerV225RbacTest-server-1545629045", "status": "RESIZE", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "11963b972eb6d09f2649fda4ffdcbc396a903c992fbb1e9c0e251a47", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:08Z", "updated": "2020-11-06T18:00:26Z", "addresses": {"patrole_reader-net_30048f18-b96b-4343-a720-1173982b59b8": [{"version": 4, "addr": "192.168.120.180", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:54:42:29"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:16.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-SRV-ATTR:reservation_id": "r-fqm7bxkb", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1545629045", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "resize_finish", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:28.537 39 INFO tempest.lib.common.rest_client [req-2221dfea-6e3b-45a4-b771-202392b9a8d5 ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6 0.068s 2020-11-06 18:00:28.538 39 DEBUG tempest.lib.common.rest_client [req-2221dfea-6e3b-45a4-b771-202392b9a8d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1713', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2221dfea-6e3b-45a4-b771-202392b9a8d5', 'x-compute-request-id': 'req-2221dfea-6e3b-45a4-b771-202392b9a8d5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6'} Body: b'{"image": {"id": "4b82337b-9afd-41e8-a1d3-ce32a594dca6", "name": "tempest-ServerActionsRbacTest-image-1763093907", "minRam": 0, "minDisk": 1, "metadata": {"base_image_ref": "56b368f6-9136-40ec-a04c-564d02c95e42", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_location": "snapshot", "image_state": "available", "image_type": "snapshot", "instance_uuid": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "owner_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "owner_project_name": "tempest-ServerActionsRbacTest-1280955528", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1280955528", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f"}, "created": "2020-11-06T18:00:21Z", "updated": "2020-11-06T18:00:27Z", "status": "SAVING", "progress": 50, "OS-EXT-IMG-SIZE:size": 0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}], "server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}]}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:28.898 40 INFO tempest.lib.common.rest_client [req-f418bb3f-662d-4b5d-a9d3-db7125f47c22 ] Request (ServerTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8 0.222s 2020-11-06 18:00:28.899 40 DEBUG tempest.lib.common.rest_client [req-f418bb3f-662d-4b5d-a9d3-db7125f47c22 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1710', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f418bb3f-662d-4b5d-a9d3-db7125f47c22', 'x-compute-request-id': 'req-f418bb3f-662d-4b5d-a9d3-db7125f47c22', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8'} Body: b'{"server": {"id": "37373f5f-0e45-4a02-aea3-c804446204f8", "name": "tempest-ServerTagsRbacTest-server-610909107", "status": "ACTIVE", "tenant_id": "01712c7a73f8464a8cda41cbd4399038", "user_id": "059542b3d55e4690abcee46249e52f8e", "metadata": {}, "hostId": "496d52bb57d5371371e5a6735c1fd7fd74fb37e35ce9991e70b600ac", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:17Z", "updated": "2020-11-06T18:00:28Z", "addresses": {"tempest-ServerTagsRbacTest-898134328-network": [{"version": 4, "addr": "192.168.120.9", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:04:bc:24"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/37373f5f-0e45-4a02-aea3-c804446204f8"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:28.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:28.911 40 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 11 second wait 2020-11-06 18:00:28.912 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:00:28.913 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.913 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.914 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.914 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.914 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.915 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.915 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.916 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.916 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.916 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.916 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.917 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.917 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.917 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.918 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.918 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.918 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.919 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.919 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.919 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.919 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.920 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.920 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.920 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.921 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.921 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.921 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.921 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.922 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.922 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.922 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.923 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.923 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.923 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.923 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.924 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.924 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.924 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.924 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.925 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.925 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.925 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.926 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.926 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.926 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.926 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.927 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.927 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.927 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.928 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.928 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.928 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.928 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.929 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.929 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.929 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.930 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.930 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.930 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.930 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.931 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.931 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.931 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.932 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.932 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.932 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.932 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.933 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.933 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.933 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.933 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.933 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.934 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.934 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.934 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:28.935 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-server-tags:show, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:00:28.974 38 INFO tempest.lib.common.rest_client [req-eb888ff4-a172-4638-83e2-0dba4d90bb51 ] Request (ServerMetadataRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b 0.279s 2020-11-06 18:00:28.974 38 DEBUG tempest.lib.common.rest_client [req-eb888ff4-a172-4638-83e2-0dba4d90bb51 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1566', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-eb888ff4-a172-4638-83e2-0dba4d90bb51', 'x-compute-request-id': 'req-eb888ff4-a172-4638-83e2-0dba4d90bb51', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b'} Body: b'{"server": {"id": "c69462d2-ab7c-4ae9-9572-13ad098c921b", "name": "tempest-ServerMetadataRbacTest-server-1570620911", "status": "DELETED", "tenant_id": "915ccc983b9341ed85216c7d9ac7bfa7", "user_id": "3c1ff96f31b04e82bb3fb98702adee0b", "metadata": {"default_key": "value1", "delete_key": "value2"}, "hostId": "0b84e656eca0c1d4032c518cd6ae78d054280549da0a88200b7c2a04", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:14Z", "updated": "2020-11-06T18:00:29Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:21.000000", "OS-SRV-USG:terminated_at": "2020-11-06T18:00:28.000000", "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c6", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "deleted", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:28.989 38 INFO tempest.common.waiters [-] State transition "ACTIVE/deleting" ==> "DELETED/None" after 1 second wait 2020-11-06 18:00:29.070 40 INFO tempest.lib.common.rest_client [req-e0e6b5ad-7b33-4423-a9ce-e15d756cf637 ] Request (ServerTagsRbacTest:test_check_tag_existence): 201 PUT http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8/tags/tempest-ServerTagsRbacTest-tag-78618651 0.134s 2020-11-06 18:00:29.070 40 DEBUG tempest.lib.common.rest_client [req-e0e6b5ad-7b33-4423-a9ce-e15d756cf637 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.26', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'content-length': '0', 'location': 'http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8/tags/tempest-ServerTagsRbacTest-tag-78618651', 'openstack-api-version': 'compute 2.26', 'x-openstack-nova-api-version': '2.26', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e0e6b5ad-7b33-4423-a9ce-e15d756cf637', 'x-compute-request-id': 'req-e0e6b5ad-7b33-4423-a9ce-e15d756cf637', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8/tags/tempest-ServerTagsRbacTest-tag-78618651'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:29.072 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:29.127 40 INFO tempest.lib.common.rest_client [req-47d3d4ed-c22d-4579-81bf-7e3ac5791b2f ] Request (ServerTagsRbacTest:test_check_tag_existence): 200 GET http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles 0.054s 2020-11-06 18:00:29.127 40 DEBUG tempest.lib.common.rest_client [req-47d3d4ed-c22d-4579-81bf-7e3ac5791b2f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-47d3d4ed-c22d-4579-81bf-7e3ac5791b2f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:29.160 40 INFO tempest.lib.common.rest_client [req-d63523b3-fe23-4b9e-a068-4e1a134a9c27 ] Request (ServerTagsRbacTest:test_check_tag_existence): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:00:29.160 40 DEBUG tempest.lib.common.rest_client [req-d63523b3-fe23-4b9e-a068-4e1a134a9c27 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d63523b3-fe23-4b9e-a068-4e1a134a9c27', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "059542b3d55e4690abcee46249e52f8e", "name": "tempest-ServerTagsRbacTest-1477164779", "password_expires_at": null}, "audit_ids": ["a5zFfHbYR_OIU2XF_0muvA"], "expires_at": "2020-11-06T19:00:29.000000Z", "issued_at": "2020-11-06T18:00:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "01712c7a73f8464a8cda41cbd4399038", "name": "tempest-ServerTagsRbacTest-1477164779"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:29.276 40 INFO tempest.lib.common.rest_client [req-b146fa3e-cabf-4f59-86f7-c55b8533f145 ] Request (ServerTagsRbacTest:test_check_tag_existence): 204 GET http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8/tags/tempest-ServerTagsRbacTest-tag-78618651 0.114s 2020-11-06 18:00:29.276 40 DEBUG tempest.lib.common.rest_client [req-b146fa3e-cabf-4f59-86f7-c55b8533f145 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.26', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.26', 'x-openstack-nova-api-version': '2.26', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b146fa3e-cabf-4f59-86f7-c55b8533f145', 'x-compute-request-id': 'req-b146fa3e-cabf-4f59-86f7-c55b8533f145', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8/tags/tempest-ServerTagsRbacTest-tag-78618651'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:29.277 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:29.337 40 INFO tempest.lib.common.rest_client [req-d4551498-3e17-4759-8df2-3994a98e0fbd ] Request (ServerTagsRbacTest:test_check_tag_existence): 200 GET http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles 0.058s 2020-11-06 18:00:29.337 40 DEBUG tempest.lib.common.rest_client [req-d4551498-3e17-4759-8df2-3994a98e0fbd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d4551498-3e17-4759-8df2-3994a98e0fbd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:29.372 40 INFO tempest.lib.common.rest_client [req-62c19f69-0923-421f-b356-da97b2378baa ] Request (ServerTagsRbacTest:test_check_tag_existence): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:00:29.372 40 DEBUG tempest.lib.common.rest_client [req-62c19f69-0923-421f-b356-da97b2378baa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-62c19f69-0923-421f-b356-da97b2378baa', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "059542b3d55e4690abcee46249e52f8e", "name": "tempest-ServerTagsRbacTest-1477164779", "password_expires_at": null}, "audit_ids": ["lJ31pFgVQyaED7Gv02gZRg"], "expires_at": "2020-11-06T19:00:29.000000Z", "issued_at": "2020-11-06T18:00:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "01712c7a73f8464a8cda41cbd4399038", "name": "tempest-ServerTagsRbacTest-1477164779"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:29.462 37 INFO tempest.lib.common.rest_client [req-e3a40326-0d35-4baf-8cf4-e5db8f70505b ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45 0.227s 2020-11-06 18:00:29.462 37 DEBUG tempest.lib.common.rest_client [req-e3a40326-0d35-4baf-8cf4-e5db8f70505b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2114', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e3a40326-0d35-4baf-8cf4-e5db8f70505b', 'x-compute-request-id': 'req-e3a40326-0d35-4baf-8cf4-e5db8f70505b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45'} Body: b'{"server": {"id": "d609c5d7-7c53-4853-a874-e6a5b166ad45", "name": "tempest-MigrateServerV225RbacTest-server-1545629045", "status": "VERIFY_RESIZE", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "11963b972eb6d09f2649fda4ffdcbc396a903c992fbb1e9c0e251a47", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:08Z", "updated": "2020-11-06T18:00:28Z", "addresses": {"patrole_reader-net_30048f18-b96b-4343-a720-1173982b59b8": [{"version": 4, "addr": "192.168.120.180", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:54:42:29"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:28.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-SRV-ATTR:reservation_id": "r-fqm7bxkb", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1545629045", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:29.482 37 INFO tempest.common.waiters [-] State transition "RESIZE/resize_finish" ==> "VERIFY_RESIZE/None" after 11 second wait 2020-11-06 18:00:29.487 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:00:29.488 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.488 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.488 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.489 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.489 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.490 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.490 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.490 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.491 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.491 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.491 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.492 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.492 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.492 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.492 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.493 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.493 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.493 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.494 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.494 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.494 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.494 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.495 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.495 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.495 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.496 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.496 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.496 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.496 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.497 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.497 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.497 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.498 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.498 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.498 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.499 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.499 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.499 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.499 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.499 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.500 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.500 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.500 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.500 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.501 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.501 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.501 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.502 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.502 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.502 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.502 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.503 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.503 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.503 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.503 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.503 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.504 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.504 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.504 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.504 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.505 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.505 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.505 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.506 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.506 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.506 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.506 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.506 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.507 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.507 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.507 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.507 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.508 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.508 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.508 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.509 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-migrate-server:migrate_live, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:00:29.551 37 INFO tempest.lib.common.rest_client [req-012aa85d-9c4d-4de5-9917-a6a4e3f4ef2f ] Request (MigrateServerV225RbacTest:test_migration_live): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:00:29.552 37 DEBUG tempest.lib.common.rest_client [req-012aa85d-9c4d-4de5-9917-a6a4e3f4ef2f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-012aa85d-9c4d-4de5-9917-a6a4e3f4ef2f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "99a9d4e6d0ca480d8f91548cce415d39", "name": "tempest-MigrateServerV225RbacTest-107357711", "password_expires_at": null}, "audit_ids": ["6I6pouIESySg7VKrYPJihw"], "expires_at": "2020-11-06T19:00:29.000000Z", "issued_at": "2020-11-06T18:00:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e8c4ea0aa616438d84be2a246c718bc3", "name": "tempest-MigrateServerV225RbacTest-107357711"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:29.553 37 DEBUG tempest.lib.common.fixed_network [-] (MigrateServerV225RbacTest:test_migration_live) No valid network provided or created, defaulting to fixed_network_name get_tenant_network /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/fixed_network.py:102 2020-11-06 18:00:29.567 40 INFO tempest.lib.common.rest_client [req-58035f44-3c6a-4050-98a5-3263a5a3ef77 ] Request (ServerTagsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8/tags 0.194s 2020-11-06 18:00:29.574 40 DEBUG tempest.lib.common.rest_client [req-58035f44-3c6a-4050-98a5-3263a5a3ef77 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.26', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.26', 'x-openstack-nova-api-version': '2.26', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-58035f44-3c6a-4050-98a5-3263a5a3ef77', 'x-compute-request-id': 'req-58035f44-3c6a-4050-98a5-3263a5a3ef77', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8/tags'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:29.577 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:00:29.577 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.577 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.578 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.578 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.578 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.579 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.579 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.579 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.579 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.580 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.580 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.580 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.580 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.581 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.581 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.581 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.581 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.581 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.582 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.582 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.582 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.583 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.583 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.583 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.583 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.583 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.584 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.584 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.584 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.585 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.585 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.585 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.585 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.586 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.586 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.586 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.586 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.586 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.587 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.587 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.587 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.587 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.588 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.588 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.597 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.597 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.598 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.598 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.599 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.599 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.599 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.599 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.599 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.600 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.600 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.600 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.600 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.601 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.601 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.601 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.602 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.602 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.602 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.602 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.603 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.603 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.603 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.603 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.604 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.604 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.604 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.604 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.604 39 INFO tempest.lib.common.rest_client [req-e57bc46e-d855-4562-adf9-d28b6ae31d90 ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6 0.056s 2020-11-06 18:00:29.605 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.605 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.605 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.605 39 DEBUG tempest.lib.common.rest_client [req-e57bc46e-d855-4562-adf9-d28b6ae31d90 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1713', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e57bc46e-d855-4562-adf9-d28b6ae31d90', 'x-compute-request-id': 'req-e57bc46e-d855-4562-adf9-d28b6ae31d90', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6'} Body: b'{"image": {"id": "4b82337b-9afd-41e8-a1d3-ce32a594dca6", "name": "tempest-ServerActionsRbacTest-image-1763093907", "minRam": 0, "minDisk": 1, "metadata": {"base_image_ref": "56b368f6-9136-40ec-a04c-564d02c95e42", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_location": "snapshot", "image_state": "available", "image_type": "snapshot", "instance_uuid": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "owner_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "owner_project_name": "tempest-ServerActionsRbacTest-1280955528", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1280955528", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f"}, "created": "2020-11-06T18:00:21Z", "updated": "2020-11-06T18:00:27Z", "status": "SAVING", "progress": 50, "OS-EXT-IMG-SIZE:size": 0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}], "server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}]}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:29.606 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-server-tags:delete_all, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:00:29.606 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:29.647 40 INFO tempest.lib.common.rest_client [req-47ab9215-78bc-403e-9fc2-0d839f695322 ] Request (ServerTagsRbacTest:test_delete_all_tags): 200 GET http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles 0.041s 2020-11-06 18:00:29.648 40 DEBUG tempest.lib.common.rest_client [req-47ab9215-78bc-403e-9fc2-0d839f695322 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-47ab9215-78bc-403e-9fc2-0d839f695322', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:29.684 40 INFO tempest.lib.common.rest_client [req-f0dc61ca-ae8e-47dc-ab68-2890dceeaa87 ] Request (ServerTagsRbacTest:test_delete_all_tags): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:00:29.685 40 DEBUG tempest.lib.common.rest_client [req-f0dc61ca-ae8e-47dc-ab68-2890dceeaa87 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f0dc61ca-ae8e-47dc-ab68-2890dceeaa87', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "059542b3d55e4690abcee46249e52f8e", "name": "tempest-ServerTagsRbacTest-1477164779", "password_expires_at": null}, "audit_ids": ["0uSg7VunRnSqiDar3D2uIg"], "expires_at": "2020-11-06T19:00:29.000000Z", "issued_at": "2020-11-06T18:00:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "01712c7a73f8464a8cda41cbd4399038", "name": "tempest-ServerTagsRbacTest-1477164779"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:29.807 37 INFO tempest.lib.common.rest_client [req-9bf65984-d2af-4876-96a2-7a8d0c283ff7 ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94:9696/v2.0/networks 0.253s 2020-11-06 18:00:29.809 37 DEBUG tempest.lib.common.rest_client [req-9bf65984-d2af-4876-96a2-7a8d0c283ff7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '47257', 'x-openstack-request-id': 'req-9bf65984-d2af-4876-96a2-7a8d0c283ff7', 'date': 'Fri, 06 Nov 2020 18:00:29 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"networks":[{"id":"075e5ee8-b0b4-4574-81a3-c3210ea79d71","name":"tempest-MultipleCreateTestJSON-683767456-network","tenant_id":"e8d23ff83aff43a6830320c63bdbdbd8","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["066b37a3-1660-4b06-bef8-73963e0a421c"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-10-23T17:10:54Z","updated_at":"2020-10-23T17:10:54Z","revision_number":2,"project_id":"e8d23ff83aff43a6830320c63bdbdbd8","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":32},{"id":"12b51787-2098-4ad2-adec-89879e4e9a8f","name":"tempest-PortsRbacTest-test-network-1366426066","tenant_id":"6327cab58a074eb8ad4ca78c04e95df3","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["18a37c17-6038-4819-8099-d98b8388fc25"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T17:59:49Z","updated_at":"2020-11-06T17:59:50Z","revision_number":2,"project_id":"6327cab58a074eb8ad4ca78c04e95df3","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":60},{"id":"13682051-c16d-4418-88ee-1a180a4cfc15","name":"tempest-MultipleCreateTestJSON-1346316559-network","tenant_id":"70c2f48fcaf343ceb2657220e064d31c","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["d9e144c5-9735-4711-b3a1-0d367753c7f6"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-03T09:04:32Z","updated_at":"2020-11-03T09:04:33Z","revision_number":2,"project_id":"70c2f48fcaf343ceb2657220e064d31c","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":12},{"id":"13969b3e-1458-4017-97b3-6dc65a2e1f8c","name":"tempest-MultipleCreateTestJSON-80353040-network","tenant_id":"143eaf18da0d441fb68df29b15aea9c4","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["68cade25-ac24-411c-bbea-7ccfd23b16b3"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-03T08:54:27Z","updated_at":"2020-11-03T08:54:28Z","revision_number":2,"project_id":"143eaf18da0d441fb68df29b15aea9c4","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":54},{"id":"17d7963c-2bb9-4b6c-aa1a-40527525c1b8","name":"tempest-MultipleCreateTestJSON-1331327385-network","tenant_id":"5062fdae248541b4b2745b81a243b3ac","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["dd45b7d9-27bb-43cd-94c7-f0d86d72311d"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-10-17T12:35:00Z","updated_at":"2020-10-17T12:35:00Z","revision_number":2,"project_id":"5062fdae248541b4b2745b81a243b3ac","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":42},{"id":"1c02029e-3385-4b0f-8ea8-64f5a5e9c878","name":"private","tenant_id":"76550dbb2e094ea8b53f0ef35fc93342","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["026ed5dd-3740-4409-bbff-427502b63344","91f28f82-50f3-4858-baa0-c00af5a09fba"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:29.811 37 INFO tempest.lib.common.fixed_network [-] (MigrateServerV225RbacTest:test_migration_live) Found network {'id': '33ad4e1b-dd49-4d7f-951f-1d19a3d44add', 'name': 'patrole_reader-net_30048f18-b96b-4343-a720-1173982b59b8', 'tenant_id': 'd3e694f4541e406a85c66c35fb3f05ea', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': ['feec1188-d62d-4267-ba87-551ab4fd62c2'], 'shared': True, 'availability_zone_hints': [], 'availability_zones': ['nova'], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'router:external': False, 'description': '', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T17:57:35Z', 'updated_at': '2020-11-06T17:57:37Z', 'revision_number': 2, 'project_id': 'd3e694f4541e406a85c66c35fb3f05ea', 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 43} available for tenant 2020-11-06 18:00:29.869 40 INFO tempest.lib.common.rest_client [req-ed63d24e-242a-426b-acd3-d5c01b0c8728 ] Request (ServerTagsRbacTest:test_delete_all_tags): 204 DELETE http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8/tags 0.183s 2020-11-06 18:00:29.870 40 DEBUG tempest.lib.common.rest_client [req-ed63d24e-242a-426b-acd3-d5c01b0c8728 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.26', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.26', 'x-openstack-nova-api-version': '2.26', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ed63d24e-242a-426b-acd3-d5c01b0c8728', 'x-compute-request-id': 'req-ed63d24e-242a-426b-acd3-d5c01b0c8728', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8/tags'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:29.871 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:29.920 40 INFO tempest.lib.common.rest_client [req-fed5c18a-8531-48f0-904d-885003c5da7d ] Request (ServerTagsRbacTest:test_delete_all_tags): 200 GET http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles 0.048s 2020-11-06 18:00:29.921 40 DEBUG tempest.lib.common.rest_client [req-fed5c18a-8531-48f0-904d-885003c5da7d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fed5c18a-8531-48f0-904d-885003c5da7d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:29.956 40 INFO tempest.lib.common.rest_client [req-ed1170a0-7b92-4fa3-8441-11cede602410 ] Request (ServerTagsRbacTest:test_delete_all_tags): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:00:29.956 40 DEBUG tempest.lib.common.rest_client [req-ed1170a0-7b92-4fa3-8441-11cede602410 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ed1170a0-7b92-4fa3-8441-11cede602410', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "059542b3d55e4690abcee46249e52f8e", "name": "tempest-ServerTagsRbacTest-1477164779", "password_expires_at": null}, "audit_ids": ["Ga9XcprJTH6mScNZT5n0Ug"], "expires_at": "2020-11-06T19:00:29.000000Z", "issued_at": "2020-11-06T18:00:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "01712c7a73f8464a8cda41cbd4399038", "name": "tempest-ServerTagsRbacTest-1477164779"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:29.962 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:00:29.963 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.964 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.964 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.965 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.966 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.966 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.967 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.968 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.968 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.969 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.969 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.969 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.970 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.970 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.970 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.970 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.971 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.971 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.971 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.972 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.972 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.972 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.972 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.973 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.973 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.973 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.974 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.974 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.974 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.974 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.975 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.975 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.975 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.975 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.976 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.976 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.976 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.977 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.977 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.977 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.977 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.978 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.978 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.978 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.979 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.979 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.979 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.979 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.980 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.980 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.980 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.981 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.981 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.981 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.981 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.982 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.982 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.982 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.982 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.983 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.983 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.984 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.984 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.984 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.984 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.985 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.985 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.985 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.986 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.986 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.986 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.986 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.987 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.987 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.987 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:29.988 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-server-tags:delete, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:00:30.050 38 INFO tempest.lib.common.rest_client [req-f525c9da-4d85-4ff7-9d84-73764240b98e ] Request (ServerMetadataRbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b 0.059s 2020-11-06 18:00:30.050 38 DEBUG tempest.lib.common.rest_client [req-f525c9da-4d85-4ff7-9d84-73764240b98e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-f525c9da-4d85-4ff7-9d84-73764240b98e', 'x-compute-request-id': 'req-f525c9da-4d85-4ff7-9d84-73764240b98e', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c69462d2-ab7c-4ae9-9572-13ad098c921b'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance c69462d2-ab7c-4ae9-9572-13ad098c921b could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:30.051 38 DEBUG tempest.lib.common.dynamic_creds [-] Clearing network: {'id': 'baa469fe-6923-4d8f-bf23-30791ce8fab6', 'name': 'tempest-ServerMetadataRbacTest-1567801355-network', 'tenant_id': '915ccc983b9341ed85216c7d9ac7bfa7', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '915ccc983b9341ed85216c7d9ac7bfa7', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 49, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T18:00:06Z', 'updated_at': '2020-11-06T18:00:06Z', 'revision_number': 1}, subnet: {'id': '2e54fc0f-3b7c-44cc-bfb3-df05984efd40', 'name': 'tempest-ServerMetadataRbacTest-1567801355-subnet', 'tenant_id': '915ccc983b9341ed85216c7d9ac7bfa7', 'network_id': 'baa469fe-6923-4d8f-bf23-30791ce8fab6', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-11-06T18:00:06Z', 'updated_at': '2020-11-06T18:00:06Z', 'revision_number': 0, 'project_id': '915ccc983b9341ed85216c7d9ac7bfa7'}, router: {'id': 'e00d4c88-9473-4f84-80e8-d00e6e78ceeb', 'name': 'tempest-ServerMetadataRbacTest-1567801355-router', 'tenant_id': '915ccc983b9341ed85216c7d9ac7bfa7', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.44'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::fe'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-11-06T18:00:06Z', 'updated_at': '2020-11-06T18:00:08Z', 'revision_number': 3, 'project_id': '915ccc983b9341ed85216c7d9ac7bfa7'} _clear_isolated_net_resources /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/dynamic_creds.py:418 2020-11-06 18:00:30.204 40 INFO tempest.lib.common.rest_client [req-9401a409-05bb-48b6-a4de-e893c460d2d7 ] Request (ServerTagsRbacTest:test_delete_tag): 201 PUT http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8/tags/tempest-ServerTagsRbacTest-tag-651900721 0.214s 2020-11-06 18:00:30.204 40 DEBUG tempest.lib.common.rest_client [req-9401a409-05bb-48b6-a4de-e893c460d2d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.26', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'content-length': '0', 'location': 'http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8/tags/tempest-ServerTagsRbacTest-tag-651900721', 'openstack-api-version': 'compute 2.26', 'x-openstack-nova-api-version': '2.26', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9401a409-05bb-48b6-a4de-e893c460d2d7', 'x-compute-request-id': 'req-9401a409-05bb-48b6-a4de-e893c460d2d7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8/tags/tempest-ServerTagsRbacTest-tag-651900721'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:30.207 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:30.247 40 INFO tempest.lib.common.rest_client [req-02791e89-e58c-4094-86a6-113270b9b241 ] Request (ServerTagsRbacTest:test_delete_tag): 200 GET http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles 0.039s 2020-11-06 18:00:30.248 40 DEBUG tempest.lib.common.rest_client [req-02791e89-e58c-4094-86a6-113270b9b241 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-02791e89-e58c-4094-86a6-113270b9b241', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:30.292 40 INFO tempest.lib.common.rest_client [req-b4d70762-ec9f-48bc-bb1b-072ef0c4d2ce ] Request (ServerTagsRbacTest:test_delete_tag): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-11-06 18:00:30.293 40 DEBUG tempest.lib.common.rest_client [req-b4d70762-ec9f-48bc-bb1b-072ef0c4d2ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b4d70762-ec9f-48bc-bb1b-072ef0c4d2ce', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "059542b3d55e4690abcee46249e52f8e", "name": "tempest-ServerTagsRbacTest-1477164779", "password_expires_at": null}, "audit_ids": ["95U5gCj3S0ymibjT5N2Fgw"], "expires_at": "2020-11-06T19:00:30.000000Z", "issued_at": "2020-11-06T18:00:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "01712c7a73f8464a8cda41cbd4399038", "name": "tempest-ServerTagsRbacTest-1477164779"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:30.493 40 INFO tempest.lib.common.rest_client [req-80016fd6-6e30-4e2c-a20a-376f319f2be7 ] Request (ServerTagsRbacTest:test_delete_tag): 204 DELETE http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8/tags/tempest-ServerTagsRbacTest-tag-651900721 0.198s 2020-11-06 18:00:30.493 40 DEBUG tempest.lib.common.rest_client [req-80016fd6-6e30-4e2c-a20a-376f319f2be7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.26', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.26', 'x-openstack-nova-api-version': '2.26', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-80016fd6-6e30-4e2c-a20a-376f319f2be7', 'x-compute-request-id': 'req-80016fd6-6e30-4e2c-a20a-376f319f2be7', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8/tags/tempest-ServerTagsRbacTest-tag-651900721'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:30.494 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:30.542 40 INFO tempest.lib.common.rest_client [req-ad462a1c-10a1-4c60-bf12-142bd82c12a1 ] Request (ServerTagsRbacTest:test_delete_tag): 200 GET http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles 0.047s 2020-11-06 18:00:30.543 40 DEBUG tempest.lib.common.rest_client [req-ad462a1c-10a1-4c60-bf12-142bd82c12a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ad462a1c-10a1-4c60-bf12-142bd82c12a1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:30.569 40 INFO tempest.lib.common.rest_client [req-eec6f8dc-bc21-459c-b66e-474c4a02cad0 ] Request (ServerTagsRbacTest:test_delete_tag): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.025s 2020-11-06 18:00:30.570 40 DEBUG tempest.lib.common.rest_client [req-eec6f8dc-bc21-459c-b66e-474c4a02cad0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eec6f8dc-bc21-459c-b66e-474c4a02cad0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "059542b3d55e4690abcee46249e52f8e", "name": "tempest-ServerTagsRbacTest-1477164779", "password_expires_at": null}, "audit_ids": ["ItApQJIqTk6HM9A-c_DVHA"], "expires_at": "2020-11-06T19:00:30.000000Z", "issued_at": "2020-11-06T18:00:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "01712c7a73f8464a8cda41cbd4399038", "name": "tempest-ServerTagsRbacTest-1477164779"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:30.637 37 INFO tempest.lib.common.rest_client [req-06aab36a-5e0c-4741-8f55-d29bc4be2616 ] Request (MigrateServerV225RbacTest:test_migration_live): 202 POST http://172.30.13.94/compute/v2.1/servers 0.824s 2020-11-06 18:00:30.641 37 DEBUG tempest.lib.common.rest_client [req-06aab36a-5e0c-4741-8f55-d29bc4be2616 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-MigrateServerV225RbacTest-server-1605055471", "imageRef": "56b368f6-9136-40ec-a04c-564d02c95e42", "flavorRef": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "networks": [{"uuid": "33ad4e1b-dd49-4d7f-951f-1d19a3d44add"}]}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-06aab36a-5e0c-4741-8f55-d29bc4be2616', 'x-compute-request-id': 'req-06aab36a-5e0c-4741-8f55-d29bc4be2616', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "G2uUiScnDKCQ"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:30.675 39 INFO tempest.lib.common.rest_client [req-14f81b44-ad24-4272-8707-bd3928dbe736 ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6 0.060s 2020-11-06 18:00:30.676 39 DEBUG tempest.lib.common.rest_client [req-14f81b44-ad24-4272-8707-bd3928dbe736 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1713', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-14f81b44-ad24-4272-8707-bd3928dbe736', 'x-compute-request-id': 'req-14f81b44-ad24-4272-8707-bd3928dbe736', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6'} Body: b'{"image": {"id": "4b82337b-9afd-41e8-a1d3-ce32a594dca6", "name": "tempest-ServerActionsRbacTest-image-1763093907", "minRam": 0, "minDisk": 1, "metadata": {"base_image_ref": "56b368f6-9136-40ec-a04c-564d02c95e42", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_location": "snapshot", "image_state": "available", "image_type": "snapshot", "instance_uuid": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "owner_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "owner_project_name": "tempest-ServerActionsRbacTest-1280955528", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1280955528", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f"}, "created": "2020-11-06T18:00:21Z", "updated": "2020-11-06T18:00:27Z", "status": "SAVING", "progress": 50, "OS-EXT-IMG-SIZE:size": 0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}], "server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}]}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:30.754 37 INFO tempest.lib.common.rest_client [req-21039ae9-dd0f-43c1-a35d-b07cce556778 ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b 0.110s 2020-11-06 18:00:30.754 37 DEBUG tempest.lib.common.rest_client [req-21039ae9-dd0f-43c1-a35d-b07cce556778 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1768', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-21039ae9-dd0f-43c1-a35d-b07cce556778', 'x-compute-request-id': 'req-21039ae9-dd0f-43c1-a35d-b07cce556778', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b'} Body: b'{"server": {"id": "c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b", "name": "tempest-MigrateServerV225RbacTest-server-1605055471", "status": "BUILD", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:31Z", "updated": "2020-11-06T18:00:30Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-SRV-ATTR:reservation_id": "r-mos6y4h1", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1605055471", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": null, "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [], "host_status": "", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:30.773 40 INFO tempest.lib.common.rest_client [req-c6e88db1-684f-407f-9974-91b7072abbf8 ] Request (ServerTagsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8/tags 0.202s 2020-11-06 18:00:30.774 40 DEBUG tempest.lib.common.rest_client [req-c6e88db1-684f-407f-9974-91b7072abbf8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.26', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.26', 'x-openstack-nova-api-version': '2.26', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c6e88db1-684f-407f-9974-91b7072abbf8', 'x-compute-request-id': 'req-c6e88db1-684f-407f-9974-91b7072abbf8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8/tags'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:30.779 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:00:30.780 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.780 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.780 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.781 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.781 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.781 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.782 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.782 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.782 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.782 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.783 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.783 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.783 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.783 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.784 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.784 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.784 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.784 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.785 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.785 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.785 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.785 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.786 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.786 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.786 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.786 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.786 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.787 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.787 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.787 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.787 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.788 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.788 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.788 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.788 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.788 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.789 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.789 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.789 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.789 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.790 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.790 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.790 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.791 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.791 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.791 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.791 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.792 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.792 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.792 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.792 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.792 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.793 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.793 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.793 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.793 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.794 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.794 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.794 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.794 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.795 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.795 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.795 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.796 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.796 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.796 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.796 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.796 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.797 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.797 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.797 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.797 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.798 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.798 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.798 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:30.799 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-server-tags:index, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:00:30.799 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:30.855 40 INFO tempest.lib.common.rest_client [req-ecffd0d0-be68-4423-88ef-35cae3f80bf9 ] Request (ServerTagsRbacTest:test_list_tags): 200 GET http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles 0.056s 2020-11-06 18:00:30.856 40 DEBUG tempest.lib.common.rest_client [req-ecffd0d0-be68-4423-88ef-35cae3f80bf9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ecffd0d0-be68-4423-88ef-35cae3f80bf9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:30.900 40 INFO tempest.lib.common.rest_client [req-a290ed0b-c159-4385-a591-d0d2b75e8908 ] Request (ServerTagsRbacTest:test_list_tags): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-11-06 18:00:30.901 40 DEBUG tempest.lib.common.rest_client [req-a290ed0b-c159-4385-a591-d0d2b75e8908 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a290ed0b-c159-4385-a591-d0d2b75e8908', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "059542b3d55e4690abcee46249e52f8e", "name": "tempest-ServerTagsRbacTest-1477164779", "password_expires_at": null}, "audit_ids": ["ZesAe-tvRD2hJ5Z3LYiTrw"], "expires_at": "2020-11-06T19:00:30.000000Z", "issued_at": "2020-11-06T18:00:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "01712c7a73f8464a8cda41cbd4399038", "name": "tempest-ServerTagsRbacTest-1477164779"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:30.996 40 INFO tempest.lib.common.rest_client [req-8474b602-d691-4c98-948a-dbfe752d9a76 ] Request (ServerTagsRbacTest:test_list_tags): 200 GET http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8/tags 0.094s 2020-11-06 18:00:30.996 40 DEBUG tempest.lib.common.rest_client [req-8474b602-d691-4c98-948a-dbfe752d9a76 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.26', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '12', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.26', 'x-openstack-nova-api-version': '2.26', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8474b602-d691-4c98-948a-dbfe752d9a76', 'x-compute-request-id': 'req-8474b602-d691-4c98-948a-dbfe752d9a76', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8/tags'} Body: b'{"tags": []}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:30.998 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:31.054 40 INFO tempest.lib.common.rest_client [req-c7d9787c-f0d1-4482-b14c-5dbff97bbba3 ] Request (ServerTagsRbacTest:test_list_tags): 200 GET http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles 0.055s 2020-11-06 18:00:31.059 40 DEBUG tempest.lib.common.rest_client [req-c7d9787c-f0d1-4482-b14c-5dbff97bbba3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c7d9787c-f0d1-4482-b14c-5dbff97bbba3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:31.096 40 INFO tempest.lib.common.rest_client [req-34341f73-b4cd-44ea-9166-5288c9c2008c ] Request (ServerTagsRbacTest:test_list_tags): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:00:31.097 40 DEBUG tempest.lib.common.rest_client [req-34341f73-b4cd-44ea-9166-5288c9c2008c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-34341f73-b4cd-44ea-9166-5288c9c2008c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "059542b3d55e4690abcee46249e52f8e", "name": "tempest-ServerTagsRbacTest-1477164779", "password_expires_at": null}, "audit_ids": ["Kgf14TLhRzuf9w1FyPgcTg"], "expires_at": "2020-11-06T19:00:31.000000Z", "issued_at": "2020-11-06T18:00:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "01712c7a73f8464a8cda41cbd4399038", "name": "tempest-ServerTagsRbacTest-1477164779"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:31.102 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:00:31.103 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.104 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.104 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.104 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.105 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.105 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.106 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.106 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.106 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.106 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.107 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.107 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.107 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.107 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.108 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.108 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.108 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.108 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.109 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.109 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.109 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.109 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.110 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.110 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.110 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.110 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.111 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.111 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.111 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.111 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.111 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.112 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.112 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.112 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.112 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.113 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.113 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.113 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.113 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.114 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.114 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.114 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.114 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.115 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.115 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.115 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.115 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.116 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.116 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.116 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.116 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.117 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.117 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.117 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.117 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.118 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.118 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.118 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.118 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.119 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.119 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.119 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.119 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.120 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.120 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.120 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.120 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.121 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.121 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.121 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.122 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.122 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.122 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.123 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.123 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.124 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-server-tags:update_all, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:00:31.125 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:31.177 40 INFO tempest.lib.common.rest_client [req-6d54d13f-54cc-4c58-a2a9-394a5ce4029b ] Request (ServerTagsRbacTest:test_update_all_tags): 200 GET http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles 0.051s 2020-11-06 18:00:31.177 40 DEBUG tempest.lib.common.rest_client [req-6d54d13f-54cc-4c58-a2a9-394a5ce4029b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6d54d13f-54cc-4c58-a2a9-394a5ce4029b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:31.209 40 INFO tempest.lib.common.rest_client [req-1b9098ce-bb72-4043-a719-3a43c216f71f ] Request (ServerTagsRbacTest:test_update_all_tags): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:00:31.210 40 DEBUG tempest.lib.common.rest_client [req-1b9098ce-bb72-4043-a719-3a43c216f71f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1b9098ce-bb72-4043-a719-3a43c216f71f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "059542b3d55e4690abcee46249e52f8e", "name": "tempest-ServerTagsRbacTest-1477164779", "password_expires_at": null}, "audit_ids": ["DKO0UvbCSj6XTvpB2_rjaA"], "expires_at": "2020-11-06T19:00:31.000000Z", "issued_at": "2020-11-06T18:00:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "01712c7a73f8464a8cda41cbd4399038", "name": "tempest-ServerTagsRbacTest-1477164779"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:31.406 40 INFO tempest.lib.common.rest_client [req-74489a9c-358c-4184-9604-46bf74b7d8ea ] Request (ServerTagsRbacTest:test_update_all_tags): 200 PUT http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8/tags 0.195s 2020-11-06 18:00:31.406 40 DEBUG tempest.lib.common.rest_client [req-74489a9c-358c-4184-9604-46bf74b7d8ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.26', 'X-Auth-Token': ''} Body: {"tags": ["tempest-ServerTagsRbacTest-tag-2125382557"]} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '55', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.26', 'x-openstack-nova-api-version': '2.26', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-74489a9c-358c-4184-9604-46bf74b7d8ea', 'x-compute-request-id': 'req-74489a9c-358c-4184-9604-46bf74b7d8ea', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8/tags'} Body: b'{"tags": ["tempest-ServerTagsRbacTest-tag-2125382557"]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:31.409 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:31.464 40 INFO tempest.lib.common.rest_client [req-f23df2c6-f08d-4fb4-9b88-3e08e995916f ] Request (ServerTagsRbacTest:test_update_all_tags): 200 GET http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles 0.055s 2020-11-06 18:00:31.465 40 DEBUG tempest.lib.common.rest_client [req-f23df2c6-f08d-4fb4-9b88-3e08e995916f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f23df2c6-f08d-4fb4-9b88-3e08e995916f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:31.500 40 INFO tempest.lib.common.rest_client [req-635fbe22-f3f9-4d52-bc0e-d7141ce5dbb2 ] Request (ServerTagsRbacTest:test_update_all_tags): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:00:31.501 40 DEBUG tempest.lib.common.rest_client [req-635fbe22-f3f9-4d52-bc0e-d7141ce5dbb2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-635fbe22-f3f9-4d52-bc0e-d7141ce5dbb2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "059542b3d55e4690abcee46249e52f8e", "name": "tempest-ServerTagsRbacTest-1477164779", "password_expires_at": null}, "audit_ids": ["5HCXLcb5TuuBoCY17SnTyg"], "expires_at": "2020-11-06T19:00:31.000000Z", "issued_at": "2020-11-06T18:00:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "01712c7a73f8464a8cda41cbd4399038", "name": "tempest-ServerTagsRbacTest-1477164779"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:31.505 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:00:31.505 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.506 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.506 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.507 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.507 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.507 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.508 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.508 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.508 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.509 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.509 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.509 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.510 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.510 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.510 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.511 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.511 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.511 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.511 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.512 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.512 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.512 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.513 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.513 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.513 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.514 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.514 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.514 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.514 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.515 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.515 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.515 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.516 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.520 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.521 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.521 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.521 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.522 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.522 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.522 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.522 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.523 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.523 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.523 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.524 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.524 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.524 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.525 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.525 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.525 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.525 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.526 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.526 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.526 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.526 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.527 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.527 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.527 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.528 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.528 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.528 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.529 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.529 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.529 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.529 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.530 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.530 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.530 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.530 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.531 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.531 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.531 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.532 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.532 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.532 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:31.534 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-server-tags:update, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:00:31.534 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:31.579 40 INFO tempest.lib.common.rest_client [req-bd132da1-1486-4c53-83c1-f937c01bd2a9 ] Request (ServerTagsRbacTest:test_update_tag): 200 GET http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles 0.044s 2020-11-06 18:00:31.579 40 DEBUG tempest.lib.common.rest_client [req-bd132da1-1486-4c53-83c1-f937c01bd2a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bd132da1-1486-4c53-83c1-f937c01bd2a9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:31.613 40 INFO tempest.lib.common.rest_client [req-648ac59a-2ec3-4117-9998-b04541a56a33 ] Request (ServerTagsRbacTest:test_update_tag): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:00:31.613 40 DEBUG tempest.lib.common.rest_client [req-648ac59a-2ec3-4117-9998-b04541a56a33 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-648ac59a-2ec3-4117-9998-b04541a56a33', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "059542b3d55e4690abcee46249e52f8e", "name": "tempest-ServerTagsRbacTest-1477164779", "password_expires_at": null}, "audit_ids": ["WZqKocUYS7OPhzHKyJtfJQ"], "expires_at": "2020-11-06T19:00:31.000000Z", "issued_at": "2020-11-06T18:00:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "01712c7a73f8464a8cda41cbd4399038", "name": "tempest-ServerTagsRbacTest-1477164779"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:31.748 39 INFO tempest.lib.common.rest_client [req-06890883-4324-4cf9-9d6c-ff1543fecced ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6 0.062s 2020-11-06 18:00:31.749 39 DEBUG tempest.lib.common.rest_client [req-06890883-4324-4cf9-9d6c-ff1543fecced ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1713', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-06890883-4324-4cf9-9d6c-ff1543fecced', 'x-compute-request-id': 'req-06890883-4324-4cf9-9d6c-ff1543fecced', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6'} Body: b'{"image": {"id": "4b82337b-9afd-41e8-a1d3-ce32a594dca6", "name": "tempest-ServerActionsRbacTest-image-1763093907", "minRam": 0, "minDisk": 1, "metadata": {"base_image_ref": "56b368f6-9136-40ec-a04c-564d02c95e42", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_location": "snapshot", "image_state": "available", "image_type": "snapshot", "instance_uuid": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "owner_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "owner_project_name": "tempest-ServerActionsRbacTest-1280955528", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1280955528", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f"}, "created": "2020-11-06T18:00:21Z", "updated": "2020-11-06T18:00:27Z", "status": "SAVING", "progress": 50, "OS-EXT-IMG-SIZE:size": 0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}], "server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}]}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:31.834 40 INFO tempest.lib.common.rest_client [req-4796573b-ecdd-4966-8c34-a9c7af183fe7 ] Request (ServerTagsRbacTest:test_update_tag): 201 PUT http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8/tags/tempest-ServerTagsRbacTest-tag-388048748 0.220s 2020-11-06 18:00:31.835 40 DEBUG tempest.lib.common.rest_client [req-4796573b-ecdd-4966-8c34-a9c7af183fe7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.26', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'content-length': '0', 'location': 'http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8/tags/tempest-ServerTagsRbacTest-tag-388048748', 'openstack-api-version': 'compute 2.26', 'x-openstack-nova-api-version': '2.26', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4796573b-ecdd-4966-8c34-a9c7af183fe7', 'x-compute-request-id': 'req-4796573b-ecdd-4966-8c34-a9c7af183fe7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8/tags/tempest-ServerTagsRbacTest-tag-388048748'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:31.838 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:31.895 40 INFO tempest.lib.common.rest_client [req-aa2804b8-136e-416a-85a8-f8116f8841d8 ] Request (ServerTagsRbacTest:test_update_tag): 200 GET http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles 0.056s 2020-11-06 18:00:31.896 40 DEBUG tempest.lib.common.rest_client [req-aa2804b8-136e-416a-85a8-f8116f8841d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aa2804b8-136e-416a-85a8-f8116f8841d8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038/users/059542b3d55e4690abcee46249e52f8e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:31.936 40 INFO tempest.lib.common.rest_client [req-24bdaab4-f5b3-4ba9-b889-9f5e53f5740b ] Request (ServerTagsRbacTest:test_update_tag): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:00:31.937 40 DEBUG tempest.lib.common.rest_client [req-24bdaab4-f5b3-4ba9-b889-9f5e53f5740b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-24bdaab4-f5b3-4ba9-b889-9f5e53f5740b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "059542b3d55e4690abcee46249e52f8e", "name": "tempest-ServerTagsRbacTest-1477164779", "password_expires_at": null}, "audit_ids": ["XPs_b2onRg2L3J713i_mfA"], "expires_at": "2020-11-06T19:00:31.000000Z", "issued_at": "2020-11-06T18:00:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "01712c7a73f8464a8cda41cbd4399038", "name": "tempest-ServerTagsRbacTest-1477164779"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_01712c7a73f8464a8cda41cbd4399038", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:32.130 40 INFO tempest.lib.common.rest_client [req-c9aa2e92-926c-4053-8a13-43d90fcad703 ] Request (ServerTagsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8/tags 0.191s 2020-11-06 18:00:32.131 40 DEBUG tempest.lib.common.rest_client [req-c9aa2e92-926c-4053-8a13-43d90fcad703 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.26', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.26', 'x-openstack-nova-api-version': '2.26', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c9aa2e92-926c-4053-8a13-43d90fcad703', 'x-compute-request-id': 'req-c9aa2e92-926c-4053-8a13-43d90fcad703', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8/tags'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:32.307 40 INFO tempest.lib.common.rest_client [req-8f4ad58b-d8dc-4c1b-9a47-400957da7d12 ] Request (ServerTagsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8 0.172s 2020-11-06 18:00:32.308 40 DEBUG tempest.lib.common.rest_client [req-8f4ad58b-d8dc-4c1b-9a47-400957da7d12 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8f4ad58b-d8dc-4c1b-9a47-400957da7d12', 'x-compute-request-id': 'req-8f4ad58b-d8dc-4c1b-9a47-400957da7d12', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:32.751 37 INFO tempest.lib.common.rest_client [req-70868b80-20d6-4e8f-83b3-54f37055fe15 ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b 0.986s 2020-11-06 18:00:32.751 37 DEBUG tempest.lib.common.rest_client [req-70868b80-20d6-4e8f-83b3-54f37055fe15 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1857', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-70868b80-20d6-4e8f-83b3-54f37055fe15', 'x-compute-request-id': 'req-70868b80-20d6-4e8f-83b3-54f37055fe15', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b'} Body: b'{"server": {"id": "c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b", "name": "tempest-MigrateServerV225RbacTest-server-1605055471", "status": "BUILD", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "2d746f1ab29074f3f929b1892e496ee0de7b1451dab2a8ca922b6c38", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:30Z", "updated": "2020-11-06T18:00:31Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c8", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-SRV-ATTR:reservation_id": "r-mos6y4h1", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1605055471", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": null, "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:32.761 37 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/None" after 2 second wait 2020-11-06 18:00:32.822 39 INFO tempest.lib.common.rest_client [req-6899bb9a-5850-4da0-8a75-19731ea3383d ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6 0.064s 2020-11-06 18:00:32.823 39 DEBUG tempest.lib.common.rest_client [req-6899bb9a-5850-4da0-8a75-19731ea3383d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1713', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6899bb9a-5850-4da0-8a75-19731ea3383d', 'x-compute-request-id': 'req-6899bb9a-5850-4da0-8a75-19731ea3383d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6'} Body: b'{"image": {"id": "4b82337b-9afd-41e8-a1d3-ce32a594dca6", "name": "tempest-ServerActionsRbacTest-image-1763093907", "minRam": 0, "minDisk": 1, "metadata": {"base_image_ref": "56b368f6-9136-40ec-a04c-564d02c95e42", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_location": "snapshot", "image_state": "available", "image_type": "snapshot", "instance_uuid": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "owner_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "owner_project_name": "tempest-ServerActionsRbacTest-1280955528", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1280955528", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f"}, "created": "2020-11-06T18:00:21Z", "updated": "2020-11-06T18:00:27Z", "status": "SAVING", "progress": 50, "OS-EXT-IMG-SIZE:size": 0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}], "server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}]}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:32.947 40 INFO tempest.lib.common.rest_client [req-05be4f06-044e-4dbf-8553-b7615227cbca ] Request (ServerTagsRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8 0.638s 2020-11-06 18:00:32.948 40 DEBUG tempest.lib.common.rest_client [req-05be4f06-044e-4dbf-8553-b7615227cbca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1716', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-05be4f06-044e-4dbf-8553-b7615227cbca', 'x-compute-request-id': 'req-05be4f06-044e-4dbf-8553-b7615227cbca', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8'} Body: b'{"server": {"id": "37373f5f-0e45-4a02-aea3-c804446204f8", "name": "tempest-ServerTagsRbacTest-server-610909107", "status": "ACTIVE", "tenant_id": "01712c7a73f8464a8cda41cbd4399038", "user_id": "059542b3d55e4690abcee46249e52f8e", "metadata": {}, "hostId": "496d52bb57d5371371e5a6735c1fd7fd74fb37e35ce9991e70b600ac", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:17Z", "updated": "2020-11-06T18:00:32Z", "addresses": {"tempest-ServerTagsRbacTest-898134328-network": [{"version": 4, "addr": "192.168.120.9", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:04:bc:24"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/37373f5f-0e45-4a02-aea3-c804446204f8"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:28.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:33.894 39 INFO tempest.lib.common.rest_client [req-701bda26-811d-441b-bce3-55f1361c7730 ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6 0.061s 2020-11-06 18:00:33.895 39 DEBUG tempest.lib.common.rest_client [req-701bda26-811d-441b-bce3-55f1361c7730 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1723', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-701bda26-811d-441b-bce3-55f1361c7730', 'x-compute-request-id': 'req-701bda26-811d-441b-bce3-55f1361c7730', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6'} Body: b'{"image": {"id": "4b82337b-9afd-41e8-a1d3-ce32a594dca6", "name": "tempest-ServerActionsRbacTest-image-1763093907", "minRam": 0, "minDisk": 1, "metadata": {"base_image_ref": "56b368f6-9136-40ec-a04c-564d02c95e42", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_location": "snapshot", "image_state": "available", "image_type": "snapshot", "instance_uuid": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "owner_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "owner_project_name": "tempest-ServerActionsRbacTest-1280955528", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1280955528", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f"}, "created": "2020-11-06T18:00:21Z", "updated": "2020-11-06T18:00:34Z", "status": "ACTIVE", "progress": 100, "OS-EXT-IMG-SIZE:size": 1073741824, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}], "server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}]}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:33.972 39 INFO tempest.lib.common.rest_client [req-82c9253f-8b6c-4058-91ea-ba5cab8eac6e ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6 0.067s 2020-11-06 18:00:33.972 39 DEBUG tempest.lib.common.rest_client [req-82c9253f-8b6c-4058-91ea-ba5cab8eac6e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1723', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-82c9253f-8b6c-4058-91ea-ba5cab8eac6e', 'x-compute-request-id': 'req-82c9253f-8b6c-4058-91ea-ba5cab8eac6e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6'} Body: b'{"image": {"id": "4b82337b-9afd-41e8-a1d3-ce32a594dca6", "name": "tempest-ServerActionsRbacTest-image-1763093907", "minRam": 0, "minDisk": 1, "metadata": {"base_image_ref": "56b368f6-9136-40ec-a04c-564d02c95e42", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_location": "snapshot", "image_state": "available", "image_type": "snapshot", "instance_uuid": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "owner_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "owner_project_name": "tempest-ServerActionsRbacTest-1280955528", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1280955528", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f"}, "created": "2020-11-06T18:00:21Z", "updated": "2020-11-06T18:00:34Z", "status": "ACTIVE", "progress": 100, "OS-EXT-IMG-SIZE:size": 1073741824, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6"}], "server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}]}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:34.015 37 INFO tempest.lib.common.rest_client [req-917cd4ff-7a00-43eb-86ae-596f580029f7 ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b 0.253s 2020-11-06 18:00:34.015 37 DEBUG tempest.lib.common.rest_client [req-917cd4ff-7a00-43eb-86ae-596f580029f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1911', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-917cd4ff-7a00-43eb-86ae-596f580029f7', 'x-compute-request-id': 'req-917cd4ff-7a00-43eb-86ae-596f580029f7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b'} Body: b'{"server": {"id": "c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b", "name": "tempest-MigrateServerV225RbacTest-server-1605055471", "status": "BUILD", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "2d746f1ab29074f3f929b1892e496ee0de7b1451dab2a8ca922b6c38", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:30Z", "updated": "2020-11-06T18:00:32Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c8", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-SRV-ATTR:reservation_id": "r-mos6y4h1", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1605055471", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:34.028 37 INFO tempest.common.waiters [-] State transition "BUILD/None" ==> "BUILD/spawning" after 4 second wait 2020-11-06 18:00:34.334 39 INFO tempest.lib.common.rest_client [req-435fc0b9-2443-4037-98ef-8ac2dfbf06a9 ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.353s 2020-11-06 18:00:34.335 39 DEBUG tempest.lib.common.rest_client [req-435fc0b9-2443-4037-98ef-8ac2dfbf06a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-435fc0b9-2443-4037-98ef-8ac2dfbf06a9', 'x-compute-request-id': 'req-435fc0b9-2443-4037-98ef-8ac2dfbf06a9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:00:27Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:02.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "image_uploading", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:34.470 40 INFO tempest.lib.common.rest_client [req-ed488ff5-bd0b-4a60-b927-ed6da9720a4c ] Request (ServerTagsRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8 0.504s 2020-11-06 18:00:34.471 40 DEBUG tempest.lib.common.rest_client [req-ed488ff5-bd0b-4a60-b927-ed6da9720a4c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1716', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ed488ff5-bd0b-4a60-b927-ed6da9720a4c', 'x-compute-request-id': 'req-ed488ff5-bd0b-4a60-b927-ed6da9720a4c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8'} Body: b'{"server": {"id": "37373f5f-0e45-4a02-aea3-c804446204f8", "name": "tempest-ServerTagsRbacTest-server-610909107", "status": "ACTIVE", "tenant_id": "01712c7a73f8464a8cda41cbd4399038", "user_id": "059542b3d55e4690abcee46249e52f8e", "metadata": {}, "hostId": "496d52bb57d5371371e5a6735c1fd7fd74fb37e35ce9991e70b600ac", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:17Z", "updated": "2020-11-06T18:00:33Z", "addresses": {"tempest-ServerTagsRbacTest-898134328-network": [{"version": 4, "addr": "192.168.120.9", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:04:bc:24"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/37373f5f-0e45-4a02-aea3-c804446204f8"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:28.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:34.602 38 INFO tempest.lib.common.rest_client [req-7860ef9a-9ce9-466f-b2dd-15e47226ecb2 ] Request (ServerMetadataRbacTest:tearDownClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/e00d4c88-9473-4f84-80e8-d00e6e78ceeb/remove_router_interface 4.550s 2020-11-06 18:00:34.603 38 DEBUG tempest.lib.common.rest_client [req-7860ef9a-9ce9-466f-b2dd-15e47226ecb2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "2e54fc0f-3b7c-44cc-bfb3-df05984efd40"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-7860ef9a-9ce9-466f-b2dd-15e47226ecb2', 'date': 'Fri, 06 Nov 2020 18:00:34 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/e00d4c88-9473-4f84-80e8-d00e6e78ceeb/remove_router_interface'} Body: b'{"id": "e00d4c88-9473-4f84-80e8-d00e6e78ceeb", "tenant_id": "915ccc983b9341ed85216c7d9ac7bfa7", "port_id": "ec6e5889-9034-43d9-8b7f-ae7d5cf8e125", "network_id": "baa469fe-6923-4d8f-bf23-30791ce8fab6", "subnet_id": "2e54fc0f-3b7c-44cc-bfb3-df05984efd40", "subnet_ids": ["2e54fc0f-3b7c-44cc-bfb3-df05984efd40"]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:35.275 37 INFO tempest.lib.common.rest_client [req-bad72950-a1bb-480d-a3e4-6ffd65cc326b ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b 0.245s 2020-11-06 18:00:35.276 37 DEBUG tempest.lib.common.rest_client [req-bad72950-a1bb-480d-a3e4-6ffd65cc326b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1911', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bad72950-a1bb-480d-a3e4-6ffd65cc326b', 'x-compute-request-id': 'req-bad72950-a1bb-480d-a3e4-6ffd65cc326b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b'} Body: b'{"server": {"id": "c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b", "name": "tempest-MigrateServerV225RbacTest-server-1605055471", "status": "BUILD", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "2d746f1ab29074f3f929b1892e496ee0de7b1451dab2a8ca922b6c38", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:30Z", "updated": "2020-11-06T18:00:32Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c8", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-SRV-ATTR:reservation_id": "r-mos6y4h1", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1605055471", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:35.649 40 INFO tempest.lib.common.rest_client [req-6562efec-de78-456a-a97f-d326aa040668 ] Request (ServerTagsRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8 0.161s 2020-11-06 18:00:35.650 40 DEBUG tempest.lib.common.rest_client [req-6562efec-de78-456a-a97f-d326aa040668 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1514', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6562efec-de78-456a-a97f-d326aa040668', 'x-compute-request-id': 'req-6562efec-de78-456a-a97f-d326aa040668', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8'} Body: b'{"server": {"id": "37373f5f-0e45-4a02-aea3-c804446204f8", "name": "tempest-ServerTagsRbacTest-server-610909107", "status": "DELETED", "tenant_id": "01712c7a73f8464a8cda41cbd4399038", "user_id": "059542b3d55e4690abcee46249e52f8e", "metadata": {}, "hostId": "496d52bb57d5371371e5a6735c1fd7fd74fb37e35ce9991e70b600ac", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:17Z", "updated": "2020-11-06T18:00:35Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/37373f5f-0e45-4a02-aea3-c804446204f8"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:28.000000", "OS-SRV-USG:terminated_at": "2020-11-06T18:00:35.000000", "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "deleted", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:35.665 40 INFO tempest.common.waiters [-] State transition "ACTIVE/deleting" ==> "DELETED/None" after 3 second wait 2020-11-06 18:00:36.034 39 INFO tempest.lib.common.rest_client [req-4a1038d0-64e7-4b4b-88a7-3b6ea5fe9858 ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.681s 2020-11-06 18:00:36.035 39 DEBUG tempest.lib.common.rest_client [req-4a1038d0-64e7-4b4b-88a7-3b6ea5fe9858 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4a1038d0-64e7-4b4b-88a7-3b6ea5fe9858', 'x-compute-request-id': 'req-4a1038d0-64e7-4b4b-88a7-3b6ea5fe9858', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:00:34Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:02.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:36.049 39 INFO tempest.common.waiters [-] State transition "ACTIVE/image_uploading" ==> "ACTIVE/None" after 2 second wait 2020-11-06 18:00:36.049 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:36.107 39 INFO tempest.lib.common.rest_client [req-1c713145-b4d8-4057-8d60-2361b33a2ab5 ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.057s 2020-11-06 18:00:36.107 39 DEBUG tempest.lib.common.rest_client [req-1c713145-b4d8-4057-8d60-2361b33a2ab5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1c713145-b4d8-4057-8d60-2361b33a2ab5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:36.145 39 INFO tempest.lib.common.rest_client [req-e212176d-8a0c-4d12-8647-527d39852828 ] Request (ServerActionsRbacTest:test_create_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:00:36.146 39 DEBUG tempest.lib.common.rest_client [req-e212176d-8a0c-4d12-8647-527d39852828 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e212176d-8a0c-4d12-8647-527d39852828', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["t4edNTuvTr6LjK8LlcMiSw"], "expires_at": "2020-11-06T19:00:36.000000Z", "issued_at": "2020-11-06T18:00:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:36.174 38 INFO tempest.lib.common.rest_client [req-096f65f3-e604-4c1e-b34a-3937e349a356 ] Request (ServerMetadataRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/e00d4c88-9473-4f84-80e8-d00e6e78ceeb 1.570s 2020-11-06 18:00:36.175 38 DEBUG tempest.lib.common.rest_client [req-096f65f3-e604-4c1e-b34a-3937e349a356 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-096f65f3-e604-4c1e-b34a-3937e349a356', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:00:36 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/e00d4c88-9473-4f84-80e8-d00e6e78ceeb'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:36.735 40 INFO tempest.lib.common.rest_client [req-cb3bc2e2-9081-4aef-b92e-1a825a0c9c76 ] Request (ServerTagsRbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8 0.067s 2020-11-06 18:00:36.735 40 DEBUG tempest.lib.common.rest_client [req-cb3bc2e2-9081-4aef-b92e-1a825a0c9c76 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-cb3bc2e2-9081-4aef-b92e-1a825a0c9c76', 'x-compute-request-id': 'req-cb3bc2e2-9081-4aef-b92e-1a825a0c9c76', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/37373f5f-0e45-4a02-aea3-c804446204f8'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 37373f5f-0e45-4a02-aea3-c804446204f8 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:36.736 40 DEBUG tempest.lib.common.dynamic_creds [-] Clearing network: {'id': 'faa756a0-4f6d-4c31-b9d9-1787dee4c317', 'name': 'tempest-ServerTagsRbacTest-898134328-network', 'tenant_id': '01712c7a73f8464a8cda41cbd4399038', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '01712c7a73f8464a8cda41cbd4399038', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 53, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T18:00:10Z', 'updated_at': '2020-11-06T18:00:10Z', 'revision_number': 1}, subnet: {'id': 'd9339805-ddc2-420a-a2ba-92c7b5bd8022', 'name': 'tempest-ServerTagsRbacTest-898134328-subnet', 'tenant_id': '01712c7a73f8464a8cda41cbd4399038', 'network_id': 'faa756a0-4f6d-4c31-b9d9-1787dee4c317', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-11-06T18:00:10Z', 'updated_at': '2020-11-06T18:00:10Z', 'revision_number': 0, 'project_id': '01712c7a73f8464a8cda41cbd4399038'}, router: {'id': '7ee93e84-0654-4099-bd73-5fa2f4216602', 'name': 'tempest-ServerTagsRbacTest-898134328-router', 'tenant_id': '01712c7a73f8464a8cda41cbd4399038', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.70'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::3ec'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-11-06T18:00:11Z', 'updated_at': '2020-11-06T18:00:11Z', 'revision_number': 3, 'project_id': '01712c7a73f8464a8cda41cbd4399038'} _clear_isolated_net_resources /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/dynamic_creds.py:418 2020-11-06 18:00:37.930 39 INFO tempest.lib.common.rest_client [req-85fdd9c5-be87-4c63-aec1-7aade01c2475 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 1.773s 2020-11-06 18:00:37.931 39 DEBUG tempest.lib.common.rest_client [req-85fdd9c5-be87-4c63-aec1-7aade01c2475 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-85fdd9c5-be87-4c63-aec1-7aade01c2475', 'x-compute-request-id': 'req-85fdd9c5-be87-4c63-aec1-7aade01c2475', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:00:34Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:02.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:37.949 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:00:37.949 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.950 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.950 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.950 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.951 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.951 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.952 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.952 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.952 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.952 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.953 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.953 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.954 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.954 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.954 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.954 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.955 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.955 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.955 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.956 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.956 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.956 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.957 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.957 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.957 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.958 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.958 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.958 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.958 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.959 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.959 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.959 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.960 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.960 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.960 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.960 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.961 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.961 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.961 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.962 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.962 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.962 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.963 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.963 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.963 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.963 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.964 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.964 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.964 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.965 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.965 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.965 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.966 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.966 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.966 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.966 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.967 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.967 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.967 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.968 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.968 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.969 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.969 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.969 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.969 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.970 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.970 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.970 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.971 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.971 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.971 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.971 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.972 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.972 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.972 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:37.974 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-pause-server:pause, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:00:37.974 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:37.997 37 INFO tempest.lib.common.rest_client [req-12a912db-d2eb-4330-8f62-67f8a8effa85 ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b 1.703s 2020-11-06 18:00:37.998 37 DEBUG tempest.lib.common.rest_client [req-12a912db-d2eb-4330-8f62-67f8a8effa85 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1911', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-12a912db-d2eb-4330-8f62-67f8a8effa85', 'x-compute-request-id': 'req-12a912db-d2eb-4330-8f62-67f8a8effa85', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b'} Body: b'{"server": {"id": "c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b", "name": "tempest-MigrateServerV225RbacTest-server-1605055471", "status": "BUILD", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "2d746f1ab29074f3f929b1892e496ee0de7b1451dab2a8ca922b6c38", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:30Z", "updated": "2020-11-06T18:00:32Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c8", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-SRV-ATTR:reservation_id": "r-mos6y4h1", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1605055471", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:38.032 39 INFO tempest.lib.common.rest_client [req-59cdc1ad-5122-486a-b5bc-23ca4a8044fe ] Request (ServerActionsRbacTest:test_pause_server): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.057s 2020-11-06 18:00:38.033 39 DEBUG tempest.lib.common.rest_client [req-59cdc1ad-5122-486a-b5bc-23ca4a8044fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-59cdc1ad-5122-486a-b5bc-23ca4a8044fe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:38.053 38 INFO tempest.lib.common.rest_client [req-5fb1ff90-903e-48d8-958b-381f820579b5 ] Request (ServerMetadataRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/2e54fc0f-3b7c-44cc-bfb3-df05984efd40 1.877s 2020-11-06 18:00:38.054 38 DEBUG tempest.lib.common.rest_client [req-5fb1ff90-903e-48d8-958b-381f820579b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-5fb1ff90-903e-48d8-958b-381f820579b5', 'date': 'Fri, 06 Nov 2020 18:00:38 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/2e54fc0f-3b7c-44cc-bfb3-df05984efd40'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:38.078 39 INFO tempest.lib.common.rest_client [req-13e53a6c-f765-4dab-8867-708e96a1f7f8 ] Request (ServerActionsRbacTest:test_pause_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-11-06 18:00:38.078 39 DEBUG tempest.lib.common.rest_client [req-13e53a6c-f765-4dab-8867-708e96a1f7f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-13e53a6c-f765-4dab-8867-708e96a1f7f8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["9PklCQ6nTICEtfkQro1ygg"], "expires_at": "2020-11-06T19:00:38.000000Z", "issued_at": "2020-11-06T18:00:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:38.314 39 INFO tempest.lib.common.rest_client [req-0365bcce-fd9a-4218-bf50-421a1ff290e4 ] Request (ServerActionsRbacTest:test_pause_server): 202 POST http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf/action 0.234s 2020-11-06 18:00:38.315 39 DEBUG tempest.lib.common.rest_client [req-0365bcce-fd9a-4218-bf50-421a1ff290e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"pause": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0365bcce-fd9a-4218-bf50-421a1ff290e4', 'x-compute-request-id': 'req-0365bcce-fd9a-4218-bf50-421a1ff290e4', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:38.551 39 INFO tempest.lib.common.rest_client [req-4993df34-7d12-475f-8b66-a50809d6c0dc ] Request (ServerActionsRbacTest:test_pause_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.235s 2020-11-06 18:00:38.552 39 DEBUG tempest.lib.common.rest_client [req-4993df34-7d12-475f-8b66-a50809d6c0dc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1723', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4993df34-7d12-475f-8b66-a50809d6c0dc', 'x-compute-request-id': 'req-4993df34-7d12-475f-8b66-a50809d6c0dc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:00:38Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:02.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "pausing", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:38.925 38 INFO tempest.lib.common.rest_client [req-940c34d1-2d20-4d78-aa58-cc82eea87fd8 ] Request (ServerMetadataRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/baa469fe-6923-4d8f-bf23-30791ce8fab6 0.870s 2020-11-06 18:00:38.925 38 DEBUG tempest.lib.common.rest_client [req-940c34d1-2d20-4d78-aa58-cc82eea87fd8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-940c34d1-2d20-4d78-aa58-cc82eea87fd8', 'date': 'Fri, 06 Nov 2020 18:00:38 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/baa469fe-6923-4d8f-bf23-30791ce8fab6'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:39.065 38 INFO tempest.lib.common.rest_client [req-cf375f1e-588d-45da-a062-0ecaf4d4d1dc ] Request (ServerMetadataRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/3c1ff96f31b04e82bb3fb98702adee0b 0.138s 2020-11-06 18:00:39.065 38 DEBUG tempest.lib.common.rest_client [req-cf375f1e-588d-45da-a062-0ecaf4d4d1dc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cf375f1e-588d-45da-a062-0ecaf4d4d1dc', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/3c1ff96f31b04e82bb3fb98702adee0b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:39.138 38 INFO tempest.lib.common.rest_client [req-f95f4155-68b5-4a7e-9ae1-704d5853db0c ] Request (ServerMetadataRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=915ccc983b9341ed85216c7d9ac7bfa7&name=default 0.071s 2020-11-06 18:00:39.139 38 DEBUG tempest.lib.common.rest_client [req-f95f4155-68b5-4a7e-9ae1-704d5853db0c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-f95f4155-68b5-4a7e-9ae1-704d5853db0c', 'date': 'Fri, 06 Nov 2020 18:00:39 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=915ccc983b9341ed85216c7d9ac7bfa7&name=default'} Body: b'{"security_groups": [{"id": "19f8566f-61b6-4113-98d4-a4134f258b0e", "name": "default", "stateful": true, "tenant_id": "915ccc983b9341ed85216c7d9ac7bfa7", "description": "Default security group", "security_group_rules": [{"id": "6cb9898b-9dba-4d87-83bf-dd45f6511acf", "tenant_id": "915ccc983b9341ed85216c7d9ac7bfa7", "security_group_id": "19f8566f-61b6-4113-98d4-a4134f258b0e", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:00:06Z", "updated_at": "2020-11-06T18:00:06Z", "revision_number": 0, "project_id": "915ccc983b9341ed85216c7d9ac7bfa7"}, {"id": "6dbce6c8-8592-4b4d-896b-2bbafbc837f0", "tenant_id": "915ccc983b9341ed85216c7d9ac7bfa7", "security_group_id": "19f8566f-61b6-4113-98d4-a4134f258b0e", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:00:06Z", "updated_at": "2020-11-06T18:00:06Z", "revision_number": 0, "project_id": "915ccc983b9341ed85216c7d9ac7bfa7"}, {"id": "91476d71-3b49-4459-b9b4-583975ba94e0", "tenant_id": "915ccc983b9341ed85216c7d9ac7bfa7", "security_group_id": "19f8566f-61b6-4113-98d4-a4134f258b0e", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "19f8566f-61b6-4113-98d4-a4134f258b0e", "description": null, "tags": [], "created_at": "2020-11-06T18:00:06Z", "updated_at": "2020-11-06T18:00:06Z", "revision_number": 0, "project_id": "915ccc983b9341ed85216c7d9ac7bfa7"}, {"id": "c1c6f2fe-8635-4ec3-a735-4a3305683039", "tenant_id": "915ccc983b9341ed85216c7d9ac7bfa7", "security_group_id": "19f8566f-61b6-4113-98d4-a4134f258b0e", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "19f8566f-61b6-4113-98d4-a4134f258b0e", "description": null, "tags": [], "created_at": "2020-11-06T18:00:06Z", "updated_at": "2020-11-06T18:00:06Z", "revision_number": 0, "project_id": "915ccc983b9341ed85216c7d9ac7bfa7"}], "tags": [], "created_at": "2020-11-06T18:00:06Z", "updated_at": "2020-11-06T18:00:06Z", "revision_number": 1, "project_id": "915ccc983b9341ed85216c7d9ac7bfa7"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:39.207 40 INFO tempest.lib.common.rest_client [req-956b2b50-f72d-4f36-a60a-ed73c7f77653 ] Request (ServerTagsRbacTest:tearDownClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/7ee93e84-0654-4099-bd73-5fa2f4216602/remove_router_interface 2.470s 2020-11-06 18:00:39.208 40 DEBUG tempest.lib.common.rest_client [req-956b2b50-f72d-4f36-a60a-ed73c7f77653 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "d9339805-ddc2-420a-a2ba-92c7b5bd8022"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-956b2b50-f72d-4f36-a60a-ed73c7f77653', 'date': 'Fri, 06 Nov 2020 18:00:39 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/7ee93e84-0654-4099-bd73-5fa2f4216602/remove_router_interface'} Body: b'{"id": "7ee93e84-0654-4099-bd73-5fa2f4216602", "tenant_id": "01712c7a73f8464a8cda41cbd4399038", "port_id": "ff94abe0-ec56-4107-8d47-bd74b0a98cd1", "network_id": "faa756a0-4f6d-4c31-b9d9-1787dee4c317", "subnet_id": "d9339805-ddc2-420a-a2ba-92c7b5bd8022", "subnet_ids": ["d9339805-ddc2-420a-a2ba-92c7b5bd8022"]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:39.262 38 INFO tempest.lib.common.rest_client [req-ca965e30-a454-4be6-ac0a-8ee6429fb1a4 ] Request (ServerMetadataRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/19f8566f-61b6-4113-98d4-a4134f258b0e 0.122s 2020-11-06 18:00:39.262 38 DEBUG tempest.lib.common.rest_client [req-ca965e30-a454-4be6-ac0a-8ee6429fb1a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-ca965e30-a454-4be6-ac0a-8ee6429fb1a4', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:00:39 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/19f8566f-61b6-4113-98d4-a4134f258b0e'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:39.364 37 INFO tempest.lib.common.rest_client [req-31c560c6-b65b-42c9-bc34-0d684eda41d8 ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b 0.350s 2020-11-06 18:00:39.365 37 DEBUG tempest.lib.common.rest_client [req-31c560c6-b65b-42c9-bc34-0d684eda41d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1911', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-31c560c6-b65b-42c9-bc34-0d684eda41d8', 'x-compute-request-id': 'req-31c560c6-b65b-42c9-bc34-0d684eda41d8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b'} Body: b'{"server": {"id": "c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b", "name": "tempest-MigrateServerV225RbacTest-server-1605055471", "status": "BUILD", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "2d746f1ab29074f3f929b1892e496ee0de7b1451dab2a8ca922b6c38", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:30Z", "updated": "2020-11-06T18:00:32Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c8", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-SRV-ATTR:reservation_id": "r-mos6y4h1", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1605055471", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:39.454 38 INFO tempest.lib.common.rest_client [req-63b00a51-9fda-44d4-afca-3b695bb5d8e1 ] Request (ServerMetadataRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7 0.191s 2020-11-06 18:00:39.455 38 DEBUG tempest.lib.common.rest_client [req-63b00a51-9fda-44d4-afca-3b695bb5d8e1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-63b00a51-9fda-44d4-afca-3b695bb5d8e1', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/915ccc983b9341ed85216c7d9ac7bfa7'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:39.555 38 INFO tempest.lib.common.rest_client [req-c0a36229-483c-47b0-8a7a-142611932e52 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-11-06 18:00:39.555 38 DEBUG tempest.lib.common.rest_client [req-c0a36229-483c-47b0-8a7a-142611932e52 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c0a36229-483c-47b0-8a7a-142611932e52', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["tc-5fCWrS9CkeQRkfe-JXA"], "expires_at": "2020-11-06T19:00:39.000000Z", "issued_at": "2020-11-06T18:00:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:39.607 38 INFO tempest.lib.common.rest_client [req-79f95a84-67c1-481f-bcd1-5f63dc8fed3b ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-11-06 18:00:39.607 38 DEBUG tempest.lib.common.rest_client [req-79f95a84-67c1-481f-bcd1-5f63dc8fed3b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-79f95a84-67c1-481f-bcd1-5f63dc8fed3b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["kgQR9btmSnCSTNk2VzzzdA"], "expires_at": "2020-11-06T19:00:39.000000Z", "issued_at": "2020-11-06T18:00:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:39.669 38 INFO tempest.lib.common.rest_client [req-dbb4aae4-daad-42fa-af4b-8c8126754ccf ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.060s 2020-11-06 18:00:39.670 38 DEBUG tempest.lib.common.rest_client [req-dbb4aae4-daad-42fa-af4b-8c8126754ccf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dbb4aae4-daad-42fa-af4b-8c8126754ccf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:39.735 38 INFO tempest.lib.common.rest_client [req-8bc449b1-8664-44fd-afb5-6b6e0bcd761c ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.064s 2020-11-06 18:00:39.735 38 DEBUG tempest.lib.common.rest_client [req-8bc449b1-8664-44fd-afb5-6b6e0bcd761c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-MiscPolicyActionsNetworkRbacTest-233952843-desc", "domain_id": "default", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '400', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8bc449b1-8664-44fd-afb5-6b6e0bcd761c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843", "domain_id": "default", "description": "tempest-MiscPolicyActionsNetworkRbacTest-233952843-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:39.823 39 INFO tempest.lib.common.rest_client [req-30afe7a1-53ef-4166-9d55-2033d75b6808 ] Request (ServerActionsRbacTest:test_pause_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.256s 2020-11-06 18:00:39.824 39 DEBUG tempest.lib.common.rest_client [req-30afe7a1-53ef-4166-9d55-2033d75b6808 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1703', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-30afe7a1-53ef-4166-9d55-2033d75b6808', 'x-compute-request-id': 'req-30afe7a1-53ef-4166-9d55-2033d75b6808', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "PAUSED", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:00:38Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:02.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "paused", "OS-EXT-STS:power_state": 3, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:39.840 39 INFO tempest.common.waiters [-] State transition "ACTIVE/pausing" ==> "PAUSED/None" after 1 second wait 2020-11-06 18:00:39.840 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:39.862 38 INFO tempest.lib.common.rest_client [req-157bda09-ba31-477a-96d4-528ea0420c88 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.125s 2020-11-06 18:00:39.862 38 DEBUG tempest.lib.common.rest_client [req-157bda09-ba31-477a-96d4-528ea0420c88 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843", "password": "Y2!I~hfMFY#ahmR", "project_id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "email": "tempest-MiscPolicyActionsNetworkRbacTest-1116531204@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '419', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-157bda09-ba31-477a-96d4-528ea0420c88', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "email": "tempest-MiscPolicyActionsNetworkRbacTest-1116531204@example.com", "id": "1db6819d47a748669464ad962e63976e", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/1db6819d47a748669464ad962e63976e"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:39.899 39 INFO tempest.lib.common.rest_client [req-51ef2641-8b1a-4f6a-a751-18a633aa8668 ] Request (ServerActionsRbacTest:test_pause_server): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.058s 2020-11-06 18:00:39.900 39 DEBUG tempest.lib.common.rest_client [req-51ef2641-8b1a-4f6a-a751-18a633aa8668 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-51ef2641-8b1a-4f6a-a751-18a633aa8668', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:39.921 38 INFO tempest.lib.common.rest_client [req-4a788910-9b71-4cf6-97be-45320cf6204d ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.057s 2020-11-06 18:00:39.921 38 DEBUG tempest.lib.common.rest_client [req-4a788910-9b71-4cf6-97be-45320cf6204d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4a788910-9b71-4cf6-97be-45320cf6204d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:39.973 38 INFO tempest.lib.common.rest_client [req-51a0af47-7320-47ce-9819-5c0d920a9b52 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.050s 2020-11-06 18:00:39.974 38 DEBUG tempest.lib.common.rest_client [req-51a0af47-7320-47ce-9819-5c0d920a9b52 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-51a0af47-7320-47ce-9819-5c0d920a9b52', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:39.993 39 INFO tempest.lib.common.rest_client [req-1714d19b-eb5b-4ee3-9087-514801007515 ] Request (ServerActionsRbacTest:test_pause_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-11-06 18:00:39.993 39 DEBUG tempest.lib.common.rest_client [req-1714d19b-eb5b-4ee3-9087-514801007515 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1714d19b-eb5b-4ee3-9087-514801007515', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["6QTKhiXzTtGhNyHlnLVn1A"], "expires_at": "2020-11-06T19:00:39.000000Z", "issued_at": "2020-11-06T18:00:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:40.061 38 INFO tempest.lib.common.rest_client [req-7528ab91-f453-4f3a-b24a-ea5c757bb941 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles/72a4576c553448cd941b052c1ca0cf2d 0.086s 2020-11-06 18:00:40.062 38 DEBUG tempest.lib.common.rest_client [req-7528ab91-f453-4f3a-b24a-ea5c757bb941 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7528ab91-f453-4f3a-b24a-ea5c757bb941', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:40.063 38 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-MiscPolicyActionsNetworkRbacTest-233952843', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '4f44b0a1b5fe4a17b77cabcf20e9501b', 'project_name': 'tempest-MiscPolicyActionsNetworkRbacTest-233952843', 'tenant_id': '4f44b0a1b5fe4a17b77cabcf20e9501b', 'tenant_name': 'tempest-MiscPolicyActionsNetworkRbacTest-233952843', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '1db6819d47a748669464ad962e63976e'}, Network: None, Subnet: None, Router: None 2020-11-06 18:00:40.145 38 INFO tempest.lib.common.rest_client [req-e81ac658-f14a-45fa-9ff5-5fc3098c5f63 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 18:00:40.146 38 DEBUG tempest.lib.common.rest_client [req-e81ac658-f14a-45fa-9ff5-5fc3098c5f63 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e81ac658-f14a-45fa-9ff5-5fc3098c5f63', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["-JiH3LfZQYaN6FjDJIm-qA"], "expires_at": "2020-11-06T19:00:40.000000Z", "issued_at": "2020-11-06T18:00:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:40.674 38 INFO tempest.lib.common.rest_client [req-98bed44d-eb7a-4ffa-b721-7202b7f9b4a8 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.528s 2020-11-06 18:00:40.675 38 DEBUG tempest.lib.common.rest_client [req-98bed44d-eb7a-4ffa-b721-7202b7f9b4a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-MiscPolicyActionsNetworkRbacTest-1290166897-network", "tenant_id": "4f44b0a1b5fe4a17b77cabcf20e9501b"}} Response - Headers: {'content-type': 'application/json', 'content-length': '748', 'x-openstack-request-id': 'req-98bed44d-eb7a-4ffa-b721-7202b7f9b4a8', 'date': 'Fri, 06 Nov 2020 18:00:40 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"f747eec6-c776-4af6-aa67-8eb73e88914e","name":"tempest-MiscPolicyActionsNetworkRbacTest-1290166897-network","tenant_id":"4f44b0a1b5fe4a17b77cabcf20e9501b","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"4f44b0a1b5fe4a17b77cabcf20e9501b","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":49,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:00:40Z","updated_at":"2020-11-06T18:00:40Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:40.731 37 INFO tempest.lib.common.rest_client [req-95b57c66-02ed-4efd-871e-1015f5caa024 ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b 0.348s 2020-11-06 18:00:40.732 37 DEBUG tempest.lib.common.rest_client [req-95b57c66-02ed-4efd-871e-1015f5caa024 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2106', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-95b57c66-02ed-4efd-871e-1015f5caa024', 'x-compute-request-id': 'req-95b57c66-02ed-4efd-871e-1015f5caa024', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b'} Body: b'{"server": {"id": "c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b", "name": "tempest-MigrateServerV225RbacTest-server-1605055471", "status": "ACTIVE", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "2d746f1ab29074f3f929b1892e496ee0de7b1451dab2a8ca922b6c38", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:30Z", "updated": "2020-11-06T18:00:40Z", "addresses": {"patrole_reader-net_30048f18-b96b-4343-a720-1173982b59b8": [{"version": 4, "addr": "192.168.120.109", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:44:63:02"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:39.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c8", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-SRV-ATTR:reservation_id": "r-mos6y4h1", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1605055471", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:40.743 37 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 10 second wait 2020-11-06 18:00:40.870 40 INFO tempest.lib.common.rest_client [req-ad4451c8-aa8a-431d-8620-761c09a367c2 ] Request (ServerTagsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/7ee93e84-0654-4099-bd73-5fa2f4216602 1.660s 2020-11-06 18:00:40.870 40 DEBUG tempest.lib.common.rest_client [req-ad4451c8-aa8a-431d-8620-761c09a367c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-ad4451c8-aa8a-431d-8620-761c09a367c2', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:00:40 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/7ee93e84-0654-4099-bd73-5fa2f4216602'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:41.193 37 INFO tempest.lib.common.rest_client [req-fe9ed8e9-fbe9-4639-8b6f-5e248461577f ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b 0.448s 2020-11-06 18:00:41.193 37 DEBUG tempest.lib.common.rest_client [req-fe9ed8e9-fbe9-4639-8b6f-5e248461577f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2106', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fe9ed8e9-fbe9-4639-8b6f-5e248461577f', 'x-compute-request-id': 'req-fe9ed8e9-fbe9-4639-8b6f-5e248461577f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b'} Body: b'{"server": {"id": "c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b", "name": "tempest-MigrateServerV225RbacTest-server-1605055471", "status": "ACTIVE", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "2d746f1ab29074f3f929b1892e496ee0de7b1451dab2a8ca922b6c38", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:30Z", "updated": "2020-11-06T18:00:40Z", "addresses": {"patrole_reader-net_30048f18-b96b-4343-a720-1173982b59b8": [{"version": 4, "addr": "192.168.120.109", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:44:63:02"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:39.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c8", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-SRV-ATTR:reservation_id": "r-mos6y4h1", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1605055471", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:41.245 37 INFO tempest.lib.common.rest_client [req-d8dba135-0735-4da3-bb78-7b31767a6384 ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/os-hosts 0.039s 2020-11-06 18:00:41.246 37 DEBUG tempest.lib.common.rest_client [req-d8dba135-0735-4da3-bb78-7b31767a6384 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '369', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d8dba135-0735-4da3-bb78-7b31767a6384', 'x-compute-request-id': 'req-d8dba135-0735-4da3-bb78-7b31767a6384', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hosts'} Body: b'{"hosts": [{"host_name": "lf-virtual9", "service": "scheduler", "zone": "internal"}, {"host_name": "lf-virtual9", "service": "conductor", "zone": "internal"}, {"host_name": "lf-virtual9", "service": "conductor", "zone": "internal"}, {"host_name": "lf-virtual9", "service": "compute", "zone": "nova"}, {"host_name": "lf-virtual8", "service": "compute", "zone": "nova"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:41.250 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:41.299 40 INFO tempest.lib.common.rest_client [req-80271a20-17ad-48cd-bbd8-ef6f3e09ffb6 ] Request (ServerTagsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/d9339805-ddc2-420a-a2ba-92c7b5bd8022 0.428s 2020-11-06 18:00:41.300 40 DEBUG tempest.lib.common.rest_client [req-80271a20-17ad-48cd-bbd8-ef6f3e09ffb6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-80271a20-17ad-48cd-bbd8-ef6f3e09ffb6', 'date': 'Fri, 06 Nov 2020 18:00:41 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/d9339805-ddc2-420a-a2ba-92c7b5bd8022'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:41.308 37 INFO tempest.lib.common.rest_client [req-a5b1d5ab-8f6b-48e6-803a-770c98f5faa3 ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/identity/v3/projects/e8c4ea0aa616438d84be2a246c718bc3/users/99a9d4e6d0ca480d8f91548cce415d39/roles 0.057s 2020-11-06 18:00:41.309 37 DEBUG tempest.lib.common.rest_client [req-a5b1d5ab-8f6b-48e6-803a-770c98f5faa3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a5b1d5ab-8f6b-48e6-803a-770c98f5faa3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e8c4ea0aa616438d84be2a246c718bc3/users/99a9d4e6d0ca480d8f91548cce415d39/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e8c4ea0aa616438d84be2a246c718bc3/users/99a9d4e6d0ca480d8f91548cce415d39/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:41.393 37 INFO tempest.lib.common.rest_client [req-fcb9ef72-f560-46e8-92aa-9fcd2dd8ee44 ] Request (MigrateServerV225RbacTest:test_migration_live): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 18:00:41.394 37 DEBUG tempest.lib.common.rest_client [req-fcb9ef72-f560-46e8-92aa-9fcd2dd8ee44 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fcb9ef72-f560-46e8-92aa-9fcd2dd8ee44', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "99a9d4e6d0ca480d8f91548cce415d39", "name": "tempest-MigrateServerV225RbacTest-107357711", "password_expires_at": null}, "audit_ids": ["1pKbEkThTZSFvmaHDUskUA"], "expires_at": "2020-11-06T19:00:41.000000Z", "issued_at": "2020-11-06T18:00:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e8c4ea0aa616438d84be2a246c718bc3", "name": "tempest-MigrateServerV225RbacTest-107357711"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:41.660 38 INFO tempest.lib.common.rest_client [req-62be7f40-940a-4f32-a020-e28d26f156ff ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.984s 2020-11-06 18:00:41.660 38 DEBUG tempest.lib.common.rest_client [req-62be7f40-940a-4f32-a020-e28d26f156ff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "f747eec6-c776-4af6-aa67-8eb73e88914e", "cidr": "192.168.120.0/28", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1290166897-subnet", "tenant_id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "enable_dhcp": true, "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '719', 'x-openstack-request-id': 'req-62be7f40-940a-4f32-a020-e28d26f156ff', 'date': 'Fri, 06 Nov 2020 18:00:41 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"a7138c88-1746-4acf-b367-e81e790bf9d7","name":"tempest-MiscPolicyActionsNetworkRbacTest-1290166897-subnet","tenant_id":"4f44b0a1b5fe4a17b77cabcf20e9501b","network_id":"f747eec6-c776-4af6-aa67-8eb73e88914e","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-11-06T18:00:40Z","updated_at":"2020-11-06T18:00:40Z","revision_number":0,"project_id":"4f44b0a1b5fe4a17b77cabcf20e9501b"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:41.858 39 INFO tempest.lib.common.rest_client [req-c763bc5a-c770-4cd5-8951-2c71b5fd2298 ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 1.863s 2020-11-06 18:00:41.859 39 DEBUG tempest.lib.common.rest_client [req-c763bc5a-c770-4cd5-8951-2c71b5fd2298 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1703', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c763bc5a-c770-4cd5-8951-2c71b5fd2298', 'x-compute-request-id': 'req-c763bc5a-c770-4cd5-8951-2c71b5fd2298', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "PAUSED", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:00:38Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:02.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "paused", "OS-EXT-STS:power_state": 3, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:41.979 40 INFO tempest.lib.common.rest_client [req-c29e2fd3-c58f-4b9f-89c9-b0e8bb8a4e0e ] Request (ServerTagsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/faa756a0-4f6d-4c31-b9d9-1787dee4c317 0.678s 2020-11-06 18:00:41.980 40 DEBUG tempest.lib.common.rest_client [req-c29e2fd3-c58f-4b9f-89c9-b0e8bb8a4e0e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-c29e2fd3-c58f-4b9f-89c9-b0e8bb8a4e0e', 'date': 'Fri, 06 Nov 2020 18:00:41 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/faa756a0-4f6d-4c31-b9d9-1787dee4c317'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:42.050 39 INFO tempest.lib.common.rest_client [req-f28b9395-1c8c-41f5-8173-8d1b37ae043c ] Request (ServerActionsRbacTest:_run_cleanups): 202 POST http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf/action 0.178s 2020-11-06 18:00:42.050 39 DEBUG tempest.lib.common.rest_client [req-f28b9395-1c8c-41f5-8173-8d1b37ae043c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"unpause": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f28b9395-1c8c-41f5-8173-8d1b37ae043c', 'x-compute-request-id': 'req-f28b9395-1c8c-41f5-8173-8d1b37ae043c', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:42.114 40 INFO tempest.lib.common.rest_client [req-ee1ac02d-be98-43bc-aeeb-5cdb45ea8703 ] Request (ServerTagsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/059542b3d55e4690abcee46249e52f8e 0.133s 2020-11-06 18:00:42.114 40 DEBUG tempest.lib.common.rest_client [req-ee1ac02d-be98-43bc-aeeb-5cdb45ea8703 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ee1ac02d-be98-43bc-aeeb-5cdb45ea8703', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/059542b3d55e4690abcee46249e52f8e'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:42.183 40 INFO tempest.lib.common.rest_client [req-17c7a5c2-d413-44f4-abd2-72d88b956ca4 ] Request (ServerTagsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=01712c7a73f8464a8cda41cbd4399038&name=default 0.067s 2020-11-06 18:00:42.183 40 DEBUG tempest.lib.common.rest_client [req-17c7a5c2-d413-44f4-abd2-72d88b956ca4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-17c7a5c2-d413-44f4-abd2-72d88b956ca4', 'date': 'Fri, 06 Nov 2020 18:00:42 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=01712c7a73f8464a8cda41cbd4399038&name=default'} Body: b'{"security_groups": [{"id": "14e9664b-2f63-4189-a773-1a59ae081bba", "name": "default", "stateful": true, "tenant_id": "01712c7a73f8464a8cda41cbd4399038", "description": "Default security group", "security_group_rules": [{"id": "55b11403-7230-4b6a-a9fc-4fb9ce48f085", "tenant_id": "01712c7a73f8464a8cda41cbd4399038", "security_group_id": "14e9664b-2f63-4189-a773-1a59ae081bba", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:00:10Z", "updated_at": "2020-11-06T18:00:10Z", "revision_number": 0, "project_id": "01712c7a73f8464a8cda41cbd4399038"}, {"id": "5c99a59d-423e-431a-83a7-7f28ef15cf71", "tenant_id": "01712c7a73f8464a8cda41cbd4399038", "security_group_id": "14e9664b-2f63-4189-a773-1a59ae081bba", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "14e9664b-2f63-4189-a773-1a59ae081bba", "description": null, "tags": [], "created_at": "2020-11-06T18:00:10Z", "updated_at": "2020-11-06T18:00:10Z", "revision_number": 0, "project_id": "01712c7a73f8464a8cda41cbd4399038"}, {"id": "5f9d5112-2581-47dc-b288-a5fb4f5ae3f5", "tenant_id": "01712c7a73f8464a8cda41cbd4399038", "security_group_id": "14e9664b-2f63-4189-a773-1a59ae081bba", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:00:10Z", "updated_at": "2020-11-06T18:00:10Z", "revision_number": 0, "project_id": "01712c7a73f8464a8cda41cbd4399038"}, {"id": "9f2aa164-218b-4736-a223-f17048ffcfd0", "tenant_id": "01712c7a73f8464a8cda41cbd4399038", "security_group_id": "14e9664b-2f63-4189-a773-1a59ae081bba", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "14e9664b-2f63-4189-a773-1a59ae081bba", "description": null, "tags": [], "created_at": "2020-11-06T18:00:10Z", "updated_at": "2020-11-06T18:00:10Z", "revision_number": 0, "project_id": "01712c7a73f8464a8cda41cbd4399038"}], "tags": [], "created_at": "2020-11-06T18:00:10Z", "updated_at": "2020-11-06T18:00:10Z", "revision_number": 1, "project_id": "01712c7a73f8464a8cda41cbd4399038"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:42.322 40 INFO tempest.lib.common.rest_client [req-fe628650-85ec-439d-9f0a-e012abc493ec ] Request (ServerTagsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/14e9664b-2f63-4189-a773-1a59ae081bba 0.138s 2020-11-06 18:00:42.322 40 DEBUG tempest.lib.common.rest_client [req-fe628650-85ec-439d-9f0a-e012abc493ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-fe628650-85ec-439d-9f0a-e012abc493ec', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:00:42 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/14e9664b-2f63-4189-a773-1a59ae081bba'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:42.377 39 INFO tempest.lib.common.rest_client [req-aefed128-40f1-4ed0-936d-28d1f9707b6c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.321s 2020-11-06 18:00:42.377 39 DEBUG tempest.lib.common.rest_client [req-aefed128-40f1-4ed0-936d-28d1f9707b6c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1710', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-aefed128-40f1-4ed0-936d-28d1f9707b6c', 'x-compute-request-id': 'req-aefed128-40f1-4ed0-936d-28d1f9707b6c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "PAUSED", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:00:42Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:02.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "unpausing", "OS-EXT-STS:vm_state": "paused", "OS-EXT-STS:power_state": 3, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:42.492 40 INFO tempest.lib.common.rest_client [req-1253fe93-642d-439b-8fef-1fc8bf9b76f3 ] Request (ServerTagsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038 0.169s 2020-11-06 18:00:42.492 40 DEBUG tempest.lib.common.rest_client [req-1253fe93-642d-439b-8fef-1fc8bf9b76f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1253fe93-642d-439b-8fef-1fc8bf9b76f3', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/01712c7a73f8464a8cda41cbd4399038'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:42.578 40 INFO tempest.lib.common.rest_client [req-230f207b-1571-4a7d-80b8-9e443b012609 ] Request (VolumeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 18:00:42.578 40 DEBUG tempest.lib.common.rest_client [req-230f207b-1571-4a7d-80b8-9e443b012609 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-230f207b-1571-4a7d-80b8-9e443b012609', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["EcH3xMl_TN-SVqVKjmTadA"], "expires_at": "2020-11-06T19:00:42.000000Z", "issued_at": "2020-11-06T18:00:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:42.623 40 INFO tempest.lib.common.rest_client [req-d3165b57-1f24-42c1-86b0-df08eecad38a ] Request (VolumeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:00:42.623 40 DEBUG tempest.lib.common.rest_client [req-d3165b57-1f24-42c1-86b0-df08eecad38a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d3165b57-1f24-42c1-86b0-df08eecad38a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["II9VR94mR9KrdSTXKygM2g"], "expires_at": "2020-11-06T19:00:42.000000Z", "issued_at": "2020-11-06T18:00:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:42.682 40 INFO tempest.lib.common.rest_client [req-92fc4b94-a880-46cc-927d-4bb2ded4c252 ] Request (VolumeRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.058s 2020-11-06 18:00:42.683 40 DEBUG tempest.lib.common.rest_client [req-92fc4b94-a880-46cc-927d-4bb2ded4c252 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-92fc4b94-a880-46cc-927d-4bb2ded4c252', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:42.767 40 INFO tempest.lib.common.rest_client [req-49b93d69-7f80-4988-932a-82f8b88f4396 ] Request (VolumeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.083s 2020-11-06 18:00:42.767 40 DEBUG tempest.lib.common.rest_client [req-49b93d69-7f80-4988-932a-82f8b88f4396 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumeRbacTest-200076840-desc", "domain_id": "default", "name": "tempest-VolumeRbacTest-200076840"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '364', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-49b93d69-7f80-4988-932a-82f8b88f4396', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "6783e84af29c412fb82aa0c1f57a42dc", "name": "tempest-VolumeRbacTest-200076840", "domain_id": "default", "description": "tempest-VolumeRbacTest-200076840-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:42.875 40 INFO tempest.lib.common.rest_client [req-9bebf78e-e207-4b8f-8a14-35e61c24e4ef ] Request (VolumeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.107s 2020-11-06 18:00:42.876 40 DEBUG tempest.lib.common.rest_client [req-9bebf78e-e207-4b8f-8a14-35e61c24e4ef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumeRbacTest-200076840", "password": "M1^phVqoy2dh0Bn", "project_id": "6783e84af29c412fb82aa0c1f57a42dc", "email": "tempest-VolumeRbacTest-793488654@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '382', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9bebf78e-e207-4b8f-8a14-35e61c24e4ef', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "6783e84af29c412fb82aa0c1f57a42dc", "email": "tempest-VolumeRbacTest-793488654@example.com", "id": "f0f68e26f4a84ca492a5ea80b6591569", "name": "tempest-VolumeRbacTest-200076840", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/f0f68e26f4a84ca492a5ea80b6591569"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:42.929 40 INFO tempest.lib.common.rest_client [req-0f85ca93-fb1c-4889-b6ff-4a702707e411 ] Request (VolumeRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.052s 2020-11-06 18:00:42.929 40 DEBUG tempest.lib.common.rest_client [req-0f85ca93-fb1c-4889-b6ff-4a702707e411 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0f85ca93-fb1c-4889-b6ff-4a702707e411', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:42.945 37 INFO tempest.lib.common.rest_client [req-f4e88f17-1027-40a7-ae64-c1a3669edcc6 ] Request (MigrateServerV225RbacTest:test_migration_live): 202 POST http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b/action 1.550s 2020-11-06 18:00:42.946 37 DEBUG tempest.lib.common.rest_client [req-f4e88f17-1027-40a7-ae64-c1a3669edcc6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: {"os-migrateLive": {"host": "lf-virtual9", "block_migration": "auto"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f4e88f17-1027-40a7-ae64-c1a3669edcc6', 'x-compute-request-id': 'req-f4e88f17-1027-40a7-ae64-c1a3669edcc6', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:42.946 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:42.975 40 INFO tempest.lib.common.rest_client [req-eb92577c-28fc-4898-bdf2-4f173258e24b ] Request (VolumeRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.044s 2020-11-06 18:00:42.975 40 DEBUG tempest.lib.common.rest_client [req-eb92577c-28fc-4898-bdf2-4f173258e24b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eb92577c-28fc-4898-bdf2-4f173258e24b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:42.999 37 INFO tempest.lib.common.rest_client [req-37720e80-62ae-4501-8c44-04ef967f9590 ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/identity/v3/projects/e8c4ea0aa616438d84be2a246c718bc3/users/99a9d4e6d0ca480d8f91548cce415d39/roles 0.052s 2020-11-06 18:00:43.000 37 DEBUG tempest.lib.common.rest_client [req-37720e80-62ae-4501-8c44-04ef967f9590 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-37720e80-62ae-4501-8c44-04ef967f9590', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e8c4ea0aa616438d84be2a246c718bc3/users/99a9d4e6d0ca480d8f91548cce415d39/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e8c4ea0aa616438d84be2a246c718bc3/users/99a9d4e6d0ca480d8f91548cce415d39/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:43.036 40 INFO tempest.lib.common.rest_client [req-436145d7-097d-475c-93c9-39bbaef1054a ] Request (VolumeRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles/72a4576c553448cd941b052c1ca0cf2d 0.060s 2020-11-06 18:00:43.037 40 DEBUG tempest.lib.common.rest_client [req-436145d7-097d-475c-93c9-39bbaef1054a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-436145d7-097d-475c-93c9-39bbaef1054a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:43.037 40 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumeRbacTest-200076840', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '6783e84af29c412fb82aa0c1f57a42dc', 'project_name': 'tempest-VolumeRbacTest-200076840', 'tenant_id': '6783e84af29c412fb82aa0c1f57a42dc', 'tenant_name': 'tempest-VolumeRbacTest-200076840', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'f0f68e26f4a84ca492a5ea80b6591569'}, Network: None, Subnet: None, Router: None 2020-11-06 18:00:43.038 40 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumeRbacTest-200076840', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '6783e84af29c412fb82aa0c1f57a42dc', 'project_name': 'tempest-VolumeRbacTest-200076840', 'tenant_id': '6783e84af29c412fb82aa0c1f57a42dc', 'tenant_name': 'tempest-VolumeRbacTest-200076840', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'f0f68e26f4a84ca492a5ea80b6591569'}, Network: None, Subnet: None, Router: None 2020-11-06 18:00:43.095 37 INFO tempest.lib.common.rest_client [req-ff943278-aa0f-402b-9ba7-02a93d31f050 ] Request (MigrateServerV225RbacTest:test_migration_live): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-11-06 18:00:43.095 37 DEBUG tempest.lib.common.rest_client [req-ff943278-aa0f-402b-9ba7-02a93d31f050 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ff943278-aa0f-402b-9ba7-02a93d31f050', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "99a9d4e6d0ca480d8f91548cce415d39", "name": "tempest-MigrateServerV225RbacTest-107357711", "password_expires_at": null}, "audit_ids": ["oz0lcUG_TBqRXKIveHWXkA"], "expires_at": "2020-11-06T19:00:43.000000Z", "issued_at": "2020-11-06T18:00:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e8c4ea0aa616438d84be2a246c718bc3", "name": "tempest-MigrateServerV225RbacTest-107357711"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e8c4ea0aa616438d84be2a246c718bc3", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:43.148 40 INFO tempest.lib.common.rest_client [req-c3b81edd-3e67-49e1-83b7-d5822ba9182b ] Request (VolumeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-11-06 18:00:43.148 40 DEBUG tempest.lib.common.rest_client [req-c3b81edd-3e67-49e1-83b7-d5822ba9182b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6557', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c3b81edd-3e67-49e1-83b7-d5822ba9182b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f0f68e26f4a84ca492a5ea80b6591569", "name": "tempest-VolumeRbacTest-200076840", "password_expires_at": null}, "audit_ids": ["IsDX4quMSrqWTvDIbWIyfw"], "expires_at": "2020-11-06T19:00:43.000000Z", "issued_at": "2020-11-06T18:00:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6783e84af29c412fb82aa0c1f57a42dc", "name": "tempest-VolumeRbacTest-200076840"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/imag _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:43.230 40 INFO tempest.lib.common.rest_client [req-1a2698ec-1653-46a2-9f90-a56462f20230 ] Request (VolumeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-11-06 18:00:43.231 40 DEBUG tempest.lib.common.rest_client [req-1a2698ec-1653-46a2-9f90-a56462f20230 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1a2698ec-1653-46a2-9f90-a56462f20230', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["d5FJnsXJRR-WqWJ7Yc6BIA"], "expires_at": "2020-11-06T19:00:43.000000Z", "issued_at": "2020-11-06T18:00:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:43.270 40 INFO tempest.lib.common.rest_client [req-2e6650e2-bb2c-477c-a77a-1026a4370c26 ] Request (VolumeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:00:43.270 40 DEBUG tempest.lib.common.rest_client [req-2e6650e2-bb2c-477c-a77a-1026a4370c26 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2e6650e2-bb2c-477c-a77a-1026a4370c26', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["4h3lRe-lRz2gUMokyqwJDQ"], "expires_at": "2020-11-06T19:00:43.000000Z", "issued_at": "2020-11-06T18:00:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:43.317 40 INFO tempest.lib.common.rest_client [req-3209c24b-77d7-4730-be85-27302d160e89 ] Request (VolumeRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.046s 2020-11-06 18:00:43.317 40 DEBUG tempest.lib.common.rest_client [req-3209c24b-77d7-4730-be85-27302d160e89 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3209c24b-77d7-4730-be85-27302d160e89', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:43.371 40 INFO tempest.lib.common.rest_client [req-eb60dfd1-a2ce-4e73-b905-1b7dd9d81272 ] Request (VolumeRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.053s 2020-11-06 18:00:43.372 40 DEBUG tempest.lib.common.rest_client [req-eb60dfd1-a2ce-4e73-b905-1b7dd9d81272 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eb60dfd1-a2ce-4e73-b905-1b7dd9d81272', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:43.373 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:00:43.373 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:43.428 40 INFO tempest.lib.common.rest_client [req-4a45e3d4-df8c-4ab0-9a11-df37ff8ec680 ] Request (VolumeRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles 0.054s 2020-11-06 18:00:43.429 40 DEBUG tempest.lib.common.rest_client [req-4a45e3d4-df8c-4ab0-9a11-df37ff8ec680 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4a45e3d4-df8c-4ab0-9a11-df37ff8ec680', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:43.497 40 INFO tempest.lib.common.rest_client [req-9fe2e56c-5644-44bd-85ee-ce1f6490209a ] Request (VolumeRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles/72a4576c553448cd941b052c1ca0cf2d 0.066s 2020-11-06 18:00:43.497 40 DEBUG tempest.lib.common.rest_client [req-9fe2e56c-5644-44bd-85ee-ce1f6490209a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9fe2e56c-5644-44bd-85ee-ce1f6490209a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:43.513 37 INFO tempest.lib.common.rest_client [req-96d76c7e-48bf-4022-a749-fa3334eed370 ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b 0.417s 2020-11-06 18:00:43.514 37 DEBUG tempest.lib.common.rest_client [req-96d76c7e-48bf-4022-a749-fa3334eed370 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2116', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-96d76c7e-48bf-4022-a749-fa3334eed370', 'x-compute-request-id': 'req-96d76c7e-48bf-4022-a749-fa3334eed370', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b'} Body: b'{"server": {"id": "c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b", "name": "tempest-MigrateServerV225RbacTest-server-1605055471", "status": "MIGRATING", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "2d746f1ab29074f3f929b1892e496ee0de7b1451dab2a8ca922b6c38", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:30Z", "updated": "2020-11-06T18:00:42Z", "addresses": {"patrole_reader-net_30048f18-b96b-4343-a720-1173982b59b8": [{"version": 4, "addr": "192.168.120.109", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:44:63:02"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:39.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c8", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-SRV-ATTR:reservation_id": "r-mos6y4h1", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1605055471", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:43.595 40 INFO tempest.lib.common.rest_client [req-30986ef6-6732-4229-84a4-1f3d69e541a8 ] Request (VolumeRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles/a629c95d64b3416fb80ae90af4f69c05 0.097s 2020-11-06 18:00:43.596 40 DEBUG tempest.lib.common.rest_client [req-30986ef6-6732-4229-84a4-1f3d69e541a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-30986ef6-6732-4229-84a4-1f3d69e541a8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:43.692 39 INFO tempest.lib.common.rest_client [req-fe1c182c-63e0-474c-a00d-b97a3d9e4425 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.298s 2020-11-06 18:00:43.693 39 DEBUG tempest.lib.common.rest_client [req-fe1c182c-63e0-474c-a00d-b97a3d9e4425 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fe1c182c-63e0-474c-a00d-b97a3d9e4425', 'x-compute-request-id': 'req-fe1c182c-63e0-474c-a00d-b97a3d9e4425', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:00:42Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:02.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:43.707 39 INFO tempest.common.waiters [-] State transition "PAUSED/unpausing" ==> "ACTIVE/None" after 1 second wait 2020-11-06 18:00:43.707 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:00:43.708 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.709 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.709 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.709 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.710 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.710 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.711 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.711 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.711 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.712 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.712 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.712 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.713 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.713 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.714 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.714 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.715 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.715 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.716 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.717 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.717 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.718 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.718 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.719 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.719 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.720 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.720 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.721 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.721 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.722 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.722 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.723 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.723 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.724 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.724 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.725 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.726 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.726 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.726 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.727 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.727 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.728 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.728 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.729 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.729 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.730 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.730 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.731 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.731 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.732 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.732 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.733 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.734 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.734 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.735 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.735 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.736 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.736 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.737 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.737 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.738 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.739 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.739 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.740 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.740 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.741 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.741 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.741 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.741 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.742 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.742 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.742 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.743 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.743 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.743 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:43.745 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:reboot, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:00:43.745 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:43.859 39 INFO tempest.lib.common.rest_client [req-bbac6937-05e0-4b81-8067-44275fa6ad87 ] Request (ServerActionsRbacTest:test_reboot_server): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.113s 2020-11-06 18:00:43.860 39 DEBUG tempest.lib.common.rest_client [req-bbac6937-05e0-4b81-8067-44275fa6ad87 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bbac6937-05e0-4b81-8067-44275fa6ad87', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:43.943 39 INFO tempest.lib.common.rest_client [req-92845b17-9cb2-4b2b-9950-42bbc184361f ] Request (ServerActionsRbacTest:test_reboot_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 18:00:43.944 39 DEBUG tempest.lib.common.rest_client [req-92845b17-9cb2-4b2b-9950-42bbc184361f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-92845b17-9cb2-4b2b-9950-42bbc184361f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["mauAuek6ReqO0Ruchl9xNw"], "expires_at": "2020-11-06T19:00:43.000000Z", "issued_at": "2020-11-06T18:00:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:44.218 39 INFO tempest.lib.common.rest_client [req-c8a8b9ca-26f9-404b-8a7b-d3960c763cb2 ] Request (ServerActionsRbacTest:test_reboot_server): 202 POST http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf/action 0.272s 2020-11-06 18:00:44.219 39 DEBUG tempest.lib.common.rest_client [req-c8a8b9ca-26f9-404b-8a7b-d3960c763cb2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"reboot": {"type": "HARD"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c8a8b9ca-26f9-404b-8a7b-d3960c763cb2', 'x-compute-request-id': 'req-c8a8b9ca-26f9-404b-8a7b-d3960c763cb2', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:44.219 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:44.275 39 INFO tempest.lib.common.rest_client [req-ada4a5e1-b583-4d7d-a141-40b65ca8bf99 ] Request (ServerActionsRbacTest:test_reboot_server): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.054s 2020-11-06 18:00:44.275 39 DEBUG tempest.lib.common.rest_client [req-ada4a5e1-b583-4d7d-a141-40b65ca8bf99 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ada4a5e1-b583-4d7d-a141-40b65ca8bf99', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:44.309 39 INFO tempest.lib.common.rest_client [req-850249d8-7083-45df-ba42-e61673a62f92 ] Request (ServerActionsRbacTest:test_reboot_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:00:44.309 39 DEBUG tempest.lib.common.rest_client [req-850249d8-7083-45df-ba42-e61673a62f92 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-850249d8-7083-45df-ba42-e61673a62f92', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["XL2TGs9-TP2cvpBhygCOwg"], "expires_at": "2020-11-06T19:00:44.000000Z", "issued_at": "2020-11-06T18:00:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:44.690 40 INFO tempest.lib.common.rest_client [req-a85c6a47-eb1b-49cd-9be7-984a84f86f83 ] Request (VolumeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-11-06 18:00:44.690 40 DEBUG tempest.lib.common.rest_client [req-a85c6a47-eb1b-49cd-9be7-984a84f86f83 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a85c6a47-eb1b-49cd-9be7-984a84f86f83', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f0f68e26f4a84ca492a5ea80b6591569", "name": "tempest-VolumeRbacTest-200076840", "password_expires_at": null}, "audit_ids": ["yUiBCMY4RturjPwnRk6enw"], "expires_at": "2020-11-06T19:00:44.000000Z", "issued_at": "2020-11-06T18:00:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6783e84af29c412fb82aa0c1f57a42dc", "name": "tempest-VolumeRbacTest-200076840"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:44.889 39 INFO tempest.lib.common.rest_client [req-e8f7d099-198b-440e-86ca-e2ee0af94893 ] Request (ServerActionsRbacTest:test_reboot_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.578s 2020-11-06 18:00:44.890 39 DEBUG tempest.lib.common.rest_client [req-e8f7d099-198b-440e-86ca-e2ee0af94893 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1720', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e8f7d099-198b-440e-86ca-e2ee0af94893', 'x-compute-request-id': 'req-e8f7d099-198b-440e-86ca-e2ee0af94893', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "HARD_REBOOT", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:00:44Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:02.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "rebooting_hard", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:44.980 37 INFO tempest.lib.common.rest_client [req-a0b28806-1029-47dd-ae39-3730e6b84d02 ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b 0.449s 2020-11-06 18:00:44.981 37 DEBUG tempest.lib.common.rest_client [req-a0b28806-1029-47dd-ae39-3730e6b84d02 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2116', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a0b28806-1029-47dd-ae39-3730e6b84d02', 'x-compute-request-id': 'req-a0b28806-1029-47dd-ae39-3730e6b84d02', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b'} Body: b'{"server": {"id": "c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b", "name": "tempest-MigrateServerV225RbacTest-server-1605055471", "status": "MIGRATING", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "2d746f1ab29074f3f929b1892e496ee0de7b1451dab2a8ca922b6c38", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:30Z", "updated": "2020-11-06T18:00:42Z", "addresses": {"patrole_reader-net_30048f18-b96b-4343-a720-1173982b59b8": [{"version": 4, "addr": "192.168.120.109", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:44:63:02"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:39.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c8", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-SRV-ATTR:reservation_id": "r-mos6y4h1", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1605055471", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:45.170 40 INFO tempest.lib.common.rest_client [req-e593741f-e2de-4dd5-878a-7d6b16f77cd1 ] Request (VolumeRbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc/volumes 0.479s 2020-11-06 18:00:45.171 40 DEBUG tempest.lib.common.rest_client [req-e593741f-e2de-4dd5-878a-7d6b16f77cd1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "display_name": "tempest-VolumeRbacTest-volume-463318806"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e593741f-e2de-4dd5-878a-7d6b16f77cd1', 'content-length': '834', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e593741f-e2de-4dd5-878a-7d6b16f77cd1', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc/volumes'} Body: b'{"volume": {"id": "aaf194c8-bbb3-481a-a89d-d81da24b838a", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:00:45.000000", "updated_at": null, "name": "tempest-VolumeRbacTest-volume-463318806", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc/volumes/aaf194c8-bbb3-481a-a89d-d81da24b838a"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6783e84af29c412fb82aa0c1f57a42dc/volumes/aaf194c8-bbb3-481a-a89d-d81da24b838a"}], "user_id": "f0f68e26f4a84ca492a5ea80b6591569", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:45.273 40 INFO tempest.lib.common.rest_client [req-6751c5b9-4637-444f-a35c-50a0035087d6 ] Request (VolumeRbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc/volumes/aaf194c8-bbb3-481a-a89d-d81da24b838a 0.089s 2020-11-06 18:00:45.274 40 DEBUG tempest.lib.common.rest_client [req-6751c5b9-4637-444f-a35c-50a0035087d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6751c5b9-4637-444f-a35c-50a0035087d6', 'content-length': '1056', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6751c5b9-4637-444f-a35c-50a0035087d6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc/volumes/aaf194c8-bbb3-481a-a89d-d81da24b838a'} Body: b'{"volume": {"id": "aaf194c8-bbb3-481a-a89d-d81da24b838a", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:00:45.000000", "updated_at": "2020-11-06T18:00:45.000000", "name": "tempest-VolumeRbacTest-volume-463318806", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc/volumes/aaf194c8-bbb3-481a-a89d-d81da24b838a"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6783e84af29c412fb82aa0c1f57a42dc/volumes/aaf194c8-bbb3-481a-a89d-d81da24b838a"}], "user_id": "f0f68e26f4a84ca492a5ea80b6591569", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "6783e84af29c412fb82aa0c1f57a42dc"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:45.447 38 INFO tempest.lib.common.rest_client [req-e6709306-42e0-4f12-92fb-3ac75865cbc3 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/routers 3.785s 2020-11-06 18:00:45.448 38 DEBUG tempest.lib.common.rest_client [req-e6709306-42e0-4f12-92fb-3ac75865cbc3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-MiscPolicyActionsNetworkRbacTest-1290166897-router", "tenant_id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea"}}} Response - Headers: {'content-type': 'application/json', 'content-length': '821', 'x-openstack-request-id': 'req-e6709306-42e0-4f12-92fb-3ac75865cbc3', 'date': 'Fri, 06 Nov 2020 18:00:45 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "e1b5c04a-81a2-432a-a515-871a9b8c9800", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1290166897-router", "tenant_id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.67"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::2d5"}], "enable_snat": true}, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T18:00:41Z", "updated_at": "2020-11-06T18:00:42Z", "revision_number": 3, "project_id": "4f44b0a1b5fe4a17b77cabcf20e9501b"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:46.215 37 INFO tempest.lib.common.rest_client [req-5cd88960-9e5c-477d-b80a-bfa9d81c205e ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b 0.218s 2020-11-06 18:00:46.216 37 DEBUG tempest.lib.common.rest_client [req-5cd88960-9e5c-477d-b80a-bfa9d81c205e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2116', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5cd88960-9e5c-477d-b80a-bfa9d81c205e', 'x-compute-request-id': 'req-5cd88960-9e5c-477d-b80a-bfa9d81c205e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b'} Body: b'{"server": {"id": "c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b", "name": "tempest-MigrateServerV225RbacTest-server-1605055471", "status": "MIGRATING", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "2d746f1ab29074f3f929b1892e496ee0de7b1451dab2a8ca922b6c38", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:30Z", "updated": "2020-11-06T18:00:46Z", "addresses": {"patrole_reader-net_30048f18-b96b-4343-a720-1173982b59b8": [{"version": 4, "addr": "192.168.120.109", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:44:63:02"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:39.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c8", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-SRV-ATTR:reservation_id": "r-mos6y4h1", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1605055471", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:46.389 40 INFO tempest.lib.common.rest_client [req-341378c2-8615-4594-b341-003d133bda1b ] Request (VolumeRbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc/volumes/aaf194c8-bbb3-481a-a89d-d81da24b838a 0.101s 2020-11-06 18:00:46.390 40 DEBUG tempest.lib.common.rest_client [req-341378c2-8615-4594-b341-003d133bda1b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-341378c2-8615-4594-b341-003d133bda1b', 'content-length': '1057', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-341378c2-8615-4594-b341-003d133bda1b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc/volumes/aaf194c8-bbb3-481a-a89d-d81da24b838a'} Body: b'{"volume": {"id": "aaf194c8-bbb3-481a-a89d-d81da24b838a", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:00:45.000000", "updated_at": "2020-11-06T18:00:45.000000", "name": "tempest-VolumeRbacTest-volume-463318806", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc/volumes/aaf194c8-bbb3-481a-a89d-d81da24b838a"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6783e84af29c412fb82aa0c1f57a42dc/volumes/aaf194c8-bbb3-481a-a89d-d81da24b838a"}], "user_id": "f0f68e26f4a84ca492a5ea80b6591569", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "6783e84af29c412fb82aa0c1f57a42dc"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:46.401 40 INFO tempest.common.waiters [-] volume aaf194c8-bbb3-481a-a89d-d81da24b838a reached available after waiting for 1.401289 seconds 2020-11-06 18:00:46.402 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:00:46.403 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.403 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.403 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.404 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.404 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.405 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.405 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.406 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.406 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.406 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.407 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.407 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.407 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.407 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.408 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.408 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.408 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.409 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.409 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.409 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.410 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.410 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.410 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.411 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.411 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.411 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.411 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.412 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.412 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.412 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.413 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.413 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.413 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.414 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.414 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.414 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.414 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.415 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.415 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.415 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.416 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.416 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.416 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.417 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.417 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.417 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.418 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.418 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.418 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.419 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.419 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.419 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.420 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.420 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.420 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.421 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.421 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.421 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.422 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.422 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.422 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.423 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.423 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.423 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.424 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.424 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.424 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.424 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.425 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.425 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.425 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.426 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.426 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.426 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.427 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:46.428 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-volumes:snapshots:create, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:00:46.428 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:46.484 40 INFO tempest.lib.common.rest_client [req-c7d25c97-eb63-433d-b0d7-f5010baa8523 ] Request (VolumeRbacTest:test_create_snapshot): 200 GET http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles 0.056s 2020-11-06 18:00:46.485 40 DEBUG tempest.lib.common.rest_client [req-c7d25c97-eb63-433d-b0d7-f5010baa8523 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c7d25c97-eb63-433d-b0d7-f5010baa8523', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:46.517 40 INFO tempest.lib.common.rest_client [req-5b98ed69-b6d2-44e9-b916-c182be4af63a ] Request (VolumeRbacTest:test_create_snapshot): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:00:46.518 40 DEBUG tempest.lib.common.rest_client [req-5b98ed69-b6d2-44e9-b916-c182be4af63a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5b98ed69-b6d2-44e9-b916-c182be4af63a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f0f68e26f4a84ca492a5ea80b6591569", "name": "tempest-VolumeRbacTest-200076840", "password_expires_at": null}, "audit_ids": ["J1hNc_c4RtmO0brDVI2sLg"], "expires_at": "2020-11-06T19:00:46.000000Z", "issued_at": "2020-11-06T18:00:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6783e84af29c412fb82aa0c1f57a42dc", "name": "tempest-VolumeRbacTest-200076840"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:46.767 40 INFO tempest.lib.common.rest_client [req-6b9a4eb9-64c6-4bb1-9f8f-f08d5fb33d2d ] Request (VolumeRbacTest:test_create_snapshot): 200 POST http://172.30.13.94/compute/v2.1/os-snapshots 0.248s 2020-11-06 18:00:46.767 40 DEBUG tempest.lib.common.rest_client [req-6b9a4eb9-64c6-4bb1-9f8f-f08d5fb33d2d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"snapshot": {"volume_id": "aaf194c8-bbb3-481a-a89d-d81da24b838a", "display_name": "tempest-VolumeRbacTest-Snapshot-82806506"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '275', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6b9a4eb9-64c6-4bb1-9f8f-f08d5fb33d2d', 'x-compute-request-id': 'req-6b9a4eb9-64c6-4bb1-9f8f-f08d5fb33d2d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots'} Body: b'{"snapshot": {"id": "ec79a848-c88f-42ef-8107-3eff4329923c", "volumeId": "aaf194c8-bbb3-481a-a89d-d81da24b838a", "status": "creating", "size": 1, "createdAt": "2020-11-06T18:00:46.694824", "displayName": "tempest-VolumeRbacTest-Snapshot-82806506", "displayDescription": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:46.771 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:46.827 40 INFO tempest.lib.common.rest_client [req-a84297cc-2cf7-4dd7-95dd-31bef979ddd8 ] Request (VolumeRbacTest:test_create_snapshot): 200 GET http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles 0.055s 2020-11-06 18:00:46.828 40 DEBUG tempest.lib.common.rest_client [req-a84297cc-2cf7-4dd7-95dd-31bef979ddd8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a84297cc-2cf7-4dd7-95dd-31bef979ddd8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:46.860 40 INFO tempest.lib.common.rest_client [req-370c034c-8380-420b-9780-312c4115f46e ] Request (VolumeRbacTest:test_create_snapshot): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:00:46.861 40 DEBUG tempest.lib.common.rest_client [req-370c034c-8380-420b-9780-312c4115f46e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-370c034c-8380-420b-9780-312c4115f46e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f0f68e26f4a84ca492a5ea80b6591569", "name": "tempest-VolumeRbacTest-200076840", "password_expires_at": null}, "audit_ids": ["CfWlcmFoTFG35U-HGUSMhQ"], "expires_at": "2020-11-06T19:00:46.000000Z", "issued_at": "2020-11-06T18:00:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6783e84af29c412fb82aa0c1f57a42dc", "name": "tempest-VolumeRbacTest-200076840"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:46.990 40 INFO tempest.lib.common.rest_client [req-a06706a2-97be-4ce7-a0a4-1af181fcb75f ] Request (VolumeRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/os-snapshots/ec79a848-c88f-42ef-8107-3eff4329923c 0.128s 2020-11-06 18:00:46.991 40 DEBUG tempest.lib.common.rest_client [req-a06706a2-97be-4ce7-a0a4-1af181fcb75f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '275', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a06706a2-97be-4ce7-a0a4-1af181fcb75f', 'x-compute-request-id': 'req-a06706a2-97be-4ce7-a0a4-1af181fcb75f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots/ec79a848-c88f-42ef-8107-3eff4329923c'} Body: b'{"snapshot": {"id": "ec79a848-c88f-42ef-8107-3eff4329923c", "volumeId": "aaf194c8-bbb3-481a-a89d-d81da24b838a", "status": "creating", "size": 1, "createdAt": "2020-11-06T18:00:47.000000", "displayName": "tempest-VolumeRbacTest-Snapshot-82806506", "displayDescription": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:47.284 39 INFO tempest.lib.common.rest_client [req-20f99f43-7c1c-4f45-8c79-21ff77517f57 ] Request (ServerActionsRbacTest:test_reboot_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 1.377s 2020-11-06 18:00:47.285 39 DEBUG tempest.lib.common.rest_client [req-20f99f43-7c1c-4f45-8c79-21ff77517f57 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1725', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-20f99f43-7c1c-4f45-8c79-21ff77517f57', 'x-compute-request-id': 'req-20f99f43-7c1c-4f45-8c79-21ff77517f57', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "HARD_REBOOT", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:00:45Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:02.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "reboot_started_hard", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:47.300 39 INFO tempest.common.waiters [-] State transition "HARD_REBOOT/rebooting_hard" ==> "HARD_REBOOT/reboot_started_hard" after 3 second wait 2020-11-06 18:00:47.572 38 INFO tempest.lib.common.rest_client [req-8dbbc613-f3a8-4e0b-a5af-28fcea1dd6df ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/e1b5c04a-81a2-432a-a515-871a9b8c9800/add_router_interface 2.122s 2020-11-06 18:00:47.573 38 DEBUG tempest.lib.common.rest_client [req-8dbbc613-f3a8-4e0b-a5af-28fcea1dd6df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "a7138c88-1746-4acf-b367-e81e790bf9d7"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-8dbbc613-f3a8-4e0b-a5af-28fcea1dd6df', 'date': 'Fri, 06 Nov 2020 18:00:47 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/e1b5c04a-81a2-432a-a515-871a9b8c9800/add_router_interface'} Body: b'{"id": "e1b5c04a-81a2-432a-a515-871a9b8c9800", "tenant_id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "port_id": "8e6df4da-c013-485e-9bf0-7ef4a95b5f78", "network_id": "f747eec6-c776-4af6-aa67-8eb73e88914e", "subnet_id": "a7138c88-1746-4acf-b367-e81e790bf9d7", "subnet_ids": ["a7138c88-1746-4acf-b367-e81e790bf9d7"]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:47.573 38 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-MiscPolicyActionsNetworkRbacTest-233952843', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '4f44b0a1b5fe4a17b77cabcf20e9501b', 'project_name': 'tempest-MiscPolicyActionsNetworkRbacTest-233952843', 'tenant_id': '4f44b0a1b5fe4a17b77cabcf20e9501b', 'tenant_name': 'tempest-MiscPolicyActionsNetworkRbacTest-233952843', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '1db6819d47a748669464ad962e63976e'}, Network: {'id': 'f747eec6-c776-4af6-aa67-8eb73e88914e', 'name': 'tempest-MiscPolicyActionsNetworkRbacTest-1290166897-network', 'tenant_id': '4f44b0a1b5fe4a17b77cabcf20e9501b', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '4f44b0a1b5fe4a17b77cabcf20e9501b', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 49, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T18:00:40Z', 'updated_at': '2020-11-06T18:00:40Z', 'revision_number': 1}, Subnet: {'id': 'a7138c88-1746-4acf-b367-e81e790bf9d7', 'name': 'tempest-MiscPolicyActionsNetworkRbacTest-1290166897-subnet', 'tenant_id': '4f44b0a1b5fe4a17b77cabcf20e9501b', 'network_id': 'f747eec6-c776-4af6-aa67-8eb73e88914e', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': True, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-11-06T18:00:40Z', 'updated_at': '2020-11-06T18:00:40Z', 'revision_number': 0, 'project_id': '4f44b0a1b5fe4a17b77cabcf20e9501b'}, Router: {'id': 'e1b5c04a-81a2-432a-a515-871a9b8c9800', 'name': 'tempest-MiscPolicyActionsNetworkRbacTest-1290166897-router', 'tenant_id': '4f44b0a1b5fe4a17b77cabcf20e9501b', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.67'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::2d5'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-11-06T18:00:41Z', 'updated_at': '2020-11-06T18:00:42Z', 'revision_number': 3, 'project_id': '4f44b0a1b5fe4a17b77cabcf20e9501b'} 2020-11-06 18:00:47.589 37 INFO tempest.lib.common.rest_client [req-287760e4-f758-4239-bcc5-e99266129b13 ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b 0.356s 2020-11-06 18:00:47.590 37 DEBUG tempest.lib.common.rest_client [req-287760e4-f758-4239-bcc5-e99266129b13 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2116', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-287760e4-f758-4239-bcc5-e99266129b13', 'x-compute-request-id': 'req-287760e4-f758-4239-bcc5-e99266129b13', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b'} Body: b'{"server": {"id": "c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b", "name": "tempest-MigrateServerV225RbacTest-server-1605055471", "status": "MIGRATING", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "2d746f1ab29074f3f929b1892e496ee0de7b1451dab2a8ca922b6c38", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:30Z", "updated": "2020-11-06T18:00:46Z", "addresses": {"patrole_reader-net_30048f18-b96b-4343-a720-1173982b59b8": [{"version": 4, "addr": "192.168.120.109", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:44:63:02"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:39.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c8", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-SRV-ATTR:reservation_id": "r-mos6y4h1", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1605055471", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:47.702 38 INFO tempest.lib.common.rest_client [req-b0481938-ff67-4452-8444-6947c1bd6d6d ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.116s 2020-11-06 18:00:47.703 38 DEBUG tempest.lib.common.rest_client [req-b0481938-ff67-4452-8444-6947c1bd6d6d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6593', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b0481938-ff67-4452-8444-6947c1bd6d6d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1db6819d47a748669464ad962e63976e", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843", "password_expires_at": null}, "audit_ids": ["p5TmS4gOQk6yfeunlqiKfw"], "expires_at": "2020-11-06T19:00:47.000000Z", "issued_at": "2020-11-06T18:00:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOn _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:47.734 38 INFO tempest.lib.common.rest_client [req-300c78b7-2b2d-41b3-ba16-dd96011c7d74 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.030s 2020-11-06 18:00:47.735 38 DEBUG tempest.lib.common.rest_client [req-300c78b7-2b2d-41b3-ba16-dd96011c7d74 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-300c78b7-2b2d-41b3-ba16-dd96011c7d74', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["Ia7lB931TBCVVqsOfdjqtA"], "expires_at": "2020-11-06T19:00:47.000000Z", "issued_at": "2020-11-06T18:00:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:47.780 38 INFO tempest.lib.common.rest_client [req-6d695be6-2627-4120-8791-65225c256818 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:00:47.781 38 DEBUG tempest.lib.common.rest_client [req-6d695be6-2627-4120-8791-65225c256818 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6d695be6-2627-4120-8791-65225c256818', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["TgbAiHE8TY2f4Se0K_4UgA"], "expires_at": "2020-11-06T19:00:47.000000Z", "issued_at": "2020-11-06T18:00:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:47.832 38 INFO tempest.lib.common.rest_client [req-22aa10e0-761b-4077-b9d8-6f658e5ecc08 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.049s 2020-11-06 18:00:47.832 38 DEBUG tempest.lib.common.rest_client [req-22aa10e0-761b-4077-b9d8-6f658e5ecc08 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-22aa10e0-761b-4077-b9d8-6f658e5ecc08', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:47.881 38 INFO tempest.lib.common.rest_client [req-73fd5595-cb17-46ab-b8c7-bde798710a92 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.048s 2020-11-06 18:00:47.882 38 DEBUG tempest.lib.common.rest_client [req-73fd5595-cb17-46ab-b8c7-bde798710a92 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-73fd5595-cb17-46ab-b8c7-bde798710a92', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:47.882 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:00:47.883 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:47.939 38 INFO tempest.lib.common.rest_client [req-68a19a27-c00e-4ed6-abe8-f23d174e434c ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles 0.055s 2020-11-06 18:00:47.939 38 DEBUG tempest.lib.common.rest_client [req-68a19a27-c00e-4ed6-abe8-f23d174e434c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-68a19a27-c00e-4ed6-abe8-f23d174e434c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:48.012 38 INFO tempest.lib.common.rest_client [req-be711aad-27f3-4559-a07d-660bbf51228b ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles/72a4576c553448cd941b052c1ca0cf2d 0.072s 2020-11-06 18:00:48.013 38 DEBUG tempest.lib.common.rest_client [req-be711aad-27f3-4559-a07d-660bbf51228b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-be711aad-27f3-4559-a07d-660bbf51228b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:48.052 40 INFO tempest.lib.common.rest_client [req-01b3ad2c-aab5-4a3d-bf5f-fdb381b9b527 ] Request (VolumeRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/os-snapshots/ec79a848-c88f-42ef-8107-3eff4329923c 0.057s 2020-11-06 18:00:48.053 40 DEBUG tempest.lib.common.rest_client [req-01b3ad2c-aab5-4a3d-bf5f-fdb381b9b527 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '276', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-01b3ad2c-aab5-4a3d-bf5f-fdb381b9b527', 'x-compute-request-id': 'req-01b3ad2c-aab5-4a3d-bf5f-fdb381b9b527', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots/ec79a848-c88f-42ef-8107-3eff4329923c'} Body: b'{"snapshot": {"id": "ec79a848-c88f-42ef-8107-3eff4329923c", "volumeId": "aaf194c8-bbb3-481a-a89d-d81da24b838a", "status": "available", "size": 1, "createdAt": "2020-11-06T18:00:47.000000", "displayName": "tempest-VolumeRbacTest-Snapshot-82806506", "displayDescription": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:48.056 40 INFO tempest.common.waiters [-] snapshot ec79a848-c88f-42ef-8107-3eff4329923c reached available after waiting for 2.056539 seconds 2020-11-06 18:00:48.116 38 INFO tempest.lib.common.rest_client [req-7bfa90d0-bfcc-434f-b0d7-cb0116de865e ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles/a629c95d64b3416fb80ae90af4f69c05 0.102s 2020-11-06 18:00:48.117 38 DEBUG tempest.lib.common.rest_client [req-7bfa90d0-bfcc-434f-b0d7-cb0116de865e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7bfa90d0-bfcc-434f-b0d7-cb0116de865e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:48.168 40 INFO tempest.lib.common.rest_client [req-ff0357c4-3ce6-441e-9b13-8a78782b6f29 ] Request (VolumeRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/compute/v2.1/os-snapshots/ec79a848-c88f-42ef-8107-3eff4329923c 0.111s 2020-11-06 18:00:48.169 40 DEBUG tempest.lib.common.rest_client [req-ff0357c4-3ce6-441e-9b13-8a78782b6f29 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ff0357c4-3ce6-441e-9b13-8a78782b6f29', 'x-compute-request-id': 'req-ff0357c4-3ce6-441e-9b13-8a78782b6f29', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots/ec79a848-c88f-42ef-8107-3eff4329923c'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:48.232 40 INFO tempest.lib.common.rest_client [req-7b8e07ff-9053-44c7-85db-24b0752fcbce ] Request (VolumeRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/os-snapshots/ec79a848-c88f-42ef-8107-3eff4329923c 0.062s 2020-11-06 18:00:48.233 40 DEBUG tempest.lib.common.rest_client [req-7b8e07ff-9053-44c7-85db-24b0752fcbce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '275', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7b8e07ff-9053-44c7-85db-24b0752fcbce', 'x-compute-request-id': 'req-7b8e07ff-9053-44c7-85db-24b0752fcbce', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots/ec79a848-c88f-42ef-8107-3eff4329923c'} Body: b'{"snapshot": {"id": "ec79a848-c88f-42ef-8107-3eff4329923c", "volumeId": "aaf194c8-bbb3-481a-a89d-d81da24b838a", "status": "deleting", "size": 1, "createdAt": "2020-11-06T18:00:47.000000", "displayName": "tempest-VolumeRbacTest-Snapshot-82806506", "displayDescription": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:48.566 39 INFO tempest.lib.common.rest_client [req-4c950392-15f5-4fe5-81c6-bb07718c5196 ] Request (ServerActionsRbacTest:test_reboot_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.264s 2020-11-06 18:00:48.566 39 DEBUG tempest.lib.common.rest_client [req-4c950392-15f5-4fe5-81c6-bb07718c5196 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4c950392-15f5-4fe5-81c6-bb07718c5196', 'x-compute-request-id': 'req-4c950392-15f5-4fe5-81c6-bb07718c5196', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:00:48Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:02.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:48.576 39 INFO tempest.common.waiters [-] State transition "HARD_REBOOT/reboot_started_hard" ==> "ACTIVE/None" after 4 second wait 2020-11-06 18:00:48.789 39 INFO tempest.lib.common.rest_client [req-c6a11c6c-2963-4a3d-aa9a-27b12d9e8eac ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.206s 2020-11-06 18:00:48.790 39 DEBUG tempest.lib.common.rest_client [req-c6a11c6c-2963-4a3d-aa9a-27b12d9e8eac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c6a11c6c-2963-4a3d-aa9a-27b12d9e8eac', 'x-compute-request-id': 'req-c6a11c6c-2963-4a3d-aa9a-27b12d9e8eac', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:00:48Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:02.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:48.801 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:00:48.801 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.802 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.802 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.802 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.803 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.803 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.804 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.804 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.804 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.805 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.805 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.806 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.806 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.806 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.807 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.807 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.807 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.808 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.808 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.808 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.809 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.809 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.809 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.810 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.810 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.810 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.811 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.811 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.811 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.811 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.812 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.812 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.812 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.813 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.813 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.814 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.814 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.814 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.815 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.815 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.815 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.816 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.816 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.816 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.817 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.817 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.818 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.818 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.818 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.819 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.819 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.819 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.820 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.820 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.820 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.821 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.821 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.821 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.822 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.822 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.823 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.823 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.823 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.824 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.824 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.824 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.825 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.825 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.825 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.826 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.826 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.826 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.827 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.827 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.827 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:48.829 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:rebuild, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:00:48.829 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:48.867 37 INFO tempest.lib.common.rest_client [req-da70c9f4-644d-44ed-8390-542ce1cd7ee5 ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b 0.257s 2020-11-06 18:00:48.868 37 DEBUG tempest.lib.common.rest_client [req-da70c9f4-644d-44ed-8390-542ce1cd7ee5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2116', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-da70c9f4-644d-44ed-8390-542ce1cd7ee5', 'x-compute-request-id': 'req-da70c9f4-644d-44ed-8390-542ce1cd7ee5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b'} Body: b'{"server": {"id": "c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b", "name": "tempest-MigrateServerV225RbacTest-server-1605055471", "status": "MIGRATING", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "2d746f1ab29074f3f929b1892e496ee0de7b1451dab2a8ca922b6c38", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:30Z", "updated": "2020-11-06T18:00:46Z", "addresses": {"patrole_reader-net_30048f18-b96b-4343-a720-1173982b59b8": [{"version": 4, "addr": "192.168.120.109", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:44:63:02"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:39.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c8", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-SRV-ATTR:reservation_id": "r-mos6y4h1", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1605055471", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:48.943 39 INFO tempest.lib.common.rest_client [req-c4053f27-1607-4f62-a0d8-7ec30777d8fe ] Request (ServerActionsRbacTest:test_rebuild_server): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.113s 2020-11-06 18:00:48.943 39 DEBUG tempest.lib.common.rest_client [req-c4053f27-1607-4f62-a0d8-7ec30777d8fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c4053f27-1607-4f62-a0d8-7ec30777d8fe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:49.032 39 INFO tempest.lib.common.rest_client [req-0dff05d6-c13a-48ad-b373-461dd545b307 ] Request (ServerActionsRbacTest:test_rebuild_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 18:00:49.033 39 DEBUG tempest.lib.common.rest_client [req-0dff05d6-c13a-48ad-b373-461dd545b307 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0dff05d6-c13a-48ad-b373-461dd545b307', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["6q_9nyM9TkKPScAKu9JOBA"], "expires_at": "2020-11-06T19:00:48.000000Z", "issued_at": "2020-11-06T18:00:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:49.204 38 INFO tempest.lib.common.rest_client [req-9161c06e-82dc-4929-8505-becae7bf4f8f ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:00:49.205 38 DEBUG tempest.lib.common.rest_client [req-9161c06e-82dc-4929-8505-becae7bf4f8f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6654', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9161c06e-82dc-4929-8505-becae7bf4f8f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1db6819d47a748669464ad962e63976e", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843", "password_expires_at": null}, "audit_ids": ["kEqC4M_dS6WU02zfZEOUtQ"], "expires_at": "2020-11-06T19:00:49.000000Z", "issued_at": "2020-11-06T18:00:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a6 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:49.242 38 INFO tempest.lib.common.rest_client [req-92ff2711-157f-4b04-9e4c-283f98515e62 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.030s 2020-11-06 18:00:49.243 38 DEBUG tempest.lib.common.rest_client [req-92ff2711-157f-4b04-9e4c-283f98515e62 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6654', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-92ff2711-157f-4b04-9e4c-283f98515e62', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1db6819d47a748669464ad962e63976e", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843", "password_expires_at": null}, "audit_ids": ["78915tKVRb6E5ZRoQtj9Xw"], "expires_at": "2020-11-06T19:00:49.000000Z", "issued_at": "2020-11-06T18:00:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a6 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:49.243 38 INFO tempest.lib.common.fixed_network [-] (MiscPolicyActionsNetworkRbacTest:setUpClass) Found network {'id': 'f747eec6-c776-4af6-aa67-8eb73e88914e', 'name': 'tempest-MiscPolicyActionsNetworkRbacTest-1290166897-network', 'tenant_id': '4f44b0a1b5fe4a17b77cabcf20e9501b', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '4f44b0a1b5fe4a17b77cabcf20e9501b', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 49, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T18:00:40Z', 'updated_at': '2020-11-06T18:00:40Z', 'revision_number': 1} available for tenant 2020-11-06 18:00:49.287 40 INFO tempest.lib.common.rest_client [req-8d3577f6-bbe9-499a-9bee-e7cc8632864b ] Request (VolumeRbacTest:_run_cleanups): 404 GET http://172.30.13.94/compute/v2.1/os-snapshots/ec79a848-c88f-42ef-8107-3eff4329923c 0.050s 2020-11-06 18:00:49.287 40 DEBUG tempest.lib.common.rest_client [req-8d3577f6-bbe9-499a-9bee-e7cc8632864b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-8d3577f6-bbe9-499a-9bee-e7cc8632864b', 'x-compute-request-id': 'req-8d3577f6-bbe9-499a-9bee-e7cc8632864b', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots/ec79a848-c88f-42ef-8107-3eff4329923c'} Body: b'{"itemNotFound": {"code": 404, "message": "Snapshot ec79a848-c88f-42ef-8107-3eff4329923c could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:49.292 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:00:49.293 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.293 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.294 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.294 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.295 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.295 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.296 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.296 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.296 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.297 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.297 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.298 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.298 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.298 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.299 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.299 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.300 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.300 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.300 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.301 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.301 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.301 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.302 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.302 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.302 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.302 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.303 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.303 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.303 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.304 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.304 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.304 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.304 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.305 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.305 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.313 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.314 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.314 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.315 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.315 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.315 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.316 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.316 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.316 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.317 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.317 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.317 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.317 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.318 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.318 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.318 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.319 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.319 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.319 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.320 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.320 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.320 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.321 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.322 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.322 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.323 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.324 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.324 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.325 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.325 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.325 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.326 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.326 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.326 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.326 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.327 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.327 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.327 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.327 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.328 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:49.329 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-volumes:create, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:00:49.329 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:49.385 40 INFO tempest.lib.common.rest_client [req-2d91ebe4-4b81-4192-ac00-31221314e1cf ] Request (VolumeRbacTest:test_create_volume): 200 GET http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles 0.055s 2020-11-06 18:00:49.386 40 DEBUG tempest.lib.common.rest_client [req-2d91ebe4-4b81-4192-ac00-31221314e1cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2d91ebe4-4b81-4192-ac00-31221314e1cf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:49.419 39 INFO tempest.lib.common.rest_client [req-c268a5c9-1d93-4321-9a70-65fcc9fd553c ] Request (ServerActionsRbacTest:test_rebuild_server): 202 POST http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf/action 0.384s 2020-11-06 18:00:49.419 39 DEBUG tempest.lib.common.rest_client [req-c268a5c9-1d93-4321-9a70-65fcc9fd553c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"rebuild": {"imageRef": "56b368f6-9136-40ec-a04c-564d02c95e42"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1179', 'location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c268a5c9-1d93-4321-9a70-65fcc9fd553c', 'x-compute-request-id': 'req-c268a5c9-1d93-4321-9a70-65fcc9fd553c', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf/action'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "REBUILD", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:00:49Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "adminPass": "yVfVWi6AMXuc"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:49.429 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:49.474 40 INFO tempest.lib.common.rest_client [req-23d15c50-65d7-4e76-98da-1708b632af0e ] Request (VolumeRbacTest:test_create_volume): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 18:00:49.475 40 DEBUG tempest.lib.common.rest_client [req-23d15c50-65d7-4e76-98da-1708b632af0e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-23d15c50-65d7-4e76-98da-1708b632af0e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f0f68e26f4a84ca492a5ea80b6591569", "name": "tempest-VolumeRbacTest-200076840", "password_expires_at": null}, "audit_ids": ["3n83-csGRcCtoHynjjFySQ"], "expires_at": "2020-11-06T19:00:49.000000Z", "issued_at": "2020-11-06T18:00:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6783e84af29c412fb82aa0c1f57a42dc", "name": "tempest-VolumeRbacTest-200076840"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:49.485 39 INFO tempest.lib.common.rest_client [req-27a0b1e9-c3a9-468a-a40a-97135f10f903 ] Request (ServerActionsRbacTest:test_rebuild_server): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.055s 2020-11-06 18:00:49.485 39 DEBUG tempest.lib.common.rest_client [req-27a0b1e9-c3a9-468a-a40a-97135f10f903 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-27a0b1e9-c3a9-468a-a40a-97135f10f903', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:49.521 39 INFO tempest.lib.common.rest_client [req-207fb946-c809-4947-97e8-58777d5d6c38 ] Request (ServerActionsRbacTest:test_rebuild_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:00:49.522 39 DEBUG tempest.lib.common.rest_client [req-207fb946-c809-4947-97e8-58777d5d6c38 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-207fb946-c809-4947-97e8-58777d5d6c38', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["yWWLEXa2TP6U8R5MwAixhg"], "expires_at": "2020-11-06T19:00:49.000000Z", "issued_at": "2020-11-06T18:00:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:49.964 40 INFO tempest.lib.common.rest_client [req-745db366-7a68-4a20-ba4d-09100d6bb19c ] Request (VolumeRbacTest:test_create_volume): 200 POST http://172.30.13.94/compute/v2.1/os-volumes 0.488s 2020-11-06 18:00:49.965 40 DEBUG tempest.lib.common.rest_client [req-745db366-7a68-4a20-ba4d-09100d6bb19c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '290', 'location': 'http://172.30.13.94/compute/v2.1/os-volumes/7d814ce0-f266-419e-b3ee-ca2e8869ff91', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-745db366-7a68-4a20-ba4d-09100d6bb19c', 'x-compute-request-id': 'req-745db366-7a68-4a20-ba4d-09100d6bb19c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-volumes'} Body: b'{"volume": {"id": "7d814ce0-f266-419e-b3ee-ca2e8869ff91", "status": "creating", "size": 1, "availabilityZone": "nova", "createdAt": "2020-11-06T18:00:50.000000", "attachments": [{}], "displayName": null, "displayDescription": null, "volumeType": "ceph", "snapshotId": null, "metadata": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:49.970 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:50.035 39 INFO tempest.lib.common.rest_client [req-71d54a8c-76b5-4b8b-8e17-8c3980955ac1 ] Request (ServerActionsRbacTest:test_rebuild_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.512s 2020-11-06 18:00:50.036 39 DEBUG tempest.lib.common.rest_client [req-71d54a8c-76b5-4b8b-8e17-8c3980955ac1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1727', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-71d54a8c-76b5-4b8b-8e17-8c3980955ac1', 'x-compute-request-id': 'req-71d54a8c-76b5-4b8b-8e17-8c3980955ac1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "REBUILD", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:00:49Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:02.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "rebuilding", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:50.056 40 INFO tempest.lib.common.rest_client [req-639f4144-e6c1-46cc-8693-184f9aa26420 ] Request (VolumeRbacTest:test_create_volume): 200 GET http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles 0.085s 2020-11-06 18:00:50.057 40 DEBUG tempest.lib.common.rest_client [req-639f4144-e6c1-46cc-8693-184f9aa26420 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-639f4144-e6c1-46cc-8693-184f9aa26420', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:50.143 40 INFO tempest.lib.common.rest_client [req-71d4857c-36a2-4eaf-b201-9519fa98d9b6 ] Request (VolumeRbacTest:test_create_volume): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:00:50.144 40 DEBUG tempest.lib.common.rest_client [req-71d4857c-36a2-4eaf-b201-9519fa98d9b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-71d4857c-36a2-4eaf-b201-9519fa98d9b6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f0f68e26f4a84ca492a5ea80b6591569", "name": "tempest-VolumeRbacTest-200076840", "password_expires_at": null}, "audit_ids": ["ZQ7VT5SFTIGID--KZU2eGg"], "expires_at": "2020-11-06T19:00:50.000000Z", "issued_at": "2020-11-06T18:00:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6783e84af29c412fb82aa0c1f57a42dc", "name": "tempest-VolumeRbacTest-200076840"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:50.201 37 INFO tempest.lib.common.rest_client [req-a7222343-09d4-4b2c-a054-bcbe583a763b ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b 0.313s 2020-11-06 18:00:50.202 37 DEBUG tempest.lib.common.rest_client [req-a7222343-09d4-4b2c-a054-bcbe583a763b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2116', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a7222343-09d4-4b2c-a054-bcbe583a763b', 'x-compute-request-id': 'req-a7222343-09d4-4b2c-a054-bcbe583a763b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b'} Body: b'{"server": {"id": "c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b", "name": "tempest-MigrateServerV225RbacTest-server-1605055471", "status": "MIGRATING", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "2d746f1ab29074f3f929b1892e496ee0de7b1451dab2a8ca922b6c38", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:30Z", "updated": "2020-11-06T18:00:46Z", "addresses": {"patrole_reader-net_30048f18-b96b-4343-a720-1173982b59b8": [{"version": 4, "addr": "192.168.120.109", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:44:63:02"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:39.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c8", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-SRV-ATTR:reservation_id": "r-mos6y4h1", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1605055471", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:50.376 40 INFO tempest.lib.common.rest_client [req-65060164-a020-455b-a6fc-2c89696dd1e3 ] Request (VolumeRbacTest:test_create_volume): 200 GET http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc/volumes/7d814ce0-f266-419e-b3ee-ca2e8869ff91 0.231s 2020-11-06 18:00:50.377 40 DEBUG tempest.lib.common.rest_client [req-65060164-a020-455b-a6fc-2c89696dd1e3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-65060164-a020-455b-a6fc-2c89696dd1e3', 'content-length': '1020', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-65060164-a020-455b-a6fc-2c89696dd1e3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc/volumes/7d814ce0-f266-419e-b3ee-ca2e8869ff91'} Body: b'{"volume": {"id": "7d814ce0-f266-419e-b3ee-ca2e8869ff91", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:00:50.000000", "updated_at": "2020-11-06T18:00:50.000000", "name": null, "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc/volumes/7d814ce0-f266-419e-b3ee-ca2e8869ff91"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6783e84af29c412fb82aa0c1f57a42dc/volumes/7d814ce0-f266-419e-b3ee-ca2e8869ff91"}], "user_id": "f0f68e26f4a84ca492a5ea80b6591569", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "6783e84af29c412fb82aa0c1f57a42dc"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:50.380 38 INFO tempest.lib.common.rest_client [req-b6899f3a-7c95-4b19-8b17-9715d0d34c05 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 202 POST http://172.30.13.94/compute/v2.1/servers 1.135s 2020-11-06 18:00:50.380 38 DEBUG tempest.lib.common.rest_client [req-b6899f3a-7c95-4b19-8b17-9715d0d34c05 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-MiscPolicyActionsNetworkRbacTest-server-807842018", "imageRef": "56b368f6-9136-40ec-a04c-564d02c95e42", "flavorRef": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "networks": [{"uuid": "f747eec6-c776-4af6-aa67-8eb73e88914e"}]}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b6899f3a-7c95-4b19-8b17-9715d0d34c05', 'x-compute-request-id': 'req-b6899f3a-7c95-4b19-8b17-9715d0d34c05', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "400f4368-ffc1-4bc4-8fe6-fddf93f90826", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "T4a8asqLJkws"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:50.390 40 INFO tempest.common.waiters [-] volume 7d814ce0-f266-419e-b3ee-ca2e8869ff91 reached available after waiting for 0.390389 seconds 2020-11-06 18:00:50.479 38 INFO tempest.lib.common.rest_client [req-5064b8bb-56c9-4baa-b43d-4f8e81fe8f7f ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826 0.093s 2020-11-06 18:00:50.479 38 DEBUG tempest.lib.common.rest_client [req-5064b8bb-56c9-4baa-b43d-4f8e81fe8f7f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1407', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5064b8bb-56c9-4baa-b43d-4f8e81fe8f7f', 'x-compute-request-id': 'req-5064b8bb-56c9-4baa-b43d-4f8e81fe8f7f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826'} Body: b'{"server": {"id": "400f4368-ffc1-4bc4-8fe6-fddf93f90826", "name": "tempest-MiscPolicyActionsNetworkRbacTest-server-807842018", "status": "BUILD", "tenant_id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "user_id": "1db6819d47a748669464ad962e63976e", "metadata": {}, "hostId": "", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:50Z", "updated": "2020-11-06T18:00:50Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:50.494 40 INFO tempest.lib.common.rest_client [req-8835cd91-53a4-4d54-b57e-0491529cc072 ] Request (VolumeRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc/volumes/7d814ce0-f266-419e-b3ee-ca2e8869ff91 0.103s 2020-11-06 18:00:50.494 40 DEBUG tempest.lib.common.rest_client [req-8835cd91-53a4-4d54-b57e-0491529cc072 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8835cd91-53a4-4d54-b57e-0491529cc072', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc/volumes/7d814ce0-f266-419e-b3ee-ca2e8869ff91'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:50.498 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:00:50.498 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.499 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.500 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.500 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.500 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.501 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.502 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.502 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.502 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.503 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.503 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.504 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.504 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.504 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.505 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.505 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.506 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.506 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.506 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.507 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.507 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.507 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.507 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.508 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.508 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.508 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.509 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.509 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.509 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.509 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.510 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.510 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.510 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.511 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.511 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.511 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.511 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.512 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.512 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.512 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.512 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.513 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.513 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.513 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.514 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.514 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.514 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.515 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.515 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.515 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.515 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.516 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.516 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.517 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.517 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.517 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.518 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.518 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.518 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.519 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.519 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.519 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.520 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.520 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.520 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.521 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.521 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.521 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.522 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.522 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.522 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.522 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.523 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.523 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.523 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:50.525 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-volumes:snapshots:delete, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:00:50.753 40 INFO tempest.lib.common.rest_client [req-5026a82d-904d-49e8-b83c-3db8f4bf4c64 ] Request (VolumeRbacTest:test_delete_snapshot): 200 POST http://172.30.13.94/compute/v2.1/os-snapshots 0.227s 2020-11-06 18:00:50.754 40 DEBUG tempest.lib.common.rest_client [req-5026a82d-904d-49e8-b83c-3db8f4bf4c64 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"snapshot": {"volume_id": "aaf194c8-bbb3-481a-a89d-d81da24b838a", "display_name": "tempest-VolumeRbacTest-Snapshot-2108624176"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '277', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5026a82d-904d-49e8-b83c-3db8f4bf4c64', 'x-compute-request-id': 'req-5026a82d-904d-49e8-b83c-3db8f4bf4c64', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots'} Body: b'{"snapshot": {"id": "9f6b032f-9f70-4ee6-95e1-dc34e750c96c", "volumeId": "aaf194c8-bbb3-481a-a89d-d81da24b838a", "status": "creating", "size": 1, "createdAt": "2020-11-06T18:00:50.658037", "displayName": "tempest-VolumeRbacTest-Snapshot-2108624176", "displayDescription": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:50.806 40 INFO tempest.lib.common.rest_client [req-4c6543a7-b917-402f-bb57-db3de313c65c ] Request (VolumeRbacTest:test_delete_snapshot): 200 GET http://172.30.13.94/compute/v2.1/os-snapshots/9f6b032f-9f70-4ee6-95e1-dc34e750c96c 0.049s 2020-11-06 18:00:50.807 40 DEBUG tempest.lib.common.rest_client [req-4c6543a7-b917-402f-bb57-db3de313c65c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '277', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4c6543a7-b917-402f-bb57-db3de313c65c', 'x-compute-request-id': 'req-4c6543a7-b917-402f-bb57-db3de313c65c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots/9f6b032f-9f70-4ee6-95e1-dc34e750c96c'} Body: b'{"snapshot": {"id": "9f6b032f-9f70-4ee6-95e1-dc34e750c96c", "volumeId": "aaf194c8-bbb3-481a-a89d-d81da24b838a", "status": "creating", "size": 1, "createdAt": "2020-11-06T18:00:51.000000", "displayName": "tempest-VolumeRbacTest-Snapshot-2108624176", "displayDescription": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:51.875 40 INFO tempest.lib.common.rest_client [req-8921112f-297d-40bb-954a-90d2c93adab2 ] Request (VolumeRbacTest:test_delete_snapshot): 200 GET http://172.30.13.94/compute/v2.1/os-snapshots/9f6b032f-9f70-4ee6-95e1-dc34e750c96c 0.062s 2020-11-06 18:00:51.875 40 DEBUG tempest.lib.common.rest_client [req-8921112f-297d-40bb-954a-90d2c93adab2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '278', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8921112f-297d-40bb-954a-90d2c93adab2', 'x-compute-request-id': 'req-8921112f-297d-40bb-954a-90d2c93adab2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots/9f6b032f-9f70-4ee6-95e1-dc34e750c96c'} Body: b'{"snapshot": {"id": "9f6b032f-9f70-4ee6-95e1-dc34e750c96c", "volumeId": "aaf194c8-bbb3-481a-a89d-d81da24b838a", "status": "available", "size": 1, "createdAt": "2020-11-06T18:00:51.000000", "displayName": "tempest-VolumeRbacTest-Snapshot-2108624176", "displayDescription": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:51.878 40 INFO tempest.common.waiters [-] snapshot 9f6b032f-9f70-4ee6-95e1-dc34e750c96c reached available after waiting for 1.878801 seconds 2020-11-06 18:00:51.879 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:52.032 40 INFO tempest.lib.common.rest_client [req-1786b05d-3322-4430-a7c5-75822aa5092c ] Request (VolumeRbacTest:test_delete_snapshot): 200 GET http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles 0.152s 2020-11-06 18:00:52.032 40 DEBUG tempest.lib.common.rest_client [req-1786b05d-3322-4430-a7c5-75822aa5092c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1786b05d-3322-4430-a7c5-75822aa5092c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:52.114 40 INFO tempest.lib.common.rest_client [req-7821b8cf-1025-436b-b37e-f87ba791635d ] Request (VolumeRbacTest:test_delete_snapshot): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-11-06 18:00:52.115 40 DEBUG tempest.lib.common.rest_client [req-7821b8cf-1025-436b-b37e-f87ba791635d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7821b8cf-1025-436b-b37e-f87ba791635d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f0f68e26f4a84ca492a5ea80b6591569", "name": "tempest-VolumeRbacTest-200076840", "password_expires_at": null}, "audit_ids": ["0C2Ej_4zQ0mJXxNkqnG64Q"], "expires_at": "2020-11-06T19:00:52.000000Z", "issued_at": "2020-11-06T18:00:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6783e84af29c412fb82aa0c1f57a42dc", "name": "tempest-VolumeRbacTest-200076840"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:52.404 40 INFO tempest.lib.common.rest_client [req-1eb895e8-11ea-4f42-8fca-5a67df3ee2fa ] Request (VolumeRbacTest:test_delete_snapshot): 202 DELETE http://172.30.13.94/compute/v2.1/os-snapshots/9f6b032f-9f70-4ee6-95e1-dc34e750c96c 0.287s 2020-11-06 18:00:52.404 40 DEBUG tempest.lib.common.rest_client [req-1eb895e8-11ea-4f42-8fca-5a67df3ee2fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1eb895e8-11ea-4f42-8fca-5a67df3ee2fa', 'x-compute-request-id': 'req-1eb895e8-11ea-4f42-8fca-5a67df3ee2fa', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots/9f6b032f-9f70-4ee6-95e1-dc34e750c96c'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:52.405 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:52.465 40 INFO tempest.lib.common.rest_client [req-40af82c8-a861-4a0b-ae52-c874acdcfb0a ] Request (VolumeRbacTest:test_delete_snapshot): 200 GET http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles 0.059s 2020-11-06 18:00:52.466 40 DEBUG tempest.lib.common.rest_client [req-40af82c8-a861-4a0b-ae52-c874acdcfb0a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-40af82c8-a861-4a0b-ae52-c874acdcfb0a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:52.501 40 INFO tempest.lib.common.rest_client [req-5fb5b2dc-805b-4d05-9727-4b34d36d985f ] Request (VolumeRbacTest:test_delete_snapshot): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:00:52.502 40 DEBUG tempest.lib.common.rest_client [req-5fb5b2dc-805b-4d05-9727-4b34d36d985f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5fb5b2dc-805b-4d05-9727-4b34d36d985f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f0f68e26f4a84ca492a5ea80b6591569", "name": "tempest-VolumeRbacTest-200076840", "password_expires_at": null}, "audit_ids": ["N0XTh8Z9T5WFxucfdfwCng"], "expires_at": "2020-11-06T19:00:52.000000Z", "issued_at": "2020-11-06T18:00:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6783e84af29c412fb82aa0c1f57a42dc", "name": "tempest-VolumeRbacTest-200076840"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:52.515 38 INFO tempest.lib.common.rest_client [req-2e57b023-6386-41a7-b173-6210dc33c936 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826 1.022s 2020-11-06 18:00:52.515 38 DEBUG tempest.lib.common.rest_client [req-2e57b023-6386-41a7-b173-6210dc33c936 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1494', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2e57b023-6386-41a7-b173-6210dc33c936', 'x-compute-request-id': 'req-2e57b023-6386-41a7-b173-6210dc33c936', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826'} Body: b'{"server": {"id": "400f4368-ffc1-4bc4-8fe6-fddf93f90826", "name": "tempest-MiscPolicyActionsNetworkRbacTest-server-807842018", "status": "BUILD", "tenant_id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "user_id": "1db6819d47a748669464ad962e63976e", "metadata": {}, "hostId": "ece68e332f20fc5533900b2d7968634335d3e48777e967f3ff177a1f", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:50Z", "updated": "2020-11-06T18:00:51Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c9", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:52.525 38 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/None" after 2 second wait 2020-11-06 18:00:52.622 40 INFO tempest.lib.common.rest_client [req-376ee009-fb82-45f6-b27e-1fdd51319d5b ] Request (VolumeRbacTest:test_delete_snapshot): 200 GET http://172.30.13.94/compute/v2.1/os-snapshots/9f6b032f-9f70-4ee6-95e1-dc34e750c96c 0.119s 2020-11-06 18:00:52.622 40 DEBUG tempest.lib.common.rest_client [req-376ee009-fb82-45f6-b27e-1fdd51319d5b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '277', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-376ee009-fb82-45f6-b27e-1fdd51319d5b', 'x-compute-request-id': 'req-376ee009-fb82-45f6-b27e-1fdd51319d5b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots/9f6b032f-9f70-4ee6-95e1-dc34e750c96c'} Body: b'{"snapshot": {"id": "9f6b032f-9f70-4ee6-95e1-dc34e750c96c", "volumeId": "aaf194c8-bbb3-481a-a89d-d81da24b838a", "status": "deleting", "size": 1, "createdAt": "2020-11-06T18:00:51.000000", "displayName": "tempest-VolumeRbacTest-Snapshot-2108624176", "displayDescription": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:52.681 39 INFO tempest.lib.common.rest_client [req-5b59f976-3e84-4e6e-8b3d-7d91d1818ce1 ] Request (ServerActionsRbacTest:test_rebuild_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 1.629s 2020-11-06 18:00:52.682 39 DEBUG tempest.lib.common.rest_client [req-5b59f976-3e84-4e6e-8b3d-7d91d1818ce1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1733', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5b59f976-3e84-4e6e-8b3d-7d91d1818ce1', 'x-compute-request-id': 'req-5b59f976-3e84-4e6e-8b3d-7d91d1818ce1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "REBUILD", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:00:51Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:02.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "rebuild_spawning", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:52.697 39 INFO tempest.common.waiters [-] State transition "REBUILD/rebuilding" ==> "REBUILD/rebuild_spawning" after 2 second wait 2020-11-06 18:00:52.740 37 INFO tempest.lib.common.rest_client [req-ede0d52f-d131-402c-9a2f-195f6bba599c ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b 1.520s 2020-11-06 18:00:52.741 37 DEBUG tempest.lib.common.rest_client [req-ede0d52f-d131-402c-9a2f-195f6bba599c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2116', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ede0d52f-d131-402c-9a2f-195f6bba599c', 'x-compute-request-id': 'req-ede0d52f-d131-402c-9a2f-195f6bba599c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b'} Body: b'{"server": {"id": "c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b", "name": "tempest-MigrateServerV225RbacTest-server-1605055471", "status": "MIGRATING", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "2d746f1ab29074f3f929b1892e496ee0de7b1451dab2a8ca922b6c38", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:30Z", "updated": "2020-11-06T18:00:51Z", "addresses": {"patrole_reader-net_30048f18-b96b-4343-a720-1173982b59b8": [{"version": 4, "addr": "192.168.120.109", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:44:63:02"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:39.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c8", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-SRV-ATTR:reservation_id": "r-mos6y4h1", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1605055471", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:53.694 40 INFO tempest.lib.common.rest_client [req-e306817e-a7d4-4877-bb4f-eae3811383fc ] Request (VolumeRbacTest:test_delete_snapshot): 404 GET http://172.30.13.94/compute/v2.1/os-snapshots/9f6b032f-9f70-4ee6-95e1-dc34e750c96c 0.067s 2020-11-06 18:00:53.695 40 DEBUG tempest.lib.common.rest_client [req-e306817e-a7d4-4877-bb4f-eae3811383fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-e306817e-a7d4-4877-bb4f-eae3811383fc', 'x-compute-request-id': 'req-e306817e-a7d4-4877-bb4f-eae3811383fc', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots/9f6b032f-9f70-4ee6-95e1-dc34e750c96c'} Body: b'{"itemNotFound": {"code": 404, "message": "Snapshot 9f6b032f-9f70-4ee6-95e1-dc34e750c96c could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:53.767 40 INFO tempest.lib.common.rest_client [req-1f50734b-1579-4167-89a8-6018ff14ac54 ] Request (VolumeRbacTest:_run_cleanups): 404 GET http://172.30.13.94/compute/v2.1/os-snapshots/9f6b032f-9f70-4ee6-95e1-dc34e750c96c 0.071s 2020-11-06 18:00:53.767 40 DEBUG tempest.lib.common.rest_client [req-1f50734b-1579-4167-89a8-6018ff14ac54 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-1f50734b-1579-4167-89a8-6018ff14ac54', 'x-compute-request-id': 'req-1f50734b-1579-4167-89a8-6018ff14ac54', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots/9f6b032f-9f70-4ee6-95e1-dc34e750c96c'} Body: b'{"itemNotFound": {"code": 404, "message": "Snapshot 9f6b032f-9f70-4ee6-95e1-dc34e750c96c could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:53.772 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:00:53.772 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.773 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.773 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.773 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.774 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.774 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.774 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.774 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.775 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.775 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.775 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.775 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.776 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.776 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.776 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.776 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.777 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.777 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.777 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.777 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.778 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.778 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.778 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.778 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.779 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.779 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.779 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.779 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.779 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.780 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.780 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.780 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.780 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.781 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.781 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.781 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.781 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.782 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.782 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.782 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.783 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.783 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.784 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.784 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.784 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.784 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.785 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.785 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.786 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.786 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.786 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.786 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.787 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.787 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.787 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.788 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.788 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.788 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.788 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.789 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.789 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.790 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.790 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.790 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.790 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.791 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.791 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.791 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.792 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.792 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.792 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.792 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.793 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.793 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.793 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:53.795 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-volumes:delete, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:00:53.931 38 INFO tempest.lib.common.rest_client [req-5907c6cf-4aa4-437d-a438-61a2841dd0f9 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826 0.404s 2020-11-06 18:00:53.932 38 DEBUG tempest.lib.common.rest_client [req-5907c6cf-4aa4-437d-a438-61a2841dd0f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1542', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5907c6cf-4aa4-437d-a438-61a2841dd0f9', 'x-compute-request-id': 'req-5907c6cf-4aa4-437d-a438-61a2841dd0f9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826'} Body: b'{"server": {"id": "400f4368-ffc1-4bc4-8fe6-fddf93f90826", "name": "tempest-MiscPolicyActionsNetworkRbacTest-server-807842018", "status": "BUILD", "tenant_id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "user_id": "1db6819d47a748669464ad962e63976e", "metadata": {}, "hostId": "ece68e332f20fc5533900b2d7968634335d3e48777e967f3ff177a1f", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:50Z", "updated": "2020-11-06T18:00:52Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c9", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:53.945 38 INFO tempest.common.waiters [-] State transition "BUILD/None" ==> "BUILD/spawning" after 3 second wait 2020-11-06 18:00:54.036 39 INFO tempest.lib.common.rest_client [req-afdc4f1c-e070-4fca-8146-fe46047103f3 ] Request (ServerActionsRbacTest:test_rebuild_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.336s 2020-11-06 18:00:54.036 39 DEBUG tempest.lib.common.rest_client [req-afdc4f1c-e070-4fca-8146-fe46047103f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1733', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-afdc4f1c-e070-4fca-8146-fe46047103f3', 'x-compute-request-id': 'req-afdc4f1c-e070-4fca-8146-fe46047103f3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "REBUILD", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:00:51Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:02.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "rebuild_spawning", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:54.087 40 INFO tempest.lib.common.rest_client [req-64a78dc3-c6e4-4150-842b-fe727ef2ed6a ] Request (VolumeRbacTest:test_delete_volume): 202 POST http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc/volumes 0.291s 2020-11-06 18:00:54.087 40 DEBUG tempest.lib.common.rest_client [req-64a78dc3-c6e4-4150-842b-fe727ef2ed6a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "display_name": "tempest-VolumeRbacTest-volume-1222637570"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-64a78dc3-c6e4-4150-842b-fe727ef2ed6a', 'content-length': '835', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-64a78dc3-c6e4-4150-842b-fe727ef2ed6a', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc/volumes'} Body: b'{"volume": {"id": "55b1fa73-07a7-441e-9924-a2e4723c9e77", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:00:54.000000", "updated_at": null, "name": "tempest-VolumeRbacTest-volume-1222637570", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc/volumes/55b1fa73-07a7-441e-9924-a2e4723c9e77"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6783e84af29c412fb82aa0c1f57a42dc/volumes/55b1fa73-07a7-441e-9924-a2e4723c9e77"}], "user_id": "f0f68e26f4a84ca492a5ea80b6591569", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:54.119 37 INFO tempest.lib.common.rest_client [req-2abe69ad-42db-4c30-9bc1-414844588e83 ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b 0.359s 2020-11-06 18:00:54.119 37 DEBUG tempest.lib.common.rest_client [req-2abe69ad-42db-4c30-9bc1-414844588e83 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2106', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2abe69ad-42db-4c30-9bc1-414844588e83', 'x-compute-request-id': 'req-2abe69ad-42db-4c30-9bc1-414844588e83', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b'} Body: b'{"server": {"id": "c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b", "name": "tempest-MigrateServerV225RbacTest-server-1605055471", "status": "ACTIVE", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "11963b972eb6d09f2649fda4ffdcbc396a903c992fbb1e9c0e251a47", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:30Z", "updated": "2020-11-06T18:00:52Z", "addresses": {"patrole_reader-net_30048f18-b96b-4343-a720-1173982b59b8": [{"version": 4, "addr": "192.168.120.109", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:44:63:02"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:39.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c8", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-SRV-ATTR:reservation_id": "r-mos6y4h1", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1605055471", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:54.140 37 INFO tempest.common.waiters [-] State transition "MIGRATING/migrating" ==> "ACTIVE/None" after 11 second wait 2020-11-06 18:00:54.201 40 INFO tempest.lib.common.rest_client [req-6b21ecf3-f457-4337-8f37-6f42e1db331e ] Request (VolumeRbacTest:test_delete_volume): 200 GET http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc/volumes/55b1fa73-07a7-441e-9924-a2e4723c9e77 0.102s 2020-11-06 18:00:54.201 40 DEBUG tempest.lib.common.rest_client [req-6b21ecf3-f457-4337-8f37-6f42e1db331e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6b21ecf3-f457-4337-8f37-6f42e1db331e', 'content-length': '1057', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6b21ecf3-f457-4337-8f37-6f42e1db331e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc/volumes/55b1fa73-07a7-441e-9924-a2e4723c9e77'} Body: b'{"volume": {"id": "55b1fa73-07a7-441e-9924-a2e4723c9e77", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:00:54.000000", "updated_at": "2020-11-06T18:00:54.000000", "name": "tempest-VolumeRbacTest-volume-1222637570", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc/volumes/55b1fa73-07a7-441e-9924-a2e4723c9e77"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6783e84af29c412fb82aa0c1f57a42dc/volumes/55b1fa73-07a7-441e-9924-a2e4723c9e77"}], "user_id": "f0f68e26f4a84ca492a5ea80b6591569", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "6783e84af29c412fb82aa0c1f57a42dc"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:54.332 37 INFO tempest.lib.common.rest_client [req-2cfd1a2f-ee3e-4ada-a6e6-858b7eb5015a ] Request (MigrateServerV225RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b 0.179s 2020-11-06 18:00:54.333 37 DEBUG tempest.lib.common.rest_client [req-2cfd1a2f-ee3e-4ada-a6e6-858b7eb5015a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2cfd1a2f-ee3e-4ada-a6e6-858b7eb5015a', 'x-compute-request-id': 'req-2cfd1a2f-ee3e-4ada-a6e6-858b7eb5015a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:54.643 37 INFO tempest.lib.common.rest_client [req-3fb8b086-8fb2-497d-9f83-cb9721ae4aca ] Request (MigrateServerV225RbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b 0.309s 2020-11-06 18:00:54.643 37 DEBUG tempest.lib.common.rest_client [req-3fb8b086-8fb2-497d-9f83-cb9721ae4aca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1737', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3fb8b086-8fb2-497d-9f83-cb9721ae4aca', 'x-compute-request-id': 'req-3fb8b086-8fb2-497d-9f83-cb9721ae4aca', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b'} Body: b'{"server": {"id": "c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b", "name": "tempest-MigrateServerV225RbacTest-server-1605055471", "status": "ACTIVE", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "11963b972eb6d09f2649fda4ffdcbc396a903c992fbb1e9c0e251a47", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:30Z", "updated": "2020-11-06T18:00:54Z", "addresses": {"patrole_reader-net_30048f18-b96b-4343-a720-1173982b59b8": [{"version": 4, "addr": "192.168.120.109", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:44:63:02"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:39.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c8", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:55.286 40 INFO tempest.lib.common.rest_client [req-75021390-b082-446e-811b-af8811c4371e ] Request (VolumeRbacTest:test_delete_volume): 200 GET http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc/volumes/55b1fa73-07a7-441e-9924-a2e4723c9e77 0.072s 2020-11-06 18:00:55.287 40 DEBUG tempest.lib.common.rest_client [req-75021390-b082-446e-811b-af8811c4371e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-75021390-b082-446e-811b-af8811c4371e', 'content-length': '1058', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-75021390-b082-446e-811b-af8811c4371e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc/volumes/55b1fa73-07a7-441e-9924-a2e4723c9e77'} Body: b'{"volume": {"id": "55b1fa73-07a7-441e-9924-a2e4723c9e77", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:00:54.000000", "updated_at": "2020-11-06T18:00:54.000000", "name": "tempest-VolumeRbacTest-volume-1222637570", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc/volumes/55b1fa73-07a7-441e-9924-a2e4723c9e77"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6783e84af29c412fb82aa0c1f57a42dc/volumes/55b1fa73-07a7-441e-9924-a2e4723c9e77"}], "user_id": "f0f68e26f4a84ca492a5ea80b6591569", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "6783e84af29c412fb82aa0c1f57a42dc"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:55.301 40 INFO tempest.common.waiters [-] volume 55b1fa73-07a7-441e-9924-a2e4723c9e77 reached available after waiting for 1.301477 seconds 2020-11-06 18:00:55.301 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:55.358 40 INFO tempest.lib.common.rest_client [req-d07ecbad-4aae-4ecf-9744-ab0a01cea6bf ] Request (VolumeRbacTest:test_delete_volume): 200 GET http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles 0.055s 2020-11-06 18:00:55.358 40 DEBUG tempest.lib.common.rest_client [req-d07ecbad-4aae-4ecf-9744-ab0a01cea6bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d07ecbad-4aae-4ecf-9744-ab0a01cea6bf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:55.374 38 INFO tempest.lib.common.rest_client [req-c5e3bcd4-30f9-47a3-8d22-0e1ae75c3723 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826 0.426s 2020-11-06 18:00:55.374 38 DEBUG tempest.lib.common.rest_client [req-c5e3bcd4-30f9-47a3-8d22-0e1ae75c3723 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1542', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c5e3bcd4-30f9-47a3-8d22-0e1ae75c3723', 'x-compute-request-id': 'req-c5e3bcd4-30f9-47a3-8d22-0e1ae75c3723', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826'} Body: b'{"server": {"id": "400f4368-ffc1-4bc4-8fe6-fddf93f90826", "name": "tempest-MiscPolicyActionsNetworkRbacTest-server-807842018", "status": "BUILD", "tenant_id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "user_id": "1db6819d47a748669464ad962e63976e", "metadata": {}, "hostId": "ece68e332f20fc5533900b2d7968634335d3e48777e967f3ff177a1f", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:50Z", "updated": "2020-11-06T18:00:52Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c9", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:55.399 40 INFO tempest.lib.common.rest_client [req-266f7c5d-442a-4eee-8b13-3e6166aa49e3 ] Request (VolumeRbacTest:test_delete_volume): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:00:55.399 40 DEBUG tempest.lib.common.rest_client [req-266f7c5d-442a-4eee-8b13-3e6166aa49e3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-266f7c5d-442a-4eee-8b13-3e6166aa49e3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f0f68e26f4a84ca492a5ea80b6591569", "name": "tempest-VolumeRbacTest-200076840", "password_expires_at": null}, "audit_ids": ["hb2EyvLSQuWSxVR0QMYMhg"], "expires_at": "2020-11-06T19:00:55.000000Z", "issued_at": "2020-11-06T18:00:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6783e84af29c412fb82aa0c1f57a42dc", "name": "tempest-VolumeRbacTest-200076840"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:55.404 39 INFO tempest.lib.common.rest_client [req-4439225a-655f-4b17-af30-245abaea3843 ] Request (ServerActionsRbacTest:test_rebuild_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.352s 2020-11-06 18:00:55.404 39 DEBUG tempest.lib.common.rest_client [req-4439225a-655f-4b17-af30-245abaea3843 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4439225a-655f-4b17-af30-245abaea3843', 'x-compute-request-id': 'req-4439225a-655f-4b17-af30-245abaea3843', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:00:54Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:53.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:55.414 39 INFO tempest.common.waiters [-] State transition "REBUILD/rebuild_spawning" ==> "ACTIVE/None" after 5 second wait 2020-11-06 18:00:55.580 40 INFO tempest.lib.common.rest_client [req-37d21c87-98ae-45e6-a3b9-041ca51934b7 ] Request (VolumeRbacTest:test_delete_volume): 202 DELETE http://172.30.13.94/compute/v2.1/os-volumes/55b1fa73-07a7-441e-9924-a2e4723c9e77 0.179s 2020-11-06 18:00:55.581 40 DEBUG tempest.lib.common.rest_client [req-37d21c87-98ae-45e6-a3b9-041ca51934b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-37d21c87-98ae-45e6-a3b9-041ca51934b7', 'x-compute-request-id': 'req-37d21c87-98ae-45e6-a3b9-041ca51934b7', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/os-volumes/55b1fa73-07a7-441e-9924-a2e4723c9e77'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:55.581 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:55.639 40 INFO tempest.lib.common.rest_client [req-0e634049-6687-4517-9f8b-6f4638bce40a ] Request (VolumeRbacTest:test_delete_volume): 200 GET http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles 0.057s 2020-11-06 18:00:55.639 40 DEBUG tempest.lib.common.rest_client [req-0e634049-6687-4517-9f8b-6f4638bce40a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0e634049-6687-4517-9f8b-6f4638bce40a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:55.682 40 INFO tempest.lib.common.rest_client [req-93ab5d38-0f82-4c12-a8f0-3f9d7cf80cd9 ] Request (VolumeRbacTest:test_delete_volume): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-11-06 18:00:55.682 40 DEBUG tempest.lib.common.rest_client [req-93ab5d38-0f82-4c12-a8f0-3f9d7cf80cd9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-93ab5d38-0f82-4c12-a8f0-3f9d7cf80cd9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f0f68e26f4a84ca492a5ea80b6591569", "name": "tempest-VolumeRbacTest-200076840", "password_expires_at": null}, "audit_ids": ["RxYwDiEoT0yz9gVP7uTu6Q"], "expires_at": "2020-11-06T19:00:55.000000Z", "issued_at": "2020-11-06T18:00:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6783e84af29c412fb82aa0c1f57a42dc", "name": "tempest-VolumeRbacTest-200076840"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:55.688 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:00:55.689 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.689 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.689 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.690 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.690 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.691 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.691 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.692 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.692 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.692 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.693 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.693 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.694 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.694 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.694 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.695 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.695 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.695 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.696 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.696 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.697 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.697 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.697 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.698 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.698 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.698 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.699 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.698 39 INFO tempest.lib.common.rest_client [req-304d04ca-8518-4741-bd7e-72eb822d12b5 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.279s 2020-11-06 18:00:55.699 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.699 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.699 39 DEBUG tempest.lib.common.rest_client [req-304d04ca-8518-4741-bd7e-72eb822d12b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-304d04ca-8518-4741-bd7e-72eb822d12b5', 'x-compute-request-id': 'req-304d04ca-8518-4741-bd7e-72eb822d12b5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:00:54Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:53.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:55.700 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.700 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.701 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.701 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.701 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.702 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.702 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.702 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.703 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.703 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.703 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.704 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.704 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.704 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.705 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.705 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.705 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.706 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.706 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.706 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.707 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.707 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.707 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.707 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.708 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.708 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.708 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.709 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.709 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.709 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.710 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.710 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.710 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.711 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.711 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.711 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.712 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.712 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.712 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.712 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.713 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.713 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.713 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.714 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.714 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.714 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.715 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:00:55.716 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-volumes:snapshots:list, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:00:55.716 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.716 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:55.716 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.717 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.717 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.717 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.718 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.718 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.719 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.719 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.720 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.720 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.721 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.721 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.721 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.721 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.722 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.722 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.722 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.723 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.723 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.723 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.724 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.724 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.724 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.725 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.725 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.725 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.725 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.726 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.726 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.726 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.727 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.727 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.727 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.728 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.728 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.728 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.728 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.729 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.729 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.729 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.730 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.730 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.730 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.731 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.731 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.731 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.731 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.732 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.732 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.732 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.733 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.733 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.733 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.733 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.734 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.734 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.735 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.735 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.735 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.736 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.736 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.736 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.737 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.737 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.738 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.738 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.738 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.738 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.739 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.739 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.739 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.739 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.740 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.740 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:55.741 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:resize, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:00:55.742 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:55.771 40 INFO tempest.lib.common.rest_client [req-540286b7-76d4-4c7a-abba-95a63d1705bd ] Request (VolumeRbacTest:test_list_snapshots): 200 GET http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles 0.054s 2020-11-06 18:00:55.772 40 DEBUG tempest.lib.common.rest_client [req-540286b7-76d4-4c7a-abba-95a63d1705bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-540286b7-76d4-4c7a-abba-95a63d1705bd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:55.801 39 INFO tempest.lib.common.rest_client [req-a7f6dfc7-f7d6-40c7-a34c-186c531a5ac0 ] Request (ServerActionsRbacTest:test_resize_server): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.059s 2020-11-06 18:00:55.802 39 DEBUG tempest.lib.common.rest_client [req-a7f6dfc7-f7d6-40c7-a34c-186c531a5ac0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a7f6dfc7-f7d6-40c7-a34c-186c531a5ac0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:55.810 40 INFO tempest.lib.common.rest_client [req-e63ffb02-3d76-46b9-8c62-ca4794157260 ] Request (VolumeRbacTest:test_list_snapshots): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:00:55.811 40 DEBUG tempest.lib.common.rest_client [req-e63ffb02-3d76-46b9-8c62-ca4794157260 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e63ffb02-3d76-46b9-8c62-ca4794157260', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f0f68e26f4a84ca492a5ea80b6591569", "name": "tempest-VolumeRbacTest-200076840", "password_expires_at": null}, "audit_ids": ["UR7TYn8DScCWP5Lg92GEXQ"], "expires_at": "2020-11-06T19:00:55.000000Z", "issued_at": "2020-11-06T18:00:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6783e84af29c412fb82aa0c1f57a42dc", "name": "tempest-VolumeRbacTest-200076840"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:55.817 37 INFO tempest.lib.common.rest_client [req-a3ed5f82-6c2b-45aa-b27d-01d1cf612377 ] Request (MigrateServerV225RbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b 0.158s 2020-11-06 18:00:55.817 37 DEBUG tempest.lib.common.rest_client [req-a3ed5f82-6c2b-45aa-b27d-01d1cf612377 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1695', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a3ed5f82-6c2b-45aa-b27d-01d1cf612377', 'x-compute-request-id': 'req-a3ed5f82-6c2b-45aa-b27d-01d1cf612377', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b'} Body: b'{"server": {"id": "c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b", "name": "tempest-MigrateServerV225RbacTest-server-1605055471", "status": "ACTIVE", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "11963b972eb6d09f2649fda4ffdcbc396a903c992fbb1e9c0e251a47", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:30Z", "updated": "2020-11-06T18:00:55Z", "addresses": {"patrole_reader-net_30048f18-b96b-4343-a720-1173982b59b8": [{"version": 4, "addr": "192.168.120.109", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:44:63:02"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:39.000000", "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c8", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:55.883 39 INFO tempest.lib.common.rest_client [req-11d5d792-4e16-4132-95e2-e2ce70bd1a6e ] Request (ServerActionsRbacTest:test_resize_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-11-06 18:00:55.884 39 DEBUG tempest.lib.common.rest_client [req-11d5d792-4e16-4132-95e2-e2ce70bd1a6e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-11d5d792-4e16-4132-95e2-e2ce70bd1a6e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["8Jwm91TuRU-boAC-aClhBg"], "expires_at": "2020-11-06T19:00:55.000000Z", "issued_at": "2020-11-06T18:00:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:55.941 40 INFO tempest.lib.common.rest_client [req-fa1f8f5c-7f3b-4ed9-b3c0-cb854012a372 ] Request (VolumeRbacTest:test_list_snapshots): 200 GET http://172.30.13.94/compute/v2.1/os-snapshots 0.129s 2020-11-06 18:00:55.942 40 DEBUG tempest.lib.common.rest_client [req-fa1f8f5c-7f3b-4ed9-b3c0-cb854012a372 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '17', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fa1f8f5c-7f3b-4ed9-b3c0-cb854012a372', 'x-compute-request-id': 'req-fa1f8f5c-7f3b-4ed9-b3c0-cb854012a372', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots'} Body: b'{"snapshots": []}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:55.946 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:55.995 40 INFO tempest.lib.common.rest_client [req-1e7d07a2-ad3c-48a7-9543-eb5b5365be71 ] Request (VolumeRbacTest:test_list_snapshots): 200 GET http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles 0.049s 2020-11-06 18:00:55.996 40 DEBUG tempest.lib.common.rest_client [req-1e7d07a2-ad3c-48a7-9543-eb5b5365be71 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1e7d07a2-ad3c-48a7-9543-eb5b5365be71', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:56.032 40 INFO tempest.lib.common.rest_client [req-fd530a06-dea1-4684-b9b0-f1f5a2c857a5 ] Request (VolumeRbacTest:test_list_snapshots): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:00:56.033 40 DEBUG tempest.lib.common.rest_client [req-fd530a06-dea1-4684-b9b0-f1f5a2c857a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fd530a06-dea1-4684-b9b0-f1f5a2c857a5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f0f68e26f4a84ca492a5ea80b6591569", "name": "tempest-VolumeRbacTest-200076840", "password_expires_at": null}, "audit_ids": ["yoIcU0y4SgC_-8TIKBr8Bg"], "expires_at": "2020-11-06T19:00:56.000000Z", "issued_at": "2020-11-06T18:00:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6783e84af29c412fb82aa0c1f57a42dc", "name": "tempest-VolumeRbacTest-200076840"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:56.036 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:00:56.037 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.037 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.037 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.038 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.038 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.039 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.039 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.039 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.040 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.040 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.040 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.040 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.041 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.041 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.041 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.042 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.042 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.042 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.043 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.043 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.043 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.044 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.044 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.044 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.044 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.045 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.045 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.045 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.046 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.046 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.046 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.046 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.047 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.047 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.047 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.048 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.048 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.048 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.048 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.049 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.049 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.049 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.050 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.050 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.050 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.051 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.051 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.051 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.051 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.052 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.052 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.052 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.053 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.053 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.053 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.053 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.054 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.054 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.054 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.055 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.055 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.055 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.056 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.056 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.056 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.057 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.057 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.057 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.057 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.058 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.058 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.058 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.059 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.059 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.059 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.061 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-volumes:list, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:00:56.061 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:56.073 39 INFO tempest.lib.common.rest_client [req-e0026aa6-81b7-4d63-9c5b-1e4c4cc15b35 ] Request (ServerActionsRbacTest:test_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.188s 2020-11-06 18:00:56.074 39 DEBUG tempest.lib.common.rest_client [req-e0026aa6-81b7-4d63-9c5b-1e4c4cc15b35 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e0026aa6-81b7-4d63-9c5b-1e4c4cc15b35', 'x-compute-request-id': 'req-e0026aa6-81b7-4d63-9c5b-1e4c4cc15b35', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:00:54Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:53.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:56.109 40 INFO tempest.lib.common.rest_client [req-918305d4-4005-4f38-bd44-a28a8ae4a8b4 ] Request (VolumeRbacTest:test_list_volumes): 200 GET http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles 0.047s 2020-11-06 18:00:56.110 40 DEBUG tempest.lib.common.rest_client [req-918305d4-4005-4f38-bd44-a28a8ae4a8b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-918305d4-4005-4f38-bd44-a28a8ae4a8b4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:56.148 40 INFO tempest.lib.common.rest_client [req-afd4b5b8-807c-4d5e-8413-2623fd3603ad ] Request (VolumeRbacTest:test_list_volumes): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:00:56.148 40 DEBUG tempest.lib.common.rest_client [req-afd4b5b8-807c-4d5e-8413-2623fd3603ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-afd4b5b8-807c-4d5e-8413-2623fd3603ad', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f0f68e26f4a84ca492a5ea80b6591569", "name": "tempest-VolumeRbacTest-200076840", "password_expires_at": null}, "audit_ids": ["842X2wB0R0yOcwl_818p3w"], "expires_at": "2020-11-06T19:00:56.000000Z", "issued_at": "2020-11-06T18:00:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6783e84af29c412fb82aa0c1f57a42dc", "name": "tempest-VolumeRbacTest-200076840"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:56.307 40 INFO tempest.lib.common.rest_client [req-a93a9efb-75f2-4db8-b164-a54dbbee69cf ] Request (VolumeRbacTest:test_list_volumes): 200 GET http://172.30.13.94/compute/v2.1/os-volumes 0.157s 2020-11-06 18:00:56.307 40 DEBUG tempest.lib.common.rest_client [req-a93a9efb-75f2-4db8-b164-a54dbbee69cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '331', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a93a9efb-75f2-4db8-b164-a54dbbee69cf', 'x-compute-request-id': 'req-a93a9efb-75f2-4db8-b164-a54dbbee69cf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-volumes'} Body: b'{"volumes": [{"id": "aaf194c8-bbb3-481a-a89d-d81da24b838a", "status": "available", "size": 1, "availabilityZone": "nova", "createdAt": "2020-11-06T18:00:45.000000", "attachments": [{}], "displayName": "tempest-VolumeRbacTest-volume-463318806", "displayDescription": null, "volumeType": "ceph", "snapshotId": null, "metadata": {}}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:56.313 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:56.367 40 INFO tempest.lib.common.rest_client [req-929795d8-ebb6-41c2-9442-35f444c0faa2 ] Request (VolumeRbacTest:test_list_volumes): 200 GET http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles 0.053s 2020-11-06 18:00:56.368 40 DEBUG tempest.lib.common.rest_client [req-929795d8-ebb6-41c2-9442-35f444c0faa2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-929795d8-ebb6-41c2-9442-35f444c0faa2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:56.401 40 INFO tempest.lib.common.rest_client [req-7925e537-17fd-4e8f-b209-484327a2e791 ] Request (VolumeRbacTest:test_list_volumes): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:00:56.402 40 DEBUG tempest.lib.common.rest_client [req-7925e537-17fd-4e8f-b209-484327a2e791 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7925e537-17fd-4e8f-b209-484327a2e791', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f0f68e26f4a84ca492a5ea80b6591569", "name": "tempest-VolumeRbacTest-200076840", "password_expires_at": null}, "audit_ids": ["CWZAocu4RQyqJGvG_jj8Fw"], "expires_at": "2020-11-06T19:00:56.000000Z", "issued_at": "2020-11-06T18:00:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6783e84af29c412fb82aa0c1f57a42dc", "name": "tempest-VolumeRbacTest-200076840"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:56.406 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:00:56.407 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.408 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.408 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.409 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.409 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.410 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.410 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.410 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.411 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.411 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.411 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.412 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.412 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.412 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.413 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.413 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.413 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.414 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.414 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.414 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.414 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.415 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.415 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.415 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.416 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.416 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.416 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.416 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.417 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.417 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.417 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.418 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.418 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.418 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.418 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.419 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.419 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.419 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.420 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.420 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.420 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.420 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.421 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.421 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.421 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.422 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.422 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.422 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.423 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.423 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.423 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.423 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.424 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.424 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.424 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.425 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.425 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.425 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.426 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.426 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.426 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.427 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.427 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.427 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.428 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.428 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.428 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.428 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.429 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.429 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.429 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.430 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.430 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.430 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.430 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:56.432 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-volumes:snapshots:show, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:00:56.472 39 INFO tempest.lib.common.rest_client [req-8481e8ba-e54b-4861-8ce4-e4c2f63d788c ] Request (ServerActionsRbacTest:test_resize_server): 202 POST http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf/action 0.383s 2020-11-06 18:00:56.473 39 DEBUG tempest.lib.common.rest_client [req-8481e8ba-e54b-4861-8ce4-e4c2f63d788c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"resize": {"flavorRef": "a93eb10f-c417-43d8-812c-06039356e038"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8481e8ba-e54b-4861-8ce4-e4c2f63d788c', 'x-compute-request-id': 'req-8481e8ba-e54b-4861-8ce4-e4c2f63d788c', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:56.577 38 INFO tempest.lib.common.rest_client [req-f218ba55-7682-46d8-8f62-cc59e4816ba6 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826 0.187s 2020-11-06 18:00:56.578 38 DEBUG tempest.lib.common.rest_client [req-f218ba55-7682-46d8-8f62-cc59e4816ba6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1542', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f218ba55-7682-46d8-8f62-cc59e4816ba6', 'x-compute-request-id': 'req-f218ba55-7682-46d8-8f62-cc59e4816ba6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826'} Body: b'{"server": {"id": "400f4368-ffc1-4bc4-8fe6-fddf93f90826", "name": "tempest-MiscPolicyActionsNetworkRbacTest-server-807842018", "status": "BUILD", "tenant_id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "user_id": "1db6819d47a748669464ad962e63976e", "metadata": {}, "hostId": "ece68e332f20fc5533900b2d7968634335d3e48777e967f3ff177a1f", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:50Z", "updated": "2020-11-06T18:00:52Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c9", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:56.698 40 INFO tempest.lib.common.rest_client [req-0142a319-2710-45cb-a540-9e2b74576585 ] Request (VolumeRbacTest:test_show_snapshot): 200 POST http://172.30.13.94/compute/v2.1/os-snapshots 0.265s 2020-11-06 18:00:56.698 40 DEBUG tempest.lib.common.rest_client [req-0142a319-2710-45cb-a540-9e2b74576585 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"snapshot": {"volume_id": "aaf194c8-bbb3-481a-a89d-d81da24b838a", "display_name": "tempest-VolumeRbacTest-Snapshot-507199569"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '276', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0142a319-2710-45cb-a540-9e2b74576585', 'x-compute-request-id': 'req-0142a319-2710-45cb-a540-9e2b74576585', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots'} Body: b'{"snapshot": {"id": "6f969f0d-455e-43e2-b44a-9d97e869694f", "volumeId": "aaf194c8-bbb3-481a-a89d-d81da24b838a", "status": "creating", "size": 1, "createdAt": "2020-11-06T18:00:56.615577", "displayName": "tempest-VolumeRbacTest-Snapshot-507199569", "displayDescription": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:56.702 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:56.739 39 INFO tempest.lib.common.rest_client [req-06bf59e9-2197-4caa-b787-12664f5e322e ] Request (ServerActionsRbacTest:test_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.265s 2020-11-06 18:00:56.739 39 DEBUG tempest.lib.common.rest_client [req-06bf59e9-2197-4caa-b787-12664f5e322e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1727', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-06bf59e9-2197-4caa-b787-12664f5e322e', 'x-compute-request-id': 'req-06bf59e9-2197-4caa-b787-12664f5e322e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:00:56Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:53.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_prep", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:56.755 40 INFO tempest.lib.common.rest_client [req-9ddef6ff-3304-4c3e-9b1c-d8213e745afb ] Request (VolumeRbacTest:test_show_snapshot): 200 GET http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles 0.053s 2020-11-06 18:00:56.756 40 DEBUG tempest.lib.common.rest_client [req-9ddef6ff-3304-4c3e-9b1c-d8213e745afb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9ddef6ff-3304-4c3e-9b1c-d8213e745afb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:56.790 40 INFO tempest.lib.common.rest_client [req-02cf25a3-564b-4661-8e8a-f9411d1e405b ] Request (VolumeRbacTest:test_show_snapshot): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:00:56.791 40 DEBUG tempest.lib.common.rest_client [req-02cf25a3-564b-4661-8e8a-f9411d1e405b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-02cf25a3-564b-4661-8e8a-f9411d1e405b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f0f68e26f4a84ca492a5ea80b6591569", "name": "tempest-VolumeRbacTest-200076840", "password_expires_at": null}, "audit_ids": ["CxX9VBrYRZyhG2BRzMfGGA"], "expires_at": "2020-11-06T19:00:56.000000Z", "issued_at": "2020-11-06T18:00:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6783e84af29c412fb82aa0c1f57a42dc", "name": "tempest-VolumeRbacTest-200076840"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:56.889 37 INFO tempest.lib.common.rest_client [req-719d00b7-e1a7-4036-b62a-6882ddfbe099 ] Request (MigrateServerV225RbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b 0.053s 2020-11-06 18:00:56.889 37 DEBUG tempest.lib.common.rest_client [req-719d00b7-e1a7-4036-b62a-6882ddfbe099 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-719d00b7-e1a7-4036-b62a-6882ddfbe099', 'x-compute-request-id': 'req-719d00b7-e1a7-4036-b62a-6882ddfbe099', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance c6582d26-9dfa-40a8-9fbd-2aa23e9dc98b could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:56.917 40 INFO tempest.lib.common.rest_client [req-1312336f-069e-4dc5-b2b5-f01d1608c827 ] Request (VolumeRbacTest:test_show_snapshot): 200 GET http://172.30.13.94/compute/v2.1/os-snapshots/6f969f0d-455e-43e2-b44a-9d97e869694f 0.125s 2020-11-06 18:00:56.918 40 DEBUG tempest.lib.common.rest_client [req-1312336f-069e-4dc5-b2b5-f01d1608c827 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '276', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1312336f-069e-4dc5-b2b5-f01d1608c827', 'x-compute-request-id': 'req-1312336f-069e-4dc5-b2b5-f01d1608c827', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots/6f969f0d-455e-43e2-b44a-9d97e869694f'} Body: b'{"snapshot": {"id": "6f969f0d-455e-43e2-b44a-9d97e869694f", "volumeId": "aaf194c8-bbb3-481a-a89d-d81da24b838a", "status": "creating", "size": 1, "createdAt": "2020-11-06T18:00:57.000000", "displayName": "tempest-VolumeRbacTest-Snapshot-507199569", "displayDescription": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:56.921 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:56.973 40 INFO tempest.lib.common.rest_client [req-87c5f22c-c428-4393-84ac-055b67147bb7 ] Request (VolumeRbacTest:test_show_snapshot): 200 GET http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles 0.051s 2020-11-06 18:00:56.973 40 DEBUG tempest.lib.common.rest_client [req-87c5f22c-c428-4393-84ac-055b67147bb7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-87c5f22c-c428-4393-84ac-055b67147bb7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:57.008 40 INFO tempest.lib.common.rest_client [req-8034724c-bbdf-473c-b849-95613ac14a38 ] Request (VolumeRbacTest:test_show_snapshot): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:00:57.008 40 DEBUG tempest.lib.common.rest_client [req-8034724c-bbdf-473c-b849-95613ac14a38 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8034724c-bbdf-473c-b849-95613ac14a38', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f0f68e26f4a84ca492a5ea80b6591569", "name": "tempest-VolumeRbacTest-200076840", "password_expires_at": null}, "audit_ids": ["RUbje_phRr2NQkgI3Li6tQ"], "expires_at": "2020-11-06T19:00:56.000000Z", "issued_at": "2020-11-06T18:00:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6783e84af29c412fb82aa0c1f57a42dc", "name": "tempest-VolumeRbacTest-200076840"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:57.137 40 INFO tempest.lib.common.rest_client [req-d002b6ee-e0e1-4053-b5f1-eccd413267f6 ] Request (VolumeRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/os-snapshots/6f969f0d-455e-43e2-b44a-9d97e869694f 0.127s 2020-11-06 18:00:57.137 40 DEBUG tempest.lib.common.rest_client [req-d002b6ee-e0e1-4053-b5f1-eccd413267f6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '277', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d002b6ee-e0e1-4053-b5f1-eccd413267f6', 'x-compute-request-id': 'req-d002b6ee-e0e1-4053-b5f1-eccd413267f6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots/6f969f0d-455e-43e2-b44a-9d97e869694f'} Body: b'{"snapshot": {"id": "6f969f0d-455e-43e2-b44a-9d97e869694f", "volumeId": "aaf194c8-bbb3-481a-a89d-d81da24b838a", "status": "available", "size": 1, "createdAt": "2020-11-06T18:00:57.000000", "displayName": "tempest-VolumeRbacTest-Snapshot-507199569", "displayDescription": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:57.140 40 INFO tempest.common.waiters [-] snapshot 6f969f0d-455e-43e2-b44a-9d97e869694f reached available after waiting for 0.140472 seconds 2020-11-06 18:00:57.250 40 INFO tempest.lib.common.rest_client [req-912ae862-1e54-4a35-9f11-8cc9d1d04138 ] Request (VolumeRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/compute/v2.1/os-snapshots/6f969f0d-455e-43e2-b44a-9d97e869694f 0.109s 2020-11-06 18:00:57.250 40 DEBUG tempest.lib.common.rest_client [req-912ae862-1e54-4a35-9f11-8cc9d1d04138 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-912ae862-1e54-4a35-9f11-8cc9d1d04138', 'x-compute-request-id': 'req-912ae862-1e54-4a35-9f11-8cc9d1d04138', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots/6f969f0d-455e-43e2-b44a-9d97e869694f'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:57.306 40 INFO tempest.lib.common.rest_client [req-d951adc9-89e2-4be1-833e-a6ef2482b664 ] Request (VolumeRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/os-snapshots/6f969f0d-455e-43e2-b44a-9d97e869694f 0.054s 2020-11-06 18:00:57.306 40 DEBUG tempest.lib.common.rest_client [req-d951adc9-89e2-4be1-833e-a6ef2482b664 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '276', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d951adc9-89e2-4be1-833e-a6ef2482b664', 'x-compute-request-id': 'req-d951adc9-89e2-4be1-833e-a6ef2482b664', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots/6f969f0d-455e-43e2-b44a-9d97e869694f'} Body: b'{"snapshot": {"id": "6f969f0d-455e-43e2-b44a-9d97e869694f", "volumeId": "aaf194c8-bbb3-481a-a89d-d81da24b838a", "status": "deleting", "size": 1, "createdAt": "2020-11-06T18:00:57.000000", "displayName": "tempest-VolumeRbacTest-Snapshot-507199569", "displayDescription": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:57.910 38 INFO tempest.lib.common.rest_client [req-b1bb655d-12d5-41c8-b47e-ffcf02f84d9f ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826 0.319s 2020-11-06 18:00:57.911 38 DEBUG tempest.lib.common.rest_client [req-b1bb655d-12d5-41c8-b47e-ffcf02f84d9f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1542', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b1bb655d-12d5-41c8-b47e-ffcf02f84d9f', 'x-compute-request-id': 'req-b1bb655d-12d5-41c8-b47e-ffcf02f84d9f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826'} Body: b'{"server": {"id": "400f4368-ffc1-4bc4-8fe6-fddf93f90826", "name": "tempest-MiscPolicyActionsNetworkRbacTest-server-807842018", "status": "BUILD", "tenant_id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "user_id": "1db6819d47a748669464ad962e63976e", "metadata": {}, "hostId": "ece68e332f20fc5533900b2d7968634335d3e48777e967f3ff177a1f", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:50Z", "updated": "2020-11-06T18:00:52Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c9", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:58.046 39 INFO tempest.lib.common.rest_client [req-630b4954-575d-4e36-9f25-10d565f85881 ] Request (ServerActionsRbacTest:test_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.293s 2020-11-06 18:00:58.047 39 DEBUG tempest.lib.common.rest_client [req-630b4954-575d-4e36-9f25-10d565f85881 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1727', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-630b4954-575d-4e36-9f25-10d565f85881', 'x-compute-request-id': 'req-630b4954-575d-4e36-9f25-10d565f85881', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:00:58Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:53.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_prep", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:58.360 40 INFO tempest.lib.common.rest_client [req-892ea54b-e628-4e40-8c3d-346eb8f160a4 ] Request (VolumeRbacTest:_run_cleanups): 404 GET http://172.30.13.94/compute/v2.1/os-snapshots/6f969f0d-455e-43e2-b44a-9d97e869694f 0.048s 2020-11-06 18:00:58.360 40 DEBUG tempest.lib.common.rest_client [req-892ea54b-e628-4e40-8c3d-346eb8f160a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-892ea54b-e628-4e40-8c3d-346eb8f160a4', 'x-compute-request-id': 'req-892ea54b-e628-4e40-8c3d-346eb8f160a4', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots/6f969f0d-455e-43e2-b44a-9d97e869694f'} Body: b'{"itemNotFound": {"code": 404, "message": "Snapshot 6f969f0d-455e-43e2-b44a-9d97e869694f could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:58.366 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:00:58.367 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.367 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.368 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.368 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.369 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.369 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.370 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.370 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.371 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.371 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.372 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.372 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.373 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.373 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.373 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.373 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.374 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.374 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.374 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.375 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.375 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.375 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.375 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.376 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.376 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.376 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.377 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.377 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.377 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.377 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.378 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.378 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.378 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.378 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.379 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.379 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.380 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.380 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.381 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.381 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.382 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.382 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.382 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.383 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.383 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.383 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.384 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.384 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.384 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.384 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.385 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.385 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.385 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.386 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.386 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.386 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.387 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.387 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.387 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.388 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.389 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.390 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.390 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.390 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.391 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.391 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.392 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.392 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.392 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.392 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.393 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.393 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.393 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.394 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.394 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:00:58.395 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-volumes:show, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:00:58.396 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:58.447 40 INFO tempest.lib.common.rest_client [req-0c427652-44f6-448f-928e-e6168939abd9 ] Request (VolumeRbacTest:test_show_volume): 200 GET http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles 0.051s 2020-11-06 18:00:58.447 40 DEBUG tempest.lib.common.rest_client [req-0c427652-44f6-448f-928e-e6168939abd9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0c427652-44f6-448f-928e-e6168939abd9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:58.490 40 INFO tempest.lib.common.rest_client [req-4269e89a-2d6a-4d03-b47b-ec7cd20cb6e0 ] Request (VolumeRbacTest:test_show_volume): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-11-06 18:00:58.491 40 DEBUG tempest.lib.common.rest_client [req-4269e89a-2d6a-4d03-b47b-ec7cd20cb6e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4269e89a-2d6a-4d03-b47b-ec7cd20cb6e0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f0f68e26f4a84ca492a5ea80b6591569", "name": "tempest-VolumeRbacTest-200076840", "password_expires_at": null}, "audit_ids": ["mtgm3Bz2R7-Iq7HupDrymw"], "expires_at": "2020-11-06T19:00:58.000000Z", "issued_at": "2020-11-06T18:00:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6783e84af29c412fb82aa0c1f57a42dc", "name": "tempest-VolumeRbacTest-200076840"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:58.640 40 INFO tempest.lib.common.rest_client [req-7ef02120-5e68-4611-af81-6cb50d1ff0aa ] Request (VolumeRbacTest:test_show_volume): 200 GET http://172.30.13.94/compute/v2.1/os-volumes/aaf194c8-bbb3-481a-a89d-d81da24b838a 0.148s 2020-11-06 18:00:58.641 40 DEBUG tempest.lib.common.rest_client [req-7ef02120-5e68-4611-af81-6cb50d1ff0aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '328', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7ef02120-5e68-4611-af81-6cb50d1ff0aa', 'x-compute-request-id': 'req-7ef02120-5e68-4611-af81-6cb50d1ff0aa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-volumes/aaf194c8-bbb3-481a-a89d-d81da24b838a'} Body: b'{"volume": {"id": "aaf194c8-bbb3-481a-a89d-d81da24b838a", "status": "available", "size": 1, "availabilityZone": "nova", "createdAt": "2020-11-06T18:00:45.000000", "attachments": [{}], "displayName": "tempest-VolumeRbacTest-volume-463318806", "displayDescription": null, "volumeType": "ceph", "snapshotId": null, "metadata": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:58.649 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:00:58.713 40 INFO tempest.lib.common.rest_client [req-7ebf93a2-be7a-41d1-aeab-fa8e80e4f27f ] Request (VolumeRbacTest:test_show_volume): 200 GET http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles 0.063s 2020-11-06 18:00:58.714 40 DEBUG tempest.lib.common.rest_client [req-7ebf93a2-be7a-41d1-aeab-fa8e80e4f27f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7ebf93a2-be7a-41d1-aeab-fa8e80e4f27f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc/users/f0f68e26f4a84ca492a5ea80b6591569/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:58.748 40 INFO tempest.lib.common.rest_client [req-8da6ae7a-149f-4ffb-b1f6-7c59e0f068d0 ] Request (VolumeRbacTest:test_show_volume): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:00:58.749 40 DEBUG tempest.lib.common.rest_client [req-8da6ae7a-149f-4ffb-b1f6-7c59e0f068d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8da6ae7a-149f-4ffb-b1f6-7c59e0f068d0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f0f68e26f4a84ca492a5ea80b6591569", "name": "tempest-VolumeRbacTest-200076840", "password_expires_at": null}, "audit_ids": ["uvoCAOgwSq-WvdJ0seyXVA"], "expires_at": "2020-11-06T19:00:58.000000Z", "issued_at": "2020-11-06T18:00:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6783e84af29c412fb82aa0c1f57a42dc", "name": "tempest-VolumeRbacTest-200076840"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6783e84af29c412fb82aa0c1f57a42dc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:58.912 40 INFO tempest.lib.common.rest_client [req-735a3d90-03c3-4d42-a551-cdb330a0bafd ] Request (VolumeRbacTest:tearDownClass): 404 DELETE http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc/volumes/55b1fa73-07a7-441e-9924-a2e4723c9e77 0.155s 2020-11-06 18:00:58.912 40 DEBUG tempest.lib.common.rest_client [req-735a3d90-03c3-4d42-a551-cdb330a0bafd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-735a3d90-03c3-4d42-a551-cdb330a0bafd', 'x-openstack-request-id': 'req-735a3d90-03c3-4d42-a551-cdb330a0bafd', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc/volumes/55b1fa73-07a7-441e-9924-a2e4723c9e77'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 55b1fa73-07a7-441e-9924-a2e4723c9e77 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:58.957 40 INFO tempest.lib.common.rest_client [req-72091d0f-1ade-4784-87f8-b904f9cf5a8a ] Request (VolumeRbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc/volumes/55b1fa73-07a7-441e-9924-a2e4723c9e77 0.043s 2020-11-06 18:00:58.957 40 DEBUG tempest.lib.common.rest_client [req-72091d0f-1ade-4784-87f8-b904f9cf5a8a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-72091d0f-1ade-4784-87f8-b904f9cf5a8a', 'x-openstack-request-id': 'req-72091d0f-1ade-4784-87f8-b904f9cf5a8a', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc/volumes/55b1fa73-07a7-441e-9924-a2e4723c9e77'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 55b1fa73-07a7-441e-9924-a2e4723c9e77 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:59.069 40 INFO tempest.lib.common.rest_client [req-8a2acedb-caa4-4d69-b0b1-38b7c4ca863f ] Request (VolumeRbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc/volumes/aaf194c8-bbb3-481a-a89d-d81da24b838a 0.111s 2020-11-06 18:00:59.069 40 DEBUG tempest.lib.common.rest_client [req-8a2acedb-caa4-4d69-b0b1-38b7c4ca863f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8a2acedb-caa4-4d69-b0b1-38b7c4ca863f', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc/volumes/aaf194c8-bbb3-481a-a89d-d81da24b838a'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:59.136 40 INFO tempest.lib.common.rest_client [req-390b73dc-c014-40ca-a856-4ae15281204d ] Request (VolumeRbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc/volumes/aaf194c8-bbb3-481a-a89d-d81da24b838a 0.067s 2020-11-06 18:00:59.137 40 DEBUG tempest.lib.common.rest_client [req-390b73dc-c014-40ca-a856-4ae15281204d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-390b73dc-c014-40ca-a856-4ae15281204d', 'content-length': '1056', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-390b73dc-c014-40ca-a856-4ae15281204d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc/volumes/aaf194c8-bbb3-481a-a89d-d81da24b838a'} Body: b'{"volume": {"id": "aaf194c8-bbb3-481a-a89d-d81da24b838a", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:00:45.000000", "updated_at": "2020-11-06T18:00:59.000000", "name": "tempest-VolumeRbacTest-volume-463318806", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc/volumes/aaf194c8-bbb3-481a-a89d-d81da24b838a"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6783e84af29c412fb82aa0c1f57a42dc/volumes/aaf194c8-bbb3-481a-a89d-d81da24b838a"}], "user_id": "f0f68e26f4a84ca492a5ea80b6591569", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "6783e84af29c412fb82aa0c1f57a42dc"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:59.194 38 INFO tempest.lib.common.rest_client [req-cbdc0478-7480-4300-b70e-69a621a64d28 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826 0.269s 2020-11-06 18:00:59.194 38 DEBUG tempest.lib.common.rest_client [req-cbdc0478-7480-4300-b70e-69a621a64d28 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1739', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cbdc0478-7480-4300-b70e-69a621a64d28', 'x-compute-request-id': 'req-cbdc0478-7480-4300-b70e-69a621a64d28', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826'} Body: b'{"server": {"id": "400f4368-ffc1-4bc4-8fe6-fddf93f90826", "name": "tempest-MiscPolicyActionsNetworkRbacTest-server-807842018", "status": "ACTIVE", "tenant_id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "user_id": "1db6819d47a748669464ad962e63976e", "metadata": {}, "hostId": "ece68e332f20fc5533900b2d7968634335d3e48777e967f3ff177a1f", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:50Z", "updated": "2020-11-06T18:00:58Z", "addresses": {"tempest-MiscPolicyActionsNetworkRbacTest-1290166897-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:b6:79:e7"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:57.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c9", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:59.206 38 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 9 second wait 2020-11-06 18:00:59.250 39 INFO tempest.lib.common.rest_client [req-75859d83-3d59-4df9-8851-ef5f5cd697df ] Request (ServerActionsRbacTest:test_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.189s 2020-11-06 18:00:59.251 39 DEBUG tempest.lib.common.rest_client [req-75859d83-3d59-4df9-8851-ef5f5cd697df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1727', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-75859d83-3d59-4df9-8851-ef5f5cd697df', 'x-compute-request-id': 'req-75859d83-3d59-4df9-8851-ef5f5cd697df', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:00:58Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:53.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_prep", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:59.508 38 INFO tempest.lib.common.rest_client [req-440417b9-f6c0-4147-96c8-be043d9db55d ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.301s 2020-11-06 18:00:59.509 38 DEBUG tempest.lib.common.rest_client [req-440417b9-f6c0-4147-96c8-be043d9db55d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-MiscPolicyActionsNetworkRbacTest-network-550712968", "router:external": false, "shared": true, "port_security_enabled": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '746', 'x-openstack-request-id': 'req-440417b9-f6c0-4147-96c8-be043d9db55d', 'date': 'Fri, 06 Nov 2020 18:00:59 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"76f18a02-b98c-4b49-9ce2-560e504bc8a8","name":"tempest-MiscPolicyActionsNetworkRbacTest-network-550712968","tenant_id":"4f44b0a1b5fe4a17b77cabcf20e9501b","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":true,"project_id":"4f44b0a1b5fe4a17b77cabcf20e9501b","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":57,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:00:59Z","updated_at":"2020-11-06T18:00:59Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:00:59.965 37 INFO tempest.lib.common.rest_client [req-f676410b-3e22-42bb-a08e-94977cf95ac1 ] Request (MigrateServerV225RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45 3.075s 2020-11-06 18:00:59.966 37 DEBUG tempest.lib.common.rest_client [req-f676410b-3e22-42bb-a08e-94977cf95ac1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f676410b-3e22-42bb-a08e-94977cf95ac1', 'x-compute-request-id': 'req-f676410b-3e22-42bb-a08e-94977cf95ac1', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:00.185 37 INFO tempest.lib.common.rest_client [req-a5fab4dd-7f5a-487c-bf13-3832026d0d56 ] Request (MigrateServerV225RbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45 0.218s 2020-11-06 18:01:00.185 37 DEBUG tempest.lib.common.rest_client [req-a5fab4dd-7f5a-487c-bf13-3832026d0d56 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:00:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a5fab4dd-7f5a-487c-bf13-3832026d0d56', 'x-compute-request-id': 'req-a5fab4dd-7f5a-487c-bf13-3832026d0d56', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45'} Body: b'{"server": {"id": "d609c5d7-7c53-4853-a874-e6a5b166ad45", "name": "tempest-MigrateServerV225RbacTest-server-1545629045", "status": "ACTIVE", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "11963b972eb6d09f2649fda4ffdcbc396a903c992fbb1e9c0e251a47", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:08Z", "updated": "2020-11-06T18:01:00Z", "addresses": {"patrole_reader-net_30048f18-b96b-4343-a720-1173982b59b8": [{"version": 4, "addr": "192.168.120.180", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:54:42:29"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:28.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:00.189 38 INFO tempest.lib.common.rest_client [req-52a6758e-4724-4bd3-8d45-dc5aea60ce2a ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.678s 2020-11-06 18:01:00.189 38 DEBUG tempest.lib.common.rest_client [req-52a6758e-4724-4bd3-8d45-dc5aea60ce2a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "76f18a02-b98c-4b49-9ce2-560e504bc8a8", "cidr": "192.168.120.0/24", "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '662', 'x-openstack-request-id': 'req-52a6758e-4724-4bd3-8d45-dc5aea60ce2a', 'date': 'Fri, 06 Nov 2020 18:01:00 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"7cc652b1-42a3-434f-8267-0b79a65decc2","name":"","tenant_id":"4f44b0a1b5fe4a17b77cabcf20e9501b","network_id":"76f18a02-b98c-4b49-9ce2-560e504bc8a8","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/24","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.254"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-11-06T18:00:59Z","updated_at":"2020-11-06T18:00:59Z","revision_number":0,"project_id":"4f44b0a1b5fe4a17b77cabcf20e9501b"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:00.190 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:00.191 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.191 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.192 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.192 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.192 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.192 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.193 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.193 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.193 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.193 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.194 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.194 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.194 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.194 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.195 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.195 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.195 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.195 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.196 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.196 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.196 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.196 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.196 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.197 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.197 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.197 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.197 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.198 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.198 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.198 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.198 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.198 40 INFO tempest.lib.common.rest_client [req-8a8a0a09-e3ee-45e0-a78d-5d3f9805545d ] Request (VolumeRbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc/volumes/aaf194c8-bbb3-481a-a89d-d81da24b838a 0.053s 2020-11-06 18:01:00.199 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.199 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.199 40 DEBUG tempest.lib.common.rest_client [req-8a8a0a09-e3ee-45e0-a78d-5d3f9805545d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-8a8a0a09-e3ee-45e0-a78d-5d3f9805545d', 'x-openstack-request-id': 'req-8a8a0a09-e3ee-45e0-a78d-5d3f9805545d', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/6783e84af29c412fb82aa0c1f57a42dc/volumes/aaf194c8-bbb3-481a-a89d-d81da24b838a'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume aaf194c8-bbb3-481a-a89d-d81da24b838a could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:00.199 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.199 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.199 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.200 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.200 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.200 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.200 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.200 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.201 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.201 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.201 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.201 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.202 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.202 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.202 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.202 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.203 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.203 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.203 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.204 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.204 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.204 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.204 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.205 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.205 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.205 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.205 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.206 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.206 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.206 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.207 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.207 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.207 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.207 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.207 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.208 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.208 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.208 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.208 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.209 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.209 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.209 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:00.210 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-multinic:add, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:00.329 40 INFO tempest.lib.common.rest_client [req-92da2d61-a78d-4c0b-a1b0-80ae2c2b731b ] Request (VolumeRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/f0f68e26f4a84ca492a5ea80b6591569 0.129s 2020-11-06 18:01:00.329 40 DEBUG tempest.lib.common.rest_client [req-92da2d61-a78d-4c0b-a1b0-80ae2c2b731b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-92da2d61-a78d-4c0b-a1b0-80ae2c2b731b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/f0f68e26f4a84ca492a5ea80b6591569'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:00.347 38 INFO tempest.lib.common.rest_client [req-b0be022f-c349-4169-8c37-cebe8a87b363 ] Request (MiscPolicyActionsNetworkRbacTest:test_add_fixed_ip): 200 GET http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface 0.137s 2020-11-06 18:01:00.348 38 DEBUG tempest.lib.common.rest_client [req-b0be022f-c349-4169-8c37-cebe8a87b363 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '287', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b0be022f-c349-4169-8c37-cebe8a87b363', 'x-compute-request-id': 'req-b0be022f-c349-4169-8c37-cebe8a87b363', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface'} Body: b'{"interfaceAttachments": [{"net_id": "f747eec6-c776-4af6-aa67-8eb73e88914e", "port_id": "1df0e979-f494-4217-a330-024aa7c0300e", "mac_addr": "fa:16:3e:b6:79:e7", "port_state": "ACTIVE", "fixed_ips": [{"subnet_id": "a7138c88-1746-4acf-b367-e81e790bf9d7", "ip_address": "192.168.120.7"}]}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:00.353 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:00.423 40 INFO tempest.lib.common.rest_client [req-47d6a5b3-5d17-42e0-9225-8742c4211783 ] Request (VolumeRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-11-06 18:01:00.424 40 DEBUG tempest.lib.common.rest_client [req-47d6a5b3-5d17-42e0-9225-8742c4211783 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-47d6a5b3-5d17-42e0-9225-8742c4211783', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["8AWtt7pzQNafF-2yeFPOPw"], "expires_at": "2020-11-06T19:01:00.000000Z", "issued_at": "2020-11-06T18:01:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:00.465 38 INFO tempest.lib.common.rest_client [req-e82fd191-0bc0-4a55-a1c3-10bf3dd8546c ] Request (MiscPolicyActionsNetworkRbacTest:test_add_fixed_ip): 200 GET http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles 0.110s 2020-11-06 18:01:00.465 38 DEBUG tempest.lib.common.rest_client [req-e82fd191-0bc0-4a55-a1c3-10bf3dd8546c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e82fd191-0bc0-4a55-a1c3-10bf3dd8546c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:00.551 38 INFO tempest.lib.common.rest_client [req-69778820-5c7f-4a9c-9120-fe2fe0158bf7 ] Request (MiscPolicyActionsNetworkRbacTest:test_add_fixed_ip): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:01:00.552 38 DEBUG tempest.lib.common.rest_client [req-69778820-5c7f-4a9c-9120-fe2fe0158bf7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6654', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-69778820-5c7f-4a9c-9120-fe2fe0158bf7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1db6819d47a748669464ad962e63976e", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843", "password_expires_at": null}, "audit_ids": ["PI0xmj2LSUGeN_X5oJDozQ"], "expires_at": "2020-11-06T19:01:00.000000Z", "issued_at": "2020-11-06T18:01:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a6 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:00.680 40 INFO tempest.lib.common.rest_client [req-c7571100-8302-4223-b31b-e90ec9ca26f2 ] Request (VolumeRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=6783e84af29c412fb82aa0c1f57a42dc&name=default 0.254s 2020-11-06 18:01:00.680 40 DEBUG tempest.lib.common.rest_client [req-c7571100-8302-4223-b31b-e90ec9ca26f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-c7571100-8302-4223-b31b-e90ec9ca26f2', 'date': 'Fri, 06 Nov 2020 18:01:00 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=6783e84af29c412fb82aa0c1f57a42dc&name=default'} Body: b'{"security_groups": [{"id": "39a19a58-a102-4c34-83eb-42062d94f227", "name": "default", "stateful": true, "tenant_id": "6783e84af29c412fb82aa0c1f57a42dc", "description": "Default security group", "security_group_rules": [{"id": "1d99ab68-3a2b-4a6e-b6f6-23fe5036a8f6", "tenant_id": "6783e84af29c412fb82aa0c1f57a42dc", "security_group_id": "39a19a58-a102-4c34-83eb-42062d94f227", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:01:00Z", "updated_at": "2020-11-06T18:01:00Z", "revision_number": 0, "project_id": "6783e84af29c412fb82aa0c1f57a42dc"}, {"id": "b3063325-4e9d-45ba-bc1a-415f9ff8c440", "tenant_id": "6783e84af29c412fb82aa0c1f57a42dc", "security_group_id": "39a19a58-a102-4c34-83eb-42062d94f227", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "39a19a58-a102-4c34-83eb-42062d94f227", "description": null, "tags": [], "created_at": "2020-11-06T18:01:00Z", "updated_at": "2020-11-06T18:01:00Z", "revision_number": 0, "project_id": "6783e84af29c412fb82aa0c1f57a42dc"}, {"id": "bc9e5687-a1d3-437f-a9be-e244ea00e90f", "tenant_id": "6783e84af29c412fb82aa0c1f57a42dc", "security_group_id": "39a19a58-a102-4c34-83eb-42062d94f227", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:01:00Z", "updated_at": "2020-11-06T18:01:00Z", "revision_number": 0, "project_id": "6783e84af29c412fb82aa0c1f57a42dc"}, {"id": "f6c2877e-71d0-43d1-a9a6-047b76986da7", "tenant_id": "6783e84af29c412fb82aa0c1f57a42dc", "security_group_id": "39a19a58-a102-4c34-83eb-42062d94f227", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "39a19a58-a102-4c34-83eb-42062d94f227", "description": null, "tags": [], "created_at": "2020-11-06T18:01:00Z", "updated_at": "2020-11-06T18:01:00Z", "revision_number": 0, "project_id": "6783e84af29c412fb82aa0c1f57a42dc"}], "tags": [], "created_at": "2020-11-06T18:01:00Z", "updated_at": "2020-11-06T18:01:00Z", "revision_number": 1, "project_id": "6783e84af29c412fb82aa0c1f57a42dc"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:00.736 38 INFO tempest.lib.common.rest_client [req-34a93e26-48e5-4c2b-8a0c-3ace697f3872 ] Request (MiscPolicyActionsNetworkRbacTest:test_add_fixed_ip): 202 POST http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/action 0.182s 2020-11-06 18:01:00.736 38 DEBUG tempest.lib.common.rest_client [req-34a93e26-48e5-4c2b-8a0c-3ace697f3872 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"addFixedIp": {"networkId": "f747eec6-c776-4af6-aa67-8eb73e88914e"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-34a93e26-48e5-4c2b-8a0c-3ace697f3872', 'x-compute-request-id': 'req-34a93e26-48e5-4c2b-8a0c-3ace697f3872', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:00.737 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:00.793 38 INFO tempest.lib.common.rest_client [req-33fc3232-5d87-4b43-9c2a-55fe039e285a ] Request (MiscPolicyActionsNetworkRbacTest:test_add_fixed_ip): 200 GET http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles 0.056s 2020-11-06 18:01:00.794 38 DEBUG tempest.lib.common.rest_client [req-33fc3232-5d87-4b43-9c2a-55fe039e285a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-33fc3232-5d87-4b43-9c2a-55fe039e285a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:00.831 38 INFO tempest.lib.common.rest_client [req-69cc331c-8b8a-4a75-84f5-df09b9fc4932 ] Request (MiscPolicyActionsNetworkRbacTest:test_add_fixed_ip): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:01:00.832 38 DEBUG tempest.lib.common.rest_client [req-69cc331c-8b8a-4a75-84f5-df09b9fc4932 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6654', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-69cc331c-8b8a-4a75-84f5-df09b9fc4932', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1db6819d47a748669464ad962e63976e", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843", "password_expires_at": null}, "audit_ids": ["YTd5n56YS5qsUzpCBeWtYQ"], "expires_at": "2020-11-06T19:01:00.000000Z", "issued_at": "2020-11-06T18:01:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a6 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:01.847 39 INFO tempest.lib.common.rest_client [req-edbe0423-1d36-4b30-a7a3-0c0f6fba4f8a ] Request (ServerActionsRbacTest:test_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 1.583s 2020-11-06 18:01:01.848 39 DEBUG tempest.lib.common.rest_client [req-edbe0423-1d36-4b30-a7a3-0c0f6fba4f8a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-edbe0423-1d36-4b30-a7a3-0c0f6fba4f8a', 'x-compute-request-id': 'req-edbe0423-1d36-4b30-a7a3-0c0f6fba4f8a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:00:59Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:53.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:01.864 39 INFO tempest.common.waiters [-] State transition "RESIZE/resize_prep" ==> "RESIZE/resize_migrating" after 5 second wait 2020-11-06 18:01:02.357 38 INFO tempest.lib.common.rest_client [req-bd5d5ac6-9a10-4330-ad53-8b41439159f4 ] Request (MiscPolicyActionsNetworkRbacTest:test_add_fixed_ip): 200 GET http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826 1.524s 2020-11-06 18:01:02.358 38 DEBUG tempest.lib.common.rest_client [req-bd5d5ac6-9a10-4330-ad53-8b41439159f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1739', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bd5d5ac6-9a10-4330-ad53-8b41439159f4', 'x-compute-request-id': 'req-bd5d5ac6-9a10-4330-ad53-8b41439159f4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826'} Body: b'{"server": {"id": "400f4368-ffc1-4bc4-8fe6-fddf93f90826", "name": "tempest-MiscPolicyActionsNetworkRbacTest-server-807842018", "status": "ACTIVE", "tenant_id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "user_id": "1db6819d47a748669464ad962e63976e", "metadata": {}, "hostId": "ece68e332f20fc5533900b2d7968634335d3e48777e967f3ff177a1f", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:50Z", "updated": "2020-11-06T18:00:58Z", "addresses": {"tempest-MiscPolicyActionsNetworkRbacTest-1290166897-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:b6:79:e7"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:57.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c9", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:02.377 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:02.377 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.378 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.378 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.379 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.379 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.379 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.380 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.380 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.381 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.381 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.381 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.382 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.382 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.382 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.383 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.383 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.383 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.384 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.384 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.384 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.385 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.385 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.385 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.385 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.386 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.386 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.386 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.387 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.387 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.387 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.387 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.387 40 INFO tempest.lib.common.rest_client [req-80e77e01-a5ba-44d0-b557-b204f9adfea5 ] Request (VolumeRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/39a19a58-a102-4c34-83eb-42062d94f227 1.705s 2020-11-06 18:01:02.388 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.388 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.388 40 DEBUG tempest.lib.common.rest_client [req-80e77e01-a5ba-44d0-b557-b204f9adfea5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-80e77e01-a5ba-44d0-b557-b204f9adfea5', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:01:02 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/39a19a58-a102-4c34-83eb-42062d94f227'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:02.388 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.388 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.389 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.389 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.389 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.390 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.390 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.390 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.390 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.391 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.391 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.391 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.391 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.392 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.392 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.392 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.393 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.393 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.393 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.393 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.394 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.394 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.394 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.395 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.395 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.395 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.395 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.396 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.396 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.396 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.397 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.397 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.397 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.398 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.398 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.398 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.398 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.399 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.399 37 INFO tempest.lib.common.rest_client [req-c3d84c7c-822a-4c0b-b25a-79143cbd7b82 ] Request (MigrateServerV225RbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45 1.197s 2020-11-06 18:01:02.399 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.399 37 DEBUG tempest.lib.common.rest_client [req-c3d84c7c-822a-4c0b-b25a-79143cbd7b82 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c3d84c7c-822a-4c0b-b25a-79143cbd7b82', 'x-compute-request-id': 'req-c3d84c7c-822a-4c0b-b25a-79143cbd7b82', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45'} Body: b'{"server": {"id": "d609c5d7-7c53-4853-a874-e6a5b166ad45", "name": "tempest-MigrateServerV225RbacTest-server-1545629045", "status": "ACTIVE", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "11963b972eb6d09f2649fda4ffdcbc396a903c992fbb1e9c0e251a47", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:08Z", "updated": "2020-11-06T18:01:01Z", "addresses": {"patrole_reader-net_30048f18-b96b-4343-a720-1173982b59b8": [{"version": 4, "addr": "192.168.120.180", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:54:42:29"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:28.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:02.399 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.399 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.400 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:02.401 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-attach-interfaces:create, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:02.401 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:02.451 38 INFO tempest.lib.common.rest_client [req-c497e82a-067a-4b14-928d-e6c7be8edbb7 ] Request (MiscPolicyActionsNetworkRbacTest:test_create_interface): 200 GET http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles 0.049s 2020-11-06 18:01:02.451 38 DEBUG tempest.lib.common.rest_client [req-c497e82a-067a-4b14-928d-e6c7be8edbb7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c497e82a-067a-4b14-928d-e6c7be8edbb7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:02.514 40 INFO tempest.lib.common.rest_client [req-60ccf7dd-541b-4f30-9663-6f2797e4829e ] Request (VolumeRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc 0.125s 2020-11-06 18:01:02.515 40 DEBUG tempest.lib.common.rest_client [req-60ccf7dd-541b-4f30-9663-6f2797e4829e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-60ccf7dd-541b-4f30-9663-6f2797e4829e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6783e84af29c412fb82aa0c1f57a42dc'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:02.535 38 INFO tempest.lib.common.rest_client [req-a09e280b-b915-47aa-b850-f728a87bc100 ] Request (MiscPolicyActionsNetworkRbacTest:test_create_interface): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 18:01:02.535 38 DEBUG tempest.lib.common.rest_client [req-a09e280b-b915-47aa-b850-f728a87bc100 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6654', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a09e280b-b915-47aa-b850-f728a87bc100', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1db6819d47a748669464ad962e63976e", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843", "password_expires_at": null}, "audit_ids": ["VRZAchjqRla4NVnB4ttNlg"], "expires_at": "2020-11-06T19:01:02.000000Z", "issued_at": "2020-11-06T18:01:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a6 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:02.608 40 INFO tempest.lib.common.rest_client [req-661592e5-df08-440f-8829-86e78e9e911f ] Request (FloatingIpsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-11-06 18:01:02.609 40 DEBUG tempest.lib.common.rest_client [req-661592e5-df08-440f-8829-86e78e9e911f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-661592e5-df08-440f-8829-86e78e9e911f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["hw9H0Ir9TeyHtEzDKy7nQA"], "expires_at": "2020-11-06T19:01:02.000000Z", "issued_at": "2020-11-06T18:01:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:02.661 40 INFO tempest.lib.common.rest_client [req-46f58a83-bf4d-4e3e-a954-b0b170a71382 ] Request (FloatingIpsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-11-06 18:01:02.662 40 DEBUG tempest.lib.common.rest_client [req-46f58a83-bf4d-4e3e-a954-b0b170a71382 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-46f58a83-bf4d-4e3e-a954-b0b170a71382', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["iPYWQPJ5QRG9genRD3x6Kg"], "expires_at": "2020-11-06T19:01:02.000000Z", "issued_at": "2020-11-06T18:01:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:02.721 40 INFO tempest.lib.common.rest_client [req-d702fb15-3ab8-4aa7-8f8a-12452cb5d232 ] Request (FloatingIpsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.058s 2020-11-06 18:01:02.721 40 DEBUG tempest.lib.common.rest_client [req-d702fb15-3ab8-4aa7-8f8a-12452cb5d232 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d702fb15-3ab8-4aa7-8f8a-12452cb5d232', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:02.802 40 INFO tempest.lib.common.rest_client [req-349dcde5-3099-4e8f-9e48-c73e14eb9f3f ] Request (FloatingIpsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.080s 2020-11-06 18:01:02.803 40 DEBUG tempest.lib.common.rest_client [req-349dcde5-3099-4e8f-9e48-c73e14eb9f3f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-FloatingIpsRbacTest-48598991-desc", "domain_id": "default", "name": "tempest-FloatingIpsRbacTest-48598991"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '372', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-349dcde5-3099-4e8f-9e48-c73e14eb9f3f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "e7d05d99cdc146be8da0847e45f60a2d", "name": "tempest-FloatingIpsRbacTest-48598991", "domain_id": "default", "description": "tempest-FloatingIpsRbacTest-48598991-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:02.926 40 INFO tempest.lib.common.rest_client [req-b5c7d7e7-067f-43b5-8c6e-93c2977eb530 ] Request (FloatingIpsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.121s 2020-11-06 18:01:02.926 40 DEBUG tempest.lib.common.rest_client [req-b5c7d7e7-067f-43b5-8c6e-93c2977eb530 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-FloatingIpsRbacTest-48598991", "password": "B1*wYT=rfvfLlDH", "project_id": "e7d05d99cdc146be8da0847e45f60a2d", "email": "tempest-FloatingIpsRbacTest-793907790@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '391', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b5c7d7e7-067f-43b5-8c6e-93c2977eb530', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "e7d05d99cdc146be8da0847e45f60a2d", "email": "tempest-FloatingIpsRbacTest-793907790@example.com", "id": "f1cf94a5d6644718b805d96ed06a5e60", "name": "tempest-FloatingIpsRbacTest-48598991", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/f1cf94a5d6644718b805d96ed06a5e60"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:02.973 40 INFO tempest.lib.common.rest_client [req-e95ef100-95a0-44a8-8cd0-01e14c5ac0f5 ] Request (FloatingIpsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.045s 2020-11-06 18:01:02.973 40 DEBUG tempest.lib.common.rest_client [req-e95ef100-95a0-44a8-8cd0-01e14c5ac0f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e95ef100-95a0-44a8-8cd0-01e14c5ac0f5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:03.023 40 INFO tempest.lib.common.rest_client [req-dce995d1-f5f6-40b0-b972-fd41a2efcad1 ] Request (FloatingIpsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.048s 2020-11-06 18:01:03.024 40 DEBUG tempest.lib.common.rest_client [req-dce995d1-f5f6-40b0-b972-fd41a2efcad1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dce995d1-f5f6-40b0-b972-fd41a2efcad1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:03.099 40 INFO tempest.lib.common.rest_client [req-89998a0c-6ce4-434c-8a0a-74d9e9954624 ] Request (FloatingIpsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles/72a4576c553448cd941b052c1ca0cf2d 0.074s 2020-11-06 18:01:03.100 40 DEBUG tempest.lib.common.rest_client [req-89998a0c-6ce4-434c-8a0a-74d9e9954624 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-89998a0c-6ce4-434c-8a0a-74d9e9954624', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:03.100 40 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FloatingIpsRbacTest-48598991', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'e7d05d99cdc146be8da0847e45f60a2d', 'project_name': 'tempest-FloatingIpsRbacTest-48598991', 'tenant_id': 'e7d05d99cdc146be8da0847e45f60a2d', 'tenant_name': 'tempest-FloatingIpsRbacTest-48598991', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'f1cf94a5d6644718b805d96ed06a5e60'}, Network: None, Subnet: None, Router: None 2020-11-06 18:01:03.101 40 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FloatingIpsRbacTest-48598991', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'e7d05d99cdc146be8da0847e45f60a2d', 'project_name': 'tempest-FloatingIpsRbacTest-48598991', 'tenant_id': 'e7d05d99cdc146be8da0847e45f60a2d', 'tenant_name': 'tempest-FloatingIpsRbacTest-48598991', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'f1cf94a5d6644718b805d96ed06a5e60'}, Network: None, Subnet: None, Router: None 2020-11-06 18:01:03.239 40 INFO tempest.lib.common.rest_client [req-53f56f09-5219-4aa8-8daf-33bca49b2ab1 ] Request (FloatingIpsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.128s 2020-11-06 18:01:03.239 40 DEBUG tempest.lib.common.rest_client [req-53f56f09-5219-4aa8-8daf-33bca49b2ab1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6565', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-53f56f09-5219-4aa8-8daf-33bca49b2ab1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f1cf94a5d6644718b805d96ed06a5e60", "name": "tempest-FloatingIpsRbacTest-48598991", "password_expires_at": null}, "audit_ids": ["36DLLFBVQQm_r0H0su9h1A"], "expires_at": "2020-11-06T19:01:03.000000Z", "issued_at": "2020-11-06T18:01:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e7d05d99cdc146be8da0847e45f60a2d", "name": "tempest-FloatingIpsRbacTest-48598991"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:03.247 39 INFO tempest.lib.common.rest_client [req-8e55816b-ec8a-4ab6-9044-f4d29dc849df ] Request (ServerActionsRbacTest:test_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.381s 2020-11-06 18:01:03.248 39 DEBUG tempest.lib.common.rest_client [req-8e55816b-ec8a-4ab6-9044-f4d29dc849df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8e55816b-ec8a-4ab6-9044-f4d29dc849df', 'x-compute-request-id': 'req-8e55816b-ec8a-4ab6-9044-f4d29dc849df', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:03Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:53.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_migrated", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:03.265 39 INFO tempest.common.waiters [-] State transition "RESIZE/resize_migrating" ==> "RESIZE/resize_migrated" after 7 second wait 2020-11-06 18:01:03.335 40 INFO tempest.lib.common.rest_client [req-a1141a5a-ee49-40f0-91d7-ba2a1a8ce9f4 ] Request (FloatingIpsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-11-06 18:01:03.336 40 DEBUG tempest.lib.common.rest_client [req-a1141a5a-ee49-40f0-91d7-ba2a1a8ce9f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a1141a5a-ee49-40f0-91d7-ba2a1a8ce9f4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["G7cYzT_WSJe49x64ndPWgA"], "expires_at": "2020-11-06T19:01:03.000000Z", "issued_at": "2020-11-06T18:01:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:03.388 40 INFO tempest.lib.common.rest_client [req-1b3ca774-d526-49f7-9fac-6cf8e0939b34 ] Request (FloatingIpsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-11-06 18:01:03.390 40 DEBUG tempest.lib.common.rest_client [req-1b3ca774-d526-49f7-9fac-6cf8e0939b34 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1b3ca774-d526-49f7-9fac-6cf8e0939b34', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["feVb8MOpRa22IcSjA12FOg"], "expires_at": "2020-11-06T19:01:03.000000Z", "issued_at": "2020-11-06T18:01:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:03.448 40 INFO tempest.lib.common.rest_client [req-f0d0533c-c2e6-4f6f-922c-c5bd2dd3d7bd ] Request (FloatingIpsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.057s 2020-11-06 18:01:03.449 40 DEBUG tempest.lib.common.rest_client [req-f0d0533c-c2e6-4f6f-922c-c5bd2dd3d7bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f0d0533c-c2e6-4f6f-922c-c5bd2dd3d7bd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:03.495 40 INFO tempest.lib.common.rest_client [req-314db00e-1c46-4ef1-a2cc-52d3d53df122 ] Request (FloatingIpsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.045s 2020-11-06 18:01:03.495 40 DEBUG tempest.lib.common.rest_client [req-314db00e-1c46-4ef1-a2cc-52d3d53df122 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-314db00e-1c46-4ef1-a2cc-52d3d53df122', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:03.496 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:01:03.496 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:03.588 37 INFO tempest.lib.common.rest_client [req-fef814bf-6d20-4a23-905f-47f87eacc46f ] Request (MigrateServerV225RbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45 0.177s 2020-11-06 18:01:03.589 37 DEBUG tempest.lib.common.rest_client [req-fef814bf-6d20-4a23-905f-47f87eacc46f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1522', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fef814bf-6d20-4a23-905f-47f87eacc46f', 'x-compute-request-id': 'req-fef814bf-6d20-4a23-905f-47f87eacc46f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45'} Body: b'{"server": {"id": "d609c5d7-7c53-4853-a874-e6a5b166ad45", "name": "tempest-MigrateServerV225RbacTest-server-1545629045", "status": "DELETED", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "user_id": "99a9d4e6d0ca480d8f91548cce415d39", "metadata": {}, "hostId": "11963b972eb6d09f2649fda4ffdcbc396a903c992fbb1e9c0e251a47", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:08Z", "updated": "2020-11-06T18:01:03Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:28.000000", "OS-SRV-USG:terminated_at": "2020-11-06T18:01:02.000000", "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "deleted", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:03.591 40 INFO tempest.lib.common.rest_client [req-920db969-0d33-4dea-9968-09b419f6ac85 ] Request (FloatingIpsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles 0.094s 2020-11-06 18:01:03.592 40 DEBUG tempest.lib.common.rest_client [req-920db969-0d33-4dea-9968-09b419f6ac85 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-920db969-0d33-4dea-9968-09b419f6ac85', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:03.604 37 INFO tempest.common.waiters [-] State transition "ACTIVE/None" ==> "DELETED/None" after 3 second wait 2020-11-06 18:01:03.647 40 INFO tempest.lib.common.rest_client [req-2a631c44-4634-496d-b9a0-b5b02e28c240 ] Request (FloatingIpsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles/72a4576c553448cd941b052c1ca0cf2d 0.054s 2020-11-06 18:01:03.648 40 DEBUG tempest.lib.common.rest_client [req-2a631c44-4634-496d-b9a0-b5b02e28c240 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2a631c44-4634-496d-b9a0-b5b02e28c240', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:03.759 40 INFO tempest.lib.common.rest_client [req-1a41a835-be4e-4966-a99e-873d7ed746b6 ] Request (FloatingIpsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles/a629c95d64b3416fb80ae90af4f69c05 0.111s 2020-11-06 18:01:03.760 40 DEBUG tempest.lib.common.rest_client [req-1a41a835-be4e-4966-a99e-873d7ed746b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1a41a835-be4e-4966-a99e-873d7ed746b6', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:04.512 39 INFO tempest.lib.common.rest_client [req-4d7a62d9-2034-4cfc-87b2-ba061217c98e ] Request (ServerActionsRbacTest:test_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.244s 2020-11-06 18:01:04.512 39 DEBUG tempest.lib.common.rest_client [req-4d7a62d9-2034-4cfc-87b2-ba061217c98e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4d7a62d9-2034-4cfc-87b2-ba061217c98e', 'x-compute-request-id': 'req-4d7a62d9-2034-4cfc-87b2-ba061217c98e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:03Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:53.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_migrated", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:04.667 37 INFO tempest.lib.common.rest_client [req-5b949ecb-784f-4063-a9de-0802135332b2 ] Request (MigrateServerV225RbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45 0.061s 2020-11-06 18:01:04.667 37 DEBUG tempest.lib.common.rest_client [req-5b949ecb-784f-4063-a9de-0802135332b2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-5b949ecb-784f-4063-a9de-0802135332b2', 'x-compute-request-id': 'req-5b949ecb-784f-4063-a9de-0802135332b2', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d609c5d7-7c53-4853-a874-e6a5b166ad45'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance d609c5d7-7c53-4853-a874-e6a5b166ad45 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:04.842 40 INFO tempest.lib.common.rest_client [req-26bc2d4b-b195-46c1-a893-81740bcd8c7c ] Request (FloatingIpsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-11-06 18:01:04.843 40 DEBUG tempest.lib.common.rest_client [req-26bc2d4b-b195-46c1-a893-81740bcd8c7c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-26bc2d4b-b195-46c1-a893-81740bcd8c7c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f1cf94a5d6644718b805d96ed06a5e60", "name": "tempest-FloatingIpsRbacTest-48598991", "password_expires_at": null}, "audit_ids": ["OQvvItgRQpy8HwCcObkOCQ"], "expires_at": "2020-11-06T19:01:04.000000Z", "issued_at": "2020-11-06T18:01:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e7d05d99cdc146be8da0847e45f60a2d", "name": "tempest-FloatingIpsRbacTest-48598991"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:04.898 37 INFO tempest.lib.common.rest_client [req-b998544a-2390-4428-b571-9102b569f812 ] Request (MigrateServerV225RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/99a9d4e6d0ca480d8f91548cce415d39 0.229s 2020-11-06 18:01:04.898 37 DEBUG tempest.lib.common.rest_client [req-b998544a-2390-4428-b571-9102b569f812 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b998544a-2390-4428-b571-9102b569f812', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/99a9d4e6d0ca480d8f91548cce415d39'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:04.993 37 INFO tempest.lib.common.rest_client [req-b192d0b5-026e-4d46-9ce6-147cc4ca35da ] Request (MigrateServerV225RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-11-06 18:01:04.994 37 DEBUG tempest.lib.common.rest_client [req-b192d0b5-026e-4d46-9ce6-147cc4ca35da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b192d0b5-026e-4d46-9ce6-147cc4ca35da', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["TxRAZT_jQwimLuY4OGfkeA"], "expires_at": "2020-11-06T19:01:04.000000Z", "issued_at": "2020-11-06T18:01:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:05.176 37 INFO tempest.lib.common.rest_client [req-3b0bf6e6-a5dc-410d-92bb-1a70f07771cb ] Request (MigrateServerV225RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=e8c4ea0aa616438d84be2a246c718bc3&name=default 0.180s 2020-11-06 18:01:05.176 37 DEBUG tempest.lib.common.rest_client [req-3b0bf6e6-a5dc-410d-92bb-1a70f07771cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-3b0bf6e6-a5dc-410d-92bb-1a70f07771cb', 'date': 'Fri, 06 Nov 2020 18:01:05 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=e8c4ea0aa616438d84be2a246c718bc3&name=default'} Body: b'{"security_groups": [{"id": "a0cb804c-240e-4cc1-bd4f-19627729d382", "name": "default", "stateful": true, "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "description": "Default security group", "security_group_rules": [{"id": "1d726933-9e4a-4e42-867c-717fb310e5db", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "security_group_id": "a0cb804c-240e-4cc1-bd4f-19627729d382", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "a0cb804c-240e-4cc1-bd4f-19627729d382", "description": null, "tags": [], "created_at": "2020-11-06T18:00:10Z", "updated_at": "2020-11-06T18:00:10Z", "revision_number": 0, "project_id": "e8c4ea0aa616438d84be2a246c718bc3"}, {"id": "253289e9-5c18-4749-b830-e813379e52c2", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "security_group_id": "a0cb804c-240e-4cc1-bd4f-19627729d382", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "a0cb804c-240e-4cc1-bd4f-19627729d382", "description": null, "tags": [], "created_at": "2020-11-06T18:00:10Z", "updated_at": "2020-11-06T18:00:10Z", "revision_number": 0, "project_id": "e8c4ea0aa616438d84be2a246c718bc3"}, {"id": "d09bcbe9-5f4f-4d75-911b-9bb82351a98d", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "security_group_id": "a0cb804c-240e-4cc1-bd4f-19627729d382", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:00:10Z", "updated_at": "2020-11-06T18:00:10Z", "revision_number": 0, "project_id": "e8c4ea0aa616438d84be2a246c718bc3"}, {"id": "f36169eb-3c33-43e0-b992-a3f97ed29504", "tenant_id": "e8c4ea0aa616438d84be2a246c718bc3", "security_group_id": "a0cb804c-240e-4cc1-bd4f-19627729d382", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:00:10Z", "updated_at": "2020-11-06T18:00:10Z", "revision_number": 0, "project_id": "e8c4ea0aa616438d84be2a246c718bc3"}], "tags": [], "created_at": "2020-11-06T18:00:10Z", "updated_at": "2020-11-06T18:00:10Z", "revision_number": 1, "project_id": "e8c4ea0aa616438d84be2a246c718bc3"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:05.354 37 INFO tempest.lib.common.rest_client [req-5d2c5884-c6be-410e-bd36-e71f3bbad7a5 ] Request (MigrateServerV225RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/a0cb804c-240e-4cc1-bd4f-19627729d382 0.177s 2020-11-06 18:01:05.355 37 DEBUG tempest.lib.common.rest_client [req-5d2c5884-c6be-410e-bd36-e71f3bbad7a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-5d2c5884-c6be-410e-bd36-e71f3bbad7a5', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:01:05 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/a0cb804c-240e-4cc1-bd4f-19627729d382'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:05.477 37 INFO tempest.lib.common.rest_client [req-4fe87a03-12e6-461f-b710-5e5bdfb33aa1 ] Request (MigrateServerV225RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/e8c4ea0aa616438d84be2a246c718bc3 0.121s 2020-11-06 18:01:05.477 37 DEBUG tempest.lib.common.rest_client [req-4fe87a03-12e6-461f-b710-5e5bdfb33aa1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4fe87a03-12e6-461f-b710-5e5bdfb33aa1', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e8c4ea0aa616438d84be2a246c718bc3'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:05.567 37 INFO tempest.lib.common.rest_client [req-e3cdf06c-9c26-41ad-9986-7379ce657b7d ] Request (ComputeServersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-11-06 18:01:05.568 37 DEBUG tempest.lib.common.rest_client [req-e3cdf06c-9c26-41ad-9986-7379ce657b7d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e3cdf06c-9c26-41ad-9986-7379ce657b7d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["tTGWV-Y_TPeiK0T1q0ga4A"], "expires_at": "2020-11-06T19:01:05.000000Z", "issued_at": "2020-11-06T18:01:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:05.612 37 INFO tempest.lib.common.rest_client [req-9fcee5fa-dcff-4155-9ee2-f15cd6c95a92 ] Request (ComputeServersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:01:05.612 37 DEBUG tempest.lib.common.rest_client [req-9fcee5fa-dcff-4155-9ee2-f15cd6c95a92 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9fcee5fa-dcff-4155-9ee2-f15cd6c95a92', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["51Vdm-yGTMOVBUiTO3JVAg"], "expires_at": "2020-11-06T19:01:05.000000Z", "issued_at": "2020-11-06T18:01:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:05.671 40 INFO tempest.lib.common.rest_client [req-bda3963c-0e6a-499b-a435-8a542d26cd11 ] Request (FloatingIpsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.826s 2020-11-06 18:01:05.671 37 INFO tempest.lib.common.rest_client [req-d8817433-ec39-4bc7-9bb3-de9d8178db40 ] Request (ComputeServersRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.058s 2020-11-06 18:01:05.671 37 DEBUG tempest.lib.common.rest_client [req-d8817433-ec39-4bc7-9bb3-de9d8178db40 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d8817433-ec39-4bc7-9bb3-de9d8178db40', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:05.671 40 DEBUG tempest.lib.common.rest_client [req-bda3963c-0e6a-499b-a435-8a542d26cd11 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-FloatingIpsRbacTest-test-network-2081541478", "router:external": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '739', 'x-openstack-request-id': 'req-bda3963c-0e6a-499b-a435-8a542d26cd11', 'date': 'Fri, 06 Nov 2020 18:01:05 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"9032b2ce-cbbb-4a60-94d2-43ec3738190b","name":"tempest-FloatingIpsRbacTest-test-network-2081541478","tenant_id":"e7d05d99cdc146be8da0847e45f60a2d","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"e7d05d99cdc146be8da0847e45f60a2d","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":true,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":53,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:01:05Z","updated_at":"2020-11-06T18:01:05Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:05.739 39 INFO tempest.lib.common.rest_client [req-d182614b-29bd-4d90-a8e8-34a662a6af86 ] Request (ServerActionsRbacTest:test_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.209s 2020-11-06 18:01:05.740 39 DEBUG tempest.lib.common.rest_client [req-d182614b-29bd-4d90-a8e8-34a662a6af86 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1729', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d182614b-29bd-4d90-a8e8-34a662a6af86', 'x-compute-request-id': 'req-d182614b-29bd-4d90-a8e8-34a662a6af86', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:04Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:53.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_finish", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:05.744 37 INFO tempest.lib.common.rest_client [req-502368d8-97d0-435a-bcf9-904a1bfdbe48 ] Request (ComputeServersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.072s 2020-11-06 18:01:05.745 37 DEBUG tempest.lib.common.rest_client [req-502368d8-97d0-435a-bcf9-904a1bfdbe48 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ComputeServersRbacTest-1376603226-desc", "domain_id": "default", "name": "tempest-ComputeServersRbacTest-1376603226"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '382', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-502368d8-97d0-435a-bcf9-904a1bfdbe48', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "738a797d686c408e8ceb6a8b32bc1d09", "name": "tempest-ComputeServersRbacTest-1376603226", "domain_id": "default", "description": "tempest-ComputeServersRbacTest-1376603226-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:05.755 39 INFO tempest.common.waiters [-] State transition "RESIZE/resize_migrated" ==> "RESIZE/resize_finish" after 9 second wait 2020-11-06 18:01:05.889 37 INFO tempest.lib.common.rest_client [req-a8a484e4-cf33-4125-ac79-e849e99b8b85 ] Request (ComputeServersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.142s 2020-11-06 18:01:05.889 37 DEBUG tempest.lib.common.rest_client [req-a8a484e4-cf33-4125-ac79-e849e99b8b85 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ComputeServersRbacTest-1376603226", "password": "T7~Y+AS0H4QrEA0", "project_id": "738a797d686c408e8ceb6a8b32bc1d09", "email": "tempest-ComputeServersRbacTest-1172203765@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '400', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a8a484e4-cf33-4125-ac79-e849e99b8b85', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "738a797d686c408e8ceb6a8b32bc1d09", "email": "tempest-ComputeServersRbacTest-1172203765@example.com", "id": "262f98552a3a4d8a8fba3f96d5a872bf", "name": "tempest-ComputeServersRbacTest-1376603226", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/262f98552a3a4d8a8fba3f96d5a872bf"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:05.935 37 INFO tempest.lib.common.rest_client [req-053bbf03-3c49-4367-b0cb-5fc71ded09cf ] Request (ComputeServersRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.045s 2020-11-06 18:01:05.936 37 DEBUG tempest.lib.common.rest_client [req-053bbf03-3c49-4367-b0cb-5fc71ded09cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-053bbf03-3c49-4367-b0cb-5fc71ded09cf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:05.984 37 INFO tempest.lib.common.rest_client [req-4160041e-776f-40dc-9986-a61a668f9bcd ] Request (ComputeServersRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.047s 2020-11-06 18:01:05.985 37 DEBUG tempest.lib.common.rest_client [req-4160041e-776f-40dc-9986-a61a668f9bcd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4160041e-776f-40dc-9986-a61a668f9bcd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:06.071 37 INFO tempest.lib.common.rest_client [req-e2d73f15-f2d7-4dc3-bb8c-f1eedbc046fe ] Request (ComputeServersRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles/72a4576c553448cd941b052c1ca0cf2d 0.085s 2020-11-06 18:01:06.071 37 DEBUG tempest.lib.common.rest_client [req-e2d73f15-f2d7-4dc3-bb8c-f1eedbc046fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e2d73f15-f2d7-4dc3-bb8c-f1eedbc046fe', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:06.072 37 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ComputeServersRbacTest-1376603226', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '738a797d686c408e8ceb6a8b32bc1d09', 'project_name': 'tempest-ComputeServersRbacTest-1376603226', 'tenant_id': '738a797d686c408e8ceb6a8b32bc1d09', 'tenant_name': 'tempest-ComputeServersRbacTest-1376603226', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '262f98552a3a4d8a8fba3f96d5a872bf'}, Network: None, Subnet: None, Router: None 2020-11-06 18:01:06.161 37 INFO tempest.lib.common.rest_client [req-aef3c795-ffc8-45bc-a5f7-2ac8cd6e4778 ] Request (ComputeServersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 18:01:06.161 37 DEBUG tempest.lib.common.rest_client [req-aef3c795-ffc8-45bc-a5f7-2ac8cd6e4778 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aef3c795-ffc8-45bc-a5f7-2ac8cd6e4778', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["c4yW0miJTQOZDsDeX_p-zg"], "expires_at": "2020-11-06T19:01:06.000000Z", "issued_at": "2020-11-06T18:01:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:06.716 37 INFO tempest.lib.common.rest_client [req-9d364759-8a7d-433b-a4e6-9da1d36a288c ] Request (ComputeServersRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.553s 2020-11-06 18:01:06.717 37 DEBUG tempest.lib.common.rest_client [req-9d364759-8a7d-433b-a4e6-9da1d36a288c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-ComputeServersRbacTest-1143895587-network", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09"}} Response - Headers: {'content-type': 'application/json', 'content-length': '738', 'x-openstack-request-id': 'req-9d364759-8a7d-433b-a4e6-9da1d36a288c', 'date': 'Fri, 06 Nov 2020 18:01:06 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"4c841a1c-655b-4758-ac88-8f8b657eda1b","name":"tempest-ComputeServersRbacTest-1143895587-network","tenant_id":"738a797d686c408e8ceb6a8b32bc1d09","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"738a797d686c408e8ceb6a8b32bc1d09","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":60,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:01:06Z","updated_at":"2020-11-06T18:01:06Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:07.007 39 INFO tempest.lib.common.rest_client [req-ec87d677-9129-4e2b-a40b-843c1bb60267 ] Request (ServerActionsRbacTest:test_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.249s 2020-11-06 18:01:07.007 39 DEBUG tempest.lib.common.rest_client [req-ec87d677-9129-4e2b-a40b-843c1bb60267 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1729', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ec87d677-9129-4e2b-a40b-843c1bb60267', 'x-compute-request-id': 'req-ec87d677-9129-4e2b-a40b-843c1bb60267', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:04Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:53.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_finish", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:07.354 37 INFO tempest.lib.common.rest_client [req-86377efa-5273-45ac-82ec-80b98b575dfb ] Request (ComputeServersRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.636s 2020-11-06 18:01:07.354 37 DEBUG tempest.lib.common.rest_client [req-86377efa-5273-45ac-82ec-80b98b575dfb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "4c841a1c-655b-4758-ac88-8f8b657eda1b", "cidr": "192.168.120.0/28", "name": "tempest-ComputeServersRbacTest-1143895587-subnet", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "enable_dhcp": false, "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '710', 'x-openstack-request-id': 'req-86377efa-5273-45ac-82ec-80b98b575dfb', 'date': 'Fri, 06 Nov 2020 18:01:07 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"6250e302-c932-4ed2-94fd-97f0293ed4e2","name":"tempest-ComputeServersRbacTest-1143895587-subnet","tenant_id":"738a797d686c408e8ceb6a8b32bc1d09","network_id":"4c841a1c-655b-4758-ac88-8f8b657eda1b","ip_version":4,"subnetpool_id":null,"enable_dhcp":false,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-11-06T18:01:06Z","updated_at":"2020-11-06T18:01:06Z","revision_number":0,"project_id":"738a797d686c408e8ceb6a8b32bc1d09"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:07.631 40 INFO tempest.lib.common.rest_client [req-c2fab4ea-69c4-4d55-9aeb-a44a4f517cba ] Request (FloatingIpsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 1.958s 2020-11-06 18:01:07.632 40 DEBUG tempest.lib.common.rest_client [req-c2fab4ea-69c4-4d55-9aeb-a44a4f517cba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "9032b2ce-cbbb-4a60-94d2-43ec3738190b", "cidr": "192.168.120.0/24", "ip_version": 4, "gateway_ip": "192.168.120.1"}} Response - Headers: {'content-type': 'application/json', 'content-length': '662', 'x-openstack-request-id': 'req-c2fab4ea-69c4-4d55-9aeb-a44a4f517cba', 'date': 'Fri, 06 Nov 2020 18:01:07 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"78483b93-83d1-4462-bc89-6531ae515095","name":"","tenant_id":"e7d05d99cdc146be8da0847e45f60a2d","network_id":"9032b2ce-cbbb-4a60-94d2-43ec3738190b","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/24","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.254"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-11-06T18:01:07Z","updated_at":"2020-11-06T18:01:07Z","revision_number":0,"project_id":"e7d05d99cdc146be8da0847e45f60a2d"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:07.633 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:07.667 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_floatingip, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:07.673 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:07.734 40 INFO tempest.lib.common.rest_client [req-73f9d038-ff68-400f-a53f-2a05fe56cd75 ] Request (FloatingIpsRbacTest:test_create_floating_ip): 200 GET http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles 0.060s 2020-11-06 18:01:07.734 40 DEBUG tempest.lib.common.rest_client [req-73f9d038-ff68-400f-a53f-2a05fe56cd75 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-73f9d038-ff68-400f-a53f-2a05fe56cd75', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:07.821 40 INFO tempest.lib.common.rest_client [req-4984148e-c6f2-4e5a-85b7-eb7f111db849 ] Request (FloatingIpsRbacTest:test_create_floating_ip): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:01:07.821 40 DEBUG tempest.lib.common.rest_client [req-4984148e-c6f2-4e5a-85b7-eb7f111db849 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4984148e-c6f2-4e5a-85b7-eb7f111db849', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f1cf94a5d6644718b805d96ed06a5e60", "name": "tempest-FloatingIpsRbacTest-48598991", "password_expires_at": null}, "audit_ids": ["pQYfuX0ERxSWBITf218vYg"], "expires_at": "2020-11-06T19:01:07.000000Z", "issued_at": "2020-11-06T18:01:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e7d05d99cdc146be8da0847e45f60a2d", "name": "tempest-FloatingIpsRbacTest-48598991"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:08.250 39 INFO tempest.lib.common.rest_client [req-29df70ce-ac69-494c-8e05-2323db3003d7 ] Request (ServerActionsRbacTest:test_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.230s 2020-11-06 18:01:08.251 39 DEBUG tempest.lib.common.rest_client [req-29df70ce-ac69-494c-8e05-2323db3003d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-29df70ce-ac69-494c-8e05-2323db3003d7', 'x-compute-request-id': 'req-29df70ce-ac69-494c-8e05-2323db3003d7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:08.268 39 INFO tempest.common.waiters [-] State transition "RESIZE/resize_finish" ==> "VERIFY_RESIZE/None" after 12 second wait 2020-11-06 18:01:08.268 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:08.325 39 INFO tempest.lib.common.rest_client [req-13d737e4-e0db-4764-aef1-22b6881b6605 ] Request (ServerActionsRbacTest:test_resize_server): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.056s 2020-11-06 18:01:08.326 39 DEBUG tempest.lib.common.rest_client [req-13d737e4-e0db-4764-aef1-22b6881b6605 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-13d737e4-e0db-4764-aef1-22b6881b6605', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:08.365 38 INFO tempest.lib.common.rest_client [req-790ffa16-4976-459a-bcbb-bfe9a21074ad ] Request (MiscPolicyActionsNetworkRbacTest:test_create_interface): 200 POST http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface 5.828s 2020-11-06 18:01:08.365 38 DEBUG tempest.lib.common.rest_client [req-790ffa16-4976-459a-bcbb-bfe9a21074ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"interfaceAttachment": {"net_id": "76f18a02-b98c-4b49-9ce2-560e504bc8a8"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '283', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-790ffa16-4976-459a-bcbb-bfe9a21074ad', 'x-compute-request-id': 'req-790ffa16-4976-459a-bcbb-bfe9a21074ad', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface'} Body: b'{"interfaceAttachment": {"net_id": "76f18a02-b98c-4b49-9ce2-560e504bc8a8", "port_id": "b386e888-0d40-4e63-a06c-4cd5ff436512", "mac_addr": "fa:16:3e:ef:84:ce", "port_state": "DOWN", "fixed_ips": [{"subnet_id": "7cc652b1-42a3-434f-8267-0b79a65decc2", "ip_address": "192.168.120.69"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:08.371 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:08.414 39 INFO tempest.lib.common.rest_client [req-ede04ab7-5d1d-4ba3-a74e-4256f9c749a6 ] Request (ServerActionsRbacTest:test_resize_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-11-06 18:01:08.415 39 DEBUG tempest.lib.common.rest_client [req-ede04ab7-5d1d-4ba3-a74e-4256f9c749a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ede04ab7-5d1d-4ba3-a74e-4256f9c749a6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["SSmyx3rITEypyuXMbVIMVQ"], "expires_at": "2020-11-06T19:01:08.000000Z", "issued_at": "2020-11-06T18:01:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:08.429 38 INFO tempest.lib.common.rest_client [req-8ec93c00-cb6b-4cb2-9b22-0916847feab9 ] Request (MiscPolicyActionsNetworkRbacTest:test_create_interface): 200 GET http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles 0.057s 2020-11-06 18:01:08.430 38 DEBUG tempest.lib.common.rest_client [req-8ec93c00-cb6b-4cb2-9b22-0916847feab9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8ec93c00-cb6b-4cb2-9b22-0916847feab9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:08.519 38 INFO tempest.lib.common.rest_client [req-4ac6282a-7fe0-4bd4-b7cd-aac4580e997f ] Request (MiscPolicyActionsNetworkRbacTest:test_create_interface): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 18:01:08.520 38 DEBUG tempest.lib.common.rest_client [req-4ac6282a-7fe0-4bd4-b7cd-aac4580e997f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6654', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4ac6282a-7fe0-4bd4-b7cd-aac4580e997f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1db6819d47a748669464ad962e63976e", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843", "password_expires_at": null}, "audit_ids": ["EWZgM3YgSLaTsQTsaLjXUQ"], "expires_at": "2020-11-06T19:01:08.000000Z", "issued_at": "2020-11-06T18:01:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a6 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:08.694 38 INFO tempest.lib.common.rest_client [req-89daba6e-c0eb-45b3-9099-1859ab914751 ] Request (MiscPolicyActionsNetworkRbacTest:test_create_interface): 200 GET http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface/b386e888-0d40-4e63-a06c-4cd5ff436512 0.172s 2020-11-06 18:01:08.695 38 DEBUG tempest.lib.common.rest_client [req-89daba6e-c0eb-45b3-9099-1859ab914751 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '283', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-89daba6e-c0eb-45b3-9099-1859ab914751', 'x-compute-request-id': 'req-89daba6e-c0eb-45b3-9099-1859ab914751', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface/b386e888-0d40-4e63-a06c-4cd5ff436512'} Body: b'{"interfaceAttachment": {"net_id": "76f18a02-b98c-4b49-9ce2-560e504bc8a8", "port_id": "b386e888-0d40-4e63-a06c-4cd5ff436512", "mac_addr": "fa:16:3e:ef:84:ce", "port_state": "DOWN", "fixed_ips": [{"subnet_id": "7cc652b1-42a3-434f-8267-0b79a65decc2", "ip_address": "192.168.120.69"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:08.810 39 INFO tempest.lib.common.rest_client [req-79226a63-e3f8-4e62-a4c6-4fce45a956b4 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.386s 2020-11-06 18:01:08.811 39 DEBUG tempest.lib.common.rest_client [req-79226a63-e3f8-4e62-a4c6-4fce45a956b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-79226a63-e3f8-4e62-a4c6-4fce45a956b4', 'x-compute-request-id': 'req-79226a63-e3f8-4e62-a4c6-4fce45a956b4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:08.890 37 INFO tempest.lib.common.rest_client [req-b006b98e-0be0-4b1d-ad93-07b1080f3abb ] Request (ComputeServersRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/routers 1.535s 2020-11-06 18:01:08.891 37 DEBUG tempest.lib.common.rest_client [req-b006b98e-0be0-4b1d-ad93-07b1080f3abb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-ComputeServersRbacTest-1143895587-router", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea"}}} Response - Headers: {'content-type': 'application/json', 'content-length': '812', 'x-openstack-request-id': 'req-b006b98e-0be0-4b1d-ad93-07b1080f3abb', 'date': 'Fri, 06 Nov 2020 18:01:08 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "66685dd3-d90a-40a2-9ca6-f10c83599b62", "name": "tempest-ComputeServersRbacTest-1143895587-router", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.168"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::123"}], "enable_snat": true}, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T18:01:07Z", "updated_at": "2020-11-06T18:01:08Z", "revision_number": 3, "project_id": "738a797d686c408e8ceb6a8b32bc1d09"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:09.760 40 INFO tempest.lib.common.rest_client [req-304e469e-a893-4811-a7d3-644fe473eb77 ] Request (FloatingIpsRbacTest:test_create_floating_ip): 201 POST http://172.30.13.94:9696/v2.0/floatingips 1.937s 2020-11-06 18:01:09.760 40 DEBUG tempest.lib.common.rest_client [req-304e469e-a893-4811-a7d3-644fe473eb77 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"floatingip": {"floating_network_id": "9032b2ce-cbbb-4a60-94d2-43ec3738190b"}} Response - Headers: {'content-type': 'application/json', 'content-length': '577', 'x-openstack-request-id': 'req-304e469e-a893-4811-a7d3-644fe473eb77', 'date': 'Fri, 06 Nov 2020 18:01:09 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/floatingips'} Body: b'{"floatingip": {"id": "e26d228e-64a7-49e5-bf35-3bb1aff0cf78", "tenant_id": "e7d05d99cdc146be8da0847e45f60a2d", "floating_ip_address": "192.168.120.82", "floating_network_id": "9032b2ce-cbbb-4a60-94d2-43ec3738190b", "router_id": null, "port_id": null, "fixed_ip_address": null, "status": "DOWN", "project_id": "e7d05d99cdc146be8da0847e45f60a2d", "description": "", "qos_policy_id": null, "port_details": null, "dns_domain": "", "dns_name": "", "port_forwardings": [], "tags": [], "created_at": "2020-11-06T18:01:09Z", "updated_at": "2020-11-06T18:01:09Z", "revision_number": 0}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:09.761 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:09.810 40 INFO tempest.lib.common.rest_client [req-91a4ef25-bd02-4139-ad78-e63f2b9a328f ] Request (FloatingIpsRbacTest:test_create_floating_ip): 200 GET http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles 0.048s 2020-11-06 18:01:09.811 40 DEBUG tempest.lib.common.rest_client [req-91a4ef25-bd02-4139-ad78-e63f2b9a328f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-91a4ef25-bd02-4139-ad78-e63f2b9a328f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:09.845 40 INFO tempest.lib.common.rest_client [req-129181b1-4775-4fcf-8ebe-8c4e6409d4f0 ] Request (FloatingIpsRbacTest:test_create_floating_ip): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:01:09.846 40 DEBUG tempest.lib.common.rest_client [req-129181b1-4775-4fcf-8ebe-8c4e6409d4f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-129181b1-4775-4fcf-8ebe-8c4e6409d4f0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f1cf94a5d6644718b805d96ed06a5e60", "name": "tempest-FloatingIpsRbacTest-48598991", "password_expires_at": null}, "audit_ids": ["uIaOtGQgRM2qHSDGRvFgig"], "expires_at": "2020-11-06T19:01:09.000000Z", "issued_at": "2020-11-06T18:01:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e7d05d99cdc146be8da0847e45f60a2d", "name": "tempest-FloatingIpsRbacTest-48598991"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:09.866 38 INFO tempest.lib.common.rest_client [req-1d90e2e0-d3fb-4a9e-ab5e-3409d99ffe18 ] Request (MiscPolicyActionsNetworkRbacTest:test_create_interface): 200 GET http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface/b386e888-0d40-4e63-a06c-4cd5ff436512 0.163s 2020-11-06 18:01:09.866 38 DEBUG tempest.lib.common.rest_client [req-1d90e2e0-d3fb-4a9e-ab5e-3409d99ffe18 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '283', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1d90e2e0-d3fb-4a9e-ab5e-3409d99ffe18', 'x-compute-request-id': 'req-1d90e2e0-d3fb-4a9e-ab5e-3409d99ffe18', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface/b386e888-0d40-4e63-a06c-4cd5ff436512'} Body: b'{"interfaceAttachment": {"net_id": "76f18a02-b98c-4b49-9ce2-560e504bc8a8", "port_id": "b386e888-0d40-4e63-a06c-4cd5ff436512", "mac_addr": "fa:16:3e:ef:84:ce", "port_state": "DOWN", "fixed_ips": [{"subnet_id": "7cc652b1-42a3-434f-8267-0b79a65decc2", "ip_address": "192.168.120.69"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:10.039 39 INFO tempest.lib.common.rest_client [req-eeae96b5-61b2-4ce4-a591-8383c45d790f ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.211s 2020-11-06 18:01:10.040 39 DEBUG tempest.lib.common.rest_client [req-eeae96b5-61b2-4ce4-a591-8383c45d790f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-eeae96b5-61b2-4ce4-a591-8383c45d790f', 'x-compute-request-id': 'req-eeae96b5-61b2-4ce4-a591-8383c45d790f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:10.580 40 INFO tempest.lib.common.rest_client [req-c7884df6-f450-4614-a673-fa8cb62886c1 ] Request (FloatingIpsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/floatingips/e26d228e-64a7-49e5-bf35-3bb1aff0cf78 0.732s 2020-11-06 18:01:10.581 40 DEBUG tempest.lib.common.rest_client [req-c7884df6-f450-4614-a673-fa8cb62886c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-c7884df6-f450-4614-a673-fa8cb62886c1', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:01:10 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/floatingips/e26d228e-64a7-49e5-bf35-3bb1aff0cf78'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:10.584 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:10.587 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_floatingip, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:10.588 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:10.591 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_floatingip:floating_ip_address, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:10.591 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:10.642 40 INFO tempest.lib.common.rest_client [req-71dce673-4a82-4676-9ff5-b93e00a455a4 ] Request (FloatingIpsRbacTest:test_create_floating_ip_floatingip_address): 200 GET http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles 0.049s 2020-11-06 18:01:10.643 40 DEBUG tempest.lib.common.rest_client [req-71dce673-4a82-4676-9ff5-b93e00a455a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-71dce673-4a82-4676-9ff5-b93e00a455a4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:10.682 40 INFO tempest.lib.common.rest_client [req-8def2fd4-91ac-4440-8918-0a1c48a8965e ] Request (FloatingIpsRbacTest:test_create_floating_ip_floatingip_address): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:01:10.683 40 DEBUG tempest.lib.common.rest_client [req-8def2fd4-91ac-4440-8918-0a1c48a8965e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8def2fd4-91ac-4440-8918-0a1c48a8965e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f1cf94a5d6644718b805d96ed06a5e60", "name": "tempest-FloatingIpsRbacTest-48598991", "password_expires_at": null}, "audit_ids": ["omT0HsowS7SgmeH2JAXgQQ"], "expires_at": "2020-11-06T19:01:10.000000Z", "issued_at": "2020-11-06T18:01:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e7d05d99cdc146be8da0847e45f60a2d", "name": "tempest-FloatingIpsRbacTest-48598991"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:11.075 38 INFO tempest.lib.common.rest_client [req-b3622de6-78ee-4a1f-8279-bd372db0caf6 ] Request (MiscPolicyActionsNetworkRbacTest:test_create_interface): 200 GET http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface/b386e888-0d40-4e63-a06c-4cd5ff436512 0.201s 2020-11-06 18:01:11.075 38 DEBUG tempest.lib.common.rest_client [req-b3622de6-78ee-4a1f-8279-bd372db0caf6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '285', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b3622de6-78ee-4a1f-8279-bd372db0caf6', 'x-compute-request-id': 'req-b3622de6-78ee-4a1f-8279-bd372db0caf6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface/b386e888-0d40-4e63-a06c-4cd5ff436512'} Body: b'{"interfaceAttachment": {"net_id": "76f18a02-b98c-4b49-9ce2-560e504bc8a8", "port_id": "b386e888-0d40-4e63-a06c-4cd5ff436512", "mac_addr": "fa:16:3e:ef:84:ce", "port_state": "ACTIVE", "fixed_ips": [{"subnet_id": "7cc652b1-42a3-434f-8267-0b79a65decc2", "ip_address": "192.168.120.69"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:11.158 38 INFO tempest.lib.common.rest_client [req-5fe4fd2b-c0be-407e-82a4-7f9193c94ca9 ] Request (MiscPolicyActionsNetworkRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface/b386e888-0d40-4e63-a06c-4cd5ff436512 0.076s 2020-11-06 18:01:11.159 38 DEBUG tempest.lib.common.rest_client [req-5fe4fd2b-c0be-407e-82a4-7f9193c94ca9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5fe4fd2b-c0be-407e-82a4-7f9193c94ca9', 'x-compute-request-id': 'req-5fe4fd2b-c0be-407e-82a4-7f9193c94ca9', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface/b386e888-0d40-4e63-a06c-4cd5ff436512'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:11.350 38 INFO tempest.lib.common.rest_client [req-a436f1dc-88f1-44e3-83c9-0f966dc502d1 ] Request (MiscPolicyActionsNetworkRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface 0.191s 2020-11-06 18:01:11.351 38 DEBUG tempest.lib.common.rest_client [req-a436f1dc-88f1-44e3-83c9-0f966dc502d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '636', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a436f1dc-88f1-44e3-83c9-0f966dc502d1', 'x-compute-request-id': 'req-a436f1dc-88f1-44e3-83c9-0f966dc502d1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface'} Body: b'{"interfaceAttachments": [{"net_id": "f747eec6-c776-4af6-aa67-8eb73e88914e", "port_id": "1df0e979-f494-4217-a330-024aa7c0300e", "mac_addr": "fa:16:3e:b6:79:e7", "port_state": "ACTIVE", "fixed_ips": [{"subnet_id": "a7138c88-1746-4acf-b367-e81e790bf9d7", "ip_address": "192.168.120.10"}, {"subnet_id": "a7138c88-1746-4acf-b367-e81e790bf9d7", "ip_address": "192.168.120.7"}]}, {"net_id": "76f18a02-b98c-4b49-9ce2-560e504bc8a8", "port_id": "b386e888-0d40-4e63-a06c-4cd5ff436512", "mac_addr": "fa:16:3e:ef:84:ce", "port_state": "ACTIVE", "fixed_ips": [{"subnet_id": "7cc652b1-42a3-434f-8267-0b79a65decc2", "ip_address": "192.168.120.69"}]}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:12.361 40 INFO tempest.lib.common.rest_client [req-a5229135-ec64-4c93-96e4-9ec9d2b30562 ] Request (FloatingIpsRbacTest:test_create_floating_ip_floatingip_address): 201 POST http://172.30.13.94:9696/v2.0/floatingips 1.677s 2020-11-06 18:01:12.362 40 DEBUG tempest.lib.common.rest_client [req-a5229135-ec64-4c93-96e4-9ec9d2b30562 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"floatingip": {"floating_network_id": "9032b2ce-cbbb-4a60-94d2-43ec3738190b", "floating_ip_address": "192.168.120.10"}} Response - Headers: {'content-type': 'application/json', 'content-length': '577', 'x-openstack-request-id': 'req-a5229135-ec64-4c93-96e4-9ec9d2b30562', 'date': 'Fri, 06 Nov 2020 18:01:12 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/floatingips'} Body: b'{"floatingip": {"id": "82c31905-7641-4e8a-89dd-cd951582daf8", "tenant_id": "e7d05d99cdc146be8da0847e45f60a2d", "floating_ip_address": "192.168.120.10", "floating_network_id": "9032b2ce-cbbb-4a60-94d2-43ec3738190b", "router_id": null, "port_id": null, "fixed_ip_address": null, "status": "DOWN", "project_id": "e7d05d99cdc146be8da0847e45f60a2d", "description": "", "qos_policy_id": null, "port_details": null, "dns_domain": "", "dns_name": "", "port_forwardings": [], "tags": [], "created_at": "2020-11-06T18:01:11Z", "updated_at": "2020-11-06T18:01:11Z", "revision_number": 0}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:12.362 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:12.418 40 INFO tempest.lib.common.rest_client [req-0af95a5f-d3ae-424e-adbd-ca6fd90fabcb ] Request (FloatingIpsRbacTest:test_create_floating_ip_floatingip_address): 200 GET http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles 0.055s 2020-11-06 18:01:12.419 40 DEBUG tempest.lib.common.rest_client [req-0af95a5f-d3ae-424e-adbd-ca6fd90fabcb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0af95a5f-d3ae-424e-adbd-ca6fd90fabcb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:12.453 40 INFO tempest.lib.common.rest_client [req-6f77c105-4655-4909-86bd-50747dfd30c8 ] Request (FloatingIpsRbacTest:test_create_floating_ip_floatingip_address): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:01:12.454 40 DEBUG tempest.lib.common.rest_client [req-6f77c105-4655-4909-86bd-50747dfd30c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6f77c105-4655-4909-86bd-50747dfd30c8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f1cf94a5d6644718b805d96ed06a5e60", "name": "tempest-FloatingIpsRbacTest-48598991", "password_expires_at": null}, "audit_ids": ["-cOkVkaSR--_rDJKd-ZMyw"], "expires_at": "2020-11-06T19:01:12.000000Z", "issued_at": "2020-11-06T18:01:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e7d05d99cdc146be8da0847e45f60a2d", "name": "tempest-FloatingIpsRbacTest-48598991"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:12.517 37 INFO tempest.lib.common.rest_client [req-f9f6672c-7bb9-4f21-8fc3-c727b5c1b77f ] Request (ComputeServersRbacTest:setUpClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/66685dd3-d90a-40a2-9ca6-f10c83599b62/add_router_interface 3.625s 2020-11-06 18:01:12.518 37 DEBUG tempest.lib.common.rest_client [req-f9f6672c-7bb9-4f21-8fc3-c727b5c1b77f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "6250e302-c932-4ed2-94fd-97f0293ed4e2"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-f9f6672c-7bb9-4f21-8fc3-c727b5c1b77f', 'date': 'Fri, 06 Nov 2020 18:01:12 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/66685dd3-d90a-40a2-9ca6-f10c83599b62/add_router_interface'} Body: b'{"id": "66685dd3-d90a-40a2-9ca6-f10c83599b62", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "port_id": "aba2e2f2-e103-4dab-a99a-9a211668106e", "network_id": "4c841a1c-655b-4758-ac88-8f8b657eda1b", "subnet_id": "6250e302-c932-4ed2-94fd-97f0293ed4e2", "subnet_ids": ["6250e302-c932-4ed2-94fd-97f0293ed4e2"]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:12.518 37 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ComputeServersRbacTest-1376603226', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '738a797d686c408e8ceb6a8b32bc1d09', 'project_name': 'tempest-ComputeServersRbacTest-1376603226', 'tenant_id': '738a797d686c408e8ceb6a8b32bc1d09', 'tenant_name': 'tempest-ComputeServersRbacTest-1376603226', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '262f98552a3a4d8a8fba3f96d5a872bf'}, Network: {'id': '4c841a1c-655b-4758-ac88-8f8b657eda1b', 'name': 'tempest-ComputeServersRbacTest-1143895587-network', 'tenant_id': '738a797d686c408e8ceb6a8b32bc1d09', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '738a797d686c408e8ceb6a8b32bc1d09', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 60, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T18:01:06Z', 'updated_at': '2020-11-06T18:01:06Z', 'revision_number': 1}, Subnet: {'id': '6250e302-c932-4ed2-94fd-97f0293ed4e2', 'name': 'tempest-ComputeServersRbacTest-1143895587-subnet', 'tenant_id': '738a797d686c408e8ceb6a8b32bc1d09', 'network_id': '4c841a1c-655b-4758-ac88-8f8b657eda1b', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-11-06T18:01:06Z', 'updated_at': '2020-11-06T18:01:06Z', 'revision_number': 0, 'project_id': '738a797d686c408e8ceb6a8b32bc1d09'}, Router: {'id': '66685dd3-d90a-40a2-9ca6-f10c83599b62', 'name': 'tempest-ComputeServersRbacTest-1143895587-router', 'tenant_id': '738a797d686c408e8ceb6a8b32bc1d09', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.168'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::123'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-11-06T18:01:07Z', 'updated_at': '2020-11-06T18:01:08Z', 'revision_number': 3, 'project_id': '738a797d686c408e8ceb6a8b32bc1d09'} 2020-11-06 18:01:12.616 39 INFO tempest.lib.common.rest_client [req-79dab439-c5f2-48c2-ab6d-5463c1f7884a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 1.563s 2020-11-06 18:01:12.617 39 DEBUG tempest.lib.common.rest_client [req-79dab439-c5f2-48c2-ab6d-5463c1f7884a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-79dab439-c5f2-48c2-ab6d-5463c1f7884a', 'x-compute-request-id': 'req-79dab439-c5f2-48c2-ab6d-5463c1f7884a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:12.648 37 INFO tempest.lib.common.rest_client [req-33a9a39e-1395-4793-a37b-5a47c618c0cc ] Request (ComputeServersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.118s 2020-11-06 18:01:12.649 37 DEBUG tempest.lib.common.rest_client [req-33a9a39e-1395-4793-a37b-5a47c618c0cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6575', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-33a9a39e-1395-4793-a37b-5a47c618c0cc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "262f98552a3a4d8a8fba3f96d5a872bf", "name": "tempest-ComputeServersRbacTest-1376603226", "password_expires_at": null}, "audit_ids": ["SYjcVHMiT5GnnOClw7p3pg"], "expires_at": "2020-11-06T19:01:12.000000Z", "issued_at": "2020-11-06T18:01:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "738a797d686c408e8ceb6a8b32bc1d09", "name": "tempest-ComputeServersRbacTest-1376603226"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http:/ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:12.689 37 INFO tempest.lib.common.rest_client [req-5eb57992-b17e-4b26-85bf-87a557943850 ] Request (ComputeServersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:01:12.690 37 DEBUG tempest.lib.common.rest_client [req-5eb57992-b17e-4b26-85bf-87a557943850 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5eb57992-b17e-4b26-85bf-87a557943850', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["SpmxOl2LTTKzG2B9IsoKxQ"], "expires_at": "2020-11-06T19:01:12.000000Z", "issued_at": "2020-11-06T18:01:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:12.751 37 INFO tempest.lib.common.rest_client [req-127b5eb4-eb24-4925-ad2c-c169608bf50e ] Request (ComputeServersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-11-06 18:01:12.751 37 DEBUG tempest.lib.common.rest_client [req-127b5eb4-eb24-4925-ad2c-c169608bf50e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-127b5eb4-eb24-4925-ad2c-c169608bf50e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["pS9mgbpITLmhmwejDcZyeQ"], "expires_at": "2020-11-06T19:01:12.000000Z", "issued_at": "2020-11-06T18:01:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:12.809 37 INFO tempest.lib.common.rest_client [req-f10d5e1e-61cc-4062-a204-aef848fc7ff4 ] Request (ComputeServersRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.057s 2020-11-06 18:01:12.810 37 DEBUG tempest.lib.common.rest_client [req-f10d5e1e-61cc-4062-a204-aef848fc7ff4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f10d5e1e-61cc-4062-a204-aef848fc7ff4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:12.866 37 INFO tempest.lib.common.rest_client [req-27f920b3-2134-461b-a6d5-3fa27e438370 ] Request (ComputeServersRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-11-06 18:01:12.867 37 DEBUG tempest.lib.common.rest_client [req-27f920b3-2134-461b-a6d5-3fa27e438370 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-27f920b3-2134-461b-a6d5-3fa27e438370', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:12.868 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:01:12.868 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:12.930 37 INFO tempest.lib.common.rest_client [req-34ba2d03-a849-4913-8af8-11799689996d ] Request (ComputeServersRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles 0.061s 2020-11-06 18:01:12.931 37 DEBUG tempest.lib.common.rest_client [req-34ba2d03-a849-4913-8af8-11799689996d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-34ba2d03-a849-4913-8af8-11799689996d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:12.998 37 INFO tempest.lib.common.rest_client [req-d6aa3b4d-50d0-49e1-8fd6-b4aa311f2713 ] Request (ComputeServersRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles/72a4576c553448cd941b052c1ca0cf2d 0.066s 2020-11-06 18:01:12.998 37 DEBUG tempest.lib.common.rest_client [req-d6aa3b4d-50d0-49e1-8fd6-b4aa311f2713 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d6aa3b4d-50d0-49e1-8fd6-b4aa311f2713', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:13.108 37 INFO tempest.lib.common.rest_client [req-e89eb7d3-2cb2-4aeb-9c05-670342cb686d ] Request (ComputeServersRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles/a629c95d64b3416fb80ae90af4f69c05 0.109s 2020-11-06 18:01:13.109 37 DEBUG tempest.lib.common.rest_client [req-e89eb7d3-2cb2-4aeb-9c05-670342cb686d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e89eb7d3-2cb2-4aeb-9c05-670342cb686d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:13.126 40 INFO tempest.lib.common.rest_client [req-00292a0c-a21c-41d3-932f-5548b985bf92 ] Request (FloatingIpsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/floatingips/82c31905-7641-4e8a-89dd-cd951582daf8 0.671s 2020-11-06 18:01:13.127 40 DEBUG tempest.lib.common.rest_client [req-00292a0c-a21c-41d3-932f-5548b985bf92 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-00292a0c-a21c-41d3-932f-5548b985bf92', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:01:13 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/floatingips/82c31905-7641-4e8a-89dd-cd951582daf8'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:13.129 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:13.132 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_floatingip, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:13.133 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:13.135 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_floatingip, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:13.338 38 INFO tempest.lib.common.rest_client [req-8d4b179a-ea4f-4d8d-b935-965213e3c8fa ] Request (MiscPolicyActionsNetworkRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface 0.978s 2020-11-06 18:01:13.339 38 DEBUG tempest.lib.common.rest_client [req-8d4b179a-ea4f-4d8d-b935-965213e3c8fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '634', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8d4b179a-ea4f-4d8d-b935-965213e3c8fa', 'x-compute-request-id': 'req-8d4b179a-ea4f-4d8d-b935-965213e3c8fa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface'} Body: b'{"interfaceAttachments": [{"net_id": "f747eec6-c776-4af6-aa67-8eb73e88914e", "port_id": "1df0e979-f494-4217-a330-024aa7c0300e", "mac_addr": "fa:16:3e:b6:79:e7", "port_state": "ACTIVE", "fixed_ips": [{"subnet_id": "a7138c88-1746-4acf-b367-e81e790bf9d7", "ip_address": "192.168.120.10"}, {"subnet_id": "a7138c88-1746-4acf-b367-e81e790bf9d7", "ip_address": "192.168.120.7"}]}, {"net_id": "76f18a02-b98c-4b49-9ce2-560e504bc8a8", "port_id": "b386e888-0d40-4e63-a06c-4cd5ff436512", "mac_addr": "fa:16:3e:ef:84:ce", "port_state": "DOWN", "fixed_ips": [{"subnet_id": "7cc652b1-42a3-434f-8267-0b79a65decc2", "ip_address": "192.168.120.69"}]}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:13.927 39 INFO tempest.lib.common.rest_client [req-7110634e-e926-4955-9409-d9f0d6da8081 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.293s 2020-11-06 18:01:13.928 39 DEBUG tempest.lib.common.rest_client [req-7110634e-e926-4955-9409-d9f0d6da8081 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7110634e-e926-4955-9409-d9f0d6da8081', 'x-compute-request-id': 'req-7110634e-e926-4955-9409-d9f0d6da8081', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:14.203 37 INFO tempest.lib.common.rest_client [req-69a42b96-7d07-480c-b29c-f79185ddc19e ] Request (ComputeServersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-11-06 18:01:14.204 37 DEBUG tempest.lib.common.rest_client [req-69a42b96-7d07-480c-b29c-f79185ddc19e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-69a42b96-7d07-480c-b29c-f79185ddc19e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "262f98552a3a4d8a8fba3f96d5a872bf", "name": "tempest-ComputeServersRbacTest-1376603226", "password_expires_at": null}, "audit_ids": ["-NBPIdJPQm-OzErXYp5tGw"], "expires_at": "2020-11-06T19:01:14.000000Z", "issued_at": "2020-11-06T18:01:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "738a797d686c408e8ceb6a8b32bc1d09", "name": "tempest-ComputeServersRbacTest-1376603226"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:14.260 37 INFO tempest.lib.common.rest_client [req-686b225b-d940-4540-9b82-32149d18d49a ] Request (ComputeServersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-11-06 18:01:14.261 37 DEBUG tempest.lib.common.rest_client [req-686b225b-d940-4540-9b82-32149d18d49a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-686b225b-d940-4540-9b82-32149d18d49a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "262f98552a3a4d8a8fba3f96d5a872bf", "name": "tempest-ComputeServersRbacTest-1376603226", "password_expires_at": null}, "audit_ids": ["Hq01HdoATemjSSdYmKI6ww"], "expires_at": "2020-11-06T19:01:14.000000Z", "issued_at": "2020-11-06T18:01:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "738a797d686c408e8ceb6a8b32bc1d09", "name": "tempest-ComputeServersRbacTest-1376603226"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:14.262 37 INFO tempest.lib.common.fixed_network [-] (ComputeServersRbacTest:setUpClass) Found network {'id': '4c841a1c-655b-4758-ac88-8f8b657eda1b', 'name': 'tempest-ComputeServersRbacTest-1143895587-network', 'tenant_id': '738a797d686c408e8ceb6a8b32bc1d09', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '738a797d686c408e8ceb6a8b32bc1d09', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 60, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T18:01:06Z', 'updated_at': '2020-11-06T18:01:06Z', 'revision_number': 1} available for tenant 2020-11-06 18:01:14.481 38 INFO tempest.lib.common.rest_client [req-add510b5-34b3-4b53-99c3-dcd23d7b1e1b ] Request (MiscPolicyActionsNetworkRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface 0.135s 2020-11-06 18:01:14.482 38 DEBUG tempest.lib.common.rest_client [req-add510b5-34b3-4b53-99c3-dcd23d7b1e1b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '374', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-add510b5-34b3-4b53-99c3-dcd23d7b1e1b', 'x-compute-request-id': 'req-add510b5-34b3-4b53-99c3-dcd23d7b1e1b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface'} Body: b'{"interfaceAttachments": [{"net_id": "f747eec6-c776-4af6-aa67-8eb73e88914e", "port_id": "1df0e979-f494-4217-a330-024aa7c0300e", "mac_addr": "fa:16:3e:b6:79:e7", "port_state": "ACTIVE", "fixed_ips": [{"subnet_id": "a7138c88-1746-4acf-b367-e81e790bf9d7", "ip_address": "192.168.120.10"}, {"subnet_id": "a7138c88-1746-4acf-b367-e81e790bf9d7", "ip_address": "192.168.120.7"}]}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:14.491 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:14.492 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.493 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.493 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.493 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.494 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.494 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.495 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.495 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.495 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.495 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.496 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.496 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.496 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.497 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.497 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.497 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.498 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.498 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.498 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.499 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.499 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.499 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.499 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.500 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.500 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.500 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.501 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.501 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.501 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.501 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.502 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.502 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.502 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.503 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.503 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.503 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.504 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.504 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.504 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.505 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.505 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.505 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.506 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.506 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.506 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.507 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.507 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.507 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.508 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.508 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.508 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.508 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.509 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.509 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.509 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.510 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.510 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.510 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.511 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.511 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.511 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.512 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.512 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.512 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.513 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.513 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.513 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.514 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.514 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.514 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.514 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.515 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.515 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.515 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.515 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:14.517 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-attach-interfaces:delete, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:15.215 37 INFO tempest.lib.common.rest_client [req-85e208e2-69f2-42b2-a3b6-dab83240f34d ] Request (ComputeServersRbacTest:setUpClass): 202 POST http://172.30.13.94/compute/v2.1/servers 0.952s 2020-11-06 18:01:15.216 37 DEBUG tempest.lib.common.rest_client [req-85e208e2-69f2-42b2-a3b6-dab83240f34d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-ComputeServersRbacTest-server-360935029", "imageRef": "56b368f6-9136-40ec-a04c-564d02c95e42", "flavorRef": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "networks": [{"uuid": "4c841a1c-655b-4758-ac88-8f8b657eda1b"}]}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-85e208e2-69f2-42b2-a3b6-dab83240f34d', 'x-compute-request-id': 'req-85e208e2-69f2-42b2-a3b6-dab83240f34d', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "ee273607-06e8-4025-a40f-63683e833b3e", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ee273607-06e8-4025-a40f-63683e833b3e"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "WwrNHPdewtS2"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:15.302 39 INFO tempest.lib.common.rest_client [req-8592856c-2d91-4a1d-bb62-6958198c7e4a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.356s 2020-11-06 18:01:15.302 39 DEBUG tempest.lib.common.rest_client [req-8592856c-2d91-4a1d-bb62-6958198c7e4a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8592856c-2d91-4a1d-bb62-6958198c7e4a', 'x-compute-request-id': 'req-8592856c-2d91-4a1d-bb62-6958198c7e4a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:15.405 37 INFO tempest.lib.common.rest_client [req-7b1c837c-fa4a-4fbd-bc97-dfdd86e733e9 ] Request (ComputeServersRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e 0.185s 2020-11-06 18:01:15.405 37 DEBUG tempest.lib.common.rest_client [req-7b1c837c-fa4a-4fbd-bc97-dfdd86e733e9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1397', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7b1c837c-fa4a-4fbd-bc97-dfdd86e733e9', 'x-compute-request-id': 'req-7b1c837c-fa4a-4fbd-bc97-dfdd86e733e9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e'} Body: b'{"server": {"id": "ee273607-06e8-4025-a40f-63683e833b3e", "name": "tempest-ComputeServersRbacTest-server-360935029", "status": "BUILD", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "user_id": "262f98552a3a4d8a8fba3f96d5a872bf", "metadata": {}, "hostId": "", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:01:15Z", "updated": "2020-11-06T18:01:15Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ee273607-06e8-4025-a40f-63683e833b3e"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:15.916 40 INFO tempest.lib.common.rest_client [req-996f43b4-7e52-4b17-9df9-921b5b84918c ] Request (FloatingIpsRbacTest:test_delete_floating_ip): 201 POST http://172.30.13.94:9696/v2.0/floatingips 2.780s 2020-11-06 18:01:15.917 40 DEBUG tempest.lib.common.rest_client [req-996f43b4-7e52-4b17-9df9-921b5b84918c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"floatingip": {"floating_network_id": "9032b2ce-cbbb-4a60-94d2-43ec3738190b"}} Response - Headers: {'content-type': 'application/json', 'content-length': '578', 'x-openstack-request-id': 'req-996f43b4-7e52-4b17-9df9-921b5b84918c', 'date': 'Fri, 06 Nov 2020 18:01:15 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/floatingips'} Body: b'{"floatingip": {"id": "c3815652-d21d-4ce8-b02e-a9f503337701", "tenant_id": "e7d05d99cdc146be8da0847e45f60a2d", "floating_ip_address": "192.168.120.233", "floating_network_id": "9032b2ce-cbbb-4a60-94d2-43ec3738190b", "router_id": null, "port_id": null, "fixed_ip_address": null, "status": "DOWN", "project_id": "e7d05d99cdc146be8da0847e45f60a2d", "description": "", "qos_policy_id": null, "port_details": null, "dns_domain": "", "dns_name": "", "port_forwardings": [], "tags": [], "created_at": "2020-11-06T18:01:15Z", "updated_at": "2020-11-06T18:01:15Z", "revision_number": 0}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:15.918 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:16.025 40 INFO tempest.lib.common.rest_client [req-90f05c38-68f6-44a6-ba0d-1dbfcd8d9772 ] Request (FloatingIpsRbacTest:test_delete_floating_ip): 200 GET http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles 0.106s 2020-11-06 18:01:16.026 40 DEBUG tempest.lib.common.rest_client [req-90f05c38-68f6-44a6-ba0d-1dbfcd8d9772 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-90f05c38-68f6-44a6-ba0d-1dbfcd8d9772', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:16.136 40 INFO tempest.lib.common.rest_client [req-42129e34-3593-44f4-8bfc-d4e6cef167e6 ] Request (FloatingIpsRbacTest:test_delete_floating_ip): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.109s 2020-11-06 18:01:16.137 40 DEBUG tempest.lib.common.rest_client [req-42129e34-3593-44f4-8bfc-d4e6cef167e6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-42129e34-3593-44f4-8bfc-d4e6cef167e6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f1cf94a5d6644718b805d96ed06a5e60", "name": "tempest-FloatingIpsRbacTest-48598991", "password_expires_at": null}, "audit_ids": ["vyFqqqU9SyqTQy9rxfgAnw"], "expires_at": "2020-11-06T19:01:16.000000Z", "issued_at": "2020-11-06T18:01:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e7d05d99cdc146be8da0847e45f60a2d", "name": "tempest-FloatingIpsRbacTest-48598991"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:16.582 37 INFO tempest.lib.common.rest_client [req-e0ba7e27-0af3-4531-860e-0694d918a069 ] Request (ComputeServersRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e 0.164s 2020-11-06 18:01:16.583 37 DEBUG tempest.lib.common.rest_client [req-e0ba7e27-0af3-4531-860e-0694d918a069 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1484', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e0ba7e27-0af3-4531-860e-0694d918a069', 'x-compute-request-id': 'req-e0ba7e27-0af3-4531-860e-0694d918a069', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e'} Body: b'{"server": {"id": "ee273607-06e8-4025-a40f-63683e833b3e", "name": "tempest-ComputeServersRbacTest-server-360935029", "status": "BUILD", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "user_id": "262f98552a3a4d8a8fba3f96d5a872bf", "metadata": {}, "hostId": "72aa4147e128daa70511a3b03038cad49752a08b0327f6bc0c6decc0", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:01:15Z", "updated": "2020-11-06T18:01:16Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ee273607-06e8-4025-a40f-63683e833b3e"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033cb", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:16.601 37 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/None" after 1 second wait 2020-11-06 18:01:16.684 39 INFO tempest.lib.common.rest_client [req-2f0b85e2-a5f3-4492-a878-1ced22204861 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.367s 2020-11-06 18:01:16.685 39 DEBUG tempest.lib.common.rest_client [req-2f0b85e2-a5f3-4492-a878-1ced22204861 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2f0b85e2-a5f3-4492-a878-1ced22204861', 'x-compute-request-id': 'req-2f0b85e2-a5f3-4492-a878-1ced22204861', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:16.944 40 INFO tempest.lib.common.rest_client [req-8bef0964-acf4-4f38-82f6-18f85750b268 ] Request (FloatingIpsRbacTest:test_delete_floating_ip): 204 DELETE http://172.30.13.94:9696/v2.0/floatingips/c3815652-d21d-4ce8-b02e-a9f503337701 0.806s 2020-11-06 18:01:16.945 40 DEBUG tempest.lib.common.rest_client [req-8bef0964-acf4-4f38-82f6-18f85750b268 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-8bef0964-acf4-4f38-82f6-18f85750b268', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:01:16 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/floatingips/c3815652-d21d-4ce8-b02e-a9f503337701'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:16.945 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:17.001 40 INFO tempest.lib.common.rest_client [req-c7648535-a9ac-487d-9c10-c1ec71578479 ] Request (FloatingIpsRbacTest:test_delete_floating_ip): 200 GET http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles 0.054s 2020-11-06 18:01:17.001 40 DEBUG tempest.lib.common.rest_client [req-c7648535-a9ac-487d-9c10-c1ec71578479 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c7648535-a9ac-487d-9c10-c1ec71578479', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:17.047 40 INFO tempest.lib.common.rest_client [req-d12fa2b5-b8f1-45f2-bcb8-055d37d8f89c ] Request (FloatingIpsRbacTest:test_delete_floating_ip): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-11-06 18:01:17.048 40 DEBUG tempest.lib.common.rest_client [req-d12fa2b5-b8f1-45f2-bcb8-055d37d8f89c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d12fa2b5-b8f1-45f2-bcb8-055d37d8f89c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f1cf94a5d6644718b805d96ed06a5e60", "name": "tempest-FloatingIpsRbacTest-48598991", "password_expires_at": null}, "audit_ids": ["dYC-OASsToeyp3CDD4h8sw"], "expires_at": "2020-11-06T19:01:17.000000Z", "issued_at": "2020-11-06T18:01:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e7d05d99cdc146be8da0847e45f60a2d", "name": "tempest-FloatingIpsRbacTest-48598991"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:17.244 40 INFO tempest.lib.common.rest_client [req-47114278-b9e4-49de-977c-06718f44ac8d ] Request (FloatingIpsRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94:9696/v2.0/floatingips/c3815652-d21d-4ce8-b02e-a9f503337701 0.195s 2020-11-06 18:01:17.245 40 DEBUG tempest.lib.common.rest_client [req-47114278-b9e4-49de-977c-06718f44ac8d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '144', 'x-openstack-request-id': 'req-47114278-b9e4-49de-977c-06718f44ac8d', 'date': 'Fri, 06 Nov 2020 18:01:17 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/floatingips/c3815652-d21d-4ce8-b02e-a9f503337701'} Body: b'{"NeutronError": {"type": "FloatingIPNotFound", "message": "Floating IP c3815652-d21d-4ce8-b02e-a9f503337701 could not be found", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:17.247 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:17.251 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_floatingip, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:17.899 37 INFO tempest.lib.common.rest_client [req-eae56c86-cc49-44f2-b7e3-b934e06401d9 ] Request (ComputeServersRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e 0.295s 2020-11-06 18:01:17.899 37 DEBUG tempest.lib.common.rest_client [req-eae56c86-cc49-44f2-b7e3-b934e06401d9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-eae56c86-cc49-44f2-b7e3-b934e06401d9', 'x-compute-request-id': 'req-eae56c86-cc49-44f2-b7e3-b934e06401d9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e'} Body: b'{"server": {"id": "ee273607-06e8-4025-a40f-63683e833b3e", "name": "tempest-ComputeServersRbacTest-server-360935029", "status": "BUILD", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "user_id": "262f98552a3a4d8a8fba3f96d5a872bf", "metadata": {}, "hostId": "72aa4147e128daa70511a3b03038cad49752a08b0327f6bc0c6decc0", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:01:15Z", "updated": "2020-11-06T18:01:17Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ee273607-06e8-4025-a40f-63683e833b3e"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033cb", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:17.909 37 INFO tempest.common.waiters [-] State transition "BUILD/None" ==> "BUILD/spawning" after 2 second wait 2020-11-06 18:01:18.085 39 INFO tempest.lib.common.rest_client [req-1f2aef4e-66d7-4245-83fa-790faf4e2ba8 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.383s 2020-11-06 18:01:18.086 39 DEBUG tempest.lib.common.rest_client [req-1f2aef4e-66d7-4245-83fa-790faf4e2ba8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1f2aef4e-66d7-4245-83fa-790faf4e2ba8', 'x-compute-request-id': 'req-1f2aef4e-66d7-4245-83fa-790faf4e2ba8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:19.221 37 INFO tempest.lib.common.rest_client [req-9f3d458f-94db-4a63-ae00-48c496b334c8 ] Request (ComputeServersRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e 0.310s 2020-11-06 18:01:19.221 37 DEBUG tempest.lib.common.rest_client [req-9f3d458f-94db-4a63-ae00-48c496b334c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9f3d458f-94db-4a63-ae00-48c496b334c8', 'x-compute-request-id': 'req-9f3d458f-94db-4a63-ae00-48c496b334c8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e'} Body: b'{"server": {"id": "ee273607-06e8-4025-a40f-63683e833b3e", "name": "tempest-ComputeServersRbacTest-server-360935029", "status": "BUILD", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "user_id": "262f98552a3a4d8a8fba3f96d5a872bf", "metadata": {}, "hostId": "72aa4147e128daa70511a3b03038cad49752a08b0327f6bc0c6decc0", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:01:15Z", "updated": "2020-11-06T18:01:17Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ee273607-06e8-4025-a40f-63683e833b3e"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033cb", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:19.292 40 INFO tempest.lib.common.rest_client [req-f3b20e34-984d-48f2-bd9d-235bfbfcae98 ] Request (FloatingIpsRbacTest:test_list_floating_ips): 201 POST http://172.30.13.94:9696/v2.0/floatingips 2.040s 2020-11-06 18:01:19.292 40 DEBUG tempest.lib.common.rest_client [req-f3b20e34-984d-48f2-bd9d-235bfbfcae98 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"floatingip": {"floating_network_id": "9032b2ce-cbbb-4a60-94d2-43ec3738190b"}} Response - Headers: {'content-type': 'application/json', 'content-length': '577', 'x-openstack-request-id': 'req-f3b20e34-984d-48f2-bd9d-235bfbfcae98', 'date': 'Fri, 06 Nov 2020 18:01:19 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/floatingips'} Body: b'{"floatingip": {"id": "147b9cd9-2fb2-4a98-a21f-55580aeeb086", "tenant_id": "e7d05d99cdc146be8da0847e45f60a2d", "floating_ip_address": "192.168.120.87", "floating_network_id": "9032b2ce-cbbb-4a60-94d2-43ec3738190b", "router_id": null, "port_id": null, "fixed_ip_address": null, "status": "DOWN", "project_id": "e7d05d99cdc146be8da0847e45f60a2d", "description": "", "qos_policy_id": null, "port_details": null, "dns_domain": "", "dns_name": "", "port_forwardings": [], "tags": [], "created_at": "2020-11-06T18:01:18Z", "updated_at": "2020-11-06T18:01:18Z", "revision_number": 0}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:19.293 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:19.347 40 INFO tempest.lib.common.rest_client [req-40f9deac-46f0-4421-83a7-ce3e9a955ae3 ] Request (FloatingIpsRbacTest:test_list_floating_ips): 200 GET http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles 0.053s 2020-11-06 18:01:19.348 40 DEBUG tempest.lib.common.rest_client [req-40f9deac-46f0-4421-83a7-ce3e9a955ae3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-40f9deac-46f0-4421-83a7-ce3e9a955ae3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:19.382 40 INFO tempest.lib.common.rest_client [req-b91bd8a9-70e3-4766-8fa9-61c013e39b53 ] Request (FloatingIpsRbacTest:test_list_floating_ips): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:01:19.383 40 DEBUG tempest.lib.common.rest_client [req-b91bd8a9-70e3-4766-8fa9-61c013e39b53 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b91bd8a9-70e3-4766-8fa9-61c013e39b53', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f1cf94a5d6644718b805d96ed06a5e60", "name": "tempest-FloatingIpsRbacTest-48598991", "password_expires_at": null}, "audit_ids": ["sriGVhDiRHiRkT2HecqcQg"], "expires_at": "2020-11-06T19:01:19.000000Z", "issued_at": "2020-11-06T18:01:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e7d05d99cdc146be8da0847e45f60a2d", "name": "tempest-FloatingIpsRbacTest-48598991"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:19.631 40 INFO tempest.lib.common.rest_client [req-78c5b186-9a77-46c8-bb4a-42dd9c69a550 ] Request (FloatingIpsRbacTest:test_list_floating_ips): 200 GET http://172.30.13.94:9696/v2.0/floatingips?id=147b9cd9-2fb2-4a98-a21f-55580aeeb086 0.247s 2020-11-06 18:01:19.632 40 DEBUG tempest.lib.common.rest_client [req-78c5b186-9a77-46c8-bb4a-42dd9c69a550 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '580', 'x-openstack-request-id': 'req-78c5b186-9a77-46c8-bb4a-42dd9c69a550', 'date': 'Fri, 06 Nov 2020 18:01:19 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/floatingips?id=147b9cd9-2fb2-4a98-a21f-55580aeeb086'} Body: b'{"floatingips": [{"id": "147b9cd9-2fb2-4a98-a21f-55580aeeb086", "tenant_id": "e7d05d99cdc146be8da0847e45f60a2d", "floating_ip_address": "192.168.120.87", "floating_network_id": "9032b2ce-cbbb-4a60-94d2-43ec3738190b", "router_id": null, "port_id": null, "fixed_ip_address": null, "status": "DOWN", "description": "", "qos_policy_id": null, "port_details": null, "dns_domain": "", "dns_name": "", "port_forwardings": [], "tags": [], "created_at": "2020-11-06T18:01:18Z", "updated_at": "2020-11-06T18:01:18Z", "revision_number": 0, "project_id": "e7d05d99cdc146be8da0847e45f60a2d"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:19.632 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:19.675 40 INFO tempest.lib.common.rest_client [req-4ecdd0cb-5379-4ba7-9645-f2e1f10dc031 ] Request (FloatingIpsRbacTest:test_list_floating_ips): 200 GET http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles 0.041s 2020-11-06 18:01:19.675 40 DEBUG tempest.lib.common.rest_client [req-4ecdd0cb-5379-4ba7-9645-f2e1f10dc031 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4ecdd0cb-5379-4ba7-9645-f2e1f10dc031', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:19.709 40 INFO tempest.lib.common.rest_client [req-d41bdf6d-e5b4-44c6-b0df-9f107ab72b4a ] Request (FloatingIpsRbacTest:test_list_floating_ips): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:01:19.710 40 DEBUG tempest.lib.common.rest_client [req-d41bdf6d-e5b4-44c6-b0df-9f107ab72b4a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d41bdf6d-e5b4-44c6-b0df-9f107ab72b4a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f1cf94a5d6644718b805d96ed06a5e60", "name": "tempest-FloatingIpsRbacTest-48598991", "password_expires_at": null}, "audit_ids": ["6F152-h4SVSmZzkImhj7xA"], "expires_at": "2020-11-06T19:01:19.000000Z", "issued_at": "2020-11-06T18:01:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e7d05d99cdc146be8da0847e45f60a2d", "name": "tempest-FloatingIpsRbacTest-48598991"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:19.734 38 INFO tempest.lib.common.rest_client [req-daa2091d-1406-4a9b-933b-6984d10504d6 ] Request (MiscPolicyActionsNetworkRbacTest:test_delete_interface): 200 POST http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface 5.216s 2020-11-06 18:01:19.734 38 DEBUG tempest.lib.common.rest_client [req-daa2091d-1406-4a9b-933b-6984d10504d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"interfaceAttachment": {"net_id": "76f18a02-b98c-4b49-9ce2-560e504bc8a8"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '283', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-daa2091d-1406-4a9b-933b-6984d10504d6', 'x-compute-request-id': 'req-daa2091d-1406-4a9b-933b-6984d10504d6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface'} Body: b'{"interfaceAttachment": {"net_id": "76f18a02-b98c-4b49-9ce2-560e504bc8a8", "port_id": "5fe94406-b029-42c1-8f8d-0af4185f74c5", "mac_addr": "fa:16:3e:87:3f:21", "port_state": "DOWN", "fixed_ips": [{"subnet_id": "7cc652b1-42a3-434f-8267-0b79a65decc2", "ip_address": "192.168.120.55"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:19.883 38 INFO tempest.lib.common.rest_client [req-31b7055c-945d-40ee-8ad4-c8db0ac23825 ] Request (MiscPolicyActionsNetworkRbacTest:test_delete_interface): 200 GET http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface/5fe94406-b029-42c1-8f8d-0af4185f74c5 0.144s 2020-11-06 18:01:19.884 38 DEBUG tempest.lib.common.rest_client [req-31b7055c-945d-40ee-8ad4-c8db0ac23825 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '283', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-31b7055c-945d-40ee-8ad4-c8db0ac23825', 'x-compute-request-id': 'req-31b7055c-945d-40ee-8ad4-c8db0ac23825', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface/5fe94406-b029-42c1-8f8d-0af4185f74c5'} Body: b'{"interfaceAttachment": {"net_id": "76f18a02-b98c-4b49-9ce2-560e504bc8a8", "port_id": "5fe94406-b029-42c1-8f8d-0af4185f74c5", "mac_addr": "fa:16:3e:87:3f:21", "port_state": "DOWN", "fixed_ips": [{"subnet_id": "7cc652b1-42a3-434f-8267-0b79a65decc2", "ip_address": "192.168.120.55"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:20.539 40 INFO tempest.lib.common.rest_client [req-3db2f02a-edd2-407b-9c51-174a7af31e42 ] Request (FloatingIpsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/floatingips/147b9cd9-2fb2-4a98-a21f-55580aeeb086 0.828s 2020-11-06 18:01:20.540 40 DEBUG tempest.lib.common.rest_client [req-3db2f02a-edd2-407b-9c51-174a7af31e42 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-3db2f02a-edd2-407b-9c51-174a7af31e42', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:01:20 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/floatingips/147b9cd9-2fb2-4a98-a21f-55580aeeb086'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:20.542 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:20.545 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_floatingip, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:20.700 39 INFO tempest.lib.common.rest_client [req-578c532a-29e0-4e90-b745-5ccbc6ebbc8b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 1.597s 2020-11-06 18:01:20.701 39 DEBUG tempest.lib.common.rest_client [req-578c532a-29e0-4e90-b745-5ccbc6ebbc8b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-578c532a-29e0-4e90-b745-5ccbc6ebbc8b', 'x-compute-request-id': 'req-578c532a-29e0-4e90-b745-5ccbc6ebbc8b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:20.872 37 INFO tempest.lib.common.rest_client [req-2d704363-144c-4105-b3e1-d0ce9b2b9aa5 ] Request (ComputeServersRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e 0.635s 2020-11-06 18:01:20.872 37 DEBUG tempest.lib.common.rest_client [req-2d704363-144c-4105-b3e1-d0ce9b2b9aa5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2d704363-144c-4105-b3e1-d0ce9b2b9aa5', 'x-compute-request-id': 'req-2d704363-144c-4105-b3e1-d0ce9b2b9aa5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e'} Body: b'{"server": {"id": "ee273607-06e8-4025-a40f-63683e833b3e", "name": "tempest-ComputeServersRbacTest-server-360935029", "status": "BUILD", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "user_id": "262f98552a3a4d8a8fba3f96d5a872bf", "metadata": {}, "hostId": "72aa4147e128daa70511a3b03038cad49752a08b0327f6bc0c6decc0", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:01:15Z", "updated": "2020-11-06T18:01:17Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ee273607-06e8-4025-a40f-63683e833b3e"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033cb", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:21.017 38 INFO tempest.lib.common.rest_client [req-c4014473-db1b-4dc8-aac4-4fc3d88562ad ] Request (MiscPolicyActionsNetworkRbacTest:test_delete_interface): 200 GET http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface/5fe94406-b029-42c1-8f8d-0af4185f74c5 0.125s 2020-11-06 18:01:21.018 38 DEBUG tempest.lib.common.rest_client [req-c4014473-db1b-4dc8-aac4-4fc3d88562ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '285', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c4014473-db1b-4dc8-aac4-4fc3d88562ad', 'x-compute-request-id': 'req-c4014473-db1b-4dc8-aac4-4fc3d88562ad', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface/5fe94406-b029-42c1-8f8d-0af4185f74c5'} Body: b'{"interfaceAttachment": {"net_id": "76f18a02-b98c-4b49-9ce2-560e504bc8a8", "port_id": "5fe94406-b029-42c1-8f8d-0af4185f74c5", "mac_addr": "fa:16:3e:87:3f:21", "port_state": "ACTIVE", "fixed_ips": [{"subnet_id": "7cc652b1-42a3-434f-8267-0b79a65decc2", "ip_address": "192.168.120.55"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:21.025 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:21.088 38 INFO tempest.lib.common.rest_client [req-9a7912aa-fcd0-4bc6-b14c-aeea328ad738 ] Request (MiscPolicyActionsNetworkRbacTest:test_delete_interface): 200 GET http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles 0.062s 2020-11-06 18:01:21.089 38 DEBUG tempest.lib.common.rest_client [req-9a7912aa-fcd0-4bc6-b14c-aeea328ad738 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9a7912aa-fcd0-4bc6-b14c-aeea328ad738', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:21.178 38 INFO tempest.lib.common.rest_client [req-bb9c7180-e720-4a47-92e1-5e2894ad874d ] Request (MiscPolicyActionsNetworkRbacTest:test_delete_interface): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 18:01:21.178 38 DEBUG tempest.lib.common.rest_client [req-bb9c7180-e720-4a47-92e1-5e2894ad874d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6654', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bb9c7180-e720-4a47-92e1-5e2894ad874d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1db6819d47a748669464ad962e63976e", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843", "password_expires_at": null}, "audit_ids": ["vI0kKlnBT0Ky5-CMNTgdDA"], "expires_at": "2020-11-06T19:01:21.000000Z", "issued_at": "2020-11-06T18:01:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a6 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:21.313 38 INFO tempest.lib.common.rest_client [req-d632275b-ab51-48d5-a567-5ed528670b78 ] Request (MiscPolicyActionsNetworkRbacTest:test_delete_interface): 202 DELETE http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface/5fe94406-b029-42c1-8f8d-0af4185f74c5 0.133s 2020-11-06 18:01:21.314 38 DEBUG tempest.lib.common.rest_client [req-d632275b-ab51-48d5-a567-5ed528670b78 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d632275b-ab51-48d5-a567-5ed528670b78', 'x-compute-request-id': 'req-d632275b-ab51-48d5-a567-5ed528670b78', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface/5fe94406-b029-42c1-8f8d-0af4185f74c5'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:21.315 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:21.369 38 INFO tempest.lib.common.rest_client [req-5452de65-2afa-46be-832d-a407019897d5 ] Request (MiscPolicyActionsNetworkRbacTest:test_delete_interface): 200 GET http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles 0.054s 2020-11-06 18:01:21.370 38 DEBUG tempest.lib.common.rest_client [req-5452de65-2afa-46be-832d-a407019897d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5452de65-2afa-46be-832d-a407019897d5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:21.407 38 INFO tempest.lib.common.rest_client [req-f9424d1b-71ed-4672-99e3-fabf6f6543c7 ] Request (MiscPolicyActionsNetworkRbacTest:test_delete_interface): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:01:21.407 38 DEBUG tempest.lib.common.rest_client [req-f9424d1b-71ed-4672-99e3-fabf6f6543c7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6654', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f9424d1b-71ed-4672-99e3-fabf6f6543c7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1db6819d47a748669464ad962e63976e", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843", "password_expires_at": null}, "audit_ids": ["9aQWwhROT4mzn9CV5A6s2g"], "expires_at": "2020-11-06T19:01:21.000000Z", "issued_at": "2020-11-06T18:01:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a6 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:21.722 38 INFO tempest.lib.common.rest_client [req-99f4ffdf-0a50-453a-98c2-493ee351a190 ] Request (MiscPolicyActionsNetworkRbacTest:test_delete_interface): 200 GET http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface 0.312s 2020-11-06 18:01:21.723 38 DEBUG tempest.lib.common.rest_client [req-99f4ffdf-0a50-453a-98c2-493ee351a190 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '636', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-99f4ffdf-0a50-453a-98c2-493ee351a190', 'x-compute-request-id': 'req-99f4ffdf-0a50-453a-98c2-493ee351a190', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface'} Body: b'{"interfaceAttachments": [{"net_id": "f747eec6-c776-4af6-aa67-8eb73e88914e", "port_id": "1df0e979-f494-4217-a330-024aa7c0300e", "mac_addr": "fa:16:3e:b6:79:e7", "port_state": "ACTIVE", "fixed_ips": [{"subnet_id": "a7138c88-1746-4acf-b367-e81e790bf9d7", "ip_address": "192.168.120.10"}, {"subnet_id": "a7138c88-1746-4acf-b367-e81e790bf9d7", "ip_address": "192.168.120.7"}]}, {"net_id": "76f18a02-b98c-4b49-9ce2-560e504bc8a8", "port_id": "5fe94406-b029-42c1-8f8d-0af4185f74c5", "mac_addr": "fa:16:3e:87:3f:21", "port_state": "ACTIVE", "fixed_ips": [{"subnet_id": "7cc652b1-42a3-434f-8267-0b79a65decc2", "ip_address": "192.168.120.55"}]}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:21.821 40 INFO tempest.lib.common.rest_client [req-421c0ba0-1e10-48fa-b393-245a85ff45eb ] Request (FloatingIpsRbacTest:test_show_floating_ip): 201 POST http://172.30.13.94:9696/v2.0/floatingips 1.275s 2020-11-06 18:01:21.821 40 DEBUG tempest.lib.common.rest_client [req-421c0ba0-1e10-48fa-b393-245a85ff45eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"floatingip": {"floating_network_id": "9032b2ce-cbbb-4a60-94d2-43ec3738190b"}} Response - Headers: {'content-type': 'application/json', 'content-length': '578', 'x-openstack-request-id': 'req-421c0ba0-1e10-48fa-b393-245a85ff45eb', 'date': 'Fri, 06 Nov 2020 18:01:21 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/floatingips'} Body: b'{"floatingip": {"id": "8e2ce663-0ffc-4d25-8840-f565e234d824", "tenant_id": "e7d05d99cdc146be8da0847e45f60a2d", "floating_ip_address": "192.168.120.178", "floating_network_id": "9032b2ce-cbbb-4a60-94d2-43ec3738190b", "router_id": null, "port_id": null, "fixed_ip_address": null, "status": "DOWN", "project_id": "e7d05d99cdc146be8da0847e45f60a2d", "description": "", "qos_policy_id": null, "port_details": null, "dns_domain": "", "dns_name": "", "port_forwardings": [], "tags": [], "created_at": "2020-11-06T18:01:21Z", "updated_at": "2020-11-06T18:01:21Z", "revision_number": 0}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:21.822 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:21.872 40 INFO tempest.lib.common.rest_client [req-d70487b3-aed6-4861-9bd5-ecd63f88498f ] Request (FloatingIpsRbacTest:test_show_floating_ip): 200 GET http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles 0.049s 2020-11-06 18:01:21.873 40 DEBUG tempest.lib.common.rest_client [req-d70487b3-aed6-4861-9bd5-ecd63f88498f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d70487b3-aed6-4861-9bd5-ecd63f88498f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:21.894 39 INFO tempest.lib.common.rest_client [req-dadaca4b-a7e5-423d-85aa-b854084dde8e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.178s 2020-11-06 18:01:21.895 39 DEBUG tempest.lib.common.rest_client [req-dadaca4b-a7e5-423d-85aa-b854084dde8e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dadaca4b-a7e5-423d-85aa-b854084dde8e', 'x-compute-request-id': 'req-dadaca4b-a7e5-423d-85aa-b854084dde8e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:21.910 40 INFO tempest.lib.common.rest_client [req-c99f7902-c486-4556-93e0-820d1ef1cfff ] Request (FloatingIpsRbacTest:test_show_floating_ip): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:01:21.911 40 DEBUG tempest.lib.common.rest_client [req-c99f7902-c486-4556-93e0-820d1ef1cfff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c99f7902-c486-4556-93e0-820d1ef1cfff', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f1cf94a5d6644718b805d96ed06a5e60", "name": "tempest-FloatingIpsRbacTest-48598991", "password_expires_at": null}, "audit_ids": ["S_GdDbGZRGSzFmKa92Z6_g"], "expires_at": "2020-11-06T19:01:21.000000Z", "issued_at": "2020-11-06T18:01:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e7d05d99cdc146be8da0847e45f60a2d", "name": "tempest-FloatingIpsRbacTest-48598991"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:22.050 40 INFO tempest.lib.common.rest_client [req-a4b6431f-e4cc-4e1e-95d9-d8cc86deb242 ] Request (FloatingIpsRbacTest:test_show_floating_ip): 200 GET http://172.30.13.94:9696/v2.0/floatingips/8e2ce663-0ffc-4d25-8840-f565e234d824 0.138s 2020-11-06 18:01:22.051 40 DEBUG tempest.lib.common.rest_client [req-a4b6431f-e4cc-4e1e-95d9-d8cc86deb242 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '578', 'x-openstack-request-id': 'req-a4b6431f-e4cc-4e1e-95d9-d8cc86deb242', 'date': 'Fri, 06 Nov 2020 18:01:22 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/floatingips/8e2ce663-0ffc-4d25-8840-f565e234d824'} Body: b'{"floatingip": {"id": "8e2ce663-0ffc-4d25-8840-f565e234d824", "tenant_id": "e7d05d99cdc146be8da0847e45f60a2d", "floating_ip_address": "192.168.120.178", "floating_network_id": "9032b2ce-cbbb-4a60-94d2-43ec3738190b", "router_id": null, "port_id": null, "fixed_ip_address": null, "status": "DOWN", "description": "", "qos_policy_id": null, "port_details": null, "dns_domain": "", "dns_name": "", "port_forwardings": [], "tags": [], "created_at": "2020-11-06T18:01:21Z", "updated_at": "2020-11-06T18:01:21Z", "revision_number": 0, "project_id": "e7d05d99cdc146be8da0847e45f60a2d"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:22.052 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:22.102 37 INFO tempest.lib.common.rest_client [req-56854d2f-d82e-4f59-a8d7-bf7ef9d47746 ] Request (ComputeServersRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e 0.212s 2020-11-06 18:01:22.103 37 DEBUG tempest.lib.common.rest_client [req-56854d2f-d82e-4f59-a8d7-bf7ef9d47746 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-56854d2f-d82e-4f59-a8d7-bf7ef9d47746', 'x-compute-request-id': 'req-56854d2f-d82e-4f59-a8d7-bf7ef9d47746', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e'} Body: b'{"server": {"id": "ee273607-06e8-4025-a40f-63683e833b3e", "name": "tempest-ComputeServersRbacTest-server-360935029", "status": "BUILD", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "user_id": "262f98552a3a4d8a8fba3f96d5a872bf", "metadata": {}, "hostId": "72aa4147e128daa70511a3b03038cad49752a08b0327f6bc0c6decc0", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:01:15Z", "updated": "2020-11-06T18:01:17Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ee273607-06e8-4025-a40f-63683e833b3e"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033cb", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:22.113 40 INFO tempest.lib.common.rest_client [req-79855f9b-1c32-4a8b-86f6-cd1a07175e56 ] Request (FloatingIpsRbacTest:test_show_floating_ip): 200 GET http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles 0.060s 2020-11-06 18:01:22.114 40 DEBUG tempest.lib.common.rest_client [req-79855f9b-1c32-4a8b-86f6-cd1a07175e56 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-79855f9b-1c32-4a8b-86f6-cd1a07175e56', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:22.153 40 INFO tempest.lib.common.rest_client [req-05b2bbe8-d6f7-482c-a56c-238938ccd4d4 ] Request (FloatingIpsRbacTest:test_show_floating_ip): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:01:22.153 40 DEBUG tempest.lib.common.rest_client [req-05b2bbe8-d6f7-482c-a56c-238938ccd4d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-05b2bbe8-d6f7-482c-a56c-238938ccd4d4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f1cf94a5d6644718b805d96ed06a5e60", "name": "tempest-FloatingIpsRbacTest-48598991", "password_expires_at": null}, "audit_ids": ["eaYvsXhgQgqMVdbzrUgCSg"], "expires_at": "2020-11-06T19:01:22.000000Z", "issued_at": "2020-11-06T18:01:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e7d05d99cdc146be8da0847e45f60a2d", "name": "tempest-FloatingIpsRbacTest-48598991"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:22.903 38 INFO tempest.lib.common.rest_client [req-6b1cdd61-cd09-43c5-99e5-b116d1c468f7 ] Request (MiscPolicyActionsNetworkRbacTest:test_delete_interface): 200 GET http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface 0.169s 2020-11-06 18:01:22.903 38 DEBUG tempest.lib.common.rest_client [req-6b1cdd61-cd09-43c5-99e5-b116d1c468f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '374', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6b1cdd61-cd09-43c5-99e5-b116d1c468f7', 'x-compute-request-id': 'req-6b1cdd61-cd09-43c5-99e5-b116d1c468f7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface'} Body: b'{"interfaceAttachments": [{"net_id": "f747eec6-c776-4af6-aa67-8eb73e88914e", "port_id": "1df0e979-f494-4217-a330-024aa7c0300e", "mac_addr": "fa:16:3e:b6:79:e7", "port_state": "ACTIVE", "fixed_ips": [{"subnet_id": "a7138c88-1746-4acf-b367-e81e790bf9d7", "ip_address": "192.168.120.10"}, {"subnet_id": "a7138c88-1746-4acf-b367-e81e790bf9d7", "ip_address": "192.168.120.7"}]}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:22.988 38 INFO tempest.lib.common.rest_client [req-f41e2185-b377-4941-bf6e-68c316364272 ] Request (MiscPolicyActionsNetworkRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface/5fe94406-b029-42c1-8f8d-0af4185f74c5 0.077s 2020-11-06 18:01:22.988 38 DEBUG tempest.lib.common.rest_client [req-f41e2185-b377-4941-bf6e-68c316364272 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f41e2185-b377-4941-bf6e-68c316364272', 'x-compute-request-id': 'req-f41e2185-b377-4941-bf6e-68c316364272', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface/5fe94406-b029-42c1-8f8d-0af4185f74c5'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:23.141 39 INFO tempest.lib.common.rest_client [req-70a4f336-e5b7-4bbc-83f4-8a8e50a202fe ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.229s 2020-11-06 18:01:23.142 39 DEBUG tempest.lib.common.rest_client [req-70a4f336-e5b7-4bbc-83f4-8a8e50a202fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-70a4f336-e5b7-4bbc-83f4-8a8e50a202fe', 'x-compute-request-id': 'req-70a4f336-e5b7-4bbc-83f4-8a8e50a202fe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:23.147 38 INFO tempest.lib.common.rest_client [req-ec96c8e9-4684-4a98-a0a1-1868916d4bef ] Request (MiscPolicyActionsNetworkRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface 0.158s 2020-11-06 18:01:23.147 38 DEBUG tempest.lib.common.rest_client [req-ec96c8e9-4684-4a98-a0a1-1868916d4bef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '374', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ec96c8e9-4684-4a98-a0a1-1868916d4bef', 'x-compute-request-id': 'req-ec96c8e9-4684-4a98-a0a1-1868916d4bef', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface'} Body: b'{"interfaceAttachments": [{"net_id": "f747eec6-c776-4af6-aa67-8eb73e88914e", "port_id": "1df0e979-f494-4217-a330-024aa7c0300e", "mac_addr": "fa:16:3e:b6:79:e7", "port_state": "ACTIVE", "fixed_ips": [{"subnet_id": "a7138c88-1746-4acf-b367-e81e790bf9d7", "ip_address": "192.168.120.10"}, {"subnet_id": "a7138c88-1746-4acf-b367-e81e790bf9d7", "ip_address": "192.168.120.7"}]}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:23.158 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:23.159 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.160 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.160 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.161 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.161 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.162 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.162 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.162 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.163 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.163 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.163 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.164 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.164 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.164 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.164 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.165 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.165 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.165 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.166 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.166 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.166 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.167 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.167 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.167 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.167 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.168 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.168 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.168 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.169 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.169 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.169 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.169 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.170 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.170 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.170 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.171 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.171 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.171 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.171 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.172 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.172 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.172 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.173 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.173 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.173 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.173 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.174 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.174 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.174 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.175 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.175 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.175 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.176 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.176 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.176 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.176 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.177 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.177 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.177 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.178 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.178 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.178 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.179 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.179 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.179 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.180 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.180 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.180 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.180 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.181 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.181 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.181 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.182 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.182 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.182 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.183 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:ips:index, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:23.184 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:23.233 38 INFO tempest.lib.common.rest_client [req-b7360b9b-fff2-4e35-a2a8-5a45965ee4f0 ] Request (MiscPolicyActionsNetworkRbacTest:test_list_addresses): 200 GET http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles 0.048s 2020-11-06 18:01:23.233 38 DEBUG tempest.lib.common.rest_client [req-b7360b9b-fff2-4e35-a2a8-5a45965ee4f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b7360b9b-fff2-4e35-a2a8-5a45965ee4f0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:23.267 38 INFO tempest.lib.common.rest_client [req-180e9784-66ce-41ef-8323-4cd62ac6cb2e ] Request (MiscPolicyActionsNetworkRbacTest:test_list_addresses): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:01:23.267 38 DEBUG tempest.lib.common.rest_client [req-180e9784-66ce-41ef-8323-4cd62ac6cb2e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6654', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-180e9784-66ce-41ef-8323-4cd62ac6cb2e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1db6819d47a748669464ad962e63976e", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843", "password_expires_at": null}, "audit_ids": ["aDIj12TQQ5qIJbPza9OLpg"], "expires_at": "2020-11-06T19:01:23.000000Z", "issued_at": "2020-11-06T18:01:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a6 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:23.398 38 INFO tempest.lib.common.rest_client [req-55840e12-9ea5-44cc-8248-cf0b8fb8792c ] Request (MiscPolicyActionsNetworkRbacTest:test_list_addresses): 200 GET http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/ips 0.129s 2020-11-06 18:01:23.399 38 DEBUG tempest.lib.common.rest_client [req-55840e12-9ea5-44cc-8248-cf0b8fb8792c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '163', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-55840e12-9ea5-44cc-8248-cf0b8fb8792c', 'x-compute-request-id': 'req-55840e12-9ea5-44cc-8248-cf0b8fb8792c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/ips'} Body: b'{"addresses": {"tempest-MiscPolicyActionsNetworkRbacTest-1290166897-network": [{"version": 4, "addr": "192.168.120.10"}, {"version": 4, "addr": "192.168.120.7"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:23.404 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:23.452 38 INFO tempest.lib.common.rest_client [req-5a2ba71a-e8aa-4a2b-a890-6fd503a02690 ] Request (MiscPolicyActionsNetworkRbacTest:test_list_addresses): 200 GET http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles 0.047s 2020-11-06 18:01:23.452 38 DEBUG tempest.lib.common.rest_client [req-5a2ba71a-e8aa-4a2b-a890-6fd503a02690 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5a2ba71a-e8aa-4a2b-a890-6fd503a02690', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:23.481 38 INFO tempest.lib.common.rest_client [req-06048426-d429-4685-81d8-ef5489cb35ce ] Request (MiscPolicyActionsNetworkRbacTest:test_list_addresses): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.028s 2020-11-06 18:01:23.482 38 DEBUG tempest.lib.common.rest_client [req-06048426-d429-4685-81d8-ef5489cb35ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6654', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-06048426-d429-4685-81d8-ef5489cb35ce', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1db6819d47a748669464ad962e63976e", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843", "password_expires_at": null}, "audit_ids": ["MB3z-rGjR3-7UrWaSlXkzQ"], "expires_at": "2020-11-06T19:01:23.000000Z", "issued_at": "2020-11-06T18:01:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a6 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:23.486 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:23.486 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.487 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.487 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.488 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.488 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.489 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.489 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.490 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.490 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.490 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.491 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.491 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.492 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.492 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.492 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.493 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.493 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.493 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.494 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.494 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.495 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.495 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.495 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.496 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.496 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.496 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.497 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.497 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.497 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.498 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.498 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.498 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.499 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.499 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.499 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.499 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.500 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.500 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.500 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.501 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.501 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.501 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.502 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.502 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.502 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.502 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.503 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.503 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.503 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.504 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.504 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.504 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.505 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.505 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.505 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.505 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.506 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.506 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.506 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.507 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.507 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.508 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.508 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.508 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.508 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.509 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.509 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.509 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.510 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.510 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.510 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.510 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.511 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.511 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.511 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.512 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:ips:show, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:23.639 38 INFO tempest.lib.common.rest_client [req-0a171d8c-08b4-45bd-b71f-4f613b977ffd ] Request (MiscPolicyActionsNetworkRbacTest:test_list_addresses_by_network): 200 GET http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/ips 0.126s 2020-11-06 18:01:23.639 38 DEBUG tempest.lib.common.rest_client [req-0a171d8c-08b4-45bd-b71f-4f613b977ffd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '163', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0a171d8c-08b4-45bd-b71f-4f613b977ffd', 'x-compute-request-id': 'req-0a171d8c-08b4-45bd-b71f-4f613b977ffd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/ips'} Body: b'{"addresses": {"tempest-MiscPolicyActionsNetworkRbacTest-1290166897-network": [{"version": 4, "addr": "192.168.120.10"}, {"version": 4, "addr": "192.168.120.7"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:23.644 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:23.693 38 INFO tempest.lib.common.rest_client [req-09418410-03e7-451b-a584-e619ec266259 ] Request (MiscPolicyActionsNetworkRbacTest:test_list_addresses_by_network): 200 GET http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles 0.048s 2020-11-06 18:01:23.693 38 DEBUG tempest.lib.common.rest_client [req-09418410-03e7-451b-a584-e619ec266259 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-09418410-03e7-451b-a584-e619ec266259', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:23.728 38 INFO tempest.lib.common.rest_client [req-5a1104b0-accf-4499-9221-ff7be94ffbf9 ] Request (MiscPolicyActionsNetworkRbacTest:test_list_addresses_by_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:01:23.728 38 DEBUG tempest.lib.common.rest_client [req-5a1104b0-accf-4499-9221-ff7be94ffbf9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6654', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5a1104b0-accf-4499-9221-ff7be94ffbf9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1db6819d47a748669464ad962e63976e", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843", "password_expires_at": null}, "audit_ids": ["uTIFIMvKQZOiwmPW66-NIg"], "expires_at": "2020-11-06T19:01:23.000000Z", "issued_at": "2020-11-06T18:01:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a6 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:23.848 38 INFO tempest.lib.common.rest_client [req-63535fb8-c836-40a3-84ca-73dedf995dec ] Request (MiscPolicyActionsNetworkRbacTest:test_list_addresses_by_network): 200 GET http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/ips/tempest-MiscPolicyActionsNetworkRbacTest-1290166897-network 0.119s 2020-11-06 18:01:23.849 38 DEBUG tempest.lib.common.rest_client [req-63535fb8-c836-40a3-84ca-73dedf995dec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '148', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-63535fb8-c836-40a3-84ca-73dedf995dec', 'x-compute-request-id': 'req-63535fb8-c836-40a3-84ca-73dedf995dec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/ips/tempest-MiscPolicyActionsNetworkRbacTest-1290166897-network'} Body: b'{"tempest-MiscPolicyActionsNetworkRbacTest-1290166897-network": [{"version": 4, "addr": "192.168.120.10"}, {"version": 4, "addr": "192.168.120.7"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:23.853 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:23.902 38 INFO tempest.lib.common.rest_client [req-ee80e4f1-6320-4000-86ac-ba7e8c264633 ] Request (MiscPolicyActionsNetworkRbacTest:test_list_addresses_by_network): 200 GET http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles 0.048s 2020-11-06 18:01:23.903 38 DEBUG tempest.lib.common.rest_client [req-ee80e4f1-6320-4000-86ac-ba7e8c264633 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ee80e4f1-6320-4000-86ac-ba7e8c264633', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:23.935 38 INFO tempest.lib.common.rest_client [req-49a8fa1b-7ea2-475c-8426-0db7e0055b04 ] Request (MiscPolicyActionsNetworkRbacTest:test_list_addresses_by_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:01:23.936 38 DEBUG tempest.lib.common.rest_client [req-49a8fa1b-7ea2-475c-8426-0db7e0055b04 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6654', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-49a8fa1b-7ea2-475c-8426-0db7e0055b04', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1db6819d47a748669464ad962e63976e", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843", "password_expires_at": null}, "audit_ids": ["vyjlJHTjSV6dfnbbapfWOg"], "expires_at": "2020-11-06T19:01:23.000000Z", "issued_at": "2020-11-06T18:01:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a6 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:23.941 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:23.942 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.942 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.943 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.943 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.944 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.945 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.946 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.946 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.947 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.947 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.948 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.948 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.949 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.949 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.949 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.950 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.950 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.950 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.951 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.951 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.951 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.952 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.952 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.952 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.952 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.953 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.953 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.953 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.954 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.954 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.954 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.954 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.955 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.955 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.955 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.956 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.956 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.956 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.956 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.957 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.957 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.957 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.958 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.958 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.958 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.959 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.959 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.959 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.960 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.960 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.960 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.960 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.961 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.961 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.961 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.962 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.962 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.962 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.963 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.963 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.963 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.964 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.964 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.964 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.965 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.965 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.965 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.965 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.966 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.966 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.966 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.967 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.967 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.967 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.967 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:23.969 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-attach-interfaces:list, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:23.969 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:24.016 38 INFO tempest.lib.common.rest_client [req-0cd61576-fd84-44fe-8f3c-f7e9f7891e35 ] Request (MiscPolicyActionsNetworkRbacTest:test_list_interfaces): 200 GET http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles 0.046s 2020-11-06 18:01:24.017 38 DEBUG tempest.lib.common.rest_client [req-0cd61576-fd84-44fe-8f3c-f7e9f7891e35 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0cd61576-fd84-44fe-8f3c-f7e9f7891e35', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:24.050 38 INFO tempest.lib.common.rest_client [req-f3f29f3a-df57-425b-b73d-0168fa1564e4 ] Request (MiscPolicyActionsNetworkRbacTest:test_list_interfaces): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:01:24.050 38 DEBUG tempest.lib.common.rest_client [req-f3f29f3a-df57-425b-b73d-0168fa1564e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6654', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f3f29f3a-df57-425b-b73d-0168fa1564e4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1db6819d47a748669464ad962e63976e", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843", "password_expires_at": null}, "audit_ids": ["FNafUmsfSH-EiXhpaWCKlQ"], "expires_at": "2020-11-06T19:01:24.000000Z", "issued_at": "2020-11-06T18:01:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a6 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:24.310 38 INFO tempest.lib.common.rest_client [req-dd64f84f-c19f-4189-bbb1-40936e39a953 ] Request (MiscPolicyActionsNetworkRbacTest:test_list_interfaces): 200 GET http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface 0.258s 2020-11-06 18:01:24.310 38 DEBUG tempest.lib.common.rest_client [req-dd64f84f-c19f-4189-bbb1-40936e39a953 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '374', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dd64f84f-c19f-4189-bbb1-40936e39a953', 'x-compute-request-id': 'req-dd64f84f-c19f-4189-bbb1-40936e39a953', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface'} Body: b'{"interfaceAttachments": [{"net_id": "f747eec6-c776-4af6-aa67-8eb73e88914e", "port_id": "1df0e979-f494-4217-a330-024aa7c0300e", "mac_addr": "fa:16:3e:b6:79:e7", "port_state": "ACTIVE", "fixed_ips": [{"subnet_id": "a7138c88-1746-4acf-b367-e81e790bf9d7", "ip_address": "192.168.120.10"}, {"subnet_id": "a7138c88-1746-4acf-b367-e81e790bf9d7", "ip_address": "192.168.120.7"}]}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:24.316 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:24.368 38 INFO tempest.lib.common.rest_client [req-4e4d8f38-88a1-4ffc-95ca-987d40993ee4 ] Request (MiscPolicyActionsNetworkRbacTest:test_list_interfaces): 200 GET http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles 0.051s 2020-11-06 18:01:24.368 39 INFO tempest.lib.common.rest_client [req-63f1d7c4-7e70-45fd-9e9c-4dcbac06db3c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.210s 2020-11-06 18:01:24.369 38 DEBUG tempest.lib.common.rest_client [req-4e4d8f38-88a1-4ffc-95ca-987d40993ee4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4e4d8f38-88a1-4ffc-95ca-987d40993ee4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:24.369 39 DEBUG tempest.lib.common.rest_client [req-63f1d7c4-7e70-45fd-9e9c-4dcbac06db3c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-63f1d7c4-7e70-45fd-9e9c-4dcbac06db3c', 'x-compute-request-id': 'req-63f1d7c4-7e70-45fd-9e9c-4dcbac06db3c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:24.379 40 INFO tempest.lib.common.rest_client [req-ad9a9809-67bd-4099-8685-a171f74c7b68 ] Request (FloatingIpsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/floatingips/8e2ce663-0ffc-4d25-8840-f565e234d824 2.224s 2020-11-06 18:01:24.379 40 DEBUG tempest.lib.common.rest_client [req-ad9a9809-67bd-4099-8685-a171f74c7b68 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-ad9a9809-67bd-4099-8685-a171f74c7b68', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:01:24 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/floatingips/8e2ce663-0ffc-4d25-8840-f565e234d824'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:24.381 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:24.385 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_floatingip, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:24.385 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:24.388 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_floatingip, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:24.391 37 INFO tempest.lib.common.rest_client [req-5a1031c7-2fc7-427b-b711-48c35b4df5f2 ] Request (ComputeServersRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e 1.274s 2020-11-06 18:01:24.392 37 DEBUG tempest.lib.common.rest_client [req-5a1031c7-2fc7-427b-b711-48c35b4df5f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1720', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5a1031c7-2fc7-427b-b711-48c35b4df5f2', 'x-compute-request-id': 'req-5a1031c7-2fc7-427b-b711-48c35b4df5f2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e'} Body: b'{"server": {"id": "ee273607-06e8-4025-a40f-63683e833b3e", "name": "tempest-ComputeServersRbacTest-server-360935029", "status": "ACTIVE", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "user_id": "262f98552a3a4d8a8fba3f96d5a872bf", "metadata": {}, "hostId": "72aa4147e128daa70511a3b03038cad49752a08b0327f6bc0c6decc0", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:01:15Z", "updated": "2020-11-06T18:01:22Z", "addresses": {"tempest-ComputeServersRbacTest-1143895587-network": [{"version": 4, "addr": "192.168.120.11", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:ff:85:1c"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ee273607-06e8-4025-a40f-63683e833b3e"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:22.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033cb", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:24.402 38 INFO tempest.lib.common.rest_client [req-03522796-8abb-4ca1-8351-8cea6b490ecd ] Request (MiscPolicyActionsNetworkRbacTest:test_list_interfaces): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:01:24.402 38 DEBUG tempest.lib.common.rest_client [req-03522796-8abb-4ca1-8351-8cea6b490ecd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6654', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-03522796-8abb-4ca1-8351-8cea6b490ecd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1db6819d47a748669464ad962e63976e", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843", "password_expires_at": null}, "audit_ids": ["LxxoQx3xQ5aBfOT32DKFyA"], "expires_at": "2020-11-06T19:01:24.000000Z", "issued_at": "2020-11-06T18:01:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a6 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:24.406 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:24.407 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.408 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.408 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.408 37 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 9 second wait 2020-11-06 18:01:24.408 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.409 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.410 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.411 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.411 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.411 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.412 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.412 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.413 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.413 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.414 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.414 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.414 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.415 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.415 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.416 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.416 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.416 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.417 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.417 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.417 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.418 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.418 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.418 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.419 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.419 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.419 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.419 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.420 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.420 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.420 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.421 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.421 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.421 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.421 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.422 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.422 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.422 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.423 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.423 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.423 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.424 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.424 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.424 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.425 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.425 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.425 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.426 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.426 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.426 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.426 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.427 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.427 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.427 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.428 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.428 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.428 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.429 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.429 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.429 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.430 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.430 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.430 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.431 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.431 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.431 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.431 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.432 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.432 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.432 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.433 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.433 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.434 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-attach-interfaces:show, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:24.450 37 INFO tempest.lib.common.rest_client [req-983ac1cb-62a3-4c17-a18b-bfa3523501a9 ] Request (ComputeServersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:01:24.451 37 DEBUG tempest.lib.common.rest_client [req-983ac1cb-62a3-4c17-a18b-bfa3523501a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-983ac1cb-62a3-4c17-a18b-bfa3523501a9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "262f98552a3a4d8a8fba3f96d5a872bf", "name": "tempest-ComputeServersRbacTest-1376603226", "password_expires_at": null}, "audit_ids": ["IyewYFCQRNuZNyxPmZE26A"], "expires_at": "2020-11-06T19:01:24.000000Z", "issued_at": "2020-11-06T18:01:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "738a797d686c408e8ceb6a8b32bc1d09", "name": "tempest-ComputeServersRbacTest-1376603226"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:24.451 37 INFO tempest.lib.common.fixed_network [-] (ComputeServersRbacTest:setUpClass) Found network {'id': '4c841a1c-655b-4758-ac88-8f8b657eda1b', 'name': 'tempest-ComputeServersRbacTest-1143895587-network', 'tenant_id': '738a797d686c408e8ceb6a8b32bc1d09', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '738a797d686c408e8ceb6a8b32bc1d09', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 60, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T18:01:06Z', 'updated_at': '2020-11-06T18:01:06Z', 'revision_number': 1} available for tenant 2020-11-06 18:01:24.453 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:24.454 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.454 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.455 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.455 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.456 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.457 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.457 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.458 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.458 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.459 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.459 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.460 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.460 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.461 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.461 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.462 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.462 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.463 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.463 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.464 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.464 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.465 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.465 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.465 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.466 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.466 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.466 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.467 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.467 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.467 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.468 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.468 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.468 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.469 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.469 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.469 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.469 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.470 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.470 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.470 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.471 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.471 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.471 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.472 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.472 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.472 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.472 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.473 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.473 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.473 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.474 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.474 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.474 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.475 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.475 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.475 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.475 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.476 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.476 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.476 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.477 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.477 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.477 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.478 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.478 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.478 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.479 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.479 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.479 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.479 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.480 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.480 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.480 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.481 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.481 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:24.482 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:create, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:24.482 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:24.532 37 INFO tempest.lib.common.rest_client [req-fdada2f1-ba57-4496-b7e2-f0d1a431904e ] Request (ComputeServersRbacTest:test_create_server): 200 GET http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles 0.049s 2020-11-06 18:01:24.532 37 DEBUG tempest.lib.common.rest_client [req-fdada2f1-ba57-4496-b7e2-f0d1a431904e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fdada2f1-ba57-4496-b7e2-f0d1a431904e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:24.565 37 INFO tempest.lib.common.rest_client [req-e7e10c0b-8f85-4134-b1e8-dcacfacd5599 ] Request (ComputeServersRbacTest:test_create_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:01:24.566 37 DEBUG tempest.lib.common.rest_client [req-e7e10c0b-8f85-4134-b1e8-dcacfacd5599 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e7e10c0b-8f85-4134-b1e8-dcacfacd5599', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "262f98552a3a4d8a8fba3f96d5a872bf", "name": "tempest-ComputeServersRbacTest-1376603226", "password_expires_at": null}, "audit_ids": ["ceLeijzkSROvO5WDEYJDgA"], "expires_at": "2020-11-06T19:01:24.000000Z", "issued_at": "2020-11-06T18:01:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "738a797d686c408e8ceb6a8b32bc1d09", "name": "tempest-ComputeServersRbacTest-1376603226"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:25.264 37 INFO tempest.lib.common.rest_client [req-7000ec39-145c-46c4-8638-148205a3f61e ] Request (ComputeServersRbacTest:test_create_server): 202 POST http://172.30.13.94/compute/v2.1/servers 0.697s 2020-11-06 18:01:25.265 37 DEBUG tempest.lib.common.rest_client [req-7000ec39-145c-46c4-8638-148205a3f61e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-ComputeServersRbacTest-Server-2024643723", "flavorRef": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "imageRef": "56b368f6-9136-40ec-a04c-564d02c95e42", "networks": [{"uuid": "4c841a1c-655b-4758-ac88-8f8b657eda1b"}]}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/06fc622a-b877-4b7f-897d-816b3b229b81', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7000ec39-145c-46c4-8638-148205a3f61e', 'x-compute-request-id': 'req-7000ec39-145c-46c4-8638-148205a3f61e', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "06fc622a-b877-4b7f-897d-816b3b229b81", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/06fc622a-b877-4b7f-897d-816b3b229b81"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/06fc622a-b877-4b7f-897d-816b3b229b81"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "mcsa4iFXT3F9"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:25.270 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:25.319 37 INFO tempest.lib.common.rest_client [req-0f5058bf-62a7-466e-94ce-f47375f8b7da ] Request (ComputeServersRbacTest:test_create_server): 200 GET http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles 0.047s 2020-11-06 18:01:25.319 37 DEBUG tempest.lib.common.rest_client [req-0f5058bf-62a7-466e-94ce-f47375f8b7da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0f5058bf-62a7-466e-94ce-f47375f8b7da', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:25.360 37 INFO tempest.lib.common.rest_client [req-a39763db-6ab5-4060-97a0-fc24a270eafb ] Request (ComputeServersRbacTest:test_create_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:01:25.361 37 DEBUG tempest.lib.common.rest_client [req-a39763db-6ab5-4060-97a0-fc24a270eafb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a39763db-6ab5-4060-97a0-fc24a270eafb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "262f98552a3a4d8a8fba3f96d5a872bf", "name": "tempest-ComputeServersRbacTest-1376603226", "password_expires_at": null}, "audit_ids": ["ue4Jb3leRLezbq4IWp0ewg"], "expires_at": "2020-11-06T19:01:25.000000Z", "issued_at": "2020-11-06T18:01:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "738a797d686c408e8ceb6a8b32bc1d09", "name": "tempest-ComputeServersRbacTest-1376603226"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:25.621 40 INFO tempest.lib.common.rest_client [req-da18b458-877e-4809-8c7b-105e69b96b84 ] Request (FloatingIpsRbacTest:test_update_floating_ip): 201 POST http://172.30.13.94:9696/v2.0/floatingips 1.232s 2020-11-06 18:01:25.622 40 DEBUG tempest.lib.common.rest_client [req-da18b458-877e-4809-8c7b-105e69b96b84 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"floatingip": {"floating_network_id": "9032b2ce-cbbb-4a60-94d2-43ec3738190b"}} Response - Headers: {'content-type': 'application/json', 'content-length': '578', 'x-openstack-request-id': 'req-da18b458-877e-4809-8c7b-105e69b96b84', 'date': 'Fri, 06 Nov 2020 18:01:25 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/floatingips'} Body: b'{"floatingip": {"id": "73989dec-ae7e-4891-b06c-c50e4d7b43bd", "tenant_id": "e7d05d99cdc146be8da0847e45f60a2d", "floating_ip_address": "192.168.120.162", "floating_network_id": "9032b2ce-cbbb-4a60-94d2-43ec3738190b", "router_id": null, "port_id": null, "fixed_ip_address": null, "status": "DOWN", "project_id": "e7d05d99cdc146be8da0847e45f60a2d", "description": "", "qos_policy_id": null, "port_details": null, "dns_domain": "", "dns_name": "", "port_forwardings": [], "tags": [], "created_at": "2020-11-06T18:01:25Z", "updated_at": "2020-11-06T18:01:25Z", "revision_number": 0}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:25.622 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:25.678 40 INFO tempest.lib.common.rest_client [req-639a6cfe-1ccd-4924-b020-43f113c314ed ] Request (FloatingIpsRbacTest:test_update_floating_ip): 200 GET http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles 0.054s 2020-11-06 18:01:25.678 40 DEBUG tempest.lib.common.rest_client [req-639a6cfe-1ccd-4924-b020-43f113c314ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-639a6cfe-1ccd-4924-b020-43f113c314ed', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:25.694 37 INFO tempest.lib.common.rest_client [req-3560f91a-7606-41c3-8ce3-c2115ef4ee81 ] Request (ComputeServersRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/compute/v2.1/servers/06fc622a-b877-4b7f-897d-816b3b229b81 0.330s 2020-11-06 18:01:25.694 37 DEBUG tempest.lib.common.rest_client [req-3560f91a-7606-41c3-8ce3-c2115ef4ee81 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3560f91a-7606-41c3-8ce3-c2115ef4ee81', 'x-compute-request-id': 'req-3560f91a-7606-41c3-8ce3-c2115ef4ee81', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/06fc622a-b877-4b7f-897d-816b3b229b81'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:25.713 40 INFO tempest.lib.common.rest_client [req-4474bfff-ce27-47e9-8fd9-7676adb49f71 ] Request (FloatingIpsRbacTest:test_update_floating_ip): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:01:25.714 40 DEBUG tempest.lib.common.rest_client [req-4474bfff-ce27-47e9-8fd9-7676adb49f71 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4474bfff-ce27-47e9-8fd9-7676adb49f71', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f1cf94a5d6644718b805d96ed06a5e60", "name": "tempest-FloatingIpsRbacTest-48598991", "password_expires_at": null}, "audit_ids": ["CvzHZVAFTdGqLx4bkUuN5g"], "expires_at": "2020-11-06T19:01:25.000000Z", "issued_at": "2020-11-06T18:01:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e7d05d99cdc146be8da0847e45f60a2d", "name": "tempest-FloatingIpsRbacTest-48598991"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:25.716 37 INFO tempest.lib.common.rest_client [req-e9c95dd8-cf64-43f5-8309-b7a0bd5443a3 ] Request (ComputeServersRbacTest:_run_cleanups): 404 GET http://172.30.13.94/compute/v2.1/servers/06fc622a-b877-4b7f-897d-816b3b229b81 0.020s 2020-11-06 18:01:25.716 37 DEBUG tempest.lib.common.rest_client [req-e9c95dd8-cf64-43f5-8309-b7a0bd5443a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-e9c95dd8-cf64-43f5-8309-b7a0bd5443a3', 'x-compute-request-id': 'req-e9c95dd8-cf64-43f5-8309-b7a0bd5443a3', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/06fc622a-b877-4b7f-897d-816b3b229b81'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 06fc622a-b877-4b7f-897d-816b3b229b81 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:25.720 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:25.721 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.722 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.722 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.722 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.723 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.723 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.724 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.724 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.724 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.724 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.725 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.725 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.725 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.726 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.726 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.726 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.727 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.727 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.727 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.728 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.728 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.728 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.729 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.729 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.729 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.730 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.730 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.730 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.730 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.731 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.731 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.731 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.732 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.732 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.732 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.732 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.733 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.733 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.733 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.734 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.734 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.734 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.734 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.735 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.735 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.735 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.736 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.736 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.736 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.736 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.737 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.737 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.737 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.738 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.738 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.738 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.738 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.739 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.739 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.739 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.740 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.740 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.740 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.741 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.741 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.741 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.742 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.742 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.742 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.742 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.743 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.743 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.743 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.743 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.744 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:25.745 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:create:attach_network, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:25.897 39 INFO tempest.lib.common.rest_client [req-cfa0a0a6-3faa-4a51-ae80-59a11dfbcfb7 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.515s 2020-11-06 18:01:25.898 39 DEBUG tempest.lib.common.rest_client [req-cfa0a0a6-3faa-4a51-ae80-59a11dfbcfb7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cfa0a0a6-3faa-4a51-ae80-59a11dfbcfb7', 'x-compute-request-id': 'req-cfa0a0a6-3faa-4a51-ae80-59a11dfbcfb7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:26.028 37 INFO tempest.lib.common.rest_client [req-ea81eda8-88a8-4412-92a5-55c54d45848e ] Request (ComputeServersRbacTest:test_create_server_attach_network): 201 POST http://172.30.13.94:9696/v2.0/networks 0.282s 2020-11-06 18:01:26.028 37 DEBUG tempest.lib.common.rest_client [req-ea81eda8-88a8-4412-92a5-55c54d45848e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-ComputeServersRbacTest-network-1366774935", "port_security_enabled": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '738', 'x-openstack-request-id': 'req-ea81eda8-88a8-4412-92a5-55c54d45848e', 'date': 'Fri, 06 Nov 2020 18:01:26 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"0e4e217b-5e6d-4c9a-9f8d-f5aa9a9549ad","name":"tempest-ComputeServersRbacTest-network-1366774935","tenant_id":"738a797d686c408e8ceb6a8b32bc1d09","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"738a797d686c408e8ceb6a8b32bc1d09","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":64,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:01:25Z","updated_at":"2020-11-06T18:01:25Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:26.095 40 INFO tempest.lib.common.rest_client [req-8003ac19-4f4a-40cc-aaca-bb3c52aea893 ] Request (FloatingIpsRbacTest:test_update_floating_ip): 200 PUT http://172.30.13.94:9696/v2.0/floatingips/73989dec-ae7e-4891-b06c-c50e4d7b43bd 0.379s 2020-11-06 18:01:26.095 40 DEBUG tempest.lib.common.rest_client [req-8003ac19-4f4a-40cc-aaca-bb3c52aea893 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"floatingip": {"port_id": null}} Response - Headers: {'content-type': 'application/json', 'content-length': '578', 'x-openstack-request-id': 'req-8003ac19-4f4a-40cc-aaca-bb3c52aea893', 'date': 'Fri, 06 Nov 2020 18:01:26 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/floatingips/73989dec-ae7e-4891-b06c-c50e4d7b43bd'} Body: b'{"floatingip": {"id": "73989dec-ae7e-4891-b06c-c50e4d7b43bd", "tenant_id": "e7d05d99cdc146be8da0847e45f60a2d", "floating_ip_address": "192.168.120.162", "floating_network_id": "9032b2ce-cbbb-4a60-94d2-43ec3738190b", "router_id": null, "port_id": null, "fixed_ip_address": null, "status": "DOWN", "description": "", "qos_policy_id": null, "port_details": null, "dns_domain": "", "dns_name": "", "port_forwardings": [], "tags": [], "created_at": "2020-11-06T18:01:25Z", "updated_at": "2020-11-06T18:01:26Z", "revision_number": 1, "project_id": "e7d05d99cdc146be8da0847e45f60a2d"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:26.096 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:26.157 40 INFO tempest.lib.common.rest_client [req-7ab01af4-26d6-49c0-9207-ae908c722f8c ] Request (FloatingIpsRbacTest:test_update_floating_ip): 200 GET http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles 0.060s 2020-11-06 18:01:26.158 40 DEBUG tempest.lib.common.rest_client [req-7ab01af4-26d6-49c0-9207-ae908c722f8c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7ab01af4-26d6-49c0-9207-ae908c722f8c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d/users/f1cf94a5d6644718b805d96ed06a5e60/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:26.200 40 INFO tempest.lib.common.rest_client [req-a18f6500-df58-401e-abdb-8d06877fe08f ] Request (FloatingIpsRbacTest:test_update_floating_ip): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-11-06 18:01:26.201 40 DEBUG tempest.lib.common.rest_client [req-a18f6500-df58-401e-abdb-8d06877fe08f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a18f6500-df58-401e-abdb-8d06877fe08f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f1cf94a5d6644718b805d96ed06a5e60", "name": "tempest-FloatingIpsRbacTest-48598991", "password_expires_at": null}, "audit_ids": ["tTmVYfamQGqDUvk8SQxXEQ"], "expires_at": "2020-11-06T19:01:26.000000Z", "issued_at": "2020-11-06T18:01:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e7d05d99cdc146be8da0847e45f60a2d", "name": "tempest-FloatingIpsRbacTest-48598991"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e7d05d99cdc146be8da0847e45f60a2d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:26.604 37 INFO tempest.lib.common.rest_client [req-ad6b66fb-49b2-48c9-8dd7-6dacb4d30a3c ] Request (ComputeServersRbacTest:test_create_server_attach_network): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.574s 2020-11-06 18:01:26.605 37 DEBUG tempest.lib.common.rest_client [req-ad6b66fb-49b2-48c9-8dd7-6dacb4d30a3c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"name": "tempest-ComputeServersRbacTest-subnet-1042350981", "network_id": "0e4e217b-5e6d-4c9a-9f8d-f5aa9a9549ad", "cidr": "192.168.120.0/24", "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '710', 'x-openstack-request-id': 'req-ad6b66fb-49b2-48c9-8dd7-6dacb4d30a3c', 'date': 'Fri, 06 Nov 2020 18:01:26 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"61733acb-34f3-4331-80ef-f5f074810456","name":"tempest-ComputeServersRbacTest-subnet-1042350981","tenant_id":"738a797d686c408e8ceb6a8b32bc1d09","network_id":"0e4e217b-5e6d-4c9a-9f8d-f5aa9a9549ad","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/24","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.254"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-11-06T18:01:26Z","updated_at":"2020-11-06T18:01:26Z","revision_number":0,"project_id":"738a797d686c408e8ceb6a8b32bc1d09"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:26.605 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:26.662 37 INFO tempest.lib.common.rest_client [req-fd88c31e-c040-4ab3-ac97-6fba33e3f311 ] Request (ComputeServersRbacTest:test_create_server_attach_network): 200 GET http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles 0.055s 2020-11-06 18:01:26.663 37 DEBUG tempest.lib.common.rest_client [req-fd88c31e-c040-4ab3-ac97-6fba33e3f311 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fd88c31e-c040-4ab3-ac97-6fba33e3f311', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:26.703 37 INFO tempest.lib.common.rest_client [req-f0217371-5031-488b-ba9a-434ee4e62e11 ] Request (ComputeServersRbacTest:test_create_server_attach_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:01:26.704 37 DEBUG tempest.lib.common.rest_client [req-f0217371-5031-488b-ba9a-434ee4e62e11 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f0217371-5031-488b-ba9a-434ee4e62e11', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "262f98552a3a4d8a8fba3f96d5a872bf", "name": "tempest-ComputeServersRbacTest-1376603226", "password_expires_at": null}, "audit_ids": ["shEyYSHjTFiAn5ZMVw1JnQ"], "expires_at": "2020-11-06T19:01:26.000000Z", "issued_at": "2020-11-06T18:01:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "738a797d686c408e8ceb6a8b32bc1d09", "name": "tempest-ComputeServersRbacTest-1376603226"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:27.351 40 INFO tempest.lib.common.rest_client [req-c8f9b098-39d0-4349-b516-9dc96e5abdac ] Request (FloatingIpsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/floatingips/73989dec-ae7e-4891-b06c-c50e4d7b43bd 1.148s 2020-11-06 18:01:27.351 40 DEBUG tempest.lib.common.rest_client [req-c8f9b098-39d0-4349-b516-9dc96e5abdac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-c8f9b098-39d0-4349-b516-9dc96e5abdac', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:01:27 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/floatingips/73989dec-ae7e-4891-b06c-c50e4d7b43bd'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:27.396 39 INFO tempest.lib.common.rest_client [req-657b904b-0982-4361-af2c-6a8b51fc506d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.483s 2020-11-06 18:01:27.397 39 DEBUG tempest.lib.common.rest_client [req-657b904b-0982-4361-af2c-6a8b51fc506d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-657b904b-0982-4361-af2c-6a8b51fc506d', 'x-compute-request-id': 'req-657b904b-0982-4361-af2c-6a8b51fc506d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:27.731 37 INFO tempest.lib.common.rest_client [req-f37e82c2-7e6d-4656-8f56-7f9a7d0a20b4 ] Request (ComputeServersRbacTest:test_create_server_attach_network): 202 POST http://172.30.13.94/compute/v2.1/servers 1.025s 2020-11-06 18:01:27.732 37 DEBUG tempest.lib.common.rest_client [req-f37e82c2-7e6d-4656-8f56-7f9a7d0a20b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-ComputeServersRbacTest-Server-296588748", "flavorRef": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "imageRef": "56b368f6-9136-40ec-a04c-564d02c95e42", "networks": [{"uuid": "0e4e217b-5e6d-4c9a-9f8d-f5aa9a9549ad"}]}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/58338fab-3127-4b44-a399-94b067d272f7', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f37e82c2-7e6d-4656-8f56-7f9a7d0a20b4', 'x-compute-request-id': 'req-f37e82c2-7e6d-4656-8f56-7f9a7d0a20b4', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "58338fab-3127-4b44-a399-94b067d272f7", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/58338fab-3127-4b44-a399-94b067d272f7"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/58338fab-3127-4b44-a399-94b067d272f7"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "SboFWPF2ALVr"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:27.737 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:27.796 37 INFO tempest.lib.common.rest_client [req-3936aa66-6091-4338-bd68-47de3bbf8171 ] Request (ComputeServersRbacTest:test_create_server_attach_network): 200 GET http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles 0.058s 2020-11-06 18:01:27.796 37 DEBUG tempest.lib.common.rest_client [req-3936aa66-6091-4338-bd68-47de3bbf8171 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3936aa66-6091-4338-bd68-47de3bbf8171', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:27.833 37 INFO tempest.lib.common.rest_client [req-b4f52b55-e57f-4862-ac5f-066ef0b9a265 ] Request (ComputeServersRbacTest:test_create_server_attach_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:01:27.834 37 DEBUG tempest.lib.common.rest_client [req-b4f52b55-e57f-4862-ac5f-066ef0b9a265 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b4f52b55-e57f-4862-ac5f-066ef0b9a265', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "262f98552a3a4d8a8fba3f96d5a872bf", "name": "tempest-ComputeServersRbacTest-1376603226", "password_expires_at": null}, "audit_ids": ["NuQboj2vSim9Xwo24pbSGw"], "expires_at": "2020-11-06T19:01:27.000000Z", "issued_at": "2020-11-06T18:01:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "738a797d686c408e8ceb6a8b32bc1d09", "name": "tempest-ComputeServersRbacTest-1376603226"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:28.145 40 INFO tempest.lib.common.rest_client [req-c684dcdd-16f7-47e5-9728-492be57dd9f8 ] Request (FloatingIpsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/78483b93-83d1-4462-bc89-6531ae515095 0.791s 2020-11-06 18:01:28.145 40 DEBUG tempest.lib.common.rest_client [req-c684dcdd-16f7-47e5-9728-492be57dd9f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-c684dcdd-16f7-47e5-9728-492be57dd9f8', 'date': 'Fri, 06 Nov 2020 18:01:28 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/78483b93-83d1-4462-bc89-6531ae515095'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:28.200 37 INFO tempest.lib.common.rest_client [req-a02beab8-ecec-4b59-ab99-8d439fef28b8 ] Request (ComputeServersRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/compute/v2.1/servers/58338fab-3127-4b44-a399-94b067d272f7 0.364s 2020-11-06 18:01:28.200 37 DEBUG tempest.lib.common.rest_client [req-a02beab8-ecec-4b59-ab99-8d439fef28b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a02beab8-ecec-4b59-ab99-8d439fef28b8', 'x-compute-request-id': 'req-a02beab8-ecec-4b59-ab99-8d439fef28b8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/58338fab-3127-4b44-a399-94b067d272f7'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:28.259 37 INFO tempest.lib.common.rest_client [req-fc39d219-50a5-4e15-8eee-7ea49b3e06f1 ] Request (ComputeServersRbacTest:_run_cleanups): 404 GET http://172.30.13.94/compute/v2.1/servers/58338fab-3127-4b44-a399-94b067d272f7 0.057s 2020-11-06 18:01:28.259 37 DEBUG tempest.lib.common.rest_client [req-fc39d219-50a5-4e15-8eee-7ea49b3e06f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-fc39d219-50a5-4e15-8eee-7ea49b3e06f1', 'x-compute-request-id': 'req-fc39d219-50a5-4e15-8eee-7ea49b3e06f1', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/58338fab-3127-4b44-a399-94b067d272f7'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 58338fab-3127-4b44-a399-94b067d272f7 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:28.648 39 INFO tempest.lib.common.rest_client [req-bd2be64e-505b-4b4b-b45a-4576e2cbfc67 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.233s 2020-11-06 18:01:28.648 39 DEBUG tempest.lib.common.rest_client [req-bd2be64e-505b-4b4b-b45a-4576e2cbfc67 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bd2be64e-505b-4b4b-b45a-4576e2cbfc67', 'x-compute-request-id': 'req-bd2be64e-505b-4b4b-b45a-4576e2cbfc67', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:28.842 37 INFO tempest.lib.common.rest_client [req-be2a1a57-fc15-4209-b3c2-3d886efbfe0b ] Request (ComputeServersRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/61733acb-34f3-4331-80ef-f5f074810456 0.582s 2020-11-06 18:01:28.843 37 DEBUG tempest.lib.common.rest_client [req-be2a1a57-fc15-4209-b3c2-3d886efbfe0b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-be2a1a57-fc15-4209-b3c2-3d886efbfe0b', 'date': 'Fri, 06 Nov 2020 18:01:28 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/61733acb-34f3-4331-80ef-f5f074810456'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:29.821 40 INFO tempest.lib.common.rest_client [req-0631e034-6a0b-46f5-9080-5f96f8c05048 ] Request (FloatingIpsRbacTest:tearDownClass): 200 PUT http://172.30.13.94:9696/v2.0/networks/9032b2ce-cbbb-4a60-94d2-43ec3738190b 1.674s 2020-11-06 18:01:29.822 40 DEBUG tempest.lib.common.rest_client [req-0631e034-6a0b-46f5-9080-5f96f8c05048 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"router:external": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '727', 'x-openstack-request-id': 'req-0631e034-6a0b-46f5-9080-5f96f8c05048', 'date': 'Fri, 06 Nov 2020 18:01:29 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/9032b2ce-cbbb-4a60-94d2-43ec3738190b'} Body: b'{"network":{"id":"9032b2ce-cbbb-4a60-94d2-43ec3738190b","name":"tempest-FloatingIpsRbacTest-test-network-2081541478","tenant_id":"e7d05d99cdc146be8da0847e45f60a2d","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:01:05Z","updated_at":"2020-11-06T18:01:29Z","revision_number":4,"project_id":"e7d05d99cdc146be8da0847e45f60a2d","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":53}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:29.847 39 INFO tempest.lib.common.rest_client [req-a529428c-a82a-4a98-86a4-91dd295e23f9 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.182s 2020-11-06 18:01:29.848 39 DEBUG tempest.lib.common.rest_client [req-a529428c-a82a-4a98-86a4-91dd295e23f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a529428c-a82a-4a98-86a4-91dd295e23f9', 'x-compute-request-id': 'req-a529428c-a82a-4a98-86a4-91dd295e23f9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:30.560 38 INFO tempest.lib.common.rest_client [req-a70574f2-15ed-4875-b7ec-68b4bc5fe4bd ] Request (MiscPolicyActionsNetworkRbacTest:test_show_interface): 200 POST http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface 6.125s 2020-11-06 18:01:30.560 38 DEBUG tempest.lib.common.rest_client [req-a70574f2-15ed-4875-b7ec-68b4bc5fe4bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"interfaceAttachment": {"net_id": "76f18a02-b98c-4b49-9ce2-560e504bc8a8"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '285', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a70574f2-15ed-4875-b7ec-68b4bc5fe4bd', 'x-compute-request-id': 'req-a70574f2-15ed-4875-b7ec-68b4bc5fe4bd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface'} Body: b'{"interfaceAttachment": {"net_id": "76f18a02-b98c-4b49-9ce2-560e504bc8a8", "port_id": "383c2fb7-157c-4e29-80a9-0c2c9a36968d", "mac_addr": "fa:16:3e:0f:e4:2e", "port_state": "ACTIVE", "fixed_ips": [{"subnet_id": "7cc652b1-42a3-434f-8267-0b79a65decc2", "ip_address": "192.168.120.64"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:30.739 38 INFO tempest.lib.common.rest_client [req-9e0a7015-a300-48e1-b1d4-2425ac1b3988 ] Request (MiscPolicyActionsNetworkRbacTest:test_show_interface): 200 GET http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface/383c2fb7-157c-4e29-80a9-0c2c9a36968d 0.171s 2020-11-06 18:01:30.740 38 DEBUG tempest.lib.common.rest_client [req-9e0a7015-a300-48e1-b1d4-2425ac1b3988 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '285', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9e0a7015-a300-48e1-b1d4-2425ac1b3988', 'x-compute-request-id': 'req-9e0a7015-a300-48e1-b1d4-2425ac1b3988', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface/383c2fb7-157c-4e29-80a9-0c2c9a36968d'} Body: b'{"interfaceAttachment": {"net_id": "76f18a02-b98c-4b49-9ce2-560e504bc8a8", "port_id": "383c2fb7-157c-4e29-80a9-0c2c9a36968d", "mac_addr": "fa:16:3e:0f:e4:2e", "port_state": "ACTIVE", "fixed_ips": [{"subnet_id": "7cc652b1-42a3-434f-8267-0b79a65decc2", "ip_address": "192.168.120.64"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:30.745 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:30.796 38 INFO tempest.lib.common.rest_client [req-a4890c75-d45c-42a6-a307-166a3a61ced2 ] Request (MiscPolicyActionsNetworkRbacTest:test_show_interface): 200 GET http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles 0.049s 2020-11-06 18:01:30.796 38 DEBUG tempest.lib.common.rest_client [req-a4890c75-d45c-42a6-a307-166a3a61ced2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a4890c75-d45c-42a6-a307-166a3a61ced2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:30.826 38 INFO tempest.lib.common.rest_client [req-f04dfe8f-42bc-4fec-abdf-705495dc3dc7 ] Request (MiscPolicyActionsNetworkRbacTest:test_show_interface): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.028s 2020-11-06 18:01:30.826 38 DEBUG tempest.lib.common.rest_client [req-f04dfe8f-42bc-4fec-abdf-705495dc3dc7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6654', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f04dfe8f-42bc-4fec-abdf-705495dc3dc7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1db6819d47a748669464ad962e63976e", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843", "password_expires_at": null}, "audit_ids": ["XiqotT72Q3SBNaBBh-T0tA"], "expires_at": "2020-11-06T19:01:30.000000Z", "issued_at": "2020-11-06T18:01:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a6 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:31.450 37 INFO tempest.lib.common.rest_client [req-8ddb7fec-02be-4104-aef7-67456249f77a ] Request (ComputeServersRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/networks/0e4e217b-5e6d-4c9a-9f8d-f5aa9a9549ad 2.606s 2020-11-06 18:01:31.451 37 DEBUG tempest.lib.common.rest_client [req-8ddb7fec-02be-4104-aef7-67456249f77a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-8ddb7fec-02be-4104-aef7-67456249f77a', 'date': 'Fri, 06 Nov 2020 18:01:31 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/0e4e217b-5e6d-4c9a-9f8d-f5aa9a9549ad'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:31.455 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:31.456 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.456 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.457 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.457 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.458 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.458 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.459 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.459 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.460 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.460 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.460 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.461 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.461 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.462 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.462 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.462 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.463 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.463 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.463 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.464 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.464 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.465 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.465 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.465 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.465 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.466 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.466 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.466 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.467 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.467 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.467 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.467 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.468 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.468 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.468 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.468 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.469 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.469 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.469 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.470 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.470 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.470 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.470 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.471 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.471 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.471 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.472 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.472 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.472 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.472 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.473 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.473 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.473 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.474 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.474 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.474 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.474 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.475 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.475 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.475 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.476 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.476 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.476 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.477 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.477 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.477 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.477 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.478 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.478 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.478 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.479 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.479 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.479 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.479 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.480 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:31.480 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:create:attach_volume, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:31.943 37 INFO tempest.lib.common.rest_client [req-42adfd4c-bdcc-4180-ad8b-84da9f557f71 ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 202 POST http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09/volumes 0.462s 2020-11-06 18:01:31.944 37 DEBUG tempest.lib.common.rest_client [req-42adfd4c-bdcc-4180-ad8b-84da9f557f71 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"imageRef": "56b368f6-9136-40ec-a04c-564d02c95e42", "size": 1, "display_name": "tempest-ComputeServersRbacTest-volume-82098402"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-42adfd4c-bdcc-4180-ad8b-84da9f557f71', 'content-length': '841', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-42adfd4c-bdcc-4180-ad8b-84da9f557f71', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09/volumes'} Body: b'{"volume": {"id": "af94feae-2c64-4f66-978a-2eb00d12ad7c", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:01:32.000000", "updated_at": null, "name": "tempest-ComputeServersRbacTest-volume-82098402", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09/volumes/af94feae-2c64-4f66-978a-2eb00d12ad7c"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/738a797d686c408e8ceb6a8b32bc1d09/volumes/af94feae-2c64-4f66-978a-2eb00d12ad7c"}], "user_id": "262f98552a3a4d8a8fba3f96d5a872bf", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:32.023 40 INFO tempest.lib.common.rest_client [req-c775a164-2724-42e5-86f4-fb818a112e93 ] Request (FloatingIpsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/9032b2ce-cbbb-4a60-94d2-43ec3738190b 2.200s 2020-11-06 18:01:32.023 40 DEBUG tempest.lib.common.rest_client [req-c775a164-2724-42e5-86f4-fb818a112e93 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-c775a164-2724-42e5-86f4-fb818a112e93', 'date': 'Fri, 06 Nov 2020 18:01:32 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/9032b2ce-cbbb-4a60-94d2-43ec3738190b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:32.033 37 INFO tempest.lib.common.rest_client [req-0330310b-ea94-4564-8138-e87d12164c07 ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 200 GET http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09/volumes/af94feae-2c64-4f66-978a-2eb00d12ad7c 0.074s 2020-11-06 18:01:32.034 37 DEBUG tempest.lib.common.rest_client [req-0330310b-ea94-4564-8138-e87d12164c07 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-0330310b-ea94-4564-8138-e87d12164c07', 'content-length': '1063', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0330310b-ea94-4564-8138-e87d12164c07', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09/volumes/af94feae-2c64-4f66-978a-2eb00d12ad7c'} Body: b'{"volume": {"id": "af94feae-2c64-4f66-978a-2eb00d12ad7c", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:01:32.000000", "updated_at": "2020-11-06T18:01:32.000000", "name": "tempest-ComputeServersRbacTest-volume-82098402", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09/volumes/af94feae-2c64-4f66-978a-2eb00d12ad7c"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/738a797d686c408e8ceb6a8b32bc1d09/volumes/af94feae-2c64-4f66-978a-2eb00d12ad7c"}], "user_id": "262f98552a3a4d8a8fba3f96d5a872bf", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "738a797d686c408e8ceb6a8b32bc1d09"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:32.169 40 INFO tempest.lib.common.rest_client [req-7f0752e4-f40b-4f79-977c-f41cd4e83749 ] Request (FloatingIpsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/f1cf94a5d6644718b805d96ed06a5e60 0.145s 2020-11-06 18:01:32.170 40 DEBUG tempest.lib.common.rest_client [req-7f0752e4-f40b-4f79-977c-f41cd4e83749 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7f0752e4-f40b-4f79-977c-f41cd4e83749', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/f1cf94a5d6644718b805d96ed06a5e60'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:32.191 38 INFO tempest.lib.common.rest_client [req-da402bb4-8fea-468c-b48b-37575984c6f5 ] Request (MiscPolicyActionsNetworkRbacTest:test_show_interface): 200 GET http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface/383c2fb7-157c-4e29-80a9-0c2c9a36968d 1.363s 2020-11-06 18:01:32.191 38 DEBUG tempest.lib.common.rest_client [req-da402bb4-8fea-468c-b48b-37575984c6f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '285', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-da402bb4-8fea-468c-b48b-37575984c6f5', 'x-compute-request-id': 'req-da402bb4-8fea-468c-b48b-37575984c6f5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface/383c2fb7-157c-4e29-80a9-0c2c9a36968d'} Body: b'{"interfaceAttachment": {"net_id": "76f18a02-b98c-4b49-9ce2-560e504bc8a8", "port_id": "383c2fb7-157c-4e29-80a9-0c2c9a36968d", "mac_addr": "fa:16:3e:0f:e4:2e", "port_state": "ACTIVE", "fixed_ips": [{"subnet_id": "7cc652b1-42a3-434f-8267-0b79a65decc2", "ip_address": "192.168.120.64"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:32.197 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:32.250 39 INFO tempest.lib.common.rest_client [req-ce26b26b-1527-42c1-ba28-f68e60ed1c5c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 1.389s 2020-11-06 18:01:32.251 39 DEBUG tempest.lib.common.rest_client [req-ce26b26b-1527-42c1-ba28-f68e60ed1c5c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ce26b26b-1527-42c1-ba28-f68e60ed1c5c', 'x-compute-request-id': 'req-ce26b26b-1527-42c1-ba28-f68e60ed1c5c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:32.305 40 INFO tempest.lib.common.rest_client [req-cf24909a-e455-46cc-9bca-3ee49082b5e0 ] Request (FloatingIpsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.134s 2020-11-06 18:01:32.306 40 DEBUG tempest.lib.common.rest_client [req-cf24909a-e455-46cc-9bca-3ee49082b5e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cf24909a-e455-46cc-9bca-3ee49082b5e0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["f3pG3HOOQB65ZCWQOCb4QA"], "expires_at": "2020-11-06T19:01:32.000000Z", "issued_at": "2020-11-06T18:01:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:32.309 38 INFO tempest.lib.common.rest_client [req-995f7471-08a2-4b1e-8bf8-50f28ed0d342 ] Request (MiscPolicyActionsNetworkRbacTest:test_show_interface): 200 GET http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles 0.111s 2020-11-06 18:01:32.309 38 DEBUG tempest.lib.common.rest_client [req-995f7471-08a2-4b1e-8bf8-50f28ed0d342 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-995f7471-08a2-4b1e-8bf8-50f28ed0d342', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b/users/1db6819d47a748669464ad962e63976e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:32.389 38 INFO tempest.lib.common.rest_client [req-94eea8ea-0cd8-4d49-8bda-27b299840f0b ] Request (MiscPolicyActionsNetworkRbacTest:test_show_interface): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-11-06 18:01:32.389 38 DEBUG tempest.lib.common.rest_client [req-94eea8ea-0cd8-4d49-8bda-27b299840f0b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6654', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-94eea8ea-0cd8-4d49-8bda-27b299840f0b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1db6819d47a748669464ad962e63976e", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843", "password_expires_at": null}, "audit_ids": ["yEBZceoyRFC4mn2nNNDlJA"], "expires_at": "2020-11-06T19:01:32.000000Z", "issued_at": "2020-11-06T18:01:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "name": "tempest-MiscPolicyActionsNetworkRbacTest-233952843"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f44b0a1b5fe4a17b77cabcf20e9501b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a6 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:32.478 40 INFO tempest.lib.common.rest_client [req-413823ec-b869-44d2-a05c-770903dde8a4 ] Request (FloatingIpsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=e7d05d99cdc146be8da0847e45f60a2d&name=default 0.171s 2020-11-06 18:01:32.478 40 DEBUG tempest.lib.common.rest_client [req-413823ec-b869-44d2-a05c-770903dde8a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-413823ec-b869-44d2-a05c-770903dde8a4', 'date': 'Fri, 06 Nov 2020 18:01:32 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=e7d05d99cdc146be8da0847e45f60a2d&name=default'} Body: b'{"security_groups": [{"id": "f50b10e4-aee8-4703-875d-49d3d2334a8b", "name": "default", "stateful": true, "tenant_id": "e7d05d99cdc146be8da0847e45f60a2d", "description": "Default security group", "security_group_rules": [{"id": "2b520590-d8b2-4e08-9197-7b420ccdc7e1", "tenant_id": "e7d05d99cdc146be8da0847e45f60a2d", "security_group_id": "f50b10e4-aee8-4703-875d-49d3d2334a8b", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "f50b10e4-aee8-4703-875d-49d3d2334a8b", "description": null, "tags": [], "created_at": "2020-11-06T18:01:05Z", "updated_at": "2020-11-06T18:01:05Z", "revision_number": 0, "project_id": "e7d05d99cdc146be8da0847e45f60a2d"}, {"id": "5c8de5ed-a1d8-4ba6-aea2-cc4f7d9c84fd", "tenant_id": "e7d05d99cdc146be8da0847e45f60a2d", "security_group_id": "f50b10e4-aee8-4703-875d-49d3d2334a8b", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:01:05Z", "updated_at": "2020-11-06T18:01:05Z", "revision_number": 0, "project_id": "e7d05d99cdc146be8da0847e45f60a2d"}, {"id": "9a9f2aa0-dca1-4759-a32a-281bf3ceca61", "tenant_id": "e7d05d99cdc146be8da0847e45f60a2d", "security_group_id": "f50b10e4-aee8-4703-875d-49d3d2334a8b", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:01:05Z", "updated_at": "2020-11-06T18:01:05Z", "revision_number": 0, "project_id": "e7d05d99cdc146be8da0847e45f60a2d"}, {"id": "bfda8746-e19f-47e7-99ed-d833806906f9", "tenant_id": "e7d05d99cdc146be8da0847e45f60a2d", "security_group_id": "f50b10e4-aee8-4703-875d-49d3d2334a8b", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "f50b10e4-aee8-4703-875d-49d3d2334a8b", "description": null, "tags": [], "created_at": "2020-11-06T18:01:05Z", "updated_at": "2020-11-06T18:01:05Z", "revision_number": 0, "project_id": "e7d05d99cdc146be8da0847e45f60a2d"}], "tags": [], "created_at": "2020-11-06T18:01:05Z", "updated_at": "2020-11-06T18:01:05Z", "revision_number": 1, "project_id": "e7d05d99cdc146be8da0847e45f60a2d"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:32.576 38 INFO tempest.lib.common.rest_client [req-a5187d5c-69f9-48b2-ac2a-0647744f549d ] Request (MiscPolicyActionsNetworkRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface/383c2fb7-157c-4e29-80a9-0c2c9a36968d 0.185s 2020-11-06 18:01:32.576 38 DEBUG tempest.lib.common.rest_client [req-a5187d5c-69f9-48b2-ac2a-0647744f549d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a5187d5c-69f9-48b2-ac2a-0647744f549d', 'x-compute-request-id': 'req-a5187d5c-69f9-48b2-ac2a-0647744f549d', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface/383c2fb7-157c-4e29-80a9-0c2c9a36968d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:32.640 40 INFO tempest.lib.common.rest_client [req-ec420f38-126e-4529-b20e-2dda21d2bab4 ] Request (FloatingIpsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/f50b10e4-aee8-4703-875d-49d3d2334a8b 0.161s 2020-11-06 18:01:32.640 40 DEBUG tempest.lib.common.rest_client [req-ec420f38-126e-4529-b20e-2dda21d2bab4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-ec420f38-126e-4529-b20e-2dda21d2bab4', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:01:32 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/f50b10e4-aee8-4703-875d-49d3d2334a8b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:32.715 38 INFO tempest.lib.common.rest_client [req-bfa73ce5-25ad-4830-9e87-e29c2ee66ee2 ] Request (MiscPolicyActionsNetworkRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface 0.138s 2020-11-06 18:01:32.715 38 DEBUG tempest.lib.common.rest_client [req-bfa73ce5-25ad-4830-9e87-e29c2ee66ee2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '636', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bfa73ce5-25ad-4830-9e87-e29c2ee66ee2', 'x-compute-request-id': 'req-bfa73ce5-25ad-4830-9e87-e29c2ee66ee2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface'} Body: b'{"interfaceAttachments": [{"net_id": "f747eec6-c776-4af6-aa67-8eb73e88914e", "port_id": "1df0e979-f494-4217-a330-024aa7c0300e", "mac_addr": "fa:16:3e:b6:79:e7", "port_state": "ACTIVE", "fixed_ips": [{"subnet_id": "a7138c88-1746-4acf-b367-e81e790bf9d7", "ip_address": "192.168.120.10"}, {"subnet_id": "a7138c88-1746-4acf-b367-e81e790bf9d7", "ip_address": "192.168.120.7"}]}, {"net_id": "76f18a02-b98c-4b49-9ce2-560e504bc8a8", "port_id": "383c2fb7-157c-4e29-80a9-0c2c9a36968d", "mac_addr": "fa:16:3e:0f:e4:2e", "port_state": "ACTIVE", "fixed_ips": [{"subnet_id": "7cc652b1-42a3-434f-8267-0b79a65decc2", "ip_address": "192.168.120.64"}]}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:32.744 40 INFO tempest.lib.common.rest_client [req-3663082d-e76a-4114-89d6-92b34cbeb659 ] Request (FloatingIpsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d 0.103s 2020-11-06 18:01:32.745 40 DEBUG tempest.lib.common.rest_client [req-3663082d-e76a-4114-89d6-92b34cbeb659 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3663082d-e76a-4114-89d6-92b34cbeb659', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e7d05d99cdc146be8da0847e45f60a2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:32.747 40 INFO tempest.test [-] raised in MeteringLabelRulesRbacTest.setUpClass. Invoking tearDownClass. 2020-11-06 18:01:32.839 40 INFO tempest.lib.common.rest_client [req-f954967f-9e8f-4eb6-9ffc-9205d90ba66c ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-11-06 18:01:32.840 40 DEBUG tempest.lib.common.rest_client [req-f954967f-9e8f-4eb6-9ffc-9205d90ba66c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f954967f-9e8f-4eb6-9ffc-9205d90ba66c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["0i5IRRZkQWem2qLTdujdzQ"], "expires_at": "2020-11-06T19:01:32.000000Z", "issued_at": "2020-11-06T18:01:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:32.887 40 INFO tempest.lib.common.rest_client [req-a71d1dcd-ccd5-47f2-8af6-21adbd4f1b82 ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:01:32.888 40 DEBUG tempest.lib.common.rest_client [req-a71d1dcd-ccd5-47f2-8af6-21adbd4f1b82 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a71d1dcd-ccd5-47f2-8af6-21adbd4f1b82', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["HMXgiRemQkSRRpFjeafEDQ"], "expires_at": "2020-11-06T19:01:32.000000Z", "issued_at": "2020-11-06T18:01:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:32.943 40 INFO tempest.lib.common.rest_client [req-367dcb98-42e8-411a-bc3f-75c2acce8ec2 ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.054s 2020-11-06 18:01:32.944 40 DEBUG tempest.lib.common.rest_client [req-367dcb98-42e8-411a-bc3f-75c2acce8ec2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-367dcb98-42e8-411a-bc3f-75c2acce8ec2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:33.007 40 INFO tempest.lib.common.rest_client [req-e29bd26b-ec7d-4f39-a9e2-19bd88e16f5b ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.062s 2020-11-06 18:01:33.008 40 DEBUG tempest.lib.common.rest_client [req-e29bd26b-ec7d-4f39-a9e2-19bd88e16f5b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233-desc", "domain_id": "default", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '406', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e29bd26b-ec7d-4f39-a9e2-19bd88e16f5b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "05e89bb41ef44a46ab515fb12ff2530b", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233", "domain_id": "default", "description": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/05e89bb41ef44a46ab515fb12ff2530b"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:33.117 40 INFO tempest.lib.common.rest_client [req-40398bc6-f7e2-4847-ae34-9640152b14b1 ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.108s 2020-11-06 18:01:33.118 40 DEBUG tempest.lib.common.rest_client [req-40398bc6-f7e2-4847-ae34-9640152b14b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233", "password": "C7@!B*4ANJkhM*v", "project_id": "05e89bb41ef44a46ab515fb12ff2530b", "email": "tempest-PolicyBandwidthLimitRuleExtRbacTest-1458353730@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '425', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-40398bc6-f7e2-4847-ae34-9640152b14b1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "05e89bb41ef44a46ab515fb12ff2530b", "email": "tempest-PolicyBandwidthLimitRuleExtRbacTest-1458353730@example.com", "id": "ad6669f9f5844b22a68a5fa021f443c4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/ad6669f9f5844b22a68a5fa021f443c4"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:33.127 37 INFO tempest.lib.common.rest_client [req-af55b892-fff2-402f-8435-5ff204c2c919 ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 200 GET http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09/volumes/af94feae-2c64-4f66-978a-2eb00d12ad7c 0.078s 2020-11-06 18:01:33.128 37 DEBUG tempest.lib.common.rest_client [req-af55b892-fff2-402f-8435-5ff204c2c919 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-af55b892-fff2-402f-8435-5ff204c2c919', 'content-length': '1121', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-af55b892-fff2-402f-8435-5ff204c2c919', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09/volumes/af94feae-2c64-4f66-978a-2eb00d12ad7c'} Body: b'{"volume": {"id": "af94feae-2c64-4f66-978a-2eb00d12ad7c", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:01:32.000000", "updated_at": "2020-11-06T18:01:32.000000", "name": "tempest-ComputeServersRbacTest-volume-82098402", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09/volumes/af94feae-2c64-4f66-978a-2eb00d12ad7c"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/738a797d686c408e8ceb6a8b32bc1d09/volumes/af94feae-2c64-4f66-978a-2eb00d12ad7c"}], "user_id": "262f98552a3a4d8a8fba3f96d5a872bf", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "volume_image_metadata": {"signature_verified": "False"}, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "738a797d686c408e8ceb6a8b32bc1d09"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:33.172 40 INFO tempest.lib.common.rest_client [req-e3b5e311-d61f-4b4a-8327-d0a4772a32cc ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.053s 2020-11-06 18:01:33.173 40 DEBUG tempest.lib.common.rest_client [req-e3b5e311-d61f-4b4a-8327-d0a4772a32cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e3b5e311-d61f-4b4a-8327-d0a4772a32cc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:33.216 40 INFO tempest.lib.common.rest_client [req-31f435a1-8a44-4438-8f1a-0063be8ebd58 ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.042s 2020-11-06 18:01:33.216 40 DEBUG tempest.lib.common.rest_client [req-31f435a1-8a44-4438-8f1a-0063be8ebd58 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-31f435a1-8a44-4438-8f1a-0063be8ebd58', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:33.293 40 INFO tempest.lib.common.rest_client [req-9903fd74-c79d-454c-8a41-299018fae2f1 ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/05e89bb41ef44a46ab515fb12ff2530b/users/ad6669f9f5844b22a68a5fa021f443c4/roles/72a4576c553448cd941b052c1ca0cf2d 0.076s 2020-11-06 18:01:33.294 40 DEBUG tempest.lib.common.rest_client [req-9903fd74-c79d-454c-8a41-299018fae2f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9903fd74-c79d-454c-8a41-299018fae2f1', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/05e89bb41ef44a46ab515fb12ff2530b/users/ad6669f9f5844b22a68a5fa021f443c4/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:33.294 40 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '05e89bb41ef44a46ab515fb12ff2530b', 'project_name': 'tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233', 'tenant_id': '05e89bb41ef44a46ab515fb12ff2530b', 'tenant_name': 'tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'ad6669f9f5844b22a68a5fa021f443c4'}, Network: None, Subnet: None, Router: None 2020-11-06 18:01:33.295 40 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '05e89bb41ef44a46ab515fb12ff2530b', 'project_name': 'tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233', 'tenant_id': '05e89bb41ef44a46ab515fb12ff2530b', 'tenant_name': 'tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'ad6669f9f5844b22a68a5fa021f443c4'}, Network: None, Subnet: None, Router: None 2020-11-06 18:01:33.417 40 INFO tempest.lib.common.rest_client [req-de568dc9-d56d-40eb-9edc-44ae338334be ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.112s 2020-11-06 18:01:33.418 40 DEBUG tempest.lib.common.rest_client [req-de568dc9-d56d-40eb-9edc-44ae338334be ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6599', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-de568dc9-d56d-40eb-9edc-44ae338334be', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ad6669f9f5844b22a68a5fa021f443c4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233", "password_expires_at": null}, "audit_ids": ["bgzG8ENQTgG6-ZkmLkXoEg"], "expires_at": "2020-11-06T19:01:33.000000Z", "issued_at": "2020-11-06T18:01:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "05e89bb41ef44a46ab515fb12ff2530b", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "Re _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:33.419 40 WARNING tempest.manager [-] tempest.manager.Manager is not a stable interface and as such it should not be imported directly. It will be removed as soon as the client manager becomes available in tempest.lib. 2020-11-06 18:01:33.511 40 INFO tempest.lib.common.rest_client [req-9c07f177-f666-4d73-b4e3-5891345018a6 ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-11-06 18:01:33.511 40 DEBUG tempest.lib.common.rest_client [req-9c07f177-f666-4d73-b4e3-5891345018a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9c07f177-f666-4d73-b4e3-5891345018a6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["FtS7c8lDSXOBAfoRCyBO8g"], "expires_at": "2020-11-06T19:01:33.000000Z", "issued_at": "2020-11-06T18:01:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:33.517 39 INFO tempest.lib.common.rest_client [req-227dd139-0c92-4574-be02-9d02fb5a579b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.247s 2020-11-06 18:01:33.518 39 DEBUG tempest.lib.common.rest_client [req-227dd139-0c92-4574-be02-9d02fb5a579b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-227dd139-0c92-4574-be02-9d02fb5a579b', 'x-compute-request-id': 'req-227dd139-0c92-4574-be02-9d02fb5a579b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:33.673 40 INFO tempest.lib.common.rest_client [req-946b5e45-ea95-4e54-a1e6-bcf3345a6fab ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-11-06 18:01:33.674 40 DEBUG tempest.lib.common.rest_client [req-946b5e45-ea95-4e54-a1e6-bcf3345a6fab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-946b5e45-ea95-4e54-a1e6-bcf3345a6fab', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["-T7uNYvASeeAaqcc2OP4nA"], "expires_at": "2020-11-06T19:01:33.000000Z", "issued_at": "2020-11-06T18:01:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:33.724 40 INFO tempest.lib.common.rest_client [req-212593f7-c62b-4af0-910e-e8b6952b6a37 ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.050s 2020-11-06 18:01:33.725 40 DEBUG tempest.lib.common.rest_client [req-212593f7-c62b-4af0-910e-e8b6952b6a37 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-212593f7-c62b-4af0-910e-e8b6952b6a37', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:33.777 40 INFO tempest.lib.common.rest_client [req-1c8bec90-5b7c-4162-92b5-adca0c3ae60a ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.051s 2020-11-06 18:01:33.778 40 DEBUG tempest.lib.common.rest_client [req-1c8bec90-5b7c-4162-92b5-adca0c3ae60a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1c8bec90-5b7c-4162-92b5-adca0c3ae60a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:33.778 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:01:33.779 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:33.832 40 INFO tempest.lib.common.rest_client [req-a3339570-db4c-4011-b5ec-df60b2c0435d ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/05e89bb41ef44a46ab515fb12ff2530b/users/ad6669f9f5844b22a68a5fa021f443c4/roles 0.052s 2020-11-06 18:01:33.832 40 DEBUG tempest.lib.common.rest_client [req-a3339570-db4c-4011-b5ec-df60b2c0435d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a3339570-db4c-4011-b5ec-df60b2c0435d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/05e89bb41ef44a46ab515fb12ff2530b/users/ad6669f9f5844b22a68a5fa021f443c4/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/05e89bb41ef44a46ab515fb12ff2530b/users/ad6669f9f5844b22a68a5fa021f443c4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:33.880 38 INFO tempest.lib.common.rest_client [req-8d08b74e-6dd1-44ec-ba0a-a2066b38d879 ] Request (MiscPolicyActionsNetworkRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface 0.156s 2020-11-06 18:01:33.881 38 DEBUG tempest.lib.common.rest_client [req-8d08b74e-6dd1-44ec-ba0a-a2066b38d879 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '374', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8d08b74e-6dd1-44ec-ba0a-a2066b38d879', 'x-compute-request-id': 'req-8d08b74e-6dd1-44ec-ba0a-a2066b38d879', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826/os-interface'} Body: b'{"interfaceAttachments": [{"net_id": "f747eec6-c776-4af6-aa67-8eb73e88914e", "port_id": "1df0e979-f494-4217-a330-024aa7c0300e", "mac_addr": "fa:16:3e:b6:79:e7", "port_state": "ACTIVE", "fixed_ips": [{"subnet_id": "a7138c88-1746-4acf-b367-e81e790bf9d7", "ip_address": "192.168.120.10"}, {"subnet_id": "a7138c88-1746-4acf-b367-e81e790bf9d7", "ip_address": "192.168.120.7"}]}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:33.891 40 INFO tempest.lib.common.rest_client [req-953fae3a-e6f3-4d15-b8c8-ca6b008c475d ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/05e89bb41ef44a46ab515fb12ff2530b/users/ad6669f9f5844b22a68a5fa021f443c4/roles/72a4576c553448cd941b052c1ca0cf2d 0.057s 2020-11-06 18:01:33.891 40 DEBUG tempest.lib.common.rest_client [req-953fae3a-e6f3-4d15-b8c8-ca6b008c475d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-953fae3a-e6f3-4d15-b8c8-ca6b008c475d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/05e89bb41ef44a46ab515fb12ff2530b/users/ad6669f9f5844b22a68a5fa021f443c4/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:33.956 38 INFO tempest.lib.common.rest_client [req-e6cc3fbd-aaa8-4592-964b-6eb945584761 ] Request (MiscPolicyActionsNetworkRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/ports?network_id=76f18a02-b98c-4b49-9ce2-560e504bc8a8 0.060s 2020-11-06 18:01:33.957 38 DEBUG tempest.lib.common.rest_client [req-e6cc3fbd-aaa8-4592-964b-6eb945584761 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '1229', 'x-openstack-request-id': 'req-e6cc3fbd-aaa8-4592-964b-6eb945584761', 'date': 'Fri, 06 Nov 2020 18:01:33 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports?network_id=76f18a02-b98c-4b49-9ce2-560e504bc8a8'} Body: b'{"ports":[{"id":"7db75e4e-a8b5-400f-bf6b-8820a6a00c74","name":"","network_id":"76f18a02-b98c-4b49-9ce2-560e504bc8a8","tenant_id":"4f44b0a1b5fe4a17b77cabcf20e9501b","mac_address":"fa:16:3e:66:29:23","admin_state_up":true,"status":"ACTIVE","device_id":"dhcpcf0aa1ad-fc1e-58c4-863b-aba14f17f098-76f18a02-b98c-4b49-9ce2-560e504bc8a8","device_owner":"network:dhcp","fixed_ips":[{"subnet_id":"7cc652b1-42a3-434f-8267-0b79a65decc2","ip_address":"192.168.120.2"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":[],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"lf-virtual9","binding:vif_type":"ovs","binding:vif_details":{"connectivity":"l2","port_filter":true,"ovs_hybrid_plug":false,"datapath_type":"system","bridge_name":"br-int"},"port_security_enabled":false,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.2","hostname":"host-192-168-120-2","fqdn":"host-192-168-120-2.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:01:00Z","updated_at":"2020-11-06T18:01:04Z","revision_number":3,"project_id":"4f44b0a1b5fe4a17b77cabcf20e9501b"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:34.002 40 INFO tempest.lib.common.rest_client [req-668946b0-e661-4e49-aec8-db5741dff2b1 ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/05e89bb41ef44a46ab515fb12ff2530b/users/ad6669f9f5844b22a68a5fa021f443c4/roles/a629c95d64b3416fb80ae90af4f69c05 0.109s 2020-11-06 18:01:34.002 40 DEBUG tempest.lib.common.rest_client [req-668946b0-e661-4e49-aec8-db5741dff2b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-668946b0-e661-4e49-aec8-db5741dff2b1', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/05e89bb41ef44a46ab515fb12ff2530b/users/ad6669f9f5844b22a68a5fa021f443c4/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:34.220 37 INFO tempest.lib.common.rest_client [req-cbf5b033-864a-4d5a-9437-79bb8ced1481 ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 200 GET http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09/volumes/af94feae-2c64-4f66-978a-2eb00d12ad7c 0.079s 2020-11-06 18:01:34.221 37 DEBUG tempest.lib.common.rest_client [req-cbf5b033-864a-4d5a-9437-79bb8ced1481 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-cbf5b033-864a-4d5a-9437-79bb8ced1481', 'content-length': '1124', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-cbf5b033-864a-4d5a-9437-79bb8ced1481', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09/volumes/af94feae-2c64-4f66-978a-2eb00d12ad7c'} Body: b'{"volume": {"id": "af94feae-2c64-4f66-978a-2eb00d12ad7c", "status": "downloading", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:01:32.000000", "updated_at": "2020-11-06T18:01:33.000000", "name": "tempest-ComputeServersRbacTest-volume-82098402", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09/volumes/af94feae-2c64-4f66-978a-2eb00d12ad7c"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/738a797d686c408e8ceb6a8b32bc1d09/volumes/af94feae-2c64-4f66-978a-2eb00d12ad7c"}], "user_id": "262f98552a3a4d8a8fba3f96d5a872bf", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "volume_image_metadata": {"signature_verified": "False"}, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "738a797d686c408e8ceb6a8b32bc1d09"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:34.594 38 INFO tempest.lib.common.rest_client [req-5cdd58b8-2b1c-401d-8a15-8378d9ef2c27 ] Request (MiscPolicyActionsNetworkRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/7db75e4e-a8b5-400f-bf6b-8820a6a00c74 0.636s 2020-11-06 18:01:34.594 38 DEBUG tempest.lib.common.rest_client [req-5cdd58b8-2b1c-401d-8a15-8378d9ef2c27 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-5cdd58b8-2b1c-401d-8a15-8378d9ef2c27', 'date': 'Fri, 06 Nov 2020 18:01:34 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/7db75e4e-a8b5-400f-bf6b-8820a6a00c74'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:34.802 39 INFO tempest.lib.common.rest_client [req-ba2a0f2c-3930-4e2c-a9ec-2bc9260ddf05 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.267s 2020-11-06 18:01:34.803 39 DEBUG tempest.lib.common.rest_client [req-ba2a0f2c-3930-4e2c-a9ec-2bc9260ddf05 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ba2a0f2c-3930-4e2c-a9ec-2bc9260ddf05', 'x-compute-request-id': 'req-ba2a0f2c-3930-4e2c-a9ec-2bc9260ddf05', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:35.098 40 INFO tempest.lib.common.rest_client [req-50787e7d-f02d-4baa-88c4-ffee248d5a63 ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-11-06 18:01:35.099 40 DEBUG tempest.lib.common.rest_client [req-50787e7d-f02d-4baa-88c4-ffee248d5a63 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6660', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-50787e7d-f02d-4baa-88c4-ffee248d5a63', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ad6669f9f5844b22a68a5fa021f443c4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233", "password_expires_at": null}, "audit_ids": ["AEKzYgIzTUSQGCiR_yWfJg"], "expires_at": "2020-11-06T19:01:35.000000Z", "issued_at": "2020-11-06T18:01:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "05e89bb41ef44a46ab515fb12ff2530b", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b24 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:35.137 40 INFO tempest.lib.common.rest_client [req-17d9f21a-5675-4091-87d0-f3cc99c6c159 ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:01:35.138 40 DEBUG tempest.lib.common.rest_client [req-17d9f21a-5675-4091-87d0-f3cc99c6c159 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6660', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-17d9f21a-5675-4091-87d0-f3cc99c6c159', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ad6669f9f5844b22a68a5fa021f443c4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233", "password_expires_at": null}, "audit_ids": ["t3pGZ778TRWXf3yPgvoxpw"], "expires_at": "2020-11-06T19:01:35.000000Z", "issued_at": "2020-11-06T18:01:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "05e89bb41ef44a46ab515fb12ff2530b", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b24 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:35.200 38 INFO tempest.lib.common.rest_client [req-df14d0dd-51d2-4b2e-b240-dedd979ad40e ] Request (MiscPolicyActionsNetworkRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/7cc652b1-42a3-434f-8267-0b79a65decc2 0.605s 2020-11-06 18:01:35.201 38 DEBUG tempest.lib.common.rest_client [req-df14d0dd-51d2-4b2e-b240-dedd979ad40e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-df14d0dd-51d2-4b2e-b240-dedd979ad40e', 'date': 'Fri, 06 Nov 2020 18:01:35 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/7cc652b1-42a3-434f-8267-0b79a65decc2'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:35.275 40 INFO tempest.lib.common.rest_client [req-f6a7a55f-009f-4612-bd55-08ace0ea7bca ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/qos/policies 0.135s 2020-11-06 18:01:35.276 40 DEBUG tempest.lib.common.rest_client [req-f6a7a55f-009f-4612-bd55-08ace0ea7bca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"policy": {"name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-qos-policy-439641773", "shared": false, "is_default": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '413', 'x-openstack-request-id': 'req-f6a7a55f-009f-4612-bd55-08ace0ea7bca', 'date': 'Fri, 06 Nov 2020 18:01:35 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies'} Body: b'{"policy": {"id": "2a9c627c-5841-45fb-b5b5-e1c4f0beb4fa", "project_id": "05e89bb41ef44a46ab515fb12ff2530b", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-qos-policy-439641773", "shared": false, "rules": [], "is_default": false, "revision_number": 0, "description": "", "created_at": "2020-11-06T18:01:35Z", "updated_at": "2020-11-06T18:01:35Z", "tenant_id": "05e89bb41ef44a46ab515fb12ff2530b", "tags": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:35.277 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:35.280 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_policy_bandwidth_limit_rule, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:35.280 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:35.306 37 INFO tempest.lib.common.rest_client [req-4a4ec94f-d72a-45cb-a6e4-059d9b887372 ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 200 GET http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09/volumes/af94feae-2c64-4f66-978a-2eb00d12ad7c 0.073s 2020-11-06 18:01:35.306 37 DEBUG tempest.lib.common.rest_client [req-4a4ec94f-d72a-45cb-a6e4-059d9b887372 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4a4ec94f-d72a-45cb-a6e4-059d9b887372', 'content-length': '1717', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4a4ec94f-d72a-45cb-a6e4-059d9b887372', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09/volumes/af94feae-2c64-4f66-978a-2eb00d12ad7c'} Body: b'{"volume": {"id": "af94feae-2c64-4f66-978a-2eb00d12ad7c", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:01:32.000000", "updated_at": "2020-11-06T18:01:35.000000", "name": "tempest-ComputeServersRbacTest-volume-82098402", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09/volumes/af94feae-2c64-4f66-978a-2eb00d12ad7c"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/738a797d686c408e8ceb6a8b32bc1d09/volumes/af94feae-2c64-4f66-978a-2eb00d12ad7c"}], "user_id": "262f98552a3a4d8a8fba3f96d5a872bf", "bootable": "true", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "volume_image_metadata": {"signature_verified": "False", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "image_id": "56b368f6-9136-40ec-a04c-564d02c95e42", "image_name": "patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "checksum": "443b7623e27ecf03dc9e01ee93f67afe", "container_format": "bare", "disk_format": "qcow2", "min_disk": "0", "min_ram": "0", "size": "12716032"}, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "738a797d686c408e8ceb6a8b32bc1d09"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:35.322 37 INFO tempest.common.waiters [-] volume af94feae-2c64-4f66-978a-2eb00d12ad7c reached available after waiting for 3.322109 seconds 2020-11-06 18:01:35.322 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:35.391 40 INFO tempest.lib.common.rest_client [req-32a60c82-8869-4e85-9387-48c0d69d8047 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_create_policy_bandwidth_limit_rule): 200 GET http://172.30.13.94/identity/v3/projects/05e89bb41ef44a46ab515fb12ff2530b/users/ad6669f9f5844b22a68a5fa021f443c4/roles 0.110s 2020-11-06 18:01:35.392 40 DEBUG tempest.lib.common.rest_client [req-32a60c82-8869-4e85-9387-48c0d69d8047 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-32a60c82-8869-4e85-9387-48c0d69d8047', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/05e89bb41ef44a46ab515fb12ff2530b/users/ad6669f9f5844b22a68a5fa021f443c4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/05e89bb41ef44a46ab515fb12ff2530b/users/ad6669f9f5844b22a68a5fa021f443c4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:35.423 37 INFO tempest.lib.common.rest_client [req-63d18774-d4e0-42ab-9f2d-7573b387f3d5 ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 200 GET http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles 0.100s 2020-11-06 18:01:35.424 37 DEBUG tempest.lib.common.rest_client [req-63d18774-d4e0-42ab-9f2d-7573b387f3d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-63d18774-d4e0-42ab-9f2d-7573b387f3d5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:35.424 40 INFO tempest.lib.common.rest_client [req-d879b572-1b68-4bb8-92cd-e9deccb0c914 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_create_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:01:35.425 40 DEBUG tempest.lib.common.rest_client [req-d879b572-1b68-4bb8-92cd-e9deccb0c914 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6660', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d879b572-1b68-4bb8-92cd-e9deccb0c914', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ad6669f9f5844b22a68a5fa021f443c4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233", "password_expires_at": null}, "audit_ids": ["FriaZI9kRuifWA2xIYg1gg"], "expires_at": "2020-11-06T19:01:35.000000Z", "issued_at": "2020-11-06T18:01:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "05e89bb41ef44a46ab515fb12ff2530b", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b24 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:35.455 40 INFO tempest.lib.common.rest_client [req-6d039daf-9633-444f-bd5a-ce93cb6a0905 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_create_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.029s 2020-11-06 18:01:35.456 40 DEBUG tempest.lib.common.rest_client [req-6d039daf-9633-444f-bd5a-ce93cb6a0905 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6660', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6d039daf-9633-444f-bd5a-ce93cb6a0905', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ad6669f9f5844b22a68a5fa021f443c4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233", "password_expires_at": null}, "audit_ids": ["6apjk4RhQueyNkpoJhjxrg"], "expires_at": "2020-11-06T19:01:35.000000Z", "issued_at": "2020-11-06T18:01:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "05e89bb41ef44a46ab515fb12ff2530b", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b24 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:35.504 37 INFO tempest.lib.common.rest_client [req-d538a0b2-23db-424f-bb1f-391fb1129b42 ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.079s 2020-11-06 18:01:35.505 37 DEBUG tempest.lib.common.rest_client [req-d538a0b2-23db-424f-bb1f-391fb1129b42 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d538a0b2-23db-424f-bb1f-391fb1129b42', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "262f98552a3a4d8a8fba3f96d5a872bf", "name": "tempest-ComputeServersRbacTest-1376603226", "password_expires_at": null}, "audit_ids": ["QGeqylIlTciHnTi74ADzlw"], "expires_at": "2020-11-06T19:01:35.000000Z", "issued_at": "2020-11-06T18:01:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "738a797d686c408e8ceb6a8b32bc1d09", "name": "tempest-ComputeServersRbacTest-1376603226"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:35.636 40 INFO tempest.lib.common.rest_client [req-5c372608-2ff8-484b-921e-668d518efeb9 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_create_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94:9696/v2.0/qos/policies/2a9c627c-5841-45fb-b5b5-e1c4f0beb4fa/bandwidth_limit_rules 0.179s 2020-11-06 18:01:35.637 40 DEBUG tempest.lib.common.rest_client [req-5c372608-2ff8-484b-921e-668d518efeb9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"bandwidth_limit_rule": {"max_kbps": 1000, "max_burst_kbps": 1000, "direction": "egress"}} Response - Headers: {'content-type': 'application/json', 'content-length': '137', 'x-openstack-request-id': 'req-5c372608-2ff8-484b-921e-668d518efeb9', 'date': 'Fri, 06 Nov 2020 18:01:35 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/2a9c627c-5841-45fb-b5b5-e1c4f0beb4fa/bandwidth_limit_rules'} Body: b'{"bandwidth_limit_rule": {"max_kbps": 1000, "max_burst_kbps": 1000, "direction": "egress", "id": "f5889ca2-7fe4-4469-9e2a-515ced7966d9"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:35.637 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:35.688 40 INFO tempest.lib.common.rest_client [req-f2a80e14-d1e1-4fd4-9be8-bbeece651372 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_create_policy_bandwidth_limit_rule): 200 GET http://172.30.13.94/identity/v3/projects/05e89bb41ef44a46ab515fb12ff2530b/users/ad6669f9f5844b22a68a5fa021f443c4/roles 0.050s 2020-11-06 18:01:35.689 40 DEBUG tempest.lib.common.rest_client [req-f2a80e14-d1e1-4fd4-9be8-bbeece651372 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f2a80e14-d1e1-4fd4-9be8-bbeece651372', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/05e89bb41ef44a46ab515fb12ff2530b/users/ad6669f9f5844b22a68a5fa021f443c4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/05e89bb41ef44a46ab515fb12ff2530b/users/ad6669f9f5844b22a68a5fa021f443c4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:35.723 40 INFO tempest.lib.common.rest_client [req-36454248-8832-49d9-8a79-c37409844d40 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_create_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:01:35.723 40 DEBUG tempest.lib.common.rest_client [req-36454248-8832-49d9-8a79-c37409844d40 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6660', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-36454248-8832-49d9-8a79-c37409844d40', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ad6669f9f5844b22a68a5fa021f443c4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233", "password_expires_at": null}, "audit_ids": ["oMuXwOvgQKaQaSd-HIiGdA"], "expires_at": "2020-11-06T19:01:35.000000Z", "issued_at": "2020-11-06T18:01:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "05e89bb41ef44a46ab515fb12ff2530b", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b24 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:35.761 40 INFO tempest.lib.common.rest_client [req-486a8f3a-c197-43bb-b30d-509143ef1fcb ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_create_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:01:35.762 40 DEBUG tempest.lib.common.rest_client [req-486a8f3a-c197-43bb-b30d-509143ef1fcb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6660', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-486a8f3a-c197-43bb-b30d-509143ef1fcb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ad6669f9f5844b22a68a5fa021f443c4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233", "password_expires_at": null}, "audit_ids": ["zw2puUrjQUy-sxpbzzx0_A"], "expires_at": "2020-11-06T19:01:35.000000Z", "issued_at": "2020-11-06T18:01:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "05e89bb41ef44a46ab515fb12ff2530b", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b24 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:36.050 38 INFO tempest.lib.common.rest_client [req-52a0dcfb-8d1f-4b48-94da-74c16a5bd3b9 ] Request (MiscPolicyActionsNetworkRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/76f18a02-b98c-4b49-9ce2-560e504bc8a8 0.848s 2020-11-06 18:01:36.051 38 DEBUG tempest.lib.common.rest_client [req-52a0dcfb-8d1f-4b48-94da-74c16a5bd3b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-52a0dcfb-8d1f-4b48-94da-74c16a5bd3b9', 'date': 'Fri, 06 Nov 2020 18:01:36 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/76f18a02-b98c-4b49-9ce2-560e504bc8a8'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:36.055 40 INFO tempest.lib.common.rest_client [req-7dd0797e-00ac-45de-ac1f-e9c4311f70de ] Request (PolicyBandwidthLimitRuleExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/2a9c627c-5841-45fb-b5b5-e1c4f0beb4fa/bandwidth_limit_rules/f5889ca2-7fe4-4469-9e2a-515ced7966d9 0.292s 2020-11-06 18:01:36.056 40 DEBUG tempest.lib.common.rest_client [req-7dd0797e-00ac-45de-ac1f-e9c4311f70de ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-7dd0797e-00ac-45de-ac1f-e9c4311f70de', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:01:36 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/2a9c627c-5841-45fb-b5b5-e1c4f0beb4fa/bandwidth_limit_rules/f5889ca2-7fe4-4469-9e2a-515ced7966d9'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:36.059 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:36.063 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_policy_bandwidth_limit_rule, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:36.063 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:36.067 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_policy_bandwidth_limit_rule, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:36.089 39 INFO tempest.lib.common.rest_client [req-ed406c22-e5b8-4002-b5f4-1323a3d4aadf ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.270s 2020-11-06 18:01:36.090 39 DEBUG tempest.lib.common.rest_client [req-ed406c22-e5b8-4002-b5f4-1323a3d4aadf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ed406c22-e5b8-4002-b5f4-1323a3d4aadf', 'x-compute-request-id': 'req-ed406c22-e5b8-4002-b5f4-1323a3d4aadf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:36.152 40 INFO tempest.lib.common.rest_client [req-0a0214a4-387f-45fb-ab1d-2e88a5205ebf ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_delete_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94:9696/v2.0/qos/policies/2a9c627c-5841-45fb-b5b5-e1c4f0beb4fa/bandwidth_limit_rules 0.084s 2020-11-06 18:01:36.152 40 DEBUG tempest.lib.common.rest_client [req-0a0214a4-387f-45fb-ab1d-2e88a5205ebf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"bandwidth_limit_rule": {"max_kbps": 1000, "max_burst_kbps": 1000, "direction": "egress"}} Response - Headers: {'content-type': 'application/json', 'content-length': '137', 'x-openstack-request-id': 'req-0a0214a4-387f-45fb-ab1d-2e88a5205ebf', 'date': 'Fri, 06 Nov 2020 18:01:36 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/2a9c627c-5841-45fb-b5b5-e1c4f0beb4fa/bandwidth_limit_rules'} Body: b'{"bandwidth_limit_rule": {"max_kbps": 1000, "max_burst_kbps": 1000, "direction": "egress", "id": "49c063c1-732f-498f-a094-d84cd395f31e"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:36.153 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:36.197 38 INFO tempest.lib.common.rest_client [req-3bf6de4f-797f-4f68-ba98-be0abd7b72bb ] Request (MiscPolicyActionsNetworkRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826 0.145s 2020-11-06 18:01:36.198 38 DEBUG tempest.lib.common.rest_client [req-3bf6de4f-797f-4f68-ba98-be0abd7b72bb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3bf6de4f-797f-4f68-ba98-be0abd7b72bb', 'x-compute-request-id': 'req-3bf6de4f-797f-4f68-ba98-be0abd7b72bb', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:36.208 40 INFO tempest.lib.common.rest_client [req-d9e05144-7307-4882-b42c-4090d2b9421b ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_delete_policy_bandwidth_limit_rule): 200 GET http://172.30.13.94/identity/v3/projects/05e89bb41ef44a46ab515fb12ff2530b/users/ad6669f9f5844b22a68a5fa021f443c4/roles 0.054s 2020-11-06 18:01:36.208 40 DEBUG tempest.lib.common.rest_client [req-d9e05144-7307-4882-b42c-4090d2b9421b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d9e05144-7307-4882-b42c-4090d2b9421b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/05e89bb41ef44a46ab515fb12ff2530b/users/ad6669f9f5844b22a68a5fa021f443c4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/05e89bb41ef44a46ab515fb12ff2530b/users/ad6669f9f5844b22a68a5fa021f443c4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:36.252 40 INFO tempest.lib.common.rest_client [req-aec8edb8-06de-450f-9c67-b104e35108a9 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_delete_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-11-06 18:01:36.252 40 DEBUG tempest.lib.common.rest_client [req-aec8edb8-06de-450f-9c67-b104e35108a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6660', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aec8edb8-06de-450f-9c67-b104e35108a9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ad6669f9f5844b22a68a5fa021f443c4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233", "password_expires_at": null}, "audit_ids": ["m56iUMoQSaOi3-GJwHhZXA"], "expires_at": "2020-11-06T19:01:36.000000Z", "issued_at": "2020-11-06T18:01:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "05e89bb41ef44a46ab515fb12ff2530b", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b24 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:36.287 40 INFO tempest.lib.common.rest_client [req-9b146727-a003-4f3f-a317-9b6eb3d61c41 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_delete_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:01:36.288 40 DEBUG tempest.lib.common.rest_client [req-9b146727-a003-4f3f-a317-9b6eb3d61c41 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6660', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9b146727-a003-4f3f-a317-9b6eb3d61c41', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ad6669f9f5844b22a68a5fa021f443c4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233", "password_expires_at": null}, "audit_ids": ["wX1secyOScKKJzUk3PKPzw"], "expires_at": "2020-11-06T19:01:36.000000Z", "issued_at": "2020-11-06T18:01:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "05e89bb41ef44a46ab515fb12ff2530b", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b24 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:36.406 40 INFO tempest.lib.common.rest_client [req-7a826bb4-ea53-4689-8c81-1dddb86fd5a5 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_delete_policy_bandwidth_limit_rule): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/2a9c627c-5841-45fb-b5b5-e1c4f0beb4fa/bandwidth_limit_rules/49c063c1-732f-498f-a094-d84cd395f31e 0.116s 2020-11-06 18:01:36.406 40 DEBUG tempest.lib.common.rest_client [req-7a826bb4-ea53-4689-8c81-1dddb86fd5a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-7a826bb4-ea53-4689-8c81-1dddb86fd5a5', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:01:36 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/2a9c627c-5841-45fb-b5b5-e1c4f0beb4fa/bandwidth_limit_rules/49c063c1-732f-498f-a094-d84cd395f31e'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:36.407 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:36.467 40 INFO tempest.lib.common.rest_client [req-f91acbb4-a148-4fca-afcc-f47279c62764 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_delete_policy_bandwidth_limit_rule): 200 GET http://172.30.13.94/identity/v3/projects/05e89bb41ef44a46ab515fb12ff2530b/users/ad6669f9f5844b22a68a5fa021f443c4/roles 0.058s 2020-11-06 18:01:36.467 40 DEBUG tempest.lib.common.rest_client [req-f91acbb4-a148-4fca-afcc-f47279c62764 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f91acbb4-a148-4fca-afcc-f47279c62764', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/05e89bb41ef44a46ab515fb12ff2530b/users/ad6669f9f5844b22a68a5fa021f443c4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/05e89bb41ef44a46ab515fb12ff2530b/users/ad6669f9f5844b22a68a5fa021f443c4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:36.505 40 INFO tempest.lib.common.rest_client [req-b5015cd1-a1a4-422d-a301-210c722c3210 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_delete_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:01:36.505 40 DEBUG tempest.lib.common.rest_client [req-b5015cd1-a1a4-422d-a301-210c722c3210 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6660', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b5015cd1-a1a4-422d-a301-210c722c3210', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ad6669f9f5844b22a68a5fa021f443c4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233", "password_expires_at": null}, "audit_ids": ["r5MrHaQvTUqdS9ZSiV-Fwg"], "expires_at": "2020-11-06T19:01:36.000000Z", "issued_at": "2020-11-06T18:01:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "05e89bb41ef44a46ab515fb12ff2530b", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b24 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:36.538 37 INFO tempest.lib.common.rest_client [req-e29df526-418e-4add-b12a-f23bfda37017 ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 202 POST http://172.30.13.94/compute/v2.1/servers 1.031s 2020-11-06 18:01:36.538 37 DEBUG tempest.lib.common.rest_client [req-e29df526-418e-4add-b12a-f23bfda37017 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-ComputeServersRbacTest-Server-1807623844", "flavorRef": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "imageRef": "", "networks": [{"uuid": "4c841a1c-655b-4758-ac88-8f8b657eda1b"}], "block_device_mapping_v2": [{"uuid": "af94feae-2c64-4f66-978a-2eb00d12ad7c", "source_type": "volume", "destination_type": "volume", "boot_index": 0, "delete_on_termination": false}]}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e29df526-418e-4add-b12a-f23bfda37017', 'x-compute-request-id': 'req-e29df526-418e-4add-b12a-f23bfda37017', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "d09fce60-e537-4bc8-9db8-df2a08c4d747", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "2rgwpcd9fvXC"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:36.541 40 INFO tempest.lib.common.rest_client [req-5f8db025-e3fd-4373-906b-ee814a29ce77 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_delete_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:01:36.542 40 DEBUG tempest.lib.common.rest_client [req-5f8db025-e3fd-4373-906b-ee814a29ce77 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6660', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5f8db025-e3fd-4373-906b-ee814a29ce77', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ad6669f9f5844b22a68a5fa021f443c4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233", "password_expires_at": null}, "audit_ids": ["VcErk_fvR_G_T3ZajIbXiA"], "expires_at": "2020-11-06T19:01:36.000000Z", "issued_at": "2020-11-06T18:01:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "05e89bb41ef44a46ab515fb12ff2530b", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b24 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:36.543 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:36.603 37 INFO tempest.lib.common.rest_client [req-2b10b598-1a41-40c2-8d52-cc73925e6cde ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 200 GET http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles 0.059s 2020-11-06 18:01:36.603 37 DEBUG tempest.lib.common.rest_client [req-2b10b598-1a41-40c2-8d52-cc73925e6cde ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2b10b598-1a41-40c2-8d52-cc73925e6cde', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:36.645 37 INFO tempest.lib.common.rest_client [req-3062a82d-07bf-4ebd-930c-4d93a9f9de16 ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:01:36.645 37 DEBUG tempest.lib.common.rest_client [req-3062a82d-07bf-4ebd-930c-4d93a9f9de16 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3062a82d-07bf-4ebd-930c-4d93a9f9de16', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "262f98552a3a4d8a8fba3f96d5a872bf", "name": "tempest-ComputeServersRbacTest-1376603226", "password_expires_at": null}, "audit_ids": ["YmRwSMOZQiyh34lEjmhS_w"], "expires_at": "2020-11-06T19:01:36.000000Z", "issued_at": "2020-11-06T18:01:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "738a797d686c408e8ceb6a8b32bc1d09", "name": "tempest-ComputeServersRbacTest-1376603226"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:36.647 40 INFO tempest.lib.common.rest_client [req-b610dc7a-74f4-4545-be9b-79b7f381d128 ] Request (PolicyBandwidthLimitRuleExtRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94:9696/v2.0/qos/policies/2a9c627c-5841-45fb-b5b5-e1c4f0beb4fa/bandwidth_limit_rules/49c063c1-732f-498f-a094-d84cd395f31e 0.104s 2020-11-06 18:01:36.648 40 DEBUG tempest.lib.common.rest_client [req-b610dc7a-74f4-4545-be9b-79b7f381d128 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '187', 'x-openstack-request-id': 'req-b610dc7a-74f4-4545-be9b-79b7f381d128', 'date': 'Fri, 06 Nov 2020 18:01:36 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/2a9c627c-5841-45fb-b5b5-e1c4f0beb4fa/bandwidth_limit_rules/49c063c1-732f-498f-a094-d84cd395f31e'} Body: b'{"NeutronError": {"type": "QosRuleNotFound", "message": "QoS rule 49c063c1-732f-498f-a094-d84cd395f31e for policy 2a9c627c-5841-45fb-b5b5-e1c4f0beb4fa could not be found.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:36.651 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:36.655 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_policy_bandwidth_limit_rule, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:36.677 38 INFO tempest.lib.common.rest_client [req-ba0e4b9c-285d-4232-869b-45a8451966c1 ] Request (MiscPolicyActionsNetworkRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826 0.478s 2020-11-06 18:01:36.677 38 DEBUG tempest.lib.common.rest_client [req-ba0e4b9c-285d-4232-869b-45a8451966c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1863', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ba0e4b9c-285d-4232-869b-45a8451966c1', 'x-compute-request-id': 'req-ba0e4b9c-285d-4232-869b-45a8451966c1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826'} Body: b'{"server": {"id": "400f4368-ffc1-4bc4-8fe6-fddf93f90826", "name": "tempest-MiscPolicyActionsNetworkRbacTest-server-807842018", "status": "ACTIVE", "tenant_id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "user_id": "1db6819d47a748669464ad962e63976e", "metadata": {}, "hostId": "ece68e332f20fc5533900b2d7968634335d3e48777e967f3ff177a1f", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:50Z", "updated": "2020-11-06T18:01:36Z", "addresses": {"tempest-MiscPolicyActionsNetworkRbacTest-1290166897-network": [{"version": 4, "addr": "192.168.120.10", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:b6:79:e7"}, {"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:b6:79:e7"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:57.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c9", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:36.751 40 INFO tempest.lib.common.rest_client [req-b09787bb-0472-473f-86b6-213f4025b37e ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_show_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94:9696/v2.0/qos/policies/2a9c627c-5841-45fb-b5b5-e1c4f0beb4fa/bandwidth_limit_rules 0.095s 2020-11-06 18:01:36.752 40 DEBUG tempest.lib.common.rest_client [req-b09787bb-0472-473f-86b6-213f4025b37e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"bandwidth_limit_rule": {"max_kbps": 1000, "max_burst_kbps": 1000, "direction": "egress"}} Response - Headers: {'content-type': 'application/json', 'content-length': '137', 'x-openstack-request-id': 'req-b09787bb-0472-473f-86b6-213f4025b37e', 'date': 'Fri, 06 Nov 2020 18:01:36 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/2a9c627c-5841-45fb-b5b5-e1c4f0beb4fa/bandwidth_limit_rules'} Body: b'{"bandwidth_limit_rule": {"max_kbps": 1000, "max_burst_kbps": 1000, "direction": "egress", "id": "4bd3c475-6529-4cf2-b696-f24643efd5a3"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:36.753 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:36.804 40 INFO tempest.lib.common.rest_client [req-f1434b0b-0cd9-4f48-ac69-05a7ed54cee9 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_show_policy_bandwidth_limit_rule): 200 GET http://172.30.13.94/identity/v3/projects/05e89bb41ef44a46ab515fb12ff2530b/users/ad6669f9f5844b22a68a5fa021f443c4/roles 0.050s 2020-11-06 18:01:36.805 40 DEBUG tempest.lib.common.rest_client [req-f1434b0b-0cd9-4f48-ac69-05a7ed54cee9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f1434b0b-0cd9-4f48-ac69-05a7ed54cee9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/05e89bb41ef44a46ab515fb12ff2530b/users/ad6669f9f5844b22a68a5fa021f443c4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/05e89bb41ef44a46ab515fb12ff2530b/users/ad6669f9f5844b22a68a5fa021f443c4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:36.831 37 INFO tempest.lib.common.rest_client [req-d99c3830-35b6-4968-a1ab-e86b94407613 ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 200 GET http://172.30.13.94/compute/v2.1/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747 0.184s 2020-11-06 18:01:36.832 37 DEBUG tempest.lib.common.rest_client [req-d99c3830-35b6-4968-a1ab-e86b94407613 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1239', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d99c3830-35b6-4968-a1ab-e86b94407613', 'x-compute-request-id': 'req-d99c3830-35b6-4968-a1ab-e86b94407613', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747'} Body: b'{"server": {"id": "d09fce60-e537-4bc8-9db8-df2a08c4d747", "name": "tempest-ComputeServersRbacTest-Server-1807623844", "status": "BUILD", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "user_id": "262f98552a3a4d8a8fba3f96d5a872bf", "metadata": {}, "hostId": "", "image": "", "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:01:37Z", "updated": "2020-11-06T18:01:36Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:36.858 40 INFO tempest.lib.common.rest_client [req-cb1a8fed-3945-4025-8b28-e5d91aa42ab8 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_show_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-11-06 18:01:36.859 40 DEBUG tempest.lib.common.rest_client [req-cb1a8fed-3945-4025-8b28-e5d91aa42ab8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6660', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cb1a8fed-3945-4025-8b28-e5d91aa42ab8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ad6669f9f5844b22a68a5fa021f443c4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233", "password_expires_at": null}, "audit_ids": ["E2P6QkRrSKeI560n2ctRPw"], "expires_at": "2020-11-06T19:01:36.000000Z", "issued_at": "2020-11-06T18:01:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "05e89bb41ef44a46ab515fb12ff2530b", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b24 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:36.891 40 INFO tempest.lib.common.rest_client [req-2669d970-5dd6-4a5c-9b7a-8fb6b3336165 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_show_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:01:36.892 40 DEBUG tempest.lib.common.rest_client [req-2669d970-5dd6-4a5c-9b7a-8fb6b3336165 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6660', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2669d970-5dd6-4a5c-9b7a-8fb6b3336165', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ad6669f9f5844b22a68a5fa021f443c4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233", "password_expires_at": null}, "audit_ids": ["6TrVftKATuKzoLOLDfPCrg"], "expires_at": "2020-11-06T19:01:36.000000Z", "issued_at": "2020-11-06T18:01:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "05e89bb41ef44a46ab515fb12ff2530b", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b24 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:37.144 40 INFO tempest.lib.common.rest_client [req-5aa15d6f-d2d1-41d1-9a37-4d0746590a8a ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_show_policy_bandwidth_limit_rule): 200 GET http://172.30.13.94:9696/v2.0/qos/policies/2a9c627c-5841-45fb-b5b5-e1c4f0beb4fa/bandwidth_limit_rules/4bd3c475-6529-4cf2-b696-f24643efd5a3 0.250s 2020-11-06 18:01:37.144 40 DEBUG tempest.lib.common.rest_client [req-5aa15d6f-d2d1-41d1-9a37-4d0746590a8a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '137', 'x-openstack-request-id': 'req-5aa15d6f-d2d1-41d1-9a37-4d0746590a8a', 'date': 'Fri, 06 Nov 2020 18:01:37 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/2a9c627c-5841-45fb-b5b5-e1c4f0beb4fa/bandwidth_limit_rules/4bd3c475-6529-4cf2-b696-f24643efd5a3'} Body: b'{"bandwidth_limit_rule": {"max_kbps": 1000, "max_burst_kbps": 1000, "direction": "egress", "id": "4bd3c475-6529-4cf2-b696-f24643efd5a3"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:37.145 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:37.203 40 INFO tempest.lib.common.rest_client [req-7965d56d-1ee7-44ca-bcaf-c6eb7e70d3e7 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_show_policy_bandwidth_limit_rule): 200 GET http://172.30.13.94/identity/v3/projects/05e89bb41ef44a46ab515fb12ff2530b/users/ad6669f9f5844b22a68a5fa021f443c4/roles 0.057s 2020-11-06 18:01:37.203 40 DEBUG tempest.lib.common.rest_client [req-7965d56d-1ee7-44ca-bcaf-c6eb7e70d3e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7965d56d-1ee7-44ca-bcaf-c6eb7e70d3e7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/05e89bb41ef44a46ab515fb12ff2530b/users/ad6669f9f5844b22a68a5fa021f443c4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/05e89bb41ef44a46ab515fb12ff2530b/users/ad6669f9f5844b22a68a5fa021f443c4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:37.242 40 INFO tempest.lib.common.rest_client [req-91bb3289-25aa-4243-aeaa-edd10102ad3f ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_show_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:01:37.243 40 DEBUG tempest.lib.common.rest_client [req-91bb3289-25aa-4243-aeaa-edd10102ad3f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6660', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-91bb3289-25aa-4243-aeaa-edd10102ad3f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ad6669f9f5844b22a68a5fa021f443c4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233", "password_expires_at": null}, "audit_ids": ["vwLujPolSSSZwV8erBmL2w"], "expires_at": "2020-11-06T19:01:37.000000Z", "issued_at": "2020-11-06T18:01:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "05e89bb41ef44a46ab515fb12ff2530b", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b24 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:37.282 40 INFO tempest.lib.common.rest_client [req-8df3ebd7-4768-4583-ada4-f1d4874ea434 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_show_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:01:37.283 40 DEBUG tempest.lib.common.rest_client [req-8df3ebd7-4768-4583-ada4-f1d4874ea434 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6660', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8df3ebd7-4768-4583-ada4-f1d4874ea434', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ad6669f9f5844b22a68a5fa021f443c4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233", "password_expires_at": null}, "audit_ids": ["rRpevPSDTxqGLbg2NNUo2A"], "expires_at": "2020-11-06T19:01:37.000000Z", "issued_at": "2020-11-06T18:01:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "05e89bb41ef44a46ab515fb12ff2530b", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b24 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:37.361 39 INFO tempest.lib.common.rest_client [req-82ed9ccc-bc06-42ce-8285-fca7e734219a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.256s 2020-11-06 18:01:37.362 39 DEBUG tempest.lib.common.rest_client [req-82ed9ccc-bc06-42ce-8285-fca7e734219a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-82ed9ccc-bc06-42ce-8285-fca7e734219a', 'x-compute-request-id': 'req-82ed9ccc-bc06-42ce-8285-fca7e734219a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:37.631 40 INFO tempest.lib.common.rest_client [req-ffa3ae66-e3e1-4d38-b005-318609052aaa ] Request (PolicyBandwidthLimitRuleExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/2a9c627c-5841-45fb-b5b5-e1c4f0beb4fa/bandwidth_limit_rules/4bd3c475-6529-4cf2-b696-f24643efd5a3 0.347s 2020-11-06 18:01:37.631 40 DEBUG tempest.lib.common.rest_client [req-ffa3ae66-e3e1-4d38-b005-318609052aaa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-ffa3ae66-e3e1-4d38-b005-318609052aaa', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:01:37 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/2a9c627c-5841-45fb-b5b5-e1c4f0beb4fa/bandwidth_limit_rules/4bd3c475-6529-4cf2-b696-f24643efd5a3'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:37.634 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:37.637 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_policy_bandwidth_limit_rule, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:37.637 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:37.640 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_policy_bandwidth_limit_rule, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:37.735 40 INFO tempest.lib.common.rest_client [req-e99018f4-3750-4983-8d24-a560d05e893c ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_update_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94:9696/v2.0/qos/policies/2a9c627c-5841-45fb-b5b5-e1c4f0beb4fa/bandwidth_limit_rules 0.094s 2020-11-06 18:01:37.736 40 DEBUG tempest.lib.common.rest_client [req-e99018f4-3750-4983-8d24-a560d05e893c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"bandwidth_limit_rule": {"max_kbps": 1000, "max_burst_kbps": 1000, "direction": "egress"}} Response - Headers: {'content-type': 'application/json', 'content-length': '137', 'x-openstack-request-id': 'req-e99018f4-3750-4983-8d24-a560d05e893c', 'date': 'Fri, 06 Nov 2020 18:01:37 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/2a9c627c-5841-45fb-b5b5-e1c4f0beb4fa/bandwidth_limit_rules'} Body: b'{"bandwidth_limit_rule": {"max_kbps": 1000, "max_burst_kbps": 1000, "direction": "egress", "id": "faba8167-e4af-4b9c-9a8e-7ab16309a1cc"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:37.736 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:37.785 40 INFO tempest.lib.common.rest_client [req-188f58a6-731c-4e4c-bd60-40adde89e926 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_update_policy_bandwidth_limit_rule): 200 GET http://172.30.13.94/identity/v3/projects/05e89bb41ef44a46ab515fb12ff2530b/users/ad6669f9f5844b22a68a5fa021f443c4/roles 0.047s 2020-11-06 18:01:37.785 40 DEBUG tempest.lib.common.rest_client [req-188f58a6-731c-4e4c-bd60-40adde89e926 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-188f58a6-731c-4e4c-bd60-40adde89e926', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/05e89bb41ef44a46ab515fb12ff2530b/users/ad6669f9f5844b22a68a5fa021f443c4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/05e89bb41ef44a46ab515fb12ff2530b/users/ad6669f9f5844b22a68a5fa021f443c4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:37.819 40 INFO tempest.lib.common.rest_client [req-0e66c002-47e4-4419-bf8e-602dbe2ab4ac ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_update_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:01:37.820 40 DEBUG tempest.lib.common.rest_client [req-0e66c002-47e4-4419-bf8e-602dbe2ab4ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6660', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0e66c002-47e4-4419-bf8e-602dbe2ab4ac', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ad6669f9f5844b22a68a5fa021f443c4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233", "password_expires_at": null}, "audit_ids": ["HjcqHu5QThaWkigvhC2nyA"], "expires_at": "2020-11-06T19:01:37.000000Z", "issued_at": "2020-11-06T18:01:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "05e89bb41ef44a46ab515fb12ff2530b", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b24 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:37.853 40 INFO tempest.lib.common.rest_client [req-39531998-b6d8-4ed6-97d5-25d17225698f ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_update_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:01:37.853 40 DEBUG tempest.lib.common.rest_client [req-39531998-b6d8-4ed6-97d5-25d17225698f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6660', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-39531998-b6d8-4ed6-97d5-25d17225698f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ad6669f9f5844b22a68a5fa021f443c4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233", "password_expires_at": null}, "audit_ids": ["Tt0yfOPQSYWRLpOO1TjB9g"], "expires_at": "2020-11-06T19:01:37.000000Z", "issued_at": "2020-11-06T18:01:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "05e89bb41ef44a46ab515fb12ff2530b", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b24 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:37.917 38 INFO tempest.lib.common.rest_client [req-801f9403-ccc3-4833-8190-a4f4edea97bf ] Request (MiscPolicyActionsNetworkRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826 0.227s 2020-11-06 18:01:37.918 38 DEBUG tempest.lib.common.rest_client [req-801f9403-ccc3-4833-8190-a4f4edea97bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1523', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-801f9403-ccc3-4833-8190-a4f4edea97bf', 'x-compute-request-id': 'req-801f9403-ccc3-4833-8190-a4f4edea97bf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826'} Body: b'{"server": {"id": "400f4368-ffc1-4bc4-8fe6-fddf93f90826", "name": "tempest-MiscPolicyActionsNetworkRbacTest-server-807842018", "status": "ACTIVE", "tenant_id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "user_id": "1db6819d47a748669464ad962e63976e", "metadata": {}, "hostId": "ece68e332f20fc5533900b2d7968634335d3e48777e967f3ff177a1f", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:00:50Z", "updated": "2020-11-06T18:01:37Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:00:57.000000", "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033c9", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:38.088 40 INFO tempest.lib.common.rest_client [req-2cdd74e7-037c-4afe-8455-9ea4e1301785 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_update_policy_bandwidth_limit_rule): 200 PUT http://172.30.13.94:9696/v2.0/qos/policies/2a9c627c-5841-45fb-b5b5-e1c4f0beb4fa/bandwidth_limit_rules/faba8167-e4af-4b9c-9a8e-7ab16309a1cc 0.233s 2020-11-06 18:01:38.089 40 DEBUG tempest.lib.common.rest_client [req-2cdd74e7-037c-4afe-8455-9ea4e1301785 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"bandwidth_limit_rule": {"max_kbps": 2000}} Response - Headers: {'content-type': 'application/json', 'content-length': '137', 'x-openstack-request-id': 'req-2cdd74e7-037c-4afe-8455-9ea4e1301785', 'date': 'Fri, 06 Nov 2020 18:01:38 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/2a9c627c-5841-45fb-b5b5-e1c4f0beb4fa/bandwidth_limit_rules/faba8167-e4af-4b9c-9a8e-7ab16309a1cc'} Body: b'{"bandwidth_limit_rule": {"max_kbps": 2000, "max_burst_kbps": 1000, "direction": "egress", "id": "faba8167-e4af-4b9c-9a8e-7ab16309a1cc"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:38.089 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:38.099 37 INFO tempest.lib.common.rest_client [req-26b18143-9159-4644-9f74-0d59b351a3be ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 200 GET http://172.30.13.94/compute/v2.1/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747 0.249s 2020-11-06 18:01:38.100 37 DEBUG tempest.lib.common.rest_client [req-26b18143-9159-4644-9f74-0d59b351a3be ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1390', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-26b18143-9159-4644-9f74-0d59b351a3be', 'x-compute-request-id': 'req-26b18143-9159-4644-9f74-0d59b351a3be', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747'} Body: b'{"server": {"id": "d09fce60-e537-4bc8-9db8-df2a08c4d747", "name": "tempest-ComputeServersRbacTest-Server-1807623844", "status": "BUILD", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "user_id": "262f98552a3a4d8a8fba3f96d5a872bf", "metadata": {}, "hostId": "72aa4147e128daa70511a3b03038cad49752a08b0327f6bc0c6decc0", "image": "", "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:01:36Z", "updated": "2020-11-06T18:01:38Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ce", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "block_device_mapping", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [{"id": "af94feae-2c64-4f66-978a-2eb00d12ad7c"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:38.115 37 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/block_device_mapping" after 2 second wait 2020-11-06 18:01:38.150 40 INFO tempest.lib.common.rest_client [req-1c87bea2-7fbd-439c-b643-e070e58ff3fd ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_update_policy_bandwidth_limit_rule): 200 GET http://172.30.13.94/identity/v3/projects/05e89bb41ef44a46ab515fb12ff2530b/users/ad6669f9f5844b22a68a5fa021f443c4/roles 0.060s 2020-11-06 18:01:38.151 40 DEBUG tempest.lib.common.rest_client [req-1c87bea2-7fbd-439c-b643-e070e58ff3fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1c87bea2-7fbd-439c-b643-e070e58ff3fd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/05e89bb41ef44a46ab515fb12ff2530b/users/ad6669f9f5844b22a68a5fa021f443c4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/05e89bb41ef44a46ab515fb12ff2530b/users/ad6669f9f5844b22a68a5fa021f443c4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:38.186 40 INFO tempest.lib.common.rest_client [req-1613e390-d311-4327-a868-fab0e9437349 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_update_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:01:38.186 40 DEBUG tempest.lib.common.rest_client [req-1613e390-d311-4327-a868-fab0e9437349 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6660', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1613e390-d311-4327-a868-fab0e9437349', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ad6669f9f5844b22a68a5fa021f443c4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233", "password_expires_at": null}, "audit_ids": ["1dw8-cSOS8-Y5oheqz-WEw"], "expires_at": "2020-11-06T19:01:38.000000Z", "issued_at": "2020-11-06T18:01:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "05e89bb41ef44a46ab515fb12ff2530b", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b24 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:38.223 40 INFO tempest.lib.common.rest_client [req-d585b121-e022-44e9-97e3-8669e5dfb228 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_update_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:01:38.223 40 DEBUG tempest.lib.common.rest_client [req-d585b121-e022-44e9-97e3-8669e5dfb228 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6660', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d585b121-e022-44e9-97e3-8669e5dfb228', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ad6669f9f5844b22a68a5fa021f443c4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233", "password_expires_at": null}, "audit_ids": ["bjNS-YDQSPKs97llZ5WJ4A"], "expires_at": "2020-11-06T19:01:38.000000Z", "issued_at": "2020-11-06T18:01:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "05e89bb41ef44a46ab515fb12ff2530b", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-466709233"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_05e89bb41ef44a46ab515fb12ff2530b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b24 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:38.357 40 INFO tempest.lib.common.rest_client [req-ccfba9d7-f291-412b-a300-3e4e5abc4670 ] Request (PolicyBandwidthLimitRuleExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/2a9c627c-5841-45fb-b5b5-e1c4f0beb4fa/bandwidth_limit_rules/faba8167-e4af-4b9c-9a8e-7ab16309a1cc 0.132s 2020-11-06 18:01:38.358 40 DEBUG tempest.lib.common.rest_client [req-ccfba9d7-f291-412b-a300-3e4e5abc4670 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-ccfba9d7-f291-412b-a300-3e4e5abc4670', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:01:38 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/2a9c627c-5841-45fb-b5b5-e1c4f0beb4fa/bandwidth_limit_rules/faba8167-e4af-4b9c-9a8e-7ab16309a1cc'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:38.437 40 INFO tempest.lib.common.rest_client [req-07496a50-65ff-4edc-8c34-b00ef3d1e08b ] Request (PolicyBandwidthLimitRuleExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/2a9c627c-5841-45fb-b5b5-e1c4f0beb4fa 0.078s 2020-11-06 18:01:38.438 40 DEBUG tempest.lib.common.rest_client [req-07496a50-65ff-4edc-8c34-b00ef3d1e08b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-07496a50-65ff-4edc-8c34-b00ef3d1e08b', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:01:38 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/2a9c627c-5841-45fb-b5b5-e1c4f0beb4fa'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:38.566 40 INFO tempest.lib.common.rest_client [req-38608a03-4e95-41c2-bb60-255c76bb85fb ] Request (PolicyBandwidthLimitRuleExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/ad6669f9f5844b22a68a5fa021f443c4 0.128s 2020-11-06 18:01:38.567 40 DEBUG tempest.lib.common.rest_client [req-38608a03-4e95-41c2-bb60-255c76bb85fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-38608a03-4e95-41c2-bb60-255c76bb85fb', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/ad6669f9f5844b22a68a5fa021f443c4'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:38.645 39 INFO tempest.lib.common.rest_client [req-5520e0b5-c8d6-413b-8fa7-8e7fb1fb45a5 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.269s 2020-11-06 18:01:38.646 39 DEBUG tempest.lib.common.rest_client [req-5520e0b5-c8d6-413b-8fa7-8e7fb1fb45a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5520e0b5-c8d6-413b-8fa7-8e7fb1fb45a5', 'x-compute-request-id': 'req-5520e0b5-c8d6-413b-8fa7-8e7fb1fb45a5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:38.660 40 INFO tempest.lib.common.rest_client [req-027cc0f1-33a5-4799-a042-3dde38968753 ] Request (PolicyBandwidthLimitRuleExtRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-11-06 18:01:38.661 40 DEBUG tempest.lib.common.rest_client [req-027cc0f1-33a5-4799-a042-3dde38968753 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-027cc0f1-33a5-4799-a042-3dde38968753', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["vEP03YNmQwSC2xLCjRKfxw"], "expires_at": "2020-11-06T19:01:38.000000Z", "issued_at": "2020-11-06T18:01:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:38.966 40 INFO tempest.lib.common.rest_client [req-0d6ccf7f-a1ce-416c-934a-38a25b6b0b0b ] Request (PolicyBandwidthLimitRuleExtRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=05e89bb41ef44a46ab515fb12ff2530b&name=default 0.304s 2020-11-06 18:01:38.966 40 DEBUG tempest.lib.common.rest_client [req-0d6ccf7f-a1ce-416c-934a-38a25b6b0b0b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-0d6ccf7f-a1ce-416c-934a-38a25b6b0b0b', 'date': 'Fri, 06 Nov 2020 18:01:38 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=05e89bb41ef44a46ab515fb12ff2530b&name=default'} Body: b'{"security_groups": [{"id": "c8cbfa6b-4be1-4fd0-a904-bcb1f42d24e0", "name": "default", "stateful": true, "tenant_id": "05e89bb41ef44a46ab515fb12ff2530b", "description": "Default security group", "security_group_rules": [{"id": "12985b4f-67b2-4138-b0be-2a5651149fce", "tenant_id": "05e89bb41ef44a46ab515fb12ff2530b", "security_group_id": "c8cbfa6b-4be1-4fd0-a904-bcb1f42d24e0", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "c8cbfa6b-4be1-4fd0-a904-bcb1f42d24e0", "description": null, "tags": [], "created_at": "2020-11-06T18:01:38Z", "updated_at": "2020-11-06T18:01:38Z", "revision_number": 0, "project_id": "05e89bb41ef44a46ab515fb12ff2530b"}, {"id": "827d38b5-5326-4483-b38a-ba1d08ab5bde", "tenant_id": "05e89bb41ef44a46ab515fb12ff2530b", "security_group_id": "c8cbfa6b-4be1-4fd0-a904-bcb1f42d24e0", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:01:38Z", "updated_at": "2020-11-06T18:01:38Z", "revision_number": 0, "project_id": "05e89bb41ef44a46ab515fb12ff2530b"}, {"id": "8fffc56f-ad5b-440c-9d40-95e0183489d9", "tenant_id": "05e89bb41ef44a46ab515fb12ff2530b", "security_group_id": "c8cbfa6b-4be1-4fd0-a904-bcb1f42d24e0", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "c8cbfa6b-4be1-4fd0-a904-bcb1f42d24e0", "description": null, "tags": [], "created_at": "2020-11-06T18:01:38Z", "updated_at": "2020-11-06T18:01:38Z", "revision_number": 0, "project_id": "05e89bb41ef44a46ab515fb12ff2530b"}, {"id": "92cd365e-19b8-46f3-8eca-0f92553c8514", "tenant_id": "05e89bb41ef44a46ab515fb12ff2530b", "security_group_id": "c8cbfa6b-4be1-4fd0-a904-bcb1f42d24e0", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:01:38Z", "updated_at": "2020-11-06T18:01:38Z", "revision_number": 0, "project_id": "05e89bb41ef44a46ab515fb12ff2530b"}], "tags": [], "created_at": "2020-11-06T18:01:38Z", "updated_at": "2020-11-06T18:01:38Z", "revision_number": 1, "project_id": "05e89bb41ef44a46ab515fb12ff2530b"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:39.006 38 INFO tempest.lib.common.rest_client [req-ec79da56-d3db-4cad-9e9a-38e0dc26d6af ] Request (MiscPolicyActionsNetworkRbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826 0.077s 2020-11-06 18:01:39.007 38 DEBUG tempest.lib.common.rest_client [req-ec79da56-d3db-4cad-9e9a-38e0dc26d6af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-ec79da56-d3db-4cad-9e9a-38e0dc26d6af', 'x-compute-request-id': 'req-ec79da56-d3db-4cad-9e9a-38e0dc26d6af', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/400f4368-ffc1-4bc4-8fe6-fddf93f90826'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 400f4368-ffc1-4bc4-8fe6-fddf93f90826 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:39.008 38 DEBUG tempest.lib.common.dynamic_creds [-] Clearing network: {'id': 'f747eec6-c776-4af6-aa67-8eb73e88914e', 'name': 'tempest-MiscPolicyActionsNetworkRbacTest-1290166897-network', 'tenant_id': '4f44b0a1b5fe4a17b77cabcf20e9501b', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '4f44b0a1b5fe4a17b77cabcf20e9501b', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 49, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T18:00:40Z', 'updated_at': '2020-11-06T18:00:40Z', 'revision_number': 1}, subnet: {'id': 'a7138c88-1746-4acf-b367-e81e790bf9d7', 'name': 'tempest-MiscPolicyActionsNetworkRbacTest-1290166897-subnet', 'tenant_id': '4f44b0a1b5fe4a17b77cabcf20e9501b', 'network_id': 'f747eec6-c776-4af6-aa67-8eb73e88914e', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': True, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-11-06T18:00:40Z', 'updated_at': '2020-11-06T18:00:40Z', 'revision_number': 0, 'project_id': '4f44b0a1b5fe4a17b77cabcf20e9501b'}, router: {'id': 'e1b5c04a-81a2-432a-a515-871a9b8c9800', 'name': 'tempest-MiscPolicyActionsNetworkRbacTest-1290166897-router', 'tenant_id': '4f44b0a1b5fe4a17b77cabcf20e9501b', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.67'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::2d5'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-11-06T18:00:41Z', 'updated_at': '2020-11-06T18:00:42Z', 'revision_number': 3, 'project_id': '4f44b0a1b5fe4a17b77cabcf20e9501b'} _clear_isolated_net_resources /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/dynamic_creds.py:418 2020-11-06 18:01:39.182 40 INFO tempest.lib.common.rest_client [req-015e3866-c298-4857-b967-f222ab414489 ] Request (PolicyBandwidthLimitRuleExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/c8cbfa6b-4be1-4fd0-a904-bcb1f42d24e0 0.214s 2020-11-06 18:01:39.183 40 DEBUG tempest.lib.common.rest_client [req-015e3866-c298-4857-b967-f222ab414489 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-015e3866-c298-4857-b967-f222ab414489', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:01:39 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/c8cbfa6b-4be1-4fd0-a904-bcb1f42d24e0'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:39.322 40 INFO tempest.lib.common.rest_client [req-e2271f14-fc86-4c2c-bd7a-d5b703951823 ] Request (PolicyBandwidthLimitRuleExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/05e89bb41ef44a46ab515fb12ff2530b 0.139s 2020-11-06 18:01:39.323 40 DEBUG tempest.lib.common.rest_client [req-e2271f14-fc86-4c2c-bd7a-d5b703951823 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e2271f14-fc86-4c2c-bd7a-d5b703951823', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/05e89bb41ef44a46ab515fb12ff2530b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:39.424 40 INFO tempest.lib.common.rest_client [req-b4537534-d950-441f-8d5f-8b69e495c62d ] Request (PortsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-11-06 18:01:39.425 40 DEBUG tempest.lib.common.rest_client [req-b4537534-d950-441f-8d5f-8b69e495c62d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b4537534-d950-441f-8d5f-8b69e495c62d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["urxhho1_SlituqeK0hFKqA"], "expires_at": "2020-11-06T19:01:39.000000Z", "issued_at": "2020-11-06T18:01:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:39.473 40 INFO tempest.lib.common.rest_client [req-5167227b-522c-453b-82c8-e6647da8ab9c ] Request (PortsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:01:39.473 40 DEBUG tempest.lib.common.rest_client [req-5167227b-522c-453b-82c8-e6647da8ab9c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5167227b-522c-453b-82c8-e6647da8ab9c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["MXGc46UfTSG5mUvq9H7fuQ"], "expires_at": "2020-11-06T19:01:39.000000Z", "issued_at": "2020-11-06T18:01:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:39.487 37 INFO tempest.lib.common.rest_client [req-dd4b5382-eeb5-4fcb-9809-833ffa9098d7 ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 200 GET http://172.30.13.94/compute/v2.1/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747 0.370s 2020-11-06 18:01:39.488 37 DEBUG tempest.lib.common.rest_client [req-dd4b5382-eeb5-4fcb-9809-833ffa9098d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1420', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dd4b5382-eeb5-4fcb-9809-833ffa9098d7', 'x-compute-request-id': 'req-dd4b5382-eeb5-4fcb-9809-833ffa9098d7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747'} Body: b'{"server": {"id": "d09fce60-e537-4bc8-9db8-df2a08c4d747", "name": "tempest-ComputeServersRbacTest-Server-1807623844", "status": "BUILD", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "user_id": "262f98552a3a4d8a8fba3f96d5a872bf", "metadata": {}, "hostId": "72aa4147e128daa70511a3b03038cad49752a08b0327f6bc0c6decc0", "image": "", "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:01:36Z", "updated": "2020-11-06T18:01:39Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ce", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [{"id": "af94feae-2c64-4f66-978a-2eb00d12ad7c"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:39.502 37 INFO tempest.common.waiters [-] State transition "BUILD/block_device_mapping" ==> "BUILD/spawning" after 3 second wait 2020-11-06 18:01:39.532 40 INFO tempest.lib.common.rest_client [req-e13f3cdc-c403-4884-84cd-26b485071c45 ] Request (PortsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.057s 2020-11-06 18:01:39.533 40 DEBUG tempest.lib.common.rest_client [req-e13f3cdc-c403-4884-84cd-26b485071c45 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e13f3cdc-c403-4884-84cd-26b485071c45', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:39.612 40 INFO tempest.lib.common.rest_client [req-b4e7cfba-8c17-424e-9b44-b560b1fc6316 ] Request (PortsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.078s 2020-11-06 18:01:39.613 40 DEBUG tempest.lib.common.rest_client [req-b4e7cfba-8c17-424e-9b44-b560b1fc6316 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-PortsRbacTest-702790460-desc", "domain_id": "default", "name": "tempest-PortsRbacTest-702790460"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '362', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b4e7cfba-8c17-424e-9b44-b560b1fc6316', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460", "domain_id": "default", "description": "tempest-PortsRbacTest-702790460-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:39.745 40 INFO tempest.lib.common.rest_client [req-abc4f931-2111-41d3-baef-a125fbc96e73 ] Request (PortsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.130s 2020-11-06 18:01:39.746 40 DEBUG tempest.lib.common.rest_client [req-abc4f931-2111-41d3-baef-a125fbc96e73 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-PortsRbacTest-702790460", "password": "C2_EYqlRyYCH7r1", "project_id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "email": "tempest-PortsRbacTest-153090998@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '380', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-abc4f931-2111-41d3-baef-a125fbc96e73', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "email": "tempest-PortsRbacTest-153090998@example.com", "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/eca9e2d75b3d43ebb62aa386f11363f5"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:39.802 40 INFO tempest.lib.common.rest_client [req-8aa95f84-13a4-4a67-bf1b-297e8ba07c7b ] Request (PortsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-11-06 18:01:39.803 40 DEBUG tempest.lib.common.rest_client [req-8aa95f84-13a4-4a67-bf1b-297e8ba07c7b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8aa95f84-13a4-4a67-bf1b-297e8ba07c7b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:39.867 40 INFO tempest.lib.common.rest_client [req-f8dde2d0-b2f1-485e-bfe0-7b7f681356c6 ] Request (PortsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.063s 2020-11-06 18:01:39.868 40 DEBUG tempest.lib.common.rest_client [req-f8dde2d0-b2f1-485e-bfe0-7b7f681356c6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f8dde2d0-b2f1-485e-bfe0-7b7f681356c6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:39.944 40 INFO tempest.lib.common.rest_client [req-975c9418-d878-4b04-abdd-699395f052d3 ] Request (PortsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles/72a4576c553448cd941b052c1ca0cf2d 0.075s 2020-11-06 18:01:39.945 40 DEBUG tempest.lib.common.rest_client [req-975c9418-d878-4b04-abdd-699395f052d3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-975c9418-d878-4b04-abdd-699395f052d3', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:39.945 40 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-PortsRbacTest-702790460', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'b3f19206f12a4063bdbe2a1fda1d8a6f', 'project_name': 'tempest-PortsRbacTest-702790460', 'tenant_id': 'b3f19206f12a4063bdbe2a1fda1d8a6f', 'tenant_name': 'tempest-PortsRbacTest-702790460', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'eca9e2d75b3d43ebb62aa386f11363f5'}, Network: None, Subnet: None, Router: None 2020-11-06 18:01:39.946 40 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-PortsRbacTest-702790460', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'b3f19206f12a4063bdbe2a1fda1d8a6f', 'project_name': 'tempest-PortsRbacTest-702790460', 'tenant_id': 'b3f19206f12a4063bdbe2a1fda1d8a6f', 'tenant_name': 'tempest-PortsRbacTest-702790460', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'eca9e2d75b3d43ebb62aa386f11363f5'}, Network: None, Subnet: None, Router: None 2020-11-06 18:01:39.981 39 INFO tempest.lib.common.rest_client [req-42cf1039-0b1a-4012-bb51-0fd5a2a7b77d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.319s 2020-11-06 18:01:39.981 39 DEBUG tempest.lib.common.rest_client [req-42cf1039-0b1a-4012-bb51-0fd5a2a7b77d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-42cf1039-0b1a-4012-bb51-0fd5a2a7b77d', 'x-compute-request-id': 'req-42cf1039-0b1a-4012-bb51-0fd5a2a7b77d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:40.082 40 INFO tempest.lib.common.rest_client [req-9fe6604e-f355-494f-a385-ae23e8cedebd ] Request (PortsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.124s 2020-11-06 18:01:40.083 40 DEBUG tempest.lib.common.rest_client [req-9fe6604e-f355-494f-a385-ae23e8cedebd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6555', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9fe6604e-f355-494f-a385-ae23e8cedebd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["tVC04lw2R2WS8a8trJ9_IA"], "expires_at": "2020-11-06T19:01:39.000000Z", "issued_at": "2020-11-06T18:01:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/image" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:40.180 40 INFO tempest.lib.common.rest_client [req-fa921df9-2b1d-43b2-981c-94c81d356bf3 ] Request (PortsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-11-06 18:01:40.180 40 DEBUG tempest.lib.common.rest_client [req-fa921df9-2b1d-43b2-981c-94c81d356bf3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fa921df9-2b1d-43b2-981c-94c81d356bf3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["ZXAeROMtQAOdsz883NdA9w"], "expires_at": "2020-11-06T19:01:40.000000Z", "issued_at": "2020-11-06T18:01:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:40.235 40 INFO tempest.lib.common.rest_client [req-439fc246-0490-4c37-805b-7443a8dfcc83 ] Request (PortsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-11-06 18:01:40.235 40 DEBUG tempest.lib.common.rest_client [req-439fc246-0490-4c37-805b-7443a8dfcc83 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-439fc246-0490-4c37-805b-7443a8dfcc83', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["KbW-sLmKT1eFEqI1VLXK7A"], "expires_at": "2020-11-06T19:01:40.000000Z", "issued_at": "2020-11-06T18:01:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:40.291 40 INFO tempest.lib.common.rest_client [req-74160def-c2c6-43cc-8ef7-4001c0ef1be8 ] Request (PortsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.054s 2020-11-06 18:01:40.291 40 DEBUG tempest.lib.common.rest_client [req-74160def-c2c6-43cc-8ef7-4001c0ef1be8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-74160def-c2c6-43cc-8ef7-4001c0ef1be8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:40.345 40 INFO tempest.lib.common.rest_client [req-bc467aa8-2a6c-40f7-a22d-9a43f08c6a65 ] Request (PortsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.053s 2020-11-06 18:01:40.346 40 DEBUG tempest.lib.common.rest_client [req-bc467aa8-2a6c-40f7-a22d-9a43f08c6a65 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bc467aa8-2a6c-40f7-a22d-9a43f08c6a65', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:40.347 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:01:40.347 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:40.407 40 INFO tempest.lib.common.rest_client [req-f4105613-2004-4d0c-b29c-7c410754054a ] Request (PortsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.059s 2020-11-06 18:01:40.408 40 DEBUG tempest.lib.common.rest_client [req-f4105613-2004-4d0c-b29c-7c410754054a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f4105613-2004-4d0c-b29c-7c410754054a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:40.466 40 INFO tempest.lib.common.rest_client [req-7d976c49-cba2-43fa-abba-aa45ca415050 ] Request (PortsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles/72a4576c553448cd941b052c1ca0cf2d 0.057s 2020-11-06 18:01:40.466 40 DEBUG tempest.lib.common.rest_client [req-7d976c49-cba2-43fa-abba-aa45ca415050 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7d976c49-cba2-43fa-abba-aa45ca415050', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:40.561 40 INFO tempest.lib.common.rest_client [req-9b7a2023-c8f4-42fa-a02c-4f0f2ea6767b ] Request (PortsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles/a629c95d64b3416fb80ae90af4f69c05 0.094s 2020-11-06 18:01:40.562 40 DEBUG tempest.lib.common.rest_client [req-9b7a2023-c8f4-42fa-a02c-4f0f2ea6767b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9b7a2023-c8f4-42fa-a02c-4f0f2ea6767b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:40.718 37 INFO tempest.lib.common.rest_client [req-d5fcbdd4-b17a-439f-84fb-04b8c1eed7c1 ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 200 GET http://172.30.13.94/compute/v2.1/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747 0.215s 2020-11-06 18:01:40.719 37 DEBUG tempest.lib.common.rest_client [req-d5fcbdd4-b17a-439f-84fb-04b8c1eed7c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1420', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d5fcbdd4-b17a-439f-84fb-04b8c1eed7c1', 'x-compute-request-id': 'req-d5fcbdd4-b17a-439f-84fb-04b8c1eed7c1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747'} Body: b'{"server": {"id": "d09fce60-e537-4bc8-9db8-df2a08c4d747", "name": "tempest-ComputeServersRbacTest-Server-1807623844", "status": "BUILD", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "user_id": "262f98552a3a4d8a8fba3f96d5a872bf", "metadata": {}, "hostId": "72aa4147e128daa70511a3b03038cad49752a08b0327f6bc0c6decc0", "image": "", "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:01:36Z", "updated": "2020-11-06T18:01:39Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ce", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [{"id": "af94feae-2c64-4f66-978a-2eb00d12ad7c"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:41.201 39 INFO tempest.lib.common.rest_client [req-0e4eadf0-6b4d-4e92-99e0-f954b7cd1c03 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.203s 2020-11-06 18:01:41.201 39 DEBUG tempest.lib.common.rest_client [req-0e4eadf0-6b4d-4e92-99e0-f954b7cd1c03 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0e4eadf0-6b4d-4e92-99e0-f954b7cd1c03', 'x-compute-request-id': 'req-0e4eadf0-6b4d-4e92-99e0-f954b7cd1c03', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:41.658 40 INFO tempest.lib.common.rest_client [req-42845eba-9705-442f-aeca-24ffa65791bd ] Request (PortsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-11-06 18:01:41.659 40 DEBUG tempest.lib.common.rest_client [req-42845eba-9705-442f-aeca-24ffa65791bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-42845eba-9705-442f-aeca-24ffa65791bd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["IVuqCsLYRpqLmlQ5fOUsFw"], "expires_at": "2020-11-06T19:01:41.000000Z", "issued_at": "2020-11-06T18:01:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:41.994 37 INFO tempest.lib.common.rest_client [req-79f6d3ef-09cc-41ec-93ac-3e0d77a437da ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 200 GET http://172.30.13.94/compute/v2.1/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747 0.260s 2020-11-06 18:01:41.994 37 DEBUG tempest.lib.common.rest_client [req-79f6d3ef-09cc-41ec-93ac-3e0d77a437da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1420', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-79f6d3ef-09cc-41ec-93ac-3e0d77a437da', 'x-compute-request-id': 'req-79f6d3ef-09cc-41ec-93ac-3e0d77a437da', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747'} Body: b'{"server": {"id": "d09fce60-e537-4bc8-9db8-df2a08c4d747", "name": "tempest-ComputeServersRbacTest-Server-1807623844", "status": "BUILD", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "user_id": "262f98552a3a4d8a8fba3f96d5a872bf", "metadata": {}, "hostId": "72aa4147e128daa70511a3b03038cad49752a08b0327f6bc0c6decc0", "image": "", "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:01:36Z", "updated": "2020-11-06T18:01:39Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ce", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [{"id": "af94feae-2c64-4f66-978a-2eb00d12ad7c"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:42.119 40 INFO tempest.lib.common.rest_client [req-8baf2acf-7e84-4aac-b232-3f7ed253d28f ] Request (PortsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.458s 2020-11-06 18:01:42.119 40 DEBUG tempest.lib.common.rest_client [req-8baf2acf-7e84-4aac-b232-3f7ed253d28f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-PortsRbacTest-test-network-1972631598"}} Response - Headers: {'content-type': 'application/json', 'content-length': '734', 'x-openstack-request-id': 'req-8baf2acf-7e84-4aac-b232-3f7ed253d28f', 'date': 'Fri, 06 Nov 2020 18:01:42 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"586884b2-4363-4597-acb0-ddbc49908b65","name":"tempest-PortsRbacTest-test-network-1972631598","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":57,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:01:41Z","updated_at":"2020-11-06T18:01:42Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:42.507 38 INFO tempest.lib.common.rest_client [req-f17af675-61d9-4341-aec6-710fa84aa065 ] Request (MiscPolicyActionsNetworkRbacTest:tearDownClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/e1b5c04a-81a2-432a-a515-871a9b8c9800/remove_router_interface 3.498s 2020-11-06 18:01:42.507 38 DEBUG tempest.lib.common.rest_client [req-f17af675-61d9-4341-aec6-710fa84aa065 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "a7138c88-1746-4acf-b367-e81e790bf9d7"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-f17af675-61d9-4341-aec6-710fa84aa065', 'date': 'Fri, 06 Nov 2020 18:01:42 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/e1b5c04a-81a2-432a-a515-871a9b8c9800/remove_router_interface'} Body: b'{"id": "e1b5c04a-81a2-432a-a515-871a9b8c9800", "tenant_id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "port_id": "8e6df4da-c013-485e-9bf0-7ef4a95b5f78", "network_id": "f747eec6-c776-4af6-aa67-8eb73e88914e", "subnet_id": "a7138c88-1746-4acf-b367-e81e790bf9d7", "subnet_ids": ["a7138c88-1746-4acf-b367-e81e790bf9d7"]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:42.660 40 INFO tempest.lib.common.rest_client [req-d3ef5161-4cd5-4ca0-908d-e69fc047e0ea ] Request (PortsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.539s 2020-11-06 18:01:42.661 40 DEBUG tempest.lib.common.rest_client [req-d3ef5161-4cd5-4ca0-908d-e69fc047e0ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "586884b2-4363-4597-acb0-ddbc49908b65", "cidr": "192.168.120.0/24", "ip_version": 4, "gateway_ip": "192.168.120.1"}} Response - Headers: {'content-type': 'application/json', 'content-length': '662', 'x-openstack-request-id': 'req-d3ef5161-4cd5-4ca0-908d-e69fc047e0ea', 'date': 'Fri, 06 Nov 2020 18:01:42 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","name":"","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/24","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.254"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-11-06T18:01:42Z","updated_at":"2020-11-06T18:01:42Z","revision_number":0,"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:42.685 39 INFO tempest.lib.common.rest_client [req-2e2e22c9-4d16-4693-92e6-f5f2f2531d94 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.468s 2020-11-06 18:01:42.686 39 DEBUG tempest.lib.common.rest_client [req-2e2e22c9-4d16-4693-92e6-f5f2f2531d94 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2e2e22c9-4d16-4693-92e6-f5f2f2531d94', 'x-compute-request-id': 'req-2e2e22c9-4d16-4693-92e6-f5f2f2531d94', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:43.282 40 INFO tempest.lib.common.rest_client [req-9876a5cc-0db6-4240-8b8a-85aec9fbd17d ] Request (PortsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/ports 0.620s 2020-11-06 18:01:43.282 40 DEBUG tempest.lib.common.rest_client [req-9876a5cc-0db6-4240-8b8a-85aec9fbd17d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "586884b2-4363-4597-acb0-ddbc49908b65", "name": "tempest-PortsRbacTest-339006369"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1094', 'x-openstack-request-id': 'req-9876a5cc-0db6-4240-8b8a-85aec9fbd17d', 'date': 'Fri, 06 Nov 2020 18:01:43 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"e218c7fc-d3dc-4c2c-9234-aa97d5412eb7","name":"tempest-PortsRbacTest-339006369","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:8a:69:9e","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.243"}],"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","port_security_enabled":true,"qos_policy_id":null,"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"allowed_address_pairs":[],"extra_dhcp_opts":[],"description":"","qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.243","hostname":"host-192-168-120-243","fqdn":"host-192-168-120-243.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:01:42Z","updated_at":"2020-11-06T18:01:42Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:43.284 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:43.288 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_port, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:43.288 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:43.390 40 INFO tempest.lib.common.rest_client [req-f65ab3f3-c7f6-4f4f-89c1-fce0c13405ab ] Request (PortsRbacTest:test_create_port): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.101s 2020-11-06 18:01:43.391 40 DEBUG tempest.lib.common.rest_client [req-f65ab3f3-c7f6-4f4f-89c1-fce0c13405ab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f65ab3f3-c7f6-4f4f-89c1-fce0c13405ab', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:43.425 40 INFO tempest.lib.common.rest_client [req-432db59c-7bc1-43f5-8a7f-f81229e44d19 ] Request (PortsRbacTest:test_create_port): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:01:43.426 40 DEBUG tempest.lib.common.rest_client [req-432db59c-7bc1-43f5-8a7f-f81229e44d19 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-432db59c-7bc1-43f5-8a7f-f81229e44d19', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["laTQgMp7R3aT-m5qP_Rj_A"], "expires_at": "2020-11-06T19:01:43.000000Z", "issued_at": "2020-11-06T18:01:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:43.747 38 INFO tempest.lib.common.rest_client [req-4b159ae5-84ef-447b-b238-a4463d692501 ] Request (MiscPolicyActionsNetworkRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/e1b5c04a-81a2-432a-a515-871a9b8c9800 1.238s 2020-11-06 18:01:43.748 38 DEBUG tempest.lib.common.rest_client [req-4b159ae5-84ef-447b-b238-a4463d692501 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-4b159ae5-84ef-447b-b238-a4463d692501', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:01:43 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/e1b5c04a-81a2-432a-a515-871a9b8c9800'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:44.220 38 INFO tempest.lib.common.rest_client [req-b246a28d-1918-4575-aa82-a1102c316547 ] Request (MiscPolicyActionsNetworkRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/a7138c88-1746-4acf-b367-e81e790bf9d7 0.471s 2020-11-06 18:01:44.220 38 DEBUG tempest.lib.common.rest_client [req-b246a28d-1918-4575-aa82-a1102c316547 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-b246a28d-1918-4575-aa82-a1102c316547', 'date': 'Fri, 06 Nov 2020 18:01:44 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/a7138c88-1746-4acf-b367-e81e790bf9d7'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:44.347 37 INFO tempest.lib.common.rest_client [req-2f461407-a72c-41a4-9602-032092e15d17 ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 200 GET http://172.30.13.94/compute/v2.1/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747 1.336s 2020-11-06 18:01:44.348 37 DEBUG tempest.lib.common.rest_client [req-2f461407-a72c-41a4-9602-032092e15d17 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1420', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2f461407-a72c-41a4-9602-032092e15d17', 'x-compute-request-id': 'req-2f461407-a72c-41a4-9602-032092e15d17', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747'} Body: b'{"server": {"id": "d09fce60-e537-4bc8-9db8-df2a08c4d747", "name": "tempest-ComputeServersRbacTest-Server-1807623844", "status": "BUILD", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "user_id": "262f98552a3a4d8a8fba3f96d5a872bf", "metadata": {}, "hostId": "72aa4147e128daa70511a3b03038cad49752a08b0327f6bc0c6decc0", "image": "", "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:01:36Z", "updated": "2020-11-06T18:01:39Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ce", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [{"id": "af94feae-2c64-4f66-978a-2eb00d12ad7c"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:44.348 39 INFO tempest.lib.common.rest_client [req-fb3def5a-a6cb-45af-af61-f3f34d3e1853 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.648s 2020-11-06 18:01:44.349 39 DEBUG tempest.lib.common.rest_client [req-fb3def5a-a6cb-45af-af61-f3f34d3e1853 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fb3def5a-a6cb-45af-af61-f3f34d3e1853', 'x-compute-request-id': 'req-fb3def5a-a6cb-45af-af61-f3f34d3e1853', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:45.233 38 INFO tempest.lib.common.rest_client [req-24937be7-200c-4d81-ba03-f934985ec5db ] Request (MiscPolicyActionsNetworkRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/f747eec6-c776-4af6-aa67-8eb73e88914e 1.012s 2020-11-06 18:01:45.234 38 DEBUG tempest.lib.common.rest_client [req-24937be7-200c-4d81-ba03-f934985ec5db ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-24937be7-200c-4d81-ba03-f934985ec5db', 'date': 'Fri, 06 Nov 2020 18:01:45 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/f747eec6-c776-4af6-aa67-8eb73e88914e'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:45.359 38 INFO tempest.lib.common.rest_client [req-aff04429-e702-4e36-a105-29fd1c529f62 ] Request (MiscPolicyActionsNetworkRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/1db6819d47a748669464ad962e63976e 0.125s 2020-11-06 18:01:45.360 38 DEBUG tempest.lib.common.rest_client [req-aff04429-e702-4e36-a105-29fd1c529f62 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aff04429-e702-4e36-a105-29fd1c529f62', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/1db6819d47a748669464ad962e63976e'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:45.405 38 INFO tempest.lib.common.rest_client [req-06984887-3359-4ca0-b858-145e6a9ddc17 ] Request (MiscPolicyActionsNetworkRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=4f44b0a1b5fe4a17b77cabcf20e9501b&name=default 0.045s 2020-11-06 18:01:45.406 38 DEBUG tempest.lib.common.rest_client [req-06984887-3359-4ca0-b858-145e6a9ddc17 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-06984887-3359-4ca0-b858-145e6a9ddc17', 'date': 'Fri, 06 Nov 2020 18:01:45 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=4f44b0a1b5fe4a17b77cabcf20e9501b&name=default'} Body: b'{"security_groups": [{"id": "6b39128a-2e1a-4072-965c-ca657e3d921b", "name": "default", "stateful": true, "tenant_id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "description": "Default security group", "security_group_rules": [{"id": "01d7b3e6-083f-465e-bb60-6af395007cfd", "tenant_id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "security_group_id": "6b39128a-2e1a-4072-965c-ca657e3d921b", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "6b39128a-2e1a-4072-965c-ca657e3d921b", "description": null, "tags": [], "created_at": "2020-11-06T18:00:40Z", "updated_at": "2020-11-06T18:00:40Z", "revision_number": 0, "project_id": "4f44b0a1b5fe4a17b77cabcf20e9501b"}, {"id": "3034d00c-cec6-40f0-ac6c-85503e3c7799", "tenant_id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "security_group_id": "6b39128a-2e1a-4072-965c-ca657e3d921b", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:00:40Z", "updated_at": "2020-11-06T18:00:40Z", "revision_number": 0, "project_id": "4f44b0a1b5fe4a17b77cabcf20e9501b"}, {"id": "913e0c88-a321-4143-94b9-20721b793fb6", "tenant_id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "security_group_id": "6b39128a-2e1a-4072-965c-ca657e3d921b", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:00:40Z", "updated_at": "2020-11-06T18:00:40Z", "revision_number": 0, "project_id": "4f44b0a1b5fe4a17b77cabcf20e9501b"}, {"id": "d2dd9708-ef7d-4b99-a142-979118390a1f", "tenant_id": "4f44b0a1b5fe4a17b77cabcf20e9501b", "security_group_id": "6b39128a-2e1a-4072-965c-ca657e3d921b", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "6b39128a-2e1a-4072-965c-ca657e3d921b", "description": null, "tags": [], "created_at": "2020-11-06T18:00:40Z", "updated_at": "2020-11-06T18:00:40Z", "revision_number": 0, "project_id": "4f44b0a1b5fe4a17b77cabcf20e9501b"}], "tags": [], "created_at": "2020-11-06T18:00:40Z", "updated_at": "2020-11-06T18:00:40Z", "revision_number": 1, "project_id": "4f44b0a1b5fe4a17b77cabcf20e9501b"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:45.407 40 INFO tempest.lib.common.rest_client [req-f4fd5614-0672-4804-90cc-d27d69710668 ] Request (PortsRbacTest:test_create_port): 201 POST http://172.30.13.94:9696/v2.0/ports 1.979s 2020-11-06 18:01:45.407 40 DEBUG tempest.lib.common.rest_client [req-f4fd5614-0672-4804-90cc-d27d69710668 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "586884b2-4363-4597-acb0-ddbc49908b65", "name": "tempest-PortsRbacTest-924953576"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1090', 'x-openstack-request-id': 'req-f4fd5614-0672-4804-90cc-d27d69710668', 'date': 'Fri, 06 Nov 2020 18:01:45 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"e4ce18c0-d23f-456a-9d00-0ba568d13e05","name":"tempest-PortsRbacTest-924953576","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:33:f6:83","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.45"}],"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","port_security_enabled":true,"qos_policy_id":null,"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"allowed_address_pairs":[],"extra_dhcp_opts":[],"description":"","qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.45","hostname":"host-192-168-120-45","fqdn":"host-192-168-120-45.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:01:43Z","updated_at":"2020-11-06T18:01:43Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:45.407 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:45.512 40 INFO tempest.lib.common.rest_client [req-8f010cc4-bc5a-436f-b068-dbb03c76a239 ] Request (PortsRbacTest:test_create_port): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.103s 2020-11-06 18:01:45.512 40 DEBUG tempest.lib.common.rest_client [req-8f010cc4-bc5a-436f-b068-dbb03c76a239 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8f010cc4-bc5a-436f-b068-dbb03c76a239', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:45.593 40 INFO tempest.lib.common.rest_client [req-f06a2544-d928-4076-b64c-2d672acd2aed ] Request (PortsRbacTest:test_create_port): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.080s 2020-11-06 18:01:45.594 40 DEBUG tempest.lib.common.rest_client [req-f06a2544-d928-4076-b64c-2d672acd2aed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f06a2544-d928-4076-b64c-2d672acd2aed', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["VPsKS7iORF-VkMpvf5w7_Q"], "expires_at": "2020-11-06T19:01:45.000000Z", "issued_at": "2020-11-06T18:01:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:45.596 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:45.599 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_port, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:45.599 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:45.602 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_port:allowed_address_pairs, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:45.602 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:45.618 38 INFO tempest.lib.common.rest_client [req-f0eba1c5-39f8-4de0-9b86-f59901764afd ] Request (MiscPolicyActionsNetworkRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/6b39128a-2e1a-4072-965c-ca657e3d921b 0.212s 2020-11-06 18:01:45.619 38 DEBUG tempest.lib.common.rest_client [req-f0eba1c5-39f8-4de0-9b86-f59901764afd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-f0eba1c5-39f8-4de0-9b86-f59901764afd', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:01:45 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/6b39128a-2e1a-4072-965c-ca657e3d921b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:45.625 39 INFO tempest.lib.common.rest_client [req-7aca83fb-4551-4e7c-9396-ec90ccdf4e74 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.260s 2020-11-06 18:01:45.626 39 DEBUG tempest.lib.common.rest_client [req-7aca83fb-4551-4e7c-9396-ec90ccdf4e74 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7aca83fb-4551-4e7c-9396-ec90ccdf4e74', 'x-compute-request-id': 'req-7aca83fb-4551-4e7c-9396-ec90ccdf4e74', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:45.669 40 INFO tempest.lib.common.rest_client [req-01990d7e-0eef-46b8-a4e1-8917a200074f ] Request (PortsRbacTest:test_create_port_allowed_address_pairs): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.067s 2020-11-06 18:01:45.670 40 DEBUG tempest.lib.common.rest_client [req-01990d7e-0eef-46b8-a4e1-8917a200074f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-01990d7e-0eef-46b8-a4e1-8917a200074f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:45.679 37 INFO tempest.lib.common.rest_client [req-d662d751-449e-4f4e-ac68-7f2516dcd254 ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 200 GET http://172.30.13.94/compute/v2.1/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747 0.317s 2020-11-06 18:01:45.679 37 DEBUG tempest.lib.common.rest_client [req-d662d751-449e-4f4e-ac68-7f2516dcd254 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1607', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d662d751-449e-4f4e-ac68-7f2516dcd254', 'x-compute-request-id': 'req-d662d751-449e-4f4e-ac68-7f2516dcd254', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747'} Body: b'{"server": {"id": "d09fce60-e537-4bc8-9db8-df2a08c4d747", "name": "tempest-ComputeServersRbacTest-Server-1807623844", "status": "ACTIVE", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "user_id": "262f98552a3a4d8a8fba3f96d5a872bf", "metadata": {}, "hostId": "72aa4147e128daa70511a3b03038cad49752a08b0327f6bc0c6decc0", "image": "", "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:01:36Z", "updated": "2020-11-06T18:01:44Z", "addresses": {"tempest-ComputeServersRbacTest-1143895587-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8c:0b:20"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:43.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ce", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [{"id": "af94feae-2c64-4f66-978a-2eb00d12ad7c"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:45.692 37 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 9 second wait 2020-11-06 18:01:45.725 38 INFO tempest.lib.common.rest_client [req-c905c761-033c-4c0b-be51-9ac942eabd7e ] Request (MiscPolicyActionsNetworkRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b 0.105s 2020-11-06 18:01:45.726 38 DEBUG tempest.lib.common.rest_client [req-c905c761-033c-4c0b-be51-9ac942eabd7e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c905c761-033c-4c0b-be51-9ac942eabd7e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/4f44b0a1b5fe4a17b77cabcf20e9501b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:45.752 40 INFO tempest.lib.common.rest_client [req-1074d56b-ae2d-4de0-be8f-77ee50fa6cb4 ] Request (PortsRbacTest:test_create_port_allowed_address_pairs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-11-06 18:01:45.753 40 DEBUG tempest.lib.common.rest_client [req-1074d56b-ae2d-4de0-be8f-77ee50fa6cb4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1074d56b-ae2d-4de0-be8f-77ee50fa6cb4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["Vm6SarufTE2Vrc-U1erLLw"], "expires_at": "2020-11-06T19:01:45.000000Z", "issued_at": "2020-11-06T18:01:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:45.809 38 INFO tempest.lib.common.rest_client [req-d0844fff-0723-4738-85b0-36c5e974d69b ] Request (ImageNamespacesObjectsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-11-06 18:01:45.810 38 DEBUG tempest.lib.common.rest_client [req-d0844fff-0723-4738-85b0-36c5e974d69b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d0844fff-0723-4738-85b0-36c5e974d69b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["Q1_j4uM9Sd-ALd8QDseVEQ"], "expires_at": "2020-11-06T19:01:45.000000Z", "issued_at": "2020-11-06T18:01:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:45.847 37 INFO tempest.lib.common.rest_client [req-f9ee3a2c-ca83-40b3-920f-33923e67479a ] Request (ComputeServersRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/compute/v2.1/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747 0.154s 2020-11-06 18:01:45.847 37 DEBUG tempest.lib.common.rest_client [req-f9ee3a2c-ca83-40b3-920f-33923e67479a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f9ee3a2c-ca83-40b3-920f-33923e67479a', 'x-compute-request-id': 'req-f9ee3a2c-ca83-40b3-920f-33923e67479a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:45.853 38 INFO tempest.lib.common.rest_client [req-24ee8bde-411d-4abf-80a8-52a4a6b52d53 ] Request (ImageNamespacesObjectsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:01:45.854 38 DEBUG tempest.lib.common.rest_client [req-24ee8bde-411d-4abf-80a8-52a4a6b52d53 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-24ee8bde-411d-4abf-80a8-52a4a6b52d53', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["huiuYdTyTtqycdGA-VuMTA"], "expires_at": "2020-11-06T19:01:45.000000Z", "issued_at": "2020-11-06T18:01:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:45.905 38 INFO tempest.lib.common.rest_client [req-75239ccc-e3e1-414d-bbd1-bf0240fe2a77 ] Request (ImageNamespacesObjectsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.049s 2020-11-06 18:01:45.905 38 DEBUG tempest.lib.common.rest_client [req-75239ccc-e3e1-414d-bbd1-bf0240fe2a77 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-75239ccc-e3e1-414d-bbd1-bf0240fe2a77', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:45.967 38 INFO tempest.lib.common.rest_client [req-480c3d01-1469-4a96-b1de-69fab82c444d ] Request (ImageNamespacesObjectsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.060s 2020-11-06 18:01:45.967 38 DEBUG tempest.lib.common.rest_client [req-480c3d01-1469-4a96-b1de-69fab82c444d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ImageNamespacesObjectsRbacTest-608895417-desc", "domain_id": "default", "name": "tempest-ImageNamespacesObjectsRbacTest-608895417"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '396', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-480c3d01-1469-4a96-b1de-69fab82c444d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "7b2386475a1747b394d9e3bd1abed87b", "name": "tempest-ImageNamespacesObjectsRbacTest-608895417", "domain_id": "default", "description": "tempest-ImageNamespacesObjectsRbacTest-608895417-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/7b2386475a1747b394d9e3bd1abed87b"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:46.096 38 INFO tempest.lib.common.rest_client [req-f5a2f2c0-7eca-4735-9126-eb49333a2929 ] Request (ImageNamespacesObjectsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.127s 2020-11-06 18:01:46.096 38 DEBUG tempest.lib.common.rest_client [req-f5a2f2c0-7eca-4735-9126-eb49333a2929 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ImageNamespacesObjectsRbacTest-608895417", "password": "J7~5x3=hL@JyNTo", "project_id": "7b2386475a1747b394d9e3bd1abed87b", "email": "tempest-ImageNamespacesObjectsRbacTest-921817454@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '414', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f5a2f2c0-7eca-4735-9126-eb49333a2929', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "7b2386475a1747b394d9e3bd1abed87b", "email": "tempest-ImageNamespacesObjectsRbacTest-921817454@example.com", "id": "2f7f4ca98599438eb5165a65f2132953", "name": "tempest-ImageNamespacesObjectsRbacTest-608895417", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/2f7f4ca98599438eb5165a65f2132953"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:46.156 38 INFO tempest.lib.common.rest_client [req-c03614d3-81cf-4427-9cbb-b3449abb410f ] Request (ImageNamespacesObjectsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.058s 2020-11-06 18:01:46.157 38 DEBUG tempest.lib.common.rest_client [req-c03614d3-81cf-4427-9cbb-b3449abb410f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c03614d3-81cf-4427-9cbb-b3449abb410f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:46.205 37 INFO tempest.lib.common.rest_client [req-ce5d47f1-4907-4bfe-a2ef-ae60ac063ab1 ] Request (ComputeServersRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747 0.357s 2020-11-06 18:01:46.206 37 DEBUG tempest.lib.common.rest_client [req-ce5d47f1-4907-4bfe-a2ef-ae60ac063ab1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1613', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ce5d47f1-4907-4bfe-a2ef-ae60ac063ab1', 'x-compute-request-id': 'req-ce5d47f1-4907-4bfe-a2ef-ae60ac063ab1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747'} Body: b'{"server": {"id": "d09fce60-e537-4bc8-9db8-df2a08c4d747", "name": "tempest-ComputeServersRbacTest-Server-1807623844", "status": "ACTIVE", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "user_id": "262f98552a3a4d8a8fba3f96d5a872bf", "metadata": {}, "hostId": "72aa4147e128daa70511a3b03038cad49752a08b0327f6bc0c6decc0", "image": "", "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:01:36Z", "updated": "2020-11-06T18:01:46Z", "addresses": {"tempest-ComputeServersRbacTest-1143895587-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8c:0b:20"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:43.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ce", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [{"id": "af94feae-2c64-4f66-978a-2eb00d12ad7c"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:46.210 38 INFO tempest.lib.common.rest_client [req-4dcb3165-2127-4727-a055-c4783384354a ] Request (ImageNamespacesObjectsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.052s 2020-11-06 18:01:46.210 38 DEBUG tempest.lib.common.rest_client [req-4dcb3165-2127-4727-a055-c4783384354a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4dcb3165-2127-4727-a055-c4783384354a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:46.318 38 INFO tempest.lib.common.rest_client [req-79132c00-7da1-4295-8f18-4c69739a8080 ] Request (ImageNamespacesObjectsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/7b2386475a1747b394d9e3bd1abed87b/users/2f7f4ca98599438eb5165a65f2132953/roles/72a4576c553448cd941b052c1ca0cf2d 0.106s 2020-11-06 18:01:46.318 38 DEBUG tempest.lib.common.rest_client [req-79132c00-7da1-4295-8f18-4c69739a8080 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-79132c00-7da1-4295-8f18-4c69739a8080', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/7b2386475a1747b394d9e3bd1abed87b/users/2f7f4ca98599438eb5165a65f2132953/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:46.319 38 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImageNamespacesObjectsRbacTest-608895417', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '7b2386475a1747b394d9e3bd1abed87b', 'project_name': 'tempest-ImageNamespacesObjectsRbacTest-608895417', 'tenant_id': '7b2386475a1747b394d9e3bd1abed87b', 'tenant_name': 'tempest-ImageNamespacesObjectsRbacTest-608895417', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '2f7f4ca98599438eb5165a65f2132953'}, Network: None, Subnet: None, Router: None 2020-11-06 18:01:46.319 38 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImageNamespacesObjectsRbacTest-608895417', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '7b2386475a1747b394d9e3bd1abed87b', 'project_name': 'tempest-ImageNamespacesObjectsRbacTest-608895417', 'tenant_id': '7b2386475a1747b394d9e3bd1abed87b', 'tenant_name': 'tempest-ImageNamespacesObjectsRbacTest-608895417', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '2f7f4ca98599438eb5165a65f2132953'}, Network: None, Subnet: None, Router: None 2020-11-06 18:01:46.429 38 INFO tempest.lib.common.rest_client [req-1043bba0-14ee-4906-ab64-811fabc17251 ] Request (ImageNamespacesObjectsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.100s 2020-11-06 18:01:46.430 38 DEBUG tempest.lib.common.rest_client [req-1043bba0-14ee-4906-ab64-811fabc17251 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6589', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1043bba0-14ee-4906-ab64-811fabc17251', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2f7f4ca98599438eb5165a65f2132953", "name": "tempest-ImageNamespacesObjectsRbacTest-608895417", "password_expires_at": null}, "audit_ids": ["yekYsbNNSNa7SpeLGLkueg"], "expires_at": "2020-11-06T19:01:46.000000Z", "issued_at": "2020-11-06T18:01:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7b2386475a1747b394d9e3bd1abed87b", "name": "tempest-ImageNamespacesObjectsRbacTest-608895417"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:46.514 38 INFO tempest.lib.common.rest_client [req-836af92a-c2a2-47f3-b5e8-30f581095418 ] Request (ImageNamespacesObjectsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 18:01:46.514 38 DEBUG tempest.lib.common.rest_client [req-836af92a-c2a2-47f3-b5e8-30f581095418 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-836af92a-c2a2-47f3-b5e8-30f581095418', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["opyjVMTAQOmEzYZ6tDrxYA"], "expires_at": "2020-11-06T19:01:46.000000Z", "issued_at": "2020-11-06T18:01:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:46.560 38 INFO tempest.lib.common.rest_client [req-24f16ae7-c02d-4039-a9f2-1046b14ca596 ] Request (ImageNamespacesObjectsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:01:46.560 38 DEBUG tempest.lib.common.rest_client [req-24f16ae7-c02d-4039-a9f2-1046b14ca596 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-24f16ae7-c02d-4039-a9f2-1046b14ca596', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["v2x28rFOS9iUbAMtpTCWrA"], "expires_at": "2020-11-06T19:01:46.000000Z", "issued_at": "2020-11-06T18:01:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:46.615 38 INFO tempest.lib.common.rest_client [req-273dc4af-42a1-4be2-9d20-de389f44c39f ] Request (ImageNamespacesObjectsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.053s 2020-11-06 18:01:46.615 38 DEBUG tempest.lib.common.rest_client [req-273dc4af-42a1-4be2-9d20-de389f44c39f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-273dc4af-42a1-4be2-9d20-de389f44c39f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:46.669 38 INFO tempest.lib.common.rest_client [req-39d6e91e-dcb5-4573-af9a-b262c41ce443 ] Request (ImageNamespacesObjectsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.053s 2020-11-06 18:01:46.670 38 DEBUG tempest.lib.common.rest_client [req-39d6e91e-dcb5-4573-af9a-b262c41ce443 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-39d6e91e-dcb5-4573-af9a-b262c41ce443', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:46.670 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:01:46.671 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:46.720 38 INFO tempest.lib.common.rest_client [req-a59f43fc-9df8-4408-b71d-c39a8c97fbc6 ] Request (ImageNamespacesObjectsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/7b2386475a1747b394d9e3bd1abed87b/users/2f7f4ca98599438eb5165a65f2132953/roles 0.049s 2020-11-06 18:01:46.721 38 DEBUG tempest.lib.common.rest_client [req-a59f43fc-9df8-4408-b71d-c39a8c97fbc6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a59f43fc-9df8-4408-b71d-c39a8c97fbc6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7b2386475a1747b394d9e3bd1abed87b/users/2f7f4ca98599438eb5165a65f2132953/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7b2386475a1747b394d9e3bd1abed87b/users/2f7f4ca98599438eb5165a65f2132953/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:46.774 38 INFO tempest.lib.common.rest_client [req-a10ba850-0248-41a6-862f-06539693072e ] Request (ImageNamespacesObjectsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/7b2386475a1747b394d9e3bd1abed87b/users/2f7f4ca98599438eb5165a65f2132953/roles/72a4576c553448cd941b052c1ca0cf2d 0.052s 2020-11-06 18:01:46.775 38 DEBUG tempest.lib.common.rest_client [req-a10ba850-0248-41a6-862f-06539693072e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a10ba850-0248-41a6-862f-06539693072e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/7b2386475a1747b394d9e3bd1abed87b/users/2f7f4ca98599438eb5165a65f2132953/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:46.780 40 INFO tempest.lib.common.rest_client [req-c38ffec8-9c10-43d5-a981-a43a9421aa7c ] Request (PortsRbacTest:test_create_port_allowed_address_pairs): 201 POST http://172.30.13.94:9696/v2.0/ports 1.026s 2020-11-06 18:01:46.781 40 DEBUG tempest.lib.common.rest_client [req-c38ffec8-9c10-43d5-a981-a43a9421aa7c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "586884b2-4363-4597-acb0-ddbc49908b65", "allowed_address_pairs": [{"ip_address": "192.168.120.243", "mac_address": "fa:16:3e:8a:69:9e"}], "name": "tempest-PortsRbacTest-72359599"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1151', 'x-openstack-request-id': 'req-c38ffec8-9c10-43d5-a981-a43a9421aa7c', 'date': 'Fri, 06 Nov 2020 18:01:46 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"6b4d62dd-e4bd-487b-945d-e2074c50baf6","name":"tempest-PortsRbacTest-72359599","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:bd:67:7c","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.8"}],"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","port_security_enabled":true,"qos_policy_id":null,"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"allowed_address_pairs":[{"mac_address":"fa:16:3e:8a:69:9e","ip_address":"192.168.120.243"}],"extra_dhcp_opts":[],"description":"","qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.8","hostname":"host-192-168-120-8","fqdn":"host-192-168-120-8.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:01:46Z","updated_at":"2020-11-06T18:01:46Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:46.782 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:46.881 38 INFO tempest.lib.common.rest_client [req-8843fe7f-d1cb-4aaf-b670-02f660de366a ] Request (ImageNamespacesObjectsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/7b2386475a1747b394d9e3bd1abed87b/users/2f7f4ca98599438eb5165a65f2132953/roles/a629c95d64b3416fb80ae90af4f69c05 0.105s 2020-11-06 18:01:46.881 38 DEBUG tempest.lib.common.rest_client [req-8843fe7f-d1cb-4aaf-b670-02f660de366a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8843fe7f-d1cb-4aaf-b670-02f660de366a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/7b2386475a1747b394d9e3bd1abed87b/users/2f7f4ca98599438eb5165a65f2132953/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:46.888 40 INFO tempest.lib.common.rest_client [req-e589d83c-33c3-4cdf-ad71-99a8343d7c21 ] Request (PortsRbacTest:test_create_port_allowed_address_pairs): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.105s 2020-11-06 18:01:46.888 40 DEBUG tempest.lib.common.rest_client [req-e589d83c-33c3-4cdf-ad71-99a8343d7c21 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e589d83c-33c3-4cdf-ad71-99a8343d7c21', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:46.941 39 INFO tempest.lib.common.rest_client [req-2a9e8434-98f0-45b3-ab05-ff870b07432b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.292s 2020-11-06 18:01:46.941 39 DEBUG tempest.lib.common.rest_client [req-2a9e8434-98f0-45b3-ab05-ff870b07432b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2a9e8434-98f0-45b3-ab05-ff870b07432b', 'x-compute-request-id': 'req-2a9e8434-98f0-45b3-ab05-ff870b07432b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:46.967 40 INFO tempest.lib.common.rest_client [req-f2594b92-b7a7-4c64-ae06-c61316538bd6 ] Request (PortsRbacTest:test_create_port_allowed_address_pairs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.077s 2020-11-06 18:01:46.968 40 DEBUG tempest.lib.common.rest_client [req-f2594b92-b7a7-4c64-ae06-c61316538bd6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f2594b92-b7a7-4c64-ae06-c61316538bd6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["HlfOVJJpTEmazESvecj5kQ"], "expires_at": "2020-11-06T19:01:46.000000Z", "issued_at": "2020-11-06T18:01:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:46.970 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:46.976 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_port, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:46.977 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:46.980 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_port:binding:host_id, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:46.981 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:47.081 40 INFO tempest.lib.common.rest_client [req-273eae8f-e18e-482a-b12a-facc35e9e333 ] Request (PortsRbacTest:test_create_port_binding_host_id): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.099s 2020-11-06 18:01:47.081 40 DEBUG tempest.lib.common.rest_client [req-273eae8f-e18e-482a-b12a-facc35e9e333 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-273eae8f-e18e-482a-b12a-facc35e9e333', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:47.114 40 INFO tempest.lib.common.rest_client [req-df700eec-8ac9-4257-83a4-4ccdcacda8f6 ] Request (PortsRbacTest:test_create_port_binding_host_id): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:01:47.115 40 DEBUG tempest.lib.common.rest_client [req-df700eec-8ac9-4257-83a4-4ccdcacda8f6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-df700eec-8ac9-4257-83a4-4ccdcacda8f6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["KY4yXxNKQFW2NVqGrN8Lqg"], "expires_at": "2020-11-06T19:01:47.000000Z", "issued_at": "2020-11-06T18:01:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:47.355 37 INFO tempest.lib.common.rest_client [req-712b30c9-8cd1-4107-b405-224656bb0813 ] Request (ComputeServersRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747 0.137s 2020-11-06 18:01:47.355 37 DEBUG tempest.lib.common.rest_client [req-712b30c9-8cd1-4107-b405-224656bb0813 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1571', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-712b30c9-8cd1-4107-b405-224656bb0813', 'x-compute-request-id': 'req-712b30c9-8cd1-4107-b405-224656bb0813', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747'} Body: b'{"server": {"id": "d09fce60-e537-4bc8-9db8-df2a08c4d747", "name": "tempest-ComputeServersRbacTest-Server-1807623844", "status": "ACTIVE", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "user_id": "262f98552a3a4d8a8fba3f96d5a872bf", "metadata": {}, "hostId": "72aa4147e128daa70511a3b03038cad49752a08b0327f6bc0c6decc0", "image": "", "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:01:36Z", "updated": "2020-11-06T18:01:46Z", "addresses": {"tempest-ComputeServersRbacTest-1143895587-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8c:0b:20"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:43.000000", "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ce", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [{"id": "af94feae-2c64-4f66-978a-2eb00d12ad7c"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:47.988 38 INFO tempest.lib.common.rest_client [req-9811e2b0-6808-4dc4-b346-7af9b554c798 ] Request (ImageNamespacesObjectsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.104s 2020-11-06 18:01:47.988 38 DEBUG tempest.lib.common.rest_client [req-9811e2b0-6808-4dc4-b346-7af9b554c798 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9811e2b0-6808-4dc4-b346-7af9b554c798', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2f7f4ca98599438eb5165a65f2132953", "name": "tempest-ImageNamespacesObjectsRbacTest-608895417", "password_expires_at": null}, "audit_ids": ["UuhRbZggR8eIHpJ4nfYKYA"], "expires_at": "2020-11-06T19:01:47.000000Z", "issued_at": "2020-11-06T18:01:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7b2386475a1747b394d9e3bd1abed87b", "name": "tempest-ImageNamespacesObjectsRbacTest-608895417"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:47.991 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:47.992 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:47.994 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: add_metadef_object, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:48.145 38 INFO tempest.lib.common.rest_client [req-36005ee8-b319-423a-94b4-dd38f9793186 ] Request (ImageNamespacesObjectsRbacTest:test_create_metadef_object_in_namespace): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces 0.150s 2020-11-06 18:01:48.146 38 DEBUG tempest.lib.common.rest_client [req-36005ee8-b319-423a-94b4-dd38f9793186 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"namespace": "tempest-test-ns-1490207108", "visibility": "public", "description": "Tempest", "protected": false, "display_name": "tempest-test-ns-1490207108"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '386', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/metadefs/namespaces/tempest-test-ns-1490207108', 'x-openstack-request-id': 'req-36005ee8-b319-423a-94b4-dd38f9793186', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces'} Body: b'{"namespace": "tempest-test-ns-1490207108", "display_name": "tempest-test-ns-1490207108", "description": "Tempest", "visibility": "public", "protected": false, "owner": "7b2386475a1747b394d9e3bd1abed87b", "created_at": "2020-11-06T18:01:48Z", "updated_at": "2020-11-06T18:01:48Z", "self": "/v2/metadefs/namespaces/tempest-test-ns-1490207108", "schema": "/v2/schemas/metadefs/namespace"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:48.146 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:48.205 38 INFO tempest.lib.common.rest_client [req-31cdd0f8-9236-4dfb-8a99-d8de9790c00a ] Request (ImageNamespacesObjectsRbacTest:test_create_metadef_object_in_namespace): 200 GET http://172.30.13.94/identity/v3/projects/7b2386475a1747b394d9e3bd1abed87b/users/2f7f4ca98599438eb5165a65f2132953/roles 0.057s 2020-11-06 18:01:48.205 38 DEBUG tempest.lib.common.rest_client [req-31cdd0f8-9236-4dfb-8a99-d8de9790c00a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-31cdd0f8-9236-4dfb-8a99-d8de9790c00a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7b2386475a1747b394d9e3bd1abed87b/users/2f7f4ca98599438eb5165a65f2132953/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7b2386475a1747b394d9e3bd1abed87b/users/2f7f4ca98599438eb5165a65f2132953/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:48.237 38 INFO tempest.lib.common.rest_client [req-eeab6032-4c36-4908-8316-82348a51a99d ] Request (ImageNamespacesObjectsRbacTest:test_create_metadef_object_in_namespace): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:01:48.238 38 DEBUG tempest.lib.common.rest_client [req-eeab6032-4c36-4908-8316-82348a51a99d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eeab6032-4c36-4908-8316-82348a51a99d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2f7f4ca98599438eb5165a65f2132953", "name": "tempest-ImageNamespacesObjectsRbacTest-608895417", "password_expires_at": null}, "audit_ids": ["nqiLE8XCTwOATcyQ57g82Q"], "expires_at": "2020-11-06T19:01:48.000000Z", "issued_at": "2020-11-06T18:01:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7b2386475a1747b394d9e3bd1abed87b", "name": "tempest-ImageNamespacesObjectsRbacTest-608895417"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:48.338 38 INFO tempest.lib.common.rest_client [req-16ab504e-f5de-4d99-aed7-0fac6b1e953a ] Request (ImageNamespacesObjectsRbacTest:test_create_metadef_object_in_namespace): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1490207108/objects 0.099s 2020-11-06 18:01:48.339 38 DEBUG tempest.lib.common.rest_client [req-16ab504e-f5de-4d99-aed7-0fac6b1e953a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-ImageNamespacesObjectsRbacTest-test-object-249461371"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '320', 'content-type': 'application/json', 'x-openstack-request-id': 'req-16ab504e-f5de-4d99-aed7-0fac6b1e953a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1490207108/objects'} Body: b'{"name": "tempest-ImageNamespacesObjectsRbacTest-test-object-249461371", "created_at": "2020-11-06T18:01:48Z", "updated_at": "2020-11-06T18:01:48Z", "self": "/v2/metadefs/namespaces/tempest-test-ns-1490207108/objects/tempest-ImageNamespacesObjectsRbacTest-test-object-249461371", "schema": "/v2/schemas/metadefs/object"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:48.340 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:48.392 38 INFO tempest.lib.common.rest_client [req-414bbdd6-c2f4-448c-bd69-14d072bac1d9 ] Request (ImageNamespacesObjectsRbacTest:test_create_metadef_object_in_namespace): 200 GET http://172.30.13.94/identity/v3/projects/7b2386475a1747b394d9e3bd1abed87b/users/2f7f4ca98599438eb5165a65f2132953/roles 0.051s 2020-11-06 18:01:48.392 38 DEBUG tempest.lib.common.rest_client [req-414bbdd6-c2f4-448c-bd69-14d072bac1d9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-414bbdd6-c2f4-448c-bd69-14d072bac1d9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7b2386475a1747b394d9e3bd1abed87b/users/2f7f4ca98599438eb5165a65f2132953/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7b2386475a1747b394d9e3bd1abed87b/users/2f7f4ca98599438eb5165a65f2132953/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:48.427 38 INFO tempest.lib.common.rest_client [req-ffdcb61f-4149-47d8-9316-12c8bc2356e8 ] Request (ImageNamespacesObjectsRbacTest:test_create_metadef_object_in_namespace): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:01:48.428 38 DEBUG tempest.lib.common.rest_client [req-ffdcb61f-4149-47d8-9316-12c8bc2356e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ffdcb61f-4149-47d8-9316-12c8bc2356e8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2f7f4ca98599438eb5165a65f2132953", "name": "tempest-ImageNamespacesObjectsRbacTest-608895417", "password_expires_at": null}, "audit_ids": ["gqNOIZHLQJqcXYVEVkmyPw"], "expires_at": "2020-11-06T19:01:48.000000Z", "issued_at": "2020-11-06T18:01:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7b2386475a1747b394d9e3bd1abed87b", "name": "tempest-ImageNamespacesObjectsRbacTest-608895417"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:48.439 37 INFO tempest.lib.common.rest_client [req-f0d75cd2-c3e9-4f6e-aa07-a3f1a388e9c7 ] Request (ComputeServersRbacTest:_run_cleanups): 404 GET http://172.30.13.94/compute/v2.1/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747 0.072s 2020-11-06 18:01:48.440 37 DEBUG tempest.lib.common.rest_client [req-f0d75cd2-c3e9-4f6e-aa07-a3f1a388e9c7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-f0d75cd2-c3e9-4f6e-aa07-a3f1a388e9c7', 'x-compute-request-id': 'req-f0d75cd2-c3e9-4f6e-aa07-a3f1a388e9c7', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance d09fce60-e537-4bc8-9db8-df2a08c4d747 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:48.450 39 INFO tempest.lib.common.rest_client [req-a8653f61-ab32-45a8-ba2d-bcd9d4073bb3 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.494s 2020-11-06 18:01:48.451 39 DEBUG tempest.lib.common.rest_client [req-a8653f61-ab32-45a8-ba2d-bcd9d4073bb3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a8653f61-ab32-45a8-ba2d-bcd9d4073bb3', 'x-compute-request-id': 'req-a8653f61-ab32-45a8-ba2d-bcd9d4073bb3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:48.501 37 INFO tempest.lib.common.rest_client [req-f293efbc-c58a-43a5-b1f5-2ef4af50c241 ] Request (ComputeServersRbacTest:_run_cleanups): 404 GET http://172.30.13.94/compute/v2.1/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747 0.060s 2020-11-06 18:01:48.502 37 DEBUG tempest.lib.common.rest_client [req-f293efbc-c58a-43a5-b1f5-2ef4af50c241 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-f293efbc-c58a-43a5-b1f5-2ef4af50c241', 'x-compute-request-id': 'req-f293efbc-c58a-43a5-b1f5-2ef4af50c241', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d09fce60-e537-4bc8-9db8-df2a08c4d747'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance d09fce60-e537-4bc8-9db8-df2a08c4d747 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:48.536 38 INFO tempest.lib.common.rest_client [req-b620e2e0-2866-414c-a810-bb4958094c55 ] Request (ImageNamespacesObjectsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1490207108/objects/tempest-ImageNamespacesObjectsRbacTest-test-object-249461371 0.106s 2020-11-06 18:01:48.536 38 DEBUG tempest.lib.common.rest_client [req-b620e2e0-2866-414c-a810-bb4958094c55 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-b620e2e0-2866-414c-a810-bb4958094c55', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1490207108/objects/tempest-ImageNamespacesObjectsRbacTest-test-object-249461371'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:48.571 38 INFO tempest.lib.common.rest_client [req-b776df10-1595-4ae5-b193-d94591e729f0 ] Request (ImageNamespacesObjectsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1490207108 0.034s 2020-11-06 18:01:48.572 38 DEBUG tempest.lib.common.rest_client [req-b776df10-1595-4ae5-b193-d94591e729f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-b776df10-1595-4ae5-b193-d94591e729f0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1490207108'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:48.573 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:48.574 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.575 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_metadef_objects, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:48.580 37 INFO tempest.lib.common.rest_client [req-5587781e-57ce-46c5-900e-488a852b3ff6 ] Request (ComputeServersRbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09/volumes/af94feae-2c64-4f66-978a-2eb00d12ad7c 0.077s 2020-11-06 18:01:48.581 37 DEBUG tempest.lib.common.rest_client [req-5587781e-57ce-46c5-900e-488a852b3ff6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-5587781e-57ce-46c5-900e-488a852b3ff6', 'content-length': '1717', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5587781e-57ce-46c5-900e-488a852b3ff6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09/volumes/af94feae-2c64-4f66-978a-2eb00d12ad7c'} Body: b'{"volume": {"id": "af94feae-2c64-4f66-978a-2eb00d12ad7c", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:01:32.000000", "updated_at": "2020-11-06T18:01:47.000000", "name": "tempest-ComputeServersRbacTest-volume-82098402", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09/volumes/af94feae-2c64-4f66-978a-2eb00d12ad7c"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/738a797d686c408e8ceb6a8b32bc1d09/volumes/af94feae-2c64-4f66-978a-2eb00d12ad7c"}], "user_id": "262f98552a3a4d8a8fba3f96d5a872bf", "bootable": "true", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "volume_image_metadata": {"signature_verified": "False", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "image_id": "56b368f6-9136-40ec-a04c-564d02c95e42", "image_name": "patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "checksum": "443b7623e27ecf03dc9e01ee93f67afe", "container_format": "bare", "disk_format": "qcow2", "min_disk": "0", "min_ram": "0", "size": "12716032"}, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "738a797d686c408e8ceb6a8b32bc1d09"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:48.594 37 INFO tempest.common.waiters [-] volume af94feae-2c64-4f66-978a-2eb00d12ad7c reached available after waiting for 0.594178 seconds 2020-11-06 18:01:48.597 38 INFO tempest.lib.common.rest_client [req-d67d2857-e3c8-4583-a95a-2663aca32dcd ] Request (ImageNamespacesObjectsRbacTest:test_list_metadef_objects_in_namespace): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces 0.022s 2020-11-06 18:01:48.598 38 DEBUG tempest.lib.common.rest_client [req-d67d2857-e3c8-4583-a95a-2663aca32dcd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"namespace": "tempest-test-ns-1769573260", "visibility": "public", "description": "Tempest", "protected": false, "display_name": "tempest-test-ns-1769573260"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '386', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/metadefs/namespaces/tempest-test-ns-1769573260', 'x-openstack-request-id': 'req-d67d2857-e3c8-4583-a95a-2663aca32dcd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces'} Body: b'{"namespace": "tempest-test-ns-1769573260", "display_name": "tempest-test-ns-1769573260", "description": "Tempest", "visibility": "public", "protected": false, "owner": "7b2386475a1747b394d9e3bd1abed87b", "created_at": "2020-11-06T18:01:48Z", "updated_at": "2020-11-06T18:01:48Z", "self": "/v2/metadefs/namespaces/tempest-test-ns-1769573260", "schema": "/v2/schemas/metadefs/namespace"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:48.598 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:48.601 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:48.602 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.602 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.603 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.603 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.603 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.604 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.604 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.605 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.605 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.605 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.606 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.606 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.607 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.607 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.607 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.607 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.608 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.608 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.608 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.609 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.609 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.609 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.610 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.610 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.610 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.611 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.611 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.611 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.612 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.612 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.612 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.612 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.613 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.613 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.613 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.614 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.614 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.614 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.614 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.615 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.615 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.615 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.616 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.616 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.616 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.617 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.617 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.617 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.618 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.618 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.618 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.618 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.619 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.619 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.619 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.620 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.620 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.620 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.621 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.621 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.622 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.622 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.622 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.623 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.623 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.623 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.623 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.624 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.624 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.624 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.625 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.625 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.625 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.625 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.626 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.627 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:create:forced_host, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:48.648 38 INFO tempest.lib.common.rest_client [req-303d9d4d-f45b-46fe-b1bd-3cafd1d251ce ] Request (ImageNamespacesObjectsRbacTest:test_list_metadef_objects_in_namespace): 200 GET http://172.30.13.94/identity/v3/projects/7b2386475a1747b394d9e3bd1abed87b/users/2f7f4ca98599438eb5165a65f2132953/roles 0.049s 2020-11-06 18:01:48.648 38 DEBUG tempest.lib.common.rest_client [req-303d9d4d-f45b-46fe-b1bd-3cafd1d251ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-303d9d4d-f45b-46fe-b1bd-3cafd1d251ce', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7b2386475a1747b394d9e3bd1abed87b/users/2f7f4ca98599438eb5165a65f2132953/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7b2386475a1747b394d9e3bd1abed87b/users/2f7f4ca98599438eb5165a65f2132953/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:48.671 37 INFO tempest.lib.common.rest_client [req-34d22817-87cc-4ae3-a083-8badcd25dd15 ] Request (ComputeServersRbacTest:test_create_server_forced_host): 200 GET http://172.30.13.94/compute/v2.1/os-availability-zone/detail 0.043s 2020-11-06 18:01:48.671 37 DEBUG tempest.lib.common.rest_client [req-34d22817-87cc-4ae3-a083-8badcd25dd15 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '607', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-34d22817-87cc-4ae3-a083-8badcd25dd15', 'x-compute-request-id': 'req-34d22817-87cc-4ae3-a083-8badcd25dd15', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-availability-zone/detail'} Body: b'{"availabilityZoneInfo": [{"zoneName": "internal", "zoneState": {"available": true}, "hosts": {"lf-virtual9": {"nova-scheduler": {"available": true, "active": true, "updated_at": "2020-11-06T18:01:40.000000"}, "nova-conductor": {"available": true, "active": true, "updated_at": "2020-11-06T18:01:46.000000"}}}}, {"zoneName": "nova", "zoneState": {"available": true}, "hosts": {"lf-virtual9": {"nova-compute": {"available": true, "active": true, "updated_at": "2020-11-06T18:01:42.000000"}}, "lf-virtual8": {"nova-compute": {"available": true, "active": true, "updated_at": "2020-11-06T18:01:39.000000"}}}}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:48.675 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:48.685 38 INFO tempest.lib.common.rest_client [req-d847045e-0077-4725-a1e2-67de49b21f90 ] Request (ImageNamespacesObjectsRbacTest:test_list_metadef_objects_in_namespace): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:01:48.685 38 DEBUG tempest.lib.common.rest_client [req-d847045e-0077-4725-a1e2-67de49b21f90 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d847045e-0077-4725-a1e2-67de49b21f90', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2f7f4ca98599438eb5165a65f2132953", "name": "tempest-ImageNamespacesObjectsRbacTest-608895417", "password_expires_at": null}, "audit_ids": ["TAmf7JydTY-RmUlQ0voBRA"], "expires_at": "2020-11-06T19:01:48.000000Z", "issued_at": "2020-11-06T18:01:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7b2386475a1747b394d9e3bd1abed87b", "name": "tempest-ImageNamespacesObjectsRbacTest-608895417"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:48.733 37 INFO tempest.lib.common.rest_client [req-3eb81027-c564-44b3-a73e-f879d8839345 ] Request (ComputeServersRbacTest:test_create_server_forced_host): 200 GET http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles 0.057s 2020-11-06 18:01:48.734 37 DEBUG tempest.lib.common.rest_client [req-3eb81027-c564-44b3-a73e-f879d8839345 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3eb81027-c564-44b3-a73e-f879d8839345', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:48.781 38 INFO tempest.lib.common.rest_client [req-926d314d-c4c5-42b3-8005-b2afda87e9be ] Request (ImageNamespacesObjectsRbacTest:test_list_metadef_objects_in_namespace): 200 GET http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1769573260/objects 0.095s 2020-11-06 18:01:48.782 38 DEBUG tempest.lib.common.rest_client [req-926d314d-c4c5-42b3-8005-b2afda87e9be ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '56', 'content-type': 'application/json', 'x-openstack-request-id': 'req-926d314d-c4c5-42b3-8005-b2afda87e9be', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1769573260/objects'} Body: b'{"objects": [], "schema": "v2/schemas/metadefs/objects"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:48.782 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:48.823 37 INFO tempest.lib.common.rest_client [req-18b5f049-b48f-4b09-b5c7-720e940bd33c ] Request (ComputeServersRbacTest:test_create_server_forced_host): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 18:01:48.824 37 DEBUG tempest.lib.common.rest_client [req-18b5f049-b48f-4b09-b5c7-720e940bd33c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-18b5f049-b48f-4b09-b5c7-720e940bd33c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "262f98552a3a4d8a8fba3f96d5a872bf", "name": "tempest-ComputeServersRbacTest-1376603226", "password_expires_at": null}, "audit_ids": ["2R5vZSICSJ2RGhfHtm8cWg"], "expires_at": "2020-11-06T19:01:48.000000Z", "issued_at": "2020-11-06T18:01:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "738a797d686c408e8ceb6a8b32bc1d09", "name": "tempest-ComputeServersRbacTest-1376603226"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:48.843 38 INFO tempest.lib.common.rest_client [req-9067119a-c646-4a5c-9dcf-f02d866f9f4c ] Request (ImageNamespacesObjectsRbacTest:test_list_metadef_objects_in_namespace): 200 GET http://172.30.13.94/identity/v3/projects/7b2386475a1747b394d9e3bd1abed87b/users/2f7f4ca98599438eb5165a65f2132953/roles 0.059s 2020-11-06 18:01:48.843 38 DEBUG tempest.lib.common.rest_client [req-9067119a-c646-4a5c-9dcf-f02d866f9f4c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9067119a-c646-4a5c-9dcf-f02d866f9f4c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7b2386475a1747b394d9e3bd1abed87b/users/2f7f4ca98599438eb5165a65f2132953/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7b2386475a1747b394d9e3bd1abed87b/users/2f7f4ca98599438eb5165a65f2132953/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:48.876 38 INFO tempest.lib.common.rest_client [req-a7a18cf1-6303-4022-98d5-cf2a4ea740e2 ] Request (ImageNamespacesObjectsRbacTest:test_list_metadef_objects_in_namespace): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:01:48.877 38 DEBUG tempest.lib.common.rest_client [req-a7a18cf1-6303-4022-98d5-cf2a4ea740e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a7a18cf1-6303-4022-98d5-cf2a4ea740e2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2f7f4ca98599438eb5165a65f2132953", "name": "tempest-ImageNamespacesObjectsRbacTest-608895417", "password_expires_at": null}, "audit_ids": ["HsvtvYzeR26fCLkzDcpcZQ"], "expires_at": "2020-11-06T19:01:48.000000Z", "issued_at": "2020-11-06T18:01:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7b2386475a1747b394d9e3bd1abed87b", "name": "tempest-ImageNamespacesObjectsRbacTest-608895417"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:48.899 40 INFO tempest.lib.common.rest_client [req-146b53e7-4734-4f25-aaa4-0b724fda6b10 ] Request (PortsRbacTest:test_create_port_binding_host_id): 201 POST http://172.30.13.94:9696/v2.0/ports 1.782s 2020-11-06 18:01:48.899 40 DEBUG tempest.lib.common.rest_client [req-146b53e7-4734-4f25-aaa4-0b724fda6b10 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "586884b2-4363-4597-acb0-ddbc49908b65", "binding:host_id": "rbac_test_host", "name": "tempest-PortsRbacTest-982544266"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1111', 'x-openstack-request-id': 'req-146b53e7-4734-4f25-aaa4-0b724fda6b10', 'date': 'Fri, 06 Nov 2020 18:01:48 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"2f8ba6cd-b1ff-4dcf-8706-3a80a4ddfb28","name":"tempest-PortsRbacTest-982544266","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:c3:8f:b0","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.10"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"rbac_test_host","binding:vif_type":"binding_failed","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.10","hostname":"host-192-168-120-10","fqdn":"host-192-168-120-10.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:01:47Z","updated_at":"2020-11-06T18:01:47Z","revision_number":1,"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:48.899 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:48.953 40 INFO tempest.lib.common.rest_client [req-a3ae52c1-f2ac-4e57-bfe2-b38611767d71 ] Request (PortsRbacTest:test_create_port_binding_host_id): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.053s 2020-11-06 18:01:48.953 40 DEBUG tempest.lib.common.rest_client [req-a3ae52c1-f2ac-4e57-bfe2-b38611767d71 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a3ae52c1-f2ac-4e57-bfe2-b38611767d71', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:48.966 38 INFO tempest.lib.common.rest_client [req-09c7c2a4-98e4-4eb2-a9f2-a6476ed0ffaf ] Request (ImageNamespacesObjectsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1769573260 0.088s 2020-11-06 18:01:48.967 38 DEBUG tempest.lib.common.rest_client [req-09c7c2a4-98e4-4eb2-a9f2-a6476ed0ffaf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-09c7c2a4-98e4-4eb2-a9f2-a6476ed0ffaf', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1769573260'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:48.969 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:48.970 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:48.971 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_metadef_object, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:48.988 40 INFO tempest.lib.common.rest_client [req-16b30656-c1d4-4766-85ff-4d0868b1512a ] Request (PortsRbacTest:test_create_port_binding_host_id): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:01:48.989 40 DEBUG tempest.lib.common.rest_client [req-16b30656-c1d4-4766-85ff-4d0868b1512a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-16b30656-c1d4-4766-85ff-4d0868b1512a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["Nze6TuxISyC3AzJ7zt-OFw"], "expires_at": "2020-11-06T19:01:48.000000Z", "issued_at": "2020-11-06T18:01:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:48.992 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:48.996 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_port, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:48.996 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:49.000 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_port:binding:profile, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:49.000 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:49.011 38 INFO tempest.lib.common.rest_client [req-02831e98-a0c9-4195-ae32-6f91fea65949 ] Request (ImageNamespacesObjectsRbacTest:test_show_metadef_object_in_namespace): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces 0.039s 2020-11-06 18:01:49.011 38 DEBUG tempest.lib.common.rest_client [req-02831e98-a0c9-4195-ae32-6f91fea65949 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"namespace": "tempest-test-ns-742526641", "visibility": "public", "description": "Tempest", "protected": false, "display_name": "tempest-test-ns-742526641"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '383', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/metadefs/namespaces/tempest-test-ns-742526641', 'x-openstack-request-id': 'req-02831e98-a0c9-4195-ae32-6f91fea65949', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces'} Body: b'{"namespace": "tempest-test-ns-742526641", "display_name": "tempest-test-ns-742526641", "description": "Tempest", "visibility": "public", "protected": false, "owner": "7b2386475a1747b394d9e3bd1abed87b", "created_at": "2020-11-06T18:01:48Z", "updated_at": "2020-11-06T18:01:48Z", "self": "/v2/metadefs/namespaces/tempest-test-ns-742526641", "schema": "/v2/schemas/metadefs/namespace"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:49.038 38 INFO tempest.lib.common.rest_client [req-36edde53-da0a-4aef-aca6-9b4e15b58afb ] Request (ImageNamespacesObjectsRbacTest:test_show_metadef_object_in_namespace): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-742526641/objects 0.026s 2020-11-06 18:01:49.038 38 DEBUG tempest.lib.common.rest_client [req-36edde53-da0a-4aef-aca6-9b4e15b58afb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-ImageNamespacesObjectsRbacTest-test-object-829837507"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '319', 'content-type': 'application/json', 'x-openstack-request-id': 'req-36edde53-da0a-4aef-aca6-9b4e15b58afb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-742526641/objects'} Body: b'{"name": "tempest-ImageNamespacesObjectsRbacTest-test-object-829837507", "created_at": "2020-11-06T18:01:49Z", "updated_at": "2020-11-06T18:01:49Z", "self": "/v2/metadefs/namespaces/tempest-test-ns-742526641/objects/tempest-ImageNamespacesObjectsRbacTest-test-object-829837507", "schema": "/v2/schemas/metadefs/object"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:49.039 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:49.049 40 INFO tempest.lib.common.rest_client [req-7fdad565-60a7-4fb9-8722-ea0b5bdc3b7f ] Request (PortsRbacTest:test_create_port_binding_profile): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.048s 2020-11-06 18:01:49.049 40 DEBUG tempest.lib.common.rest_client [req-7fdad565-60a7-4fb9-8722-ea0b5bdc3b7f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7fdad565-60a7-4fb9-8722-ea0b5bdc3b7f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:49.084 38 INFO tempest.lib.common.rest_client [req-3b9afe6c-4fab-4c98-8255-711840720777 ] Request (ImageNamespacesObjectsRbacTest:test_show_metadef_object_in_namespace): 200 GET http://172.30.13.94/identity/v3/projects/7b2386475a1747b394d9e3bd1abed87b/users/2f7f4ca98599438eb5165a65f2132953/roles 0.043s 2020-11-06 18:01:49.084 38 DEBUG tempest.lib.common.rest_client [req-3b9afe6c-4fab-4c98-8255-711840720777 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3b9afe6c-4fab-4c98-8255-711840720777', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7b2386475a1747b394d9e3bd1abed87b/users/2f7f4ca98599438eb5165a65f2132953/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7b2386475a1747b394d9e3bd1abed87b/users/2f7f4ca98599438eb5165a65f2132953/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:49.121 38 INFO tempest.lib.common.rest_client [req-046bcafd-b239-42c6-ad53-2746d0a01d83 ] Request (ImageNamespacesObjectsRbacTest:test_show_metadef_object_in_namespace): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:01:49.121 38 DEBUG tempest.lib.common.rest_client [req-046bcafd-b239-42c6-ad53-2746d0a01d83 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-046bcafd-b239-42c6-ad53-2746d0a01d83', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2f7f4ca98599438eb5165a65f2132953", "name": "tempest-ImageNamespacesObjectsRbacTest-608895417", "password_expires_at": null}, "audit_ids": ["FCU2lHc7QieJfB9IwH9x4Q"], "expires_at": "2020-11-06T19:01:49.000000Z", "issued_at": "2020-11-06T18:01:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7b2386475a1747b394d9e3bd1abed87b", "name": "tempest-ImageNamespacesObjectsRbacTest-608895417"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:49.202 38 INFO tempest.lib.common.rest_client [req-be0afddc-17b7-482d-b52a-91ebfa306c68 ] Request (ImageNamespacesObjectsRbacTest:test_show_metadef_object_in_namespace): 200 GET http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-742526641/objects/tempest-ImageNamespacesObjectsRbacTest-test-object-829837507 0.079s 2020-11-06 18:01:49.203 38 DEBUG tempest.lib.common.rest_client [req-be0afddc-17b7-482d-b52a-91ebfa306c68 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '353', 'content-type': 'application/json', 'x-openstack-request-id': 'req-be0afddc-17b7-482d-b52a-91ebfa306c68', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-742526641/objects/tempest-ImageNamespacesObjectsRbacTest-test-object-829837507'} Body: b'{"name": "tempest-ImageNamespacesObjectsRbacTest-test-object-829837507", "required": [], "properties": {}, "created_at": "2020-11-06T18:01:49Z", "updated_at": "2020-11-06T18:01:49Z", "self": "/v2/metadefs/namespaces/tempest-test-ns-742526641/objects/tempest-ImageNamespacesObjectsRbacTest-test-object-829837507", "schema": "/v2/schemas/metadefs/object"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:49.203 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:49.207 40 INFO tempest.lib.common.rest_client [req-215b08fe-0343-42cb-915d-70dd93c7499b ] Request (PortsRbacTest:test_create_port_binding_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.156s 2020-11-06 18:01:49.207 40 DEBUG tempest.lib.common.rest_client [req-215b08fe-0343-42cb-915d-70dd93c7499b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-215b08fe-0343-42cb-915d-70dd93c7499b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["nJyjuniXRsK4US9ClB6q4Q"], "expires_at": "2020-11-06T19:01:49.000000Z", "issued_at": "2020-11-06T18:01:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:49.251 38 INFO tempest.lib.common.rest_client [req-c9d38994-cfdf-4176-97d9-3351ad4bc29e ] Request (ImageNamespacesObjectsRbacTest:test_show_metadef_object_in_namespace): 200 GET http://172.30.13.94/identity/v3/projects/7b2386475a1747b394d9e3bd1abed87b/users/2f7f4ca98599438eb5165a65f2132953/roles 0.047s 2020-11-06 18:01:49.252 38 DEBUG tempest.lib.common.rest_client [req-c9d38994-cfdf-4176-97d9-3351ad4bc29e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c9d38994-cfdf-4176-97d9-3351ad4bc29e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7b2386475a1747b394d9e3bd1abed87b/users/2f7f4ca98599438eb5165a65f2132953/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7b2386475a1747b394d9e3bd1abed87b/users/2f7f4ca98599438eb5165a65f2132953/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:49.284 38 INFO tempest.lib.common.rest_client [req-abddecba-00b6-4c64-9880-6b7caacaf651 ] Request (ImageNamespacesObjectsRbacTest:test_show_metadef_object_in_namespace): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:01:49.285 38 DEBUG tempest.lib.common.rest_client [req-abddecba-00b6-4c64-9880-6b7caacaf651 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-abddecba-00b6-4c64-9880-6b7caacaf651', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2f7f4ca98599438eb5165a65f2132953", "name": "tempest-ImageNamespacesObjectsRbacTest-608895417", "password_expires_at": null}, "audit_ids": ["fiOVE3VfRmuEaDAow10c1A"], "expires_at": "2020-11-06T19:01:49.000000Z", "issued_at": "2020-11-06T18:01:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7b2386475a1747b394d9e3bd1abed87b", "name": "tempest-ImageNamespacesObjectsRbacTest-608895417"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:49.389 38 INFO tempest.lib.common.rest_client [req-ddb3d970-c861-4668-9d64-3fcb7aee212c ] Request (ImageNamespacesObjectsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-742526641/objects/tempest-ImageNamespacesObjectsRbacTest-test-object-829837507 0.102s 2020-11-06 18:01:49.390 38 DEBUG tempest.lib.common.rest_client [req-ddb3d970-c861-4668-9d64-3fcb7aee212c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-ddb3d970-c861-4668-9d64-3fcb7aee212c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-742526641/objects/tempest-ImageNamespacesObjectsRbacTest-test-object-829837507'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:49.420 38 INFO tempest.lib.common.rest_client [req-932f7724-eda5-45d0-943e-943b8833e5d3 ] Request (ImageNamespacesObjectsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-742526641 0.029s 2020-11-06 18:01:49.421 38 DEBUG tempest.lib.common.rest_client [req-932f7724-eda5-45d0-943e-943b8833e5d3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-932f7724-eda5-45d0-943e-943b8833e5d3', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-742526641'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:49.423 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:49.424 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:49.426 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: modify_metadef_object, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:49.453 38 INFO tempest.lib.common.rest_client [req-05bfea66-282f-4223-a956-76c23e1119bf ] Request (ImageNamespacesObjectsRbacTest:test_update_metadef_object_in_namespace): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces 0.026s 2020-11-06 18:01:49.453 38 DEBUG tempest.lib.common.rest_client [req-05bfea66-282f-4223-a956-76c23e1119bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"namespace": "tempest-test-ns-1488704722", "visibility": "public", "description": "Tempest", "protected": false, "display_name": "tempest-test-ns-1488704722"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '386', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/metadefs/namespaces/tempest-test-ns-1488704722', 'x-openstack-request-id': 'req-05bfea66-282f-4223-a956-76c23e1119bf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces'} Body: b'{"namespace": "tempest-test-ns-1488704722", "display_name": "tempest-test-ns-1488704722", "description": "Tempest", "visibility": "public", "protected": false, "owner": "7b2386475a1747b394d9e3bd1abed87b", "created_at": "2020-11-06T18:01:49Z", "updated_at": "2020-11-06T18:01:49Z", "self": "/v2/metadefs/namespaces/tempest-test-ns-1488704722", "schema": "/v2/schemas/metadefs/namespace"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:49.478 38 INFO tempest.lib.common.rest_client [req-fe9cef47-15bb-4a6c-863d-3bb96bdbc152 ] Request (ImageNamespacesObjectsRbacTest:test_update_metadef_object_in_namespace): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1488704722/objects 0.024s 2020-11-06 18:01:49.479 38 DEBUG tempest.lib.common.rest_client [req-fe9cef47-15bb-4a6c-863d-3bb96bdbc152 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-ImageNamespacesObjectsRbacTest-test-object-1699269732"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '322', 'content-type': 'application/json', 'x-openstack-request-id': 'req-fe9cef47-15bb-4a6c-863d-3bb96bdbc152', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1488704722/objects'} Body: b'{"name": "tempest-ImageNamespacesObjectsRbacTest-test-object-1699269732", "created_at": "2020-11-06T18:01:49Z", "updated_at": "2020-11-06T18:01:49Z", "self": "/v2/metadefs/namespaces/tempest-test-ns-1488704722/objects/tempest-ImageNamespacesObjectsRbacTest-test-object-1699269732", "schema": "/v2/schemas/metadefs/object"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:49.479 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:49.529 38 INFO tempest.lib.common.rest_client [req-7c1465de-d6e7-48ca-a6fd-3b2f585d41dd ] Request (ImageNamespacesObjectsRbacTest:test_update_metadef_object_in_namespace): 200 GET http://172.30.13.94/identity/v3/projects/7b2386475a1747b394d9e3bd1abed87b/users/2f7f4ca98599438eb5165a65f2132953/roles 0.049s 2020-11-06 18:01:49.530 38 DEBUG tempest.lib.common.rest_client [req-7c1465de-d6e7-48ca-a6fd-3b2f585d41dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7c1465de-d6e7-48ca-a6fd-3b2f585d41dd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7b2386475a1747b394d9e3bd1abed87b/users/2f7f4ca98599438eb5165a65f2132953/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7b2386475a1747b394d9e3bd1abed87b/users/2f7f4ca98599438eb5165a65f2132953/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:49.560 38 INFO tempest.lib.common.rest_client [req-bce9c2f1-3553-47f8-b140-55eed596842d ] Request (ImageNamespacesObjectsRbacTest:test_update_metadef_object_in_namespace): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.029s 2020-11-06 18:01:49.560 38 DEBUG tempest.lib.common.rest_client [req-bce9c2f1-3553-47f8-b140-55eed596842d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bce9c2f1-3553-47f8-b140-55eed596842d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2f7f4ca98599438eb5165a65f2132953", "name": "tempest-ImageNamespacesObjectsRbacTest-608895417", "password_expires_at": null}, "audit_ids": ["K3XzWpjmRz6jEbJ_OPuVNw"], "expires_at": "2020-11-06T19:01:49.000000Z", "issued_at": "2020-11-06T18:01:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7b2386475a1747b394d9e3bd1abed87b", "name": "tempest-ImageNamespacesObjectsRbacTest-608895417"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:49.654 38 INFO tempest.lib.common.rest_client [req-4a0693fb-ffd7-4c00-9355-8b9e59e17e89 ] Request (ImageNamespacesObjectsRbacTest:test_update_metadef_object_in_namespace): 200 PUT http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1488704722/objects/tempest-ImageNamespacesObjectsRbacTest-test-object-1699269732 0.092s 2020-11-06 18:01:49.654 38 DEBUG tempest.lib.common.rest_client [req-4a0693fb-ffd7-4c00-9355-8b9e59e17e89 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "Object New Name"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '230', 'content-type': 'application/json', 'x-openstack-request-id': 'req-4a0693fb-ffd7-4c00-9355-8b9e59e17e89', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1488704722/objects/tempest-ImageNamespacesObjectsRbacTest-test-object-1699269732'} Body: b'{"name": "Object New Name", "created_at": "2020-11-06T18:01:49Z", "updated_at": "2020-11-06T18:01:49Z", "self": "/v2/metadefs/namespaces/tempest-test-ns-1488704722/objects/Object New Name", "schema": "/v2/schemas/metadefs/object"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:49.655 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:49.694 37 INFO tempest.lib.common.rest_client [req-707fb305-6f6c-43ce-b932-b6d437417058 ] Request (ComputeServersRbacTest:test_create_server_forced_host): 202 POST http://172.30.13.94/compute/v2.1/servers 0.870s 2020-11-06 18:01:49.695 37 DEBUG tempest.lib.common.rest_client [req-707fb305-6f6c-43ce-b932-b6d437417058 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-ComputeServersRbacTest-Server-820155090", "flavorRef": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "imageRef": "56b368f6-9136-40ec-a04c-564d02c95e42", "networks": [{"uuid": "4c841a1c-655b-4758-ac88-8f8b657eda1b"}], "availability_zone": "nova:lf-virtual9"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/21864d36-4f1f-4c03-8061-54c9a2291177', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-707fb305-6f6c-43ce-b932-b6d437417058', 'x-compute-request-id': 'req-707fb305-6f6c-43ce-b932-b6d437417058', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "21864d36-4f1f-4c03-8061-54c9a2291177", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/21864d36-4f1f-4c03-8061-54c9a2291177"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/21864d36-4f1f-4c03-8061-54c9a2291177"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "HobzT3j2JiDA"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:49.698 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:49.713 38 INFO tempest.lib.common.rest_client [req-313c009c-841f-41b6-adba-02751f76f100 ] Request (ImageNamespacesObjectsRbacTest:test_update_metadef_object_in_namespace): 200 GET http://172.30.13.94/identity/v3/projects/7b2386475a1747b394d9e3bd1abed87b/users/2f7f4ca98599438eb5165a65f2132953/roles 0.057s 2020-11-06 18:01:49.713 38 DEBUG tempest.lib.common.rest_client [req-313c009c-841f-41b6-adba-02751f76f100 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-313c009c-841f-41b6-adba-02751f76f100', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7b2386475a1747b394d9e3bd1abed87b/users/2f7f4ca98599438eb5165a65f2132953/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7b2386475a1747b394d9e3bd1abed87b/users/2f7f4ca98599438eb5165a65f2132953/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:49.732 39 INFO tempest.lib.common.rest_client [req-f2802df6-0b35-4d41-90ad-91a49e2d831f ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.263s 2020-11-06 18:01:49.732 39 DEBUG tempest.lib.common.rest_client [req-f2802df6-0b35-4d41-90ad-91a49e2d831f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f2802df6-0b35-4d41-90ad-91a49e2d831f', 'x-compute-request-id': 'req-f2802df6-0b35-4d41-90ad-91a49e2d831f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:49.747 38 INFO tempest.lib.common.rest_client [req-813398d1-043d-42d8-b073-9e2411c9d62f ] Request (ImageNamespacesObjectsRbacTest:test_update_metadef_object_in_namespace): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:01:49.748 38 DEBUG tempest.lib.common.rest_client [req-813398d1-043d-42d8-b073-9e2411c9d62f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-813398d1-043d-42d8-b073-9e2411c9d62f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2f7f4ca98599438eb5165a65f2132953", "name": "tempest-ImageNamespacesObjectsRbacTest-608895417", "password_expires_at": null}, "audit_ids": ["RZgAkZcNQPmMZWAomNuviQ"], "expires_at": "2020-11-06T19:01:49.000000Z", "issued_at": "2020-11-06T18:01:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7b2386475a1747b394d9e3bd1abed87b", "name": "tempest-ImageNamespacesObjectsRbacTest-608895417"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7b2386475a1747b394d9e3bd1abed87b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:49.753 37 INFO tempest.lib.common.rest_client [req-ecd882fc-c9ef-4877-80a8-36d93a4317df ] Request (ComputeServersRbacTest:test_create_server_forced_host): 200 GET http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles 0.054s 2020-11-06 18:01:49.754 37 DEBUG tempest.lib.common.rest_client [req-ecd882fc-c9ef-4877-80a8-36d93a4317df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ecd882fc-c9ef-4877-80a8-36d93a4317df', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:49.794 37 INFO tempest.lib.common.rest_client [req-d5bac30e-00bf-4677-97f4-7cfe4149b2ce ] Request (ComputeServersRbacTest:test_create_server_forced_host): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:01:49.795 37 DEBUG tempest.lib.common.rest_client [req-d5bac30e-00bf-4677-97f4-7cfe4149b2ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d5bac30e-00bf-4677-97f4-7cfe4149b2ce', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "262f98552a3a4d8a8fba3f96d5a872bf", "name": "tempest-ComputeServersRbacTest-1376603226", "password_expires_at": null}, "audit_ids": ["dbcG2eTxQ52psQZPTUBTCA"], "expires_at": "2020-11-06T19:01:49.000000Z", "issued_at": "2020-11-06T18:01:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "738a797d686c408e8ceb6a8b32bc1d09", "name": "tempest-ComputeServersRbacTest-1376603226"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:49.829 38 INFO tempest.lib.common.rest_client [req-41f13c59-731b-4733-847f-51e7a7ab476b ] Request (ImageNamespacesObjectsRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1488704722/objects/tempest-ImageNamespacesObjectsRbacTest-test-object-1699269732 0.080s 2020-11-06 18:01:49.830 38 DEBUG tempest.lib.common.rest_client [req-41f13c59-731b-4733-847f-51e7a7ab476b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '172', 'content-type': 'application/json', 'x-openstack-request-id': 'req-41f13c59-731b-4733-847f-51e7a7ab476b', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1488704722/objects/tempest-ImageNamespacesObjectsRbacTest-test-object-1699269732'} Body: b'{"message": "Could not find metadata object tempest-ImageNamespacesObjectsRbacTest-test-object-1699269732

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:49.867 38 INFO tempest.lib.common.rest_client [req-da15d9b6-64ab-4516-aadb-6f610e0f9826 ] Request (ImageNamespacesObjectsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1488704722 0.036s 2020-11-06 18:01:49.867 38 DEBUG tempest.lib.common.rest_client [req-da15d9b6-64ab-4516-aadb-6f610e0f9826 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-da15d9b6-64ab-4516-aadb-6f610e0f9826', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1488704722'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:49.995 38 INFO tempest.lib.common.rest_client [req-196c1d50-1b71-4bf3-880a-a13f8414ed09 ] Request (ImageNamespacesObjectsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/2f7f4ca98599438eb5165a65f2132953 0.125s 2020-11-06 18:01:49.996 38 DEBUG tempest.lib.common.rest_client [req-196c1d50-1b71-4bf3-880a-a13f8414ed09 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-196c1d50-1b71-4bf3-880a-a13f8414ed09', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/2f7f4ca98599438eb5165a65f2132953'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:50.031 40 INFO tempest.lib.common.rest_client [req-278ae9c9-34cc-4eb5-8e76-77c079743ae1 ] Request (PortsRbacTest:test_create_port_binding_profile): 201 POST http://172.30.13.94:9696/v2.0/ports 0.822s 2020-11-06 18:01:50.031 40 DEBUG tempest.lib.common.rest_client [req-278ae9c9-34cc-4eb5-8e76-77c079743ae1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "586884b2-4363-4597-acb0-ddbc49908b65", "binding:profile": {"foo": "1"}, "name": "tempest-PortsRbacTest-1937642841"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1104', 'x-openstack-request-id': 'req-278ae9c9-34cc-4eb5-8e76-77c079743ae1', 'date': 'Fri, 06 Nov 2020 18:01:50 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"681475a9-b4b1-4301-b8f4-1c15dc1ffff3","name":"tempest-PortsRbacTest-1937642841","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:d6:3a:6d","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.185"}],"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","port_security_enabled":true,"qos_policy_id":null,"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"binding:vnic_type":"normal","binding:profile":{"foo":"1"},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"allowed_address_pairs":[],"extra_dhcp_opts":[],"description":"","qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.185","hostname":"host-192-168-120-185","fqdn":"host-192-168-120-185.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:01:49Z","updated_at":"2020-11-06T18:01:49Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:50.032 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:50.051 37 INFO tempest.lib.common.rest_client [req-610a0308-85c1-4edd-8d3a-649e7ab760fa ] Request (ComputeServersRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/compute/v2.1/servers/21864d36-4f1f-4c03-8061-54c9a2291177 0.255s 2020-11-06 18:01:50.052 37 DEBUG tempest.lib.common.rest_client [req-610a0308-85c1-4edd-8d3a-649e7ab760fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-610a0308-85c1-4edd-8d3a-649e7ab760fa', 'x-compute-request-id': 'req-610a0308-85c1-4edd-8d3a-649e7ab760fa', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/21864d36-4f1f-4c03-8061-54c9a2291177'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:50.086 38 INFO tempest.lib.common.rest_client [req-0b5e4854-3b1a-4570-a51d-e1b480ea48fb ] Request (ImageNamespacesObjectsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-11-06 18:01:50.087 38 DEBUG tempest.lib.common.rest_client [req-0b5e4854-3b1a-4570-a51d-e1b480ea48fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0b5e4854-3b1a-4570-a51d-e1b480ea48fb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["exuhKaSiRmaK69Nzt86CnQ"], "expires_at": "2020-11-06T19:01:50.000000Z", "issued_at": "2020-11-06T18:01:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:50.137 40 INFO tempest.lib.common.rest_client [req-325d9a08-3f70-4fe9-8c94-d40044c09185 ] Request (PortsRbacTest:test_create_port_binding_profile): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.103s 2020-11-06 18:01:50.137 40 DEBUG tempest.lib.common.rest_client [req-325d9a08-3f70-4fe9-8c94-d40044c09185 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-325d9a08-3f70-4fe9-8c94-d40044c09185', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:50.221 37 INFO tempest.lib.common.rest_client [req-3a4d6417-c47d-4d5c-85c0-58095e83ec1b ] Request (ComputeServersRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/21864d36-4f1f-4c03-8061-54c9a2291177 0.167s 2020-11-06 18:01:50.221 37 DEBUG tempest.lib.common.rest_client [req-3a4d6417-c47d-4d5c-85c0-58095e83ec1b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1418', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3a4d6417-c47d-4d5c-85c0-58095e83ec1b', 'x-compute-request-id': 'req-3a4d6417-c47d-4d5c-85c0-58095e83ec1b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/21864d36-4f1f-4c03-8061-54c9a2291177'} Body: b'{"server": {"id": "21864d36-4f1f-4c03-8061-54c9a2291177", "name": "tempest-ComputeServersRbacTest-Server-820155090", "status": "BUILD", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "user_id": "262f98552a3a4d8a8fba3f96d5a872bf", "metadata": {}, "hostId": "", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:01:49Z", "updated": "2020-11-06T18:01:50Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/21864d36-4f1f-4c03-8061-54c9a2291177"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/21864d36-4f1f-4c03-8061-54c9a2291177"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "instance-000033d0", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:50.225 40 INFO tempest.lib.common.rest_client [req-520e6ced-ee3c-4ad1-b7f4-bc7d033cb0b6 ] Request (PortsRbacTest:test_create_port_binding_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-11-06 18:01:50.225 40 DEBUG tempest.lib.common.rest_client [req-520e6ced-ee3c-4ad1-b7f4-bc7d033cb0b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-520e6ced-ee3c-4ad1-b7f4-bc7d033cb0b6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["lfuSdHfQQ2Wt2mujHFXUHA"], "expires_at": "2020-11-06T19:01:50.000000Z", "issued_at": "2020-11-06T18:01:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:50.228 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:50.231 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_port, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:50.231 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:50.234 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_port:device_owner, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:50.234 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:50.287 40 INFO tempest.lib.common.rest_client [req-f3c55617-c37e-4834-9d24-602d24ff9c8e ] Request (PortsRbacTest:test_create_port_device_owner): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.052s 2020-11-06 18:01:50.287 40 DEBUG tempest.lib.common.rest_client [req-f3c55617-c37e-4834-9d24-602d24ff9c8e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f3c55617-c37e-4834-9d24-602d24ff9c8e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:50.350 40 INFO tempest.lib.common.rest_client [req-a533fdf5-959d-4220-a364-262ac477002d ] Request (PortsRbacTest:test_create_port_device_owner): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.061s 2020-11-06 18:01:50.351 40 DEBUG tempest.lib.common.rest_client [req-a533fdf5-959d-4220-a364-262ac477002d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a533fdf5-959d-4220-a364-262ac477002d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["fT64IB5aRauVjpvcPlGrpQ"], "expires_at": "2020-11-06T19:01:50.000000Z", "issued_at": "2020-11-06T18:01:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:50.360 38 INFO tempest.lib.common.rest_client [req-3d056ab2-7513-4302-a20b-d89300f84692 ] Request (ImageNamespacesObjectsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=7b2386475a1747b394d9e3bd1abed87b&name=default 0.272s 2020-11-06 18:01:50.361 38 DEBUG tempest.lib.common.rest_client [req-3d056ab2-7513-4302-a20b-d89300f84692 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-3d056ab2-7513-4302-a20b-d89300f84692', 'date': 'Fri, 06 Nov 2020 18:01:50 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=7b2386475a1747b394d9e3bd1abed87b&name=default'} Body: b'{"security_groups": [{"id": "76528270-f85e-4956-9e4f-cb541d6a80c7", "name": "default", "stateful": true, "tenant_id": "7b2386475a1747b394d9e3bd1abed87b", "description": "Default security group", "security_group_rules": [{"id": "111fabde-8411-42d9-81d3-8f74a41ccf03", "tenant_id": "7b2386475a1747b394d9e3bd1abed87b", "security_group_id": "76528270-f85e-4956-9e4f-cb541d6a80c7", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:01:50Z", "updated_at": "2020-11-06T18:01:50Z", "revision_number": 0, "project_id": "7b2386475a1747b394d9e3bd1abed87b"}, {"id": "4dbfcbb3-cafe-4e40-b18a-8e41be87d969", "tenant_id": "7b2386475a1747b394d9e3bd1abed87b", "security_group_id": "76528270-f85e-4956-9e4f-cb541d6a80c7", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "76528270-f85e-4956-9e4f-cb541d6a80c7", "description": null, "tags": [], "created_at": "2020-11-06T18:01:50Z", "updated_at": "2020-11-06T18:01:50Z", "revision_number": 0, "project_id": "7b2386475a1747b394d9e3bd1abed87b"}, {"id": "51d4770f-2254-4e36-9050-ca21b2156786", "tenant_id": "7b2386475a1747b394d9e3bd1abed87b", "security_group_id": "76528270-f85e-4956-9e4f-cb541d6a80c7", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "76528270-f85e-4956-9e4f-cb541d6a80c7", "description": null, "tags": [], "created_at": "2020-11-06T18:01:50Z", "updated_at": "2020-11-06T18:01:50Z", "revision_number": 0, "project_id": "7b2386475a1747b394d9e3bd1abed87b"}, {"id": "e7878f15-7fad-4099-993d-113fc3a42ac5", "tenant_id": "7b2386475a1747b394d9e3bd1abed87b", "security_group_id": "76528270-f85e-4956-9e4f-cb541d6a80c7", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:01:50Z", "updated_at": "2020-11-06T18:01:50Z", "revision_number": 0, "project_id": "7b2386475a1747b394d9e3bd1abed87b"}], "tags": [], "created_at": "2020-11-06T18:01:50Z", "updated_at": "2020-11-06T18:01:50Z", "revision_number": 1, "project_id": "7b2386475a1747b394d9e3bd1abed87b"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:50.607 38 INFO tempest.lib.common.rest_client [req-76e19e97-7db7-4e06-b2e0-89c4cc3e3af0 ] Request (ImageNamespacesObjectsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/76528270-f85e-4956-9e4f-cb541d6a80c7 0.245s 2020-11-06 18:01:50.608 38 DEBUG tempest.lib.common.rest_client [req-76e19e97-7db7-4e06-b2e0-89c4cc3e3af0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-76e19e97-7db7-4e06-b2e0-89c4cc3e3af0', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:01:50 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/76528270-f85e-4956-9e4f-cb541d6a80c7'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:50.726 38 INFO tempest.lib.common.rest_client [req-eb1ec836-f8a3-41b4-8a8a-75e75486507e ] Request (ImageNamespacesObjectsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/7b2386475a1747b394d9e3bd1abed87b 0.117s 2020-11-06 18:01:50.726 38 DEBUG tempest.lib.common.rest_client [req-eb1ec836-f8a3-41b4-8a8a-75e75486507e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eb1ec836-f8a3-41b4-8a8a-75e75486507e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/7b2386475a1747b394d9e3bd1abed87b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:50.806 38 INFO tempest.lib.common.rest_client [req-a504dbaa-0eb4-450d-bb54-f361cdf50b79 ] Request (NamespaceTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.077s 2020-11-06 18:01:50.807 38 DEBUG tempest.lib.common.rest_client [req-a504dbaa-0eb4-450d-bb54-f361cdf50b79 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a504dbaa-0eb4-450d-bb54-f361cdf50b79', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["dAsy8EfVSjudSzI2RU9vKA"], "expires_at": "2020-11-06T19:01:50.000000Z", "issued_at": "2020-11-06T18:01:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:50.851 38 INFO tempest.lib.common.rest_client [req-00a999fa-4cc0-4310-b7e5-072586e44d26 ] Request (NamespaceTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:01:50.852 38 DEBUG tempest.lib.common.rest_client [req-00a999fa-4cc0-4310-b7e5-072586e44d26 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-00a999fa-4cc0-4310-b7e5-072586e44d26', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["lNLTq7hIQBSavOfHlSLjXA"], "expires_at": "2020-11-06T19:01:50.000000Z", "issued_at": "2020-11-06T18:01:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:50.917 38 INFO tempest.lib.common.rest_client [req-3355ac66-a56c-48aa-9cee-317267fdaca6 ] Request (NamespaceTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.065s 2020-11-06 18:01:50.918 38 DEBUG tempest.lib.common.rest_client [req-3355ac66-a56c-48aa-9cee-317267fdaca6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3355ac66-a56c-48aa-9cee-317267fdaca6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:50.986 38 INFO tempest.lib.common.rest_client [req-1da04867-a64d-4dca-a5ed-4acf70462050 ] Request (NamespaceTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.067s 2020-11-06 18:01:50.986 38 DEBUG tempest.lib.common.rest_client [req-1da04867-a64d-4dca-a5ed-4acf70462050 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-NamespaceTagsRbacTest-909104330-desc", "domain_id": "default", "name": "tempest-NamespaceTagsRbacTest-909104330"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '378', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1da04867-a64d-4dca-a5ed-4acf70462050', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "78e5eaff937b447586c90ea68c13cbcf", "name": "tempest-NamespaceTagsRbacTest-909104330", "domain_id": "default", "description": "tempest-NamespaceTagsRbacTest-909104330-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:51.031 39 INFO tempest.lib.common.rest_client [req-2abe01b7-0db0-4767-b436-c17890cef4da ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.281s 2020-11-06 18:01:51.032 39 DEBUG tempest.lib.common.rest_client [req-2abe01b7-0db0-4767-b436-c17890cef4da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2abe01b7-0db0-4767-b436-c17890cef4da', 'x-compute-request-id': 'req-2abe01b7-0db0-4767-b436-c17890cef4da', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:51.110 38 INFO tempest.lib.common.rest_client [req-95cefb76-1dbb-42da-b7f1-c27f24b6f2ca ] Request (NamespaceTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.121s 2020-11-06 18:01:51.110 38 DEBUG tempest.lib.common.rest_client [req-95cefb76-1dbb-42da-b7f1-c27f24b6f2ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-NamespaceTagsRbacTest-909104330", "password": "W0+tnz%vt^rrGN^", "project_id": "78e5eaff937b447586c90ea68c13cbcf", "email": "tempest-NamespaceTagsRbacTest-1928849814@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '397', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-95cefb76-1dbb-42da-b7f1-c27f24b6f2ca', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "78e5eaff937b447586c90ea68c13cbcf", "email": "tempest-NamespaceTagsRbacTest-1928849814@example.com", "id": "da6a58e445874217add8b6e759a4026c", "name": "tempest-NamespaceTagsRbacTest-909104330", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/da6a58e445874217add8b6e759a4026c"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:51.118 40 INFO tempest.lib.common.rest_client [req-f0737f7f-c75c-4afd-b878-46ab100a6a05 ] Request (PortsRbacTest:test_create_port_device_owner): 201 POST http://172.30.13.94:9696/v2.0/ports 0.767s 2020-11-06 18:01:51.119 40 DEBUG tempest.lib.common.rest_client [req-f0737f7f-c75c-4afd-b878-46ab100a6a05 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "586884b2-4363-4597-acb0-ddbc49908b65", "device_owner": "network:router_interface", "name": "tempest-PortsRbacTest-1063623884"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1082', 'x-openstack-request-id': 'req-f0737f7f-c75c-4afd-b878-46ab100a6a05', 'date': 'Fri, 06 Nov 2020 18:01:51 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"b6f1631d-865c-41b9-bcc8-e604b89032a7","name":"tempest-PortsRbacTest-1063623884","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:7a:15:ff","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"network:router_interface","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.172"}],"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","port_security_enabled":false,"qos_policy_id":null,"security_groups":[],"binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"allowed_address_pairs":[],"extra_dhcp_opts":[],"description":"","qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.172","hostname":"host-192-168-120-172","fqdn":"host-192-168-120-172.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:01:50Z","updated_at":"2020-11-06T18:01:50Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:51.120 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:51.158 38 INFO tempest.lib.common.rest_client [req-023fe8ba-6b32-49d9-b6ec-1d79fecca173 ] Request (NamespaceTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.047s 2020-11-06 18:01:51.159 38 DEBUG tempest.lib.common.rest_client [req-023fe8ba-6b32-49d9-b6ec-1d79fecca173 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-023fe8ba-6b32-49d9-b6ec-1d79fecca173', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:51.170 40 INFO tempest.lib.common.rest_client [req-34ee8dd3-a38d-40a0-a795-f2b41d41dd25 ] Request (PortsRbacTest:test_create_port_device_owner): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.050s 2020-11-06 18:01:51.171 40 DEBUG tempest.lib.common.rest_client [req-34ee8dd3-a38d-40a0-a795-f2b41d41dd25 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-34ee8dd3-a38d-40a0-a795-f2b41d41dd25', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:51.209 38 INFO tempest.lib.common.rest_client [req-a12f841c-0939-46d9-9ac6-f1c27123a329 ] Request (NamespaceTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.050s 2020-11-06 18:01:51.210 38 DEBUG tempest.lib.common.rest_client [req-a12f841c-0939-46d9-9ac6-f1c27123a329 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a12f841c-0939-46d9-9ac6-f1c27123a329', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:51.255 40 INFO tempest.lib.common.rest_client [req-23242797-55ff-49f1-b657-03cfc368bc3f ] Request (PortsRbacTest:test_create_port_device_owner): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 18:01:51.256 40 DEBUG tempest.lib.common.rest_client [req-23242797-55ff-49f1-b657-03cfc368bc3f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-23242797-55ff-49f1-b657-03cfc368bc3f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["5PwVXWHrRJm7nLV25bQkOA"], "expires_at": "2020-11-06T19:01:51.000000Z", "issued_at": "2020-11-06T18:01:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:51.259 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:51.262 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_port, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:51.263 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:51.267 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_port:fixed_ips:ip_address, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:51.271 38 INFO tempest.lib.common.rest_client [req-d8bdcdb1-b5f7-4ef6-ab4c-0f165956b3ce ] Request (NamespaceTagsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles/72a4576c553448cd941b052c1ca0cf2d 0.059s 2020-11-06 18:01:51.271 38 DEBUG tempest.lib.common.rest_client [req-d8bdcdb1-b5f7-4ef6-ab4c-0f165956b3ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d8bdcdb1-b5f7-4ef6-ab4c-0f165956b3ce', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:51.272 38 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-NamespaceTagsRbacTest-909104330', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '78e5eaff937b447586c90ea68c13cbcf', 'project_name': 'tempest-NamespaceTagsRbacTest-909104330', 'tenant_id': '78e5eaff937b447586c90ea68c13cbcf', 'tenant_name': 'tempest-NamespaceTagsRbacTest-909104330', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'da6a58e445874217add8b6e759a4026c'}, Network: None, Subnet: None, Router: None 2020-11-06 18:01:51.272 38 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-NamespaceTagsRbacTest-909104330', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '78e5eaff937b447586c90ea68c13cbcf', 'project_name': 'tempest-NamespaceTagsRbacTest-909104330', 'tenant_id': '78e5eaff937b447586c90ea68c13cbcf', 'tenant_name': 'tempest-NamespaceTagsRbacTest-909104330', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'da6a58e445874217add8b6e759a4026c'}, Network: None, Subnet: None, Router: None 2020-11-06 18:01:51.296 37 INFO tempest.lib.common.rest_client [req-2b56235f-7db1-4a86-934f-8c476592c6c3 ] Request (ComputeServersRbacTest:_run_cleanups): 404 GET http://172.30.13.94/compute/v2.1/servers/21864d36-4f1f-4c03-8061-54c9a2291177 0.061s 2020-11-06 18:01:51.296 37 DEBUG tempest.lib.common.rest_client [req-2b56235f-7db1-4a86-934f-8c476592c6c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-2b56235f-7db1-4a86-934f-8c476592c6c3', 'x-compute-request-id': 'req-2b56235f-7db1-4a86-934f-8c476592c6c3', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/21864d36-4f1f-4c03-8061-54c9a2291177'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 21864d36-4f1f-4c03-8061-54c9a2291177 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:51.301 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:51.302 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.302 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.302 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.303 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.303 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.303 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.304 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.304 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.304 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.305 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.305 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.305 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.306 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.306 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.306 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.306 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.307 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.307 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.307 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.308 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.308 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.308 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.308 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.309 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.309 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.309 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.310 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.310 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.310 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.310 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.311 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.311 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.311 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.311 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.312 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.312 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.312 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.313 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.313 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.313 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.313 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.314 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.314 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.314 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.315 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.315 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.315 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.315 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.316 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.316 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.316 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.317 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.317 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.317 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.317 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.318 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.318 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.318 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.319 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.319 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.319 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.320 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.320 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.320 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.321 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.321 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.321 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.322 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.322 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.322 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.322 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.323 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.323 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.323 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.323 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:51.325 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:delete, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:51.392 38 INFO tempest.lib.common.rest_client [req-eae43437-3c7e-456d-b7ab-dd3343176dd5 ] Request (NamespaceTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.108s 2020-11-06 18:01:51.392 38 DEBUG tempest.lib.common.rest_client [req-eae43437-3c7e-456d-b7ab-dd3343176dd5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6571', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eae43437-3c7e-456d-b7ab-dd3343176dd5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "da6a58e445874217add8b6e759a4026c", "name": "tempest-NamespaceTagsRbacTest-909104330", "password_expires_at": null}, "audit_ids": ["L7cZqxa4TXWqHZaChLTGCg"], "expires_at": "2020-11-06T19:01:51.000000Z", "issued_at": "2020-11-06T18:01:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "78e5eaff937b447586c90ea68c13cbcf", "name": "tempest-NamespaceTagsRbacTest-909104330"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:51.422 37 INFO tempest.lib.common.rest_client [req-da071d07-1cc5-4aef-a9f0-03c1504b2ff1 ] Request (ComputeServersRbacTest:test_delete_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-11-06 18:01:51.423 37 DEBUG tempest.lib.common.rest_client [req-da071d07-1cc5-4aef-a9f0-03c1504b2ff1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-da071d07-1cc5-4aef-a9f0-03c1504b2ff1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "262f98552a3a4d8a8fba3f96d5a872bf", "name": "tempest-ComputeServersRbacTest-1376603226", "password_expires_at": null}, "audit_ids": ["usxbTgm3R4ez6ZvWvHnroA"], "expires_at": "2020-11-06T19:01:51.000000Z", "issued_at": "2020-11-06T18:01:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "738a797d686c408e8ceb6a8b32bc1d09", "name": "tempest-ComputeServersRbacTest-1376603226"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:51.423 37 INFO tempest.lib.common.fixed_network [-] (ComputeServersRbacTest:test_delete_server) Found network {'id': '4c841a1c-655b-4758-ac88-8f8b657eda1b', 'name': 'tempest-ComputeServersRbacTest-1143895587-network', 'tenant_id': '738a797d686c408e8ceb6a8b32bc1d09', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '738a797d686c408e8ceb6a8b32bc1d09', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 60, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T18:01:06Z', 'updated_at': '2020-11-06T18:01:06Z', 'revision_number': 1} available for tenant 2020-11-06 18:01:51.484 38 INFO tempest.lib.common.rest_client [req-d117fdb9-33da-4e71-bc13-3b10fa749d65 ] Request (NamespaceTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-11-06 18:01:51.485 38 DEBUG tempest.lib.common.rest_client [req-d117fdb9-33da-4e71-bc13-3b10fa749d65 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d117fdb9-33da-4e71-bc13-3b10fa749d65', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["1E8901RDR_uXfx1_w8gvQQ"], "expires_at": "2020-11-06T19:01:51.000000Z", "issued_at": "2020-11-06T18:01:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:51.531 38 INFO tempest.lib.common.rest_client [req-f91e18c0-c16b-4943-ae09-ded60741a7ea ] Request (NamespaceTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:01:51.532 38 DEBUG tempest.lib.common.rest_client [req-f91e18c0-c16b-4943-ae09-ded60741a7ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f91e18c0-c16b-4943-ae09-ded60741a7ea', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["G_ej0E3QSNOPPJvhlwGHqA"], "expires_at": "2020-11-06T19:01:51.000000Z", "issued_at": "2020-11-06T18:01:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:51.587 38 INFO tempest.lib.common.rest_client [req-82d601c8-5d03-4847-ba83-b625a48c37d4 ] Request (NamespaceTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.054s 2020-11-06 18:01:51.588 38 DEBUG tempest.lib.common.rest_client [req-82d601c8-5d03-4847-ba83-b625a48c37d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-82d601c8-5d03-4847-ba83-b625a48c37d4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:51.637 38 INFO tempest.lib.common.rest_client [req-2d474ce6-64ff-4635-abe1-c8bdab23ec49 ] Request (NamespaceTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.048s 2020-11-06 18:01:51.637 38 DEBUG tempest.lib.common.rest_client [req-2d474ce6-64ff-4635-abe1-c8bdab23ec49 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2d474ce6-64ff-4635-abe1-c8bdab23ec49', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:51.638 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:01:51.638 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:51.693 38 INFO tempest.lib.common.rest_client [req-a1d0f513-0551-4076-9843-b3e982ab4257 ] Request (NamespaceTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles 0.053s 2020-11-06 18:01:51.693 38 DEBUG tempest.lib.common.rest_client [req-a1d0f513-0551-4076-9843-b3e982ab4257 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a1d0f513-0551-4076-9843-b3e982ab4257', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:51.765 38 INFO tempest.lib.common.rest_client [req-24f61664-13f6-47d1-9398-e79442d4b096 ] Request (NamespaceTagsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles/72a4576c553448cd941b052c1ca0cf2d 0.070s 2020-11-06 18:01:51.765 38 DEBUG tempest.lib.common.rest_client [req-24f61664-13f6-47d1-9398-e79442d4b096 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-24f61664-13f6-47d1-9398-e79442d4b096', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:51.890 38 INFO tempest.lib.common.rest_client [req-887b0d98-a332-4dff-9722-5ddbd49a675b ] Request (NamespaceTagsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles/a629c95d64b3416fb80ae90af4f69c05 0.124s 2020-11-06 18:01:51.890 38 DEBUG tempest.lib.common.rest_client [req-887b0d98-a332-4dff-9722-5ddbd49a675b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-887b0d98-a332-4dff-9722-5ddbd49a675b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:52.651 39 INFO tempest.lib.common.rest_client [req-efb31844-3633-406a-bc0d-2782d5e7dde4 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.601s 2020-11-06 18:01:52.652 39 DEBUG tempest.lib.common.rest_client [req-efb31844-3633-406a-bc0d-2782d5e7dde4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-efb31844-3633-406a-bc0d-2782d5e7dde4', 'x-compute-request-id': 'req-efb31844-3633-406a-bc0d-2782d5e7dde4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:52.944 40 INFO tempest.lib.common.rest_client [req-1ed1fa29-8384-4bb0-bd63-f59d4adabdcb ] Request (PortsRbacTest:test_create_port_fixed_ips_ip_address): 200 GET http://172.30.13.94:9696/v2.0/ports?network_id=586884b2-4363-4597-acb0-ddbc49908b65 1.676s 2020-11-06 18:01:52.945 40 DEBUG tempest.lib.common.rest_client [req-1ed1fa29-8384-4bb0-bd63-f59d4adabdcb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '7813', 'x-openstack-request-id': 'req-1ed1fa29-8384-4bb0-bd63-f59d4adabdcb', 'date': 'Fri, 06 Nov 2020 18:01:52 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports?network_id=586884b2-4363-4597-acb0-ddbc49908b65'} Body: b'{"ports":[{"id":"2f8ba6cd-b1ff-4dcf-8706-3a80a4ddfb28","name":"tempest-PortsRbacTest-982544266","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:c3:8f:b0","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.10"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"rbac_test_host","binding:vif_type":"binding_failed","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.10","hostname":"host-192-168-120-10","fqdn":"host-192-168-120-10.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:01:47Z","updated_at":"2020-11-06T18:01:48Z","revision_number":2,"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f"},{"id":"681475a9-b4b1-4301-b8f4-1c15dc1ffff3","name":"tempest-PortsRbacTest-1937642841","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:d6:3a:6d","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.185"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"description":"","binding:vnic_type":"normal","binding:profile":{"foo":"1"},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.185","hostname":"host-192-168-120-185","fqdn":"host-192-168-120-185.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:01:49Z","updated_at":"2020-11-06T18:01:49Z","revision_number":1,"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f"},{"id":"6b4d62dd-e4bd-487b-945d-e2074c50baf6","name":"tempest-PortsRbacTest-72359599","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:bd:67:7c","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.8"}],"allowed_address_pairs":[{"mac_address":"fa:16:3e:8a:69:9e","ip_address":"192.168.120.243"}],"extra_dhcp_opts":[],"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.8","hostname":"host-192-168-120-8","fqdn":"host-192-168-120-8.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:01:46Z","updated_at":"2020-11-06T18:01:46Z","revision_number":1,"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f"},{"id":"85158d53-ba10-4064-baee-9a50b1e54d69","name":"","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:ba:d4:7b","admin_state_up":true,"status":"ACTIVE","device_id":"dhcpcf0aa1ad-fc1e-58c4-863b-aba14f17f098-586884b2-4363-4597-acb0-ddbc49908b65","device_owner":"network:dhcp","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.2"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":[],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"lf-virtual9","binding:vif_type":"ovs","binding:vif_details":{"connectivity":"l2","port_filter":true,"ovs_hybrid_plug":false,"datapath_type":" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:53.017 40 INFO tempest.lib.common.rest_client [req-3cc51045-0636-44f0-9f8b-4ee44d1dec27 ] Request (PortsRbacTest:test_create_port_fixed_ips_ip_address): 200 GET http://172.30.13.94:9696/v2.0/subnets/6dab2f10-428e-4a16-a2a0-bc153f1d8c9c 0.071s 2020-11-06 18:01:53.018 40 DEBUG tempest.lib.common.rest_client [req-3cc51045-0636-44f0-9f8b-4ee44d1dec27 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '662', 'x-openstack-request-id': 'req-3cc51045-0636-44f0-9f8b-4ee44d1dec27', 'date': 'Fri, 06 Nov 2020 18:01:53 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/6dab2f10-428e-4a16-a2a0-bc153f1d8c9c'} Body: b'{"subnet":{"id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","name":"","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/24","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.254"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-11-06T18:01:42Z","updated_at":"2020-11-06T18:01:42Z","revision_number":0,"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:53.033 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:53.083 38 INFO tempest.lib.common.rest_client [req-6f0dd818-eb03-47a0-9ac9-70e697834332 ] Request (NamespaceTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.191s 2020-11-06 18:01:53.083 38 DEBUG tempest.lib.common.rest_client [req-6f0dd818-eb03-47a0-9ac9-70e697834332 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6f0dd818-eb03-47a0-9ac9-70e697834332', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "da6a58e445874217add8b6e759a4026c", "name": "tempest-NamespaceTagsRbacTest-909104330", "password_expires_at": null}, "audit_ids": ["-zvJuUQUSa617HJC4_MijQ"], "expires_at": "2020-11-06T19:01:52.000000Z", "issued_at": "2020-11-06T18:01:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "78e5eaff937b447586c90ea68c13cbcf", "name": "tempest-NamespaceTagsRbacTest-909104330"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:53.215 38 INFO tempest.lib.common.rest_client [req-5db63b56-64a4-4464-a154-3fb3d30e3f8e ] Request (NamespaceTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces 0.130s 2020-11-06 18:01:53.215 38 DEBUG tempest.lib.common.rest_client [req-5db63b56-64a4-4464-a154-3fb3d30e3f8e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"namespace": "tempest-NamespaceTagsRbacTest-namespace-256285733"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '361', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-256285733', 'x-openstack-request-id': 'req-5db63b56-64a4-4464-a154-3fb3d30e3f8e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces'} Body: b'{"namespace": "tempest-NamespaceTagsRbacTest-namespace-256285733", "visibility": "private", "protected": false, "owner": "78e5eaff937b447586c90ea68c13cbcf", "created_at": "2020-11-06T18:01:53Z", "updated_at": "2020-11-06T18:01:53Z", "self": "/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-256285733", "schema": "/v2/schemas/metadefs/namespace"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:53.217 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:53.218 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:53.219 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: add_metadef_tag, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:53.220 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:53.244 40 INFO tempest.lib.common.rest_client [req-9e4a861a-2ed3-4ea6-9e5a-a36116995a9e ] Request (PortsRbacTest:test_create_port_fixed_ips_ip_address): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.210s 2020-11-06 18:01:53.245 40 DEBUG tempest.lib.common.rest_client [req-9e4a861a-2ed3-4ea6-9e5a-a36116995a9e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9e4a861a-2ed3-4ea6-9e5a-a36116995a9e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:53.272 38 INFO tempest.lib.common.rest_client [req-176b212d-5a6b-4085-81ce-54ebb8b7fc09 ] Request (NamespaceTagsRbacTest:test_create_namespace_tag): 200 GET http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles 0.051s 2020-11-06 18:01:53.273 38 DEBUG tempest.lib.common.rest_client [req-176b212d-5a6b-4085-81ce-54ebb8b7fc09 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-176b212d-5a6b-4085-81ce-54ebb8b7fc09', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:53.311 38 INFO tempest.lib.common.rest_client [req-2e0496b8-b0b2-484b-a532-79c43b0333d5 ] Request (NamespaceTagsRbacTest:test_create_namespace_tag): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:01:53.312 38 DEBUG tempest.lib.common.rest_client [req-2e0496b8-b0b2-484b-a532-79c43b0333d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2e0496b8-b0b2-484b-a532-79c43b0333d5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "da6a58e445874217add8b6e759a4026c", "name": "tempest-NamespaceTagsRbacTest-909104330", "password_expires_at": null}, "audit_ids": ["_QQmSH_MRTWRBEdZrldc8g"], "expires_at": "2020-11-06T19:01:53.000000Z", "issued_at": "2020-11-06T18:01:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "78e5eaff937b447586c90ea68c13cbcf", "name": "tempest-NamespaceTagsRbacTest-909104330"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:53.335 40 INFO tempest.lib.common.rest_client [req-f43baaeb-41fd-40e0-ad13-fece6190cdae ] Request (PortsRbacTest:test_create_port_fixed_ips_ip_address): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 18:01:53.335 40 DEBUG tempest.lib.common.rest_client [req-f43baaeb-41fd-40e0-ad13-fece6190cdae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f43baaeb-41fd-40e0-ad13-fece6190cdae', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["GK3NzxYISY-d7f90KYDqog"], "expires_at": "2020-11-06T19:01:53.000000Z", "issued_at": "2020-11-06T18:01:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:53.406 38 INFO tempest.lib.common.rest_client [req-5512f225-5eb2-4a96-978a-b20340d6d23e ] Request (NamespaceTagsRbacTest:test_create_namespace_tag): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-256285733/tags/tempest-NamespaceTagsRbacTest-tag-404424915 0.092s 2020-11-06 18:01:53.406 38 DEBUG tempest.lib.common.rest_client [req-5512f225-5eb2-4a96-978a-b20340d6d23e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '131', 'content-type': 'application/json', 'x-openstack-request-id': 'req-5512f225-5eb2-4a96-978a-b20340d6d23e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-256285733/tags/tempest-NamespaceTagsRbacTest-tag-404424915'} Body: b'{"name": "tempest-NamespaceTagsRbacTest-tag-404424915", "created_at": "2020-11-06T18:01:53Z", "updated_at": "2020-11-06T18:01:53Z"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:53.407 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:53.462 38 INFO tempest.lib.common.rest_client [req-881943b8-7085-4ae6-ac8d-cb16df3ff2dd ] Request (NamespaceTagsRbacTest:test_create_namespace_tag): 200 GET http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles 0.054s 2020-11-06 18:01:53.462 38 DEBUG tempest.lib.common.rest_client [req-881943b8-7085-4ae6-ac8d-cb16df3ff2dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-881943b8-7085-4ae6-ac8d-cb16df3ff2dd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:53.469 37 INFO tempest.lib.common.rest_client [req-438bc7bc-86d9-4df8-ba82-955fce375b70 ] Request (ComputeServersRbacTest:test_delete_server): 202 POST http://172.30.13.94/compute/v2.1/servers 2.045s 2020-11-06 18:01:53.470 37 DEBUG tempest.lib.common.rest_client [req-438bc7bc-86d9-4df8-ba82-955fce375b70 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-ComputeServersRbacTest-server-354678351", "imageRef": "56b368f6-9136-40ec-a04c-564d02c95e42", "flavorRef": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "networks": [{"uuid": "4c841a1c-655b-4758-ac88-8f8b657eda1b"}]}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-438bc7bc-86d9-4df8-ba82-955fce375b70', 'x-compute-request-id': 'req-438bc7bc-86d9-4df8-ba82-955fce375b70', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "9657d9f5-7280-4ea5-999f-f296dffe42c9", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "DaYwe58NBnHf"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:53.500 38 INFO tempest.lib.common.rest_client [req-1e4bc5c7-c4de-4fb3-9c7e-e0d11c018106 ] Request (NamespaceTagsRbacTest:test_create_namespace_tag): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:01:53.501 38 DEBUG tempest.lib.common.rest_client [req-1e4bc5c7-c4de-4fb3-9c7e-e0d11c018106 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1e4bc5c7-c4de-4fb3-9c7e-e0d11c018106', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "da6a58e445874217add8b6e759a4026c", "name": "tempest-NamespaceTagsRbacTest-909104330", "password_expires_at": null}, "audit_ids": ["H1v1u_nsQpKiuIbtnIwqHw"], "expires_at": "2020-11-06T19:01:53.000000Z", "issued_at": "2020-11-06T18:01:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "78e5eaff937b447586c90ea68c13cbcf", "name": "tempest-NamespaceTagsRbacTest-909104330"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:53.577 37 INFO tempest.lib.common.rest_client [req-915406e9-11a3-4f3a-b55b-18b8e1a3a713 ] Request (ComputeServersRbacTest:test_delete_server): 200 GET http://172.30.13.94/compute/v2.1/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9 0.104s 2020-11-06 18:01:53.578 37 DEBUG tempest.lib.common.rest_client [req-915406e9-11a3-4f3a-b55b-18b8e1a3a713 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1397', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-915406e9-11a3-4f3a-b55b-18b8e1a3a713', 'x-compute-request-id': 'req-915406e9-11a3-4f3a-b55b-18b8e1a3a713', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9'} Body: b'{"server": {"id": "9657d9f5-7280-4ea5-999f-f296dffe42c9", "name": "tempest-ComputeServersRbacTest-server-354678351", "status": "BUILD", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "user_id": "262f98552a3a4d8a8fba3f96d5a872bf", "metadata": {}, "hostId": "", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:01:53Z", "updated": "2020-11-06T18:01:53Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:53.619 38 INFO tempest.lib.common.rest_client [req-d2b5b33f-d47a-4af8-8130-385b3d8761bf ] Request (NamespaceTagsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-256285733/tags 0.116s 2020-11-06 18:01:53.620 38 DEBUG tempest.lib.common.rest_client [req-d2b5b33f-d47a-4af8-8130-385b3d8761bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-d2b5b33f-d47a-4af8-8130-385b3d8761bf', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-256285733/tags'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:53.622 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:53.623 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:53.625 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: add_metadef_tags, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:53.625 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:53.685 38 INFO tempest.lib.common.rest_client [req-1d391116-5ea5-4da7-9600-e1efc5d61e1a ] Request (NamespaceTagsRbacTest:test_create_namespace_tags): 200 GET http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles 0.059s 2020-11-06 18:01:53.686 38 DEBUG tempest.lib.common.rest_client [req-1d391116-5ea5-4da7-9600-e1efc5d61e1a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1d391116-5ea5-4da7-9600-e1efc5d61e1a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:53.718 38 INFO tempest.lib.common.rest_client [req-9d358b0c-bdc7-48a3-9108-7e88493a391d ] Request (NamespaceTagsRbacTest:test_create_namespace_tags): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:01:53.718 38 DEBUG tempest.lib.common.rest_client [req-9d358b0c-bdc7-48a3-9108-7e88493a391d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9d358b0c-bdc7-48a3-9108-7e88493a391d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "da6a58e445874217add8b6e759a4026c", "name": "tempest-NamespaceTagsRbacTest-909104330", "password_expires_at": null}, "audit_ids": ["KKaWtmaSThWRnb5kM1-dlg"], "expires_at": "2020-11-06T19:01:53.000000Z", "issued_at": "2020-11-06T18:01:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "78e5eaff937b447586c90ea68c13cbcf", "name": "tempest-NamespaceTagsRbacTest-909104330"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:53.813 38 INFO tempest.lib.common.rest_client [req-e987a5f7-d29d-4db2-8012-bddc9efa87b9 ] Request (NamespaceTagsRbacTest:test_create_namespace_tags): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-256285733/tags 0.093s 2020-11-06 18:01:53.814 38 DEBUG tempest.lib.common.rest_client [req-e987a5f7-d29d-4db2-8012-bddc9efa87b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"tags": [{"name": "tempest-NamespaceTagsRbacTest-tag-1999241283"}, {"name": "tempest-NamespaceTagsRbacTest-tag-1375972493"}]} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '126', 'content-type': 'application/json', 'x-openstack-request-id': 'req-e987a5f7-d29d-4db2-8012-bddc9efa87b9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-256285733/tags'} Body: b'{"tags": [{"name": "tempest-NamespaceTagsRbacTest-tag-1999241283"}, {"name": "tempest-NamespaceTagsRbacTest-tag-1375972493"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:53.814 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:53.863 38 INFO tempest.lib.common.rest_client [req-7d75b650-9a4d-4426-ae8f-369128fcc234 ] Request (NamespaceTagsRbacTest:test_create_namespace_tags): 200 GET http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles 0.048s 2020-11-06 18:01:53.864 38 DEBUG tempest.lib.common.rest_client [req-7d75b650-9a4d-4426-ae8f-369128fcc234 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7d75b650-9a4d-4426-ae8f-369128fcc234', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:53.901 38 INFO tempest.lib.common.rest_client [req-51ec0900-9850-4f22-b1a9-bab31fa4ce4c ] Request (NamespaceTagsRbacTest:test_create_namespace_tags): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:01:53.902 38 DEBUG tempest.lib.common.rest_client [req-51ec0900-9850-4f22-b1a9-bab31fa4ce4c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-51ec0900-9850-4f22-b1a9-bab31fa4ce4c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "da6a58e445874217add8b6e759a4026c", "name": "tempest-NamespaceTagsRbacTest-909104330", "password_expires_at": null}, "audit_ids": ["Fgs27OLgSFW0URzuKchhYA"], "expires_at": "2020-11-06T19:01:53.000000Z", "issued_at": "2020-11-06T18:01:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "78e5eaff937b447586c90ea68c13cbcf", "name": "tempest-NamespaceTagsRbacTest-909104330"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:54.031 38 INFO tempest.lib.common.rest_client [req-c1549be1-34ae-4ae1-8542-aa078258103a ] Request (NamespaceTagsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-256285733/tags 0.128s 2020-11-06 18:01:54.032 38 DEBUG tempest.lib.common.rest_client [req-c1549be1-34ae-4ae1-8542-aa078258103a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-c1549be1-34ae-4ae1-8542-aa078258103a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-256285733/tags'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:54.032 39 INFO tempest.lib.common.rest_client [req-ca0b89b4-ca0b-40e5-ac78-e56f98f87f54 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.366s 2020-11-06 18:01:54.033 39 DEBUG tempest.lib.common.rest_client [req-ca0b89b4-ca0b-40e5-ac78-e56f98f87f54 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ca0b89b4-ca0b-40e5-ac78-e56f98f87f54', 'x-compute-request-id': 'req-ca0b89b4-ca0b-40e5-ac78-e56f98f87f54', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:54.034 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:54.035 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:54.037 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_metadef_tags, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:54.037 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:54.087 38 INFO tempest.lib.common.rest_client [req-8a7ebf62-8c24-45a8-8868-0d9554c2b199 ] Request (NamespaceTagsRbacTest:test_list_namespace_tags): 200 GET http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles 0.049s 2020-11-06 18:01:54.087 38 DEBUG tempest.lib.common.rest_client [req-8a7ebf62-8c24-45a8-8868-0d9554c2b199 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8a7ebf62-8c24-45a8-8868-0d9554c2b199', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:54.120 38 INFO tempest.lib.common.rest_client [req-d3d040d9-0259-4db7-bd98-c0420c589c0a ] Request (NamespaceTagsRbacTest:test_list_namespace_tags): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:01:54.121 38 DEBUG tempest.lib.common.rest_client [req-d3d040d9-0259-4db7-bd98-c0420c589c0a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d3d040d9-0259-4db7-bd98-c0420c589c0a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "da6a58e445874217add8b6e759a4026c", "name": "tempest-NamespaceTagsRbacTest-909104330", "password_expires_at": null}, "audit_ids": ["5Nha_u1UQzqPuGm05e3Hvw"], "expires_at": "2020-11-06T19:01:54.000000Z", "issued_at": "2020-11-06T18:01:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "78e5eaff937b447586c90ea68c13cbcf", "name": "tempest-NamespaceTagsRbacTest-909104330"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:54.209 38 INFO tempest.lib.common.rest_client [req-e9190af4-460b-4488-892c-d022cb4d46ec ] Request (NamespaceTagsRbacTest:test_list_namespace_tags): 200 GET http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-256285733/tags 0.086s 2020-11-06 18:01:54.210 38 DEBUG tempest.lib.common.rest_client [req-e9190af4-460b-4488-892c-d022cb4d46ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '12', 'content-type': 'application/json', 'x-openstack-request-id': 'req-e9190af4-460b-4488-892c-d022cb4d46ec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-256285733/tags'} Body: b'{"tags": []}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:54.210 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:54.255 40 INFO tempest.lib.common.rest_client [req-d16827ef-1deb-4125-844e-a0ed70262a2a ] Request (PortsRbacTest:test_create_port_fixed_ips_ip_address): 201 POST http://172.30.13.94:9696/v2.0/ports 0.918s 2020-11-06 18:01:54.255 40 DEBUG tempest.lib.common.rest_client [req-d16827ef-1deb-4125-844e-a0ed70262a2a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "586884b2-4363-4597-acb0-ddbc49908b65", "fixed_ips": [{"ip_address": "192.168.120.254"}, {"subnet_id": "6dab2f10-428e-4a16-a2a0-bc153f1d8c9c"}], "name": "tempest-PortsRbacTest-1203195263"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1293', 'x-openstack-request-id': 'req-d16827ef-1deb-4125-844e-a0ed70262a2a', 'date': 'Fri, 06 Nov 2020 18:01:54 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"a36b21eb-8c95-4f67-af2a-daff19a10de7","name":"tempest-PortsRbacTest-1203195263","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:c4:35:29","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.24"},{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.254"}],"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","port_security_enabled":true,"qos_policy_id":null,"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"allowed_address_pairs":[],"extra_dhcp_opts":[],"description":"","qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.24","hostname":"host-192-168-120-24","fqdn":"host-192-168-120-24.openstackgate.local."},{"ip_address":"192.168.120.254","hostname":"host-192-168-120-254","fqdn":"host-192-168-120-254.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:01:53Z","updated_at":"2020-11-06T18:01:53Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:54.256 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:54.259 38 INFO tempest.lib.common.rest_client [req-b7045b8d-4a89-4dae-8493-9b56ad4d0a93 ] Request (NamespaceTagsRbacTest:test_list_namespace_tags): 200 GET http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles 0.047s 2020-11-06 18:01:54.259 38 DEBUG tempest.lib.common.rest_client [req-b7045b8d-4a89-4dae-8493-9b56ad4d0a93 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b7045b8d-4a89-4dae-8493-9b56ad4d0a93', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:54.292 38 INFO tempest.lib.common.rest_client [req-7d31a259-7a26-4f1e-865c-46617209ca43 ] Request (NamespaceTagsRbacTest:test_list_namespace_tags): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:01:54.293 38 DEBUG tempest.lib.common.rest_client [req-7d31a259-7a26-4f1e-865c-46617209ca43 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7d31a259-7a26-4f1e-865c-46617209ca43', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "da6a58e445874217add8b6e759a4026c", "name": "tempest-NamespaceTagsRbacTest-909104330", "password_expires_at": null}, "audit_ids": ["AzO2hBmLQIKR6Kw79m2pCA"], "expires_at": "2020-11-06T19:01:54.000000Z", "issued_at": "2020-11-06T18:01:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "78e5eaff937b447586c90ea68c13cbcf", "name": "tempest-NamespaceTagsRbacTest-909104330"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:54.295 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:54.296 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:54.298 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_metadef_tag, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:54.305 40 INFO tempest.lib.common.rest_client [req-7ae1bccc-9a68-4a47-8e75-c73e44708c92 ] Request (PortsRbacTest:test_create_port_fixed_ips_ip_address): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.048s 2020-11-06 18:01:54.305 40 DEBUG tempest.lib.common.rest_client [req-7ae1bccc-9a68-4a47-8e75-c73e44708c92 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7ae1bccc-9a68-4a47-8e75-c73e44708c92', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:54.343 40 INFO tempest.lib.common.rest_client [req-0cf728fc-e250-436d-825a-2b5adf511afa ] Request (PortsRbacTest:test_create_port_fixed_ips_ip_address): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:01:54.344 40 DEBUG tempest.lib.common.rest_client [req-0cf728fc-e250-436d-825a-2b5adf511afa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0cf728fc-e250-436d-825a-2b5adf511afa', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["Js7NMxJEQ9qWHr6r8wqyuA"], "expires_at": "2020-11-06T19:01:54.000000Z", "issued_at": "2020-11-06T18:01:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:54.346 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:54.350 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_port, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:54.351 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:54.355 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_port:mac_address, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:54.355 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:54.383 38 INFO tempest.lib.common.rest_client [req-7983b40f-9c19-4445-a7c8-ede7c955aac3 ] Request (NamespaceTagsRbacTest:test_show_namespace_tag): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-256285733/tags/tempest-NamespaceTagsRbacTest-tag-1778728076 0.084s 2020-11-06 18:01:54.384 38 DEBUG tempest.lib.common.rest_client [req-7983b40f-9c19-4445-a7c8-ede7c955aac3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '132', 'content-type': 'application/json', 'x-openstack-request-id': 'req-7983b40f-9c19-4445-a7c8-ede7c955aac3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-256285733/tags/tempest-NamespaceTagsRbacTest-tag-1778728076'} Body: b'{"name": "tempest-NamespaceTagsRbacTest-tag-1778728076", "created_at": "2020-11-06T18:01:54Z", "updated_at": "2020-11-06T18:01:54Z"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:54.384 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:54.406 40 INFO tempest.lib.common.rest_client [req-9be8f7b4-39fb-451f-8e4a-3e3c449d50d5 ] Request (PortsRbacTest:test_create_port_mac_address): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.049s 2020-11-06 18:01:54.407 40 DEBUG tempest.lib.common.rest_client [req-9be8f7b4-39fb-451f-8e4a-3e3c449d50d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9be8f7b4-39fb-451f-8e4a-3e3c449d50d5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:54.430 38 INFO tempest.lib.common.rest_client [req-efd5a219-0988-4439-9f8a-9e703945e9e7 ] Request (NamespaceTagsRbacTest:test_show_namespace_tag): 200 GET http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles 0.044s 2020-11-06 18:01:54.430 38 DEBUG tempest.lib.common.rest_client [req-efd5a219-0988-4439-9f8a-9e703945e9e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-efd5a219-0988-4439-9f8a-9e703945e9e7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:54.443 40 INFO tempest.lib.common.rest_client [req-45ea3704-0af8-4e2f-ae4d-11782b5fa342 ] Request (PortsRbacTest:test_create_port_mac_address): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:01:54.444 40 DEBUG tempest.lib.common.rest_client [req-45ea3704-0af8-4e2f-ae4d-11782b5fa342 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-45ea3704-0af8-4e2f-ae4d-11782b5fa342', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["QU1aTYImR3yyovzKnuoZyQ"], "expires_at": "2020-11-06T19:01:54.000000Z", "issued_at": "2020-11-06T18:01:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:54.469 38 INFO tempest.lib.common.rest_client [req-155f1ecd-53e8-46e7-a934-3989a4fbe20a ] Request (NamespaceTagsRbacTest:test_show_namespace_tag): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:01:54.469 38 DEBUG tempest.lib.common.rest_client [req-155f1ecd-53e8-46e7-a934-3989a4fbe20a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-155f1ecd-53e8-46e7-a934-3989a4fbe20a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "da6a58e445874217add8b6e759a4026c", "name": "tempest-NamespaceTagsRbacTest-909104330", "password_expires_at": null}, "audit_ids": ["Y5-JU6_0QoCYI9-ARpGMsQ"], "expires_at": "2020-11-06T19:01:54.000000Z", "issued_at": "2020-11-06T18:01:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "78e5eaff937b447586c90ea68c13cbcf", "name": "tempest-NamespaceTagsRbacTest-909104330"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:54.545 38 INFO tempest.lib.common.rest_client [req-9d5a0762-ad26-4c3c-8af6-ec8987775967 ] Request (NamespaceTagsRbacTest:test_show_namespace_tag): 200 GET http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-256285733/tags/tempest-NamespaceTagsRbacTest-tag-1778728076 0.074s 2020-11-06 18:01:54.545 38 DEBUG tempest.lib.common.rest_client [req-9d5a0762-ad26-4c3c-8af6-ec8987775967 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '132', 'content-type': 'application/json', 'x-openstack-request-id': 'req-9d5a0762-ad26-4c3c-8af6-ec8987775967', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-256285733/tags/tempest-NamespaceTagsRbacTest-tag-1778728076'} Body: b'{"name": "tempest-NamespaceTagsRbacTest-tag-1778728076", "created_at": "2020-11-06T18:01:54Z", "updated_at": "2020-11-06T18:01:54Z"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:54.546 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:54.597 38 INFO tempest.lib.common.rest_client [req-186ab73b-2d04-4fec-9b50-5ef573526c8b ] Request (NamespaceTagsRbacTest:test_show_namespace_tag): 200 GET http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles 0.050s 2020-11-06 18:01:54.598 38 DEBUG tempest.lib.common.rest_client [req-186ab73b-2d04-4fec-9b50-5ef573526c8b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-186ab73b-2d04-4fec-9b50-5ef573526c8b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:54.634 38 INFO tempest.lib.common.rest_client [req-50076ef4-3d87-4c06-931e-ab90ad37f232 ] Request (NamespaceTagsRbacTest:test_show_namespace_tag): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:01:54.635 38 DEBUG tempest.lib.common.rest_client [req-50076ef4-3d87-4c06-931e-ab90ad37f232 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-50076ef4-3d87-4c06-931e-ab90ad37f232', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "da6a58e445874217add8b6e759a4026c", "name": "tempest-NamespaceTagsRbacTest-909104330", "password_expires_at": null}, "audit_ids": ["y8qjy7AOQPSceaH2gjmuJA"], "expires_at": "2020-11-06T19:01:54.000000Z", "issued_at": "2020-11-06T18:01:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "78e5eaff937b447586c90ea68c13cbcf", "name": "tempest-NamespaceTagsRbacTest-909104330"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:54.730 38 INFO tempest.lib.common.rest_client [req-0ab9885d-a4e7-4dc3-89ba-ea6d9837417d ] Request (NamespaceTagsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-256285733/tags 0.093s 2020-11-06 18:01:54.730 38 DEBUG tempest.lib.common.rest_client [req-0ab9885d-a4e7-4dc3-89ba-ea6d9837417d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-0ab9885d-a4e7-4dc3-89ba-ea6d9837417d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-256285733/tags'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:54.733 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:54.733 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:54.735 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: modify_metadef_tag, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:54.760 38 INFO tempest.lib.common.rest_client [req-6ea8497a-cfe0-4fe8-8ee8-194b655657c2 ] Request (NamespaceTagsRbacTest:test_update_namespace_tag): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-256285733/tags/tempest-NamespaceTagsRbacTest-tag-1729639251 0.024s 2020-11-06 18:01:54.761 38 DEBUG tempest.lib.common.rest_client [req-6ea8497a-cfe0-4fe8-8ee8-194b655657c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '132', 'content-type': 'application/json', 'x-openstack-request-id': 'req-6ea8497a-cfe0-4fe8-8ee8-194b655657c2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-256285733/tags/tempest-NamespaceTagsRbacTest-tag-1729639251'} Body: b'{"name": "tempest-NamespaceTagsRbacTest-tag-1729639251", "created_at": "2020-11-06T18:01:54Z", "updated_at": "2020-11-06T18:01:54Z"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:54.761 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:54.765 37 INFO tempest.lib.common.rest_client [req-10885fb8-ea05-452f-8e1f-7e73b5be448b ] Request (ComputeServersRbacTest:test_delete_server): 200 GET http://172.30.13.94/compute/v2.1/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9 0.171s 2020-11-06 18:01:54.766 37 DEBUG tempest.lib.common.rest_client [req-10885fb8-ea05-452f-8e1f-7e73b5be448b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1492', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-10885fb8-ea05-452f-8e1f-7e73b5be448b', 'x-compute-request-id': 'req-10885fb8-ea05-452f-8e1f-7e73b5be448b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9'} Body: b'{"server": {"id": "9657d9f5-7280-4ea5-999f-f296dffe42c9", "name": "tempest-ComputeServersRbacTest-server-354678351", "status": "BUILD", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "user_id": "262f98552a3a4d8a8fba3f96d5a872bf", "metadata": {}, "hostId": "72aa4147e128daa70511a3b03038cad49752a08b0327f6bc0c6decc0", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:01:53Z", "updated": "2020-11-06T18:01:55Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033d1", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "networking", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:54.778 37 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/networking" after 1 second wait 2020-11-06 18:01:54.823 38 INFO tempest.lib.common.rest_client [req-264604b7-9696-42a8-af1a-a36b715d534a ] Request (NamespaceTagsRbacTest:test_update_namespace_tag): 200 GET http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles 0.061s 2020-11-06 18:01:54.824 38 DEBUG tempest.lib.common.rest_client [req-264604b7-9696-42a8-af1a-a36b715d534a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-264604b7-9696-42a8-af1a-a36b715d534a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:54.865 38 INFO tempest.lib.common.rest_client [req-bd6dff62-409f-49be-b729-d686016abffb ] Request (NamespaceTagsRbacTest:test_update_namespace_tag): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:01:54.865 38 DEBUG tempest.lib.common.rest_client [req-bd6dff62-409f-49be-b729-d686016abffb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bd6dff62-409f-49be-b729-d686016abffb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "da6a58e445874217add8b6e759a4026c", "name": "tempest-NamespaceTagsRbacTest-909104330", "password_expires_at": null}, "audit_ids": ["O1rVIkvdQIGQdM8TMClfwg"], "expires_at": "2020-11-06T19:01:54.000000Z", "issued_at": "2020-11-06T18:01:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "78e5eaff937b447586c90ea68c13cbcf", "name": "tempest-NamespaceTagsRbacTest-909104330"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:54.973 38 INFO tempest.lib.common.rest_client [req-65e8d3f5-56f0-4dcf-9fd5-791792babbc0 ] Request (NamespaceTagsRbacTest:test_update_namespace_tag): 200 PUT http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-256285733/tags/tempest-NamespaceTagsRbacTest-tag-1729639251 0.106s 2020-11-06 18:01:54.974 38 DEBUG tempest.lib.common.rest_client [req-65e8d3f5-56f0-4dcf-9fd5-791792babbc0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-NamespaceTagsRbacTest-tag-201515316"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '131', 'content-type': 'application/json', 'x-openstack-request-id': 'req-65e8d3f5-56f0-4dcf-9fd5-791792babbc0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-256285733/tags/tempest-NamespaceTagsRbacTest-tag-1729639251'} Body: b'{"name": "tempest-NamespaceTagsRbacTest-tag-201515316", "created_at": "2020-11-06T18:01:55Z", "updated_at": "2020-11-06T18:01:55Z"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:54.975 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:55.023 38 INFO tempest.lib.common.rest_client [req-673477bd-1403-43f8-be87-25323d6a7c2f ] Request (NamespaceTagsRbacTest:test_update_namespace_tag): 200 GET http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles 0.047s 2020-11-06 18:01:55.023 38 DEBUG tempest.lib.common.rest_client [req-673477bd-1403-43f8-be87-25323d6a7c2f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-673477bd-1403-43f8-be87-25323d6a7c2f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf/users/da6a58e445874217add8b6e759a4026c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:55.057 38 INFO tempest.lib.common.rest_client [req-0bde22f5-b613-4ac7-bafa-c48dddb8617c ] Request (NamespaceTagsRbacTest:test_update_namespace_tag): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:01:55.058 38 DEBUG tempest.lib.common.rest_client [req-0bde22f5-b613-4ac7-bafa-c48dddb8617c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0bde22f5-b613-4ac7-bafa-c48dddb8617c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "da6a58e445874217add8b6e759a4026c", "name": "tempest-NamespaceTagsRbacTest-909104330", "password_expires_at": null}, "audit_ids": ["pEe7R1AlQSi3WpCu_MTjgw"], "expires_at": "2020-11-06T19:01:55.000000Z", "issued_at": "2020-11-06T18:01:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "78e5eaff937b447586c90ea68c13cbcf", "name": "tempest-NamespaceTagsRbacTest-909104330"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78e5eaff937b447586c90ea68c13cbcf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:55.149 38 INFO tempest.lib.common.rest_client [req-b0c14318-2d15-497a-9e25-1dda8350c04a ] Request (NamespaceTagsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-256285733/tags 0.089s 2020-11-06 18:01:55.150 38 DEBUG tempest.lib.common.rest_client [req-b0c14318-2d15-497a-9e25-1dda8350c04a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-b0c14318-2d15-497a-9e25-1dda8350c04a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-256285733/tags'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:55.184 38 INFO tempest.lib.common.rest_client [req-cf6af291-dee6-494e-bb65-9489c51b66b8 ] Request (NamespaceTagsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-256285733 0.031s 2020-11-06 18:01:55.184 38 DEBUG tempest.lib.common.rest_client [req-cf6af291-dee6-494e-bb65-9489c51b66b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-cf6af291-dee6-494e-bb65-9489c51b66b8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-256285733'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:55.302 38 INFO tempest.lib.common.rest_client [req-28a9fbd3-b75c-4b69-a738-1b95a0a40eca ] Request (NamespaceTagsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/da6a58e445874217add8b6e759a4026c 0.117s 2020-11-06 18:01:55.303 38 DEBUG tempest.lib.common.rest_client [req-28a9fbd3-b75c-4b69-a738-1b95a0a40eca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-28a9fbd3-b75c-4b69-a738-1b95a0a40eca', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/da6a58e445874217add8b6e759a4026c'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:55.333 39 INFO tempest.lib.common.rest_client [req-78d07291-bd96-414a-9977-f8b1828afe59 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.287s 2020-11-06 18:01:55.334 39 DEBUG tempest.lib.common.rest_client [req-78d07291-bd96-414a-9977-f8b1828afe59 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-78d07291-bd96-414a-9977-f8b1828afe59', 'x-compute-request-id': 'req-78d07291-bd96-414a-9977-f8b1828afe59', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:55.386 38 INFO tempest.lib.common.rest_client [req-1fe0dbae-e989-4d19-8567-d46313a72c0b ] Request (NamespaceTagsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 18:01:55.386 38 DEBUG tempest.lib.common.rest_client [req-1fe0dbae-e989-4d19-8567-d46313a72c0b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1fe0dbae-e989-4d19-8567-d46313a72c0b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["_BUzYVObTK-pknlnSwaKpA"], "expires_at": "2020-11-06T19:01:55.000000Z", "issued_at": "2020-11-06T18:01:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:55.657 38 INFO tempest.lib.common.rest_client [req-3c1c51c7-c845-4f4e-8f3c-ea7a4bb87bd6 ] Request (NamespaceTagsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=78e5eaff937b447586c90ea68c13cbcf&name=default 0.270s 2020-11-06 18:01:55.658 38 DEBUG tempest.lib.common.rest_client [req-3c1c51c7-c845-4f4e-8f3c-ea7a4bb87bd6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-3c1c51c7-c845-4f4e-8f3c-ea7a4bb87bd6', 'date': 'Fri, 06 Nov 2020 18:01:55 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=78e5eaff937b447586c90ea68c13cbcf&name=default'} Body: b'{"security_groups": [{"id": "7d37a93a-37fe-4f66-89e8-eb543d967546", "name": "default", "stateful": true, "tenant_id": "78e5eaff937b447586c90ea68c13cbcf", "description": "Default security group", "security_group_rules": [{"id": "1b3d52e2-bd89-4988-90a0-443282164e6a", "tenant_id": "78e5eaff937b447586c90ea68c13cbcf", "security_group_id": "7d37a93a-37fe-4f66-89e8-eb543d967546", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:01:55Z", "updated_at": "2020-11-06T18:01:55Z", "revision_number": 0, "project_id": "78e5eaff937b447586c90ea68c13cbcf"}, {"id": "437cf77c-6088-435c-bd54-8a5212f9dfa7", "tenant_id": "78e5eaff937b447586c90ea68c13cbcf", "security_group_id": "7d37a93a-37fe-4f66-89e8-eb543d967546", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:01:55Z", "updated_at": "2020-11-06T18:01:55Z", "revision_number": 0, "project_id": "78e5eaff937b447586c90ea68c13cbcf"}, {"id": "9bd558be-fe9a-49e4-b9fc-0f7e3ecb9182", "tenant_id": "78e5eaff937b447586c90ea68c13cbcf", "security_group_id": "7d37a93a-37fe-4f66-89e8-eb543d967546", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "7d37a93a-37fe-4f66-89e8-eb543d967546", "description": null, "tags": [], "created_at": "2020-11-06T18:01:55Z", "updated_at": "2020-11-06T18:01:55Z", "revision_number": 0, "project_id": "78e5eaff937b447586c90ea68c13cbcf"}, {"id": "ee81c558-30e9-4926-bcd3-262b4675de64", "tenant_id": "78e5eaff937b447586c90ea68c13cbcf", "security_group_id": "7d37a93a-37fe-4f66-89e8-eb543d967546", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "7d37a93a-37fe-4f66-89e8-eb543d967546", "description": null, "tags": [], "created_at": "2020-11-06T18:01:55Z", "updated_at": "2020-11-06T18:01:55Z", "revision_number": 0, "project_id": "78e5eaff937b447586c90ea68c13cbcf"}], "tags": [], "created_at": "2020-11-06T18:01:55Z", "updated_at": "2020-11-06T18:01:55Z", "revision_number": 1, "project_id": "78e5eaff937b447586c90ea68c13cbcf"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:55.767 38 INFO tempest.lib.common.rest_client [req-4e34b9fe-b942-40f0-8113-ce51d9cf93ac ] Request (NamespaceTagsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/7d37a93a-37fe-4f66-89e8-eb543d967546 0.107s 2020-11-06 18:01:55.767 38 DEBUG tempest.lib.common.rest_client [req-4e34b9fe-b942-40f0-8113-ce51d9cf93ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-4e34b9fe-b942-40f0-8113-ce51d9cf93ac', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:01:55 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/7d37a93a-37fe-4f66-89e8-eb543d967546'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:55.802 40 INFO tempest.lib.common.rest_client [req-ea98f445-0c8a-405c-a311-5fbee61118c8 ] Request (PortsRbacTest:test_create_port_mac_address): 201 POST http://172.30.13.94:9696/v2.0/ports 1.357s 2020-11-06 18:01:55.803 40 DEBUG tempest.lib.common.rest_client [req-ea98f445-0c8a-405c-a311-5fbee61118c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "586884b2-4363-4597-acb0-ddbc49908b65", "mac_address": "fa:16:3e:9a:fc:75", "name": "tempest-PortsRbacTest-680531402"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1094', 'x-openstack-request-id': 'req-ea98f445-0c8a-405c-a311-5fbee61118c8', 'date': 'Fri, 06 Nov 2020 18:01:55 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"9133146d-a0cb-4e67-8e41-deb4272d7c64","name":"tempest-PortsRbacTest-680531402","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:9a:fc:75","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.160"}],"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","port_security_enabled":true,"qos_policy_id":null,"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"allowed_address_pairs":[],"extra_dhcp_opts":[],"description":"","qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.160","hostname":"host-192-168-120-160","fqdn":"host-192-168-120-160.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:01:54Z","updated_at":"2020-11-06T18:01:55Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:55.804 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:55.863 40 INFO tempest.lib.common.rest_client [req-5f59e84d-2300-4fab-a33b-190f4ca9be5c ] Request (PortsRbacTest:test_create_port_mac_address): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.058s 2020-11-06 18:01:55.864 40 DEBUG tempest.lib.common.rest_client [req-5f59e84d-2300-4fab-a33b-190f4ca9be5c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5f59e84d-2300-4fab-a33b-190f4ca9be5c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:55.903 38 INFO tempest.lib.common.rest_client [req-5c9f2653-8873-4718-b282-86e311050498 ] Request (NamespaceTagsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf 0.134s 2020-11-06 18:01:55.903 38 DEBUG tempest.lib.common.rest_client [req-5c9f2653-8873-4718-b282-86e311050498 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5c9f2653-8873-4718-b282-86e311050498', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/78e5eaff937b447586c90ea68c13cbcf'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:55.953 40 INFO tempest.lib.common.rest_client [req-52a36153-6d5a-4547-a287-f7547c085e6e ] Request (PortsRbacTest:test_create_port_mac_address): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 18:01:55.953 40 DEBUG tempest.lib.common.rest_client [req-52a36153-6d5a-4547-a287-f7547c085e6e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-52a36153-6d5a-4547-a287-f7547c085e6e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["FJxQbxMlSzu-xB0b1eLOrQ"], "expires_at": "2020-11-06T19:01:55.000000Z", "issued_at": "2020-11-06T18:01:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:55.956 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:55.960 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_port, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:55.961 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:55.965 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_port:port_security_enabled, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:55.965 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:55.988 38 INFO tempest.lib.common.rest_client [req-44ef00bb-e03a-4eff-97db-4b10b0f033cb ] Request (ImagesMemberRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-11-06 18:01:55.989 38 DEBUG tempest.lib.common.rest_client [req-44ef00bb-e03a-4eff-97db-4b10b0f033cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-44ef00bb-e03a-4eff-97db-4b10b0f033cb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["ZYmSAnsHTgSiUWG2HHeo_A"], "expires_at": "2020-11-06T19:01:55.000000Z", "issued_at": "2020-11-06T18:01:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:56.033 38 INFO tempest.lib.common.rest_client [req-4f1716af-d9d0-4904-a3aa-c77a6ba47084 ] Request (ImagesMemberRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:01:56.033 38 DEBUG tempest.lib.common.rest_client [req-4f1716af-d9d0-4904-a3aa-c77a6ba47084 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4f1716af-d9d0-4904-a3aa-c77a6ba47084', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["Utw0SZ66Sf6gE-r3e1qdQA"], "expires_at": "2020-11-06T19:01:56.000000Z", "issued_at": "2020-11-06T18:01:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:56.061 40 INFO tempest.lib.common.rest_client [req-acf4de18-6c34-4abb-931b-cca31d33e460 ] Request (PortsRbacTest:test_create_port_security_enabled): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.096s 2020-11-06 18:01:56.062 40 DEBUG tempest.lib.common.rest_client [req-acf4de18-6c34-4abb-931b-cca31d33e460 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-acf4de18-6c34-4abb-931b-cca31d33e460', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:56.080 38 INFO tempest.lib.common.rest_client [req-cb929dfa-82c7-4faa-9b96-741cddf3f7e8 ] Request (ImagesMemberRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.045s 2020-11-06 18:01:56.080 38 DEBUG tempest.lib.common.rest_client [req-cb929dfa-82c7-4faa-9b96-741cddf3f7e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cb929dfa-82c7-4faa-9b96-741cddf3f7e8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:56.094 40 INFO tempest.lib.common.rest_client [req-3adc19a8-42f4-4ce3-8e04-3a376a15d7eb ] Request (PortsRbacTest:test_create_port_security_enabled): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:01:56.094 40 DEBUG tempest.lib.common.rest_client [req-3adc19a8-42f4-4ce3-8e04-3a376a15d7eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3adc19a8-42f4-4ce3-8e04-3a376a15d7eb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["sR4vD-U1T--T2Cn6TWWXNA"], "expires_at": "2020-11-06T19:01:56.000000Z", "issued_at": "2020-11-06T18:01:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:56.148 38 INFO tempest.lib.common.rest_client [req-e05a7cf6-d0da-40ff-b9a9-563bd538bdfc ] Request (ImagesMemberRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.066s 2020-11-06 18:01:56.149 38 DEBUG tempest.lib.common.rest_client [req-e05a7cf6-d0da-40ff-b9a9-563bd538bdfc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ImagesMemberRbacTest-1618743830-desc", "domain_id": "default", "name": "tempest-ImagesMemberRbacTest-1618743830"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '378', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e05a7cf6-d0da-40ff-b9a9-563bd538bdfc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "a4cd9c52a26f49539cab00bf4c5af4e7", "name": "tempest-ImagesMemberRbacTest-1618743830", "domain_id": "default", "description": "tempest-ImagesMemberRbacTest-1618743830-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:56.278 38 INFO tempest.lib.common.rest_client [req-3674584c-c514-4a55-b4d2-705591807bc1 ] Request (ImagesMemberRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.128s 2020-11-06 18:01:56.279 38 DEBUG tempest.lib.common.rest_client [req-3674584c-c514-4a55-b4d2-705591807bc1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ImagesMemberRbacTest-1618743830", "password": "Q6&RxosHT1Kkf~l", "project_id": "a4cd9c52a26f49539cab00bf4c5af4e7", "email": "tempest-ImagesMemberRbacTest-580692382@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '395', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3674584c-c514-4a55-b4d2-705591807bc1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "a4cd9c52a26f49539cab00bf4c5af4e7", "email": "tempest-ImagesMemberRbacTest-580692382@example.com", "id": "9a2878730d184150a67894aaba8107b5", "name": "tempest-ImagesMemberRbacTest-1618743830", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/9a2878730d184150a67894aaba8107b5"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:56.335 38 INFO tempest.lib.common.rest_client [req-5cb26171-a4d3-48e4-86bf-8db2e93dd733 ] Request (ImagesMemberRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-11-06 18:01:56.336 38 DEBUG tempest.lib.common.rest_client [req-5cb26171-a4d3-48e4-86bf-8db2e93dd733 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5cb26171-a4d3-48e4-86bf-8db2e93dd733', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:56.391 38 INFO tempest.lib.common.rest_client [req-6d9b02a7-f13a-490c-9610-c73ab4714882 ] Request (ImagesMemberRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.053s 2020-11-06 18:01:56.391 38 DEBUG tempest.lib.common.rest_client [req-6d9b02a7-f13a-490c-9610-c73ab4714882 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6d9b02a7-f13a-490c-9610-c73ab4714882', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:56.466 38 INFO tempest.lib.common.rest_client [req-69397da2-8c6a-4ce0-956b-50b67a76f1b5 ] Request (ImagesMemberRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles/72a4576c553448cd941b052c1ca0cf2d 0.074s 2020-11-06 18:01:56.467 38 DEBUG tempest.lib.common.rest_client [req-69397da2-8c6a-4ce0-956b-50b67a76f1b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-69397da2-8c6a-4ce0-956b-50b67a76f1b5', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:56.467 38 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImagesMemberRbacTest-1618743830', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'a4cd9c52a26f49539cab00bf4c5af4e7', 'project_name': 'tempest-ImagesMemberRbacTest-1618743830', 'tenant_id': 'a4cd9c52a26f49539cab00bf4c5af4e7', 'tenant_name': 'tempest-ImagesMemberRbacTest-1618743830', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '9a2878730d184150a67894aaba8107b5'}, Network: None, Subnet: None, Router: None 2020-11-06 18:01:56.468 38 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImagesMemberRbacTest-1618743830', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'a4cd9c52a26f49539cab00bf4c5af4e7', 'project_name': 'tempest-ImagesMemberRbacTest-1618743830', 'tenant_id': 'a4cd9c52a26f49539cab00bf4c5af4e7', 'tenant_name': 'tempest-ImagesMemberRbacTest-1618743830', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '9a2878730d184150a67894aaba8107b5'}, Network: None, Subnet: None, Router: None 2020-11-06 18:01:56.780 38 INFO tempest.lib.common.rest_client [req-4a34df80-23ac-4bdb-8dae-14c16581d3fe ] Request (ImagesMemberRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-11-06 18:01:56.781 38 DEBUG tempest.lib.common.rest_client [req-4a34df80-23ac-4bdb-8dae-14c16581d3fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6571', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4a34df80-23ac-4bdb-8dae-14c16581d3fe', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9a2878730d184150a67894aaba8107b5", "name": "tempest-ImagesMemberRbacTest-1618743830", "password_expires_at": null}, "audit_ids": ["PxPgyi67TPGRPIJuSGcu5Q"], "expires_at": "2020-11-06T19:01:56.000000Z", "issued_at": "2020-11-06T18:01:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a4cd9c52a26f49539cab00bf4c5af4e7", "name": "tempest-ImagesMemberRbacTest-1618743830"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:56.889 38 INFO tempest.lib.common.rest_client [req-77fa16c5-4d2e-4d2d-a3b1-907c31ac0e91 ] Request (ImagesMemberRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.107s 2020-11-06 18:01:56.890 38 DEBUG tempest.lib.common.rest_client [req-77fa16c5-4d2e-4d2d-a3b1-907c31ac0e91 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ImagesMemberRbacTest-1030919757-desc", "domain_id": "default", "name": "tempest-ImagesMemberRbacTest-1030919757"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '378', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-77fa16c5-4d2e-4d2d-a3b1-907c31ac0e91', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "066fcc85b4b8416fbc84967133f75b9e", "name": "tempest-ImagesMemberRbacTest-1030919757", "domain_id": "default", "description": "tempest-ImagesMemberRbacTest-1030919757-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/066fcc85b4b8416fbc84967133f75b9e"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:56.996 38 INFO tempest.lib.common.rest_client [req-275ea7d7-59f2-4450-a005-a9b1a595d6c8 ] Request (ImagesMemberRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.106s 2020-11-06 18:01:56.997 38 DEBUG tempest.lib.common.rest_client [req-275ea7d7-59f2-4450-a005-a9b1a595d6c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ImagesMemberRbacTest-1030919757", "password": "M9+heyoo0y6@TxG", "project_id": "066fcc85b4b8416fbc84967133f75b9e", "email": "tempest-ImagesMemberRbacTest-1001093347@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '396', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-275ea7d7-59f2-4450-a005-a9b1a595d6c8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "066fcc85b4b8416fbc84967133f75b9e", "email": "tempest-ImagesMemberRbacTest-1001093347@example.com", "id": "62d2fea6b0d3405c9d63a19677898f49", "name": "tempest-ImagesMemberRbacTest-1030919757", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/62d2fea6b0d3405c9d63a19677898f49"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:57.019 40 INFO tempest.lib.common.rest_client [req-98e2e609-78ad-4106-bf4d-4eb8a7cf3508 ] Request (PortsRbacTest:test_create_port_security_enabled): 201 POST http://172.30.13.94:9696/v2.0/ports 0.924s 2020-11-06 18:01:57.020 40 DEBUG tempest.lib.common.rest_client [req-98e2e609-78ad-4106-bf4d-4eb8a7cf3508 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "586884b2-4363-4597-acb0-ddbc49908b65", "port_security_enabled": true, "name": "tempest-PortsRbacTest-279480143"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1094', 'x-openstack-request-id': 'req-98e2e609-78ad-4106-bf4d-4eb8a7cf3508', 'date': 'Fri, 06 Nov 2020 18:01:57 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"c9f58e9f-9178-4898-b197-6dfd6b810679","name":"tempest-PortsRbacTest-279480143","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:fa:04:dc","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.188"}],"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","port_security_enabled":true,"qos_policy_id":null,"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"allowed_address_pairs":[],"extra_dhcp_opts":[],"description":"","qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.188","hostname":"host-192-168-120-188","fqdn":"host-192-168-120-188.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:01:56Z","updated_at":"2020-11-06T18:01:56Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:57.020 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:57.053 38 INFO tempest.lib.common.rest_client [req-60e49f74-1bb7-47e8-8aff-f4694c70c57d ] Request (ImagesMemberRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-11-06 18:01:57.054 38 DEBUG tempest.lib.common.rest_client [req-60e49f74-1bb7-47e8-8aff-f4694c70c57d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-60e49f74-1bb7-47e8-8aff-f4694c70c57d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:57.074 40 INFO tempest.lib.common.rest_client [req-9607bdca-93d7-43a4-a67a-767471a0bab7 ] Request (PortsRbacTest:test_create_port_security_enabled): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.053s 2020-11-06 18:01:57.075 40 DEBUG tempest.lib.common.rest_client [req-9607bdca-93d7-43a4-a67a-767471a0bab7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9607bdca-93d7-43a4-a67a-767471a0bab7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:57.097 38 INFO tempest.lib.common.rest_client [req-d4eaa6c0-cf62-475e-8494-615a9253c0f1 ] Request (ImagesMemberRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.042s 2020-11-06 18:01:57.097 38 DEBUG tempest.lib.common.rest_client [req-d4eaa6c0-cf62-475e-8494-615a9253c0f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d4eaa6c0-cf62-475e-8494-615a9253c0f1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:57.160 40 INFO tempest.lib.common.rest_client [req-84e47b62-1082-4e2a-8a1b-58552bd75e9d ] Request (PortsRbacTest:test_create_port_security_enabled): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:01:57.161 40 DEBUG tempest.lib.common.rest_client [req-84e47b62-1082-4e2a-8a1b-58552bd75e9d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-84e47b62-1082-4e2a-8a1b-58552bd75e9d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["WjkoGIubTYiG4s3Ug4XJjw"], "expires_at": "2020-11-06T19:01:57.000000Z", "issued_at": "2020-11-06T18:01:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:57.163 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:57.164 38 INFO tempest.lib.common.rest_client [req-5d2ac915-a584-41c9-ae25-ebf8b9cfad64 ] Request (ImagesMemberRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/066fcc85b4b8416fbc84967133f75b9e/users/62d2fea6b0d3405c9d63a19677898f49/roles/72a4576c553448cd941b052c1ca0cf2d 0.066s 2020-11-06 18:01:57.165 38 DEBUG tempest.lib.common.rest_client [req-5d2ac915-a584-41c9-ae25-ebf8b9cfad64 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5d2ac915-a584-41c9-ae25-ebf8b9cfad64', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/066fcc85b4b8416fbc84967133f75b9e/users/62d2fea6b0d3405c9d63a19677898f49/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:57.165 38 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImagesMemberRbacTest-1030919757', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '066fcc85b4b8416fbc84967133f75b9e', 'project_name': 'tempest-ImagesMemberRbacTest-1030919757', 'tenant_id': '066fcc85b4b8416fbc84967133f75b9e', 'tenant_name': 'tempest-ImagesMemberRbacTest-1030919757', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '62d2fea6b0d3405c9d63a19677898f49'}, Network: None, Subnet: None, Router: None 2020-11-06 18:01:57.166 38 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImagesMemberRbacTest-1030919757', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '066fcc85b4b8416fbc84967133f75b9e', 'project_name': 'tempest-ImagesMemberRbacTest-1030919757', 'tenant_id': '066fcc85b4b8416fbc84967133f75b9e', 'tenant_name': 'tempest-ImagesMemberRbacTest-1030919757', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '62d2fea6b0d3405c9d63a19677898f49'}, Network: None, Subnet: None, Router: None 2020-11-06 18:01:57.167 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:57.167 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:57.170 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_port, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:57.311 38 INFO tempest.lib.common.rest_client [req-91897240-f48e-4c69-a290-f844ecf50fa6 ] Request (ImagesMemberRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.134s 2020-11-06 18:01:57.312 38 DEBUG tempest.lib.common.rest_client [req-91897240-f48e-4c69-a290-f844ecf50fa6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6571', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-91897240-f48e-4c69-a290-f844ecf50fa6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "62d2fea6b0d3405c9d63a19677898f49", "name": "tempest-ImagesMemberRbacTest-1030919757", "password_expires_at": null}, "audit_ids": ["zzcdNDB1TemWTAZg3Wtm_w"], "expires_at": "2020-11-06T19:01:57.000000Z", "issued_at": "2020-11-06T18:01:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "066fcc85b4b8416fbc84967133f75b9e", "name": "tempest-ImagesMemberRbacTest-1030919757"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/066fcc85b4b8416fbc84967133f75b9e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/066fcc85b4b8416fbc84967133f75b9e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/066fcc85b4b8416fbc84967133f75b9e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_066fcc85b4b8416fbc84967133f75b9e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_066fcc85b4b8416fbc84967133f75b9e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_066fcc85b4b8416fbc84967133f75b9e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:57.315 37 INFO tempest.lib.common.rest_client [req-17c43680-d98d-4bb8-8ca2-e1178f63d804 ] Request (ComputeServersRbacTest:test_delete_server): 200 GET http://172.30.13.94/compute/v2.1/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9 1.534s 2020-11-06 18:01:57.315 37 DEBUG tempest.lib.common.rest_client [req-17c43680-d98d-4bb8-8ca2-e1178f63d804 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-17c43680-d98d-4bb8-8ca2-e1178f63d804', 'x-compute-request-id': 'req-17c43680-d98d-4bb8-8ca2-e1178f63d804', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9'} Body: b'{"server": {"id": "9657d9f5-7280-4ea5-999f-f296dffe42c9", "name": "tempest-ComputeServersRbacTest-server-354678351", "status": "BUILD", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "user_id": "262f98552a3a4d8a8fba3f96d5a872bf", "metadata": {}, "hostId": "72aa4147e128daa70511a3b03038cad49752a08b0327f6bc0c6decc0", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:01:53Z", "updated": "2020-11-06T18:01:55Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033d1", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:57.330 39 INFO tempest.lib.common.rest_client [req-8c5e6ee9-7d2a-4b5f-bdf0-94efa1f82ffe ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.977s 2020-11-06 18:01:57.330 37 INFO tempest.common.waiters [-] State transition "BUILD/networking" ==> "BUILD/spawning" after 4 second wait 2020-11-06 18:01:57.330 39 DEBUG tempest.lib.common.rest_client [req-8c5e6ee9-7d2a-4b5f-bdf0-94efa1f82ffe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8c5e6ee9-7d2a-4b5f-bdf0-94efa1f82ffe', 'x-compute-request-id': 'req-8c5e6ee9-7d2a-4b5f-bdf0-94efa1f82ffe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:57.386 38 INFO tempest.lib.common.rest_client [req-2812218e-dea1-4dad-b821-e9e3fc65759a ] Request (ImagesMemberRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.073s 2020-11-06 18:01:57.387 38 DEBUG tempest.lib.common.rest_client [req-2812218e-dea1-4dad-b821-e9e3fc65759a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2812218e-dea1-4dad-b821-e9e3fc65759a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["MdCVTomTT6-kMw-uron6YA"], "expires_at": "2020-11-06T19:01:57.000000Z", "issued_at": "2020-11-06T18:01:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:57.434 38 INFO tempest.lib.common.rest_client [req-c3a0d32b-a605-4d5f-bafe-405012d1f5af ] Request (ImagesMemberRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:01:57.434 38 DEBUG tempest.lib.common.rest_client [req-c3a0d32b-a605-4d5f-bafe-405012d1f5af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c3a0d32b-a605-4d5f-bafe-405012d1f5af', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["F0EXXp3NT4qSU5sOwZpIWA"], "expires_at": "2020-11-06T19:01:57.000000Z", "issued_at": "2020-11-06T18:01:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:57.473 38 INFO tempest.lib.common.rest_client [req-5113cc36-1a10-455f-b762-8a8d8aaeb608 ] Request (ImagesMemberRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.037s 2020-11-06 18:01:57.473 38 DEBUG tempest.lib.common.rest_client [req-5113cc36-1a10-455f-b762-8a8d8aaeb608 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5113cc36-1a10-455f-b762-8a8d8aaeb608', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:57.520 38 INFO tempest.lib.common.rest_client [req-d5388952-3802-41b0-890a-7c58b5a3134f ] Request (ImagesMemberRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.045s 2020-11-06 18:01:57.520 38 DEBUG tempest.lib.common.rest_client [req-d5388952-3802-41b0-890a-7c58b5a3134f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d5388952-3802-41b0-890a-7c58b5a3134f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:57.521 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:01:57.521 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:57.571 38 INFO tempest.lib.common.rest_client [req-c5161c0a-3ff8-4867-8923-820f79f98b12 ] Request (ImagesMemberRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles 0.049s 2020-11-06 18:01:57.572 38 DEBUG tempest.lib.common.rest_client [req-c5161c0a-3ff8-4867-8923-820f79f98b12 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c5161c0a-3ff8-4867-8923-820f79f98b12', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:57.623 38 INFO tempest.lib.common.rest_client [req-7effc2c0-61e3-4fb5-a103-a78a23cf4b67 ] Request (ImagesMemberRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles/72a4576c553448cd941b052c1ca0cf2d 0.050s 2020-11-06 18:01:57.624 38 DEBUG tempest.lib.common.rest_client [req-7effc2c0-61e3-4fb5-a103-a78a23cf4b67 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7effc2c0-61e3-4fb5-a103-a78a23cf4b67', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:57.722 38 INFO tempest.lib.common.rest_client [req-660318fc-aaf7-46be-9edd-c2ab6ec8b5ac ] Request (ImagesMemberRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles/a629c95d64b3416fb80ae90af4f69c05 0.097s 2020-11-06 18:01:57.722 38 DEBUG tempest.lib.common.rest_client [req-660318fc-aaf7-46be-9edd-c2ab6ec8b5ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-660318fc-aaf7-46be-9edd-c2ab6ec8b5ac', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:58.506 37 INFO tempest.lib.common.rest_client [req-444777a2-5254-4869-be4b-1ee38438a4f3 ] Request (ComputeServersRbacTest:test_delete_server): 200 GET http://172.30.13.94/compute/v2.1/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9 0.174s 2020-11-06 18:01:58.507 37 DEBUG tempest.lib.common.rest_client [req-444777a2-5254-4869-be4b-1ee38438a4f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-444777a2-5254-4869-be4b-1ee38438a4f3', 'x-compute-request-id': 'req-444777a2-5254-4869-be4b-1ee38438a4f3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9'} Body: b'{"server": {"id": "9657d9f5-7280-4ea5-999f-f296dffe42c9", "name": "tempest-ComputeServersRbacTest-server-354678351", "status": "BUILD", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "user_id": "262f98552a3a4d8a8fba3f96d5a872bf", "metadata": {}, "hostId": "72aa4147e128daa70511a3b03038cad49752a08b0327f6bc0c6decc0", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:01:53Z", "updated": "2020-11-06T18:01:55Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033d1", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:58.716 39 INFO tempest.lib.common.rest_client [req-4812b72e-cb97-4fc0-bc49-b4778ca8be14 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.372s 2020-11-06 18:01:58.716 39 DEBUG tempest.lib.common.rest_client [req-4812b72e-cb97-4fc0-bc49-b4778ca8be14 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4812b72e-cb97-4fc0-bc49-b4778ca8be14', 'x-compute-request-id': 'req-4812b72e-cb97-4fc0-bc49-b4778ca8be14', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:58.805 38 INFO tempest.lib.common.rest_client [req-14e6be1f-3bfc-4b95-b5d6-b4addf65897d ] Request (ImagesMemberRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-11-06 18:01:58.806 38 DEBUG tempest.lib.common.rest_client [req-14e6be1f-3bfc-4b95-b5d6-b4addf65897d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-14e6be1f-3bfc-4b95-b5d6-b4addf65897d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9a2878730d184150a67894aaba8107b5", "name": "tempest-ImagesMemberRbacTest-1618743830", "password_expires_at": null}, "audit_ids": ["2wwNsdS0T6-hFoOF8V68EQ"], "expires_at": "2020-11-06T19:01:58.000000Z", "issued_at": "2020-11-06T18:01:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a4cd9c52a26f49539cab00bf4c5af4e7", "name": "tempest-ImagesMemberRbacTest-1618743830"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:58.809 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:58.810 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:58.812 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: add_member, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:59.000 38 INFO tempest.lib.common.rest_client [req-a6e100d9-0f5d-447c-a97f-99cd77ff278a ] Request (ImagesMemberRbacTest:test_add_image_member): 201 POST http://172.30.13.94/image/v2/images 0.188s 2020-11-06 18:01:59.001 38 DEBUG tempest.lib.common.rest_client [req-a6e100d9-0f5d-447c-a97f-99cd77ff278a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-ImagesMemberRbacTest-image-583774818"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '648', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/96003ac3-22bb-40c5-ab05-6c4543bbb0dc', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-a6e100d9-0f5d-447c-a97f-99cd77ff278a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-ImagesMemberRbacTest-image-583774818", "disk_format": null, "container_format": null, "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "a4cd9c52a26f49539cab00bf4c5af4e7", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "96003ac3-22bb-40c5-ab05-6c4543bbb0dc", "created_at": "2020-11-06T18:01:59Z", "updated_at": "2020-11-06T18:01:59Z", "tags": [], "self": "/v2/images/96003ac3-22bb-40c5-ab05-6c4543bbb0dc", "file": "/v2/images/96003ac3-22bb-40c5-ab05-6c4543bbb0dc/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:59.002 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:59.103 38 INFO tempest.lib.common.rest_client [req-1004d997-d914-4d93-b7e6-0d527d348516 ] Request (ImagesMemberRbacTest:test_add_image_member): 200 GET http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles 0.100s 2020-11-06 18:01:59.104 38 DEBUG tempest.lib.common.rest_client [req-1004d997-d914-4d93-b7e6-0d527d348516 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1004d997-d914-4d93-b7e6-0d527d348516', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:59.145 38 INFO tempest.lib.common.rest_client [req-8c1627f0-995a-4003-bc29-51166a1a50d4 ] Request (ImagesMemberRbacTest:test_add_image_member): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-11-06 18:01:59.146 38 DEBUG tempest.lib.common.rest_client [req-8c1627f0-995a-4003-bc29-51166a1a50d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8c1627f0-995a-4003-bc29-51166a1a50d4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9a2878730d184150a67894aaba8107b5", "name": "tempest-ImagesMemberRbacTest-1618743830", "password_expires_at": null}, "audit_ids": ["lRoPkBOyQGevVgJGx5xD_w"], "expires_at": "2020-11-06T19:01:59.000000Z", "issued_at": "2020-11-06T18:01:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a4cd9c52a26f49539cab00bf4c5af4e7", "name": "tempest-ImagesMemberRbacTest-1618743830"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:59.260 38 INFO tempest.lib.common.rest_client [req-b621063b-1efe-4c3c-9142-a1d334c859ca ] Request (ImagesMemberRbacTest:test_add_image_member): 200 POST http://172.30.13.94/image/v2/images/96003ac3-22bb-40c5-ab05-6c4543bbb0dc/members 0.113s 2020-11-06 18:01:59.261 38 DEBUG tempest.lib.common.rest_client [req-b621063b-1efe-4c3c-9142-a1d334c859ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"member": "066fcc85b4b8416fbc84967133f75b9e"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '230', 'content-type': 'application/json', 'x-openstack-request-id': 'req-b621063b-1efe-4c3c-9142-a1d334c859ca', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/96003ac3-22bb-40c5-ab05-6c4543bbb0dc/members'} Body: b'{"member_id": "066fcc85b4b8416fbc84967133f75b9e", "image_id": "96003ac3-22bb-40c5-ab05-6c4543bbb0dc", "status": "pending", "created_at": "2020-11-06T18:01:59Z", "updated_at": "2020-11-06T18:01:59Z", "schema": "/v2/schemas/member"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:59.261 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:59.311 38 INFO tempest.lib.common.rest_client [req-7aa3d14b-37d8-472f-933d-ff10f08900e7 ] Request (ImagesMemberRbacTest:test_add_image_member): 200 GET http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles 0.049s 2020-11-06 18:01:59.311 38 DEBUG tempest.lib.common.rest_client [req-7aa3d14b-37d8-472f-933d-ff10f08900e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7aa3d14b-37d8-472f-933d-ff10f08900e7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:59.348 38 INFO tempest.lib.common.rest_client [req-98831d43-6faa-4628-aab8-d6b5265a3e18 ] Request (ImagesMemberRbacTest:test_add_image_member): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:01:59.348 38 DEBUG tempest.lib.common.rest_client [req-98831d43-6faa-4628-aab8-d6b5265a3e18 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-98831d43-6faa-4628-aab8-d6b5265a3e18', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9a2878730d184150a67894aaba8107b5", "name": "tempest-ImagesMemberRbacTest-1618743830", "password_expires_at": null}, "audit_ids": ["nd4OUK0FRyyGuwSTQu99QQ"], "expires_at": "2020-11-06T19:01:59.000000Z", "issued_at": "2020-11-06T18:01:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a4cd9c52a26f49539cab00bf4c5af4e7", "name": "tempest-ImagesMemberRbacTest-1618743830"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:59.351 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:59.352 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:59.354 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_member, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:59.458 38 INFO tempest.lib.common.rest_client [req-4f9b57e7-20c7-436e-8dcf-5770e65b1939 ] Request (ImagesMemberRbacTest:test_delete_image_member): 201 POST http://172.30.13.94/image/v2/images 0.103s 2020-11-06 18:01:59.459 38 DEBUG tempest.lib.common.rest_client [req-4f9b57e7-20c7-436e-8dcf-5770e65b1939 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-ImagesMemberRbacTest-image-1789625148"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '649', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/e23940c5-5c15-4ac6-83eb-7df1fbceb8f5', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-4f9b57e7-20c7-436e-8dcf-5770e65b1939', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-ImagesMemberRbacTest-image-1789625148", "disk_format": null, "container_format": null, "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "a4cd9c52a26f49539cab00bf4c5af4e7", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "e23940c5-5c15-4ac6-83eb-7df1fbceb8f5", "created_at": "2020-11-06T18:01:59Z", "updated_at": "2020-11-06T18:01:59Z", "tags": [], "self": "/v2/images/e23940c5-5c15-4ac6-83eb-7df1fbceb8f5", "file": "/v2/images/e23940c5-5c15-4ac6-83eb-7df1fbceb8f5/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:59.498 40 INFO tempest.lib.common.rest_client [req-a352a500-3eff-4ba3-98ed-8f430923ebf9 ] Request (PortsRbacTest:test_delete_port): 201 POST http://172.30.13.94:9696/v2.0/ports 2.327s 2020-11-06 18:01:59.499 40 DEBUG tempest.lib.common.rest_client [req-a352a500-3eff-4ba3-98ed-8f430923ebf9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "586884b2-4363-4597-acb0-ddbc49908b65", "name": "tempest-PortsRbacTest-102344059"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1094', 'x-openstack-request-id': 'req-a352a500-3eff-4ba3-98ed-8f430923ebf9', 'date': 'Fri, 06 Nov 2020 18:01:59 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"be92dbc3-231e-4b93-831e-f18bc0fefc70","name":"tempest-PortsRbacTest-102344059","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:10:1f:4c","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.120"}],"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","port_security_enabled":true,"qos_policy_id":null,"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"allowed_address_pairs":[],"extra_dhcp_opts":[],"description":"","qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.120","hostname":"host-192-168-120-120","fqdn":"host-192-168-120-120.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:01:58Z","updated_at":"2020-11-06T18:01:58Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:59.500 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:59.507 38 INFO tempest.lib.common.rest_client [req-c7abd10e-3348-47b8-ba02-28fd40d02bd7 ] Request (ImagesMemberRbacTest:test_delete_image_member): 200 POST http://172.30.13.94/image/v2/images/e23940c5-5c15-4ac6-83eb-7df1fbceb8f5/members 0.047s 2020-11-06 18:01:59.507 38 DEBUG tempest.lib.common.rest_client [req-c7abd10e-3348-47b8-ba02-28fd40d02bd7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"member": "066fcc85b4b8416fbc84967133f75b9e"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '230', 'content-type': 'application/json', 'x-openstack-request-id': 'req-c7abd10e-3348-47b8-ba02-28fd40d02bd7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/e23940c5-5c15-4ac6-83eb-7df1fbceb8f5/members'} Body: b'{"member_id": "066fcc85b4b8416fbc84967133f75b9e", "image_id": "e23940c5-5c15-4ac6-83eb-7df1fbceb8f5", "status": "pending", "created_at": "2020-11-06T18:01:59Z", "updated_at": "2020-11-06T18:01:59Z", "schema": "/v2/schemas/member"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:59.507 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:59.554 40 INFO tempest.lib.common.rest_client [req-8d42ca8e-7059-470b-8e3c-a320acef2af9 ] Request (PortsRbacTest:test_delete_port): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.052s 2020-11-06 18:01:59.554 40 DEBUG tempest.lib.common.rest_client [req-8d42ca8e-7059-470b-8e3c-a320acef2af9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8d42ca8e-7059-470b-8e3c-a320acef2af9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:59.567 38 INFO tempest.lib.common.rest_client [req-91595032-397b-41e7-82a9-4355b24ef9bb ] Request (ImagesMemberRbacTest:test_delete_image_member): 200 GET http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles 0.058s 2020-11-06 18:01:59.568 38 DEBUG tempest.lib.common.rest_client [req-91595032-397b-41e7-82a9-4355b24ef9bb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-91595032-397b-41e7-82a9-4355b24ef9bb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:59.603 38 INFO tempest.lib.common.rest_client [req-1c1f98b9-dc11-43c3-ab7b-89691a6e3347 ] Request (ImagesMemberRbacTest:test_delete_image_member): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:01:59.604 38 DEBUG tempest.lib.common.rest_client [req-1c1f98b9-dc11-43c3-ab7b-89691a6e3347 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1c1f98b9-dc11-43c3-ab7b-89691a6e3347', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9a2878730d184150a67894aaba8107b5", "name": "tempest-ImagesMemberRbacTest-1618743830", "password_expires_at": null}, "audit_ids": ["Pkq3L9FmSGqrw7zo-9Qnzg"], "expires_at": "2020-11-06T19:01:59.000000Z", "issued_at": "2020-11-06T18:01:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a4cd9c52a26f49539cab00bf4c5af4e7", "name": "tempest-ImagesMemberRbacTest-1618743830"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:59.648 40 INFO tempest.lib.common.rest_client [req-02b91e61-563d-416a-a34d-e0ed442d1149 ] Request (PortsRbacTest:test_delete_port): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-11-06 18:01:59.649 40 DEBUG tempest.lib.common.rest_client [req-02b91e61-563d-416a-a34d-e0ed442d1149 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-02b91e61-563d-416a-a34d-e0ed442d1149', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["9gZdcaxGSjmcWjE8JiG83g"], "expires_at": "2020-11-06T19:01:59.000000Z", "issued_at": "2020-11-06T18:01:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:59.718 38 INFO tempest.lib.common.rest_client [req-1e58f5e0-1de5-4924-8576-73dacd0f463e ] Request (ImagesMemberRbacTest:test_delete_image_member): 204 DELETE http://172.30.13.94/image/v2/images/e23940c5-5c15-4ac6-83eb-7df1fbceb8f5/members/066fcc85b4b8416fbc84967133f75b9e 0.113s 2020-11-06 18:01:59.719 38 DEBUG tempest.lib.common.rest_client [req-1e58f5e0-1de5-4924-8576-73dacd0f463e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-openstack-request-id': 'req-1e58f5e0-1de5-4924-8576-73dacd0f463e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/e23940c5-5c15-4ac6-83eb-7df1fbceb8f5/members/066fcc85b4b8416fbc84967133f75b9e'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:59.719 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:01:59.777 38 INFO tempest.lib.common.rest_client [req-501f131f-e317-48fd-9cc6-3777a8ab94aa ] Request (ImagesMemberRbacTest:test_delete_image_member): 200 GET http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles 0.056s 2020-11-06 18:01:59.777 38 DEBUG tempest.lib.common.rest_client [req-501f131f-e317-48fd-9cc6-3777a8ab94aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-501f131f-e317-48fd-9cc6-3777a8ab94aa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:59.815 38 INFO tempest.lib.common.rest_client [req-09ca502e-d311-4d50-a31c-c9c4edb232d2 ] Request (ImagesMemberRbacTest:test_delete_image_member): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:01:59.816 38 DEBUG tempest.lib.common.rest_client [req-09ca502e-d311-4d50-a31c-c9c4edb232d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-09ca502e-d311-4d50-a31c-c9c4edb232d2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9a2878730d184150a67894aaba8107b5", "name": "tempest-ImagesMemberRbacTest-1618743830", "password_expires_at": null}, "audit_ids": ["Yd7X3lB8QpCq67t-NlZlbg"], "expires_at": "2020-11-06T19:01:59.000000Z", "issued_at": "2020-11-06T18:01:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a4cd9c52a26f49539cab00bf4c5af4e7", "name": "tempest-ImagesMemberRbacTest-1618743830"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:59.819 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:01:59.820 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:01:59.822 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_members, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:01:59.934 38 INFO tempest.lib.common.rest_client [req-58e2efca-0344-4736-a103-34a960e16575 ] Request (ImagesMemberRbacTest:test_list_image_members): 201 POST http://172.30.13.94/image/v2/images 0.110s 2020-11-06 18:01:59.934 38 DEBUG tempest.lib.common.rest_client [req-58e2efca-0344-4736-a103-34a960e16575 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-ImagesMemberRbacTest-image-600518292"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '648', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/292246e7-1253-49b4-b9e6-099b8267f31a', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-58e2efca-0344-4736-a103-34a960e16575', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-ImagesMemberRbacTest-image-600518292", "disk_format": null, "container_format": null, "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "a4cd9c52a26f49539cab00bf4c5af4e7", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "292246e7-1253-49b4-b9e6-099b8267f31a", "created_at": "2020-11-06T18:02:00Z", "updated_at": "2020-11-06T18:02:00Z", "tags": [], "self": "/v2/images/292246e7-1253-49b4-b9e6-099b8267f31a", "file": "/v2/images/292246e7-1253-49b4-b9e6-099b8267f31a/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:59.981 38 INFO tempest.lib.common.rest_client [req-700ed70b-be02-489d-b53e-b14ec7642d55 ] Request (ImagesMemberRbacTest:test_list_image_members): 200 POST http://172.30.13.94/image/v2/images/292246e7-1253-49b4-b9e6-099b8267f31a/members 0.045s 2020-11-06 18:01:59.981 38 DEBUG tempest.lib.common.rest_client [req-700ed70b-be02-489d-b53e-b14ec7642d55 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"member": "066fcc85b4b8416fbc84967133f75b9e"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '230', 'content-type': 'application/json', 'x-openstack-request-id': 'req-700ed70b-be02-489d-b53e-b14ec7642d55', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/292246e7-1253-49b4-b9e6-099b8267f31a/members'} Body: b'{"member_id": "066fcc85b4b8416fbc84967133f75b9e", "image_id": "292246e7-1253-49b4-b9e6-099b8267f31a", "status": "pending", "created_at": "2020-11-06T18:01:59Z", "updated_at": "2020-11-06T18:01:59Z", "schema": "/v2/schemas/member"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:01:59.982 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:00.035 38 INFO tempest.lib.common.rest_client [req-e6f5ae23-5cb2-4c50-a64c-c59ec0663e01 ] Request (ImagesMemberRbacTest:test_list_image_members): 200 GET http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles 0.052s 2020-11-06 18:02:00.036 38 DEBUG tempest.lib.common.rest_client [req-e6f5ae23-5cb2-4c50-a64c-c59ec0663e01 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e6f5ae23-5cb2-4c50-a64c-c59ec0663e01', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:00.074 38 INFO tempest.lib.common.rest_client [req-e92b8232-ce1a-4cec-ad2d-2dea4557d9a1 ] Request (ImagesMemberRbacTest:test_list_image_members): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:02:00.075 38 DEBUG tempest.lib.common.rest_client [req-e92b8232-ce1a-4cec-ad2d-2dea4557d9a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e92b8232-ce1a-4cec-ad2d-2dea4557d9a1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9a2878730d184150a67894aaba8107b5", "name": "tempest-ImagesMemberRbacTest-1618743830", "password_expires_at": null}, "audit_ids": ["hb5mzds3RNmX0bmXIxAWWA"], "expires_at": "2020-11-06T19:02:00.000000Z", "issued_at": "2020-11-06T18:02:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a4cd9c52a26f49539cab00bf4c5af4e7", "name": "tempest-ImagesMemberRbacTest-1618743830"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:00.170 38 INFO tempest.lib.common.rest_client [req-71d6c3ce-d33f-4461-b2b7-854e27e85a98 ] Request (ImagesMemberRbacTest:test_list_image_members): 200 GET http://172.30.13.94/image/v2/images/292246e7-1253-49b4-b9e6-099b8267f31a/members 0.094s 2020-11-06 18:02:00.171 38 DEBUG tempest.lib.common.rest_client [req-71d6c3ce-d33f-4461-b2b7-854e27e85a98 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '278', 'content-type': 'application/json', 'x-openstack-request-id': 'req-71d6c3ce-d33f-4461-b2b7-854e27e85a98', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/292246e7-1253-49b4-b9e6-099b8267f31a/members'} Body: b'{"members": [{"member_id": "066fcc85b4b8416fbc84967133f75b9e", "image_id": "292246e7-1253-49b4-b9e6-099b8267f31a", "status": "pending", "created_at": "2020-11-06T18:02:00Z", "updated_at": "2020-11-06T18:02:00Z", "schema": "/v2/schemas/member"}], "schema": "/v2/schemas/members"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:00.172 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:00.228 38 INFO tempest.lib.common.rest_client [req-5161ce56-d9ea-4009-a564-fa41809a7a5d ] Request (ImagesMemberRbacTest:test_list_image_members): 200 GET http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles 0.055s 2020-11-06 18:02:00.229 38 DEBUG tempest.lib.common.rest_client [req-5161ce56-d9ea-4009-a564-fa41809a7a5d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5161ce56-d9ea-4009-a564-fa41809a7a5d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:00.269 38 INFO tempest.lib.common.rest_client [req-0cf13f86-dae8-4163-a5c6-481d9ea24031 ] Request (ImagesMemberRbacTest:test_list_image_members): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:02:00.270 38 DEBUG tempest.lib.common.rest_client [req-0cf13f86-dae8-4163-a5c6-481d9ea24031 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0cf13f86-dae8-4163-a5c6-481d9ea24031', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9a2878730d184150a67894aaba8107b5", "name": "tempest-ImagesMemberRbacTest-1618743830", "password_expires_at": null}, "audit_ids": ["FEDTlaMISh-lsh1R19TgvA"], "expires_at": "2020-11-06T19:02:00.000000Z", "issued_at": "2020-11-06T18:02:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a4cd9c52a26f49539cab00bf4c5af4e7", "name": "tempest-ImagesMemberRbacTest-1618743830"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:00.273 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:00.274 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:00.276 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_member, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:00.378 38 INFO tempest.lib.common.rest_client [req-83d4adf0-caa7-4a2b-a092-fa71a39a6701 ] Request (ImagesMemberRbacTest:test_show_image_member): 201 POST http://172.30.13.94/image/v2/images 0.100s 2020-11-06 18:02:00.378 38 DEBUG tempest.lib.common.rest_client [req-83d4adf0-caa7-4a2b-a092-fa71a39a6701 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-ImagesMemberRbacTest-image-1330980050"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '649', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/6dd1b127-29a2-4500-8fbe-d26c6a43dbdf', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-83d4adf0-caa7-4a2b-a092-fa71a39a6701', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-ImagesMemberRbacTest-image-1330980050", "disk_format": null, "container_format": null, "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "a4cd9c52a26f49539cab00bf4c5af4e7", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "6dd1b127-29a2-4500-8fbe-d26c6a43dbdf", "created_at": "2020-11-06T18:02:00Z", "updated_at": "2020-11-06T18:02:00Z", "tags": [], "self": "/v2/images/6dd1b127-29a2-4500-8fbe-d26c6a43dbdf", "file": "/v2/images/6dd1b127-29a2-4500-8fbe-d26c6a43dbdf/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:00.418 38 INFO tempest.lib.common.rest_client [req-96bae231-8840-4271-bd64-40e1aff1779c ] Request (ImagesMemberRbacTest:test_show_image_member): 200 POST http://172.30.13.94/image/v2/images/6dd1b127-29a2-4500-8fbe-d26c6a43dbdf/members 0.039s 2020-11-06 18:02:00.419 38 DEBUG tempest.lib.common.rest_client [req-96bae231-8840-4271-bd64-40e1aff1779c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"member": "066fcc85b4b8416fbc84967133f75b9e"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '230', 'content-type': 'application/json', 'x-openstack-request-id': 'req-96bae231-8840-4271-bd64-40e1aff1779c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/6dd1b127-29a2-4500-8fbe-d26c6a43dbdf/members'} Body: b'{"member_id": "066fcc85b4b8416fbc84967133f75b9e", "image_id": "6dd1b127-29a2-4500-8fbe-d26c6a43dbdf", "status": "pending", "created_at": "2020-11-06T18:02:00Z", "updated_at": "2020-11-06T18:02:00Z", "schema": "/v2/schemas/member"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:00.420 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:00.473 38 INFO tempest.lib.common.rest_client [req-a8a6abf9-06da-47c8-a4df-fe11143b233c ] Request (ImagesMemberRbacTest:test_show_image_member): 200 GET http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles 0.052s 2020-11-06 18:02:00.473 38 DEBUG tempest.lib.common.rest_client [req-a8a6abf9-06da-47c8-a4df-fe11143b233c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a8a6abf9-06da-47c8-a4df-fe11143b233c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:00.513 38 INFO tempest.lib.common.rest_client [req-a8351323-ddc5-4e33-8d7f-4dfbd72aa790 ] Request (ImagesMemberRbacTest:test_show_image_member): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:02:00.514 38 DEBUG tempest.lib.common.rest_client [req-a8351323-ddc5-4e33-8d7f-4dfbd72aa790 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a8351323-ddc5-4e33-8d7f-4dfbd72aa790', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9a2878730d184150a67894aaba8107b5", "name": "tempest-ImagesMemberRbacTest-1618743830", "password_expires_at": null}, "audit_ids": ["ADMXDvewRfWCjre4c2A7cg"], "expires_at": "2020-11-06T19:02:00.000000Z", "issued_at": "2020-11-06T18:02:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a4cd9c52a26f49539cab00bf4c5af4e7", "name": "tempest-ImagesMemberRbacTest-1618743830"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:00.616 38 INFO tempest.lib.common.rest_client [req-8e117982-0343-4bc1-aa12-04c253757244 ] Request (ImagesMemberRbacTest:test_show_image_member): 200 GET http://172.30.13.94/image/v2/images/6dd1b127-29a2-4500-8fbe-d26c6a43dbdf/members/066fcc85b4b8416fbc84967133f75b9e 0.100s 2020-11-06 18:02:00.617 38 DEBUG tempest.lib.common.rest_client [req-8e117982-0343-4bc1-aa12-04c253757244 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '230', 'content-type': 'application/json', 'x-openstack-request-id': 'req-8e117982-0343-4bc1-aa12-04c253757244', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/6dd1b127-29a2-4500-8fbe-d26c6a43dbdf/members/066fcc85b4b8416fbc84967133f75b9e'} Body: b'{"member_id": "066fcc85b4b8416fbc84967133f75b9e", "image_id": "6dd1b127-29a2-4500-8fbe-d26c6a43dbdf", "status": "pending", "created_at": "2020-11-06T18:02:00Z", "updated_at": "2020-11-06T18:02:00Z", "schema": "/v2/schemas/member"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:00.617 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:00.679 38 INFO tempest.lib.common.rest_client [req-58a04b86-40e2-498c-bcb3-959873f004d6 ] Request (ImagesMemberRbacTest:test_show_image_member): 200 GET http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles 0.060s 2020-11-06 18:02:00.679 38 DEBUG tempest.lib.common.rest_client [req-58a04b86-40e2-498c-bcb3-959873f004d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-58a04b86-40e2-498c-bcb3-959873f004d6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:00.720 38 INFO tempest.lib.common.rest_client [req-9d0bb63e-4faf-40bd-872d-5efb76c86fc1 ] Request (ImagesMemberRbacTest:test_show_image_member): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:02:00.721 38 DEBUG tempest.lib.common.rest_client [req-9d0bb63e-4faf-40bd-872d-5efb76c86fc1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9d0bb63e-4faf-40bd-872d-5efb76c86fc1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9a2878730d184150a67894aaba8107b5", "name": "tempest-ImagesMemberRbacTest-1618743830", "password_expires_at": null}, "audit_ids": ["MR5tFGh3SY275ScrKtJWJA"], "expires_at": "2020-11-06T19:02:00.000000Z", "issued_at": "2020-11-06T18:02:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a4cd9c52a26f49539cab00bf4c5af4e7", "name": "tempest-ImagesMemberRbacTest-1618743830"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:00.724 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:00.725 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:00.726 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: modify_member, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:00.750 40 INFO tempest.lib.common.rest_client [req-31d5cd63-a147-459a-a7db-3ee068569692 ] Request (PortsRbacTest:test_delete_port): 204 DELETE http://172.30.13.94:9696/v2.0/ports/be92dbc3-231e-4b93-831e-f18bc0fefc70 1.099s 2020-11-06 18:02:00.750 40 DEBUG tempest.lib.common.rest_client [req-31d5cd63-a147-459a-a7db-3ee068569692 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-31d5cd63-a147-459a-a7db-3ee068569692', 'date': 'Fri, 06 Nov 2020 18:02:00 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/be92dbc3-231e-4b93-831e-f18bc0fefc70'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:00.751 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:00.807 40 INFO tempest.lib.common.rest_client [req-e0c5b822-67f9-44ff-9ac8-5c78f4c3290a ] Request (PortsRbacTest:test_delete_port): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.056s 2020-11-06 18:02:00.808 40 DEBUG tempest.lib.common.rest_client [req-e0c5b822-67f9-44ff-9ac8-5c78f4c3290a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e0c5b822-67f9-44ff-9ac8-5c78f4c3290a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:00.825 38 INFO tempest.lib.common.rest_client [req-d5ca0c13-82c7-4c48-82b0-d7ee6bdaa035 ] Request (ImagesMemberRbacTest:test_update_image_member): 201 POST http://172.30.13.94/image/v2/images 0.098s 2020-11-06 18:02:00.826 38 DEBUG tempest.lib.common.rest_client [req-d5ca0c13-82c7-4c48-82b0-d7ee6bdaa035 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"visibility": "shared", "name": "tempest-ImagesMemberRbacTest-image-605988840"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '648', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/3a4d5d20-c995-4170-8f10-963468779324', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-d5ca0c13-82c7-4c48-82b0-d7ee6bdaa035', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-ImagesMemberRbacTest-image-605988840", "disk_format": null, "container_format": null, "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "a4cd9c52a26f49539cab00bf4c5af4e7", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "3a4d5d20-c995-4170-8f10-963468779324", "created_at": "2020-11-06T18:02:01Z", "updated_at": "2020-11-06T18:02:01Z", "tags": [], "self": "/v2/images/3a4d5d20-c995-4170-8f10-963468779324", "file": "/v2/images/3a4d5d20-c995-4170-8f10-963468779324/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:00.849 40 INFO tempest.lib.common.rest_client [req-9c4489b3-9cb6-49b0-927c-4393afcbd048 ] Request (PortsRbacTest:test_delete_port): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:02:00.850 40 DEBUG tempest.lib.common.rest_client [req-9c4489b3-9cb6-49b0-927c-4393afcbd048 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9c4489b3-9cb6-49b0-927c-4393afcbd048', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["3r5bWIxWQYemFbR7QaUi9A"], "expires_at": "2020-11-06T19:02:00.000000Z", "issued_at": "2020-11-06T18:02:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:00.852 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:00.856 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:00.856 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:00.865 38 INFO tempest.lib.common.rest_client [req-b30d0a5c-046d-47e5-8737-21cbda98f61c ] Request (ImagesMemberRbacTest:test_update_image_member): 200 POST http://172.30.13.94/image/v2/images/3a4d5d20-c995-4170-8f10-963468779324/members 0.038s 2020-11-06 18:02:00.865 38 DEBUG tempest.lib.common.rest_client [req-b30d0a5c-046d-47e5-8737-21cbda98f61c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"member": "a4cd9c52a26f49539cab00bf4c5af4e7"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '230', 'content-type': 'application/json', 'x-openstack-request-id': 'req-b30d0a5c-046d-47e5-8737-21cbda98f61c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/3a4d5d20-c995-4170-8f10-963468779324/members'} Body: b'{"member_id": "a4cd9c52a26f49539cab00bf4c5af4e7", "image_id": "3a4d5d20-c995-4170-8f10-963468779324", "status": "pending", "created_at": "2020-11-06T18:02:00Z", "updated_at": "2020-11-06T18:02:00Z", "schema": "/v2/schemas/member"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:00.908 38 INFO tempest.lib.common.rest_client [req-9fc86a34-c162-4ead-813c-09cbc94792ab ] Request (ImagesMemberRbacTest:test_update_image_member): 200 PUT http://172.30.13.94/image/v2/images/3a4d5d20-c995-4170-8f10-963468779324/members/a4cd9c52a26f49539cab00bf4c5af4e7 0.041s 2020-11-06 18:02:00.908 38 DEBUG tempest.lib.common.rest_client [req-9fc86a34-c162-4ead-813c-09cbc94792ab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"status": "accepted"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '231', 'content-type': 'application/json', 'x-openstack-request-id': 'req-9fc86a34-c162-4ead-813c-09cbc94792ab', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/3a4d5d20-c995-4170-8f10-963468779324/members/a4cd9c52a26f49539cab00bf4c5af4e7'} Body: b'{"member_id": "a4cd9c52a26f49539cab00bf4c5af4e7", "image_id": "3a4d5d20-c995-4170-8f10-963468779324", "status": "accepted", "created_at": "2020-11-06T18:02:01Z", "updated_at": "2020-11-06T18:02:00Z", "schema": "/v2/schemas/member"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:00.909 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:00.914 40 INFO tempest.lib.common.rest_client [req-c0f4c859-31e8-46f1-9248-3ad52b310137 ] Request (PortsRbacTest:test_list_ports): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.057s 2020-11-06 18:02:00.915 40 DEBUG tempest.lib.common.rest_client [req-c0f4c859-31e8-46f1-9248-3ad52b310137 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c0f4c859-31e8-46f1-9248-3ad52b310137', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:00.947 40 INFO tempest.lib.common.rest_client [req-ad19bd1d-6c06-4f14-9ad7-2a605931f96f ] Request (PortsRbacTest:test_list_ports): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:02:00.948 40 DEBUG tempest.lib.common.rest_client [req-ad19bd1d-6c06-4f14-9ad7-2a605931f96f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ad19bd1d-6c06-4f14-9ad7-2a605931f96f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["5I38xuMNRHeiKWP96VzxZA"], "expires_at": "2020-11-06T19:02:00.000000Z", "issued_at": "2020-11-06T18:02:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:00.961 38 INFO tempest.lib.common.rest_client [req-3795acb6-6d66-48ff-8806-e92ce2f115f2 ] Request (ImagesMemberRbacTest:test_update_image_member): 200 GET http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles 0.051s 2020-11-06 18:02:00.962 38 DEBUG tempest.lib.common.rest_client [req-3795acb6-6d66-48ff-8806-e92ce2f115f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3795acb6-6d66-48ff-8806-e92ce2f115f2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:00.992 37 INFO tempest.lib.common.rest_client [req-02820293-8704-442c-b194-13a662d367a7 ] Request (ComputeServersRbacTest:test_delete_server): 200 GET http://172.30.13.94/compute/v2.1/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9 1.471s 2020-11-06 18:02:00.993 37 DEBUG tempest.lib.common.rest_client [req-02820293-8704-442c-b194-13a662d367a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-02820293-8704-442c-b194-13a662d367a7', 'x-compute-request-id': 'req-02820293-8704-442c-b194-13a662d367a7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9'} Body: b'{"server": {"id": "9657d9f5-7280-4ea5-999f-f296dffe42c9", "name": "tempest-ComputeServersRbacTest-server-354678351", "status": "BUILD", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "user_id": "262f98552a3a4d8a8fba3f96d5a872bf", "metadata": {}, "hostId": "72aa4147e128daa70511a3b03038cad49752a08b0327f6bc0c6decc0", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:01:53Z", "updated": "2020-11-06T18:01:55Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033d1", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:00.996 38 INFO tempest.lib.common.rest_client [req-9e6ffb16-e388-473f-8b8b-c1075b2e882b ] Request (ImagesMemberRbacTest:test_update_image_member): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:02:00.996 38 DEBUG tempest.lib.common.rest_client [req-9e6ffb16-e388-473f-8b8b-c1075b2e882b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9e6ffb16-e388-473f-8b8b-c1075b2e882b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9a2878730d184150a67894aaba8107b5", "name": "tempest-ImagesMemberRbacTest-1618743830", "password_expires_at": null}, "audit_ids": ["2ki1VAhiRmGEXeTL2x3IEg"], "expires_at": "2020-11-06T19:02:00.000000Z", "issued_at": "2020-11-06T18:02:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a4cd9c52a26f49539cab00bf4c5af4e7", "name": "tempest-ImagesMemberRbacTest-1618743830"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:01.019 39 INFO tempest.lib.common.rest_client [req-c55f1581-fb69-4c91-a441-e1399b8b5446 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 1.286s 2020-11-06 18:02:01.020 39 DEBUG tempest.lib.common.rest_client [req-c55f1581-fb69-4c91-a441-e1399b8b5446 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:01:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c55f1581-fb69-4c91-a441-e1399b8b5446', 'x-compute-request-id': 'req-c55f1581-fb69-4c91-a441-e1399b8b5446', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:01.087 38 INFO tempest.lib.common.rest_client [req-0dbb98bc-59db-427e-952b-05d2760319fb ] Request (ImagesMemberRbacTest:test_update_image_member): 200 PUT http://172.30.13.94/image/v2/images/3a4d5d20-c995-4170-8f10-963468779324/members/a4cd9c52a26f49539cab00bf4c5af4e7 0.089s 2020-11-06 18:02:01.087 38 DEBUG tempest.lib.common.rest_client [req-0dbb98bc-59db-427e-952b-05d2760319fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"status": "pending"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '230', 'content-type': 'application/json', 'x-openstack-request-id': 'req-0dbb98bc-59db-427e-952b-05d2760319fb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/3a4d5d20-c995-4170-8f10-963468779324/members/a4cd9c52a26f49539cab00bf4c5af4e7'} Body: b'{"member_id": "a4cd9c52a26f49539cab00bf4c5af4e7", "image_id": "3a4d5d20-c995-4170-8f10-963468779324", "status": "pending", "created_at": "2020-11-06T18:02:01Z", "updated_at": "2020-11-06T18:02:01Z", "schema": "/v2/schemas/member"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:01.088 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:01.093 40 INFO tempest.lib.common.rest_client [req-f3fecb2f-764a-4cd3-af2a-142f5ea525b7 ] Request (PortsRbacTest:test_list_ports): 200 GET http://172.30.13.94:9696/v2.0/ports?id=e218c7fc-d3dc-4c2c-9234-aa97d5412eb7 0.144s 2020-11-06 18:02:01.094 40 DEBUG tempest.lib.common.rest_client [req-f3fecb2f-764a-4cd3-af2a-142f5ea525b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '1097', 'x-openstack-request-id': 'req-f3fecb2f-764a-4cd3-af2a-142f5ea525b7', 'date': 'Fri, 06 Nov 2020 18:02:01 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports?id=e218c7fc-d3dc-4c2c-9234-aa97d5412eb7'} Body: b'{"ports":[{"id":"e218c7fc-d3dc-4c2c-9234-aa97d5412eb7","name":"tempest-PortsRbacTest-339006369","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:8a:69:9e","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.243"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.243","hostname":"host-192-168-120-243","fqdn":"host-192-168-120-243.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:01:42Z","updated_at":"2020-11-06T18:01:42Z","revision_number":1,"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:01.095 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:01.138 38 INFO tempest.lib.common.rest_client [req-606e06f9-7f7f-42e4-99ec-a0ad7f5eb10f ] Request (ImagesMemberRbacTest:test_update_image_member): 200 GET http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles 0.049s 2020-11-06 18:02:01.138 38 DEBUG tempest.lib.common.rest_client [req-606e06f9-7f7f-42e4-99ec-a0ad7f5eb10f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-606e06f9-7f7f-42e4-99ec-a0ad7f5eb10f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7/users/9a2878730d184150a67894aaba8107b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:01.143 40 INFO tempest.lib.common.rest_client [req-0d72ce9c-6a7f-4d6b-a46d-d70aeb5ea92c ] Request (PortsRbacTest:test_list_ports): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.048s 2020-11-06 18:02:01.144 40 DEBUG tempest.lib.common.rest_client [req-0d72ce9c-6a7f-4d6b-a46d-d70aeb5ea92c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0d72ce9c-6a7f-4d6b-a46d-d70aeb5ea92c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:01.172 38 INFO tempest.lib.common.rest_client [req-01f69155-d206-4264-95ff-bfccde5fd0f8 ] Request (ImagesMemberRbacTest:test_update_image_member): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:02:01.173 38 DEBUG tempest.lib.common.rest_client [req-01f69155-d206-4264-95ff-bfccde5fd0f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-01f69155-d206-4264-95ff-bfccde5fd0f8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9a2878730d184150a67894aaba8107b5", "name": "tempest-ImagesMemberRbacTest-1618743830", "password_expires_at": null}, "audit_ids": ["bWWdkRL6Rb2teZXKoZdC9A"], "expires_at": "2020-11-06T19:02:01.000000Z", "issued_at": "2020-11-06T18:02:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a4cd9c52a26f49539cab00bf4c5af4e7", "name": "tempest-ImagesMemberRbacTest-1618743830"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a4cd9c52a26f49539cab00bf4c5af4e7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:01.175 40 INFO tempest.lib.common.rest_client [req-a464860d-7d47-41e3-a19c-adaa6d929f29 ] Request (PortsRbacTest:test_list_ports): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.030s 2020-11-06 18:02:01.176 40 DEBUG tempest.lib.common.rest_client [req-a464860d-7d47-41e3-a19c-adaa6d929f29 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a464860d-7d47-41e3-a19c-adaa6d929f29', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["zISm6q3uTpChyDaK-Q2hnQ"], "expires_at": "2020-11-06T19:02:01.000000Z", "issued_at": "2020-11-06T18:02:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:01.179 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:01.183 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:01.184 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:01.230 40 INFO tempest.lib.common.rest_client [req-485eb39b-a38b-452b-a118-cf6ebb0a2cfd ] Request (PortsRbacTest:test_show_port): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.046s 2020-11-06 18:02:01.231 40 DEBUG tempest.lib.common.rest_client [req-485eb39b-a38b-452b-a118-cf6ebb0a2cfd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-485eb39b-a38b-452b-a118-cf6ebb0a2cfd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:01.264 40 INFO tempest.lib.common.rest_client [req-d31d6b41-1fb6-44f0-8e7e-7bc757cc2ce0 ] Request (PortsRbacTest:test_show_port): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:02:01.264 40 DEBUG tempest.lib.common.rest_client [req-d31d6b41-1fb6-44f0-8e7e-7bc757cc2ce0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d31d6b41-1fb6-44f0-8e7e-7bc757cc2ce0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["F_m2OLP3Q2KPN4K-WR5OlA"], "expires_at": "2020-11-06T19:02:01.000000Z", "issued_at": "2020-11-06T18:02:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:01.306 38 INFO tempest.lib.common.rest_client [req-02258ae3-69d0-42b1-b689-dd11b7ee1086 ] Request (ImagesMemberRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/3a4d5d20-c995-4170-8f10-963468779324 0.130s 2020-11-06 18:02:01.307 38 DEBUG tempest.lib.common.rest_client [req-02258ae3-69d0-42b1-b689-dd11b7ee1086 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-02258ae3-69d0-42b1-b689-dd11b7ee1086', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/3a4d5d20-c995-4170-8f10-963468779324'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:01.323 38 INFO tempest.lib.common.rest_client [req-4f17b8be-2039-4879-8a39-0e5fc445c609 ] Request (ImagesMemberRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/3a4d5d20-c995-4170-8f10-963468779324 0.015s 2020-11-06 18:02:01.323 38 DEBUG tempest.lib.common.rest_client [req-4f17b8be-2039-4879-8a39-0e5fc445c609 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-4f17b8be-2039-4879-8a39-0e5fc445c609', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/3a4d5d20-c995-4170-8f10-963468779324'} Body: b'{"message": "No image found with ID 3a4d5d20-c995-4170-8f10-963468779324

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:01.373 40 INFO tempest.lib.common.rest_client [req-dd54dd20-b558-466c-b176-50ee23fdebba ] Request (PortsRbacTest:test_show_port): 200 GET http://172.30.13.94:9696/v2.0/ports/e218c7fc-d3dc-4c2c-9234-aa97d5412eb7 0.108s 2020-11-06 18:02:01.374 40 DEBUG tempest.lib.common.rest_client [req-dd54dd20-b558-466c-b176-50ee23fdebba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '1094', 'x-openstack-request-id': 'req-dd54dd20-b558-466c-b176-50ee23fdebba', 'date': 'Fri, 06 Nov 2020 18:02:01 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/e218c7fc-d3dc-4c2c-9234-aa97d5412eb7'} Body: b'{"port":{"id":"e218c7fc-d3dc-4c2c-9234-aa97d5412eb7","name":"tempest-PortsRbacTest-339006369","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:8a:69:9e","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.243"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.243","hostname":"host-192-168-120-243","fqdn":"host-192-168-120-243.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:01:42Z","updated_at":"2020-11-06T18:01:42Z","revision_number":1,"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:01.375 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:01.384 38 INFO tempest.lib.common.rest_client [req-a0b6e566-b683-4195-94bd-ba13aa9c0b6f ] Request (ImagesMemberRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/6dd1b127-29a2-4500-8fbe-d26c6a43dbdf 0.059s 2020-11-06 18:02:01.384 38 DEBUG tempest.lib.common.rest_client [req-a0b6e566-b683-4195-94bd-ba13aa9c0b6f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-a0b6e566-b683-4195-94bd-ba13aa9c0b6f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/6dd1b127-29a2-4500-8fbe-d26c6a43dbdf'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:01.402 38 INFO tempest.lib.common.rest_client [req-ceacc795-958a-4165-80a0-0757ae5cdd5c ] Request (ImagesMemberRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/6dd1b127-29a2-4500-8fbe-d26c6a43dbdf 0.017s 2020-11-06 18:02:01.402 38 DEBUG tempest.lib.common.rest_client [req-ceacc795-958a-4165-80a0-0757ae5cdd5c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-ceacc795-958a-4165-80a0-0757ae5cdd5c', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/6dd1b127-29a2-4500-8fbe-d26c6a43dbdf'} Body: b'{"message": "No image found with ID 6dd1b127-29a2-4500-8fbe-d26c6a43dbdf

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:01.432 40 INFO tempest.lib.common.rest_client [req-abbc39d7-2f7a-4f00-937f-94381745aaec ] Request (PortsRbacTest:test_show_port): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.057s 2020-11-06 18:02:01.433 40 DEBUG tempest.lib.common.rest_client [req-abbc39d7-2f7a-4f00-937f-94381745aaec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-abbc39d7-2f7a-4f00-937f-94381745aaec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:01.468 40 INFO tempest.lib.common.rest_client [req-9cd4939a-e328-45ae-9f81-e08de671e6b6 ] Request (PortsRbacTest:test_show_port): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:02:01.469 40 DEBUG tempest.lib.common.rest_client [req-9cd4939a-e328-45ae-9f81-e08de671e6b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9cd4939a-e328-45ae-9f81-e08de671e6b6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["vaIEWn64T7S-6JEnAKYY-Q"], "expires_at": "2020-11-06T19:02:01.000000Z", "issued_at": "2020-11-06T18:02:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:01.471 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:01.476 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:01.476 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:01.479 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port:binding:host_id, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:01.483 38 INFO tempest.lib.common.rest_client [req-9cc6311b-bdac-41cd-b8f5-1363bcd23d79 ] Request (ImagesMemberRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/292246e7-1253-49b4-b9e6-099b8267f31a 0.079s 2020-11-06 18:02:01.483 38 DEBUG tempest.lib.common.rest_client [req-9cc6311b-bdac-41cd-b8f5-1363bcd23d79 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-9cc6311b-bdac-41cd-b8f5-1363bcd23d79', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/292246e7-1253-49b4-b9e6-099b8267f31a'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:01.500 38 INFO tempest.lib.common.rest_client [req-0cc08463-8c93-432d-ba6c-8cfc5a078774 ] Request (ImagesMemberRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/292246e7-1253-49b4-b9e6-099b8267f31a 0.016s 2020-11-06 18:02:01.501 38 DEBUG tempest.lib.common.rest_client [req-0cc08463-8c93-432d-ba6c-8cfc5a078774 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-0cc08463-8c93-432d-ba6c-8cfc5a078774', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/292246e7-1253-49b4-b9e6-099b8267f31a'} Body: b'{"message": "No image found with ID 292246e7-1253-49b4-b9e6-099b8267f31a

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:01.561 38 INFO tempest.lib.common.rest_client [req-c420de29-bbd4-421a-b264-b325377e7bb2 ] Request (ImagesMemberRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/e23940c5-5c15-4ac6-83eb-7df1fbceb8f5 0.059s 2020-11-06 18:02:01.561 38 DEBUG tempest.lib.common.rest_client [req-c420de29-bbd4-421a-b264-b325377e7bb2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-c420de29-bbd4-421a-b264-b325377e7bb2', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/e23940c5-5c15-4ac6-83eb-7df1fbceb8f5'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:01.579 38 INFO tempest.lib.common.rest_client [req-d71b07c3-42fd-4059-9a1f-a29c401dd3a1 ] Request (ImagesMemberRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/e23940c5-5c15-4ac6-83eb-7df1fbceb8f5 0.017s 2020-11-06 18:02:01.580 38 DEBUG tempest.lib.common.rest_client [req-d71b07c3-42fd-4059-9a1f-a29c401dd3a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-d71b07c3-42fd-4059-9a1f-a29c401dd3a1', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/e23940c5-5c15-4ac6-83eb-7df1fbceb8f5'} Body: b'{"message": "No image found with ID e23940c5-5c15-4ac6-83eb-7df1fbceb8f5

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:01.643 38 INFO tempest.lib.common.rest_client [req-319c6d07-ee6f-4b8c-aecb-e3fcc1afa695 ] Request (ImagesMemberRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/96003ac3-22bb-40c5-ab05-6c4543bbb0dc 0.062s 2020-11-06 18:02:01.643 38 DEBUG tempest.lib.common.rest_client [req-319c6d07-ee6f-4b8c-aecb-e3fcc1afa695 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-319c6d07-ee6f-4b8c-aecb-e3fcc1afa695', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/96003ac3-22bb-40c5-ab05-6c4543bbb0dc'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:01.662 38 INFO tempest.lib.common.rest_client [req-0f6b7b45-be1c-44ed-812f-6830965a0505 ] Request (ImagesMemberRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/96003ac3-22bb-40c5-ab05-6c4543bbb0dc 0.018s 2020-11-06 18:02:01.662 38 DEBUG tempest.lib.common.rest_client [req-0f6b7b45-be1c-44ed-812f-6830965a0505 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-0f6b7b45-be1c-44ed-812f-6830965a0505', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/96003ac3-22bb-40c5-ab05-6c4543bbb0dc'} Body: b'{"message": "No image found with ID 96003ac3-22bb-40c5-ab05-6c4543bbb0dc

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:01.818 38 INFO tempest.lib.common.rest_client [req-31748280-3694-48e6-9d8c-2ac1953bfa71 ] Request (ImagesMemberRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/9a2878730d184150a67894aaba8107b5 0.155s 2020-11-06 18:02:01.819 38 DEBUG tempest.lib.common.rest_client [req-31748280-3694-48e6-9d8c-2ac1953bfa71 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-31748280-3694-48e6-9d8c-2ac1953bfa71', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/9a2878730d184150a67894aaba8107b5'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:01.898 38 INFO tempest.lib.common.rest_client [req-5dc101c3-b539-4c4a-9629-83b89fe030e0 ] Request (ImagesMemberRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-11-06 18:02:01.898 38 DEBUG tempest.lib.common.rest_client [req-5dc101c3-b539-4c4a-9629-83b89fe030e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5dc101c3-b539-4c4a-9629-83b89fe030e0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["rUmHyf09Rbu25v0pILg2Og"], "expires_at": "2020-11-06T19:02:01.000000Z", "issued_at": "2020-11-06T18:02:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:02.248 38 INFO tempest.lib.common.rest_client [req-1b5f4381-9219-49ed-9839-fc10418818fb ] Request (ImagesMemberRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=a4cd9c52a26f49539cab00bf4c5af4e7&name=default 0.348s 2020-11-06 18:02:02.249 38 DEBUG tempest.lib.common.rest_client [req-1b5f4381-9219-49ed-9839-fc10418818fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-1b5f4381-9219-49ed-9839-fc10418818fb', 'date': 'Fri, 06 Nov 2020 18:02:02 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=a4cd9c52a26f49539cab00bf4c5af4e7&name=default'} Body: b'{"security_groups": [{"id": "91c625aa-8d2b-4076-8270-089ee79bedd4", "name": "default", "stateful": true, "tenant_id": "a4cd9c52a26f49539cab00bf4c5af4e7", "description": "Default security group", "security_group_rules": [{"id": "064c5c9d-f524-4ed9-b503-5625b9c44627", "tenant_id": "a4cd9c52a26f49539cab00bf4c5af4e7", "security_group_id": "91c625aa-8d2b-4076-8270-089ee79bedd4", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "91c625aa-8d2b-4076-8270-089ee79bedd4", "description": null, "tags": [], "created_at": "2020-11-06T18:02:02Z", "updated_at": "2020-11-06T18:02:02Z", "revision_number": 0, "project_id": "a4cd9c52a26f49539cab00bf4c5af4e7"}, {"id": "57d900f2-1d96-435e-abdb-2ebf59c6d7b2", "tenant_id": "a4cd9c52a26f49539cab00bf4c5af4e7", "security_group_id": "91c625aa-8d2b-4076-8270-089ee79bedd4", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:02:02Z", "updated_at": "2020-11-06T18:02:02Z", "revision_number": 0, "project_id": "a4cd9c52a26f49539cab00bf4c5af4e7"}, {"id": "784046af-dd1e-4914-b883-bcd278eb6764", "tenant_id": "a4cd9c52a26f49539cab00bf4c5af4e7", "security_group_id": "91c625aa-8d2b-4076-8270-089ee79bedd4", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "91c625aa-8d2b-4076-8270-089ee79bedd4", "description": null, "tags": [], "created_at": "2020-11-06T18:02:02Z", "updated_at": "2020-11-06T18:02:02Z", "revision_number": 0, "project_id": "a4cd9c52a26f49539cab00bf4c5af4e7"}, {"id": "79383cb4-c038-461f-9e84-1ba2805957a6", "tenant_id": "a4cd9c52a26f49539cab00bf4c5af4e7", "security_group_id": "91c625aa-8d2b-4076-8270-089ee79bedd4", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:02:02Z", "updated_at": "2020-11-06T18:02:02Z", "revision_number": 0, "project_id": "a4cd9c52a26f49539cab00bf4c5af4e7"}], "tags": [], "created_at": "2020-11-06T18:02:02Z", "updated_at": "2020-11-06T18:02:02Z", "revision_number": 1, "project_id": "a4cd9c52a26f49539cab00bf4c5af4e7"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:02.353 37 INFO tempest.lib.common.rest_client [req-9ab0e727-c8b0-452e-8496-290b1296ff4a ] Request (ComputeServersRbacTest:test_delete_server): 200 GET http://172.30.13.94/compute/v2.1/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9 0.347s 2020-11-06 18:02:02.354 37 DEBUG tempest.lib.common.rest_client [req-9ab0e727-c8b0-452e-8496-290b1296ff4a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1719', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9ab0e727-c8b0-452e-8496-290b1296ff4a', 'x-compute-request-id': 'req-9ab0e727-c8b0-452e-8496-290b1296ff4a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9'} Body: b'{"server": {"id": "9657d9f5-7280-4ea5-999f-f296dffe42c9", "name": "tempest-ComputeServersRbacTest-server-354678351", "status": "ACTIVE", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "user_id": "262f98552a3a4d8a8fba3f96d5a872bf", "metadata": {}, "hostId": "72aa4147e128daa70511a3b03038cad49752a08b0327f6bc0c6decc0", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:01:53Z", "updated": "2020-11-06T18:02:00Z", "addresses": {"tempest-ComputeServersRbacTest-1143895587-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:3c:36:91"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:02:00.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033d1", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:02.354 39 INFO tempest.lib.common.rest_client [req-aaa466af-5fae-423a-a4ef-41b3577c8ed4 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.317s 2020-11-06 18:02:02.354 39 DEBUG tempest.lib.common.rest_client [req-aaa466af-5fae-423a-a4ef-41b3577c8ed4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-aaa466af-5fae-423a-a4ef-41b3577c8ed4', 'x-compute-request-id': 'req-aaa466af-5fae-423a-a4ef-41b3577c8ed4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:02.369 37 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 9 second wait 2020-11-06 18:02:02.370 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:02.374 38 INFO tempest.lib.common.rest_client [req-7fde5211-41fa-4df7-91b5-9b4f805f1208 ] Request (ImagesMemberRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/91c625aa-8d2b-4076-8270-089ee79bedd4 0.124s 2020-11-06 18:02:02.375 38 DEBUG tempest.lib.common.rest_client [req-7fde5211-41fa-4df7-91b5-9b4f805f1208 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-7fde5211-41fa-4df7-91b5-9b4f805f1208', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:02:02 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/91c625aa-8d2b-4076-8270-089ee79bedd4'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:02.430 37 INFO tempest.lib.common.rest_client [req-cc8d6fdb-661f-4010-92cf-b30221c72cf0 ] Request (ComputeServersRbacTest:test_delete_server): 200 GET http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles 0.059s 2020-11-06 18:02:02.430 37 DEBUG tempest.lib.common.rest_client [req-cc8d6fdb-661f-4010-92cf-b30221c72cf0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cc8d6fdb-661f-4010-92cf-b30221c72cf0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:02.517 37 INFO tempest.lib.common.rest_client [req-503a43e9-d31c-401b-9607-9519185615f8 ] Request (ComputeServersRbacTest:test_delete_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:02:02.518 37 DEBUG tempest.lib.common.rest_client [req-503a43e9-d31c-401b-9607-9519185615f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-503a43e9-d31c-401b-9607-9519185615f8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "262f98552a3a4d8a8fba3f96d5a872bf", "name": "tempest-ComputeServersRbacTest-1376603226", "password_expires_at": null}, "audit_ids": ["aTSYzfH-TgGORyvR-uEFrw"], "expires_at": "2020-11-06T19:02:02.000000Z", "issued_at": "2020-11-06T18:02:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "738a797d686c408e8ceb6a8b32bc1d09", "name": "tempest-ComputeServersRbacTest-1376603226"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:02.520 38 INFO tempest.lib.common.rest_client [req-4619a40e-76dc-43d0-8fcc-21bcc1fe566b ] Request (ImagesMemberRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7 0.144s 2020-11-06 18:02:02.520 38 DEBUG tempest.lib.common.rest_client [req-4619a40e-76dc-43d0-8fcc-21bcc1fe566b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4619a40e-76dc-43d0-8fcc-21bcc1fe566b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a4cd9c52a26f49539cab00bf4c5af4e7'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:02.686 38 INFO tempest.lib.common.rest_client [req-30e35d54-94a7-496b-90eb-8d102d7e2ff6 ] Request (ImagesMemberRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/62d2fea6b0d3405c9d63a19677898f49 0.165s 2020-11-06 18:02:02.687 38 DEBUG tempest.lib.common.rest_client [req-30e35d54-94a7-496b-90eb-8d102d7e2ff6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-30e35d54-94a7-496b-90eb-8d102d7e2ff6', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/62d2fea6b0d3405c9d63a19677898f49'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:02.824 38 INFO tempest.lib.common.rest_client [req-2e846182-c81a-4d58-9c23-4405c5bf9c84 ] Request (ImagesMemberRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=066fcc85b4b8416fbc84967133f75b9e&name=default 0.136s 2020-11-06 18:02:02.824 38 DEBUG tempest.lib.common.rest_client [req-2e846182-c81a-4d58-9c23-4405c5bf9c84 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-2e846182-c81a-4d58-9c23-4405c5bf9c84', 'date': 'Fri, 06 Nov 2020 18:02:02 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=066fcc85b4b8416fbc84967133f75b9e&name=default'} Body: b'{"security_groups": [{"id": "23ff1d2a-1e76-4db1-b767-5bd178c47081", "name": "default", "stateful": true, "tenant_id": "066fcc85b4b8416fbc84967133f75b9e", "description": "Default security group", "security_group_rules": [{"id": "0b5a7769-9b99-48c5-b965-29d31bed66dd", "tenant_id": "066fcc85b4b8416fbc84967133f75b9e", "security_group_id": "23ff1d2a-1e76-4db1-b767-5bd178c47081", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "23ff1d2a-1e76-4db1-b767-5bd178c47081", "description": null, "tags": [], "created_at": "2020-11-06T18:02:02Z", "updated_at": "2020-11-06T18:02:02Z", "revision_number": 0, "project_id": "066fcc85b4b8416fbc84967133f75b9e"}, {"id": "3ced7217-c667-461d-af24-6f510f0780a1", "tenant_id": "066fcc85b4b8416fbc84967133f75b9e", "security_group_id": "23ff1d2a-1e76-4db1-b767-5bd178c47081", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "23ff1d2a-1e76-4db1-b767-5bd178c47081", "description": null, "tags": [], "created_at": "2020-11-06T18:02:02Z", "updated_at": "2020-11-06T18:02:02Z", "revision_number": 0, "project_id": "066fcc85b4b8416fbc84967133f75b9e"}, {"id": "a6b7075a-0de8-460e-820c-2cb248ab2153", "tenant_id": "066fcc85b4b8416fbc84967133f75b9e", "security_group_id": "23ff1d2a-1e76-4db1-b767-5bd178c47081", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:02:02Z", "updated_at": "2020-11-06T18:02:02Z", "revision_number": 0, "project_id": "066fcc85b4b8416fbc84967133f75b9e"}, {"id": "d3f8bf97-69b7-457f-8930-5760732bae65", "tenant_id": "066fcc85b4b8416fbc84967133f75b9e", "security_group_id": "23ff1d2a-1e76-4db1-b767-5bd178c47081", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:02:02Z", "updated_at": "2020-11-06T18:02:02Z", "revision_number": 0, "project_id": "066fcc85b4b8416fbc84967133f75b9e"}], "tags": [], "created_at": "2020-11-06T18:02:02Z", "updated_at": "2020-11-06T18:02:02Z", "revision_number": 1, "project_id": "066fcc85b4b8416fbc84967133f75b9e"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:02.899 37 INFO tempest.lib.common.rest_client [req-7e68d662-984b-47e1-a348-3b6ae189c1fb ] Request (ComputeServersRbacTest:test_delete_server): 204 DELETE http://172.30.13.94/compute/v2.1/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9 0.379s 2020-11-06 18:02:02.899 37 DEBUG tempest.lib.common.rest_client [req-7e68d662-984b-47e1-a348-3b6ae189c1fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7e68d662-984b-47e1-a348-3b6ae189c1fb', 'x-compute-request-id': 'req-7e68d662-984b-47e1-a348-3b6ae189c1fb', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:02.900 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:02.935 38 INFO tempest.lib.common.rest_client [req-8638576a-1bea-4d22-8b94-80eab6108083 ] Request (ImagesMemberRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/23ff1d2a-1e76-4db1-b767-5bd178c47081 0.110s 2020-11-06 18:02:02.936 38 DEBUG tempest.lib.common.rest_client [req-8638576a-1bea-4d22-8b94-80eab6108083 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-8638576a-1bea-4d22-8b94-80eab6108083', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:02:02 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/23ff1d2a-1e76-4db1-b767-5bd178c47081'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:03.001 37 INFO tempest.lib.common.rest_client [req-07cf5be3-8032-436c-951e-a5da927f8e76 ] Request (ComputeServersRbacTest:test_delete_server): 200 GET http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles 0.100s 2020-11-06 18:02:03.002 37 DEBUG tempest.lib.common.rest_client [req-07cf5be3-8032-436c-951e-a5da927f8e76 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-07cf5be3-8032-436c-951e-a5da927f8e76', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:03.090 37 INFO tempest.lib.common.rest_client [req-2a364b64-0623-4f6d-87b8-cfbff24da96d ] Request (ComputeServersRbacTest:test_delete_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-11-06 18:02:03.090 37 DEBUG tempest.lib.common.rest_client [req-2a364b64-0623-4f6d-87b8-cfbff24da96d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2a364b64-0623-4f6d-87b8-cfbff24da96d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "262f98552a3a4d8a8fba3f96d5a872bf", "name": "tempest-ComputeServersRbacTest-1376603226", "password_expires_at": null}, "audit_ids": ["VsykyVidSHS02BOiOmBqZQ"], "expires_at": "2020-11-06T19:02:03.000000Z", "issued_at": "2020-11-06T18:02:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "738a797d686c408e8ceb6a8b32bc1d09", "name": "tempest-ComputeServersRbacTest-1376603226"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:03.115 38 INFO tempest.lib.common.rest_client [req-c427a64d-1c75-48c0-a334-40245f9e182a ] Request (ImagesMemberRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/066fcc85b4b8416fbc84967133f75b9e 0.179s 2020-11-06 18:02:03.116 38 DEBUG tempest.lib.common.rest_client [req-c427a64d-1c75-48c0-a334-40245f9e182a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c427a64d-1c75-48c0-a334-40245f9e182a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/066fcc85b4b8416fbc84967133f75b9e'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:03.211 38 INFO tempest.lib.common.rest_client [req-4df97047-e2f8-4563-abac-81ac2dc4bd4d ] Request (BasicOperationsImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-11-06 18:02:03.212 38 DEBUG tempest.lib.common.rest_client [req-4df97047-e2f8-4563-abac-81ac2dc4bd4d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4df97047-e2f8-4563-abac-81ac2dc4bd4d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["JW5pM1HxTXGNMM17lunVqg"], "expires_at": "2020-11-06T19:02:03.000000Z", "issued_at": "2020-11-06T18:02:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:03.257 38 INFO tempest.lib.common.rest_client [req-890d61ad-d0d0-489c-af94-e468ee4a6f31 ] Request (BasicOperationsImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:02:03.257 38 DEBUG tempest.lib.common.rest_client [req-890d61ad-d0d0-489c-af94-e468ee4a6f31 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-890d61ad-d0d0-489c-af94-e468ee4a6f31', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["YSw8udROQueNKk7F4uxfLA"], "expires_at": "2020-11-06T19:02:03.000000Z", "issued_at": "2020-11-06T18:02:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:03.286 40 INFO tempest.lib.common.rest_client [req-a7f85910-815a-44ce-8007-d4454be72625 ] Request (PortsRbacTest:test_show_port_binding_host_id): 201 POST http://172.30.13.94:9696/v2.0/ports 1.807s 2020-11-06 18:02:03.287 40 DEBUG tempest.lib.common.rest_client [req-a7f85910-815a-44ce-8007-d4454be72625 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "586884b2-4363-4597-acb0-ddbc49908b65", "binding:host_id": "tempest-host-id-549629504", "name": "tempest-PortsRbacTest-408391140"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1126', 'x-openstack-request-id': 'req-a7f85910-815a-44ce-8007-d4454be72625', 'date': 'Fri, 06 Nov 2020 18:02:03 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"e7a04276-026d-4302-adc0-e50810d5c736","name":"tempest-PortsRbacTest-408391140","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:8d:fc:ab","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.119"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"tempest-host-id-549629504","binding:vif_type":"binding_failed","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.119","hostname":"host-192-168-120-119","fqdn":"host-192-168-120-119.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:02:01Z","updated_at":"2020-11-06T18:02:02Z","revision_number":1,"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:03.288 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:03.308 38 INFO tempest.lib.common.rest_client [req-f90d9d59-440c-40ec-b89e-715c0ff6d216 ] Request (BasicOperationsImagesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.049s 2020-11-06 18:02:03.308 38 DEBUG tempest.lib.common.rest_client [req-f90d9d59-440c-40ec-b89e-715c0ff6d216 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f90d9d59-440c-40ec-b89e-715c0ff6d216', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:03.351 40 INFO tempest.lib.common.rest_client [req-14488e32-8b3f-4501-8665-1797079fe5d7 ] Request (PortsRbacTest:test_show_port_binding_host_id): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.062s 2020-11-06 18:02:03.352 40 DEBUG tempest.lib.common.rest_client [req-14488e32-8b3f-4501-8665-1797079fe5d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-14488e32-8b3f-4501-8665-1797079fe5d7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:03.378 38 INFO tempest.lib.common.rest_client [req-3f11138a-1a3c-4c25-b686-9d35ba0190f7 ] Request (BasicOperationsImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.069s 2020-11-06 18:02:03.379 38 DEBUG tempest.lib.common.rest_client [req-3f11138a-1a3c-4c25-b686-9d35ba0190f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-BasicOperationsImagesRbacTest-335924360-desc", "domain_id": "default", "name": "tempest-BasicOperationsImagesRbacTest-335924360"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '394', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3f11138a-1a3c-4c25-b686-9d35ba0190f7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "62aad203ff2a47c9a1e41ff9c7c69b5f", "name": "tempest-BasicOperationsImagesRbacTest-335924360", "domain_id": "default", "description": "tempest-BasicOperationsImagesRbacTest-335924360-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:03.442 40 INFO tempest.lib.common.rest_client [req-7fd3133a-16fb-4b73-8b70-538137d364c0 ] Request (PortsRbacTest:test_show_port_binding_host_id): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 18:02:03.443 40 DEBUG tempest.lib.common.rest_client [req-7fd3133a-16fb-4b73-8b70-538137d364c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7fd3133a-16fb-4b73-8b70-538137d364c0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["GqBr5pSPTHCHiyh4KEzUbA"], "expires_at": "2020-11-06T19:02:03.000000Z", "issued_at": "2020-11-06T18:02:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:03.481 38 INFO tempest.lib.common.rest_client [req-087473bb-dc3a-4e80-b3a8-d78791c94805 ] Request (BasicOperationsImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.101s 2020-11-06 18:02:03.482 38 DEBUG tempest.lib.common.rest_client [req-087473bb-dc3a-4e80-b3a8-d78791c94805 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-BasicOperationsImagesRbacTest-335924360", "password": "K9%K+ev*obEKJR_", "project_id": "62aad203ff2a47c9a1e41ff9c7c69b5f", "email": "tempest-BasicOperationsImagesRbacTest-356631395@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-087473bb-dc3a-4e80-b3a8-d78791c94805', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "62aad203ff2a47c9a1e41ff9c7c69b5f", "email": "tempest-BasicOperationsImagesRbacTest-356631395@example.com", "id": "f423e6d7a5aa4cd79bba74f653d7bcc4", "name": "tempest-BasicOperationsImagesRbacTest-335924360", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/f423e6d7a5aa4cd79bba74f653d7bcc4"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:03.523 37 INFO tempest.lib.common.rest_client [req-f42370be-a52f-4b81-a696-cba35fc8b662 ] Request (ComputeServersRbacTest:test_delete_server): 200 GET http://172.30.13.94/compute/v2.1/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9 0.431s 2020-11-06 18:02:03.524 37 DEBUG tempest.lib.common.rest_client [req-f42370be-a52f-4b81-a696-cba35fc8b662 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1725', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f42370be-a52f-4b81-a696-cba35fc8b662', 'x-compute-request-id': 'req-f42370be-a52f-4b81-a696-cba35fc8b662', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9'} Body: b'{"server": {"id": "9657d9f5-7280-4ea5-999f-f296dffe42c9", "name": "tempest-ComputeServersRbacTest-server-354678351", "status": "ACTIVE", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "user_id": "262f98552a3a4d8a8fba3f96d5a872bf", "metadata": {}, "hostId": "72aa4147e128daa70511a3b03038cad49752a08b0327f6bc0c6decc0", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:01:53Z", "updated": "2020-11-06T18:02:03Z", "addresses": {"tempest-ComputeServersRbacTest-1143895587-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:3c:36:91"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:02:00.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033d1", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:03.541 38 INFO tempest.lib.common.rest_client [req-4de9e943-e6be-4855-94ce-c9a007eced09 ] Request (BasicOperationsImagesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.058s 2020-11-06 18:02:03.541 38 DEBUG tempest.lib.common.rest_client [req-4de9e943-e6be-4855-94ce-c9a007eced09 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4de9e943-e6be-4855-94ce-c9a007eced09', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:03.597 38 INFO tempest.lib.common.rest_client [req-092d68be-c821-4f6a-8ec0-7f26b1134396 ] Request (BasicOperationsImagesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.054s 2020-11-06 18:02:03.597 38 DEBUG tempest.lib.common.rest_client [req-092d68be-c821-4f6a-8ec0-7f26b1134396 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-092d68be-c821-4f6a-8ec0-7f26b1134396', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:03.608 39 INFO tempest.lib.common.rest_client [req-d205f966-4710-42d6-a433-8bfa762f1ca9 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.236s 2020-11-06 18:02:03.608 39 DEBUG tempest.lib.common.rest_client [req-d205f966-4710-42d6-a433-8bfa762f1ca9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d205f966-4710-42d6-a433-8bfa762f1ca9', 'x-compute-request-id': 'req-d205f966-4710-42d6-a433-8bfa762f1ca9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:03.661 38 INFO tempest.lib.common.rest_client [req-223e13f3-8785-4b99-9664-4f0715c9b025 ] Request (BasicOperationsImagesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles/72a4576c553448cd941b052c1ca0cf2d 0.062s 2020-11-06 18:02:03.661 38 DEBUG tempest.lib.common.rest_client [req-223e13f3-8785-4b99-9664-4f0715c9b025 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-223e13f3-8785-4b99-9664-4f0715c9b025', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:03.662 38 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-BasicOperationsImagesRbacTest-335924360', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '62aad203ff2a47c9a1e41ff9c7c69b5f', 'project_name': 'tempest-BasicOperationsImagesRbacTest-335924360', 'tenant_id': '62aad203ff2a47c9a1e41ff9c7c69b5f', 'tenant_name': 'tempest-BasicOperationsImagesRbacTest-335924360', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'f423e6d7a5aa4cd79bba74f653d7bcc4'}, Network: None, Subnet: None, Router: None 2020-11-06 18:02:03.662 38 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-BasicOperationsImagesRbacTest-335924360', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '62aad203ff2a47c9a1e41ff9c7c69b5f', 'project_name': 'tempest-BasicOperationsImagesRbacTest-335924360', 'tenant_id': '62aad203ff2a47c9a1e41ff9c7c69b5f', 'tenant_name': 'tempest-BasicOperationsImagesRbacTest-335924360', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'f423e6d7a5aa4cd79bba74f653d7bcc4'}, Network: None, Subnet: None, Router: None 2020-11-06 18:02:03.665 40 INFO tempest.lib.common.rest_client [req-eba98cb2-7c91-4342-b343-14d6467b0c54 ] Request (PortsRbacTest:test_show_port_binding_host_id): 200 GET http://172.30.13.94:9696/v2.0/ports/e7a04276-026d-4302-adc0-e50810d5c736?fields=binding%3Ahost_id 0.221s 2020-11-06 18:02:03.666 40 DEBUG tempest.lib.common.rest_client [req-eba98cb2-7c91-4342-b343-14d6467b0c54 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '56', 'x-openstack-request-id': 'req-eba98cb2-7c91-4342-b343-14d6467b0c54', 'date': 'Fri, 06 Nov 2020 18:02:03 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/e7a04276-026d-4302-adc0-e50810d5c736?fields=binding%3Ahost_id'} Body: b'{"port":{"binding:host_id":"tempest-host-id-549629504"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:03.666 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:03.771 40 INFO tempest.lib.common.rest_client [req-11f190bb-d17b-4b7f-8715-d45a8d0b7dd5 ] Request (PortsRbacTest:test_show_port_binding_host_id): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.103s 2020-11-06 18:02:03.771 40 DEBUG tempest.lib.common.rest_client [req-11f190bb-d17b-4b7f-8715-d45a8d0b7dd5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-11f190bb-d17b-4b7f-8715-d45a8d0b7dd5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:03.776 38 INFO tempest.lib.common.rest_client [req-bd8b2eda-ee1a-4b91-ae29-59b9683e3971 ] Request (BasicOperationsImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.102s 2020-11-06 18:02:03.776 38 DEBUG tempest.lib.common.rest_client [req-bd8b2eda-ee1a-4b91-ae29-59b9683e3971 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6587', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bd8b2eda-ee1a-4b91-ae29-59b9683e3971', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f423e6d7a5aa4cd79bba74f653d7bcc4", "name": "tempest-BasicOperationsImagesRbacTest-335924360", "password_expires_at": null}, "audit_ids": ["Fn86KdJVRt65PBY6YVwkUA"], "expires_at": "2020-11-06T19:02:03.000000Z", "issued_at": "2020-11-06T18:02:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62aad203ff2a47c9a1e41ff9c7c69b5f", "name": "tempest-BasicOperationsImagesRbacTest-335924360"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "u _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:03.813 38 INFO tempest.lib.common.rest_client [req-263bba7e-f202-4e45-ab3c-485bc5c53e5b ] Request (BasicOperationsImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:02:03.813 38 DEBUG tempest.lib.common.rest_client [req-263bba7e-f202-4e45-ab3c-485bc5c53e5b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-263bba7e-f202-4e45-ab3c-485bc5c53e5b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["yyqyTUruQAuN6avZ6bNXvQ"], "expires_at": "2020-11-06T19:02:03.000000Z", "issued_at": "2020-11-06T18:02:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:03.857 40 INFO tempest.lib.common.rest_client [req-8f6e14d0-c438-4371-ac8b-b3810f835b42 ] Request (PortsRbacTest:test_show_port_binding_host_id): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:02:03.857 40 DEBUG tempest.lib.common.rest_client [req-8f6e14d0-c438-4371-ac8b-b3810f835b42 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8f6e14d0-c438-4371-ac8b-b3810f835b42', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["thBzm5LHRYyjsjQeBdw31g"], "expires_at": "2020-11-06T19:02:03.000000Z", "issued_at": "2020-11-06T18:02:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:03.860 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:03.863 38 INFO tempest.lib.common.rest_client [req-2eb4004a-8f64-44c1-9bb5-f1162737bc7f ] Request (BasicOperationsImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:02:03.864 38 DEBUG tempest.lib.common.rest_client [req-2eb4004a-8f64-44c1-9bb5-f1162737bc7f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2eb4004a-8f64-44c1-9bb5-f1162737bc7f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["SnJe56OqSgqt578VY7t60g"], "expires_at": "2020-11-06T19:02:03.000000Z", "issued_at": "2020-11-06T18:02:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:03.865 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:03.866 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:03.869 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port:binding:profile, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:03.921 38 INFO tempest.lib.common.rest_client [req-1c008ebe-ffc9-4dba-a8c4-97f4cb9f7400 ] Request (BasicOperationsImagesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.056s 2020-11-06 18:02:03.921 38 DEBUG tempest.lib.common.rest_client [req-1c008ebe-ffc9-4dba-a8c4-97f4cb9f7400 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1c008ebe-ffc9-4dba-a8c4-97f4cb9f7400', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:03.968 38 INFO tempest.lib.common.rest_client [req-8e3dec67-fef6-41dd-b375-3e6508d67847 ] Request (BasicOperationsImagesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.046s 2020-11-06 18:02:03.968 38 DEBUG tempest.lib.common.rest_client [req-8e3dec67-fef6-41dd-b375-3e6508d67847 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8e3dec67-fef6-41dd-b375-3e6508d67847', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:03.969 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:02:03.970 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:04.019 38 INFO tempest.lib.common.rest_client [req-b8abfce2-f3ef-4afa-8bd1-8b80b184476a ] Request (BasicOperationsImagesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles 0.049s 2020-11-06 18:02:04.020 38 DEBUG tempest.lib.common.rest_client [req-b8abfce2-f3ef-4afa-8bd1-8b80b184476a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b8abfce2-f3ef-4afa-8bd1-8b80b184476a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:04.087 38 INFO tempest.lib.common.rest_client [req-6a157cab-ed12-4954-a406-1e9f822e84d1 ] Request (BasicOperationsImagesRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles/72a4576c553448cd941b052c1ca0cf2d 0.066s 2020-11-06 18:02:04.087 38 DEBUG tempest.lib.common.rest_client [req-6a157cab-ed12-4954-a406-1e9f822e84d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6a157cab-ed12-4954-a406-1e9f822e84d1', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:04.192 38 INFO tempest.lib.common.rest_client [req-eb6e64af-fd15-4429-b338-bb5eb593bc26 ] Request (BasicOperationsImagesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles/a629c95d64b3416fb80ae90af4f69c05 0.104s 2020-11-06 18:02:04.193 38 DEBUG tempest.lib.common.rest_client [req-eb6e64af-fd15-4429-b338-bb5eb593bc26 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eb6e64af-fd15-4429-b338-bb5eb593bc26', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:04.675 37 INFO tempest.lib.common.rest_client [req-585fc895-0710-46d4-8ffd-1a6a841287b4 ] Request (ComputeServersRbacTest:test_delete_server): 200 GET http://172.30.13.94/compute/v2.1/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9 0.133s 2020-11-06 18:02:04.675 37 DEBUG tempest.lib.common.rest_client [req-585fc895-0710-46d4-8ffd-1a6a841287b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1518', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-585fc895-0710-46d4-8ffd-1a6a841287b4', 'x-compute-request-id': 'req-585fc895-0710-46d4-8ffd-1a6a841287b4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9'} Body: b'{"server": {"id": "9657d9f5-7280-4ea5-999f-f296dffe42c9", "name": "tempest-ComputeServersRbacTest-server-354678351", "status": "DELETED", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "user_id": "262f98552a3a4d8a8fba3f96d5a872bf", "metadata": {}, "hostId": "72aa4147e128daa70511a3b03038cad49752a08b0327f6bc0c6decc0", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:01:53Z", "updated": "2020-11-06T18:02:05Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:02:00.000000", "OS-SRV-USG:terminated_at": "2020-11-06T18:02:04.000000", "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033d1", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "deleted", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:04.691 37 INFO tempest.common.waiters [-] State transition "ACTIVE/deleting" ==> "DELETED/None" after 1 second wait 2020-11-06 18:02:04.804 39 INFO tempest.lib.common.rest_client [req-b434712e-090d-4fde-aa23-56cbb909a547 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.183s 2020-11-06 18:02:04.804 39 DEBUG tempest.lib.common.rest_client [req-b434712e-090d-4fde-aa23-56cbb909a547 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b434712e-090d-4fde-aa23-56cbb909a547', 'x-compute-request-id': 'req-b434712e-090d-4fde-aa23-56cbb909a547', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:04.832 40 INFO tempest.lib.common.rest_client [req-7bbadd38-ba58-4112-b8b4-2a5399459c23 ] Request (PortsRbacTest:test_show_port_binding_profile): 201 POST http://172.30.13.94:9696/v2.0/ports 0.962s 2020-11-06 18:02:04.833 40 DEBUG tempest.lib.common.rest_client [req-7bbadd38-ba58-4112-b8b4-2a5399459c23 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "586884b2-4363-4597-acb0-ddbc49908b65", "binding:profile": {"foo": "1"}, "name": "tempest-PortsRbacTest-1908306902"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1104', 'x-openstack-request-id': 'req-7bbadd38-ba58-4112-b8b4-2a5399459c23', 'date': 'Fri, 06 Nov 2020 18:02:04 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"8cf8492c-2005-4dec-bb6f-15ac0f538c4f","name":"tempest-PortsRbacTest-1908306902","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:59:8a:8d","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.163"}],"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","port_security_enabled":true,"qos_policy_id":null,"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"binding:vnic_type":"normal","binding:profile":{"foo":"1"},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"allowed_address_pairs":[],"extra_dhcp_opts":[],"description":"","qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.163","hostname":"host-192-168-120-163","fqdn":"host-192-168-120-163.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:02:04Z","updated_at":"2020-11-06T18:02:04Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:04.833 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:04.928 40 INFO tempest.lib.common.rest_client [req-bf268bcf-4246-46e4-9bb4-44f55836a708 ] Request (PortsRbacTest:test_show_port_binding_profile): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.094s 2020-11-06 18:02:04.929 40 DEBUG tempest.lib.common.rest_client [req-bf268bcf-4246-46e4-9bb4-44f55836a708 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bf268bcf-4246-46e4-9bb4-44f55836a708', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:05.008 40 INFO tempest.lib.common.rest_client [req-cdd411fe-cb60-4624-9860-56759af1ae0f ] Request (PortsRbacTest:test_show_port_binding_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-11-06 18:02:05.009 40 DEBUG tempest.lib.common.rest_client [req-cdd411fe-cb60-4624-9860-56759af1ae0f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cdd411fe-cb60-4624-9860-56759af1ae0f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["0I9v8IQ_QqilttDlvAxcUg"], "expires_at": "2020-11-06T19:02:04.000000Z", "issued_at": "2020-11-06T18:02:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:05.139 40 INFO tempest.lib.common.rest_client [req-0cf98cab-3d32-4729-b873-4cf222d3d64c ] Request (PortsRbacTest:test_show_port_binding_profile): 200 GET http://172.30.13.94:9696/v2.0/ports/8cf8492c-2005-4dec-bb6f-15ac0f538c4f?fields=binding%3Aprofile 0.129s 2020-11-06 18:02:05.139 40 DEBUG tempest.lib.common.rest_client [req-0cf98cab-3d32-4729-b873-4cf222d3d64c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '40', 'x-openstack-request-id': 'req-0cf98cab-3d32-4729-b873-4cf222d3d64c', 'date': 'Fri, 06 Nov 2020 18:02:05 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/8cf8492c-2005-4dec-bb6f-15ac0f538c4f?fields=binding%3Aprofile'} Body: b'{"port":{"binding:profile":{"foo":"1"}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:05.140 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:05.191 40 INFO tempest.lib.common.rest_client [req-afc15702-8b59-42c3-b162-a0aee77be6b5 ] Request (PortsRbacTest:test_show_port_binding_profile): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.050s 2020-11-06 18:02:05.192 40 DEBUG tempest.lib.common.rest_client [req-afc15702-8b59-42c3-b162-a0aee77be6b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-afc15702-8b59-42c3-b162-a0aee77be6b5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:05.224 40 INFO tempest.lib.common.rest_client [req-db1ec5cd-256c-4b08-a063-c7c4203e986e ] Request (PortsRbacTest:test_show_port_binding_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:02:05.224 40 DEBUG tempest.lib.common.rest_client [req-db1ec5cd-256c-4b08-a063-c7c4203e986e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-db1ec5cd-256c-4b08-a063-c7c4203e986e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["_h6ODgGGSZKK5luReeiJLg"], "expires_at": "2020-11-06T19:02:05.000000Z", "issued_at": "2020-11-06T18:02:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:05.227 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:05.231 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:05.231 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:05.233 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port:binding:vif_details, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:05.233 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:05.277 40 INFO tempest.lib.common.rest_client [req-34716761-e23d-4c7a-b57d-c76322502ed0 ] Request (PortsRbacTest:test_show_port_binding_vif_details): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.043s 2020-11-06 18:02:05.278 40 DEBUG tempest.lib.common.rest_client [req-34716761-e23d-4c7a-b57d-c76322502ed0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-34716761-e23d-4c7a-b57d-c76322502ed0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:05.280 38 INFO tempest.lib.common.rest_client [req-9ab5aaba-21b9-4c52-83ca-ffc0e98cb7af ] Request (BasicOperationsImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-11-06 18:02:05.281 38 DEBUG tempest.lib.common.rest_client [req-9ab5aaba-21b9-4c52-83ca-ffc0e98cb7af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9ab5aaba-21b9-4c52-83ca-ffc0e98cb7af', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f423e6d7a5aa4cd79bba74f653d7bcc4", "name": "tempest-BasicOperationsImagesRbacTest-335924360", "password_expires_at": null}, "audit_ids": ["Il1v2SjYSmCetbxQzNAczQ"], "expires_at": "2020-11-06T19:02:05.000000Z", "issued_at": "2020-11-06T18:02:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62aad203ff2a47c9a1e41ff9c7c69b5f", "name": "tempest-BasicOperationsImagesRbacTest-335924360"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:05.283 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:05.284 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.286 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: communitize_image, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:05.286 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:05.308 40 INFO tempest.lib.common.rest_client [req-2084466f-3612-4501-8239-204d7eb55422 ] Request (PortsRbacTest:test_show_port_binding_vif_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.029s 2020-11-06 18:02:05.308 40 DEBUG tempest.lib.common.rest_client [req-2084466f-3612-4501-8239-204d7eb55422 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2084466f-3612-4501-8239-204d7eb55422', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["mVMiQR_iRbSha4NUSM2bLw"], "expires_at": "2020-11-06T19:02:05.000000Z", "issued_at": "2020-11-06T18:02:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:05.358 38 INFO tempest.lib.common.rest_client [req-f5c6f439-56e8-4b85-a71a-dbe9972ce1b8 ] Request (BasicOperationsImagesRbacTest:test_communitize_image): 200 GET http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles 0.071s 2020-11-06 18:02:05.359 38 DEBUG tempest.lib.common.rest_client [req-f5c6f439-56e8-4b85-a71a-dbe9972ce1b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f5c6f439-56e8-4b85-a71a-dbe9972ce1b8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:05.393 38 INFO tempest.lib.common.rest_client [req-9ab6cc5b-8bfb-4aa0-ab17-2b456e4a2cb7 ] Request (BasicOperationsImagesRbacTest:test_communitize_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:02:05.393 38 DEBUG tempest.lib.common.rest_client [req-9ab6cc5b-8bfb-4aa0-ab17-2b456e4a2cb7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9ab6cc5b-8bfb-4aa0-ab17-2b456e4a2cb7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f423e6d7a5aa4cd79bba74f653d7bcc4", "name": "tempest-BasicOperationsImagesRbacTest-335924360", "password_expires_at": null}, "audit_ids": ["X5IIPvuqQ5i-qJdaQE-nNg"], "expires_at": "2020-11-06T19:02:05.000000Z", "issued_at": "2020-11-06T18:02:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62aad203ff2a47c9a1e41ff9c7c69b5f", "name": "tempest-BasicOperationsImagesRbacTest-335924360"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:05.444 40 INFO tempest.lib.common.rest_client [req-c6ef1b52-2518-4373-bd28-fb7213d01e8d ] Request (PortsRbacTest:test_show_port_binding_vif_details): 200 GET http://172.30.13.94:9696/v2.0/ports/e218c7fc-d3dc-4c2c-9234-aa97d5412eb7?fields=binding%3Avif_details 0.134s 2020-11-06 18:02:05.444 40 DEBUG tempest.lib.common.rest_client [req-c6ef1b52-2518-4373-bd28-fb7213d01e8d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '35', 'x-openstack-request-id': 'req-c6ef1b52-2518-4373-bd28-fb7213d01e8d', 'date': 'Fri, 06 Nov 2020 18:02:05 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/e218c7fc-d3dc-4c2c-9234-aa97d5412eb7?fields=binding%3Avif_details'} Body: b'{"port":{"binding:vif_details":{}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:05.444 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:05.493 40 INFO tempest.lib.common.rest_client [req-4732313e-02ee-4343-8ebe-ee7494cf894c ] Request (PortsRbacTest:test_show_port_binding_vif_details): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.048s 2020-11-06 18:02:05.494 40 DEBUG tempest.lib.common.rest_client [req-4732313e-02ee-4343-8ebe-ee7494cf894c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4732313e-02ee-4343-8ebe-ee7494cf894c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:05.527 40 INFO tempest.lib.common.rest_client [req-ec8bc095-8e63-4cab-9e54-88b499d1fa34 ] Request (PortsRbacTest:test_show_port_binding_vif_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:02:05.528 40 DEBUG tempest.lib.common.rest_client [req-ec8bc095-8e63-4cab-9e54-88b499d1fa34 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ec8bc095-8e63-4cab-9e54-88b499d1fa34', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["XMyDZFzQQCGuoDakkXZtXQ"], "expires_at": "2020-11-06T19:02:05.000000Z", "issued_at": "2020-11-06T18:02:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:05.531 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:05.535 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:05.535 38 INFO tempest.lib.common.rest_client [req-c14e1fc8-1a87-4106-9d0b-5c0d3740f0b4 ] Request (BasicOperationsImagesRbacTest:test_communitize_image): 201 POST http://172.30.13.94/image/v2/images 0.140s 2020-11-06 18:02:05.535 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:05.536 38 DEBUG tempest.lib.common.rest_client [req-c14e1fc8-1a87-4106-9d0b-5c0d3740f0b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-BasicOperationsImagesRbacTest-Image-544919587", "container_format": "bare", "disk_format": "raw", "visibility": "community"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '663', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/ce39cd1c-f379-477f-aa69-d541c3dfb666', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-c14e1fc8-1a87-4106-9d0b-5c0d3740f0b4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-BasicOperationsImagesRbacTest-Image-544919587", "disk_format": "raw", "container_format": "bare", "visibility": "community", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "62aad203ff2a47c9a1e41ff9c7c69b5f", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "ce39cd1c-f379-477f-aa69-d541c3dfb666", "created_at": "2020-11-06T18:02:06Z", "updated_at": "2020-11-06T18:02:06Z", "tags": [], "self": "/v2/images/ce39cd1c-f379-477f-aa69-d541c3dfb666", "file": "/v2/images/ce39cd1c-f379-477f-aa69-d541c3dfb666/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:05.536 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:05.539 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port:binding:vif_type, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:05.540 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:05.585 38 INFO tempest.lib.common.rest_client [req-21bec226-ec2e-4006-aff8-66a9c5140546 ] Request (BasicOperationsImagesRbacTest:test_communitize_image): 200 GET http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles 0.048s 2020-11-06 18:02:05.586 40 INFO tempest.lib.common.rest_client [req-92982a0a-0c7c-4ba8-b593-285e2e51f17a ] Request (PortsRbacTest:test_show_port_binding_vif_type): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.045s 2020-11-06 18:02:05.586 38 DEBUG tempest.lib.common.rest_client [req-21bec226-ec2e-4006-aff8-66a9c5140546 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-21bec226-ec2e-4006-aff8-66a9c5140546', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:05.586 40 DEBUG tempest.lib.common.rest_client [req-92982a0a-0c7c-4ba8-b593-285e2e51f17a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-92982a0a-0c7c-4ba8-b593-285e2e51f17a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:05.618 40 INFO tempest.lib.common.rest_client [req-7afdbdce-cca8-4ae8-b180-4962c4af10af ] Request (PortsRbacTest:test_show_port_binding_vif_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:02:05.619 40 DEBUG tempest.lib.common.rest_client [req-7afdbdce-cca8-4ae8-b180-4962c4af10af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7afdbdce-cca8-4ae8-b180-4962c4af10af', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["cXCRANpbSH-CTrTBSkWpUg"], "expires_at": "2020-11-06T19:02:05.000000Z", "issued_at": "2020-11-06T18:02:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:05.619 38 INFO tempest.lib.common.rest_client [req-07c7ccac-6f02-4103-848f-1aad814a620e ] Request (BasicOperationsImagesRbacTest:test_communitize_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:02:05.620 38 DEBUG tempest.lib.common.rest_client [req-07c7ccac-6f02-4103-848f-1aad814a620e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-07c7ccac-6f02-4103-848f-1aad814a620e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f423e6d7a5aa4cd79bba74f653d7bcc4", "name": "tempest-BasicOperationsImagesRbacTest-335924360", "password_expires_at": null}, "audit_ids": ["tMHNfNq3SK2km4Ya13XMyQ"], "expires_at": "2020-11-06T19:02:05.000000Z", "issued_at": "2020-11-06T18:02:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62aad203ff2a47c9a1e41ff9c7c69b5f", "name": "tempest-BasicOperationsImagesRbacTest-335924360"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:05.623 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:05.623 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.625 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: add_image, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:05.625 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:05.681 38 INFO tempest.lib.common.rest_client [req-821330a9-28d7-470f-9968-024e0866884b ] Request (BasicOperationsImagesRbacTest:test_create_image): 200 GET http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles 0.055s 2020-11-06 18:02:05.682 38 DEBUG tempest.lib.common.rest_client [req-821330a9-28d7-470f-9968-024e0866884b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-821330a9-28d7-470f-9968-024e0866884b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:05.718 38 INFO tempest.lib.common.rest_client [req-c57e41a2-74fc-43e3-a516-be07812af459 ] Request (BasicOperationsImagesRbacTest:test_create_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:02:05.719 38 DEBUG tempest.lib.common.rest_client [req-c57e41a2-74fc-43e3-a516-be07812af459 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c57e41a2-74fc-43e3-a516-be07812af459', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f423e6d7a5aa4cd79bba74f653d7bcc4", "name": "tempest-BasicOperationsImagesRbacTest-335924360", "password_expires_at": null}, "audit_ids": ["mQynf98JTEykmtxnRCABxw"], "expires_at": "2020-11-06T19:02:05.000000Z", "issued_at": "2020-11-06T18:02:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62aad203ff2a47c9a1e41ff9c7c69b5f", "name": "tempest-BasicOperationsImagesRbacTest-335924360"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:05.761 40 INFO tempest.lib.common.rest_client [req-9181dc15-b2b3-4ed9-9a64-0c737f394cf8 ] Request (PortsRbacTest:test_show_port_binding_vif_type): 200 GET http://172.30.13.94:9696/v2.0/ports/e218c7fc-d3dc-4c2c-9234-aa97d5412eb7?fields=binding%3Avif_type 0.141s 2020-11-06 18:02:05.762 40 DEBUG tempest.lib.common.rest_client [req-9181dc15-b2b3-4ed9-9a64-0c737f394cf8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '39', 'x-openstack-request-id': 'req-9181dc15-b2b3-4ed9-9a64-0c737f394cf8', 'date': 'Fri, 06 Nov 2020 18:02:05 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/e218c7fc-d3dc-4c2c-9234-aa97d5412eb7?fields=binding%3Avif_type'} Body: b'{"port":{"binding:vif_type":"unbound"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:05.763 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:05.765 37 INFO tempest.lib.common.rest_client [req-fd47c8d4-1bf7-446e-a2af-23f1f89e09f0 ] Request (ComputeServersRbacTest:test_delete_server): 404 GET http://172.30.13.94/compute/v2.1/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9 0.072s 2020-11-06 18:02:05.766 37 DEBUG tempest.lib.common.rest_client [req-fd47c8d4-1bf7-446e-a2af-23f1f89e09f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-fd47c8d4-1bf7-446e-a2af-23f1f89e09f0', 'x-compute-request-id': 'req-fd47c8d4-1bf7-446e-a2af-23f1f89e09f0', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 9657d9f5-7280-4ea5-999f-f296dffe42c9 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:05.774 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:05.774 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.775 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.775 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.776 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.776 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.776 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.777 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.777 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.777 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.778 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.778 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.778 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.779 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.779 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.779 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.779 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.780 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.780 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.780 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.781 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.781 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.781 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.782 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.782 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.782 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.782 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.783 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.783 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.783 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.784 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.784 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.784 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.784 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.785 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.785 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.785 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.786 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.786 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.786 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.786 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.787 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.787 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.787 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.788 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.788 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.788 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.788 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.789 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.789 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.789 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.790 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.790 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.790 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.790 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.791 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.791 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.791 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.792 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.792 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.793 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.793 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.794 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.794 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.794 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.795 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.795 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.795 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.795 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.796 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.796 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.796 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.797 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.797 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.797 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.798 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.799 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:update, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:05.799 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:05.810 38 INFO tempest.lib.common.rest_client [req-a1ecb719-49e0-4945-a201-80ef7a4754c2 ] Request (BasicOperationsImagesRbacTest:test_create_image): 201 POST http://172.30.13.94/image/v2/images 0.090s 2020-11-06 18:02:05.811 38 DEBUG tempest.lib.common.rest_client [req-a1ecb719-49e0-4945-a201-80ef7a4754c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-BasicOperationsImagesRbacTest-Image-282484322", "container_format": "bare", "disk_format": "raw"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '660', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/6409d663-e524-47b6-97a9-d2c6fba9de34', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-a1ecb719-49e0-4945-a201-80ef7a4754c2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-BasicOperationsImagesRbacTest-Image-282484322", "disk_format": "raw", "container_format": "bare", "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "62aad203ff2a47c9a1e41ff9c7c69b5f", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "6409d663-e524-47b6-97a9-d2c6fba9de34", "created_at": "2020-11-06T18:02:06Z", "updated_at": "2020-11-06T18:02:06Z", "tags": [], "self": "/v2/images/6409d663-e524-47b6-97a9-d2c6fba9de34", "file": "/v2/images/6409d663-e524-47b6-97a9-d2c6fba9de34/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:05.811 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:05.811 40 INFO tempest.lib.common.rest_client [req-dab82c57-37e3-4e4d-b45e-21eda8c50b4b ] Request (PortsRbacTest:test_show_port_binding_vif_type): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.048s 2020-11-06 18:02:05.812 40 DEBUG tempest.lib.common.rest_client [req-dab82c57-37e3-4e4d-b45e-21eda8c50b4b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dab82c57-37e3-4e4d-b45e-21eda8c50b4b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:05.846 40 INFO tempest.lib.common.rest_client [req-100e2e42-96c2-474d-8d88-c15a233443d8 ] Request (PortsRbacTest:test_show_port_binding_vif_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:02:05.846 40 DEBUG tempest.lib.common.rest_client [req-100e2e42-96c2-474d-8d88-c15a233443d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-100e2e42-96c2-474d-8d88-c15a233443d8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["lkiVKaSAS5Om5iwXu6odYw"], "expires_at": "2020-11-06T19:02:05.000000Z", "issued_at": "2020-11-06T18:02:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:05.849 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:05.850 37 INFO tempest.lib.common.rest_client [req-5b2b54d6-652c-4e0e-92e7-9853894a0a2f ] Request (ComputeServersRbacTest:test_update_server): 200 GET http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles 0.050s 2020-11-06 18:02:05.850 37 DEBUG tempest.lib.common.rest_client [req-5b2b54d6-652c-4e0e-92e7-9853894a0a2f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5b2b54d6-652c-4e0e-92e7-9853894a0a2f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:05.853 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:05.853 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:05.856 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_port, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:05.857 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:05.858 38 INFO tempest.lib.common.rest_client [req-39571723-3068-4c72-8778-831cfddda0da ] Request (BasicOperationsImagesRbacTest:test_create_image): 200 GET http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles 0.046s 2020-11-06 18:02:05.858 38 DEBUG tempest.lib.common.rest_client [req-39571723-3068-4c72-8778-831cfddda0da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-39571723-3068-4c72-8778-831cfddda0da', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:05.894 38 INFO tempest.lib.common.rest_client [req-84ff377a-a166-401f-93f0-b8e3bbddab33 ] Request (BasicOperationsImagesRbacTest:test_create_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:02:05.894 38 DEBUG tempest.lib.common.rest_client [req-84ff377a-a166-401f-93f0-b8e3bbddab33 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-84ff377a-a166-401f-93f0-b8e3bbddab33', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f423e6d7a5aa4cd79bba74f653d7bcc4", "name": "tempest-BasicOperationsImagesRbacTest-335924360", "password_expires_at": null}, "audit_ids": ["btpw4dPjTR20szi3Jsg3AQ"], "expires_at": "2020-11-06T19:02:05.000000Z", "issued_at": "2020-11-06T18:02:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62aad203ff2a47c9a1e41ff9c7c69b5f", "name": "tempest-BasicOperationsImagesRbacTest-335924360"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:05.897 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:05.897 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:05.898 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: modify_image, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:05.906 40 INFO tempest.lib.common.rest_client [req-84c139c8-5446-4a40-ac88-bbe76e125184 ] Request (PortsRbacTest:test_update_port): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.048s 2020-11-06 18:02:05.906 40 DEBUG tempest.lib.common.rest_client [req-84c139c8-5446-4a40-ac88-bbe76e125184 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-84c139c8-5446-4a40-ac88-bbe76e125184', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:05.937 40 INFO tempest.lib.common.rest_client [req-40215436-7a29-42a7-b983-a3cb23e427f1 ] Request (PortsRbacTest:test_update_port): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.030s 2020-11-06 18:02:05.938 40 DEBUG tempest.lib.common.rest_client [req-40215436-7a29-42a7-b983-a3cb23e427f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-40215436-7a29-42a7-b983-a3cb23e427f1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["5S-tdYoqRCuuv7WOTDIE2A"], "expires_at": "2020-11-06T19:02:05.000000Z", "issued_at": "2020-11-06T18:02:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:05.939 37 INFO tempest.lib.common.rest_client [req-96ef7918-6a77-420d-90f9-97c33c4890ae ] Request (ComputeServersRbacTest:test_update_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 18:02:05.940 37 DEBUG tempest.lib.common.rest_client [req-96ef7918-6a77-420d-90f9-97c33c4890ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-96ef7918-6a77-420d-90f9-97c33c4890ae', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "262f98552a3a4d8a8fba3f96d5a872bf", "name": "tempest-ComputeServersRbacTest-1376603226", "password_expires_at": null}, "audit_ids": ["d6cpOIvnRuKPzf6xD5fPvQ"], "expires_at": "2020-11-06T19:02:05.000000Z", "issued_at": "2020-11-06T18:02:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "738a797d686c408e8ceb6a8b32bc1d09", "name": "tempest-ComputeServersRbacTest-1376603226"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:06.002 38 INFO tempest.lib.common.rest_client [req-a953f5d5-df64-4d3e-910f-963acd24ef96 ] Request (BasicOperationsImagesRbacTest:test_create_image_tag): 201 POST http://172.30.13.94/image/v2/images 0.103s 2020-11-06 18:02:06.003 38 DEBUG tempest.lib.common.rest_client [req-a953f5d5-df64-4d3e-910f-963acd24ef96 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-BasicOperationsImagesRbacTest-Image-1153616155", "container_format": "bare", "disk_format": "raw"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '661', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/7d141290-3180-43e8-97a8-0c8ef3c5899a', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-a953f5d5-df64-4d3e-910f-963acd24ef96', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-BasicOperationsImagesRbacTest-Image-1153616155", "disk_format": "raw", "container_format": "bare", "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "62aad203ff2a47c9a1e41ff9c7c69b5f", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "7d141290-3180-43e8-97a8-0c8ef3c5899a", "created_at": "2020-11-06T18:02:06Z", "updated_at": "2020-11-06T18:02:06Z", "tags": [], "self": "/v2/images/7d141290-3180-43e8-97a8-0c8ef3c5899a", "file": "/v2/images/7d141290-3180-43e8-97a8-0c8ef3c5899a/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:06.003 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:06.011 39 INFO tempest.lib.common.rest_client [req-e9da7fc0-c6bd-4c97-82c6-ddf0b17fd262 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.194s 2020-11-06 18:02:06.011 39 DEBUG tempest.lib.common.rest_client [req-e9da7fc0-c6bd-4c97-82c6-ddf0b17fd262 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e9da7fc0-c6bd-4c97-82c6-ddf0b17fd262', 'x-compute-request-id': 'req-e9da7fc0-c6bd-4c97-82c6-ddf0b17fd262', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:06.050 38 INFO tempest.lib.common.rest_client [req-44455fb2-8db9-4e5b-8523-38e3b582cb06 ] Request (BasicOperationsImagesRbacTest:test_create_image_tag): 200 GET http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles 0.046s 2020-11-06 18:02:06.050 38 DEBUG tempest.lib.common.rest_client [req-44455fb2-8db9-4e5b-8523-38e3b582cb06 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-44455fb2-8db9-4e5b-8523-38e3b582cb06', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:06.085 38 INFO tempest.lib.common.rest_client [req-cedc2ad9-6151-4e7f-9433-a27484dee439 ] Request (BasicOperationsImagesRbacTest:test_create_image_tag): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:02:06.086 38 DEBUG tempest.lib.common.rest_client [req-cedc2ad9-6151-4e7f-9433-a27484dee439 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cedc2ad9-6151-4e7f-9433-a27484dee439', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f423e6d7a5aa4cd79bba74f653d7bcc4", "name": "tempest-BasicOperationsImagesRbacTest-335924360", "password_expires_at": null}, "audit_ids": ["5JTaz-d0QzulYO91nbHgaQ"], "expires_at": "2020-11-06T19:02:06.000000Z", "issued_at": "2020-11-06T18:02:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62aad203ff2a47c9a1e41ff9c7c69b5f", "name": "tempest-BasicOperationsImagesRbacTest-335924360"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:06.184 37 INFO tempest.lib.common.rest_client [req-972f2516-c61d-4e25-b3ba-bd38b2f07dc6 ] Request (ComputeServersRbacTest:test_update_server): 200 PUT http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e 0.243s 2020-11-06 18:02:06.184 37 DEBUG tempest.lib.common.rest_client [req-972f2516-c61d-4e25-b3ba-bd38b2f07dc6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-ComputeServersRbacTest-server-926161566"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1151', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-972f2516-c61d-4e25-b3ba-bd38b2f07dc6', 'x-compute-request-id': 'req-972f2516-c61d-4e25-b3ba-bd38b2f07dc6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e'} Body: b'{"server": {"id": "ee273607-06e8-4025-a40f-63683e833b3e", "name": "tempest-ComputeServersRbacTest-server-926161566", "status": "ACTIVE", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "user_id": "262f98552a3a4d8a8fba3f96d5a872bf", "metadata": {}, "hostId": "72aa4147e128daa70511a3b03038cad49752a08b0327f6bc0c6decc0", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:01:15Z", "updated": "2020-11-06T18:01:22Z", "addresses": {"tempest-ComputeServersRbacTest-1143895587-network": [{"version": 4, "addr": "192.168.120.11"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ee273607-06e8-4025-a40f-63683e833b3e"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:06.198 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:06.220 38 INFO tempest.lib.common.rest_client [req-105a4a05-0029-4cd4-a3c5-72108e7f8b4b ] Request (BasicOperationsImagesRbacTest:test_create_image_tag): 204 PUT http://172.30.13.94/image/v2/images/7d141290-3180-43e8-97a8-0c8ef3c5899a/tags/tempest-BasicOperationsImagesRbacTest-tag-333241065 0.133s 2020-11-06 18:02:06.220 38 DEBUG tempest.lib.common.rest_client [req-105a4a05-0029-4cd4-a3c5-72108e7f8b4b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-105a4a05-0029-4cd4-a3c5-72108e7f8b4b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/7d141290-3180-43e8-97a8-0c8ef3c5899a/tags/tempest-BasicOperationsImagesRbacTest-tag-333241065'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:06.220 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:06.246 37 INFO tempest.lib.common.rest_client [req-8e923eaf-e776-46f3-8726-efd68476c94a ] Request (ComputeServersRbacTest:test_update_server): 200 GET http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles 0.047s 2020-11-06 18:02:06.246 37 DEBUG tempest.lib.common.rest_client [req-8e923eaf-e776-46f3-8726-efd68476c94a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8e923eaf-e776-46f3-8726-efd68476c94a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09/users/262f98552a3a4d8a8fba3f96d5a872bf/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:06.268 38 INFO tempest.lib.common.rest_client [req-125e8d4d-5334-4d4d-bd67-00098361aac2 ] Request (BasicOperationsImagesRbacTest:test_create_image_tag): 200 GET http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles 0.047s 2020-11-06 18:02:06.269 38 DEBUG tempest.lib.common.rest_client [req-125e8d4d-5334-4d4d-bd67-00098361aac2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-125e8d4d-5334-4d4d-bd67-00098361aac2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:06.280 37 INFO tempest.lib.common.rest_client [req-ec6b40cf-9951-4a42-9427-3f412d47760d ] Request (ComputeServersRbacTest:test_update_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:02:06.281 37 DEBUG tempest.lib.common.rest_client [req-ec6b40cf-9951-4a42-9427-3f412d47760d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ec6b40cf-9951-4a42-9427-3f412d47760d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "262f98552a3a4d8a8fba3f96d5a872bf", "name": "tempest-ComputeServersRbacTest-1376603226", "password_expires_at": null}, "audit_ids": ["fcH9nwhURFGJ6LS3y1eQ7g"], "expires_at": "2020-11-06T19:02:06.000000Z", "issued_at": "2020-11-06T18:02:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "738a797d686c408e8ceb6a8b32bc1d09", "name": "tempest-ComputeServersRbacTest-1376603226"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_738a797d686c408e8ceb6a8b32bc1d09", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:06.300 38 INFO tempest.lib.common.rest_client [req-190a5166-8ceb-4d22-9144-83661d584e16 ] Request (BasicOperationsImagesRbacTest:test_create_image_tag): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:02:06.301 38 DEBUG tempest.lib.common.rest_client [req-190a5166-8ceb-4d22-9144-83661d584e16 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-190a5166-8ceb-4d22-9144-83661d584e16', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f423e6d7a5aa4cd79bba74f653d7bcc4", "name": "tempest-BasicOperationsImagesRbacTest-335924360", "password_expires_at": null}, "audit_ids": ["Apvz--vhTkWadJKcXFHZqw"], "expires_at": "2020-11-06T19:02:06.000000Z", "issued_at": "2020-11-06T18:02:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62aad203ff2a47c9a1e41ff9c7c69b5f", "name": "tempest-BasicOperationsImagesRbacTest-335924360"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:06.304 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:06.304 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:06.306 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: deactivate, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:06.393 38 INFO tempest.lib.common.rest_client [req-318d8183-8475-41b6-a783-1f910c69c406 ] Request (BasicOperationsImagesRbacTest:test_deactivate_image): 201 POST http://172.30.13.94/image/v2/images 0.087s 2020-11-06 18:02:06.394 38 DEBUG tempest.lib.common.rest_client [req-318d8183-8475-41b6-a783-1f910c69c406 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-BasicOperationsImagesRbacTest-Image-1156357618", "container_format": "bare", "disk_format": "raw"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '661', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/2ebad546-6eeb-4630-a2b9-9da0d16b921a', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-318d8183-8475-41b6-a783-1f910c69c406', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-BasicOperationsImagesRbacTest-Image-1156357618", "disk_format": "raw", "container_format": "bare", "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "62aad203ff2a47c9a1e41ff9c7c69b5f", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "2ebad546-6eeb-4630-a2b9-9da0d16b921a", "created_at": "2020-11-06T18:02:06Z", "updated_at": "2020-11-06T18:02:06Z", "tags": [], "self": "/v2/images/2ebad546-6eeb-4630-a2b9-9da0d16b921a", "file": "/v2/images/2ebad546-6eeb-4630-a2b9-9da0d16b921a/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:06.401 38 DEBUG patrole_tempest_plugin.tests.api.image.test_images_rbac [-] Image file content type _upload_image /usr/lib/python3.8/site-packages/patrole_tempest_plugin/tests/api/image/test_images_rbac.py:45 2020-11-06 18:02:06.609 37 INFO tempest.lib.common.rest_client [req-2657f071-3d6e-4e8e-99e0-89ffb6d3c03f ] Request (ComputeServersRbacTest:test_update_server): 200 GET http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e 0.327s 2020-11-06 18:02:06.610 37 DEBUG tempest.lib.common.rest_client [req-2657f071-3d6e-4e8e-99e0-89ffb6d3c03f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1720', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2657f071-3d6e-4e8e-99e0-89ffb6d3c03f', 'x-compute-request-id': 'req-2657f071-3d6e-4e8e-99e0-89ffb6d3c03f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e'} Body: b'{"server": {"id": "ee273607-06e8-4025-a40f-63683e833b3e", "name": "tempest-ComputeServersRbacTest-server-926161566", "status": "ACTIVE", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "user_id": "262f98552a3a4d8a8fba3f96d5a872bf", "metadata": {}, "hostId": "72aa4147e128daa70511a3b03038cad49752a08b0327f6bc0c6decc0", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:01:15Z", "updated": "2020-11-06T18:02:06Z", "addresses": {"tempest-ComputeServersRbacTest-1143895587-network": [{"version": 4, "addr": "192.168.120.11", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:ff:85:1c"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ee273607-06e8-4025-a40f-63683e833b3e"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:22.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033cb", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:06.627 40 INFO tempest.lib.common.rest_client [req-21f12809-e857-4464-8a3c-42d3b974f80b ] Request (PortsRbacTest:test_update_port): 200 PUT http://172.30.13.94:9696/v2.0/ports/e218c7fc-d3dc-4c2c-9234-aa97d5412eb7 0.688s 2020-11-06 18:02:06.628 40 DEBUG tempest.lib.common.rest_client [req-21f12809-e857-4464-8a3c-42d3b974f80b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"admin_state_up": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '1095', 'x-openstack-request-id': 'req-21f12809-e857-4464-8a3c-42d3b974f80b', 'date': 'Fri, 06 Nov 2020 18:02:06 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/e218c7fc-d3dc-4c2c-9234-aa97d5412eb7'} Body: b'{"port":{"id":"e218c7fc-d3dc-4c2c-9234-aa97d5412eb7","name":"tempest-PortsRbacTest-339006369","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:8a:69:9e","admin_state_up":false,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.243"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.243","hostname":"host-192-168-120-243","fqdn":"host-192-168-120-243.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:01:42Z","updated_at":"2020-11-06T18:02:06Z","revision_number":2,"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:06.628 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:06.678 40 INFO tempest.lib.common.rest_client [req-b213df81-ef4b-4b5e-ac61-502bf57cc414 ] Request (PortsRbacTest:test_update_port): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.049s 2020-11-06 18:02:06.679 40 DEBUG tempest.lib.common.rest_client [req-b213df81-ef4b-4b5e-ac61-502bf57cc414 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b213df81-ef4b-4b5e-ac61-502bf57cc414', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:06.699 37 INFO tempest.lib.common.rest_client [req-523f18d1-4b35-4f79-ba1c-315164d93cc6 ] Request (ComputeServersRbacTest:tearDownClass): 404 DELETE http://172.30.13.94/compute/v2.1/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9 0.070s 2020-11-06 18:02:06.699 38 INFO tempest.lib.common.rest_client [req-e0dfdbac-9d2a-4305-b3da-7e210636fd82 ] Request (BasicOperationsImagesRbacTest:test_deactivate_image): 204 PUT http://172.30.13.94/image/v2/images/2ebad546-6eeb-4630-a2b9-9da0d16b921a/file 0.297s 2020-11-06 18:02:06.700 37 DEBUG tempest.lib.common.rest_client [req-523f18d1-4b35-4f79-ba1c-315164d93cc6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-523f18d1-4b35-4f79-ba1c-315164d93cc6', 'x-compute-request-id': 'req-523f18d1-4b35-4f79-ba1c-315164d93cc6', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 9657d9f5-7280-4ea5-999f-f296dffe42c9 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:06.700 38 DEBUG tempest.lib.common.rest_client [req-e0dfdbac-9d2a-4305-b3da-7e210636fd82 ] Request - Headers: {'Content-Type': 'application/octet-stream', 'X-Auth-Token': ''} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-e0dfdbac-9d2a-4305-b3da-7e210636fd82', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/2ebad546-6eeb-4630-a2b9-9da0d16b921a/file'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:06.701 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:06.714 40 INFO tempest.lib.common.rest_client [req-06ab7531-bf9e-434c-bf29-a261b3c1c61e ] Request (PortsRbacTest:test_update_port): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:02:06.714 40 DEBUG tempest.lib.common.rest_client [req-06ab7531-bf9e-434c-bf29-a261b3c1c61e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-06ab7531-bf9e-434c-bf29-a261b3c1c61e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["2xKomc3bREiBIo1HcW-3ow"], "expires_at": "2020-11-06T19:02:06.000000Z", "issued_at": "2020-11-06T18:02:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:06.752 38 INFO tempest.lib.common.rest_client [req-e57e7064-7404-4652-a9d7-b872e2c3d98a ] Request (BasicOperationsImagesRbacTest:test_deactivate_image): 200 GET http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles 0.050s 2020-11-06 18:02:06.752 38 DEBUG tempest.lib.common.rest_client [req-e57e7064-7404-4652-a9d7-b872e2c3d98a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e57e7064-7404-4652-a9d7-b872e2c3d98a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:06.762 37 INFO tempest.lib.common.rest_client [req-265aef54-efbb-4b39-a3aa-15d959a38ee8 ] Request (ComputeServersRbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9 0.061s 2020-11-06 18:02:06.763 37 DEBUG tempest.lib.common.rest_client [req-265aef54-efbb-4b39-a3aa-15d959a38ee8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-265aef54-efbb-4b39-a3aa-15d959a38ee8', 'x-compute-request-id': 'req-265aef54-efbb-4b39-a3aa-15d959a38ee8', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9657d9f5-7280-4ea5-999f-f296dffe42c9'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 9657d9f5-7280-4ea5-999f-f296dffe42c9 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:06.787 38 INFO tempest.lib.common.rest_client [req-876415bb-caf2-4df1-be9a-3e54d0eca692 ] Request (BasicOperationsImagesRbacTest:test_deactivate_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:02:06.788 38 DEBUG tempest.lib.common.rest_client [req-876415bb-caf2-4df1-be9a-3e54d0eca692 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-876415bb-caf2-4df1-be9a-3e54d0eca692', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f423e6d7a5aa4cd79bba74f653d7bcc4", "name": "tempest-BasicOperationsImagesRbacTest-335924360", "password_expires_at": null}, "audit_ids": ["oxt0gAPuSciqDMeuCEL4-A"], "expires_at": "2020-11-06T19:02:06.000000Z", "issued_at": "2020-11-06T18:02:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62aad203ff2a47c9a1e41ff9c7c69b5f", "name": "tempest-BasicOperationsImagesRbacTest-335924360"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:06.838 37 INFO tempest.lib.common.rest_client [req-0d30eac1-66f8-431a-8a21-bb1caf05dee3 ] Request (ComputeServersRbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09/volumes/af94feae-2c64-4f66-978a-2eb00d12ad7c 0.074s 2020-11-06 18:02:06.838 37 DEBUG tempest.lib.common.rest_client [req-0d30eac1-66f8-431a-8a21-bb1caf05dee3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0d30eac1-66f8-431a-8a21-bb1caf05dee3', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09/volumes/af94feae-2c64-4f66-978a-2eb00d12ad7c'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:06.910 37 INFO tempest.lib.common.rest_client [req-3def5bcc-d6c7-427c-b152-00f345241976 ] Request (ComputeServersRbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09/volumes/af94feae-2c64-4f66-978a-2eb00d12ad7c 0.071s 2020-11-06 18:02:06.911 37 DEBUG tempest.lib.common.rest_client [req-3def5bcc-d6c7-427c-b152-00f345241976 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-3def5bcc-d6c7-427c-b152-00f345241976', 'content-length': '1716', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3def5bcc-d6c7-427c-b152-00f345241976', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09/volumes/af94feae-2c64-4f66-978a-2eb00d12ad7c'} Body: b'{"volume": {"id": "af94feae-2c64-4f66-978a-2eb00d12ad7c", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:01:32.000000", "updated_at": "2020-11-06T18:02:07.000000", "name": "tempest-ComputeServersRbacTest-volume-82098402", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09/volumes/af94feae-2c64-4f66-978a-2eb00d12ad7c"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/738a797d686c408e8ceb6a8b32bc1d09/volumes/af94feae-2c64-4f66-978a-2eb00d12ad7c"}], "user_id": "262f98552a3a4d8a8fba3f96d5a872bf", "bootable": "true", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "volume_image_metadata": {"signature_verified": "False", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "image_id": "56b368f6-9136-40ec-a04c-564d02c95e42", "image_name": "patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "checksum": "443b7623e27ecf03dc9e01ee93f67afe", "container_format": "bare", "disk_format": "qcow2", "min_disk": "0", "min_ram": "0", "size": "12716032"}, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "738a797d686c408e8ceb6a8b32bc1d09"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:06.917 38 INFO tempest.lib.common.rest_client [req-af1cb489-0d64-4403-a649-c5b58a713e3c ] Request (BasicOperationsImagesRbacTest:test_deactivate_image): 204 POST http://172.30.13.94/image/v2/images/2ebad546-6eeb-4630-a2b9-9da0d16b921a/actions/deactivate 0.127s 2020-11-06 18:02:06.917 38 DEBUG tempest.lib.common.rest_client [req-af1cb489-0d64-4403-a649-c5b58a713e3c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-af1cb489-0d64-4403-a649-c5b58a713e3c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/2ebad546-6eeb-4630-a2b9-9da0d16b921a/actions/deactivate'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:06.918 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:06.977 38 INFO tempest.lib.common.rest_client [req-7ba6e94a-c71e-40f3-a411-6e9be2869f8e ] Request (BasicOperationsImagesRbacTest:test_deactivate_image): 200 GET http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles 0.058s 2020-11-06 18:02:06.978 38 DEBUG tempest.lib.common.rest_client [req-7ba6e94a-c71e-40f3-a411-6e9be2869f8e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7ba6e94a-c71e-40f3-a411-6e9be2869f8e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:07.014 38 INFO tempest.lib.common.rest_client [req-21888660-2f0e-4915-a1e8-756ee093dd2e ] Request (BasicOperationsImagesRbacTest:test_deactivate_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:02:07.015 38 DEBUG tempest.lib.common.rest_client [req-21888660-2f0e-4915-a1e8-756ee093dd2e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-21888660-2f0e-4915-a1e8-756ee093dd2e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f423e6d7a5aa4cd79bba74f653d7bcc4", "name": "tempest-BasicOperationsImagesRbacTest-335924360", "password_expires_at": null}, "audit_ids": ["oBgA49sdS6yoRZtrUoGtRA"], "expires_at": "2020-11-06T19:02:07.000000Z", "issued_at": "2020-11-06T18:02:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62aad203ff2a47c9a1e41ff9c7c69b5f", "name": "tempest-BasicOperationsImagesRbacTest-335924360"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:07.018 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:07.019 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:07.020 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_image, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:07.126 38 INFO tempest.lib.common.rest_client [req-ab67d97d-fefe-423b-ad09-7632bdffd906 ] Request (BasicOperationsImagesRbacTest:test_delete_image): 201 POST http://172.30.13.94/image/v2/images 0.104s 2020-11-06 18:02:07.126 38 DEBUG tempest.lib.common.rest_client [req-ab67d97d-fefe-423b-ad09-7632bdffd906 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-BasicOperationsImagesRbacTest-Image-1343003793", "container_format": "bare", "disk_format": "raw"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '661', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/2189e1e5-9704-4f02-a12f-6c5b09f9b35c', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-ab67d97d-fefe-423b-ad09-7632bdffd906', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-BasicOperationsImagesRbacTest-Image-1343003793", "disk_format": "raw", "container_format": "bare", "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "62aad203ff2a47c9a1e41ff9c7c69b5f", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "2189e1e5-9704-4f02-a12f-6c5b09f9b35c", "created_at": "2020-11-06T18:02:07Z", "updated_at": "2020-11-06T18:02:07Z", "tags": [], "self": "/v2/images/2189e1e5-9704-4f02-a12f-6c5b09f9b35c", "file": "/v2/images/2189e1e5-9704-4f02-a12f-6c5b09f9b35c/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:07.127 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:07.190 38 INFO tempest.lib.common.rest_client [req-0546d242-c3c6-487f-96b7-e530d2f8acec ] Request (BasicOperationsImagesRbacTest:test_delete_image): 200 GET http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles 0.061s 2020-11-06 18:02:07.190 38 DEBUG tempest.lib.common.rest_client [req-0546d242-c3c6-487f-96b7-e530d2f8acec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0546d242-c3c6-487f-96b7-e530d2f8acec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:07.228 38 INFO tempest.lib.common.rest_client [req-f3292f82-4b79-47fc-95be-a4f1a900dc84 ] Request (BasicOperationsImagesRbacTest:test_delete_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:02:07.229 38 DEBUG tempest.lib.common.rest_client [req-f3292f82-4b79-47fc-95be-a4f1a900dc84 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f3292f82-4b79-47fc-95be-a4f1a900dc84', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f423e6d7a5aa4cd79bba74f653d7bcc4", "name": "tempest-BasicOperationsImagesRbacTest-335924360", "password_expires_at": null}, "audit_ids": ["Vpeo-nc9RfazYOaStpZ4Lw"], "expires_at": "2020-11-06T19:02:07.000000Z", "issued_at": "2020-11-06T18:02:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62aad203ff2a47c9a1e41ff9c7c69b5f", "name": "tempest-BasicOperationsImagesRbacTest-335924360"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:07.363 39 INFO tempest.lib.common.rest_client [req-73ed920a-f381-47a7-8dc7-678d678c8b10 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.339s 2020-11-06 18:02:07.363 39 DEBUG tempest.lib.common.rest_client [req-73ed920a-f381-47a7-8dc7-678d678c8b10 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-73ed920a-f381-47a7-8dc7-678d678c8b10', 'x-compute-request-id': 'req-73ed920a-f381-47a7-8dc7-678d678c8b10', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:07.364 38 INFO tempest.lib.common.rest_client [req-c1dae86f-7baf-4f79-9b2f-89576aa64875 ] Request (BasicOperationsImagesRbacTest:test_delete_image): 204 DELETE http://172.30.13.94/image/v2/images/2189e1e5-9704-4f02-a12f-6c5b09f9b35c 0.134s 2020-11-06 18:02:07.365 38 DEBUG tempest.lib.common.rest_client [req-c1dae86f-7baf-4f79-9b2f-89576aa64875 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-c1dae86f-7baf-4f79-9b2f-89576aa64875', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/2189e1e5-9704-4f02-a12f-6c5b09f9b35c'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:07.365 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:07.418 38 INFO tempest.lib.common.rest_client [req-af3b02a6-1fc2-4b5d-8742-ffbeef7650b6 ] Request (BasicOperationsImagesRbacTest:test_delete_image): 200 GET http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles 0.051s 2020-11-06 18:02:07.418 38 DEBUG tempest.lib.common.rest_client [req-af3b02a6-1fc2-4b5d-8742-ffbeef7650b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-af3b02a6-1fc2-4b5d-8742-ffbeef7650b6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:07.431 40 INFO tempest.lib.common.rest_client [req-aefa2d39-e2d0-4f20-aeb5-1411da574c05 ] Request (PortsRbacTest:_run_cleanups): 200 PUT http://172.30.13.94:9696/v2.0/ports/e218c7fc-d3dc-4c2c-9234-aa97d5412eb7 0.715s 2020-11-06 18:02:07.432 40 DEBUG tempest.lib.common.rest_client [req-aefa2d39-e2d0-4f20-aeb5-1411da574c05 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"admin_state_up": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '1094', 'x-openstack-request-id': 'req-aefa2d39-e2d0-4f20-aeb5-1411da574c05', 'date': 'Fri, 06 Nov 2020 18:02:07 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/e218c7fc-d3dc-4c2c-9234-aa97d5412eb7'} Body: b'{"port":{"id":"e218c7fc-d3dc-4c2c-9234-aa97d5412eb7","name":"tempest-PortsRbacTest-339006369","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:8a:69:9e","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.243"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.243","hostname":"host-192-168-120-243","fqdn":"host-192-168-120-243.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:01:42Z","updated_at":"2020-11-06T18:02:07Z","revision_number":3,"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:07.434 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:07.438 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:07.438 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:07.441 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_port, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:07.441 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:07.444 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_port:allowed_address_pairs, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:07.452 38 INFO tempest.lib.common.rest_client [req-b4734088-e7cf-4bca-8b33-f0fcf5353267 ] Request (BasicOperationsImagesRbacTest:test_delete_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:02:07.453 38 DEBUG tempest.lib.common.rest_client [req-b4734088-e7cf-4bca-8b33-f0fcf5353267 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b4734088-e7cf-4bca-8b33-f0fcf5353267', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f423e6d7a5aa4cd79bba74f653d7bcc4", "name": "tempest-BasicOperationsImagesRbacTest-335924360", "password_expires_at": null}, "audit_ids": ["7-bUypI9T6OcaUk1SJRmQQ"], "expires_at": "2020-11-06T19:02:07.000000Z", "issued_at": "2020-11-06T18:02:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62aad203ff2a47c9a1e41ff9c7c69b5f", "name": "tempest-BasicOperationsImagesRbacTest-335924360"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:07.507 40 INFO tempest.lib.common.rest_client [req-703d56ef-b7d4-4da1-85e0-92c3c9076869 ] Request (PortsRbacTest:test_update_port_allowed_address_pairs): 200 GET http://172.30.13.94:9696/v2.0/ports?network_id=586884b2-4363-4597-acb0-ddbc49908b65 0.062s 2020-11-06 18:02:07.508 40 DEBUG tempest.lib.common.rest_client [req-703d56ef-b7d4-4da1-85e0-92c3c9076869 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '13484', 'x-openstack-request-id': 'req-703d56ef-b7d4-4da1-85e0-92c3c9076869', 'date': 'Fri, 06 Nov 2020 18:02:07 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports?network_id=586884b2-4363-4597-acb0-ddbc49908b65'} Body: b'{"ports":[{"id":"2f8ba6cd-b1ff-4dcf-8706-3a80a4ddfb28","name":"tempest-PortsRbacTest-982544266","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:c3:8f:b0","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.10"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"rbac_test_host","binding:vif_type":"binding_failed","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.10","hostname":"host-192-168-120-10","fqdn":"host-192-168-120-10.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:01:47Z","updated_at":"2020-11-06T18:01:48Z","revision_number":2,"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f"},{"id":"681475a9-b4b1-4301-b8f4-1c15dc1ffff3","name":"tempest-PortsRbacTest-1937642841","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:d6:3a:6d","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.185"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"description":"","binding:vnic_type":"normal","binding:profile":{"foo":"1"},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.185","hostname":"host-192-168-120-185","fqdn":"host-192-168-120-185.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:01:49Z","updated_at":"2020-11-06T18:01:49Z","revision_number":1,"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f"},{"id":"6b4d62dd-e4bd-487b-945d-e2074c50baf6","name":"tempest-PortsRbacTest-72359599","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:bd:67:7c","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.8"}],"allowed_address_pairs":[{"mac_address":"fa:16:3e:8a:69:9e","ip_address":"192.168.120.243"}],"extra_dhcp_opts":[],"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.8","hostname":"host-192-168-120-8","fqdn":"host-192-168-120-8.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:01:46Z","updated_at":"2020-11-06T18:01:46Z","revision_number":1,"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f"},{"id":"85158d53-ba10-4064-baee-9a50b1e54d69","name":"","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:ba:d4:7b","admin_state_up":true,"status":"ACTIVE","device_id":"dhcpcf0aa1ad-fc1e-58c4-863b-aba14f17f098-586884b2-4363-4597-acb0-ddbc49908b65","device_owner":"network:dhcp","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.2"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":[],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"lf-virtual9","binding:vif_type":"ovs","binding:vif_details":{"connectivity":"l2","port_filter":true,"ovs_hybrid_plug":false,"datapath_type":" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:07.540 38 INFO tempest.lib.common.rest_client [req-86eacce6-5eea-4dac-a27c-ced320300ad3 ] Request (BasicOperationsImagesRbacTest:test_delete_image): 404 GET http://172.30.13.94/image/v2/images/2189e1e5-9704-4f02-a12f-6c5b09f9b35c 0.086s 2020-11-06 18:02:07.541 38 DEBUG tempest.lib.common.rest_client [req-86eacce6-5eea-4dac-a27c-ced320300ad3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-86eacce6-5eea-4dac-a27c-ced320300ad3', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/2189e1e5-9704-4f02-a12f-6c5b09f9b35c'} Body: b'{"message": "No image found with ID 2189e1e5-9704-4f02-a12f-6c5b09f9b35c

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:07.544 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:07.544 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:07.546 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: modify_image, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:07.554 40 INFO tempest.lib.common.rest_client [req-b693e9e8-75ac-489c-9d65-fef456490bf9 ] Request (PortsRbacTest:test_update_port_allowed_address_pairs): 200 GET http://172.30.13.94:9696/v2.0/subnets/6dab2f10-428e-4a16-a2a0-bc153f1d8c9c 0.044s 2020-11-06 18:02:07.554 40 DEBUG tempest.lib.common.rest_client [req-b693e9e8-75ac-489c-9d65-fef456490bf9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '662', 'x-openstack-request-id': 'req-b693e9e8-75ac-489c-9d65-fef456490bf9', 'date': 'Fri, 06 Nov 2020 18:02:07 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/6dab2f10-428e-4a16-a2a0-bc153f1d8c9c'} Body: b'{"subnet":{"id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","name":"","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/24","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.254"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-11-06T18:01:42Z","updated_at":"2020-11-06T18:01:42Z","revision_number":0,"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:07.583 38 INFO tempest.lib.common.rest_client [req-7d947198-f1be-4db3-8724-6c61c8185ac7 ] Request (BasicOperationsImagesRbacTest:test_delete_image_tag): 201 POST http://172.30.13.94/image/v2/images 0.036s 2020-11-06 18:02:07.584 38 DEBUG tempest.lib.common.rest_client [req-7d947198-f1be-4db3-8724-6c61c8185ac7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-BasicOperationsImagesRbacTest-Image-1201725103", "container_format": "bare", "disk_format": "raw"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '661', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/db96fb06-92ba-4539-b49b-be50a65e678c', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-7d947198-f1be-4db3-8724-6c61c8185ac7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-BasicOperationsImagesRbacTest-Image-1201725103", "disk_format": "raw", "container_format": "bare", "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "62aad203ff2a47c9a1e41ff9c7c69b5f", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "db96fb06-92ba-4539-b49b-be50a65e678c", "created_at": "2020-11-06T18:02:08Z", "updated_at": "2020-11-06T18:02:08Z", "tags": [], "self": "/v2/images/db96fb06-92ba-4539-b49b-be50a65e678c", "file": "/v2/images/db96fb06-92ba-4539-b49b-be50a65e678c/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:07.657 38 INFO tempest.lib.common.rest_client [req-f11ab397-abb0-4e84-91e0-4170b674167f ] Request (BasicOperationsImagesRbacTest:test_delete_image_tag): 204 PUT http://172.30.13.94/image/v2/images/db96fb06-92ba-4539-b49b-be50a65e678c/tags/tempest-BasicOperationsImagesRbacTest-tag-1465050255 0.072s 2020-11-06 18:02:07.657 38 DEBUG tempest.lib.common.rest_client [req-f11ab397-abb0-4e84-91e0-4170b674167f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-f11ab397-abb0-4e84-91e0-4170b674167f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/db96fb06-92ba-4539-b49b-be50a65e678c/tags/tempest-BasicOperationsImagesRbacTest-tag-1465050255'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:07.658 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:07.727 38 INFO tempest.lib.common.rest_client [req-98da31d0-1f86-416d-a141-f2f08dcb5672 ] Request (BasicOperationsImagesRbacTest:test_delete_image_tag): 200 GET http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles 0.068s 2020-11-06 18:02:07.728 38 DEBUG tempest.lib.common.rest_client [req-98da31d0-1f86-416d-a141-f2f08dcb5672 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-98da31d0-1f86-416d-a141-f2f08dcb5672', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:07.768 38 INFO tempest.lib.common.rest_client [req-f9175ff1-595f-4ccd-8f69-36dd52123bbe ] Request (BasicOperationsImagesRbacTest:test_delete_image_tag): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:02:07.768 38 DEBUG tempest.lib.common.rest_client [req-f9175ff1-595f-4ccd-8f69-36dd52123bbe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f9175ff1-595f-4ccd-8f69-36dd52123bbe', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f423e6d7a5aa4cd79bba74f653d7bcc4", "name": "tempest-BasicOperationsImagesRbacTest-335924360", "password_expires_at": null}, "audit_ids": ["nFIw07BvQomTUdMahjXUjw"], "expires_at": "2020-11-06T19:02:07.000000Z", "issued_at": "2020-11-06T18:02:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62aad203ff2a47c9a1e41ff9c7c69b5f", "name": "tempest-BasicOperationsImagesRbacTest-335924360"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:07.888 38 INFO tempest.lib.common.rest_client [req-6db53b59-0be9-438d-91a0-069ed20c8df0 ] Request (BasicOperationsImagesRbacTest:test_delete_image_tag): 204 DELETE http://172.30.13.94/image/v2/images/db96fb06-92ba-4539-b49b-be50a65e678c/tags/tempest-BasicOperationsImagesRbacTest-tag-1465050255 0.119s 2020-11-06 18:02:07.891 38 DEBUG tempest.lib.common.rest_client [req-6db53b59-0be9-438d-91a0-069ed20c8df0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-6db53b59-0be9-438d-91a0-069ed20c8df0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/db96fb06-92ba-4539-b49b-be50a65e678c/tags/tempest-BasicOperationsImagesRbacTest-tag-1465050255'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:07.892 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:07.945 38 INFO tempest.lib.common.rest_client [req-9d495350-38b9-473b-9d40-de05d3313f82 ] Request (BasicOperationsImagesRbacTest:test_delete_image_tag): 200 GET http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles 0.052s 2020-11-06 18:02:07.946 38 DEBUG tempest.lib.common.rest_client [req-9d495350-38b9-473b-9d40-de05d3313f82 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9d495350-38b9-473b-9d40-de05d3313f82', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:07.971 37 INFO tempest.lib.common.rest_client [req-d956f068-dc70-4b3f-a9a1-2bc376c4b60d ] Request (ComputeServersRbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09/volumes/af94feae-2c64-4f66-978a-2eb00d12ad7c 0.046s 2020-11-06 18:02:07.972 37 DEBUG tempest.lib.common.rest_client [req-d956f068-dc70-4b3f-a9a1-2bc376c4b60d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-d956f068-dc70-4b3f-a9a1-2bc376c4b60d', 'x-openstack-request-id': 'req-d956f068-dc70-4b3f-a9a1-2bc376c4b60d', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/738a797d686c408e8ceb6a8b32bc1d09/volumes/af94feae-2c64-4f66-978a-2eb00d12ad7c'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume af94feae-2c64-4f66-978a-2eb00d12ad7c could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:07.980 38 INFO tempest.lib.common.rest_client [req-4ecf1874-8017-4d5f-9cc0-49d06ed7e77f ] Request (BasicOperationsImagesRbacTest:test_delete_image_tag): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:02:07.980 38 DEBUG tempest.lib.common.rest_client [req-4ecf1874-8017-4d5f-9cc0-49d06ed7e77f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4ecf1874-8017-4d5f-9cc0-49d06ed7e77f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f423e6d7a5aa4cd79bba74f653d7bcc4", "name": "tempest-BasicOperationsImagesRbacTest-335924360", "password_expires_at": null}, "audit_ids": ["aoz_bCQaRZCz9y_tzJx2fw"], "expires_at": "2020-11-06T19:02:07.000000Z", "issued_at": "2020-11-06T18:02:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62aad203ff2a47c9a1e41ff9c7c69b5f", "name": "tempest-BasicOperationsImagesRbacTest-335924360"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:07.982 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:07.983 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:07.984 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: download_image, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:08.078 38 INFO tempest.lib.common.rest_client [req-bbb17779-b6f2-410b-8d62-29d9057b3887 ] Request (BasicOperationsImagesRbacTest:test_download_image): 201 POST http://172.30.13.94/image/v2/images 0.093s 2020-11-06 18:02:08.078 38 DEBUG tempest.lib.common.rest_client [req-bbb17779-b6f2-410b-8d62-29d9057b3887 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-BasicOperationsImagesRbacTest-Image-1030122333", "container_format": "bare", "disk_format": "raw"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '661', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/c1b99cb0-4abc-4c42-a2fa-10497191c6fd', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-bbb17779-b6f2-410b-8d62-29d9057b3887', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-BasicOperationsImagesRbacTest-Image-1030122333", "disk_format": "raw", "container_format": "bare", "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "62aad203ff2a47c9a1e41ff9c7c69b5f", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "c1b99cb0-4abc-4c42-a2fa-10497191c6fd", "created_at": "2020-11-06T18:02:08Z", "updated_at": "2020-11-06T18:02:08Z", "tags": [], "self": "/v2/images/c1b99cb0-4abc-4c42-a2fa-10497191c6fd", "file": "/v2/images/c1b99cb0-4abc-4c42-a2fa-10497191c6fd/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:08.086 38 DEBUG patrole_tempest_plugin.tests.api.image.test_images_rbac [-] Image file content type _upload_image /usr/lib/python3.8/site-packages/patrole_tempest_plugin/tests/api/image/test_images_rbac.py:45 2020-11-06 18:02:08.141 37 INFO tempest.lib.common.rest_client [req-3738c732-dd56-4d1b-a816-cb10ce05e7ed ] Request (ComputeServersRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e 0.168s 2020-11-06 18:02:08.141 37 DEBUG tempest.lib.common.rest_client [req-3738c732-dd56-4d1b-a816-cb10ce05e7ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3738c732-dd56-4d1b-a816-cb10ce05e7ed', 'x-compute-request-id': 'req-3738c732-dd56-4d1b-a816-cb10ce05e7ed', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:08.304 40 INFO tempest.lib.common.rest_client [req-cb6e2584-0a18-44be-abfb-7fa6f719af72 ] Request (PortsRbacTest:test_update_port_allowed_address_pairs): 201 POST http://172.30.13.94:9696/v2.0/ports 0.728s 2020-11-06 18:02:08.304 40 DEBUG tempest.lib.common.rest_client [req-cb6e2584-0a18-44be-abfb-7fa6f719af72 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "586884b2-4363-4597-acb0-ddbc49908b65", "name": "tempest-PortsRbacTest-302887961"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1086', 'x-openstack-request-id': 'req-cb6e2584-0a18-44be-abfb-7fa6f719af72', 'date': 'Fri, 06 Nov 2020 18:02:08 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"489b6d93-ae70-4c73-9220-5d613ae619e7","name":"tempest-PortsRbacTest-302887961","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:c7:44:2c","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.5"}],"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","port_security_enabled":true,"qos_policy_id":null,"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"allowed_address_pairs":[],"extra_dhcp_opts":[],"description":"","qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.5","hostname":"host-192-168-120-5","fqdn":"host-192-168-120-5.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:02:07Z","updated_at":"2020-11-06T18:02:07Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:08.305 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:08.343 38 INFO tempest.lib.common.rest_client [req-aa70563f-2d18-4184-a700-6c7a167e6983 ] Request (BasicOperationsImagesRbacTest:test_download_image): 204 PUT http://172.30.13.94/image/v2/images/c1b99cb0-4abc-4c42-a2fa-10497191c6fd/file 0.255s 2020-11-06 18:02:08.343 38 DEBUG tempest.lib.common.rest_client [req-aa70563f-2d18-4184-a700-6c7a167e6983 ] Request - Headers: {'Content-Type': 'application/octet-stream', 'X-Auth-Token': ''} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-aa70563f-2d18-4184-a700-6c7a167e6983', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/c1b99cb0-4abc-4c42-a2fa-10497191c6fd/file'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:08.344 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:08.350 37 INFO tempest.lib.common.rest_client [req-ec34bd3c-c197-4bbb-940c-ade529849c0d ] Request (ComputeServersRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e 0.207s 2020-11-06 18:02:08.351 37 DEBUG tempest.lib.common.rest_client [req-ec34bd3c-c197-4bbb-940c-ade529849c0d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ec34bd3c-c197-4bbb-940c-ade529849c0d', 'x-compute-request-id': 'req-ec34bd3c-c197-4bbb-940c-ade529849c0d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e'} Body: b'{"server": {"id": "ee273607-06e8-4025-a40f-63683e833b3e", "name": "tempest-ComputeServersRbacTest-server-926161566", "status": "ACTIVE", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "user_id": "262f98552a3a4d8a8fba3f96d5a872bf", "metadata": {}, "hostId": "72aa4147e128daa70511a3b03038cad49752a08b0327f6bc0c6decc0", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:01:15Z", "updated": "2020-11-06T18:02:08Z", "addresses": {"tempest-ComputeServersRbacTest-1143895587-network": [{"version": 4, "addr": "192.168.120.11", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:ff:85:1c"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ee273607-06e8-4025-a40f-63683e833b3e"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:22.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033cb", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:08.357 40 INFO tempest.lib.common.rest_client [req-89884ffe-470f-40bb-9d42-26a9b6887573 ] Request (PortsRbacTest:test_update_port_allowed_address_pairs): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.051s 2020-11-06 18:02:08.358 40 DEBUG tempest.lib.common.rest_client [req-89884ffe-470f-40bb-9d42-26a9b6887573 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-89884ffe-470f-40bb-9d42-26a9b6887573', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:08.395 38 INFO tempest.lib.common.rest_client [req-e4c48d14-9a29-4298-a12d-731484412f3c ] Request (BasicOperationsImagesRbacTest:test_download_image): 200 GET http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles 0.050s 2020-11-06 18:02:08.395 38 DEBUG tempest.lib.common.rest_client [req-e4c48d14-9a29-4298-a12d-731484412f3c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e4c48d14-9a29-4298-a12d-731484412f3c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:08.399 40 INFO tempest.lib.common.rest_client [req-3830e2e2-2907-46b1-856b-2154f0677650 ] Request (PortsRbacTest:test_update_port_allowed_address_pairs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:02:08.400 40 DEBUG tempest.lib.common.rest_client [req-3830e2e2-2907-46b1-856b-2154f0677650 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3830e2e2-2907-46b1-856b-2154f0677650', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["4F_Qqf7zQ-e_G1uoVNY37g"], "expires_at": "2020-11-06T19:02:08.000000Z", "issued_at": "2020-11-06T18:02:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:08.427 38 INFO tempest.lib.common.rest_client [req-ebd9eabf-f0c0-43e1-bb04-b51715fb85a6 ] Request (BasicOperationsImagesRbacTest:test_download_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:02:08.427 38 DEBUG tempest.lib.common.rest_client [req-ebd9eabf-f0c0-43e1-bb04-b51715fb85a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ebd9eabf-f0c0-43e1-bb04-b51715fb85a6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f423e6d7a5aa4cd79bba74f653d7bcc4", "name": "tempest-BasicOperationsImagesRbacTest-335924360", "password_expires_at": null}, "audit_ids": ["Awp1aPN-ReGtgHel194S7w"], "expires_at": "2020-11-06T19:02:08.000000Z", "issued_at": "2020-11-06T18:02:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62aad203ff2a47c9a1e41ff9c7c69b5f", "name": "tempest-BasicOperationsImagesRbacTest-335924360"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:08.574 39 INFO tempest.lib.common.rest_client [req-440ea2b0-5efc-4ccf-9da1-f781b395bcab ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.193s 2020-11-06 18:02:08.575 39 DEBUG tempest.lib.common.rest_client [req-440ea2b0-5efc-4ccf-9da1-f781b395bcab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-440ea2b0-5efc-4ccf-9da1-f781b395bcab', 'x-compute-request-id': 'req-440ea2b0-5efc-4ccf-9da1-f781b395bcab', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:08.666 38 INFO tempest.lib.common.rest_client [req-92707862-3b72-47cd-af8d-1117f18a1a90 ] Request (BasicOperationsImagesRbacTest:test_download_image): 200 GET http://172.30.13.94/image/v2/images/c1b99cb0-4abc-4c42-a2fa-10497191c6fd/file 0.237s 2020-11-06 18:02:08.666 38 DEBUG tempest.lib.common.rest_client [req-92707862-3b72-47cd-af8d-1117f18a1a90 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/octet-stream', 'content-md5': 'd3c1bba5566709531d29a649dbdf6c92', 'x-openstack-request-id': 'req-92707862-3b72-47cd-af8d-1117f18a1a90', 'connection': 'close', 'transfer-encoding': 'chunked', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/c1b99cb0-4abc-4c42-a2fa-10497191c6fd/file'} Body: b'\xd7z\xc9`h\x8d\xc6\xec\x1c\xdb\x0e\xb3\x11\xd4\xf5\x93\x8eS\xbc\x14\xb9&\xf9;\x9d)\x0bO\xfb\x1d\xc22\xe8\x8ca\xea\xda\xa8\xcbH\x15\xd5O\x1cc\xfd\x9aN\xddIEd\x11\x12`\xd88\x98\xae\xdb\x14\x87^\x95/\xcc\x91\x86\xbc\xfe\xcf)\xb0ffe\xb8c\xb4\r%OP\x1eO\xc6\xb0\x8b\x08\x94\xea\x0cC\xbam\x93G\x0e(\x9d\xbc|z\xed\xe3.F\xc0)8\x81&\x84}\x88\xa3z\xc8\xfe\xb6\xd0\x10\xd0\x0f\x9cX\x97\\\xc1\xcb\xd9\xcd\x10,Pp2\xb7$\xf3\xcd=\x06\xb06`\xe4\xff?C}\xcb\xb1\x85Dl\xdb*\xdf\x8f\x93B\x9fI\x00l\xb3R\x0f\x92\xc8h\xcbT96F\x07s\xc0f\x96\x84\x14o\x9f\x9d\xc4\xce/\x81i\xfe\x81\xd4\xc5q\xda!v\xd40\x19O\x06\x17\xf1\xb1u\xcb\xcfw%\xad\xde-\xcba\xfb\x05$\xbc\x85=Mkd$\x8c\x9fQ+\xab\xb0\xf6\x18*Y\xc3\xca\x8c\n\xc2\x82Jhy\xffm\xebb\x9a\xa1\xcc\xeb1I\x84hT*\xe5\xb1\xd0\x1c\xd2\xc7BQ\x8e_\x8f\xb1.i\xce\x90\x7f\xd8\x13R\xc0\x92\xef\xf5s\xf2\xb3\xa3MC( d\x00\x13\xca\x8b\x174\x15\xd1\xea\x008Z\x9f\xbb$\x17<:bTb\xbe\x12z)\xbaq+\x04\x04m\x15\xe7D\xe1\xabmn\xf7o\x87\x1a]a\xfa\xb7\xea\x08\xb0mffRt\xe4\xd9&\x8c\xbf\x13r~\xcd\xe2\xb4\x8f>"F\xabHa05\x14q\xa3\xf0z\x8a\x02\xc2Q-\x9eO\x0c\xd3\xc9\r\xb6\x9a\xf6\x8eJ\x80\x0e\xe6\xf1\xa1&\x15X\xa5\x8c\xc5O\xeb\xeb\xe1\xae\xd9\xcd*\xb4\x9d+)\x97AkP\x0f\xa7\xb2W\xfd\xfd\x18\xbbe\xfb\x06*\xba\x14\xdb\x13s6\xdb\xaa}\x1a\xcc\x9e\xa0\xe7\'kL$\xe6igS\xa4@\xd5\xd3\xd0=\x01\xf0\xec\x8b\xfe\x82\xdeD/S\x1f\xf4m\xe4\xc0\x03\x06\n\xdb\x12\x8d\x93\xec\xa8E\x82\x16\x0e\xc4\xb4\xb8\xe7`\x7f\xdeY\x9a\x0b\xb6\xdd\x8f\xf5\xafu)l/@\x18\x97&\xad\xba\xec\x0f\x15\x9cx2\x8e\x85\xb8\x12x(\x1f\xf9\x07\x07\xcb\xbf\xa7tL\x02\x1f\x12\xe5\xe2\x905\x03\x1a\x02\xde\xd1\xe4\xa9\x1e-\x8a\xfb\xd6\x9c\xe2\xc4?z\x05\x14Ec0\'\xc9\x1fD\x8a\x00\xddW\x07\xdf\xc1X\xf8\xfa(\x10##\xca\xfc\x076\xc9\x83j\xfc\x05+\x06\x88\xf6\xaf\x18)\x98\xef\xae\t\x12\xc9)P\xa2\x01m\x8f\xc8\xb1\xab\xb5\x98M\xde\x17q9]\x1bQ\xf6t\x15:\xa3\xdeUJAL^v\xb4\xe2\x1a\x9f/U\x92\xfa\xa5\x1dN<\xdb\x84\xdb\xaf\x1cy\\(\xf3\x9f\xd4\xdf\\8VTC\xffL\x07.\xfd"\x15/w\xf8[\x15\xad\x0c\xc0\x04\xd4\xc6eE\x14g\xae-b5`kl)7l\xf5\x9998\'f\x98\xeb\xd5WG\n\xedW\xb6\xd7yO\xb3V\xc3\x1f\x1f\xf8\xd8\xea\xef\x7f\xecO\x1d5\xce\xa5\xc4\x17(\x1a^\xa0\x12\xa2\xfdx\xdaU\xf7\xd4}tF\xc3\xd1\xb0J1N\xc3,\xf82\x97=u\xe4\x1e\xd9\xb9\x94\x1c\x99h&\xa0\xd8\xe7;\xce6\xbb\x0f\xffe\xa2\x96mH\t\xa4\x15#\xef\x10\n\x1a\t5\x80\x91\xec\x8f\x85kbR\xa5\xa6\xffa\xcf\x18~\xf7G\x86SS\xd5\x80\xe8#\xfa\xa7\x05q\x082\xb2\xd9\x03\xc7|\x01\xc2\x88\xf1\xe0\xf1\xe5\x11\x98\xef\x83\xcaG\x86}Y\xd1\xec\x08k\x14\x12\x01\xc4\x02\xbc\xfb\xb2x0\xba\x1d\xa8\xc6#\xc7\x13&\x00o\xd9V\x03\x1b\xf1;*\xbe\x074\x8c\xdd5\xf2G\xa0\xe0\'I\xe4=\xa5s"\xa4\xb9\xd1\xab\x88u\x01L\xb2\x15p\xcb>4a\x9c\xf1\xd0\xe7JA\x19\xd5\xc8\x91!\x12\xfc\xe3r\x94\xfcI@3\xaf\x99`?\t\xd9\xc0\xa6\x92\xdc~+\\\xc0a\xa38\xe0\xafw\x08\xf0\xe6\xd3R\xd2\xaa[o\x1d^{\xd6(w\xfc\xb4\xf6\xaa\x96+\xc5\x1fC\xed\x1fg\xd5\xa3\xfd\xe0u\xa0\xa8\xd4\x8c}:\xc9\xfa@\x1exl\x08\xa3g&/\xe9\x18B\x16y#\x11\x07^\x8aW\x90\x03\x98\x8b\xcaA\x1c\xf3\x1e\xdb\n\x14]N!\x00\xe2\xb0\x8f\xba\x7f\x8a' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:08.667 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:08.722 38 INFO tempest.lib.common.rest_client [req-3a59feac-097f-4d56-acd3-5c3ed5e3ba2d ] Request (BasicOperationsImagesRbacTest:test_download_image): 200 GET http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles 0.054s 2020-11-06 18:02:08.722 38 DEBUG tempest.lib.common.rest_client [req-3a59feac-097f-4d56-acd3-5c3ed5e3ba2d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3a59feac-097f-4d56-acd3-5c3ed5e3ba2d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:08.757 38 INFO tempest.lib.common.rest_client [req-813357b1-b8e7-4fee-ae0a-1764823e6e04 ] Request (BasicOperationsImagesRbacTest:test_download_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:02:08.758 38 DEBUG tempest.lib.common.rest_client [req-813357b1-b8e7-4fee-ae0a-1764823e6e04 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-813357b1-b8e7-4fee-ae0a-1764823e6e04', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f423e6d7a5aa4cd79bba74f653d7bcc4", "name": "tempest-BasicOperationsImagesRbacTest-335924360", "password_expires_at": null}, "audit_ids": ["JKwSCb4IQ7KEChDdHY3jnQ"], "expires_at": "2020-11-06T19:02:08.000000Z", "issued_at": "2020-11-06T18:02:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62aad203ff2a47c9a1e41ff9c7c69b5f", "name": "tempest-BasicOperationsImagesRbacTest-335924360"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:08.761 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:08.761 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:08.762 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_images, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:08.763 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:08.808 38 INFO tempest.lib.common.rest_client [req-42ce29c6-0c6c-4fc6-a64d-d997634c4b27 ] Request (BasicOperationsImagesRbacTest:test_list_images): 200 GET http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles 0.045s 2020-11-06 18:02:08.809 38 DEBUG tempest.lib.common.rest_client [req-42ce29c6-0c6c-4fc6-a64d-d997634c4b27 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-42ce29c6-0c6c-4fc6-a64d-d997634c4b27', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:08.845 38 INFO tempest.lib.common.rest_client [req-506d7957-369a-41f0-941a-393da54b90ca ] Request (BasicOperationsImagesRbacTest:test_list_images): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:02:08.846 38 DEBUG tempest.lib.common.rest_client [req-506d7957-369a-41f0-941a-393da54b90ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-506d7957-369a-41f0-941a-393da54b90ca', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f423e6d7a5aa4cd79bba74f653d7bcc4", "name": "tempest-BasicOperationsImagesRbacTest-335924360", "password_expires_at": null}, "audit_ids": ["jTBDUjRpQrqNZBG4zNv5FA"], "expires_at": "2020-11-06T19:02:08.000000Z", "issued_at": "2020-11-06T18:02:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62aad203ff2a47c9a1e41ff9c7c69b5f", "name": "tempest-BasicOperationsImagesRbacTest-335924360"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:08.953 38 INFO tempest.lib.common.rest_client [req-b75247c5-f2a4-491c-9ede-ae3aa5d04d7f ] Request (BasicOperationsImagesRbacTest:test_list_images): 200 GET http://172.30.13.94/image/v2/images 0.106s 2020-11-06 18:02:08.954 38 DEBUG tempest.lib.common.rest_client [req-b75247c5-f2a4-491c-9ede-ae3aa5d04d7f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '16535', 'content-type': 'application/json', 'x-openstack-request-id': 'req-b75247c5-f2a4-491c-9ede-ae3aa5d04d7f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"images": [{"name": "tempest-BasicOperationsImagesRbacTest-Image-1201725103", "disk_format": "raw", "container_format": "bare", "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "62aad203ff2a47c9a1e41ff9c7c69b5f", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "db96fb06-92ba-4539-b49b-be50a65e678c", "created_at": "2020-11-06T18:02:08Z", "updated_at": "2020-11-06T18:02:08Z", "tags": [], "self": "/v2/images/db96fb06-92ba-4539-b49b-be50a65e678c", "file": "/v2/images/db96fb06-92ba-4539-b49b-be50a65e678c/file", "schema": "/v2/schemas/image"}, {"name": "tempest-BasicOperationsImagesRbacTest-Image-1030122333", "disk_format": "raw", "container_format": "bare", "visibility": "shared", "size": 1024, "virtual_size": 1024, "status": "active", "checksum": "d3c1bba5566709531d29a649dbdf6c92", "protected": false, "min_ram": 0, "min_disk": 0, "owner": "62aad203ff2a47c9a1e41ff9c7c69b5f", "os_hidden": false, "os_hash_algo": "sha512", "os_hash_value": "70347b59551e582c253566bfda0c0762007b2d6ef126bcc487470d68d06758249d6b030e6b5f9d475369fdae079e60223022a2eed6abb5df218691d29f9c1134", "id": "c1b99cb0-4abc-4c42-a2fa-10497191c6fd", "created_at": "2020-11-06T18:02:08Z", "updated_at": "2020-11-06T18:02:08Z", "tags": [], "self": "/v2/images/c1b99cb0-4abc-4c42-a2fa-10497191c6fd", "file": "/v2/images/c1b99cb0-4abc-4c42-a2fa-10497191c6fd/file", "schema": "/v2/schemas/image"}, {"name": "tempest-BasicOperationsImagesRbacTest-Image-544919587", "disk_format": "raw", "container_format": "bare", "visibility": "community", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "62aad203ff2a47c9a1e41ff9c7c69b5f", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "ce39cd1c-f379-477f-aa69-d541c3dfb666", "created_at": "2020-11-06T18:02:06Z", "updated_at": "2020-11-06T18:02:06Z", "tags": [], "self": "/v2/images/ce39cd1c-f379-477f-aa69-d541c3dfb666", "file": "/v2/images/ce39cd1c-f379-477f-aa69-d541c3dfb666/file", "schema": "/v2/schemas/image"}, {"name": "tempest-BasicOperationsImagesRbacTest-Image-1153616155", "disk_format": "raw", "container_format": "bare", "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "62aad203ff2a47c9a1e41ff9c7c69b5f", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "7d141290-3180-43e8-97a8-0c8ef3c5899a", "created_at": "2020-11-06T18:02:06Z", "updated_at": "2020-11-06T18:02:06Z", "tags": ["tempest-BasicOperationsImagesRbacTest-tag-333241065"], "self": "/v2/images/7d141290-3180-43e8-97a8-0c8ef3c5899a", "file": "/v2/images/7d141290-3180-43e8-97a8-0c8ef3c5899a/file", "schema": "/v2/schemas/image"}, {"name": "tempest-BasicOperationsImagesRbacTest-Image-282484322", "disk_format": "raw", "container_format": "bare", "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "62aad203ff2a47c9a1e41ff9c7c69b5f", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "6409d663-e524-47b6-97a9-d2c6fba9de34", "created_at": "2020-11-06T18:02:06Z", "updated_at": "2020-11-06T18:02:06Z", "tags": [], "self": "/v2/images/6409d663-e524-47b6-97a9-d2c6fba9de34", "file": "/v2/images/6409d663-e524-47b6-97a9-d2c6fba9de34/file", "schema": "/v2/schemas/image"}, {"name": "tempest-BasicOperationsImagesRbacTest-Image-1156357618", "disk_format": "raw", "container_format": "bare", "visibility": "shared", "size": 1024, "virtual_size": 1024, "status": "deactivated", "checksum": "e86b98da1c7b6a7518da47b41dd1cef1", "protected": false, "min_ram": 0, "min_disk": 0, "owner": "62aad203ff2a47c9a1e41ff9c7c69b5f", "os_hidden": false, "os_hash_algo": "sha512", "os_hash_value": "2f829a6ea86b5d3cc62d7e4b096b4a96439113324cc36b6a02481704cee94a7a5a2130e05b18eebe9855a9291763c79395cf9b5aef51f20dbe4e25e837368e26", "id": "2ebad54 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:08.954 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:09.001 38 INFO tempest.lib.common.rest_client [req-1674f5c2-6012-4897-8bc5-45c4e719d607 ] Request (BasicOperationsImagesRbacTest:test_list_images): 200 GET http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles 0.046s 2020-11-06 18:02:09.001 38 DEBUG tempest.lib.common.rest_client [req-1674f5c2-6012-4897-8bc5-45c4e719d607 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1674f5c2-6012-4897-8bc5-45c4e719d607', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:09.032 40 INFO tempest.lib.common.rest_client [req-cf9ca324-bedd-4f7c-bdb1-b92bc4cb183e ] Request (PortsRbacTest:test_update_port_allowed_address_pairs): 200 PUT http://172.30.13.94:9696/v2.0/ports/489b6d93-ae70-4c73-9220-5d613ae619e7 0.630s 2020-11-06 18:02:09.033 40 DEBUG tempest.lib.common.rest_client [req-cf9ca324-bedd-4f7c-bdb1-b92bc4cb183e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"allowed_address_pairs": [{"ip_address": "192.168.120.253", "mac_address": "fa:16:3e:13:12:93"}]}} Response - Headers: {'content-type': 'application/json', 'content-length': '1152', 'x-openstack-request-id': 'req-cf9ca324-bedd-4f7c-bdb1-b92bc4cb183e', 'date': 'Fri, 06 Nov 2020 18:02:09 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/489b6d93-ae70-4c73-9220-5d613ae619e7'} Body: b'{"port":{"id":"489b6d93-ae70-4c73-9220-5d613ae619e7","name":"tempest-PortsRbacTest-302887961","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:c7:44:2c","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.5"}],"allowed_address_pairs":[{"mac_address":"fa:16:3e:13:12:93","ip_address":"192.168.120.253"}],"extra_dhcp_opts":[],"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.5","hostname":"host-192-168-120-5","fqdn":"host-192-168-120-5.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:02:07Z","updated_at":"2020-11-06T18:02:08Z","revision_number":2,"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:09.033 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:09.037 38 INFO tempest.lib.common.rest_client [req-d2df066d-f4ce-4ca1-b7eb-53d951bc9e08 ] Request (BasicOperationsImagesRbacTest:test_list_images): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:02:09.038 38 DEBUG tempest.lib.common.rest_client [req-d2df066d-f4ce-4ca1-b7eb-53d951bc9e08 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d2df066d-f4ce-4ca1-b7eb-53d951bc9e08', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f423e6d7a5aa4cd79bba74f653d7bcc4", "name": "tempest-BasicOperationsImagesRbacTest-335924360", "password_expires_at": null}, "audit_ids": ["Hqj3KIIFTaq1zhvCVloYPQ"], "expires_at": "2020-11-06T19:02:09.000000Z", "issued_at": "2020-11-06T18:02:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62aad203ff2a47c9a1e41ff9c7c69b5f", "name": "tempest-BasicOperationsImagesRbacTest-335924360"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:09.041 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:09.041 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:09.043 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: publicize_image, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:09.044 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:09.083 40 INFO tempest.lib.common.rest_client [req-233e0faf-f8fd-45f4-bd2b-78be39f51a02 ] Request (PortsRbacTest:test_update_port_allowed_address_pairs): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.049s 2020-11-06 18:02:09.084 40 DEBUG tempest.lib.common.rest_client [req-233e0faf-f8fd-45f4-bd2b-78be39f51a02 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-233e0faf-f8fd-45f4-bd2b-78be39f51a02', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:09.091 38 INFO tempest.lib.common.rest_client [req-d4761f26-7e59-4fa3-9fd0-7f098c73a4c5 ] Request (BasicOperationsImagesRbacTest:test_publicize_image): 200 GET http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles 0.047s 2020-11-06 18:02:09.092 38 DEBUG tempest.lib.common.rest_client [req-d4761f26-7e59-4fa3-9fd0-7f098c73a4c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d4761f26-7e59-4fa3-9fd0-7f098c73a4c5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:09.118 40 INFO tempest.lib.common.rest_client [req-9030e179-3bb4-4bfd-bab9-0c52038ab035 ] Request (PortsRbacTest:test_update_port_allowed_address_pairs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:02:09.119 40 DEBUG tempest.lib.common.rest_client [req-9030e179-3bb4-4bfd-bab9-0c52038ab035 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9030e179-3bb4-4bfd-bab9-0c52038ab035', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["8J-TqsD4ReeR2WMXWIyXNg"], "expires_at": "2020-11-06T19:02:09.000000Z", "issued_at": "2020-11-06T18:02:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:09.122 38 INFO tempest.lib.common.rest_client [req-9c2b1167-0445-4209-8fd1-654e1a147712 ] Request (BasicOperationsImagesRbacTest:test_publicize_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.030s 2020-11-06 18:02:09.123 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:09.123 38 DEBUG tempest.lib.common.rest_client [req-9c2b1167-0445-4209-8fd1-654e1a147712 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9c2b1167-0445-4209-8fd1-654e1a147712', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f423e6d7a5aa4cd79bba74f653d7bcc4", "name": "tempest-BasicOperationsImagesRbacTest-335924360", "password_expires_at": null}, "audit_ids": ["bs3WD37SR4OzH4yT7RjboA"], "expires_at": "2020-11-06T19:02:09.000000Z", "issued_at": "2020-11-06T18:02:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62aad203ff2a47c9a1e41ff9c7c69b5f", "name": "tempest-BasicOperationsImagesRbacTest-335924360"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:09.127 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:09.128 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:09.131 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_port, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:09.132 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:09.135 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_port:binding:host_id, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:09.222 38 INFO tempest.lib.common.rest_client [req-038d2f2b-ad72-4a7d-8bf1-6ea45dfbbcab ] Request (BasicOperationsImagesRbacTest:test_publicize_image): 201 POST http://172.30.13.94/image/v2/images 0.097s 2020-11-06 18:02:09.223 38 DEBUG tempest.lib.common.rest_client [req-038d2f2b-ad72-4a7d-8bf1-6ea45dfbbcab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-BasicOperationsImagesRbacTest-Image-2123502176", "container_format": "bare", "disk_format": "raw", "visibility": "public"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '661', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/70a47842-2b67-464a-bf54-5b198e8e0381', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-038d2f2b-ad72-4a7d-8bf1-6ea45dfbbcab', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-BasicOperationsImagesRbacTest-Image-2123502176", "disk_format": "raw", "container_format": "bare", "visibility": "public", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "62aad203ff2a47c9a1e41ff9c7c69b5f", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "70a47842-2b67-464a-bf54-5b198e8e0381", "created_at": "2020-11-06T18:02:09Z", "updated_at": "2020-11-06T18:02:09Z", "tags": [], "self": "/v2/images/70a47842-2b67-464a-bf54-5b198e8e0381", "file": "/v2/images/70a47842-2b67-464a-bf54-5b198e8e0381/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:09.223 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:09.272 38 INFO tempest.lib.common.rest_client [req-57d11be0-2531-44ad-9263-61aaf30e6dcb ] Request (BasicOperationsImagesRbacTest:test_publicize_image): 200 GET http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles 0.048s 2020-11-06 18:02:09.273 38 DEBUG tempest.lib.common.rest_client [req-57d11be0-2531-44ad-9263-61aaf30e6dcb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-57d11be0-2531-44ad-9263-61aaf30e6dcb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:09.306 38 INFO tempest.lib.common.rest_client [req-93adb108-3bba-4958-9fc9-37a09bfb0fde ] Request (BasicOperationsImagesRbacTest:test_publicize_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:02:09.306 38 DEBUG tempest.lib.common.rest_client [req-93adb108-3bba-4958-9fc9-37a09bfb0fde ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-93adb108-3bba-4958-9fc9-37a09bfb0fde', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f423e6d7a5aa4cd79bba74f653d7bcc4", "name": "tempest-BasicOperationsImagesRbacTest-335924360", "password_expires_at": null}, "audit_ids": ["EG16dHAvR-GG9qOtpJYJFQ"], "expires_at": "2020-11-06T19:02:09.000000Z", "issued_at": "2020-11-06T18:02:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62aad203ff2a47c9a1e41ff9c7c69b5f", "name": "tempest-BasicOperationsImagesRbacTest-335924360"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:09.309 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:09.309 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:09.311 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: reactivate, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:09.428 38 INFO tempest.lib.common.rest_client [req-f338cd37-9890-40d2-92d2-bfaed480c015 ] Request (BasicOperationsImagesRbacTest:test_reactivate_image): 201 POST http://172.30.13.94/image/v2/images 0.117s 2020-11-06 18:02:09.428 38 DEBUG tempest.lib.common.rest_client [req-f338cd37-9890-40d2-92d2-bfaed480c015 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-BasicOperationsImagesRbacTest-Image-774964376", "container_format": "bare", "disk_format": "raw"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '660', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/407d14d3-1ea9-41e2-af9c-a8dbc93cdf50', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-f338cd37-9890-40d2-92d2-bfaed480c015', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-BasicOperationsImagesRbacTest-Image-774964376", "disk_format": "raw", "container_format": "bare", "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "62aad203ff2a47c9a1e41ff9c7c69b5f", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "407d14d3-1ea9-41e2-af9c-a8dbc93cdf50", "created_at": "2020-11-06T18:02:09Z", "updated_at": "2020-11-06T18:02:09Z", "tags": [], "self": "/v2/images/407d14d3-1ea9-41e2-af9c-a8dbc93cdf50", "file": "/v2/images/407d14d3-1ea9-41e2-af9c-a8dbc93cdf50/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:09.435 38 DEBUG patrole_tempest_plugin.tests.api.image.test_images_rbac [-] Image file content type _upload_image /usr/lib/python3.8/site-packages/patrole_tempest_plugin/tests/api/image/test_images_rbac.py:45 2020-11-06 18:02:09.568 37 INFO tempest.lib.common.rest_client [req-4b3d6e58-d82b-4223-a5bc-47d95f4f54d1 ] Request (ComputeServersRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e 0.198s 2020-11-06 18:02:09.569 37 DEBUG tempest.lib.common.rest_client [req-4b3d6e58-d82b-4223-a5bc-47d95f4f54d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4b3d6e58-d82b-4223-a5bc-47d95f4f54d1', 'x-compute-request-id': 'req-4b3d6e58-d82b-4223-a5bc-47d95f4f54d1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e'} Body: b'{"server": {"id": "ee273607-06e8-4025-a40f-63683e833b3e", "name": "tempest-ComputeServersRbacTest-server-926161566", "status": "ACTIVE", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "user_id": "262f98552a3a4d8a8fba3f96d5a872bf", "metadata": {}, "hostId": "72aa4147e128daa70511a3b03038cad49752a08b0327f6bc0c6decc0", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:01:15Z", "updated": "2020-11-06T18:02:09Z", "addresses": {"tempest-ComputeServersRbacTest-1143895587-network": [{"version": 4, "addr": "192.168.120.11", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:ff:85:1c"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ee273607-06e8-4025-a40f-63683e833b3e"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:22.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033cb", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:09.698 38 INFO tempest.lib.common.rest_client [req-680d8756-abb3-4770-8291-e6c45d948024 ] Request (BasicOperationsImagesRbacTest:test_reactivate_image): 204 PUT http://172.30.13.94/image/v2/images/407d14d3-1ea9-41e2-af9c-a8dbc93cdf50/file 0.262s 2020-11-06 18:02:09.699 38 DEBUG tempest.lib.common.rest_client [req-680d8756-abb3-4770-8291-e6c45d948024 ] Request - Headers: {'Content-Type': 'application/octet-stream', 'X-Auth-Token': ''} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-680d8756-abb3-4770-8291-e6c45d948024', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/407d14d3-1ea9-41e2-af9c-a8dbc93cdf50/file'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:09.699 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:09.749 38 INFO tempest.lib.common.rest_client [req-912939b6-10f8-4525-b40d-711290c6013f ] Request (BasicOperationsImagesRbacTest:test_reactivate_image): 200 GET http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles 0.048s 2020-11-06 18:02:09.749 38 DEBUG tempest.lib.common.rest_client [req-912939b6-10f8-4525-b40d-711290c6013f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-912939b6-10f8-4525-b40d-711290c6013f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:09.781 38 INFO tempest.lib.common.rest_client [req-810a98ad-c20c-4c7b-9110-97b09f5eab75 ] Request (BasicOperationsImagesRbacTest:test_reactivate_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:02:09.782 38 DEBUG tempest.lib.common.rest_client [req-810a98ad-c20c-4c7b-9110-97b09f5eab75 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-810a98ad-c20c-4c7b-9110-97b09f5eab75', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f423e6d7a5aa4cd79bba74f653d7bcc4", "name": "tempest-BasicOperationsImagesRbacTest-335924360", "password_expires_at": null}, "audit_ids": ["KG-MsBAGTR69MEdL2EG6qA"], "expires_at": "2020-11-06T19:02:09.000000Z", "issued_at": "2020-11-06T18:02:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62aad203ff2a47c9a1e41ff9c7c69b5f", "name": "tempest-BasicOperationsImagesRbacTest-335924360"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:09.806 39 INFO tempest.lib.common.rest_client [req-85a8f1ac-6f9f-400a-8a59-68f9c850da0c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.217s 2020-11-06 18:02:09.807 39 DEBUG tempest.lib.common.rest_client [req-85a8f1ac-6f9f-400a-8a59-68f9c850da0c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-85a8f1ac-6f9f-400a-8a59-68f9c850da0c', 'x-compute-request-id': 'req-85a8f1ac-6f9f-400a-8a59-68f9c850da0c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:09.875 38 INFO tempest.lib.common.rest_client [req-a36a0dc6-ccf0-4138-96f8-b2c89c240959 ] Request (BasicOperationsImagesRbacTest:test_reactivate_image): 204 POST http://172.30.13.94/image/v2/images/407d14d3-1ea9-41e2-af9c-a8dbc93cdf50/actions/reactivate 0.092s 2020-11-06 18:02:09.875 38 DEBUG tempest.lib.common.rest_client [req-a36a0dc6-ccf0-4138-96f8-b2c89c240959 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-a36a0dc6-ccf0-4138-96f8-b2c89c240959', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/407d14d3-1ea9-41e2-af9c-a8dbc93cdf50/actions/reactivate'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:09.876 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:09.925 38 INFO tempest.lib.common.rest_client [req-aa8d0eb7-b2f3-4d74-bb1a-01a8bdc19dfd ] Request (BasicOperationsImagesRbacTest:test_reactivate_image): 200 GET http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles 0.048s 2020-11-06 18:02:09.926 38 DEBUG tempest.lib.common.rest_client [req-aa8d0eb7-b2f3-4d74-bb1a-01a8bdc19dfd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aa8d0eb7-b2f3-4d74-bb1a-01a8bdc19dfd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:09.959 38 INFO tempest.lib.common.rest_client [req-b198b09f-ff41-4987-93f2-d6aefabff2c5 ] Request (BasicOperationsImagesRbacTest:test_reactivate_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:02:09.960 38 DEBUG tempest.lib.common.rest_client [req-b198b09f-ff41-4987-93f2-d6aefabff2c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b198b09f-ff41-4987-93f2-d6aefabff2c5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f423e6d7a5aa4cd79bba74f653d7bcc4", "name": "tempest-BasicOperationsImagesRbacTest-335924360", "password_expires_at": null}, "audit_ids": ["WeMAiMB6TGO6Bhkmi-IwjQ"], "expires_at": "2020-11-06T19:02:09.000000Z", "issued_at": "2020-11-06T18:02:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62aad203ff2a47c9a1e41ff9c7c69b5f", "name": "tempest-BasicOperationsImagesRbacTest-335924360"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:09.963 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:09.964 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:09.966 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_image, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:10.060 38 INFO tempest.lib.common.rest_client [req-04211d7a-774f-41aa-8ed9-78e0857e8fa5 ] Request (BasicOperationsImagesRbacTest:test_show_image): 201 POST http://172.30.13.94/image/v2/images 0.093s 2020-11-06 18:02:10.060 38 DEBUG tempest.lib.common.rest_client [req-04211d7a-774f-41aa-8ed9-78e0857e8fa5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-BasicOperationsImagesRbacTest-Image-1235225080", "container_format": "bare", "disk_format": "raw"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '661', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/8b4c3d5f-7195-4977-8aff-b048240aeb36', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-04211d7a-774f-41aa-8ed9-78e0857e8fa5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-BasicOperationsImagesRbacTest-Image-1235225080", "disk_format": "raw", "container_format": "bare", "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "62aad203ff2a47c9a1e41ff9c7c69b5f", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "8b4c3d5f-7195-4977-8aff-b048240aeb36", "created_at": "2020-11-06T18:02:10Z", "updated_at": "2020-11-06T18:02:10Z", "tags": [], "self": "/v2/images/8b4c3d5f-7195-4977-8aff-b048240aeb36", "file": "/v2/images/8b4c3d5f-7195-4977-8aff-b048240aeb36/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:10.061 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:10.116 38 INFO tempest.lib.common.rest_client [req-d05cff88-1f3b-426b-bc1d-672d46d2303a ] Request (BasicOperationsImagesRbacTest:test_show_image): 200 GET http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles 0.054s 2020-11-06 18:02:10.116 38 DEBUG tempest.lib.common.rest_client [req-d05cff88-1f3b-426b-bc1d-672d46d2303a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d05cff88-1f3b-426b-bc1d-672d46d2303a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:10.152 38 INFO tempest.lib.common.rest_client [req-a418ce71-a57f-4a14-8a52-2e6bb07a1372 ] Request (BasicOperationsImagesRbacTest:test_show_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:02:10.153 38 DEBUG tempest.lib.common.rest_client [req-a418ce71-a57f-4a14-8a52-2e6bb07a1372 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a418ce71-a57f-4a14-8a52-2e6bb07a1372', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f423e6d7a5aa4cd79bba74f653d7bcc4", "name": "tempest-BasicOperationsImagesRbacTest-335924360", "password_expires_at": null}, "audit_ids": ["r81ZRfmDThej9qAnfLNSjw"], "expires_at": "2020-11-06T19:02:10.000000Z", "issued_at": "2020-11-06T18:02:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62aad203ff2a47c9a1e41ff9c7c69b5f", "name": "tempest-BasicOperationsImagesRbacTest-335924360"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:10.238 38 INFO tempest.lib.common.rest_client [req-1ece38b8-e28f-4f33-83c9-828c83c84583 ] Request (BasicOperationsImagesRbacTest:test_show_image): 200 GET http://172.30.13.94/image/v2/images/8b4c3d5f-7195-4977-8aff-b048240aeb36 0.085s 2020-11-06 18:02:10.239 38 DEBUG tempest.lib.common.rest_client [req-1ece38b8-e28f-4f33-83c9-828c83c84583 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '661', 'content-type': 'application/json', 'x-openstack-request-id': 'req-1ece38b8-e28f-4f33-83c9-828c83c84583', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/8b4c3d5f-7195-4977-8aff-b048240aeb36'} Body: b'{"name": "tempest-BasicOperationsImagesRbacTest-Image-1235225080", "disk_format": "raw", "container_format": "bare", "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "62aad203ff2a47c9a1e41ff9c7c69b5f", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "8b4c3d5f-7195-4977-8aff-b048240aeb36", "created_at": "2020-11-06T18:02:10Z", "updated_at": "2020-11-06T18:02:10Z", "tags": [], "self": "/v2/images/8b4c3d5f-7195-4977-8aff-b048240aeb36", "file": "/v2/images/8b4c3d5f-7195-4977-8aff-b048240aeb36/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:10.239 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:10.287 38 INFO tempest.lib.common.rest_client [req-53797901-767d-42ac-b8f8-876952516e10 ] Request (BasicOperationsImagesRbacTest:test_show_image): 200 GET http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles 0.047s 2020-11-06 18:02:10.287 38 DEBUG tempest.lib.common.rest_client [req-53797901-767d-42ac-b8f8-876952516e10 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-53797901-767d-42ac-b8f8-876952516e10', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:10.321 38 INFO tempest.lib.common.rest_client [req-41ed99df-8502-4c99-a568-4059eca69f25 ] Request (BasicOperationsImagesRbacTest:test_show_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:02:10.322 38 DEBUG tempest.lib.common.rest_client [req-41ed99df-8502-4c99-a568-4059eca69f25 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-41ed99df-8502-4c99-a568-4059eca69f25', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f423e6d7a5aa4cd79bba74f653d7bcc4", "name": "tempest-BasicOperationsImagesRbacTest-335924360", "password_expires_at": null}, "audit_ids": ["-Qx3jtd-QU6CHSgmmjj05Q"], "expires_at": "2020-11-06T19:02:10.000000Z", "issued_at": "2020-11-06T18:02:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62aad203ff2a47c9a1e41ff9c7c69b5f", "name": "tempest-BasicOperationsImagesRbacTest-335924360"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:10.325 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:10.325 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:10.327 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: modify_image, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:10.350 40 INFO tempest.lib.common.rest_client [req-eaf12db0-60de-4bbf-866f-1eeccbd8790b ] Request (PortsRbacTest:test_update_port_binding_host_id): 201 POST http://172.30.13.94:9696/v2.0/ports 1.214s 2020-11-06 18:02:10.350 40 DEBUG tempest.lib.common.rest_client [req-eaf12db0-60de-4bbf-866f-1eeccbd8790b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "586884b2-4363-4597-acb0-ddbc49908b65", "binding:host_id": "rbac_test_host", "name": "tempest-PortsRbacTest-638047048"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1115', 'x-openstack-request-id': 'req-eaf12db0-60de-4bbf-866f-1eeccbd8790b', 'date': 'Fri, 06 Nov 2020 18:02:10 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"3525ae88-78ad-4c0a-a27e-aece7cf41d4f","name":"tempest-PortsRbacTest-638047048","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:34:99:30","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.151"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"rbac_test_host","binding:vif_type":"binding_failed","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.151","hostname":"host-192-168-120-151","fqdn":"host-192-168-120-151.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:02:09Z","updated_at":"2020-11-06T18:02:09Z","revision_number":1,"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:10.351 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:10.399 40 INFO tempest.lib.common.rest_client [req-1ed43e26-247b-4215-8066-fff185a4d3b5 ] Request (PortsRbacTest:test_update_port_binding_host_id): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.047s 2020-11-06 18:02:10.399 40 DEBUG tempest.lib.common.rest_client [req-1ed43e26-247b-4215-8066-fff185a4d3b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1ed43e26-247b-4215-8066-fff185a4d3b5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:10.425 38 INFO tempest.lib.common.rest_client [req-d20635d1-7320-49f6-a52b-57f2f258f8bd ] Request (BasicOperationsImagesRbacTest:test_update_image): 201 POST http://172.30.13.94/image/v2/images 0.097s 2020-11-06 18:02:10.426 38 DEBUG tempest.lib.common.rest_client [req-d20635d1-7320-49f6-a52b-57f2f258f8bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-BasicOperationsImagesRbacTest-Image-1304934627", "container_format": "bare", "disk_format": "raw"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '661', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/e0fd34a1-ea59-443c-ad9c-20f7d4925db7', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-d20635d1-7320-49f6-a52b-57f2f258f8bd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-BasicOperationsImagesRbacTest-Image-1304934627", "disk_format": "raw", "container_format": "bare", "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "62aad203ff2a47c9a1e41ff9c7c69b5f", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "e0fd34a1-ea59-443c-ad9c-20f7d4925db7", "created_at": "2020-11-06T18:02:10Z", "updated_at": "2020-11-06T18:02:10Z", "tags": [], "self": "/v2/images/e0fd34a1-ea59-443c-ad9c-20f7d4925db7", "file": "/v2/images/e0fd34a1-ea59-443c-ad9c-20f7d4925db7/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:10.426 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:10.434 40 INFO tempest.lib.common.rest_client [req-b5d8e9e7-d771-43c7-9870-d6b24c062a2c ] Request (PortsRbacTest:test_update_port_binding_host_id): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:02:10.434 40 DEBUG tempest.lib.common.rest_client [req-b5d8e9e7-d771-43c7-9870-d6b24c062a2c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b5d8e9e7-d771-43c7-9870-d6b24c062a2c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["CpiLe37OQxa-6tTafE7Tmg"], "expires_at": "2020-11-06T19:02:10.000000Z", "issued_at": "2020-11-06T18:02:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:10.484 38 INFO tempest.lib.common.rest_client [req-1531bc29-6ecf-43a1-b2dd-e9dde16ee3bc ] Request (BasicOperationsImagesRbacTest:test_update_image): 200 GET http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles 0.057s 2020-11-06 18:02:10.485 38 DEBUG tempest.lib.common.rest_client [req-1531bc29-6ecf-43a1-b2dd-e9dde16ee3bc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1531bc29-6ecf-43a1-b2dd-e9dde16ee3bc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:10.526 38 INFO tempest.lib.common.rest_client [req-cb3aab22-bc77-4527-b023-0af74929531a ] Request (BasicOperationsImagesRbacTest:test_update_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:02:10.527 38 DEBUG tempest.lib.common.rest_client [req-cb3aab22-bc77-4527-b023-0af74929531a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cb3aab22-bc77-4527-b023-0af74929531a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f423e6d7a5aa4cd79bba74f653d7bcc4", "name": "tempest-BasicOperationsImagesRbacTest-335924360", "password_expires_at": null}, "audit_ids": ["BwtMSKTcQhqdD2LM_Eu0xw"], "expires_at": "2020-11-06T19:02:10.000000Z", "issued_at": "2020-11-06T18:02:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62aad203ff2a47c9a1e41ff9c7c69b5f", "name": "tempest-BasicOperationsImagesRbacTest-335924360"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:10.645 37 INFO tempest.lib.common.rest_client [req-85bacb6f-461e-4aa3-ae58-5f6b172c112d ] Request (ComputeServersRbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e 0.059s 2020-11-06 18:02:10.646 37 DEBUG tempest.lib.common.rest_client [req-85bacb6f-461e-4aa3-ae58-5f6b172c112d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-85bacb6f-461e-4aa3-ae58-5f6b172c112d', 'x-compute-request-id': 'req-85bacb6f-461e-4aa3-ae58-5f6b172c112d', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ee273607-06e8-4025-a40f-63683e833b3e'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance ee273607-06e8-4025-a40f-63683e833b3e could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:10.647 37 DEBUG tempest.lib.common.dynamic_creds [-] Clearing network: {'id': '4c841a1c-655b-4758-ac88-8f8b657eda1b', 'name': 'tempest-ComputeServersRbacTest-1143895587-network', 'tenant_id': '738a797d686c408e8ceb6a8b32bc1d09', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '738a797d686c408e8ceb6a8b32bc1d09', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 60, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T18:01:06Z', 'updated_at': '2020-11-06T18:01:06Z', 'revision_number': 1}, subnet: {'id': '6250e302-c932-4ed2-94fd-97f0293ed4e2', 'name': 'tempest-ComputeServersRbacTest-1143895587-subnet', 'tenant_id': '738a797d686c408e8ceb6a8b32bc1d09', 'network_id': '4c841a1c-655b-4758-ac88-8f8b657eda1b', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-11-06T18:01:06Z', 'updated_at': '2020-11-06T18:01:06Z', 'revision_number': 0, 'project_id': '738a797d686c408e8ceb6a8b32bc1d09'}, router: {'id': '66685dd3-d90a-40a2-9ca6-f10c83599b62', 'name': 'tempest-ComputeServersRbacTest-1143895587-router', 'tenant_id': '738a797d686c408e8ceb6a8b32bc1d09', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.168'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::123'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-11-06T18:01:07Z', 'updated_at': '2020-11-06T18:01:08Z', 'revision_number': 3, 'project_id': '738a797d686c408e8ceb6a8b32bc1d09'} _clear_isolated_net_resources /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/dynamic_creds.py:418 2020-11-06 18:02:10.659 38 INFO tempest.lib.common.rest_client [req-13c73bfc-85fd-4502-ad6b-249d227d93f3 ] Request (BasicOperationsImagesRbacTest:test_update_image): 200 PATCH http://172.30.13.94/image/v2/images/e0fd34a1-ea59-443c-ad9c-20f7d4925db7 0.131s 2020-11-06 18:02:10.660 38 DEBUG tempest.lib.common.rest_client [req-13c73bfc-85fd-4502-ad6b-249d227d93f3 ] Request - Headers: {'Content-Type': 'application/openstack-images-v2.0-json-patch', 'X-Auth-Token': ''} Body: [{"replace": "/name", "value": "tempest-BasicOperationsImagesRbacTest-image-1971803585"}] Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '661', 'content-type': 'application/json', 'x-openstack-request-id': 'req-13c73bfc-85fd-4502-ad6b-249d227d93f3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/e0fd34a1-ea59-443c-ad9c-20f7d4925db7'} Body: b'{"name": "tempest-BasicOperationsImagesRbacTest-image-1971803585", "disk_format": "raw", "container_format": "bare", "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "62aad203ff2a47c9a1e41ff9c7c69b5f", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "e0fd34a1-ea59-443c-ad9c-20f7d4925db7", "created_at": "2020-11-06T18:02:10Z", "updated_at": "2020-11-06T18:02:11Z", "tags": [], "self": "/v2/images/e0fd34a1-ea59-443c-ad9c-20f7d4925db7", "file": "/v2/images/e0fd34a1-ea59-443c-ad9c-20f7d4925db7/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:10.661 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:10.719 38 INFO tempest.lib.common.rest_client [req-369dc458-353a-4a49-9bee-bd50ebe8bd08 ] Request (BasicOperationsImagesRbacTest:test_update_image): 200 GET http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles 0.058s 2020-11-06 18:02:10.720 38 DEBUG tempest.lib.common.rest_client [req-369dc458-353a-4a49-9bee-bd50ebe8bd08 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-369dc458-353a-4a49-9bee-bd50ebe8bd08', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:10.758 38 INFO tempest.lib.common.rest_client [req-ac2a1ce0-2467-4e60-b607-0db52e32eeac ] Request (BasicOperationsImagesRbacTest:test_update_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:02:10.758 38 DEBUG tempest.lib.common.rest_client [req-ac2a1ce0-2467-4e60-b607-0db52e32eeac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ac2a1ce0-2467-4e60-b607-0db52e32eeac', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f423e6d7a5aa4cd79bba74f653d7bcc4", "name": "tempest-BasicOperationsImagesRbacTest-335924360", "password_expires_at": null}, "audit_ids": ["QnonRrffRMSpnXLT8GaeLA"], "expires_at": "2020-11-06T19:02:10.000000Z", "issued_at": "2020-11-06T18:02:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62aad203ff2a47c9a1e41ff9c7c69b5f", "name": "tempest-BasicOperationsImagesRbacTest-335924360"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:10.761 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:10.762 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:10.764 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: upload_image, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:10.874 38 INFO tempest.lib.common.rest_client [req-8b342e9d-7fa6-4bcd-ac18-991cdca12a0b ] Request (BasicOperationsImagesRbacTest:test_upload_image): 201 POST http://172.30.13.94/image/v2/images 0.109s 2020-11-06 18:02:10.874 38 DEBUG tempest.lib.common.rest_client [req-8b342e9d-7fa6-4bcd-ac18-991cdca12a0b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-BasicOperationsImagesRbacTest-Image-867748934", "container_format": "bare", "disk_format": "raw"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '660', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/4a4815ec-aa58-4bdd-b43c-06ceeaa4a106', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-8b342e9d-7fa6-4bcd-ac18-991cdca12a0b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-BasicOperationsImagesRbacTest-Image-867748934", "disk_format": "raw", "container_format": "bare", "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "62aad203ff2a47c9a1e41ff9c7c69b5f", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "4a4815ec-aa58-4bdd-b43c-06ceeaa4a106", "created_at": "2020-11-06T18:02:11Z", "updated_at": "2020-11-06T18:02:11Z", "tags": [], "self": "/v2/images/4a4815ec-aa58-4bdd-b43c-06ceeaa4a106", "file": "/v2/images/4a4815ec-aa58-4bdd-b43c-06ceeaa4a106/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:10.875 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:10.930 38 INFO tempest.lib.common.rest_client [req-a9992364-e080-46bf-b846-517ec834069b ] Request (BasicOperationsImagesRbacTest:test_upload_image): 200 GET http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles 0.054s 2020-11-06 18:02:10.931 38 DEBUG tempest.lib.common.rest_client [req-a9992364-e080-46bf-b846-517ec834069b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a9992364-e080-46bf-b846-517ec834069b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:10.966 38 INFO tempest.lib.common.rest_client [req-73a56704-1ef7-42d1-9613-df52b7879382 ] Request (BasicOperationsImagesRbacTest:test_upload_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:02:10.966 38 DEBUG tempest.lib.common.rest_client [req-73a56704-1ef7-42d1-9613-df52b7879382 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-73a56704-1ef7-42d1-9613-df52b7879382', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f423e6d7a5aa4cd79bba74f653d7bcc4", "name": "tempest-BasicOperationsImagesRbacTest-335924360", "password_expires_at": null}, "audit_ids": ["6Idmv8ncR_6xykyirjMNsg"], "expires_at": "2020-11-06T19:02:10.000000Z", "issued_at": "2020-11-06T18:02:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62aad203ff2a47c9a1e41ff9c7c69b5f", "name": "tempest-BasicOperationsImagesRbacTest-335924360"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:10.972 38 DEBUG patrole_tempest_plugin.tests.api.image.test_images_rbac [-] Image file content type _upload_image /usr/lib/python3.8/site-packages/patrole_tempest_plugin/tests/api/image/test_images_rbac.py:45 2020-11-06 18:02:11.196 39 INFO tempest.lib.common.rest_client [req-1e87acef-cddd-4de7-b380-f05c665f10df ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.375s 2020-11-06 18:02:11.196 39 DEBUG tempest.lib.common.rest_client [req-1e87acef-cddd-4de7-b380-f05c665f10df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1e87acef-cddd-4de7-b380-f05c665f10df', 'x-compute-request-id': 'req-1e87acef-cddd-4de7-b380-f05c665f10df', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:11.300 38 INFO tempest.lib.common.rest_client [req-dc878b36-961a-4ec6-ae38-e955d46dbabb ] Request (BasicOperationsImagesRbacTest:test_upload_image): 204 PUT http://172.30.13.94/image/v2/images/4a4815ec-aa58-4bdd-b43c-06ceeaa4a106/file 0.327s 2020-11-06 18:02:11.301 38 DEBUG tempest.lib.common.rest_client [req-dc878b36-961a-4ec6-ae38-e955d46dbabb ] Request - Headers: {'Content-Type': 'application/octet-stream', 'X-Auth-Token': ''} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-dc878b36-961a-4ec6-ae38-e955d46dbabb', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/4a4815ec-aa58-4bdd-b43c-06ceeaa4a106/file'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:11.301 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:11.348 38 INFO tempest.lib.common.rest_client [req-059325fd-5478-47a7-bb66-42d47d115abf ] Request (BasicOperationsImagesRbacTest:test_upload_image): 200 GET http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles 0.046s 2020-11-06 18:02:11.348 38 DEBUG tempest.lib.common.rest_client [req-059325fd-5478-47a7-bb66-42d47d115abf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-059325fd-5478-47a7-bb66-42d47d115abf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f/users/f423e6d7a5aa4cd79bba74f653d7bcc4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:11.376 38 INFO tempest.lib.common.rest_client [req-5a7ceb38-15c3-499a-8e21-7562f8c72811 ] Request (BasicOperationsImagesRbacTest:test_upload_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.027s 2020-11-06 18:02:11.376 38 DEBUG tempest.lib.common.rest_client [req-5a7ceb38-15c3-499a-8e21-7562f8c72811 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5a7ceb38-15c3-499a-8e21-7562f8c72811', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f423e6d7a5aa4cd79bba74f653d7bcc4", "name": "tempest-BasicOperationsImagesRbacTest-335924360", "password_expires_at": null}, "audit_ids": ["AtiCJvevSWWqW_uR_X3SjQ"], "expires_at": "2020-11-06T19:02:11.000000Z", "issued_at": "2020-11-06T18:02:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62aad203ff2a47c9a1e41ff9c7c69b5f", "name": "tempest-BasicOperationsImagesRbacTest-335924360"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62aad203ff2a47c9a1e41ff9c7c69b5f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:11.642 38 INFO tempest.lib.common.rest_client [req-961f1a91-2c66-48c7-8ca4-9d9804275f80 ] Request (BasicOperationsImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/4a4815ec-aa58-4bdd-b43c-06ceeaa4a106 0.263s 2020-11-06 18:02:11.643 38 DEBUG tempest.lib.common.rest_client [req-961f1a91-2c66-48c7-8ca4-9d9804275f80 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-961f1a91-2c66-48c7-8ca4-9d9804275f80', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/4a4815ec-aa58-4bdd-b43c-06ceeaa4a106'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:11.664 38 INFO tempest.lib.common.rest_client [req-56031abc-72fd-4f1a-bf39-e1abb860a3bf ] Request (BasicOperationsImagesRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/4a4815ec-aa58-4bdd-b43c-06ceeaa4a106 0.020s 2020-11-06 18:02:11.665 38 DEBUG tempest.lib.common.rest_client [req-56031abc-72fd-4f1a-bf39-e1abb860a3bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-56031abc-72fd-4f1a-bf39-e1abb860a3bf', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/4a4815ec-aa58-4bdd-b43c-06ceeaa4a106'} Body: b'{"message": "No image found with ID 4a4815ec-aa58-4bdd-b43c-06ceeaa4a106

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:11.726 38 INFO tempest.lib.common.rest_client [req-7bf182ca-12eb-4a90-84ea-1e90753031ea ] Request (BasicOperationsImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/e0fd34a1-ea59-443c-ad9c-20f7d4925db7 0.061s 2020-11-06 18:02:11.727 38 DEBUG tempest.lib.common.rest_client [req-7bf182ca-12eb-4a90-84ea-1e90753031ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-7bf182ca-12eb-4a90-84ea-1e90753031ea', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/e0fd34a1-ea59-443c-ad9c-20f7d4925db7'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:11.749 38 INFO tempest.lib.common.rest_client [req-5095df8a-3e33-42fc-bdd3-14d5194d6700 ] Request (BasicOperationsImagesRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/e0fd34a1-ea59-443c-ad9c-20f7d4925db7 0.022s 2020-11-06 18:02:11.750 38 DEBUG tempest.lib.common.rest_client [req-5095df8a-3e33-42fc-bdd3-14d5194d6700 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-5095df8a-3e33-42fc-bdd3-14d5194d6700', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/e0fd34a1-ea59-443c-ad9c-20f7d4925db7'} Body: b'{"message": "No image found with ID e0fd34a1-ea59-443c-ad9c-20f7d4925db7

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:11.755 40 INFO tempest.lib.common.rest_client [req-acc544e8-573e-4cb2-8c80-d83b53f2ac6c ] Request (PortsRbacTest:test_update_port_binding_host_id): 200 PUT http://172.30.13.94:9696/v2.0/ports/3525ae88-78ad-4c0a-a27e-aece7cf41d4f 1.319s 2020-11-06 18:02:11.756 40 DEBUG tempest.lib.common.rest_client [req-acc544e8-573e-4cb2-8c80-d83b53f2ac6c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"binding:host_id": "rbac_test_host_updated"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1123', 'x-openstack-request-id': 'req-acc544e8-573e-4cb2-8c80-d83b53f2ac6c', 'date': 'Fri, 06 Nov 2020 18:02:11 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/3525ae88-78ad-4c0a-a27e-aece7cf41d4f'} Body: b'{"port":{"id":"3525ae88-78ad-4c0a-a27e-aece7cf41d4f","name":"tempest-PortsRbacTest-638047048","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:34:99:30","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.151"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"rbac_test_host_updated","binding:vif_type":"binding_failed","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.151","hostname":"host-192-168-120-151","fqdn":"host-192-168-120-151.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:02:09Z","updated_at":"2020-11-06T18:02:10Z","revision_number":3,"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:11.756 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:11.805 40 INFO tempest.lib.common.rest_client [req-70f0e153-9d18-4dc5-bdfc-b345bf666c7c ] Request (PortsRbacTest:test_update_port_binding_host_id): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.047s 2020-11-06 18:02:11.805 40 DEBUG tempest.lib.common.rest_client [req-70f0e153-9d18-4dc5-bdfc-b345bf666c7c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-70f0e153-9d18-4dc5-bdfc-b345bf666c7c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:11.822 38 INFO tempest.lib.common.rest_client [req-e4e5ba86-4087-4e77-898f-c89102664158 ] Request (BasicOperationsImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/8b4c3d5f-7195-4977-8aff-b048240aeb36 0.071s 2020-11-06 18:02:11.822 38 DEBUG tempest.lib.common.rest_client [req-e4e5ba86-4087-4e77-898f-c89102664158 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-e4e5ba86-4087-4e77-898f-c89102664158', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/8b4c3d5f-7195-4977-8aff-b048240aeb36'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:11.837 40 INFO tempest.lib.common.rest_client [req-98220510-11c9-49c9-8c56-172d79097fcc ] Request (PortsRbacTest:test_update_port_binding_host_id): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:02:11.838 40 DEBUG tempest.lib.common.rest_client [req-98220510-11c9-49c9-8c56-172d79097fcc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-98220510-11c9-49c9-8c56-172d79097fcc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["FcLyxvYTR5umsIxmWN7iWQ"], "expires_at": "2020-11-06T19:02:11.000000Z", "issued_at": "2020-11-06T18:02:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:11.841 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:11.841 38 INFO tempest.lib.common.rest_client [req-36b89810-c899-441e-93cc-c7f73d0f8ea0 ] Request (BasicOperationsImagesRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/8b4c3d5f-7195-4977-8aff-b048240aeb36 0.018s 2020-11-06 18:02:11.841 38 DEBUG tempest.lib.common.rest_client [req-36b89810-c899-441e-93cc-c7f73d0f8ea0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-36b89810-c899-441e-93cc-c7f73d0f8ea0', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/8b4c3d5f-7195-4977-8aff-b048240aeb36'} Body: b'{"message": "No image found with ID 8b4c3d5f-7195-4977-8aff-b048240aeb36

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:11.845 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:11.845 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:11.848 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_port, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:11.848 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:11.850 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_port:binding:profile, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:12.046 38 INFO tempest.lib.common.rest_client [req-704588a0-266d-49f1-8eb3-c85b19c787cd ] Request (BasicOperationsImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/407d14d3-1ea9-41e2-af9c-a8dbc93cdf50 0.204s 2020-11-06 18:02:12.047 38 DEBUG tempest.lib.common.rest_client [req-704588a0-266d-49f1-8eb3-c85b19c787cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-704588a0-266d-49f1-8eb3-c85b19c787cd', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/407d14d3-1ea9-41e2-af9c-a8dbc93cdf50'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:12.068 38 INFO tempest.lib.common.rest_client [req-af14ab5a-c1ac-4bee-a2a1-37680d94dccc ] Request (BasicOperationsImagesRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/407d14d3-1ea9-41e2-af9c-a8dbc93cdf50 0.020s 2020-11-06 18:02:12.068 38 DEBUG tempest.lib.common.rest_client [req-af14ab5a-c1ac-4bee-a2a1-37680d94dccc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-af14ab5a-c1ac-4bee-a2a1-37680d94dccc', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/407d14d3-1ea9-41e2-af9c-a8dbc93cdf50'} Body: b'{"message": "No image found with ID 407d14d3-1ea9-41e2-af9c-a8dbc93cdf50

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:12.139 38 INFO tempest.lib.common.rest_client [req-e809bb49-2883-451f-96af-0574276e504c ] Request (BasicOperationsImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/70a47842-2b67-464a-bf54-5b198e8e0381 0.070s 2020-11-06 18:02:12.140 38 DEBUG tempest.lib.common.rest_client [req-e809bb49-2883-451f-96af-0574276e504c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-e809bb49-2883-451f-96af-0574276e504c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/70a47842-2b67-464a-bf54-5b198e8e0381'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:12.162 38 INFO tempest.lib.common.rest_client [req-eba2ba60-c3ee-47ef-81bb-4007b301f59f ] Request (BasicOperationsImagesRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/70a47842-2b67-464a-bf54-5b198e8e0381 0.021s 2020-11-06 18:02:12.162 38 DEBUG tempest.lib.common.rest_client [req-eba2ba60-c3ee-47ef-81bb-4007b301f59f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-eba2ba60-c3ee-47ef-81bb-4007b301f59f', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/70a47842-2b67-464a-bf54-5b198e8e0381'} Body: b'{"message": "No image found with ID 70a47842-2b67-464a-bf54-5b198e8e0381

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:12.380 38 INFO tempest.lib.common.rest_client [req-116bdf30-4d67-4047-ac17-54b8be1ee3f7 ] Request (BasicOperationsImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/c1b99cb0-4abc-4c42-a2fa-10497191c6fd 0.216s 2020-11-06 18:02:12.380 38 DEBUG tempest.lib.common.rest_client [req-116bdf30-4d67-4047-ac17-54b8be1ee3f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-116bdf30-4d67-4047-ac17-54b8be1ee3f7', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/c1b99cb0-4abc-4c42-a2fa-10497191c6fd'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:12.406 38 INFO tempest.lib.common.rest_client [req-3a072737-6772-4aef-92f8-24704b20cbaf ] Request (BasicOperationsImagesRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/c1b99cb0-4abc-4c42-a2fa-10497191c6fd 0.025s 2020-11-06 18:02:12.407 38 DEBUG tempest.lib.common.rest_client [req-3a072737-6772-4aef-92f8-24704b20cbaf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-3a072737-6772-4aef-92f8-24704b20cbaf', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/c1b99cb0-4abc-4c42-a2fa-10497191c6fd'} Body: b'{"message": "No image found with ID c1b99cb0-4abc-4c42-a2fa-10497191c6fd

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:12.431 39 INFO tempest.lib.common.rest_client [req-6e5efb6d-1416-4554-bbde-5bb86086d544 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.217s 2020-11-06 18:02:12.431 39 DEBUG tempest.lib.common.rest_client [req-6e5efb6d-1416-4554-bbde-5bb86086d544 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6e5efb6d-1416-4554-bbde-5bb86086d544', 'x-compute-request-id': 'req-6e5efb6d-1416-4554-bbde-5bb86086d544', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:12.475 38 INFO tempest.lib.common.rest_client [req-cb2a730e-9ecc-4a40-86cd-254d1ee06212 ] Request (BasicOperationsImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/db96fb06-92ba-4539-b49b-be50a65e678c 0.067s 2020-11-06 18:02:12.475 38 DEBUG tempest.lib.common.rest_client [req-cb2a730e-9ecc-4a40-86cd-254d1ee06212 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-cb2a730e-9ecc-4a40-86cd-254d1ee06212', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/db96fb06-92ba-4539-b49b-be50a65e678c'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:12.496 38 INFO tempest.lib.common.rest_client [req-e3992a39-3bf6-405a-b74f-e431c8fbe73d ] Request (BasicOperationsImagesRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/db96fb06-92ba-4539-b49b-be50a65e678c 0.020s 2020-11-06 18:02:12.496 38 DEBUG tempest.lib.common.rest_client [req-e3992a39-3bf6-405a-b74f-e431c8fbe73d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-e3992a39-3bf6-405a-b74f-e431c8fbe73d', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/db96fb06-92ba-4539-b49b-be50a65e678c'} Body: b'{"message": "No image found with ID db96fb06-92ba-4539-b49b-be50a65e678c

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:12.517 38 INFO tempest.lib.common.rest_client [req-ede26061-9af6-433d-adcd-390850016c0c ] Request (BasicOperationsImagesRbacTest:tearDownClass): 404 DELETE http://172.30.13.94/image/v2/images/2189e1e5-9704-4f02-a12f-6c5b09f9b35c 0.019s 2020-11-06 18:02:12.517 38 DEBUG tempest.lib.common.rest_client [req-ede26061-9af6-433d-adcd-390850016c0c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '147', 'content-type': 'application/json', 'x-openstack-request-id': 'req-ede26061-9af6-433d-adcd-390850016c0c', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/2189e1e5-9704-4f02-a12f-6c5b09f9b35c'} Body: b'{"message": "Failed to find image 2189e1e5-9704-4f02-a12f-6c5b09f9b35c to delete

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:12.540 38 INFO tempest.lib.common.rest_client [req-64bf02d8-c760-4a5d-853a-eaf895aeefa3 ] Request (BasicOperationsImagesRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/2189e1e5-9704-4f02-a12f-6c5b09f9b35c 0.021s 2020-11-06 18:02:12.540 38 DEBUG tempest.lib.common.rest_client [req-64bf02d8-c760-4a5d-853a-eaf895aeefa3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-64bf02d8-c760-4a5d-853a-eaf895aeefa3', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/2189e1e5-9704-4f02-a12f-6c5b09f9b35c'} Body: b'{"message": "No image found with ID 2189e1e5-9704-4f02-a12f-6c5b09f9b35c

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:12.634 40 INFO tempest.lib.common.rest_client [req-0b031d4a-f340-43af-8203-a99eb0c3c79c ] Request (PortsRbacTest:test_update_port_binding_profile): 201 POST http://172.30.13.94:9696/v2.0/ports 0.784s 2020-11-06 18:02:12.635 40 DEBUG tempest.lib.common.rest_client [req-0b031d4a-f340-43af-8203-a99eb0c3c79c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "586884b2-4363-4597-acb0-ddbc49908b65", "binding:profile": {"foo": "1"}, "name": "tempest-PortsRbacTest-1551566114"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1104', 'x-openstack-request-id': 'req-0b031d4a-f340-43af-8203-a99eb0c3c79c', 'date': 'Fri, 06 Nov 2020 18:02:12 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"777d2d81-6bad-4993-af93-bd2144685853","name":"tempest-PortsRbacTest-1551566114","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:ea:34:8d","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.161"}],"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","port_security_enabled":true,"qos_policy_id":null,"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"binding:vnic_type":"normal","binding:profile":{"foo":"1"},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"allowed_address_pairs":[],"extra_dhcp_opts":[],"description":"","qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.161","hostname":"host-192-168-120-161","fqdn":"host-192-168-120-161.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:02:12Z","updated_at":"2020-11-06T18:02:12Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:12.636 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:12.685 40 INFO tempest.lib.common.rest_client [req-3e468ee2-7fcc-4c19-bf72-2108aadc6647 ] Request (PortsRbacTest:test_update_port_binding_profile): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.049s 2020-11-06 18:02:12.686 40 DEBUG tempest.lib.common.rest_client [req-3e468ee2-7fcc-4c19-bf72-2108aadc6647 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3e468ee2-7fcc-4c19-bf72-2108aadc6647', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:12.718 40 INFO tempest.lib.common.rest_client [req-13321625-61ae-4d06-9d23-5f2f74fc2a30 ] Request (PortsRbacTest:test_update_port_binding_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:02:12.718 40 DEBUG tempest.lib.common.rest_client [req-13321625-61ae-4d06-9d23-5f2f74fc2a30 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-13321625-61ae-4d06-9d23-5f2f74fc2a30', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["szJ5Lg9ESCCb8FKTBk4iBA"], "expires_at": "2020-11-06T19:02:12.000000Z", "issued_at": "2020-11-06T18:02:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:12.740 38 INFO tempest.lib.common.rest_client [req-0f575a35-f37b-4d9b-95ff-f9e541c40d10 ] Request (BasicOperationsImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/2ebad546-6eeb-4630-a2b9-9da0d16b921a 0.199s 2020-11-06 18:02:12.741 38 DEBUG tempest.lib.common.rest_client [req-0f575a35-f37b-4d9b-95ff-f9e541c40d10 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-0f575a35-f37b-4d9b-95ff-f9e541c40d10', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/2ebad546-6eeb-4630-a2b9-9da0d16b921a'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:12.769 38 INFO tempest.lib.common.rest_client [req-72ef6a16-db74-4643-99d6-742d0f7780e7 ] Request (BasicOperationsImagesRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/2ebad546-6eeb-4630-a2b9-9da0d16b921a 0.027s 2020-11-06 18:02:12.769 38 DEBUG tempest.lib.common.rest_client [req-72ef6a16-db74-4643-99d6-742d0f7780e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-72ef6a16-db74-4643-99d6-742d0f7780e7', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/2ebad546-6eeb-4630-a2b9-9da0d16b921a'} Body: b'{"message": "No image found with ID 2ebad546-6eeb-4630-a2b9-9da0d16b921a

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:12.837 38 INFO tempest.lib.common.rest_client [req-6e74f615-6db7-4482-8856-99ee9dbcf6ae ] Request (BasicOperationsImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/7d141290-3180-43e8-97a8-0c8ef3c5899a 0.066s 2020-11-06 18:02:12.837 38 DEBUG tempest.lib.common.rest_client [req-6e74f615-6db7-4482-8856-99ee9dbcf6ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-6e74f615-6db7-4482-8856-99ee9dbcf6ae', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/7d141290-3180-43e8-97a8-0c8ef3c5899a'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:12.858 38 INFO tempest.lib.common.rest_client [req-076a9794-cbdc-45e6-acab-a2513137edd6 ] Request (BasicOperationsImagesRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/7d141290-3180-43e8-97a8-0c8ef3c5899a 0.020s 2020-11-06 18:02:12.859 38 DEBUG tempest.lib.common.rest_client [req-076a9794-cbdc-45e6-acab-a2513137edd6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-076a9794-cbdc-45e6-acab-a2513137edd6', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/7d141290-3180-43e8-97a8-0c8ef3c5899a'} Body: b'{"message": "No image found with ID 7d141290-3180-43e8-97a8-0c8ef3c5899a

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:12.929 38 INFO tempest.lib.common.rest_client [req-47ae0291-dd57-4f7e-8378-76fd64be8667 ] Request (BasicOperationsImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/6409d663-e524-47b6-97a9-d2c6fba9de34 0.070s 2020-11-06 18:02:12.930 38 DEBUG tempest.lib.common.rest_client [req-47ae0291-dd57-4f7e-8378-76fd64be8667 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-47ae0291-dd57-4f7e-8378-76fd64be8667', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/6409d663-e524-47b6-97a9-d2c6fba9de34'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:12.948 38 INFO tempest.lib.common.rest_client [req-f517f134-4f90-4aaa-b4f8-5e50c30f6bf8 ] Request (BasicOperationsImagesRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/6409d663-e524-47b6-97a9-d2c6fba9de34 0.017s 2020-11-06 18:02:12.948 38 DEBUG tempest.lib.common.rest_client [req-f517f134-4f90-4aaa-b4f8-5e50c30f6bf8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-f517f134-4f90-4aaa-b4f8-5e50c30f6bf8', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/6409d663-e524-47b6-97a9-d2c6fba9de34'} Body: b'{"message": "No image found with ID 6409d663-e524-47b6-97a9-d2c6fba9de34

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:13.010 38 INFO tempest.lib.common.rest_client [req-534083a3-2d01-4b96-9288-d0c11850d75b ] Request (BasicOperationsImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/ce39cd1c-f379-477f-aa69-d541c3dfb666 0.061s 2020-11-06 18:02:13.011 38 DEBUG tempest.lib.common.rest_client [req-534083a3-2d01-4b96-9288-d0c11850d75b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-534083a3-2d01-4b96-9288-d0c11850d75b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/ce39cd1c-f379-477f-aa69-d541c3dfb666'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:13.031 38 INFO tempest.lib.common.rest_client [req-3ad1d12f-3a02-48d3-9ba6-b1c1da49b522 ] Request (BasicOperationsImagesRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/ce39cd1c-f379-477f-aa69-d541c3dfb666 0.019s 2020-11-06 18:02:13.031 38 DEBUG tempest.lib.common.rest_client [req-3ad1d12f-3a02-48d3-9ba6-b1c1da49b522 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-3ad1d12f-3a02-48d3-9ba6-b1c1da49b522', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/ce39cd1c-f379-477f-aa69-d541c3dfb666'} Body: b'{"message": "No image found with ID ce39cd1c-f379-477f-aa69-d541c3dfb666

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:13.147 38 INFO tempest.lib.common.rest_client [req-895d1a9c-b6eb-4de4-bbae-5000ac5b2d5f ] Request (BasicOperationsImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/f423e6d7a5aa4cd79bba74f653d7bcc4 0.114s 2020-11-06 18:02:13.147 38 DEBUG tempest.lib.common.rest_client [req-895d1a9c-b6eb-4de4-bbae-5000ac5b2d5f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-895d1a9c-b6eb-4de4-bbae-5000ac5b2d5f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/f423e6d7a5aa4cd79bba74f653d7bcc4'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:13.231 38 INFO tempest.lib.common.rest_client [req-bccdf30c-a7b0-4f4e-b613-405a595294d3 ] Request (BasicOperationsImagesRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 18:02:13.232 38 DEBUG tempest.lib.common.rest_client [req-bccdf30c-a7b0-4f4e-b613-405a595294d3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bccdf30c-a7b0-4f4e-b613-405a595294d3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["ebEmRWYzQaGvHxOlJwVX5A"], "expires_at": "2020-11-06T19:02:13.000000Z", "issued_at": "2020-11-06T18:02:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:13.327 40 INFO tempest.lib.common.rest_client [req-c69cf9ac-3adb-4e47-84d4-bbaa65048515 ] Request (PortsRbacTest:test_update_port_binding_profile): 200 PUT http://172.30.13.94:9696/v2.0/ports/777d2d81-6bad-4993-af93-bd2144685853 0.608s 2020-11-06 18:02:13.328 40 DEBUG tempest.lib.common.rest_client [req-c69cf9ac-3adb-4e47-84d4-bbaa65048515 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"binding:profile": {"foo": "2"}}} Response - Headers: {'content-type': 'application/json', 'content-length': '1104', 'x-openstack-request-id': 'req-c69cf9ac-3adb-4e47-84d4-bbaa65048515', 'date': 'Fri, 06 Nov 2020 18:02:13 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/777d2d81-6bad-4993-af93-bd2144685853'} Body: b'{"port":{"id":"777d2d81-6bad-4993-af93-bd2144685853","name":"tempest-PortsRbacTest-1551566114","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:ea:34:8d","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.161"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"description":"","binding:vnic_type":"normal","binding:profile":{"foo":"2"},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.161","hostname":"host-192-168-120-161","fqdn":"host-192-168-120-161.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:02:12Z","updated_at":"2020-11-06T18:02:12Z","revision_number":1,"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:13.329 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:13.378 40 INFO tempest.lib.common.rest_client [req-ada5b1d7-0682-4b3d-891d-f3233884115a ] Request (PortsRbacTest:test_update_port_binding_profile): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.048s 2020-11-06 18:02:13.379 40 DEBUG tempest.lib.common.rest_client [req-ada5b1d7-0682-4b3d-891d-f3233884115a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ada5b1d7-0682-4b3d-891d-f3233884115a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:13.474 40 INFO tempest.lib.common.rest_client [req-bc712b53-8755-4d22-b946-6eed4fbee392 ] Request (PortsRbacTest:test_update_port_binding_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-11-06 18:02:13.475 40 DEBUG tempest.lib.common.rest_client [req-bc712b53-8755-4d22-b946-6eed4fbee392 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bc712b53-8755-4d22-b946-6eed4fbee392', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["GQdrDmacQbOzb9MXEmQCSQ"], "expires_at": "2020-11-06T19:02:13.000000Z", "issued_at": "2020-11-06T18:02:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:13.478 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:13.482 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:13.483 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:13.487 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_port, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:13.487 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:13.490 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_port:device_owner, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:13.490 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:13.548 40 INFO tempest.lib.common.rest_client [req-475f1067-8c19-4d65-923b-2f3711d966b4 ] Request (PortsRbacTest:test_update_port_device_owner): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.057s 2020-11-06 18:02:13.549 40 DEBUG tempest.lib.common.rest_client [req-475f1067-8c19-4d65-923b-2f3711d966b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-475f1067-8c19-4d65-923b-2f3711d966b4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:13.562 38 INFO tempest.lib.common.rest_client [req-8026a9ef-d84d-4746-9600-12d8002d6686 ] Request (BasicOperationsImagesRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=62aad203ff2a47c9a1e41ff9c7c69b5f&name=default 0.329s 2020-11-06 18:02:13.563 38 DEBUG tempest.lib.common.rest_client [req-8026a9ef-d84d-4746-9600-12d8002d6686 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-8026a9ef-d84d-4746-9600-12d8002d6686', 'date': 'Fri, 06 Nov 2020 18:02:13 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=62aad203ff2a47c9a1e41ff9c7c69b5f&name=default'} Body: b'{"security_groups": [{"id": "b37df13e-16f2-4945-92a4-b046c7d5e21d", "name": "default", "stateful": true, "tenant_id": "62aad203ff2a47c9a1e41ff9c7c69b5f", "description": "Default security group", "security_group_rules": [{"id": "296fd6d2-aaa7-4e9a-b4ce-ace8927b4611", "tenant_id": "62aad203ff2a47c9a1e41ff9c7c69b5f", "security_group_id": "b37df13e-16f2-4945-92a4-b046c7d5e21d", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:02:13Z", "updated_at": "2020-11-06T18:02:13Z", "revision_number": 0, "project_id": "62aad203ff2a47c9a1e41ff9c7c69b5f"}, {"id": "6005a462-0996-4119-ae7a-e00dc65be420", "tenant_id": "62aad203ff2a47c9a1e41ff9c7c69b5f", "security_group_id": "b37df13e-16f2-4945-92a4-b046c7d5e21d", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "b37df13e-16f2-4945-92a4-b046c7d5e21d", "description": null, "tags": [], "created_at": "2020-11-06T18:02:13Z", "updated_at": "2020-11-06T18:02:13Z", "revision_number": 0, "project_id": "62aad203ff2a47c9a1e41ff9c7c69b5f"}, {"id": "c322b9bc-06df-43b8-b501-432d1734f729", "tenant_id": "62aad203ff2a47c9a1e41ff9c7c69b5f", "security_group_id": "b37df13e-16f2-4945-92a4-b046c7d5e21d", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "b37df13e-16f2-4945-92a4-b046c7d5e21d", "description": null, "tags": [], "created_at": "2020-11-06T18:02:13Z", "updated_at": "2020-11-06T18:02:13Z", "revision_number": 0, "project_id": "62aad203ff2a47c9a1e41ff9c7c69b5f"}, {"id": "d15ebf0c-9149-4a72-96ca-e4c526718f51", "tenant_id": "62aad203ff2a47c9a1e41ff9c7c69b5f", "security_group_id": "b37df13e-16f2-4945-92a4-b046c7d5e21d", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:02:13Z", "updated_at": "2020-11-06T18:02:13Z", "revision_number": 0, "project_id": "62aad203ff2a47c9a1e41ff9c7c69b5f"}], "tags": [], "created_at": "2020-11-06T18:02:13Z", "updated_at": "2020-11-06T18:02:13Z", "revision_number": 1, "project_id": "62aad203ff2a47c9a1e41ff9c7c69b5f"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:13.586 40 INFO tempest.lib.common.rest_client [req-c6ab29f9-6bc3-4ac0-ada5-ce392b3e971c ] Request (PortsRbacTest:test_update_port_device_owner): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:02:13.586 40 DEBUG tempest.lib.common.rest_client [req-c6ab29f9-6bc3-4ac0-ada5-ce392b3e971c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c6ab29f9-6bc3-4ac0-ada5-ce392b3e971c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["KmxPb5OxQu2eBhxzptPDoA"], "expires_at": "2020-11-06T19:02:13.000000Z", "issued_at": "2020-11-06T18:02:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:13.628 39 INFO tempest.lib.common.rest_client [req-3aaa2209-4bcc-40cb-b844-fad050fef032 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.182s 2020-11-06 18:02:13.629 39 DEBUG tempest.lib.common.rest_client [req-3aaa2209-4bcc-40cb-b844-fad050fef032 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3aaa2209-4bcc-40cb-b844-fad050fef032', 'x-compute-request-id': 'req-3aaa2209-4bcc-40cb-b844-fad050fef032', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:13.715 38 INFO tempest.lib.common.rest_client [req-ba136c6d-cfcd-4acd-a4dc-9ecf266cec71 ] Request (BasicOperationsImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/b37df13e-16f2-4945-92a4-b046c7d5e21d 0.150s 2020-11-06 18:02:13.715 38 DEBUG tempest.lib.common.rest_client [req-ba136c6d-cfcd-4acd-a4dc-9ecf266cec71 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-ba136c6d-cfcd-4acd-a4dc-9ecf266cec71', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:02:13 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/b37df13e-16f2-4945-92a4-b046c7d5e21d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:13.834 38 INFO tempest.lib.common.rest_client [req-303e6d18-7ef6-4128-9393-2b793054cddf ] Request (BasicOperationsImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f 0.117s 2020-11-06 18:02:13.835 38 DEBUG tempest.lib.common.rest_client [req-303e6d18-7ef6-4128-9393-2b793054cddf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-303e6d18-7ef6-4128-9393-2b793054cddf', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/62aad203ff2a47c9a1e41ff9c7c69b5f'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:13.929 38 INFO tempest.lib.common.rest_client [req-c7c657d1-fa02-416e-887d-416b09042989 ] Request (AgentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:02:13.929 38 DEBUG tempest.lib.common.rest_client [req-c7c657d1-fa02-416e-887d-416b09042989 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c7c657d1-fa02-416e-887d-416b09042989', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["IO6_NooiRu-2zWWF404lgw"], "expires_at": "2020-11-06T19:02:13.000000Z", "issued_at": "2020-11-06T18:02:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:13.976 38 INFO tempest.lib.common.rest_client [req-7d3ddd1b-859f-4424-9957-6c90cfc1961e ] Request (AgentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:02:13.976 38 DEBUG tempest.lib.common.rest_client [req-7d3ddd1b-859f-4424-9957-6c90cfc1961e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7d3ddd1b-859f-4424-9957-6c90cfc1961e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["wNFtHdpuSjCwV9md2bDv3w"], "expires_at": "2020-11-06T19:02:13.000000Z", "issued_at": "2020-11-06T18:02:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:14.032 37 INFO tempest.lib.common.rest_client [req-5369338d-431f-440a-b289-9c9b2a37de4d ] Request (ComputeServersRbacTest:tearDownClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/66685dd3-d90a-40a2-9ca6-f10c83599b62/remove_router_interface 3.383s 2020-11-06 18:02:14.033 37 DEBUG tempest.lib.common.rest_client [req-5369338d-431f-440a-b289-9c9b2a37de4d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "6250e302-c932-4ed2-94fd-97f0293ed4e2"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-5369338d-431f-440a-b289-9c9b2a37de4d', 'date': 'Fri, 06 Nov 2020 18:02:14 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/66685dd3-d90a-40a2-9ca6-f10c83599b62/remove_router_interface'} Body: b'{"id": "66685dd3-d90a-40a2-9ca6-f10c83599b62", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "port_id": "aba2e2f2-e103-4dab-a99a-9a211668106e", "network_id": "4c841a1c-655b-4758-ac88-8f8b657eda1b", "subnet_id": "6250e302-c932-4ed2-94fd-97f0293ed4e2", "subnet_ids": ["6250e302-c932-4ed2-94fd-97f0293ed4e2"]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:14.052 38 INFO tempest.lib.common.rest_client [req-3506972f-1691-4441-9fc7-4580e80e3b10 ] Request (AgentsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.075s 2020-11-06 18:02:14.052 38 DEBUG tempest.lib.common.rest_client [req-3506972f-1691-4441-9fc7-4580e80e3b10 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3506972f-1691-4441-9fc7-4580e80e3b10', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:14.117 38 INFO tempest.lib.common.rest_client [req-b49b4d0d-ea8a-4b48-9908-063d9af0622d ] Request (AgentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.063s 2020-11-06 18:02:14.117 38 DEBUG tempest.lib.common.rest_client [req-b49b4d0d-ea8a-4b48-9908-063d9af0622d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-AgentsRbacTest-1458169091-desc", "domain_id": "default", "name": "tempest-AgentsRbacTest-1458169091"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '366', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b49b4d0d-ea8a-4b48-9908-063d9af0622d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "9a1b769eba1a4eba859a81e63028a487", "name": "tempest-AgentsRbacTest-1458169091", "domain_id": "default", "description": "tempest-AgentsRbacTest-1458169091-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/9a1b769eba1a4eba859a81e63028a487"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:14.232 38 INFO tempest.lib.common.rest_client [req-f530183b-709d-4120-b80a-8f88721588ce ] Request (AgentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.114s 2020-11-06 18:02:14.233 38 DEBUG tempest.lib.common.rest_client [req-f530183b-709d-4120-b80a-8f88721588ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-AgentsRbacTest-1458169091", "password": "Z7!31NfR54~#_N4", "project_id": "9a1b769eba1a4eba859a81e63028a487", "email": "tempest-AgentsRbacTest-544773670@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '383', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f530183b-709d-4120-b80a-8f88721588ce', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "9a1b769eba1a4eba859a81e63028a487", "email": "tempest-AgentsRbacTest-544773670@example.com", "id": "ac0caf9c72db49b3a72c9101965133b8", "name": "tempest-AgentsRbacTest-1458169091", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/ac0caf9c72db49b3a72c9101965133b8"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:14.287 38 INFO tempest.lib.common.rest_client [req-28579144-004e-4eaa-8933-c85bd1a044e3 ] Request (AgentsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.052s 2020-11-06 18:02:14.287 38 DEBUG tempest.lib.common.rest_client [req-28579144-004e-4eaa-8933-c85bd1a044e3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-28579144-004e-4eaa-8933-c85bd1a044e3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:14.295 40 INFO tempest.lib.common.rest_client [req-c8c9c7c1-bc35-4c65-a0e0-f2d6575bc61d ] Request (PortsRbacTest:test_update_port_device_owner): 200 PUT http://172.30.13.94:9696/v2.0/ports/e218c7fc-d3dc-4c2c-9234-aa97d5412eb7 0.708s 2020-11-06 18:02:14.296 40 DEBUG tempest.lib.common.rest_client [req-c8c9c7c1-bc35-4c65-a0e0-f2d6575bc61d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"device_owner": "network:router_interface"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1118', 'x-openstack-request-id': 'req-c8c9c7c1-bc35-4c65-a0e0-f2d6575bc61d', 'date': 'Fri, 06 Nov 2020 18:02:14 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/e218c7fc-d3dc-4c2c-9234-aa97d5412eb7'} Body: b'{"port":{"id":"e218c7fc-d3dc-4c2c-9234-aa97d5412eb7","name":"tempest-PortsRbacTest-339006369","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:8a:69:9e","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"network:router_interface","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.243"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.243","hostname":"host-192-168-120-243","fqdn":"host-192-168-120-243.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:01:42Z","updated_at":"2020-11-06T18:02:13Z","revision_number":4,"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:14.297 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:14.339 38 INFO tempest.lib.common.rest_client [req-0949c8c0-6e0d-4851-9402-a80f2730813e ] Request (AgentsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.050s 2020-11-06 18:02:14.340 38 DEBUG tempest.lib.common.rest_client [req-0949c8c0-6e0d-4851-9402-a80f2730813e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0949c8c0-6e0d-4851-9402-a80f2730813e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:14.353 40 INFO tempest.lib.common.rest_client [req-7d660c5a-cde0-44ea-bcd1-9753eb8a1061 ] Request (PortsRbacTest:test_update_port_device_owner): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.055s 2020-11-06 18:02:14.354 40 DEBUG tempest.lib.common.rest_client [req-7d660c5a-cde0-44ea-bcd1-9753eb8a1061 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7d660c5a-cde0-44ea-bcd1-9753eb8a1061', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:14.425 38 INFO tempest.lib.common.rest_client [req-82608198-6a5f-439d-9a07-c73391232bf5 ] Request (AgentsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/9a1b769eba1a4eba859a81e63028a487/users/ac0caf9c72db49b3a72c9101965133b8/roles/72a4576c553448cd941b052c1ca0cf2d 0.083s 2020-11-06 18:02:14.425 38 DEBUG tempest.lib.common.rest_client [req-82608198-6a5f-439d-9a07-c73391232bf5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-82608198-6a5f-439d-9a07-c73391232bf5', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a1b769eba1a4eba859a81e63028a487/users/ac0caf9c72db49b3a72c9101965133b8/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:14.426 38 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-AgentsRbacTest-1458169091', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '9a1b769eba1a4eba859a81e63028a487', 'project_name': 'tempest-AgentsRbacTest-1458169091', 'tenant_id': '9a1b769eba1a4eba859a81e63028a487', 'tenant_name': 'tempest-AgentsRbacTest-1458169091', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'ac0caf9c72db49b3a72c9101965133b8'}, Network: None, Subnet: None, Router: None 2020-11-06 18:02:14.426 38 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-AgentsRbacTest-1458169091', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '9a1b769eba1a4eba859a81e63028a487', 'project_name': 'tempest-AgentsRbacTest-1458169091', 'tenant_id': '9a1b769eba1a4eba859a81e63028a487', 'tenant_name': 'tempest-AgentsRbacTest-1458169091', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'ac0caf9c72db49b3a72c9101965133b8'}, Network: None, Subnet: None, Router: None 2020-11-06 18:02:14.438 40 INFO tempest.lib.common.rest_client [req-469f8976-e890-45c5-b744-66b7256ae97d ] Request (PortsRbacTest:test_update_port_device_owner): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 18:02:14.438 40 DEBUG tempest.lib.common.rest_client [req-469f8976-e890-45c5-b744-66b7256ae97d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-469f8976-e890-45c5-b744-66b7256ae97d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["5_wS27WCT9mMGPPrl7bV5w"], "expires_at": "2020-11-06T19:02:14.000000Z", "issued_at": "2020-11-06T18:02:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:14.566 38 INFO tempest.lib.common.rest_client [req-1065c218-b4c6-49d0-a763-32f74ce6fe12 ] Request (AgentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.129s 2020-11-06 18:02:14.567 38 DEBUG tempest.lib.common.rest_client [req-1065c218-b4c6-49d0-a763-32f74ce6fe12 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6559', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1065c218-b4c6-49d0-a763-32f74ce6fe12', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ac0caf9c72db49b3a72c9101965133b8", "name": "tempest-AgentsRbacTest-1458169091", "password_expires_at": null}, "audit_ids": ["SM52fac6TV28zhuwnH11fQ"], "expires_at": "2020-11-06T19:02:14.000000Z", "issued_at": "2020-11-06T18:02:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a1b769eba1a4eba859a81e63028a487", "name": "tempest-AgentsRbacTest-1458169091"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/im _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:14.660 38 INFO tempest.lib.common.rest_client [req-df875224-b277-4230-9fb7-b1bffedadda0 ] Request (AgentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-11-06 18:02:14.661 38 DEBUG tempest.lib.common.rest_client [req-df875224-b277-4230-9fb7-b1bffedadda0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-df875224-b277-4230-9fb7-b1bffedadda0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["4bbX9MkBT4aF6Kdi-spKQg"], "expires_at": "2020-11-06T19:02:14.000000Z", "issued_at": "2020-11-06T18:02:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:14.709 38 INFO tempest.lib.common.rest_client [req-97cef7f4-eed6-4e6b-bc40-8ec193247443 ] Request (AgentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:02:14.709 38 DEBUG tempest.lib.common.rest_client [req-97cef7f4-eed6-4e6b-bc40-8ec193247443 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-97cef7f4-eed6-4e6b-bc40-8ec193247443', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["MXdLG-1XQke5h8t0PlP1qg"], "expires_at": "2020-11-06T19:02:14.000000Z", "issued_at": "2020-11-06T18:02:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:14.763 38 INFO tempest.lib.common.rest_client [req-9fe7d238-c1cd-4954-b96a-68690ed37bcc ] Request (AgentsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.052s 2020-11-06 18:02:14.763 38 DEBUG tempest.lib.common.rest_client [req-9fe7d238-c1cd-4954-b96a-68690ed37bcc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9fe7d238-c1cd-4954-b96a-68690ed37bcc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:14.811 38 INFO tempest.lib.common.rest_client [req-da78f6a9-4e0a-44e4-a83a-9d50e6b4a331 ] Request (AgentsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.046s 2020-11-06 18:02:14.811 38 DEBUG tempest.lib.common.rest_client [req-da78f6a9-4e0a-44e4-a83a-9d50e6b4a331 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-da78f6a9-4e0a-44e4-a83a-9d50e6b4a331', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:14.812 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:02:14.812 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:14.861 38 INFO tempest.lib.common.rest_client [req-19e4b5b7-ba60-4c4a-89ed-d67cb8abd054 ] Request (AgentsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/9a1b769eba1a4eba859a81e63028a487/users/ac0caf9c72db49b3a72c9101965133b8/roles 0.048s 2020-11-06 18:02:14.862 38 DEBUG tempest.lib.common.rest_client [req-19e4b5b7-ba60-4c4a-89ed-d67cb8abd054 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-19e4b5b7-ba60-4c4a-89ed-d67cb8abd054', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a1b769eba1a4eba859a81e63028a487/users/ac0caf9c72db49b3a72c9101965133b8/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a1b769eba1a4eba859a81e63028a487/users/ac0caf9c72db49b3a72c9101965133b8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:14.914 38 INFO tempest.lib.common.rest_client [req-a462693e-19aa-43c9-ba6d-07483413c885 ] Request (AgentsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/9a1b769eba1a4eba859a81e63028a487/users/ac0caf9c72db49b3a72c9101965133b8/roles/72a4576c553448cd941b052c1ca0cf2d 0.052s 2020-11-06 18:02:14.915 38 DEBUG tempest.lib.common.rest_client [req-a462693e-19aa-43c9-ba6d-07483413c885 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a462693e-19aa-43c9-ba6d-07483413c885', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a1b769eba1a4eba859a81e63028a487/users/ac0caf9c72db49b3a72c9101965133b8/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:15.023 38 INFO tempest.lib.common.rest_client [req-db145b5b-f6ae-448b-902d-b96034a8eaf8 ] Request (AgentsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/9a1b769eba1a4eba859a81e63028a487/users/ac0caf9c72db49b3a72c9101965133b8/roles/a629c95d64b3416fb80ae90af4f69c05 0.107s 2020-11-06 18:02:15.023 38 DEBUG tempest.lib.common.rest_client [req-db145b5b-f6ae-448b-902d-b96034a8eaf8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-db145b5b-f6ae-448b-902d-b96034a8eaf8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a1b769eba1a4eba859a81e63028a487/users/ac0caf9c72db49b3a72c9101965133b8/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:15.403 39 INFO tempest.lib.common.rest_client [req-b2350e90-55a3-4638-b797-66ccecca2e1c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.760s 2020-11-06 18:02:15.404 39 DEBUG tempest.lib.common.rest_client [req-b2350e90-55a3-4638-b797-66ccecca2e1c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b2350e90-55a3-4638-b797-66ccecca2e1c', 'x-compute-request-id': 'req-b2350e90-55a3-4638-b797-66ccecca2e1c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:16.101 38 INFO tempest.lib.common.rest_client [req-74b1c237-c4f9-4117-96a8-36001a1b7245 ] Request (AgentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.076s 2020-11-06 18:02:16.102 38 DEBUG tempest.lib.common.rest_client [req-74b1c237-c4f9-4117-96a8-36001a1b7245 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-74b1c237-c4f9-4117-96a8-36001a1b7245', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ac0caf9c72db49b3a72c9101965133b8", "name": "tempest-AgentsRbacTest-1458169091", "password_expires_at": null}, "audit_ids": ["CNh4gS0wQICHNFg6gMk-8Q"], "expires_at": "2020-11-06T19:02:16.000000Z", "issued_at": "2020-11-06T18:02:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a1b769eba1a4eba859a81e63028a487", "name": "tempest-AgentsRbacTest-1458169091"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:16.249 38 INFO tempest.lib.common.rest_client [req-6b21f175-4721-40e8-a237-a256fcceed66 ] Request (AgentsRbacTest:setUpClass): 200 GET http://172.30.13.94:9696/v2.0/agents 0.145s 2020-11-06 18:02:16.250 38 DEBUG tempest.lib.common.rest_client [req-6b21f175-4721-40e8-a237-a256fcceed66 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '4330', 'x-openstack-request-id': 'req-6b21f175-4721-40e8-a237-a256fcceed66', 'date': 'Fri, 06 Nov 2020 18:02:16 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/agents'} Body: b'{"agents": [{"id": "0efbff63-9926-4774-9bea-b5e130b9492e", "agent_type": "L3 agent", "binary": "neutron-l3-agent", "topic": "l3_agent", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:04", "started_at": "2020-10-07 12:07:05", "heartbeat_timestamp": "2020-11-06 18:02:02", "description": null, "resources_synced": null, "availability_zone": "nova", "alive": true, "configurations": {"agent_mode": "legacy", "ex_gw_ports": 10, "extensions": ["fip_qos", "gateway_ip_qos", "port_forwarding"], "floating_ips": 0, "handle_internal_only_routers": true, "interface_driver": "openvswitch", "interfaces": 12, "log_agent_heartbeats": false, "routers": 10}}, {"id": "538ccf2a-fb61-47ed-a10a-785f64cdbb63", "agent_type": "Open vSwitch agent", "binary": "neutron-openvswitch-agent", "topic": "N/A", "host": "lf-virtual8", "admin_state_up": true, "created_at": "2020-10-07 13:02:58", "started_at": "2020-10-07 13:03:28", "heartbeat_timestamp": "2020-11-06 18:01:57", "description": null, "resources_synced": null, "availability_zone": null, "alive": true, "configurations": {"arp_responder_enabled": false, "baremetal_smartnic": false, "bridge_mappings": {}, "datapath_type": "system", "devices": 0, "enable_distributed_routing": false, "extensions": ["qos", "log"], "in_distributed_mode": false, "integration_bridge": "br-int", "l2_population": false, "log_agent_heartbeats": false, "ovs_capabilities": {"datapath_types": ["netdev", "system"], "iface_types": ["erspan", "geneve", "gre", "internal", "ip6erspan", "ip6gre", "lisp", "patch", "stt", "system", "tap", "vxlan"]}, "ovs_hybrid_plug": false, "resource_provider_bandwidths": {}, "resource_provider_hypervisors": {}, "resource_provider_inventory_defaults": {"allocation_ratio": 1.0, "min_unit": 1, "step_size": 1, "reserved": 0}, "tunnel_types": ["vxlan"], "tunneling_ip": "172.30.13.93", "vhostuser_socket_dir": "/var/run/openvswitch"}}, {"id": "9d48116b-94de-4990-baef-e3b6765751fc", "agent_type": "Open vSwitch agent", "binary": "neutron-openvswitch-agent", "topic": "N/A", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:05", "started_at": "2020-10-07 12:07:35", "heartbeat_timestamp": "2020-11-06 18:02:02", "description": null, "resources_synced": null, "availability_zone": null, "alive": true, "configurations": {"arp_responder_enabled": false, "baremetal_smartnic": false, "bridge_mappings": {"public": "br-ex"}, "datapath_type": "system", "devices": 21, "enable_distributed_routing": false, "extensions": ["qos", "log"], "in_distributed_mode": false, "integration_bridge": "br-int", "l2_population": false, "log_agent_heartbeats": false, "ovs_capabilities": {"datapath_types": ["netdev", "system"], "iface_types": ["erspan", "geneve", "gre", "internal", "ip6erspan", "ip6gre", "lisp", "patch", "stt", "system", "tap", "vxlan"]}, "ovs_hybrid_plug": false, "resource_provider_bandwidths": {}, "resource_provider_hypervisors": {"br-ex": "lf-virtual9"}, "resource_provider_inventory_defaults": {"allocation_ratio": 1.0, "min_unit": 1, "step_size": 1, "reserved": 0}, "tunnel_types": ["gre", "vxlan"], "tunneling_ip": "172.30.13.94", "vhostuser_socket_dir": "/var/run/openvswitch"}}, {"id": "bc496462-aac8-4795-a8f9-6f5600fa0870", "agent_type": "DHCP agent", "binary": "neutron-dhcp-agent", "topic": "dhcp_agent", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:02", "started_at": "2020-10-07 12:07:02", "heartbeat_timestamp": "2020-11-06 18:01:47", "description": null, "resources_synced": null, "availability_zone": "nova", "alive": true, "configurations": {"dhcp_driver": "neutron.agent.linux.dhcp.Dnsmasq", "dhcp_lease_duration": 86400, "log_agent_heartbeats": false, "networks": 10, "ports": 17, "subnets": 11}}, {"id": "faf7e63c-a878-4cb5-b625-f96907b00d51", "agent_type": "Metadata agent", "binary": "neutron-metadata-agent", "topic": "N/A", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:06", "started_at": "2020-10-07 12:07:06", "heartbeat_timestamp": "2020-11-06 18:01:47", "description": null, "resources_synced _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:16.251 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:16.278 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_agent, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:16.278 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:16.377 40 INFO tempest.lib.common.rest_client [req-6b7c2fdb-6172-4803-8e29-8c41745150ab ] Request (PortsRbacTest:_run_cleanups): 200 PUT http://172.30.13.94:9696/v2.0/ports/e218c7fc-d3dc-4c2c-9234-aa97d5412eb7 1.937s 2020-11-06 18:02:16.377 40 DEBUG tempest.lib.common.rest_client [req-6b7c2fdb-6172-4803-8e29-8c41745150ab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"device_owner": ""}} Response - Headers: {'content-type': 'application/json', 'content-length': '1094', 'x-openstack-request-id': 'req-6b7c2fdb-6172-4803-8e29-8c41745150ab', 'date': 'Fri, 06 Nov 2020 18:02:16 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/e218c7fc-d3dc-4c2c-9234-aa97d5412eb7'} Body: b'{"port":{"id":"e218c7fc-d3dc-4c2c-9234-aa97d5412eb7","name":"tempest-PortsRbacTest-339006369","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:8a:69:9e","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.243"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.243","hostname":"host-192-168-120-243","fqdn":"host-192-168-120-243.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:01:42Z","updated_at":"2020-11-06T18:02:16Z","revision_number":5,"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:16.380 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:16.383 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:16.384 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:16.383 38 INFO tempest.lib.common.rest_client [req-1d49d990-a885-43f6-b549-e5f439071ced ] Request (AgentsRbacTest:test_list_agents): 200 GET http://172.30.13.94/identity/v3/projects/9a1b769eba1a4eba859a81e63028a487/users/ac0caf9c72db49b3a72c9101965133b8/roles 0.104s 2020-11-06 18:02:16.384 38 DEBUG tempest.lib.common.rest_client [req-1d49d990-a885-43f6-b549-e5f439071ced ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1d49d990-a885-43f6-b549-e5f439071ced', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a1b769eba1a4eba859a81e63028a487/users/ac0caf9c72db49b3a72c9101965133b8/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a1b769eba1a4eba859a81e63028a487/users/ac0caf9c72db49b3a72c9101965133b8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:16.386 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_port, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:16.386 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:16.389 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_port:fixed_ips:ip_address, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:16.420 37 INFO tempest.lib.common.rest_client [req-0076ead1-6d97-4991-ad49-eb483508bf4a ] Request (ComputeServersRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/66685dd3-d90a-40a2-9ca6-f10c83599b62 2.386s 2020-11-06 18:02:16.420 37 DEBUG tempest.lib.common.rest_client [req-0076ead1-6d97-4991-ad49-eb483508bf4a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-0076ead1-6d97-4991-ad49-eb483508bf4a', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:02:16 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/66685dd3-d90a-40a2-9ca6-f10c83599b62'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:16.421 38 INFO tempest.lib.common.rest_client [req-eb3b8c09-e359-46bf-9c07-951929a1d53f ] Request (AgentsRbacTest:test_list_agents): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:02:16.421 38 DEBUG tempest.lib.common.rest_client [req-eb3b8c09-e359-46bf-9c07-951929a1d53f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eb3b8c09-e359-46bf-9c07-951929a1d53f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ac0caf9c72db49b3a72c9101965133b8", "name": "tempest-AgentsRbacTest-1458169091", "password_expires_at": null}, "audit_ids": ["Zc_-roCuRgao5WeYeZTKDw"], "expires_at": "2020-11-06T19:02:16.000000Z", "issued_at": "2020-11-06T18:02:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a1b769eba1a4eba859a81e63028a487", "name": "tempest-AgentsRbacTest-1458169091"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:16.625 38 INFO tempest.lib.common.rest_client [req-c8d8ac2b-6572-4819-b65b-63700d9bfde3 ] Request (AgentsRbacTest:test_list_agents): 200 GET http://172.30.13.94:9696/v2.0/agents?id=0efbff63-9926-4774-9bea-b5e130b9492e 0.202s 2020-11-06 18:02:16.626 38 DEBUG tempest.lib.common.rest_client [req-c8d8ac2b-6572-4819-b65b-63700d9bfde3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '678', 'x-openstack-request-id': 'req-c8d8ac2b-6572-4819-b65b-63700d9bfde3', 'date': 'Fri, 06 Nov 2020 18:02:16 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/agents?id=0efbff63-9926-4774-9bea-b5e130b9492e'} Body: b'{"agents": [{"id": "0efbff63-9926-4774-9bea-b5e130b9492e", "agent_type": "L3 agent", "binary": "neutron-l3-agent", "topic": "l3_agent", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:04", "started_at": "2020-10-07 12:07:05", "heartbeat_timestamp": "2020-11-06 18:02:02", "description": null, "resources_synced": null, "availability_zone": "nova", "alive": true, "configurations": {"agent_mode": "legacy", "ex_gw_ports": 10, "extensions": ["fip_qos", "gateway_ip_qos", "port_forwarding"], "floating_ips": 0, "handle_internal_only_routers": true, "interface_driver": "openvswitch", "interfaces": 12, "log_agent_heartbeats": false, "routers": 10}}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:16.626 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:16.677 38 INFO tempest.lib.common.rest_client [req-87eebd8b-7426-4d37-a6ce-037edf084e76 ] Request (AgentsRbacTest:test_list_agents): 200 GET http://172.30.13.94/identity/v3/projects/9a1b769eba1a4eba859a81e63028a487/users/ac0caf9c72db49b3a72c9101965133b8/roles 0.049s 2020-11-06 18:02:16.678 38 DEBUG tempest.lib.common.rest_client [req-87eebd8b-7426-4d37-a6ce-037edf084e76 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-87eebd8b-7426-4d37-a6ce-037edf084e76', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a1b769eba1a4eba859a81e63028a487/users/ac0caf9c72db49b3a72c9101965133b8/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a1b769eba1a4eba859a81e63028a487/users/ac0caf9c72db49b3a72c9101965133b8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:16.700 39 INFO tempest.lib.common.rest_client [req-a9b7a9b2-c780-4097-9510-a5ef4cc3cd7d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.281s 2020-11-06 18:02:16.701 39 DEBUG tempest.lib.common.rest_client [req-a9b7a9b2-c780-4097-9510-a5ef4cc3cd7d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a9b7a9b2-c780-4097-9510-a5ef4cc3cd7d', 'x-compute-request-id': 'req-a9b7a9b2-c780-4097-9510-a5ef4cc3cd7d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:16.716 38 INFO tempest.lib.common.rest_client [req-616cbe13-e842-4a2b-9746-206e97a08990 ] Request (AgentsRbacTest:test_list_agents): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:02:16.717 38 DEBUG tempest.lib.common.rest_client [req-616cbe13-e842-4a2b-9746-206e97a08990 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-616cbe13-e842-4a2b-9746-206e97a08990', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ac0caf9c72db49b3a72c9101965133b8", "name": "tempest-AgentsRbacTest-1458169091", "password_expires_at": null}, "audit_ids": ["jblRzQ_jSSGeePPne7UuvA"], "expires_at": "2020-11-06T19:02:16.000000Z", "issued_at": "2020-11-06T18:02:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a1b769eba1a4eba859a81e63028a487", "name": "tempest-AgentsRbacTest-1458169091"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:16.720 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:16.723 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_agent, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:16.723 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:16.782 38 INFO tempest.lib.common.rest_client [req-1fafa817-57fd-450e-88d2-52b42182fcde ] Request (AgentsRbacTest:test_show_agent): 200 GET http://172.30.13.94/identity/v3/projects/9a1b769eba1a4eba859a81e63028a487/users/ac0caf9c72db49b3a72c9101965133b8/roles 0.058s 2020-11-06 18:02:16.783 38 DEBUG tempest.lib.common.rest_client [req-1fafa817-57fd-450e-88d2-52b42182fcde ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1fafa817-57fd-450e-88d2-52b42182fcde', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a1b769eba1a4eba859a81e63028a487/users/ac0caf9c72db49b3a72c9101965133b8/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a1b769eba1a4eba859a81e63028a487/users/ac0caf9c72db49b3a72c9101965133b8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:16.818 38 INFO tempest.lib.common.rest_client [req-f12dcd28-4791-4876-9f2d-41fad9284832 ] Request (AgentsRbacTest:test_show_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:02:16.818 38 DEBUG tempest.lib.common.rest_client [req-f12dcd28-4791-4876-9f2d-41fad9284832 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f12dcd28-4791-4876-9f2d-41fad9284832', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ac0caf9c72db49b3a72c9101965133b8", "name": "tempest-AgentsRbacTest-1458169091", "password_expires_at": null}, "audit_ids": ["HO0g5fsjQuu11tVtJ_2Ilg"], "expires_at": "2020-11-06T19:02:16.000000Z", "issued_at": "2020-11-06T18:02:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a1b769eba1a4eba859a81e63028a487", "name": "tempest-AgentsRbacTest-1458169091"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:16.887 37 INFO tempest.lib.common.rest_client [req-6fbdb27d-2265-483d-86bc-511c9d793fcf ] Request (ComputeServersRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/6250e302-c932-4ed2-94fd-97f0293ed4e2 0.465s 2020-11-06 18:02:16.887 37 DEBUG tempest.lib.common.rest_client [req-6fbdb27d-2265-483d-86bc-511c9d793fcf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-6fbdb27d-2265-483d-86bc-511c9d793fcf', 'date': 'Fri, 06 Nov 2020 18:02:16 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/6250e302-c932-4ed2-94fd-97f0293ed4e2'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:16.901 38 INFO tempest.lib.common.rest_client [req-c3543a7b-e1a7-4153-b67d-d1054f6374cb ] Request (AgentsRbacTest:test_show_agent): 200 GET http://172.30.13.94:9696/v2.0/agents/0efbff63-9926-4774-9bea-b5e130b9492e 0.081s 2020-11-06 18:02:16.901 38 DEBUG tempest.lib.common.rest_client [req-c3543a7b-e1a7-4153-b67d-d1054f6374cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '675', 'x-openstack-request-id': 'req-c3543a7b-e1a7-4153-b67d-d1054f6374cb', 'date': 'Fri, 06 Nov 2020 18:02:16 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/agents/0efbff63-9926-4774-9bea-b5e130b9492e'} Body: b'{"agent": {"id": "0efbff63-9926-4774-9bea-b5e130b9492e", "agent_type": "L3 agent", "binary": "neutron-l3-agent", "topic": "l3_agent", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:04", "started_at": "2020-10-07 12:07:05", "heartbeat_timestamp": "2020-11-06 18:02:02", "description": null, "resources_synced": null, "availability_zone": "nova", "alive": true, "configurations": {"agent_mode": "legacy", "ex_gw_ports": 10, "extensions": ["fip_qos", "gateway_ip_qos", "port_forwarding"], "floating_ips": 0, "handle_internal_only_routers": true, "interface_driver": "openvswitch", "interfaces": 12, "log_agent_heartbeats": false, "routers": 10}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:16.902 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:16.958 38 INFO tempest.lib.common.rest_client [req-8e5df22f-3201-426d-88b8-0436c0d0cac3 ] Request (AgentsRbacTest:test_show_agent): 200 GET http://172.30.13.94/identity/v3/projects/9a1b769eba1a4eba859a81e63028a487/users/ac0caf9c72db49b3a72c9101965133b8/roles 0.055s 2020-11-06 18:02:16.959 38 DEBUG tempest.lib.common.rest_client [req-8e5df22f-3201-426d-88b8-0436c0d0cac3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8e5df22f-3201-426d-88b8-0436c0d0cac3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a1b769eba1a4eba859a81e63028a487/users/ac0caf9c72db49b3a72c9101965133b8/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a1b769eba1a4eba859a81e63028a487/users/ac0caf9c72db49b3a72c9101965133b8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:16.998 38 INFO tempest.lib.common.rest_client [req-f52d5f3f-977f-4f59-a866-734df13bf4fd ] Request (AgentsRbacTest:test_show_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:02:16.999 38 DEBUG tempest.lib.common.rest_client [req-f52d5f3f-977f-4f59-a866-734df13bf4fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f52d5f3f-977f-4f59-a866-734df13bf4fd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ac0caf9c72db49b3a72c9101965133b8", "name": "tempest-AgentsRbacTest-1458169091", "password_expires_at": null}, "audit_ids": ["NYEtt1M4RdaScd2z8xyTAA"], "expires_at": "2020-11-06T19:02:16.000000Z", "issued_at": "2020-11-06T18:02:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a1b769eba1a4eba859a81e63028a487", "name": "tempest-AgentsRbacTest-1458169091"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:17.002 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:17.006 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_agent, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:17.007 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:17.011 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_agent, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:17.011 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:17.070 38 INFO tempest.lib.common.rest_client [req-fd3d3d0d-091b-4811-93bd-92dcdcc8fe40 ] Request (AgentsRbacTest:test_update_agent): 200 GET http://172.30.13.94/identity/v3/projects/9a1b769eba1a4eba859a81e63028a487/users/ac0caf9c72db49b3a72c9101965133b8/roles 0.058s 2020-11-06 18:02:17.071 38 DEBUG tempest.lib.common.rest_client [req-fd3d3d0d-091b-4811-93bd-92dcdcc8fe40 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fd3d3d0d-091b-4811-93bd-92dcdcc8fe40', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a1b769eba1a4eba859a81e63028a487/users/ac0caf9c72db49b3a72c9101965133b8/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a1b769eba1a4eba859a81e63028a487/users/ac0caf9c72db49b3a72c9101965133b8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:17.114 38 INFO tempest.lib.common.rest_client [req-2ba19090-d27f-46f7-83de-14a1e1d2220b ] Request (AgentsRbacTest:test_update_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-11-06 18:02:17.114 38 DEBUG tempest.lib.common.rest_client [req-2ba19090-d27f-46f7-83de-14a1e1d2220b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2ba19090-d27f-46f7-83de-14a1e1d2220b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ac0caf9c72db49b3a72c9101965133b8", "name": "tempest-AgentsRbacTest-1458169091", "password_expires_at": null}, "audit_ids": ["aKXozgz6ReWARyiqBdbYuA"], "expires_at": "2020-11-06T19:02:17.000000Z", "issued_at": "2020-11-06T18:02:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a1b769eba1a4eba859a81e63028a487", "name": "tempest-AgentsRbacTest-1458169091"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:17.219 40 INFO tempest.lib.common.rest_client [req-f0b8ef71-723f-4057-84a3-8861c62e2803 ] Request (PortsRbacTest:test_update_port_fixed_ips_ip_address): 201 POST http://172.30.13.94:9696/v2.0/ports 0.829s 2020-11-06 18:02:17.220 40 DEBUG tempest.lib.common.rest_client [req-f0b8ef71-723f-4057-84a3-8861c62e2803 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "586884b2-4363-4597-acb0-ddbc49908b65", "name": "tempest-PortsRbacTest-1155012303"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1091', 'x-openstack-request-id': 'req-f0b8ef71-723f-4057-84a3-8861c62e2803', 'date': 'Fri, 06 Nov 2020 18:02:17 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"03868049-d262-4579-809e-104f455417a2","name":"tempest-PortsRbacTest-1155012303","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:99:e2:d6","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.38"}],"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","port_security_enabled":true,"qos_policy_id":null,"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"allowed_address_pairs":[],"extra_dhcp_opts":[],"description":"","qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.38","hostname":"host-192-168-120-38","fqdn":"host-192-168-120-38.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:02:16Z","updated_at":"2020-11-06T18:02:16Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:17.302 40 INFO tempest.lib.common.rest_client [req-753ca52a-2004-45bb-b248-3b935f89526a ] Request (PortsRbacTest:test_update_port_fixed_ips_ip_address): 200 GET http://172.30.13.94:9696/v2.0/ports?network_id=586884b2-4363-4597-acb0-ddbc49908b65 0.081s 2020-11-06 18:02:17.303 40 DEBUG tempest.lib.common.rest_client [req-753ca52a-2004-45bb-b248-3b935f89526a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '17922', 'x-openstack-request-id': 'req-753ca52a-2004-45bb-b248-3b935f89526a', 'date': 'Fri, 06 Nov 2020 18:02:17 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports?network_id=586884b2-4363-4597-acb0-ddbc49908b65'} Body: b'{"ports":[{"id":"03868049-d262-4579-809e-104f455417a2","name":"tempest-PortsRbacTest-1155012303","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:99:e2:d6","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.38"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.38","hostname":"host-192-168-120-38","fqdn":"host-192-168-120-38.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:02:16Z","updated_at":"2020-11-06T18:02:16Z","revision_number":1,"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f"},{"id":"2f8ba6cd-b1ff-4dcf-8706-3a80a4ddfb28","name":"tempest-PortsRbacTest-982544266","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:c3:8f:b0","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.10"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"rbac_test_host","binding:vif_type":"binding_failed","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.10","hostname":"host-192-168-120-10","fqdn":"host-192-168-120-10.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:01:47Z","updated_at":"2020-11-06T18:01:48Z","revision_number":2,"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f"},{"id":"3525ae88-78ad-4c0a-a27e-aece7cf41d4f","name":"tempest-PortsRbacTest-638047048","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:34:99:30","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.151"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"rbac_test_host_updated","binding:vif_type":"binding_failed","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.151","hostname":"host-192-168-120-151","fqdn":"host-192-168-120-151.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:02:09Z","updated_at":"2020-11-06T18:02:11Z","revision_number":4,"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f"},{"id":"489b6d93-ae70-4c73-9220-5d613ae619e7","name":"tempest-PortsRbacTest-302887961","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:c7:44:2c","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.5"}],"allowed_address_pairs":[{"mac_address":"fa:16:3e:13:12:93","ip_address":"192.168.120.253"}],"extra_dhcp_opts":[],"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dn _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:17.361 40 INFO tempest.lib.common.rest_client [req-64187c63-3955-4a67-8016-a2c5c8387d2f ] Request (PortsRbacTest:test_update_port_fixed_ips_ip_address): 200 GET http://172.30.13.94:9696/v2.0/subnets/6dab2f10-428e-4a16-a2a0-bc153f1d8c9c 0.056s 2020-11-06 18:02:17.362 40 DEBUG tempest.lib.common.rest_client [req-64187c63-3955-4a67-8016-a2c5c8387d2f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '662', 'x-openstack-request-id': 'req-64187c63-3955-4a67-8016-a2c5c8387d2f', 'date': 'Fri, 06 Nov 2020 18:02:17 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/6dab2f10-428e-4a16-a2a0-bc153f1d8c9c'} Body: b'{"subnet":{"id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","name":"","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/24","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.254"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-11-06T18:01:42Z","updated_at":"2020-11-06T18:01:42Z","revision_number":0,"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:17.385 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:17.391 38 INFO tempest.lib.common.rest_client [req-22be43f1-f77e-47db-9b5f-3bf3a037cb3c ] Request (AgentsRbacTest:test_update_agent): 200 PUT http://172.30.13.94:9696/v2.0/agents/0efbff63-9926-4774-9bea-b5e130b9492e 0.275s 2020-11-06 18:02:17.392 38 DEBUG tempest.lib.common.rest_client [req-22be43f1-f77e-47db-9b5f-3bf3a037cb3c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"agent": {"admin_state_up": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '675', 'x-openstack-request-id': 'req-22be43f1-f77e-47db-9b5f-3bf3a037cb3c', 'date': 'Fri, 06 Nov 2020 18:02:17 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/agents/0efbff63-9926-4774-9bea-b5e130b9492e'} Body: b'{"agent": {"id": "0efbff63-9926-4774-9bea-b5e130b9492e", "agent_type": "L3 agent", "binary": "neutron-l3-agent", "topic": "l3_agent", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:04", "started_at": "2020-10-07 12:07:05", "heartbeat_timestamp": "2020-11-06 18:02:02", "description": null, "resources_synced": null, "availability_zone": "nova", "alive": true, "configurations": {"agent_mode": "legacy", "ex_gw_ports": 10, "extensions": ["fip_qos", "gateway_ip_qos", "port_forwarding"], "floating_ips": 0, "handle_internal_only_routers": true, "interface_driver": "openvswitch", "interfaces": 12, "log_agent_heartbeats": false, "routers": 10}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:17.392 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:17.447 40 INFO tempest.lib.common.rest_client [req-61f9d10a-e560-4aeb-8d91-528e1bdd4c46 ] Request (PortsRbacTest:test_update_port_fixed_ips_ip_address): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.061s 2020-11-06 18:02:17.447 40 DEBUG tempest.lib.common.rest_client [req-61f9d10a-e560-4aeb-8d91-528e1bdd4c46 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-61f9d10a-e560-4aeb-8d91-528e1bdd4c46', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:17.451 38 INFO tempest.lib.common.rest_client [req-8733a5d3-95ec-4054-9b70-d98a79625e1c ] Request (AgentsRbacTest:test_update_agent): 200 GET http://172.30.13.94/identity/v3/projects/9a1b769eba1a4eba859a81e63028a487/users/ac0caf9c72db49b3a72c9101965133b8/roles 0.057s 2020-11-06 18:02:17.452 38 DEBUG tempest.lib.common.rest_client [req-8733a5d3-95ec-4054-9b70-d98a79625e1c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8733a5d3-95ec-4054-9b70-d98a79625e1c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a1b769eba1a4eba859a81e63028a487/users/ac0caf9c72db49b3a72c9101965133b8/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a1b769eba1a4eba859a81e63028a487/users/ac0caf9c72db49b3a72c9101965133b8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:17.490 38 INFO tempest.lib.common.rest_client [req-e38e76a7-dbad-490d-b9f7-7b4827f06e58 ] Request (AgentsRbacTest:test_update_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:02:17.490 38 DEBUG tempest.lib.common.rest_client [req-e38e76a7-dbad-490d-b9f7-7b4827f06e58 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e38e76a7-dbad-490d-b9f7-7b4827f06e58', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ac0caf9c72db49b3a72c9101965133b8", "name": "tempest-AgentsRbacTest-1458169091", "password_expires_at": null}, "audit_ids": ["oX20lCpURhCEgt1uQGLqkQ"], "expires_at": "2020-11-06T19:02:17.000000Z", "issued_at": "2020-11-06T18:02:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a1b769eba1a4eba859a81e63028a487", "name": "tempest-AgentsRbacTest-1458169091"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a1b769eba1a4eba859a81e63028a487", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:17.534 40 INFO tempest.lib.common.rest_client [req-c872040c-1972-4460-b61b-d33c3fa8a7e2 ] Request (PortsRbacTest:test_update_port_fixed_ips_ip_address): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-11-06 18:02:17.535 40 DEBUG tempest.lib.common.rest_client [req-c872040c-1972-4460-b61b-d33c3fa8a7e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c872040c-1972-4460-b61b-d33c3fa8a7e2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["qHUmU0wATHy-0LxzfteOQA"], "expires_at": "2020-11-06T19:02:17.000000Z", "issued_at": "2020-11-06T18:02:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:17.638 38 INFO tempest.lib.common.rest_client [req-d0db21ae-5309-428e-aeb8-cdd1564fbb06 ] Request (AgentsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/ac0caf9c72db49b3a72c9101965133b8 0.145s 2020-11-06 18:02:17.639 38 DEBUG tempest.lib.common.rest_client [req-d0db21ae-5309-428e-aeb8-cdd1564fbb06 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d0db21ae-5309-428e-aeb8-cdd1564fbb06', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/ac0caf9c72db49b3a72c9101965133b8'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:17.677 37 INFO tempest.lib.common.rest_client [req-82089c20-5587-4324-acb8-8d179244643f ] Request (ComputeServersRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/4c841a1c-655b-4758-ac88-8f8b657eda1b 0.789s 2020-11-06 18:02:17.677 37 DEBUG tempest.lib.common.rest_client [req-82089c20-5587-4324-acb8-8d179244643f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-82089c20-5587-4324-acb8-8d179244643f', 'date': 'Fri, 06 Nov 2020 18:02:17 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/4c841a1c-655b-4758-ac88-8f8b657eda1b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:17.723 38 INFO tempest.lib.common.rest_client [req-1cfb45ea-9dd8-45ab-9071-ead276b2e9fa ] Request (AgentsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-11-06 18:02:17.724 38 DEBUG tempest.lib.common.rest_client [req-1cfb45ea-9dd8-45ab-9071-ead276b2e9fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1cfb45ea-9dd8-45ab-9071-ead276b2e9fa', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["k41-j314R62r7Yl9GzY0kg"], "expires_at": "2020-11-06T19:02:17.000000Z", "issued_at": "2020-11-06T18:02:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:17.863 37 INFO tempest.lib.common.rest_client [req-4ac15720-25bf-43c3-92e8-609ecd5aef23 ] Request (ComputeServersRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/262f98552a3a4d8a8fba3f96d5a872bf 0.184s 2020-11-06 18:02:17.864 37 DEBUG tempest.lib.common.rest_client [req-4ac15720-25bf-43c3-92e8-609ecd5aef23 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4ac15720-25bf-43c3-92e8-609ecd5aef23', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/262f98552a3a4d8a8fba3f96d5a872bf'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:17.922 37 INFO tempest.lib.common.rest_client [req-916e4296-83bf-41b2-8475-e98cd433c45a ] Request (ComputeServersRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=738a797d686c408e8ceb6a8b32bc1d09&name=default 0.057s 2020-11-06 18:02:17.923 37 DEBUG tempest.lib.common.rest_client [req-916e4296-83bf-41b2-8475-e98cd433c45a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-916e4296-83bf-41b2-8475-e98cd433c45a', 'date': 'Fri, 06 Nov 2020 18:02:17 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=738a797d686c408e8ceb6a8b32bc1d09&name=default'} Body: b'{"security_groups": [{"id": "36ebc50c-d146-43bc-841a-d6dfb8ca6ade", "name": "default", "stateful": true, "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "description": "Default security group", "security_group_rules": [{"id": "48a2b592-b13c-4df0-85f3-5553f2ac0bfa", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "security_group_id": "36ebc50c-d146-43bc-841a-d6dfb8ca6ade", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "36ebc50c-d146-43bc-841a-d6dfb8ca6ade", "description": null, "tags": [], "created_at": "2020-11-06T18:01:06Z", "updated_at": "2020-11-06T18:01:06Z", "revision_number": 0, "project_id": "738a797d686c408e8ceb6a8b32bc1d09"}, {"id": "ca8349ed-d0b6-4977-a9bc-1891386f99a5", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "security_group_id": "36ebc50c-d146-43bc-841a-d6dfb8ca6ade", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "36ebc50c-d146-43bc-841a-d6dfb8ca6ade", "description": null, "tags": [], "created_at": "2020-11-06T18:01:06Z", "updated_at": "2020-11-06T18:01:06Z", "revision_number": 0, "project_id": "738a797d686c408e8ceb6a8b32bc1d09"}, {"id": "e27cec1a-2de6-4ddb-b3bd-b2730b9bbe9c", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "security_group_id": "36ebc50c-d146-43bc-841a-d6dfb8ca6ade", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:01:06Z", "updated_at": "2020-11-06T18:01:06Z", "revision_number": 0, "project_id": "738a797d686c408e8ceb6a8b32bc1d09"}, {"id": "f228ee16-3689-44b0-b424-75a22159560e", "tenant_id": "738a797d686c408e8ceb6a8b32bc1d09", "security_group_id": "36ebc50c-d146-43bc-841a-d6dfb8ca6ade", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:01:06Z", "updated_at": "2020-11-06T18:01:06Z", "revision_number": 0, "project_id": "738a797d686c408e8ceb6a8b32bc1d09"}], "tags": [], "created_at": "2020-11-06T18:01:06Z", "updated_at": "2020-11-06T18:01:06Z", "revision_number": 1, "project_id": "738a797d686c408e8ceb6a8b32bc1d09"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:17.994 39 INFO tempest.lib.common.rest_client [req-54c3098b-22d3-46cd-8fab-4c6e9806397b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.280s 2020-11-06 18:02:17.995 39 DEBUG tempest.lib.common.rest_client [req-54c3098b-22d3-46cd-8fab-4c6e9806397b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-54c3098b-22d3-46cd-8fab-4c6e9806397b', 'x-compute-request-id': 'req-54c3098b-22d3-46cd-8fab-4c6e9806397b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:18.070 37 INFO tempest.lib.common.rest_client [req-1991929a-d089-472a-85fd-d24b3df728b2 ] Request (ComputeServersRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/36ebc50c-d146-43bc-841a-d6dfb8ca6ade 0.146s 2020-11-06 18:02:18.071 37 DEBUG tempest.lib.common.rest_client [req-1991929a-d089-472a-85fd-d24b3df728b2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-1991929a-d089-472a-85fd-d24b3df728b2', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:02:18 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/36ebc50c-d146-43bc-841a-d6dfb8ca6ade'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:18.082 38 INFO tempest.lib.common.rest_client [req-77fca1fc-f518-4896-82c8-46dfeb38bd01 ] Request (AgentsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=9a1b769eba1a4eba859a81e63028a487&name=default 0.357s 2020-11-06 18:02:18.083 38 DEBUG tempest.lib.common.rest_client [req-77fca1fc-f518-4896-82c8-46dfeb38bd01 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-77fca1fc-f518-4896-82c8-46dfeb38bd01', 'date': 'Fri, 06 Nov 2020 18:02:18 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=9a1b769eba1a4eba859a81e63028a487&name=default'} Body: b'{"security_groups": [{"id": "e1ffb80d-8264-4987-a3de-7f6b580e43b8", "name": "default", "stateful": true, "tenant_id": "9a1b769eba1a4eba859a81e63028a487", "description": "Default security group", "security_group_rules": [{"id": "a66b08c4-7541-4cce-a64c-8b8449f105d9", "tenant_id": "9a1b769eba1a4eba859a81e63028a487", "security_group_id": "e1ffb80d-8264-4987-a3de-7f6b580e43b8", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:02:17Z", "updated_at": "2020-11-06T18:02:17Z", "revision_number": 0, "project_id": "9a1b769eba1a4eba859a81e63028a487"}, {"id": "aa370854-17a1-42c0-a6e1-d07ed15b1aa1", "tenant_id": "9a1b769eba1a4eba859a81e63028a487", "security_group_id": "e1ffb80d-8264-4987-a3de-7f6b580e43b8", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:02:17Z", "updated_at": "2020-11-06T18:02:17Z", "revision_number": 0, "project_id": "9a1b769eba1a4eba859a81e63028a487"}, {"id": "d63789a7-61d4-4f73-86b7-bcd392a29e9a", "tenant_id": "9a1b769eba1a4eba859a81e63028a487", "security_group_id": "e1ffb80d-8264-4987-a3de-7f6b580e43b8", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "e1ffb80d-8264-4987-a3de-7f6b580e43b8", "description": null, "tags": [], "created_at": "2020-11-06T18:02:17Z", "updated_at": "2020-11-06T18:02:17Z", "revision_number": 0, "project_id": "9a1b769eba1a4eba859a81e63028a487"}, {"id": "e249a0db-baee-4a2a-803c-5a2e9de12543", "tenant_id": "9a1b769eba1a4eba859a81e63028a487", "security_group_id": "e1ffb80d-8264-4987-a3de-7f6b580e43b8", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "e1ffb80d-8264-4987-a3de-7f6b580e43b8", "description": null, "tags": [], "created_at": "2020-11-06T18:02:17Z", "updated_at": "2020-11-06T18:02:17Z", "revision_number": 0, "project_id": "9a1b769eba1a4eba859a81e63028a487"}], "tags": [], "created_at": "2020-11-06T18:02:17Z", "updated_at": "2020-11-06T18:02:17Z", "revision_number": 1, "project_id": "9a1b769eba1a4eba859a81e63028a487"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:18.203 38 INFO tempest.lib.common.rest_client [req-f4075cbd-070a-40c6-9183-13581aaa3b8b ] Request (AgentsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/e1ffb80d-8264-4987-a3de-7f6b580e43b8 0.119s 2020-11-06 18:02:18.204 38 DEBUG tempest.lib.common.rest_client [req-f4075cbd-070a-40c6-9183-13581aaa3b8b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-f4075cbd-070a-40c6-9183-13581aaa3b8b', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:02:18 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/e1ffb80d-8264-4987-a3de-7f6b580e43b8'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:18.244 37 INFO tempest.lib.common.rest_client [req-724209df-a538-4485-bb57-be35b5b96d2f ] Request (ComputeServersRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09 0.171s 2020-11-06 18:02:18.244 37 DEBUG tempest.lib.common.rest_client [req-724209df-a538-4485-bb57-be35b5b96d2f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-724209df-a538-4485-bb57-be35b5b96d2f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/738a797d686c408e8ceb6a8b32bc1d09'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:18.290 37 INFO tempest.lib.common.rest_client [req-50015668-af67-42f3-b8ad-2abbdb4f15dd ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:02:18.290 37 DEBUG tempest.lib.common.rest_client [req-50015668-af67-42f3-b8ad-2abbdb4f15dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-50015668-af67-42f3-b8ad-2abbdb4f15dd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["Voud7EtrRXyWxP-tX189Cg"], "expires_at": "2020-11-06T19:02:18.000000Z", "issued_at": "2020-11-06T18:02:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:18.374 38 INFO tempest.lib.common.rest_client [req-ebb35811-23f1-4d15-9581-7f68d4f1eb55 ] Request (AgentsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/9a1b769eba1a4eba859a81e63028a487 0.168s 2020-11-06 18:02:18.374 38 DEBUG tempest.lib.common.rest_client [req-ebb35811-23f1-4d15-9581-7f68d4f1eb55 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ebb35811-23f1-4d15-9581-7f68d4f1eb55', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a1b769eba1a4eba859a81e63028a487'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:18.400 37 INFO tempest.lib.common.rest_client [req-27cc5fb0-3b6f-4468-89b8-cbc2c8024dfd ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-11-06 18:02:18.401 37 DEBUG tempest.lib.common.rest_client [req-27cc5fb0-3b6f-4468-89b8-cbc2c8024dfd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-27cc5fb0-3b6f-4468-89b8-cbc2c8024dfd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["vZHMO69TRJ6owOJ7jEMdhw"], "expires_at": "2020-11-06T19:02:18.000000Z", "issued_at": "2020-11-06T18:02:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:18.418 38 INFO tempest.lib.common.rest_client [req-ace8fddd-1cce-4075-aeff-3c35b1d0e73b ] Request (DHCPAgentSchedulersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:02:18.419 38 DEBUG tempest.lib.common.rest_client [req-ace8fddd-1cce-4075-aeff-3c35b1d0e73b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ace8fddd-1cce-4075-aeff-3c35b1d0e73b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["ObYnffMwQwuNuULzTs4P3w"], "expires_at": "2020-11-06T19:02:18.000000Z", "issued_at": "2020-11-06T18:02:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:18.457 37 INFO tempest.lib.common.rest_client [req-385b098b-b4ab-44c7-9692-6a7d82a0d877 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.055s 2020-11-06 18:02:18.458 37 DEBUG tempest.lib.common.rest_client [req-385b098b-b4ab-44c7-9692-6a7d82a0d877 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-385b098b-b4ab-44c7-9692-6a7d82a0d877', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:18.464 38 INFO tempest.lib.common.rest_client [req-e5983751-36b4-4a66-8d8d-fdab94f79153 ] Request (DHCPAgentSchedulersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:02:18.464 38 DEBUG tempest.lib.common.rest_client [req-e5983751-36b4-4a66-8d8d-fdab94f79153 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e5983751-36b4-4a66-8d8d-fdab94f79153', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["XsizqaRxRH62xx0U8YnPhg"], "expires_at": "2020-11-06T19:02:18.000000Z", "issued_at": "2020-11-06T18:02:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:18.465 40 INFO tempest.lib.common.rest_client [req-271813bd-df63-4b08-af60-6398111898da ] Request (PortsRbacTest:test_update_port_fixed_ips_ip_address): 200 PUT http://172.30.13.94:9696/v2.0/ports/03868049-d262-4579-809e-104f455417a2 0.929s 2020-11-06 18:02:18.466 40 DEBUG tempest.lib.common.rest_client [req-271813bd-df63-4b08-af60-6398111898da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"fixed_ips": [{"ip_address": "192.168.120.253"}]}} Response - Headers: {'content-type': 'application/json', 'content-length': '1095', 'x-openstack-request-id': 'req-271813bd-df63-4b08-af60-6398111898da', 'date': 'Fri, 06 Nov 2020 18:02:18 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/03868049-d262-4579-809e-104f455417a2'} Body: b'{"port":{"id":"03868049-d262-4579-809e-104f455417a2","name":"tempest-PortsRbacTest-1155012303","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:99:e2:d6","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.253"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.253","hostname":"host-192-168-120-253","fqdn":"host-192-168-120-253.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:02:16Z","updated_at":"2020-11-06T18:02:17Z","revision_number":2,"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:18.466 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:18.519 38 INFO tempest.lib.common.rest_client [req-4228cdb7-90fb-42b8-8f60-fc0a2a108a3c ] Request (DHCPAgentSchedulersRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.053s 2020-11-06 18:02:18.519 38 DEBUG tempest.lib.common.rest_client [req-4228cdb7-90fb-42b8-8f60-fc0a2a108a3c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4228cdb7-90fb-42b8-8f60-fc0a2a108a3c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:18.523 40 INFO tempest.lib.common.rest_client [req-19b0829e-5c13-435a-9c1f-4b18b9ae1403 ] Request (PortsRbacTest:test_update_port_fixed_ips_ip_address): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.055s 2020-11-06 18:02:18.524 40 DEBUG tempest.lib.common.rest_client [req-19b0829e-5c13-435a-9c1f-4b18b9ae1403 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-19b0829e-5c13-435a-9c1f-4b18b9ae1403', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:18.525 37 INFO tempest.lib.common.rest_client [req-7d01fb8b-8b5c-4b73-a136-6787003d301f ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.066s 2020-11-06 18:02:18.525 37 DEBUG tempest.lib.common.rest_client [req-7d01fb8b-8b5c-4b73-a136-6787003d301f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ServerVolumeAttachmentRbacTest-1175560981-desc", "domain_id": "default", "name": "tempest-ServerVolumeAttachmentRbacTest-1175560981"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '398', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7d01fb8b-8b5c-4b73-a136-6787003d301f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "198374b90e3641c39c58226d89b9ccc8", "name": "tempest-ServerVolumeAttachmentRbacTest-1175560981", "domain_id": "default", "description": "tempest-ServerVolumeAttachmentRbacTest-1175560981-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/198374b90e3641c39c58226d89b9ccc8"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:18.608 40 INFO tempest.lib.common.rest_client [req-b6dadde5-3825-4cfb-ba9d-a119fe132b2c ] Request (PortsRbacTest:test_update_port_fixed_ips_ip_address): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 18:02:18.608 40 DEBUG tempest.lib.common.rest_client [req-b6dadde5-3825-4cfb-ba9d-a119fe132b2c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b6dadde5-3825-4cfb-ba9d-a119fe132b2c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["WFIjUdrKSiGJo7AxKQql7Q"], "expires_at": "2020-11-06T19:02:18.000000Z", "issued_at": "2020-11-06T18:02:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:18.611 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:18.615 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:18.615 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:18.617 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_port, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:18.617 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:18.620 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_port:mac_address, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:18.620 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:18.628 37 INFO tempest.lib.common.rest_client [req-68b7c53f-2693-45de-969c-768e326c6e5d ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.101s 2020-11-06 18:02:18.629 37 DEBUG tempest.lib.common.rest_client [req-68b7c53f-2693-45de-969c-768e326c6e5d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ServerVolumeAttachmentRbacTest-1175560981", "password": "L6#YB^ro#4YpejA", "project_id": "198374b90e3641c39c58226d89b9ccc8", "email": "tempest-ServerVolumeAttachmentRbacTest-159587476@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '415', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-68b7c53f-2693-45de-969c-768e326c6e5d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "198374b90e3641c39c58226d89b9ccc8", "email": "tempest-ServerVolumeAttachmentRbacTest-159587476@example.com", "id": "31dfe8b61f554cfe82a18efd5d747c55", "name": "tempest-ServerVolumeAttachmentRbacTest-1175560981", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/31dfe8b61f554cfe82a18efd5d747c55"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:18.635 38 INFO tempest.lib.common.rest_client [req-c579664d-5e91-4420-8161-408b7be7b594 ] Request (DHCPAgentSchedulersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.114s 2020-11-06 18:02:18.635 38 DEBUG tempest.lib.common.rest_client [req-c579664d-5e91-4420-8161-408b7be7b594 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-DHCPAgentSchedulersRbacTest-1617395121-desc", "domain_id": "default", "name": "tempest-DHCPAgentSchedulersRbacTest-1617395121"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '392', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c579664d-5e91-4420-8161-408b7be7b594', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "5900a11aa8c444ef859c281201ee71e5", "name": "tempest-DHCPAgentSchedulersRbacTest-1617395121", "domain_id": "default", "description": "tempest-DHCPAgentSchedulersRbacTest-1617395121-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/5900a11aa8c444ef859c281201ee71e5"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:18.676 40 INFO tempest.lib.common.rest_client [req-eec6a05f-5f56-4e2a-ab5e-945b2c1b8206 ] Request (PortsRbacTest:test_update_port_mac_address): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.055s 2020-11-06 18:02:18.676 40 DEBUG tempest.lib.common.rest_client [req-eec6a05f-5f56-4e2a-ab5e-945b2c1b8206 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eec6a05f-5f56-4e2a-ab5e-945b2c1b8206', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:18.744 37 INFO tempest.lib.common.rest_client [req-de32e59f-9c2a-43f9-96a2-5d6124a92806 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.114s 2020-11-06 18:02:18.745 37 DEBUG tempest.lib.common.rest_client [req-de32e59f-9c2a-43f9-96a2-5d6124a92806 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-de32e59f-9c2a-43f9-96a2-5d6124a92806', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:18.747 38 INFO tempest.lib.common.rest_client [req-f7e8abcd-0d86-4652-9ff8-73b2de98bc73 ] Request (DHCPAgentSchedulersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.111s 2020-11-06 18:02:18.747 38 DEBUG tempest.lib.common.rest_client [req-f7e8abcd-0d86-4652-9ff8-73b2de98bc73 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-DHCPAgentSchedulersRbacTest-1617395121", "password": "J3#xzMPboIZ7I+7", "project_id": "5900a11aa8c444ef859c281201ee71e5", "email": "tempest-DHCPAgentSchedulersRbacTest-716148399@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '409', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f7e8abcd-0d86-4652-9ff8-73b2de98bc73', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "5900a11aa8c444ef859c281201ee71e5", "email": "tempest-DHCPAgentSchedulersRbacTest-716148399@example.com", "id": "cf72677f26d34f81bab6c3d4077e6c7f", "name": "tempest-DHCPAgentSchedulersRbacTest-1617395121", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/cf72677f26d34f81bab6c3d4077e6c7f"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:18.768 40 INFO tempest.lib.common.rest_client [req-28b1758c-4f92-458a-8a14-6dd903e990ba ] Request (PortsRbacTest:test_update_port_mac_address): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-11-06 18:02:18.769 40 DEBUG tempest.lib.common.rest_client [req-28b1758c-4f92-458a-8a14-6dd903e990ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-28b1758c-4f92-458a-8a14-6dd903e990ba', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["xOjnxbYMT0-sabxJVLF1Uw"], "expires_at": "2020-11-06T19:02:18.000000Z", "issued_at": "2020-11-06T18:02:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:18.787 37 INFO tempest.lib.common.rest_client [req-139bfa41-cb1f-4417-9e49-ab8caa88a9c0 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.041s 2020-11-06 18:02:18.788 37 DEBUG tempest.lib.common.rest_client [req-139bfa41-cb1f-4417-9e49-ab8caa88a9c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-139bfa41-cb1f-4417-9e49-ab8caa88a9c0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:18.797 38 INFO tempest.lib.common.rest_client [req-89abf9d0-734c-4a21-b2bc-b28bfff15210 ] Request (DHCPAgentSchedulersRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.049s 2020-11-06 18:02:18.798 38 DEBUG tempest.lib.common.rest_client [req-89abf9d0-734c-4a21-b2bc-b28bfff15210 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-89abf9d0-734c-4a21-b2bc-b28bfff15210', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:18.845 38 INFO tempest.lib.common.rest_client [req-62000be9-4026-408e-9ff2-7a80a4ab377a ] Request (DHCPAgentSchedulersRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.046s 2020-11-06 18:02:18.846 38 DEBUG tempest.lib.common.rest_client [req-62000be9-4026-408e-9ff2-7a80a4ab377a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-62000be9-4026-408e-9ff2-7a80a4ab377a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:18.865 37 INFO tempest.lib.common.rest_client [req-c5e1037e-806d-4531-b8e4-235d13ebd567 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/198374b90e3641c39c58226d89b9ccc8/users/31dfe8b61f554cfe82a18efd5d747c55/roles/72a4576c553448cd941b052c1ca0cf2d 0.076s 2020-11-06 18:02:18.865 37 DEBUG tempest.lib.common.rest_client [req-c5e1037e-806d-4531-b8e4-235d13ebd567 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c5e1037e-806d-4531-b8e4-235d13ebd567', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/198374b90e3641c39c58226d89b9ccc8/users/31dfe8b61f554cfe82a18efd5d747c55/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:18.866 37 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerVolumeAttachmentRbacTest-1175560981', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '198374b90e3641c39c58226d89b9ccc8', 'project_name': 'tempest-ServerVolumeAttachmentRbacTest-1175560981', 'tenant_id': '198374b90e3641c39c58226d89b9ccc8', 'tenant_name': 'tempest-ServerVolumeAttachmentRbacTest-1175560981', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '31dfe8b61f554cfe82a18efd5d747c55'}, Network: None, Subnet: None, Router: None 2020-11-06 18:02:18.964 37 INFO tempest.lib.common.rest_client [req-e9f904ff-bc35-4b67-b6fe-b0005060e072 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-11-06 18:02:18.965 37 DEBUG tempest.lib.common.rest_client [req-e9f904ff-bc35-4b67-b6fe-b0005060e072 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e9f904ff-bc35-4b67-b6fe-b0005060e072', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["r8CpqZ1VR42HZgZNXvdkPA"], "expires_at": "2020-11-06T19:02:18.000000Z", "issued_at": "2020-11-06T18:02:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:18.972 38 INFO tempest.lib.common.rest_client [req-85c1a698-26d9-45f2-945f-ada20932dd99 ] Request (DHCPAgentSchedulersRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/5900a11aa8c444ef859c281201ee71e5/users/cf72677f26d34f81bab6c3d4077e6c7f/roles/72a4576c553448cd941b052c1ca0cf2d 0.125s 2020-11-06 18:02:18.972 38 DEBUG tempest.lib.common.rest_client [req-85c1a698-26d9-45f2-945f-ada20932dd99 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-85c1a698-26d9-45f2-945f-ada20932dd99', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/5900a11aa8c444ef859c281201ee71e5/users/cf72677f26d34f81bab6c3d4077e6c7f/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:18.973 38 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-DHCPAgentSchedulersRbacTest-1617395121', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '5900a11aa8c444ef859c281201ee71e5', 'project_name': 'tempest-DHCPAgentSchedulersRbacTest-1617395121', 'tenant_id': '5900a11aa8c444ef859c281201ee71e5', 'tenant_name': 'tempest-DHCPAgentSchedulersRbacTest-1617395121', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'cf72677f26d34f81bab6c3d4077e6c7f'}, Network: None, Subnet: None, Router: None 2020-11-06 18:02:18.973 38 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-DHCPAgentSchedulersRbacTest-1617395121', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '5900a11aa8c444ef859c281201ee71e5', 'project_name': 'tempest-DHCPAgentSchedulersRbacTest-1617395121', 'tenant_id': '5900a11aa8c444ef859c281201ee71e5', 'tenant_name': 'tempest-DHCPAgentSchedulersRbacTest-1617395121', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'cf72677f26d34f81bab6c3d4077e6c7f'}, Network: None, Subnet: None, Router: None 2020-11-06 18:02:19.097 38 INFO tempest.lib.common.rest_client [req-ba4d9719-a83f-4b86-a1f8-3f449ddb1e13 ] Request (DHCPAgentSchedulersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.113s 2020-11-06 18:02:19.098 38 DEBUG tempest.lib.common.rest_client [req-ba4d9719-a83f-4b86-a1f8-3f449ddb1e13 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6585', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ba4d9719-a83f-4b86-a1f8-3f449ddb1e13', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "cf72677f26d34f81bab6c3d4077e6c7f", "name": "tempest-DHCPAgentSchedulersRbacTest-1617395121", "password_expires_at": null}, "audit_ids": ["18qmAwqQR-qYOY-k2EI3LA"], "expires_at": "2020-11-06T19:02:19.000000Z", "issued_at": "2020-11-06T18:02:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5900a11aa8c444ef859c281201ee71e5", "name": "tempest-DHCPAgentSchedulersRbacTest-1617395121"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:19.136 38 INFO tempest.lib.common.rest_client [req-0756a1c1-bdc0-47ed-8203-a93b4f41ec41 ] Request (DHCPAgentSchedulersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:02:19.137 38 DEBUG tempest.lib.common.rest_client [req-0756a1c1-bdc0-47ed-8203-a93b4f41ec41 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0756a1c1-bdc0-47ed-8203-a93b4f41ec41', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["a63c-7dgQ_O8uSFaPl0M-A"], "expires_at": "2020-11-06T19:02:19.000000Z", "issued_at": "2020-11-06T18:02:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:19.184 38 INFO tempest.lib.common.rest_client [req-5d6e4a7f-f198-42e2-85a4-bb5a1fe98a6a ] Request (DHCPAgentSchedulersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:02:19.185 38 DEBUG tempest.lib.common.rest_client [req-5d6e4a7f-f198-42e2-85a4-bb5a1fe98a6a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5d6e4a7f-f198-42e2-85a4-bb5a1fe98a6a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["QxTIFioXRVWiG3C2oTTdMQ"], "expires_at": "2020-11-06T19:02:19.000000Z", "issued_at": "2020-11-06T18:02:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:19.243 38 INFO tempest.lib.common.rest_client [req-6b5cd7d3-de4f-4552-a396-d31ce6aee658 ] Request (DHCPAgentSchedulersRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.057s 2020-11-06 18:02:19.243 38 DEBUG tempest.lib.common.rest_client [req-6b5cd7d3-de4f-4552-a396-d31ce6aee658 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6b5cd7d3-de4f-4552-a396-d31ce6aee658', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:19.293 38 INFO tempest.lib.common.rest_client [req-97a49e81-7ac9-42fb-b849-133a3095d5f6 ] Request (DHCPAgentSchedulersRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.048s 2020-11-06 18:02:19.293 38 DEBUG tempest.lib.common.rest_client [req-97a49e81-7ac9-42fb-b849-133a3095d5f6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-97a49e81-7ac9-42fb-b849-133a3095d5f6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:19.294 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:02:19.294 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:19.311 39 INFO tempest.lib.common.rest_client [req-e5692ec9-fb42-4fa8-9935-69e6e4659cbf ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.304s 2020-11-06 18:02:19.312 39 DEBUG tempest.lib.common.rest_client [req-e5692ec9-fb42-4fa8-9935-69e6e4659cbf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e5692ec9-fb42-4fa8-9935-69e6e4659cbf', 'x-compute-request-id': 'req-e5692ec9-fb42-4fa8-9935-69e6e4659cbf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:19.349 38 INFO tempest.lib.common.rest_client [req-04a27c05-d023-4024-a79a-b95f8494a453 ] Request (DHCPAgentSchedulersRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/5900a11aa8c444ef859c281201ee71e5/users/cf72677f26d34f81bab6c3d4077e6c7f/roles 0.053s 2020-11-06 18:02:19.349 38 DEBUG tempest.lib.common.rest_client [req-04a27c05-d023-4024-a79a-b95f8494a453 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-04a27c05-d023-4024-a79a-b95f8494a453', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5900a11aa8c444ef859c281201ee71e5/users/cf72677f26d34f81bab6c3d4077e6c7f/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5900a11aa8c444ef859c281201ee71e5/users/cf72677f26d34f81bab6c3d4077e6c7f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:19.419 38 INFO tempest.lib.common.rest_client [req-89b59edb-8cff-40a0-ba60-8da92641ad4e ] Request (DHCPAgentSchedulersRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/5900a11aa8c444ef859c281201ee71e5/users/cf72677f26d34f81bab6c3d4077e6c7f/roles/72a4576c553448cd941b052c1ca0cf2d 0.068s 2020-11-06 18:02:19.419 38 DEBUG tempest.lib.common.rest_client [req-89b59edb-8cff-40a0-ba60-8da92641ad4e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-89b59edb-8cff-40a0-ba60-8da92641ad4e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/5900a11aa8c444ef859c281201ee71e5/users/cf72677f26d34f81bab6c3d4077e6c7f/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:19.509 37 INFO tempest.lib.common.rest_client [req-f46029a3-2575-4d2e-a63e-daae49af0922 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.543s 2020-11-06 18:02:19.510 37 DEBUG tempest.lib.common.rest_client [req-f46029a3-2575-4d2e-a63e-daae49af0922 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-ServerVolumeAttachmentRbacTest-1258567035-network", "tenant_id": "198374b90e3641c39c58226d89b9ccc8"}} Response - Headers: {'content-type': 'application/json', 'content-length': '746', 'x-openstack-request-id': 'req-f46029a3-2575-4d2e-a63e-daae49af0922', 'date': 'Fri, 06 Nov 2020 18:02:19 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"5d36c639-e8c3-4217-a17b-7cd7a033d67a","name":"tempest-ServerVolumeAttachmentRbacTest-1258567035-network","tenant_id":"198374b90e3641c39c58226d89b9ccc8","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"198374b90e3641c39c58226d89b9ccc8","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":49,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:02:19Z","updated_at":"2020-11-06T18:02:19Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:19.557 38 INFO tempest.lib.common.rest_client [req-d60bcfc4-7d2a-41b4-a74e-b393f5a87f2e ] Request (DHCPAgentSchedulersRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/5900a11aa8c444ef859c281201ee71e5/users/cf72677f26d34f81bab6c3d4077e6c7f/roles/a629c95d64b3416fb80ae90af4f69c05 0.137s 2020-11-06 18:02:19.558 38 DEBUG tempest.lib.common.rest_client [req-d60bcfc4-7d2a-41b4-a74e-b393f5a87f2e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d60bcfc4-7d2a-41b4-a74e-b393f5a87f2e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/5900a11aa8c444ef859c281201ee71e5/users/cf72677f26d34f81bab6c3d4077e6c7f/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:19.727 40 INFO tempest.lib.common.rest_client [req-34044905-b2c3-452d-b0c9-22ccf4e99795 ] Request (PortsRbacTest:test_update_port_mac_address): 200 PUT http://172.30.13.94:9696/v2.0/ports/e218c7fc-d3dc-4c2c-9234-aa97d5412eb7 0.956s 2020-11-06 18:02:19.727 40 DEBUG tempest.lib.common.rest_client [req-34044905-b2c3-452d-b0c9-22ccf4e99795 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"mac_address": "fa:16:3e:ef:b1:9b"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1094', 'x-openstack-request-id': 'req-34044905-b2c3-452d-b0c9-22ccf4e99795', 'date': 'Fri, 06 Nov 2020 18:02:19 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/e218c7fc-d3dc-4c2c-9234-aa97d5412eb7'} Body: b'{"port":{"id":"e218c7fc-d3dc-4c2c-9234-aa97d5412eb7","name":"tempest-PortsRbacTest-339006369","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:ef:b1:9b","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.243"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.243","hostname":"host-192-168-120-243","fqdn":"host-192-168-120-243.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:01:42Z","updated_at":"2020-11-06T18:02:19Z","revision_number":6,"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:19.728 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:19.841 40 INFO tempest.lib.common.rest_client [req-b2be3d24-f86a-4392-817c-3929fa0a8afc ] Request (PortsRbacTest:test_update_port_mac_address): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.112s 2020-11-06 18:02:19.842 40 DEBUG tempest.lib.common.rest_client [req-b2be3d24-f86a-4392-817c-3929fa0a8afc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b2be3d24-f86a-4392-817c-3929fa0a8afc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:19.923 40 INFO tempest.lib.common.rest_client [req-ff5ecc2a-683c-44c0-aa28-ba7057f9fd0f ] Request (PortsRbacTest:test_update_port_mac_address): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.080s 2020-11-06 18:02:19.923 40 DEBUG tempest.lib.common.rest_client [req-ff5ecc2a-683c-44c0-aa28-ba7057f9fd0f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ff5ecc2a-683c-44c0-aa28-ba7057f9fd0f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["pNS4jOtASRWbmjU1SFkZ_w"], "expires_at": "2020-11-06T19:02:19.000000Z", "issued_at": "2020-11-06T18:02:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:20.534 39 INFO tempest.lib.common.rest_client [req-1dfc13af-0d0f-47a1-82b9-54ba5905ef49 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.205s 2020-11-06 18:02:20.535 39 DEBUG tempest.lib.common.rest_client [req-1dfc13af-0d0f-47a1-82b9-54ba5905ef49 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1dfc13af-0d0f-47a1-82b9-54ba5905ef49', 'x-compute-request-id': 'req-1dfc13af-0d0f-47a1-82b9-54ba5905ef49', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:20.569 37 INFO tempest.lib.common.rest_client [req-54d7828e-93bf-4373-87ed-9897a9ccb9a5 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 1.057s 2020-11-06 18:02:20.570 37 DEBUG tempest.lib.common.rest_client [req-54d7828e-93bf-4373-87ed-9897a9ccb9a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "5d36c639-e8c3-4217-a17b-7cd7a033d67a", "cidr": "192.168.120.0/28", "name": "tempest-ServerVolumeAttachmentRbacTest-1258567035-subnet", "tenant_id": "198374b90e3641c39c58226d89b9ccc8", "enable_dhcp": false, "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '718', 'x-openstack-request-id': 'req-54d7828e-93bf-4373-87ed-9897a9ccb9a5', 'date': 'Fri, 06 Nov 2020 18:02:20 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"8b7f9f92-033a-4908-99d7-129d95e50f00","name":"tempest-ServerVolumeAttachmentRbacTest-1258567035-subnet","tenant_id":"198374b90e3641c39c58226d89b9ccc8","network_id":"5d36c639-e8c3-4217-a17b-7cd7a033d67a","ip_version":4,"subnetpool_id":null,"enable_dhcp":false,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-11-06T18:02:19Z","updated_at":"2020-11-06T18:02:19Z","revision_number":0,"project_id":"198374b90e3641c39c58226d89b9ccc8"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:20.643 38 INFO tempest.lib.common.rest_client [req-46460daa-ace9-465d-ac00-e5b944e2a407 ] Request (DHCPAgentSchedulersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 18:02:20.643 38 DEBUG tempest.lib.common.rest_client [req-46460daa-ace9-465d-ac00-e5b944e2a407 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6646', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-46460daa-ace9-465d-ac00-e5b944e2a407', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "cf72677f26d34f81bab6c3d4077e6c7f", "name": "tempest-DHCPAgentSchedulersRbacTest-1617395121", "password_expires_at": null}, "audit_ids": ["Ldf5YqmyRVy57ncEC1EYfg"], "expires_at": "2020-11-06T19:02:20.000000Z", "issued_at": "2020-11-06T18:02:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5900a11aa8c444ef859c281201ee71e5", "name": "tempest-DHCPAgentSchedulersRbacTest-1617395121"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5baf _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:20.837 38 INFO tempest.lib.common.rest_client [req-f20ce8a0-634f-44aa-9bb9-6d2869ae9bee ] Request (DHCPAgentSchedulersRbacTest:setUp): 200 GET http://172.30.13.94:9696/v2.0/agents 0.192s 2020-11-06 18:02:20.837 38 DEBUG tempest.lib.common.rest_client [req-f20ce8a0-634f-44aa-9bb9-6d2869ae9bee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '4330', 'x-openstack-request-id': 'req-f20ce8a0-634f-44aa-9bb9-6d2869ae9bee', 'date': 'Fri, 06 Nov 2020 18:02:20 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/agents'} Body: b'{"agents": [{"id": "0efbff63-9926-4774-9bea-b5e130b9492e", "agent_type": "L3 agent", "binary": "neutron-l3-agent", "topic": "l3_agent", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:04", "started_at": "2020-10-07 12:07:05", "heartbeat_timestamp": "2020-11-06 18:02:02", "description": null, "resources_synced": null, "availability_zone": "nova", "alive": true, "configurations": {"agent_mode": "legacy", "ex_gw_ports": 10, "extensions": ["fip_qos", "gateway_ip_qos", "port_forwarding"], "floating_ips": 0, "handle_internal_only_routers": true, "interface_driver": "openvswitch", "interfaces": 12, "log_agent_heartbeats": false, "routers": 10}}, {"id": "538ccf2a-fb61-47ed-a10a-785f64cdbb63", "agent_type": "Open vSwitch agent", "binary": "neutron-openvswitch-agent", "topic": "N/A", "host": "lf-virtual8", "admin_state_up": true, "created_at": "2020-10-07 13:02:58", "started_at": "2020-10-07 13:03:28", "heartbeat_timestamp": "2020-11-06 18:01:57", "description": null, "resources_synced": null, "availability_zone": null, "alive": true, "configurations": {"arp_responder_enabled": false, "baremetal_smartnic": false, "bridge_mappings": {}, "datapath_type": "system", "devices": 0, "enable_distributed_routing": false, "extensions": ["qos", "log"], "in_distributed_mode": false, "integration_bridge": "br-int", "l2_population": false, "log_agent_heartbeats": false, "ovs_capabilities": {"datapath_types": ["netdev", "system"], "iface_types": ["erspan", "geneve", "gre", "internal", "ip6erspan", "ip6gre", "lisp", "patch", "stt", "system", "tap", "vxlan"]}, "ovs_hybrid_plug": false, "resource_provider_bandwidths": {}, "resource_provider_hypervisors": {}, "resource_provider_inventory_defaults": {"allocation_ratio": 1.0, "min_unit": 1, "step_size": 1, "reserved": 0}, "tunnel_types": ["vxlan"], "tunneling_ip": "172.30.13.93", "vhostuser_socket_dir": "/var/run/openvswitch"}}, {"id": "9d48116b-94de-4990-baef-e3b6765751fc", "agent_type": "Open vSwitch agent", "binary": "neutron-openvswitch-agent", "topic": "N/A", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:05", "started_at": "2020-10-07 12:07:35", "heartbeat_timestamp": "2020-11-06 18:02:02", "description": null, "resources_synced": null, "availability_zone": null, "alive": true, "configurations": {"arp_responder_enabled": false, "baremetal_smartnic": false, "bridge_mappings": {"public": "br-ex"}, "datapath_type": "system", "devices": 21, "enable_distributed_routing": false, "extensions": ["qos", "log"], "in_distributed_mode": false, "integration_bridge": "br-int", "l2_population": false, "log_agent_heartbeats": false, "ovs_capabilities": {"datapath_types": ["netdev", "system"], "iface_types": ["erspan", "geneve", "gre", "internal", "ip6erspan", "ip6gre", "lisp", "patch", "stt", "system", "tap", "vxlan"]}, "ovs_hybrid_plug": false, "resource_provider_bandwidths": {}, "resource_provider_hypervisors": {"br-ex": "lf-virtual9"}, "resource_provider_inventory_defaults": {"allocation_ratio": 1.0, "min_unit": 1, "step_size": 1, "reserved": 0}, "tunnel_types": ["gre", "vxlan"], "tunneling_ip": "172.30.13.94", "vhostuser_socket_dir": "/var/run/openvswitch"}}, {"id": "bc496462-aac8-4795-a8f9-6f5600fa0870", "agent_type": "DHCP agent", "binary": "neutron-dhcp-agent", "topic": "dhcp_agent", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:02", "started_at": "2020-10-07 12:07:02", "heartbeat_timestamp": "2020-11-06 18:02:17", "description": null, "resources_synced": null, "availability_zone": "nova", "alive": true, "configurations": {"dhcp_driver": "neutron.agent.linux.dhcp.Dnsmasq", "dhcp_lease_duration": 86400, "log_agent_heartbeats": false, "networks": 11, "ports": 35, "subnets": 12}}, {"id": "faf7e63c-a878-4cb5-b625-f96907b00d51", "agent_type": "Metadata agent", "binary": "neutron-metadata-agent", "topic": "N/A", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:06", "started_at": "2020-10-07 12:07:06", "heartbeat_timestamp": "2020-11-06 18:02:17", "description": null, "resources_synced _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:20.838 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:20.843 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_dhcp-network, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:20.930 40 INFO tempest.lib.common.rest_client [req-db5cc260-e692-4c22-b73b-fe7c34949c76 ] Request (PortsRbacTest:_run_cleanups): 200 PUT http://172.30.13.94:9696/v2.0/ports/e218c7fc-d3dc-4c2c-9234-aa97d5412eb7 1.005s 2020-11-06 18:02:20.931 40 DEBUG tempest.lib.common.rest_client [req-db5cc260-e692-4c22-b73b-fe7c34949c76 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"mac_address": "fa:16:3e:8a:69:9e"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1094', 'x-openstack-request-id': 'req-db5cc260-e692-4c22-b73b-fe7c34949c76', 'date': 'Fri, 06 Nov 2020 18:02:20 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/e218c7fc-d3dc-4c2c-9234-aa97d5412eb7'} Body: b'{"port":{"id":"e218c7fc-d3dc-4c2c-9234-aa97d5412eb7","name":"tempest-PortsRbacTest-339006369","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:8a:69:9e","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.243"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.243","hostname":"host-192-168-120-243","fqdn":"host-192-168-120-243.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:01:42Z","updated_at":"2020-11-06T18:02:20Z","revision_number":7,"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:20.933 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:20.938 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:20.938 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:20.942 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_port, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:20.942 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:20.946 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_port:port_security_enabled, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:20.946 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:21.002 40 INFO tempest.lib.common.rest_client [req-82d347fd-7bce-4361-bcfd-18b7b8d98fc2 ] Request (PortsRbacTest:test_update_port_security_enabled): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.055s 2020-11-06 18:02:21.003 40 DEBUG tempest.lib.common.rest_client [req-82d347fd-7bce-4361-bcfd-18b7b8d98fc2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-82d347fd-7bce-4361-bcfd-18b7b8d98fc2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:21.035 40 INFO tempest.lib.common.rest_client [req-8918ffce-ddb3-45b4-b06e-47cfb5bfff75 ] Request (PortsRbacTest:test_update_port_security_enabled): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:02:21.036 40 DEBUG tempest.lib.common.rest_client [req-8918ffce-ddb3-45b4-b06e-47cfb5bfff75 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8918ffce-ddb3-45b4-b06e-47cfb5bfff75', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["00CRiyrKRLmb1ZRusMQl3w"], "expires_at": "2020-11-06T19:02:21.000000Z", "issued_at": "2020-11-06T18:02:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:21.215 38 INFO tempest.lib.common.rest_client [req-dccb65e9-3a70-447e-a328-e27eff6309e8 ] Request (DHCPAgentSchedulersRbacTest:test_add_dhcp_agent_to_network): 201 POST http://172.30.13.94:9696/v2.0/networks 0.371s 2020-11-06 18:02:21.215 38 DEBUG tempest.lib.common.rest_client [req-dccb65e9-3a70-447e-a328-e27eff6309e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-DHCPAgentSchedulersRbacTest-test-network-1188947940"}} Response - Headers: {'content-type': 'application/json', 'content-length': '748', 'x-openstack-request-id': 'req-dccb65e9-3a70-447e-a328-e27eff6309e8', 'date': 'Fri, 06 Nov 2020 18:02:21 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"5944cc2a-6435-4849-a45f-3f9248083dab","name":"tempest-DHCPAgentSchedulersRbacTest-test-network-1188947940","tenant_id":"5900a11aa8c444ef859c281201ee71e5","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"5900a11aa8c444ef859c281201ee71e5","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":53,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:02:21Z","updated_at":"2020-11-06T18:02:21Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:21.423 38 INFO tempest.lib.common.rest_client [req-748f6c2a-18e5-4915-9d8e-ee0aa12c2c96 ] Request (DHCPAgentSchedulersRbacTest:test_add_dhcp_agent_to_network): 200 GET http://172.30.13.94:9696/v2.0/agents/bc496462-aac8-4795-a8f9-6f5600fa0870/dhcp-networks 0.206s 2020-11-06 18:02:21.424 38 DEBUG tempest.lib.common.rest_client [req-748f6c2a-18e5-4915-9d8e-ee0aa12c2c96 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '52217', 'x-openstack-request-id': 'req-748f6c2a-18e5-4915-9d8e-ee0aa12c2c96', 'date': 'Fri, 06 Nov 2020 18:02:21 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/agents/bc496462-aac8-4795-a8f9-6f5600fa0870/dhcp-networks'} Body: b'{"networks": [{"id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "name": "public", "tenant_id": "5990258dee3b412286ccca75bcab995c", "admin_state_up": true, "mtu": 1450, "status": "ACTIVE", "subnets": ["72d79dc6-ca18-4491-924f-283ab190f863", "886f7675-1d95-43e4-a213-604399f9af5c"], "shared": false, "availability_zone_hints": [], "availability_zones": ["nova"], "ipv4_address_scope": null, "ipv6_address_scope": null, "router:external": true, "vlan_transparent": null, "description": "gman", "port_security_enabled": true, "qos_policy_id": null, "dns_domain": "", "l2_adjacency": true, "is_default": true, "tags": [], "created_at": "2020-10-07T12:07:37Z", "updated_at": "2020-10-07T13:37:09Z", "revision_number": 3, "project_id": "5990258dee3b412286ccca75bcab995c", "provider:network_type": "flat", "provider:physical_network": "public", "provider:segmentation_id": null}, {"id": "b1421953-43aa-4bbc-86e6-60913df13a55", "name": "tempest-RouterRbacTest-test-network-648020112", "tenant_id": "d3e1d6150afd4f9683c1f0ce41376397", "admin_state_up": true, "mtu": 1400, "status": "ACTIVE", "subnets": ["18cc4ea8-bfde-48e3-846b-ba8575bbfaee"], "shared": false, "availability_zone_hints": [], "availability_zones": ["nova"], "ipv4_address_scope": null, "ipv6_address_scope": null, "router:external": true, "vlan_transparent": null, "description": "", "port_security_enabled": true, "qos_policy_id": null, "dns_domain": "", "l2_adjacency": true, "is_default": false, "tags": [], "created_at": "2020-11-06T18:01:07Z", "updated_at": "2020-11-06T18:01:07Z", "revision_number": 2, "project_id": "d3e1d6150afd4f9683c1f0ce41376397", "provider:network_type": "vxlan", "provider:physical_network": null, "provider:segmentation_id": 61}, {"id": "075e5ee8-b0b4-4574-81a3-c3210ea79d71", "name": "tempest-MultipleCreateTestJSON-683767456-network", "tenant_id": "e8d23ff83aff43a6830320c63bdbdbd8", "admin_state_up": true, "mtu": 1400, "status": "ACTIVE", "subnets": ["066b37a3-1660-4b06-bef8-73963e0a421c"], "shared": false, "availability_zone_hints": [], "availability_zones": ["nova"], "ipv4_address_scope": null, "ipv6_address_scope": null, "router:external": false, "vlan_transparent": null, "description": "", "port_security_enabled": true, "qos_policy_id": null, "dns_domain": "", "l2_adjacency": true, "tags": [], "created_at": "2020-10-23T17:10:54Z", "updated_at": "2020-10-23T17:10:54Z", "revision_number": 2, "project_id": "e8d23ff83aff43a6830320c63bdbdbd8", "provider:network_type": "vxlan", "provider:physical_network": null, "provider:segmentation_id": 32}, {"id": "13682051-c16d-4418-88ee-1a180a4cfc15", "name": "tempest-MultipleCreateTestJSON-1346316559-network", "tenant_id": "70c2f48fcaf343ceb2657220e064d31c", "admin_state_up": true, "mtu": 1400, "status": "ACTIVE", "subnets": ["d9e144c5-9735-4711-b3a1-0d367753c7f6"], "shared": false, "availability_zone_hints": [], "availability_zones": ["nova"], "ipv4_address_scope": null, "ipv6_address_scope": null, "router:external": false, "vlan_transparent": null, "description": "", "port_security_enabled": true, "qos_policy_id": null, "dns_domain": "", "l2_adjacency": true, "tags": [], "created_at": "2020-11-03T09:04:32Z", "updated_at": "2020-11-03T09:04:33Z", "revision_number": 2, "project_id": "70c2f48fcaf343ceb2657220e064d31c", "provider:network_type": "vxlan", "provider:physical_network": null, "provider:segmentation_id": 12}, {"id": "13969b3e-1458-4017-97b3-6dc65a2e1f8c", "name": "tempest-MultipleCreateTestJSON-80353040-network", "tenant_id": "143eaf18da0d441fb68df29b15aea9c4", "admin_state_up": true, "mtu": 1400, "status": "ACTIVE", "subnets": ["68cade25-ac24-411c-bbea-7ccfd23b16b3"], "shared": false, "availability_zone_hints": [], "availability_zones": ["nova"], "ipv4_address_scope": null, "ipv6_address_scope": null, "router:external": false, "vlan_transparent": null, "description": "", "port_security_enabled": true, "qos_policy_id": null, "dns_domain": "", "l2_adjacency": true, "tags": [], "created_at": "2020-11-03T08:54:27Z", "updated_at": "2020-11-03T08:54:28Z", "revision_number": 2, "project_id": "143eaf18da0d441fb68df29b15aea _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:21.427 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:21.496 38 INFO tempest.lib.common.rest_client [req-6308ec17-b849-4f39-bb48-1575439c7f94 ] Request (DHCPAgentSchedulersRbacTest:test_add_dhcp_agent_to_network): 200 GET http://172.30.13.94/identity/v3/projects/5900a11aa8c444ef859c281201ee71e5/users/cf72677f26d34f81bab6c3d4077e6c7f/roles 0.068s 2020-11-06 18:02:21.497 38 DEBUG tempest.lib.common.rest_client [req-6308ec17-b849-4f39-bb48-1575439c7f94 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6308ec17-b849-4f39-bb48-1575439c7f94', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5900a11aa8c444ef859c281201ee71e5/users/cf72677f26d34f81bab6c3d4077e6c7f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5900a11aa8c444ef859c281201ee71e5/users/cf72677f26d34f81bab6c3d4077e6c7f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:21.543 38 INFO tempest.lib.common.rest_client [req-1ec311f1-3f06-4200-811d-e7a4c0f547c6 ] Request (DHCPAgentSchedulersRbacTest:test_add_dhcp_agent_to_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-11-06 18:02:21.544 38 DEBUG tempest.lib.common.rest_client [req-1ec311f1-3f06-4200-811d-e7a4c0f547c6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6646', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1ec311f1-3f06-4200-811d-e7a4c0f547c6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "cf72677f26d34f81bab6c3d4077e6c7f", "name": "tempest-DHCPAgentSchedulersRbacTest-1617395121", "password_expires_at": null}, "audit_ids": ["h4ejXVv5RZiZEzo7oreGmw"], "expires_at": "2020-11-06T19:02:21.000000Z", "issued_at": "2020-11-06T18:02:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5900a11aa8c444ef859c281201ee71e5", "name": "tempest-DHCPAgentSchedulersRbacTest-1617395121"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5baf _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:21.560 40 INFO tempest.lib.common.rest_client [req-a80bb451-e110-4902-8481-72b084ce2c25 ] Request (PortsRbacTest:test_update_port_security_enabled): 200 PUT http://172.30.13.94:9696/v2.0/ports/e218c7fc-d3dc-4c2c-9234-aa97d5412eb7 0.522s 2020-11-06 18:02:21.560 40 DEBUG tempest.lib.common.rest_client [req-a80bb451-e110-4902-8481-72b084ce2c25 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"port_security_enabled": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '1094', 'x-openstack-request-id': 'req-a80bb451-e110-4902-8481-72b084ce2c25', 'date': 'Fri, 06 Nov 2020 18:02:21 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/e218c7fc-d3dc-4c2c-9234-aa97d5412eb7'} Body: b'{"port":{"id":"e218c7fc-d3dc-4c2c-9234-aa97d5412eb7","name":"tempest-PortsRbacTest-339006369","network_id":"586884b2-4363-4597-acb0-ddbc49908b65","tenant_id":"b3f19206f12a4063bdbe2a1fda1d8a6f","mac_address":"fa:16:3e:8a:69:9e","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"6dab2f10-428e-4a16-a2a0-bc153f1d8c9c","ip_address":"192.168.120.243"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["4f8e7d2c-d180-457a-93b4-fa9e035f9503"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.243","hostname":"host-192-168-120-243","fqdn":"host-192-168-120-243.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:01:42Z","updated_at":"2020-11-06T18:02:21Z","revision_number":8,"project_id":"b3f19206f12a4063bdbe2a1fda1d8a6f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:21.561 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:21.609 40 INFO tempest.lib.common.rest_client [req-3491ac1e-16d8-4513-b56a-869240c1c353 ] Request (PortsRbacTest:test_update_port_security_enabled): 200 GET http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles 0.047s 2020-11-06 18:02:21.610 40 DEBUG tempest.lib.common.rest_client [req-3491ac1e-16d8-4513-b56a-869240c1c353 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3491ac1e-16d8-4513-b56a-869240c1c353', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f/users/eca9e2d75b3d43ebb62aa386f11363f5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:21.653 40 INFO tempest.lib.common.rest_client [req-29d3cd9c-79d9-4af7-9628-3e49b3aa9aab ] Request (PortsRbacTest:test_update_port_security_enabled): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-11-06 18:02:21.654 40 DEBUG tempest.lib.common.rest_client [req-29d3cd9c-79d9-4af7-9628-3e49b3aa9aab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6616', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-29d3cd9c-79d9-4af7-9628-3e49b3aa9aab', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eca9e2d75b3d43ebb62aa386f11363f5", "name": "tempest-PortsRbacTest-702790460", "password_expires_at": null}, "audit_ids": ["1NnDFeZhSjGI2MBMYste0g"], "expires_at": "2020-11-06T19:02:21.000000Z", "issued_at": "2020-11-06T18:02:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "name": "tempest-PortsRbacTest-702790460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b3f19206f12a4063bdbe2a1fda1d8a6f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:21.744 39 INFO tempest.lib.common.rest_client [req-2852ec9b-2737-4621-80c3-f8f72955243c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.193s 2020-11-06 18:02:21.745 39 DEBUG tempest.lib.common.rest_client [req-2852ec9b-2737-4621-80c3-f8f72955243c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2852ec9b-2737-4621-80c3-f8f72955243c', 'x-compute-request-id': 'req-2852ec9b-2737-4621-80c3-f8f72955243c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:21.781 38 INFO tempest.lib.common.rest_client [req-4126a91a-b041-4cc2-a82c-35e39d418793 ] Request (DHCPAgentSchedulersRbacTest:test_add_dhcp_agent_to_network): 201 POST http://172.30.13.94:9696/v2.0/agents/bc496462-aac8-4795-a8f9-6f5600fa0870/dhcp-networks 0.235s 2020-11-06 18:02:21.781 38 DEBUG tempest.lib.common.rest_client [req-4126a91a-b041-4cc2-a82c-35e39d418793 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network_id": "5944cc2a-6435-4849-a45f-3f9248083dab"} Response - Headers: {'content-type': 'application/json', 'content-length': '4', 'x-openstack-request-id': 'req-4126a91a-b041-4cc2-a82c-35e39d418793', 'date': 'Fri, 06 Nov 2020 18:02:21 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/agents/bc496462-aac8-4795-a8f9-6f5600fa0870/dhcp-networks'} Body: b'null' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:21.782 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:21.863 38 INFO tempest.lib.common.rest_client [req-c771af3a-f0f1-4cd2-bb13-ba4465ea9078 ] Request (DHCPAgentSchedulersRbacTest:test_add_dhcp_agent_to_network): 200 GET http://172.30.13.94/identity/v3/projects/5900a11aa8c444ef859c281201ee71e5/users/cf72677f26d34f81bab6c3d4077e6c7f/roles 0.080s 2020-11-06 18:02:21.864 38 DEBUG tempest.lib.common.rest_client [req-c771af3a-f0f1-4cd2-bb13-ba4465ea9078 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c771af3a-f0f1-4cd2-bb13-ba4465ea9078', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5900a11aa8c444ef859c281201ee71e5/users/cf72677f26d34f81bab6c3d4077e6c7f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5900a11aa8c444ef859c281201ee71e5/users/cf72677f26d34f81bab6c3d4077e6c7f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:21.897 38 INFO tempest.lib.common.rest_client [req-1a764ed6-42be-4bc5-9675-b43d2548e862 ] Request (DHCPAgentSchedulersRbacTest:test_add_dhcp_agent_to_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:02:21.898 38 DEBUG tempest.lib.common.rest_client [req-1a764ed6-42be-4bc5-9675-b43d2548e862 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6646', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1a764ed6-42be-4bc5-9675-b43d2548e862', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "cf72677f26d34f81bab6c3d4077e6c7f", "name": "tempest-DHCPAgentSchedulersRbacTest-1617395121", "password_expires_at": null}, "audit_ids": ["oon320IYQI2zPZ3icI5gKw"], "expires_at": "2020-11-06T19:02:21.000000Z", "issued_at": "2020-11-06T18:02:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5900a11aa8c444ef859c281201ee71e5", "name": "tempest-DHCPAgentSchedulersRbacTest-1617395121"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5baf _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:21.989 38 INFO tempest.lib.common.rest_client [req-b7f0b2e2-134f-4259-ab24-7efb78c3d85d ] Request (DHCPAgentSchedulersRbacTest:setUp): 200 GET http://172.30.13.94:9696/v2.0/agents 0.088s 2020-11-06 18:02:21.990 38 DEBUG tempest.lib.common.rest_client [req-b7f0b2e2-134f-4259-ab24-7efb78c3d85d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '4330', 'x-openstack-request-id': 'req-b7f0b2e2-134f-4259-ab24-7efb78c3d85d', 'date': 'Fri, 06 Nov 2020 18:02:21 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/agents'} Body: b'{"agents": [{"id": "0efbff63-9926-4774-9bea-b5e130b9492e", "agent_type": "L3 agent", "binary": "neutron-l3-agent", "topic": "l3_agent", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:04", "started_at": "2020-10-07 12:07:05", "heartbeat_timestamp": "2020-11-06 18:02:02", "description": null, "resources_synced": null, "availability_zone": "nova", "alive": true, "configurations": {"agent_mode": "legacy", "ex_gw_ports": 10, "extensions": ["fip_qos", "gateway_ip_qos", "port_forwarding"], "floating_ips": 0, "handle_internal_only_routers": true, "interface_driver": "openvswitch", "interfaces": 12, "log_agent_heartbeats": false, "routers": 10}}, {"id": "538ccf2a-fb61-47ed-a10a-785f64cdbb63", "agent_type": "Open vSwitch agent", "binary": "neutron-openvswitch-agent", "topic": "N/A", "host": "lf-virtual8", "admin_state_up": true, "created_at": "2020-10-07 13:02:58", "started_at": "2020-10-07 13:03:28", "heartbeat_timestamp": "2020-11-06 18:01:57", "description": null, "resources_synced": null, "availability_zone": null, "alive": true, "configurations": {"arp_responder_enabled": false, "baremetal_smartnic": false, "bridge_mappings": {}, "datapath_type": "system", "devices": 0, "enable_distributed_routing": false, "extensions": ["qos", "log"], "in_distributed_mode": false, "integration_bridge": "br-int", "l2_population": false, "log_agent_heartbeats": false, "ovs_capabilities": {"datapath_types": ["netdev", "system"], "iface_types": ["erspan", "geneve", "gre", "internal", "ip6erspan", "ip6gre", "lisp", "patch", "stt", "system", "tap", "vxlan"]}, "ovs_hybrid_plug": false, "resource_provider_bandwidths": {}, "resource_provider_hypervisors": {}, "resource_provider_inventory_defaults": {"allocation_ratio": 1.0, "min_unit": 1, "step_size": 1, "reserved": 0}, "tunnel_types": ["vxlan"], "tunneling_ip": "172.30.13.93", "vhostuser_socket_dir": "/var/run/openvswitch"}}, {"id": "9d48116b-94de-4990-baef-e3b6765751fc", "agent_type": "Open vSwitch agent", "binary": "neutron-openvswitch-agent", "topic": "N/A", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:05", "started_at": "2020-10-07 12:07:35", "heartbeat_timestamp": "2020-11-06 18:02:02", "description": null, "resources_synced": null, "availability_zone": null, "alive": true, "configurations": {"arp_responder_enabled": false, "baremetal_smartnic": false, "bridge_mappings": {"public": "br-ex"}, "datapath_type": "system", "devices": 21, "enable_distributed_routing": false, "extensions": ["qos", "log"], "in_distributed_mode": false, "integration_bridge": "br-int", "l2_population": false, "log_agent_heartbeats": false, "ovs_capabilities": {"datapath_types": ["netdev", "system"], "iface_types": ["erspan", "geneve", "gre", "internal", "ip6erspan", "ip6gre", "lisp", "patch", "stt", "system", "tap", "vxlan"]}, "ovs_hybrid_plug": false, "resource_provider_bandwidths": {}, "resource_provider_hypervisors": {"br-ex": "lf-virtual9"}, "resource_provider_inventory_defaults": {"allocation_ratio": 1.0, "min_unit": 1, "step_size": 1, "reserved": 0}, "tunnel_types": ["gre", "vxlan"], "tunneling_ip": "172.30.13.94", "vhostuser_socket_dir": "/var/run/openvswitch"}}, {"id": "bc496462-aac8-4795-a8f9-6f5600fa0870", "agent_type": "DHCP agent", "binary": "neutron-dhcp-agent", "topic": "dhcp_agent", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:02", "started_at": "2020-10-07 12:07:02", "heartbeat_timestamp": "2020-11-06 18:02:17", "description": null, "resources_synced": null, "availability_zone": "nova", "alive": true, "configurations": {"dhcp_driver": "neutron.agent.linux.dhcp.Dnsmasq", "dhcp_lease_duration": 86400, "log_agent_heartbeats": false, "networks": 11, "ports": 35, "subnets": 12}}, {"id": "faf7e63c-a878-4cb5-b625-f96907b00d51", "agent_type": "Metadata agent", "binary": "neutron-metadata-agent", "topic": "N/A", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:06", "started_at": "2020-10-07 12:07:06", "heartbeat_timestamp": "2020-11-06 18:02:17", "description": null, "resources_synced _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:21.991 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:21.995 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_dhcp-network, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:22.009 37 INFO tempest.lib.common.rest_client [req-6220778b-8c01-4f03-9c57-124832cacbfe ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/routers 1.437s 2020-11-06 18:02:22.010 37 DEBUG tempest.lib.common.rest_client [req-6220778b-8c01-4f03-9c57-124832cacbfe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-ServerVolumeAttachmentRbacTest-1258567035-router", "tenant_id": "198374b90e3641c39c58226d89b9ccc8", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea"}}} Response - Headers: {'content-type': 'application/json', 'content-length': '820', 'x-openstack-request-id': 'req-6220778b-8c01-4f03-9c57-124832cacbfe', 'date': 'Fri, 06 Nov 2020 18:02:22 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "95d785d5-5725-416d-a580-63ed0c22ed73", "name": "tempest-ServerVolumeAttachmentRbacTest-1258567035-router", "tenant_id": "198374b90e3641c39c58226d89b9ccc8", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.141"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::3be"}], "enable_snat": true}, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T18:02:20Z", "updated_at": "2020-11-06T18:02:21Z", "revision_number": 3, "project_id": "198374b90e3641c39c58226d89b9ccc8"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:22.221 38 INFO tempest.lib.common.rest_client [req-e4d527fb-ab6e-428a-b772-dd62d740117c ] Request (DHCPAgentSchedulersRbacTest:test_delete_network_from_dhcp_agent): 201 POST http://172.30.13.94:9696/v2.0/networks 0.224s 2020-11-06 18:02:22.222 38 DEBUG tempest.lib.common.rest_client [req-e4d527fb-ab6e-428a-b772-dd62d740117c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-DHCPAgentSchedulersRbacTest-test-network-1529399366"}} Response - Headers: {'content-type': 'application/json', 'content-length': '748', 'x-openstack-request-id': 'req-e4d527fb-ab6e-428a-b772-dd62d740117c', 'date': 'Fri, 06 Nov 2020 18:02:22 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"1d7adc99-d1c0-4631-b659-492de6523992","name":"tempest-DHCPAgentSchedulersRbacTest-test-network-1529399366","tenant_id":"5900a11aa8c444ef859c281201ee71e5","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"5900a11aa8c444ef859c281201ee71e5","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":60,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:02:22Z","updated_at":"2020-11-06T18:02:22Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:22.337 40 INFO tempest.lib.common.rest_client [req-b015e375-5eff-492e-b126-74c1d2965b86 ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/03868049-d262-4579-809e-104f455417a2 0.680s 2020-11-06 18:02:22.337 40 DEBUG tempest.lib.common.rest_client [req-b015e375-5eff-492e-b126-74c1d2965b86 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-b015e375-5eff-492e-b126-74c1d2965b86', 'date': 'Fri, 06 Nov 2020 18:02:22 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/03868049-d262-4579-809e-104f455417a2'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:22.424 38 INFO tempest.lib.common.rest_client [req-aa99ed05-00aa-4108-a212-fca04b87292b ] Request (DHCPAgentSchedulersRbacTest:test_delete_network_from_dhcp_agent): 200 GET http://172.30.13.94:9696/v2.0/agents/bc496462-aac8-4795-a8f9-6f5600fa0870/dhcp-networks 0.201s 2020-11-06 18:02:22.426 38 DEBUG tempest.lib.common.rest_client [req-aa99ed05-00aa-4108-a212-fca04b87292b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '52981', 'x-openstack-request-id': 'req-aa99ed05-00aa-4108-a212-fca04b87292b', 'date': 'Fri, 06 Nov 2020 18:02:22 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/agents/bc496462-aac8-4795-a8f9-6f5600fa0870/dhcp-networks'} Body: b'{"networks": [{"id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "name": "public", "tenant_id": "5990258dee3b412286ccca75bcab995c", "admin_state_up": true, "mtu": 1450, "status": "ACTIVE", "subnets": ["72d79dc6-ca18-4491-924f-283ab190f863", "886f7675-1d95-43e4-a213-604399f9af5c"], "shared": false, "availability_zone_hints": [], "availability_zones": ["nova"], "ipv4_address_scope": null, "ipv6_address_scope": null, "router:external": true, "vlan_transparent": null, "description": "gman", "port_security_enabled": true, "qos_policy_id": null, "dns_domain": "", "l2_adjacency": true, "is_default": true, "tags": [], "created_at": "2020-10-07T12:07:37Z", "updated_at": "2020-10-07T13:37:09Z", "revision_number": 3, "project_id": "5990258dee3b412286ccca75bcab995c", "provider:network_type": "flat", "provider:physical_network": "public", "provider:segmentation_id": null}, {"id": "b1421953-43aa-4bbc-86e6-60913df13a55", "name": "tempest-RouterRbacTest-test-network-648020112", "tenant_id": "d3e1d6150afd4f9683c1f0ce41376397", "admin_state_up": true, "mtu": 1400, "status": "ACTIVE", "subnets": ["18cc4ea8-bfde-48e3-846b-ba8575bbfaee"], "shared": false, "availability_zone_hints": [], "availability_zones": ["nova"], "ipv4_address_scope": null, "ipv6_address_scope": null, "router:external": true, "vlan_transparent": null, "description": "", "port_security_enabled": true, "qos_policy_id": null, "dns_domain": "", "l2_adjacency": true, "is_default": false, "tags": [], "created_at": "2020-11-06T18:01:07Z", "updated_at": "2020-11-06T18:01:07Z", "revision_number": 2, "project_id": "d3e1d6150afd4f9683c1f0ce41376397", "provider:network_type": "vxlan", "provider:physical_network": null, "provider:segmentation_id": 61}, {"id": "075e5ee8-b0b4-4574-81a3-c3210ea79d71", "name": "tempest-MultipleCreateTestJSON-683767456-network", "tenant_id": "e8d23ff83aff43a6830320c63bdbdbd8", "admin_state_up": true, "mtu": 1400, "status": "ACTIVE", "subnets": ["066b37a3-1660-4b06-bef8-73963e0a421c"], "shared": false, "availability_zone_hints": [], "availability_zones": ["nova"], "ipv4_address_scope": null, "ipv6_address_scope": null, "router:external": false, "vlan_transparent": null, "description": "", "port_security_enabled": true, "qos_policy_id": null, "dns_domain": "", "l2_adjacency": true, "tags": [], "created_at": "2020-10-23T17:10:54Z", "updated_at": "2020-10-23T17:10:54Z", "revision_number": 2, "project_id": "e8d23ff83aff43a6830320c63bdbdbd8", "provider:network_type": "vxlan", "provider:physical_network": null, "provider:segmentation_id": 32}, {"id": "13682051-c16d-4418-88ee-1a180a4cfc15", "name": "tempest-MultipleCreateTestJSON-1346316559-network", "tenant_id": "70c2f48fcaf343ceb2657220e064d31c", "admin_state_up": true, "mtu": 1400, "status": "ACTIVE", "subnets": ["d9e144c5-9735-4711-b3a1-0d367753c7f6"], "shared": false, "availability_zone_hints": [], "availability_zones": ["nova"], "ipv4_address_scope": null, "ipv6_address_scope": null, "router:external": false, "vlan_transparent": null, "description": "", "port_security_enabled": true, "qos_policy_id": null, "dns_domain": "", "l2_adjacency": true, "tags": [], "created_at": "2020-11-03T09:04:32Z", "updated_at": "2020-11-03T09:04:33Z", "revision_number": 2, "project_id": "70c2f48fcaf343ceb2657220e064d31c", "provider:network_type": "vxlan", "provider:physical_network": null, "provider:segmentation_id": 12}, {"id": "13969b3e-1458-4017-97b3-6dc65a2e1f8c", "name": "tempest-MultipleCreateTestJSON-80353040-network", "tenant_id": "143eaf18da0d441fb68df29b15aea9c4", "admin_state_up": true, "mtu": 1400, "status": "ACTIVE", "subnets": ["68cade25-ac24-411c-bbea-7ccfd23b16b3"], "shared": false, "availability_zone_hints": [], "availability_zones": ["nova"], "ipv4_address_scope": null, "ipv6_address_scope": null, "router:external": false, "vlan_transparent": null, "description": "", "port_security_enabled": true, "qos_policy_id": null, "dns_domain": "", "l2_adjacency": true, "tags": [], "created_at": "2020-11-03T08:54:27Z", "updated_at": "2020-11-03T08:54:28Z", "revision_number": 2, "project_id": "143eaf18da0d441fb68df29b15aea _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:22.520 38 INFO tempest.lib.common.rest_client [req-1d49a7ed-bbd7-4e01-8aab-9240c9978b47 ] Request (DHCPAgentSchedulersRbacTest:test_delete_network_from_dhcp_agent): 201 POST http://172.30.13.94:9696/v2.0/agents/bc496462-aac8-4795-a8f9-6f5600fa0870/dhcp-networks 0.092s 2020-11-06 18:02:22.521 38 DEBUG tempest.lib.common.rest_client [req-1d49a7ed-bbd7-4e01-8aab-9240c9978b47 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network_id": "1d7adc99-d1c0-4631-b659-492de6523992"} Response - Headers: {'content-type': 'application/json', 'content-length': '4', 'x-openstack-request-id': 'req-1d49a7ed-bbd7-4e01-8aab-9240c9978b47', 'date': 'Fri, 06 Nov 2020 18:02:22 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/agents/bc496462-aac8-4795-a8f9-6f5600fa0870/dhcp-networks'} Body: b'null' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:22.522 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:22.578 38 INFO tempest.lib.common.rest_client [req-3bfc5522-6125-4e81-8991-178e48d4ea8a ] Request (DHCPAgentSchedulersRbacTest:test_delete_network_from_dhcp_agent): 200 GET http://172.30.13.94/identity/v3/projects/5900a11aa8c444ef859c281201ee71e5/users/cf72677f26d34f81bab6c3d4077e6c7f/roles 0.055s 2020-11-06 18:02:22.578 38 DEBUG tempest.lib.common.rest_client [req-3bfc5522-6125-4e81-8991-178e48d4ea8a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3bfc5522-6125-4e81-8991-178e48d4ea8a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5900a11aa8c444ef859c281201ee71e5/users/cf72677f26d34f81bab6c3d4077e6c7f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5900a11aa8c444ef859c281201ee71e5/users/cf72677f26d34f81bab6c3d4077e6c7f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:22.614 38 INFO tempest.lib.common.rest_client [req-8ed00ed6-7c93-4af6-8dda-0836af59290d ] Request (DHCPAgentSchedulersRbacTest:test_delete_network_from_dhcp_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:02:22.615 38 DEBUG tempest.lib.common.rest_client [req-8ed00ed6-7c93-4af6-8dda-0836af59290d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6646', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8ed00ed6-7c93-4af6-8dda-0836af59290d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "cf72677f26d34f81bab6c3d4077e6c7f", "name": "tempest-DHCPAgentSchedulersRbacTest-1617395121", "password_expires_at": null}, "audit_ids": ["LMcqe0qMS9aq-jKfRF6vzg"], "expires_at": "2020-11-06T19:02:22.000000Z", "issued_at": "2020-11-06T18:02:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5900a11aa8c444ef859c281201ee71e5", "name": "tempest-DHCPAgentSchedulersRbacTest-1617395121"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5baf _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:22.732 38 INFO tempest.lib.common.rest_client [req-ba98c68c-350c-4ded-b327-1200ba6cf5ce ] Request (DHCPAgentSchedulersRbacTest:test_delete_network_from_dhcp_agent): 204 DELETE http://172.30.13.94:9696/v2.0/agents/bc496462-aac8-4795-a8f9-6f5600fa0870/dhcp-networks/1d7adc99-d1c0-4631-b659-492de6523992 0.116s 2020-11-06 18:02:22.733 38 DEBUG tempest.lib.common.rest_client [req-ba98c68c-350c-4ded-b327-1200ba6cf5ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-ba98c68c-350c-4ded-b327-1200ba6cf5ce', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:02:22 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/agents/bc496462-aac8-4795-a8f9-6f5600fa0870/dhcp-networks/1d7adc99-d1c0-4631-b659-492de6523992'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:22.733 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:22.785 38 INFO tempest.lib.common.rest_client [req-dd467a86-12b0-4c2c-b8ee-d67ce51d5835 ] Request (DHCPAgentSchedulersRbacTest:test_delete_network_from_dhcp_agent): 200 GET http://172.30.13.94/identity/v3/projects/5900a11aa8c444ef859c281201ee71e5/users/cf72677f26d34f81bab6c3d4077e6c7f/roles 0.051s 2020-11-06 18:02:22.786 38 DEBUG tempest.lib.common.rest_client [req-dd467a86-12b0-4c2c-b8ee-d67ce51d5835 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dd467a86-12b0-4c2c-b8ee-d67ce51d5835', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5900a11aa8c444ef859c281201ee71e5/users/cf72677f26d34f81bab6c3d4077e6c7f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5900a11aa8c444ef859c281201ee71e5/users/cf72677f26d34f81bab6c3d4077e6c7f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:22.820 38 INFO tempest.lib.common.rest_client [req-67e0f5e1-f0de-4a96-99f9-fa34d29286c1 ] Request (DHCPAgentSchedulersRbacTest:test_delete_network_from_dhcp_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:02:22.820 38 DEBUG tempest.lib.common.rest_client [req-67e0f5e1-f0de-4a96-99f9-fa34d29286c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6646', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-67e0f5e1-f0de-4a96-99f9-fa34d29286c1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "cf72677f26d34f81bab6c3d4077e6c7f", "name": "tempest-DHCPAgentSchedulersRbacTest-1617395121", "password_expires_at": null}, "audit_ids": ["l8VnQ7nJS8-A7tAURwHl6w"], "expires_at": "2020-11-06T19:02:22.000000Z", "issued_at": "2020-11-06T18:02:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5900a11aa8c444ef859c281201ee71e5", "name": "tempest-DHCPAgentSchedulersRbacTest-1617395121"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5baf _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:22.900 38 INFO tempest.lib.common.rest_client [req-c2f55139-125c-4de1-8063-ca135e7bc003 ] Request (DHCPAgentSchedulersRbacTest:setUp): 200 GET http://172.30.13.94:9696/v2.0/agents 0.077s 2020-11-06 18:02:22.901 38 DEBUG tempest.lib.common.rest_client [req-c2f55139-125c-4de1-8063-ca135e7bc003 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '4330', 'x-openstack-request-id': 'req-c2f55139-125c-4de1-8063-ca135e7bc003', 'date': 'Fri, 06 Nov 2020 18:02:22 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/agents'} Body: b'{"agents": [{"id": "0efbff63-9926-4774-9bea-b5e130b9492e", "agent_type": "L3 agent", "binary": "neutron-l3-agent", "topic": "l3_agent", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:04", "started_at": "2020-10-07 12:07:05", "heartbeat_timestamp": "2020-11-06 18:02:02", "description": null, "resources_synced": null, "availability_zone": "nova", "alive": true, "configurations": {"agent_mode": "legacy", "ex_gw_ports": 10, "extensions": ["fip_qos", "gateway_ip_qos", "port_forwarding"], "floating_ips": 0, "handle_internal_only_routers": true, "interface_driver": "openvswitch", "interfaces": 12, "log_agent_heartbeats": false, "routers": 10}}, {"id": "538ccf2a-fb61-47ed-a10a-785f64cdbb63", "agent_type": "Open vSwitch agent", "binary": "neutron-openvswitch-agent", "topic": "N/A", "host": "lf-virtual8", "admin_state_up": true, "created_at": "2020-10-07 13:02:58", "started_at": "2020-10-07 13:03:28", "heartbeat_timestamp": "2020-11-06 18:01:57", "description": null, "resources_synced": null, "availability_zone": null, "alive": true, "configurations": {"arp_responder_enabled": false, "baremetal_smartnic": false, "bridge_mappings": {}, "datapath_type": "system", "devices": 0, "enable_distributed_routing": false, "extensions": ["qos", "log"], "in_distributed_mode": false, "integration_bridge": "br-int", "l2_population": false, "log_agent_heartbeats": false, "ovs_capabilities": {"datapath_types": ["netdev", "system"], "iface_types": ["erspan", "geneve", "gre", "internal", "ip6erspan", "ip6gre", "lisp", "patch", "stt", "system", "tap", "vxlan"]}, "ovs_hybrid_plug": false, "resource_provider_bandwidths": {}, "resource_provider_hypervisors": {}, "resource_provider_inventory_defaults": {"allocation_ratio": 1.0, "min_unit": 1, "step_size": 1, "reserved": 0}, "tunnel_types": ["vxlan"], "tunneling_ip": "172.30.13.93", "vhostuser_socket_dir": "/var/run/openvswitch"}}, {"id": "9d48116b-94de-4990-baef-e3b6765751fc", "agent_type": "Open vSwitch agent", "binary": "neutron-openvswitch-agent", "topic": "N/A", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:05", "started_at": "2020-10-07 12:07:35", "heartbeat_timestamp": "2020-11-06 18:02:02", "description": null, "resources_synced": null, "availability_zone": null, "alive": true, "configurations": {"arp_responder_enabled": false, "baremetal_smartnic": false, "bridge_mappings": {"public": "br-ex"}, "datapath_type": "system", "devices": 21, "enable_distributed_routing": false, "extensions": ["qos", "log"], "in_distributed_mode": false, "integration_bridge": "br-int", "l2_population": false, "log_agent_heartbeats": false, "ovs_capabilities": {"datapath_types": ["netdev", "system"], "iface_types": ["erspan", "geneve", "gre", "internal", "ip6erspan", "ip6gre", "lisp", "patch", "stt", "system", "tap", "vxlan"]}, "ovs_hybrid_plug": false, "resource_provider_bandwidths": {}, "resource_provider_hypervisors": {"br-ex": "lf-virtual9"}, "resource_provider_inventory_defaults": {"allocation_ratio": 1.0, "min_unit": 1, "step_size": 1, "reserved": 0}, "tunnel_types": ["gre", "vxlan"], "tunneling_ip": "172.30.13.94", "vhostuser_socket_dir": "/var/run/openvswitch"}}, {"id": "bc496462-aac8-4795-a8f9-6f5600fa0870", "agent_type": "DHCP agent", "binary": "neutron-dhcp-agent", "topic": "dhcp_agent", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:02", "started_at": "2020-10-07 12:07:02", "heartbeat_timestamp": "2020-11-06 18:02:17", "description": null, "resources_synced": null, "availability_zone": "nova", "alive": true, "configurations": {"dhcp_driver": "neutron.agent.linux.dhcp.Dnsmasq", "dhcp_lease_duration": 86400, "log_agent_heartbeats": false, "networks": 11, "ports": 35, "subnets": 12}}, {"id": "faf7e63c-a878-4cb5-b625-f96907b00d51", "agent_type": "Metadata agent", "binary": "neutron-metadata-agent", "topic": "N/A", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:06", "started_at": "2020-10-07 12:07:06", "heartbeat_timestamp": "2020-11-06 18:02:17", "description": null, "resources_synced _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:22.902 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:22.906 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_dhcp-networks, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:22.906 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:22.963 38 INFO tempest.lib.common.rest_client [req-ad8cc7cc-028a-4d13-96ec-8f17d6222e93 ] Request (DHCPAgentSchedulersRbacTest:test_list_networks_hosted_by_one_dhcp_agent): 200 GET http://172.30.13.94/identity/v3/projects/5900a11aa8c444ef859c281201ee71e5/users/cf72677f26d34f81bab6c3d4077e6c7f/roles 0.055s 2020-11-06 18:02:22.963 38 DEBUG tempest.lib.common.rest_client [req-ad8cc7cc-028a-4d13-96ec-8f17d6222e93 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ad8cc7cc-028a-4d13-96ec-8f17d6222e93', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5900a11aa8c444ef859c281201ee71e5/users/cf72677f26d34f81bab6c3d4077e6c7f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5900a11aa8c444ef859c281201ee71e5/users/cf72677f26d34f81bab6c3d4077e6c7f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:22.994 40 INFO tempest.lib.common.rest_client [req-54f479a9-b287-4abe-b9f2-5d076df23cea ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/777d2d81-6bad-4993-af93-bd2144685853 0.655s 2020-11-06 18:02:22.995 40 DEBUG tempest.lib.common.rest_client [req-54f479a9-b287-4abe-b9f2-5d076df23cea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-54f479a9-b287-4abe-b9f2-5d076df23cea', 'date': 'Fri, 06 Nov 2020 18:02:22 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/777d2d81-6bad-4993-af93-bd2144685853'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:23.002 38 INFO tempest.lib.common.rest_client [req-88e4034f-fd6f-48f1-a983-755235d18013 ] Request (DHCPAgentSchedulersRbacTest:test_list_networks_hosted_by_one_dhcp_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:02:23.002 38 DEBUG tempest.lib.common.rest_client [req-88e4034f-fd6f-48f1-a983-755235d18013 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6646', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-88e4034f-fd6f-48f1-a983-755235d18013', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "cf72677f26d34f81bab6c3d4077e6c7f", "name": "tempest-DHCPAgentSchedulersRbacTest-1617395121", "password_expires_at": null}, "audit_ids": ["Z-1-xi6IRbCJ9SG_NWVCTA"], "expires_at": "2020-11-06T19:02:22.000000Z", "issued_at": "2020-11-06T18:02:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5900a11aa8c444ef859c281201ee71e5", "name": "tempest-DHCPAgentSchedulersRbacTest-1617395121"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5baf _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:23.492 38 INFO tempest.lib.common.rest_client [req-e9e9bf3b-ce64-43a8-9a2a-cbc586ded34c ] Request (DHCPAgentSchedulersRbacTest:test_list_networks_hosted_by_one_dhcp_agent): 200 GET http://172.30.13.94:9696/v2.0/agents/bc496462-aac8-4795-a8f9-6f5600fa0870/dhcp-networks 0.489s 2020-11-06 18:02:23.493 38 DEBUG tempest.lib.common.rest_client [req-e9e9bf3b-ce64-43a8-9a2a-cbc586ded34c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '52192', 'x-openstack-request-id': 'req-e9e9bf3b-ce64-43a8-9a2a-cbc586ded34c', 'date': 'Fri, 06 Nov 2020 18:02:23 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/agents/bc496462-aac8-4795-a8f9-6f5600fa0870/dhcp-networks'} Body: b'{"networks": [{"id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "name": "public", "tenant_id": "5990258dee3b412286ccca75bcab995c", "admin_state_up": true, "mtu": 1450, "status": "ACTIVE", "subnets": ["72d79dc6-ca18-4491-924f-283ab190f863", "886f7675-1d95-43e4-a213-604399f9af5c"], "shared": false, "availability_zone_hints": [], "availability_zones": ["nova"], "ipv4_address_scope": null, "ipv6_address_scope": null, "router:external": true, "vlan_transparent": null, "description": "gman", "port_security_enabled": true, "qos_policy_id": null, "dns_domain": "", "l2_adjacency": true, "is_default": true, "tags": [], "created_at": "2020-10-07T12:07:37Z", "updated_at": "2020-10-07T13:37:09Z", "revision_number": 3, "project_id": "5990258dee3b412286ccca75bcab995c", "provider:network_type": "flat", "provider:physical_network": "public", "provider:segmentation_id": null}, {"id": "b1421953-43aa-4bbc-86e6-60913df13a55", "name": "tempest-RouterRbacTest-test-network-648020112", "tenant_id": "d3e1d6150afd4f9683c1f0ce41376397", "admin_state_up": true, "mtu": 1400, "status": "ACTIVE", "subnets": ["18cc4ea8-bfde-48e3-846b-ba8575bbfaee"], "shared": false, "availability_zone_hints": [], "availability_zones": ["nova"], "ipv4_address_scope": null, "ipv6_address_scope": null, "router:external": true, "vlan_transparent": null, "description": "", "port_security_enabled": true, "qos_policy_id": null, "dns_domain": "", "l2_adjacency": true, "is_default": false, "tags": [], "created_at": "2020-11-06T18:01:07Z", "updated_at": "2020-11-06T18:01:07Z", "revision_number": 2, "project_id": "d3e1d6150afd4f9683c1f0ce41376397", "provider:network_type": "vxlan", "provider:physical_network": null, "provider:segmentation_id": 61}, {"id": "075e5ee8-b0b4-4574-81a3-c3210ea79d71", "name": "tempest-MultipleCreateTestJSON-683767456-network", "tenant_id": "e8d23ff83aff43a6830320c63bdbdbd8", "admin_state_up": true, "mtu": 1400, "status": "ACTIVE", "subnets": ["066b37a3-1660-4b06-bef8-73963e0a421c"], "shared": false, "availability_zone_hints": [], "availability_zones": ["nova"], "ipv4_address_scope": null, "ipv6_address_scope": null, "router:external": false, "vlan_transparent": null, "description": "", "port_security_enabled": true, "qos_policy_id": null, "dns_domain": "", "l2_adjacency": true, "tags": [], "created_at": "2020-10-23T17:10:54Z", "updated_at": "2020-10-23T17:10:54Z", "revision_number": 2, "project_id": "e8d23ff83aff43a6830320c63bdbdbd8", "provider:network_type": "vxlan", "provider:physical_network": null, "provider:segmentation_id": 32}, {"id": "13682051-c16d-4418-88ee-1a180a4cfc15", "name": "tempest-MultipleCreateTestJSON-1346316559-network", "tenant_id": "70c2f48fcaf343ceb2657220e064d31c", "admin_state_up": true, "mtu": 1400, "status": "ACTIVE", "subnets": ["d9e144c5-9735-4711-b3a1-0d367753c7f6"], "shared": false, "availability_zone_hints": [], "availability_zones": ["nova"], "ipv4_address_scope": null, "ipv6_address_scope": null, "router:external": false, "vlan_transparent": null, "description": "", "port_security_enabled": true, "qos_policy_id": null, "dns_domain": "", "l2_adjacency": true, "tags": [], "created_at": "2020-11-03T09:04:32Z", "updated_at": "2020-11-03T09:04:33Z", "revision_number": 2, "project_id": "70c2f48fcaf343ceb2657220e064d31c", "provider:network_type": "vxlan", "provider:physical_network": null, "provider:segmentation_id": 12}, {"id": "13969b3e-1458-4017-97b3-6dc65a2e1f8c", "name": "tempest-MultipleCreateTestJSON-80353040-network", "tenant_id": "143eaf18da0d441fb68df29b15aea9c4", "admin_state_up": true, "mtu": 1400, "status": "ACTIVE", "subnets": ["68cade25-ac24-411c-bbea-7ccfd23b16b3"], "shared": false, "availability_zone_hints": [], "availability_zones": ["nova"], "ipv4_address_scope": null, "ipv6_address_scope": null, "router:external": false, "vlan_transparent": null, "description": "", "port_security_enabled": true, "qos_policy_id": null, "dns_domain": "", "l2_adjacency": true, "tags": [], "created_at": "2020-11-03T08:54:27Z", "updated_at": "2020-11-03T08:54:28Z", "revision_number": 2, "project_id": "143eaf18da0d441fb68df29b15aea _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:23.495 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:23.557 38 INFO tempest.lib.common.rest_client [req-70c379cd-2d85-4004-9876-366abd339a12 ] Request (DHCPAgentSchedulersRbacTest:test_list_networks_hosted_by_one_dhcp_agent): 200 GET http://172.30.13.94/identity/v3/projects/5900a11aa8c444ef859c281201ee71e5/users/cf72677f26d34f81bab6c3d4077e6c7f/roles 0.060s 2020-11-06 18:02:23.557 38 DEBUG tempest.lib.common.rest_client [req-70c379cd-2d85-4004-9876-366abd339a12 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-70c379cd-2d85-4004-9876-366abd339a12', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5900a11aa8c444ef859c281201ee71e5/users/cf72677f26d34f81bab6c3d4077e6c7f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5900a11aa8c444ef859c281201ee71e5/users/cf72677f26d34f81bab6c3d4077e6c7f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:23.598 38 INFO tempest.lib.common.rest_client [req-0a2cf848-512a-4d59-ab47-a37e2dbc5d59 ] Request (DHCPAgentSchedulersRbacTest:test_list_networks_hosted_by_one_dhcp_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:02:23.599 38 DEBUG tempest.lib.common.rest_client [req-0a2cf848-512a-4d59-ab47-a37e2dbc5d59 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6646', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0a2cf848-512a-4d59-ab47-a37e2dbc5d59', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "cf72677f26d34f81bab6c3d4077e6c7f", "name": "tempest-DHCPAgentSchedulersRbacTest-1617395121", "password_expires_at": null}, "audit_ids": ["Ewa_0nlhS76U-5KqoIOcJw"], "expires_at": "2020-11-06T19:02:23.000000Z", "issued_at": "2020-11-06T18:02:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5900a11aa8c444ef859c281201ee71e5", "name": "tempest-DHCPAgentSchedulersRbacTest-1617395121"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5900a11aa8c444ef859c281201ee71e5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5baf _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:23.647 40 INFO tempest.lib.common.rest_client [req-e174ef9d-1393-450a-a99c-d334241db60f ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/3525ae88-78ad-4c0a-a27e-aece7cf41d4f 0.651s 2020-11-06 18:02:23.648 40 DEBUG tempest.lib.common.rest_client [req-e174ef9d-1393-450a-a99c-d334241db60f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-e174ef9d-1393-450a-a99c-d334241db60f', 'date': 'Fri, 06 Nov 2020 18:02:23 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/3525ae88-78ad-4c0a-a27e-aece7cf41d4f'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:24.202 39 INFO tempest.lib.common.rest_client [req-150941d3-839c-4223-b0c6-fbefc3676c04 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 1.444s 2020-11-06 18:02:24.203 39 DEBUG tempest.lib.common.rest_client [req-150941d3-839c-4223-b0c6-fbefc3676c04 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-150941d3-839c-4223-b0c6-fbefc3676c04', 'x-compute-request-id': 'req-150941d3-839c-4223-b0c6-fbefc3676c04', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:24.657 38 INFO tempest.lib.common.rest_client [req-f2368c67-317b-40b9-8feb-42ceccc8701c ] Request (DHCPAgentSchedulersRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/1d7adc99-d1c0-4631-b659-492de6523992 1.055s 2020-11-06 18:02:24.657 38 DEBUG tempest.lib.common.rest_client [req-f2368c67-317b-40b9-8feb-42ceccc8701c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-f2368c67-317b-40b9-8feb-42ceccc8701c', 'date': 'Fri, 06 Nov 2020 18:02:24 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/1d7adc99-d1c0-4631-b659-492de6523992'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:24.745 40 INFO tempest.lib.common.rest_client [req-a3e618df-65a5-4cbc-a874-0917e7532421 ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/489b6d93-ae70-4c73-9220-5d613ae619e7 1.096s 2020-11-06 18:02:24.745 40 DEBUG tempest.lib.common.rest_client [req-a3e618df-65a5-4cbc-a874-0917e7532421 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-a3e618df-65a5-4cbc-a874-0917e7532421', 'date': 'Fri, 06 Nov 2020 18:02:24 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/489b6d93-ae70-4c73-9220-5d613ae619e7'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:25.415 40 INFO tempest.lib.common.rest_client [req-a2983b93-a299-4a6f-9338-ad4e268b0b23 ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/8cf8492c-2005-4dec-bb6f-15ac0f538c4f 0.669s 2020-11-06 18:02:25.416 40 DEBUG tempest.lib.common.rest_client [req-a2983b93-a299-4a6f-9338-ad4e268b0b23 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-a2983b93-a299-4a6f-9338-ad4e268b0b23', 'date': 'Fri, 06 Nov 2020 18:02:25 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/8cf8492c-2005-4dec-bb6f-15ac0f538c4f'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:25.448 38 INFO tempest.lib.common.rest_client [req-6869c421-a632-491e-b98b-502038146cf6 ] Request (DHCPAgentSchedulersRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/5944cc2a-6435-4849-a45f-3f9248083dab 0.789s 2020-11-06 18:02:25.449 38 DEBUG tempest.lib.common.rest_client [req-6869c421-a632-491e-b98b-502038146cf6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-6869c421-a632-491e-b98b-502038146cf6', 'date': 'Fri, 06 Nov 2020 18:02:25 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/5944cc2a-6435-4849-a45f-3f9248083dab'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:25.539 39 INFO tempest.lib.common.rest_client [req-b4426cf3-a525-45de-82d6-1267a161d80f ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.321s 2020-11-06 18:02:25.540 39 DEBUG tempest.lib.common.rest_client [req-b4426cf3-a525-45de-82d6-1267a161d80f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b4426cf3-a525-45de-82d6-1267a161d80f', 'x-compute-request-id': 'req-b4426cf3-a525-45de-82d6-1267a161d80f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:25.569 38 INFO tempest.lib.common.rest_client [req-f41380db-26a2-486e-9308-a38934bb0933 ] Request (DHCPAgentSchedulersRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/cf72677f26d34f81bab6c3d4077e6c7f 0.119s 2020-11-06 18:02:25.569 38 DEBUG tempest.lib.common.rest_client [req-f41380db-26a2-486e-9308-a38934bb0933 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f41380db-26a2-486e-9308-a38934bb0933', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/cf72677f26d34f81bab6c3d4077e6c7f'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:25.657 38 INFO tempest.lib.common.rest_client [req-9b0b3885-cd40-4e3e-b1c3-b02f073399a6 ] Request (DHCPAgentSchedulersRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-11-06 18:02:25.657 38 DEBUG tempest.lib.common.rest_client [req-9b0b3885-cd40-4e3e-b1c3-b02f073399a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9b0b3885-cd40-4e3e-b1c3-b02f073399a6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["wZueEiGRT_O1l9theMH_kw"], "expires_at": "2020-11-06T19:02:25.000000Z", "issued_at": "2020-11-06T18:02:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:25.828 38 INFO tempest.lib.common.rest_client [req-9ef735fa-aa25-4c78-a74f-f9751ca17b26 ] Request (DHCPAgentSchedulersRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=5900a11aa8c444ef859c281201ee71e5&name=default 0.170s 2020-11-06 18:02:25.829 38 DEBUG tempest.lib.common.rest_client [req-9ef735fa-aa25-4c78-a74f-f9751ca17b26 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-9ef735fa-aa25-4c78-a74f-f9751ca17b26', 'date': 'Fri, 06 Nov 2020 18:02:25 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=5900a11aa8c444ef859c281201ee71e5&name=default'} Body: b'{"security_groups": [{"id": "2ddbd6bb-ab11-4d33-aa8e-fbc6162bdf16", "name": "default", "stateful": true, "tenant_id": "5900a11aa8c444ef859c281201ee71e5", "description": "Default security group", "security_group_rules": [{"id": "1a5c9ebb-b29f-4841-b9ee-73a494632f15", "tenant_id": "5900a11aa8c444ef859c281201ee71e5", "security_group_id": "2ddbd6bb-ab11-4d33-aa8e-fbc6162bdf16", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:02:20Z", "updated_at": "2020-11-06T18:02:20Z", "revision_number": 0, "project_id": "5900a11aa8c444ef859c281201ee71e5"}, {"id": "5daac29c-663d-4679-a9bb-cc5542d74630", "tenant_id": "5900a11aa8c444ef859c281201ee71e5", "security_group_id": "2ddbd6bb-ab11-4d33-aa8e-fbc6162bdf16", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "2ddbd6bb-ab11-4d33-aa8e-fbc6162bdf16", "description": null, "tags": [], "created_at": "2020-11-06T18:02:20Z", "updated_at": "2020-11-06T18:02:20Z", "revision_number": 0, "project_id": "5900a11aa8c444ef859c281201ee71e5"}, {"id": "7cbf9c5e-d30f-42a9-b018-6fe670fc2dc1", "tenant_id": "5900a11aa8c444ef859c281201ee71e5", "security_group_id": "2ddbd6bb-ab11-4d33-aa8e-fbc6162bdf16", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "2ddbd6bb-ab11-4d33-aa8e-fbc6162bdf16", "description": null, "tags": [], "created_at": "2020-11-06T18:02:20Z", "updated_at": "2020-11-06T18:02:20Z", "revision_number": 0, "project_id": "5900a11aa8c444ef859c281201ee71e5"}, {"id": "94eb35e2-2a1f-47d8-b9ec-075b36b0e63b", "tenant_id": "5900a11aa8c444ef859c281201ee71e5", "security_group_id": "2ddbd6bb-ab11-4d33-aa8e-fbc6162bdf16", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:02:20Z", "updated_at": "2020-11-06T18:02:20Z", "revision_number": 0, "project_id": "5900a11aa8c444ef859c281201ee71e5"}], "tags": [], "created_at": "2020-11-06T18:02:20Z", "updated_at": "2020-11-06T18:02:20Z", "revision_number": 1, "project_id": "5900a11aa8c444ef859c281201ee71e5"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:25.939 38 INFO tempest.lib.common.rest_client [req-1d730465-0771-4113-8fdb-92f80d613b43 ] Request (DHCPAgentSchedulersRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/2ddbd6bb-ab11-4d33-aa8e-fbc6162bdf16 0.108s 2020-11-06 18:02:25.940 38 DEBUG tempest.lib.common.rest_client [req-1d730465-0771-4113-8fdb-92f80d613b43 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-1d730465-0771-4113-8fdb-92f80d613b43', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:02:25 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/2ddbd6bb-ab11-4d33-aa8e-fbc6162bdf16'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:26.069 38 INFO tempest.lib.common.rest_client [req-462cd8f7-a6bb-4be4-88de-7275b2dc2ad2 ] Request (DHCPAgentSchedulersRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/5900a11aa8c444ef859c281201ee71e5 0.128s 2020-11-06 18:02:26.069 38 DEBUG tempest.lib.common.rest_client [req-462cd8f7-a6bb-4be4-88de-7275b2dc2ad2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-462cd8f7-a6bb-4be4-88de-7275b2dc2ad2', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/5900a11aa8c444ef859c281201ee71e5'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:26.150 37 INFO tempest.lib.common.rest_client [req-febe451c-e32c-4609-b9ee-ef59f2947e96 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/95d785d5-5725-416d-a580-63ed0c22ed73/add_router_interface 4.139s 2020-11-06 18:02:26.151 37 DEBUG tempest.lib.common.rest_client [req-febe451c-e32c-4609-b9ee-ef59f2947e96 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "8b7f9f92-033a-4908-99d7-129d95e50f00"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-febe451c-e32c-4609-b9ee-ef59f2947e96', 'date': 'Fri, 06 Nov 2020 18:02:26 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/95d785d5-5725-416d-a580-63ed0c22ed73/add_router_interface'} Body: b'{"id": "95d785d5-5725-416d-a580-63ed0c22ed73", "tenant_id": "198374b90e3641c39c58226d89b9ccc8", "port_id": "a07b90a0-e5fa-44ed-bf03-b66e82b5f796", "network_id": "5d36c639-e8c3-4217-a17b-7cd7a033d67a", "subnet_id": "8b7f9f92-033a-4908-99d7-129d95e50f00", "subnet_ids": ["8b7f9f92-033a-4908-99d7-129d95e50f00"]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:26.151 37 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerVolumeAttachmentRbacTest-1175560981', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '198374b90e3641c39c58226d89b9ccc8', 'project_name': 'tempest-ServerVolumeAttachmentRbacTest-1175560981', 'tenant_id': '198374b90e3641c39c58226d89b9ccc8', 'tenant_name': 'tempest-ServerVolumeAttachmentRbacTest-1175560981', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '31dfe8b61f554cfe82a18efd5d747c55'}, Network: {'id': '5d36c639-e8c3-4217-a17b-7cd7a033d67a', 'name': 'tempest-ServerVolumeAttachmentRbacTest-1258567035-network', 'tenant_id': '198374b90e3641c39c58226d89b9ccc8', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '198374b90e3641c39c58226d89b9ccc8', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 49, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T18:02:19Z', 'updated_at': '2020-11-06T18:02:19Z', 'revision_number': 1}, Subnet: {'id': '8b7f9f92-033a-4908-99d7-129d95e50f00', 'name': 'tempest-ServerVolumeAttachmentRbacTest-1258567035-subnet', 'tenant_id': '198374b90e3641c39c58226d89b9ccc8', 'network_id': '5d36c639-e8c3-4217-a17b-7cd7a033d67a', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-11-06T18:02:19Z', 'updated_at': '2020-11-06T18:02:19Z', 'revision_number': 0, 'project_id': '198374b90e3641c39c58226d89b9ccc8'}, Router: {'id': '95d785d5-5725-416d-a580-63ed0c22ed73', 'name': 'tempest-ServerVolumeAttachmentRbacTest-1258567035-router', 'tenant_id': '198374b90e3641c39c58226d89b9ccc8', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.141'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::3be'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-11-06T18:02:20Z', 'updated_at': '2020-11-06T18:02:21Z', 'revision_number': 3, 'project_id': '198374b90e3641c39c58226d89b9ccc8'} 2020-11-06 18:02:26.168 38 INFO tempest.lib.common.rest_client [req-db540aa0-db1f-4c88-8f09-16dc8c28d37d ] Request (L3AgentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-11-06 18:02:26.169 38 DEBUG tempest.lib.common.rest_client [req-db540aa0-db1f-4c88-8f09-16dc8c28d37d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-db540aa0-db1f-4c88-8f09-16dc8c28d37d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["wiAOxGlJQDOu5arZP9lKUg"], "expires_at": "2020-11-06T19:02:26.000000Z", "issued_at": "2020-11-06T18:02:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:26.213 38 INFO tempest.lib.common.rest_client [req-7c8c2446-1ee6-4585-9876-ba68e456f4a5 ] Request (L3AgentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:02:26.214 38 DEBUG tempest.lib.common.rest_client [req-7c8c2446-1ee6-4585-9876-ba68e456f4a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7c8c2446-1ee6-4585-9876-ba68e456f4a5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["iTmhQndNQNSXiih9T1QJSw"], "expires_at": "2020-11-06T19:02:26.000000Z", "issued_at": "2020-11-06T18:02:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:26.266 37 INFO tempest.lib.common.rest_client [req-1c612bf5-05f6-435f-8b9d-a47331977e7b ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.106s 2020-11-06 18:02:26.267 37 DEBUG tempest.lib.common.rest_client [req-1c612bf5-05f6-435f-8b9d-a47331977e7b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6591', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1c612bf5-05f6-435f-8b9d-a47331977e7b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "31dfe8b61f554cfe82a18efd5d747c55", "name": "tempest-ServerVolumeAttachmentRbacTest-1175560981", "password_expires_at": null}, "audit_ids": ["C0fJTRbCSzCw-Ckz1R6j8Q"], "expires_at": "2020-11-06T19:02:26.000000Z", "issued_at": "2020-11-06T18:02:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "198374b90e3641c39c58226d89b9ccc8", "name": "tempest-ServerVolumeAttachmentRbacTest-1175560981"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:26.276 38 INFO tempest.lib.common.rest_client [req-64dc4f49-3c4e-48ed-9215-38a2c4da4f38 ] Request (L3AgentsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.061s 2020-11-06 18:02:26.277 38 DEBUG tempest.lib.common.rest_client [req-64dc4f49-3c4e-48ed-9215-38a2c4da4f38 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-64dc4f49-3c4e-48ed-9215-38a2c4da4f38', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:26.308 37 INFO tempest.lib.common.rest_client [req-f9675e3e-dc3a-4767-9676-54a745b3b1bd ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:02:26.309 37 DEBUG tempest.lib.common.rest_client [req-f9675e3e-dc3a-4767-9676-54a745b3b1bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f9675e3e-dc3a-4767-9676-54a745b3b1bd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["FQPxwD5ySnWG3MMFUo-6UQ"], "expires_at": "2020-11-06T19:02:26.000000Z", "issued_at": "2020-11-06T18:02:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:26.343 38 INFO tempest.lib.common.rest_client [req-8d61b01d-becd-4028-b9e1-3d03bfc3a133 ] Request (L3AgentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.065s 2020-11-06 18:02:26.344 38 DEBUG tempest.lib.common.rest_client [req-8d61b01d-becd-4028-b9e1-3d03bfc3a133 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-L3AgentsExtRbacTest-1865962985-desc", "domain_id": "default", "name": "tempest-L3AgentsExtRbacTest-1865962985"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '376', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8d61b01d-becd-4028-b9e1-3d03bfc3a133', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "09881f12c73d453190ea98833e83a3b8", "name": "tempest-L3AgentsExtRbacTest-1865962985", "domain_id": "default", "description": "tempest-L3AgentsExtRbacTest-1865962985-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/09881f12c73d453190ea98833e83a3b8"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:26.406 37 INFO tempest.lib.common.rest_client [req-7474ffb1-ee34-446d-8199-196bf4a7cc2e ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:02:26.407 37 DEBUG tempest.lib.common.rest_client [req-7474ffb1-ee34-446d-8199-196bf4a7cc2e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7474ffb1-ee34-446d-8199-196bf4a7cc2e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["SkASdAIEQ-66kTnsu0gMlw"], "expires_at": "2020-11-06T19:02:26.000000Z", "issued_at": "2020-11-06T18:02:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:26.463 37 INFO tempest.lib.common.rest_client [req-e078ff86-296b-452f-b670-a341659a44df ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.055s 2020-11-06 18:02:26.464 37 DEBUG tempest.lib.common.rest_client [req-e078ff86-296b-452f-b670-a341659a44df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e078ff86-296b-452f-b670-a341659a44df', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:26.473 38 INFO tempest.lib.common.rest_client [req-10aef8f4-7d3a-42aa-bf59-fd4255132242 ] Request (L3AgentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.127s 2020-11-06 18:02:26.473 38 DEBUG tempest.lib.common.rest_client [req-10aef8f4-7d3a-42aa-bf59-fd4255132242 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-L3AgentsExtRbacTest-1865962985", "password": "Z5%%ORbzg4ujK~=", "project_id": "09881f12c73d453190ea98833e83a3b8", "email": "tempest-L3AgentsExtRbacTest-1500419898@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '394', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-10aef8f4-7d3a-42aa-bf59-fd4255132242', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "09881f12c73d453190ea98833e83a3b8", "email": "tempest-L3AgentsExtRbacTest-1500419898@example.com", "id": "11af03d25d7a4055863a90e9d11f849f", "name": "tempest-L3AgentsExtRbacTest-1865962985", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/11af03d25d7a4055863a90e9d11f849f"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:26.514 37 INFO tempest.lib.common.rest_client [req-bc416706-4456-4ab8-adbf-47f27659c46c ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.050s 2020-11-06 18:02:26.515 37 DEBUG tempest.lib.common.rest_client [req-bc416706-4456-4ab8-adbf-47f27659c46c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bc416706-4456-4ab8-adbf-47f27659c46c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:26.515 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:02:26.516 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:26.525 38 INFO tempest.lib.common.rest_client [req-b6760f94-6da5-42a4-9c90-e30b78c45ffd ] Request (L3AgentsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.050s 2020-11-06 18:02:26.525 38 DEBUG tempest.lib.common.rest_client [req-b6760f94-6da5-42a4-9c90-e30b78c45ffd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b6760f94-6da5-42a4-9c90-e30b78c45ffd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:26.564 37 INFO tempest.lib.common.rest_client [req-8ed20f16-85f7-4c69-9c6b-386dda684d84 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/198374b90e3641c39c58226d89b9ccc8/users/31dfe8b61f554cfe82a18efd5d747c55/roles 0.047s 2020-11-06 18:02:26.564 37 DEBUG tempest.lib.common.rest_client [req-8ed20f16-85f7-4c69-9c6b-386dda684d84 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8ed20f16-85f7-4c69-9c6b-386dda684d84', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/198374b90e3641c39c58226d89b9ccc8/users/31dfe8b61f554cfe82a18efd5d747c55/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/198374b90e3641c39c58226d89b9ccc8/users/31dfe8b61f554cfe82a18efd5d747c55/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:26.588 38 INFO tempest.lib.common.rest_client [req-12a3e2b1-513f-498d-a9c3-09e61c9167fc ] Request (L3AgentsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.061s 2020-11-06 18:02:26.588 38 DEBUG tempest.lib.common.rest_client [req-12a3e2b1-513f-498d-a9c3-09e61c9167fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-12a3e2b1-513f-498d-a9c3-09e61c9167fc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:26.614 37 INFO tempest.lib.common.rest_client [req-b031fdd5-ecdd-444c-abbb-32d5944724a5 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/198374b90e3641c39c58226d89b9ccc8/users/31dfe8b61f554cfe82a18efd5d747c55/roles/72a4576c553448cd941b052c1ca0cf2d 0.048s 2020-11-06 18:02:26.614 37 DEBUG tempest.lib.common.rest_client [req-b031fdd5-ecdd-444c-abbb-32d5944724a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b031fdd5-ecdd-444c-abbb-32d5944724a5', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/198374b90e3641c39c58226d89b9ccc8/users/31dfe8b61f554cfe82a18efd5d747c55/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:26.665 38 INFO tempest.lib.common.rest_client [req-f6974dac-3ebd-4395-be5a-d076215ff4d7 ] Request (L3AgentsExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/09881f12c73d453190ea98833e83a3b8/users/11af03d25d7a4055863a90e9d11f849f/roles/72a4576c553448cd941b052c1ca0cf2d 0.076s 2020-11-06 18:02:26.665 38 DEBUG tempest.lib.common.rest_client [req-f6974dac-3ebd-4395-be5a-d076215ff4d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f6974dac-3ebd-4395-be5a-d076215ff4d7', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/09881f12c73d453190ea98833e83a3b8/users/11af03d25d7a4055863a90e9d11f849f/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:26.666 38 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-L3AgentsExtRbacTest-1865962985', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '09881f12c73d453190ea98833e83a3b8', 'project_name': 'tempest-L3AgentsExtRbacTest-1865962985', 'tenant_id': '09881f12c73d453190ea98833e83a3b8', 'tenant_name': 'tempest-L3AgentsExtRbacTest-1865962985', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '11af03d25d7a4055863a90e9d11f849f'}, Network: None, Subnet: None, Router: None 2020-11-06 18:02:26.666 38 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-L3AgentsExtRbacTest-1865962985', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '09881f12c73d453190ea98833e83a3b8', 'project_name': 'tempest-L3AgentsExtRbacTest-1865962985', 'tenant_id': '09881f12c73d453190ea98833e83a3b8', 'tenant_name': 'tempest-L3AgentsExtRbacTest-1865962985', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '11af03d25d7a4055863a90e9d11f849f'}, Network: None, Subnet: None, Router: None 2020-11-06 18:02:26.734 37 INFO tempest.lib.common.rest_client [req-6ac9c1df-ad99-4752-b703-3e7ef458b410 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/198374b90e3641c39c58226d89b9ccc8/users/31dfe8b61f554cfe82a18efd5d747c55/roles/a629c95d64b3416fb80ae90af4f69c05 0.118s 2020-11-06 18:02:26.734 37 DEBUG tempest.lib.common.rest_client [req-6ac9c1df-ad99-4752-b703-3e7ef458b410 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6ac9c1df-ad99-4752-b703-3e7ef458b410', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/198374b90e3641c39c58226d89b9ccc8/users/31dfe8b61f554cfe82a18efd5d747c55/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:26.788 38 INFO tempest.lib.common.rest_client [req-6cf3eee9-c64c-4929-ab65-547a9ef6396a ] Request (L3AgentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.109s 2020-11-06 18:02:26.788 38 DEBUG tempest.lib.common.rest_client [req-6cf3eee9-c64c-4929-ab65-547a9ef6396a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6569', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6cf3eee9-c64c-4929-ab65-547a9ef6396a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "11af03d25d7a4055863a90e9d11f849f", "name": "tempest-L3AgentsExtRbacTest-1865962985", "password_expires_at": null}, "audit_ids": ["u2It31WyRmGhyU14dfBN5g"], "expires_at": "2020-11-06T19:02:26.000000Z", "issued_at": "2020-11-06T18:02:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "09881f12c73d453190ea98833e83a3b8", "name": "tempest-L3AgentsExtRbacTest-1865962985"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.3 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:26.789 38 WARNING tempest.manager [-] tempest.manager.Manager is not a stable interface and as such it should not be imported directly. It will be removed as soon as the client manager becomes available in tempest.lib. 2020-11-06 18:02:26.879 38 INFO tempest.lib.common.rest_client [req-559c452a-d2fc-4aba-987c-0892ab1e9bf6 ] Request (L3AgentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:02:26.879 38 DEBUG tempest.lib.common.rest_client [req-559c452a-d2fc-4aba-987c-0892ab1e9bf6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-559c452a-d2fc-4aba-987c-0892ab1e9bf6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["W8Bo_nxPQdeyL1AXstZf9w"], "expires_at": "2020-11-06T19:02:26.000000Z", "issued_at": "2020-11-06T18:02:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:26.886 39 INFO tempest.lib.common.rest_client [req-4e6d7c0c-34ad-40b7-b3c1-9a39395f2ed2 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.332s 2020-11-06 18:02:26.886 39 DEBUG tempest.lib.common.rest_client [req-4e6d7c0c-34ad-40b7-b3c1-9a39395f2ed2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4e6d7c0c-34ad-40b7-b3c1-9a39395f2ed2', 'x-compute-request-id': 'req-4e6d7c0c-34ad-40b7-b3c1-9a39395f2ed2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:26.922 38 INFO tempest.lib.common.rest_client [req-e31ef857-a4ce-4560-908a-fe2f6c819dfa ] Request (L3AgentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:02:26.922 38 DEBUG tempest.lib.common.rest_client [req-e31ef857-a4ce-4560-908a-fe2f6c819dfa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e31ef857-a4ce-4560-908a-fe2f6c819dfa', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["nf_FSftESsK12zU2Y7tKuw"], "expires_at": "2020-11-06T19:02:26.000000Z", "issued_at": "2020-11-06T18:02:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:27.024 38 INFO tempest.lib.common.rest_client [req-ae171e36-89fd-4063-9b74-1e9db6757361 ] Request (L3AgentsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.101s 2020-11-06 18:02:27.025 38 DEBUG tempest.lib.common.rest_client [req-ae171e36-89fd-4063-9b74-1e9db6757361 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ae171e36-89fd-4063-9b74-1e9db6757361', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:27.077 38 INFO tempest.lib.common.rest_client [req-e597b370-d0a4-4393-b394-b26b13bcb2c0 ] Request (L3AgentsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.051s 2020-11-06 18:02:27.078 38 DEBUG tempest.lib.common.rest_client [req-e597b370-d0a4-4393-b394-b26b13bcb2c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e597b370-d0a4-4393-b394-b26b13bcb2c0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:27.078 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:02:27.079 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:27.183 38 INFO tempest.lib.common.rest_client [req-f947ad39-20d9-47ac-8cd3-abcaaa742a31 ] Request (L3AgentsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/09881f12c73d453190ea98833e83a3b8/users/11af03d25d7a4055863a90e9d11f849f/roles 0.103s 2020-11-06 18:02:27.183 38 DEBUG tempest.lib.common.rest_client [req-f947ad39-20d9-47ac-8cd3-abcaaa742a31 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f947ad39-20d9-47ac-8cd3-abcaaa742a31', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/09881f12c73d453190ea98833e83a3b8/users/11af03d25d7a4055863a90e9d11f849f/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/09881f12c73d453190ea98833e83a3b8/users/11af03d25d7a4055863a90e9d11f849f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:27.221 40 INFO tempest.lib.common.rest_client [req-4eed1d99-41c2-4062-b52e-9b74c3cf5803 ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/e7a04276-026d-4302-adc0-e50810d5c736 1.804s 2020-11-06 18:02:27.222 40 DEBUG tempest.lib.common.rest_client [req-4eed1d99-41c2-4062-b52e-9b74c3cf5803 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-4eed1d99-41c2-4062-b52e-9b74c3cf5803', 'date': 'Fri, 06 Nov 2020 18:02:27 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/e7a04276-026d-4302-adc0-e50810d5c736'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:27.248 38 INFO tempest.lib.common.rest_client [req-bbaaf068-6960-4c79-9b4a-87fde22bd058 ] Request (L3AgentsExtRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/09881f12c73d453190ea98833e83a3b8/users/11af03d25d7a4055863a90e9d11f849f/roles/72a4576c553448cd941b052c1ca0cf2d 0.063s 2020-11-06 18:02:27.248 38 DEBUG tempest.lib.common.rest_client [req-bbaaf068-6960-4c79-9b4a-87fde22bd058 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bbaaf068-6960-4c79-9b4a-87fde22bd058', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/09881f12c73d453190ea98833e83a3b8/users/11af03d25d7a4055863a90e9d11f849f/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:27.257 40 INFO tempest.lib.common.rest_client [req-842253b4-a095-4ed3-8d51-582d49ba6a96 ] Request (PortsRbacTest:tearDownClass): 404 DELETE http://172.30.13.94:9696/v2.0/ports/be92dbc3-231e-4b93-831e-f18bc0fefc70 0.034s 2020-11-06 18:02:27.257 40 DEBUG tempest.lib.common.rest_client [req-842253b4-a095-4ed3-8d51-582d49ba6a96 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '132', 'x-openstack-request-id': 'req-842253b4-a095-4ed3-8d51-582d49ba6a96', 'date': 'Fri, 06 Nov 2020 18:02:27 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/be92dbc3-231e-4b93-831e-f18bc0fefc70'} Body: b'{"NeutronError": {"type": "PortNotFound", "message": "Port be92dbc3-231e-4b93-831e-f18bc0fefc70 could not be found.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:27.356 38 INFO tempest.lib.common.rest_client [req-e1f873e8-34e9-4170-95b2-ba347ed02c46 ] Request (L3AgentsExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/09881f12c73d453190ea98833e83a3b8/users/11af03d25d7a4055863a90e9d11f849f/roles/a629c95d64b3416fb80ae90af4f69c05 0.107s 2020-11-06 18:02:27.357 38 DEBUG tempest.lib.common.rest_client [req-e1f873e8-34e9-4170-95b2-ba347ed02c46 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e1f873e8-34e9-4170-95b2-ba347ed02c46', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/09881f12c73d453190ea98833e83a3b8/users/11af03d25d7a4055863a90e9d11f849f/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:27.828 37 INFO tempest.lib.common.rest_client [req-585bc098-1bd5-4515-9e60-37510b6393eb ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-11-06 18:02:27.829 37 DEBUG tempest.lib.common.rest_client [req-585bc098-1bd5-4515-9e60-37510b6393eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6652', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-585bc098-1bd5-4515-9e60-37510b6393eb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "31dfe8b61f554cfe82a18efd5d747c55", "name": "tempest-ServerVolumeAttachmentRbacTest-1175560981", "password_expires_at": null}, "audit_ids": ["CYtY8-1NRkK1C6dGus1KcQ"], "expires_at": "2020-11-06T19:02:27.000000Z", "issued_at": "2020-11-06T18:02:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "198374b90e3641c39c58226d89b9ccc8", "name": "tempest-ServerVolumeAttachmentRbacTest-1175560981"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:27.831 40 INFO tempest.lib.common.rest_client [req-85161857-fae4-4540-8456-6af8f9c1df0c ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/c9f58e9f-9178-4898-b197-6dfd6b810679 0.573s 2020-11-06 18:02:27.832 40 DEBUG tempest.lib.common.rest_client [req-85161857-fae4-4540-8456-6af8f9c1df0c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-85161857-fae4-4540-8456-6af8f9c1df0c', 'date': 'Fri, 06 Nov 2020 18:02:27 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/c9f58e9f-9178-4898-b197-6dfd6b810679'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:27.877 37 INFO tempest.lib.common.rest_client [req-0239edcc-9089-4b53-96bb-17ff4bd9317b ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:02:27.878 37 DEBUG tempest.lib.common.rest_client [req-0239edcc-9089-4b53-96bb-17ff4bd9317b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6652', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0239edcc-9089-4b53-96bb-17ff4bd9317b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "31dfe8b61f554cfe82a18efd5d747c55", "name": "tempest-ServerVolumeAttachmentRbacTest-1175560981", "password_expires_at": null}, "audit_ids": ["TAcqUKWlR365zgGorIpjfA"], "expires_at": "2020-11-06T19:02:27.000000Z", "issued_at": "2020-11-06T18:02:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "198374b90e3641c39c58226d89b9ccc8", "name": "tempest-ServerVolumeAttachmentRbacTest-1175560981"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:27.879 37 INFO tempest.lib.common.fixed_network [-] (ServerVolumeAttachmentRbacTest:setUpClass) Found network {'id': '5d36c639-e8c3-4217-a17b-7cd7a033d67a', 'name': 'tempest-ServerVolumeAttachmentRbacTest-1258567035-network', 'tenant_id': '198374b90e3641c39c58226d89b9ccc8', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '198374b90e3641c39c58226d89b9ccc8', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 49, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T18:02:19Z', 'updated_at': '2020-11-06T18:02:19Z', 'revision_number': 1} available for tenant 2020-11-06 18:02:28.114 39 INFO tempest.lib.common.rest_client [req-1efa6fa4-73e2-4196-8978-bd031207eff3 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.210s 2020-11-06 18:02:28.114 39 DEBUG tempest.lib.common.rest_client [req-1efa6fa4-73e2-4196-8978-bd031207eff3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1efa6fa4-73e2-4196-8978-bd031207eff3', 'x-compute-request-id': 'req-1efa6fa4-73e2-4196-8978-bd031207eff3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:28.443 38 INFO tempest.lib.common.rest_client [req-4e11bacc-1fcd-492e-8dd8-e1b8ccf91a9c ] Request (L3AgentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-11-06 18:02:28.444 38 DEBUG tempest.lib.common.rest_client [req-4e11bacc-1fcd-492e-8dd8-e1b8ccf91a9c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4e11bacc-1fcd-492e-8dd8-e1b8ccf91a9c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "11af03d25d7a4055863a90e9d11f849f", "name": "tempest-L3AgentsExtRbacTest-1865962985", "password_expires_at": null}, "audit_ids": ["Y93NYRFZRNep0uMOeAc5GQ"], "expires_at": "2020-11-06T19:02:28.000000Z", "issued_at": "2020-11-06T18:02:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "09881f12c73d453190ea98833e83a3b8", "name": "tempest-L3AgentsExtRbacTest-1865962985"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:28.483 38 INFO tempest.lib.common.rest_client [req-d8c35f52-3fff-4013-880e-66077642d3bf ] Request (L3AgentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:02:28.483 38 DEBUG tempest.lib.common.rest_client [req-d8c35f52-3fff-4013-880e-66077642d3bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d8c35f52-3fff-4013-880e-66077642d3bf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "11af03d25d7a4055863a90e9d11f849f", "name": "tempest-L3AgentsExtRbacTest-1865962985", "password_expires_at": null}, "audit_ids": ["O0AyrJY2T0KrAEiSBkushw"], "expires_at": "2020-11-06T19:02:28.000000Z", "issued_at": "2020-11-06T18:02:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "09881f12c73d453190ea98833e83a3b8", "name": "tempest-L3AgentsExtRbacTest-1865962985"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:28.603 40 INFO tempest.lib.common.rest_client [req-24433d3e-770e-499b-ae1a-760758ccddb1 ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/9133146d-a0cb-4e67-8e41-deb4272d7c64 0.770s 2020-11-06 18:02:28.603 40 DEBUG tempest.lib.common.rest_client [req-24433d3e-770e-499b-ae1a-760758ccddb1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-24433d3e-770e-499b-ae1a-760758ccddb1', 'date': 'Fri, 06 Nov 2020 18:02:28 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/9133146d-a0cb-4e67-8e41-deb4272d7c64'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:28.720 37 INFO tempest.lib.common.rest_client [req-32919412-01be-49cb-9965-8be4cedd1cd7 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 202 POST http://172.30.13.94/compute/v2.1/servers 0.840s 2020-11-06 18:02:28.721 37 DEBUG tempest.lib.common.rest_client [req-32919412-01be-49cb-9965-8be4cedd1cd7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-ServerVolumeAttachmentRbacTest-server-1425651703", "imageRef": "56b368f6-9136-40ec-a04c-564d02c95e42", "flavorRef": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "networks": [{"uuid": "5d36c639-e8c3-4217-a17b-7cd7a033d67a"}]}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-32919412-01be-49cb-9965-8be4cedd1cd7', 'x-compute-request-id': 'req-32919412-01be-49cb-9965-8be4cedd1cd7', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "e62cf5bc-fdb9-402c-b1b0-22ca5336dbac", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "oiGq4iAX6evi"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:29.265 40 INFO tempest.lib.common.rest_client [req-f53f38e9-9f88-4e8c-a161-6d7eded4920b ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/a36b21eb-8c95-4f67-af2a-daff19a10de7 0.661s 2020-11-06 18:02:29.266 40 DEBUG tempest.lib.common.rest_client [req-f53f38e9-9f88-4e8c-a161-6d7eded4920b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-f53f38e9-9f88-4e8c-a161-6d7eded4920b', 'date': 'Fri, 06 Nov 2020 18:02:29 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/a36b21eb-8c95-4f67-af2a-daff19a10de7'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:29.857 40 INFO tempest.lib.common.rest_client [req-f03fbdb8-d7d8-4110-ba31-da8d5f142ffc ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/b6f1631d-865c-41b9-bcc8-e604b89032a7 0.590s 2020-11-06 18:02:29.858 40 DEBUG tempest.lib.common.rest_client [req-f03fbdb8-d7d8-4110-ba31-da8d5f142ffc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-f03fbdb8-d7d8-4110-ba31-da8d5f142ffc', 'date': 'Fri, 06 Nov 2020 18:02:29 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/b6f1631d-865c-41b9-bcc8-e604b89032a7'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:30.008 37 INFO tempest.lib.common.rest_client [req-b02ae255-e148-4f9b-932c-19eb6aed8554 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac 1.282s 2020-11-06 18:02:30.009 37 DEBUG tempest.lib.common.rest_client [req-b02ae255-e148-4f9b-932c-19eb6aed8554 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1406', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b02ae255-e148-4f9b-932c-19eb6aed8554', 'x-compute-request-id': 'req-b02ae255-e148-4f9b-932c-19eb6aed8554', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac'} Body: b'{"server": {"id": "e62cf5bc-fdb9-402c-b1b0-22ca5336dbac", "name": "tempest-ServerVolumeAttachmentRbacTest-server-1425651703", "status": "BUILD", "tenant_id": "198374b90e3641c39c58226d89b9ccc8", "user_id": "31dfe8b61f554cfe82a18efd5d747c55", "metadata": {}, "hostId": "", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:02:29Z", "updated": "2020-11-06T18:02:28Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:30.096 39 INFO tempest.lib.common.rest_client [req-22056903-5b96-44f0-845c-dfcbd9af12d4 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.965s 2020-11-06 18:02:30.096 39 DEBUG tempest.lib.common.rest_client [req-22056903-5b96-44f0-845c-dfcbd9af12d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-22056903-5b96-44f0-845c-dfcbd9af12d4', 'x-compute-request-id': 'req-22056903-5b96-44f0-845c-dfcbd9af12d4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:30.225 38 INFO tempest.lib.common.rest_client [req-abaec4fd-58d9-4cd5-8363-e85d7c9150a5 ] Request (L3AgentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/routers 1.740s 2020-11-06 18:02:30.226 38 DEBUG tempest.lib.common.rest_client [req-abaec4fd-58d9-4cd5-8363-e85d7c9150a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-L3AgentsExtRbacTest-Router-120737989", "admin_state_up": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '542', 'x-openstack-request-id': 'req-abaec4fd-58d9-4cd5-8363-e85d7c9150a5', 'date': 'Fri, 06 Nov 2020 18:02:30 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "89f4833c-c825-4548-acda-b617fca43ba3", "name": "tempest-L3AgentsExtRbacTest-Router-120737989", "tenant_id": "09881f12c73d453190ea98833e83a3b8", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T18:02:28Z", "updated_at": "2020-11-06T18:02:28Z", "revision_number": 1, "project_id": "09881f12c73d453190ea98833e83a3b8"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:30.228 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:30.232 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_l3-agents, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:30.233 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:30.415 38 INFO tempest.lib.common.rest_client [req-e1478d92-fb2d-426d-9052-01d8f1592ddf ] Request (L3AgentsExtRbacTest:test_list_l3_agents_on_router): 200 GET http://172.30.13.94/identity/v3/projects/09881f12c73d453190ea98833e83a3b8/users/11af03d25d7a4055863a90e9d11f849f/roles 0.181s 2020-11-06 18:02:30.416 38 DEBUG tempest.lib.common.rest_client [req-e1478d92-fb2d-426d-9052-01d8f1592ddf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e1478d92-fb2d-426d-9052-01d8f1592ddf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/09881f12c73d453190ea98833e83a3b8/users/11af03d25d7a4055863a90e9d11f849f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/09881f12c73d453190ea98833e83a3b8/users/11af03d25d7a4055863a90e9d11f849f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:30.515 38 INFO tempest.lib.common.rest_client [req-041daaf6-f694-4112-8cdc-106fceb414e8 ] Request (L3AgentsExtRbacTest:test_list_l3_agents_on_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-11-06 18:02:30.516 38 DEBUG tempest.lib.common.rest_client [req-041daaf6-f694-4112-8cdc-106fceb414e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-041daaf6-f694-4112-8cdc-106fceb414e8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "11af03d25d7a4055863a90e9d11f849f", "name": "tempest-L3AgentsExtRbacTest-1865962985", "password_expires_at": null}, "audit_ids": ["2mFW1wZfSkKSbFwWW8PvEA"], "expires_at": "2020-11-06T19:02:30.000000Z", "issued_at": "2020-11-06T18:02:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "09881f12c73d453190ea98833e83a3b8", "name": "tempest-L3AgentsExtRbacTest-1865962985"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:30.556 38 INFO tempest.lib.common.rest_client [req-1ad691c1-358d-4484-992a-2f7ac8114bcc ] Request (L3AgentsExtRbacTest:test_list_l3_agents_on_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:02:30.557 38 DEBUG tempest.lib.common.rest_client [req-1ad691c1-358d-4484-992a-2f7ac8114bcc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1ad691c1-358d-4484-992a-2f7ac8114bcc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "11af03d25d7a4055863a90e9d11f849f", "name": "tempest-L3AgentsExtRbacTest-1865962985", "password_expires_at": null}, "audit_ids": ["aBgvYqwfQmWYEpNIVztq8g"], "expires_at": "2020-11-06T19:02:30.000000Z", "issued_at": "2020-11-06T18:02:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "09881f12c73d453190ea98833e83a3b8", "name": "tempest-L3AgentsExtRbacTest-1865962985"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:30.673 40 INFO tempest.lib.common.rest_client [req-0e5a4a2f-fc65-4646-9f2c-f1622f086ebb ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/681475a9-b4b1-4301-b8f4-1c15dc1ffff3 0.814s 2020-11-06 18:02:30.673 40 DEBUG tempest.lib.common.rest_client [req-0e5a4a2f-fc65-4646-9f2c-f1622f086ebb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-0e5a4a2f-fc65-4646-9f2c-f1622f086ebb', 'date': 'Fri, 06 Nov 2020 18:02:30 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/681475a9-b4b1-4301-b8f4-1c15dc1ffff3'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:30.745 38 INFO tempest.lib.common.rest_client [req-33a9a866-783b-4c23-adf0-c60526ffc160 ] Request (L3AgentsExtRbacTest:test_list_l3_agents_on_router): 200 GET http://172.30.13.94:9696/v2.0/routers/89f4833c-c825-4548-acda-b617fca43ba3/l3-agents 0.186s 2020-11-06 18:02:30.746 38 DEBUG tempest.lib.common.rest_client [req-33a9a866-783b-4c23-adf0-c60526ffc160 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '14', 'x-openstack-request-id': 'req-33a9a866-783b-4c23-adf0-c60526ffc160', 'date': 'Fri, 06 Nov 2020 18:02:30 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/89f4833c-c825-4548-acda-b617fca43ba3/l3-agents'} Body: b'{"agents": []}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:30.746 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:30.805 38 INFO tempest.lib.common.rest_client [req-374c882a-9574-41ea-a9de-0848ec11382c ] Request (L3AgentsExtRbacTest:test_list_l3_agents_on_router): 200 GET http://172.30.13.94/identity/v3/projects/09881f12c73d453190ea98833e83a3b8/users/11af03d25d7a4055863a90e9d11f849f/roles 0.058s 2020-11-06 18:02:30.806 38 DEBUG tempest.lib.common.rest_client [req-374c882a-9574-41ea-a9de-0848ec11382c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-374c882a-9574-41ea-a9de-0848ec11382c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/09881f12c73d453190ea98833e83a3b8/users/11af03d25d7a4055863a90e9d11f849f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/09881f12c73d453190ea98833e83a3b8/users/11af03d25d7a4055863a90e9d11f849f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:30.843 38 INFO tempest.lib.common.rest_client [req-14f517b2-0e8d-4a39-878f-973fee98fe38 ] Request (L3AgentsExtRbacTest:test_list_l3_agents_on_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:02:30.844 38 DEBUG tempest.lib.common.rest_client [req-14f517b2-0e8d-4a39-878f-973fee98fe38 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-14f517b2-0e8d-4a39-878f-973fee98fe38', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "11af03d25d7a4055863a90e9d11f849f", "name": "tempest-L3AgentsExtRbacTest-1865962985", "password_expires_at": null}, "audit_ids": ["VQECCGGRRwusXCzxLnptKA"], "expires_at": "2020-11-06T19:02:30.000000Z", "issued_at": "2020-11-06T18:02:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "09881f12c73d453190ea98833e83a3b8", "name": "tempest-L3AgentsExtRbacTest-1865962985"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:30.885 38 INFO tempest.lib.common.rest_client [req-0b6608a4-5742-4eec-b9d9-bb7c8bd511c2 ] Request (L3AgentsExtRbacTest:test_list_l3_agents_on_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:02:30.886 38 DEBUG tempest.lib.common.rest_client [req-0b6608a4-5742-4eec-b9d9-bb7c8bd511c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0b6608a4-5742-4eec-b9d9-bb7c8bd511c2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "11af03d25d7a4055863a90e9d11f849f", "name": "tempest-L3AgentsExtRbacTest-1865962985", "password_expires_at": null}, "audit_ids": ["P0AYwhdxTeqBZzN7w1DspA"], "expires_at": "2020-11-06T19:02:30.000000Z", "issued_at": "2020-11-06T18:02:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "09881f12c73d453190ea98833e83a3b8", "name": "tempest-L3AgentsExtRbacTest-1865962985"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09881f12c73d453190ea98833e83a3b8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:31.513 38 INFO tempest.lib.common.rest_client [req-919717c1-7f5b-4383-a122-c23ba1846d71 ] Request (L3AgentsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/89f4833c-c825-4548-acda-b617fca43ba3 0.624s 2020-11-06 18:02:31.514 38 DEBUG tempest.lib.common.rest_client [req-919717c1-7f5b-4383-a122-c23ba1846d71 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-919717c1-7f5b-4383-a122-c23ba1846d71', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:02:31 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/89f4833c-c825-4548-acda-b617fca43ba3'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:31.519 39 INFO tempest.lib.common.rest_client [req-1615f42a-dec4-4d97-8756-a2af2bdbc559 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.408s 2020-11-06 18:02:31.520 39 DEBUG tempest.lib.common.rest_client [req-1615f42a-dec4-4d97-8756-a2af2bdbc559 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1615f42a-dec4-4d97-8756-a2af2bdbc559', 'x-compute-request-id': 'req-1615f42a-dec4-4d97-8756-a2af2bdbc559', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:31.540 37 INFO tempest.lib.common.rest_client [req-e7f3cc0f-891e-4deb-9130-24d705930ffb ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac 0.517s 2020-11-06 18:02:31.540 37 DEBUG tempest.lib.common.rest_client [req-e7f3cc0f-891e-4deb-9130-24d705930ffb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1541', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e7f3cc0f-891e-4deb-9130-24d705930ffb', 'x-compute-request-id': 'req-e7f3cc0f-891e-4deb-9130-24d705930ffb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac'} Body: b'{"server": {"id": "e62cf5bc-fdb9-402c-b1b0-22ca5336dbac", "name": "tempest-ServerVolumeAttachmentRbacTest-server-1425651703", "status": "BUILD", "tenant_id": "198374b90e3641c39c58226d89b9ccc8", "user_id": "31dfe8b61f554cfe82a18efd5d747c55", "metadata": {}, "hostId": "5360a33e40b4071081b6a940f5afc0dfa9f0bf3525e71fadd36c7a64", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:02:28Z", "updated": "2020-11-06T18:02:30Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033d2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:31.550 40 INFO tempest.lib.common.rest_client [req-430ab546-50bc-4936-b5dc-b7282a9c9c09 ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/2f8ba6cd-b1ff-4dcf-8706-3a80a4ddfb28 0.875s 2020-11-06 18:02:31.551 40 DEBUG tempest.lib.common.rest_client [req-430ab546-50bc-4936-b5dc-b7282a9c9c09 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-430ab546-50bc-4936-b5dc-b7282a9c9c09', 'date': 'Fri, 06 Nov 2020 18:02:31 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/2f8ba6cd-b1ff-4dcf-8706-3a80a4ddfb28'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:31.554 37 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/spawning" after 1 second wait 2020-11-06 18:02:31.642 38 INFO tempest.lib.common.rest_client [req-86c276a5-a1d0-487b-a9dd-495d0bcf8d75 ] Request (L3AgentsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/11af03d25d7a4055863a90e9d11f849f 0.127s 2020-11-06 18:02:31.643 38 DEBUG tempest.lib.common.rest_client [req-86c276a5-a1d0-487b-a9dd-495d0bcf8d75 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-86c276a5-a1d0-487b-a9dd-495d0bcf8d75', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/11af03d25d7a4055863a90e9d11f849f'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:31.732 38 INFO tempest.lib.common.rest_client [req-6f2c0adc-4749-4750-af7b-a59fac41524f ] Request (L3AgentsExtRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 18:02:31.732 38 DEBUG tempest.lib.common.rest_client [req-6f2c0adc-4749-4750-af7b-a59fac41524f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6f2c0adc-4749-4750-af7b-a59fac41524f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["V6oQlKEHTvWySbSGLUhjjQ"], "expires_at": "2020-11-06T19:02:31.000000Z", "issued_at": "2020-11-06T18:02:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:32.197 38 INFO tempest.lib.common.rest_client [req-80b13720-c998-4b34-bc40-02f5a5a92c31 ] Request (L3AgentsExtRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=09881f12c73d453190ea98833e83a3b8&name=default 0.463s 2020-11-06 18:02:32.197 38 DEBUG tempest.lib.common.rest_client [req-80b13720-c998-4b34-bc40-02f5a5a92c31 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-80b13720-c998-4b34-bc40-02f5a5a92c31', 'date': 'Fri, 06 Nov 2020 18:02:32 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=09881f12c73d453190ea98833e83a3b8&name=default'} Body: b'{"security_groups": [{"id": "79f329ee-2165-41f9-bbd6-8c53f5d49b07", "name": "default", "stateful": true, "tenant_id": "09881f12c73d453190ea98833e83a3b8", "description": "Default security group", "security_group_rules": [{"id": "b4d67e48-51ab-416c-b184-f427a4042e2f", "tenant_id": "09881f12c73d453190ea98833e83a3b8", "security_group_id": "79f329ee-2165-41f9-bbd6-8c53f5d49b07", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "79f329ee-2165-41f9-bbd6-8c53f5d49b07", "description": null, "tags": [], "created_at": "2020-11-06T18:02:31Z", "updated_at": "2020-11-06T18:02:31Z", "revision_number": 0, "project_id": "09881f12c73d453190ea98833e83a3b8"}, {"id": "ea6f951a-75d5-4a6c-891b-ffdefc9fdc24", "tenant_id": "09881f12c73d453190ea98833e83a3b8", "security_group_id": "79f329ee-2165-41f9-bbd6-8c53f5d49b07", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:02:31Z", "updated_at": "2020-11-06T18:02:31Z", "revision_number": 0, "project_id": "09881f12c73d453190ea98833e83a3b8"}, {"id": "f88e7090-b864-41d8-a774-1304bbc09803", "tenant_id": "09881f12c73d453190ea98833e83a3b8", "security_group_id": "79f329ee-2165-41f9-bbd6-8c53f5d49b07", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:02:32Z", "updated_at": "2020-11-06T18:02:32Z", "revision_number": 0, "project_id": "09881f12c73d453190ea98833e83a3b8"}, {"id": "f8ed147c-7ac8-4c60-8b9b-d9890cb3888d", "tenant_id": "09881f12c73d453190ea98833e83a3b8", "security_group_id": "79f329ee-2165-41f9-bbd6-8c53f5d49b07", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "79f329ee-2165-41f9-bbd6-8c53f5d49b07", "description": null, "tags": [], "created_at": "2020-11-06T18:02:32Z", "updated_at": "2020-11-06T18:02:32Z", "revision_number": 0, "project_id": "09881f12c73d453190ea98833e83a3b8"}], "tags": [], "created_at": "2020-11-06T18:02:31Z", "updated_at": "2020-11-06T18:02:31Z", "revision_number": 1, "project_id": "09881f12c73d453190ea98833e83a3b8"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:32.375 38 INFO tempest.lib.common.rest_client [req-f83c71f7-558a-4e2d-8f78-a4f7fe666000 ] Request (L3AgentsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/79f329ee-2165-41f9-bbd6-8c53f5d49b07 0.176s 2020-11-06 18:02:32.375 38 DEBUG tempest.lib.common.rest_client [req-f83c71f7-558a-4e2d-8f78-a4f7fe666000 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-f83c71f7-558a-4e2d-8f78-a4f7fe666000', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:02:32 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/79f329ee-2165-41f9-bbd6-8c53f5d49b07'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:32.386 40 INFO tempest.lib.common.rest_client [req-d0836650-ab60-4e5b-a99d-7df173e37c7a ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/6b4d62dd-e4bd-487b-945d-e2074c50baf6 0.835s 2020-11-06 18:02:32.387 40 DEBUG tempest.lib.common.rest_client [req-d0836650-ab60-4e5b-a99d-7df173e37c7a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-d0836650-ab60-4e5b-a99d-7df173e37c7a', 'date': 'Fri, 06 Nov 2020 18:02:32 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/6b4d62dd-e4bd-487b-945d-e2074c50baf6'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:32.516 38 INFO tempest.lib.common.rest_client [req-776aaced-8358-43c8-ab4e-458b8eb0e171 ] Request (L3AgentsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/09881f12c73d453190ea98833e83a3b8 0.140s 2020-11-06 18:02:32.517 38 DEBUG tempest.lib.common.rest_client [req-776aaced-8358-43c8-ab4e-458b8eb0e171 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-776aaced-8358-43c8-ab4e-458b8eb0e171', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/09881f12c73d453190ea98833e83a3b8'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:32.615 38 INFO tempest.lib.common.rest_client [req-db525a54-0bf1-4b5b-b240-dbc67e9e8c9f ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-11-06 18:02:32.616 38 DEBUG tempest.lib.common.rest_client [req-db525a54-0bf1-4b5b-b240-dbc67e9e8c9f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-db525a54-0bf1-4b5b-b240-dbc67e9e8c9f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["OnfpfFEvTHG9AthdDzOOMw"], "expires_at": "2020-11-06T19:02:32.000000Z", "issued_at": "2020-11-06T18:02:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:32.660 38 INFO tempest.lib.common.rest_client [req-2371686c-9489-40c2-9b37-a62d9c84096b ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:02:32.660 38 DEBUG tempest.lib.common.rest_client [req-2371686c-9489-40c2-9b37-a62d9c84096b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2371686c-9489-40c2-9b37-a62d9c84096b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["KcUQRzOTS3qcsxT4h2dEEQ"], "expires_at": "2020-11-06T19:02:32.000000Z", "issued_at": "2020-11-06T18:02:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:32.718 38 INFO tempest.lib.common.rest_client [req-8ae34849-dba3-42dd-9886-7b4507b54dde ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.057s 2020-11-06 18:02:32.719 38 DEBUG tempest.lib.common.rest_client [req-8ae34849-dba3-42dd-9886-7b4507b54dde ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8ae34849-dba3-42dd-9886-7b4507b54dde', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:32.795 38 INFO tempest.lib.common.rest_client [req-6a316ba5-538d-426a-a4dc-e38eefb7e0e5 ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.075s 2020-11-06 18:02:32.795 38 DEBUG tempest.lib.common.rest_client [req-6a316ba5-538d-426a-a4dc-e38eefb7e0e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-DscpMarkingRuleExtRbacTest-1145948194-desc", "domain_id": "default", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '390', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6a316ba5-538d-426a-a4dc-e38eefb7e0e5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "66c19fc59bcf48248be8995500ae56d5", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194", "domain_id": "default", "description": "tempest-DscpMarkingRuleExtRbacTest-1145948194-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:32.892 37 INFO tempest.lib.common.rest_client [req-36f6b783-8771-4886-8343-15566df46519 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac 0.335s 2020-11-06 18:02:32.892 37 DEBUG tempest.lib.common.rest_client [req-36f6b783-8771-4886-8343-15566df46519 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1541', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-36f6b783-8771-4886-8343-15566df46519', 'x-compute-request-id': 'req-36f6b783-8771-4886-8343-15566df46519', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac'} Body: b'{"server": {"id": "e62cf5bc-fdb9-402c-b1b0-22ca5336dbac", "name": "tempest-ServerVolumeAttachmentRbacTest-server-1425651703", "status": "BUILD", "tenant_id": "198374b90e3641c39c58226d89b9ccc8", "user_id": "31dfe8b61f554cfe82a18efd5d747c55", "metadata": {}, "hostId": "5360a33e40b4071081b6a940f5afc0dfa9f0bf3525e71fadd36c7a64", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:02:28Z", "updated": "2020-11-06T18:02:30Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033d2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:32.899 39 INFO tempest.lib.common.rest_client [req-b4ac83d2-b656-4ec7-a6ce-1289d26a2b23 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.365s 2020-11-06 18:02:32.899 39 DEBUG tempest.lib.common.rest_client [req-b4ac83d2-b656-4ec7-a6ce-1289d26a2b23 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b4ac83d2-b656-4ec7-a6ce-1289d26a2b23', 'x-compute-request-id': 'req-b4ac83d2-b656-4ec7-a6ce-1289d26a2b23', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:32.922 38 INFO tempest.lib.common.rest_client [req-7ebab7f4-c3c6-4832-b9e5-4cf0fe8d4790 ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.125s 2020-11-06 18:02:32.922 38 DEBUG tempest.lib.common.rest_client [req-7ebab7f4-c3c6-4832-b9e5-4cf0fe8d4790 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-DscpMarkingRuleExtRbacTest-1145948194", "password": "X7#=6hfSTsga=Sc", "project_id": "66c19fc59bcf48248be8995500ae56d5", "email": "tempest-DscpMarkingRuleExtRbacTest-1954838686@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '408', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7ebab7f4-c3c6-4832-b9e5-4cf0fe8d4790', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "66c19fc59bcf48248be8995500ae56d5", "email": "tempest-DscpMarkingRuleExtRbacTest-1954838686@example.com", "id": "eb409a7f07674d39a75112f4b4ee0cd8", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/eb409a7f07674d39a75112f4b4ee0cd8"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:32.976 38 INFO tempest.lib.common.rest_client [req-b9c27abd-f7dd-4c65-9de9-e48e5c8790d6 ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.053s 2020-11-06 18:02:32.977 38 DEBUG tempest.lib.common.rest_client [req-b9c27abd-f7dd-4c65-9de9-e48e5c8790d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b9c27abd-f7dd-4c65-9de9-e48e5c8790d6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:33.005 40 INFO tempest.lib.common.rest_client [req-cb709052-df9f-403c-81d6-2fe3c53dc63c ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/e4ce18c0-d23f-456a-9d00-0ba568d13e05 0.617s 2020-11-06 18:02:33.006 40 DEBUG tempest.lib.common.rest_client [req-cb709052-df9f-403c-81d6-2fe3c53dc63c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-cb709052-df9f-403c-81d6-2fe3c53dc63c', 'date': 'Fri, 06 Nov 2020 18:02:33 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/e4ce18c0-d23f-456a-9d00-0ba568d13e05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:33.033 38 INFO tempest.lib.common.rest_client [req-e9ee9098-9eaf-4518-a80b-be74e51666af ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-11-06 18:02:33.034 38 DEBUG tempest.lib.common.rest_client [req-e9ee9098-9eaf-4518-a80b-be74e51666af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e9ee9098-9eaf-4518-a80b-be74e51666af', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:33.097 38 INFO tempest.lib.common.rest_client [req-86095716-fe4f-4379-a212-6bee0419c8f6 ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles/72a4576c553448cd941b052c1ca0cf2d 0.062s 2020-11-06 18:02:33.098 38 DEBUG tempest.lib.common.rest_client [req-86095716-fe4f-4379-a212-6bee0419c8f6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-86095716-fe4f-4379-a212-6bee0419c8f6', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:33.098 38 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-DscpMarkingRuleExtRbacTest-1145948194', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '66c19fc59bcf48248be8995500ae56d5', 'project_name': 'tempest-DscpMarkingRuleExtRbacTest-1145948194', 'tenant_id': '66c19fc59bcf48248be8995500ae56d5', 'tenant_name': 'tempest-DscpMarkingRuleExtRbacTest-1145948194', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'eb409a7f07674d39a75112f4b4ee0cd8'}, Network: None, Subnet: None, Router: None 2020-11-06 18:02:33.099 38 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-DscpMarkingRuleExtRbacTest-1145948194', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '66c19fc59bcf48248be8995500ae56d5', 'project_name': 'tempest-DscpMarkingRuleExtRbacTest-1145948194', 'tenant_id': '66c19fc59bcf48248be8995500ae56d5', 'tenant_name': 'tempest-DscpMarkingRuleExtRbacTest-1145948194', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'eb409a7f07674d39a75112f4b4ee0cd8'}, Network: None, Subnet: None, Router: None 2020-11-06 18:02:33.204 38 INFO tempest.lib.common.rest_client [req-78cad5b5-2a24-4b7a-bf61-8f0b4f0f5443 ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-11-06 18:02:33.205 38 DEBUG tempest.lib.common.rest_client [req-78cad5b5-2a24-4b7a-bf61-8f0b4f0f5443 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6583', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-78cad5b5-2a24-4b7a-bf61-8f0b4f0f5443', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eb409a7f07674d39a75112f4b4ee0cd8", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194", "password_expires_at": null}, "audit_ids": ["knMX_Rk5Sh2a0OGzUm2bpw"], "expires_at": "2020-11-06T19:02:33.000000Z", "issued_at": "2020-11-06T18:02:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "66c19fc59bcf48248be8995500ae56d5", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:33.206 38 WARNING tempest.manager [-] tempest.manager.Manager is not a stable interface and as such it should not be imported directly. It will be removed as soon as the client manager becomes available in tempest.lib. 2020-11-06 18:02:33.303 38 INFO tempest.lib.common.rest_client [req-addb8c46-f9ec-4d98-a663-653e7f1e456b ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-11-06 18:02:33.303 38 DEBUG tempest.lib.common.rest_client [req-addb8c46-f9ec-4d98-a663-653e7f1e456b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-addb8c46-f9ec-4d98-a663-653e7f1e456b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["hRID3y0VRre73X2ZhJTlWg"], "expires_at": "2020-11-06T19:02:33.000000Z", "issued_at": "2020-11-06T18:02:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:33.360 38 INFO tempest.lib.common.rest_client [req-1af0b206-ef76-48d5-9dca-40329c261641 ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-11-06 18:02:33.360 38 DEBUG tempest.lib.common.rest_client [req-1af0b206-ef76-48d5-9dca-40329c261641 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1af0b206-ef76-48d5-9dca-40329c261641', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["vug0wxaLSyOA_I6GPkhAcQ"], "expires_at": "2020-11-06T19:02:33.000000Z", "issued_at": "2020-11-06T18:02:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:33.412 38 INFO tempest.lib.common.rest_client [req-e64d9ab2-53ef-4723-8b5a-5e27d4ecba45 ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.051s 2020-11-06 18:02:33.412 38 DEBUG tempest.lib.common.rest_client [req-e64d9ab2-53ef-4723-8b5a-5e27d4ecba45 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e64d9ab2-53ef-4723-8b5a-5e27d4ecba45', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:33.457 38 INFO tempest.lib.common.rest_client [req-2f61f879-ea74-4541-916f-5226add2f679 ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.044s 2020-11-06 18:02:33.458 38 DEBUG tempest.lib.common.rest_client [req-2f61f879-ea74-4541-916f-5226add2f679 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2f61f879-ea74-4541-916f-5226add2f679', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:33.458 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:02:33.459 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:33.513 38 INFO tempest.lib.common.rest_client [req-5e575ab0-0dd5-4f27-b56e-310ffa2d15be ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles 0.053s 2020-11-06 18:02:33.513 38 DEBUG tempest.lib.common.rest_client [req-5e575ab0-0dd5-4f27-b56e-310ffa2d15be ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5e575ab0-0dd5-4f27-b56e-310ffa2d15be', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:33.578 38 INFO tempest.lib.common.rest_client [req-039ae7fa-541b-467d-b40b-12ac4d52914e ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles/72a4576c553448cd941b052c1ca0cf2d 0.064s 2020-11-06 18:02:33.579 38 DEBUG tempest.lib.common.rest_client [req-039ae7fa-541b-467d-b40b-12ac4d52914e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-039ae7fa-541b-467d-b40b-12ac4d52914e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:33.674 38 INFO tempest.lib.common.rest_client [req-9d8cbdb9-6e4b-47ea-82bd-773d9e088188 ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles/a629c95d64b3416fb80ae90af4f69c05 0.094s 2020-11-06 18:02:33.675 38 DEBUG tempest.lib.common.rest_client [req-9d8cbdb9-6e4b-47ea-82bd-773d9e088188 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9d8cbdb9-6e4b-47ea-82bd-773d9e088188', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:33.758 40 INFO tempest.lib.common.rest_client [req-62b2a0b5-733d-46f1-813c-9705a80190cd ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/e218c7fc-d3dc-4c2c-9234-aa97d5412eb7 0.752s 2020-11-06 18:02:33.759 40 DEBUG tempest.lib.common.rest_client [req-62b2a0b5-733d-46f1-813c-9705a80190cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-62b2a0b5-733d-46f1-813c-9705a80190cd', 'date': 'Fri, 06 Nov 2020 18:02:33 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/e218c7fc-d3dc-4c2c-9234-aa97d5412eb7'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:34.179 39 INFO tempest.lib.common.rest_client [req-6e825799-7a2d-42e7-9932-5445b0423c28 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.268s 2020-11-06 18:02:34.179 39 DEBUG tempest.lib.common.rest_client [req-6e825799-7a2d-42e7-9932-5445b0423c28 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6e825799-7a2d-42e7-9932-5445b0423c28', 'x-compute-request-id': 'req-6e825799-7a2d-42e7-9932-5445b0423c28', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:34.214 37 INFO tempest.lib.common.rest_client [req-0a5b37fa-965b-494b-b850-611ecb5da55b ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac 0.299s 2020-11-06 18:02:34.214 37 DEBUG tempest.lib.common.rest_client [req-0a5b37fa-965b-494b-b850-611ecb5da55b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1541', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0a5b37fa-965b-494b-b850-611ecb5da55b', 'x-compute-request-id': 'req-0a5b37fa-965b-494b-b850-611ecb5da55b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac'} Body: b'{"server": {"id": "e62cf5bc-fdb9-402c-b1b0-22ca5336dbac", "name": "tempest-ServerVolumeAttachmentRbacTest-server-1425651703", "status": "BUILD", "tenant_id": "198374b90e3641c39c58226d89b9ccc8", "user_id": "31dfe8b61f554cfe82a18efd5d747c55", "metadata": {}, "hostId": "5360a33e40b4071081b6a940f5afc0dfa9f0bf3525e71fadd36c7a64", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:02:28Z", "updated": "2020-11-06T18:02:30Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033d2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:34.315 40 INFO tempest.lib.common.rest_client [req-cecc49e0-fe2c-4de4-b200-8bd9f3dc8ac8 ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/6dab2f10-428e-4a16-a2a0-bc153f1d8c9c 0.554s 2020-11-06 18:02:34.315 40 DEBUG tempest.lib.common.rest_client [req-cecc49e0-fe2c-4de4-b200-8bd9f3dc8ac8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-cecc49e0-fe2c-4de4-b200-8bd9f3dc8ac8', 'date': 'Fri, 06 Nov 2020 18:02:34 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/6dab2f10-428e-4a16-a2a0-bc153f1d8c9c'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:34.767 38 INFO tempest.lib.common.rest_client [req-965e813b-3d2b-4174-9b98-ed50b5b035c0 ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-11-06 18:02:34.768 38 DEBUG tempest.lib.common.rest_client [req-965e813b-3d2b-4174-9b98-ed50b5b035c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-965e813b-3d2b-4174-9b98-ed50b5b035c0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eb409a7f07674d39a75112f4b4ee0cd8", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194", "password_expires_at": null}, "audit_ids": ["22cpUCKVTam0cNCzynxxZA"], "expires_at": "2020-11-06T19:02:34.000000Z", "issued_at": "2020-11-06T18:02:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "66c19fc59bcf48248be8995500ae56d5", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:34.802 38 INFO tempest.lib.common.rest_client [req-3ee3244e-c9da-46c2-a290-306163cc44ff ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:02:34.803 38 DEBUG tempest.lib.common.rest_client [req-3ee3244e-c9da-46c2-a290-306163cc44ff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3ee3244e-c9da-46c2-a290-306163cc44ff', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eb409a7f07674d39a75112f4b4ee0cd8", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194", "password_expires_at": null}, "audit_ids": ["Zfo7REFJSeCVlyAIJfSSnw"], "expires_at": "2020-11-06T19:02:34.000000Z", "issued_at": "2020-11-06T18:02:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "66c19fc59bcf48248be8995500ae56d5", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:34.920 38 INFO tempest.lib.common.rest_client [req-27f87546-14e3-41f9-9acc-b49e9425084d ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/qos/policies 0.115s 2020-11-06 18:02:34.921 38 DEBUG tempest.lib.common.rest_client [req-27f87546-14e3-41f9-9acc-b49e9425084d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"policy": {"name": "tempest-DscpMarkingRuleExtRbacTest-qos-555823805", "shared": false, "is_default": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '397', 'x-openstack-request-id': 'req-27f87546-14e3-41f9-9acc-b49e9425084d', 'date': 'Fri, 06 Nov 2020 18:02:34 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies'} Body: b'{"policy": {"id": "440f844d-32a3-4a0c-8273-51115a4e73ee", "project_id": "66c19fc59bcf48248be8995500ae56d5", "name": "tempest-DscpMarkingRuleExtRbacTest-qos-555823805", "shared": false, "rules": [], "is_default": false, "revision_number": 0, "description": "", "created_at": "2020-11-06T18:02:34Z", "updated_at": "2020-11-06T18:02:34Z", "tenant_id": "66c19fc59bcf48248be8995500ae56d5", "tags": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:34.922 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:34.925 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_policy_dscp_marking_rule, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:34.925 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:35.035 38 INFO tempest.lib.common.rest_client [req-b7ed2ef8-a23f-4796-88df-48455ae9f7c4 ] Request (DscpMarkingRuleExtRbacTest:test_create_policy_dscp_marking_rule): 200 GET http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles 0.109s 2020-11-06 18:02:35.036 38 DEBUG tempest.lib.common.rest_client [req-b7ed2ef8-a23f-4796-88df-48455ae9f7c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b7ed2ef8-a23f-4796-88df-48455ae9f7c4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:35.072 38 INFO tempest.lib.common.rest_client [req-f963e020-79a2-40cc-94a2-c29dd298c02e ] Request (DscpMarkingRuleExtRbacTest:test_create_policy_dscp_marking_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:02:35.073 38 DEBUG tempest.lib.common.rest_client [req-f963e020-79a2-40cc-94a2-c29dd298c02e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f963e020-79a2-40cc-94a2-c29dd298c02e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eb409a7f07674d39a75112f4b4ee0cd8", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194", "password_expires_at": null}, "audit_ids": ["IcK_P3JrQs2ZwD1sHoY2bw"], "expires_at": "2020-11-06T19:02:35.000000Z", "issued_at": "2020-11-06T18:02:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "66c19fc59bcf48248be8995500ae56d5", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:35.112 38 INFO tempest.lib.common.rest_client [req-27945037-af9a-406f-8e5c-538501e7a683 ] Request (DscpMarkingRuleExtRbacTest:test_create_policy_dscp_marking_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:02:35.112 38 DEBUG tempest.lib.common.rest_client [req-27945037-af9a-406f-8e5c-538501e7a683 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-27945037-af9a-406f-8e5c-538501e7a683', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eb409a7f07674d39a75112f4b4ee0cd8", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194", "password_expires_at": null}, "audit_ids": ["X1FEpM04Qoivh8xu43dI9A"], "expires_at": "2020-11-06T19:02:35.000000Z", "issued_at": "2020-11-06T18:02:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "66c19fc59bcf48248be8995500ae56d5", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:35.114 38 DEBUG tempest.lib.common.utils.test_utils [-] Sane call name not found in ['_log_request_start', 'raw_request', '_request', 'request', 'post', 'create_dscp_marking_rule', 'create_policy_dscp_marking_rule'] find_test_caller /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/utils/test_utils.py:77 2020-11-06 18:02:35.280 38 DEBUG tempest.lib.common.utils.test_utils [-] Sane call name not found in ['_log_request', 'raw_request', '_request', 'request', 'post', 'create_dscp_marking_rule', 'create_policy_dscp_marking_rule'] find_test_caller /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/utils/test_utils.py:77 2020-11-06 18:02:35.280 38 INFO tempest.lib.common.rest_client [req-ce6850f0-c404-431d-b8ca-a2a90c3099a6 ] Request (None): 201 POST http://172.30.13.94:9696/v2.0/qos/policies/440f844d-32a3-4a0c-8273-51115a4e73ee/dscp_marking_rules 0.166s 2020-11-06 18:02:35.280 38 DEBUG tempest.lib.common.rest_client [req-ce6850f0-c404-431d-b8ca-a2a90c3099a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"dscp_marking_rule": {"dscp_mark": 10}} Response - Headers: {'content-type': 'application/json', 'content-length': '86', 'x-openstack-request-id': 'req-ce6850f0-c404-431d-b8ca-a2a90c3099a6', 'date': 'Fri, 06 Nov 2020 18:02:35 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/440f844d-32a3-4a0c-8273-51115a4e73ee/dscp_marking_rules'} Body: b'{"dscp_marking_rule": {"dscp_mark": 10, "id": "0f83ff67-6f60-4614-af38-2d0431f07150"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:35.281 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:35.338 38 INFO tempest.lib.common.rest_client [req-bb69f990-1730-4d39-bf6f-e7bdd83cebe6 ] Request (DscpMarkingRuleExtRbacTest:test_create_policy_dscp_marking_rule): 200 GET http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles 0.057s 2020-11-06 18:02:35.339 38 DEBUG tempest.lib.common.rest_client [req-bb69f990-1730-4d39-bf6f-e7bdd83cebe6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bb69f990-1730-4d39-bf6f-e7bdd83cebe6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:35.382 38 INFO tempest.lib.common.rest_client [req-2a0de88d-3534-48ab-84e5-dd887d822d6e ] Request (DscpMarkingRuleExtRbacTest:test_create_policy_dscp_marking_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-11-06 18:02:35.382 38 DEBUG tempest.lib.common.rest_client [req-2a0de88d-3534-48ab-84e5-dd887d822d6e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2a0de88d-3534-48ab-84e5-dd887d822d6e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eb409a7f07674d39a75112f4b4ee0cd8", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194", "password_expires_at": null}, "audit_ids": ["p9m7c-xOSMu1vW3bxv84cQ"], "expires_at": "2020-11-06T19:02:35.000000Z", "issued_at": "2020-11-06T18:02:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "66c19fc59bcf48248be8995500ae56d5", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:35.418 38 INFO tempest.lib.common.rest_client [req-f63ce4a7-ea2c-4605-8a3d-3dcb70e0244f ] Request (DscpMarkingRuleExtRbacTest:test_create_policy_dscp_marking_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:02:35.419 38 DEBUG tempest.lib.common.rest_client [req-f63ce4a7-ea2c-4605-8a3d-3dcb70e0244f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f63ce4a7-ea2c-4605-8a3d-3dcb70e0244f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eb409a7f07674d39a75112f4b4ee0cd8", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194", "password_expires_at": null}, "audit_ids": ["ZfJ0rIymRWa5uAyRTrcIzg"], "expires_at": "2020-11-06T19:02:35.000000Z", "issued_at": "2020-11-06T18:02:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "66c19fc59bcf48248be8995500ae56d5", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:35.577 38 INFO tempest.lib.common.rest_client [req-5d66513c-74c6-44b8-9cfe-94525db45298 ] Request (DscpMarkingRuleExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/440f844d-32a3-4a0c-8273-51115a4e73ee/dscp_marking_rules/0f83ff67-6f60-4614-af38-2d0431f07150 0.157s 2020-11-06 18:02:35.578 38 DEBUG tempest.lib.common.rest_client [req-5d66513c-74c6-44b8-9cfe-94525db45298 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-5d66513c-74c6-44b8-9cfe-94525db45298', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:02:35 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/440f844d-32a3-4a0c-8273-51115a4e73ee/dscp_marking_rules/0f83ff67-6f60-4614-af38-2d0431f07150'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:35.581 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:35.585 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_policy_dscp_marking_rule, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:35.585 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:35.589 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_policy_dscp_marking_rule, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:35.590 38 DEBUG tempest.lib.common.utils.test_utils [-] Sane call name not found in ['_log_request_start', 'raw_request', '_request', 'request', 'post', 'create_dscp_marking_rule', 'create_policy_dscp_marking_rule'] find_test_caller /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/utils/test_utils.py:77 2020-11-06 18:02:35.721 38 DEBUG tempest.lib.common.utils.test_utils [-] Sane call name not found in ['_log_request', 'raw_request', '_request', 'request', 'post', 'create_dscp_marking_rule', 'create_policy_dscp_marking_rule'] find_test_caller /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/utils/test_utils.py:77 2020-11-06 18:02:35.721 38 INFO tempest.lib.common.rest_client [req-4568858d-8fe5-4670-be4f-e7abe4a51834 ] Request (None): 201 POST http://172.30.13.94:9696/v2.0/qos/policies/440f844d-32a3-4a0c-8273-51115a4e73ee/dscp_marking_rules 0.131s 2020-11-06 18:02:35.722 38 DEBUG tempest.lib.common.rest_client [req-4568858d-8fe5-4670-be4f-e7abe4a51834 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"dscp_marking_rule": {"dscp_mark": 10}} Response - Headers: {'content-type': 'application/json', 'content-length': '86', 'x-openstack-request-id': 'req-4568858d-8fe5-4670-be4f-e7abe4a51834', 'date': 'Fri, 06 Nov 2020 18:02:35 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/440f844d-32a3-4a0c-8273-51115a4e73ee/dscp_marking_rules'} Body: b'{"dscp_marking_rule": {"dscp_mark": 10, "id": "416fc9da-896f-4991-8f95-19d2a94e76d7"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:35.722 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:35.780 38 INFO tempest.lib.common.rest_client [req-d4635937-42ab-4940-b546-3e986ad00602 ] Request (DscpMarkingRuleExtRbacTest:test_delete_policy_dscp_marking_rule): 200 GET http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles 0.056s 2020-11-06 18:02:35.781 38 DEBUG tempest.lib.common.rest_client [req-d4635937-42ab-4940-b546-3e986ad00602 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d4635937-42ab-4940-b546-3e986ad00602', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:35.815 38 INFO tempest.lib.common.rest_client [req-b4970395-9a81-44f1-bcca-68631a0c6904 ] Request (DscpMarkingRuleExtRbacTest:test_delete_policy_dscp_marking_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:02:35.815 38 DEBUG tempest.lib.common.rest_client [req-b4970395-9a81-44f1-bcca-68631a0c6904 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b4970395-9a81-44f1-bcca-68631a0c6904', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eb409a7f07674d39a75112f4b4ee0cd8", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194", "password_expires_at": null}, "audit_ids": ["yXHFW00nQ72AhnoR0bt96g"], "expires_at": "2020-11-06T19:02:35.000000Z", "issued_at": "2020-11-06T18:02:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "66c19fc59bcf48248be8995500ae56d5", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:35.849 38 INFO tempest.lib.common.rest_client [req-b20313f3-0205-48bc-8498-4ea15dd99ee7 ] Request (DscpMarkingRuleExtRbacTest:test_delete_policy_dscp_marking_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:02:35.850 38 DEBUG tempest.lib.common.rest_client [req-b20313f3-0205-48bc-8498-4ea15dd99ee7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b20313f3-0205-48bc-8498-4ea15dd99ee7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eb409a7f07674d39a75112f4b4ee0cd8", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194", "password_expires_at": null}, "audit_ids": ["n5EXXj4EQXSnuO3LJQui-A"], "expires_at": "2020-11-06T19:02:35.000000Z", "issued_at": "2020-11-06T18:02:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "66c19fc59bcf48248be8995500ae56d5", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:35.997 38 INFO tempest.lib.common.rest_client [req-da72f019-8266-4e8b-8a79-0defa73d574b ] Request (DscpMarkingRuleExtRbacTest:test_delete_policy_dscp_marking_rule): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/440f844d-32a3-4a0c-8273-51115a4e73ee/dscp_marking_rules/416fc9da-896f-4991-8f95-19d2a94e76d7 0.145s 2020-11-06 18:02:35.998 38 DEBUG tempest.lib.common.rest_client [req-da72f019-8266-4e8b-8a79-0defa73d574b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-da72f019-8266-4e8b-8a79-0defa73d574b', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:02:35 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/440f844d-32a3-4a0c-8273-51115a4e73ee/dscp_marking_rules/416fc9da-896f-4991-8f95-19d2a94e76d7'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:35.998 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:36.040 37 INFO tempest.lib.common.rest_client [req-c225c56d-1c3d-4b3b-8511-5ed7e17b8340 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac 0.813s 2020-11-06 18:02:36.040 37 DEBUG tempest.lib.common.rest_client [req-c225c56d-1c3d-4b3b-8511-5ed7e17b8340 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1541', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c225c56d-1c3d-4b3b-8511-5ed7e17b8340', 'x-compute-request-id': 'req-c225c56d-1c3d-4b3b-8511-5ed7e17b8340', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac'} Body: b'{"server": {"id": "e62cf5bc-fdb9-402c-b1b0-22ca5336dbac", "name": "tempest-ServerVolumeAttachmentRbacTest-server-1425651703", "status": "BUILD", "tenant_id": "198374b90e3641c39c58226d89b9ccc8", "user_id": "31dfe8b61f554cfe82a18efd5d747c55", "metadata": {}, "hostId": "5360a33e40b4071081b6a940f5afc0dfa9f0bf3525e71fadd36c7a64", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:02:28Z", "updated": "2020-11-06T18:02:30Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033d2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:36.044 39 INFO tempest.lib.common.rest_client [req-e2c73cec-ad69-4f59-9e05-0c6426d92e8f ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.851s 2020-11-06 18:02:36.045 39 DEBUG tempest.lib.common.rest_client [req-e2c73cec-ad69-4f59-9e05-0c6426d92e8f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e2c73cec-ad69-4f59-9e05-0c6426d92e8f', 'x-compute-request-id': 'req-e2c73cec-ad69-4f59-9e05-0c6426d92e8f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:36.056 38 INFO tempest.lib.common.rest_client [req-184e53c1-1e02-4148-8a5d-963cb15b226f ] Request (DscpMarkingRuleExtRbacTest:test_delete_policy_dscp_marking_rule): 200 GET http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles 0.057s 2020-11-06 18:02:36.057 38 DEBUG tempest.lib.common.rest_client [req-184e53c1-1e02-4148-8a5d-963cb15b226f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-184e53c1-1e02-4148-8a5d-963cb15b226f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:36.094 38 INFO tempest.lib.common.rest_client [req-78d38a76-63af-424f-b28d-e390f1f6a789 ] Request (DscpMarkingRuleExtRbacTest:test_delete_policy_dscp_marking_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:02:36.095 38 DEBUG tempest.lib.common.rest_client [req-78d38a76-63af-424f-b28d-e390f1f6a789 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-78d38a76-63af-424f-b28d-e390f1f6a789', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eb409a7f07674d39a75112f4b4ee0cd8", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194", "password_expires_at": null}, "audit_ids": ["4IyOG2GQSImg5XdJwsE6mg"], "expires_at": "2020-11-06T19:02:36.000000Z", "issued_at": "2020-11-06T18:02:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "66c19fc59bcf48248be8995500ae56d5", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:36.129 38 INFO tempest.lib.common.rest_client [req-36f60e2f-ead8-442d-b188-753981cbde3f ] Request (DscpMarkingRuleExtRbacTest:test_delete_policy_dscp_marking_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:02:36.129 38 DEBUG tempest.lib.common.rest_client [req-36f60e2f-ead8-442d-b188-753981cbde3f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-36f60e2f-ead8-442d-b188-753981cbde3f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eb409a7f07674d39a75112f4b4ee0cd8", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194", "password_expires_at": null}, "audit_ids": ["F0QfXl03RsCHLSkaMXIuhw"], "expires_at": "2020-11-06T19:02:36.000000Z", "issued_at": "2020-11-06T18:02:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "66c19fc59bcf48248be8995500ae56d5", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:36.225 38 INFO tempest.lib.common.rest_client [req-674632a4-6627-4dc2-8cc7-8488e9d9113b ] Request (DscpMarkingRuleExtRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94:9696/v2.0/qos/policies/440f844d-32a3-4a0c-8273-51115a4e73ee/dscp_marking_rules/416fc9da-896f-4991-8f95-19d2a94e76d7 0.095s 2020-11-06 18:02:36.226 38 DEBUG tempest.lib.common.rest_client [req-674632a4-6627-4dc2-8cc7-8488e9d9113b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '187', 'x-openstack-request-id': 'req-674632a4-6627-4dc2-8cc7-8488e9d9113b', 'date': 'Fri, 06 Nov 2020 18:02:36 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/440f844d-32a3-4a0c-8273-51115a4e73ee/dscp_marking_rules/416fc9da-896f-4991-8f95-19d2a94e76d7'} Body: b'{"NeutronError": {"type": "QosRuleNotFound", "message": "QoS rule 416fc9da-896f-4991-8f95-19d2a94e76d7 for policy 440f844d-32a3-4a0c-8273-51115a4e73ee could not be found.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:36.229 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:36.233 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_policy_dscp_marking_rule, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:36.234 38 DEBUG tempest.lib.common.utils.test_utils [-] Sane call name not found in ['_log_request_start', 'raw_request', '_request', 'request', 'post', 'create_dscp_marking_rule', 'create_policy_dscp_marking_rule'] find_test_caller /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/utils/test_utils.py:77 2020-11-06 18:02:36.322 38 DEBUG tempest.lib.common.utils.test_utils [-] Sane call name not found in ['_log_request', 'raw_request', '_request', 'request', 'post', 'create_dscp_marking_rule', 'create_policy_dscp_marking_rule'] find_test_caller /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/utils/test_utils.py:77 2020-11-06 18:02:36.322 38 INFO tempest.lib.common.rest_client [req-d5545e0c-ec56-420d-a9ef-424b97f2a8c0 ] Request (None): 201 POST http://172.30.13.94:9696/v2.0/qos/policies/440f844d-32a3-4a0c-8273-51115a4e73ee/dscp_marking_rules 0.088s 2020-11-06 18:02:36.322 38 DEBUG tempest.lib.common.rest_client [req-d5545e0c-ec56-420d-a9ef-424b97f2a8c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"dscp_marking_rule": {"dscp_mark": 10}} Response - Headers: {'content-type': 'application/json', 'content-length': '86', 'x-openstack-request-id': 'req-d5545e0c-ec56-420d-a9ef-424b97f2a8c0', 'date': 'Fri, 06 Nov 2020 18:02:36 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/440f844d-32a3-4a0c-8273-51115a4e73ee/dscp_marking_rules'} Body: b'{"dscp_marking_rule": {"dscp_mark": 10, "id": "88d0a502-0a6c-436d-96fe-548a55a4c9f2"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:36.323 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:36.383 38 INFO tempest.lib.common.rest_client [req-444c4935-1a46-4b80-9320-4df027abaa23 ] Request (DscpMarkingRuleExtRbacTest:test_list_policy_dscp_marking_rules): 200 GET http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles 0.060s 2020-11-06 18:02:36.384 38 DEBUG tempest.lib.common.rest_client [req-444c4935-1a46-4b80-9320-4df027abaa23 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-444c4935-1a46-4b80-9320-4df027abaa23', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:36.426 38 INFO tempest.lib.common.rest_client [req-84ab0c60-44ab-479f-905d-6c676dce76d0 ] Request (DscpMarkingRuleExtRbacTest:test_list_policy_dscp_marking_rules): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-11-06 18:02:36.427 38 DEBUG tempest.lib.common.rest_client [req-84ab0c60-44ab-479f-905d-6c676dce76d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-84ab0c60-44ab-479f-905d-6c676dce76d0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eb409a7f07674d39a75112f4b4ee0cd8", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194", "password_expires_at": null}, "audit_ids": ["wjeVIRHpSFq55q0r5J8WKQ"], "expires_at": "2020-11-06T19:02:36.000000Z", "issued_at": "2020-11-06T18:02:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "66c19fc59bcf48248be8995500ae56d5", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:36.468 38 INFO tempest.lib.common.rest_client [req-23fe2603-5911-42af-a470-9b180af4c374 ] Request (DscpMarkingRuleExtRbacTest:test_list_policy_dscp_marking_rules): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:02:36.468 38 DEBUG tempest.lib.common.rest_client [req-23fe2603-5911-42af-a470-9b180af4c374 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-23fe2603-5911-42af-a470-9b180af4c374', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eb409a7f07674d39a75112f4b4ee0cd8", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194", "password_expires_at": null}, "audit_ids": ["FmlcBR0_Q2CWLTpcB0XMZg"], "expires_at": "2020-11-06T19:02:36.000000Z", "issued_at": "2020-11-06T18:02:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "66c19fc59bcf48248be8995500ae56d5", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:36.587 38 INFO tempest.lib.common.rest_client [req-0f6ac958-1cba-452c-8f55-158b04780ff2 ] Request (DscpMarkingRuleExtRbacTest:test_list_policy_dscp_marking_rules): 200 GET http://172.30.13.94:9696/v2.0/qos/policies/440f844d-32a3-4a0c-8273-51115a4e73ee/dscp_marking_rules 0.117s 2020-11-06 18:02:36.588 38 DEBUG tempest.lib.common.rest_client [req-0f6ac958-1cba-452c-8f55-158b04780ff2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '89', 'x-openstack-request-id': 'req-0f6ac958-1cba-452c-8f55-158b04780ff2', 'date': 'Fri, 06 Nov 2020 18:02:36 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/440f844d-32a3-4a0c-8273-51115a4e73ee/dscp_marking_rules'} Body: b'{"dscp_marking_rules": [{"dscp_mark": 10, "id": "88d0a502-0a6c-436d-96fe-548a55a4c9f2"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:36.589 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:36.650 38 INFO tempest.lib.common.rest_client [req-ae4e428a-b00f-4ba5-80b3-7491f7b3c9d4 ] Request (DscpMarkingRuleExtRbacTest:test_list_policy_dscp_marking_rules): 200 GET http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles 0.060s 2020-11-06 18:02:36.651 38 DEBUG tempest.lib.common.rest_client [req-ae4e428a-b00f-4ba5-80b3-7491f7b3c9d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ae4e428a-b00f-4ba5-80b3-7491f7b3c9d4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:36.685 38 INFO tempest.lib.common.rest_client [req-5d309859-740d-482b-9056-88d24c8cdcdd ] Request (DscpMarkingRuleExtRbacTest:test_list_policy_dscp_marking_rules): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:02:36.685 38 DEBUG tempest.lib.common.rest_client [req-5d309859-740d-482b-9056-88d24c8cdcdd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5d309859-740d-482b-9056-88d24c8cdcdd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eb409a7f07674d39a75112f4b4ee0cd8", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194", "password_expires_at": null}, "audit_ids": ["ykwZTvZsTCGikfmIkhzYvQ"], "expires_at": "2020-11-06T19:02:36.000000Z", "issued_at": "2020-11-06T18:02:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "66c19fc59bcf48248be8995500ae56d5", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:36.722 38 INFO tempest.lib.common.rest_client [req-a4366328-d38a-4037-81a9-f63799439f76 ] Request (DscpMarkingRuleExtRbacTest:test_list_policy_dscp_marking_rules): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:02:36.722 38 DEBUG tempest.lib.common.rest_client [req-a4366328-d38a-4037-81a9-f63799439f76 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a4366328-d38a-4037-81a9-f63799439f76', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eb409a7f07674d39a75112f4b4ee0cd8", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194", "password_expires_at": null}, "audit_ids": ["t-OEztyjS2y__Ax_kCTrEw"], "expires_at": "2020-11-06T19:02:36.000000Z", "issued_at": "2020-11-06T18:02:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "66c19fc59bcf48248be8995500ae56d5", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:36.857 38 INFO tempest.lib.common.rest_client [req-2a4d1475-e3fb-499f-83fd-b510d7d703dd ] Request (DscpMarkingRuleExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/440f844d-32a3-4a0c-8273-51115a4e73ee/dscp_marking_rules/88d0a502-0a6c-436d-96fe-548a55a4c9f2 0.133s 2020-11-06 18:02:36.857 38 DEBUG tempest.lib.common.rest_client [req-2a4d1475-e3fb-499f-83fd-b510d7d703dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-2a4d1475-e3fb-499f-83fd-b510d7d703dd', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:02:36 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/440f844d-32a3-4a0c-8273-51115a4e73ee/dscp_marking_rules/88d0a502-0a6c-436d-96fe-548a55a4c9f2'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:36.860 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:36.864 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_policy_dscp_marking_rule, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:36.865 38 DEBUG tempest.lib.common.utils.test_utils [-] Sane call name not found in ['_log_request_start', 'raw_request', '_request', 'request', 'post', 'create_dscp_marking_rule', 'create_policy_dscp_marking_rule'] find_test_caller /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/utils/test_utils.py:77 2020-11-06 18:02:36.972 38 DEBUG tempest.lib.common.utils.test_utils [-] Sane call name not found in ['_log_request', 'raw_request', '_request', 'request', 'post', 'create_dscp_marking_rule', 'create_policy_dscp_marking_rule'] find_test_caller /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/utils/test_utils.py:77 2020-11-06 18:02:36.973 38 INFO tempest.lib.common.rest_client [req-859dd47e-e572-4966-ad2c-cca8d07e1a08 ] Request (None): 201 POST http://172.30.13.94:9696/v2.0/qos/policies/440f844d-32a3-4a0c-8273-51115a4e73ee/dscp_marking_rules 0.107s 2020-11-06 18:02:36.973 38 DEBUG tempest.lib.common.rest_client [req-859dd47e-e572-4966-ad2c-cca8d07e1a08 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"dscp_marking_rule": {"dscp_mark": 10}} Response - Headers: {'content-type': 'application/json', 'content-length': '86', 'x-openstack-request-id': 'req-859dd47e-e572-4966-ad2c-cca8d07e1a08', 'date': 'Fri, 06 Nov 2020 18:02:36 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/440f844d-32a3-4a0c-8273-51115a4e73ee/dscp_marking_rules'} Body: b'{"dscp_marking_rule": {"dscp_mark": 10, "id": "9464c248-9d36-4b5b-bf12-a5013c343b42"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:36.974 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:37.037 38 INFO tempest.lib.common.rest_client [req-2c779b47-9ea6-4ea8-b13a-622b5711994b ] Request (DscpMarkingRuleExtRbacTest:test_show_policy_dscp_marking_rule): 200 GET http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles 0.062s 2020-11-06 18:02:37.038 38 DEBUG tempest.lib.common.rest_client [req-2c779b47-9ea6-4ea8-b13a-622b5711994b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2c779b47-9ea6-4ea8-b13a-622b5711994b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:37.077 38 INFO tempest.lib.common.rest_client [req-796fc0d8-06da-467a-93f4-4aa42c5782e0 ] Request (DscpMarkingRuleExtRbacTest:test_show_policy_dscp_marking_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:02:37.078 38 DEBUG tempest.lib.common.rest_client [req-796fc0d8-06da-467a-93f4-4aa42c5782e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-796fc0d8-06da-467a-93f4-4aa42c5782e0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eb409a7f07674d39a75112f4b4ee0cd8", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194", "password_expires_at": null}, "audit_ids": ["dr3tsTSaQNeV3kXu_KU8hg"], "expires_at": "2020-11-06T19:02:37.000000Z", "issued_at": "2020-11-06T18:02:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "66c19fc59bcf48248be8995500ae56d5", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:37.115 38 INFO tempest.lib.common.rest_client [req-13f615d0-b05d-4c30-94c1-2201e7878e70 ] Request (DscpMarkingRuleExtRbacTest:test_show_policy_dscp_marking_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:02:37.116 38 DEBUG tempest.lib.common.rest_client [req-13f615d0-b05d-4c30-94c1-2201e7878e70 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-13f615d0-b05d-4c30-94c1-2201e7878e70', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eb409a7f07674d39a75112f4b4ee0cd8", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194", "password_expires_at": null}, "audit_ids": ["GaUSvDNORvK0jJjHJDxJOg"], "expires_at": "2020-11-06T19:02:37.000000Z", "issued_at": "2020-11-06T18:02:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "66c19fc59bcf48248be8995500ae56d5", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:37.128 40 INFO tempest.lib.common.rest_client [req-39f91bd5-de83-4204-aa7d-76f6ef6c82c1 ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/586884b2-4363-4597-acb0-ddbc49908b65 2.812s 2020-11-06 18:02:37.128 40 DEBUG tempest.lib.common.rest_client [req-39f91bd5-de83-4204-aa7d-76f6ef6c82c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-39f91bd5-de83-4204-aa7d-76f6ef6c82c1', 'date': 'Fri, 06 Nov 2020 18:02:37 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/586884b2-4363-4597-acb0-ddbc49908b65'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:37.201 38 INFO tempest.lib.common.rest_client [req-25fb064e-26a8-4146-9170-167e2d04949e ] Request (DscpMarkingRuleExtRbacTest:test_show_policy_dscp_marking_rule): 200 GET http://172.30.13.94:9696/v2.0/qos/policies/440f844d-32a3-4a0c-8273-51115a4e73ee/dscp_marking_rules/9464c248-9d36-4b5b-bf12-a5013c343b42 0.084s 2020-11-06 18:02:37.202 38 DEBUG tempest.lib.common.rest_client [req-25fb064e-26a8-4146-9170-167e2d04949e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '86', 'x-openstack-request-id': 'req-25fb064e-26a8-4146-9170-167e2d04949e', 'date': 'Fri, 06 Nov 2020 18:02:37 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/440f844d-32a3-4a0c-8273-51115a4e73ee/dscp_marking_rules/9464c248-9d36-4b5b-bf12-a5013c343b42'} Body: b'{"dscp_marking_rule": {"dscp_mark": 10, "id": "9464c248-9d36-4b5b-bf12-a5013c343b42"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:37.202 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:37.256 38 INFO tempest.lib.common.rest_client [req-47c678fb-e1f1-4def-91ee-daef1a0c2598 ] Request (DscpMarkingRuleExtRbacTest:test_show_policy_dscp_marking_rule): 200 GET http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles 0.052s 2020-11-06 18:02:37.256 38 DEBUG tempest.lib.common.rest_client [req-47c678fb-e1f1-4def-91ee-daef1a0c2598 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-47c678fb-e1f1-4def-91ee-daef1a0c2598', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:37.263 40 INFO tempest.lib.common.rest_client [req-67b54871-a9d8-4464-930e-92ec01ce5676 ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/eca9e2d75b3d43ebb62aa386f11363f5 0.133s 2020-11-06 18:02:37.263 40 DEBUG tempest.lib.common.rest_client [req-67b54871-a9d8-4464-930e-92ec01ce5676 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-67b54871-a9d8-4464-930e-92ec01ce5676', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/eca9e2d75b3d43ebb62aa386f11363f5'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:37.338 38 INFO tempest.lib.common.rest_client [req-5152edf0-1deb-45a2-87ee-6f772f967b09 ] Request (DscpMarkingRuleExtRbacTest:test_show_policy_dscp_marking_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.080s 2020-11-06 18:02:37.339 38 DEBUG tempest.lib.common.rest_client [req-5152edf0-1deb-45a2-87ee-6f772f967b09 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5152edf0-1deb-45a2-87ee-6f772f967b09', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eb409a7f07674d39a75112f4b4ee0cd8", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194", "password_expires_at": null}, "audit_ids": ["gpCszax5TI2MCMKkiq8FwA"], "expires_at": "2020-11-06T19:02:37.000000Z", "issued_at": "2020-11-06T18:02:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "66c19fc59bcf48248be8995500ae56d5", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:37.346 40 INFO tempest.lib.common.rest_client [req-7206bc87-ecff-4dd8-98a6-9e72c30474e7 ] Request (PortsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 18:02:37.347 40 DEBUG tempest.lib.common.rest_client [req-7206bc87-ecff-4dd8-98a6-9e72c30474e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7206bc87-ecff-4dd8-98a6-9e72c30474e7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["hVCqcA4xSNiPdDopm-E2_Q"], "expires_at": "2020-11-06T19:02:37.000000Z", "issued_at": "2020-11-06T18:02:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:37.359 39 INFO tempest.lib.common.rest_client [req-b279502e-3ead-40d3-908e-b79aad13f563 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.299s 2020-11-06 18:02:37.360 39 DEBUG tempest.lib.common.rest_client [req-b279502e-3ead-40d3-908e-b79aad13f563 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b279502e-3ead-40d3-908e-b79aad13f563', 'x-compute-request-id': 'req-b279502e-3ead-40d3-908e-b79aad13f563', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:37.361 37 INFO tempest.lib.common.rest_client [req-6abca67c-ec82-402d-afe1-d4bc03435eea ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac 0.305s 2020-11-06 18:02:37.362 37 DEBUG tempest.lib.common.rest_client [req-6abca67c-ec82-402d-afe1-d4bc03435eea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1737', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6abca67c-ec82-402d-afe1-d4bc03435eea', 'x-compute-request-id': 'req-6abca67c-ec82-402d-afe1-d4bc03435eea', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac'} Body: b'{"server": {"id": "e62cf5bc-fdb9-402c-b1b0-22ca5336dbac", "name": "tempest-ServerVolumeAttachmentRbacTest-server-1425651703", "status": "ACTIVE", "tenant_id": "198374b90e3641c39c58226d89b9ccc8", "user_id": "31dfe8b61f554cfe82a18efd5d747c55", "metadata": {}, "hostId": "5360a33e40b4071081b6a940f5afc0dfa9f0bf3525e71fadd36c7a64", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:02:28Z", "updated": "2020-11-06T18:02:36Z", "addresses": {"tempest-ServerVolumeAttachmentRbacTest-1258567035-network": [{"version": 4, "addr": "192.168.120.14", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:e4:1b:3a"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:02:36.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033d2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:37.373 38 INFO tempest.lib.common.rest_client [req-79e77f7e-1193-44d2-8124-98194ab4b523 ] Request (DscpMarkingRuleExtRbacTest:test_show_policy_dscp_marking_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:02:37.374 38 DEBUG tempest.lib.common.rest_client [req-79e77f7e-1193-44d2-8124-98194ab4b523 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-79e77f7e-1193-44d2-8124-98194ab4b523', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eb409a7f07674d39a75112f4b4ee0cd8", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194", "password_expires_at": null}, "audit_ids": ["fPOLE9ZkSsSxWt7JLWBmHA"], "expires_at": "2020-11-06T19:02:37.000000Z", "issued_at": "2020-11-06T18:02:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "66c19fc59bcf48248be8995500ae56d5", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:37.377 37 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 7 second wait 2020-11-06 18:02:37.519 40 INFO tempest.lib.common.rest_client [req-0241efe0-26ae-4664-ae0a-8b3c0eb7cb46 ] Request (PortsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=b3f19206f12a4063bdbe2a1fda1d8a6f&name=default 0.171s 2020-11-06 18:02:37.519 40 DEBUG tempest.lib.common.rest_client [req-0241efe0-26ae-4664-ae0a-8b3c0eb7cb46 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-0241efe0-26ae-4664-ae0a-8b3c0eb7cb46', 'date': 'Fri, 06 Nov 2020 18:02:37 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=b3f19206f12a4063bdbe2a1fda1d8a6f&name=default'} Body: b'{"security_groups": [{"id": "4f8e7d2c-d180-457a-93b4-fa9e035f9503", "name": "default", "stateful": true, "tenant_id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "description": "Default security group", "security_group_rules": [{"id": "368e8f46-0303-490d-95a9-f5c30522e814", "tenant_id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "security_group_id": "4f8e7d2c-d180-457a-93b4-fa9e035f9503", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "4f8e7d2c-d180-457a-93b4-fa9e035f9503", "description": null, "tags": [], "created_at": "2020-11-06T18:01:41Z", "updated_at": "2020-11-06T18:01:41Z", "revision_number": 0, "project_id": "b3f19206f12a4063bdbe2a1fda1d8a6f"}, {"id": "52d67b2e-fdb4-468d-9dfa-583365e74dd1", "tenant_id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "security_group_id": "4f8e7d2c-d180-457a-93b4-fa9e035f9503", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:01:41Z", "updated_at": "2020-11-06T18:01:41Z", "revision_number": 0, "project_id": "b3f19206f12a4063bdbe2a1fda1d8a6f"}, {"id": "9e60f5a9-fa7d-438a-8428-ab162ecf7490", "tenant_id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "security_group_id": "4f8e7d2c-d180-457a-93b4-fa9e035f9503", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "4f8e7d2c-d180-457a-93b4-fa9e035f9503", "description": null, "tags": [], "created_at": "2020-11-06T18:01:41Z", "updated_at": "2020-11-06T18:01:41Z", "revision_number": 0, "project_id": "b3f19206f12a4063bdbe2a1fda1d8a6f"}, {"id": "b6b78e7e-f5ad-4c04-a13c-0659567ce081", "tenant_id": "b3f19206f12a4063bdbe2a1fda1d8a6f", "security_group_id": "4f8e7d2c-d180-457a-93b4-fa9e035f9503", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:01:41Z", "updated_at": "2020-11-06T18:01:41Z", "revision_number": 0, "project_id": "b3f19206f12a4063bdbe2a1fda1d8a6f"}], "tags": [], "created_at": "2020-11-06T18:01:41Z", "updated_at": "2020-11-06T18:01:41Z", "revision_number": 1, "project_id": "b3f19206f12a4063bdbe2a1fda1d8a6f"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:37.565 38 INFO tempest.lib.common.rest_client [req-c666190a-df74-4116-919d-f6393b8cfea1 ] Request (DscpMarkingRuleExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/440f844d-32a3-4a0c-8273-51115a4e73ee/dscp_marking_rules/9464c248-9d36-4b5b-bf12-a5013c343b42 0.190s 2020-11-06 18:02:37.566 38 DEBUG tempest.lib.common.rest_client [req-c666190a-df74-4116-919d-f6393b8cfea1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-c666190a-df74-4116-919d-f6393b8cfea1', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:02:37 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/440f844d-32a3-4a0c-8273-51115a4e73ee/dscp_marking_rules/9464c248-9d36-4b5b-bf12-a5013c343b42'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:37.568 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:37.572 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_policy_dscp_marking_rule, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:37.573 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:37.577 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_policy_dscp_marking_rule, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:37.578 38 DEBUG tempest.lib.common.utils.test_utils [-] Sane call name not found in ['_log_request_start', 'raw_request', '_request', 'request', 'post', 'create_dscp_marking_rule', 'create_policy_dscp_marking_rule'] find_test_caller /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/utils/test_utils.py:77 2020-11-06 18:02:37.638 40 INFO tempest.lib.common.rest_client [req-5e468859-74e6-487c-b47a-de45f5192105 ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/4f8e7d2c-d180-457a-93b4-fa9e035f9503 0.117s 2020-11-06 18:02:37.639 40 DEBUG tempest.lib.common.rest_client [req-5e468859-74e6-487c-b47a-de45f5192105 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-5e468859-74e6-487c-b47a-de45f5192105', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:02:37 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/4f8e7d2c-d180-457a-93b4-fa9e035f9503'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:37.722 37 INFO tempest.lib.common.rest_client [req-d0150afe-c919-4ec9-9104-6d44e78c033b ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes 0.345s 2020-11-06 18:02:37.723 37 DEBUG tempest.lib.common.rest_client [req-d0150afe-c919-4ec9-9104-6d44e78c033b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "display_name": "tempest-ServerVolumeAttachmentRbacTest-volume-2023480968"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d0150afe-c919-4ec9-9104-6d44e78c033b', 'content-length': '851', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d0150afe-c919-4ec9-9104-6d44e78c033b', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes'} Body: b'{"volume": {"id": "2766140b-9b9f-43bb-990b-38596df82177", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:02:38.000000", "updated_at": null, "name": "tempest-ServerVolumeAttachmentRbacTest-volume-2023480968", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}], "user_id": "31dfe8b61f554cfe82a18efd5d747c55", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:37.818 40 INFO tempest.lib.common.rest_client [req-73caf733-cd28-4bd6-9052-b539518f612f ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f 0.177s 2020-11-06 18:02:37.818 40 DEBUG tempest.lib.common.rest_client [req-73caf733-cd28-4bd6-9052-b539518f612f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-73caf733-cd28-4bd6-9052-b539518f612f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/b3f19206f12a4063bdbe2a1fda1d8a6f'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:37.919 40 INFO tempest.lib.common.rest_client [req-2a3d5844-ff7c-48f0-853a-d1b671430a23 ] Request (RbacPoliciesExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-11-06 18:02:37.919 40 DEBUG tempest.lib.common.rest_client [req-2a3d5844-ff7c-48f0-853a-d1b671430a23 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2a3d5844-ff7c-48f0-853a-d1b671430a23', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["ZMCvrzwtS4WFVguOpWWhuA"], "expires_at": "2020-11-06T19:02:37.000000Z", "issued_at": "2020-11-06T18:02:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:37.972 37 INFO tempest.lib.common.rest_client [req-7df6544f-8e04-4b1b-a1b2-1712523e0e5e ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177 0.235s 2020-11-06 18:02:37.972 37 DEBUG tempest.lib.common.rest_client [req-7df6544f-8e04-4b1b-a1b2-1712523e0e5e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-7df6544f-8e04-4b1b-a1b2-1712523e0e5e', 'content-length': '1073', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7df6544f-8e04-4b1b-a1b2-1712523e0e5e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177'} Body: b'{"volume": {"id": "2766140b-9b9f-43bb-990b-38596df82177", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:02:38.000000", "updated_at": "2020-11-06T18:02:38.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-2023480968", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}], "user_id": "31dfe8b61f554cfe82a18efd5d747c55", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "198374b90e3641c39c58226d89b9ccc8"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:38.017 40 INFO tempest.lib.common.rest_client [req-b4efe680-8ab4-45bd-a9a8-07637d871c22 ] Request (RbacPoliciesExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-11-06 18:02:38.018 40 DEBUG tempest.lib.common.rest_client [req-b4efe680-8ab4-45bd-a9a8-07637d871c22 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b4efe680-8ab4-45bd-a9a8-07637d871c22', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["JCLsuUNST0CEhP01uqXHgA"], "expires_at": "2020-11-06T19:02:37.000000Z", "issued_at": "2020-11-06T18:02:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:38.074 40 INFO tempest.lib.common.rest_client [req-4c74eeed-7c24-42fd-904e-6b2c8014b60e ] Request (RbacPoliciesExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.055s 2020-11-06 18:02:38.075 40 DEBUG tempest.lib.common.rest_client [req-4c74eeed-7c24-42fd-904e-6b2c8014b60e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4c74eeed-7c24-42fd-904e-6b2c8014b60e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:38.158 40 INFO tempest.lib.common.rest_client [req-6b7a1b42-7277-4f26-90f2-60dedb1e6e97 ] Request (RbacPoliciesExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.081s 2020-11-06 18:02:38.159 40 DEBUG tempest.lib.common.rest_client [req-6b7a1b42-7277-4f26-90f2-60dedb1e6e97 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-RbacPoliciesExtRbacTest-345152215-desc", "domain_id": "default", "name": "tempest-RbacPoliciesExtRbacTest-345152215"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '382', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6b7a1b42-7277-4f26-90f2-60dedb1e6e97', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "bacf7290ccf4444e8183eb504493cdde", "name": "tempest-RbacPoliciesExtRbacTest-345152215", "domain_id": "default", "description": "tempest-RbacPoliciesExtRbacTest-345152215-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:38.265 40 INFO tempest.lib.common.rest_client [req-693e1a4e-74b0-419d-b3b6-8893ca152168 ] Request (RbacPoliciesExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.105s 2020-11-06 18:02:38.266 40 DEBUG tempest.lib.common.rest_client [req-693e1a4e-74b0-419d-b3b6-8893ca152168 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-RbacPoliciesExtRbacTest-345152215", "password": "N3_yZmLzM4%gJdc", "project_id": "bacf7290ccf4444e8183eb504493cdde", "email": "tempest-RbacPoliciesExtRbacTest-1955876081@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '401', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-693e1a4e-74b0-419d-b3b6-8893ca152168', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "bacf7290ccf4444e8183eb504493cdde", "email": "tempest-RbacPoliciesExtRbacTest-1955876081@example.com", "id": "2e60a8c38b4747239417157dd4a249f9", "name": "tempest-RbacPoliciesExtRbacTest-345152215", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/2e60a8c38b4747239417157dd4a249f9"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:38.315 40 INFO tempest.lib.common.rest_client [req-73882b92-f156-4d57-b170-ee90d3768d9b ] Request (RbacPoliciesExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.048s 2020-11-06 18:02:38.316 40 DEBUG tempest.lib.common.rest_client [req-73882b92-f156-4d57-b170-ee90d3768d9b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-73882b92-f156-4d57-b170-ee90d3768d9b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:38.429 40 INFO tempest.lib.common.rest_client [req-4a0e90c3-03a2-40f3-aade-e40318a8081a ] Request (RbacPoliciesExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.106s 2020-11-06 18:02:38.430 40 DEBUG tempest.lib.common.rest_client [req-4a0e90c3-03a2-40f3-aade-e40318a8081a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4a0e90c3-03a2-40f3-aade-e40318a8081a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:38.500 40 INFO tempest.lib.common.rest_client [req-234a864c-37ee-449b-87ee-a63cbe83c404 ] Request (RbacPoliciesExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles/72a4576c553448cd941b052c1ca0cf2d 0.068s 2020-11-06 18:02:38.501 40 DEBUG tempest.lib.common.rest_client [req-234a864c-37ee-449b-87ee-a63cbe83c404 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-234a864c-37ee-449b-87ee-a63cbe83c404', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:38.501 40 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-RbacPoliciesExtRbacTest-345152215', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'bacf7290ccf4444e8183eb504493cdde', 'project_name': 'tempest-RbacPoliciesExtRbacTest-345152215', 'tenant_id': 'bacf7290ccf4444e8183eb504493cdde', 'tenant_name': 'tempest-RbacPoliciesExtRbacTest-345152215', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '2e60a8c38b4747239417157dd4a249f9'}, Network: None, Subnet: None, Router: None 2020-11-06 18:02:38.502 40 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-RbacPoliciesExtRbacTest-345152215', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'bacf7290ccf4444e8183eb504493cdde', 'project_name': 'tempest-RbacPoliciesExtRbacTest-345152215', 'tenant_id': 'bacf7290ccf4444e8183eb504493cdde', 'tenant_name': 'tempest-RbacPoliciesExtRbacTest-345152215', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '2e60a8c38b4747239417157dd4a249f9'}, Network: None, Subnet: None, Router: None 2020-11-06 18:02:38.622 40 INFO tempest.lib.common.rest_client [req-6382af49-b94e-4100-85ba-656afbb48231 ] Request (RbacPoliciesExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.108s 2020-11-06 18:02:38.623 40 DEBUG tempest.lib.common.rest_client [req-6382af49-b94e-4100-85ba-656afbb48231 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6575', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6382af49-b94e-4100-85ba-656afbb48231', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2e60a8c38b4747239417157dd4a249f9", "name": "tempest-RbacPoliciesExtRbacTest-345152215", "password_expires_at": null}, "audit_ids": ["a7EnLOl_QcSnhR8cXycIlA"], "expires_at": "2020-11-06T19:02:38.000000Z", "issued_at": "2020-11-06T18:02:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bacf7290ccf4444e8183eb504493cdde", "name": "tempest-RbacPoliciesExtRbacTest-345152215"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http:/ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:38.624 40 WARNING tempest.manager [-] tempest.manager.Manager is not a stable interface and as such it should not be imported directly. It will be removed as soon as the client manager becomes available in tempest.lib. 2020-11-06 18:02:38.709 40 INFO tempest.lib.common.rest_client [req-e96c5f00-4d6f-4225-aa2f-e322ddc49a5c ] Request (RbacPoliciesExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-11-06 18:02:38.709 40 DEBUG tempest.lib.common.rest_client [req-e96c5f00-4d6f-4225-aa2f-e322ddc49a5c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e96c5f00-4d6f-4225-aa2f-e322ddc49a5c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["7efBehOOQhmcThhGrVdzqQ"], "expires_at": "2020-11-06T19:02:38.000000Z", "issued_at": "2020-11-06T18:02:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:38.756 40 INFO tempest.lib.common.rest_client [req-6711f392-96b7-4926-9142-b7df7a49d256 ] Request (RbacPoliciesExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:02:38.756 40 DEBUG tempest.lib.common.rest_client [req-6711f392-96b7-4926-9142-b7df7a49d256 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6711f392-96b7-4926-9142-b7df7a49d256', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["IO4bdk8ITTCVawU4btHAzA"], "expires_at": "2020-11-06T19:02:38.000000Z", "issued_at": "2020-11-06T18:02:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:38.815 40 INFO tempest.lib.common.rest_client [req-2e316691-2891-489e-836c-ed175b987cd6 ] Request (RbacPoliciesExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.058s 2020-11-06 18:02:38.815 40 DEBUG tempest.lib.common.rest_client [req-2e316691-2891-489e-836c-ed175b987cd6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2e316691-2891-489e-836c-ed175b987cd6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:38.866 40 INFO tempest.lib.common.rest_client [req-245df4f8-3b5a-480f-a9c3-5ab3cc468a90 ] Request (RbacPoliciesExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.049s 2020-11-06 18:02:38.866 40 DEBUG tempest.lib.common.rest_client [req-245df4f8-3b5a-480f-a9c3-5ab3cc468a90 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-245df4f8-3b5a-480f-a9c3-5ab3cc468a90', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:38.867 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:02:38.868 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:38.875 38 DEBUG tempest.lib.common.utils.test_utils [-] Sane call name not found in ['_log_request', 'raw_request', '_request', 'request', 'post', 'create_dscp_marking_rule', 'create_policy_dscp_marking_rule'] find_test_caller /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/utils/test_utils.py:77 2020-11-06 18:02:38.876 38 INFO tempest.lib.common.rest_client [req-e4baad35-1f11-4bc8-bac3-70d45b902992 ] Request (None): 201 POST http://172.30.13.94:9696/v2.0/qos/policies/440f844d-32a3-4a0c-8273-51115a4e73ee/dscp_marking_rules 1.298s 2020-11-06 18:02:38.876 38 DEBUG tempest.lib.common.rest_client [req-e4baad35-1f11-4bc8-bac3-70d45b902992 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"dscp_marking_rule": {"dscp_mark": 10}} Response - Headers: {'content-type': 'application/json', 'content-length': '86', 'x-openstack-request-id': 'req-e4baad35-1f11-4bc8-bac3-70d45b902992', 'date': 'Fri, 06 Nov 2020 18:02:38 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/440f844d-32a3-4a0c-8273-51115a4e73ee/dscp_marking_rules'} Body: b'{"dscp_marking_rule": {"dscp_mark": 10, "id": "116a5ade-e71a-4eaa-bb7f-fc92ff859bb0"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:38.877 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:38.920 40 INFO tempest.lib.common.rest_client [req-5b2a7d56-e402-4afa-9ee9-3c84a81b2555 ] Request (RbacPoliciesExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles 0.051s 2020-11-06 18:02:38.921 40 DEBUG tempest.lib.common.rest_client [req-5b2a7d56-e402-4afa-9ee9-3c84a81b2555 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5b2a7d56-e402-4afa-9ee9-3c84a81b2555', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:38.936 38 INFO tempest.lib.common.rest_client [req-f481418e-6aef-4584-923a-b59fcfe7971e ] Request (DscpMarkingRuleExtRbacTest:test_update_policy_dscp_marking_rule): 200 GET http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles 0.058s 2020-11-06 18:02:38.936 38 DEBUG tempest.lib.common.rest_client [req-f481418e-6aef-4584-923a-b59fcfe7971e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f481418e-6aef-4584-923a-b59fcfe7971e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:38.952 39 INFO tempest.lib.common.rest_client [req-4111297c-0411-40c9-9672-b5c19678a956 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.575s 2020-11-06 18:02:38.953 39 DEBUG tempest.lib.common.rest_client [req-4111297c-0411-40c9-9672-b5c19678a956 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4111297c-0411-40c9-9672-b5c19678a956', 'x-compute-request-id': 'req-4111297c-0411-40c9-9672-b5c19678a956', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:38.974 40 INFO tempest.lib.common.rest_client [req-cdbd7499-2c30-42dd-aa64-44b9c224500b ] Request (RbacPoliciesExtRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles/72a4576c553448cd941b052c1ca0cf2d 0.052s 2020-11-06 18:02:38.975 40 DEBUG tempest.lib.common.rest_client [req-cdbd7499-2c30-42dd-aa64-44b9c224500b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cdbd7499-2c30-42dd-aa64-44b9c224500b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:39.041 38 INFO tempest.lib.common.rest_client [req-b4861157-3c8b-44d8-a455-a7e12af613d4 ] Request (DscpMarkingRuleExtRbacTest:test_update_policy_dscp_marking_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.103s 2020-11-06 18:02:39.041 38 DEBUG tempest.lib.common.rest_client [req-b4861157-3c8b-44d8-a455-a7e12af613d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b4861157-3c8b-44d8-a455-a7e12af613d4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eb409a7f07674d39a75112f4b4ee0cd8", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194", "password_expires_at": null}, "audit_ids": ["EK6sUHhBTJGIi3Y1A-IoTw"], "expires_at": "2020-11-06T19:02:38.000000Z", "issued_at": "2020-11-06T18:02:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "66c19fc59bcf48248be8995500ae56d5", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:39.052 37 INFO tempest.lib.common.rest_client [req-f391b8a2-998e-4946-98ad-4d7fada245b5 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177 0.069s 2020-11-06 18:02:39.052 37 DEBUG tempest.lib.common.rest_client [req-f391b8a2-998e-4946-98ad-4d7fada245b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-f391b8a2-998e-4946-98ad-4d7fada245b5', 'content-length': '1074', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f391b8a2-998e-4946-98ad-4d7fada245b5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177'} Body: b'{"volume": {"id": "2766140b-9b9f-43bb-990b-38596df82177", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:02:38.000000", "updated_at": "2020-11-06T18:02:38.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-2023480968", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}], "user_id": "31dfe8b61f554cfe82a18efd5d747c55", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "198374b90e3641c39c58226d89b9ccc8"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:39.062 37 INFO tempest.common.waiters [-] volume 2766140b-9b9f-43bb-990b-38596df82177 reached available after waiting for 2.062459 seconds 2020-11-06 18:02:39.075 40 INFO tempest.lib.common.rest_client [req-b1b0089a-3401-4496-9a0b-128099d5b8d3 ] Request (RbacPoliciesExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles/a629c95d64b3416fb80ae90af4f69c05 0.099s 2020-11-06 18:02:39.076 40 DEBUG tempest.lib.common.rest_client [req-b1b0089a-3401-4496-9a0b-128099d5b8d3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b1b0089a-3401-4496-9a0b-128099d5b8d3', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:39.121 37 INFO tempest.lib.common.rest_client [req-3f1dfe75-d971-4c8b-9e15-50811dce143a ] Request (ServerVolumeAttachmentRbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177 0.057s 2020-11-06 18:02:39.121 37 DEBUG tempest.lib.common.rest_client [req-3f1dfe75-d971-4c8b-9e15-50811dce143a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-3f1dfe75-d971-4c8b-9e15-50811dce143a', 'content-length': '1074', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3f1dfe75-d971-4c8b-9e15-50811dce143a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177'} Body: b'{"volume": {"id": "2766140b-9b9f-43bb-990b-38596df82177", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:02:38.000000", "updated_at": "2020-11-06T18:02:38.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-2023480968", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}], "user_id": "31dfe8b61f554cfe82a18efd5d747c55", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "198374b90e3641c39c58226d89b9ccc8"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:39.127 38 INFO tempest.lib.common.rest_client [req-61dd8c9e-6454-411a-a5e2-fe4ee4e38e0d ] Request (DscpMarkingRuleExtRbacTest:test_update_policy_dscp_marking_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:02:39.128 38 DEBUG tempest.lib.common.rest_client [req-61dd8c9e-6454-411a-a5e2-fe4ee4e38e0d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-61dd8c9e-6454-411a-a5e2-fe4ee4e38e0d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eb409a7f07674d39a75112f4b4ee0cd8", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194", "password_expires_at": null}, "audit_ids": ["O80UIjy0Qv-9fl5igcBGdw"], "expires_at": "2020-11-06T19:02:39.000000Z", "issued_at": "2020-11-06T18:02:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "66c19fc59bcf48248be8995500ae56d5", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:39.136 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:39.137 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.138 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.138 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.138 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.139 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.139 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.139 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.140 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.140 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.140 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.141 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.141 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.141 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.142 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.142 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.142 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.143 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.143 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.143 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.144 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.144 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.144 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.144 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.145 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.145 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.145 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.146 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.146 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.146 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.146 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.147 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.147 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.147 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.148 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.148 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.148 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.149 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.149 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.149 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.149 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.150 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.150 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.150 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.151 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.151 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.151 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.151 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.152 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.152 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.152 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.153 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.153 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.153 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.153 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.154 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.154 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.154 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.155 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.155 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.155 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.156 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.156 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.156 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.157 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.157 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.157 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.157 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.158 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.158 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.158 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.158 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.159 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.159 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.159 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.159 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:39.161 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-volumes-attachments:create, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:39.161 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:39.276 37 INFO tempest.lib.common.rest_client [req-b5ead0db-8347-4dfa-9dd1-98540630dfc1 ] Request (ServerVolumeAttachmentRbacTest:test_create_volume_attachment): 200 GET http://172.30.13.94/identity/v3/projects/198374b90e3641c39c58226d89b9ccc8/users/31dfe8b61f554cfe82a18efd5d747c55/roles 0.114s 2020-11-06 18:02:39.277 37 DEBUG tempest.lib.common.rest_client [req-b5ead0db-8347-4dfa-9dd1-98540630dfc1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b5ead0db-8347-4dfa-9dd1-98540630dfc1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/198374b90e3641c39c58226d89b9ccc8/users/31dfe8b61f554cfe82a18efd5d747c55/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/198374b90e3641c39c58226d89b9ccc8/users/31dfe8b61f554cfe82a18efd5d747c55/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:39.362 37 INFO tempest.lib.common.rest_client [req-4b3dbe07-8ef5-4e4a-9114-5974d2acb36c ] Request (ServerVolumeAttachmentRbacTest:test_create_volume_attachment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-11-06 18:02:39.363 37 DEBUG tempest.lib.common.rest_client [req-4b3dbe07-8ef5-4e4a-9114-5974d2acb36c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6652', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4b3dbe07-8ef5-4e4a-9114-5974d2acb36c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "31dfe8b61f554cfe82a18efd5d747c55", "name": "tempest-ServerVolumeAttachmentRbacTest-1175560981", "password_expires_at": null}, "audit_ids": ["wyRtZz_AR7SfVUUJSx05-w"], "expires_at": "2020-11-06T19:02:39.000000Z", "issued_at": "2020-11-06T18:02:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "198374b90e3641c39c58226d89b9ccc8", "name": "tempest-ServerVolumeAttachmentRbacTest-1175560981"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:39.444 38 INFO tempest.lib.common.rest_client [req-a4f2c93a-725f-42cc-8309-0626e1396161 ] Request (DscpMarkingRuleExtRbacTest:test_update_policy_dscp_marking_rule): 200 PUT http://172.30.13.94:9696/v2.0/qos/policies/440f844d-32a3-4a0c-8273-51115a4e73ee/dscp_marking_rules/116a5ade-e71a-4eaa-bb7f-fc92ff859bb0 0.315s 2020-11-06 18:02:39.445 38 DEBUG tempest.lib.common.rest_client [req-a4f2c93a-725f-42cc-8309-0626e1396161 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"dscp_marking_rule": {"dscp_mark": 16}} Response - Headers: {'content-type': 'application/json', 'content-length': '86', 'x-openstack-request-id': 'req-a4f2c93a-725f-42cc-8309-0626e1396161', 'date': 'Fri, 06 Nov 2020 18:02:39 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/440f844d-32a3-4a0c-8273-51115a4e73ee/dscp_marking_rules/116a5ade-e71a-4eaa-bb7f-fc92ff859bb0'} Body: b'{"dscp_marking_rule": {"dscp_mark": 16, "id": "116a5ade-e71a-4eaa-bb7f-fc92ff859bb0"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:39.445 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:39.590 38 INFO tempest.lib.common.rest_client [req-e2c9c78d-8181-4082-b577-946e9fea1b33 ] Request (DscpMarkingRuleExtRbacTest:test_update_policy_dscp_marking_rule): 200 GET http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles 0.144s 2020-11-06 18:02:39.590 38 DEBUG tempest.lib.common.rest_client [req-e2c9c78d-8181-4082-b577-946e9fea1b33 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e2c9c78d-8181-4082-b577-946e9fea1b33', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5/users/eb409a7f07674d39a75112f4b4ee0cd8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:39.676 38 INFO tempest.lib.common.rest_client [req-1f558bee-1525-46c1-b012-80d6ea8a2fd5 ] Request (DscpMarkingRuleExtRbacTest:test_update_policy_dscp_marking_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-11-06 18:02:39.676 38 DEBUG tempest.lib.common.rest_client [req-1f558bee-1525-46c1-b012-80d6ea8a2fd5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1f558bee-1525-46c1-b012-80d6ea8a2fd5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eb409a7f07674d39a75112f4b4ee0cd8", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194", "password_expires_at": null}, "audit_ids": ["AmaOxjewQKWtG-TAC_140A"], "expires_at": "2020-11-06T19:02:39.000000Z", "issued_at": "2020-11-06T18:02:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "66c19fc59bcf48248be8995500ae56d5", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:39.713 38 INFO tempest.lib.common.rest_client [req-d20bc3ce-1c35-49b8-8ad5-2b0bad9481be ] Request (DscpMarkingRuleExtRbacTest:test_update_policy_dscp_marking_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:02:39.713 38 DEBUG tempest.lib.common.rest_client [req-d20bc3ce-1c35-49b8-8ad5-2b0bad9481be ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d20bc3ce-1c35-49b8-8ad5-2b0bad9481be', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eb409a7f07674d39a75112f4b4ee0cd8", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194", "password_expires_at": null}, "audit_ids": ["pyvFdtAuR0SkpF4eFqylvQ"], "expires_at": "2020-11-06T19:02:39.000000Z", "issued_at": "2020-11-06T18:02:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "66c19fc59bcf48248be8995500ae56d5", "name": "tempest-DscpMarkingRuleExtRbacTest-1145948194"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_66c19fc59bcf48248be8995500ae56d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:39.932 38 INFO tempest.lib.common.rest_client [req-e1a3a065-86e9-44ea-b59f-e44b568121b7 ] Request (DscpMarkingRuleExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/440f844d-32a3-4a0c-8273-51115a4e73ee/dscp_marking_rules/116a5ade-e71a-4eaa-bb7f-fc92ff859bb0 0.217s 2020-11-06 18:02:39.933 38 DEBUG tempest.lib.common.rest_client [req-e1a3a065-86e9-44ea-b59f-e44b568121b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-e1a3a065-86e9-44ea-b59f-e44b568121b7', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:02:39 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/440f844d-32a3-4a0c-8273-51115a4e73ee/dscp_marking_rules/116a5ade-e71a-4eaa-bb7f-fc92ff859bb0'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:40.002 38 INFO tempest.lib.common.rest_client [req-35ba8a22-1471-432d-be4a-4c5847610161 ] Request (DscpMarkingRuleExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/440f844d-32a3-4a0c-8273-51115a4e73ee 0.066s 2020-11-06 18:02:40.002 38 DEBUG tempest.lib.common.rest_client [req-35ba8a22-1471-432d-be4a-4c5847610161 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-35ba8a22-1471-432d-be4a-4c5847610161', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:02:40 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/440f844d-32a3-4a0c-8273-51115a4e73ee'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:40.037 37 INFO tempest.lib.common.rest_client [req-8a7f47b5-be21-4ed3-abc0-b39c00afbef3 ] Request (ServerVolumeAttachmentRbacTest:test_create_volume_attachment): 200 POST http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac/os-volume_attachments 0.672s 2020-11-06 18:02:40.038 37 DEBUG tempest.lib.common.rest_client [req-8a7f47b5-be21-4ed3-abc0-b39c00afbef3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volumeAttachment": {"volumeId": "2766140b-9b9f-43bb-990b-38596df82177"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '194', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8a7f47b5-be21-4ed3-abc0-b39c00afbef3', 'x-compute-request-id': 'req-8a7f47b5-be21-4ed3-abc0-b39c00afbef3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac/os-volume_attachments'} Body: b'{"volumeAttachment": {"id": "2766140b-9b9f-43bb-990b-38596df82177", "serverId": "e62cf5bc-fdb9-402c-b1b0-22ca5336dbac", "volumeId": "2766140b-9b9f-43bb-990b-38596df82177", "device": "/dev/sdb"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:40.042 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:40.102 37 INFO tempest.lib.common.rest_client [req-9f3bbdf5-a4c5-49ed-9cc4-42fcb6c69bea ] Request (ServerVolumeAttachmentRbacTest:test_create_volume_attachment): 200 GET http://172.30.13.94/identity/v3/projects/198374b90e3641c39c58226d89b9ccc8/users/31dfe8b61f554cfe82a18efd5d747c55/roles 0.059s 2020-11-06 18:02:40.103 37 DEBUG tempest.lib.common.rest_client [req-9f3bbdf5-a4c5-49ed-9cc4-42fcb6c69bea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9f3bbdf5-a4c5-49ed-9cc4-42fcb6c69bea', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/198374b90e3641c39c58226d89b9ccc8/users/31dfe8b61f554cfe82a18efd5d747c55/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/198374b90e3641c39c58226d89b9ccc8/users/31dfe8b61f554cfe82a18efd5d747c55/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:40.137 38 INFO tempest.lib.common.rest_client [req-b61721b6-4280-4e82-aa5b-326428f1794e ] Request (DscpMarkingRuleExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/eb409a7f07674d39a75112f4b4ee0cd8 0.133s 2020-11-06 18:02:40.137 38 DEBUG tempest.lib.common.rest_client [req-b61721b6-4280-4e82-aa5b-326428f1794e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b61721b6-4280-4e82-aa5b-326428f1794e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/eb409a7f07674d39a75112f4b4ee0cd8'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:40.138 37 INFO tempest.lib.common.rest_client [req-1b877486-43c8-4035-bf7f-2fea7a5428ac ] Request (ServerVolumeAttachmentRbacTest:test_create_volume_attachment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:02:40.138 37 DEBUG tempest.lib.common.rest_client [req-1b877486-43c8-4035-bf7f-2fea7a5428ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6652', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1b877486-43c8-4035-bf7f-2fea7a5428ac', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "31dfe8b61f554cfe82a18efd5d747c55", "name": "tempest-ServerVolumeAttachmentRbacTest-1175560981", "password_expires_at": null}, "audit_ids": ["swXgKuepR9OF9pR4WLQFeA"], "expires_at": "2020-11-06T19:02:40.000000Z", "issued_at": "2020-11-06T18:02:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "198374b90e3641c39c58226d89b9ccc8", "name": "tempest-ServerVolumeAttachmentRbacTest-1175560981"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:40.163 40 INFO tempest.lib.common.rest_client [req-14602e0f-d88a-4c68-a9e7-13c6e3cdb7d5 ] Request (RbacPoliciesExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:02:40.163 40 DEBUG tempest.lib.common.rest_client [req-14602e0f-d88a-4c68-a9e7-13c6e3cdb7d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-14602e0f-d88a-4c68-a9e7-13c6e3cdb7d5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2e60a8c38b4747239417157dd4a249f9", "name": "tempest-RbacPoliciesExtRbacTest-345152215", "password_expires_at": null}, "audit_ids": ["zTO_-h90Rq6FUbHW0m5iGw"], "expires_at": "2020-11-06T19:02:40.000000Z", "issued_at": "2020-11-06T18:02:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bacf7290ccf4444e8183eb504493cdde", "name": "tempest-RbacPoliciesExtRbacTest-345152215"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:40.173 39 INFO tempest.lib.common.rest_client [req-d17fac32-fbf7-4ee1-8e36-8980834737fa ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.204s 2020-11-06 18:02:40.174 39 DEBUG tempest.lib.common.rest_client [req-d17fac32-fbf7-4ee1-8e36-8980834737fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d17fac32-fbf7-4ee1-8e36-8980834737fa', 'x-compute-request-id': 'req-d17fac32-fbf7-4ee1-8e36-8980834737fa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:40.229 38 INFO tempest.lib.common.rest_client [req-62219d13-c060-47b3-8f86-c86e4887fdf3 ] Request (DscpMarkingRuleExtRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-11-06 18:02:40.230 38 DEBUG tempest.lib.common.rest_client [req-62219d13-c060-47b3-8f86-c86e4887fdf3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-62219d13-c060-47b3-8f86-c86e4887fdf3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["4VLaDZr5Sgy9J3FUgJh2lw"], "expires_at": "2020-11-06T19:02:40.000000Z", "issued_at": "2020-11-06T18:02:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:40.264 40 INFO tempest.lib.common.rest_client [req-2189c63f-d495-48de-b90f-d2faf421be49 ] Request (RbacPoliciesExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.099s 2020-11-06 18:02:40.264 40 DEBUG tempest.lib.common.rest_client [req-2189c63f-d495-48de-b90f-d2faf421be49 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2189c63f-d495-48de-b90f-d2faf421be49', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2e60a8c38b4747239417157dd4a249f9", "name": "tempest-RbacPoliciesExtRbacTest-345152215", "password_expires_at": null}, "audit_ids": ["mFMSdeKURM27ZSYYRla2vA"], "expires_at": "2020-11-06T19:02:40.000000Z", "issued_at": "2020-11-06T18:02:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bacf7290ccf4444e8183eb504493cdde", "name": "tempest-RbacPoliciesExtRbacTest-345152215"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:40.398 37 INFO tempest.lib.common.rest_client [req-f3baf9de-3730-48f5-80e2-d7183bc75e4e ] Request (ServerVolumeAttachmentRbacTest:test_create_volume_attachment): 200 GET http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177 0.259s 2020-11-06 18:02:40.399 37 DEBUG tempest.lib.common.rest_client [req-f3baf9de-3730-48f5-80e2-d7183bc75e4e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-f3baf9de-3730-48f5-80e2-d7183bc75e4e', 'content-length': '1073', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f3baf9de-3730-48f5-80e2-d7183bc75e4e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177'} Body: b'{"volume": {"id": "2766140b-9b9f-43bb-990b-38596df82177", "status": "reserved", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:02:38.000000", "updated_at": "2020-11-06T18:02:40.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-2023480968", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}], "user_id": "31dfe8b61f554cfe82a18efd5d747c55", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "198374b90e3641c39c58226d89b9ccc8"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:40.684 38 INFO tempest.lib.common.rest_client [req-24102962-96c8-4def-876a-20dd7e7e276a ] Request (DscpMarkingRuleExtRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=66c19fc59bcf48248be8995500ae56d5&name=default 0.453s 2020-11-06 18:02:40.685 38 DEBUG tempest.lib.common.rest_client [req-24102962-96c8-4def-876a-20dd7e7e276a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-24102962-96c8-4def-876a-20dd7e7e276a', 'date': 'Fri, 06 Nov 2020 18:02:40 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=66c19fc59bcf48248be8995500ae56d5&name=default'} Body: b'{"security_groups": [{"id": "79a1f3b7-921d-4710-87f4-f88cb6607d7e", "name": "default", "stateful": true, "tenant_id": "66c19fc59bcf48248be8995500ae56d5", "description": "Default security group", "security_group_rules": [{"id": "32380085-3c0b-4425-8055-e40612e5ebd9", "tenant_id": "66c19fc59bcf48248be8995500ae56d5", "security_group_id": "79a1f3b7-921d-4710-87f4-f88cb6607d7e", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "79a1f3b7-921d-4710-87f4-f88cb6607d7e", "description": null, "tags": [], "created_at": "2020-11-06T18:02:40Z", "updated_at": "2020-11-06T18:02:40Z", "revision_number": 0, "project_id": "66c19fc59bcf48248be8995500ae56d5"}, {"id": "9a8f70fb-c707-422d-bec1-86e9d04a0b51", "tenant_id": "66c19fc59bcf48248be8995500ae56d5", "security_group_id": "79a1f3b7-921d-4710-87f4-f88cb6607d7e", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "79a1f3b7-921d-4710-87f4-f88cb6607d7e", "description": null, "tags": [], "created_at": "2020-11-06T18:02:40Z", "updated_at": "2020-11-06T18:02:40Z", "revision_number": 0, "project_id": "66c19fc59bcf48248be8995500ae56d5"}, {"id": "b5d77756-0142-4b62-8491-7555bc3c0c16", "tenant_id": "66c19fc59bcf48248be8995500ae56d5", "security_group_id": "79a1f3b7-921d-4710-87f4-f88cb6607d7e", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:02:40Z", "updated_at": "2020-11-06T18:02:40Z", "revision_number": 0, "project_id": "66c19fc59bcf48248be8995500ae56d5"}, {"id": "f7e32be3-6198-43f7-9aa2-90cd01278957", "tenant_id": "66c19fc59bcf48248be8995500ae56d5", "security_group_id": "79a1f3b7-921d-4710-87f4-f88cb6607d7e", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:02:40Z", "updated_at": "2020-11-06T18:02:40Z", "revision_number": 0, "project_id": "66c19fc59bcf48248be8995500ae56d5"}], "tags": [], "created_at": "2020-11-06T18:02:40Z", "updated_at": "2020-11-06T18:02:40Z", "revision_number": 1, "project_id": "66c19fc59bcf48248be8995500ae56d5"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:40.841 40 INFO tempest.lib.common.rest_client [req-31d863cc-9e45-43fd-8e1b-c0fc98b1a8a4 ] Request (RbacPoliciesExtRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.574s 2020-11-06 18:02:40.842 40 DEBUG tempest.lib.common.rest_client [req-31d863cc-9e45-43fd-8e1b-c0fc98b1a8a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-RbacPoliciesExtRbacTest-test-network-2067899975"}} Response - Headers: {'content-type': 'application/json', 'content-length': '744', 'x-openstack-request-id': 'req-31d863cc-9e45-43fd-8e1b-c0fc98b1a8a4', 'date': 'Fri, 06 Nov 2020 18:02:40 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"c1d4e282-563f-4b42-a9f4-751c12f5350d","name":"tempest-RbacPoliciesExtRbacTest-test-network-2067899975","tenant_id":"bacf7290ccf4444e8183eb504493cdde","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"bacf7290ccf4444e8183eb504493cdde","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":53,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:02:40Z","updated_at":"2020-11-06T18:02:40Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:40.844 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:40.849 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_rbac_policy, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:40.849 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:40.853 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_rbac_policy:target_tenant, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:40.853 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:40.873 38 INFO tempest.lib.common.rest_client [req-be2cc5c4-be26-4b66-9aab-378262f4e480 ] Request (DscpMarkingRuleExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/79a1f3b7-921d-4710-87f4-f88cb6607d7e 0.187s 2020-11-06 18:02:40.874 38 DEBUG tempest.lib.common.rest_client [req-be2cc5c4-be26-4b66-9aab-378262f4e480 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-be2cc5c4-be26-4b66-9aab-378262f4e480', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:02:40 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/79a1f3b7-921d-4710-87f4-f88cb6607d7e'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:40.916 40 INFO tempest.lib.common.rest_client [req-d28e3a5a-9700-4761-becb-9a4a7a4f01ea ] Request (RbacPoliciesExtRbacTest:test_create_rbac_policy): 200 GET http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles 0.062s 2020-11-06 18:02:40.916 40 DEBUG tempest.lib.common.rest_client [req-d28e3a5a-9700-4761-becb-9a4a7a4f01ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d28e3a5a-9700-4761-becb-9a4a7a4f01ea', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:40.949 40 INFO tempest.lib.common.rest_client [req-e5141358-eb92-4bb0-a6ca-f8fc9cc33899 ] Request (RbacPoliciesExtRbacTest:test_create_rbac_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:02:40.949 40 DEBUG tempest.lib.common.rest_client [req-e5141358-eb92-4bb0-a6ca-f8fc9cc33899 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e5141358-eb92-4bb0-a6ca-f8fc9cc33899', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2e60a8c38b4747239417157dd4a249f9", "name": "tempest-RbacPoliciesExtRbacTest-345152215", "password_expires_at": null}, "audit_ids": ["IocAWOiHSHufR9EwPwIbiA"], "expires_at": "2020-11-06T19:02:40.000000Z", "issued_at": "2020-11-06T18:02:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bacf7290ccf4444e8183eb504493cdde", "name": "tempest-RbacPoliciesExtRbacTest-345152215"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:40.992 38 INFO tempest.lib.common.rest_client [req-8dcabbde-cbe3-4c33-90b8-15494ecff3b5 ] Request (DscpMarkingRuleExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5 0.117s 2020-11-06 18:02:40.993 38 DEBUG tempest.lib.common.rest_client [req-8dcabbde-cbe3-4c33-90b8-15494ecff3b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8dcabbde-cbe3-4c33-90b8-15494ecff3b5', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/66c19fc59bcf48248be8995500ae56d5'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:41.033 40 INFO tempest.lib.common.rest_client [req-76f29d4b-be72-45ef-9fcd-2095fc0e787c ] Request (RbacPoliciesExtRbacTest:test_create_rbac_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 18:02:41.034 40 DEBUG tempest.lib.common.rest_client [req-76f29d4b-be72-45ef-9fcd-2095fc0e787c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-76f29d4b-be72-45ef-9fcd-2095fc0e787c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2e60a8c38b4747239417157dd4a249f9", "name": "tempest-RbacPoliciesExtRbacTest-345152215", "password_expires_at": null}, "audit_ids": ["bS3M61EtSOS_Mrsl_P0o5Q"], "expires_at": "2020-11-06T19:02:40.000000Z", "issued_at": "2020-11-06T18:02:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bacf7290ccf4444e8183eb504493cdde", "name": "tempest-RbacPoliciesExtRbacTest-345152215"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:41.088 38 INFO tempest.lib.common.rest_client [req-8ca63e32-2b86-4e95-8359-2df1fd10f364 ] Request (FlavorsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-11-06 18:02:41.089 38 DEBUG tempest.lib.common.rest_client [req-8ca63e32-2b86-4e95-8359-2df1fd10f364 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8ca63e32-2b86-4e95-8359-2df1fd10f364', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["y5kkLqioQhulK_D68l2zHQ"], "expires_at": "2020-11-06T19:02:41.000000Z", "issued_at": "2020-11-06T18:02:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:41.132 38 INFO tempest.lib.common.rest_client [req-e3412b47-43dc-4a8d-8acb-866ae8615356 ] Request (FlavorsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:02:41.133 38 DEBUG tempest.lib.common.rest_client [req-e3412b47-43dc-4a8d-8acb-866ae8615356 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e3412b47-43dc-4a8d-8acb-866ae8615356', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["vH2DUHenReyjWw9lrr7s5Q"], "expires_at": "2020-11-06T19:02:41.000000Z", "issued_at": "2020-11-06T18:02:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:41.189 38 INFO tempest.lib.common.rest_client [req-04c5c2d7-4348-4555-936b-ef95b8731b7e ] Request (FlavorsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.055s 2020-11-06 18:02:41.189 38 DEBUG tempest.lib.common.rest_client [req-04c5c2d7-4348-4555-936b-ef95b8731b7e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-04c5c2d7-4348-4555-936b-ef95b8731b7e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:41.246 38 INFO tempest.lib.common.rest_client [req-58f6e187-7058-49cf-bd9c-e6bb96948628 ] Request (FlavorsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.055s 2020-11-06 18:02:41.246 38 DEBUG tempest.lib.common.rest_client [req-58f6e187-7058-49cf-bd9c-e6bb96948628 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-FlavorsExtRbacTest-1244557403-desc", "domain_id": "default", "name": "tempest-FlavorsExtRbacTest-1244557403"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '374', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-58f6e187-7058-49cf-bd9c-e6bb96948628', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "6f121ac206344b789a1e6d58c76fd2de", "name": "tempest-FlavorsExtRbacTest-1244557403", "domain_id": "default", "description": "tempest-FlavorsExtRbacTest-1244557403-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:41.354 38 INFO tempest.lib.common.rest_client [req-186b5314-784c-4260-baec-70fe067b52a5 ] Request (FlavorsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.107s 2020-11-06 18:02:41.355 38 DEBUG tempest.lib.common.rest_client [req-186b5314-784c-4260-baec-70fe067b52a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-FlavorsExtRbacTest-1244557403", "password": "K8!qcBKpA6o+N1*", "project_id": "6f121ac206344b789a1e6d58c76fd2de", "email": "tempest-FlavorsExtRbacTest-246787109@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '391', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-186b5314-784c-4260-baec-70fe067b52a5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "6f121ac206344b789a1e6d58c76fd2de", "email": "tempest-FlavorsExtRbacTest-246787109@example.com", "id": "b57c33dd08574923b7fb03c67ce0542c", "name": "tempest-FlavorsExtRbacTest-1244557403", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/b57c33dd08574923b7fb03c67ce0542c"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:41.401 39 INFO tempest.lib.common.rest_client [req-b0c3e8c7-9d3f-419f-9320-856eb4b722fb ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.209s 2020-11-06 18:02:41.401 39 DEBUG tempest.lib.common.rest_client [req-b0c3e8c7-9d3f-419f-9320-856eb4b722fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b0c3e8c7-9d3f-419f-9320-856eb4b722fb', 'x-compute-request-id': 'req-b0c3e8c7-9d3f-419f-9320-856eb4b722fb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:41.405 38 INFO tempest.lib.common.rest_client [req-3dd766fb-aa1d-443c-a784-ee9482d3089d ] Request (FlavorsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.049s 2020-11-06 18:02:41.406 38 DEBUG tempest.lib.common.rest_client [req-3dd766fb-aa1d-443c-a784-ee9482d3089d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3dd766fb-aa1d-443c-a784-ee9482d3089d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:41.458 38 INFO tempest.lib.common.rest_client [req-d92e5433-f9a1-45a0-9375-7a4c7fd110fd ] Request (FlavorsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.050s 2020-11-06 18:02:41.458 38 DEBUG tempest.lib.common.rest_client [req-d92e5433-f9a1-45a0-9375-7a4c7fd110fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d92e5433-f9a1-45a0-9375-7a4c7fd110fd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:41.524 37 INFO tempest.lib.common.rest_client [req-9e69e445-13a8-4774-97a6-285654884ed4 ] Request (ServerVolumeAttachmentRbacTest:test_create_volume_attachment): 200 GET http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177 0.108s 2020-11-06 18:02:41.525 37 DEBUG tempest.lib.common.rest_client [req-9e69e445-13a8-4774-97a6-285654884ed4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-9e69e445-13a8-4774-97a6-285654884ed4', 'content-length': '1375', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9e69e445-13a8-4774-97a6-285654884ed4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177'} Body: b'{"volume": {"id": "2766140b-9b9f-43bb-990b-38596df82177", "status": "in-use", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:02:38.000000", "updated_at": "2020-11-06T18:02:41.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-2023480968", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}], "user_id": "31dfe8b61f554cfe82a18efd5d747c55", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [{"id": "2766140b-9b9f-43bb-990b-38596df82177", "attachment_id": "2c6c4958-c333-472b-a721-42d913242e00", "volume_id": "2766140b-9b9f-43bb-990b-38596df82177", "server_id": "e62cf5bc-fdb9-402c-b1b0-22ca5336dbac", "host_name": "lf-virtual8", "device": "/dev/sdb", "attached_at": "2020-11-06T18:02:41.000000"}], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "198374b90e3641c39c58226d89b9ccc8"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:41.528 38 INFO tempest.lib.common.rest_client [req-d0fc59de-8d29-492d-a8ca-7c4f9a1704ec ] Request (FlavorsExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles/72a4576c553448cd941b052c1ca0cf2d 0.068s 2020-11-06 18:02:41.529 38 DEBUG tempest.lib.common.rest_client [req-d0fc59de-8d29-492d-a8ca-7c4f9a1704ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d0fc59de-8d29-492d-a8ca-7c4f9a1704ec', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:41.529 38 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FlavorsExtRbacTest-1244557403', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '6f121ac206344b789a1e6d58c76fd2de', 'project_name': 'tempest-FlavorsExtRbacTest-1244557403', 'tenant_id': '6f121ac206344b789a1e6d58c76fd2de', 'tenant_name': 'tempest-FlavorsExtRbacTest-1244557403', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'b57c33dd08574923b7fb03c67ce0542c'}, Network: None, Subnet: None, Router: None 2020-11-06 18:02:41.530 38 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FlavorsExtRbacTest-1244557403', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '6f121ac206344b789a1e6d58c76fd2de', 'project_name': 'tempest-FlavorsExtRbacTest-1244557403', 'tenant_id': '6f121ac206344b789a1e6d58c76fd2de', 'tenant_name': 'tempest-FlavorsExtRbacTest-1244557403', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'b57c33dd08574923b7fb03c67ce0542c'}, Network: None, Subnet: None, Router: None 2020-11-06 18:02:41.537 37 INFO tempest.common.waiters [-] volume 2766140b-9b9f-43bb-990b-38596df82177 reached in-use after waiting for 1.537733 seconds 2020-11-06 18:02:41.611 37 INFO tempest.lib.common.rest_client [req-74894be5-0a5b-4704-8fb0-77092564c558 ] Request (ServerVolumeAttachmentRbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177 0.072s 2020-11-06 18:02:41.612 37 DEBUG tempest.lib.common.rest_client [req-74894be5-0a5b-4704-8fb0-77092564c558 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-74894be5-0a5b-4704-8fb0-77092564c558', 'content-length': '1375', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-74894be5-0a5b-4704-8fb0-77092564c558', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177'} Body: b'{"volume": {"id": "2766140b-9b9f-43bb-990b-38596df82177", "status": "in-use", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:02:38.000000", "updated_at": "2020-11-06T18:02:41.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-2023480968", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}], "user_id": "31dfe8b61f554cfe82a18efd5d747c55", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [{"id": "2766140b-9b9f-43bb-990b-38596df82177", "attachment_id": "2c6c4958-c333-472b-a721-42d913242e00", "volume_id": "2766140b-9b9f-43bb-990b-38596df82177", "server_id": "e62cf5bc-fdb9-402c-b1b0-22ca5336dbac", "host_name": "lf-virtual8", "device": "/dev/sdb", "attached_at": "2020-11-06T18:02:41.000000"}], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "198374b90e3641c39c58226d89b9ccc8"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:41.634 40 INFO tempest.lib.common.rest_client [req-9a808df6-2b86-4a07-a9c4-09dc4cc639df ] Request (RbacPoliciesExtRbacTest:test_create_rbac_policy): 201 POST http://172.30.13.94:9696/v2.0/rbac-policies 0.598s 2020-11-06 18:02:41.634 40 DEBUG tempest.lib.common.rest_client [req-9a808df6-2b86-4a07-a9c4-09dc4cc639df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"rbac_policy": {"target_tenant": "bacf7290ccf4444e8183eb504493cdde", "object_type": "network", "object_id": "c1d4e282-563f-4b42-a9f4-751c12f5350d", "action": "access_as_shared"}} Response - Headers: {'content-type': 'application/json', 'content-length': '324', 'x-openstack-request-id': 'req-9a808df6-2b86-4a07-a9c4-09dc4cc639df', 'date': 'Fri, 06 Nov 2020 18:02:41 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/rbac-policies'} Body: b'{"rbac_policy": {"id": "cd2fc764-5b04-4953-bb85-c48c94c527dd", "project_id": "bacf7290ccf4444e8183eb504493cdde", "target_tenant": "bacf7290ccf4444e8183eb504493cdde", "action": "access_as_shared", "object_id": "c1d4e282-563f-4b42-a9f4-751c12f5350d", "object_type": "network", "tenant_id": "bacf7290ccf4444e8183eb504493cdde"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:41.635 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:41.646 38 INFO tempest.lib.common.rest_client [req-93a53826-2d5c-4421-9c03-caf8d247b11b ] Request (FlavorsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.108s 2020-11-06 18:02:41.647 38 DEBUG tempest.lib.common.rest_client [req-93a53826-2d5c-4421-9c03-caf8d247b11b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6567', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-93a53826-2d5c-4421-9c03-caf8d247b11b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b57c33dd08574923b7fb03c67ce0542c", "name": "tempest-FlavorsExtRbacTest-1244557403", "password_expires_at": null}, "audit_ids": ["r_BXwws8TiqD30s2jPvlcQ"], "expires_at": "2020-11-06T19:02:41.000000Z", "issued_at": "2020-11-06T18:02:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6f121ac206344b789a1e6d58c76fd2de", "name": "tempest-FlavorsExtRbacTest-1244557403"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30. _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:41.648 38 WARNING tempest.manager [-] tempest.manager.Manager is not a stable interface and as such it should not be imported directly. It will be removed as soon as the client manager becomes available in tempest.lib. 2020-11-06 18:02:41.741 38 INFO tempest.lib.common.rest_client [req-1b5ba3a0-d8ec-4b22-b9a8-9fe81b4265a5 ] Request (FlavorsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 18:02:41.741 38 DEBUG tempest.lib.common.rest_client [req-1b5ba3a0-d8ec-4b22-b9a8-9fe81b4265a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1b5ba3a0-d8ec-4b22-b9a8-9fe81b4265a5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["QwH7gBipQvOXHnSwft7kGw"], "expires_at": "2020-11-06T19:02:41.000000Z", "issued_at": "2020-11-06T18:02:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:41.749 40 INFO tempest.lib.common.rest_client [req-eb66fd3e-bdbd-4d38-9a0e-cdacdd2a8212 ] Request (RbacPoliciesExtRbacTest:test_create_rbac_policy): 200 GET http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles 0.112s 2020-11-06 18:02:41.749 40 DEBUG tempest.lib.common.rest_client [req-eb66fd3e-bdbd-4d38-9a0e-cdacdd2a8212 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eb66fd3e-bdbd-4d38-9a0e-cdacdd2a8212', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:41.788 38 INFO tempest.lib.common.rest_client [req-ddf5877b-85f3-4699-b3c1-23e97c2e06e7 ] Request (FlavorsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:02:41.789 38 DEBUG tempest.lib.common.rest_client [req-ddf5877b-85f3-4699-b3c1-23e97c2e06e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ddf5877b-85f3-4699-b3c1-23e97c2e06e7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["NThdv1whSFe9KZvd832tiw"], "expires_at": "2020-11-06T19:02:41.000000Z", "issued_at": "2020-11-06T18:02:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:41.833 38 INFO tempest.lib.common.rest_client [req-72711cd2-bfcb-4b31-ba3c-d4c77b9f1983 ] Request (FlavorsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.043s 2020-11-06 18:02:41.834 38 DEBUG tempest.lib.common.rest_client [req-72711cd2-bfcb-4b31-ba3c-d4c77b9f1983 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-72711cd2-bfcb-4b31-ba3c-d4c77b9f1983', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:41.851 40 INFO tempest.lib.common.rest_client [req-5b944c4d-5629-43fa-aa6c-221d93f69618 ] Request (RbacPoliciesExtRbacTest:test_create_rbac_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.100s 2020-11-06 18:02:41.852 40 DEBUG tempest.lib.common.rest_client [req-5b944c4d-5629-43fa-aa6c-221d93f69618 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5b944c4d-5629-43fa-aa6c-221d93f69618', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2e60a8c38b4747239417157dd4a249f9", "name": "tempest-RbacPoliciesExtRbacTest-345152215", "password_expires_at": null}, "audit_ids": ["-PehDTFeSfmawWLLH6KCIw"], "expires_at": "2020-11-06T19:02:41.000000Z", "issued_at": "2020-11-06T18:02:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bacf7290ccf4444e8183eb504493cdde", "name": "tempest-RbacPoliciesExtRbacTest-345152215"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:41.884 38 INFO tempest.lib.common.rest_client [req-69a38c0d-ac94-4da6-94a1-e24fa3465463 ] Request (FlavorsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.050s 2020-11-06 18:02:41.885 38 DEBUG tempest.lib.common.rest_client [req-69a38c0d-ac94-4da6-94a1-e24fa3465463 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-69a38c0d-ac94-4da6-94a1-e24fa3465463', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:41.886 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:02:41.886 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:41.886 40 INFO tempest.lib.common.rest_client [req-31535e7d-c4a0-4212-b49f-5bd03d4d06cb ] Request (RbacPoliciesExtRbacTest:test_create_rbac_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:02:41.887 40 DEBUG tempest.lib.common.rest_client [req-31535e7d-c4a0-4212-b49f-5bd03d4d06cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-31535e7d-c4a0-4212-b49f-5bd03d4d06cb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2e60a8c38b4747239417157dd4a249f9", "name": "tempest-RbacPoliciesExtRbacTest-345152215", "password_expires_at": null}, "audit_ids": ["b-aCI6KdSne8LlkvhBf3BA"], "expires_at": "2020-11-06T19:02:41.000000Z", "issued_at": "2020-11-06T18:02:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bacf7290ccf4444e8183eb504493cdde", "name": "tempest-RbacPoliciesExtRbacTest-345152215"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:41.920 37 INFO tempest.lib.common.rest_client [req-bc2a34c5-6d0b-4113-b633-22dc52932915 ] Request (ServerVolumeAttachmentRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac/os-volume_attachments/2766140b-9b9f-43bb-990b-38596df82177 0.294s 2020-11-06 18:02:41.920 37 DEBUG tempest.lib.common.rest_client [req-bc2a34c5-6d0b-4113-b633-22dc52932915 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bc2a34c5-6d0b-4113-b633-22dc52932915', 'x-compute-request-id': 'req-bc2a34c5-6d0b-4113-b633-22dc52932915', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac/os-volume_attachments/2766140b-9b9f-43bb-990b-38596df82177'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:41.937 38 INFO tempest.lib.common.rest_client [req-ce88b50f-c50b-4b57-97d4-629f546c1017 ] Request (FlavorsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles 0.051s 2020-11-06 18:02:41.938 38 DEBUG tempest.lib.common.rest_client [req-ce88b50f-c50b-4b57-97d4-629f546c1017 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ce88b50f-c50b-4b57-97d4-629f546c1017', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:41.995 37 INFO tempest.lib.common.rest_client [req-9b88be3a-9fca-4417-900a-13ee0eb06bbb ] Request (ServerVolumeAttachmentRbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177 0.073s 2020-11-06 18:02:41.996 37 DEBUG tempest.lib.common.rest_client [req-9b88be3a-9fca-4417-900a-13ee0eb06bbb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-9b88be3a-9fca-4417-900a-13ee0eb06bbb', 'content-length': '1378', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9b88be3a-9fca-4417-900a-13ee0eb06bbb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177'} Body: b'{"volume": {"id": "2766140b-9b9f-43bb-990b-38596df82177", "status": "detaching", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:02:38.000000", "updated_at": "2020-11-06T18:02:42.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-2023480968", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}], "user_id": "31dfe8b61f554cfe82a18efd5d747c55", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [{"id": "2766140b-9b9f-43bb-990b-38596df82177", "attachment_id": "2c6c4958-c333-472b-a721-42d913242e00", "volume_id": "2766140b-9b9f-43bb-990b-38596df82177", "server_id": "e62cf5bc-fdb9-402c-b1b0-22ca5336dbac", "host_name": "lf-virtual8", "device": "/dev/sdb", "attached_at": "2020-11-06T18:02:41.000000"}], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "198374b90e3641c39c58226d89b9ccc8"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:42.004 38 INFO tempest.lib.common.rest_client [req-90fabcc7-d94e-4f25-81f3-a3d034896c5c ] Request (FlavorsExtRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles/72a4576c553448cd941b052c1ca0cf2d 0.065s 2020-11-06 18:02:42.004 38 DEBUG tempest.lib.common.rest_client [req-90fabcc7-d94e-4f25-81f3-a3d034896c5c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-90fabcc7-d94e-4f25-81f3-a3d034896c5c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:42.114 38 INFO tempest.lib.common.rest_client [req-65496ac8-82e6-4a0e-b9e8-f09e6f57e6b6 ] Request (FlavorsExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles/a629c95d64b3416fb80ae90af4f69c05 0.109s 2020-11-06 18:02:42.115 38 DEBUG tempest.lib.common.rest_client [req-65496ac8-82e6-4a0e-b9e8-f09e6f57e6b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-65496ac8-82e6-4a0e-b9e8-f09e6f57e6b6', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:42.387 40 INFO tempest.lib.common.rest_client [req-52d32570-5d17-41bd-9bd4-6940d456d479 ] Request (RbacPoliciesExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/rbac-policies/cd2fc764-5b04-4953-bb85-c48c94c527dd 0.498s 2020-11-06 18:02:42.387 40 DEBUG tempest.lib.common.rest_client [req-52d32570-5d17-41bd-9bd4-6940d456d479 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-52d32570-5d17-41bd-9bd4-6940d456d479', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:02:42 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/rbac-policies/cd2fc764-5b04-4953-bb85-c48c94c527dd'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:42.391 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:42.395 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_rbac_policy, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:42.396 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:42.398 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_rbac_policy, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:42.738 40 INFO tempest.lib.common.rest_client [req-63d429c1-fd6f-4b55-b351-3b7516aa62c4 ] Request (RbacPoliciesExtRbacTest:test_delete_rbac_policy): 201 POST http://172.30.13.94:9696/v2.0/rbac-policies 0.339s 2020-11-06 18:02:42.739 40 DEBUG tempest.lib.common.rest_client [req-63d429c1-fd6f-4b55-b351-3b7516aa62c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"rbac_policy": {"target_tenant": "bacf7290ccf4444e8183eb504493cdde", "object_type": "network", "object_id": "c1d4e282-563f-4b42-a9f4-751c12f5350d", "action": "access_as_shared"}} Response - Headers: {'content-type': 'application/json', 'content-length': '324', 'x-openstack-request-id': 'req-63d429c1-fd6f-4b55-b351-3b7516aa62c4', 'date': 'Fri, 06 Nov 2020 18:02:42 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/rbac-policies'} Body: b'{"rbac_policy": {"id": "1f2a9dd7-720d-4ba5-9f3a-4cafb0cf21d7", "project_id": "bacf7290ccf4444e8183eb504493cdde", "target_tenant": "bacf7290ccf4444e8183eb504493cdde", "action": "access_as_shared", "object_id": "c1d4e282-563f-4b42-a9f4-751c12f5350d", "object_type": "network", "tenant_id": "bacf7290ccf4444e8183eb504493cdde"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:42.740 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:42.806 39 INFO tempest.lib.common.rest_client [req-3791cf7e-f429-469c-8964-7f87aa8b8651 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.392s 2020-11-06 18:02:42.807 39 DEBUG tempest.lib.common.rest_client [req-3791cf7e-f429-469c-8964-7f87aa8b8651 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3791cf7e-f429-469c-8964-7f87aa8b8651', 'x-compute-request-id': 'req-3791cf7e-f429-469c-8964-7f87aa8b8651', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:42.860 40 INFO tempest.lib.common.rest_client [req-b6880f3f-d487-4fe7-85e6-e74db28d35bc ] Request (RbacPoliciesExtRbacTest:test_delete_rbac_policy): 200 GET http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles 0.118s 2020-11-06 18:02:42.860 40 DEBUG tempest.lib.common.rest_client [req-b6880f3f-d487-4fe7-85e6-e74db28d35bc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b6880f3f-d487-4fe7-85e6-e74db28d35bc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:42.952 40 INFO tempest.lib.common.rest_client [req-1195a71b-7a58-49fe-a952-a24d8de86194 ] Request (RbacPoliciesExtRbacTest:test_delete_rbac_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-11-06 18:02:42.953 40 DEBUG tempest.lib.common.rest_client [req-1195a71b-7a58-49fe-a952-a24d8de86194 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1195a71b-7a58-49fe-a952-a24d8de86194', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2e60a8c38b4747239417157dd4a249f9", "name": "tempest-RbacPoliciesExtRbacTest-345152215", "password_expires_at": null}, "audit_ids": ["SiWmmLK_Q_WoAOI1Hbc6lg"], "expires_at": "2020-11-06T19:02:42.000000Z", "issued_at": "2020-11-06T18:02:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bacf7290ccf4444e8183eb504493cdde", "name": "tempest-RbacPoliciesExtRbacTest-345152215"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:42.994 40 INFO tempest.lib.common.rest_client [req-a34e3950-0a9b-451b-b244-d8b4fff05c05 ] Request (RbacPoliciesExtRbacTest:test_delete_rbac_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:02:42.995 40 DEBUG tempest.lib.common.rest_client [req-a34e3950-0a9b-451b-b244-d8b4fff05c05 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a34e3950-0a9b-451b-b244-d8b4fff05c05', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2e60a8c38b4747239417157dd4a249f9", "name": "tempest-RbacPoliciesExtRbacTest-345152215", "password_expires_at": null}, "audit_ids": ["xRxQRaUTQ2izlqg1Pp7ygA"], "expires_at": "2020-11-06T19:02:42.000000Z", "issued_at": "2020-11-06T18:02:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bacf7290ccf4444e8183eb504493cdde", "name": "tempest-RbacPoliciesExtRbacTest-345152215"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:43.082 37 INFO tempest.lib.common.rest_client [req-6b2a6f95-827c-447c-99fb-aaa387eb9c4a ] Request (ServerVolumeAttachmentRbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177 0.068s 2020-11-06 18:02:43.082 37 DEBUG tempest.lib.common.rest_client [req-6b2a6f95-827c-447c-99fb-aaa387eb9c4a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6b2a6f95-827c-447c-99fb-aaa387eb9c4a', 'content-length': '1074', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6b2a6f95-827c-447c-99fb-aaa387eb9c4a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177'} Body: b'{"volume": {"id": "2766140b-9b9f-43bb-990b-38596df82177", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:02:38.000000", "updated_at": "2020-11-06T18:02:42.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-2023480968", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}], "user_id": "31dfe8b61f554cfe82a18efd5d747c55", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "198374b90e3641c39c58226d89b9ccc8"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:43.095 37 INFO tempest.common.waiters [-] volume 2766140b-9b9f-43bb-990b-38596df82177 reached available after waiting for 1.095030 seconds 2020-11-06 18:02:43.179 37 INFO tempest.lib.common.rest_client [req-2a9d30c5-0575-4858-8397-f3bde2913cf3 ] Request (ServerVolumeAttachmentRbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177 0.078s 2020-11-06 18:02:43.180 37 DEBUG tempest.lib.common.rest_client [req-2a9d30c5-0575-4858-8397-f3bde2913cf3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-2a9d30c5-0575-4858-8397-f3bde2913cf3', 'content-length': '1074', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2a9d30c5-0575-4858-8397-f3bde2913cf3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177'} Body: b'{"volume": {"id": "2766140b-9b9f-43bb-990b-38596df82177", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:02:38.000000", "updated_at": "2020-11-06T18:02:42.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-2023480968", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}], "user_id": "31dfe8b61f554cfe82a18efd5d747c55", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "198374b90e3641c39c58226d89b9ccc8"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:43.191 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:43.191 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.192 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.192 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.192 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.193 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.193 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.193 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.194 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.194 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.194 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.195 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.195 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.195 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.195 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.196 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.196 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.196 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.197 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.197 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.197 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.198 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.198 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.198 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.198 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.199 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.199 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.199 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.199 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.200 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.200 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.200 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.200 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.201 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.201 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.201 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.202 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.202 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.202 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.202 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.203 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.203 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.203 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.203 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.204 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.204 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.204 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.205 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.205 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.205 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.205 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.206 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.206 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.206 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.207 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.207 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.207 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.207 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.208 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.208 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.208 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.209 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.209 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.209 38 INFO tempest.lib.common.rest_client [req-397ea3e1-e8ca-449b-8629-65cb8f431a09 ] Request (FlavorsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-11-06 18:02:43.209 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.210 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.210 38 DEBUG tempest.lib.common.rest_client [req-397ea3e1-e8ca-449b-8629-65cb8f431a09 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-397ea3e1-e8ca-449b-8629-65cb8f431a09', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b57c33dd08574923b7fb03c67ce0542c", "name": "tempest-FlavorsExtRbacTest-1244557403", "password_expires_at": null}, "audit_ids": ["Q2buaJtnSRaFbrmLAhV72Q"], "expires_at": "2020-11-06T19:02:43.000000Z", "issued_at": "2020-11-06T18:02:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6f121ac206344b789a1e6d58c76fd2de", "name": "tempest-FlavorsExtRbacTest-1244557403"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:43.210 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.210 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.210 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.211 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.211 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.211 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.211 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.212 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.212 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.212 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.213 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:43.214 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-volumes-attachments:delete, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:43.245 38 INFO tempest.lib.common.rest_client [req-8feaadc1-c929-4af0-a50b-434a124517b2 ] Request (FlavorsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:02:43.245 38 DEBUG tempest.lib.common.rest_client [req-8feaadc1-c929-4af0-a50b-434a124517b2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8feaadc1-c929-4af0-a50b-434a124517b2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b57c33dd08574923b7fb03c67ce0542c", "name": "tempest-FlavorsExtRbacTest-1244557403", "password_expires_at": null}, "audit_ids": ["MFpSkjbaR5iC8J7QzuXmfQ"], "expires_at": "2020-11-06T19:02:43.000000Z", "issued_at": "2020-11-06T18:02:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6f121ac206344b789a1e6d58c76fd2de", "name": "tempest-FlavorsExtRbacTest-1244557403"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:43.322 38 INFO tempest.lib.common.rest_client [req-93869d6c-f232-4600-9f71-5ebc0f69bca5 ] Request (FlavorsExtRbacTest:setUpClass): 200 GET http://172.30.13.94:9696/v2.0/service-providers 0.074s 2020-11-06 18:02:43.323 38 DEBUG tempest.lib.common.rest_client [req-93869d6c-f232-4600-9f71-5ebc0f69bca5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '304', 'x-openstack-request-id': 'req-93869d6c-f232-4600-9f71-5ebc0f69bca5', 'date': 'Fri, 06 Nov 2020 18:02:43 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/service-providers'} Body: b'{"service_providers": [{"service_type": "L3_ROUTER_NAT", "name": "dvrha", "default": false}, {"service_type": "L3_ROUTER_NAT", "name": "dvr", "default": false}, {"service_type": "L3_ROUTER_NAT", "name": "ha", "default": false}, {"service_type": "L3_ROUTER_NAT", "name": "single_node", "default": false}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:43.324 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:43.328 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_flavor, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:43.329 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:43.389 38 INFO tempest.lib.common.rest_client [req-01c7f1ac-67f2-4f6a-ac27-753623f0fecb ] Request (FlavorsExtRbacTest:test_create_flavor): 200 GET http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles 0.059s 2020-11-06 18:02:43.389 38 DEBUG tempest.lib.common.rest_client [req-01c7f1ac-67f2-4f6a-ac27-753623f0fecb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-01c7f1ac-67f2-4f6a-ac27-753623f0fecb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:43.423 38 INFO tempest.lib.common.rest_client [req-a7424262-e223-4a41-a01c-7ef0a593b758 ] Request (FlavorsExtRbacTest:test_create_flavor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:02:43.424 38 DEBUG tempest.lib.common.rest_client [req-a7424262-e223-4a41-a01c-7ef0a593b758 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a7424262-e223-4a41-a01c-7ef0a593b758', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b57c33dd08574923b7fb03c67ce0542c", "name": "tempest-FlavorsExtRbacTest-1244557403", "password_expires_at": null}, "audit_ids": ["xTJtpsWxTviftfIIFYnh7A"], "expires_at": "2020-11-06T19:02:43.000000Z", "issued_at": "2020-11-06T18:02:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6f121ac206344b789a1e6d58c76fd2de", "name": "tempest-FlavorsExtRbacTest-1244557403"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:43.564 38 INFO tempest.lib.common.rest_client [req-d2a6a9c3-182b-4ccf-8a1e-03248d525487 ] Request (FlavorsExtRbacTest:test_create_flavor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.139s 2020-11-06 18:02:43.564 38 DEBUG tempest.lib.common.rest_client [req-d2a6a9c3-182b-4ccf-8a1e-03248d525487 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d2a6a9c3-182b-4ccf-8a1e-03248d525487', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b57c33dd08574923b7fb03c67ce0542c", "name": "tempest-FlavorsExtRbacTest-1244557403", "password_expires_at": null}, "audit_ids": ["Wjt5U0GwQVyyh1kusOP_Vg"], "expires_at": "2020-11-06T19:02:43.000000Z", "issued_at": "2020-11-06T18:02:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6f121ac206344b789a1e6d58c76fd2de", "name": "tempest-FlavorsExtRbacTest-1244557403"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:43.576 40 INFO tempest.lib.common.rest_client [req-484475f1-51d6-48a1-8cf4-7c705220ae68 ] Request (RbacPoliciesExtRbacTest:test_delete_rbac_policy): 204 DELETE http://172.30.13.94:9696/v2.0/rbac-policies/1f2a9dd7-720d-4ba5-9f3a-4cafb0cf21d7 0.580s 2020-11-06 18:02:43.577 40 DEBUG tempest.lib.common.rest_client [req-484475f1-51d6-48a1-8cf4-7c705220ae68 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-484475f1-51d6-48a1-8cf4-7c705220ae68', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:02:43 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/rbac-policies/1f2a9dd7-720d-4ba5-9f3a-4cafb0cf21d7'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:43.578 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:43.607 37 INFO tempest.lib.common.rest_client [req-87b7ce06-7e70-4458-ac0b-532d5e5c3846 ] Request (ServerVolumeAttachmentRbacTest:test_delete_volume_attachment): 200 POST http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac/os-volume_attachments 0.393s 2020-11-06 18:02:43.608 37 DEBUG tempest.lib.common.rest_client [req-87b7ce06-7e70-4458-ac0b-532d5e5c3846 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volumeAttachment": {"volumeId": "2766140b-9b9f-43bb-990b-38596df82177"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '194', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-87b7ce06-7e70-4458-ac0b-532d5e5c3846', 'x-compute-request-id': 'req-87b7ce06-7e70-4458-ac0b-532d5e5c3846', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac/os-volume_attachments'} Body: b'{"volumeAttachment": {"id": "2766140b-9b9f-43bb-990b-38596df82177", "serverId": "e62cf5bc-fdb9-402c-b1b0-22ca5336dbac", "volumeId": "2766140b-9b9f-43bb-990b-38596df82177", "device": "/dev/sdb"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:43.628 40 INFO tempest.lib.common.rest_client [req-8cde503e-d201-4503-b449-2235bb40caea ] Request (RbacPoliciesExtRbacTest:test_delete_rbac_policy): 200 GET http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles 0.049s 2020-11-06 18:02:43.629 40 DEBUG tempest.lib.common.rest_client [req-8cde503e-d201-4503-b449-2235bb40caea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8cde503e-d201-4503-b449-2235bb40caea', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:43.647 38 INFO tempest.lib.common.rest_client [req-0df30d8a-4ec7-40c3-8e1b-9473d865793d ] Request (FlavorsExtRbacTest:test_create_flavor): 201 POST http://172.30.13.94:9696/v2.0/flavors 0.081s 2020-11-06 18:02:43.648 38 DEBUG tempest.lib.common.rest_client [req-0df30d8a-4ec7-40c3-8e1b-9473d865793d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"flavor": {"service_type": "L3_ROUTER_NAT"}} Response - Headers: {'content-type': 'application/json', 'content-length': '163', 'x-openstack-request-id': 'req-0df30d8a-4ec7-40c3-8e1b-9473d865793d', 'date': 'Fri, 06 Nov 2020 18:02:43 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors'} Body: b'{"flavor": {"id": "166af0b0-1359-4d8e-8866-820292824789", "name": "", "description": "", "service_type": "L3_ROUTER_NAT", "enabled": true, "service_profiles": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:43.648 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:43.670 40 INFO tempest.lib.common.rest_client [req-aef6e936-f5d5-4fb6-924f-b496ca65ebcc ] Request (RbacPoliciesExtRbacTest:test_delete_rbac_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:02:43.670 40 DEBUG tempest.lib.common.rest_client [req-aef6e936-f5d5-4fb6-924f-b496ca65ebcc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aef6e936-f5d5-4fb6-924f-b496ca65ebcc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2e60a8c38b4747239417157dd4a249f9", "name": "tempest-RbacPoliciesExtRbacTest-345152215", "password_expires_at": null}, "audit_ids": ["qbR3d73RTB2JZErb4M6_3g"], "expires_at": "2020-11-06T19:02:43.000000Z", "issued_at": "2020-11-06T18:02:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bacf7290ccf4444e8183eb504493cdde", "name": "tempest-RbacPoliciesExtRbacTest-345152215"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:43.696 38 INFO tempest.lib.common.rest_client [req-bdd9897c-d395-43ad-af89-966eb69b6e39 ] Request (FlavorsExtRbacTest:test_create_flavor): 200 GET http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles 0.047s 2020-11-06 18:02:43.697 38 DEBUG tempest.lib.common.rest_client [req-bdd9897c-d395-43ad-af89-966eb69b6e39 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bdd9897c-d395-43ad-af89-966eb69b6e39', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:43.699 37 INFO tempest.lib.common.rest_client [req-999074d9-50f1-4a40-b083-8be2bdbf6d26 ] Request (ServerVolumeAttachmentRbacTest:test_delete_volume_attachment): 200 GET http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177 0.086s 2020-11-06 18:02:43.699 37 DEBUG tempest.lib.common.rest_client [req-999074d9-50f1-4a40-b083-8be2bdbf6d26 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-999074d9-50f1-4a40-b083-8be2bdbf6d26', 'content-length': '1073', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-999074d9-50f1-4a40-b083-8be2bdbf6d26', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177'} Body: b'{"volume": {"id": "2766140b-9b9f-43bb-990b-38596df82177", "status": "reserved", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:02:38.000000", "updated_at": "2020-11-06T18:02:44.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-2023480968", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}], "user_id": "31dfe8b61f554cfe82a18efd5d747c55", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "198374b90e3641c39c58226d89b9ccc8"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:43.708 40 INFO tempest.lib.common.rest_client [req-840b195e-9c83-4087-8f1a-588c567fbde9 ] Request (RbacPoliciesExtRbacTest:test_delete_rbac_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:02:43.709 40 DEBUG tempest.lib.common.rest_client [req-840b195e-9c83-4087-8f1a-588c567fbde9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-840b195e-9c83-4087-8f1a-588c567fbde9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2e60a8c38b4747239417157dd4a249f9", "name": "tempest-RbacPoliciesExtRbacTest-345152215", "password_expires_at": null}, "audit_ids": ["zsWuszskRSCNGsV2cpshMg"], "expires_at": "2020-11-06T19:02:43.000000Z", "issued_at": "2020-11-06T18:02:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bacf7290ccf4444e8183eb504493cdde", "name": "tempest-RbacPoliciesExtRbacTest-345152215"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:43.735 38 INFO tempest.lib.common.rest_client [req-6ab5b160-87a1-4692-8ade-c7d16e323c05 ] Request (FlavorsExtRbacTest:test_create_flavor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:02:43.736 38 DEBUG tempest.lib.common.rest_client [req-6ab5b160-87a1-4692-8ade-c7d16e323c05 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6ab5b160-87a1-4692-8ade-c7d16e323c05', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b57c33dd08574923b7fb03c67ce0542c", "name": "tempest-FlavorsExtRbacTest-1244557403", "password_expires_at": null}, "audit_ids": ["pIebI6UqRPqZuZ56b5o8Ug"], "expires_at": "2020-11-06T19:02:43.000000Z", "issued_at": "2020-11-06T18:02:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6f121ac206344b789a1e6d58c76fd2de", "name": "tempest-FlavorsExtRbacTest-1244557403"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:43.770 38 INFO tempest.lib.common.rest_client [req-7414326c-814c-405a-8530-9a9331801f9b ] Request (FlavorsExtRbacTest:test_create_flavor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:02:43.770 38 DEBUG tempest.lib.common.rest_client [req-7414326c-814c-405a-8530-9a9331801f9b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7414326c-814c-405a-8530-9a9331801f9b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b57c33dd08574923b7fb03c67ce0542c", "name": "tempest-FlavorsExtRbacTest-1244557403", "password_expires_at": null}, "audit_ids": ["XLjiAojzRoqsRLni8ZYpMA"], "expires_at": "2020-11-06T19:02:43.000000Z", "issued_at": "2020-11-06T18:02:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6f121ac206344b789a1e6d58c76fd2de", "name": "tempest-FlavorsExtRbacTest-1244557403"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:43.820 40 INFO tempest.lib.common.rest_client [req-89f8237a-b021-44e8-b25a-bf82c9578363 ] Request (RbacPoliciesExtRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94:9696/v2.0/rbac-policies/1f2a9dd7-720d-4ba5-9f3a-4cafb0cf21d7 0.109s 2020-11-06 18:02:43.821 40 DEBUG tempest.lib.common.rest_client [req-89f8237a-b021-44e8-b25a-bf82c9578363 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '159', 'x-openstack-request-id': 'req-89f8237a-b021-44e8-b25a-bf82c9578363', 'date': 'Fri, 06 Nov 2020 18:02:43 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/rbac-policies/1f2a9dd7-720d-4ba5-9f3a-4cafb0cf21d7'} Body: b'{"NeutronError": {"type": "RbacPolicyNotFound", "message": "RBAC policy of type unknown with ID 1f2a9dd7-720d-4ba5-9f3a-4cafb0cf21d7 not found", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:43.824 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:43.827 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_rbac_policy, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:43.869 38 INFO tempest.lib.common.rest_client [req-c15e9d78-62b6-4f03-b4f7-0c23a837294d ] Request (FlavorsExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/flavors/166af0b0-1359-4d8e-8866-820292824789 0.096s 2020-11-06 18:02:43.869 38 DEBUG tempest.lib.common.rest_client [req-c15e9d78-62b6-4f03-b4f7-0c23a837294d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-c15e9d78-62b6-4f03-b4f7-0c23a837294d', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:02:43 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors/166af0b0-1359-4d8e-8866-820292824789'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:43.872 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:43.876 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_flavor, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:43.876 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:43.879 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_flavor, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:43.902 38 INFO tempest.lib.common.rest_client [req-47383c0f-d064-4538-be22-aedceb028f3c ] Request (FlavorsExtRbacTest:test_delete_flavor): 201 POST http://172.30.13.94:9696/v2.0/flavors 0.021s 2020-11-06 18:02:43.902 38 DEBUG tempest.lib.common.rest_client [req-47383c0f-d064-4538-be22-aedceb028f3c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"flavor": {"service_type": "L3_ROUTER_NAT"}} Response - Headers: {'content-type': 'application/json', 'content-length': '163', 'x-openstack-request-id': 'req-47383c0f-d064-4538-be22-aedceb028f3c', 'date': 'Fri, 06 Nov 2020 18:02:43 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors'} Body: b'{"flavor": {"id": "30940383-d5b2-4fd3-ac16-b7060cfd75e7", "name": "", "description": "", "service_type": "L3_ROUTER_NAT", "enabled": true, "service_profiles": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:43.903 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:43.951 38 INFO tempest.lib.common.rest_client [req-92bd6688-f4ce-41a4-986b-d0c4f0d7cb24 ] Request (FlavorsExtRbacTest:test_delete_flavor): 200 GET http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles 0.047s 2020-11-06 18:02:43.952 38 DEBUG tempest.lib.common.rest_client [req-92bd6688-f4ce-41a4-986b-d0c4f0d7cb24 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-92bd6688-f4ce-41a4-986b-d0c4f0d7cb24', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:43.985 38 INFO tempest.lib.common.rest_client [req-491b91a7-8f77-4281-908b-d572e1b322ee ] Request (FlavorsExtRbacTest:test_delete_flavor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:02:43.986 38 DEBUG tempest.lib.common.rest_client [req-491b91a7-8f77-4281-908b-d572e1b322ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-491b91a7-8f77-4281-908b-d572e1b322ee', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b57c33dd08574923b7fb03c67ce0542c", "name": "tempest-FlavorsExtRbacTest-1244557403", "password_expires_at": null}, "audit_ids": ["M0KBWxs4R4K13IM1_moegw"], "expires_at": "2020-11-06T19:02:43.000000Z", "issued_at": "2020-11-06T18:02:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6f121ac206344b789a1e6d58c76fd2de", "name": "tempest-FlavorsExtRbacTest-1244557403"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:44.028 38 INFO tempest.lib.common.rest_client [req-150e85cb-0c55-48b0-b5f8-d10f4dcb32c3 ] Request (FlavorsExtRbacTest:test_delete_flavor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-11-06 18:02:44.028 38 DEBUG tempest.lib.common.rest_client [req-150e85cb-0c55-48b0-b5f8-d10f4dcb32c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-150e85cb-0c55-48b0-b5f8-d10f4dcb32c3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b57c33dd08574923b7fb03c67ce0542c", "name": "tempest-FlavorsExtRbacTest-1244557403", "password_expires_at": null}, "audit_ids": ["2Pca4kGsTOqtwpZce3UPcw"], "expires_at": "2020-11-06T19:02:44.000000Z", "issued_at": "2020-11-06T18:02:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6f121ac206344b789a1e6d58c76fd2de", "name": "tempest-FlavorsExtRbacTest-1244557403"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:44.037 39 INFO tempest.lib.common.rest_client [req-126f361f-7f24-4fc4-be77-b439aa0b68cd ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.213s 2020-11-06 18:02:44.038 39 DEBUG tempest.lib.common.rest_client [req-126f361f-7f24-4fc4-be77-b439aa0b68cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-126f361f-7f24-4fc4-be77-b439aa0b68cd', 'x-compute-request-id': 'req-126f361f-7f24-4fc4-be77-b439aa0b68cd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:44.133 38 INFO tempest.lib.common.rest_client [req-afc539fc-797d-4bd1-9c4c-3d89852d70d7 ] Request (FlavorsExtRbacTest:test_delete_flavor): 204 DELETE http://172.30.13.94:9696/v2.0/flavors/30940383-d5b2-4fd3-ac16-b7060cfd75e7 0.103s 2020-11-06 18:02:44.133 38 DEBUG tempest.lib.common.rest_client [req-afc539fc-797d-4bd1-9c4c-3d89852d70d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-afc539fc-797d-4bd1-9c4c-3d89852d70d7', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:02:44 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors/30940383-d5b2-4fd3-ac16-b7060cfd75e7'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:44.134 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:44.187 38 INFO tempest.lib.common.rest_client [req-2f94f8c7-0844-4652-a0bb-6efac3d75395 ] Request (FlavorsExtRbacTest:test_delete_flavor): 200 GET http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles 0.052s 2020-11-06 18:02:44.188 38 DEBUG tempest.lib.common.rest_client [req-2f94f8c7-0844-4652-a0bb-6efac3d75395 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2f94f8c7-0844-4652-a0bb-6efac3d75395', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:44.230 38 INFO tempest.lib.common.rest_client [req-643c912f-d375-437f-8d6c-182899dcdc5f ] Request (FlavorsExtRbacTest:test_delete_flavor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-11-06 18:02:44.231 38 DEBUG tempest.lib.common.rest_client [req-643c912f-d375-437f-8d6c-182899dcdc5f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-643c912f-d375-437f-8d6c-182899dcdc5f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b57c33dd08574923b7fb03c67ce0542c", "name": "tempest-FlavorsExtRbacTest-1244557403", "password_expires_at": null}, "audit_ids": ["_Nrc8ppARS6SLH2lddd1MA"], "expires_at": "2020-11-06T19:02:44.000000Z", "issued_at": "2020-11-06T18:02:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6f121ac206344b789a1e6d58c76fd2de", "name": "tempest-FlavorsExtRbacTest-1244557403"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:44.263 38 INFO tempest.lib.common.rest_client [req-3832df16-50ef-4fac-86f1-6b93f8baea2a ] Request (FlavorsExtRbacTest:test_delete_flavor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:02:44.264 38 DEBUG tempest.lib.common.rest_client [req-3832df16-50ef-4fac-86f1-6b93f8baea2a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3832df16-50ef-4fac-86f1-6b93f8baea2a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b57c33dd08574923b7fb03c67ce0542c", "name": "tempest-FlavorsExtRbacTest-1244557403", "password_expires_at": null}, "audit_ids": ["ID0V6mh6SsGxGfuaousjUg"], "expires_at": "2020-11-06T19:02:44.000000Z", "issued_at": "2020-11-06T18:02:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6f121ac206344b789a1e6d58c76fd2de", "name": "tempest-FlavorsExtRbacTest-1244557403"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:44.349 38 INFO tempest.lib.common.rest_client [req-660b2460-11c5-4c42-947e-34297d90ec37 ] Request (FlavorsExtRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94:9696/v2.0/flavors/30940383-d5b2-4fd3-ac16-b7060cfd75e7 0.084s 2020-11-06 18:02:44.350 38 DEBUG tempest.lib.common.rest_client [req-660b2460-11c5-4c42-947e-34297d90ec37 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '136', 'x-openstack-request-id': 'req-660b2460-11c5-4c42-947e-34297d90ec37', 'date': 'Fri, 06 Nov 2020 18:02:44 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors/30940383-d5b2-4fd3-ac16-b7060cfd75e7'} Body: b'{"NeutronError": {"type": "FlavorNotFound", "message": "Flavor 30940383-d5b2-4fd3-ac16-b7060cfd75e7 could not be found.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:44.353 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:44.357 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_flavor, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:44.381 38 INFO tempest.lib.common.rest_client [req-6d8a5ad1-7225-464f-a09a-47bece5e5293 ] Request (FlavorsExtRbacTest:test_list_flavors): 201 POST http://172.30.13.94:9696/v2.0/flavors 0.023s 2020-11-06 18:02:44.382 38 DEBUG tempest.lib.common.rest_client [req-6d8a5ad1-7225-464f-a09a-47bece5e5293 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"flavor": {"service_type": "L3_ROUTER_NAT"}} Response - Headers: {'content-type': 'application/json', 'content-length': '163', 'x-openstack-request-id': 'req-6d8a5ad1-7225-464f-a09a-47bece5e5293', 'date': 'Fri, 06 Nov 2020 18:02:44 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors'} Body: b'{"flavor": {"id": "4bbfff96-2daf-4c44-93e0-baf3b032dc83", "name": "", "description": "", "service_type": "L3_ROUTER_NAT", "enabled": true, "service_profiles": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:44.382 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:44.434 38 INFO tempest.lib.common.rest_client [req-048550c8-3603-4a06-a690-e04a697310bb ] Request (FlavorsExtRbacTest:test_list_flavors): 200 GET http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles 0.050s 2020-11-06 18:02:44.435 38 DEBUG tempest.lib.common.rest_client [req-048550c8-3603-4a06-a690-e04a697310bb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-048550c8-3603-4a06-a690-e04a697310bb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:44.475 38 INFO tempest.lib.common.rest_client [req-04f6188a-54b6-4b1f-9260-845c82b21769 ] Request (FlavorsExtRbacTest:test_list_flavors): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:02:44.476 38 DEBUG tempest.lib.common.rest_client [req-04f6188a-54b6-4b1f-9260-845c82b21769 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-04f6188a-54b6-4b1f-9260-845c82b21769', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b57c33dd08574923b7fb03c67ce0542c", "name": "tempest-FlavorsExtRbacTest-1244557403", "password_expires_at": null}, "audit_ids": ["m59b4Tf5Q46RAKRZYZPJRg"], "expires_at": "2020-11-06T19:02:44.000000Z", "issued_at": "2020-11-06T18:02:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6f121ac206344b789a1e6d58c76fd2de", "name": "tempest-FlavorsExtRbacTest-1244557403"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:44.510 38 INFO tempest.lib.common.rest_client [req-9579900b-1575-4041-940f-2069cc4408d6 ] Request (FlavorsExtRbacTest:test_list_flavors): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:02:44.511 38 DEBUG tempest.lib.common.rest_client [req-9579900b-1575-4041-940f-2069cc4408d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9579900b-1575-4041-940f-2069cc4408d6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b57c33dd08574923b7fb03c67ce0542c", "name": "tempest-FlavorsExtRbacTest-1244557403", "password_expires_at": null}, "audit_ids": ["_EnqslJ6QvKwxm6yC4zSEg"], "expires_at": "2020-11-06T19:02:44.000000Z", "issued_at": "2020-11-06T18:02:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6f121ac206344b789a1e6d58c76fd2de", "name": "tempest-FlavorsExtRbacTest-1244557403"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:44.606 38 INFO tempest.lib.common.rest_client [req-947b5853-6d1b-4a2f-ba82-4cfb112c1cde ] Request (FlavorsExtRbacTest:test_list_flavors): 200 GET http://172.30.13.94:9696/v2.0/flavors 0.095s 2020-11-06 18:02:44.607 38 DEBUG tempest.lib.common.rest_client [req-947b5853-6d1b-4a2f-ba82-4cfb112c1cde ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '166', 'x-openstack-request-id': 'req-947b5853-6d1b-4a2f-ba82-4cfb112c1cde', 'date': 'Fri, 06 Nov 2020 18:02:44 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors'} Body: b'{"flavors": [{"id": "4bbfff96-2daf-4c44-93e0-baf3b032dc83", "name": "", "description": "", "service_type": "L3_ROUTER_NAT", "enabled": true, "service_profiles": []}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:44.608 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:44.658 38 INFO tempest.lib.common.rest_client [req-3d2f41ab-eb26-4e8b-8d04-e7339936c9a1 ] Request (FlavorsExtRbacTest:test_list_flavors): 200 GET http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles 0.049s 2020-11-06 18:02:44.658 38 DEBUG tempest.lib.common.rest_client [req-3d2f41ab-eb26-4e8b-8d04-e7339936c9a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3d2f41ab-eb26-4e8b-8d04-e7339936c9a1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:44.690 38 INFO tempest.lib.common.rest_client [req-e6cfb834-b0fa-4200-9c68-d33e398b055c ] Request (FlavorsExtRbacTest:test_list_flavors): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:02:44.691 38 DEBUG tempest.lib.common.rest_client [req-e6cfb834-b0fa-4200-9c68-d33e398b055c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e6cfb834-b0fa-4200-9c68-d33e398b055c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b57c33dd08574923b7fb03c67ce0542c", "name": "tempest-FlavorsExtRbacTest-1244557403", "password_expires_at": null}, "audit_ids": ["LDbPqOP2T_KU-AsTrzk5Aw"], "expires_at": "2020-11-06T19:02:44.000000Z", "issued_at": "2020-11-06T18:02:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6f121ac206344b789a1e6d58c76fd2de", "name": "tempest-FlavorsExtRbacTest-1244557403"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:44.726 38 INFO tempest.lib.common.rest_client [req-894fc1da-15d8-4c75-b89a-2fde19a6a0e8 ] Request (FlavorsExtRbacTest:test_list_flavors): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:02:44.726 38 DEBUG tempest.lib.common.rest_client [req-894fc1da-15d8-4c75-b89a-2fde19a6a0e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-894fc1da-15d8-4c75-b89a-2fde19a6a0e8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b57c33dd08574923b7fb03c67ce0542c", "name": "tempest-FlavorsExtRbacTest-1244557403", "password_expires_at": null}, "audit_ids": ["KNtzXz_RS7GbvdmnBxUU3Q"], "expires_at": "2020-11-06T19:02:44.000000Z", "issued_at": "2020-11-06T18:02:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6f121ac206344b789a1e6d58c76fd2de", "name": "tempest-FlavorsExtRbacTest-1244557403"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:44.794 37 INFO tempest.lib.common.rest_client [req-2ebc2dc5-76d2-4935-8f48-c3df03e7f4ee ] Request (ServerVolumeAttachmentRbacTest:test_delete_volume_attachment): 200 GET http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177 0.078s 2020-11-06 18:02:44.795 37 DEBUG tempest.lib.common.rest_client [req-2ebc2dc5-76d2-4935-8f48-c3df03e7f4ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-2ebc2dc5-76d2-4935-8f48-c3df03e7f4ee', 'content-length': '1375', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2ebc2dc5-76d2-4935-8f48-c3df03e7f4ee', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177'} Body: b'{"volume": {"id": "2766140b-9b9f-43bb-990b-38596df82177", "status": "in-use", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:02:38.000000", "updated_at": "2020-11-06T18:02:45.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-2023480968", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}], "user_id": "31dfe8b61f554cfe82a18efd5d747c55", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [{"id": "2766140b-9b9f-43bb-990b-38596df82177", "attachment_id": "68f0a3f4-63cc-42ed-86a9-85083c85e380", "volume_id": "2766140b-9b9f-43bb-990b-38596df82177", "server_id": "e62cf5bc-fdb9-402c-b1b0-22ca5336dbac", "host_name": "lf-virtual8", "device": "/dev/sdb", "attached_at": "2020-11-06T18:02:44.000000"}], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "198374b90e3641c39c58226d89b9ccc8"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:44.808 37 INFO tempest.common.waiters [-] volume 2766140b-9b9f-43bb-990b-38596df82177 reached in-use after waiting for 1.808907 seconds 2020-11-06 18:02:44.809 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:44.834 38 INFO tempest.lib.common.rest_client [req-54117547-2e9a-4d8c-b166-fbd51ba409b7 ] Request (FlavorsExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/flavors/4bbfff96-2daf-4c44-93e0-baf3b032dc83 0.106s 2020-11-06 18:02:44.835 38 DEBUG tempest.lib.common.rest_client [req-54117547-2e9a-4d8c-b166-fbd51ba409b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-54117547-2e9a-4d8c-b166-fbd51ba409b7', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:02:44 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors/4bbfff96-2daf-4c44-93e0-baf3b032dc83'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:44.837 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:44.841 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_flavor, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:44.864 38 INFO tempest.lib.common.rest_client [req-225b320a-6bb4-466d-96ce-0eecf9b19a09 ] Request (FlavorsExtRbacTest:test_show_flavor): 201 POST http://172.30.13.94:9696/v2.0/flavors 0.022s 2020-11-06 18:02:44.865 38 DEBUG tempest.lib.common.rest_client [req-225b320a-6bb4-466d-96ce-0eecf9b19a09 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"flavor": {"service_type": "L3_ROUTER_NAT"}} Response - Headers: {'content-type': 'application/json', 'content-length': '163', 'x-openstack-request-id': 'req-225b320a-6bb4-466d-96ce-0eecf9b19a09', 'date': 'Fri, 06 Nov 2020 18:02:44 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors'} Body: b'{"flavor": {"id": "f92ce8fe-6916-486e-b43d-819781fbc155", "name": "", "description": "", "service_type": "L3_ROUTER_NAT", "enabled": true, "service_profiles": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:44.865 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:44.872 37 INFO tempest.lib.common.rest_client [req-10e603af-8afb-4506-a83b-f3e9e333992b ] Request (ServerVolumeAttachmentRbacTest:test_delete_volume_attachment): 200 GET http://172.30.13.94/identity/v3/projects/198374b90e3641c39c58226d89b9ccc8/users/31dfe8b61f554cfe82a18efd5d747c55/roles 0.062s 2020-11-06 18:02:44.872 37 DEBUG tempest.lib.common.rest_client [req-10e603af-8afb-4506-a83b-f3e9e333992b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-10e603af-8afb-4506-a83b-f3e9e333992b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/198374b90e3641c39c58226d89b9ccc8/users/31dfe8b61f554cfe82a18efd5d747c55/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/198374b90e3641c39c58226d89b9ccc8/users/31dfe8b61f554cfe82a18efd5d747c55/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:44.920 38 INFO tempest.lib.common.rest_client [req-776a3d3f-21b2-4cf6-ac6e-daf50bc15406 ] Request (FlavorsExtRbacTest:test_show_flavor): 200 GET http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles 0.054s 2020-11-06 18:02:44.921 38 DEBUG tempest.lib.common.rest_client [req-776a3d3f-21b2-4cf6-ac6e-daf50bc15406 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-776a3d3f-21b2-4cf6-ac6e-daf50bc15406', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:44.958 38 INFO tempest.lib.common.rest_client [req-9b290728-ba7f-4e33-b196-fe2cfb72ea1a ] Request (FlavorsExtRbacTest:test_show_flavor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:02:44.958 38 DEBUG tempest.lib.common.rest_client [req-9b290728-ba7f-4e33-b196-fe2cfb72ea1a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9b290728-ba7f-4e33-b196-fe2cfb72ea1a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b57c33dd08574923b7fb03c67ce0542c", "name": "tempest-FlavorsExtRbacTest-1244557403", "password_expires_at": null}, "audit_ids": ["hTzfTIWZQ3iGtDgEu7S1kw"], "expires_at": "2020-11-06T19:02:44.000000Z", "issued_at": "2020-11-06T18:02:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6f121ac206344b789a1e6d58c76fd2de", "name": "tempest-FlavorsExtRbacTest-1244557403"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:44.965 37 INFO tempest.lib.common.rest_client [req-0ba9ece2-7714-4e29-98b6-57f809e16dae ] Request (ServerVolumeAttachmentRbacTest:test_delete_volume_attachment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-11-06 18:02:44.966 37 DEBUG tempest.lib.common.rest_client [req-0ba9ece2-7714-4e29-98b6-57f809e16dae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6652', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0ba9ece2-7714-4e29-98b6-57f809e16dae', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "31dfe8b61f554cfe82a18efd5d747c55", "name": "tempest-ServerVolumeAttachmentRbacTest-1175560981", "password_expires_at": null}, "audit_ids": ["CqGHJczURLi-cEyfAqHYCw"], "expires_at": "2020-11-06T19:02:44.000000Z", "issued_at": "2020-11-06T18:02:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "198374b90e3641c39c58226d89b9ccc8", "name": "tempest-ServerVolumeAttachmentRbacTest-1175560981"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:44.998 38 INFO tempest.lib.common.rest_client [req-e818ba87-e012-42af-a24f-ff9b23283062 ] Request (FlavorsExtRbacTest:test_show_flavor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:02:44.999 38 DEBUG tempest.lib.common.rest_client [req-e818ba87-e012-42af-a24f-ff9b23283062 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e818ba87-e012-42af-a24f-ff9b23283062', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b57c33dd08574923b7fb03c67ce0542c", "name": "tempest-FlavorsExtRbacTest-1244557403", "password_expires_at": null}, "audit_ids": ["AaJDK_PuSLCgWaid-0KU1A"], "expires_at": "2020-11-06T19:02:44.000000Z", "issued_at": "2020-11-06T18:02:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6f121ac206344b789a1e6d58c76fd2de", "name": "tempest-FlavorsExtRbacTest-1244557403"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:45.084 38 INFO tempest.lib.common.rest_client [req-d0feff04-b264-48bd-ba2f-e5165e70c2c2 ] Request (FlavorsExtRbacTest:test_show_flavor): 200 GET http://172.30.13.94:9696/v2.0/flavors/f92ce8fe-6916-486e-b43d-819781fbc155 0.084s 2020-11-06 18:02:45.085 38 DEBUG tempest.lib.common.rest_client [req-d0feff04-b264-48bd-ba2f-e5165e70c2c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '163', 'x-openstack-request-id': 'req-d0feff04-b264-48bd-ba2f-e5165e70c2c2', 'date': 'Fri, 06 Nov 2020 18:02:45 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors/f92ce8fe-6916-486e-b43d-819781fbc155'} Body: b'{"flavor": {"id": "f92ce8fe-6916-486e-b43d-819781fbc155", "name": "", "description": "", "service_type": "L3_ROUTER_NAT", "enabled": true, "service_profiles": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:45.085 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:45.141 38 INFO tempest.lib.common.rest_client [req-e62fa698-bc53-4df3-a6a0-78ed07d9c12b ] Request (FlavorsExtRbacTest:test_show_flavor): 200 GET http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles 0.055s 2020-11-06 18:02:45.142 38 DEBUG tempest.lib.common.rest_client [req-e62fa698-bc53-4df3-a6a0-78ed07d9c12b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e62fa698-bc53-4df3-a6a0-78ed07d9c12b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:45.177 38 INFO tempest.lib.common.rest_client [req-c7e73586-84f3-46e0-a2b3-407902a788ac ] Request (FlavorsExtRbacTest:test_show_flavor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:02:45.178 38 DEBUG tempest.lib.common.rest_client [req-c7e73586-84f3-46e0-a2b3-407902a788ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c7e73586-84f3-46e0-a2b3-407902a788ac', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b57c33dd08574923b7fb03c67ce0542c", "name": "tempest-FlavorsExtRbacTest-1244557403", "password_expires_at": null}, "audit_ids": ["xKZbhEa_TOign234jSVSJw"], "expires_at": "2020-11-06T19:02:45.000000Z", "issued_at": "2020-11-06T18:02:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6f121ac206344b789a1e6d58c76fd2de", "name": "tempest-FlavorsExtRbacTest-1244557403"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:45.217 38 INFO tempest.lib.common.rest_client [req-f56f95c7-e412-4a28-8fb2-40e765e86173 ] Request (FlavorsExtRbacTest:test_show_flavor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:02:45.217 38 DEBUG tempest.lib.common.rest_client [req-f56f95c7-e412-4a28-8fb2-40e765e86173 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f56f95c7-e412-4a28-8fb2-40e765e86173', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b57c33dd08574923b7fb03c67ce0542c", "name": "tempest-FlavorsExtRbacTest-1244557403", "password_expires_at": null}, "audit_ids": ["5tc2vB6WRbmp4_levRgVUQ"], "expires_at": "2020-11-06T19:02:45.000000Z", "issued_at": "2020-11-06T18:02:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6f121ac206344b789a1e6d58c76fd2de", "name": "tempest-FlavorsExtRbacTest-1244557403"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:45.264 39 INFO tempest.lib.common.rest_client [req-0144cb55-77af-4dff-bc03-ff1a4f3d8076 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.213s 2020-11-06 18:02:45.265 39 DEBUG tempest.lib.common.rest_client [req-0144cb55-77af-4dff-bc03-ff1a4f3d8076 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0144cb55-77af-4dff-bc03-ff1a4f3d8076', 'x-compute-request-id': 'req-0144cb55-77af-4dff-bc03-ff1a4f3d8076', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:45.325 37 INFO tempest.lib.common.rest_client [req-216731e9-658f-4d51-8867-98b9069a7ef9 ] Request (ServerVolumeAttachmentRbacTest:test_delete_volume_attachment): 202 DELETE http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac/os-volume_attachments/2766140b-9b9f-43bb-990b-38596df82177 0.357s 2020-11-06 18:02:45.326 37 DEBUG tempest.lib.common.rest_client [req-216731e9-658f-4d51-8867-98b9069a7ef9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-216731e9-658f-4d51-8867-98b9069a7ef9', 'x-compute-request-id': 'req-216731e9-658f-4d51-8867-98b9069a7ef9', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac/os-volume_attachments/2766140b-9b9f-43bb-990b-38596df82177'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:45.326 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:45.331 38 INFO tempest.lib.common.rest_client [req-fb7e0ba7-0d7a-414b-aa83-12715d438c10 ] Request (FlavorsExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/flavors/f92ce8fe-6916-486e-b43d-819781fbc155 0.112s 2020-11-06 18:02:45.332 38 DEBUG tempest.lib.common.rest_client [req-fb7e0ba7-0d7a-414b-aa83-12715d438c10 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-fb7e0ba7-0d7a-414b-aa83-12715d438c10', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:02:45 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors/f92ce8fe-6916-486e-b43d-819781fbc155'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:45.334 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:45.338 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_flavor, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:45.339 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:45.342 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_flavor, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:45.362 38 INFO tempest.lib.common.rest_client [req-3e635f5a-cd67-4ec8-b2b9-5145a3a9bf47 ] Request (FlavorsExtRbacTest:test_update_flavor): 201 POST http://172.30.13.94:9696/v2.0/flavors 0.019s 2020-11-06 18:02:45.362 38 DEBUG tempest.lib.common.rest_client [req-3e635f5a-cd67-4ec8-b2b9-5145a3a9bf47 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"flavor": {"service_type": "L3_ROUTER_NAT"}} Response - Headers: {'content-type': 'application/json', 'content-length': '163', 'x-openstack-request-id': 'req-3e635f5a-cd67-4ec8-b2b9-5145a3a9bf47', 'date': 'Fri, 06 Nov 2020 18:02:45 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors'} Body: b'{"flavor": {"id": "672d0856-9cd6-42e6-8f5c-ad59d3de2cb4", "name": "", "description": "", "service_type": "L3_ROUTER_NAT", "enabled": true, "service_profiles": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:45.363 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:45.387 37 INFO tempest.lib.common.rest_client [req-26cea777-e0f8-4ccc-9575-617b6308e0d1 ] Request (ServerVolumeAttachmentRbacTest:test_delete_volume_attachment): 200 GET http://172.30.13.94/identity/v3/projects/198374b90e3641c39c58226d89b9ccc8/users/31dfe8b61f554cfe82a18efd5d747c55/roles 0.060s 2020-11-06 18:02:45.388 37 DEBUG tempest.lib.common.rest_client [req-26cea777-e0f8-4ccc-9575-617b6308e0d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-26cea777-e0f8-4ccc-9575-617b6308e0d1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/198374b90e3641c39c58226d89b9ccc8/users/31dfe8b61f554cfe82a18efd5d747c55/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/198374b90e3641c39c58226d89b9ccc8/users/31dfe8b61f554cfe82a18efd5d747c55/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:45.415 38 INFO tempest.lib.common.rest_client [req-2b13b6f8-05fa-4db1-918c-f39281e86983 ] Request (FlavorsExtRbacTest:test_update_flavor): 200 GET http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles 0.051s 2020-11-06 18:02:45.416 38 DEBUG tempest.lib.common.rest_client [req-2b13b6f8-05fa-4db1-918c-f39281e86983 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2b13b6f8-05fa-4db1-918c-f39281e86983', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:45.420 37 INFO tempest.lib.common.rest_client [req-77c5d251-af63-4216-87f4-b9e7a2a480b2 ] Request (ServerVolumeAttachmentRbacTest:test_delete_volume_attachment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:02:45.420 37 DEBUG tempest.lib.common.rest_client [req-77c5d251-af63-4216-87f4-b9e7a2a480b2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6652', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-77c5d251-af63-4216-87f4-b9e7a2a480b2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "31dfe8b61f554cfe82a18efd5d747c55", "name": "tempest-ServerVolumeAttachmentRbacTest-1175560981", "password_expires_at": null}, "audit_ids": ["PnaF-juTRvO9IYdCqlv38w"], "expires_at": "2020-11-06T19:02:45.000000Z", "issued_at": "2020-11-06T18:02:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "198374b90e3641c39c58226d89b9ccc8", "name": "tempest-ServerVolumeAttachmentRbacTest-1175560981"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:45.424 40 INFO tempest.lib.common.rest_client [req-b45b2fed-57f9-49eb-8207-eccb06dc3973 ] Request (RbacPoliciesExtRbacTest:test_list_rbac_policies): 201 POST http://172.30.13.94:9696/v2.0/rbac-policies 1.596s 2020-11-06 18:02:45.425 40 DEBUG tempest.lib.common.rest_client [req-b45b2fed-57f9-49eb-8207-eccb06dc3973 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"rbac_policy": {"target_tenant": "bacf7290ccf4444e8183eb504493cdde", "object_type": "network", "object_id": "c1d4e282-563f-4b42-a9f4-751c12f5350d", "action": "access_as_shared"}} Response - Headers: {'content-type': 'application/json', 'content-length': '324', 'x-openstack-request-id': 'req-b45b2fed-57f9-49eb-8207-eccb06dc3973', 'date': 'Fri, 06 Nov 2020 18:02:45 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/rbac-policies'} Body: b'{"rbac_policy": {"id": "3d442210-8362-41bb-9b41-58f5761d1649", "project_id": "bacf7290ccf4444e8183eb504493cdde", "target_tenant": "bacf7290ccf4444e8183eb504493cdde", "action": "access_as_shared", "object_id": "c1d4e282-563f-4b42-a9f4-751c12f5350d", "object_type": "network", "tenant_id": "bacf7290ccf4444e8183eb504493cdde"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:45.425 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:45.452 38 INFO tempest.lib.common.rest_client [req-61245a84-bdde-476d-8acf-ca53d2fde359 ] Request (FlavorsExtRbacTest:test_update_flavor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:02:45.453 38 DEBUG tempest.lib.common.rest_client [req-61245a84-bdde-476d-8acf-ca53d2fde359 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-61245a84-bdde-476d-8acf-ca53d2fde359', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b57c33dd08574923b7fb03c67ce0542c", "name": "tempest-FlavorsExtRbacTest-1244557403", "password_expires_at": null}, "audit_ids": ["oMWsNlPgRT2R7iXGi-ZfZw"], "expires_at": "2020-11-06T19:02:45.000000Z", "issued_at": "2020-11-06T18:02:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6f121ac206344b789a1e6d58c76fd2de", "name": "tempest-FlavorsExtRbacTest-1244557403"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:45.472 40 INFO tempest.lib.common.rest_client [req-8cd1252f-b604-4fc8-b763-3f6364a989f8 ] Request (RbacPoliciesExtRbacTest:test_list_rbac_policies): 200 GET http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles 0.046s 2020-11-06 18:02:45.473 40 DEBUG tempest.lib.common.rest_client [req-8cd1252f-b604-4fc8-b763-3f6364a989f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8cd1252f-b604-4fc8-b763-3f6364a989f8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:45.488 38 INFO tempest.lib.common.rest_client [req-61f62480-ab94-4f40-bb6d-2ca2808015fd ] Request (FlavorsExtRbacTest:test_update_flavor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:02:45.489 38 DEBUG tempest.lib.common.rest_client [req-61f62480-ab94-4f40-bb6d-2ca2808015fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-61f62480-ab94-4f40-bb6d-2ca2808015fd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b57c33dd08574923b7fb03c67ce0542c", "name": "tempest-FlavorsExtRbacTest-1244557403", "password_expires_at": null}, "audit_ids": ["ZkasoWorT62PiegR4pVk-A"], "expires_at": "2020-11-06T19:02:45.000000Z", "issued_at": "2020-11-06T18:02:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6f121ac206344b789a1e6d58c76fd2de", "name": "tempest-FlavorsExtRbacTest-1244557403"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:45.514 40 INFO tempest.lib.common.rest_client [req-bf88f4be-7b5f-4ed6-a973-93d900e55faa ] Request (RbacPoliciesExtRbacTest:test_list_rbac_policies): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:02:45.515 40 DEBUG tempest.lib.common.rest_client [req-bf88f4be-7b5f-4ed6-a973-93d900e55faa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bf88f4be-7b5f-4ed6-a973-93d900e55faa', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2e60a8c38b4747239417157dd4a249f9", "name": "tempest-RbacPoliciesExtRbacTest-345152215", "password_expires_at": null}, "audit_ids": ["xpFR2IMqQ6CjJRQ-XnWQBA"], "expires_at": "2020-11-06T19:02:45.000000Z", "issued_at": "2020-11-06T18:02:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bacf7290ccf4444e8183eb504493cdde", "name": "tempest-RbacPoliciesExtRbacTest-345152215"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:45.547 40 INFO tempest.lib.common.rest_client [req-2cd8e7b3-60ae-4278-b6ad-059decacc4ba ] Request (RbacPoliciesExtRbacTest:test_list_rbac_policies): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:02:45.548 40 DEBUG tempest.lib.common.rest_client [req-2cd8e7b3-60ae-4278-b6ad-059decacc4ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2cd8e7b3-60ae-4278-b6ad-059decacc4ba', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2e60a8c38b4747239417157dd4a249f9", "name": "tempest-RbacPoliciesExtRbacTest-345152215", "password_expires_at": null}, "audit_ids": ["foCmrlmrRMK0ts-rcjYkwA"], "expires_at": "2020-11-06T19:02:45.000000Z", "issued_at": "2020-11-06T18:02:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bacf7290ccf4444e8183eb504493cdde", "name": "tempest-RbacPoliciesExtRbacTest-345152215"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:45.586 38 INFO tempest.lib.common.rest_client [req-78c0be2b-6825-49f5-89b6-c9c4afbda6d5 ] Request (FlavorsExtRbacTest:test_update_flavor): 200 PUT http://172.30.13.94:9696/v2.0/flavors/672d0856-9cd6-42e6-8f5c-ad59d3de2cb4 0.096s 2020-11-06 18:02:45.587 38 DEBUG tempest.lib.common.rest_client [req-78c0be2b-6825-49f5-89b6-c9c4afbda6d5 ] Request - Headers: {'X-Auth-Token': ''} Body: {"flavor": {"name": "tempest-FlavorsExtRbacTest-Flavor-1661453229"}} Response - Headers: {'content-type': 'application/json', 'content-length': '207', 'x-openstack-request-id': 'req-78c0be2b-6825-49f5-89b6-c9c4afbda6d5', 'date': 'Fri, 06 Nov 2020 18:02:45 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors/672d0856-9cd6-42e6-8f5c-ad59d3de2cb4'} Body: b'{"flavor": {"id": "672d0856-9cd6-42e6-8f5c-ad59d3de2cb4", "name": "tempest-FlavorsExtRbacTest-Flavor-1661453229", "description": "", "service_type": "L3_ROUTER_NAT", "enabled": true, "service_profiles": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:45.587 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:45.603 37 INFO tempest.lib.common.rest_client [req-c6b70a01-b325-49ad-9b1e-1a938566f33f ] Request (ServerVolumeAttachmentRbacTest:test_delete_volume_attachment): 200 GET http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177 0.182s 2020-11-06 18:02:45.604 37 DEBUG tempest.lib.common.rest_client [req-c6b70a01-b325-49ad-9b1e-1a938566f33f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c6b70a01-b325-49ad-9b1e-1a938566f33f', 'content-length': '1378', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c6b70a01-b325-49ad-9b1e-1a938566f33f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177'} Body: b'{"volume": {"id": "2766140b-9b9f-43bb-990b-38596df82177", "status": "detaching", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:02:38.000000", "updated_at": "2020-11-06T18:02:45.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-2023480968", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}], "user_id": "31dfe8b61f554cfe82a18efd5d747c55", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [{"id": "2766140b-9b9f-43bb-990b-38596df82177", "attachment_id": "68f0a3f4-63cc-42ed-86a9-85083c85e380", "volume_id": "2766140b-9b9f-43bb-990b-38596df82177", "server_id": "e62cf5bc-fdb9-402c-b1b0-22ca5336dbac", "host_name": "lf-virtual8", "device": "/dev/sdb", "attached_at": "2020-11-06T18:02:44.000000"}], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "198374b90e3641c39c58226d89b9ccc8"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:45.635 40 INFO tempest.lib.common.rest_client [req-8e368faf-04c7-4557-9fa3-35c5f8cc08e7 ] Request (RbacPoliciesExtRbacTest:test_list_rbac_policies): 200 GET http://172.30.13.94:9696/v2.0/rbac-policies?id=3d442210-8362-41bb-9b41-58f5761d1649 0.086s 2020-11-06 18:02:45.636 40 DEBUG tempest.lib.common.rest_client [req-8e368faf-04c7-4557-9fa3-35c5f8cc08e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '328', 'x-openstack-request-id': 'req-8e368faf-04c7-4557-9fa3-35c5f8cc08e7', 'date': 'Fri, 06 Nov 2020 18:02:45 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/rbac-policies?id=3d442210-8362-41bb-9b41-58f5761d1649'} Body: b'{"rbac_policies": [{"id": "3d442210-8362-41bb-9b41-58f5761d1649", "project_id": "bacf7290ccf4444e8183eb504493cdde", "target_tenant": "bacf7290ccf4444e8183eb504493cdde", "action": "access_as_shared", "object_id": "c1d4e282-563f-4b42-a9f4-751c12f5350d", "object_type": "network", "tenant_id": "bacf7290ccf4444e8183eb504493cdde"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:45.636 38 INFO tempest.lib.common.rest_client [req-8b1b307e-64cd-4e00-b995-0a34bbc63385 ] Request (FlavorsExtRbacTest:test_update_flavor): 200 GET http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles 0.048s 2020-11-06 18:02:45.636 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:45.636 38 DEBUG tempest.lib.common.rest_client [req-8b1b307e-64cd-4e00-b995-0a34bbc63385 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8b1b307e-64cd-4e00-b995-0a34bbc63385', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de/users/b57c33dd08574923b7fb03c67ce0542c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:45.669 38 INFO tempest.lib.common.rest_client [req-5267dbd2-0bb1-4922-9b5c-76a544659b84 ] Request (FlavorsExtRbacTest:test_update_flavor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:02:45.670 38 DEBUG tempest.lib.common.rest_client [req-5267dbd2-0bb1-4922-9b5c-76a544659b84 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5267dbd2-0bb1-4922-9b5c-76a544659b84', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b57c33dd08574923b7fb03c67ce0542c", "name": "tempest-FlavorsExtRbacTest-1244557403", "password_expires_at": null}, "audit_ids": ["78AAm1lAT42yiNKnMgowvQ"], "expires_at": "2020-11-06T19:02:45.000000Z", "issued_at": "2020-11-06T18:02:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6f121ac206344b789a1e6d58c76fd2de", "name": "tempest-FlavorsExtRbacTest-1244557403"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:45.691 40 INFO tempest.lib.common.rest_client [req-576b763b-b38c-4338-8db2-582507689a72 ] Request (RbacPoliciesExtRbacTest:test_list_rbac_policies): 200 GET http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles 0.054s 2020-11-06 18:02:45.691 40 DEBUG tempest.lib.common.rest_client [req-576b763b-b38c-4338-8db2-582507689a72 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-576b763b-b38c-4338-8db2-582507689a72', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:45.708 38 INFO tempest.lib.common.rest_client [req-54bf66e5-6ebb-42c6-8907-e937d7b6c7f5 ] Request (FlavorsExtRbacTest:test_update_flavor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:02:45.709 38 DEBUG tempest.lib.common.rest_client [req-54bf66e5-6ebb-42c6-8907-e937d7b6c7f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-54bf66e5-6ebb-42c6-8907-e937d7b6c7f5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b57c33dd08574923b7fb03c67ce0542c", "name": "tempest-FlavorsExtRbacTest-1244557403", "password_expires_at": null}, "audit_ids": ["xke8BbqyQuSGgD34GnITaw"], "expires_at": "2020-11-06T19:02:45.000000Z", "issued_at": "2020-11-06T18:02:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6f121ac206344b789a1e6d58c76fd2de", "name": "tempest-FlavorsExtRbacTest-1244557403"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f121ac206344b789a1e6d58c76fd2de", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:45.726 40 INFO tempest.lib.common.rest_client [req-969e1dbd-fe98-4d59-bc44-cb99877b465f ] Request (RbacPoliciesExtRbacTest:test_list_rbac_policies): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:02:45.727 40 DEBUG tempest.lib.common.rest_client [req-969e1dbd-fe98-4d59-bc44-cb99877b465f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-969e1dbd-fe98-4d59-bc44-cb99877b465f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2e60a8c38b4747239417157dd4a249f9", "name": "tempest-RbacPoliciesExtRbacTest-345152215", "password_expires_at": null}, "audit_ids": ["QfKG9BF6Qp-Xv2hGKrV9dg"], "expires_at": "2020-11-06T19:02:45.000000Z", "issued_at": "2020-11-06T18:02:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bacf7290ccf4444e8183eb504493cdde", "name": "tempest-RbacPoliciesExtRbacTest-345152215"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:45.762 40 INFO tempest.lib.common.rest_client [req-cd1ede5e-1350-44f7-8f48-f675201a7391 ] Request (RbacPoliciesExtRbacTest:test_list_rbac_policies): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:02:45.762 40 DEBUG tempest.lib.common.rest_client [req-cd1ede5e-1350-44f7-8f48-f675201a7391 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cd1ede5e-1350-44f7-8f48-f675201a7391', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2e60a8c38b4747239417157dd4a249f9", "name": "tempest-RbacPoliciesExtRbacTest-345152215", "password_expires_at": null}, "audit_ids": ["hEDS-CBvRkyMSQk-2cO0bg"], "expires_at": "2020-11-06T19:02:45.000000Z", "issued_at": "2020-11-06T18:02:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bacf7290ccf4444e8183eb504493cdde", "name": "tempest-RbacPoliciesExtRbacTest-345152215"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:45.798 38 INFO tempest.lib.common.rest_client [req-8f079f8e-a991-420b-890c-4c95ffc1c8c3 ] Request (FlavorsExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/flavors/672d0856-9cd6-42e6-8f5c-ad59d3de2cb4 0.087s 2020-11-06 18:02:45.799 38 DEBUG tempest.lib.common.rest_client [req-8f079f8e-a991-420b-890c-4c95ffc1c8c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-8f079f8e-a991-420b-890c-4c95ffc1c8c3', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:02:45 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors/672d0856-9cd6-42e6-8f5c-ad59d3de2cb4'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:45.925 38 INFO tempest.lib.common.rest_client [req-55214847-36c4-4dcd-907e-a2a6f0725c82 ] Request (FlavorsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/b57c33dd08574923b7fb03c67ce0542c 0.124s 2020-11-06 18:02:45.926 38 DEBUG tempest.lib.common.rest_client [req-55214847-36c4-4dcd-907e-a2a6f0725c82 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-55214847-36c4-4dcd-907e-a2a6f0725c82', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/b57c33dd08574923b7fb03c67ce0542c'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:46.013 38 INFO tempest.lib.common.rest_client [req-ab6817df-eb06-4837-8bf3-b3bd1f89f883 ] Request (FlavorsExtRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-11-06 18:02:46.013 38 DEBUG tempest.lib.common.rest_client [req-ab6817df-eb06-4837-8bf3-b3bd1f89f883 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ab6817df-eb06-4837-8bf3-b3bd1f89f883', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["62JJWNieSvGSXeLx328bxw"], "expires_at": "2020-11-06T19:02:45.000000Z", "issued_at": "2020-11-06T18:02:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:46.359 38 INFO tempest.lib.common.rest_client [req-8edf5aca-e565-4e43-b9de-a095e5aba268 ] Request (FlavorsExtRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=6f121ac206344b789a1e6d58c76fd2de&name=default 0.345s 2020-11-06 18:02:46.360 38 DEBUG tempest.lib.common.rest_client [req-8edf5aca-e565-4e43-b9de-a095e5aba268 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-8edf5aca-e565-4e43-b9de-a095e5aba268', 'date': 'Fri, 06 Nov 2020 18:02:46 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=6f121ac206344b789a1e6d58c76fd2de&name=default'} Body: b'{"security_groups": [{"id": "880e9410-ce77-4679-b2ba-654ab7afab02", "name": "default", "stateful": true, "tenant_id": "6f121ac206344b789a1e6d58c76fd2de", "description": "Default security group", "security_group_rules": [{"id": "9be3e8e7-e9ea-4468-b133-f50c9d3eb9e1", "tenant_id": "6f121ac206344b789a1e6d58c76fd2de", "security_group_id": "880e9410-ce77-4679-b2ba-654ab7afab02", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:02:46Z", "updated_at": "2020-11-06T18:02:46Z", "revision_number": 0, "project_id": "6f121ac206344b789a1e6d58c76fd2de"}, {"id": "bc7f6109-9ef9-4931-bf55-d849fe899007", "tenant_id": "6f121ac206344b789a1e6d58c76fd2de", "security_group_id": "880e9410-ce77-4679-b2ba-654ab7afab02", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:02:46Z", "updated_at": "2020-11-06T18:02:46Z", "revision_number": 0, "project_id": "6f121ac206344b789a1e6d58c76fd2de"}, {"id": "befbdcf4-21ca-4836-b796-01695955396d", "tenant_id": "6f121ac206344b789a1e6d58c76fd2de", "security_group_id": "880e9410-ce77-4679-b2ba-654ab7afab02", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "880e9410-ce77-4679-b2ba-654ab7afab02", "description": null, "tags": [], "created_at": "2020-11-06T18:02:46Z", "updated_at": "2020-11-06T18:02:46Z", "revision_number": 0, "project_id": "6f121ac206344b789a1e6d58c76fd2de"}, {"id": "d8ea66f7-7eee-42d8-aed8-c23b67e3254f", "tenant_id": "6f121ac206344b789a1e6d58c76fd2de", "security_group_id": "880e9410-ce77-4679-b2ba-654ab7afab02", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "880e9410-ce77-4679-b2ba-654ab7afab02", "description": null, "tags": [], "created_at": "2020-11-06T18:02:46Z", "updated_at": "2020-11-06T18:02:46Z", "revision_number": 0, "project_id": "6f121ac206344b789a1e6d58c76fd2de"}], "tags": [], "created_at": "2020-11-06T18:02:46Z", "updated_at": "2020-11-06T18:02:46Z", "revision_number": 1, "project_id": "6f121ac206344b789a1e6d58c76fd2de"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:46.524 38 INFO tempest.lib.common.rest_client [req-8103573d-b504-4b35-9621-bc8f87466d1e ] Request (FlavorsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/880e9410-ce77-4679-b2ba-654ab7afab02 0.163s 2020-11-06 18:02:46.524 38 DEBUG tempest.lib.common.rest_client [req-8103573d-b504-4b35-9621-bc8f87466d1e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-8103573d-b504-4b35-9621-bc8f87466d1e', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:02:46 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/880e9410-ce77-4679-b2ba-654ab7afab02'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:46.653 38 INFO tempest.lib.common.rest_client [req-2e27b894-9079-4210-bce1-31331dcef55f ] Request (FlavorsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de 0.127s 2020-11-06 18:02:46.653 38 DEBUG tempest.lib.common.rest_client [req-2e27b894-9079-4210-bce1-31331dcef55f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2e27b894-9079-4210-bce1-31331dcef55f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6f121ac206344b789a1e6d58c76fd2de'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:46.655 38 INFO tempest.test [-] raised in MeteringLabelsRbacTest.setUpClass. Invoking tearDownClass. 2020-11-06 18:02:46.695 37 INFO tempest.lib.common.rest_client [req-aa413f04-52f6-4e7b-a6fb-dc516e5d8565 ] Request (ServerVolumeAttachmentRbacTest:test_delete_volume_attachment): 200 GET http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177 0.073s 2020-11-06 18:02:46.695 37 DEBUG tempest.lib.common.rest_client [req-aa413f04-52f6-4e7b-a6fb-dc516e5d8565 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-aa413f04-52f6-4e7b-a6fb-dc516e5d8565', 'content-length': '1074', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-aa413f04-52f6-4e7b-a6fb-dc516e5d8565', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177'} Body: b'{"volume": {"id": "2766140b-9b9f-43bb-990b-38596df82177", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:02:38.000000", "updated_at": "2020-11-06T18:02:46.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-2023480968", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}], "user_id": "31dfe8b61f554cfe82a18efd5d747c55", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "198374b90e3641c39c58226d89b9ccc8"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:46.707 37 INFO tempest.common.waiters [-] volume 2766140b-9b9f-43bb-990b-38596df82177 reached available after waiting for 1.707105 seconds 2020-11-06 18:02:46.754 39 INFO tempest.lib.common.rest_client [req-e6d37b03-c320-45ba-a677-208698cc6b6b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.472s 2020-11-06 18:02:46.755 39 DEBUG tempest.lib.common.rest_client [req-e6d37b03-c320-45ba-a677-208698cc6b6b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e6d37b03-c320-45ba-a677-208698cc6b6b', 'x-compute-request-id': 'req-e6d37b03-c320-45ba-a677-208698cc6b6b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:46.755 38 INFO tempest.lib.common.rest_client [req-4e41bb16-5403-474d-9e0e-3913b6eceaff ] Request (ServiceProvidersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-11-06 18:02:46.756 38 DEBUG tempest.lib.common.rest_client [req-4e41bb16-5403-474d-9e0e-3913b6eceaff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4e41bb16-5403-474d-9e0e-3913b6eceaff', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["I9nluEXXR3KirZUYD2OUaw"], "expires_at": "2020-11-06T19:02:46.000000Z", "issued_at": "2020-11-06T18:02:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:46.774 37 INFO tempest.lib.common.rest_client [req-9b8896da-b533-432a-bfbc-652a810b3da1 ] Request (ServerVolumeAttachmentRbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177 0.066s 2020-11-06 18:02:46.774 37 DEBUG tempest.lib.common.rest_client [req-9b8896da-b533-432a-bfbc-652a810b3da1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-9b8896da-b533-432a-bfbc-652a810b3da1', 'content-length': '1074', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9b8896da-b533-432a-bfbc-652a810b3da1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177'} Body: b'{"volume": {"id": "2766140b-9b9f-43bb-990b-38596df82177", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:02:38.000000", "updated_at": "2020-11-06T18:02:46.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-2023480968", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}], "user_id": "31dfe8b61f554cfe82a18efd5d747c55", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "198374b90e3641c39c58226d89b9ccc8"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:46.801 38 INFO tempest.lib.common.rest_client [req-ce84f5a8-8c99-47c6-893c-35d865e17726 ] Request (ServiceProvidersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:02:46.802 38 DEBUG tempest.lib.common.rest_client [req-ce84f5a8-8c99-47c6-893c-35d865e17726 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ce84f5a8-8c99-47c6-893c-35d865e17726', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["yDbTUTCpTgSuWSB0ddoDqw"], "expires_at": "2020-11-06T19:02:46.000000Z", "issued_at": "2020-11-06T18:02:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:46.848 37 INFO tempest.lib.common.rest_client [req-e778a220-48ff-4d7a-ab14-6c1380e722e0 ] Request (ServerVolumeAttachmentRbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177 0.064s 2020-11-06 18:02:46.848 37 DEBUG tempest.lib.common.rest_client [req-e778a220-48ff-4d7a-ab14-6c1380e722e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e778a220-48ff-4d7a-ab14-6c1380e722e0', 'content-length': '1074', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e778a220-48ff-4d7a-ab14-6c1380e722e0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177'} Body: b'{"volume": {"id": "2766140b-9b9f-43bb-990b-38596df82177", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:02:38.000000", "updated_at": "2020-11-06T18:02:46.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-2023480968", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}], "user_id": "31dfe8b61f554cfe82a18efd5d747c55", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "198374b90e3641c39c58226d89b9ccc8"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:46.861 37 INFO tempest.common.waiters [-] volume 2766140b-9b9f-43bb-990b-38596df82177 reached available after waiting for 0.861880 seconds 2020-11-06 18:02:46.861 38 INFO tempest.lib.common.rest_client [req-e016d9ca-855b-45e9-b61b-80f94fa3357a ] Request (ServiceProvidersRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.058s 2020-11-06 18:02:46.862 38 DEBUG tempest.lib.common.rest_client [req-e016d9ca-855b-45e9-b61b-80f94fa3357a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e016d9ca-855b-45e9-b61b-80f94fa3357a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:46.885 40 INFO tempest.lib.common.rest_client [req-bb668a1d-0c21-4745-8db7-979a97c6c63a ] Request (RbacPoliciesExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/rbac-policies/3d442210-8362-41bb-9b41-58f5761d1649 1.121s 2020-11-06 18:02:46.886 40 DEBUG tempest.lib.common.rest_client [req-bb668a1d-0c21-4745-8db7-979a97c6c63a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-bb668a1d-0c21-4745-8db7-979a97c6c63a', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:02:46 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/rbac-policies/3d442210-8362-41bb-9b41-58f5761d1649'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:46.889 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:46.893 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_rbac_policy, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:46.939 38 INFO tempest.lib.common.rest_client [req-69a0881d-6ca8-4766-918d-44a2b760a663 ] Request (ServiceProvidersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.076s 2020-11-06 18:02:46.939 38 DEBUG tempest.lib.common.rest_client [req-69a0881d-6ca8-4766-918d-44a2b760a663 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ServiceProvidersRbacTest-1058247128-desc", "domain_id": "default", "name": "tempest-ServiceProvidersRbacTest-1058247128"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '386', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-69a0881d-6ca8-4766-918d-44a2b760a663', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "74e38b7fad14438180b079337be3b294", "name": "tempest-ServiceProvidersRbacTest-1058247128", "domain_id": "default", "description": "tempest-ServiceProvidersRbacTest-1058247128-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/74e38b7fad14438180b079337be3b294"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:46.942 37 INFO tempest.lib.common.rest_client [req-3e630dcb-3044-4ed4-a7d2-fbab4addd396 ] Request (ServerVolumeAttachmentRbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177 0.074s 2020-11-06 18:02:46.942 37 DEBUG tempest.lib.common.rest_client [req-3e630dcb-3044-4ed4-a7d2-fbab4addd396 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-3e630dcb-3044-4ed4-a7d2-fbab4addd396', 'content-length': '1074', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3e630dcb-3044-4ed4-a7d2-fbab4addd396', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177'} Body: b'{"volume": {"id": "2766140b-9b9f-43bb-990b-38596df82177", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:02:38.000000", "updated_at": "2020-11-06T18:02:46.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-2023480968", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}], "user_id": "31dfe8b61f554cfe82a18efd5d747c55", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "198374b90e3641c39c58226d89b9ccc8"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:46.953 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:46.954 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.954 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.954 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.955 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.955 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.955 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.956 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.956 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.956 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.956 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.957 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.957 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.957 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.957 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.958 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.958 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.958 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.958 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.959 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.959 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.959 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.959 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.960 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.960 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.960 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.960 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.960 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.961 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.961 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.961 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.961 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.962 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.962 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.962 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.962 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.963 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.963 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.963 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.963 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.964 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.964 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.964 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.964 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.965 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.965 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.965 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.965 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.966 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.966 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.966 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.966 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.967 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.967 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.967 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.967 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.968 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.968 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.968 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.968 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.969 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.969 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.969 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.969 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.970 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.970 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.970 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.970 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.971 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.971 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.971 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.971 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.972 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.972 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.972 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.972 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:46.973 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-volumes-attachments:index, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:46.973 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:47.050 38 INFO tempest.lib.common.rest_client [req-0a4c2562-c2f8-41a5-8853-8fed3a3fa895 ] Request (ServiceProvidersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.109s 2020-11-06 18:02:47.050 38 DEBUG tempest.lib.common.rest_client [req-0a4c2562-c2f8-41a5-8853-8fed3a3fa895 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ServiceProvidersRbacTest-1058247128", "password": "P1%+3a0sPK#OP~7", "project_id": "74e38b7fad14438180b079337be3b294", "email": "tempest-ServiceProvidersRbacTest-406950739@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '403', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0a4c2562-c2f8-41a5-8853-8fed3a3fa895', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "74e38b7fad14438180b079337be3b294", "email": "tempest-ServiceProvidersRbacTest-406950739@example.com", "id": "c38640276cde4e87a40664b1fc5a733d", "name": "tempest-ServiceProvidersRbacTest-1058247128", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/c38640276cde4e87a40664b1fc5a733d"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:47.086 37 INFO tempest.lib.common.rest_client [req-42e4b54a-32c9-46bd-923e-48ec02ef089d ] Request (ServerVolumeAttachmentRbacTest:test_list_volume_attachments): 200 GET http://172.30.13.94/identity/v3/projects/198374b90e3641c39c58226d89b9ccc8/users/31dfe8b61f554cfe82a18efd5d747c55/roles 0.112s 2020-11-06 18:02:47.086 37 DEBUG tempest.lib.common.rest_client [req-42e4b54a-32c9-46bd-923e-48ec02ef089d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-42e4b54a-32c9-46bd-923e-48ec02ef089d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/198374b90e3641c39c58226d89b9ccc8/users/31dfe8b61f554cfe82a18efd5d747c55/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/198374b90e3641c39c58226d89b9ccc8/users/31dfe8b61f554cfe82a18efd5d747c55/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:47.107 38 INFO tempest.lib.common.rest_client [req-1ed1f711-94ea-4961-809b-fc268641fe84 ] Request (ServiceProvidersRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.056s 2020-11-06 18:02:47.107 38 DEBUG tempest.lib.common.rest_client [req-1ed1f711-94ea-4961-809b-fc268641fe84 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1ed1f711-94ea-4961-809b-fc268641fe84', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:47.157 38 INFO tempest.lib.common.rest_client [req-a60a55bb-be51-44b5-9746-1473a3bcb00f ] Request (ServiceProvidersRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.049s 2020-11-06 18:02:47.158 38 DEBUG tempest.lib.common.rest_client [req-a60a55bb-be51-44b5-9746-1473a3bcb00f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a60a55bb-be51-44b5-9746-1473a3bcb00f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:47.180 37 INFO tempest.lib.common.rest_client [req-3d5ba507-75f6-40d1-af21-c24af064f90f ] Request (ServerVolumeAttachmentRbacTest:test_list_volume_attachments): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-11-06 18:02:47.181 37 DEBUG tempest.lib.common.rest_client [req-3d5ba507-75f6-40d1-af21-c24af064f90f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6652', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3d5ba507-75f6-40d1-af21-c24af064f90f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "31dfe8b61f554cfe82a18efd5d747c55", "name": "tempest-ServerVolumeAttachmentRbacTest-1175560981", "password_expires_at": null}, "audit_ids": ["QSr6OEYfR_qXKGyT0J-47g"], "expires_at": "2020-11-06T19:02:47.000000Z", "issued_at": "2020-11-06T18:02:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "198374b90e3641c39c58226d89b9ccc8", "name": "tempest-ServerVolumeAttachmentRbacTest-1175560981"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:47.245 38 INFO tempest.lib.common.rest_client [req-9662cf06-ecab-4dca-9e7e-56496c92aa5a ] Request (ServiceProvidersRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/74e38b7fad14438180b079337be3b294/users/c38640276cde4e87a40664b1fc5a733d/roles/72a4576c553448cd941b052c1ca0cf2d 0.086s 2020-11-06 18:02:47.246 38 DEBUG tempest.lib.common.rest_client [req-9662cf06-ecab-4dca-9e7e-56496c92aa5a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9662cf06-ecab-4dca-9e7e-56496c92aa5a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/74e38b7fad14438180b079337be3b294/users/c38640276cde4e87a40664b1fc5a733d/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:47.247 38 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServiceProvidersRbacTest-1058247128', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '74e38b7fad14438180b079337be3b294', 'project_name': 'tempest-ServiceProvidersRbacTest-1058247128', 'tenant_id': '74e38b7fad14438180b079337be3b294', 'tenant_name': 'tempest-ServiceProvidersRbacTest-1058247128', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'c38640276cde4e87a40664b1fc5a733d'}, Network: None, Subnet: None, Router: None 2020-11-06 18:02:47.247 38 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServiceProvidersRbacTest-1058247128', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '74e38b7fad14438180b079337be3b294', 'project_name': 'tempest-ServiceProvidersRbacTest-1058247128', 'tenant_id': '74e38b7fad14438180b079337be3b294', 'tenant_name': 'tempest-ServiceProvidersRbacTest-1058247128', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'c38640276cde4e87a40664b1fc5a733d'}, Network: None, Subnet: None, Router: None 2020-11-06 18:02:47.304 40 INFO tempest.lib.common.rest_client [req-a198521a-880e-4c5d-8565-8ff6a3e60761 ] Request (RbacPoliciesExtRbacTest:test_show_rbac_policy): 201 POST http://172.30.13.94:9696/v2.0/rbac-policies 0.410s 2020-11-06 18:02:47.305 40 DEBUG tempest.lib.common.rest_client [req-a198521a-880e-4c5d-8565-8ff6a3e60761 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"rbac_policy": {"target_tenant": "bacf7290ccf4444e8183eb504493cdde", "object_type": "network", "object_id": "c1d4e282-563f-4b42-a9f4-751c12f5350d", "action": "access_as_shared"}} Response - Headers: {'content-type': 'application/json', 'content-length': '324', 'x-openstack-request-id': 'req-a198521a-880e-4c5d-8565-8ff6a3e60761', 'date': 'Fri, 06 Nov 2020 18:02:47 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/rbac-policies'} Body: b'{"rbac_policy": {"id": "51d2cfd3-7446-404f-a762-d3d931029620", "project_id": "bacf7290ccf4444e8183eb504493cdde", "target_tenant": "bacf7290ccf4444e8183eb504493cdde", "action": "access_as_shared", "object_id": "c1d4e282-563f-4b42-a9f4-751c12f5350d", "object_type": "network", "tenant_id": "bacf7290ccf4444e8183eb504493cdde"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:47.305 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:47.377 38 INFO tempest.lib.common.rest_client [req-16178f0f-1a0d-4ab7-ab7e-8c1534b28020 ] Request (ServiceProvidersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.119s 2020-11-06 18:02:47.377 38 DEBUG tempest.lib.common.rest_client [req-16178f0f-1a0d-4ab7-ab7e-8c1534b28020 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6579', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-16178f0f-1a0d-4ab7-ab7e-8c1534b28020', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c38640276cde4e87a40664b1fc5a733d", "name": "tempest-ServiceProvidersRbacTest-1058247128", "password_expires_at": null}, "audit_ids": ["d7-QmQQqTfmWhYqnRhpmHw"], "expires_at": "2020-11-06T19:02:47.000000Z", "issued_at": "2020-11-06T18:02:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "74e38b7fad14438180b079337be3b294", "name": "tempest-ServiceProvidersRbacTest-1058247128"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/74e38b7fad14438180b079337be3b294", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/74e38b7fad14438180b079337be3b294", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/74e38b7fad14438180b079337be3b294", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_74e38b7fad14438180b079337be3b294", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_74e38b7fad14438180b079337be3b294", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_74e38b7fad14438180b079337be3b294", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "ht _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:47.408 40 INFO tempest.lib.common.rest_client [req-2718c525-2088-4d82-aa33-4ac8180fa16a ] Request (RbacPoliciesExtRbacTest:test_show_rbac_policy): 200 GET http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles 0.101s 2020-11-06 18:02:47.408 40 DEBUG tempest.lib.common.rest_client [req-2718c525-2088-4d82-aa33-4ac8180fa16a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2718c525-2088-4d82-aa33-4ac8180fa16a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:47.413 38 INFO tempest.lib.common.rest_client [req-327d8b77-6510-48dd-891f-aa3fc5770129 ] Request (ServiceProvidersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:02:47.414 38 DEBUG tempest.lib.common.rest_client [req-327d8b77-6510-48dd-891f-aa3fc5770129 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-327d8b77-6510-48dd-891f-aa3fc5770129', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["qTi6E5ksSciBvbOZ1QKpaw"], "expires_at": "2020-11-06T19:02:47.000000Z", "issued_at": "2020-11-06T18:02:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:47.459 38 INFO tempest.lib.common.rest_client [req-eb30826c-94eb-47ee-b67e-e71c53df75f6 ] Request (ServiceProvidersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:02:47.460 38 DEBUG tempest.lib.common.rest_client [req-eb30826c-94eb-47ee-b67e-e71c53df75f6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eb30826c-94eb-47ee-b67e-e71c53df75f6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["d7q6U6mMS5yB0hPJXwRGwQ"], "expires_at": "2020-11-06T19:02:47.000000Z", "issued_at": "2020-11-06T18:02:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:47.492 40 INFO tempest.lib.common.rest_client [req-9c33c93a-973a-447c-b08a-6f665ff2360d ] Request (RbacPoliciesExtRbacTest:test_show_rbac_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 18:02:47.492 40 DEBUG tempest.lib.common.rest_client [req-9c33c93a-973a-447c-b08a-6f665ff2360d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9c33c93a-973a-447c-b08a-6f665ff2360d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2e60a8c38b4747239417157dd4a249f9", "name": "tempest-RbacPoliciesExtRbacTest-345152215", "password_expires_at": null}, "audit_ids": ["2iVtzaFGQnWClH8Ms3Kpew"], "expires_at": "2020-11-06T19:02:47.000000Z", "issued_at": "2020-11-06T18:02:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bacf7290ccf4444e8183eb504493cdde", "name": "tempest-RbacPoliciesExtRbacTest-345152215"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:47.494 37 INFO tempest.lib.common.rest_client [req-4779fc69-548d-4af3-87c3-4ea728e0f183 ] Request (ServerVolumeAttachmentRbacTest:test_list_volume_attachments): 200 GET http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac/os-volume_attachments 0.312s 2020-11-06 18:02:47.495 37 DEBUG tempest.lib.common.rest_client [req-4779fc69-548d-4af3-87c3-4ea728e0f183 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '25', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4779fc69-548d-4af3-87c3-4ea728e0f183', 'x-compute-request-id': 'req-4779fc69-548d-4af3-87c3-4ea728e0f183', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac/os-volume_attachments'} Body: b'{"volumeAttachments": []}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:47.499 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:47.508 38 INFO tempest.lib.common.rest_client [req-f4bffb92-08b7-45f6-bd1e-0b68e80c7948 ] Request (ServiceProvidersRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.047s 2020-11-06 18:02:47.508 38 DEBUG tempest.lib.common.rest_client [req-f4bffb92-08b7-45f6-bd1e-0b68e80c7948 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f4bffb92-08b7-45f6-bd1e-0b68e80c7948', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:47.527 40 INFO tempest.lib.common.rest_client [req-30b95d3a-22c0-4e52-ba1c-2914b26aa8d0 ] Request (RbacPoliciesExtRbacTest:test_show_rbac_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:02:47.528 40 DEBUG tempest.lib.common.rest_client [req-30b95d3a-22c0-4e52-ba1c-2914b26aa8d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-30b95d3a-22c0-4e52-ba1c-2914b26aa8d0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2e60a8c38b4747239417157dd4a249f9", "name": "tempest-RbacPoliciesExtRbacTest-345152215", "password_expires_at": null}, "audit_ids": ["lZAvP7b0QnOdR3orSh6uEg"], "expires_at": "2020-11-06T19:02:47.000000Z", "issued_at": "2020-11-06T18:02:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bacf7290ccf4444e8183eb504493cdde", "name": "tempest-RbacPoliciesExtRbacTest-345152215"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:47.548 37 INFO tempest.lib.common.rest_client [req-2f2d6c86-8b5d-441f-a070-c7f4dd09e78a ] Request (ServerVolumeAttachmentRbacTest:test_list_volume_attachments): 200 GET http://172.30.13.94/identity/v3/projects/198374b90e3641c39c58226d89b9ccc8/users/31dfe8b61f554cfe82a18efd5d747c55/roles 0.048s 2020-11-06 18:02:47.549 37 DEBUG tempest.lib.common.rest_client [req-2f2d6c86-8b5d-441f-a070-c7f4dd09e78a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2f2d6c86-8b5d-441f-a070-c7f4dd09e78a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/198374b90e3641c39c58226d89b9ccc8/users/31dfe8b61f554cfe82a18efd5d747c55/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/198374b90e3641c39c58226d89b9ccc8/users/31dfe8b61f554cfe82a18efd5d747c55/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:47.557 38 INFO tempest.lib.common.rest_client [req-b2ee8885-8982-4e36-99b3-081375022bec ] Request (ServiceProvidersRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.048s 2020-11-06 18:02:47.558 38 DEBUG tempest.lib.common.rest_client [req-b2ee8885-8982-4e36-99b3-081375022bec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b2ee8885-8982-4e36-99b3-081375022bec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:47.558 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:02:47.558 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:47.583 37 INFO tempest.lib.common.rest_client [req-82e7aa71-2adf-48f0-9552-5bc2d5f74f39 ] Request (ServerVolumeAttachmentRbacTest:test_list_volume_attachments): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:02:47.584 37 DEBUG tempest.lib.common.rest_client [req-82e7aa71-2adf-48f0-9552-5bc2d5f74f39 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6652', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-82e7aa71-2adf-48f0-9552-5bc2d5f74f39', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "31dfe8b61f554cfe82a18efd5d747c55", "name": "tempest-ServerVolumeAttachmentRbacTest-1175560981", "password_expires_at": null}, "audit_ids": ["TAyhb1phRaWK8YFblCtijw"], "expires_at": "2020-11-06T19:02:47.000000Z", "issued_at": "2020-11-06T18:02:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "198374b90e3641c39c58226d89b9ccc8", "name": "tempest-ServerVolumeAttachmentRbacTest-1175560981"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:47.604 38 INFO tempest.lib.common.rest_client [req-7f3defc8-b6f1-4cc0-a903-620b0139bf8b ] Request (ServiceProvidersRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/74e38b7fad14438180b079337be3b294/users/c38640276cde4e87a40664b1fc5a733d/roles 0.045s 2020-11-06 18:02:47.604 38 DEBUG tempest.lib.common.rest_client [req-7f3defc8-b6f1-4cc0-a903-620b0139bf8b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7f3defc8-b6f1-4cc0-a903-620b0139bf8b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/74e38b7fad14438180b079337be3b294/users/c38640276cde4e87a40664b1fc5a733d/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/74e38b7fad14438180b079337be3b294/users/c38640276cde4e87a40664b1fc5a733d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:47.659 38 INFO tempest.lib.common.rest_client [req-b5903f60-6a21-4c5d-a1a3-2c8345ab4997 ] Request (ServiceProvidersRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/74e38b7fad14438180b079337be3b294/users/c38640276cde4e87a40664b1fc5a733d/roles/72a4576c553448cd941b052c1ca0cf2d 0.054s 2020-11-06 18:02:47.659 38 DEBUG tempest.lib.common.rest_client [req-b5903f60-6a21-4c5d-a1a3-2c8345ab4997 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b5903f60-6a21-4c5d-a1a3-2c8345ab4997', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/74e38b7fad14438180b079337be3b294/users/c38640276cde4e87a40664b1fc5a733d/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:47.663 40 INFO tempest.lib.common.rest_client [req-b3fcac00-a4ac-492e-a1e1-bf5dcfd4a6aa ] Request (RbacPoliciesExtRbacTest:test_show_rbac_policy): 200 GET http://172.30.13.94:9696/v2.0/rbac-policies/51d2cfd3-7446-404f-a762-d3d931029620 0.134s 2020-11-06 18:02:47.664 40 DEBUG tempest.lib.common.rest_client [req-b3fcac00-a4ac-492e-a1e1-bf5dcfd4a6aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '324', 'x-openstack-request-id': 'req-b3fcac00-a4ac-492e-a1e1-bf5dcfd4a6aa', 'date': 'Fri, 06 Nov 2020 18:02:47 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/rbac-policies/51d2cfd3-7446-404f-a762-d3d931029620'} Body: b'{"rbac_policy": {"id": "51d2cfd3-7446-404f-a762-d3d931029620", "project_id": "bacf7290ccf4444e8183eb504493cdde", "target_tenant": "bacf7290ccf4444e8183eb504493cdde", "action": "access_as_shared", "object_id": "c1d4e282-563f-4b42-a9f4-751c12f5350d", "object_type": "network", "tenant_id": "bacf7290ccf4444e8183eb504493cdde"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:47.664 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:47.765 40 INFO tempest.lib.common.rest_client [req-a118019f-bfe7-4175-a217-06d7bfd19fdb ] Request (RbacPoliciesExtRbacTest:test_show_rbac_policy): 200 GET http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles 0.100s 2020-11-06 18:02:47.766 40 DEBUG tempest.lib.common.rest_client [req-a118019f-bfe7-4175-a217-06d7bfd19fdb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a118019f-bfe7-4175-a217-06d7bfd19fdb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:47.768 38 INFO tempest.lib.common.rest_client [req-9f9073c8-e67a-40df-9c09-1f39cc3a0b1b ] Request (ServiceProvidersRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/74e38b7fad14438180b079337be3b294/users/c38640276cde4e87a40664b1fc5a733d/roles/a629c95d64b3416fb80ae90af4f69c05 0.109s 2020-11-06 18:02:47.769 38 DEBUG tempest.lib.common.rest_client [req-9f9073c8-e67a-40df-9c09-1f39cc3a0b1b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9f9073c8-e67a-40df-9c09-1f39cc3a0b1b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/74e38b7fad14438180b079337be3b294/users/c38640276cde4e87a40664b1fc5a733d/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:47.848 40 INFO tempest.lib.common.rest_client [req-4f9aea86-2d46-46de-bb05-86e2be494ed5 ] Request (RbacPoliciesExtRbacTest:test_show_rbac_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-11-06 18:02:47.849 40 DEBUG tempest.lib.common.rest_client [req-4f9aea86-2d46-46de-bb05-86e2be494ed5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4f9aea86-2d46-46de-bb05-86e2be494ed5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2e60a8c38b4747239417157dd4a249f9", "name": "tempest-RbacPoliciesExtRbacTest-345152215", "password_expires_at": null}, "audit_ids": ["Z9-Uri7iSVaDuP8eCbaHOQ"], "expires_at": "2020-11-06T19:02:47.000000Z", "issued_at": "2020-11-06T18:02:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bacf7290ccf4444e8183eb504493cdde", "name": "tempest-RbacPoliciesExtRbacTest-345152215"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:47.883 40 INFO tempest.lib.common.rest_client [req-aa125607-5991-4b98-9fb8-a1b7c39ca7ab ] Request (RbacPoliciesExtRbacTest:test_show_rbac_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:02:47.883 40 DEBUG tempest.lib.common.rest_client [req-aa125607-5991-4b98-9fb8-a1b7c39ca7ab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aa125607-5991-4b98-9fb8-a1b7c39ca7ab', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2e60a8c38b4747239417157dd4a249f9", "name": "tempest-RbacPoliciesExtRbacTest-345152215", "password_expires_at": null}, "audit_ids": ["gGeUc5FAQpiOc4IiFH5vqQ"], "expires_at": "2020-11-06T19:02:47.000000Z", "issued_at": "2020-11-06T18:02:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bacf7290ccf4444e8183eb504493cdde", "name": "tempest-RbacPoliciesExtRbacTest-345152215"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:47.883 37 INFO tempest.lib.common.rest_client [req-3970298b-c9c4-4810-933b-17300f25f59d ] Request (ServerVolumeAttachmentRbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177 0.295s 2020-11-06 18:02:47.884 37 DEBUG tempest.lib.common.rest_client [req-3970298b-c9c4-4810-933b-17300f25f59d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-3970298b-c9c4-4810-933b-17300f25f59d', 'content-length': '1074', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3970298b-c9c4-4810-933b-17300f25f59d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177'} Body: b'{"volume": {"id": "2766140b-9b9f-43bb-990b-38596df82177", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:02:38.000000", "updated_at": "2020-11-06T18:02:46.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-2023480968", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}], "user_id": "31dfe8b61f554cfe82a18efd5d747c55", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "198374b90e3641c39c58226d89b9ccc8"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:47.901 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:47.902 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.902 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.902 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.903 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.903 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.903 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.904 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.904 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.904 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.905 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.905 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.905 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.906 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.906 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.906 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.906 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.907 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.907 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.907 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.908 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.908 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.908 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.909 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.909 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.909 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.909 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.910 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.910 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.910 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.911 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.911 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.911 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.911 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.912 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.912 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.912 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.912 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.913 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.913 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.913 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.914 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.914 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.914 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.914 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.915 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.915 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.915 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.916 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.916 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.916 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.917 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.917 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.917 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.917 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.918 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.918 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.918 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.919 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.919 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.919 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.920 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.920 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.920 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.921 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.921 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.921 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.921 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.922 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.922 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.922 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.923 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.923 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.923 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.923 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.924 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:02:47.925 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-volumes-attachments:show, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:47.991 39 INFO tempest.lib.common.rest_client [req-2550fbc4-a7ce-4779-982d-37a57726b374 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.218s 2020-11-06 18:02:47.991 39 DEBUG tempest.lib.common.rest_client [req-2550fbc4-a7ce-4779-982d-37a57726b374 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2550fbc4-a7ce-4779-982d-37a57726b374', 'x-compute-request-id': 'req-2550fbc4-a7ce-4779-982d-37a57726b374', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:48.322 37 INFO tempest.lib.common.rest_client [req-c77e6bc1-a6f4-471e-957a-28599b162a5a ] Request (ServerVolumeAttachmentRbacTest:test_show_volume_attachment): 200 POST http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac/os-volume_attachments 0.396s 2020-11-06 18:02:48.322 37 DEBUG tempest.lib.common.rest_client [req-c77e6bc1-a6f4-471e-957a-28599b162a5a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volumeAttachment": {"volumeId": "2766140b-9b9f-43bb-990b-38596df82177"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '194', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c77e6bc1-a6f4-471e-957a-28599b162a5a', 'x-compute-request-id': 'req-c77e6bc1-a6f4-471e-957a-28599b162a5a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac/os-volume_attachments'} Body: b'{"volumeAttachment": {"id": "2766140b-9b9f-43bb-990b-38596df82177", "serverId": "e62cf5bc-fdb9-402c-b1b0-22ca5336dbac", "volumeId": "2766140b-9b9f-43bb-990b-38596df82177", "device": "/dev/sdb"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:48.395 37 INFO tempest.lib.common.rest_client [req-f074fb74-9141-475e-b59e-75d9a72e9f27 ] Request (ServerVolumeAttachmentRbacTest:test_show_volume_attachment): 200 GET http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177 0.070s 2020-11-06 18:02:48.396 37 DEBUG tempest.lib.common.rest_client [req-f074fb74-9141-475e-b59e-75d9a72e9f27 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-f074fb74-9141-475e-b59e-75d9a72e9f27', 'content-length': '1073', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f074fb74-9141-475e-b59e-75d9a72e9f27', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177'} Body: b'{"volume": {"id": "2766140b-9b9f-43bb-990b-38596df82177", "status": "reserved", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:02:38.000000", "updated_at": "2020-11-06T18:02:48.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-2023480968", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}], "user_id": "31dfe8b61f554cfe82a18efd5d747c55", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "198374b90e3641c39c58226d89b9ccc8"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:48.980 38 INFO tempest.lib.common.rest_client [req-c3f9b0cb-6b79-4c92-8870-0c4757ded669 ] Request (ServiceProvidersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.209s 2020-11-06 18:02:48.987 38 DEBUG tempest.lib.common.rest_client [req-c3f9b0cb-6b79-4c92-8870-0c4757ded669 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c3f9b0cb-6b79-4c92-8870-0c4757ded669', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c38640276cde4e87a40664b1fc5a733d", "name": "tempest-ServiceProvidersRbacTest-1058247128", "password_expires_at": null}, "audit_ids": ["h0mZ8NIuQEaFiHR5GRG_0w"], "expires_at": "2020-11-06T19:02:48.000000Z", "issued_at": "2020-11-06T18:02:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "74e38b7fad14438180b079337be3b294", "name": "tempest-ServiceProvidersRbacTest-1058247128"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/74e38b7fad14438180b079337be3b294", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/74e38b7fad14438180b079337be3b294", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/74e38b7fad14438180b079337be3b294", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_74e38b7fad14438180b079337be3b294", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_74e38b7fad14438180b079337be3b294", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_74e38b7fad14438180b079337be3b294", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:48.992 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:48.995 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_service_provider, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:48.995 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:49.098 38 INFO tempest.lib.common.rest_client [req-9599bd76-db41-4cbf-abe1-227d525a2562 ] Request (ServiceProvidersRbacTest:test_list_service_providers): 200 GET http://172.30.13.94/identity/v3/projects/74e38b7fad14438180b079337be3b294/users/c38640276cde4e87a40664b1fc5a733d/roles 0.102s 2020-11-06 18:02:49.099 38 DEBUG tempest.lib.common.rest_client [req-9599bd76-db41-4cbf-abe1-227d525a2562 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9599bd76-db41-4cbf-abe1-227d525a2562', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/74e38b7fad14438180b079337be3b294/users/c38640276cde4e87a40664b1fc5a733d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/74e38b7fad14438180b079337be3b294/users/c38640276cde4e87a40664b1fc5a733d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:49.133 38 INFO tempest.lib.common.rest_client [req-0ace56ff-9697-4b01-a326-64f676102e1a ] Request (ServiceProvidersRbacTest:test_list_service_providers): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:02:49.133 38 DEBUG tempest.lib.common.rest_client [req-0ace56ff-9697-4b01-a326-64f676102e1a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0ace56ff-9697-4b01-a326-64f676102e1a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c38640276cde4e87a40664b1fc5a733d", "name": "tempest-ServiceProvidersRbacTest-1058247128", "password_expires_at": null}, "audit_ids": ["1LWJ0x03RFmbmrNbUoKoqA"], "expires_at": "2020-11-06T19:02:49.000000Z", "issued_at": "2020-11-06T18:02:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "74e38b7fad14438180b079337be3b294", "name": "tempest-ServiceProvidersRbacTest-1058247128"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/74e38b7fad14438180b079337be3b294", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/74e38b7fad14438180b079337be3b294", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/74e38b7fad14438180b079337be3b294", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_74e38b7fad14438180b079337be3b294", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_74e38b7fad14438180b079337be3b294", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_74e38b7fad14438180b079337be3b294", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:49.215 38 INFO tempest.lib.common.rest_client [req-0733ca26-3aba-4d68-aeb6-1591583f60cb ] Request (ServiceProvidersRbacTest:test_list_service_providers): 200 GET http://172.30.13.94:9696/v2.0/service-providers 0.081s 2020-11-06 18:02:49.216 38 DEBUG tempest.lib.common.rest_client [req-0733ca26-3aba-4d68-aeb6-1591583f60cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '304', 'x-openstack-request-id': 'req-0733ca26-3aba-4d68-aeb6-1591583f60cb', 'date': 'Fri, 06 Nov 2020 18:02:49 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/service-providers'} Body: b'{"service_providers": [{"service_type": "L3_ROUTER_NAT", "name": "dvrha", "default": false}, {"service_type": "L3_ROUTER_NAT", "name": "dvr", "default": false}, {"service_type": "L3_ROUTER_NAT", "name": "ha", "default": false}, {"service_type": "L3_ROUTER_NAT", "name": "single_node", "default": false}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:49.217 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:49.279 38 INFO tempest.lib.common.rest_client [req-96012d9c-dfaa-4688-9a6a-a6fac520bc1e ] Request (ServiceProvidersRbacTest:test_list_service_providers): 200 GET http://172.30.13.94/identity/v3/projects/74e38b7fad14438180b079337be3b294/users/c38640276cde4e87a40664b1fc5a733d/roles 0.061s 2020-11-06 18:02:49.279 38 DEBUG tempest.lib.common.rest_client [req-96012d9c-dfaa-4688-9a6a-a6fac520bc1e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-96012d9c-dfaa-4688-9a6a-a6fac520bc1e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/74e38b7fad14438180b079337be3b294/users/c38640276cde4e87a40664b1fc5a733d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/74e38b7fad14438180b079337be3b294/users/c38640276cde4e87a40664b1fc5a733d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:49.326 38 INFO tempest.lib.common.rest_client [req-47fdcc68-08c3-4726-80a5-8b47946a9216 ] Request (ServiceProvidersRbacTest:test_list_service_providers): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-11-06 18:02:49.327 38 DEBUG tempest.lib.common.rest_client [req-47fdcc68-08c3-4726-80a5-8b47946a9216 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-47fdcc68-08c3-4726-80a5-8b47946a9216', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c38640276cde4e87a40664b1fc5a733d", "name": "tempest-ServiceProvidersRbacTest-1058247128", "password_expires_at": null}, "audit_ids": ["ta6rwddpSAGrp62PYwokAw"], "expires_at": "2020-11-06T19:02:49.000000Z", "issued_at": "2020-11-06T18:02:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "74e38b7fad14438180b079337be3b294", "name": "tempest-ServiceProvidersRbacTest-1058247128"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/74e38b7fad14438180b079337be3b294", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/74e38b7fad14438180b079337be3b294", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/74e38b7fad14438180b079337be3b294", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_74e38b7fad14438180b079337be3b294", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_74e38b7fad14438180b079337be3b294", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_74e38b7fad14438180b079337be3b294", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:49.475 38 INFO tempest.lib.common.rest_client [req-0ecdef1d-93ea-4129-ac24-89d89c78a8c9 ] Request (ServiceProvidersRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/c38640276cde4e87a40664b1fc5a733d 0.144s 2020-11-06 18:02:49.476 38 DEBUG tempest.lib.common.rest_client [req-0ecdef1d-93ea-4129-ac24-89d89c78a8c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0ecdef1d-93ea-4129-ac24-89d89c78a8c9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/c38640276cde4e87a40664b1fc5a733d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:49.497 37 INFO tempest.lib.common.rest_client [req-e4972a70-2e69-45e9-b7fa-0b5ab11e6913 ] Request (ServerVolumeAttachmentRbacTest:test_show_volume_attachment): 200 GET http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177 0.088s 2020-11-06 18:02:49.498 37 DEBUG tempest.lib.common.rest_client [req-e4972a70-2e69-45e9-b7fa-0b5ab11e6913 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e4972a70-2e69-45e9-b7fa-0b5ab11e6913', 'content-length': '1375', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e4972a70-2e69-45e9-b7fa-0b5ab11e6913', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177'} Body: b'{"volume": {"id": "2766140b-9b9f-43bb-990b-38596df82177", "status": "in-use", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:02:38.000000", "updated_at": "2020-11-06T18:02:49.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-2023480968", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}], "user_id": "31dfe8b61f554cfe82a18efd5d747c55", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [{"id": "2766140b-9b9f-43bb-990b-38596df82177", "attachment_id": "2c9132f0-2166-4fd2-899c-41fb851d75f9", "volume_id": "2766140b-9b9f-43bb-990b-38596df82177", "server_id": "e62cf5bc-fdb9-402c-b1b0-22ca5336dbac", "host_name": "lf-virtual8", "device": "/dev/sdb", "attached_at": "2020-11-06T18:02:49.000000"}], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "198374b90e3641c39c58226d89b9ccc8"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:49.512 37 INFO tempest.common.waiters [-] volume 2766140b-9b9f-43bb-990b-38596df82177 reached in-use after waiting for 1.512581 seconds 2020-11-06 18:02:49.512 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:49.572 38 INFO tempest.lib.common.rest_client [req-2b32cae1-fc8d-4eca-a546-32403018ee70 ] Request (ServiceProvidersRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-11-06 18:02:49.573 38 DEBUG tempest.lib.common.rest_client [req-2b32cae1-fc8d-4eca-a546-32403018ee70 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2b32cae1-fc8d-4eca-a546-32403018ee70', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["h4OJzNmAR6CmfSN8rZDyEw"], "expires_at": "2020-11-06T19:02:49.000000Z", "issued_at": "2020-11-06T18:02:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:49.576 39 INFO tempest.lib.common.rest_client [req-7a03b9ca-a87e-492e-9c95-9466ca989a8e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.567s 2020-11-06 18:02:49.576 39 DEBUG tempest.lib.common.rest_client [req-7a03b9ca-a87e-492e-9c95-9466ca989a8e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7a03b9ca-a87e-492e-9c95-9466ca989a8e', 'x-compute-request-id': 'req-7a03b9ca-a87e-492e-9c95-9466ca989a8e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:49.623 37 INFO tempest.lib.common.rest_client [req-49041706-a744-44de-b038-83855750e84f ] Request (ServerVolumeAttachmentRbacTest:test_show_volume_attachment): 200 GET http://172.30.13.94/identity/v3/projects/198374b90e3641c39c58226d89b9ccc8/users/31dfe8b61f554cfe82a18efd5d747c55/roles 0.110s 2020-11-06 18:02:49.623 37 DEBUG tempest.lib.common.rest_client [req-49041706-a744-44de-b038-83855750e84f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-49041706-a744-44de-b038-83855750e84f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/198374b90e3641c39c58226d89b9ccc8/users/31dfe8b61f554cfe82a18efd5d747c55/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/198374b90e3641c39c58226d89b9ccc8/users/31dfe8b61f554cfe82a18efd5d747c55/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:49.721 37 INFO tempest.lib.common.rest_client [req-ecd89110-62ca-4f21-b82e-c10fbd625c6d ] Request (ServerVolumeAttachmentRbacTest:test_show_volume_attachment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-11-06 18:02:49.722 37 DEBUG tempest.lib.common.rest_client [req-ecd89110-62ca-4f21-b82e-c10fbd625c6d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6652', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ecd89110-62ca-4f21-b82e-c10fbd625c6d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "31dfe8b61f554cfe82a18efd5d747c55", "name": "tempest-ServerVolumeAttachmentRbacTest-1175560981", "password_expires_at": null}, "audit_ids": ["s_NKezYLQsydo-ngmfGWFQ"], "expires_at": "2020-11-06T19:02:49.000000Z", "issued_at": "2020-11-06T18:02:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "198374b90e3641c39c58226d89b9ccc8", "name": "tempest-ServerVolumeAttachmentRbacTest-1175560981"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:49.751 40 INFO tempest.lib.common.rest_client [req-7d21bc2a-5f73-4fe5-9ed0-6d3dc962f22e ] Request (RbacPoliciesExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/rbac-policies/51d2cfd3-7446-404f-a762-d3d931029620 1.866s 2020-11-06 18:02:49.752 40 DEBUG tempest.lib.common.rest_client [req-7d21bc2a-5f73-4fe5-9ed0-6d3dc962f22e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-7d21bc2a-5f73-4fe5-9ed0-6d3dc962f22e', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:02:49 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/rbac-policies/51d2cfd3-7446-404f-a762-d3d931029620'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:49.755 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:49.759 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_rbac_policy, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:49.760 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:49.763 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_rbac_policy, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:49.764 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:49.767 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_rbac_policy:target_tenant, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:49.861 38 INFO tempest.lib.common.rest_client [req-b345cc24-1965-4534-8bf9-621ff4e89cea ] Request (ServiceProvidersRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=74e38b7fad14438180b079337be3b294&name=default 0.286s 2020-11-06 18:02:49.862 38 DEBUG tempest.lib.common.rest_client [req-b345cc24-1965-4534-8bf9-621ff4e89cea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-b345cc24-1965-4534-8bf9-621ff4e89cea', 'date': 'Fri, 06 Nov 2020 18:02:49 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=74e38b7fad14438180b079337be3b294&name=default'} Body: b'{"security_groups": [{"id": "4357e81a-ec10-4bc5-af36-98c9789c7969", "name": "default", "stateful": true, "tenant_id": "74e38b7fad14438180b079337be3b294", "description": "Default security group", "security_group_rules": [{"id": "1e423e43-f468-4bdd-ba83-9996435b3e35", "tenant_id": "74e38b7fad14438180b079337be3b294", "security_group_id": "4357e81a-ec10-4bc5-af36-98c9789c7969", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:02:49Z", "updated_at": "2020-11-06T18:02:49Z", "revision_number": 0, "project_id": "74e38b7fad14438180b079337be3b294"}, {"id": "20deae46-02da-4415-b843-44802ce2e3f9", "tenant_id": "74e38b7fad14438180b079337be3b294", "security_group_id": "4357e81a-ec10-4bc5-af36-98c9789c7969", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:02:49Z", "updated_at": "2020-11-06T18:02:49Z", "revision_number": 0, "project_id": "74e38b7fad14438180b079337be3b294"}, {"id": "b2f31429-bf99-4ffb-97dc-9b96aa9a2d07", "tenant_id": "74e38b7fad14438180b079337be3b294", "security_group_id": "4357e81a-ec10-4bc5-af36-98c9789c7969", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "4357e81a-ec10-4bc5-af36-98c9789c7969", "description": null, "tags": [], "created_at": "2020-11-06T18:02:49Z", "updated_at": "2020-11-06T18:02:49Z", "revision_number": 0, "project_id": "74e38b7fad14438180b079337be3b294"}, {"id": "c3e1a156-77a5-4291-acd6-c3d7211fc4ea", "tenant_id": "74e38b7fad14438180b079337be3b294", "security_group_id": "4357e81a-ec10-4bc5-af36-98c9789c7969", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "4357e81a-ec10-4bc5-af36-98c9789c7969", "description": null, "tags": [], "created_at": "2020-11-06T18:02:49Z", "updated_at": "2020-11-06T18:02:49Z", "revision_number": 0, "project_id": "74e38b7fad14438180b079337be3b294"}], "tags": [], "created_at": "2020-11-06T18:02:49Z", "updated_at": "2020-11-06T18:02:49Z", "revision_number": 1, "project_id": "74e38b7fad14438180b079337be3b294"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:49.990 37 INFO tempest.lib.common.rest_client [req-41b4416b-853c-4e8f-81f9-fe8b8715e4b7 ] Request (ServerVolumeAttachmentRbacTest:test_show_volume_attachment): 200 GET http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac/os-volume_attachments/2766140b-9b9f-43bb-990b-38596df82177 0.266s 2020-11-06 18:02:49.990 37 DEBUG tempest.lib.common.rest_client [req-41b4416b-853c-4e8f-81f9-fe8b8715e4b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '194', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-41b4416b-853c-4e8f-81f9-fe8b8715e4b7', 'x-compute-request-id': 'req-41b4416b-853c-4e8f-81f9-fe8b8715e4b7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac/os-volume_attachments/2766140b-9b9f-43bb-990b-38596df82177'} Body: b'{"volumeAttachment": {"id": "2766140b-9b9f-43bb-990b-38596df82177", "volumeId": "2766140b-9b9f-43bb-990b-38596df82177", "serverId": "e62cf5bc-fdb9-402c-b1b0-22ca5336dbac", "device": "/dev/sdb"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:49.994 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:50.023 38 INFO tempest.lib.common.rest_client [req-9d5b44ec-077e-4585-922c-a3d8ca916f71 ] Request (ServiceProvidersRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/4357e81a-ec10-4bc5-af36-98c9789c7969 0.160s 2020-11-06 18:02:50.024 38 DEBUG tempest.lib.common.rest_client [req-9d5b44ec-077e-4585-922c-a3d8ca916f71 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-9d5b44ec-077e-4585-922c-a3d8ca916f71', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:02:50 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/4357e81a-ec10-4bc5-af36-98c9789c7969'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:50.053 37 INFO tempest.lib.common.rest_client [req-16f69de1-7081-4895-b05b-63a66ad613fe ] Request (ServerVolumeAttachmentRbacTest:test_show_volume_attachment): 200 GET http://172.30.13.94/identity/v3/projects/198374b90e3641c39c58226d89b9ccc8/users/31dfe8b61f554cfe82a18efd5d747c55/roles 0.058s 2020-11-06 18:02:50.054 37 DEBUG tempest.lib.common.rest_client [req-16f69de1-7081-4895-b05b-63a66ad613fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-16f69de1-7081-4895-b05b-63a66ad613fe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/198374b90e3641c39c58226d89b9ccc8/users/31dfe8b61f554cfe82a18efd5d747c55/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/198374b90e3641c39c58226d89b9ccc8/users/31dfe8b61f554cfe82a18efd5d747c55/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:50.095 37 INFO tempest.lib.common.rest_client [req-671b4be9-bf6f-473e-867f-891265f3db21 ] Request (ServerVolumeAttachmentRbacTest:test_show_volume_attachment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:02:50.096 37 DEBUG tempest.lib.common.rest_client [req-671b4be9-bf6f-473e-867f-891265f3db21 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6652', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-671b4be9-bf6f-473e-867f-891265f3db21', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "31dfe8b61f554cfe82a18efd5d747c55", "name": "tempest-ServerVolumeAttachmentRbacTest-1175560981", "password_expires_at": null}, "audit_ids": ["vdNOT6WBQXKedrL_RtXWtQ"], "expires_at": "2020-11-06T19:02:50.000000Z", "issued_at": "2020-11-06T18:02:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "198374b90e3641c39c58226d89b9ccc8", "name": "tempest-ServerVolumeAttachmentRbacTest-1175560981"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_198374b90e3641c39c58226d89b9ccc8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:50.134 40 INFO tempest.lib.common.rest_client [req-e090067f-da73-4d98-84ed-a14cde9f3c43 ] Request (RbacPoliciesExtRbacTest:test_update_rbac_policy): 201 POST http://172.30.13.94:9696/v2.0/rbac-policies 0.366s 2020-11-06 18:02:50.135 40 DEBUG tempest.lib.common.rest_client [req-e090067f-da73-4d98-84ed-a14cde9f3c43 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"rbac_policy": {"target_tenant": "bacf7290ccf4444e8183eb504493cdde", "object_type": "network", "object_id": "c1d4e282-563f-4b42-a9f4-751c12f5350d", "action": "access_as_shared"}} Response - Headers: {'content-type': 'application/json', 'content-length': '324', 'x-openstack-request-id': 'req-e090067f-da73-4d98-84ed-a14cde9f3c43', 'date': 'Fri, 06 Nov 2020 18:02:50 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/rbac-policies'} Body: b'{"rbac_policy": {"id": "1a9c68fd-4132-48a4-9769-8da81e41436c", "project_id": "bacf7290ccf4444e8183eb504493cdde", "target_tenant": "bacf7290ccf4444e8183eb504493cdde", "action": "access_as_shared", "object_id": "c1d4e282-563f-4b42-a9f4-751c12f5350d", "object_type": "network", "tenant_id": "bacf7290ccf4444e8183eb504493cdde"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:50.135 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:50.155 38 INFO tempest.lib.common.rest_client [req-2c5394fb-d67b-4900-804e-b31c1035ef45 ] Request (ServiceProvidersRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/74e38b7fad14438180b079337be3b294 0.131s 2020-11-06 18:02:50.156 38 DEBUG tempest.lib.common.rest_client [req-2c5394fb-d67b-4900-804e-b31c1035ef45 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2c5394fb-d67b-4900-804e-b31c1035ef45', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/74e38b7fad14438180b079337be3b294'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:50.234 40 INFO tempest.lib.common.rest_client [req-ff95c27b-83ef-4f0d-b73b-2298e8ba30ea ] Request (RbacPoliciesExtRbacTest:test_update_rbac_policy): 200 GET http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles 0.098s 2020-11-06 18:02:50.235 40 DEBUG tempest.lib.common.rest_client [req-ff95c27b-83ef-4f0d-b73b-2298e8ba30ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ff95c27b-83ef-4f0d-b73b-2298e8ba30ea', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:50.244 38 INFO tempest.lib.common.rest_client [req-30fecf92-4ecb-48f2-a605-da349795ad61 ] Request (TrunksSubportsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 18:02:50.244 38 DEBUG tempest.lib.common.rest_client [req-30fecf92-4ecb-48f2-a605-da349795ad61 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-30fecf92-4ecb-48f2-a605-da349795ad61', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["ixxOo1QTTHOYKyfPDkvslg"], "expires_at": "2020-11-06T19:02:50.000000Z", "issued_at": "2020-11-06T18:02:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:50.284 38 INFO tempest.lib.common.rest_client [req-639f2057-3e87-4ccb-a519-8b90c4d0e3bf ] Request (TrunksSubportsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:02:50.285 38 DEBUG tempest.lib.common.rest_client [req-639f2057-3e87-4ccb-a519-8b90c4d0e3bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-639f2057-3e87-4ccb-a519-8b90c4d0e3bf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["R-ZvrNYmSf2wUk11lG07Mg"], "expires_at": "2020-11-06T19:02:50.000000Z", "issued_at": "2020-11-06T18:02:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:50.318 40 INFO tempest.lib.common.rest_client [req-f7f19c87-2ad6-449a-8d5b-22d4a1a254ec ] Request (RbacPoliciesExtRbacTest:test_update_rbac_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 18:02:50.319 40 DEBUG tempest.lib.common.rest_client [req-f7f19c87-2ad6-449a-8d5b-22d4a1a254ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f7f19c87-2ad6-449a-8d5b-22d4a1a254ec', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2e60a8c38b4747239417157dd4a249f9", "name": "tempest-RbacPoliciesExtRbacTest-345152215", "password_expires_at": null}, "audit_ids": ["cYnTLtnDR6mLxb28vh1BoQ"], "expires_at": "2020-11-06T19:02:50.000000Z", "issued_at": "2020-11-06T18:02:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bacf7290ccf4444e8183eb504493cdde", "name": "tempest-RbacPoliciesExtRbacTest-345152215"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:50.334 38 INFO tempest.lib.common.rest_client [req-f2c90c03-ed51-4cef-b59c-4ee1b1769d04 ] Request (TrunksSubportsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.048s 2020-11-06 18:02:50.334 38 DEBUG tempest.lib.common.rest_client [req-f2c90c03-ed51-4cef-b59c-4ee1b1769d04 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f2c90c03-ed51-4cef-b59c-4ee1b1769d04', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:50.352 40 INFO tempest.lib.common.rest_client [req-7244ae29-4ccf-420f-ae23-cc7374924ab1 ] Request (RbacPoliciesExtRbacTest:test_update_rbac_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:02:50.352 40 DEBUG tempest.lib.common.rest_client [req-7244ae29-4ccf-420f-ae23-cc7374924ab1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7244ae29-4ccf-420f-ae23-cc7374924ab1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2e60a8c38b4747239417157dd4a249f9", "name": "tempest-RbacPoliciesExtRbacTest-345152215", "password_expires_at": null}, "audit_ids": ["oXJta2YnReSdOPfsNhNA0g"], "expires_at": "2020-11-06T19:02:50.000000Z", "issued_at": "2020-11-06T18:02:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bacf7290ccf4444e8183eb504493cdde", "name": "tempest-RbacPoliciesExtRbacTest-345152215"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:50.376 37 INFO tempest.lib.common.rest_client [req-9d2ebc18-7c17-45ca-b41f-dd8d289d0f59 ] Request (ServerVolumeAttachmentRbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177 0.278s 2020-11-06 18:02:50.376 37 DEBUG tempest.lib.common.rest_client [req-9d2ebc18-7c17-45ca-b41f-dd8d289d0f59 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-9d2ebc18-7c17-45ca-b41f-dd8d289d0f59', 'content-length': '1375', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9d2ebc18-7c17-45ca-b41f-dd8d289d0f59', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177'} Body: b'{"volume": {"id": "2766140b-9b9f-43bb-990b-38596df82177", "status": "in-use", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:02:38.000000", "updated_at": "2020-11-06T18:02:49.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-2023480968", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}], "user_id": "31dfe8b61f554cfe82a18efd5d747c55", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [{"id": "2766140b-9b9f-43bb-990b-38596df82177", "attachment_id": "2c9132f0-2166-4fd2-899c-41fb851d75f9", "volume_id": "2766140b-9b9f-43bb-990b-38596df82177", "server_id": "e62cf5bc-fdb9-402c-b1b0-22ca5336dbac", "host_name": "lf-virtual8", "device": "/dev/sdb", "attached_at": "2020-11-06T18:02:49.000000"}], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "198374b90e3641c39c58226d89b9ccc8"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:50.397 38 INFO tempest.lib.common.rest_client [req-4df428e1-ebc4-4672-99f2-5bc27a41b8e9 ] Request (TrunksSubportsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.061s 2020-11-06 18:02:50.397 38 DEBUG tempest.lib.common.rest_client [req-4df428e1-ebc4-4672-99f2-5bc27a41b8e9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-TrunksSubportsExtRbacTest-1619357849-desc", "domain_id": "default", "name": "tempest-TrunksSubportsExtRbacTest-1619357849"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '388', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4df428e1-ebc4-4672-99f2-5bc27a41b8e9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "e9287ae5ba59491ebbe5e823539122c6", "name": "tempest-TrunksSubportsExtRbacTest-1619357849", "domain_id": "default", "description": "tempest-TrunksSubportsExtRbacTest-1619357849-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/e9287ae5ba59491ebbe5e823539122c6"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:50.538 38 INFO tempest.lib.common.rest_client [req-61c2bb90-ac42-4c5d-8a5a-81b384cea43f ] Request (TrunksSubportsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.139s 2020-11-06 18:02:50.539 38 DEBUG tempest.lib.common.rest_client [req-61c2bb90-ac42-4c5d-8a5a-81b384cea43f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-TrunksSubportsExtRbacTest-1619357849", "password": "C1&KzHEWVThSLoE", "project_id": "e9287ae5ba59491ebbe5e823539122c6", "email": "tempest-TrunksSubportsExtRbacTest-1902120389@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '406', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-61c2bb90-ac42-4c5d-8a5a-81b384cea43f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "e9287ae5ba59491ebbe5e823539122c6", "email": "tempest-TrunksSubportsExtRbacTest-1902120389@example.com", "id": "db2c6e8f5df242e39dfaed83d67b8c4f", "name": "tempest-TrunksSubportsExtRbacTest-1619357849", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/db2c6e8f5df242e39dfaed83d67b8c4f"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:50.589 38 INFO tempest.lib.common.rest_client [req-df968af4-9bed-4bae-b1de-7059dcfd1745 ] Request (TrunksSubportsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.049s 2020-11-06 18:02:50.590 38 DEBUG tempest.lib.common.rest_client [req-df968af4-9bed-4bae-b1de-7059dcfd1745 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-df968af4-9bed-4bae-b1de-7059dcfd1745', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:50.645 38 INFO tempest.lib.common.rest_client [req-f225290b-fe13-43b7-b2ca-a6885378ddbb ] Request (TrunksSubportsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.054s 2020-11-06 18:02:50.645 38 DEBUG tempest.lib.common.rest_client [req-f225290b-fe13-43b7-b2ca-a6885378ddbb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f225290b-fe13-43b7-b2ca-a6885378ddbb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:50.668 37 INFO tempest.lib.common.rest_client [req-e65acda7-699c-4066-8732-ca4265a03ebb ] Request (ServerVolumeAttachmentRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac/os-volume_attachments/2766140b-9b9f-43bb-990b-38596df82177 0.280s 2020-11-06 18:02:50.669 37 DEBUG tempest.lib.common.rest_client [req-e65acda7-699c-4066-8732-ca4265a03ebb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e65acda7-699c-4066-8732-ca4265a03ebb', 'x-compute-request-id': 'req-e65acda7-699c-4066-8732-ca4265a03ebb', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac/os-volume_attachments/2766140b-9b9f-43bb-990b-38596df82177'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:50.721 38 INFO tempest.lib.common.rest_client [req-cabc10a4-42e8-4771-b3c4-c87e80d0adc2 ] Request (TrunksSubportsExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/e9287ae5ba59491ebbe5e823539122c6/users/db2c6e8f5df242e39dfaed83d67b8c4f/roles/72a4576c553448cd941b052c1ca0cf2d 0.074s 2020-11-06 18:02:50.722 38 DEBUG tempest.lib.common.rest_client [req-cabc10a4-42e8-4771-b3c4-c87e80d0adc2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cabc10a4-42e8-4771-b3c4-c87e80d0adc2', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e9287ae5ba59491ebbe5e823539122c6/users/db2c6e8f5df242e39dfaed83d67b8c4f/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:50.722 38 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-TrunksSubportsExtRbacTest-1619357849', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'e9287ae5ba59491ebbe5e823539122c6', 'project_name': 'tempest-TrunksSubportsExtRbacTest-1619357849', 'tenant_id': 'e9287ae5ba59491ebbe5e823539122c6', 'tenant_name': 'tempest-TrunksSubportsExtRbacTest-1619357849', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'db2c6e8f5df242e39dfaed83d67b8c4f'}, Network: None, Subnet: None, Router: None 2020-11-06 18:02:50.723 38 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-TrunksSubportsExtRbacTest-1619357849', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'e9287ae5ba59491ebbe5e823539122c6', 'project_name': 'tempest-TrunksSubportsExtRbacTest-1619357849', 'tenant_id': 'e9287ae5ba59491ebbe5e823539122c6', 'tenant_name': 'tempest-TrunksSubportsExtRbacTest-1619357849', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'db2c6e8f5df242e39dfaed83d67b8c4f'}, Network: None, Subnet: None, Router: None 2020-11-06 18:02:50.747 37 INFO tempest.lib.common.rest_client [req-10a11d27-50bb-4df8-80f0-4d014ae1f136 ] Request (ServerVolumeAttachmentRbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177 0.077s 2020-11-06 18:02:50.748 37 DEBUG tempest.lib.common.rest_client [req-10a11d27-50bb-4df8-80f0-4d014ae1f136 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-10a11d27-50bb-4df8-80f0-4d014ae1f136', 'content-length': '1378', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-10a11d27-50bb-4df8-80f0-4d014ae1f136', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177'} Body: b'{"volume": {"id": "2766140b-9b9f-43bb-990b-38596df82177", "status": "detaching", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:02:38.000000", "updated_at": "2020-11-06T18:02:51.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-2023480968", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}], "user_id": "31dfe8b61f554cfe82a18efd5d747c55", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [{"id": "2766140b-9b9f-43bb-990b-38596df82177", "attachment_id": "2c9132f0-2166-4fd2-899c-41fb851d75f9", "volume_id": "2766140b-9b9f-43bb-990b-38596df82177", "server_id": "e62cf5bc-fdb9-402c-b1b0-22ca5336dbac", "host_name": "lf-virtual8", "device": "/dev/sdb", "attached_at": "2020-11-06T18:02:49.000000"}], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "198374b90e3641c39c58226d89b9ccc8"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:50.794 39 INFO tempest.lib.common.rest_client [req-f112cb9c-39f7-42e8-8cb1-59f239384d82 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.202s 2020-11-06 18:02:50.795 39 DEBUG tempest.lib.common.rest_client [req-f112cb9c-39f7-42e8-8cb1-59f239384d82 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f112cb9c-39f7-42e8-8cb1-59f239384d82', 'x-compute-request-id': 'req-f112cb9c-39f7-42e8-8cb1-59f239384d82', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:50.838 38 INFO tempest.lib.common.rest_client [req-02e07c71-f699-4f25-888f-ce41ae449021 ] Request (TrunksSubportsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.102s 2020-11-06 18:02:50.839 38 DEBUG tempest.lib.common.rest_client [req-02e07c71-f699-4f25-888f-ce41ae449021 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6581', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-02e07c71-f699-4f25-888f-ce41ae449021', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "db2c6e8f5df242e39dfaed83d67b8c4f", "name": "tempest-TrunksSubportsExtRbacTest-1619357849", "password_expires_at": null}, "audit_ids": ["baD2J5DOQwKp2VM8KHFCuA"], "expires_at": "2020-11-06T19:02:50.000000Z", "issued_at": "2020-11-06T18:02:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e9287ae5ba59491ebbe5e823539122c6", "name": "tempest-TrunksSubportsExtRbacTest-1619357849"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:50.840 38 WARNING tempest.manager [-] tempest.manager.Manager is not a stable interface and as such it should not be imported directly. It will be removed as soon as the client manager becomes available in tempest.lib. 2020-11-06 18:02:50.953 40 INFO tempest.lib.common.rest_client [req-421f8ad8-f749-4448-a8c9-a0b8afe6f6a3 ] Request (RbacPoliciesExtRbacTest:test_update_rbac_policy): 200 PUT http://172.30.13.94:9696/v2.0/rbac-policies/1a9c68fd-4132-48a4-9769-8da81e41436c 0.600s 2020-11-06 18:02:50.954 40 DEBUG tempest.lib.common.rest_client [req-421f8ad8-f749-4448-a8c9-a0b8afe6f6a3 ] Request - Headers: {'X-Auth-Token': ''} Body: {"rbac_policy": {"target_tenant": "bacf7290ccf4444e8183eb504493cdde"}} Response - Headers: {'content-type': 'application/json', 'content-length': '324', 'x-openstack-request-id': 'req-421f8ad8-f749-4448-a8c9-a0b8afe6f6a3', 'date': 'Fri, 06 Nov 2020 18:02:50 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/rbac-policies/1a9c68fd-4132-48a4-9769-8da81e41436c'} Body: b'{"rbac_policy": {"id": "1a9c68fd-4132-48a4-9769-8da81e41436c", "project_id": "bacf7290ccf4444e8183eb504493cdde", "target_tenant": "bacf7290ccf4444e8183eb504493cdde", "action": "access_as_shared", "object_id": "c1d4e282-563f-4b42-a9f4-751c12f5350d", "object_type": "network", "tenant_id": "bacf7290ccf4444e8183eb504493cdde"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:50.955 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:51.009 38 INFO tempest.lib.common.rest_client [req-53607227-aaaa-476c-90cc-d24141738781 ] Request (TrunksSubportsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.164s 2020-11-06 18:02:51.009 38 DEBUG tempest.lib.common.rest_client [req-53607227-aaaa-476c-90cc-d24141738781 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-53607227-aaaa-476c-90cc-d24141738781', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["ThHe_xHYRkqLRcZHqgoIEg"], "expires_at": "2020-11-06T19:02:50.000000Z", "issued_at": "2020-11-06T18:02:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:51.047 38 INFO tempest.lib.common.rest_client [req-13c3e552-6c6f-4f16-bdd5-9abca7ac1735 ] Request (TrunksSubportsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.030s 2020-11-06 18:02:51.048 38 DEBUG tempest.lib.common.rest_client [req-13c3e552-6c6f-4f16-bdd5-9abca7ac1735 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-13c3e552-6c6f-4f16-bdd5-9abca7ac1735', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["JWB50fkMS82yHOPWj3TSUQ"], "expires_at": "2020-11-06T19:02:51.000000Z", "issued_at": "2020-11-06T18:02:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:51.057 40 INFO tempest.lib.common.rest_client [req-1516c853-157c-48c9-b910-15fba9722e0e ] Request (RbacPoliciesExtRbacTest:test_update_rbac_policy): 200 GET http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles 0.101s 2020-11-06 18:02:51.058 40 DEBUG tempest.lib.common.rest_client [req-1516c853-157c-48c9-b910-15fba9722e0e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1516c853-157c-48c9-b910-15fba9722e0e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde/users/2e60a8c38b4747239417157dd4a249f9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:51.094 38 INFO tempest.lib.common.rest_client [req-adc01f32-4c38-4977-98c2-0321bf8ed6e6 ] Request (TrunksSubportsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.045s 2020-11-06 18:02:51.095 38 DEBUG tempest.lib.common.rest_client [req-adc01f32-4c38-4977-98c2-0321bf8ed6e6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-adc01f32-4c38-4977-98c2-0321bf8ed6e6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:51.143 40 INFO tempest.lib.common.rest_client [req-6582700f-d7ae-40e8-b496-22316c351e3e ] Request (RbacPoliciesExtRbacTest:test_update_rbac_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:02:51.144 40 DEBUG tempest.lib.common.rest_client [req-6582700f-d7ae-40e8-b496-22316c351e3e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6582700f-d7ae-40e8-b496-22316c351e3e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2e60a8c38b4747239417157dd4a249f9", "name": "tempest-RbacPoliciesExtRbacTest-345152215", "password_expires_at": null}, "audit_ids": ["fY4WKfzwS5WgnyzKeS2hVw"], "expires_at": "2020-11-06T19:02:51.000000Z", "issued_at": "2020-11-06T18:02:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bacf7290ccf4444e8183eb504493cdde", "name": "tempest-RbacPoliciesExtRbacTest-345152215"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:51.148 38 INFO tempest.lib.common.rest_client [req-f40cc374-cb21-4784-b3c1-41dd2424f506 ] Request (TrunksSubportsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.052s 2020-11-06 18:02:51.148 38 DEBUG tempest.lib.common.rest_client [req-f40cc374-cb21-4784-b3c1-41dd2424f506 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f40cc374-cb21-4784-b3c1-41dd2424f506', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:51.149 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:02:51.150 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:51.183 40 INFO tempest.lib.common.rest_client [req-ac6901c0-4534-4358-98f1-27021a45d719 ] Request (RbacPoliciesExtRbacTest:test_update_rbac_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:02:51.184 40 DEBUG tempest.lib.common.rest_client [req-ac6901c0-4534-4358-98f1-27021a45d719 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ac6901c0-4534-4358-98f1-27021a45d719', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2e60a8c38b4747239417157dd4a249f9", "name": "tempest-RbacPoliciesExtRbacTest-345152215", "password_expires_at": null}, "audit_ids": ["0gyNKNoUQu--DnTy31wjCg"], "expires_at": "2020-11-06T19:02:51.000000Z", "issued_at": "2020-11-06T18:02:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bacf7290ccf4444e8183eb504493cdde", "name": "tempest-RbacPoliciesExtRbacTest-345152215"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bacf7290ccf4444e8183eb504493cdde", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:51.208 38 INFO tempest.lib.common.rest_client [req-5b692b01-72e4-4264-9ed3-0799f27ae2cd ] Request (TrunksSubportsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/e9287ae5ba59491ebbe5e823539122c6/users/db2c6e8f5df242e39dfaed83d67b8c4f/roles 0.058s 2020-11-06 18:02:51.209 38 DEBUG tempest.lib.common.rest_client [req-5b692b01-72e4-4264-9ed3-0799f27ae2cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5b692b01-72e4-4264-9ed3-0799f27ae2cd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e9287ae5ba59491ebbe5e823539122c6/users/db2c6e8f5df242e39dfaed83d67b8c4f/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e9287ae5ba59491ebbe5e823539122c6/users/db2c6e8f5df242e39dfaed83d67b8c4f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:51.270 38 INFO tempest.lib.common.rest_client [req-a019257b-c81a-497e-a836-9b4c8ed839f2 ] Request (TrunksSubportsExtRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/e9287ae5ba59491ebbe5e823539122c6/users/db2c6e8f5df242e39dfaed83d67b8c4f/roles/72a4576c553448cd941b052c1ca0cf2d 0.060s 2020-11-06 18:02:51.271 38 DEBUG tempest.lib.common.rest_client [req-a019257b-c81a-497e-a836-9b4c8ed839f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a019257b-c81a-497e-a836-9b4c8ed839f2', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e9287ae5ba59491ebbe5e823539122c6/users/db2c6e8f5df242e39dfaed83d67b8c4f/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:51.378 38 INFO tempest.lib.common.rest_client [req-37927e72-4f19-44dd-95e4-d87758ce8142 ] Request (TrunksSubportsExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/e9287ae5ba59491ebbe5e823539122c6/users/db2c6e8f5df242e39dfaed83d67b8c4f/roles/a629c95d64b3416fb80ae90af4f69c05 0.107s 2020-11-06 18:02:51.379 38 DEBUG tempest.lib.common.rest_client [req-37927e72-4f19-44dd-95e4-d87758ce8142 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-37927e72-4f19-44dd-95e4-d87758ce8142', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e9287ae5ba59491ebbe5e823539122c6/users/db2c6e8f5df242e39dfaed83d67b8c4f/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:51.707 40 INFO tempest.lib.common.rest_client [req-59d85d7e-e4f1-4e99-ba9f-2668f7f0544f ] Request (RbacPoliciesExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/rbac-policies/1a9c68fd-4132-48a4-9769-8da81e41436c 0.522s 2020-11-06 18:02:51.708 40 DEBUG tempest.lib.common.rest_client [req-59d85d7e-e4f1-4e99-ba9f-2668f7f0544f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-59d85d7e-e4f1-4e99-ba9f-2668f7f0544f', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:02:51 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/rbac-policies/1a9c68fd-4132-48a4-9769-8da81e41436c'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:51.842 37 INFO tempest.lib.common.rest_client [req-6435bdaa-0eaf-4ecc-8388-4c23a0cb57f6 ] Request (ServerVolumeAttachmentRbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177 0.081s 2020-11-06 18:02:51.842 37 DEBUG tempest.lib.common.rest_client [req-6435bdaa-0eaf-4ecc-8388-4c23a0cb57f6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6435bdaa-0eaf-4ecc-8388-4c23a0cb57f6', 'content-length': '1074', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6435bdaa-0eaf-4ecc-8388-4c23a0cb57f6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177'} Body: b'{"volume": {"id": "2766140b-9b9f-43bb-990b-38596df82177", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:02:38.000000", "updated_at": "2020-11-06T18:02:51.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-2023480968", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}], "user_id": "31dfe8b61f554cfe82a18efd5d747c55", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "198374b90e3641c39c58226d89b9ccc8"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:51.851 37 INFO tempest.common.waiters [-] volume 2766140b-9b9f-43bb-990b-38596df82177 reached available after waiting for 1.851679 seconds 2020-11-06 18:02:51.935 37 INFO tempest.lib.common.rest_client [req-7d8a846c-8bdb-4bf5-83aa-a15e9e4e01f8 ] Request (ServerVolumeAttachmentRbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177 0.079s 2020-11-06 18:02:51.936 37 DEBUG tempest.lib.common.rest_client [req-7d8a846c-8bdb-4bf5-83aa-a15e9e4e01f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7d8a846c-8bdb-4bf5-83aa-a15e9e4e01f8', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:51.998 39 INFO tempest.lib.common.rest_client [req-ffcb2687-1576-4128-ba7e-3eae996d934b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.187s 2020-11-06 18:02:51.999 39 DEBUG tempest.lib.common.rest_client [req-ffcb2687-1576-4128-ba7e-3eae996d934b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ffcb2687-1576-4128-ba7e-3eae996d934b', 'x-compute-request-id': 'req-ffcb2687-1576-4128-ba7e-3eae996d934b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:52.012 37 INFO tempest.lib.common.rest_client [req-4246fe30-2a93-4b11-b139-865a7a738bad ] Request (ServerVolumeAttachmentRbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177 0.075s 2020-11-06 18:02:52.013 37 DEBUG tempest.lib.common.rest_client [req-4246fe30-2a93-4b11-b139-865a7a738bad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4246fe30-2a93-4b11-b139-865a7a738bad', 'content-length': '1073', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4246fe30-2a93-4b11-b139-865a7a738bad', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177'} Body: b'{"volume": {"id": "2766140b-9b9f-43bb-990b-38596df82177", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:02:38.000000", "updated_at": "2020-11-06T18:02:52.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-2023480968", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177"}], "user_id": "31dfe8b61f554cfe82a18efd5d747c55", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "198374b90e3641c39c58226d89b9ccc8"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:52.463 38 INFO tempest.lib.common.rest_client [req-8ad6a854-3d3e-46b9-b79a-66357c0b2502 ] Request (TrunksSubportsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 18:02:52.464 38 DEBUG tempest.lib.common.rest_client [req-8ad6a854-3d3e-46b9-b79a-66357c0b2502 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8ad6a854-3d3e-46b9-b79a-66357c0b2502', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "db2c6e8f5df242e39dfaed83d67b8c4f", "name": "tempest-TrunksSubportsExtRbacTest-1619357849", "password_expires_at": null}, "audit_ids": ["wh8TyemlSbG24xAvstKWEg"], "expires_at": "2020-11-06T19:02:52.000000Z", "issued_at": "2020-11-06T18:02:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e9287ae5ba59491ebbe5e823539122c6", "name": "tempest-TrunksSubportsExtRbacTest-1619357849"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:52.494 38 INFO tempest.lib.common.rest_client [req-0499fc01-028d-4033-96cd-76ee25fd6073 ] Request (TrunksSubportsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.029s 2020-11-06 18:02:52.494 38 DEBUG tempest.lib.common.rest_client [req-0499fc01-028d-4033-96cd-76ee25fd6073 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0499fc01-028d-4033-96cd-76ee25fd6073', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "db2c6e8f5df242e39dfaed83d67b8c4f", "name": "tempest-TrunksSubportsExtRbacTest-1619357849", "password_expires_at": null}, "audit_ids": ["PhWGnbqQSVaAqOtWRQIg3w"], "expires_at": "2020-11-06T19:02:52.000000Z", "issued_at": "2020-11-06T18:02:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e9287ae5ba59491ebbe5e823539122c6", "name": "tempest-TrunksSubportsExtRbacTest-1619357849"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:52.551 40 INFO tempest.lib.common.rest_client [req-86371045-082f-4e96-b507-f5ab3c7960ab ] Request (RbacPoliciesExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/c1d4e282-563f-4b42-a9f4-751c12f5350d 0.838s 2020-11-06 18:02:52.551 40 DEBUG tempest.lib.common.rest_client [req-86371045-082f-4e96-b507-f5ab3c7960ab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-86371045-082f-4e96-b507-f5ab3c7960ab', 'date': 'Fri, 06 Nov 2020 18:02:52 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/c1d4e282-563f-4b42-a9f4-751c12f5350d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:52.724 40 INFO tempest.lib.common.rest_client [req-eacc87da-3661-485d-b4cf-f65ac23b2755 ] Request (RbacPoliciesExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/2e60a8c38b4747239417157dd4a249f9 0.172s 2020-11-06 18:02:52.725 40 DEBUG tempest.lib.common.rest_client [req-eacc87da-3661-485d-b4cf-f65ac23b2755 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eacc87da-3661-485d-b4cf-f65ac23b2755', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/2e60a8c38b4747239417157dd4a249f9'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:52.795 40 INFO tempest.lib.common.rest_client [req-53241918-ea1d-4fdb-935f-2934440a8529 ] Request (RbacPoliciesExtRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.069s 2020-11-06 18:02:52.796 40 DEBUG tempest.lib.common.rest_client [req-53241918-ea1d-4fdb-935f-2934440a8529 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-53241918-ea1d-4fdb-935f-2934440a8529', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["5xJL0PFHQxO7uTpTwSLdQw"], "expires_at": "2020-11-06T19:02:52.000000Z", "issued_at": "2020-11-06T18:02:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:52.951 40 INFO tempest.lib.common.rest_client [req-e8b34085-69ab-4e47-8417-bc2268ab91aa ] Request (RbacPoliciesExtRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=bacf7290ccf4444e8183eb504493cdde&name=default 0.154s 2020-11-06 18:02:52.952 40 DEBUG tempest.lib.common.rest_client [req-e8b34085-69ab-4e47-8417-bc2268ab91aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-e8b34085-69ab-4e47-8417-bc2268ab91aa', 'date': 'Fri, 06 Nov 2020 18:02:52 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=bacf7290ccf4444e8183eb504493cdde&name=default'} Body: b'{"security_groups": [{"id": "518c53d3-2c65-4463-bafb-22e32815ddec", "name": "default", "stateful": true, "tenant_id": "bacf7290ccf4444e8183eb504493cdde", "description": "Default security group", "security_group_rules": [{"id": "11c8e012-abf5-4863-ba77-b9e15fb80966", "tenant_id": "bacf7290ccf4444e8183eb504493cdde", "security_group_id": "518c53d3-2c65-4463-bafb-22e32815ddec", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:02:40Z", "updated_at": "2020-11-06T18:02:40Z", "revision_number": 0, "project_id": "bacf7290ccf4444e8183eb504493cdde"}, {"id": "2a6fabbc-8628-42f1-ab31-37d61fefc6e6", "tenant_id": "bacf7290ccf4444e8183eb504493cdde", "security_group_id": "518c53d3-2c65-4463-bafb-22e32815ddec", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "518c53d3-2c65-4463-bafb-22e32815ddec", "description": null, "tags": [], "created_at": "2020-11-06T18:02:40Z", "updated_at": "2020-11-06T18:02:40Z", "revision_number": 0, "project_id": "bacf7290ccf4444e8183eb504493cdde"}, {"id": "2c0366ce-3e0e-4478-ad49-943409b427c3", "tenant_id": "bacf7290ccf4444e8183eb504493cdde", "security_group_id": "518c53d3-2c65-4463-bafb-22e32815ddec", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "518c53d3-2c65-4463-bafb-22e32815ddec", "description": null, "tags": [], "created_at": "2020-11-06T18:02:40Z", "updated_at": "2020-11-06T18:02:40Z", "revision_number": 0, "project_id": "bacf7290ccf4444e8183eb504493cdde"}, {"id": "fcd1b31d-c033-4cfb-bec2-ebd46bf7e7ed", "tenant_id": "bacf7290ccf4444e8183eb504493cdde", "security_group_id": "518c53d3-2c65-4463-bafb-22e32815ddec", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:02:40Z", "updated_at": "2020-11-06T18:02:40Z", "revision_number": 0, "project_id": "bacf7290ccf4444e8183eb504493cdde"}], "tags": [], "created_at": "2020-11-06T18:02:40Z", "updated_at": "2020-11-06T18:02:40Z", "revision_number": 1, "project_id": "bacf7290ccf4444e8183eb504493cdde"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:53.090 37 INFO tempest.lib.common.rest_client [req-1d4fbeba-83b5-442a-83e2-2e12a5e605ea ] Request (ServerVolumeAttachmentRbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177 0.060s 2020-11-06 18:02:53.090 37 DEBUG tempest.lib.common.rest_client [req-1d4fbeba-83b5-442a-83e2-2e12a5e605ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-1d4fbeba-83b5-442a-83e2-2e12a5e605ea', 'x-openstack-request-id': 'req-1d4fbeba-83b5-442a-83e2-2e12a5e605ea', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/198374b90e3641c39c58226d89b9ccc8/volumes/2766140b-9b9f-43bb-990b-38596df82177'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 2766140b-9b9f-43bb-990b-38596df82177 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:53.132 38 INFO tempest.lib.common.rest_client [req-bd28f661-155f-41fd-88eb-d935da50e66e ] Request (TrunksSubportsExtRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.636s 2020-11-06 18:02:53.132 38 DEBUG tempest.lib.common.rest_client [req-bd28f661-155f-41fd-88eb-d935da50e66e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-TrunksSubportsExtRbacTest-test-network-1135654511"}} Response - Headers: {'content-type': 'application/json', 'content-length': '746', 'x-openstack-request-id': 'req-bd28f661-155f-41fd-88eb-d935da50e66e', 'date': 'Fri, 06 Nov 2020 18:02:53 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"3f5df315-73c9-4c55-be39-b3d182cd9571","name":"tempest-TrunksSubportsExtRbacTest-test-network-1135654511","tenant_id":"e9287ae5ba59491ebbe5e823539122c6","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"e9287ae5ba59491ebbe5e823539122c6","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":53,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:02:52Z","updated_at":"2020-11-06T18:02:53Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:53.245 37 INFO tempest.lib.common.rest_client [req-cb9679c0-4f3b-4fed-ac55-c7e7e4ca7440 ] Request (ServerVolumeAttachmentRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac 0.154s 2020-11-06 18:02:53.246 37 DEBUG tempest.lib.common.rest_client [req-cb9679c0-4f3b-4fed-ac55-c7e7e4ca7440 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cb9679c0-4f3b-4fed-ac55-c7e7e4ca7440', 'x-compute-request-id': 'req-cb9679c0-4f3b-4fed-ac55-c7e7e4ca7440', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:53.272 39 INFO tempest.lib.common.rest_client [req-5d986f01-526e-4a55-b314-38ee0fd9bb3e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.254s 2020-11-06 18:02:53.273 39 DEBUG tempest.lib.common.rest_client [req-5d986f01-526e-4a55-b314-38ee0fd9bb3e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5d986f01-526e-4a55-b314-38ee0fd9bb3e', 'x-compute-request-id': 'req-5d986f01-526e-4a55-b314-38ee0fd9bb3e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:53.474 37 INFO tempest.lib.common.rest_client [req-fe83e7bb-7fa4-492b-a7c2-d709e5e5a2d3 ] Request (ServerVolumeAttachmentRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac 0.227s 2020-11-06 18:02:53.475 37 DEBUG tempest.lib.common.rest_client [req-fe83e7bb-7fa4-492b-a7c2-d709e5e5a2d3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1743', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fe83e7bb-7fa4-492b-a7c2-d709e5e5a2d3', 'x-compute-request-id': 'req-fe83e7bb-7fa4-492b-a7c2-d709e5e5a2d3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac'} Body: b'{"server": {"id": "e62cf5bc-fdb9-402c-b1b0-22ca5336dbac", "name": "tempest-ServerVolumeAttachmentRbacTest-server-1425651703", "status": "ACTIVE", "tenant_id": "198374b90e3641c39c58226d89b9ccc8", "user_id": "31dfe8b61f554cfe82a18efd5d747c55", "metadata": {}, "hostId": "5360a33e40b4071081b6a940f5afc0dfa9f0bf3525e71fadd36c7a64", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:02:28Z", "updated": "2020-11-06T18:02:53Z", "addresses": {"tempest-ServerVolumeAttachmentRbacTest-1258567035-network": [{"version": 4, "addr": "192.168.120.14", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:e4:1b:3a"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:02:36.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033d2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:53.978 38 INFO tempest.lib.common.rest_client [req-0cf98794-4e5c-4ffa-8061-e2fd35d61ad2 ] Request (TrunksSubportsExtRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/ports 0.844s 2020-11-06 18:02:53.978 38 DEBUG tempest.lib.common.rest_client [req-0cf98794-4e5c-4ffa-8061-e2fd35d61ad2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "3f5df315-73c9-4c55-be39-b3d182cd9571", "name": "tempest-TrunksSubportsExtRbacTest-1216317117"}} Response - Headers: {'content-type': 'application/json', 'content-length': '907', 'x-openstack-request-id': 'req-0cf98794-4e5c-4ffa-8061-e2fd35d61ad2', 'date': 'Fri, 06 Nov 2020 18:02:53 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"1cf7d780-da86-4e15-a44d-a606e913bbf7","name":"tempest-TrunksSubportsExtRbacTest-1216317117","network_id":"3f5df315-73c9-4c55-be39-b3d182cd9571","tenant_id":"e9287ae5ba59491ebbe5e823539122c6","mac_address":"fa:16:3e:13:84:4d","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[],"project_id":"e9287ae5ba59491ebbe5e823539122c6","port_security_enabled":true,"qos_policy_id":null,"security_groups":["3ff7f6cf-5e80-4ef4-b40b-a8fe135916bc"],"binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"allowed_address_pairs":[],"extra_dhcp_opts":[],"description":"","qos_network_policy_id":null,"dns_name":"","dns_assignment":[],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:02:53Z","updated_at":"2020-11-06T18:02:53Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:54.425 40 INFO tempest.lib.common.rest_client [req-277d6f31-cee8-4648-8e3d-46b83e3f845b ] Request (RbacPoliciesExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/518c53d3-2c65-4463-bafb-22e32815ddec 1.471s 2020-11-06 18:02:54.425 40 DEBUG tempest.lib.common.rest_client [req-277d6f31-cee8-4648-8e3d-46b83e3f845b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-277d6f31-cee8-4648-8e3d-46b83e3f845b', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:02:54 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/518c53d3-2c65-4463-bafb-22e32815ddec'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:54.474 38 INFO tempest.lib.common.rest_client [req-4b836777-a3b9-45a3-9ab2-09b956d5fb1a ] Request (TrunksSubportsExtRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/trunks 0.494s 2020-11-06 18:02:54.474 38 DEBUG tempest.lib.common.rest_client [req-4b836777-a3b9-45a3-9ab2-09b956d5fb1a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"trunk": {"port_id": "1cf7d780-da86-4e15-a44d-a606e913bbf7", "sub_ports": []}} Response - Headers: {'content-type': 'application/json', 'content-length': '407', 'x-openstack-request-id': 'req-4b836777-a3b9-45a3-9ab2-09b956d5fb1a', 'date': 'Fri, 06 Nov 2020 18:02:54 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks'} Body: b'{"trunk": {"admin_state_up": true, "id": "8d195501-53fd-4593-ac46-caffd5b4ed30", "project_id": "e9287ae5ba59491ebbe5e823539122c6", "name": "", "port_id": "1cf7d780-da86-4e15-a44d-a606e913bbf7", "status": "DOWN", "sub_ports": [], "revision_number": 0, "description": "", "created_at": "2020-11-06T18:02:54Z", "updated_at": "2020-11-06T18:02:54Z", "tenant_id": "e9287ae5ba59491ebbe5e823539122c6", "tags": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:54.476 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:54.480 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_trunk, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:54.481 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:54.483 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: add_subports, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:54.515 39 INFO tempest.lib.common.rest_client [req-29289ec8-0065-4e9e-991d-83ba0476d130 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.224s 2020-11-06 18:02:54.516 39 DEBUG tempest.lib.common.rest_client [req-29289ec8-0065-4e9e-991d-83ba0476d130 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-29289ec8-0065-4e9e-991d-83ba0476d130', 'x-compute-request-id': 'req-29289ec8-0065-4e9e-991d-83ba0476d130', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:54.544 40 INFO tempest.lib.common.rest_client [req-02362fa0-2934-4afa-9ac5-6d9d258a7721 ] Request (RbacPoliciesExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde 0.117s 2020-11-06 18:02:54.544 40 DEBUG tempest.lib.common.rest_client [req-02362fa0-2934-4afa-9ac5-6d9d258a7721 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-02362fa0-2934-4afa-9ac5-6d9d258a7721', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/bacf7290ccf4444e8183eb504493cdde'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:54.633 40 INFO tempest.lib.common.rest_client [req-fdde2d80-c150-45e9-87cf-7afeee30e25e ] Request (GroupTypeSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-11-06 18:02:54.633 40 DEBUG tempest.lib.common.rest_client [req-fdde2d80-c150-45e9-87cf-7afeee30e25e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fdde2d80-c150-45e9-87cf-7afeee30e25e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["L4Tp9VHCQuqjrOLZX_cprw"], "expires_at": "2020-11-06T19:02:54.000000Z", "issued_at": "2020-11-06T18:02:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:54.663 38 INFO tempest.lib.common.rest_client [req-8e772338-1502-4aa3-95d0-5a7bdcd6074d ] Request (TrunksSubportsExtRbacTest:test_add_subports): 201 POST http://172.30.13.94:9696/v2.0/networks 0.179s 2020-11-06 18:02:54.664 38 DEBUG tempest.lib.common.rest_client [req-8e772338-1502-4aa3-95d0-5a7bdcd6074d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-TrunksSubportsExtRbacTest-test-network-963037079"}} Response - Headers: {'content-type': 'application/json', 'content-length': '745', 'x-openstack-request-id': 'req-8e772338-1502-4aa3-95d0-5a7bdcd6074d', 'date': 'Fri, 06 Nov 2020 18:02:54 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"eac57475-383b-478c-bc92-98d4d552a7a2","name":"tempest-TrunksSubportsExtRbacTest-test-network-963037079","tenant_id":"e9287ae5ba59491ebbe5e823539122c6","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"e9287ae5ba59491ebbe5e823539122c6","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":60,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:02:54Z","updated_at":"2020-11-06T18:02:54Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:54.676 40 INFO tempest.lib.common.rest_client [req-a29346ce-6935-4819-8cec-24d55a4c83e5 ] Request (GroupTypeSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:02:54.676 40 DEBUG tempest.lib.common.rest_client [req-a29346ce-6935-4819-8cec-24d55a4c83e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a29346ce-6935-4819-8cec-24d55a4c83e5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["nEiOvu_xTOu5RNu0G-wDKw"], "expires_at": "2020-11-06T19:02:54.000000Z", "issued_at": "2020-11-06T18:02:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:54.699 37 INFO tempest.lib.common.rest_client [req-32f7a77e-0b1b-49c2-a48a-923252ae949d ] Request (ServerVolumeAttachmentRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac 0.207s 2020-11-06 18:02:54.699 37 DEBUG tempest.lib.common.rest_client [req-32f7a77e-0b1b-49c2-a48a-923252ae949d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1743', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-32f7a77e-0b1b-49c2-a48a-923252ae949d', 'x-compute-request-id': 'req-32f7a77e-0b1b-49c2-a48a-923252ae949d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac'} Body: b'{"server": {"id": "e62cf5bc-fdb9-402c-b1b0-22ca5336dbac", "name": "tempest-ServerVolumeAttachmentRbacTest-server-1425651703", "status": "ACTIVE", "tenant_id": "198374b90e3641c39c58226d89b9ccc8", "user_id": "31dfe8b61f554cfe82a18efd5d747c55", "metadata": {}, "hostId": "5360a33e40b4071081b6a940f5afc0dfa9f0bf3525e71fadd36c7a64", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:02:28Z", "updated": "2020-11-06T18:02:54Z", "addresses": {"tempest-ServerVolumeAttachmentRbacTest-1258567035-network": [{"version": 4, "addr": "192.168.120.14", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:e4:1b:3a"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:02:36.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033d2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:54.728 40 INFO tempest.lib.common.rest_client [req-52a4fc85-49ec-4c90-9077-23ede316a8ce ] Request (GroupTypeSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.050s 2020-11-06 18:02:54.728 40 DEBUG tempest.lib.common.rest_client [req-52a4fc85-49ec-4c90-9077-23ede316a8ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-52a4fc85-49ec-4c90-9077-23ede316a8ce', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:54.786 40 INFO tempest.lib.common.rest_client [req-d3e82ab5-19d0-4d44-94d8-a243e96f9979 ] Request (GroupTypeSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.056s 2020-11-06 18:02:54.786 40 DEBUG tempest.lib.common.rest_client [req-d3e82ab5-19d0-4d44-94d8-a243e96f9979 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-GroupTypeSpecsRbacTest-589441383-desc", "domain_id": "default", "name": "tempest-GroupTypeSpecsRbacTest-589441383"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '380', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d3e82ab5-19d0-4d44-94d8-a243e96f9979', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "ed836abbf9f049828fd0a0e7d674cb5c", "name": "tempest-GroupTypeSpecsRbacTest-589441383", "domain_id": "default", "description": "tempest-GroupTypeSpecsRbacTest-589441383-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:54.890 40 INFO tempest.lib.common.rest_client [req-e45a4df7-445f-4a2b-af71-82ebe4f526c7 ] Request (GroupTypeSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.102s 2020-11-06 18:02:54.890 40 DEBUG tempest.lib.common.rest_client [req-e45a4df7-445f-4a2b-af71-82ebe4f526c7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-GroupTypeSpecsRbacTest-589441383", "password": "X3+mnNwMQ6wkX=Q", "project_id": "ed836abbf9f049828fd0a0e7d674cb5c", "email": "tempest-GroupTypeSpecsRbacTest-1378076652@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '399', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e45a4df7-445f-4a2b-af71-82ebe4f526c7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "ed836abbf9f049828fd0a0e7d674cb5c", "email": "tempest-GroupTypeSpecsRbacTest-1378076652@example.com", "id": "9dec2b2a50f34e2594da3cb013ae3c50", "name": "tempest-GroupTypeSpecsRbacTest-589441383", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/9dec2b2a50f34e2594da3cb013ae3c50"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:54.937 40 INFO tempest.lib.common.rest_client [req-01982f06-6285-464a-9e87-f44f1a04b9a0 ] Request (GroupTypeSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.046s 2020-11-06 18:02:54.938 40 DEBUG tempest.lib.common.rest_client [req-01982f06-6285-464a-9e87-f44f1a04b9a0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-01982f06-6285-464a-9e87-f44f1a04b9a0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:54.982 40 INFO tempest.lib.common.rest_client [req-31e26264-8bf7-4c98-aef6-e65e015cb95e ] Request (GroupTypeSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.043s 2020-11-06 18:02:54.983 40 DEBUG tempest.lib.common.rest_client [req-31e26264-8bf7-4c98-aef6-e65e015cb95e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-31e26264-8bf7-4c98-aef6-e65e015cb95e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:55.048 40 INFO tempest.lib.common.rest_client [req-189e1d0f-9cbf-4564-bc55-a0e30d6c5842 ] Request (GroupTypeSpecsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles/72a4576c553448cd941b052c1ca0cf2d 0.064s 2020-11-06 18:02:55.048 40 DEBUG tempest.lib.common.rest_client [req-189e1d0f-9cbf-4564-bc55-a0e30d6c5842 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-189e1d0f-9cbf-4564-bc55-a0e30d6c5842', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:55.049 40 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-GroupTypeSpecsRbacTest-589441383', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'ed836abbf9f049828fd0a0e7d674cb5c', 'project_name': 'tempest-GroupTypeSpecsRbacTest-589441383', 'tenant_id': 'ed836abbf9f049828fd0a0e7d674cb5c', 'tenant_name': 'tempest-GroupTypeSpecsRbacTest-589441383', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '9dec2b2a50f34e2594da3cb013ae3c50'}, Network: None, Subnet: None, Router: None 2020-11-06 18:02:55.049 40 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-GroupTypeSpecsRbacTest-589441383', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'ed836abbf9f049828fd0a0e7d674cb5c', 'project_name': 'tempest-GroupTypeSpecsRbacTest-589441383', 'tenant_id': 'ed836abbf9f049828fd0a0e7d674cb5c', 'tenant_name': 'tempest-GroupTypeSpecsRbacTest-589441383', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '9dec2b2a50f34e2594da3cb013ae3c50'}, Network: None, Subnet: None, Router: None 2020-11-06 18:02:55.182 40 INFO tempest.lib.common.rest_client [req-9ea49d50-cf43-43fd-8791-af19689fa489 ] Request (GroupTypeSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.123s 2020-11-06 18:02:55.183 40 DEBUG tempest.lib.common.rest_client [req-9ea49d50-cf43-43fd-8791-af19689fa489 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6573', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9ea49d50-cf43-43fd-8791-af19689fa489', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9dec2b2a50f34e2594da3cb013ae3c50", "name": "tempest-GroupTypeSpecsRbacTest-589441383", "password_expires_at": null}, "audit_ids": ["MzDIRVIvTNexifSdK-8jEA"], "expires_at": "2020-11-06T19:02:55.000000Z", "issued_at": "2020-11-06T18:02:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed836abbf9f049828fd0a0e7d674cb5c", "name": "tempest-GroupTypeSpecsRbacTest-589441383"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://1 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:55.220 38 INFO tempest.lib.common.rest_client [req-20b005fb-ce22-47d3-b64f-d5eabe6fd1e4 ] Request (TrunksSubportsExtRbacTest:test_add_subports): 201 POST http://172.30.13.94:9696/v2.0/ports 0.555s 2020-11-06 18:02:55.221 38 DEBUG tempest.lib.common.rest_client [req-20b005fb-ce22-47d3-b64f-d5eabe6fd1e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "eac57475-383b-478c-bc92-98d4d552a7a2", "name": "tempest-TrunksSubportsExtRbacTest-1643441332"}} Response - Headers: {'content-type': 'application/json', 'content-length': '907', 'x-openstack-request-id': 'req-20b005fb-ce22-47d3-b64f-d5eabe6fd1e4', 'date': 'Fri, 06 Nov 2020 18:02:55 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"73b4fe5f-ac77-4670-9ed6-ba84d2bf526c","name":"tempest-TrunksSubportsExtRbacTest-1643441332","network_id":"eac57475-383b-478c-bc92-98d4d552a7a2","tenant_id":"e9287ae5ba59491ebbe5e823539122c6","mac_address":"fa:16:3e:75:87:40","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[],"project_id":"e9287ae5ba59491ebbe5e823539122c6","port_security_enabled":true,"qos_policy_id":null,"security_groups":["3ff7f6cf-5e80-4ef4-b40b-a8fe135916bc"],"binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"allowed_address_pairs":[],"extra_dhcp_opts":[],"description":"","qos_network_policy_id":null,"dns_name":"","dns_assignment":[],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:02:54Z","updated_at":"2020-11-06T18:02:54Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:55.222 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:55.267 40 INFO tempest.lib.common.rest_client [req-435819e1-0904-4376-aee7-100416002612 ] Request (GroupTypeSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 18:02:55.268 40 DEBUG tempest.lib.common.rest_client [req-435819e1-0904-4376-aee7-100416002612 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-435819e1-0904-4376-aee7-100416002612', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["7hG2jsqMQXm3zsHb7-50gQ"], "expires_at": "2020-11-06T19:02:55.000000Z", "issued_at": "2020-11-06T18:02:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:55.312 40 INFO tempest.lib.common.rest_client [req-851779c5-62d7-4374-901e-b028948b2262 ] Request (GroupTypeSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:02:55.312 40 DEBUG tempest.lib.common.rest_client [req-851779c5-62d7-4374-901e-b028948b2262 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-851779c5-62d7-4374-901e-b028948b2262', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["BZMx8N2XSLCfpf-Yi3riag"], "expires_at": "2020-11-06T19:02:55.000000Z", "issued_at": "2020-11-06T18:02:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:55.322 38 INFO tempest.lib.common.rest_client [req-305bc239-f1b6-45d7-a736-26a74996fb46 ] Request (TrunksSubportsExtRbacTest:test_add_subports): 200 GET http://172.30.13.94/identity/v3/projects/e9287ae5ba59491ebbe5e823539122c6/users/db2c6e8f5df242e39dfaed83d67b8c4f/roles 0.099s 2020-11-06 18:02:55.322 38 DEBUG tempest.lib.common.rest_client [req-305bc239-f1b6-45d7-a736-26a74996fb46 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-305bc239-f1b6-45d7-a736-26a74996fb46', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e9287ae5ba59491ebbe5e823539122c6/users/db2c6e8f5df242e39dfaed83d67b8c4f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e9287ae5ba59491ebbe5e823539122c6/users/db2c6e8f5df242e39dfaed83d67b8c4f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:55.360 40 INFO tempest.lib.common.rest_client [req-1b3cfe0d-2cf2-4e02-be28-401af5e6f1a8 ] Request (GroupTypeSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.046s 2020-11-06 18:02:55.360 40 DEBUG tempest.lib.common.rest_client [req-1b3cfe0d-2cf2-4e02-be28-401af5e6f1a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1b3cfe0d-2cf2-4e02-be28-401af5e6f1a8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:55.408 40 INFO tempest.lib.common.rest_client [req-453137a1-621a-42fc-9d1c-b020feae329a ] Request (GroupTypeSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.047s 2020-11-06 18:02:55.409 40 DEBUG tempest.lib.common.rest_client [req-453137a1-621a-42fc-9d1c-b020feae329a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-453137a1-621a-42fc-9d1c-b020feae329a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:55.410 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:02:55.410 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:55.419 38 INFO tempest.lib.common.rest_client [req-a469c29c-68cf-45d4-aea2-e290f1973849 ] Request (TrunksSubportsExtRbacTest:test_add_subports): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-11-06 18:02:55.420 38 DEBUG tempest.lib.common.rest_client [req-a469c29c-68cf-45d4-aea2-e290f1973849 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a469c29c-68cf-45d4-aea2-e290f1973849', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "db2c6e8f5df242e39dfaed83d67b8c4f", "name": "tempest-TrunksSubportsExtRbacTest-1619357849", "password_expires_at": null}, "audit_ids": ["HGO8fj4XTOyMop8HoL5SuA"], "expires_at": "2020-11-06T19:02:55.000000Z", "issued_at": "2020-11-06T18:02:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e9287ae5ba59491ebbe5e823539122c6", "name": "tempest-TrunksSubportsExtRbacTest-1619357849"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:55.455 38 INFO tempest.lib.common.rest_client [req-0d91564d-b625-4f4c-8819-3d6b0d0515cc ] Request (TrunksSubportsExtRbacTest:test_add_subports): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:02:55.456 38 DEBUG tempest.lib.common.rest_client [req-0d91564d-b625-4f4c-8819-3d6b0d0515cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0d91564d-b625-4f4c-8819-3d6b0d0515cc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "db2c6e8f5df242e39dfaed83d67b8c4f", "name": "tempest-TrunksSubportsExtRbacTest-1619357849", "password_expires_at": null}, "audit_ids": ["_XxL7TFfRNO5QKAmLGTRUg"], "expires_at": "2020-11-06T19:02:55.000000Z", "issued_at": "2020-11-06T18:02:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e9287ae5ba59491ebbe5e823539122c6", "name": "tempest-TrunksSubportsExtRbacTest-1619357849"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:55.458 40 INFO tempest.lib.common.rest_client [req-2e1a0943-4165-4d28-aaaf-cc2a0672c641 ] Request (GroupTypeSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles 0.047s 2020-11-06 18:02:55.458 40 DEBUG tempest.lib.common.rest_client [req-2e1a0943-4165-4d28-aaaf-cc2a0672c641 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2e1a0943-4165-4d28-aaaf-cc2a0672c641', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:55.511 40 INFO tempest.lib.common.rest_client [req-af04807b-b7f4-4b97-85fc-ad78decaa11a ] Request (GroupTypeSpecsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles/72a4576c553448cd941b052c1ca0cf2d 0.052s 2020-11-06 18:02:55.511 40 DEBUG tempest.lib.common.rest_client [req-af04807b-b7f4-4b97-85fc-ad78decaa11a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-af04807b-b7f4-4b97-85fc-ad78decaa11a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:55.626 40 INFO tempest.lib.common.rest_client [req-4219f29e-1f7f-47ba-bcc8-b5e3bb79395f ] Request (GroupTypeSpecsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles/a629c95d64b3416fb80ae90af4f69c05 0.113s 2020-11-06 18:02:55.626 40 DEBUG tempest.lib.common.rest_client [req-4219f29e-1f7f-47ba-bcc8-b5e3bb79395f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4219f29e-1f7f-47ba-bcc8-b5e3bb79395f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:55.733 39 INFO tempest.lib.common.rest_client [req-0be36f3f-ea6a-4fee-b367-28e5df85253a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.200s 2020-11-06 18:02:55.734 39 DEBUG tempest.lib.common.rest_client [req-0be36f3f-ea6a-4fee-b367-28e5df85253a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0be36f3f-ea6a-4fee-b367-28e5df85253a', 'x-compute-request-id': 'req-0be36f3f-ea6a-4fee-b367-28e5df85253a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:55.869 37 INFO tempest.lib.common.rest_client [req-e6172bc4-2f35-4a0f-9953-b7da0125f60f ] Request (ServerVolumeAttachmentRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac 0.152s 2020-11-06 18:02:55.870 37 DEBUG tempest.lib.common.rest_client [req-e6172bc4-2f35-4a0f-9953-b7da0125f60f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1527', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e6172bc4-2f35-4a0f-9953-b7da0125f60f', 'x-compute-request-id': 'req-e6172bc4-2f35-4a0f-9953-b7da0125f60f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac'} Body: b'{"server": {"id": "e62cf5bc-fdb9-402c-b1b0-22ca5336dbac", "name": "tempest-ServerVolumeAttachmentRbacTest-server-1425651703", "status": "DELETED", "tenant_id": "198374b90e3641c39c58226d89b9ccc8", "user_id": "31dfe8b61f554cfe82a18efd5d747c55", "metadata": {}, "hostId": "5360a33e40b4071081b6a940f5afc0dfa9f0bf3525e71fadd36c7a64", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:02:28Z", "updated": "2020-11-06T18:02:55Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:02:36.000000", "OS-SRV-USG:terminated_at": "2020-11-06T18:02:55.000000", "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033d2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "deleted", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:55.880 37 INFO tempest.common.waiters [-] State transition "ACTIVE/deleting" ==> "DELETED/None" after 2 second wait 2020-11-06 18:02:55.965 38 INFO tempest.lib.common.rest_client [req-3ec3e292-ff93-4478-a73a-2cc84a921ff4 ] Request (TrunksSubportsExtRbacTest:test_add_subports): 200 PUT http://172.30.13.94:9696/v2.0/trunks/8d195501-53fd-4593-ac46-caffd5b4ed30/add_subports 0.508s 2020-11-06 18:02:55.966 38 DEBUG tempest.lib.common.rest_client [req-3ec3e292-ff93-4478-a73a-2cc84a921ff4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"sub_ports": [{"port_id": "73b4fe5f-ac77-4670-9ed6-ba84d2bf526c", "segmentation_type": "vlan", "segmentation_id": 4000}]} Response - Headers: {'content-type': 'application/json', 'content-length': '501', 'x-openstack-request-id': 'req-3ec3e292-ff93-4478-a73a-2cc84a921ff4', 'date': 'Fri, 06 Nov 2020 18:02:55 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks/8d195501-53fd-4593-ac46-caffd5b4ed30/add_subports'} Body: b'{"admin_state_up": true, "id": "8d195501-53fd-4593-ac46-caffd5b4ed30", "project_id": "e9287ae5ba59491ebbe5e823539122c6", "name": "", "port_id": "1cf7d780-da86-4e15-a44d-a606e913bbf7", "status": "DOWN", "sub_ports": [{"port_id": "73b4fe5f-ac77-4670-9ed6-ba84d2bf526c", "segmentation_type": "vlan", "segmentation_id": 4000}], "revision_number": 1, "description": "", "created_at": "2020-11-06T18:02:54Z", "updated_at": "2020-11-06T18:02:55Z", "tenant_id": "e9287ae5ba59491ebbe5e823539122c6", "tags": []}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:55.966 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:56.093 38 INFO tempest.lib.common.rest_client [req-fcc32025-2c0b-4cc4-a1f5-ad4e139d46e1 ] Request (TrunksSubportsExtRbacTest:test_add_subports): 200 GET http://172.30.13.94/identity/v3/projects/e9287ae5ba59491ebbe5e823539122c6/users/db2c6e8f5df242e39dfaed83d67b8c4f/roles 0.125s 2020-11-06 18:02:56.093 38 DEBUG tempest.lib.common.rest_client [req-fcc32025-2c0b-4cc4-a1f5-ad4e139d46e1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fcc32025-2c0b-4cc4-a1f5-ad4e139d46e1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e9287ae5ba59491ebbe5e823539122c6/users/db2c6e8f5df242e39dfaed83d67b8c4f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e9287ae5ba59491ebbe5e823539122c6/users/db2c6e8f5df242e39dfaed83d67b8c4f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:56.187 38 INFO tempest.lib.common.rest_client [req-3dad70be-1d4e-43b9-bd36-b7576dcd0177 ] Request (TrunksSubportsExtRbacTest:test_add_subports): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-11-06 18:02:56.187 38 DEBUG tempest.lib.common.rest_client [req-3dad70be-1d4e-43b9-bd36-b7576dcd0177 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3dad70be-1d4e-43b9-bd36-b7576dcd0177', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "db2c6e8f5df242e39dfaed83d67b8c4f", "name": "tempest-TrunksSubportsExtRbacTest-1619357849", "password_expires_at": null}, "audit_ids": ["Cs5fKCg7SrenvqnG22SvpQ"], "expires_at": "2020-11-06T19:02:56.000000Z", "issued_at": "2020-11-06T18:02:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e9287ae5ba59491ebbe5e823539122c6", "name": "tempest-TrunksSubportsExtRbacTest-1619357849"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:56.223 38 INFO tempest.lib.common.rest_client [req-4436b84b-9453-4ce4-a9dd-b22e6e510e3e ] Request (TrunksSubportsExtRbacTest:test_add_subports): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:02:56.224 38 DEBUG tempest.lib.common.rest_client [req-4436b84b-9453-4ce4-a9dd-b22e6e510e3e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4436b84b-9453-4ce4-a9dd-b22e6e510e3e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "db2c6e8f5df242e39dfaed83d67b8c4f", "name": "tempest-TrunksSubportsExtRbacTest-1619357849", "password_expires_at": null}, "audit_ids": ["RR5EoScNTIWJfY3gp_gkDQ"], "expires_at": "2020-11-06T19:02:56.000000Z", "issued_at": "2020-11-06T18:02:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e9287ae5ba59491ebbe5e823539122c6", "name": "tempest-TrunksSubportsExtRbacTest-1619357849"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:56.410 38 INFO tempest.lib.common.rest_client [req-75856eb6-2bc4-43ef-b601-d409381bbb2d ] Request (TrunksSubportsExtRbacTest:_run_cleanups): 200 PUT http://172.30.13.94:9696/v2.0/trunks/8d195501-53fd-4593-ac46-caffd5b4ed30/remove_subports 0.185s 2020-11-06 18:02:56.411 38 DEBUG tempest.lib.common.rest_client [req-75856eb6-2bc4-43ef-b601-d409381bbb2d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"sub_ports": [{"port_id": "73b4fe5f-ac77-4670-9ed6-ba84d2bf526c", "segmentation_type": "vlan", "segmentation_id": 4000}]} Response - Headers: {'content-type': 'application/json', 'content-length': '396', 'x-openstack-request-id': 'req-75856eb6-2bc4-43ef-b601-d409381bbb2d', 'date': 'Fri, 06 Nov 2020 18:02:56 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks/8d195501-53fd-4593-ac46-caffd5b4ed30/remove_subports'} Body: b'{"admin_state_up": true, "id": "8d195501-53fd-4593-ac46-caffd5b4ed30", "project_id": "e9287ae5ba59491ebbe5e823539122c6", "name": "", "port_id": "1cf7d780-da86-4e15-a44d-a606e913bbf7", "status": "DOWN", "sub_ports": [], "revision_number": 2, "description": "", "created_at": "2020-11-06T18:02:54Z", "updated_at": "2020-11-06T18:02:56Z", "tenant_id": "e9287ae5ba59491ebbe5e823539122c6", "tags": []}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:56.414 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:56.418 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_trunk, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:56.419 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:56.422 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_subports, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:56.725 40 INFO tempest.lib.common.rest_client [req-061487c0-70fb-4ded-80c2-7cb363ce70ce ] Request (GroupTypeSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-11-06 18:02:56.726 40 DEBUG tempest.lib.common.rest_client [req-061487c0-70fb-4ded-80c2-7cb363ce70ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-061487c0-70fb-4ded-80c2-7cb363ce70ce', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9dec2b2a50f34e2594da3cb013ae3c50", "name": "tempest-GroupTypeSpecsRbacTest-589441383", "password_expires_at": null}, "audit_ids": ["UzHU4jrjSvCF9-4S_unzOQ"], "expires_at": "2020-11-06T19:02:56.000000Z", "issued_at": "2020-11-06T18:02:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed836abbf9f049828fd0a0e7d674cb5c", "name": "tempest-GroupTypeSpecsRbacTest-589441383"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:56.727 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:56.754 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:group_types_specs, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:56.900 38 INFO tempest.lib.common.rest_client [req-06c64e1f-2047-452b-9483-eda0b1b5323e ] Request (TrunksSubportsExtRbacTest:test_get_subports): 201 POST http://172.30.13.94:9696/v2.0/networks 0.477s 2020-11-06 18:02:56.900 38 DEBUG tempest.lib.common.rest_client [req-06c64e1f-2047-452b-9483-eda0b1b5323e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-TrunksSubportsExtRbacTest-test-network-696902528"}} Response - Headers: {'content-type': 'application/json', 'content-length': '745', 'x-openstack-request-id': 'req-06c64e1f-2047-452b-9483-eda0b1b5323e', 'date': 'Fri, 06 Nov 2020 18:02:56 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"645975ed-5857-4a42-a350-7cd2a458ab56","name":"tempest-TrunksSubportsExtRbacTest-test-network-696902528","tenant_id":"e9287ae5ba59491ebbe5e823539122c6","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"e9287ae5ba59491ebbe5e823539122c6","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":57,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:02:56Z","updated_at":"2020-11-06T18:02:56Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:56.960 39 INFO tempest.lib.common.rest_client [req-9a106709-2a88-4238-9766-fe589973cd4d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.211s 2020-11-06 18:02:56.961 39 DEBUG tempest.lib.common.rest_client [req-9a106709-2a88-4238-9766-fe589973cd4d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9a106709-2a88-4238-9766-fe589973cd4d', 'x-compute-request-id': 'req-9a106709-2a88-4238-9766-fe589973cd4d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:56.963 40 INFO tempest.lib.common.rest_client [req-3b8706b9-a330-4e0b-a6da-feac8d92217a ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_create): 202 POST http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c/group_types 0.208s 2020-11-06 18:02:56.964 40 DEBUG tempest.lib.common.rest_client [req-3b8706b9-a330-4e0b-a6da-feac8d92217a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupTypeSpecsRbacTest-group-type-1925025365"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-3b8706b9-a330-4e0b-a6da-feac8d92217a', 'content-length': '185', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3b8706b9-a330-4e0b-a6da-feac8d92217a', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c/group_types'} Body: b'{"group_type": {"id": "d5615a4a-925a-48f4-a65d-742649bb7e48", "name": "tempest-GroupTypeSpecsRbacTest-group-type-1925025365", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:56.968 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:57.108 37 INFO tempest.lib.common.rest_client [req-5c1c7dcc-2499-4ff2-bda5-ca0a5bd6b81e ] Request (ServerVolumeAttachmentRbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac 0.225s 2020-11-06 18:02:57.108 37 DEBUG tempest.lib.common.rest_client [req-5c1c7dcc-2499-4ff2-bda5-ca0a5bd6b81e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-5c1c7dcc-2499-4ff2-bda5-ca0a5bd6b81e', 'x-compute-request-id': 'req-5c1c7dcc-2499-4ff2-bda5-ca0a5bd6b81e', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/e62cf5bc-fdb9-402c-b1b0-22ca5336dbac'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance e62cf5bc-fdb9-402c-b1b0-22ca5336dbac could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:57.109 37 DEBUG tempest.lib.common.dynamic_creds [-] Clearing network: {'id': '5d36c639-e8c3-4217-a17b-7cd7a033d67a', 'name': 'tempest-ServerVolumeAttachmentRbacTest-1258567035-network', 'tenant_id': '198374b90e3641c39c58226d89b9ccc8', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '198374b90e3641c39c58226d89b9ccc8', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 49, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T18:02:19Z', 'updated_at': '2020-11-06T18:02:19Z', 'revision_number': 1}, subnet: {'id': '8b7f9f92-033a-4908-99d7-129d95e50f00', 'name': 'tempest-ServerVolumeAttachmentRbacTest-1258567035-subnet', 'tenant_id': '198374b90e3641c39c58226d89b9ccc8', 'network_id': '5d36c639-e8c3-4217-a17b-7cd7a033d67a', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-11-06T18:02:19Z', 'updated_at': '2020-11-06T18:02:19Z', 'revision_number': 0, 'project_id': '198374b90e3641c39c58226d89b9ccc8'}, router: {'id': '95d785d5-5725-416d-a580-63ed0c22ed73', 'name': 'tempest-ServerVolumeAttachmentRbacTest-1258567035-router', 'tenant_id': '198374b90e3641c39c58226d89b9ccc8', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.141'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::3be'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-11-06T18:02:20Z', 'updated_at': '2020-11-06T18:02:21Z', 'revision_number': 3, 'project_id': '198374b90e3641c39c58226d89b9ccc8'} _clear_isolated_net_resources /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/dynamic_creds.py:418 2020-11-06 18:02:57.139 40 INFO tempest.lib.common.rest_client [req-e5334999-d33d-4566-98ca-dadfee352768 ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_create): 200 GET http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles 0.170s 2020-11-06 18:02:57.140 40 DEBUG tempest.lib.common.rest_client [req-e5334999-d33d-4566-98ca-dadfee352768 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e5334999-d33d-4566-98ca-dadfee352768', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:57.235 40 INFO tempest.lib.common.rest_client [req-c45183a1-db55-4c1c-b137-4f6559b966b7 ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_create): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-11-06 18:02:57.236 40 DEBUG tempest.lib.common.rest_client [req-c45183a1-db55-4c1c-b137-4f6559b966b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c45183a1-db55-4c1c-b137-4f6559b966b7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9dec2b2a50f34e2594da3cb013ae3c50", "name": "tempest-GroupTypeSpecsRbacTest-589441383", "password_expires_at": null}, "audit_ids": ["0CGDTjFHRW-Ltpq0GYtY2w"], "expires_at": "2020-11-06T19:02:57.000000Z", "issued_at": "2020-11-06T18:02:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed836abbf9f049828fd0a0e7d674cb5c", "name": "tempest-GroupTypeSpecsRbacTest-589441383"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:57.492 40 INFO tempest.lib.common.rest_client [req-d9bb8515-7d1d-42c3-80a1-aa85ab22d42b ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_create): 202 POST http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c/group_types/d5615a4a-925a-48f4-a65d-742649bb7e48/group_specs 0.254s 2020-11-06 18:02:57.493 40 DEBUG tempest.lib.common.rest_client [req-d9bb8515-7d1d-42c3-80a1-aa85ab22d42b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: {"group_specs": {"key1": "value1", "key2": "value2"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d9bb8515-7d1d-42c3-80a1-aa85ab22d42b', 'content-length': '53', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d9bb8515-7d1d-42c3-80a1-aa85ab22d42b', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c/group_types/d5615a4a-925a-48f4-a65d-742649bb7e48/group_specs'} Body: b'{"group_specs": {"key1": "value1", "key2": "value2"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:57.496 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:57.497 38 INFO tempest.lib.common.rest_client [req-6f137876-71aa-400e-9841-1813995e6e12 ] Request (TrunksSubportsExtRbacTest:test_get_subports): 201 POST http://172.30.13.94:9696/v2.0/ports 0.596s 2020-11-06 18:02:57.498 38 DEBUG tempest.lib.common.rest_client [req-6f137876-71aa-400e-9841-1813995e6e12 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "645975ed-5857-4a42-a350-7cd2a458ab56", "name": "tempest-TrunksSubportsExtRbacTest-911129077"}} Response - Headers: {'content-type': 'application/json', 'content-length': '906', 'x-openstack-request-id': 'req-6f137876-71aa-400e-9841-1813995e6e12', 'date': 'Fri, 06 Nov 2020 18:02:57 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"8a1776c7-1031-425f-b420-09213842751d","name":"tempest-TrunksSubportsExtRbacTest-911129077","network_id":"645975ed-5857-4a42-a350-7cd2a458ab56","tenant_id":"e9287ae5ba59491ebbe5e823539122c6","mac_address":"fa:16:3e:ce:19:5b","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[],"project_id":"e9287ae5ba59491ebbe5e823539122c6","port_security_enabled":true,"qos_policy_id":null,"security_groups":["3ff7f6cf-5e80-4ef4-b40b-a8fe135916bc"],"binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"allowed_address_pairs":[],"extra_dhcp_opts":[],"description":"","qos_network_policy_id":null,"dns_name":"","dns_assignment":[],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:02:57Z","updated_at":"2020-11-06T18:02:57Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:57.622 40 INFO tempest.lib.common.rest_client [req-9d1daccd-c0f9-4435-a5b8-0497bb3cfcde ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_create): 200 GET http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles 0.125s 2020-11-06 18:02:57.623 40 DEBUG tempest.lib.common.rest_client [req-9d1daccd-c0f9-4435-a5b8-0497bb3cfcde ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9d1daccd-c0f9-4435-a5b8-0497bb3cfcde', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:57.712 40 INFO tempest.lib.common.rest_client [req-66afdc0b-e262-4f11-9dc7-4e57e7f4629a ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_create): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 18:02:57.713 40 DEBUG tempest.lib.common.rest_client [req-66afdc0b-e262-4f11-9dc7-4e57e7f4629a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-66afdc0b-e262-4f11-9dc7-4e57e7f4629a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9dec2b2a50f34e2594da3cb013ae3c50", "name": "tempest-GroupTypeSpecsRbacTest-589441383", "password_expires_at": null}, "audit_ids": ["kcR03OylS3-ddxs3v8szTQ"], "expires_at": "2020-11-06T19:02:57.000000Z", "issued_at": "2020-11-06T18:02:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed836abbf9f049828fd0a0e7d674cb5c", "name": "tempest-GroupTypeSpecsRbacTest-589441383"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:57.822 38 INFO tempest.lib.common.rest_client [req-5cc1a297-192b-4c40-a510-73b8e26651e4 ] Request (TrunksSubportsExtRbacTest:test_get_subports): 200 PUT http://172.30.13.94:9696/v2.0/trunks/8d195501-53fd-4593-ac46-caffd5b4ed30/add_subports 0.323s 2020-11-06 18:02:57.823 38 DEBUG tempest.lib.common.rest_client [req-5cc1a297-192b-4c40-a510-73b8e26651e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"sub_ports": [{"port_id": "8a1776c7-1031-425f-b420-09213842751d", "segmentation_type": "vlan", "segmentation_id": 4000}]} Response - Headers: {'content-type': 'application/json', 'content-length': '501', 'x-openstack-request-id': 'req-5cc1a297-192b-4c40-a510-73b8e26651e4', 'date': 'Fri, 06 Nov 2020 18:02:57 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks/8d195501-53fd-4593-ac46-caffd5b4ed30/add_subports'} Body: b'{"admin_state_up": true, "id": "8d195501-53fd-4593-ac46-caffd5b4ed30", "project_id": "e9287ae5ba59491ebbe5e823539122c6", "name": "", "port_id": "1cf7d780-da86-4e15-a44d-a606e913bbf7", "status": "DOWN", "sub_ports": [{"port_id": "8a1776c7-1031-425f-b420-09213842751d", "segmentation_type": "vlan", "segmentation_id": 4000}], "revision_number": 3, "description": "", "created_at": "2020-11-06T18:02:54Z", "updated_at": "2020-11-06T18:02:57Z", "tenant_id": "e9287ae5ba59491ebbe5e823539122c6", "tags": []}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:57.824 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:57.856 40 INFO tempest.lib.common.rest_client [req-0bc0c08a-8909-4ea8-b960-60a74b3b1d80 ] Request (GroupTypeSpecsRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c/group_types/d5615a4a-925a-48f4-a65d-742649bb7e48 0.141s 2020-11-06 18:02:57.856 40 DEBUG tempest.lib.common.rest_client [req-0bc0c08a-8909-4ea8-b960-60a74b3b1d80 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0bc0c08a-8909-4ea8-b960-60a74b3b1d80', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c/group_types/d5615a4a-925a-48f4-a65d-742649bb7e48'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:57.859 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:57.862 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:group_types_specs, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:57.916 40 INFO tempest.lib.common.rest_client [req-2018e161-d5cd-4302-b033-280ca1e97590 ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_delete): 202 POST http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c/group_types 0.052s 2020-11-06 18:02:57.916 40 DEBUG tempest.lib.common.rest_client [req-2018e161-d5cd-4302-b033-280ca1e97590 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupTypeSpecsRbacTest-group-type-1362428817"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-2018e161-d5cd-4302-b033-280ca1e97590', 'content-length': '185', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2018e161-d5cd-4302-b033-280ca1e97590', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c/group_types'} Body: b'{"group_type": {"id": "a0776c72-ddaa-4a7e-8e6b-203f037f5758", "name": "tempest-GroupTypeSpecsRbacTest-group-type-1362428817", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:57.922 38 INFO tempest.lib.common.rest_client [req-e078e628-ecbe-4457-85e5-0bf93073f631 ] Request (TrunksSubportsExtRbacTest:test_get_subports): 200 GET http://172.30.13.94/identity/v3/projects/e9287ae5ba59491ebbe5e823539122c6/users/db2c6e8f5df242e39dfaed83d67b8c4f/roles 0.097s 2020-11-06 18:02:57.922 38 DEBUG tempest.lib.common.rest_client [req-e078e628-ecbe-4457-85e5-0bf93073f631 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e078e628-ecbe-4457-85e5-0bf93073f631', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e9287ae5ba59491ebbe5e823539122c6/users/db2c6e8f5df242e39dfaed83d67b8c4f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e9287ae5ba59491ebbe5e823539122c6/users/db2c6e8f5df242e39dfaed83d67b8c4f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:57.957 40 INFO tempest.lib.common.rest_client [req-53565437-e729-4f16-80d8-44217b70b424 ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_delete): 202 POST http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c/group_types/a0776c72-ddaa-4a7e-8e6b-203f037f5758/group_specs 0.036s 2020-11-06 18:02:57.958 40 DEBUG tempest.lib.common.rest_client [req-53565437-e729-4f16-80d8-44217b70b424 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: {"group_specs": {"key1": "value1"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-53565437-e729-4f16-80d8-44217b70b424', 'content-length': '35', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-53565437-e729-4f16-80d8-44217b70b424', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c/group_types/a0776c72-ddaa-4a7e-8e6b-203f037f5758/group_specs'} Body: b'{"group_specs": {"key1": "value1"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:57.960 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:58.012 38 INFO tempest.lib.common.rest_client [req-e2faac94-4cec-4d45-9bf3-faafb2755d58 ] Request (TrunksSubportsExtRbacTest:test_get_subports): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-11-06 18:02:58.013 38 DEBUG tempest.lib.common.rest_client [req-e2faac94-4cec-4d45-9bf3-faafb2755d58 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e2faac94-4cec-4d45-9bf3-faafb2755d58', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "db2c6e8f5df242e39dfaed83d67b8c4f", "name": "tempest-TrunksSubportsExtRbacTest-1619357849", "password_expires_at": null}, "audit_ids": ["CH7o5DqiRM-zMJ5Be8TR0A"], "expires_at": "2020-11-06T19:02:57.000000Z", "issued_at": "2020-11-06T18:02:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e9287ae5ba59491ebbe5e823539122c6", "name": "tempest-TrunksSubportsExtRbacTest-1619357849"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:58.018 40 INFO tempest.lib.common.rest_client [req-4250256e-7586-418a-b838-9a1b1b694086 ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_delete): 200 GET http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles 0.057s 2020-11-06 18:02:58.019 40 DEBUG tempest.lib.common.rest_client [req-4250256e-7586-418a-b838-9a1b1b694086 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4250256e-7586-418a-b838-9a1b1b694086', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:58.097 38 INFO tempest.lib.common.rest_client [req-c1c8f148-230f-442d-9208-543a2cc88568 ] Request (TrunksSubportsExtRbacTest:test_get_subports): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 18:02:58.098 38 DEBUG tempest.lib.common.rest_client [req-c1c8f148-230f-442d-9208-543a2cc88568 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c1c8f148-230f-442d-9208-543a2cc88568', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "db2c6e8f5df242e39dfaed83d67b8c4f", "name": "tempest-TrunksSubportsExtRbacTest-1619357849", "password_expires_at": null}, "audit_ids": ["DcM3cYuaRdi5jdAFpQF4Lg"], "expires_at": "2020-11-06T19:02:58.000000Z", "issued_at": "2020-11-06T18:02:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e9287ae5ba59491ebbe5e823539122c6", "name": "tempest-TrunksSubportsExtRbacTest-1619357849"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:58.108 40 INFO tempest.lib.common.rest_client [req-e43a0a2d-244d-4166-863f-58e7e210f8de ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_delete): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-11-06 18:02:58.109 40 DEBUG tempest.lib.common.rest_client [req-e43a0a2d-244d-4166-863f-58e7e210f8de ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e43a0a2d-244d-4166-863f-58e7e210f8de', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9dec2b2a50f34e2594da3cb013ae3c50", "name": "tempest-GroupTypeSpecsRbacTest-589441383", "password_expires_at": null}, "audit_ids": ["8EhxNms_ToCKb8jPtEb9bQ"], "expires_at": "2020-11-06T19:02:58.000000Z", "issued_at": "2020-11-06T18:02:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed836abbf9f049828fd0a0e7d674cb5c", "name": "tempest-GroupTypeSpecsRbacTest-589441383"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:58.239 39 INFO tempest.lib.common.rest_client [req-8e809c59-510f-452e-a0d6-080172f29db4 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.259s 2020-11-06 18:02:58.240 39 DEBUG tempest.lib.common.rest_client [req-8e809c59-510f-452e-a0d6-080172f29db4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8e809c59-510f-452e-a0d6-080172f29db4', 'x-compute-request-id': 'req-8e809c59-510f-452e-a0d6-080172f29db4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:58.250 40 INFO tempest.lib.common.rest_client [req-53bdc08f-6c55-40ae-80f5-027d0a6e334b ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_delete): 202 DELETE http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c/group_types/a0776c72-ddaa-4a7e-8e6b-203f037f5758/group_specs/key1 0.140s 2020-11-06 18:02:58.251 40 DEBUG tempest.lib.common.rest_client [req-53bdc08f-6c55-40ae-80f5-027d0a6e334b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-53bdc08f-6c55-40ae-80f5-027d0a6e334b', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c/group_types/a0776c72-ddaa-4a7e-8e6b-203f037f5758/group_specs/key1'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:58.252 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:58.302 38 INFO tempest.lib.common.rest_client [req-3b33588b-2771-4df3-98b7-fc29d0528d22 ] Request (TrunksSubportsExtRbacTest:test_get_subports): 200 GET http://172.30.13.94:9696/v2.0/trunks/8d195501-53fd-4593-ac46-caffd5b4ed30/get_subports 0.203s 2020-11-06 18:02:58.303 38 DEBUG tempest.lib.common.rest_client [req-3b33588b-2771-4df3-98b7-fc29d0528d22 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '122', 'x-openstack-request-id': 'req-3b33588b-2771-4df3-98b7-fc29d0528d22', 'date': 'Fri, 06 Nov 2020 18:02:58 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks/8d195501-53fd-4593-ac46-caffd5b4ed30/get_subports'} Body: b'{"sub_ports": [{"port_id": "8a1776c7-1031-425f-b420-09213842751d", "segmentation_type": "vlan", "segmentation_id": 4000}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:58.304 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:58.415 40 INFO tempest.lib.common.rest_client [req-221be092-634b-49d7-b77e-7f7f5c3595ef ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_delete): 200 GET http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles 0.162s 2020-11-06 18:02:58.416 40 DEBUG tempest.lib.common.rest_client [req-221be092-634b-49d7-b77e-7f7f5c3595ef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-221be092-634b-49d7-b77e-7f7f5c3595ef', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:58.460 38 INFO tempest.lib.common.rest_client [req-d993651a-2307-4c3d-8ccb-d14cccb1c3b8 ] Request (TrunksSubportsExtRbacTest:test_get_subports): 200 GET http://172.30.13.94/identity/v3/projects/e9287ae5ba59491ebbe5e823539122c6/users/db2c6e8f5df242e39dfaed83d67b8c4f/roles 0.154s 2020-11-06 18:02:58.460 38 DEBUG tempest.lib.common.rest_client [req-d993651a-2307-4c3d-8ccb-d14cccb1c3b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d993651a-2307-4c3d-8ccb-d14cccb1c3b8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e9287ae5ba59491ebbe5e823539122c6/users/db2c6e8f5df242e39dfaed83d67b8c4f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e9287ae5ba59491ebbe5e823539122c6/users/db2c6e8f5df242e39dfaed83d67b8c4f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:58.497 40 INFO tempest.lib.common.rest_client [req-24e93b83-4202-4e88-bf51-08f8fa48f8b8 ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_delete): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-11-06 18:02:58.498 40 DEBUG tempest.lib.common.rest_client [req-24e93b83-4202-4e88-bf51-08f8fa48f8b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-24e93b83-4202-4e88-bf51-08f8fa48f8b8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9dec2b2a50f34e2594da3cb013ae3c50", "name": "tempest-GroupTypeSpecsRbacTest-589441383", "password_expires_at": null}, "audit_ids": ["nTSlmtN_QCyRissxWTwouA"], "expires_at": "2020-11-06T19:02:58.000000Z", "issued_at": "2020-11-06T18:02:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed836abbf9f049828fd0a0e7d674cb5c", "name": "tempest-GroupTypeSpecsRbacTest-589441383"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:58.556 38 INFO tempest.lib.common.rest_client [req-c38a4b8a-e109-4abd-95f4-a3c8c04ac97a ] Request (TrunksSubportsExtRbacTest:test_get_subports): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-11-06 18:02:58.556 38 DEBUG tempest.lib.common.rest_client [req-c38a4b8a-e109-4abd-95f4-a3c8c04ac97a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c38a4b8a-e109-4abd-95f4-a3c8c04ac97a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "db2c6e8f5df242e39dfaed83d67b8c4f", "name": "tempest-TrunksSubportsExtRbacTest-1619357849", "password_expires_at": null}, "audit_ids": ["HeP6rByyT_KxddBN1wFyRw"], "expires_at": "2020-11-06T19:02:58.000000Z", "issued_at": "2020-11-06T18:02:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e9287ae5ba59491ebbe5e823539122c6", "name": "tempest-TrunksSubportsExtRbacTest-1619357849"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:58.592 38 INFO tempest.lib.common.rest_client [req-0f2cfc5b-efa5-4ac9-b165-72f4a2aa17de ] Request (TrunksSubportsExtRbacTest:test_get_subports): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:02:58.593 38 DEBUG tempest.lib.common.rest_client [req-0f2cfc5b-efa5-4ac9-b165-72f4a2aa17de ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0f2cfc5b-efa5-4ac9-b165-72f4a2aa17de', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "db2c6e8f5df242e39dfaed83d67b8c4f", "name": "tempest-TrunksSubportsExtRbacTest-1619357849", "password_expires_at": null}, "audit_ids": ["_UkjClkjRTyvDxQLYROwEw"], "expires_at": "2020-11-06T19:02:58.000000Z", "issued_at": "2020-11-06T18:02:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e9287ae5ba59491ebbe5e823539122c6", "name": "tempest-TrunksSubportsExtRbacTest-1619357849"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:58.662 40 INFO tempest.lib.common.rest_client [req-a29ca0ff-1da2-4fa5-8351-7b9c6042b6ee ] Request (GroupTypeSpecsRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c/group_types/a0776c72-ddaa-4a7e-8e6b-203f037f5758 0.163s 2020-11-06 18:02:58.662 40 DEBUG tempest.lib.common.rest_client [req-a29ca0ff-1da2-4fa5-8351-7b9c6042b6ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a29ca0ff-1da2-4fa5-8351-7b9c6042b6ee', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c/group_types/a0776c72-ddaa-4a7e-8e6b-203f037f5758'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:58.665 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:58.668 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:group_types_specs, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:58.708 40 INFO tempest.lib.common.rest_client [req-3a8a4da5-cb2a-499e-90c7-e0399d7c329c ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_list): 202 POST http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c/group_types 0.038s 2020-11-06 18:02:58.708 40 DEBUG tempest.lib.common.rest_client [req-3a8a4da5-cb2a-499e-90c7-e0399d7c329c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupTypeSpecsRbacTest-group-type-597186888"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-3a8a4da5-cb2a-499e-90c7-e0399d7c329c', 'content-length': '184', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3a8a4da5-cb2a-499e-90c7-e0399d7c329c', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c/group_types'} Body: b'{"group_type": {"id": "4f371d28-e013-4807-a1a6-77ee866b3e7d", "name": "tempest-GroupTypeSpecsRbacTest-group-type-597186888", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:58.712 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:58.763 40 INFO tempest.lib.common.rest_client [req-552571f3-c562-4214-9e87-506010bba5a6 ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_list): 200 GET http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles 0.050s 2020-11-06 18:02:58.763 40 DEBUG tempest.lib.common.rest_client [req-552571f3-c562-4214-9e87-506010bba5a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-552571f3-c562-4214-9e87-506010bba5a6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:58.776 38 INFO tempest.lib.common.rest_client [req-3eb9bc43-e7b3-44a3-8408-bcdd8538c92e ] Request (TrunksSubportsExtRbacTest:_run_cleanups): 200 PUT http://172.30.13.94:9696/v2.0/trunks/8d195501-53fd-4593-ac46-caffd5b4ed30/remove_subports 0.181s 2020-11-06 18:02:58.776 38 DEBUG tempest.lib.common.rest_client [req-3eb9bc43-e7b3-44a3-8408-bcdd8538c92e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"sub_ports": [{"port_id": "8a1776c7-1031-425f-b420-09213842751d", "segmentation_type": "vlan", "segmentation_id": 4000}]} Response - Headers: {'content-type': 'application/json', 'content-length': '396', 'x-openstack-request-id': 'req-3eb9bc43-e7b3-44a3-8408-bcdd8538c92e', 'date': 'Fri, 06 Nov 2020 18:02:58 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks/8d195501-53fd-4593-ac46-caffd5b4ed30/remove_subports'} Body: b'{"admin_state_up": true, "id": "8d195501-53fd-4593-ac46-caffd5b4ed30", "project_id": "e9287ae5ba59491ebbe5e823539122c6", "name": "", "port_id": "1cf7d780-da86-4e15-a44d-a606e913bbf7", "status": "DOWN", "sub_ports": [], "revision_number": 4, "description": "", "created_at": "2020-11-06T18:02:54Z", "updated_at": "2020-11-06T18:02:58Z", "tenant_id": "e9287ae5ba59491ebbe5e823539122c6", "tags": []}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:58.780 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:58.783 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_trunk, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:58.784 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:58.786 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: remove_subports, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:58.795 40 INFO tempest.lib.common.rest_client [req-6ee4ef1f-8db6-4c6a-971f-3e9c64204365 ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_list): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:02:58.796 40 DEBUG tempest.lib.common.rest_client [req-6ee4ef1f-8db6-4c6a-971f-3e9c64204365 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6ee4ef1f-8db6-4c6a-971f-3e9c64204365', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9dec2b2a50f34e2594da3cb013ae3c50", "name": "tempest-GroupTypeSpecsRbacTest-589441383", "password_expires_at": null}, "audit_ids": ["eb5_yCM-TPG2jywVcOXL0Q"], "expires_at": "2020-11-06T19:02:58.000000Z", "issued_at": "2020-11-06T18:02:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed836abbf9f049828fd0a0e7d674cb5c", "name": "tempest-GroupTypeSpecsRbacTest-589441383"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:58.885 40 INFO tempest.lib.common.rest_client [req-52d2be30-1051-4ef2-8d55-c1e8085cf10f ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_list): 200 GET http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c/group_types/4f371d28-e013-4807-a1a6-77ee866b3e7d/group_specs 0.088s 2020-11-06 18:02:58.885 40 DEBUG tempest.lib.common.rest_client [req-52d2be30-1051-4ef2-8d55-c1e8085cf10f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-52d2be30-1051-4ef2-8d55-c1e8085cf10f', 'content-length': '19', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-52d2be30-1051-4ef2-8d55-c1e8085cf10f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c/group_types/4f371d28-e013-4807-a1a6-77ee866b3e7d/group_specs'} Body: b'{"group_specs": {}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:58.888 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:58.944 40 INFO tempest.lib.common.rest_client [req-8a142728-84ca-4491-9245-13a04e7e26b8 ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_list): 200 GET http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles 0.056s 2020-11-06 18:02:58.945 40 DEBUG tempest.lib.common.rest_client [req-8a142728-84ca-4491-9245-13a04e7e26b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8a142728-84ca-4491-9245-13a04e7e26b8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:58.994 40 INFO tempest.lib.common.rest_client [req-19f94d8b-b650-4968-a2b6-90383c11a3ea ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_list): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-11-06 18:02:58.994 40 DEBUG tempest.lib.common.rest_client [req-19f94d8b-b650-4968-a2b6-90383c11a3ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-19f94d8b-b650-4968-a2b6-90383c11a3ea', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9dec2b2a50f34e2594da3cb013ae3c50", "name": "tempest-GroupTypeSpecsRbacTest-589441383", "password_expires_at": null}, "audit_ids": ["b0OUWxbWT_SSsRO9kv3i2w"], "expires_at": "2020-11-06T19:02:58.000000Z", "issued_at": "2020-11-06T18:02:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed836abbf9f049828fd0a0e7d674cb5c", "name": "tempest-GroupTypeSpecsRbacTest-589441383"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:59.097 38 INFO tempest.lib.common.rest_client [req-b0b1f656-46e8-4773-8fd5-67d0fbe8ed7f ] Request (TrunksSubportsExtRbacTest:test_remove_subports): 201 POST http://172.30.13.94:9696/v2.0/networks 0.311s 2020-11-06 18:02:59.098 38 DEBUG tempest.lib.common.rest_client [req-b0b1f656-46e8-4773-8fd5-67d0fbe8ed7f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-TrunksSubportsExtRbacTest-test-network-129656212"}} Response - Headers: {'content-type': 'application/json', 'content-length': '745', 'x-openstack-request-id': 'req-b0b1f656-46e8-4773-8fd5-67d0fbe8ed7f', 'date': 'Fri, 06 Nov 2020 18:02:59 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"544c28ca-08b2-46b7-bc94-61ca04f5b357","name":"tempest-TrunksSubportsExtRbacTest-test-network-129656212","tenant_id":"e9287ae5ba59491ebbe5e823539122c6","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"e9287ae5ba59491ebbe5e823539122c6","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":61,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:02:58Z","updated_at":"2020-11-06T18:02:58Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:59.117 40 INFO tempest.lib.common.rest_client [req-371c8408-d220-4c51-b058-3536d7b36da5 ] Request (GroupTypeSpecsRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c/group_types/4f371d28-e013-4807-a1a6-77ee866b3e7d 0.121s 2020-11-06 18:02:59.117 40 DEBUG tempest.lib.common.rest_client [req-371c8408-d220-4c51-b058-3536d7b36da5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-371c8408-d220-4c51-b058-3536d7b36da5', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c/group_types/4f371d28-e013-4807-a1a6-77ee866b3e7d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:59.120 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:59.124 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:group_types_specs, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:59.169 40 INFO tempest.lib.common.rest_client [req-51b24ae5-3ffb-4340-97e8-c1c25ec31d80 ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_show): 202 POST http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c/group_types 0.043s 2020-11-06 18:02:59.169 40 DEBUG tempest.lib.common.rest_client [req-51b24ae5-3ffb-4340-97e8-c1c25ec31d80 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupTypeSpecsRbacTest-group-type-630309385"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-51b24ae5-3ffb-4340-97e8-c1c25ec31d80', 'content-length': '184', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-51b24ae5-3ffb-4340-97e8-c1c25ec31d80', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c/group_types'} Body: b'{"group_type": {"id": "86846670-90d8-42b0-bca7-14ced3542d58", "name": "tempest-GroupTypeSpecsRbacTest-group-type-630309385", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:59.223 40 INFO tempest.lib.common.rest_client [req-01a5ca42-9210-4e24-a013-04a368769a23 ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_show): 202 POST http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c/group_types/86846670-90d8-42b0-bca7-14ced3542d58/group_specs 0.047s 2020-11-06 18:02:59.223 40 DEBUG tempest.lib.common.rest_client [req-01a5ca42-9210-4e24-a013-04a368769a23 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: {"group_specs": {"key1": "value1", "key2": "value2"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-01a5ca42-9210-4e24-a013-04a368769a23', 'content-length': '53', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-01a5ca42-9210-4e24-a013-04a368769a23', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c/group_types/86846670-90d8-42b0-bca7-14ced3542d58/group_specs'} Body: b'{"group_specs": {"key1": "value1", "key2": "value2"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:59.225 37 INFO tempest.lib.common.rest_client [req-17a85b10-c69b-4f3b-92db-568adaec4d9c ] Request (ServerVolumeAttachmentRbacTest:tearDownClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/95d785d5-5725-416d-a580-63ed0c22ed73/remove_router_interface 2.114s 2020-11-06 18:02:59.225 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:59.225 37 DEBUG tempest.lib.common.rest_client [req-17a85b10-c69b-4f3b-92db-568adaec4d9c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "8b7f9f92-033a-4908-99d7-129d95e50f00"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-17a85b10-c69b-4f3b-92db-568adaec4d9c', 'date': 'Fri, 06 Nov 2020 18:02:59 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/95d785d5-5725-416d-a580-63ed0c22ed73/remove_router_interface'} Body: b'{"id": "95d785d5-5725-416d-a580-63ed0c22ed73", "tenant_id": "198374b90e3641c39c58226d89b9ccc8", "port_id": "a07b90a0-e5fa-44ed-bf03-b66e82b5f796", "network_id": "5d36c639-e8c3-4217-a17b-7cd7a033d67a", "subnet_id": "8b7f9f92-033a-4908-99d7-129d95e50f00", "subnet_ids": ["8b7f9f92-033a-4908-99d7-129d95e50f00"]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:59.282 40 INFO tempest.lib.common.rest_client [req-5636c65e-e6b4-495c-9e8d-d5b594681d40 ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_show): 200 GET http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles 0.056s 2020-11-06 18:02:59.283 40 DEBUG tempest.lib.common.rest_client [req-5636c65e-e6b4-495c-9e8d-d5b594681d40 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5636c65e-e6b4-495c-9e8d-d5b594681d40', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:59.320 40 INFO tempest.lib.common.rest_client [req-103dee8b-1006-458c-a73e-782d1bc4489f ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_show): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:02:59.320 40 DEBUG tempest.lib.common.rest_client [req-103dee8b-1006-458c-a73e-782d1bc4489f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-103dee8b-1006-458c-a73e-782d1bc4489f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9dec2b2a50f34e2594da3cb013ae3c50", "name": "tempest-GroupTypeSpecsRbacTest-589441383", "password_expires_at": null}, "audit_ids": ["cUaRjqz0TRG1DsotgSal3g"], "expires_at": "2020-11-06T19:02:59.000000Z", "issued_at": "2020-11-06T18:02:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed836abbf9f049828fd0a0e7d674cb5c", "name": "tempest-GroupTypeSpecsRbacTest-589441383"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:59.408 40 INFO tempest.lib.common.rest_client [req-6447b122-60a0-4a44-b928-daa9ba2afe3f ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_show): 200 GET http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c/group_types/86846670-90d8-42b0-bca7-14ced3542d58/group_specs/key2 0.086s 2020-11-06 18:02:59.409 40 DEBUG tempest.lib.common.rest_client [req-6447b122-60a0-4a44-b928-daa9ba2afe3f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6447b122-60a0-4a44-b928-daa9ba2afe3f', 'content-length': '18', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6447b122-60a0-4a44-b928-daa9ba2afe3f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c/group_types/86846670-90d8-42b0-bca7-14ced3542d58/group_specs/key2'} Body: b'{"key2": "value2"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:59.410 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:59.455 40 INFO tempest.lib.common.rest_client [req-93493668-697b-44b7-ab72-00d8528474ef ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_show): 200 GET http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles 0.044s 2020-11-06 18:02:59.456 40 DEBUG tempest.lib.common.rest_client [req-93493668-697b-44b7-ab72-00d8528474ef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-93493668-697b-44b7-ab72-00d8528474ef', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:59.488 40 INFO tempest.lib.common.rest_client [req-72d5bba6-afd8-4e86-9896-819d50944fdc ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_show): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:02:59.488 40 DEBUG tempest.lib.common.rest_client [req-72d5bba6-afd8-4e86-9896-819d50944fdc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-72d5bba6-afd8-4e86-9896-819d50944fdc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9dec2b2a50f34e2594da3cb013ae3c50", "name": "tempest-GroupTypeSpecsRbacTest-589441383", "password_expires_at": null}, "audit_ids": ["RRkAJ0N9Qv-GYH0QSDf6OA"], "expires_at": "2020-11-06T19:02:59.000000Z", "issued_at": "2020-11-06T18:02:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed836abbf9f049828fd0a0e7d674cb5c", "name": "tempest-GroupTypeSpecsRbacTest-589441383"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:59.516 39 INFO tempest.lib.common.rest_client [req-b206617f-b85b-4a5a-9432-d12b2ecd2564 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.259s 2020-11-06 18:02:59.517 39 DEBUG tempest.lib.common.rest_client [req-b206617f-b85b-4a5a-9432-d12b2ecd2564 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b206617f-b85b-4a5a-9432-d12b2ecd2564', 'x-compute-request-id': 'req-b206617f-b85b-4a5a-9432-d12b2ecd2564', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:59.578 40 INFO tempest.lib.common.rest_client [req-3333822d-0415-4e5c-9f43-3ef226c3269e ] Request (GroupTypeSpecsRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c/group_types/86846670-90d8-42b0-bca7-14ced3542d58 0.089s 2020-11-06 18:02:59.579 40 DEBUG tempest.lib.common.rest_client [req-3333822d-0415-4e5c-9f43-3ef226c3269e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3333822d-0415-4e5c-9f43-3ef226c3269e', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c/group_types/86846670-90d8-42b0-bca7-14ced3542d58'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:59.581 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:02:59.584 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:group_types_specs, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:02:59.631 40 INFO tempest.lib.common.rest_client [req-857010b3-708c-4764-936f-a434ba3508eb ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_update): 202 POST http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c/group_types 0.046s 2020-11-06 18:02:59.631 40 DEBUG tempest.lib.common.rest_client [req-857010b3-708c-4764-936f-a434ba3508eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupTypeSpecsRbacTest-group-type-355759544"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-857010b3-708c-4764-936f-a434ba3508eb', 'content-length': '184', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-857010b3-708c-4764-936f-a434ba3508eb', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c/group_types'} Body: b'{"group_type": {"id": "c1128a59-5c78-4516-bf5c-922b53473007", "name": "tempest-GroupTypeSpecsRbacTest-group-type-355759544", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:59.646 38 INFO tempest.lib.common.rest_client [req-bc1d7887-dea8-4fd4-ab8e-f8d5f1008c47 ] Request (TrunksSubportsExtRbacTest:test_remove_subports): 201 POST http://172.30.13.94:9696/v2.0/ports 0.546s 2020-11-06 18:02:59.646 38 DEBUG tempest.lib.common.rest_client [req-bc1d7887-dea8-4fd4-ab8e-f8d5f1008c47 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "544c28ca-08b2-46b7-bc94-61ca04f5b357", "name": "tempest-TrunksSubportsExtRbacTest-738135056"}} Response - Headers: {'content-type': 'application/json', 'content-length': '906', 'x-openstack-request-id': 'req-bc1d7887-dea8-4fd4-ab8e-f8d5f1008c47', 'date': 'Fri, 06 Nov 2020 18:02:59 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"711f240f-2cc3-4bdc-ae59-e2e18e7f5a0e","name":"tempest-TrunksSubportsExtRbacTest-738135056","network_id":"544c28ca-08b2-46b7-bc94-61ca04f5b357","tenant_id":"e9287ae5ba59491ebbe5e823539122c6","mac_address":"fa:16:3e:09:23:ab","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[],"project_id":"e9287ae5ba59491ebbe5e823539122c6","port_security_enabled":true,"qos_policy_id":null,"security_groups":["3ff7f6cf-5e80-4ef4-b40b-a8fe135916bc"],"binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"allowed_address_pairs":[],"extra_dhcp_opts":[],"description":"","qos_network_policy_id":null,"dns_name":"","dns_assignment":[],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:02:59Z","updated_at":"2020-11-06T18:02:59Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:59.673 40 INFO tempest.lib.common.rest_client [req-a64146aa-14c2-41b6-876c-6b768b2b8dfd ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_update): 202 POST http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c/group_types/c1128a59-5c78-4516-bf5c-922b53473007/group_specs 0.037s 2020-11-06 18:02:59.673 40 DEBUG tempest.lib.common.rest_client [req-a64146aa-14c2-41b6-876c-6b768b2b8dfd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: {"group_specs": {"key3": "value3-updated"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a64146aa-14c2-41b6-876c-6b768b2b8dfd', 'content-length': '43', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a64146aa-14c2-41b6-876c-6b768b2b8dfd', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c/group_types/c1128a59-5c78-4516-bf5c-922b53473007/group_specs'} Body: b'{"group_specs": {"key3": "value3-updated"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:59.675 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:59.731 40 INFO tempest.lib.common.rest_client [req-7d8f1a5e-1ea5-45a6-89e0-a39601a1f525 ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_update): 200 GET http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles 0.055s 2020-11-06 18:02:59.732 40 DEBUG tempest.lib.common.rest_client [req-7d8f1a5e-1ea5-45a6-89e0-a39601a1f525 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7d8f1a5e-1ea5-45a6-89e0-a39601a1f525', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:59.769 40 INFO tempest.lib.common.rest_client [req-e2435a2a-f932-47e9-9dcd-e3774d0a227d ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_update): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:02:59.769 40 DEBUG tempest.lib.common.rest_client [req-e2435a2a-f932-47e9-9dcd-e3774d0a227d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e2435a2a-f932-47e9-9dcd-e3774d0a227d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9dec2b2a50f34e2594da3cb013ae3c50", "name": "tempest-GroupTypeSpecsRbacTest-589441383", "password_expires_at": null}, "audit_ids": ["Lv-Md2T5QTec5-EsRWndCQ"], "expires_at": "2020-11-06T19:02:59.000000Z", "issued_at": "2020-11-06T18:02:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed836abbf9f049828fd0a0e7d674cb5c", "name": "tempest-GroupTypeSpecsRbacTest-589441383"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:59.858 40 INFO tempest.lib.common.rest_client [req-bd8beae0-a66b-4a02-8a4c-cc05a59911cd ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_update): 200 PUT http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c/group_types/c1128a59-5c78-4516-bf5c-922b53473007/group_specs/key3 0.087s 2020-11-06 18:02:59.858 40 DEBUG tempest.lib.common.rest_client [req-bd8beae0-a66b-4a02-8a4c-cc05a59911cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: {"key3": "value3-updated"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-bd8beae0-a66b-4a02-8a4c-cc05a59911cd', 'content-length': '26', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-bd8beae0-a66b-4a02-8a4c-cc05a59911cd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c/group_types/c1128a59-5c78-4516-bf5c-922b53473007/group_specs/key3'} Body: b'{"key3": "value3-updated"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:59.860 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:02:59.914 40 INFO tempest.lib.common.rest_client [req-a07f2db8-a8a4-4daa-a1bb-bac805b07a4f ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_update): 200 GET http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles 0.053s 2020-11-06 18:02:59.915 40 DEBUG tempest.lib.common.rest_client [req-a07f2db8-a8a4-4daa-a1bb-bac805b07a4f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a07f2db8-a8a4-4daa-a1bb-bac805b07a4f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c/users/9dec2b2a50f34e2594da3cb013ae3c50/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:59.952 40 INFO tempest.lib.common.rest_client [req-a3708c3e-d270-4691-bc41-9fbc92c0d48d ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_update): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:02:59.953 40 DEBUG tempest.lib.common.rest_client [req-a3708c3e-d270-4691-bc41-9fbc92c0d48d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a3708c3e-d270-4691-bc41-9fbc92c0d48d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9dec2b2a50f34e2594da3cb013ae3c50", "name": "tempest-GroupTypeSpecsRbacTest-589441383", "password_expires_at": null}, "audit_ids": ["DQma_q-FRF-F0JHIM_jOnw"], "expires_at": "2020-11-06T19:02:59.000000Z", "issued_at": "2020-11-06T18:02:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed836abbf9f049828fd0a0e7d674cb5c", "name": "tempest-GroupTypeSpecsRbacTest-589441383"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed836abbf9f049828fd0a0e7d674cb5c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:59.953 38 INFO tempest.lib.common.rest_client [req-cec87b2e-6699-4d47-9f95-c5ececadfa17 ] Request (TrunksSubportsExtRbacTest:test_remove_subports): 200 PUT http://172.30.13.94:9696/v2.0/trunks/8d195501-53fd-4593-ac46-caffd5b4ed30/add_subports 0.306s 2020-11-06 18:02:59.953 38 DEBUG tempest.lib.common.rest_client [req-cec87b2e-6699-4d47-9f95-c5ececadfa17 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"sub_ports": [{"port_id": "711f240f-2cc3-4bdc-ae59-e2e18e7f5a0e", "segmentation_type": "vlan", "segmentation_id": 4000}]} Response - Headers: {'content-type': 'application/json', 'content-length': '501', 'x-openstack-request-id': 'req-cec87b2e-6699-4d47-9f95-c5ececadfa17', 'date': 'Fri, 06 Nov 2020 18:02:59 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks/8d195501-53fd-4593-ac46-caffd5b4ed30/add_subports'} Body: b'{"admin_state_up": true, "id": "8d195501-53fd-4593-ac46-caffd5b4ed30", "project_id": "e9287ae5ba59491ebbe5e823539122c6", "name": "", "port_id": "1cf7d780-da86-4e15-a44d-a606e913bbf7", "status": "DOWN", "sub_ports": [{"port_id": "711f240f-2cc3-4bdc-ae59-e2e18e7f5a0e", "segmentation_type": "vlan", "segmentation_id": 4000}], "revision_number": 5, "description": "", "created_at": "2020-11-06T18:02:54Z", "updated_at": "2020-11-06T18:02:59Z", "tenant_id": "e9287ae5ba59491ebbe5e823539122c6", "tags": []}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:02:59.954 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:00.027 38 INFO tempest.lib.common.rest_client [req-4338cab0-bb70-48d5-9b06-2b8842702b17 ] Request (TrunksSubportsExtRbacTest:test_remove_subports): 200 GET http://172.30.13.94/identity/v3/projects/e9287ae5ba59491ebbe5e823539122c6/users/db2c6e8f5df242e39dfaed83d67b8c4f/roles 0.072s 2020-11-06 18:03:00.028 38 DEBUG tempest.lib.common.rest_client [req-4338cab0-bb70-48d5-9b06-2b8842702b17 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4338cab0-bb70-48d5-9b06-2b8842702b17', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e9287ae5ba59491ebbe5e823539122c6/users/db2c6e8f5df242e39dfaed83d67b8c4f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e9287ae5ba59491ebbe5e823539122c6/users/db2c6e8f5df242e39dfaed83d67b8c4f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:00.053 40 INFO tempest.lib.common.rest_client [req-15b2f143-8f7f-4f25-9d74-13eebd176dbc ] Request (GroupTypeSpecsRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c/group_types/c1128a59-5c78-4516-bf5c-922b53473007 0.099s 2020-11-06 18:03:00.054 40 DEBUG tempest.lib.common.rest_client [req-15b2f143-8f7f-4f25-9d74-13eebd176dbc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:02:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-15b2f143-8f7f-4f25-9d74-13eebd176dbc', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ed836abbf9f049828fd0a0e7d674cb5c/group_types/c1128a59-5c78-4516-bf5c-922b53473007'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:00.069 38 INFO tempest.lib.common.rest_client [req-1c3ff288-8588-48d2-a42b-33cf891c00d0 ] Request (TrunksSubportsExtRbacTest:test_remove_subports): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:03:00.070 38 DEBUG tempest.lib.common.rest_client [req-1c3ff288-8588-48d2-a42b-33cf891c00d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1c3ff288-8588-48d2-a42b-33cf891c00d0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "db2c6e8f5df242e39dfaed83d67b8c4f", "name": "tempest-TrunksSubportsExtRbacTest-1619357849", "password_expires_at": null}, "audit_ids": ["iyz8K4wHRyOGEIJErRBGXg"], "expires_at": "2020-11-06T19:03:00.000000Z", "issued_at": "2020-11-06T18:03:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e9287ae5ba59491ebbe5e823539122c6", "name": "tempest-TrunksSubportsExtRbacTest-1619357849"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:00.104 38 INFO tempest.lib.common.rest_client [req-1b256298-1f27-4478-aa73-47aa770fea9c ] Request (TrunksSubportsExtRbacTest:test_remove_subports): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:03:00.105 38 DEBUG tempest.lib.common.rest_client [req-1b256298-1f27-4478-aa73-47aa770fea9c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1b256298-1f27-4478-aa73-47aa770fea9c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "db2c6e8f5df242e39dfaed83d67b8c4f", "name": "tempest-TrunksSubportsExtRbacTest-1619357849", "password_expires_at": null}, "audit_ids": ["zKbPGn_zThqrmuqJliXAtw"], "expires_at": "2020-11-06T19:03:00.000000Z", "issued_at": "2020-11-06T18:03:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e9287ae5ba59491ebbe5e823539122c6", "name": "tempest-TrunksSubportsExtRbacTest-1619357849"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:00.186 40 INFO tempest.lib.common.rest_client [req-94c29b61-0032-42fc-8642-6f412494cf0a ] Request (GroupTypeSpecsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/9dec2b2a50f34e2594da3cb013ae3c50 0.130s 2020-11-06 18:03:00.187 40 DEBUG tempest.lib.common.rest_client [req-94c29b61-0032-42fc-8642-6f412494cf0a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-94c29b61-0032-42fc-8642-6f412494cf0a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/9dec2b2a50f34e2594da3cb013ae3c50'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:00.254 38 INFO tempest.lib.common.rest_client [req-dc0d7953-af50-418d-affd-7cd36af047bb ] Request (TrunksSubportsExtRbacTest:test_remove_subports): 200 PUT http://172.30.13.94:9696/v2.0/trunks/8d195501-53fd-4593-ac46-caffd5b4ed30/remove_subports 0.147s 2020-11-06 18:03:00.254 38 DEBUG tempest.lib.common.rest_client [req-dc0d7953-af50-418d-affd-7cd36af047bb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"sub_ports": [{"port_id": "711f240f-2cc3-4bdc-ae59-e2e18e7f5a0e", "segmentation_type": "vlan", "segmentation_id": 4000}]} Response - Headers: {'content-type': 'application/json', 'content-length': '396', 'x-openstack-request-id': 'req-dc0d7953-af50-418d-affd-7cd36af047bb', 'date': 'Fri, 06 Nov 2020 18:03:00 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks/8d195501-53fd-4593-ac46-caffd5b4ed30/remove_subports'} Body: b'{"admin_state_up": true, "id": "8d195501-53fd-4593-ac46-caffd5b4ed30", "project_id": "e9287ae5ba59491ebbe5e823539122c6", "name": "", "port_id": "1cf7d780-da86-4e15-a44d-a606e913bbf7", "status": "DOWN", "sub_ports": [], "revision_number": 6, "description": "", "created_at": "2020-11-06T18:02:54Z", "updated_at": "2020-11-06T18:03:00Z", "tenant_id": "e9287ae5ba59491ebbe5e823539122c6", "tags": []}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:00.255 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:00.272 40 INFO tempest.lib.common.rest_client [req-1e2373d8-9a4a-4fcd-842a-4860b6788d80 ] Request (GroupTypeSpecsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-11-06 18:03:00.272 40 DEBUG tempest.lib.common.rest_client [req-1e2373d8-9a4a-4fcd-842a-4860b6788d80 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1e2373d8-9a4a-4fcd-842a-4860b6788d80', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["Gm-8q4A7RMC8f8LfY0yNfg"], "expires_at": "2020-11-06T19:03:00.000000Z", "issued_at": "2020-11-06T18:03:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:00.310 38 INFO tempest.lib.common.rest_client [req-a2e2f597-99ac-4805-af73-cf522c93b875 ] Request (TrunksSubportsExtRbacTest:test_remove_subports): 200 GET http://172.30.13.94/identity/v3/projects/e9287ae5ba59491ebbe5e823539122c6/users/db2c6e8f5df242e39dfaed83d67b8c4f/roles 0.054s 2020-11-06 18:03:00.310 38 DEBUG tempest.lib.common.rest_client [req-a2e2f597-99ac-4805-af73-cf522c93b875 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a2e2f597-99ac-4805-af73-cf522c93b875', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e9287ae5ba59491ebbe5e823539122c6/users/db2c6e8f5df242e39dfaed83d67b8c4f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e9287ae5ba59491ebbe5e823539122c6/users/db2c6e8f5df242e39dfaed83d67b8c4f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:00.390 38 INFO tempest.lib.common.rest_client [req-205bf07a-c80d-4888-baed-46d4e3da1c9d ] Request (TrunksSubportsExtRbacTest:test_remove_subports): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-11-06 18:03:00.390 38 DEBUG tempest.lib.common.rest_client [req-205bf07a-c80d-4888-baed-46d4e3da1c9d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-205bf07a-c80d-4888-baed-46d4e3da1c9d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "db2c6e8f5df242e39dfaed83d67b8c4f", "name": "tempest-TrunksSubportsExtRbacTest-1619357849", "password_expires_at": null}, "audit_ids": ["FvC5Q0d_Tf2EHLjTOUxYiQ"], "expires_at": "2020-11-06T19:03:00.000000Z", "issued_at": "2020-11-06T18:03:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e9287ae5ba59491ebbe5e823539122c6", "name": "tempest-TrunksSubportsExtRbacTest-1619357849"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:00.426 38 INFO tempest.lib.common.rest_client [req-5082851b-efe3-4715-b73b-2d37133ebf59 ] Request (TrunksSubportsExtRbacTest:test_remove_subports): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:03:00.426 38 DEBUG tempest.lib.common.rest_client [req-5082851b-efe3-4715-b73b-2d37133ebf59 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5082851b-efe3-4715-b73b-2d37133ebf59', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "db2c6e8f5df242e39dfaed83d67b8c4f", "name": "tempest-TrunksSubportsExtRbacTest-1619357849", "password_expires_at": null}, "audit_ids": ["xu7IuScsTDmI7zJPNyTDLQ"], "expires_at": "2020-11-06T19:03:00.000000Z", "issued_at": "2020-11-06T18:03:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e9287ae5ba59491ebbe5e823539122c6", "name": "tempest-TrunksSubportsExtRbacTest-1619357849"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e9287ae5ba59491ebbe5e823539122c6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:00.537 37 INFO tempest.lib.common.rest_client [req-a4372ee7-cc4d-4ead-8a45-ed51d40c4620 ] Request (ServerVolumeAttachmentRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/95d785d5-5725-416d-a580-63ed0c22ed73 1.310s 2020-11-06 18:03:00.538 37 DEBUG tempest.lib.common.rest_client [req-a4372ee7-cc4d-4ead-8a45-ed51d40c4620 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-a4372ee7-cc4d-4ead-8a45-ed51d40c4620', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:03:00 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/95d785d5-5725-416d-a580-63ed0c22ed73'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:00.546 38 INFO tempest.lib.common.rest_client [req-797bab97-b8e2-4169-ba0c-cdfc07229fb0 ] Request (TrunksSubportsExtRbacTest:_run_cleanups): 404 PUT http://172.30.13.94:9696/v2.0/trunks/8d195501-53fd-4593-ac46-caffd5b4ed30/remove_subports 0.118s 2020-11-06 18:03:00.547 38 DEBUG tempest.lib.common.rest_client [req-797bab97-b8e2-4169-ba0c-cdfc07229fb0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"sub_ports": [{"port_id": "711f240f-2cc3-4bdc-ae59-e2e18e7f5a0e", "segmentation_type": "vlan", "segmentation_id": 4000}]} Response - Headers: {'content-type': 'application/json', 'content-length': '201', 'x-openstack-request-id': 'req-797bab97-b8e2-4169-ba0c-cdfc07229fb0', 'date': 'Fri, 06 Nov 2020 18:03:00 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks/8d195501-53fd-4593-ac46-caffd5b4ed30/remove_subports'} Body: b'{"NeutronError": {"type": "SubPortNotFound", "message": "SubPort on trunk 8d195501-53fd-4593-ac46-caffd5b4ed30 with parent port 711f240f-2cc3-4bdc-ae59-e2e18e7f5a0e could not be found.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:00.573 40 INFO tempest.lib.common.rest_client [req-1ec5fece-7d15-4fca-a0cd-68d6bd6c86ff ] Request (GroupTypeSpecsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=ed836abbf9f049828fd0a0e7d674cb5c&name=default 0.299s 2020-11-06 18:03:00.573 40 DEBUG tempest.lib.common.rest_client [req-1ec5fece-7d15-4fca-a0cd-68d6bd6c86ff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-1ec5fece-7d15-4fca-a0cd-68d6bd6c86ff', 'date': 'Fri, 06 Nov 2020 18:03:00 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=ed836abbf9f049828fd0a0e7d674cb5c&name=default'} Body: b'{"security_groups": [{"id": "a4503588-0270-4f88-b0a7-42decea2432f", "name": "default", "stateful": true, "tenant_id": "ed836abbf9f049828fd0a0e7d674cb5c", "description": "Default security group", "security_group_rules": [{"id": "7d6950b2-404d-41b5-91f1-3d79f86e66ab", "tenant_id": "ed836abbf9f049828fd0a0e7d674cb5c", "security_group_id": "a4503588-0270-4f88-b0a7-42decea2432f", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:00Z", "updated_at": "2020-11-06T18:03:00Z", "revision_number": 0, "project_id": "ed836abbf9f049828fd0a0e7d674cb5c"}, {"id": "c43f9947-914b-475b-8665-077468cf48eb", "tenant_id": "ed836abbf9f049828fd0a0e7d674cb5c", "security_group_id": "a4503588-0270-4f88-b0a7-42decea2432f", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:00Z", "updated_at": "2020-11-06T18:03:00Z", "revision_number": 0, "project_id": "ed836abbf9f049828fd0a0e7d674cb5c"}, {"id": "c7690cc6-9c1f-42f9-b353-c37b2640529b", "tenant_id": "ed836abbf9f049828fd0a0e7d674cb5c", "security_group_id": "a4503588-0270-4f88-b0a7-42decea2432f", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "a4503588-0270-4f88-b0a7-42decea2432f", "description": null, "tags": [], "created_at": "2020-11-06T18:03:00Z", "updated_at": "2020-11-06T18:03:00Z", "revision_number": 0, "project_id": "ed836abbf9f049828fd0a0e7d674cb5c"}, {"id": "ec06e563-f989-426e-8db3-d22a81e32ca7", "tenant_id": "ed836abbf9f049828fd0a0e7d674cb5c", "security_group_id": "a4503588-0270-4f88-b0a7-42decea2432f", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "a4503588-0270-4f88-b0a7-42decea2432f", "description": null, "tags": [], "created_at": "2020-11-06T18:03:00Z", "updated_at": "2020-11-06T18:03:00Z", "revision_number": 0, "project_id": "ed836abbf9f049828fd0a0e7d674cb5c"}], "tags": [], "created_at": "2020-11-06T18:03:00Z", "updated_at": "2020-11-06T18:03:00Z", "revision_number": 1, "project_id": "ed836abbf9f049828fd0a0e7d674cb5c"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:00.698 40 INFO tempest.lib.common.rest_client [req-dcb1f087-a8ba-426b-b893-25bb3a08bf0e ] Request (GroupTypeSpecsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/a4503588-0270-4f88-b0a7-42decea2432f 0.123s 2020-11-06 18:03:00.699 40 DEBUG tempest.lib.common.rest_client [req-dcb1f087-a8ba-426b-b893-25bb3a08bf0e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-dcb1f087-a8ba-426b-b893-25bb3a08bf0e', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:03:00 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/a4503588-0270-4f88-b0a7-42decea2432f'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:00.828 40 INFO tempest.lib.common.rest_client [req-664722bd-9e35-48b0-8232-1b7be1ae6032 ] Request (GroupTypeSpecsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c 0.128s 2020-11-06 18:03:00.829 40 DEBUG tempest.lib.common.rest_client [req-664722bd-9e35-48b0-8232-1b7be1ae6032 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-664722bd-9e35-48b0-8232-1b7be1ae6032', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed836abbf9f049828fd0a0e7d674cb5c'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:00.918 40 INFO tempest.lib.common.rest_client [req-da972ca3-e974-4635-851d-bf53d040cea3 ] Request (GroupTypesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-11-06 18:03:00.918 40 DEBUG tempest.lib.common.rest_client [req-da972ca3-e974-4635-851d-bf53d040cea3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-da972ca3-e974-4635-851d-bf53d040cea3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["MAW-FPh_TxKrBwCh8vH0aA"], "expires_at": "2020-11-06T19:03:00.000000Z", "issued_at": "2020-11-06T18:03:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:00.960 40 INFO tempest.lib.common.rest_client [req-ef4882cf-dde6-4e61-bce6-9e13278ebfbd ] Request (GroupTypesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:03:00.960 40 DEBUG tempest.lib.common.rest_client [req-ef4882cf-dde6-4e61-bce6-9e13278ebfbd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ef4882cf-dde6-4e61-bce6-9e13278ebfbd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["9u0A8bTGQU-bdwyfLCafkw"], "expires_at": "2020-11-06T19:03:00.000000Z", "issued_at": "2020-11-06T18:03:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:01.017 40 INFO tempest.lib.common.rest_client [req-7d32e8ee-5ebc-4410-9949-2f6f72df4284 ] Request (GroupTypesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.056s 2020-11-06 18:03:01.018 40 DEBUG tempest.lib.common.rest_client [req-7d32e8ee-5ebc-4410-9949-2f6f72df4284 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7d32e8ee-5ebc-4410-9949-2f6f72df4284', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:01.068 37 INFO tempest.lib.common.rest_client [req-9933d615-506e-467a-b98f-9e94441e2467 ] Request (ServerVolumeAttachmentRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/8b7f9f92-033a-4908-99d7-129d95e50f00 0.530s 2020-11-06 18:03:01.069 37 DEBUG tempest.lib.common.rest_client [req-9933d615-506e-467a-b98f-9e94441e2467 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-9933d615-506e-467a-b98f-9e94441e2467', 'date': 'Fri, 06 Nov 2020 18:03:01 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/8b7f9f92-033a-4908-99d7-129d95e50f00'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:01.091 40 INFO tempest.lib.common.rest_client [req-b50a1319-225c-4491-9de9-6a7e9523b78d ] Request (GroupTypesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.072s 2020-11-06 18:03:01.092 40 DEBUG tempest.lib.common.rest_client [req-b50a1319-225c-4491-9de9-6a7e9523b78d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-GroupTypesV3RbacTest-583363573-desc", "domain_id": "default", "name": "tempest-GroupTypesV3RbacTest-583363573"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '376', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b50a1319-225c-4491-9de9-6a7e9523b78d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "d730c5dcad974b39bf91dc71f07e90c4", "name": "tempest-GroupTypesV3RbacTest-583363573", "domain_id": "default", "description": "tempest-GroupTypesV3RbacTest-583363573-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:01.229 40 INFO tempest.lib.common.rest_client [req-268287ec-50ff-43bb-96ad-aa4abc8d8e0e ] Request (GroupTypesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.136s 2020-11-06 18:03:01.229 40 DEBUG tempest.lib.common.rest_client [req-268287ec-50ff-43bb-96ad-aa4abc8d8e0e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-GroupTypesV3RbacTest-583363573", "password": "U1#3o2_kON5%ilR", "project_id": "d730c5dcad974b39bf91dc71f07e90c4", "email": "tempest-GroupTypesV3RbacTest-583428375@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '394', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-268287ec-50ff-43bb-96ad-aa4abc8d8e0e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "d730c5dcad974b39bf91dc71f07e90c4", "email": "tempest-GroupTypesV3RbacTest-583428375@example.com", "id": "40ef8136c1984880bf28dc888da5789b", "name": "tempest-GroupTypesV3RbacTest-583363573", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/40ef8136c1984880bf28dc888da5789b"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:01.283 40 INFO tempest.lib.common.rest_client [req-5fab6e48-2acb-4c66-87dc-fcb1ce139ec3 ] Request (GroupTypesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.052s 2020-11-06 18:03:01.284 40 DEBUG tempest.lib.common.rest_client [req-5fab6e48-2acb-4c66-87dc-fcb1ce139ec3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5fab6e48-2acb-4c66-87dc-fcb1ce139ec3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:01.337 40 INFO tempest.lib.common.rest_client [req-cfc5ee57-3c98-41be-acc0-965e53e1ccbb ] Request (GroupTypesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.052s 2020-11-06 18:03:01.338 40 DEBUG tempest.lib.common.rest_client [req-cfc5ee57-3c98-41be-acc0-965e53e1ccbb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cfc5ee57-3c98-41be-acc0-965e53e1ccbb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:01.407 40 INFO tempest.lib.common.rest_client [req-f4bfa936-854a-4675-bf4b-3a3740a62b55 ] Request (GroupTypesV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles/72a4576c553448cd941b052c1ca0cf2d 0.068s 2020-11-06 18:03:01.408 40 DEBUG tempest.lib.common.rest_client [req-f4bfa936-854a-4675-bf4b-3a3740a62b55 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f4bfa936-854a-4675-bf4b-3a3740a62b55', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:01.408 40 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-GroupTypesV3RbacTest-583363573', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'd730c5dcad974b39bf91dc71f07e90c4', 'project_name': 'tempest-GroupTypesV3RbacTest-583363573', 'tenant_id': 'd730c5dcad974b39bf91dc71f07e90c4', 'tenant_name': 'tempest-GroupTypesV3RbacTest-583363573', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '40ef8136c1984880bf28dc888da5789b'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:01.409 40 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-GroupTypesV3RbacTest-583363573', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'd730c5dcad974b39bf91dc71f07e90c4', 'project_name': 'tempest-GroupTypesV3RbacTest-583363573', 'tenant_id': 'd730c5dcad974b39bf91dc71f07e90c4', 'tenant_name': 'tempest-GroupTypesV3RbacTest-583363573', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '40ef8136c1984880bf28dc888da5789b'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:01.568 40 INFO tempest.lib.common.rest_client [req-f5474104-d424-43da-a01a-064ad967fd68 ] Request (GroupTypesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.146s 2020-11-06 18:03:01.569 40 DEBUG tempest.lib.common.rest_client [req-f5474104-d424-43da-a01a-064ad967fd68 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6569', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f5474104-d424-43da-a01a-064ad967fd68', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "40ef8136c1984880bf28dc888da5789b", "name": "tempest-GroupTypesV3RbacTest-583363573", "password_expires_at": null}, "audit_ids": ["hDZG4tX9T1O-3F5pwhR6oQ"], "expires_at": "2020-11-06T19:03:01.000000Z", "issued_at": "2020-11-06T18:03:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d730c5dcad974b39bf91dc71f07e90c4", "name": "tempest-GroupTypesV3RbacTest-583363573"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.3 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:01.626 39 INFO tempest.lib.common.rest_client [req-13c459cf-2c02-440c-9653-06b0caa9385d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 1.092s 2020-11-06 18:03:01.627 39 DEBUG tempest.lib.common.rest_client [req-13c459cf-2c02-440c-9653-06b0caa9385d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-13c459cf-2c02-440c-9653-06b0caa9385d', 'x-compute-request-id': 'req-13c459cf-2c02-440c-9653-06b0caa9385d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:01.667 40 INFO tempest.lib.common.rest_client [req-ff91c115-1f88-403c-bd21-bf1879c61d56 ] Request (GroupTypesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-11-06 18:03:01.667 40 DEBUG tempest.lib.common.rest_client [req-ff91c115-1f88-403c-bd21-bf1879c61d56 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ff91c115-1f88-403c-bd21-bf1879c61d56', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["IcgfUlADQyeBUbR0ab0W_A"], "expires_at": "2020-11-06T19:03:01.000000Z", "issued_at": "2020-11-06T18:03:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:01.702 37 INFO tempest.lib.common.rest_client [req-d9a6ab0d-fb80-4151-b056-b4ccda174353 ] Request (ServerVolumeAttachmentRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/5d36c639-e8c3-4217-a17b-7cd7a033d67a 0.631s 2020-11-06 18:03:01.702 37 DEBUG tempest.lib.common.rest_client [req-d9a6ab0d-fb80-4151-b056-b4ccda174353 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-d9a6ab0d-fb80-4151-b056-b4ccda174353', 'date': 'Fri, 06 Nov 2020 18:03:01 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/5d36c639-e8c3-4217-a17b-7cd7a033d67a'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:01.715 40 INFO tempest.lib.common.rest_client [req-36489c44-de44-4e10-8fb8-ee24a25bd0db ] Request (GroupTypesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:03:01.715 40 DEBUG tempest.lib.common.rest_client [req-36489c44-de44-4e10-8fb8-ee24a25bd0db ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-36489c44-de44-4e10-8fb8-ee24a25bd0db', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["GOLs6zQFRuuKbxoNEgJltQ"], "expires_at": "2020-11-06T19:03:01.000000Z", "issued_at": "2020-11-06T18:03:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:01.764 40 INFO tempest.lib.common.rest_client [req-526206a6-0d77-4c51-832f-1df5e3718fa3 ] Request (GroupTypesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.047s 2020-11-06 18:03:01.764 40 DEBUG tempest.lib.common.rest_client [req-526206a6-0d77-4c51-832f-1df5e3718fa3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-526206a6-0d77-4c51-832f-1df5e3718fa3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:01.806 40 INFO tempest.lib.common.rest_client [req-791f4db9-3deb-4d9a-a14b-333defd3be1f ] Request (GroupTypesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.041s 2020-11-06 18:03:01.806 40 DEBUG tempest.lib.common.rest_client [req-791f4db9-3deb-4d9a-a14b-333defd3be1f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-791f4db9-3deb-4d9a-a14b-333defd3be1f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:01.807 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:03:01.807 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:01.860 40 INFO tempest.lib.common.rest_client [req-e0372685-3518-45ce-b504-5d4ff293da04 ] Request (GroupTypesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles 0.052s 2020-11-06 18:03:01.860 40 DEBUG tempest.lib.common.rest_client [req-e0372685-3518-45ce-b504-5d4ff293da04 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e0372685-3518-45ce-b504-5d4ff293da04', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:01.860 37 INFO tempest.lib.common.rest_client [req-986fd094-904a-4130-a19f-6e3192fd329e ] Request (ServerVolumeAttachmentRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/31dfe8b61f554cfe82a18efd5d747c55 0.157s 2020-11-06 18:03:01.861 37 DEBUG tempest.lib.common.rest_client [req-986fd094-904a-4130-a19f-6e3192fd329e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-986fd094-904a-4130-a19f-6e3192fd329e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/31dfe8b61f554cfe82a18efd5d747c55'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:01.922 37 INFO tempest.lib.common.rest_client [req-117068e0-8fa9-4a7e-ad79-a4f9d10bf857 ] Request (ServerVolumeAttachmentRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=198374b90e3641c39c58226d89b9ccc8&name=default 0.060s 2020-11-06 18:03:01.922 37 DEBUG tempest.lib.common.rest_client [req-117068e0-8fa9-4a7e-ad79-a4f9d10bf857 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-117068e0-8fa9-4a7e-ad79-a4f9d10bf857', 'date': 'Fri, 06 Nov 2020 18:03:01 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=198374b90e3641c39c58226d89b9ccc8&name=default'} Body: b'{"security_groups": [{"id": "d29ef789-c2fa-40bf-992f-ac7a707e2884", "name": "default", "stateful": true, "tenant_id": "198374b90e3641c39c58226d89b9ccc8", "description": "Default security group", "security_group_rules": [{"id": "24e43f30-c76c-4d64-916c-04f47311f63f", "tenant_id": "198374b90e3641c39c58226d89b9ccc8", "security_group_id": "d29ef789-c2fa-40bf-992f-ac7a707e2884", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:02:19Z", "updated_at": "2020-11-06T18:02:19Z", "revision_number": 0, "project_id": "198374b90e3641c39c58226d89b9ccc8"}, {"id": "43c424bb-3cb9-4dd8-9a4e-f4e1e16a27c5", "tenant_id": "198374b90e3641c39c58226d89b9ccc8", "security_group_id": "d29ef789-c2fa-40bf-992f-ac7a707e2884", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "d29ef789-c2fa-40bf-992f-ac7a707e2884", "description": null, "tags": [], "created_at": "2020-11-06T18:02:19Z", "updated_at": "2020-11-06T18:02:19Z", "revision_number": 0, "project_id": "198374b90e3641c39c58226d89b9ccc8"}, {"id": "70cfb7f1-6045-43a1-932a-b6f5667ebba5", "tenant_id": "198374b90e3641c39c58226d89b9ccc8", "security_group_id": "d29ef789-c2fa-40bf-992f-ac7a707e2884", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "d29ef789-c2fa-40bf-992f-ac7a707e2884", "description": null, "tags": [], "created_at": "2020-11-06T18:02:19Z", "updated_at": "2020-11-06T18:02:19Z", "revision_number": 0, "project_id": "198374b90e3641c39c58226d89b9ccc8"}, {"id": "a21da361-3eda-42a0-b82f-6813a254ff0a", "tenant_id": "198374b90e3641c39c58226d89b9ccc8", "security_group_id": "d29ef789-c2fa-40bf-992f-ac7a707e2884", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:02:19Z", "updated_at": "2020-11-06T18:02:19Z", "revision_number": 0, "project_id": "198374b90e3641c39c58226d89b9ccc8"}], "tags": [], "created_at": "2020-11-06T18:02:19Z", "updated_at": "2020-11-06T18:02:19Z", "revision_number": 1, "project_id": "198374b90e3641c39c58226d89b9ccc8"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:01.984 40 INFO tempest.lib.common.rest_client [req-946d1c43-3f68-410d-9868-465bae487ca7 ] Request (GroupTypesV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles/72a4576c553448cd941b052c1ca0cf2d 0.122s 2020-11-06 18:03:01.984 40 DEBUG tempest.lib.common.rest_client [req-946d1c43-3f68-410d-9868-465bae487ca7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-946d1c43-3f68-410d-9868-465bae487ca7', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:02.073 37 INFO tempest.lib.common.rest_client [req-091d218c-4777-4eca-a751-afc8204e63fa ] Request (ServerVolumeAttachmentRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/d29ef789-c2fa-40bf-992f-ac7a707e2884 0.150s 2020-11-06 18:03:02.074 37 DEBUG tempest.lib.common.rest_client [req-091d218c-4777-4eca-a751-afc8204e63fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-091d218c-4777-4eca-a751-afc8204e63fa', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:03:02 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/d29ef789-c2fa-40bf-992f-ac7a707e2884'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:02.092 40 INFO tempest.lib.common.rest_client [req-40fadb9c-e3b0-479b-b83e-1655fca0211a ] Request (GroupTypesV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles/a629c95d64b3416fb80ae90af4f69c05 0.107s 2020-11-06 18:03:02.093 40 DEBUG tempest.lib.common.rest_client [req-40fadb9c-e3b0-479b-b83e-1655fca0211a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-40fadb9c-e3b0-479b-b83e-1655fca0211a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:02.240 37 INFO tempest.lib.common.rest_client [req-cd3fab29-4dde-4eb8-bc95-13ed899043ac ] Request (ServerVolumeAttachmentRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/198374b90e3641c39c58226d89b9ccc8 0.166s 2020-11-06 18:03:02.241 37 DEBUG tempest.lib.common.rest_client [req-cd3fab29-4dde-4eb8-bc95-13ed899043ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cd3fab29-4dde-4eb8-bc95-13ed899043ac', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/198374b90e3641c39c58226d89b9ccc8'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:02.328 37 INFO tempest.lib.common.rest_client [req-2238576c-1ed8-4572-be04-f3fbf34904e0 ] Request (TenantNetworksRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 18:03:02.329 37 DEBUG tempest.lib.common.rest_client [req-2238576c-1ed8-4572-be04-f3fbf34904e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2238576c-1ed8-4572-be04-f3fbf34904e0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["ENhOwi6SSgm16z94Z7xrpw"], "expires_at": "2020-11-06T19:03:02.000000Z", "issued_at": "2020-11-06T18:03:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:02.375 37 INFO tempest.lib.common.rest_client [req-511f7865-dd16-40b3-8c7a-4c151687323d ] Request (TenantNetworksRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:03:02.376 37 DEBUG tempest.lib.common.rest_client [req-511f7865-dd16-40b3-8c7a-4c151687323d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-511f7865-dd16-40b3-8c7a-4c151687323d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["vH5xKtrKS8uZuyUiM_ZMNA"], "expires_at": "2020-11-06T19:03:02.000000Z", "issued_at": "2020-11-06T18:03:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:02.435 37 INFO tempest.lib.common.rest_client [req-f28251ae-823b-4768-8979-a1320e351fe1 ] Request (TenantNetworksRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.057s 2020-11-06 18:03:02.435 37 DEBUG tempest.lib.common.rest_client [req-f28251ae-823b-4768-8979-a1320e351fe1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f28251ae-823b-4768-8979-a1320e351fe1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:02.459 38 INFO tempest.lib.common.rest_client [req-fed9d59c-b26a-4625-b63d-9eca3a388326 ] Request (TrunksSubportsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/711f240f-2cc3-4bdc-ae59-e2e18e7f5a0e 1.909s 2020-11-06 18:03:02.459 38 DEBUG tempest.lib.common.rest_client [req-fed9d59c-b26a-4625-b63d-9eca3a388326 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-fed9d59c-b26a-4625-b63d-9eca3a388326', 'date': 'Fri, 06 Nov 2020 18:03:02 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/711f240f-2cc3-4bdc-ae59-e2e18e7f5a0e'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:02.503 37 INFO tempest.lib.common.rest_client [req-966c5fc1-8640-47f3-b378-33d8335f15a5 ] Request (TenantNetworksRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.067s 2020-11-06 18:03:02.504 37 DEBUG tempest.lib.common.rest_client [req-966c5fc1-8640-47f3-b378-33d8335f15a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-TenantNetworksRbacTest-813402324-desc", "domain_id": "default", "name": "tempest-TenantNetworksRbacTest-813402324"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '380', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-966c5fc1-8640-47f3-b378-33d8335f15a5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "5c37423b6614444a86e9185fd68c6ae9", "name": "tempest-TenantNetworksRbacTest-813402324", "domain_id": "default", "description": "tempest-TenantNetworksRbacTest-813402324-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/5c37423b6614444a86e9185fd68c6ae9"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:02.612 37 INFO tempest.lib.common.rest_client [req-d0e64bcd-343d-45be-ad7e-29c5ecd5c23b ] Request (TenantNetworksRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.108s 2020-11-06 18:03:02.613 37 DEBUG tempest.lib.common.rest_client [req-d0e64bcd-343d-45be-ad7e-29c5ecd5c23b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-TenantNetworksRbacTest-813402324", "password": "N7^@staXGrBe@fo", "project_id": "5c37423b6614444a86e9185fd68c6ae9", "email": "tempest-TenantNetworksRbacTest-1165690074@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '399', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d0e64bcd-343d-45be-ad7e-29c5ecd5c23b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "5c37423b6614444a86e9185fd68c6ae9", "email": "tempest-TenantNetworksRbacTest-1165690074@example.com", "id": "da06fa4860c642d79466694ae9fe4fd7", "name": "tempest-TenantNetworksRbacTest-813402324", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/da06fa4860c642d79466694ae9fe4fd7"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:02.664 37 INFO tempest.lib.common.rest_client [req-6bb463af-83eb-4018-8428-772b01bf424f ] Request (TenantNetworksRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.049s 2020-11-06 18:03:02.664 37 DEBUG tempest.lib.common.rest_client [req-6bb463af-83eb-4018-8428-772b01bf424f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6bb463af-83eb-4018-8428-772b01bf424f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:02.711 37 INFO tempest.lib.common.rest_client [req-31aaceb8-4b16-48ac-9790-a93ca85517f9 ] Request (TenantNetworksRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.045s 2020-11-06 18:03:02.712 37 DEBUG tempest.lib.common.rest_client [req-31aaceb8-4b16-48ac-9790-a93ca85517f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-31aaceb8-4b16-48ac-9790-a93ca85517f9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:02.781 37 INFO tempest.lib.common.rest_client [req-b874cde3-f231-4ebe-a0af-19f808928262 ] Request (TenantNetworksRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/5c37423b6614444a86e9185fd68c6ae9/users/da06fa4860c642d79466694ae9fe4fd7/roles/72a4576c553448cd941b052c1ca0cf2d 0.068s 2020-11-06 18:03:02.782 37 DEBUG tempest.lib.common.rest_client [req-b874cde3-f231-4ebe-a0af-19f808928262 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b874cde3-f231-4ebe-a0af-19f808928262', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/5c37423b6614444a86e9185fd68c6ae9/users/da06fa4860c642d79466694ae9fe4fd7/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:02.782 37 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-TenantNetworksRbacTest-813402324', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '5c37423b6614444a86e9185fd68c6ae9', 'project_name': 'tempest-TenantNetworksRbacTest-813402324', 'tenant_id': '5c37423b6614444a86e9185fd68c6ae9', 'tenant_name': 'tempest-TenantNetworksRbacTest-813402324', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'da06fa4860c642d79466694ae9fe4fd7'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:02.873 37 INFO tempest.lib.common.rest_client [req-d3914bfb-b876-4968-8904-41f5cbc1c0da ] Request (TenantNetworksRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-11-06 18:03:02.874 37 DEBUG tempest.lib.common.rest_client [req-d3914bfb-b876-4968-8904-41f5cbc1c0da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d3914bfb-b876-4968-8904-41f5cbc1c0da', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["AkUcBSU4R4-oFSfTDpkgDA"], "expires_at": "2020-11-06T19:03:02.000000Z", "issued_at": "2020-11-06T18:03:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:03.058 39 INFO tempest.lib.common.rest_client [req-92a65013-cc0e-4348-8382-28be131b6e2d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.417s 2020-11-06 18:03:03.059 39 DEBUG tempest.lib.common.rest_client [req-92a65013-cc0e-4348-8382-28be131b6e2d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-92a65013-cc0e-4348-8382-28be131b6e2d', 'x-compute-request-id': 'req-92a65013-cc0e-4348-8382-28be131b6e2d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:03.083 38 INFO tempest.lib.common.rest_client [req-575312f7-f0fa-4f5d-b6ed-6cc617186e90 ] Request (TrunksSubportsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/544c28ca-08b2-46b7-bc94-61ca04f5b357 0.623s 2020-11-06 18:03:03.083 38 DEBUG tempest.lib.common.rest_client [req-575312f7-f0fa-4f5d-b6ed-6cc617186e90 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-575312f7-f0fa-4f5d-b6ed-6cc617186e90', 'date': 'Fri, 06 Nov 2020 18:03:03 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/544c28ca-08b2-46b7-bc94-61ca04f5b357'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:03.179 40 INFO tempest.lib.common.rest_client [req-c32be193-0c39-4e4c-b808-e148330efcfc ] Request (GroupTypesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-11-06 18:03:03.180 40 DEBUG tempest.lib.common.rest_client [req-c32be193-0c39-4e4c-b808-e148330efcfc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c32be193-0c39-4e4c-b808-e148330efcfc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "40ef8136c1984880bf28dc888da5789b", "name": "tempest-GroupTypesV3RbacTest-583363573", "password_expires_at": null}, "audit_ids": ["0CQEVs2VS6e-Wx1_HwI82Q"], "expires_at": "2020-11-06T19:03:03.000000Z", "issued_at": "2020-11-06T18:03:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d730c5dcad974b39bf91dc71f07e90c4", "name": "tempest-GroupTypesV3RbacTest-583363573"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:03.182 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:03.185 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:group_types_manage, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:03.186 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:03.247 40 INFO tempest.lib.common.rest_client [req-d45b6d55-2da4-4247-8aa2-6e72d5f5cee2 ] Request (GroupTypesV3RbacTest:test_create_group_type): 200 GET http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles 0.061s 2020-11-06 18:03:03.248 40 DEBUG tempest.lib.common.rest_client [req-d45b6d55-2da4-4247-8aa2-6e72d5f5cee2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d45b6d55-2da4-4247-8aa2-6e72d5f5cee2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:03.284 40 INFO tempest.lib.common.rest_client [req-e3b19160-0f6f-4922-8464-5fa971244a22 ] Request (GroupTypesV3RbacTest:test_create_group_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:03:03.285 40 DEBUG tempest.lib.common.rest_client [req-e3b19160-0f6f-4922-8464-5fa971244a22 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e3b19160-0f6f-4922-8464-5fa971244a22', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "40ef8136c1984880bf28dc888da5789b", "name": "tempest-GroupTypesV3RbacTest-583363573", "password_expires_at": null}, "audit_ids": ["K3xrpSNOSGe9J1lf6o0wQQ"], "expires_at": "2020-11-06T19:03:03.000000Z", "issued_at": "2020-11-06T18:03:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d730c5dcad974b39bf91dc71f07e90c4", "name": "tempest-GroupTypesV3RbacTest-583363573"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:03.427 37 INFO tempest.lib.common.rest_client [req-951b73c2-511d-4bfc-9553-3f634511e893 ] Request (TenantNetworksRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.552s 2020-11-06 18:03:03.427 37 DEBUG tempest.lib.common.rest_client [req-951b73c2-511d-4bfc-9553-3f634511e893 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-TenantNetworksRbacTest-1495916311-network", "tenant_id": "5c37423b6614444a86e9185fd68c6ae9"}} Response - Headers: {'content-type': 'application/json', 'content-length': '738', 'x-openstack-request-id': 'req-951b73c2-511d-4bfc-9553-3f634511e893', 'date': 'Fri, 06 Nov 2020 18:03:03 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"5903c5e5-0511-4019-a4e3-a68c37dd19b6","name":"tempest-TenantNetworksRbacTest-1495916311-network","tenant_id":"5c37423b6614444a86e9185fd68c6ae9","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"5c37423b6614444a86e9185fd68c6ae9","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":49,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:03:03Z","updated_at":"2020-11-06T18:03:03Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:03.427 37 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-TenantNetworksRbacTest-813402324', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '5c37423b6614444a86e9185fd68c6ae9', 'project_name': 'tempest-TenantNetworksRbacTest-813402324', 'tenant_id': '5c37423b6614444a86e9185fd68c6ae9', 'tenant_name': 'tempest-TenantNetworksRbacTest-813402324', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'da06fa4860c642d79466694ae9fe4fd7'}, Network: {'id': '5903c5e5-0511-4019-a4e3-a68c37dd19b6', 'name': 'tempest-TenantNetworksRbacTest-1495916311-network', 'tenant_id': '5c37423b6614444a86e9185fd68c6ae9', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '5c37423b6614444a86e9185fd68c6ae9', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 49, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T18:03:03Z', 'updated_at': '2020-11-06T18:03:03Z', 'revision_number': 1}, Subnet: None, Router: None 2020-11-06 18:03:03.457 40 INFO tempest.lib.common.rest_client [req-a945619e-53c3-4e88-9901-9321fa41f3d9 ] Request (GroupTypesV3RbacTest:test_create_group_type): 202 POST http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4/group_types 0.170s 2020-11-06 18:03:03.457 40 DEBUG tempest.lib.common.rest_client [req-a945619e-53c3-4e88-9901-9321fa41f3d9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupTypesV3RbacTest-group-type-2013555360"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a945619e-53c3-4e88-9901-9321fa41f3d9', 'content-length': '183', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a945619e-53c3-4e88-9901-9321fa41f3d9', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4/group_types'} Body: b'{"group_type": {"id": "5e574add-66be-4889-aca9-2da0e144a18f", "name": "tempest-GroupTypesV3RbacTest-group-type-2013555360", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:03.461 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:03.543 37 INFO tempest.lib.common.rest_client [req-1bec8142-20df-4433-b4eb-9d7c91b818d0 ] Request (TenantNetworksRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.108s 2020-11-06 18:03:03.543 37 DEBUG tempest.lib.common.rest_client [req-1bec8142-20df-4433-b4eb-9d7c91b818d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6573', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1bec8142-20df-4433-b4eb-9d7c91b818d0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "da06fa4860c642d79466694ae9fe4fd7", "name": "tempest-TenantNetworksRbacTest-813402324", "password_expires_at": null}, "audit_ids": ["tGnnUy7aTDOMil6rw-tMGQ"], "expires_at": "2020-11-06T19:03:03.000000Z", "issued_at": "2020-11-06T18:03:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5c37423b6614444a86e9185fd68c6ae9", "name": "tempest-TenantNetworksRbacTest-813402324"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5c37423b6614444a86e9185fd68c6ae9", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5c37423b6614444a86e9185fd68c6ae9", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5c37423b6614444a86e9185fd68c6ae9", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5c37423b6614444a86e9185fd68c6ae9", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5c37423b6614444a86e9185fd68c6ae9", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5c37423b6614444a86e9185fd68c6ae9", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://1 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:03.580 37 INFO tempest.lib.common.rest_client [req-24f5d23f-375e-415f-a44d-8a03c84d3b94 ] Request (TenantNetworksRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:03:03.580 37 DEBUG tempest.lib.common.rest_client [req-24f5d23f-375e-415f-a44d-8a03c84d3b94 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-24f5d23f-375e-415f-a44d-8a03c84d3b94', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["YgHg_DeQR9OJmbN2xPyrJQ"], "expires_at": "2020-11-06T19:03:03.000000Z", "issued_at": "2020-11-06T18:03:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:03.584 38 INFO tempest.lib.common.rest_client [req-bb9a5185-864a-4843-9516-d8da6301432f ] Request (TrunksSubportsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/8a1776c7-1031-425f-b420-09213842751d 0.499s 2020-11-06 18:03:03.584 38 DEBUG tempest.lib.common.rest_client [req-bb9a5185-864a-4843-9516-d8da6301432f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-bb9a5185-864a-4843-9516-d8da6301432f', 'date': 'Fri, 06 Nov 2020 18:03:03 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/8a1776c7-1031-425f-b420-09213842751d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:03.600 40 INFO tempest.lib.common.rest_client [req-4335f1f3-b673-4c3c-9324-cdf9de698f8f ] Request (GroupTypesV3RbacTest:test_create_group_type): 200 GET http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles 0.138s 2020-11-06 18:03:03.601 40 DEBUG tempest.lib.common.rest_client [req-4335f1f3-b673-4c3c-9324-cdf9de698f8f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4335f1f3-b673-4c3c-9324-cdf9de698f8f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:03.625 37 INFO tempest.lib.common.rest_client [req-bcab870d-5815-4d7b-953b-8f4981731743 ] Request (TenantNetworksRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:03:03.625 37 DEBUG tempest.lib.common.rest_client [req-bcab870d-5815-4d7b-953b-8f4981731743 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bcab870d-5815-4d7b-953b-8f4981731743', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["6BNkpIG-SYeG5Fkx2V-HIQ"], "expires_at": "2020-11-06T19:03:03.000000Z", "issued_at": "2020-11-06T18:03:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:03.672 37 INFO tempest.lib.common.rest_client [req-91d02bfa-accb-4b20-afd9-200db3cb7885 ] Request (TenantNetworksRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.045s 2020-11-06 18:03:03.673 37 DEBUG tempest.lib.common.rest_client [req-91d02bfa-accb-4b20-afd9-200db3cb7885 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-91d02bfa-accb-4b20-afd9-200db3cb7885', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:03.684 40 INFO tempest.lib.common.rest_client [req-23e5bce2-c924-4230-9e5d-f28a7b938855 ] Request (GroupTypesV3RbacTest:test_create_group_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 18:03:03.685 40 DEBUG tempest.lib.common.rest_client [req-23e5bce2-c924-4230-9e5d-f28a7b938855 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-23e5bce2-c924-4230-9e5d-f28a7b938855', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "40ef8136c1984880bf28dc888da5789b", "name": "tempest-GroupTypesV3RbacTest-583363573", "password_expires_at": null}, "audit_ids": ["rwbq3Ub8QY28obfBSlqhOw"], "expires_at": "2020-11-06T19:03:03.000000Z", "issued_at": "2020-11-06T18:03:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d730c5dcad974b39bf91dc71f07e90c4", "name": "tempest-GroupTypesV3RbacTest-583363573"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:03.729 37 INFO tempest.lib.common.rest_client [req-d7e8da75-42dd-4dae-b3c7-ee8274d5c6f3 ] Request (TenantNetworksRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-11-06 18:03:03.730 37 DEBUG tempest.lib.common.rest_client [req-d7e8da75-42dd-4dae-b3c7-ee8274d5c6f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d7e8da75-42dd-4dae-b3c7-ee8274d5c6f3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:03.730 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:03:03.731 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:03.797 37 INFO tempest.lib.common.rest_client [req-b6f458e9-9582-42d1-86c6-753e7406b898 ] Request (TenantNetworksRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/5c37423b6614444a86e9185fd68c6ae9/users/da06fa4860c642d79466694ae9fe4fd7/roles 0.066s 2020-11-06 18:03:03.798 37 DEBUG tempest.lib.common.rest_client [req-b6f458e9-9582-42d1-86c6-753e7406b898 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b6f458e9-9582-42d1-86c6-753e7406b898', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5c37423b6614444a86e9185fd68c6ae9/users/da06fa4860c642d79466694ae9fe4fd7/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5c37423b6614444a86e9185fd68c6ae9/users/da06fa4860c642d79466694ae9fe4fd7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:03.840 40 INFO tempest.lib.common.rest_client [req-b2e1ad9e-666d-4d31-b822-35bfdd206292 ] Request (GroupTypesV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4/group_types/5e574add-66be-4889-aca9-2da0e144a18f 0.154s 2020-11-06 18:03:03.841 40 DEBUG tempest.lib.common.rest_client [req-b2e1ad9e-666d-4d31-b822-35bfdd206292 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b2e1ad9e-666d-4d31-b822-35bfdd206292', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4/group_types/5e574add-66be-4889-aca9-2da0e144a18f'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:03.843 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:03.846 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:access_group_types_specs, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:03.846 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:03.858 37 INFO tempest.lib.common.rest_client [req-4e452dfc-c87e-4784-8b78-9d42c43db105 ] Request (TenantNetworksRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/5c37423b6614444a86e9185fd68c6ae9/users/da06fa4860c642d79466694ae9fe4fd7/roles/72a4576c553448cd941b052c1ca0cf2d 0.060s 2020-11-06 18:03:03.859 37 DEBUG tempest.lib.common.rest_client [req-4e452dfc-c87e-4784-8b78-9d42c43db105 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4e452dfc-c87e-4784-8b78-9d42c43db105', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/5c37423b6614444a86e9185fd68c6ae9/users/da06fa4860c642d79466694ae9fe4fd7/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:03.952 40 INFO tempest.lib.common.rest_client [req-5b516797-38a7-4982-a9c7-8bc13fe1983a ] Request (GroupTypesV3RbacTest:test_create_group_type_group_specs): 200 GET http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles 0.105s 2020-11-06 18:03:03.952 40 DEBUG tempest.lib.common.rest_client [req-5b516797-38a7-4982-a9c7-8bc13fe1983a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5b516797-38a7-4982-a9c7-8bc13fe1983a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:03.966 37 INFO tempest.lib.common.rest_client [req-0efe6cdd-a7f0-44c2-9612-a3873b8e6723 ] Request (TenantNetworksRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/5c37423b6614444a86e9185fd68c6ae9/users/da06fa4860c642d79466694ae9fe4fd7/roles/a629c95d64b3416fb80ae90af4f69c05 0.106s 2020-11-06 18:03:03.966 37 DEBUG tempest.lib.common.rest_client [req-0efe6cdd-a7f0-44c2-9612-a3873b8e6723 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0efe6cdd-a7f0-44c2-9612-a3873b8e6723', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/5c37423b6614444a86e9185fd68c6ae9/users/da06fa4860c642d79466694ae9fe4fd7/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:04.037 40 INFO tempest.lib.common.rest_client [req-21670b7c-73eb-400d-ad6d-c696ecc29965 ] Request (GroupTypesV3RbacTest:test_create_group_type_group_specs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-11-06 18:03:04.037 40 DEBUG tempest.lib.common.rest_client [req-21670b7c-73eb-400d-ad6d-c696ecc29965 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-21670b7c-73eb-400d-ad6d-c696ecc29965', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "40ef8136c1984880bf28dc888da5789b", "name": "tempest-GroupTypesV3RbacTest-583363573", "password_expires_at": null}, "audit_ids": ["7lVHWdSQSYKzF8S3nVECrQ"], "expires_at": "2020-11-06T19:03:03.000000Z", "issued_at": "2020-11-06T18:03:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d730c5dcad974b39bf91dc71f07e90c4", "name": "tempest-GroupTypesV3RbacTest-583363573"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:04.195 40 INFO tempest.lib.common.rest_client [req-7f05b1ed-e908-4f66-ac7a-19a9ef782328 ] Request (GroupTypesV3RbacTest:test_create_group_type_group_specs): 202 POST http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4/group_types 0.157s 2020-11-06 18:03:04.196 40 DEBUG tempest.lib.common.rest_client [req-7f05b1ed-e908-4f66-ac7a-19a9ef782328 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupTypesV3RbacTest-group-type-1610677399"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-7f05b1ed-e908-4f66-ac7a-19a9ef782328', 'content-length': '183', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7f05b1ed-e908-4f66-ac7a-19a9ef782328', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4/group_types'} Body: b'{"group_type": {"id": "860d16ca-311a-4448-ac0a-c9c7200987b2", "name": "tempest-GroupTypesV3RbacTest-group-type-1610677399", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:04.200 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:04.283 39 INFO tempest.lib.common.rest_client [req-3b5c0712-756b-4280-b48b-09d705b1c608 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.209s 2020-11-06 18:03:04.284 39 DEBUG tempest.lib.common.rest_client [req-3b5c0712-756b-4280-b48b-09d705b1c608 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3b5c0712-756b-4280-b48b-09d705b1c608', 'x-compute-request-id': 'req-3b5c0712-756b-4280-b48b-09d705b1c608', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:04.300 40 INFO tempest.lib.common.rest_client [req-7d83550a-4e17-4d61-a826-d90ec76f56e2 ] Request (GroupTypesV3RbacTest:test_create_group_type_group_specs): 200 GET http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles 0.099s 2020-11-06 18:03:04.300 40 DEBUG tempest.lib.common.rest_client [req-7d83550a-4e17-4d61-a826-d90ec76f56e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7d83550a-4e17-4d61-a826-d90ec76f56e2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:04.331 40 INFO tempest.lib.common.rest_client [req-9ca20b88-5c46-41b8-8e26-1ff531e42041 ] Request (GroupTypesV3RbacTest:test_create_group_type_group_specs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.030s 2020-11-06 18:03:04.332 40 DEBUG tempest.lib.common.rest_client [req-9ca20b88-5c46-41b8-8e26-1ff531e42041 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9ca20b88-5c46-41b8-8e26-1ff531e42041', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "40ef8136c1984880bf28dc888da5789b", "name": "tempest-GroupTypesV3RbacTest-583363573", "password_expires_at": null}, "audit_ids": ["NLz-42pbTx6Ugqj0YUSwbQ"], "expires_at": "2020-11-06T19:03:04.000000Z", "issued_at": "2020-11-06T18:03:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d730c5dcad974b39bf91dc71f07e90c4", "name": "tempest-GroupTypesV3RbacTest-583363573"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:04.481 40 INFO tempest.lib.common.rest_client [req-057a523e-48e1-47b3-b4c2-6632509d0011 ] Request (GroupTypesV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4/group_types/860d16ca-311a-4448-ac0a-c9c7200987b2 0.147s 2020-11-06 18:03:04.481 40 DEBUG tempest.lib.common.rest_client [req-057a523e-48e1-47b3-b4c2-6632509d0011 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-057a523e-48e1-47b3-b4c2-6632509d0011', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4/group_types/860d16ca-311a-4448-ac0a-c9c7200987b2'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:04.484 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:04.487 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:group_types_manage, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:04.536 40 INFO tempest.lib.common.rest_client [req-319c92ad-61f6-4ebc-9fe7-db8ad4ba056b ] Request (GroupTypesV3RbacTest:test_delete_group_type): 202 POST http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4/group_types 0.048s 2020-11-06 18:03:04.537 40 DEBUG tempest.lib.common.rest_client [req-319c92ad-61f6-4ebc-9fe7-db8ad4ba056b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupTypesV3RbacTest-group-type-222734301"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-319c92ad-61f6-4ebc-9fe7-db8ad4ba056b', 'content-length': '182', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-319c92ad-61f6-4ebc-9fe7-db8ad4ba056b', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4/group_types'} Body: b'{"group_type": {"id": "d26a19dc-4105-4bac-a749-b017c6bb6ad7", "name": "tempest-GroupTypesV3RbacTest-group-type-222734301", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:04.541 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:04.604 40 INFO tempest.lib.common.rest_client [req-4a725a65-3ba9-4fdc-9ade-4458870f079b ] Request (GroupTypesV3RbacTest:test_delete_group_type): 200 GET http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles 0.062s 2020-11-06 18:03:04.604 40 DEBUG tempest.lib.common.rest_client [req-4a725a65-3ba9-4fdc-9ade-4458870f079b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4a725a65-3ba9-4fdc-9ade-4458870f079b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:04.645 40 INFO tempest.lib.common.rest_client [req-107daf19-a478-41b3-94e7-ece5b160a921 ] Request (GroupTypesV3RbacTest:test_delete_group_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:03:04.646 40 DEBUG tempest.lib.common.rest_client [req-107daf19-a478-41b3-94e7-ece5b160a921 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-107daf19-a478-41b3-94e7-ece5b160a921', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "40ef8136c1984880bf28dc888da5789b", "name": "tempest-GroupTypesV3RbacTest-583363573", "password_expires_at": null}, "audit_ids": ["bDn_5edrRNKTjjRQxo9S8A"], "expires_at": "2020-11-06T19:03:04.000000Z", "issued_at": "2020-11-06T18:03:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d730c5dcad974b39bf91dc71f07e90c4", "name": "tempest-GroupTypesV3RbacTest-583363573"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:04.763 40 INFO tempest.lib.common.rest_client [req-6e9ed80a-a85a-4de4-96b4-da89faa65aef ] Request (GroupTypesV3RbacTest:test_delete_group_type): 202 DELETE http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4/group_types/d26a19dc-4105-4bac-a749-b017c6bb6ad7 0.116s 2020-11-06 18:03:04.764 40 DEBUG tempest.lib.common.rest_client [req-6e9ed80a-a85a-4de4-96b4-da89faa65aef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6e9ed80a-a85a-4de4-96b4-da89faa65aef', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4/group_types/d26a19dc-4105-4bac-a749-b017c6bb6ad7'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:04.764 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:04.826 40 INFO tempest.lib.common.rest_client [req-781d7623-b0db-42d4-9f0a-b7b3f7e5e594 ] Request (GroupTypesV3RbacTest:test_delete_group_type): 200 GET http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles 0.061s 2020-11-06 18:03:04.827 40 DEBUG tempest.lib.common.rest_client [req-781d7623-b0db-42d4-9f0a-b7b3f7e5e594 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-781d7623-b0db-42d4-9f0a-b7b3f7e5e594', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:04.866 40 INFO tempest.lib.common.rest_client [req-a0acf163-22ed-48f5-844b-249390263dd1 ] Request (GroupTypesV3RbacTest:test_delete_group_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:03:04.866 40 DEBUG tempest.lib.common.rest_client [req-a0acf163-22ed-48f5-844b-249390263dd1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a0acf163-22ed-48f5-844b-249390263dd1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "40ef8136c1984880bf28dc888da5789b", "name": "tempest-GroupTypesV3RbacTest-583363573", "password_expires_at": null}, "audit_ids": ["UVCkOcMwSMCn-SZFO4zGAQ"], "expires_at": "2020-11-06T19:03:04.000000Z", "issued_at": "2020-11-06T18:03:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d730c5dcad974b39bf91dc71f07e90c4", "name": "tempest-GroupTypesV3RbacTest-583363573"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:04.963 40 INFO tempest.lib.common.rest_client [req-6bdb935a-b042-4e79-a8b6-4c2ba75f80ea ] Request (GroupTypesV3RbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4/group_types/d26a19dc-4105-4bac-a749-b017c6bb6ad7 0.095s 2020-11-06 18:03:04.964 40 DEBUG tempest.lib.common.rest_client [req-6bdb935a-b042-4e79-a8b6-4c2ba75f80ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'content-length': '113', 'content-type': 'application/json', 'x-compute-request-id': 'req-6bdb935a-b042-4e79-a8b6-4c2ba75f80ea', 'x-openstack-request-id': 'req-6bdb935a-b042-4e79-a8b6-4c2ba75f80ea', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4/group_types/d26a19dc-4105-4bac-a749-b017c6bb6ad7'} Body: b'{"itemNotFound": {"code": 404, "message": "Group type d26a19dc-4105-4bac-a749-b017c6bb6ad7 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:04.966 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:04.969 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:access_group_types_specs, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:05.007 40 INFO tempest.lib.common.rest_client [req-afe27694-2fb8-4abf-8050-d6b9b9682a55 ] Request (GroupTypesV3RbacTest:test_show_group_type): 202 POST http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4/group_types 0.037s 2020-11-06 18:03:05.007 40 DEBUG tempest.lib.common.rest_client [req-afe27694-2fb8-4abf-8050-d6b9b9682a55 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupTypesV3RbacTest-group-type-1552656711"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-afe27694-2fb8-4abf-8050-d6b9b9682a55', 'content-length': '183', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-afe27694-2fb8-4abf-8050-d6b9b9682a55', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4/group_types'} Body: b'{"group_type": {"id": "3e0bcdc8-e6d1-4f54-a769-306f5c387f51", "name": "tempest-GroupTypesV3RbacTest-group-type-1552656711", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:05.011 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:05.063 37 INFO tempest.lib.common.rest_client [req-ffb62709-1545-4add-a12f-5ae87b9ef91f ] Request (TenantNetworksRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-11-06 18:03:05.063 37 DEBUG tempest.lib.common.rest_client [req-ffb62709-1545-4add-a12f-5ae87b9ef91f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ffb62709-1545-4add-a12f-5ae87b9ef91f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "da06fa4860c642d79466694ae9fe4fd7", "name": "tempest-TenantNetworksRbacTest-813402324", "password_expires_at": null}, "audit_ids": ["B1Xujl_URQyXON9zV2GHmQ"], "expires_at": "2020-11-06T19:03:04.000000Z", "issued_at": "2020-11-06T18:03:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5c37423b6614444a86e9185fd68c6ae9", "name": "tempest-TenantNetworksRbacTest-813402324"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5c37423b6614444a86e9185fd68c6ae9", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5c37423b6614444a86e9185fd68c6ae9", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5c37423b6614444a86e9185fd68c6ae9", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5c37423b6614444a86e9185fd68c6ae9", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5c37423b6614444a86e9185fd68c6ae9", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5c37423b6614444a86e9185fd68c6ae9", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:05.065 40 INFO tempest.lib.common.rest_client [req-7eb49f04-73d0-4408-8633-f6266662fdc1 ] Request (GroupTypesV3RbacTest:test_show_group_type): 200 GET http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles 0.053s 2020-11-06 18:03:05.065 40 DEBUG tempest.lib.common.rest_client [req-7eb49f04-73d0-4408-8633-f6266662fdc1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7eb49f04-73d0-4408-8633-f6266662fdc1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:05.066 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:05.067 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.068 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.068 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.069 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.070 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.070 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.071 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.071 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.072 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.072 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.073 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.074 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.074 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.075 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.075 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.076 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.076 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.076 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.077 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.077 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.078 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.078 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.078 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.078 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.079 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.079 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.079 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.080 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.080 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.080 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.080 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.081 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.081 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.081 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.081 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.082 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.082 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.082 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.083 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.083 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.083 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.083 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.084 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.084 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.084 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.085 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.085 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.085 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.086 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.086 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.086 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.086 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.087 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.087 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.087 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.087 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.088 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.088 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.088 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.089 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.089 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.090 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.090 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.090 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.090 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.091 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.091 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.091 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.092 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.092 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.092 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.092 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.093 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.093 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.093 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:05.094 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-tenant-networks:list, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:05.095 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:05.103 40 INFO tempest.lib.common.rest_client [req-81d89b21-7df5-4926-9330-b72c654f1eb0 ] Request (GroupTypesV3RbacTest:test_show_group_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:03:05.104 40 DEBUG tempest.lib.common.rest_client [req-81d89b21-7df5-4926-9330-b72c654f1eb0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-81d89b21-7df5-4926-9330-b72c654f1eb0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "40ef8136c1984880bf28dc888da5789b", "name": "tempest-GroupTypesV3RbacTest-583363573", "password_expires_at": null}, "audit_ids": ["a9mdDLqxSvm0SMqrTEQYJQ"], "expires_at": "2020-11-06T19:03:05.000000Z", "issued_at": "2020-11-06T18:03:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d730c5dcad974b39bf91dc71f07e90c4", "name": "tempest-GroupTypesV3RbacTest-583363573"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:05.148 37 INFO tempest.lib.common.rest_client [req-09809c2c-948b-4543-a744-8418fa028311 ] Request (TenantNetworksRbacTest:test_list_show_tenant_networks): 200 GET http://172.30.13.94/identity/v3/projects/5c37423b6614444a86e9185fd68c6ae9/users/da06fa4860c642d79466694ae9fe4fd7/roles 0.053s 2020-11-06 18:03:05.149 37 DEBUG tempest.lib.common.rest_client [req-09809c2c-948b-4543-a744-8418fa028311 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-09809c2c-948b-4543-a744-8418fa028311', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5c37423b6614444a86e9185fd68c6ae9/users/da06fa4860c642d79466694ae9fe4fd7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5c37423b6614444a86e9185fd68c6ae9/users/da06fa4860c642d79466694ae9fe4fd7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:05.194 40 INFO tempest.lib.common.rest_client [req-4df0fa4a-e2cd-4f69-b166-3fdcd5617be4 ] Request (GroupTypesV3RbacTest:test_show_group_type): 200 GET http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4/group_types/3e0bcdc8-e6d1-4f54-a769-306f5c387f51 0.088s 2020-11-06 18:03:05.194 40 DEBUG tempest.lib.common.rest_client [req-4df0fa4a-e2cd-4f69-b166-3fdcd5617be4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4df0fa4a-e2cd-4f69-b166-3fdcd5617be4', 'content-length': '183', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4df0fa4a-e2cd-4f69-b166-3fdcd5617be4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4/group_types/3e0bcdc8-e6d1-4f54-a769-306f5c387f51'} Body: b'{"group_type": {"id": "3e0bcdc8-e6d1-4f54-a769-306f5c387f51", "name": "tempest-GroupTypesV3RbacTest-group-type-1552656711", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:05.198 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:05.206 37 INFO tempest.lib.common.rest_client [req-66a3e431-58ec-42e7-a868-a171f784d0b8 ] Request (TenantNetworksRbacTest:test_list_show_tenant_networks): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.056s 2020-11-06 18:03:05.207 37 DEBUG tempest.lib.common.rest_client [req-66a3e431-58ec-42e7-a868-a171f784d0b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-66a3e431-58ec-42e7-a868-a171f784d0b8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "da06fa4860c642d79466694ae9fe4fd7", "name": "tempest-TenantNetworksRbacTest-813402324", "password_expires_at": null}, "audit_ids": ["6Msmtl8xR_uTWb48bkZA8w"], "expires_at": "2020-11-06T19:03:05.000000Z", "issued_at": "2020-11-06T18:03:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5c37423b6614444a86e9185fd68c6ae9", "name": "tempest-TenantNetworksRbacTest-813402324"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5c37423b6614444a86e9185fd68c6ae9", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5c37423b6614444a86e9185fd68c6ae9", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5c37423b6614444a86e9185fd68c6ae9", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5c37423b6614444a86e9185fd68c6ae9", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5c37423b6614444a86e9185fd68c6ae9", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5c37423b6614444a86e9185fd68c6ae9", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:05.252 40 INFO tempest.lib.common.rest_client [req-8a1b1ddf-cb47-4502-9a71-49eebd4109a2 ] Request (GroupTypesV3RbacTest:test_show_group_type): 200 GET http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles 0.053s 2020-11-06 18:03:05.252 40 DEBUG tempest.lib.common.rest_client [req-8a1b1ddf-cb47-4502-9a71-49eebd4109a2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8a1b1ddf-cb47-4502-9a71-49eebd4109a2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:05.288 40 INFO tempest.lib.common.rest_client [req-72f80d85-a374-40e4-a6a3-521a1a388dad ] Request (GroupTypesV3RbacTest:test_show_group_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:03:05.289 40 DEBUG tempest.lib.common.rest_client [req-72f80d85-a374-40e4-a6a3-521a1a388dad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-72f80d85-a374-40e4-a6a3-521a1a388dad', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "40ef8136c1984880bf28dc888da5789b", "name": "tempest-GroupTypesV3RbacTest-583363573", "password_expires_at": null}, "audit_ids": ["6d-LAgn5TBKriq_mA5-byg"], "expires_at": "2020-11-06T19:03:05.000000Z", "issued_at": "2020-11-06T18:03:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d730c5dcad974b39bf91dc71f07e90c4", "name": "tempest-GroupTypesV3RbacTest-583363573"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:05.375 40 INFO tempest.lib.common.rest_client [req-597c9f92-12d7-497c-9a40-cc3bff395bfb ] Request (GroupTypesV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4/group_types/3e0bcdc8-e6d1-4f54-a769-306f5c387f51 0.085s 2020-11-06 18:03:05.376 40 DEBUG tempest.lib.common.rest_client [req-597c9f92-12d7-497c-9a40-cc3bff395bfb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-597c9f92-12d7-497c-9a40-cc3bff395bfb', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4/group_types/3e0bcdc8-e6d1-4f54-a769-306f5c387f51'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:05.378 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:05.381 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:group_types_manage, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:05.405 38 INFO tempest.lib.common.rest_client [req-d4e9e866-4ae0-4c3d-b6b2-0322ce4bf373 ] Request (TrunksSubportsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/645975ed-5857-4a42-a350-7cd2a458ab56 1.819s 2020-11-06 18:03:05.405 38 DEBUG tempest.lib.common.rest_client [req-d4e9e866-4ae0-4c3d-b6b2-0322ce4bf373 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-d4e9e866-4ae0-4c3d-b6b2-0322ce4bf373', 'date': 'Fri, 06 Nov 2020 18:03:05 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/645975ed-5857-4a42-a350-7cd2a458ab56'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:05.429 40 INFO tempest.lib.common.rest_client [req-6eb528c1-4b6f-4b14-9d7e-a10a9638e839 ] Request (GroupTypesV3RbacTest:test_update_group_type): 202 POST http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4/group_types 0.047s 2020-11-06 18:03:05.429 40 DEBUG tempest.lib.common.rest_client [req-6eb528c1-4b6f-4b14-9d7e-a10a9638e839 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupTypesV3RbacTest-group-type-1663077768"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6eb528c1-4b6f-4b14-9d7e-a10a9638e839', 'content-length': '183', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6eb528c1-4b6f-4b14-9d7e-a10a9638e839', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4/group_types'} Body: b'{"group_type": {"id": "f0df8444-dd53-40cc-a25f-6f29cc914e8a", "name": "tempest-GroupTypesV3RbacTest-group-type-1663077768", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:05.433 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:05.537 37 INFO tempest.lib.common.rest_client [req-8ff6d6fe-c378-42eb-9479-122325f5d492 ] Request (TenantNetworksRbacTest:test_list_show_tenant_networks): 200 GET http://172.30.13.94/compute/v2.1/os-tenant-networks 0.329s 2020-11-06 18:03:05.538 37 DEBUG tempest.lib.common.rest_client [req-8ff6d6fe-c378-42eb-9479-122325f5d492 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '7775', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8ff6d6fe-c378-42eb-9479-122325f5d492', 'x-compute-request-id': 'req-8ff6d6fe-c378-42eb-9479-122325f5d492', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-tenant-networks'} Body: b'{"networks": [{"id": "075e5ee8-b0b4-4574-81a3-c3210ea79d71", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-683767456-network"}, {"id": "13682051-c16d-4418-88ee-1a180a4cfc15", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-1346316559-network"}, {"id": "13969b3e-1458-4017-97b3-6dc65a2e1f8c", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-80353040-network"}, {"id": "17d7963c-2bb9-4b6c-aa1a-40527525c1b8", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-1331327385-network"}, {"id": "1c02029e-3385-4b0f-8ea8-64f5a5e9c878", "cidr": "None", "label": "private"}, {"id": "222829bb-98bb-422e-b261-d0093bb5b311", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-123723835-network"}, {"id": "301fd395-f2ad-446c-989a-a47eb4819d56", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-1770149323-network"}, {"id": "31821d36-8870-4e30-ba78-9e7355084c74", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-792869292-network"}, {"id": "33ad4e1b-dd49-4d7f-951f-1d19a3d44add", "cidr": "None", "label": "patrole_reader-net_30048f18-b96b-4343-a720-1173982b59b8"}, {"id": "36816896-91b4-4fb8-ae17-f40a493ff129", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-1769608953-network"}, {"id": "375af6bf-6b1d-4a79-a8e4-364fd12eb5ce", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-1679097562-network"}, {"id": "3aadcfa0-3b97-4cac-9ec2-50e6ad7cdef8", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-321183435-network"}, {"id": "3c0df36c-3ee6-4537-9024-19fde4d0c732", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-449695201-network"}, {"id": "3d29712e-3d1b-444b-8c87-4b8f127294d6", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-1954922705-network"}, {"id": "3e3a5a0f-19ad-4971-81cd-bebcff766ef3", "cidr": "None", "label": "tempest-ServerActionsRbacTest-1100924744-network"}, {"id": "3f5df315-73c9-4c55-be39-b3d182cd9571", "cidr": "None", "label": "tempest-TrunksSubportsExtRbacTest-test-network-1135654511"}, {"id": "3f826ac1-28b7-4f1f-b8e9-3491a2a1290b", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-208284482-network"}, {"id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "cidr": "None", "label": "public"}, {"id": "3ffd6d5b-6f3d-45dc-882b-fc5a5fee4462", "cidr": "None", "label": "shared"}, {"id": "463e4fd7-195b-4ab6-b244-1b4adc1f8c9e", "cidr": "None", "label": "tempest-network-smoke--1655458372"}, {"id": "471c4cbc-e10e-4589-bb02-9f529c70eaba", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-1508986907-network"}, {"id": "510f0d0b-9ca3-4c7d-a1b0-a08e57dd97cd", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-351644466-network"}, {"id": "51ce8b2b-bf8b-48cb-91fb-9b5438450b2c", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-235037129-network"}, {"id": "529aec4e-dc4d-461e-835f-1ce0fc52633a", "cidr": "None", "label": "tempest-ServerActionsRbacTest-1107501304-network"}, {"id": "52b41788-b48e-4e6e-a2f3-f4dd864ec823", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-13473268-network"}, {"id": "5903c5e5-0511-4019-a4e3-a68c37dd19b6", "cidr": "None", "label": "tempest-TenantNetworksRbacTest-1495916311-network"}, {"id": "621c5dd4-7ec0-457a-b399-b4b3b35a5feb", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-1198871085-network"}, {"id": "63a8d31c-1c0b-4afe-a8e1-7bdb9efa1b25", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-627065865-network"}, {"id": "63cb5411-d783-4f93-b394-96d1a6c67e03", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-1903322306-network"}, {"id": "645975ed-5857-4a42-a350-7cd2a458ab56", "cidr": "None", "label": "tempest-TrunksSubportsExtRbacTest-test-network-696902528"}, {"id": "64f6da5d-c3d3-4e48-b4aa-1654586f9ba1", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-99369482-network"}, {"id": "65cbc0bc-3532-4aeb-9413-961982b0a0d5", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-150349500-network"}, {"id": "6ca4b2bb-3e28-4d38-9b71-db23876f2867", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-1731349474-network"}, {"id": "78aec846-79c4-43a9-9c96-d6642943a3b8", "cidr": "None", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:05.549 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:05.549 39 INFO tempest.lib.common.rest_client [req-40dc4073-067a-4a61-a4a0-6bcd963706b0 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.250s 2020-11-06 18:03:05.550 39 DEBUG tempest.lib.common.rest_client [req-40dc4073-067a-4a61-a4a0-6bcd963706b0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-40dc4073-067a-4a61-a4a0-6bcd963706b0', 'x-compute-request-id': 'req-40dc4073-067a-4a61-a4a0-6bcd963706b0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:05.628 40 INFO tempest.lib.common.rest_client [req-0934da0b-2210-4bdf-a515-191765d18217 ] Request (GroupTypesV3RbacTest:test_update_group_type): 200 GET http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles 0.194s 2020-11-06 18:03:05.629 40 DEBUG tempest.lib.common.rest_client [req-0934da0b-2210-4bdf-a515-191765d18217 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0934da0b-2210-4bdf-a515-191765d18217', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:05.655 37 INFO tempest.lib.common.rest_client [req-d7c2618f-190d-4c7f-a581-8db09ebc5d62 ] Request (TenantNetworksRbacTest:test_list_show_tenant_networks): 200 GET http://172.30.13.94/identity/v3/projects/5c37423b6614444a86e9185fd68c6ae9/users/da06fa4860c642d79466694ae9fe4fd7/roles 0.105s 2020-11-06 18:03:05.655 37 DEBUG tempest.lib.common.rest_client [req-d7c2618f-190d-4c7f-a581-8db09ebc5d62 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d7c2618f-190d-4c7f-a581-8db09ebc5d62', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5c37423b6614444a86e9185fd68c6ae9/users/da06fa4860c642d79466694ae9fe4fd7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5c37423b6614444a86e9185fd68c6ae9/users/da06fa4860c642d79466694ae9fe4fd7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:05.725 40 INFO tempest.lib.common.rest_client [req-7e0e6f88-5db3-48ee-bb50-52fc6987023d ] Request (GroupTypesV3RbacTest:test_update_group_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-11-06 18:03:05.726 40 DEBUG tempest.lib.common.rest_client [req-7e0e6f88-5db3-48ee-bb50-52fc6987023d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7e0e6f88-5db3-48ee-bb50-52fc6987023d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "40ef8136c1984880bf28dc888da5789b", "name": "tempest-GroupTypesV3RbacTest-583363573", "password_expires_at": null}, "audit_ids": ["APYfwgG1SwC8BlRxBd6GEg"], "expires_at": "2020-11-06T19:03:05.000000Z", "issued_at": "2020-11-06T18:03:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d730c5dcad974b39bf91dc71f07e90c4", "name": "tempest-GroupTypesV3RbacTest-583363573"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:05.743 37 INFO tempest.lib.common.rest_client [req-9f0a2106-bc73-43cb-b823-5bc3dc6c922d ] Request (TenantNetworksRbacTest:test_list_show_tenant_networks): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-11-06 18:03:05.744 37 DEBUG tempest.lib.common.rest_client [req-9f0a2106-bc73-43cb-b823-5bc3dc6c922d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9f0a2106-bc73-43cb-b823-5bc3dc6c922d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "da06fa4860c642d79466694ae9fe4fd7", "name": "tempest-TenantNetworksRbacTest-813402324", "password_expires_at": null}, "audit_ids": ["HjdSR72hT8WWUhtOcdeWvg"], "expires_at": "2020-11-06T19:03:05.000000Z", "issued_at": "2020-11-06T18:03:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5c37423b6614444a86e9185fd68c6ae9", "name": "tempest-TenantNetworksRbacTest-813402324"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5c37423b6614444a86e9185fd68c6ae9", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5c37423b6614444a86e9185fd68c6ae9", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5c37423b6614444a86e9185fd68c6ae9", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5c37423b6614444a86e9185fd68c6ae9", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5c37423b6614444a86e9185fd68c6ae9", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5c37423b6614444a86e9185fd68c6ae9", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:05.751 37 DEBUG tempest.lib.common.dynamic_creds [-] Clearing network: {'id': '5903c5e5-0511-4019-a4e3-a68c37dd19b6', 'name': 'tempest-TenantNetworksRbacTest-1495916311-network', 'tenant_id': '5c37423b6614444a86e9185fd68c6ae9', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '5c37423b6614444a86e9185fd68c6ae9', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 49, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T18:03:03Z', 'updated_at': '2020-11-06T18:03:03Z', 'revision_number': 1}, subnet: None, router: None _clear_isolated_net_resources /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/dynamic_creds.py:418 2020-11-06 18:03:05.983 40 INFO tempest.lib.common.rest_client [req-9f8b0330-157d-4253-a0f6-cc35021d22a1 ] Request (GroupTypesV3RbacTest:test_update_group_type): 200 PUT http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4/group_types/f0df8444-dd53-40cc-a25f-6f29cc914e8a 0.255s 2020-11-06 18:03:05.983 40 DEBUG tempest.lib.common.rest_client [req-9f8b0330-157d-4253-a0f6-cc35021d22a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupTypesV3RbacTest-updated-group-type-1137548798", "description": "updated-group-type-desc"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-9f8b0330-157d-4253-a0f6-cc35021d22a1', 'content-length': '212', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9f8b0330-157d-4253-a0f6-cc35021d22a1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4/group_types/f0df8444-dd53-40cc-a25f-6f29cc914e8a'} Body: b'{"group_type": {"id": "f0df8444-dd53-40cc-a25f-6f29cc914e8a", "name": "tempest-GroupTypesV3RbacTest-updated-group-type-1137548798", "description": "updated-group-type-desc", "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:05.988 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:06.102 40 INFO tempest.lib.common.rest_client [req-c4a650d6-bf5e-4118-950f-4dcbd538cce5 ] Request (GroupTypesV3RbacTest:test_update_group_type): 200 GET http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles 0.113s 2020-11-06 18:03:06.103 40 DEBUG tempest.lib.common.rest_client [req-c4a650d6-bf5e-4118-950f-4dcbd538cce5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c4a650d6-bf5e-4118-950f-4dcbd538cce5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4/users/40ef8136c1984880bf28dc888da5789b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:06.197 40 INFO tempest.lib.common.rest_client [req-4b3410c8-d8df-4234-9955-c3675c88352a ] Request (GroupTypesV3RbacTest:test_update_group_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-11-06 18:03:06.198 40 DEBUG tempest.lib.common.rest_client [req-4b3410c8-d8df-4234-9955-c3675c88352a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4b3410c8-d8df-4234-9955-c3675c88352a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "40ef8136c1984880bf28dc888da5789b", "name": "tempest-GroupTypesV3RbacTest-583363573", "password_expires_at": null}, "audit_ids": ["B3UtwyP5T7Wmb9hMA1X8dw"], "expires_at": "2020-11-06T19:03:06.000000Z", "issued_at": "2020-11-06T18:03:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d730c5dcad974b39bf91dc71f07e90c4", "name": "tempest-GroupTypesV3RbacTest-583363573"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d730c5dcad974b39bf91dc71f07e90c4", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:06.355 40 INFO tempest.lib.common.rest_client [req-2e676e8e-90b4-4bb8-968c-f40d62ca73cc ] Request (GroupTypesV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4/group_types/f0df8444-dd53-40cc-a25f-6f29cc914e8a 0.155s 2020-11-06 18:03:06.355 40 DEBUG tempest.lib.common.rest_client [req-2e676e8e-90b4-4bb8-968c-f40d62ca73cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2e676e8e-90b4-4bb8-968c-f40d62ca73cc', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/d730c5dcad974b39bf91dc71f07e90c4/group_types/f0df8444-dd53-40cc-a25f-6f29cc914e8a'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:06.508 37 INFO tempest.lib.common.rest_client [req-084d4687-bb6f-4522-996e-96d22fea1f09 ] Request (TenantNetworksRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/5903c5e5-0511-4019-a4e3-a68c37dd19b6 0.756s 2020-11-06 18:03:06.509 37 DEBUG tempest.lib.common.rest_client [req-084d4687-bb6f-4522-996e-96d22fea1f09 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-084d4687-bb6f-4522-996e-96d22fea1f09', 'date': 'Fri, 06 Nov 2020 18:03:06 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/5903c5e5-0511-4019-a4e3-a68c37dd19b6'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:06.566 40 INFO tempest.lib.common.rest_client [req-6e87907f-a44f-43ac-bf95-75e55f9073a4 ] Request (GroupTypesV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/40ef8136c1984880bf28dc888da5789b 0.208s 2020-11-06 18:03:06.567 40 DEBUG tempest.lib.common.rest_client [req-6e87907f-a44f-43ac-bf95-75e55f9073a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6e87907f-a44f-43ac-bf95-75e55f9073a4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/40ef8136c1984880bf28dc888da5789b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:06.657 40 INFO tempest.lib.common.rest_client [req-ede2a500-fc2b-4b2e-91d0-66cbead7304d ] Request (GroupTypesV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 18:03:06.657 40 DEBUG tempest.lib.common.rest_client [req-ede2a500-fc2b-4b2e-91d0-66cbead7304d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ede2a500-fc2b-4b2e-91d0-66cbead7304d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["uLAiiw7lQEC6BP6Fhz4Gpw"], "expires_at": "2020-11-06T19:03:06.000000Z", "issued_at": "2020-11-06T18:03:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:06.690 37 INFO tempest.lib.common.rest_client [req-de0fcdeb-7068-4c47-9d73-18ea3fc645e5 ] Request (TenantNetworksRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/da06fa4860c642d79466694ae9fe4fd7 0.180s 2020-11-06 18:03:06.691 37 DEBUG tempest.lib.common.rest_client [req-de0fcdeb-7068-4c47-9d73-18ea3fc645e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-de0fcdeb-7068-4c47-9d73-18ea3fc645e5', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/da06fa4860c642d79466694ae9fe4fd7'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:06.749 37 INFO tempest.lib.common.rest_client [req-5de356f1-1392-4f09-8ad9-29bf752fad74 ] Request (TenantNetworksRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=5c37423b6614444a86e9185fd68c6ae9&name=default 0.057s 2020-11-06 18:03:06.750 37 DEBUG tempest.lib.common.rest_client [req-5de356f1-1392-4f09-8ad9-29bf752fad74 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-5de356f1-1392-4f09-8ad9-29bf752fad74', 'date': 'Fri, 06 Nov 2020 18:03:06 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=5c37423b6614444a86e9185fd68c6ae9&name=default'} Body: b'{"security_groups": [{"id": "ef6c43d3-42eb-4fae-ac0d-55344fca0fac", "name": "default", "stateful": true, "tenant_id": "5c37423b6614444a86e9185fd68c6ae9", "description": "Default security group", "security_group_rules": [{"id": "34ddba89-e9f7-4a22-b701-f998d32ad1c5", "tenant_id": "5c37423b6614444a86e9185fd68c6ae9", "security_group_id": "ef6c43d3-42eb-4fae-ac0d-55344fca0fac", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:03Z", "updated_at": "2020-11-06T18:03:03Z", "revision_number": 0, "project_id": "5c37423b6614444a86e9185fd68c6ae9"}, {"id": "83eb3717-1f42-4e0f-9069-87689535d2f1", "tenant_id": "5c37423b6614444a86e9185fd68c6ae9", "security_group_id": "ef6c43d3-42eb-4fae-ac0d-55344fca0fac", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "ef6c43d3-42eb-4fae-ac0d-55344fca0fac", "description": null, "tags": [], "created_at": "2020-11-06T18:03:03Z", "updated_at": "2020-11-06T18:03:03Z", "revision_number": 0, "project_id": "5c37423b6614444a86e9185fd68c6ae9"}, {"id": "9b33e8d5-6bfc-4b96-9c9f-2ed56b4f4bf8", "tenant_id": "5c37423b6614444a86e9185fd68c6ae9", "security_group_id": "ef6c43d3-42eb-4fae-ac0d-55344fca0fac", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:03Z", "updated_at": "2020-11-06T18:03:03Z", "revision_number": 0, "project_id": "5c37423b6614444a86e9185fd68c6ae9"}, {"id": "bb46d74f-1bbe-4e5f-94ae-560f4ff2b8d7", "tenant_id": "5c37423b6614444a86e9185fd68c6ae9", "security_group_id": "ef6c43d3-42eb-4fae-ac0d-55344fca0fac", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "ef6c43d3-42eb-4fae-ac0d-55344fca0fac", "description": null, "tags": [], "created_at": "2020-11-06T18:03:03Z", "updated_at": "2020-11-06T18:03:03Z", "revision_number": 0, "project_id": "5c37423b6614444a86e9185fd68c6ae9"}], "tags": [], "created_at": "2020-11-06T18:03:03Z", "updated_at": "2020-11-06T18:03:03Z", "revision_number": 1, "project_id": "5c37423b6614444a86e9185fd68c6ae9"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:06.763 39 INFO tempest.lib.common.rest_client [req-b9946fd4-1088-487d-828b-e10444f437c0 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.196s 2020-11-06 18:03:06.763 39 DEBUG tempest.lib.common.rest_client [req-b9946fd4-1088-487d-828b-e10444f437c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b9946fd4-1088-487d-828b-e10444f437c0', 'x-compute-request-id': 'req-b9946fd4-1088-487d-828b-e10444f437c0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:06.921 37 INFO tempest.lib.common.rest_client [req-1365bc30-a481-4305-a861-a3b27026020d ] Request (TenantNetworksRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/ef6c43d3-42eb-4fae-ac0d-55344fca0fac 0.170s 2020-11-06 18:03:06.922 37 DEBUG tempest.lib.common.rest_client [req-1365bc30-a481-4305-a861-a3b27026020d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-1365bc30-a481-4305-a861-a3b27026020d', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:03:06 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/ef6c43d3-42eb-4fae-ac0d-55344fca0fac'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:07.030 40 INFO tempest.lib.common.rest_client [req-e7e86f0f-54b7-44de-bac2-fa8240ab0878 ] Request (GroupTypesV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=d730c5dcad974b39bf91dc71f07e90c4&name=default 0.372s 2020-11-06 18:03:07.031 40 DEBUG tempest.lib.common.rest_client [req-e7e86f0f-54b7-44de-bac2-fa8240ab0878 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-e7e86f0f-54b7-44de-bac2-fa8240ab0878', 'date': 'Fri, 06 Nov 2020 18:03:07 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=d730c5dcad974b39bf91dc71f07e90c4&name=default'} Body: b'{"security_groups": [{"id": "20ea5311-341e-45fe-8738-29679628f6eb", "name": "default", "stateful": true, "tenant_id": "d730c5dcad974b39bf91dc71f07e90c4", "description": "Default security group", "security_group_rules": [{"id": "0b04aacd-befb-4351-aaf6-212bb290f61b", "tenant_id": "d730c5dcad974b39bf91dc71f07e90c4", "security_group_id": "20ea5311-341e-45fe-8738-29679628f6eb", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:06Z", "updated_at": "2020-11-06T18:03:06Z", "revision_number": 0, "project_id": "d730c5dcad974b39bf91dc71f07e90c4"}, {"id": "46e6059c-725c-4b35-82f3-71b685015d91", "tenant_id": "d730c5dcad974b39bf91dc71f07e90c4", "security_group_id": "20ea5311-341e-45fe-8738-29679628f6eb", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "20ea5311-341e-45fe-8738-29679628f6eb", "description": null, "tags": [], "created_at": "2020-11-06T18:03:06Z", "updated_at": "2020-11-06T18:03:06Z", "revision_number": 0, "project_id": "d730c5dcad974b39bf91dc71f07e90c4"}, {"id": "63f9162e-68eb-425d-94aa-401a19e37f46", "tenant_id": "d730c5dcad974b39bf91dc71f07e90c4", "security_group_id": "20ea5311-341e-45fe-8738-29679628f6eb", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:06Z", "updated_at": "2020-11-06T18:03:06Z", "revision_number": 0, "project_id": "d730c5dcad974b39bf91dc71f07e90c4"}, {"id": "b3e1e1c1-cb60-40a9-8be4-1a4f15d13603", "tenant_id": "d730c5dcad974b39bf91dc71f07e90c4", "security_group_id": "20ea5311-341e-45fe-8738-29679628f6eb", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "20ea5311-341e-45fe-8738-29679628f6eb", "description": null, "tags": [], "created_at": "2020-11-06T18:03:06Z", "updated_at": "2020-11-06T18:03:06Z", "revision_number": 0, "project_id": "d730c5dcad974b39bf91dc71f07e90c4"}], "tags": [], "created_at": "2020-11-06T18:03:06Z", "updated_at": "2020-11-06T18:03:06Z", "revision_number": 1, "project_id": "d730c5dcad974b39bf91dc71f07e90c4"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:07.034 37 INFO tempest.lib.common.rest_client [req-f6f74669-5a64-4256-a38d-aeb7c6142c94 ] Request (TenantNetworksRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/5c37423b6614444a86e9185fd68c6ae9 0.111s 2020-11-06 18:03:07.034 37 DEBUG tempest.lib.common.rest_client [req-f6f74669-5a64-4256-a38d-aeb7c6142c94 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f6f74669-5a64-4256-a38d-aeb7c6142c94', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/5c37423b6614444a86e9185fd68c6ae9'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:07.122 37 INFO tempest.lib.common.rest_client [req-10986ae9-03f8-49b6-ad30-2dd086f0a69d ] Request (ImageNamespacesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:03:07.123 37 DEBUG tempest.lib.common.rest_client [req-10986ae9-03f8-49b6-ad30-2dd086f0a69d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-10986ae9-03f8-49b6-ad30-2dd086f0a69d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["nQiyLUKzQsKrJLYLvc_-1w"], "expires_at": "2020-11-06T19:03:07.000000Z", "issued_at": "2020-11-06T18:03:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:07.135 40 INFO tempest.lib.common.rest_client [req-1d38767a-3c73-4a5a-a568-1c609d8ae2da ] Request (GroupTypesV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/20ea5311-341e-45fe-8738-29679628f6eb 0.103s 2020-11-06 18:03:07.136 40 DEBUG tempest.lib.common.rest_client [req-1d38767a-3c73-4a5a-a568-1c609d8ae2da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-1d38767a-3c73-4a5a-a568-1c609d8ae2da', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:03:07 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/20ea5311-341e-45fe-8738-29679628f6eb'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:07.148 38 INFO tempest.lib.common.rest_client [req-540eb898-0ec2-4998-9046-1ac7fc33a763 ] Request (TrunksSubportsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/73b4fe5f-ac77-4670-9ed6-ba84d2bf526c 1.741s 2020-11-06 18:03:07.148 38 DEBUG tempest.lib.common.rest_client [req-540eb898-0ec2-4998-9046-1ac7fc33a763 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-540eb898-0ec2-4998-9046-1ac7fc33a763', 'date': 'Fri, 06 Nov 2020 18:03:07 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/73b4fe5f-ac77-4670-9ed6-ba84d2bf526c'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:07.169 37 INFO tempest.lib.common.rest_client [req-13ab5a3e-c946-4577-aee1-35cbd50764cd ] Request (ImageNamespacesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:03:07.169 37 DEBUG tempest.lib.common.rest_client [req-13ab5a3e-c946-4577-aee1-35cbd50764cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-13ab5a3e-c946-4577-aee1-35cbd50764cd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["dBt3QBG3R5SMpRlbw8Z8cQ"], "expires_at": "2020-11-06T19:03:07.000000Z", "issued_at": "2020-11-06T18:03:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:07.230 37 INFO tempest.lib.common.rest_client [req-0aeb0da3-726f-4e14-ab20-db9cf16be7c7 ] Request (ImageNamespacesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.060s 2020-11-06 18:03:07.231 37 DEBUG tempest.lib.common.rest_client [req-0aeb0da3-726f-4e14-ab20-db9cf16be7c7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0aeb0da3-726f-4e14-ab20-db9cf16be7c7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:07.247 40 INFO tempest.lib.common.rest_client [req-de7c88de-9e5a-4302-8605-3ec0bd19aee3 ] Request (GroupTypesV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4 0.110s 2020-11-06 18:03:07.248 40 DEBUG tempest.lib.common.rest_client [req-de7c88de-9e5a-4302-8605-3ec0bd19aee3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-de7c88de-9e5a-4302-8605-3ec0bd19aee3', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d730c5dcad974b39bf91dc71f07e90c4'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:07.333 40 INFO tempest.lib.common.rest_client [req-28719f42-459b-4f97-afcf-70bd77980736 ] Request (GroupV320RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 18:03:07.334 40 DEBUG tempest.lib.common.rest_client [req-28719f42-459b-4f97-afcf-70bd77980736 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-28719f42-459b-4f97-afcf-70bd77980736', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["p2ADJOGQQuWUenlH2bhxjQ"], "expires_at": "2020-11-06T19:03:07.000000Z", "issued_at": "2020-11-06T18:03:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:07.342 37 INFO tempest.lib.common.rest_client [req-22934dea-eec2-4558-b0a6-a93a19c918e8 ] Request (ImageNamespacesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.110s 2020-11-06 18:03:07.343 37 DEBUG tempest.lib.common.rest_client [req-22934dea-eec2-4558-b0a6-a93a19c918e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ImageNamespacesRbacTest-1230131181-desc", "domain_id": "default", "name": "tempest-ImageNamespacesRbacTest-1230131181"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '384', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-22934dea-eec2-4558-b0a6-a93a19c918e8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "e86b1dc98c554ddaa96ac553798ea93c", "name": "tempest-ImageNamespacesRbacTest-1230131181", "domain_id": "default", "description": "tempest-ImageNamespacesRbacTest-1230131181-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/e86b1dc98c554ddaa96ac553798ea93c"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:07.438 40 INFO tempest.lib.common.rest_client [req-34f40229-c7a2-4e3a-af47-6c3800e0aeb4 ] Request (GroupV320RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-11-06 18:03:07.439 40 DEBUG tempest.lib.common.rest_client [req-34f40229-c7a2-4e3a-af47-6c3800e0aeb4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-34f40229-c7a2-4e3a-af47-6c3800e0aeb4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["H_-x2ThuQQKwncoxI65nOA"], "expires_at": "2020-11-06T19:03:07.000000Z", "issued_at": "2020-11-06T18:03:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:07.456 37 INFO tempest.lib.common.rest_client [req-34d316d0-0475-4588-8708-de36e87e86d6 ] Request (ImageNamespacesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.111s 2020-11-06 18:03:07.456 37 DEBUG tempest.lib.common.rest_client [req-34d316d0-0475-4588-8708-de36e87e86d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ImageNamespacesRbacTest-1230131181", "password": "S9#q@15+csQ5+R*", "project_id": "e86b1dc98c554ddaa96ac553798ea93c", "email": "tempest-ImageNamespacesRbacTest-949841158@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '401', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-34d316d0-0475-4588-8708-de36e87e86d6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "e86b1dc98c554ddaa96ac553798ea93c", "email": "tempest-ImageNamespacesRbacTest-949841158@example.com", "id": "df0cf2e5549349c9ad0b89f69f1e15a9", "name": "tempest-ImageNamespacesRbacTest-1230131181", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/df0cf2e5549349c9ad0b89f69f1e15a9"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:07.486 40 INFO tempest.lib.common.rest_client [req-f67556e7-d8a8-4e49-aba8-c397fda292bc ] Request (GroupV320RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.046s 2020-11-06 18:03:07.486 40 DEBUG tempest.lib.common.rest_client [req-f67556e7-d8a8-4e49-aba8-c397fda292bc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f67556e7-d8a8-4e49-aba8-c397fda292bc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:07.511 37 INFO tempest.lib.common.rest_client [req-0549ad04-d4cd-4290-8679-1c6ae6a0cfdd ] Request (ImageNamespacesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.054s 2020-11-06 18:03:07.512 37 DEBUG tempest.lib.common.rest_client [req-0549ad04-d4cd-4290-8679-1c6ae6a0cfdd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0549ad04-d4cd-4290-8679-1c6ae6a0cfdd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:07.545 40 INFO tempest.lib.common.rest_client [req-2215e4cb-b6e7-4644-b295-dab4a36bcd70 ] Request (GroupV320RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.057s 2020-11-06 18:03:07.545 40 DEBUG tempest.lib.common.rest_client [req-2215e4cb-b6e7-4644-b295-dab4a36bcd70 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-GroupV320RbacTest-1067859134-desc", "domain_id": "default", "name": "tempest-GroupV320RbacTest-1067859134"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '372', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2215e4cb-b6e7-4644-b295-dab4a36bcd70', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "ca807a97ef2a479dbef5d40d9c177679", "name": "tempest-GroupV320RbacTest-1067859134", "domain_id": "default", "description": "tempest-GroupV320RbacTest-1067859134-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/ca807a97ef2a479dbef5d40d9c177679"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:07.562 37 INFO tempest.lib.common.rest_client [req-08464a1e-ecb0-444f-96f8-cb5df15489bd ] Request (ImageNamespacesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.049s 2020-11-06 18:03:07.562 37 DEBUG tempest.lib.common.rest_client [req-08464a1e-ecb0-444f-96f8-cb5df15489bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-08464a1e-ecb0-444f-96f8-cb5df15489bd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:07.650 40 INFO tempest.lib.common.rest_client [req-21ea6e5f-2f7c-4053-98eb-c850ec4780e1 ] Request (GroupV320RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.103s 2020-11-06 18:03:07.650 40 DEBUG tempest.lib.common.rest_client [req-21ea6e5f-2f7c-4053-98eb-c850ec4780e1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-GroupV320RbacTest-1067859134", "password": "M9^@ncNe1L+Y#PP", "project_id": "ca807a97ef2a479dbef5d40d9c177679", "email": "tempest-GroupV320RbacTest-219581223@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '389', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-21ea6e5f-2f7c-4053-98eb-c850ec4780e1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "ca807a97ef2a479dbef5d40d9c177679", "email": "tempest-GroupV320RbacTest-219581223@example.com", "id": "f82060fe2fac452c868f6773d503eefd", "name": "tempest-GroupV320RbacTest-1067859134", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/f82060fe2fac452c868f6773d503eefd"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:07.682 37 INFO tempest.lib.common.rest_client [req-474ecf42-922f-4794-8861-8b43e337e120 ] Request (ImageNamespacesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/e86b1dc98c554ddaa96ac553798ea93c/users/df0cf2e5549349c9ad0b89f69f1e15a9/roles/72a4576c553448cd941b052c1ca0cf2d 0.119s 2020-11-06 18:03:07.683 37 DEBUG tempest.lib.common.rest_client [req-474ecf42-922f-4794-8861-8b43e337e120 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-474ecf42-922f-4794-8861-8b43e337e120', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e86b1dc98c554ddaa96ac553798ea93c/users/df0cf2e5549349c9ad0b89f69f1e15a9/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:07.683 37 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImageNamespacesRbacTest-1230131181', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'e86b1dc98c554ddaa96ac553798ea93c', 'project_name': 'tempest-ImageNamespacesRbacTest-1230131181', 'tenant_id': 'e86b1dc98c554ddaa96ac553798ea93c', 'tenant_name': 'tempest-ImageNamespacesRbacTest-1230131181', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'df0cf2e5549349c9ad0b89f69f1e15a9'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:07.684 37 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImageNamespacesRbacTest-1230131181', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'e86b1dc98c554ddaa96ac553798ea93c', 'project_name': 'tempest-ImageNamespacesRbacTest-1230131181', 'tenant_id': 'e86b1dc98c554ddaa96ac553798ea93c', 'tenant_name': 'tempest-ImageNamespacesRbacTest-1230131181', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'df0cf2e5549349c9ad0b89f69f1e15a9'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:07.702 40 INFO tempest.lib.common.rest_client [req-b1ff6b62-cd85-4706-a1a2-18f490de24e7 ] Request (GroupV320RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.050s 2020-11-06 18:03:07.702 40 DEBUG tempest.lib.common.rest_client [req-b1ff6b62-cd85-4706-a1a2-18f490de24e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b1ff6b62-cd85-4706-a1a2-18f490de24e7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:07.797 37 INFO tempest.lib.common.rest_client [req-f3426791-0a4b-4a2b-8b88-a7beea10e1a4 ] Request (ImageNamespacesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.100s 2020-11-06 18:03:07.797 40 INFO tempest.lib.common.rest_client [req-b6e73f2d-3633-4753-abaa-6c5d408937b5 ] Request (GroupV320RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.094s 2020-11-06 18:03:07.797 40 DEBUG tempest.lib.common.rest_client [req-b6e73f2d-3633-4753-abaa-6c5d408937b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b6e73f2d-3633-4753-abaa-6c5d408937b5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:07.797 37 DEBUG tempest.lib.common.rest_client [req-f3426791-0a4b-4a2b-8b88-a7beea10e1a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6577', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f3426791-0a4b-4a2b-8b88-a7beea10e1a4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "df0cf2e5549349c9ad0b89f69f1e15a9", "name": "tempest-ImageNamespacesRbacTest-1230131181", "password_expires_at": null}, "audit_ids": ["5h9tJSwfTjGBvDAnH7woRA"], "expires_at": "2020-11-06T19:03:07.000000Z", "issued_at": "2020-11-06T18:03:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e86b1dc98c554ddaa96ac553798ea93c", "name": "tempest-ImageNamespacesRbacTest-1230131181"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:07.840 37 INFO tempest.lib.common.rest_client [req-08961a9c-0019-4d95-b63e-c6cc77f6e00e ] Request (ImageNamespacesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-11-06 18:03:07.840 37 DEBUG tempest.lib.common.rest_client [req-08961a9c-0019-4d95-b63e-c6cc77f6e00e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-08961a9c-0019-4d95-b63e-c6cc77f6e00e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["B7rpYnvYTkGm-K0QA61esQ"], "expires_at": "2020-11-06T19:03:07.000000Z", "issued_at": "2020-11-06T18:03:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:07.854 38 INFO tempest.lib.common.rest_client [req-6046cdfd-e387-4563-b834-09186d156a38 ] Request (TrunksSubportsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/eac57475-383b-478c-bc92-98d4d552a7a2 0.705s 2020-11-06 18:03:07.855 38 DEBUG tempest.lib.common.rest_client [req-6046cdfd-e387-4563-b834-09186d156a38 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-6046cdfd-e387-4563-b834-09186d156a38', 'date': 'Fri, 06 Nov 2020 18:03:07 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/eac57475-383b-478c-bc92-98d4d552a7a2'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:07.875 40 INFO tempest.lib.common.rest_client [req-79f4823f-5474-4d8c-b910-160b17bacf24 ] Request (GroupV320RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/ca807a97ef2a479dbef5d40d9c177679/users/f82060fe2fac452c868f6773d503eefd/roles/72a4576c553448cd941b052c1ca0cf2d 0.076s 2020-11-06 18:03:07.875 40 DEBUG tempest.lib.common.rest_client [req-79f4823f-5474-4d8c-b910-160b17bacf24 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-79f4823f-5474-4d8c-b910-160b17bacf24', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ca807a97ef2a479dbef5d40d9c177679/users/f82060fe2fac452c868f6773d503eefd/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:07.876 40 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-GroupV320RbacTest-1067859134', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'ca807a97ef2a479dbef5d40d9c177679', 'project_name': 'tempest-GroupV320RbacTest-1067859134', 'tenant_id': 'ca807a97ef2a479dbef5d40d9c177679', 'tenant_name': 'tempest-GroupV320RbacTest-1067859134', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'f82060fe2fac452c868f6773d503eefd'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:07.876 40 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-GroupV320RbacTest-1067859134', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'ca807a97ef2a479dbef5d40d9c177679', 'project_name': 'tempest-GroupV320RbacTest-1067859134', 'tenant_id': 'ca807a97ef2a479dbef5d40d9c177679', 'tenant_name': 'tempest-GroupV320RbacTest-1067859134', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'f82060fe2fac452c868f6773d503eefd'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:07.944 37 INFO tempest.lib.common.rest_client [req-3006b00d-d6e6-461a-85c3-513766d56ac8 ] Request (ImageNamespacesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-11-06 18:03:07.945 37 DEBUG tempest.lib.common.rest_client [req-3006b00d-d6e6-461a-85c3-513766d56ac8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3006b00d-d6e6-461a-85c3-513766d56ac8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["DJu0WLwMSaSnxhOebS6W2g"], "expires_at": "2020-11-06T19:03:07.000000Z", "issued_at": "2020-11-06T18:03:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:07.970 39 INFO tempest.lib.common.rest_client [req-2a661cc9-6852-4e88-9319-f7b83ebb08a5 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.188s 2020-11-06 18:03:07.970 39 DEBUG tempest.lib.common.rest_client [req-2a661cc9-6852-4e88-9319-f7b83ebb08a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2a661cc9-6852-4e88-9319-f7b83ebb08a5', 'x-compute-request-id': 'req-2a661cc9-6852-4e88-9319-f7b83ebb08a5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:07.986 38 INFO tempest.lib.common.rest_client [req-5ee78a20-2d66-4b42-ab83-3c364777c911 ] Request (TrunksSubportsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/trunks/8d195501-53fd-4593-ac46-caffd5b4ed30 0.130s 2020-11-06 18:03:07.986 38 DEBUG tempest.lib.common.rest_client [req-5ee78a20-2d66-4b42-ab83-3c364777c911 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-5ee78a20-2d66-4b42-ab83-3c364777c911', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:03:07 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks/8d195501-53fd-4593-ac46-caffd5b4ed30'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:07.996 37 INFO tempest.lib.common.rest_client [req-269ebcf7-76da-4627-9cd8-82e3f0e8c837 ] Request (ImageNamespacesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.050s 2020-11-06 18:03:07.996 37 DEBUG tempest.lib.common.rest_client [req-269ebcf7-76da-4627-9cd8-82e3f0e8c837 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-269ebcf7-76da-4627-9cd8-82e3f0e8c837', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:08.003 40 INFO tempest.lib.common.rest_client [req-e7a1d336-05b8-42ae-a8f9-e72748576fbc ] Request (GroupV320RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.117s 2020-11-06 18:03:08.004 40 DEBUG tempest.lib.common.rest_client [req-e7a1d336-05b8-42ae-a8f9-e72748576fbc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6565', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e7a1d336-05b8-42ae-a8f9-e72748576fbc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f82060fe2fac452c868f6773d503eefd", "name": "tempest-GroupV320RbacTest-1067859134", "password_expires_at": null}, "audit_ids": ["trhafl4wRMW42hbQ1L1Sqg"], "expires_at": "2020-11-06T19:03:07.000000Z", "issued_at": "2020-11-06T18:03:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ca807a97ef2a479dbef5d40d9c177679", "name": "tempest-GroupV320RbacTest-1067859134"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ca807a97ef2a479dbef5d40d9c177679", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ca807a97ef2a479dbef5d40d9c177679", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ca807a97ef2a479dbef5d40d9c177679", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ca807a97ef2a479dbef5d40d9c177679", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ca807a97ef2a479dbef5d40d9c177679", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ca807a97ef2a479dbef5d40d9c177679", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:08.043 40 INFO tempest.lib.common.rest_client [req-fa34c700-1d68-4482-b461-fb16c947309b ] Request (GroupV320RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:03:08.043 40 DEBUG tempest.lib.common.rest_client [req-fa34c700-1d68-4482-b461-fb16c947309b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fa34c700-1d68-4482-b461-fb16c947309b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["zrvcQ0s9QXOKGIDNY6OMmg"], "expires_at": "2020-11-06T19:03:08.000000Z", "issued_at": "2020-11-06T18:03:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:08.055 37 INFO tempest.lib.common.rest_client [req-464f4f72-4f2d-4d1d-a8cd-a9d4dd44327e ] Request (ImageNamespacesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.058s 2020-11-06 18:03:08.056 37 DEBUG tempest.lib.common.rest_client [req-464f4f72-4f2d-4d1d-a8cd-a9d4dd44327e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-464f4f72-4f2d-4d1d-a8cd-a9d4dd44327e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:08.056 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:03:08.057 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:08.092 40 INFO tempest.lib.common.rest_client [req-dd57ed46-2a2b-4920-aa5e-92545d45ea0c ] Request (GroupV320RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:03:08.092 40 DEBUG tempest.lib.common.rest_client [req-dd57ed46-2a2b-4920-aa5e-92545d45ea0c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dd57ed46-2a2b-4920-aa5e-92545d45ea0c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["deXdjB5lTsWLL6U22ciNnw"], "expires_at": "2020-11-06T19:03:08.000000Z", "issued_at": "2020-11-06T18:03:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:08.104 37 INFO tempest.lib.common.rest_client [req-f1f6cd00-5eac-4456-8937-966a2a2bb2bc ] Request (ImageNamespacesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/e86b1dc98c554ddaa96ac553798ea93c/users/df0cf2e5549349c9ad0b89f69f1e15a9/roles 0.046s 2020-11-06 18:03:08.104 37 DEBUG tempest.lib.common.rest_client [req-f1f6cd00-5eac-4456-8937-966a2a2bb2bc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f1f6cd00-5eac-4456-8937-966a2a2bb2bc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e86b1dc98c554ddaa96ac553798ea93c/users/df0cf2e5549349c9ad0b89f69f1e15a9/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e86b1dc98c554ddaa96ac553798ea93c/users/df0cf2e5549349c9ad0b89f69f1e15a9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:08.155 40 INFO tempest.lib.common.rest_client [req-c04255d8-e9b1-4622-9b7e-1042e7bd29e1 ] Request (GroupV320RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.061s 2020-11-06 18:03:08.155 40 DEBUG tempest.lib.common.rest_client [req-c04255d8-e9b1-4622-9b7e-1042e7bd29e1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c04255d8-e9b1-4622-9b7e-1042e7bd29e1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:08.163 37 INFO tempest.lib.common.rest_client [req-6142de54-f2ce-4f8f-a14e-35c3b73d9e85 ] Request (ImageNamespacesRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/e86b1dc98c554ddaa96ac553798ea93c/users/df0cf2e5549349c9ad0b89f69f1e15a9/roles/72a4576c553448cd941b052c1ca0cf2d 0.057s 2020-11-06 18:03:08.163 37 DEBUG tempest.lib.common.rest_client [req-6142de54-f2ce-4f8f-a14e-35c3b73d9e85 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6142de54-f2ce-4f8f-a14e-35c3b73d9e85', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e86b1dc98c554ddaa96ac553798ea93c/users/df0cf2e5549349c9ad0b89f69f1e15a9/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:08.245 40 INFO tempest.lib.common.rest_client [req-c0cc7b12-663d-466a-82bb-ce72a04f384e ] Request (GroupV320RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.089s 2020-11-06 18:03:08.246 40 DEBUG tempest.lib.common.rest_client [req-c0cc7b12-663d-466a-82bb-ce72a04f384e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c0cc7b12-663d-466a-82bb-ce72a04f384e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:08.246 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:03:08.247 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:08.280 37 INFO tempest.lib.common.rest_client [req-923bdd0b-d4cc-4e59-a527-4ab8210f7c10 ] Request (ImageNamespacesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/e86b1dc98c554ddaa96ac553798ea93c/users/df0cf2e5549349c9ad0b89f69f1e15a9/roles/a629c95d64b3416fb80ae90af4f69c05 0.116s 2020-11-06 18:03:08.281 37 DEBUG tempest.lib.common.rest_client [req-923bdd0b-d4cc-4e59-a527-4ab8210f7c10 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-923bdd0b-d4cc-4e59-a527-4ab8210f7c10', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e86b1dc98c554ddaa96ac553798ea93c/users/df0cf2e5549349c9ad0b89f69f1e15a9/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:08.299 40 INFO tempest.lib.common.rest_client [req-0b5bcb54-b091-4039-bdf5-173c46d6d7a7 ] Request (GroupV320RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/ca807a97ef2a479dbef5d40d9c177679/users/f82060fe2fac452c868f6773d503eefd/roles 0.052s 2020-11-06 18:03:08.300 40 DEBUG tempest.lib.common.rest_client [req-0b5bcb54-b091-4039-bdf5-173c46d6d7a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0b5bcb54-b091-4039-bdf5-173c46d6d7a7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ca807a97ef2a479dbef5d40d9c177679/users/f82060fe2fac452c868f6773d503eefd/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ca807a97ef2a479dbef5d40d9c177679/users/f82060fe2fac452c868f6773d503eefd/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:08.422 40 INFO tempest.lib.common.rest_client [req-20f3099c-7ce4-4036-8c78-e2997e98d2c1 ] Request (GroupV320RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/ca807a97ef2a479dbef5d40d9c177679/users/f82060fe2fac452c868f6773d503eefd/roles/72a4576c553448cd941b052c1ca0cf2d 0.122s 2020-11-06 18:03:08.423 40 DEBUG tempest.lib.common.rest_client [req-20f3099c-7ce4-4036-8c78-e2997e98d2c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-20f3099c-7ce4-4036-8c78-e2997e98d2c1', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ca807a97ef2a479dbef5d40d9c177679/users/f82060fe2fac452c868f6773d503eefd/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:08.464 38 INFO tempest.lib.common.rest_client [req-6c605b52-1c78-448a-a548-50d344d0b1a9 ] Request (TrunksSubportsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/1cf7d780-da86-4e15-a44d-a606e913bbf7 0.477s 2020-11-06 18:03:08.465 38 DEBUG tempest.lib.common.rest_client [req-6c605b52-1c78-448a-a548-50d344d0b1a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-6c605b52-1c78-448a-a548-50d344d0b1a9', 'date': 'Fri, 06 Nov 2020 18:03:08 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/1cf7d780-da86-4e15-a44d-a606e913bbf7'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:08.535 40 INFO tempest.lib.common.rest_client [req-c1fb2cd8-60d2-4cf9-9092-af3ef7a2af67 ] Request (GroupV320RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/ca807a97ef2a479dbef5d40d9c177679/users/f82060fe2fac452c868f6773d503eefd/roles/a629c95d64b3416fb80ae90af4f69c05 0.111s 2020-11-06 18:03:08.535 40 DEBUG tempest.lib.common.rest_client [req-c1fb2cd8-60d2-4cf9-9092-af3ef7a2af67 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c1fb2cd8-60d2-4cf9-9092-af3ef7a2af67', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ca807a97ef2a479dbef5d40d9c177679/users/f82060fe2fac452c868f6773d503eefd/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:09.151 38 INFO tempest.lib.common.rest_client [req-1d7fdb48-acdd-4e07-ad55-2cd7b8688a66 ] Request (TrunksSubportsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/3f5df315-73c9-4c55-be39-b3d182cd9571 0.685s 2020-11-06 18:03:09.152 38 DEBUG tempest.lib.common.rest_client [req-1d7fdb48-acdd-4e07-ad55-2cd7b8688a66 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-1d7fdb48-acdd-4e07-ad55-2cd7b8688a66', 'date': 'Fri, 06 Nov 2020 18:03:09 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/3f5df315-73c9-4c55-be39-b3d182cd9571'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:09.191 39 INFO tempest.lib.common.rest_client [req-39d0bd53-0eab-4f68-b2e0-dd3c98ffa72d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.204s 2020-11-06 18:03:09.192 39 DEBUG tempest.lib.common.rest_client [req-39d0bd53-0eab-4f68-b2e0-dd3c98ffa72d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-39d0bd53-0eab-4f68-b2e0-dd3c98ffa72d', 'x-compute-request-id': 'req-39d0bd53-0eab-4f68-b2e0-dd3c98ffa72d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:09.342 38 INFO tempest.lib.common.rest_client [req-3040e189-4bd0-459b-83f4-3e75e9ee5a28 ] Request (TrunksSubportsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/db2c6e8f5df242e39dfaed83d67b8c4f 0.189s 2020-11-06 18:03:09.343 38 DEBUG tempest.lib.common.rest_client [req-3040e189-4bd0-459b-83f4-3e75e9ee5a28 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3040e189-4bd0-459b-83f4-3e75e9ee5a28', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/db2c6e8f5df242e39dfaed83d67b8c4f'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:09.360 37 INFO tempest.lib.common.rest_client [req-41fe30b8-a169-4c49-bcaf-c9c7b84ab9f1 ] Request (ImageNamespacesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.077s 2020-11-06 18:03:09.360 37 DEBUG tempest.lib.common.rest_client [req-41fe30b8-a169-4c49-bcaf-c9c7b84ab9f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-41fe30b8-a169-4c49-bcaf-c9c7b84ab9f1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "df0cf2e5549349c9ad0b89f69f1e15a9", "name": "tempest-ImageNamespacesRbacTest-1230131181", "password_expires_at": null}, "audit_ids": ["U_izvqT3QlO80TW_f0F-bw"], "expires_at": "2020-11-06T19:03:09.000000Z", "issued_at": "2020-11-06T18:03:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e86b1dc98c554ddaa96ac553798ea93c", "name": "tempest-ImageNamespacesRbacTest-1230131181"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:09.362 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:09.370 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:09.371 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: add_metadef_namespace, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:09.371 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:09.426 38 INFO tempest.lib.common.rest_client [req-59688c88-1dde-4ca2-b58f-f2413892e4e4 ] Request (TrunksSubportsExtRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 18:03:09.427 38 DEBUG tempest.lib.common.rest_client [req-59688c88-1dde-4ca2-b58f-f2413892e4e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-59688c88-1dde-4ca2-b58f-f2413892e4e4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["8UPRZ4bfSyyylqCl73w2iw"], "expires_at": "2020-11-06T19:03:09.000000Z", "issued_at": "2020-11-06T18:03:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:09.467 37 INFO tempest.lib.common.rest_client [req-50bcf4de-803b-4366-936d-704a846e75e1 ] Request (ImageNamespacesRbacTest:test_create_metadef_namespace): 200 GET http://172.30.13.94/identity/v3/projects/e86b1dc98c554ddaa96ac553798ea93c/users/df0cf2e5549349c9ad0b89f69f1e15a9/roles 0.095s 2020-11-06 18:03:09.467 37 DEBUG tempest.lib.common.rest_client [req-50bcf4de-803b-4366-936d-704a846e75e1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-50bcf4de-803b-4366-936d-704a846e75e1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e86b1dc98c554ddaa96ac553798ea93c/users/df0cf2e5549349c9ad0b89f69f1e15a9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e86b1dc98c554ddaa96ac553798ea93c/users/df0cf2e5549349c9ad0b89f69f1e15a9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:09.546 37 INFO tempest.lib.common.rest_client [req-6485fbf4-22b9-40b7-a460-f3ef2e07b5c3 ] Request (ImageNamespacesRbacTest:test_create_metadef_namespace): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-11-06 18:03:09.547 37 DEBUG tempest.lib.common.rest_client [req-6485fbf4-22b9-40b7-a460-f3ef2e07b5c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6485fbf4-22b9-40b7-a460-f3ef2e07b5c3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "df0cf2e5549349c9ad0b89f69f1e15a9", "name": "tempest-ImageNamespacesRbacTest-1230131181", "password_expires_at": null}, "audit_ids": ["_n8EuDXXRz-eHXw5arl_OA"], "expires_at": "2020-11-06T19:03:09.000000Z", "issued_at": "2020-11-06T18:03:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e86b1dc98c554ddaa96ac553798ea93c", "name": "tempest-ImageNamespacesRbacTest-1230131181"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:09.624 40 INFO tempest.lib.common.rest_client [req-72e73f5e-c9ca-4696-b40e-a8159f355f9f ] Request (GroupV320RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-11-06 18:03:09.624 40 DEBUG tempest.lib.common.rest_client [req-72e73f5e-c9ca-4696-b40e-a8159f355f9f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-72e73f5e-c9ca-4696-b40e-a8159f355f9f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f82060fe2fac452c868f6773d503eefd", "name": "tempest-GroupV320RbacTest-1067859134", "password_expires_at": null}, "audit_ids": ["gCuK2pu4SzWw3ORDV90G4Q"], "expires_at": "2020-11-06T19:03:09.000000Z", "issued_at": "2020-11-06T18:03:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ca807a97ef2a479dbef5d40d9c177679", "name": "tempest-GroupV320RbacTest-1067859134"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ca807a97ef2a479dbef5d40d9c177679", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ca807a97ef2a479dbef5d40d9c177679", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ca807a97ef2a479dbef5d40d9c177679", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ca807a97ef2a479dbef5d40d9c177679", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ca807a97ef2a479dbef5d40d9c177679", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ca807a97ef2a479dbef5d40d9c177679", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:09.637 38 INFO tempest.lib.common.rest_client [req-5fd78865-ffc3-42fe-b73e-fc334b0894ab ] Request (TrunksSubportsExtRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=e9287ae5ba59491ebbe5e823539122c6&name=default 0.209s 2020-11-06 18:03:09.638 38 DEBUG tempest.lib.common.rest_client [req-5fd78865-ffc3-42fe-b73e-fc334b0894ab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-5fd78865-ffc3-42fe-b73e-fc334b0894ab', 'date': 'Fri, 06 Nov 2020 18:03:09 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=e9287ae5ba59491ebbe5e823539122c6&name=default'} Body: b'{"security_groups": [{"id": "3ff7f6cf-5e80-4ef4-b40b-a8fe135916bc", "name": "default", "stateful": true, "tenant_id": "e9287ae5ba59491ebbe5e823539122c6", "description": "Default security group", "security_group_rules": [{"id": "26018591-2d32-49fb-afae-b9257ac1d3b9", "tenant_id": "e9287ae5ba59491ebbe5e823539122c6", "security_group_id": "3ff7f6cf-5e80-4ef4-b40b-a8fe135916bc", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "3ff7f6cf-5e80-4ef4-b40b-a8fe135916bc", "description": null, "tags": [], "created_at": "2020-11-06T18:02:52Z", "updated_at": "2020-11-06T18:02:52Z", "revision_number": 0, "project_id": "e9287ae5ba59491ebbe5e823539122c6"}, {"id": "2aa3438d-31ee-4ac5-b626-303d0b4bbef1", "tenant_id": "e9287ae5ba59491ebbe5e823539122c6", "security_group_id": "3ff7f6cf-5e80-4ef4-b40b-a8fe135916bc", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:02:52Z", "updated_at": "2020-11-06T18:02:52Z", "revision_number": 0, "project_id": "e9287ae5ba59491ebbe5e823539122c6"}, {"id": "92971fef-483b-4d3d-93f3-007b0a1d42e0", "tenant_id": "e9287ae5ba59491ebbe5e823539122c6", "security_group_id": "3ff7f6cf-5e80-4ef4-b40b-a8fe135916bc", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "3ff7f6cf-5e80-4ef4-b40b-a8fe135916bc", "description": null, "tags": [], "created_at": "2020-11-06T18:02:52Z", "updated_at": "2020-11-06T18:02:52Z", "revision_number": 0, "project_id": "e9287ae5ba59491ebbe5e823539122c6"}, {"id": "a3b1f94c-3dd5-4465-92a6-6f4344830e0f", "tenant_id": "e9287ae5ba59491ebbe5e823539122c6", "security_group_id": "3ff7f6cf-5e80-4ef4-b40b-a8fe135916bc", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:02:52Z", "updated_at": "2020-11-06T18:02:52Z", "revision_number": 0, "project_id": "e9287ae5ba59491ebbe5e823539122c6"}], "tags": [], "created_at": "2020-11-06T18:02:52Z", "updated_at": "2020-11-06T18:02:52Z", "revision_number": 1, "project_id": "e9287ae5ba59491ebbe5e823539122c6"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:09.731 37 INFO tempest.lib.common.rest_client [req-e7df4acf-dd71-4fdd-ac5a-d5498c5447f5 ] Request (ImageNamespacesRbacTest:test_create_metadef_namespace): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces 0.183s 2020-11-06 18:03:09.732 37 DEBUG tempest.lib.common.rest_client [req-e7df4acf-dd71-4fdd-ac5a-d5498c5447f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"namespace": "tempest-ImageNamespacesRbacTest-test-ns-361289648", "protected": false} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '361', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/metadefs/namespaces/tempest-ImageNamespacesRbacTest-test-ns-361289648', 'x-openstack-request-id': 'req-e7df4acf-dd71-4fdd-ac5a-d5498c5447f5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces'} Body: b'{"namespace": "tempest-ImageNamespacesRbacTest-test-ns-361289648", "visibility": "private", "protected": false, "owner": "e86b1dc98c554ddaa96ac553798ea93c", "created_at": "2020-11-06T18:03:09Z", "updated_at": "2020-11-06T18:03:09Z", "self": "/v2/metadefs/namespaces/tempest-ImageNamespacesRbacTest-test-ns-361289648", "schema": "/v2/schemas/metadefs/namespace"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:09.733 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:09.762 38 INFO tempest.lib.common.rest_client [req-c502e721-bf2a-4d66-a46b-e72df29a8f93 ] Request (TrunksSubportsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/3ff7f6cf-5e80-4ef4-b40b-a8fe135916bc 0.124s 2020-11-06 18:03:09.763 38 DEBUG tempest.lib.common.rest_client [req-c502e721-bf2a-4d66-a46b-e72df29a8f93 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-c502e721-bf2a-4d66-a46b-e72df29a8f93', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:03:09 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/3ff7f6cf-5e80-4ef4-b40b-a8fe135916bc'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:09.785 37 INFO tempest.lib.common.rest_client [req-ed29218f-6ee6-48aa-92de-a397d5e1b685 ] Request (ImageNamespacesRbacTest:test_create_metadef_namespace): 200 GET http://172.30.13.94/identity/v3/projects/e86b1dc98c554ddaa96ac553798ea93c/users/df0cf2e5549349c9ad0b89f69f1e15a9/roles 0.052s 2020-11-06 18:03:09.786 37 DEBUG tempest.lib.common.rest_client [req-ed29218f-6ee6-48aa-92de-a397d5e1b685 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ed29218f-6ee6-48aa-92de-a397d5e1b685', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e86b1dc98c554ddaa96ac553798ea93c/users/df0cf2e5549349c9ad0b89f69f1e15a9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e86b1dc98c554ddaa96ac553798ea93c/users/df0cf2e5549349c9ad0b89f69f1e15a9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:09.824 40 INFO tempest.lib.common.rest_client [req-de9fcdf3-1411-443f-8cc2-8b037962d8dd ] Request (GroupV320RbacTest:setUp): 200 POST http://172.30.13.94/volume/v3/ca807a97ef2a479dbef5d40d9c177679/types 0.197s 2020-11-06 18:03:09.825 40 DEBUG tempest.lib.common.rest_client [req-de9fcdf3-1411-443f-8cc2-8b037962d8dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-GroupV320RbacTest-volume-type-2140747765"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-de9fcdf3-1411-443f-8cc2-8b037962d8dd', 'content-length': '223', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-de9fcdf3-1411-443f-8cc2-8b037962d8dd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ca807a97ef2a479dbef5d40d9c177679/types'} Body: b'{"volume_type": {"id": "0e983592-dd2e-4654-839b-55818f5e828c", "name": "tempest-GroupV320RbacTest-volume-type-2140747765", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:09.827 37 INFO tempest.lib.common.rest_client [req-f2803c93-69d0-467c-92e4-5d722fa8b3af ] Request (ImageNamespacesRbacTest:test_create_metadef_namespace): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:03:09.828 37 DEBUG tempest.lib.common.rest_client [req-f2803c93-69d0-467c-92e4-5d722fa8b3af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f2803c93-69d0-467c-92e4-5d722fa8b3af', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "df0cf2e5549349c9ad0b89f69f1e15a9", "name": "tempest-ImageNamespacesRbacTest-1230131181", "password_expires_at": null}, "audit_ids": ["C0E9FLbDQQSU9aMCIi5LWw"], "expires_at": "2020-11-06T19:03:09.000000Z", "issued_at": "2020-11-06T18:03:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e86b1dc98c554ddaa96ac553798ea93c", "name": "tempest-ImageNamespacesRbacTest-1230131181"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:09.873 38 INFO tempest.lib.common.rest_client [req-3a162246-f678-4835-b8fc-5846c1a654be ] Request (TrunksSubportsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/e9287ae5ba59491ebbe5e823539122c6 0.109s 2020-11-06 18:03:09.874 38 DEBUG tempest.lib.common.rest_client [req-3a162246-f678-4835-b8fc-5846c1a654be ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3a162246-f678-4835-b8fc-5846c1a654be', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e9287ae5ba59491ebbe5e823539122c6'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:09.880 40 INFO tempest.lib.common.rest_client [req-6528ba50-9a0f-4832-8430-7804a41739eb ] Request (GroupV320RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/ca807a97ef2a479dbef5d40d9c177679/group_types 0.050s 2020-11-06 18:03:09.880 40 DEBUG tempest.lib.common.rest_client [req-6528ba50-9a0f-4832-8430-7804a41739eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.20', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupV320RbacTest-group-type-335551492"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6528ba50-9a0f-4832-8430-7804a41739eb', 'content-length': '179', 'openstack-api-version': 'volume 3.20', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6528ba50-9a0f-4832-8430-7804a41739eb', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ca807a97ef2a479dbef5d40d9c177679/group_types'} Body: b'{"group_type": {"id": "643ae4a6-65d5-42d1-b4f1-ea0278eb8d73", "name": "tempest-GroupV320RbacTest-group-type-335551492", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:09.883 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:09.886 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:reset_status, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:09.968 38 INFO tempest.lib.common.rest_client [req-31776f37-52db-4ca3-a096-63410bc062a7 ] Request (CapabilitiesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-11-06 18:03:09.968 38 DEBUG tempest.lib.common.rest_client [req-31776f37-52db-4ca3-a096-63410bc062a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-31776f37-52db-4ca3-a096-63410bc062a7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["Roo9IobnQum4gHGj29qPyQ"], "expires_at": "2020-11-06T19:03:09.000000Z", "issued_at": "2020-11-06T18:03:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:10.010 38 INFO tempest.lib.common.rest_client [req-a967c62b-3ef0-4b4e-8b95-b9bb5c433f4c ] Request (CapabilitiesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:03:10.011 38 DEBUG tempest.lib.common.rest_client [req-a967c62b-3ef0-4b4e-8b95-b9bb5c433f4c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a967c62b-3ef0-4b4e-8b95-b9bb5c433f4c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["d8pYkrTtQMShtsr09wlFTg"], "expires_at": "2020-11-06T19:03:10.000000Z", "issued_at": "2020-11-06T18:03:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:10.018 40 INFO tempest.lib.common.rest_client [req-783be129-df71-4f0c-8573-5a11bd4b51e8 ] Request (GroupV320RbacTest:test_reset_group_status): 202 POST http://172.30.13.94/volume/v3/ca807a97ef2a479dbef5d40d9c177679/groups 0.131s 2020-11-06 18:03:10.019 40 DEBUG tempest.lib.common.rest_client [req-783be129-df71-4f0c-8573-5a11bd4b51e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.20', 'X-Auth-Token': ''} Body: {"group": {"name": "tempest-GroupV320RbacTest-Group-1519559994", "group_type": "643ae4a6-65d5-42d1-b4f1-ea0278eb8d73", "volume_types": ["0e983592-dd2e-4654-839b-55818f5e828c"]}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-783be129-df71-4f0c-8573-5a11bd4b51e8', 'content-length': '111', 'openstack-api-version': 'volume 3.20', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-783be129-df71-4f0c-8573-5a11bd4b51e8', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ca807a97ef2a479dbef5d40d9c177679/groups'} Body: b'{"group": {"id": "22038613-8f76-449a-8c30-97eccd1b0626", "name": "tempest-GroupV320RbacTest-Group-1519559994"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:10.035 37 INFO tempest.lib.common.rest_client [req-d375c4a0-653c-4d7b-bf6e-46211f4bc18a ] Request (ImageNamespacesRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-ImageNamespacesRbacTest-test-ns-361289648 0.206s 2020-11-06 18:03:10.036 37 DEBUG tempest.lib.common.rest_client [req-d375c4a0-653c-4d7b-bf6e-46211f4bc18a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-d375c4a0-653c-4d7b-bf6e-46211f4bc18a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-ImageNamespacesRbacTest-test-ns-361289648'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:10.038 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:10.039 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:10.040 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_metadef_namespaces, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:10.041 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:10.060 40 INFO tempest.lib.common.rest_client [req-d1ea24f0-0cc7-4631-a8c5-138b213db5ca ] Request (GroupV320RbacTest:test_reset_group_status): 200 GET http://172.30.13.94/volume/v3/ca807a97ef2a479dbef5d40d9c177679/groups/22038613-8f76-449a-8c30-97eccd1b0626 0.037s 2020-11-06 18:03:10.060 40 DEBUG tempest.lib.common.rest_client [req-d1ea24f0-0cc7-4631-a8c5-138b213db5ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.20', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d1ea24f0-0cc7-4631-a8c5-138b213db5ca', 'content-length': '391', 'openstack-api-version': 'volume 3.20', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d1ea24f0-0cc7-4631-a8c5-138b213db5ca', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ca807a97ef2a479dbef5d40d9c177679/groups/22038613-8f76-449a-8c30-97eccd1b0626'} Body: b'{"group": {"id": "22038613-8f76-449a-8c30-97eccd1b0626", "status": "creating", "availability_zone": "nova", "created_at": "2020-11-06T18:03:10.000000", "name": "tempest-GroupV320RbacTest-Group-1519559994", "description": null, "group_type": "643ae4a6-65d5-42d1-b4f1-ea0278eb8d73", "volume_types": ["0e983592-dd2e-4654-839b-55818f5e828c"], "group_snapshot_id": null, "source_group_id": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:10.072 38 INFO tempest.lib.common.rest_client [req-f8595160-2483-46da-985c-acaf0bc57cd8 ] Request (CapabilitiesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.061s 2020-11-06 18:03:10.073 38 DEBUG tempest.lib.common.rest_client [req-f8595160-2483-46da-985c-acaf0bc57cd8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f8595160-2483-46da-985c-acaf0bc57cd8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:10.090 37 INFO tempest.lib.common.rest_client [req-4f09c413-3bfe-4e37-ab6e-f9e52482468f ] Request (ImageNamespacesRbacTest:test_list_metadef_namespaces): 200 GET http://172.30.13.94/identity/v3/projects/e86b1dc98c554ddaa96ac553798ea93c/users/df0cf2e5549349c9ad0b89f69f1e15a9/roles 0.048s 2020-11-06 18:03:10.090 37 DEBUG tempest.lib.common.rest_client [req-4f09c413-3bfe-4e37-ab6e-f9e52482468f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4f09c413-3bfe-4e37-ab6e-f9e52482468f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e86b1dc98c554ddaa96ac553798ea93c/users/df0cf2e5549349c9ad0b89f69f1e15a9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e86b1dc98c554ddaa96ac553798ea93c/users/df0cf2e5549349c9ad0b89f69f1e15a9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:10.125 37 INFO tempest.lib.common.rest_client [req-6be134d5-0ebd-4c8a-bb8d-7b8ad1f20da6 ] Request (ImageNamespacesRbacTest:test_list_metadef_namespaces): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:03:10.125 37 DEBUG tempest.lib.common.rest_client [req-6be134d5-0ebd-4c8a-bb8d-7b8ad1f20da6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6be134d5-0ebd-4c8a-bb8d-7b8ad1f20da6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "df0cf2e5549349c9ad0b89f69f1e15a9", "name": "tempest-ImageNamespacesRbacTest-1230131181", "password_expires_at": null}, "audit_ids": ["LxLThOSIS8em0wIAQ6Xh5A"], "expires_at": "2020-11-06T19:03:10.000000Z", "issued_at": "2020-11-06T18:03:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e86b1dc98c554ddaa96ac553798ea93c", "name": "tempest-ImageNamespacesRbacTest-1230131181"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:10.131 38 INFO tempest.lib.common.rest_client [req-1fc357c2-f6f0-4d85-bc31-e96174aa8d35 ] Request (CapabilitiesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.057s 2020-11-06 18:03:10.132 38 DEBUG tempest.lib.common.rest_client [req-1fc357c2-f6f0-4d85-bc31-e96174aa8d35 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-CapabilitiesV3RbacTest-1856786013-desc", "domain_id": "default", "name": "tempest-CapabilitiesV3RbacTest-1856786013"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '382', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1fc357c2-f6f0-4d85-bc31-e96174aa8d35', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "b66ec366c93245f0ba7fe013169aa36c", "name": "tempest-CapabilitiesV3RbacTest-1856786013", "domain_id": "default", "description": "tempest-CapabilitiesV3RbacTest-1856786013-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/b66ec366c93245f0ba7fe013169aa36c"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:10.237 38 INFO tempest.lib.common.rest_client [req-6c0e6320-989e-4d48-9761-8a3a1071c71b ] Request (CapabilitiesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.104s 2020-11-06 18:03:10.238 38 DEBUG tempest.lib.common.rest_client [req-6c0e6320-989e-4d48-9761-8a3a1071c71b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-CapabilitiesV3RbacTest-1856786013", "password": "O5~h&FWEhaZUm8y", "project_id": "b66ec366c93245f0ba7fe013169aa36c", "email": "tempest-CapabilitiesV3RbacTest-2106443413@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '400', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6c0e6320-989e-4d48-9761-8a3a1071c71b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "b66ec366c93245f0ba7fe013169aa36c", "email": "tempest-CapabilitiesV3RbacTest-2106443413@example.com", "id": "eed40568495a45d09a6931235ab76d69", "name": "tempest-CapabilitiesV3RbacTest-1856786013", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/eed40568495a45d09a6931235ab76d69"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:10.285 38 INFO tempest.lib.common.rest_client [req-126cc380-768b-49c6-85a9-3c609399be91 ] Request (CapabilitiesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.046s 2020-11-06 18:03:10.285 38 DEBUG tempest.lib.common.rest_client [req-126cc380-768b-49c6-85a9-3c609399be91 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-126cc380-768b-49c6-85a9-3c609399be91', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:10.341 38 INFO tempest.lib.common.rest_client [req-6e39453b-2545-496a-9b57-95fefdc2a93a ] Request (CapabilitiesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-11-06 18:03:10.342 38 DEBUG tempest.lib.common.rest_client [req-6e39453b-2545-496a-9b57-95fefdc2a93a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6e39453b-2545-496a-9b57-95fefdc2a93a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:10.412 38 INFO tempest.lib.common.rest_client [req-2b534fa2-5ec7-4aee-9299-60874c056326 ] Request (CapabilitiesV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/b66ec366c93245f0ba7fe013169aa36c/users/eed40568495a45d09a6931235ab76d69/roles/72a4576c553448cd941b052c1ca0cf2d 0.068s 2020-11-06 18:03:10.412 38 DEBUG tempest.lib.common.rest_client [req-2b534fa2-5ec7-4aee-9299-60874c056326 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2b534fa2-5ec7-4aee-9299-60874c056326', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/b66ec366c93245f0ba7fe013169aa36c/users/eed40568495a45d09a6931235ab76d69/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:10.413 38 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-CapabilitiesV3RbacTest-1856786013', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'b66ec366c93245f0ba7fe013169aa36c', 'project_name': 'tempest-CapabilitiesV3RbacTest-1856786013', 'tenant_id': 'b66ec366c93245f0ba7fe013169aa36c', 'tenant_name': 'tempest-CapabilitiesV3RbacTest-1856786013', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'eed40568495a45d09a6931235ab76d69'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:10.413 38 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-CapabilitiesV3RbacTest-1856786013', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'b66ec366c93245f0ba7fe013169aa36c', 'project_name': 'tempest-CapabilitiesV3RbacTest-1856786013', 'tenant_id': 'b66ec366c93245f0ba7fe013169aa36c', 'tenant_name': 'tempest-CapabilitiesV3RbacTest-1856786013', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'eed40568495a45d09a6931235ab76d69'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:10.439 39 INFO tempest.lib.common.rest_client [req-b20d389f-87e4-4514-86c6-9f567ccae587 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.231s 2020-11-06 18:03:10.440 39 DEBUG tempest.lib.common.rest_client [req-b20d389f-87e4-4514-86c6-9f567ccae587 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b20d389f-87e4-4514-86c6-9f567ccae587', 'x-compute-request-id': 'req-b20d389f-87e4-4514-86c6-9f567ccae587', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:10.525 37 INFO tempest.lib.common.rest_client [req-27119aa6-8e6b-48c8-9c6e-3c62df1388f3 ] Request (ImageNamespacesRbacTest:test_list_metadef_namespaces): 200 GET http://172.30.13.94/image/v2/metadefs/namespaces 0.399s 2020-11-06 18:03:10.526 37 DEBUG tempest.lib.common.rest_client [req-27119aa6-8e6b-48c8-9c6e-3c62df1388f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '20023', 'content-type': 'application/json', 'x-openstack-request-id': 'req-27119aa6-8e6b-48c8-9c6e-3c62df1388f3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces'} Body: b'{"namespaces": [{"namespace": "OS::Compute::VMwareFlavor", "display_name": "VMware Driver Options for Flavors", "description": "VMware Driver Options for Flavors may be used to customize and manage Nova Flavors. These are properties specific to VMWare compute drivers and will only have an effect if the VMWare compute driver is enabled in Nova. See: http://docs.openstack.org/admin-guide/compute-flavors.html", "visibility": "public", "protected": true, "owner": "admin", "created_at": "2020-10-07T11:58:00Z", "resource_type_associations": [{"name": "OS::Nova::Flavor", "created_at": "2020-10-07T11:58:00Z"}], "self": "/v2/metadefs/namespaces/OS::Compute::VMwareFlavor", "schema": "/v2/schemas/metadefs/namespace"}, {"namespace": "OS::Cinder::Volumetype", "display_name": "Cinder Volume Type", "description": "The Cinder volume type configuration option. Volume type assignment provides a mechanism not only to provide scheduling to a specific storage back-end, but also can be used to specify specific information for a back-end storage device to act upon.", "visibility": "public", "protected": true, "owner": "admin", "created_at": "2020-10-07T11:58:00Z", "resource_type_associations": [{"name": "OS::Glance::Image", "prefix": "cinder_", "created_at": "2020-10-07T11:58:00Z"}], "self": "/v2/metadefs/namespaces/OS::Cinder::Volumetype", "schema": "/v2/schemas/metadefs/namespace"}, {"namespace": "OS::Compute::HostCapabilities", "display_name": "Compute Host Capabilities", "description": "Hardware capabilities provided by the compute host. This provides the ability to fine tune the hardware specification required when an instance is requested. The ComputeCapabilitiesFilter should be enabled in the Nova scheduler to use these properties. When enabled, this filter checks that the capabilities provided by the compute host satisfy any extra specifications requested. Only hosts that can provide the requested capabilities will be eligible for hosting the instance.", "visibility": "public", "protected": true, "owner": "admin", "created_at": "2020-10-07T11:57:59Z", "resource_type_associations": [{"name": "OS::Nova::Flavor", "prefix": "capabilities:", "created_at": "2020-10-07T11:58:00Z"}, {"name": "OS::Nova::Aggregate", "prefix": "aggregate_instance_extra_specs:", "created_at": "2020-10-07T11:58:00Z"}], "self": "/v2/metadefs/namespaces/OS::Compute::HostCapabilities", "schema": "/v2/schemas/metadefs/namespace"}, {"namespace": "OS::Compute::VirtCPUTopology", "display_name": "Virtual CPU Topology", "description": "This provides the preferred socket/core/thread counts for the virtual CPU instance exposed to guests. This enables the ability to avoid hitting limitations on vCPU topologies that OS vendors place on their products. See also: https://opendev.org/openstack/nova-specs/src/branch/master/specs/juno/implemented/virt-driver-vcpu-topology.rst", "visibility": "public", "protected": true, "owner": "admin", "created_at": "2020-10-07T11:57:59Z", "resource_type_associations": [{"name": "OS::Glance::Image", "prefix": "hw_", "created_at": "2020-10-07T11:57:59Z"}, {"name": "OS::Cinder::Volume", "prefix": "hw_", "properties_target": "image", "created_at": "2020-10-07T11:57:59Z"}, {"name": "OS::Nova::Flavor", "prefix": "hw:", "created_at": "2020-10-07T11:57:59Z"}], "self": "/v2/metadefs/namespaces/OS::Compute::VirtCPUTopology", "schema": "/v2/schemas/metadefs/namespace"}, {"namespace": "OS::Compute::Libvirt", "display_name": "libvirt Driver Options", "description": "The libvirt compute driver options. \\n\\nThese are properties that affect the libvirt compute driver and may be specified on flavors and images. For a list of all hypervisors, see here: https://wiki.openstack.org/wiki/HypervisorSupportMatrix.", "visibility": "public", "protected": true, "owner": "admin", "created_at": "2020-10-07T11:57:59Z", "resource_type_associations": [{"name": "OS::Glance::Image", "prefix": "hw_", "created_at": "2020-10-07T11:57:59Z"}, {"name": "OS::Nova::Flavor", "prefix": "hw:", "created_at": "2020-10-07T11:57:59Z"}], "self": "/v2/metadefs/namespaces/OS::Compute::Libvir _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:10.527 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:10.532 38 INFO tempest.lib.common.rest_client [req-97bf963e-79f6-4d1d-9fb5-ec7046adcb72 ] Request (CapabilitiesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.110s 2020-11-06 18:03:10.533 38 DEBUG tempest.lib.common.rest_client [req-97bf963e-79f6-4d1d-9fb5-ec7046adcb72 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6575', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-97bf963e-79f6-4d1d-9fb5-ec7046adcb72', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eed40568495a45d09a6931235ab76d69", "name": "tempest-CapabilitiesV3RbacTest-1856786013", "password_expires_at": null}, "audit_ids": ["i9wice4dSZW1sBrRVU5Pww"], "expires_at": "2020-11-06T19:03:10.000000Z", "issued_at": "2020-11-06T18:03:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b66ec366c93245f0ba7fe013169aa36c", "name": "tempest-CapabilitiesV3RbacTest-1856786013"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b66ec366c93245f0ba7fe013169aa36c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b66ec366c93245f0ba7fe013169aa36c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b66ec366c93245f0ba7fe013169aa36c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b66ec366c93245f0ba7fe013169aa36c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b66ec366c93245f0ba7fe013169aa36c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b66ec366c93245f0ba7fe013169aa36c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http:/ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:10.626 37 INFO tempest.lib.common.rest_client [req-651d747c-a59b-4839-b07c-67ee2de945f4 ] Request (ImageNamespacesRbacTest:test_list_metadef_namespaces): 200 GET http://172.30.13.94/identity/v3/projects/e86b1dc98c554ddaa96ac553798ea93c/users/df0cf2e5549349c9ad0b89f69f1e15a9/roles 0.098s 2020-11-06 18:03:10.627 37 DEBUG tempest.lib.common.rest_client [req-651d747c-a59b-4839-b07c-67ee2de945f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-651d747c-a59b-4839-b07c-67ee2de945f4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e86b1dc98c554ddaa96ac553798ea93c/users/df0cf2e5549349c9ad0b89f69f1e15a9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e86b1dc98c554ddaa96ac553798ea93c/users/df0cf2e5549349c9ad0b89f69f1e15a9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:10.627 38 INFO tempest.lib.common.rest_client [req-7732ce73-658d-4fde-bf9b-86073a876864 ] Request (CapabilitiesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-11-06 18:03:10.627 38 DEBUG tempest.lib.common.rest_client [req-7732ce73-658d-4fde-bf9b-86073a876864 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7732ce73-658d-4fde-bf9b-86073a876864', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["WAHgal3AQyKuQ1KejAu5LQ"], "expires_at": "2020-11-06T19:03:10.000000Z", "issued_at": "2020-11-06T18:03:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:10.672 38 INFO tempest.lib.common.rest_client [req-ddb23089-da6c-4290-af95-5d8065d30c60 ] Request (CapabilitiesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:03:10.673 38 DEBUG tempest.lib.common.rest_client [req-ddb23089-da6c-4290-af95-5d8065d30c60 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ddb23089-da6c-4290-af95-5d8065d30c60', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["gYzJEBAySluau33SWWgXQw"], "expires_at": "2020-11-06T19:03:10.000000Z", "issued_at": "2020-11-06T18:03:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:10.725 37 INFO tempest.lib.common.rest_client [req-3629f4bb-3398-4a13-bfb8-8b0ae99b063d ] Request (ImageNamespacesRbacTest:test_list_metadef_namespaces): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-11-06 18:03:10.726 37 DEBUG tempest.lib.common.rest_client [req-3629f4bb-3398-4a13-bfb8-8b0ae99b063d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3629f4bb-3398-4a13-bfb8-8b0ae99b063d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "df0cf2e5549349c9ad0b89f69f1e15a9", "name": "tempest-ImageNamespacesRbacTest-1230131181", "password_expires_at": null}, "audit_ids": ["slzMTKo0SUKDi1u8IC2Gkg"], "expires_at": "2020-11-06T19:03:10.000000Z", "issued_at": "2020-11-06T18:03:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e86b1dc98c554ddaa96ac553798ea93c", "name": "tempest-ImageNamespacesRbacTest-1230131181"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:10.729 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:10.729 38 INFO tempest.lib.common.rest_client [req-6c05c5fd-9ec4-4233-b752-5f522ad64166 ] Request (CapabilitiesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.054s 2020-11-06 18:03:10.729 38 DEBUG tempest.lib.common.rest_client [req-6c05c5fd-9ec4-4233-b752-5f522ad64166 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6c05c5fd-9ec4-4233-b752-5f522ad64166', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:10.729 37 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:03:10.731 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: modify_metadef_namespace, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:10.780 38 INFO tempest.lib.common.rest_client [req-4cf9a290-b478-45c4-b450-329f516e530a ] Request (CapabilitiesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.050s 2020-11-06 18:03:10.781 38 DEBUG tempest.lib.common.rest_client [req-4cf9a290-b478-45c4-b450-329f516e530a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4cf9a290-b478-45c4-b450-329f516e530a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:10.782 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:03:10.782 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:10.834 38 INFO tempest.lib.common.rest_client [req-afaebdfb-a3c5-45c3-a514-90a23fe92ce5 ] Request (CapabilitiesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/b66ec366c93245f0ba7fe013169aa36c/users/eed40568495a45d09a6931235ab76d69/roles 0.051s 2020-11-06 18:03:10.835 38 DEBUG tempest.lib.common.rest_client [req-afaebdfb-a3c5-45c3-a514-90a23fe92ce5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-afaebdfb-a3c5-45c3-a514-90a23fe92ce5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b66ec366c93245f0ba7fe013169aa36c/users/eed40568495a45d09a6931235ab76d69/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b66ec366c93245f0ba7fe013169aa36c/users/eed40568495a45d09a6931235ab76d69/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:10.897 38 INFO tempest.lib.common.rest_client [req-3ebe6301-a1bc-4a2a-b211-4e0451592925 ] Request (CapabilitiesV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/b66ec366c93245f0ba7fe013169aa36c/users/eed40568495a45d09a6931235ab76d69/roles/72a4576c553448cd941b052c1ca0cf2d 0.062s 2020-11-06 18:03:10.898 38 DEBUG tempest.lib.common.rest_client [req-3ebe6301-a1bc-4a2a-b211-4e0451592925 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3ebe6301-a1bc-4a2a-b211-4e0451592925', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/b66ec366c93245f0ba7fe013169aa36c/users/eed40568495a45d09a6931235ab76d69/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:10.905 37 INFO tempest.lib.common.rest_client [req-46ea9ea0-0ce0-4984-9cec-f9fda5568017 ] Request (ImageNamespacesRbacTest:test_modify_metadef_namespace): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces 0.173s 2020-11-06 18:03:10.906 37 DEBUG tempest.lib.common.rest_client [req-46ea9ea0-0ce0-4984-9cec-f9fda5568017 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"namespace": "tempest-ImageNamespacesRbacTest-test-ns-1577481114", "protected": false} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '363', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/metadefs/namespaces/tempest-ImageNamespacesRbacTest-test-ns-1577481114', 'x-openstack-request-id': 'req-46ea9ea0-0ce0-4984-9cec-f9fda5568017', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces'} Body: b'{"namespace": "tempest-ImageNamespacesRbacTest-test-ns-1577481114", "visibility": "private", "protected": false, "owner": "e86b1dc98c554ddaa96ac553798ea93c", "created_at": "2020-11-06T18:03:10Z", "updated_at": "2020-11-06T18:03:10Z", "self": "/v2/metadefs/namespaces/tempest-ImageNamespacesRbacTest-test-ns-1577481114", "schema": "/v2/schemas/metadefs/namespace"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:10.906 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:11.006 38 INFO tempest.lib.common.rest_client [req-ef8d486c-9b5f-428c-8f87-2475da61a2be ] Request (CapabilitiesV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/b66ec366c93245f0ba7fe013169aa36c/users/eed40568495a45d09a6931235ab76d69/roles/a629c95d64b3416fb80ae90af4f69c05 0.107s 2020-11-06 18:03:11.006 38 DEBUG tempest.lib.common.rest_client [req-ef8d486c-9b5f-428c-8f87-2475da61a2be ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ef8d486c-9b5f-428c-8f87-2475da61a2be', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/b66ec366c93245f0ba7fe013169aa36c/users/eed40568495a45d09a6931235ab76d69/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:11.008 37 INFO tempest.lib.common.rest_client [req-e57fc3cf-c249-49ed-9686-22b84bf8d932 ] Request (ImageNamespacesRbacTest:test_modify_metadef_namespace): 200 GET http://172.30.13.94/identity/v3/projects/e86b1dc98c554ddaa96ac553798ea93c/users/df0cf2e5549349c9ad0b89f69f1e15a9/roles 0.101s 2020-11-06 18:03:11.009 37 DEBUG tempest.lib.common.rest_client [req-e57fc3cf-c249-49ed-9686-22b84bf8d932 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e57fc3cf-c249-49ed-9686-22b84bf8d932', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e86b1dc98c554ddaa96ac553798ea93c/users/df0cf2e5549349c9ad0b89f69f1e15a9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e86b1dc98c554ddaa96ac553798ea93c/users/df0cf2e5549349c9ad0b89f69f1e15a9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:11.091 37 INFO tempest.lib.common.rest_client [req-76270fef-37d7-4c7b-ab9c-db84a119305a ] Request (ImageNamespacesRbacTest:test_modify_metadef_namespace): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-11-06 18:03:11.092 37 DEBUG tempest.lib.common.rest_client [req-76270fef-37d7-4c7b-ab9c-db84a119305a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-76270fef-37d7-4c7b-ab9c-db84a119305a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "df0cf2e5549349c9ad0b89f69f1e15a9", "name": "tempest-ImageNamespacesRbacTest-1230131181", "password_expires_at": null}, "audit_ids": ["MVNOXRG5TbKpm4ffjUPBPg"], "expires_at": "2020-11-06T19:03:11.000000Z", "issued_at": "2020-11-06T18:03:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e86b1dc98c554ddaa96ac553798ea93c", "name": "tempest-ImageNamespacesRbacTest-1230131181"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:11.111 40 INFO tempest.lib.common.rest_client [req-5f86445e-1ebe-4604-9b28-15ae60a504f0 ] Request (GroupV320RbacTest:test_reset_group_status): 200 GET http://172.30.13.94/volume/v3/ca807a97ef2a479dbef5d40d9c177679/groups/22038613-8f76-449a-8c30-97eccd1b0626 0.043s 2020-11-06 18:03:11.112 40 DEBUG tempest.lib.common.rest_client [req-5f86445e-1ebe-4604-9b28-15ae60a504f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.20', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-5f86445e-1ebe-4604-9b28-15ae60a504f0', 'content-length': '392', 'openstack-api-version': 'volume 3.20', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5f86445e-1ebe-4604-9b28-15ae60a504f0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ca807a97ef2a479dbef5d40d9c177679/groups/22038613-8f76-449a-8c30-97eccd1b0626'} Body: b'{"group": {"id": "22038613-8f76-449a-8c30-97eccd1b0626", "status": "available", "availability_zone": "nova", "created_at": "2020-11-06T18:03:10.000000", "name": "tempest-GroupV320RbacTest-Group-1519559994", "description": null, "group_type": "643ae4a6-65d5-42d1-b4f1-ea0278eb8d73", "volume_types": ["0e983592-dd2e-4654-839b-55818f5e828c"], "group_snapshot_id": null, "source_group_id": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:11.117 40 INFO tempest.common.waiters [-] group 22038613-8f76-449a-8c30-97eccd1b0626 reached available after waiting for 1.117736 seconds 2020-11-06 18:03:11.118 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:11.221 40 INFO tempest.lib.common.rest_client [req-d5b469f2-9ef1-4830-84e2-ba41e25328e5 ] Request (GroupV320RbacTest:test_reset_group_status): 200 GET http://172.30.13.94/identity/v3/projects/ca807a97ef2a479dbef5d40d9c177679/users/f82060fe2fac452c868f6773d503eefd/roles 0.103s 2020-11-06 18:03:11.222 40 DEBUG tempest.lib.common.rest_client [req-d5b469f2-9ef1-4830-84e2-ba41e25328e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d5b469f2-9ef1-4830-84e2-ba41e25328e5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ca807a97ef2a479dbef5d40d9c177679/users/f82060fe2fac452c868f6773d503eefd/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ca807a97ef2a479dbef5d40d9c177679/users/f82060fe2fac452c868f6773d503eefd/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:11.283 37 INFO tempest.lib.common.rest_client [req-30bdb25a-86d4-4f61-a80e-90cfae14f7a2 ] Request (ImageNamespacesRbacTest:test_modify_metadef_namespace): 200 PUT http://172.30.13.94/image/v2/metadefs/namespaces/tempest-ImageNamespacesRbacTest-test-ns-1577481114 0.190s 2020-11-06 18:03:11.284 37 DEBUG tempest.lib.common.rest_client [req-30bdb25a-86d4-4f61-a80e-90cfae14f7a2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"namespace": "tempest-ImageNamespacesRbacTest-test-ns-1577481114", "description": "My new description"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '400', 'content-type': 'application/json', 'x-openstack-request-id': 'req-30bdb25a-86d4-4f61-a80e-90cfae14f7a2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-ImageNamespacesRbacTest-test-ns-1577481114'} Body: b'{"namespace": "tempest-ImageNamespacesRbacTest-test-ns-1577481114", "description": "My new description", "visibility": "private", "protected": false, "owner": "e86b1dc98c554ddaa96ac553798ea93c", "created_at": "2020-11-06T18:03:11Z", "updated_at": "2020-11-06T18:03:11Z", "self": "/v2/metadefs/namespaces/tempest-ImageNamespacesRbacTest-test-ns-1577481114", "schema": "/v2/schemas/metadefs/namespace"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:11.284 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:11.312 40 INFO tempest.lib.common.rest_client [req-ee65fe12-5e35-49b4-8411-1cedbd540e1e ] Request (GroupV320RbacTest:test_reset_group_status): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-11-06 18:03:11.313 40 DEBUG tempest.lib.common.rest_client [req-ee65fe12-5e35-49b4-8411-1cedbd540e1e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ee65fe12-5e35-49b4-8411-1cedbd540e1e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f82060fe2fac452c868f6773d503eefd", "name": "tempest-GroupV320RbacTest-1067859134", "password_expires_at": null}, "audit_ids": ["MTT3Gv20T-ylQbaXhCE1oA"], "expires_at": "2020-11-06T19:03:11.000000Z", "issued_at": "2020-11-06T18:03:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ca807a97ef2a479dbef5d40d9c177679", "name": "tempest-GroupV320RbacTest-1067859134"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ca807a97ef2a479dbef5d40d9c177679", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ca807a97ef2a479dbef5d40d9c177679", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ca807a97ef2a479dbef5d40d9c177679", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ca807a97ef2a479dbef5d40d9c177679", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ca807a97ef2a479dbef5d40d9c177679", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ca807a97ef2a479dbef5d40d9c177679", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:11.330 37 INFO tempest.lib.common.rest_client [req-6f37b874-d8e2-4d1c-a62f-95ff7c4251f4 ] Request (ImageNamespacesRbacTest:test_modify_metadef_namespace): 200 GET http://172.30.13.94/identity/v3/projects/e86b1dc98c554ddaa96ac553798ea93c/users/df0cf2e5549349c9ad0b89f69f1e15a9/roles 0.045s 2020-11-06 18:03:11.330 37 DEBUG tempest.lib.common.rest_client [req-6f37b874-d8e2-4d1c-a62f-95ff7c4251f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6f37b874-d8e2-4d1c-a62f-95ff7c4251f4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e86b1dc98c554ddaa96ac553798ea93c/users/df0cf2e5549349c9ad0b89f69f1e15a9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e86b1dc98c554ddaa96ac553798ea93c/users/df0cf2e5549349c9ad0b89f69f1e15a9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:11.366 37 INFO tempest.lib.common.rest_client [req-16235afa-faf3-46b8-a325-583ee3def8e2 ] Request (ImageNamespacesRbacTest:test_modify_metadef_namespace): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:03:11.367 37 DEBUG tempest.lib.common.rest_client [req-16235afa-faf3-46b8-a325-583ee3def8e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-16235afa-faf3-46b8-a325-583ee3def8e2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "df0cf2e5549349c9ad0b89f69f1e15a9", "name": "tempest-ImageNamespacesRbacTest-1230131181", "password_expires_at": null}, "audit_ids": ["qO3s14hTSUG49-Hno9P1vw"], "expires_at": "2020-11-06T19:03:11.000000Z", "issued_at": "2020-11-06T18:03:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e86b1dc98c554ddaa96ac553798ea93c", "name": "tempest-ImageNamespacesRbacTest-1230131181"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e86b1dc98c554ddaa96ac553798ea93c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:11.422 40 INFO tempest.lib.common.rest_client [req-16b980f7-3d5d-4879-adeb-892fa2cd42b4 ] Request (GroupV320RbacTest:test_reset_group_status): 202 POST http://172.30.13.94/volume/v3/ca807a97ef2a479dbef5d40d9c177679/groups/22038613-8f76-449a-8c30-97eccd1b0626/action 0.108s 2020-11-06 18:03:11.423 40 DEBUG tempest.lib.common.rest_client [req-16b980f7-3d5d-4879-adeb-892fa2cd42b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.20', 'X-Auth-Token': ''} Body: {"reset_status": {"status": "available"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.20', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-16b980f7-3d5d-4879-adeb-892fa2cd42b4', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ca807a97ef2a479dbef5d40d9c177679/groups/22038613-8f76-449a-8c30-97eccd1b0626/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:11.423 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:11.471 37 INFO tempest.lib.common.rest_client [req-c639b592-e4a9-40c3-8a68-0b1adb5743c4 ] Request (ImageNamespacesRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-ImageNamespacesRbacTest-test-ns-1577481114 0.102s 2020-11-06 18:03:11.471 37 DEBUG tempest.lib.common.rest_client [req-c639b592-e4a9-40c3-8a68-0b1adb5743c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-c639b592-e4a9-40c3-8a68-0b1adb5743c4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-ImageNamespacesRbacTest-test-ns-1577481114'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:11.477 40 INFO tempest.lib.common.rest_client [req-a80d39a9-9f1e-4b18-94c1-cfb53168ba7d ] Request (GroupV320RbacTest:test_reset_group_status): 200 GET http://172.30.13.94/identity/v3/projects/ca807a97ef2a479dbef5d40d9c177679/users/f82060fe2fac452c868f6773d503eefd/roles 0.052s 2020-11-06 18:03:11.477 40 DEBUG tempest.lib.common.rest_client [req-a80d39a9-9f1e-4b18-94c1-cfb53168ba7d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a80d39a9-9f1e-4b18-94c1-cfb53168ba7d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ca807a97ef2a479dbef5d40d9c177679/users/f82060fe2fac452c868f6773d503eefd/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ca807a97ef2a479dbef5d40d9c177679/users/f82060fe2fac452c868f6773d503eefd/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:11.511 40 INFO tempest.lib.common.rest_client [req-cee6647a-e164-4ee4-8c09-220c3b3388a1 ] Request (GroupV320RbacTest:test_reset_group_status): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:03:11.512 40 DEBUG tempest.lib.common.rest_client [req-cee6647a-e164-4ee4-8c09-220c3b3388a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cee6647a-e164-4ee4-8c09-220c3b3388a1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f82060fe2fac452c868f6773d503eefd", "name": "tempest-GroupV320RbacTest-1067859134", "password_expires_at": null}, "audit_ids": ["m9WbY1kSQBiHV54wPuKLPA"], "expires_at": "2020-11-06T19:03:11.000000Z", "issued_at": "2020-11-06T18:03:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ca807a97ef2a479dbef5d40d9c177679", "name": "tempest-GroupV320RbacTest-1067859134"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ca807a97ef2a479dbef5d40d9c177679", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ca807a97ef2a479dbef5d40d9c177679", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ca807a97ef2a479dbef5d40d9c177679", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ca807a97ef2a479dbef5d40d9c177679", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ca807a97ef2a479dbef5d40d9c177679", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ca807a97ef2a479dbef5d40d9c177679", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:11.595 37 INFO tempest.lib.common.rest_client [req-ea716596-c158-4007-a5a5-65de8e03cf62 ] Request (ImageNamespacesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/df0cf2e5549349c9ad0b89f69f1e15a9 0.122s 2020-11-06 18:03:11.596 37 DEBUG tempest.lib.common.rest_client [req-ea716596-c158-4007-a5a5-65de8e03cf62 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ea716596-c158-4007-a5a5-65de8e03cf62', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/df0cf2e5549349c9ad0b89f69f1e15a9'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:11.610 40 INFO tempest.lib.common.rest_client [req-275a98ea-0e66-4b00-8928-c6cb011a3535 ] Request (GroupV320RbacTest:test_reset_group_status): 200 GET http://172.30.13.94/volume/v3/ca807a97ef2a479dbef5d40d9c177679/groups/22038613-8f76-449a-8c30-97eccd1b0626 0.097s 2020-11-06 18:03:11.611 40 DEBUG tempest.lib.common.rest_client [req-275a98ea-0e66-4b00-8928-c6cb011a3535 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.20', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-275a98ea-0e66-4b00-8928-c6cb011a3535', 'content-length': '392', 'openstack-api-version': 'volume 3.20', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-275a98ea-0e66-4b00-8928-c6cb011a3535', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ca807a97ef2a479dbef5d40d9c177679/groups/22038613-8f76-449a-8c30-97eccd1b0626'} Body: b'{"group": {"id": "22038613-8f76-449a-8c30-97eccd1b0626", "status": "available", "availability_zone": "nova", "created_at": "2020-11-06T18:03:10.000000", "name": "tempest-GroupV320RbacTest-Group-1519559994", "description": null, "group_type": "643ae4a6-65d5-42d1-b4f1-ea0278eb8d73", "volume_types": ["0e983592-dd2e-4654-839b-55818f5e828c"], "group_snapshot_id": null, "source_group_id": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:11.616 40 INFO tempest.common.waiters [-] group 22038613-8f76-449a-8c30-97eccd1b0626 reached available after waiting for 0.616424 seconds 2020-11-06 18:03:11.677 37 INFO tempest.lib.common.rest_client [req-52b21513-ed73-4bbc-89db-c3be2db4c0bc ] Request (ImageNamespacesRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.080s 2020-11-06 18:03:11.678 37 DEBUG tempest.lib.common.rest_client [req-52b21513-ed73-4bbc-89db-c3be2db4c0bc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-52b21513-ed73-4bbc-89db-c3be2db4c0bc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["etMWnq6nTuGJ_XzQqCM2Nw"], "expires_at": "2020-11-06T19:03:11.000000Z", "issued_at": "2020-11-06T18:03:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:11.689 40 INFO tempest.lib.common.rest_client [req-6515a18a-0872-4697-b43b-67ad5b63f8f6 ] Request (GroupV320RbacTest:_run_cleanups): 202 POST http://172.30.13.94/volume/v3/ca807a97ef2a479dbef5d40d9c177679/groups/22038613-8f76-449a-8c30-97eccd1b0626/action 0.071s 2020-11-06 18:03:11.689 40 DEBUG tempest.lib.common.rest_client [req-6515a18a-0872-4697-b43b-67ad5b63f8f6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.20', 'X-Auth-Token': ''} Body: {"delete": {"delete-volumes": true}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.20', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6515a18a-0872-4697-b43b-67ad5b63f8f6', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ca807a97ef2a479dbef5d40d9c177679/groups/22038613-8f76-449a-8c30-97eccd1b0626/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:11.724 40 INFO tempest.lib.common.rest_client [req-08ea5efa-1a48-4eba-aebe-c20aee256256 ] Request (GroupV320RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/ca807a97ef2a479dbef5d40d9c177679/groups/22038613-8f76-449a-8c30-97eccd1b0626 0.034s 2020-11-06 18:03:11.725 40 DEBUG tempest.lib.common.rest_client [req-08ea5efa-1a48-4eba-aebe-c20aee256256 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.20', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-08ea5efa-1a48-4eba-aebe-c20aee256256', 'content-length': '391', 'openstack-api-version': 'volume 3.20', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-08ea5efa-1a48-4eba-aebe-c20aee256256', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ca807a97ef2a479dbef5d40d9c177679/groups/22038613-8f76-449a-8c30-97eccd1b0626'} Body: b'{"group": {"id": "22038613-8f76-449a-8c30-97eccd1b0626", "status": "deleting", "availability_zone": "nova", "created_at": "2020-11-06T18:03:10.000000", "name": "tempest-GroupV320RbacTest-Group-1519559994", "description": null, "group_type": "643ae4a6-65d5-42d1-b4f1-ea0278eb8d73", "volume_types": ["0e983592-dd2e-4654-839b-55818f5e828c"], "group_snapshot_id": null, "source_group_id": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:11.780 39 INFO tempest.lib.common.rest_client [req-3c3ba7c5-fa65-4192-856c-56ad231e25ed ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.326s 2020-11-06 18:03:11.781 39 DEBUG tempest.lib.common.rest_client [req-3c3ba7c5-fa65-4192-856c-56ad231e25ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3c3ba7c5-fa65-4192-856c-56ad231e25ed', 'x-compute-request-id': 'req-3c3ba7c5-fa65-4192-856c-56ad231e25ed', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:11.952 37 INFO tempest.lib.common.rest_client [req-26f8a3d6-39bb-4f6a-8fb9-bfc7539e001c ] Request (ImageNamespacesRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=e86b1dc98c554ddaa96ac553798ea93c&name=default 0.273s 2020-11-06 18:03:11.952 37 DEBUG tempest.lib.common.rest_client [req-26f8a3d6-39bb-4f6a-8fb9-bfc7539e001c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-26f8a3d6-39bb-4f6a-8fb9-bfc7539e001c', 'date': 'Fri, 06 Nov 2020 18:03:11 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=e86b1dc98c554ddaa96ac553798ea93c&name=default'} Body: b'{"security_groups": [{"id": "5eb53c6b-adf1-4a69-84f2-7580b5b75934", "name": "default", "stateful": true, "tenant_id": "e86b1dc98c554ddaa96ac553798ea93c", "description": "Default security group", "security_group_rules": [{"id": "33fc18ba-4476-4091-9f95-59bcd1bcf00f", "tenant_id": "e86b1dc98c554ddaa96ac553798ea93c", "security_group_id": "5eb53c6b-adf1-4a69-84f2-7580b5b75934", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:11Z", "updated_at": "2020-11-06T18:03:11Z", "revision_number": 0, "project_id": "e86b1dc98c554ddaa96ac553798ea93c"}, {"id": "3d61535e-5fee-4d8f-aae7-37a6b91d445f", "tenant_id": "e86b1dc98c554ddaa96ac553798ea93c", "security_group_id": "5eb53c6b-adf1-4a69-84f2-7580b5b75934", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "5eb53c6b-adf1-4a69-84f2-7580b5b75934", "description": null, "tags": [], "created_at": "2020-11-06T18:03:11Z", "updated_at": "2020-11-06T18:03:11Z", "revision_number": 0, "project_id": "e86b1dc98c554ddaa96ac553798ea93c"}, {"id": "42b638aa-cefa-484f-8c87-5b568be82525", "tenant_id": "e86b1dc98c554ddaa96ac553798ea93c", "security_group_id": "5eb53c6b-adf1-4a69-84f2-7580b5b75934", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:11Z", "updated_at": "2020-11-06T18:03:11Z", "revision_number": 0, "project_id": "e86b1dc98c554ddaa96ac553798ea93c"}, {"id": "f4c24e4c-e733-407e-b6a1-ab43def9e357", "tenant_id": "e86b1dc98c554ddaa96ac553798ea93c", "security_group_id": "5eb53c6b-adf1-4a69-84f2-7580b5b75934", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "5eb53c6b-adf1-4a69-84f2-7580b5b75934", "description": null, "tags": [], "created_at": "2020-11-06T18:03:11Z", "updated_at": "2020-11-06T18:03:11Z", "revision_number": 0, "project_id": "e86b1dc98c554ddaa96ac553798ea93c"}], "tags": [], "created_at": "2020-11-06T18:03:11Z", "updated_at": "2020-11-06T18:03:11Z", "revision_number": 1, "project_id": "e86b1dc98c554ddaa96ac553798ea93c"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:12.059 37 INFO tempest.lib.common.rest_client [req-62b6e5b8-763c-4370-b45b-ae54bd56fe90 ] Request (ImageNamespacesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/5eb53c6b-adf1-4a69-84f2-7580b5b75934 0.105s 2020-11-06 18:03:12.059 37 DEBUG tempest.lib.common.rest_client [req-62b6e5b8-763c-4370-b45b-ae54bd56fe90 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-62b6e5b8-763c-4370-b45b-ae54bd56fe90', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:03:12 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/5eb53c6b-adf1-4a69-84f2-7580b5b75934'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:12.116 38 INFO tempest.lib.common.rest_client [req-06179775-efc1-463b-b611-06abf7ff2203 ] Request (CapabilitiesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.108s 2020-11-06 18:03:12.117 38 DEBUG tempest.lib.common.rest_client [req-06179775-efc1-463b-b611-06abf7ff2203 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-06179775-efc1-463b-b611-06abf7ff2203', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eed40568495a45d09a6931235ab76d69", "name": "tempest-CapabilitiesV3RbacTest-1856786013", "password_expires_at": null}, "audit_ids": ["AUbcH_MOQJiDYi_tQ79p-w"], "expires_at": "2020-11-06T19:03:12.000000Z", "issued_at": "2020-11-06T18:03:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b66ec366c93245f0ba7fe013169aa36c", "name": "tempest-CapabilitiesV3RbacTest-1856786013"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b66ec366c93245f0ba7fe013169aa36c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b66ec366c93245f0ba7fe013169aa36c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b66ec366c93245f0ba7fe013169aa36c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b66ec366c93245f0ba7fe013169aa36c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b66ec366c93245f0ba7fe013169aa36c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b66ec366c93245f0ba7fe013169aa36c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:12.120 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:12.144 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:capabilities, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:12.169 37 INFO tempest.lib.common.rest_client [req-96c23831-4561-48ad-9af1-39679fd43ccd ] Request (ImageNamespacesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/e86b1dc98c554ddaa96ac553798ea93c 0.109s 2020-11-06 18:03:12.170 37 DEBUG tempest.lib.common.rest_client [req-96c23831-4561-48ad-9af1-39679fd43ccd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-96c23831-4561-48ad-9af1-39679fd43ccd', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e86b1dc98c554ddaa96ac553798ea93c'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:12.277 37 INFO tempest.lib.common.rest_client [req-bba2f7f6-0be5-40e4-95c7-21ce1ed5ea7c ] Request (AvailabilityZoneExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.103s 2020-11-06 18:03:12.278 37 DEBUG tempest.lib.common.rest_client [req-bba2f7f6-0be5-40e4-95c7-21ce1ed5ea7c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bba2f7f6-0be5-40e4-95c7-21ce1ed5ea7c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["wimAXjwjSnOYhiWg9qlPGA"], "expires_at": "2020-11-06T19:03:12.000000Z", "issued_at": "2020-11-06T18:03:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:12.319 37 INFO tempest.lib.common.rest_client [req-375260f7-7394-4b38-91c6-d7393b653366 ] Request (AvailabilityZoneExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:03:12.319 37 DEBUG tempest.lib.common.rest_client [req-375260f7-7394-4b38-91c6-d7393b653366 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-375260f7-7394-4b38-91c6-d7393b653366', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["esJrH18rTL-SDnAkuDTMnQ"], "expires_at": "2020-11-06T19:03:12.000000Z", "issued_at": "2020-11-06T18:03:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:12.336 38 INFO tempest.lib.common.rest_client [req-be300ba4-a267-426c-8be7-71ce2578ee3c ] Request (CapabilitiesV3RbacTest:test_show_back_end_capabilities): 200 GET http://172.30.13.94/volume/v3/b66ec366c93245f0ba7fe013169aa36c/os-hosts 0.191s 2020-11-06 18:03:12.336 38 DEBUG tempest.lib.common.rest_client [req-be300ba4-a267-426c-8be7-71ce2578ee3c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-be300ba4-a267-426c-8be7-71ce2578ee3c', 'content-length': '736', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-be300ba4-a267-426c-8be7-71ce2578ee3c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/b66ec366c93245f0ba7fe013169aa36c/os-hosts'} Body: b'{"hosts": [{"host_name": "lf-virtual9@ceph", "service": "cinder-volume", "zone": "nova", "service-status": "available", "service-state": "enabled", "last-update": "2020-11-06T18:03:08.000000"}, {"host_name": "lf-virtual9", "service": "cinder-scheduler", "zone": "nova", "service-status": "available", "service-state": "enabled", "last-update": "2020-11-06T18:03:07.000000"}, {"host_name": "lf-virtual9", "service": "cinder-backup", "zone": "nova", "service-status": "available", "service-state": "enabled", "last-update": "2020-11-06T18:03:09.000000"}, {"host_name": "lf-virtual8@ceph", "service": "cinder-volume", "zone": "nova", "service-status": "available", "service-state": "enabled", "last-update": "2020-11-06T18:03:02.000000"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:12.340 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:12.367 37 INFO tempest.lib.common.rest_client [req-15c4beed-5a0b-4798-af00-5836fd531981 ] Request (AvailabilityZoneExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.046s 2020-11-06 18:03:12.368 37 DEBUG tempest.lib.common.rest_client [req-15c4beed-5a0b-4798-af00-5836fd531981 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-15c4beed-5a0b-4798-af00-5836fd531981', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:12.398 38 INFO tempest.lib.common.rest_client [req-6d11305e-5765-4f2d-9c5f-8477fe836bd4 ] Request (CapabilitiesV3RbacTest:test_show_back_end_capabilities): 200 GET http://172.30.13.94/identity/v3/projects/b66ec366c93245f0ba7fe013169aa36c/users/eed40568495a45d09a6931235ab76d69/roles 0.058s 2020-11-06 18:03:12.399 38 DEBUG tempest.lib.common.rest_client [req-6d11305e-5765-4f2d-9c5f-8477fe836bd4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6d11305e-5765-4f2d-9c5f-8477fe836bd4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b66ec366c93245f0ba7fe013169aa36c/users/eed40568495a45d09a6931235ab76d69/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b66ec366c93245f0ba7fe013169aa36c/users/eed40568495a45d09a6931235ab76d69/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:12.431 37 INFO tempest.lib.common.rest_client [req-f7fb21a9-8e67-447e-8589-1ab918f68479 ] Request (AvailabilityZoneExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.061s 2020-11-06 18:03:12.431 37 DEBUG tempest.lib.common.rest_client [req-f7fb21a9-8e67-447e-8589-1ab918f68479 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-AvailabilityZoneExtRbacTest-184728547-desc", "domain_id": "default", "name": "tempest-AvailabilityZoneExtRbacTest-184728547"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '390', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f7fb21a9-8e67-447e-8589-1ab918f68479', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "2d03c65f9b3d458dad29ed04ba3bc578", "name": "tempest-AvailabilityZoneExtRbacTest-184728547", "domain_id": "default", "description": "tempest-AvailabilityZoneExtRbacTest-184728547-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/2d03c65f9b3d458dad29ed04ba3bc578"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:12.432 38 INFO tempest.lib.common.rest_client [req-51f7d559-0a33-4219-98ce-531ccc51a46f ] Request (CapabilitiesV3RbacTest:test_show_back_end_capabilities): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:03:12.432 38 DEBUG tempest.lib.common.rest_client [req-51f7d559-0a33-4219-98ce-531ccc51a46f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-51f7d559-0a33-4219-98ce-531ccc51a46f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eed40568495a45d09a6931235ab76d69", "name": "tempest-CapabilitiesV3RbacTest-1856786013", "password_expires_at": null}, "audit_ids": ["6Fb7eN_OSbm_MLj8Yo_EiQ"], "expires_at": "2020-11-06T19:03:12.000000Z", "issued_at": "2020-11-06T18:03:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b66ec366c93245f0ba7fe013169aa36c", "name": "tempest-CapabilitiesV3RbacTest-1856786013"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b66ec366c93245f0ba7fe013169aa36c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b66ec366c93245f0ba7fe013169aa36c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b66ec366c93245f0ba7fe013169aa36c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b66ec366c93245f0ba7fe013169aa36c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b66ec366c93245f0ba7fe013169aa36c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b66ec366c93245f0ba7fe013169aa36c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:12.544 37 INFO tempest.lib.common.rest_client [req-8de59024-2723-4c9f-8148-256d3dc97dd7 ] Request (AvailabilityZoneExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.112s 2020-11-06 18:03:12.545 37 DEBUG tempest.lib.common.rest_client [req-8de59024-2723-4c9f-8148-256d3dc97dd7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-AvailabilityZoneExtRbacTest-184728547", "password": "N8#&=jvhGElIpSi", "project_id": "2d03c65f9b3d458dad29ed04ba3bc578", "email": "tempest-AvailabilityZoneExtRbacTest-1842749817@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '409', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8de59024-2723-4c9f-8148-256d3dc97dd7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "2d03c65f9b3d458dad29ed04ba3bc578", "email": "tempest-AvailabilityZoneExtRbacTest-1842749817@example.com", "id": "48b6c2ff05ca4e85b658739910f7e3d1", "name": "tempest-AvailabilityZoneExtRbacTest-184728547", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/48b6c2ff05ca4e85b658739910f7e3d1"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:12.592 37 INFO tempest.lib.common.rest_client [req-df42e725-b01f-4b97-aba5-6003841e1e9b ] Request (AvailabilityZoneExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.045s 2020-11-06 18:03:12.592 37 DEBUG tempest.lib.common.rest_client [req-df42e725-b01f-4b97-aba5-6003841e1e9b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-df42e725-b01f-4b97-aba5-6003841e1e9b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:12.612 38 INFO tempest.lib.common.rest_client [req-1edbf0a6-f262-4937-9556-b06a3c4d9382 ] Request (CapabilitiesV3RbacTest:test_show_back_end_capabilities): 200 GET http://172.30.13.94/volume/v3/b66ec366c93245f0ba7fe013169aa36c/capabilities/lf-virtual9@ceph 0.178s 2020-11-06 18:03:12.613 38 DEBUG tempest.lib.common.rest_client [req-1edbf0a6-f262-4937-9556-b06a3c4d9382 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-1edbf0a6-f262-4937-9556-b06a3c4d9382', 'content-length': '696', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1edbf0a6-f262-4937-9556-b06a3c4d9382', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/b66ec366c93245f0ba7fe013169aa36c/capabilities/lf-virtual9@ceph'} Body: b'{"namespace": "OS::Storage::Capabilities::lf-virtual9@ceph", "vendor_name": "Open Source", "volume_backend_name": "ceph", "pool_name": null, "driver_version": "1.2.0", "storage_protocol": "ceph", "display_name": null, "description": null, "visibility": null, "replication_targets": [], "properties": {"thin_provisioning": {"title": "Thin Provisioning", "description": "Sets thin provisioning.", "type": "boolean"}, "compression": {"title": "Compression", "description": "Enables compression.", "type": "boolean"}, "qos": {"title": "QoS", "description": "Enables QoS.", "type": "boolean"}, "replication_enabled": {"title": "Replication", "description": "Enables replication.", "type": "boolean"}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:12.620 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:12.636 37 INFO tempest.lib.common.rest_client [req-01ec2ded-4503-444e-8e85-1a45be031c07 ] Request (AvailabilityZoneExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.042s 2020-11-06 18:03:12.636 37 DEBUG tempest.lib.common.rest_client [req-01ec2ded-4503-444e-8e85-1a45be031c07 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-01ec2ded-4503-444e-8e85-1a45be031c07', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:12.677 38 INFO tempest.lib.common.rest_client [req-7df02953-8705-4153-b7c2-ad248dc12487 ] Request (CapabilitiesV3RbacTest:test_show_back_end_capabilities): 200 GET http://172.30.13.94/identity/v3/projects/b66ec366c93245f0ba7fe013169aa36c/users/eed40568495a45d09a6931235ab76d69/roles 0.056s 2020-11-06 18:03:12.677 38 DEBUG tempest.lib.common.rest_client [req-7df02953-8705-4153-b7c2-ad248dc12487 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7df02953-8705-4153-b7c2-ad248dc12487', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b66ec366c93245f0ba7fe013169aa36c/users/eed40568495a45d09a6931235ab76d69/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b66ec366c93245f0ba7fe013169aa36c/users/eed40568495a45d09a6931235ab76d69/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:12.698 37 INFO tempest.lib.common.rest_client [req-cb1a1372-101d-4eb6-9ccd-a511b4ed649c ] Request (AvailabilityZoneExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/2d03c65f9b3d458dad29ed04ba3bc578/users/48b6c2ff05ca4e85b658739910f7e3d1/roles/72a4576c553448cd941b052c1ca0cf2d 0.061s 2020-11-06 18:03:12.699 37 DEBUG tempest.lib.common.rest_client [req-cb1a1372-101d-4eb6-9ccd-a511b4ed649c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cb1a1372-101d-4eb6-9ccd-a511b4ed649c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/2d03c65f9b3d458dad29ed04ba3bc578/users/48b6c2ff05ca4e85b658739910f7e3d1/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:12.699 37 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-AvailabilityZoneExtRbacTest-184728547', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '2d03c65f9b3d458dad29ed04ba3bc578', 'project_name': 'tempest-AvailabilityZoneExtRbacTest-184728547', 'tenant_id': '2d03c65f9b3d458dad29ed04ba3bc578', 'tenant_name': 'tempest-AvailabilityZoneExtRbacTest-184728547', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '48b6c2ff05ca4e85b658739910f7e3d1'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:12.699 37 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-AvailabilityZoneExtRbacTest-184728547', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '2d03c65f9b3d458dad29ed04ba3bc578', 'project_name': 'tempest-AvailabilityZoneExtRbacTest-184728547', 'tenant_id': '2d03c65f9b3d458dad29ed04ba3bc578', 'tenant_name': 'tempest-AvailabilityZoneExtRbacTest-184728547', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '48b6c2ff05ca4e85b658739910f7e3d1'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:12.746 40 INFO tempest.lib.common.rest_client [req-f3fcc263-067b-413c-8fc8-dfc6f85b387e ] Request (GroupV320RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/ca807a97ef2a479dbef5d40d9c177679/groups/22038613-8f76-449a-8c30-97eccd1b0626 0.016s 2020-11-06 18:03:12.746 40 DEBUG tempest.lib.common.rest_client [req-f3fcc263-067b-413c-8fc8-dfc6f85b387e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.20', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.20', 'vary': 'OpenStack-API-Version', 'content-length': '108', 'content-type': 'application/json', 'x-compute-request-id': 'req-f3fcc263-067b-413c-8fc8-dfc6f85b387e', 'x-openstack-request-id': 'req-f3fcc263-067b-413c-8fc8-dfc6f85b387e', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/ca807a97ef2a479dbef5d40d9c177679/groups/22038613-8f76-449a-8c30-97eccd1b0626'} Body: b'{"itemNotFound": {"code": 404, "message": "Group 22038613-8f76-449a-8c30-97eccd1b0626 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:12.767 38 INFO tempest.lib.common.rest_client [req-d668987b-025d-48d4-bb9a-90cdd3f2955f ] Request (CapabilitiesV3RbacTest:test_show_back_end_capabilities): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 18:03:12.767 38 DEBUG tempest.lib.common.rest_client [req-d668987b-025d-48d4-bb9a-90cdd3f2955f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d668987b-025d-48d4-bb9a-90cdd3f2955f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eed40568495a45d09a6931235ab76d69", "name": "tempest-CapabilitiesV3RbacTest-1856786013", "password_expires_at": null}, "audit_ids": ["MHQmMo0NST-c_cZXrGH6EA"], "expires_at": "2020-11-06T19:03:12.000000Z", "issued_at": "2020-11-06T18:03:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b66ec366c93245f0ba7fe013169aa36c", "name": "tempest-CapabilitiesV3RbacTest-1856786013"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b66ec366c93245f0ba7fe013169aa36c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b66ec366c93245f0ba7fe013169aa36c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b66ec366c93245f0ba7fe013169aa36c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b66ec366c93245f0ba7fe013169aa36c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b66ec366c93245f0ba7fe013169aa36c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b66ec366c93245f0ba7fe013169aa36c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:12.813 37 INFO tempest.lib.common.rest_client [req-9d067965-e84a-4036-b934-5d954df79ee6 ] Request (AvailabilityZoneExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.101s 2020-11-06 18:03:12.813 37 DEBUG tempest.lib.common.rest_client [req-9d067965-e84a-4036-b934-5d954df79ee6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6583', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9d067965-e84a-4036-b934-5d954df79ee6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "48b6c2ff05ca4e85b658739910f7e3d1", "name": "tempest-AvailabilityZoneExtRbacTest-184728547", "password_expires_at": null}, "audit_ids": ["0XEAHlZHQPWUG1ZA1NPfsA"], "expires_at": "2020-11-06T19:03:12.000000Z", "issued_at": "2020-11-06T18:03:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "2d03c65f9b3d458dad29ed04ba3bc578", "name": "tempest-AvailabilityZoneExtRbacTest-184728547"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:12.814 37 WARNING tempest.manager [-] tempest.manager.Manager is not a stable interface and as such it should not be imported directly. It will be removed as soon as the client manager becomes available in tempest.lib. 2020-11-06 18:03:12.825 40 INFO tempest.lib.common.rest_client [req-ab845dce-298a-4d56-bbf5-6817fd4fe2c4 ] Request (GroupV320RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/ca807a97ef2a479dbef5d40d9c177679/volumes/detail?all_tenants=True 0.077s 2020-11-06 18:03:12.825 40 DEBUG tempest.lib.common.rest_client [req-ab845dce-298a-4d56-bbf5-6817fd4fe2c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.20', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ab845dce-298a-4d56-bbf5-6817fd4fe2c4', 'content-length': '1176', 'openstack-api-version': 'volume 3.20', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ab845dce-298a-4d56-bbf5-6817fd4fe2c4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ca807a97ef2a479dbef5d40d9c177679/volumes/detail?all_tenants=True'} Body: b'{"volumes": [{"id": "b04633cb-14ce-44dd-8aa5-0ac530878f7d", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:03:09.000000", "updated_at": "2020-11-06T18:03:10.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-1256056320", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-1262887986", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ca807a97ef2a479dbef5d40d9c177679/volumes/b04633cb-14ce-44dd-8aa5-0ac530878f7d"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ca807a97ef2a479dbef5d40d9c177679/volumes/b04633cb-14ce-44dd-8aa5-0ac530878f7d"}], "user_id": "798a93d3ae4e4f5d90709b361322cb27", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "0a5e4a4b-0eac-46d1-a72e-f404c232aff9", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "107fa65b4875457b910497cb17b7e828"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:12.857 37 INFO tempest.lib.common.rest_client [req-c9a814ea-554d-4d06-a5f6-95e0133dd79f ] Request (AvailabilityZoneExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:03:12.857 37 DEBUG tempest.lib.common.rest_client [req-c9a814ea-554d-4d06-a5f6-95e0133dd79f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c9a814ea-554d-4d06-a5f6-95e0133dd79f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["6Cur5n_0TZu5MSc4dBTezw"], "expires_at": "2020-11-06T19:03:12.000000Z", "issued_at": "2020-11-06T18:03:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:12.876 40 INFO tempest.lib.common.rest_client [req-4858c486-a6c2-4ce8-8fb2-b456f1ba6c14 ] Request (GroupV320RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/ca807a97ef2a479dbef5d40d9c177679/group_types/643ae4a6-65d5-42d1-b4f1-ea0278eb8d73 0.040s 2020-11-06 18:03:12.877 40 DEBUG tempest.lib.common.rest_client [req-4858c486-a6c2-4ce8-8fb2-b456f1ba6c14 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.20', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.20', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4858c486-a6c2-4ce8-8fb2-b456f1ba6c14', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ca807a97ef2a479dbef5d40d9c177679/group_types/643ae4a6-65d5-42d1-b4f1-ea0278eb8d73'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:12.904 37 INFO tempest.lib.common.rest_client [req-48b5a453-8db4-4b34-9296-50baad87ec04 ] Request (AvailabilityZoneExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:03:12.904 37 DEBUG tempest.lib.common.rest_client [req-48b5a453-8db4-4b34-9296-50baad87ec04 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-48b5a453-8db4-4b34-9296-50baad87ec04', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["fjf9_QBeQ4uQMUCSNeG5Nw"], "expires_at": "2020-11-06T19:03:12.000000Z", "issued_at": "2020-11-06T18:03:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:12.943 38 INFO tempest.lib.common.rest_client [req-268e1e44-6123-4527-8df1-6933ed07133b ] Request (CapabilitiesV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/eed40568495a45d09a6931235ab76d69 0.173s 2020-11-06 18:03:12.943 38 DEBUG tempest.lib.common.rest_client [req-268e1e44-6123-4527-8df1-6933ed07133b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-268e1e44-6123-4527-8df1-6933ed07133b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/eed40568495a45d09a6931235ab76d69'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:12.951 40 INFO tempest.lib.common.rest_client [req-fc64a11f-48f1-4419-80d0-0be8c287ccef ] Request (GroupV320RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/ca807a97ef2a479dbef5d40d9c177679/types/0e983592-dd2e-4654-839b-55818f5e828c 0.070s 2020-11-06 18:03:12.952 40 DEBUG tempest.lib.common.rest_client [req-fc64a11f-48f1-4419-80d0-0be8c287ccef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-fc64a11f-48f1-4419-80d0-0be8c287ccef', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ca807a97ef2a479dbef5d40d9c177679/types/0e983592-dd2e-4654-839b-55818f5e828c'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:12.952 37 INFO tempest.lib.common.rest_client [req-84ef4452-00af-4494-b3f2-bd37bfa744a3 ] Request (AvailabilityZoneExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.046s 2020-11-06 18:03:12.952 37 DEBUG tempest.lib.common.rest_client [req-84ef4452-00af-4494-b3f2-bd37bfa744a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-84ef4452-00af-4494-b3f2-bd37bfa744a3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:12.972 40 INFO tempest.lib.common.rest_client [req-8eb9a9c6-4d40-4c1e-afc6-236ee221035e ] Request (GroupV320RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/ca807a97ef2a479dbef5d40d9c177679/types/0e983592-dd2e-4654-839b-55818f5e828c 0.019s 2020-11-06 18:03:12.972 40 DEBUG tempest.lib.common.rest_client [req-8eb9a9c6-4d40-4c1e-afc6-236ee221035e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-8eb9a9c6-4d40-4c1e-afc6-236ee221035e', 'x-openstack-request-id': 'req-8eb9a9c6-4d40-4c1e-afc6-236ee221035e', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/ca807a97ef2a479dbef5d40d9c177679/types/0e983592-dd2e-4654-839b-55818f5e828c'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 0e983592-dd2e-4654-839b-55818f5e828c could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:13.035 38 INFO tempest.lib.common.rest_client [req-5893d8d3-05f0-4d18-9331-3a62f32b7745 ] Request (CapabilitiesV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-11-06 18:03:13.036 38 DEBUG tempest.lib.common.rest_client [req-5893d8d3-05f0-4d18-9331-3a62f32b7745 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5893d8d3-05f0-4d18-9331-3a62f32b7745', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["Q8ziYB4jR7Gl0izcKSWClA"], "expires_at": "2020-11-06T19:03:12.000000Z", "issued_at": "2020-11-06T18:03:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:13.056 39 INFO tempest.lib.common.rest_client [req-b534ea3c-28b6-4a00-8a29-2c4ba1ecb441 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.260s 2020-11-06 18:03:13.057 39 DEBUG tempest.lib.common.rest_client [req-b534ea3c-28b6-4a00-8a29-2c4ba1ecb441 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b534ea3c-28b6-4a00-8a29-2c4ba1ecb441', 'x-compute-request-id': 'req-b534ea3c-28b6-4a00-8a29-2c4ba1ecb441', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:13.058 37 INFO tempest.lib.common.rest_client [req-ef06d57d-7eb1-496a-a98d-a3b95317a58a ] Request (AvailabilityZoneExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.105s 2020-11-06 18:03:13.058 37 DEBUG tempest.lib.common.rest_client [req-ef06d57d-7eb1-496a-a98d-a3b95317a58a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ef06d57d-7eb1-496a-a98d-a3b95317a58a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:13.059 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:03:13.059 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:13.119 37 INFO tempest.lib.common.rest_client [req-2a3884c1-3a6f-4676-a0f9-a49ad8de5993 ] Request (AvailabilityZoneExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/2d03c65f9b3d458dad29ed04ba3bc578/users/48b6c2ff05ca4e85b658739910f7e3d1/roles 0.059s 2020-11-06 18:03:13.119 37 DEBUG tempest.lib.common.rest_client [req-2a3884c1-3a6f-4676-a0f9-a49ad8de5993 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2a3884c1-3a6f-4676-a0f9-a49ad8de5993', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/2d03c65f9b3d458dad29ed04ba3bc578/users/48b6c2ff05ca4e85b658739910f7e3d1/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/2d03c65f9b3d458dad29ed04ba3bc578/users/48b6c2ff05ca4e85b658739910f7e3d1/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:13.172 40 INFO tempest.lib.common.rest_client [req-3929aa6c-1d1b-4693-ac76-60f1e490de8f ] Request (GroupV320RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/f82060fe2fac452c868f6773d503eefd 0.199s 2020-11-06 18:03:13.173 40 DEBUG tempest.lib.common.rest_client [req-3929aa6c-1d1b-4693-ac76-60f1e490de8f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3929aa6c-1d1b-4693-ac76-60f1e490de8f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/f82060fe2fac452c868f6773d503eefd'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:13.190 37 INFO tempest.lib.common.rest_client [req-97647949-0ca4-4bcf-8f8b-ab2ae5a8a402 ] Request (AvailabilityZoneExtRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/2d03c65f9b3d458dad29ed04ba3bc578/users/48b6c2ff05ca4e85b658739910f7e3d1/roles/72a4576c553448cd941b052c1ca0cf2d 0.069s 2020-11-06 18:03:13.190 37 DEBUG tempest.lib.common.rest_client [req-97647949-0ca4-4bcf-8f8b-ab2ae5a8a402 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-97647949-0ca4-4bcf-8f8b-ab2ae5a8a402', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/2d03c65f9b3d458dad29ed04ba3bc578/users/48b6c2ff05ca4e85b658739910f7e3d1/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:13.260 40 INFO tempest.lib.common.rest_client [req-3ff119ce-5ab2-4ba9-aa5a-8fcd665acef7 ] Request (GroupV320RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-11-06 18:03:13.261 40 DEBUG tempest.lib.common.rest_client [req-3ff119ce-5ab2-4ba9-aa5a-8fcd665acef7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3ff119ce-5ab2-4ba9-aa5a-8fcd665acef7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["F0y13K8dRu-f2dBkdEPOKg"], "expires_at": "2020-11-06T19:03:13.000000Z", "issued_at": "2020-11-06T18:03:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:13.304 37 INFO tempest.lib.common.rest_client [req-f9ef82c6-5473-43db-a741-0be0415a76b2 ] Request (AvailabilityZoneExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/2d03c65f9b3d458dad29ed04ba3bc578/users/48b6c2ff05ca4e85b658739910f7e3d1/roles/a629c95d64b3416fb80ae90af4f69c05 0.113s 2020-11-06 18:03:13.304 37 DEBUG tempest.lib.common.rest_client [req-f9ef82c6-5473-43db-a741-0be0415a76b2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f9ef82c6-5473-43db-a741-0be0415a76b2', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/2d03c65f9b3d458dad29ed04ba3bc578/users/48b6c2ff05ca4e85b658739910f7e3d1/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:13.387 38 INFO tempest.lib.common.rest_client [req-26674f88-6943-4829-b873-7c9856b9a721 ] Request (CapabilitiesV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=b66ec366c93245f0ba7fe013169aa36c&name=default 0.350s 2020-11-06 18:03:13.388 38 DEBUG tempest.lib.common.rest_client [req-26674f88-6943-4829-b873-7c9856b9a721 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-26674f88-6943-4829-b873-7c9856b9a721', 'date': 'Fri, 06 Nov 2020 18:03:13 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=b66ec366c93245f0ba7fe013169aa36c&name=default'} Body: b'{"security_groups": [{"id": "1764f255-f91d-4714-b34b-ec9d2c22d0c0", "name": "default", "stateful": true, "tenant_id": "b66ec366c93245f0ba7fe013169aa36c", "description": "Default security group", "security_group_rules": [{"id": "36fd4abd-0af1-4d5d-a7ea-bc78e758ce97", "tenant_id": "b66ec366c93245f0ba7fe013169aa36c", "security_group_id": "1764f255-f91d-4714-b34b-ec9d2c22d0c0", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "1764f255-f91d-4714-b34b-ec9d2c22d0c0", "description": null, "tags": [], "created_at": "2020-11-06T18:03:13Z", "updated_at": "2020-11-06T18:03:13Z", "revision_number": 0, "project_id": "b66ec366c93245f0ba7fe013169aa36c"}, {"id": "5826146e-47c6-442a-9728-df2425aff548", "tenant_id": "b66ec366c93245f0ba7fe013169aa36c", "security_group_id": "1764f255-f91d-4714-b34b-ec9d2c22d0c0", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:13Z", "updated_at": "2020-11-06T18:03:13Z", "revision_number": 0, "project_id": "b66ec366c93245f0ba7fe013169aa36c"}, {"id": "5e939a6f-f006-4156-a7c5-d25586db0a32", "tenant_id": "b66ec366c93245f0ba7fe013169aa36c", "security_group_id": "1764f255-f91d-4714-b34b-ec9d2c22d0c0", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "1764f255-f91d-4714-b34b-ec9d2c22d0c0", "description": null, "tags": [], "created_at": "2020-11-06T18:03:13Z", "updated_at": "2020-11-06T18:03:13Z", "revision_number": 0, "project_id": "b66ec366c93245f0ba7fe013169aa36c"}, {"id": "7bd80b79-35f9-4435-8c3b-527b305773fc", "tenant_id": "b66ec366c93245f0ba7fe013169aa36c", "security_group_id": "1764f255-f91d-4714-b34b-ec9d2c22d0c0", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:13Z", "updated_at": "2020-11-06T18:03:13Z", "revision_number": 0, "project_id": "b66ec366c93245f0ba7fe013169aa36c"}], "tags": [], "created_at": "2020-11-06T18:03:13Z", "updated_at": "2020-11-06T18:03:13Z", "revision_number": 1, "project_id": "b66ec366c93245f0ba7fe013169aa36c"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:13.600 38 INFO tempest.lib.common.rest_client [req-1926963b-e830-4598-ab72-6746c5c9ebec ] Request (CapabilitiesV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/1764f255-f91d-4714-b34b-ec9d2c22d0c0 0.211s 2020-11-06 18:03:13.600 38 DEBUG tempest.lib.common.rest_client [req-1926963b-e830-4598-ab72-6746c5c9ebec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-1926963b-e830-4598-ab72-6746c5c9ebec', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:03:13 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/1764f255-f91d-4714-b34b-ec9d2c22d0c0'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:13.607 40 INFO tempest.lib.common.rest_client [req-abb3c179-ba53-4308-bb28-5e9cd799b4e3 ] Request (GroupV320RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=ca807a97ef2a479dbef5d40d9c177679&name=default 0.345s 2020-11-06 18:03:13.608 40 DEBUG tempest.lib.common.rest_client [req-abb3c179-ba53-4308-bb28-5e9cd799b4e3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-abb3c179-ba53-4308-bb28-5e9cd799b4e3', 'date': 'Fri, 06 Nov 2020 18:03:13 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=ca807a97ef2a479dbef5d40d9c177679&name=default'} Body: b'{"security_groups": [{"id": "1b1a221e-2da7-44fe-9454-e1f547605d25", "name": "default", "stateful": true, "tenant_id": "ca807a97ef2a479dbef5d40d9c177679", "description": "Default security group", "security_group_rules": [{"id": "314d28df-3ffe-491e-ab95-821c639725b3", "tenant_id": "ca807a97ef2a479dbef5d40d9c177679", "security_group_id": "1b1a221e-2da7-44fe-9454-e1f547605d25", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "1b1a221e-2da7-44fe-9454-e1f547605d25", "description": null, "tags": [], "created_at": "2020-11-06T18:03:13Z", "updated_at": "2020-11-06T18:03:13Z", "revision_number": 0, "project_id": "ca807a97ef2a479dbef5d40d9c177679"}, {"id": "5887f964-bfe8-472a-b70a-f8ff55479f78", "tenant_id": "ca807a97ef2a479dbef5d40d9c177679", "security_group_id": "1b1a221e-2da7-44fe-9454-e1f547605d25", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:13Z", "updated_at": "2020-11-06T18:03:13Z", "revision_number": 0, "project_id": "ca807a97ef2a479dbef5d40d9c177679"}, {"id": "5ea81f80-1391-4ae6-bdc7-dbda9fca89ef", "tenant_id": "ca807a97ef2a479dbef5d40d9c177679", "security_group_id": "1b1a221e-2da7-44fe-9454-e1f547605d25", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:13Z", "updated_at": "2020-11-06T18:03:13Z", "revision_number": 0, "project_id": "ca807a97ef2a479dbef5d40d9c177679"}, {"id": "a45a8a0f-d1ec-420c-89c9-dfa3e7dcfb9c", "tenant_id": "ca807a97ef2a479dbef5d40d9c177679", "security_group_id": "1b1a221e-2da7-44fe-9454-e1f547605d25", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "1b1a221e-2da7-44fe-9454-e1f547605d25", "description": null, "tags": [], "created_at": "2020-11-06T18:03:13Z", "updated_at": "2020-11-06T18:03:13Z", "revision_number": 0, "project_id": "ca807a97ef2a479dbef5d40d9c177679"}], "tags": [], "created_at": "2020-11-06T18:03:13Z", "updated_at": "2020-11-06T18:03:13Z", "revision_number": 1, "project_id": "ca807a97ef2a479dbef5d40d9c177679"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:13.770 40 INFO tempest.lib.common.rest_client [req-b7bd23a2-798f-4efa-9b3b-082f067b6a9b ] Request (GroupV320RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/1b1a221e-2da7-44fe-9454-e1f547605d25 0.161s 2020-11-06 18:03:13.771 40 DEBUG tempest.lib.common.rest_client [req-b7bd23a2-798f-4efa-9b3b-082f067b6a9b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-b7bd23a2-798f-4efa-9b3b-082f067b6a9b', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:03:13 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/1b1a221e-2da7-44fe-9454-e1f547605d25'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:13.796 38 INFO tempest.lib.common.rest_client [req-224c3215-ea31-48af-b0ec-bf35c6b8df06 ] Request (CapabilitiesV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/b66ec366c93245f0ba7fe013169aa36c 0.194s 2020-11-06 18:03:13.796 38 DEBUG tempest.lib.common.rest_client [req-224c3215-ea31-48af-b0ec-bf35c6b8df06 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-224c3215-ea31-48af-b0ec-bf35c6b8df06', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/b66ec366c93245f0ba7fe013169aa36c'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:13.897 38 INFO tempest.lib.common.rest_client [req-fa6d5987-e3c6-48ba-91fb-d783a2a1873e ] Request (EncryptionTypesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-11-06 18:03:13.898 38 DEBUG tempest.lib.common.rest_client [req-fa6d5987-e3c6-48ba-91fb-d783a2a1873e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fa6d5987-e3c6-48ba-91fb-d783a2a1873e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["9sXr-dVGRaKzMIA4E5xSUA"], "expires_at": "2020-11-06T19:03:13.000000Z", "issued_at": "2020-11-06T18:03:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:13.954 40 INFO tempest.lib.common.rest_client [req-06d61104-0ce3-4526-a845-581a442a75e2 ] Request (GroupV320RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/ca807a97ef2a479dbef5d40d9c177679 0.182s 2020-11-06 18:03:13.955 40 DEBUG tempest.lib.common.rest_client [req-06d61104-0ce3-4526-a845-581a442a75e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-06d61104-0ce3-4526-a845-581a442a75e2', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ca807a97ef2a479dbef5d40d9c177679'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:13.996 38 INFO tempest.lib.common.rest_client [req-f22f618f-05a6-43a1-b17f-2ea23caabbc4 ] Request (EncryptionTypesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 18:03:13.997 38 DEBUG tempest.lib.common.rest_client [req-f22f618f-05a6-43a1-b17f-2ea23caabbc4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f22f618f-05a6-43a1-b17f-2ea23caabbc4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["IghGEh9HQxSdgRa37gHmHw"], "expires_at": "2020-11-06T19:03:13.000000Z", "issued_at": "2020-11-06T18:03:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:14.044 40 INFO tempest.lib.common.rest_client [req-26656695-011b-4a95-aad0-ebf5dd777679 ] Request (LimitsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:03:14.044 40 DEBUG tempest.lib.common.rest_client [req-26656695-011b-4a95-aad0-ebf5dd777679 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-26656695-011b-4a95-aad0-ebf5dd777679', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["A92jXjooR3KWCKrd1JDW1A"], "expires_at": "2020-11-06T19:03:13.000000Z", "issued_at": "2020-11-06T18:03:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:14.059 38 INFO tempest.lib.common.rest_client [req-83b59039-e293-42c0-a07b-cf376a8ee272 ] Request (EncryptionTypesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.061s 2020-11-06 18:03:14.059 38 DEBUG tempest.lib.common.rest_client [req-83b59039-e293-42c0-a07b-cf376a8ee272 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-83b59039-e293-42c0-a07b-cf376a8ee272', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:14.083 40 INFO tempest.lib.common.rest_client [req-4d70c1eb-e64a-414b-9a60-af2a4e9156b4 ] Request (LimitsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:03:14.084 40 DEBUG tempest.lib.common.rest_client [req-4d70c1eb-e64a-414b-9a60-af2a4e9156b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4d70c1eb-e64a-414b-9a60-af2a4e9156b4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["By9Av8H2QfSyKXaOKVgcCw"], "expires_at": "2020-11-06T19:03:14.000000Z", "issued_at": "2020-11-06T18:03:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:14.121 38 INFO tempest.lib.common.rest_client [req-4fad9725-6fd9-41ba-8934-5948a5363203 ] Request (EncryptionTypesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.060s 2020-11-06 18:03:14.122 38 DEBUG tempest.lib.common.rest_client [req-4fad9725-6fd9-41ba-8934-5948a5363203 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-EncryptionTypesV3RbacTest-970791869-desc", "domain_id": "default", "name": "tempest-EncryptionTypesV3RbacTest-970791869"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '386', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4fad9725-6fd9-41ba-8934-5948a5363203', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "c438772b458f419e978fb1bbba39fd37", "name": "tempest-EncryptionTypesV3RbacTest-970791869", "domain_id": "default", "description": "tempest-EncryptionTypesV3RbacTest-970791869-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:14.138 40 INFO tempest.lib.common.rest_client [req-593d2cc4-188e-451e-b327-9d350eb74e9c ] Request (LimitsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.053s 2020-11-06 18:03:14.138 40 DEBUG tempest.lib.common.rest_client [req-593d2cc4-188e-451e-b327-9d350eb74e9c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-593d2cc4-188e-451e-b327-9d350eb74e9c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:14.246 38 INFO tempest.lib.common.rest_client [req-28118146-1717-4731-a65a-1cd6bf317bfc ] Request (EncryptionTypesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.122s 2020-11-06 18:03:14.246 38 DEBUG tempest.lib.common.rest_client [req-28118146-1717-4731-a65a-1cd6bf317bfc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-EncryptionTypesV3RbacTest-970791869", "password": "U4!DVK*qMMQ~3Jt", "project_id": "c438772b458f419e978fb1bbba39fd37", "email": "tempest-EncryptionTypesV3RbacTest-1756564224@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '405', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-28118146-1717-4731-a65a-1cd6bf317bfc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "c438772b458f419e978fb1bbba39fd37", "email": "tempest-EncryptionTypesV3RbacTest-1756564224@example.com", "id": "69540f753276430e9629bd6eabeb4dc5", "name": "tempest-EncryptionTypesV3RbacTest-970791869", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/69540f753276430e9629bd6eabeb4dc5"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:14.250 40 INFO tempest.lib.common.rest_client [req-6950b52d-75b6-4f56-bf55-8f23acc6f21d ] Request (LimitsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.111s 2020-11-06 18:03:14.251 40 DEBUG tempest.lib.common.rest_client [req-6950b52d-75b6-4f56-bf55-8f23acc6f21d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-LimitsV3RbacTest-1431048088-desc", "domain_id": "default", "name": "tempest-LimitsV3RbacTest-1431048088"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '370', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6950b52d-75b6-4f56-bf55-8f23acc6f21d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "48ab5b94202448008c56eb20e2bdbf35", "name": "tempest-LimitsV3RbacTest-1431048088", "domain_id": "default", "description": "tempest-LimitsV3RbacTest-1431048088-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/48ab5b94202448008c56eb20e2bdbf35"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:14.317 39 INFO tempest.lib.common.rest_client [req-d727bfe2-fb6e-40e5-979b-82b79d5c9ee8 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.241s 2020-11-06 18:03:14.317 39 DEBUG tempest.lib.common.rest_client [req-d727bfe2-fb6e-40e5-979b-82b79d5c9ee8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d727bfe2-fb6e-40e5-979b-82b79d5c9ee8', 'x-compute-request-id': 'req-d727bfe2-fb6e-40e5-979b-82b79d5c9ee8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:14.345 38 INFO tempest.lib.common.rest_client [req-1807fd7e-f571-41e7-bb87-04c4e9e42621 ] Request (EncryptionTypesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.098s 2020-11-06 18:03:14.346 38 DEBUG tempest.lib.common.rest_client [req-1807fd7e-f571-41e7-bb87-04c4e9e42621 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1807fd7e-f571-41e7-bb87-04c4e9e42621', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:14.354 40 INFO tempest.lib.common.rest_client [req-abda4678-78a7-4abe-b7bc-6f0559e4d4b8 ] Request (LimitsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.102s 2020-11-06 18:03:14.355 40 DEBUG tempest.lib.common.rest_client [req-abda4678-78a7-4abe-b7bc-6f0559e4d4b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-LimitsV3RbacTest-1431048088", "password": "W9!txNbVjCDG~Iw", "project_id": "48ab5b94202448008c56eb20e2bdbf35", "email": "tempest-LimitsV3RbacTest-949396739@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '387', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-abda4678-78a7-4abe-b7bc-6f0559e4d4b8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "48ab5b94202448008c56eb20e2bdbf35", "email": "tempest-LimitsV3RbacTest-949396739@example.com", "id": "89cb74fbf088410c915f8eda76fbd601", "name": "tempest-LimitsV3RbacTest-1431048088", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/89cb74fbf088410c915f8eda76fbd601"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:14.387 37 INFO tempest.lib.common.rest_client [req-68128c1b-a854-4a8f-8817-3917e286199d ] Request (AvailabilityZoneExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-11-06 18:03:14.388 37 DEBUG tempest.lib.common.rest_client [req-68128c1b-a854-4a8f-8817-3917e286199d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-68128c1b-a854-4a8f-8817-3917e286199d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "48b6c2ff05ca4e85b658739910f7e3d1", "name": "tempest-AvailabilityZoneExtRbacTest-184728547", "password_expires_at": null}, "audit_ids": ["zeasiEclTayoGg_KZRYOvw"], "expires_at": "2020-11-06T19:03:14.000000Z", "issued_at": "2020-11-06T18:03:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "2d03c65f9b3d458dad29ed04ba3bc578", "name": "tempest-AvailabilityZoneExtRbacTest-184728547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:14.397 38 INFO tempest.lib.common.rest_client [req-849f0623-23ad-45a1-8604-785313fd4c4e ] Request (EncryptionTypesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.050s 2020-11-06 18:03:14.397 38 DEBUG tempest.lib.common.rest_client [req-849f0623-23ad-45a1-8604-785313fd4c4e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-849f0623-23ad-45a1-8604-785313fd4c4e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:14.409 40 INFO tempest.lib.common.rest_client [req-eddd7c57-5d44-4503-9c53-af1297db3f03 ] Request (LimitsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.053s 2020-11-06 18:03:14.409 40 DEBUG tempest.lib.common.rest_client [req-eddd7c57-5d44-4503-9c53-af1297db3f03 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eddd7c57-5d44-4503-9c53-af1297db3f03', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:14.432 37 INFO tempest.lib.common.rest_client [req-4f59a122-1bce-4739-a91a-044c75401279 ] Request (AvailabilityZoneExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-11-06 18:03:14.432 37 DEBUG tempest.lib.common.rest_client [req-4f59a122-1bce-4739-a91a-044c75401279 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4f59a122-1bce-4739-a91a-044c75401279', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "48b6c2ff05ca4e85b658739910f7e3d1", "name": "tempest-AvailabilityZoneExtRbacTest-184728547", "password_expires_at": null}, "audit_ids": ["K-pLsUczSLqFwXF9h-SAFg"], "expires_at": "2020-11-06T19:03:14.000000Z", "issued_at": "2020-11-06T18:03:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "2d03c65f9b3d458dad29ed04ba3bc578", "name": "tempest-AvailabilityZoneExtRbacTest-184728547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:14.435 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:14.457 40 INFO tempest.lib.common.rest_client [req-0d822e35-d62f-4101-be87-a0cc647a0faa ] Request (LimitsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.046s 2020-11-06 18:03:14.458 40 DEBUG tempest.lib.common.rest_client [req-0d822e35-d62f-4101-be87-a0cc647a0faa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0d822e35-d62f-4101-be87-a0cc647a0faa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:14.463 38 INFO tempest.lib.common.rest_client [req-b58b6e62-3afd-4305-bc47-1490f8291e8b ] Request (EncryptionTypesV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles/72a4576c553448cd941b052c1ca0cf2d 0.065s 2020-11-06 18:03:14.464 38 DEBUG tempest.lib.common.rest_client [req-b58b6e62-3afd-4305-bc47-1490f8291e8b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b58b6e62-3afd-4305-bc47-1490f8291e8b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:14.464 38 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-EncryptionTypesV3RbacTest-970791869', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'c438772b458f419e978fb1bbba39fd37', 'project_name': 'tempest-EncryptionTypesV3RbacTest-970791869', 'tenant_id': 'c438772b458f419e978fb1bbba39fd37', 'tenant_name': 'tempest-EncryptionTypesV3RbacTest-970791869', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '69540f753276430e9629bd6eabeb4dc5'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:14.465 38 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-EncryptionTypesV3RbacTest-970791869', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'c438772b458f419e978fb1bbba39fd37', 'project_name': 'tempest-EncryptionTypesV3RbacTest-970791869', 'tenant_id': 'c438772b458f419e978fb1bbba39fd37', 'tenant_name': 'tempest-EncryptionTypesV3RbacTest-970791869', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '69540f753276430e9629bd6eabeb4dc5'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:14.467 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_availability_zone, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:14.587 38 INFO tempest.lib.common.rest_client [req-f08164df-b16d-4505-ad46-f6dad4855427 ] Request (EncryptionTypesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.116s 2020-11-06 18:03:14.588 38 DEBUG tempest.lib.common.rest_client [req-f08164df-b16d-4505-ad46-f6dad4855427 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6579', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f08164df-b16d-4505-ad46-f6dad4855427', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "69540f753276430e9629bd6eabeb4dc5", "name": "tempest-EncryptionTypesV3RbacTest-970791869", "password_expires_at": null}, "audit_ids": ["wD6_LcxuS9KO8FlD3iwbTQ"], "expires_at": "2020-11-06T19:03:14.000000Z", "issued_at": "2020-11-06T18:03:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c438772b458f419e978fb1bbba39fd37", "name": "tempest-EncryptionTypesV3RbacTest-970791869"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "ht _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:14.592 40 INFO tempest.lib.common.rest_client [req-05db854c-b0d1-4040-8a09-f1ceb1fa03c2 ] Request (LimitsV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/48ab5b94202448008c56eb20e2bdbf35/users/89cb74fbf088410c915f8eda76fbd601/roles/72a4576c553448cd941b052c1ca0cf2d 0.133s 2020-11-06 18:03:14.592 40 DEBUG tempest.lib.common.rest_client [req-05db854c-b0d1-4040-8a09-f1ceb1fa03c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-05db854c-b0d1-4040-8a09-f1ceb1fa03c2', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/48ab5b94202448008c56eb20e2bdbf35/users/89cb74fbf088410c915f8eda76fbd601/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:14.593 40 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-LimitsV3RbacTest-1431048088', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '48ab5b94202448008c56eb20e2bdbf35', 'project_name': 'tempest-LimitsV3RbacTest-1431048088', 'tenant_id': '48ab5b94202448008c56eb20e2bdbf35', 'tenant_name': 'tempest-LimitsV3RbacTest-1431048088', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '89cb74fbf088410c915f8eda76fbd601'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:14.593 40 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-LimitsV3RbacTest-1431048088', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '48ab5b94202448008c56eb20e2bdbf35', 'project_name': 'tempest-LimitsV3RbacTest-1431048088', 'tenant_id': '48ab5b94202448008c56eb20e2bdbf35', 'tenant_name': 'tempest-LimitsV3RbacTest-1431048088', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '89cb74fbf088410c915f8eda76fbd601'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:14.671 38 INFO tempest.lib.common.rest_client [req-78274d54-108a-4b19-b4b2-e92d5dcec9f0 ] Request (EncryptionTypesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 18:03:14.672 38 DEBUG tempest.lib.common.rest_client [req-78274d54-108a-4b19-b4b2-e92d5dcec9f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-78274d54-108a-4b19-b4b2-e92d5dcec9f0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["eHz48gwQQjOX0GiJ5Xcf4g"], "expires_at": "2020-11-06T19:03:14.000000Z", "issued_at": "2020-11-06T18:03:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:14.696 37 INFO tempest.lib.common.rest_client [req-935be4ad-71ba-41c6-b62f-58319a12091f ] Request (AvailabilityZoneExtRbacTest:test_list_availability_zone_rbac): 200 GET http://172.30.13.94:9696/v2.0/availability_zones 0.228s 2020-11-06 18:03:14.697 37 DEBUG tempest.lib.common.rest_client [req-935be4ad-71ba-41c6-b62f-58319a12091f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '149', 'x-openstack-request-id': 'req-935be4ad-71ba-41c6-b62f-58319a12091f', 'date': 'Fri, 06 Nov 2020 18:03:14 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/availability_zones'} Body: b'{"availability_zones": [{"state": "available", "name": "nova", "resource": "router"}, {"state": "available", "name": "nova", "resource": "network"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:14.698 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:14.711 40 INFO tempest.lib.common.rest_client [req-4f49d4ad-acfe-4cd5-aac5-46cf095f666a ] Request (LimitsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.105s 2020-11-06 18:03:14.712 40 DEBUG tempest.lib.common.rest_client [req-4f49d4ad-acfe-4cd5-aac5-46cf095f666a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6563', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4f49d4ad-acfe-4cd5-aac5-46cf095f666a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "89cb74fbf088410c915f8eda76fbd601", "name": "tempest-LimitsV3RbacTest-1431048088", "password_expires_at": null}, "audit_ids": ["4bNhHvWxR0e54QEhrQsTdg"], "expires_at": "2020-11-06T19:03:14.000000Z", "issued_at": "2020-11-06T18:03:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "48ab5b94202448008c56eb20e2bdbf35", "name": "tempest-LimitsV3RbacTest-1431048088"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/48ab5b94202448008c56eb20e2bdbf35", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/48ab5b94202448008c56eb20e2bdbf35", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/48ab5b94202448008c56eb20e2bdbf35", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_48ab5b94202448008c56eb20e2bdbf35", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_48ab5b94202448008c56eb20e2bdbf35", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_48ab5b94202448008c56eb20e2bdbf35", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:14.717 38 INFO tempest.lib.common.rest_client [req-9e2f5910-210a-4a12-acfb-493c59312fc4 ] Request (EncryptionTypesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:03:14.718 38 DEBUG tempest.lib.common.rest_client [req-9e2f5910-210a-4a12-acfb-493c59312fc4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9e2f5910-210a-4a12-acfb-493c59312fc4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["BtBufCJbQPawkemwqAgInA"], "expires_at": "2020-11-06T19:03:14.000000Z", "issued_at": "2020-11-06T18:03:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:14.750 40 INFO tempest.lib.common.rest_client [req-b1a9238c-f9f0-4d3c-867d-7f20c131fa97 ] Request (LimitsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:03:14.750 40 DEBUG tempest.lib.common.rest_client [req-b1a9238c-f9f0-4d3c-867d-7f20c131fa97 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b1a9238c-f9f0-4d3c-867d-7f20c131fa97', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["JCXyP46mTDOPDNaRwMZ61w"], "expires_at": "2020-11-06T19:03:14.000000Z", "issued_at": "2020-11-06T18:03:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:14.755 37 INFO tempest.lib.common.rest_client [req-8e2e9ab1-3853-4faf-bbca-09303aee663d ] Request (AvailabilityZoneExtRbacTest:test_list_availability_zone_rbac): 200 GET http://172.30.13.94/identity/v3/projects/2d03c65f9b3d458dad29ed04ba3bc578/users/48b6c2ff05ca4e85b658739910f7e3d1/roles 0.057s 2020-11-06 18:03:14.756 37 DEBUG tempest.lib.common.rest_client [req-8e2e9ab1-3853-4faf-bbca-09303aee663d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8e2e9ab1-3853-4faf-bbca-09303aee663d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/2d03c65f9b3d458dad29ed04ba3bc578/users/48b6c2ff05ca4e85b658739910f7e3d1/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/2d03c65f9b3d458dad29ed04ba3bc578/users/48b6c2ff05ca4e85b658739910f7e3d1/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:14.771 38 INFO tempest.lib.common.rest_client [req-572a3520-53a2-401d-b4d7-8399b9750153 ] Request (EncryptionTypesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.052s 2020-11-06 18:03:14.772 38 DEBUG tempest.lib.common.rest_client [req-572a3520-53a2-401d-b4d7-8399b9750153 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-572a3520-53a2-401d-b4d7-8399b9750153', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:14.792 40 INFO tempest.lib.common.rest_client [req-6d0382cf-2e6f-45f3-bbee-48aca7d692a9 ] Request (LimitsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:03:14.793 40 DEBUG tempest.lib.common.rest_client [req-6d0382cf-2e6f-45f3-bbee-48aca7d692a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6d0382cf-2e6f-45f3-bbee-48aca7d692a9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["Bn6nujJnReqJ6xypjemiEQ"], "expires_at": "2020-11-06T19:03:14.000000Z", "issued_at": "2020-11-06T18:03:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:14.816 38 INFO tempest.lib.common.rest_client [req-e15a367f-c270-4a63-aa81-9f7c4018f9ab ] Request (EncryptionTypesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.043s 2020-11-06 18:03:14.817 38 DEBUG tempest.lib.common.rest_client [req-e15a367f-c270-4a63-aa81-9f7c4018f9ab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e15a367f-c270-4a63-aa81-9f7c4018f9ab', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:14.817 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:03:14.817 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:14.832 37 INFO tempest.lib.common.rest_client [req-558d0c3f-76a5-428e-9557-cf163953f1e1 ] Request (AvailabilityZoneExtRbacTest:test_list_availability_zone_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.075s 2020-11-06 18:03:14.833 37 DEBUG tempest.lib.common.rest_client [req-558d0c3f-76a5-428e-9557-cf163953f1e1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-558d0c3f-76a5-428e-9557-cf163953f1e1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "48b6c2ff05ca4e85b658739910f7e3d1", "name": "tempest-AvailabilityZoneExtRbacTest-184728547", "password_expires_at": null}, "audit_ids": ["TiMHYoksRzq-bXTyaYTKKw"], "expires_at": "2020-11-06T19:03:14.000000Z", "issued_at": "2020-11-06T18:03:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "2d03c65f9b3d458dad29ed04ba3bc578", "name": "tempest-AvailabilityZoneExtRbacTest-184728547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:14.841 40 INFO tempest.lib.common.rest_client [req-85e8c631-81f2-4b97-ba02-f9e79d661e54 ] Request (LimitsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.047s 2020-11-06 18:03:14.841 40 DEBUG tempest.lib.common.rest_client [req-85e8c631-81f2-4b97-ba02-f9e79d661e54 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-85e8c631-81f2-4b97-ba02-f9e79d661e54', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:14.861 38 INFO tempest.lib.common.rest_client [req-a0746cac-ab43-427b-a0da-76d81b0aff0e ] Request (EncryptionTypesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles 0.043s 2020-11-06 18:03:14.862 38 DEBUG tempest.lib.common.rest_client [req-a0746cac-ab43-427b-a0da-76d81b0aff0e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a0746cac-ab43-427b-a0da-76d81b0aff0e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:14.868 37 INFO tempest.lib.common.rest_client [req-47d6607b-965c-4f65-9092-638c9bbeaeb3 ] Request (AvailabilityZoneExtRbacTest:test_list_availability_zone_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:03:14.869 37 DEBUG tempest.lib.common.rest_client [req-47d6607b-965c-4f65-9092-638c9bbeaeb3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-47d6607b-965c-4f65-9092-638c9bbeaeb3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "48b6c2ff05ca4e85b658739910f7e3d1", "name": "tempest-AvailabilityZoneExtRbacTest-184728547", "password_expires_at": null}, "audit_ids": ["Blo2rOxYSDSLsL9YZcgyKA"], "expires_at": "2020-11-06T19:03:14.000000Z", "issued_at": "2020-11-06T18:03:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "2d03c65f9b3d458dad29ed04ba3bc578", "name": "tempest-AvailabilityZoneExtRbacTest-184728547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:14.883 40 INFO tempest.lib.common.rest_client [req-da1b1a6e-6173-4fa0-b1f8-557cb432658f ] Request (LimitsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.041s 2020-11-06 18:03:14.884 40 DEBUG tempest.lib.common.rest_client [req-da1b1a6e-6173-4fa0-b1f8-557cb432658f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-da1b1a6e-6173-4fa0-b1f8-557cb432658f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:14.884 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:03:14.885 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:14.912 38 INFO tempest.lib.common.rest_client [req-5dfef7a4-a600-4c38-9abf-7869c5d318b3 ] Request (EncryptionTypesV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles/72a4576c553448cd941b052c1ca0cf2d 0.050s 2020-11-06 18:03:14.913 38 DEBUG tempest.lib.common.rest_client [req-5dfef7a4-a600-4c38-9abf-7869c5d318b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5dfef7a4-a600-4c38-9abf-7869c5d318b3', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:14.930 40 INFO tempest.lib.common.rest_client [req-36266294-e764-42df-af5e-b3efac86c4ff ] Request (LimitsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/48ab5b94202448008c56eb20e2bdbf35/users/89cb74fbf088410c915f8eda76fbd601/roles 0.045s 2020-11-06 18:03:14.931 40 DEBUG tempest.lib.common.rest_client [req-36266294-e764-42df-af5e-b3efac86c4ff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-36266294-e764-42df-af5e-b3efac86c4ff', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/48ab5b94202448008c56eb20e2bdbf35/users/89cb74fbf088410c915f8eda76fbd601/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/48ab5b94202448008c56eb20e2bdbf35/users/89cb74fbf088410c915f8eda76fbd601/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:15.019 38 INFO tempest.lib.common.rest_client [req-cdc1e79e-e72d-423f-9e3f-e5fd43d420d4 ] Request (EncryptionTypesV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles/a629c95d64b3416fb80ae90af4f69c05 0.105s 2020-11-06 18:03:15.019 38 DEBUG tempest.lib.common.rest_client [req-cdc1e79e-e72d-423f-9e3f-e5fd43d420d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cdc1e79e-e72d-423f-9e3f-e5fd43d420d4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:15.039 40 INFO tempest.lib.common.rest_client [req-02c08edd-4e6f-4278-9374-5e19e379dfa7 ] Request (LimitsV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/48ab5b94202448008c56eb20e2bdbf35/users/89cb74fbf088410c915f8eda76fbd601/roles/72a4576c553448cd941b052c1ca0cf2d 0.107s 2020-11-06 18:03:15.040 40 DEBUG tempest.lib.common.rest_client [req-02c08edd-4e6f-4278-9374-5e19e379dfa7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-02c08edd-4e6f-4278-9374-5e19e379dfa7', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/48ab5b94202448008c56eb20e2bdbf35/users/89cb74fbf088410c915f8eda76fbd601/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:15.089 37 INFO tempest.lib.common.rest_client [req-42abe3b3-3f98-46bb-84b8-7c8121d14435 ] Request (AvailabilityZoneExtRbacTest:test_list_availability_zone_rbac): 200 GET http://172.30.13.94:9696/v2.0/availability_zones 0.218s 2020-11-06 18:03:15.089 37 DEBUG tempest.lib.common.rest_client [req-42abe3b3-3f98-46bb-84b8-7c8121d14435 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '149', 'x-openstack-request-id': 'req-42abe3b3-3f98-46bb-84b8-7c8121d14435', 'date': 'Fri, 06 Nov 2020 18:03:15 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/availability_zones'} Body: b'{"availability_zones": [{"state": "available", "name": "nova", "resource": "router"}, {"state": "available", "name": "nova", "resource": "network"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:15.090 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:15.143 40 INFO tempest.lib.common.rest_client [req-ea54aa9a-a198-4d2a-b298-eb1248900d5e ] Request (LimitsV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/48ab5b94202448008c56eb20e2bdbf35/users/89cb74fbf088410c915f8eda76fbd601/roles/a629c95d64b3416fb80ae90af4f69c05 0.102s 2020-11-06 18:03:15.143 40 DEBUG tempest.lib.common.rest_client [req-ea54aa9a-a198-4d2a-b298-eb1248900d5e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ea54aa9a-a198-4d2a-b298-eb1248900d5e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/48ab5b94202448008c56eb20e2bdbf35/users/89cb74fbf088410c915f8eda76fbd601/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:15.149 37 INFO tempest.lib.common.rest_client [req-7554f93f-a75f-4790-9d8c-baa7c8874f02 ] Request (AvailabilityZoneExtRbacTest:test_list_availability_zone_rbac): 200 GET http://172.30.13.94/identity/v3/projects/2d03c65f9b3d458dad29ed04ba3bc578/users/48b6c2ff05ca4e85b658739910f7e3d1/roles 0.058s 2020-11-06 18:03:15.150 37 DEBUG tempest.lib.common.rest_client [req-7554f93f-a75f-4790-9d8c-baa7c8874f02 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7554f93f-a75f-4790-9d8c-baa7c8874f02', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/2d03c65f9b3d458dad29ed04ba3bc578/users/48b6c2ff05ca4e85b658739910f7e3d1/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/2d03c65f9b3d458dad29ed04ba3bc578/users/48b6c2ff05ca4e85b658739910f7e3d1/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:15.238 37 INFO tempest.lib.common.rest_client [req-8f5835f1-b6b4-472a-a33d-04be51fc2fd8 ] Request (AvailabilityZoneExtRbacTest:test_list_availability_zone_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 18:03:15.239 37 DEBUG tempest.lib.common.rest_client [req-8f5835f1-b6b4-472a-a33d-04be51fc2fd8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8f5835f1-b6b4-472a-a33d-04be51fc2fd8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "48b6c2ff05ca4e85b658739910f7e3d1", "name": "tempest-AvailabilityZoneExtRbacTest-184728547", "password_expires_at": null}, "audit_ids": ["zYMMP5Y6QmKN0lMoaHztPg"], "expires_at": "2020-11-06T19:03:15.000000Z", "issued_at": "2020-11-06T18:03:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "2d03c65f9b3d458dad29ed04ba3bc578", "name": "tempest-AvailabilityZoneExtRbacTest-184728547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:15.269 37 INFO tempest.lib.common.rest_client [req-41002ef8-da11-42f8-ae59-b362fb80c010 ] Request (AvailabilityZoneExtRbacTest:test_list_availability_zone_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.029s 2020-11-06 18:03:15.270 37 DEBUG tempest.lib.common.rest_client [req-41002ef8-da11-42f8-ae59-b362fb80c010 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-41002ef8-da11-42f8-ae59-b362fb80c010', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "48b6c2ff05ca4e85b658739910f7e3d1", "name": "tempest-AvailabilityZoneExtRbacTest-184728547", "password_expires_at": null}, "audit_ids": ["hYFqP6olTS2EusBCrAawSw"], "expires_at": "2020-11-06T19:03:15.000000Z", "issued_at": "2020-11-06T18:03:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "2d03c65f9b3d458dad29ed04ba3bc578", "name": "tempest-AvailabilityZoneExtRbacTest-184728547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2d03c65f9b3d458dad29ed04ba3bc578", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:15.452 37 INFO tempest.lib.common.rest_client [req-21a0fecd-fa7a-4e22-8f8c-b0d3d03a3051 ] Request (AvailabilityZoneExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/48b6c2ff05ca4e85b658739910f7e3d1 0.179s 2020-11-06 18:03:15.453 37 DEBUG tempest.lib.common.rest_client [req-21a0fecd-fa7a-4e22-8f8c-b0d3d03a3051 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-21a0fecd-fa7a-4e22-8f8c-b0d3d03a3051', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/48b6c2ff05ca4e85b658739910f7e3d1'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:15.534 39 INFO tempest.lib.common.rest_client [req-0834b9ed-a6c8-4fd4-b15e-8a60689ac747 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.202s 2020-11-06 18:03:15.535 39 DEBUG tempest.lib.common.rest_client [req-0834b9ed-a6c8-4fd4-b15e-8a60689ac747 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0834b9ed-a6c8-4fd4-b15e-8a60689ac747', 'x-compute-request-id': 'req-0834b9ed-a6c8-4fd4-b15e-8a60689ac747', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:15.537 37 INFO tempest.lib.common.rest_client [req-f2d4522d-5c9d-45fb-80c0-2779473e9fd0 ] Request (AvailabilityZoneExtRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 18:03:15.538 37 DEBUG tempest.lib.common.rest_client [req-f2d4522d-5c9d-45fb-80c0-2779473e9fd0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f2d4522d-5c9d-45fb-80c0-2779473e9fd0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["Q2RiAafERJaVKbpmiqaV5w"], "expires_at": "2020-11-06T19:03:15.000000Z", "issued_at": "2020-11-06T18:03:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:15.878 37 INFO tempest.lib.common.rest_client [req-302af068-7654-4ec9-bfe1-c0c559b23fa8 ] Request (AvailabilityZoneExtRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=2d03c65f9b3d458dad29ed04ba3bc578&name=default 0.339s 2020-11-06 18:03:15.878 37 DEBUG tempest.lib.common.rest_client [req-302af068-7654-4ec9-bfe1-c0c559b23fa8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-302af068-7654-4ec9-bfe1-c0c559b23fa8', 'date': 'Fri, 06 Nov 2020 18:03:15 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=2d03c65f9b3d458dad29ed04ba3bc578&name=default'} Body: b'{"security_groups": [{"id": "f8ab2383-daff-4848-9625-02514362965e", "name": "default", "stateful": true, "tenant_id": "2d03c65f9b3d458dad29ed04ba3bc578", "description": "Default security group", "security_group_rules": [{"id": "4eb18bca-06a4-4a8b-a1bb-c1f279a6f0c2", "tenant_id": "2d03c65f9b3d458dad29ed04ba3bc578", "security_group_id": "f8ab2383-daff-4848-9625-02514362965e", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:15Z", "updated_at": "2020-11-06T18:03:15Z", "revision_number": 0, "project_id": "2d03c65f9b3d458dad29ed04ba3bc578"}, {"id": "f7ee6805-5230-4344-936d-6bcf35a36be3", "tenant_id": "2d03c65f9b3d458dad29ed04ba3bc578", "security_group_id": "f8ab2383-daff-4848-9625-02514362965e", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "f8ab2383-daff-4848-9625-02514362965e", "description": null, "tags": [], "created_at": "2020-11-06T18:03:15Z", "updated_at": "2020-11-06T18:03:15Z", "revision_number": 0, "project_id": "2d03c65f9b3d458dad29ed04ba3bc578"}, {"id": "ffbce299-16fe-4d15-bf5c-10418ffa7d84", "tenant_id": "2d03c65f9b3d458dad29ed04ba3bc578", "security_group_id": "f8ab2383-daff-4848-9625-02514362965e", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:15Z", "updated_at": "2020-11-06T18:03:15Z", "revision_number": 0, "project_id": "2d03c65f9b3d458dad29ed04ba3bc578"}, {"id": "ffc35d84-7ab7-4773-a934-7b605589ed43", "tenant_id": "2d03c65f9b3d458dad29ed04ba3bc578", "security_group_id": "f8ab2383-daff-4848-9625-02514362965e", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "f8ab2383-daff-4848-9625-02514362965e", "description": null, "tags": [], "created_at": "2020-11-06T18:03:15Z", "updated_at": "2020-11-06T18:03:15Z", "revision_number": 0, "project_id": "2d03c65f9b3d458dad29ed04ba3bc578"}], "tags": [], "created_at": "2020-11-06T18:03:15Z", "updated_at": "2020-11-06T18:03:15Z", "revision_number": 1, "project_id": "2d03c65f9b3d458dad29ed04ba3bc578"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:16.059 37 INFO tempest.lib.common.rest_client [req-0fbccb3f-304b-4094-af91-3b900c466386 ] Request (AvailabilityZoneExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/f8ab2383-daff-4848-9625-02514362965e 0.180s 2020-11-06 18:03:16.059 37 DEBUG tempest.lib.common.rest_client [req-0fbccb3f-304b-4094-af91-3b900c466386 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-0fbccb3f-304b-4094-af91-3b900c466386', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:03:16 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/f8ab2383-daff-4848-9625-02514362965e'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:16.102 38 INFO tempest.lib.common.rest_client [req-b785c214-901f-41ea-bd0b-e9d4c9badebb ] Request (EncryptionTypesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-11-06 18:03:16.103 38 DEBUG tempest.lib.common.rest_client [req-b785c214-901f-41ea-bd0b-e9d4c9badebb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b785c214-901f-41ea-bd0b-e9d4c9badebb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "69540f753276430e9629bd6eabeb4dc5", "name": "tempest-EncryptionTypesV3RbacTest-970791869", "password_expires_at": null}, "audit_ids": ["WdihkgvCQUmAWUKAjkd45w"], "expires_at": "2020-11-06T19:03:16.000000Z", "issued_at": "2020-11-06T18:03:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c438772b458f419e978fb1bbba39fd37", "name": "tempest-EncryptionTypesV3RbacTest-970791869"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:16.105 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:16.108 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_type_encryption:create, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:16.166 37 INFO tempest.lib.common.rest_client [req-461851c0-8de9-4978-a912-f1e77353a1f9 ] Request (AvailabilityZoneExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/2d03c65f9b3d458dad29ed04ba3bc578 0.106s 2020-11-06 18:03:16.166 37 DEBUG tempest.lib.common.rest_client [req-461851c0-8de9-4978-a912-f1e77353a1f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-461851c0-8de9-4978-a912-f1e77353a1f9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/2d03c65f9b3d458dad29ed04ba3bc578'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:16.235 40 INFO tempest.lib.common.rest_client [req-b9232a67-031c-4dea-ae47-e9556d53bcad ] Request (LimitsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-11-06 18:03:16.235 40 DEBUG tempest.lib.common.rest_client [req-b9232a67-031c-4dea-ae47-e9556d53bcad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b9232a67-031c-4dea-ae47-e9556d53bcad', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "89cb74fbf088410c915f8eda76fbd601", "name": "tempest-LimitsV3RbacTest-1431048088", "password_expires_at": null}, "audit_ids": ["I6uUQB-vQRG_0o6EJUsCvg"], "expires_at": "2020-11-06T19:03:16.000000Z", "issued_at": "2020-11-06T18:03:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "48ab5b94202448008c56eb20e2bdbf35", "name": "tempest-LimitsV3RbacTest-1431048088"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/48ab5b94202448008c56eb20e2bdbf35", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/48ab5b94202448008c56eb20e2bdbf35", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/48ab5b94202448008c56eb20e2bdbf35", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_48ab5b94202448008c56eb20e2bdbf35", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_48ab5b94202448008c56eb20e2bdbf35", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_48ab5b94202448008c56eb20e2bdbf35", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:16.238 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:16.241 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: limits_extension:used_limits, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:16.241 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:16.260 37 INFO tempest.lib.common.rest_client [req-74a52651-b259-4588-9b1f-9b424e015abd ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-11-06 18:03:16.260 37 DEBUG tempest.lib.common.rest_client [req-74a52651-b259-4588-9b1f-9b424e015abd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-74a52651-b259-4588-9b1f-9b424e015abd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["22MMc9QaQGWI0XCGwUhiKw"], "expires_at": "2020-11-06T19:03:16.000000Z", "issued_at": "2020-11-06T18:03:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:16.299 40 INFO tempest.lib.common.rest_client [req-59a768f2-795a-4d41-a9c6-fff9e8918416 ] Request (LimitsV3RbacTest:test_show_limits): 200 GET http://172.30.13.94/identity/v3/projects/48ab5b94202448008c56eb20e2bdbf35/users/89cb74fbf088410c915f8eda76fbd601/roles 0.057s 2020-11-06 18:03:16.300 40 DEBUG tempest.lib.common.rest_client [req-59a768f2-795a-4d41-a9c6-fff9e8918416 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-59a768f2-795a-4d41-a9c6-fff9e8918416', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/48ab5b94202448008c56eb20e2bdbf35/users/89cb74fbf088410c915f8eda76fbd601/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/48ab5b94202448008c56eb20e2bdbf35/users/89cb74fbf088410c915f8eda76fbd601/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:16.305 37 INFO tempest.lib.common.rest_client [req-f492b4cc-9a3e-4ed5-a0b2-041bb12d22cf ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:03:16.305 37 DEBUG tempest.lib.common.rest_client [req-f492b4cc-9a3e-4ed5-a0b2-041bb12d22cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f492b4cc-9a3e-4ed5-a0b2-041bb12d22cf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["0sr8aziTQxqq3mI1NLLDNg"], "expires_at": "2020-11-06T19:03:16.000000Z", "issued_at": "2020-11-06T18:03:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:16.340 40 INFO tempest.lib.common.rest_client [req-a837be28-9089-421b-ac47-56cf9ae11cf8 ] Request (LimitsV3RbacTest:test_show_limits): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:03:16.341 40 DEBUG tempest.lib.common.rest_client [req-a837be28-9089-421b-ac47-56cf9ae11cf8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a837be28-9089-421b-ac47-56cf9ae11cf8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "89cb74fbf088410c915f8eda76fbd601", "name": "tempest-LimitsV3RbacTest-1431048088", "password_expires_at": null}, "audit_ids": ["pRO3Go6qQsCKDufoRIO8Tg"], "expires_at": "2020-11-06T19:03:16.000000Z", "issued_at": "2020-11-06T18:03:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "48ab5b94202448008c56eb20e2bdbf35", "name": "tempest-LimitsV3RbacTest-1431048088"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/48ab5b94202448008c56eb20e2bdbf35", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/48ab5b94202448008c56eb20e2bdbf35", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/48ab5b94202448008c56eb20e2bdbf35", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_48ab5b94202448008c56eb20e2bdbf35", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_48ab5b94202448008c56eb20e2bdbf35", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_48ab5b94202448008c56eb20e2bdbf35", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:16.359 37 INFO tempest.lib.common.rest_client [req-17206584-cdd2-480b-872f-5dd0dc997587 ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.053s 2020-11-06 18:03:16.360 37 DEBUG tempest.lib.common.rest_client [req-17206584-cdd2-480b-872f-5dd0dc997587 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-17206584-cdd2-480b-872f-5dd0dc997587', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:16.415 38 INFO tempest.lib.common.rest_client [req-7faeaf05-1f1a-4e4c-8338-45251c9254f8 ] Request (EncryptionTypesV3RbacTest:test_create_volume_type_encryption): 200 POST http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types 0.306s 2020-11-06 18:03:16.416 38 DEBUG tempest.lib.common.rest_client [req-7faeaf05-1f1a-4e4c-8338-45251c9254f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-EncryptionTypesV3RbacTest-volume-type-1498583864"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-7faeaf05-1f1a-4e4c-8338-45251c9254f8', 'content-length': '231', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7faeaf05-1f1a-4e4c-8338-45251c9254f8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types'} Body: b'{"volume_type": {"id": "3607eaf2-d767-483e-9830-fe92cea27d83", "name": "tempest-EncryptionTypesV3RbacTest-volume-type-1498583864", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:16.418 37 INFO tempest.lib.common.rest_client [req-314cc395-98b8-445f-84b1-eaa01439bf4a ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.057s 2020-11-06 18:03:16.419 37 DEBUG tempest.lib.common.rest_client [req-314cc395-98b8-445f-84b1-eaa01439bf4a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-FlavorsServiceProfileExtRbacTest-658214980-desc", "domain_id": "default", "name": "tempest-FlavorsServiceProfileExtRbacTest-658214980"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '400', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-314cc395-98b8-445f-84b1-eaa01439bf4a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "b1e15ec001c246eeaed4d81f090f15a9", "name": "tempest-FlavorsServiceProfileExtRbacTest-658214980", "domain_id": "default", "description": "tempest-FlavorsServiceProfileExtRbacTest-658214980-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/b1e15ec001c246eeaed4d81f090f15a9"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:16.420 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:16.493 40 INFO tempest.lib.common.rest_client [req-7da81cf8-318e-4e40-be07-e07c243c4d90 ] Request (LimitsV3RbacTest:test_show_limits): 200 GET http://172.30.13.94/volume/v3/48ab5b94202448008c56eb20e2bdbf35/limits 0.150s 2020-11-06 18:03:16.493 40 DEBUG tempest.lib.common.rest_client [req-7da81cf8-318e-4e40-be07-e07c243c4d90 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-7da81cf8-318e-4e40-be07-e07c243c4d90', 'content-length': '302', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7da81cf8-318e-4e40-be07-e07c243c4d90', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/48ab5b94202448008c56eb20e2bdbf35/limits'} Body: b'{"limits": {"rate": [], "absolute": {"maxTotalVolumes": 10, "maxTotalSnapshots": 10, "maxTotalVolumeGigabytes": 1000, "maxTotalBackups": 10, "maxTotalBackupGigabytes": 1000, "totalVolumesUsed": 0, "totalGigabytesUsed": 0, "totalSnapshotsUsed": 0, "totalBackupsUsed": 0, "totalBackupGigabytesUsed": 0}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:16.499 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:16.539 37 INFO tempest.lib.common.rest_client [req-d9e452de-c9f4-4660-aa60-554d395fa048 ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.119s 2020-11-06 18:03:16.539 37 DEBUG tempest.lib.common.rest_client [req-d9e452de-c9f4-4660-aa60-554d395fa048 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-FlavorsServiceProfileExtRbacTest-658214980", "password": "A3*n0EDoHowyd1b", "project_id": "b1e15ec001c246eeaed4d81f090f15a9", "email": "tempest-FlavorsServiceProfileExtRbacTest-1853094788@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '419', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d9e452de-c9f4-4660-aa60-554d395fa048', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "b1e15ec001c246eeaed4d81f090f15a9", "email": "tempest-FlavorsServiceProfileExtRbacTest-1853094788@example.com", "id": "9af9fb0270034e8792467b7672208c8c", "name": "tempest-FlavorsServiceProfileExtRbacTest-658214980", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/9af9fb0270034e8792467b7672208c8c"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:16.545 38 INFO tempest.lib.common.rest_client [req-3f88988d-0042-4955-9a85-f42883f46214 ] Request (EncryptionTypesV3RbacTest:test_create_volume_type_encryption): 200 GET http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles 0.123s 2020-11-06 18:03:16.545 38 DEBUG tempest.lib.common.rest_client [req-3f88988d-0042-4955-9a85-f42883f46214 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3f88988d-0042-4955-9a85-f42883f46214', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:16.557 40 INFO tempest.lib.common.rest_client [req-26befb7d-2905-4677-972d-f07beca85a66 ] Request (LimitsV3RbacTest:test_show_limits): 200 GET http://172.30.13.94/identity/v3/projects/48ab5b94202448008c56eb20e2bdbf35/users/89cb74fbf088410c915f8eda76fbd601/roles 0.057s 2020-11-06 18:03:16.558 40 DEBUG tempest.lib.common.rest_client [req-26befb7d-2905-4677-972d-f07beca85a66 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-26befb7d-2905-4677-972d-f07beca85a66', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/48ab5b94202448008c56eb20e2bdbf35/users/89cb74fbf088410c915f8eda76fbd601/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/48ab5b94202448008c56eb20e2bdbf35/users/89cb74fbf088410c915f8eda76fbd601/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:16.593 37 INFO tempest.lib.common.rest_client [req-ba770276-03af-439b-83be-01ccbba59f5f ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.052s 2020-11-06 18:03:16.593 37 DEBUG tempest.lib.common.rest_client [req-ba770276-03af-439b-83be-01ccbba59f5f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ba770276-03af-439b-83be-01ccbba59f5f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:16.625 38 INFO tempest.lib.common.rest_client [req-bc4e64c9-7fa7-4722-a1b1-075eaee306b6 ] Request (EncryptionTypesV3RbacTest:test_create_volume_type_encryption): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-11-06 18:03:16.625 38 DEBUG tempest.lib.common.rest_client [req-bc4e64c9-7fa7-4722-a1b1-075eaee306b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bc4e64c9-7fa7-4722-a1b1-075eaee306b6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "69540f753276430e9629bd6eabeb4dc5", "name": "tempest-EncryptionTypesV3RbacTest-970791869", "password_expires_at": null}, "audit_ids": ["tEmpizB6TbyFJJpNmIgt9A"], "expires_at": "2020-11-06T19:03:16.000000Z", "issued_at": "2020-11-06T18:03:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c438772b458f419e978fb1bbba39fd37", "name": "tempest-EncryptionTypesV3RbacTest-970791869"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:16.640 40 INFO tempest.lib.common.rest_client [req-546e71da-5536-4404-a2f6-66559f1469d4 ] Request (LimitsV3RbacTest:test_show_limits): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 18:03:16.641 40 DEBUG tempest.lib.common.rest_client [req-546e71da-5536-4404-a2f6-66559f1469d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-546e71da-5536-4404-a2f6-66559f1469d4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "89cb74fbf088410c915f8eda76fbd601", "name": "tempest-LimitsV3RbacTest-1431048088", "password_expires_at": null}, "audit_ids": ["fcq-Ku3ZRs6xkv_ZbvQUFw"], "expires_at": "2020-11-06T19:03:16.000000Z", "issued_at": "2020-11-06T18:03:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "48ab5b94202448008c56eb20e2bdbf35", "name": "tempest-LimitsV3RbacTest-1431048088"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/48ab5b94202448008c56eb20e2bdbf35", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/48ab5b94202448008c56eb20e2bdbf35", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/48ab5b94202448008c56eb20e2bdbf35", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_48ab5b94202448008c56eb20e2bdbf35", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_48ab5b94202448008c56eb20e2bdbf35", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_48ab5b94202448008c56eb20e2bdbf35", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:16.648 37 INFO tempest.lib.common.rest_client [req-1a7efe77-e89f-431b-b985-eebbd3266d76 ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.053s 2020-11-06 18:03:16.648 37 DEBUG tempest.lib.common.rest_client [req-1a7efe77-e89f-431b-b985-eebbd3266d76 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1a7efe77-e89f-431b-b985-eebbd3266d76', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:16.711 37 INFO tempest.lib.common.rest_client [req-90c95c7a-3bd8-45d0-acdd-924e51fe1e79 ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/b1e15ec001c246eeaed4d81f090f15a9/users/9af9fb0270034e8792467b7672208c8c/roles/72a4576c553448cd941b052c1ca0cf2d 0.061s 2020-11-06 18:03:16.711 37 DEBUG tempest.lib.common.rest_client [req-90c95c7a-3bd8-45d0-acdd-924e51fe1e79 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-90c95c7a-3bd8-45d0-acdd-924e51fe1e79', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/b1e15ec001c246eeaed4d81f090f15a9/users/9af9fb0270034e8792467b7672208c8c/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:16.712 37 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FlavorsServiceProfileExtRbacTest-658214980', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'b1e15ec001c246eeaed4d81f090f15a9', 'project_name': 'tempest-FlavorsServiceProfileExtRbacTest-658214980', 'tenant_id': 'b1e15ec001c246eeaed4d81f090f15a9', 'tenant_name': 'tempest-FlavorsServiceProfileExtRbacTest-658214980', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '9af9fb0270034e8792467b7672208c8c'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:16.712 37 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FlavorsServiceProfileExtRbacTest-658214980', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'b1e15ec001c246eeaed4d81f090f15a9', 'project_name': 'tempest-FlavorsServiceProfileExtRbacTest-658214980', 'tenant_id': 'b1e15ec001c246eeaed4d81f090f15a9', 'tenant_name': 'tempest-FlavorsServiceProfileExtRbacTest-658214980', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '9af9fb0270034e8792467b7672208c8c'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:16.769 40 INFO tempest.lib.common.rest_client [req-d9bacadd-2ab8-427e-8fb8-cb4665d5344d ] Request (LimitsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/89cb74fbf088410c915f8eda76fbd601 0.125s 2020-11-06 18:03:16.769 40 DEBUG tempest.lib.common.rest_client [req-d9bacadd-2ab8-427e-8fb8-cb4665d5344d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d9bacadd-2ab8-427e-8fb8-cb4665d5344d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/89cb74fbf088410c915f8eda76fbd601'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:16.776 38 INFO tempest.lib.common.rest_client [req-a9491a36-1505-44cb-90d2-3335ea8a8414 ] Request (EncryptionTypesV3RbacTest:test_create_volume_type_encryption): 200 POST http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/3607eaf2-d767-483e-9830-fe92cea27d83/encryption 0.150s 2020-11-06 18:03:16.777 38 DEBUG tempest.lib.common.rest_client [req-a9491a36-1505-44cb-90d2-3335ea8a8414 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"encryption": {"provider": "nova.volume.encryptors.luks.LuksEncryptor", "control_location": "front-end"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a9491a36-1505-44cb-90d2-3335ea8a8414', 'content-length': '221', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a9491a36-1505-44cb-90d2-3335ea8a8414', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/3607eaf2-d767-483e-9830-fe92cea27d83/encryption'} Body: b'{"encryption": {"provider": "nova.volume.encryptors.luks.LuksEncryptor", "control_location": "front-end", "volume_type_id": "3607eaf2-d767-483e-9830-fe92cea27d83", "encryption_id": "3041c12f-5690-427d-8627-64a4dd2699d5"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:16.779 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:16.821 37 INFO tempest.lib.common.rest_client [req-0d069234-0c13-4071-8750-669c9f4bc82c ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.100s 2020-11-06 18:03:16.822 37 DEBUG tempest.lib.common.rest_client [req-0d069234-0c13-4071-8750-669c9f4bc82c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6593', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0d069234-0c13-4071-8750-669c9f4bc82c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9af9fb0270034e8792467b7672208c8c", "name": "tempest-FlavorsServiceProfileExtRbacTest-658214980", "password_expires_at": null}, "audit_ids": ["psVyMvVPQnSj8v9okqp5Lw"], "expires_at": "2020-11-06T19:03:16.000000Z", "issued_at": "2020-11-06T18:03:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b1e15ec001c246eeaed4d81f090f15a9", "name": "tempest-FlavorsServiceProfileExtRbacTest-658214980"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOn _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:16.822 37 WARNING tempest.manager [-] tempest.manager.Manager is not a stable interface and as such it should not be imported directly. It will be removed as soon as the client manager becomes available in tempest.lib. 2020-11-06 18:03:16.849 40 INFO tempest.lib.common.rest_client [req-daed9220-ab8d-425a-8983-ed9a9d2d574e ] Request (LimitsV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.079s 2020-11-06 18:03:16.849 40 DEBUG tempest.lib.common.rest_client [req-daed9220-ab8d-425a-8983-ed9a9d2d574e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-daed9220-ab8d-425a-8983-ed9a9d2d574e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["6J1BGYGyTrCrFOxCtU5VIw"], "expires_at": "2020-11-06T19:03:16.000000Z", "issued_at": "2020-11-06T18:03:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:16.861 37 INFO tempest.lib.common.rest_client [req-7b65fb4c-e705-46fa-adad-01c692e0ca71 ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:03:16.862 37 DEBUG tempest.lib.common.rest_client [req-7b65fb4c-e705-46fa-adad-01c692e0ca71 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7b65fb4c-e705-46fa-adad-01c692e0ca71', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["kw88L5OZQ7yKs01rm7ejzw"], "expires_at": "2020-11-06T19:03:16.000000Z", "issued_at": "2020-11-06T18:03:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:16.883 38 INFO tempest.lib.common.rest_client [req-aa568606-798a-41ba-b643-c13a0b150a6c ] Request (EncryptionTypesV3RbacTest:test_create_volume_type_encryption): 200 GET http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles 0.103s 2020-11-06 18:03:16.884 38 DEBUG tempest.lib.common.rest_client [req-aa568606-798a-41ba-b643-c13a0b150a6c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aa568606-798a-41ba-b643-c13a0b150a6c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:16.973 38 INFO tempest.lib.common.rest_client [req-48b0c22a-074a-4c03-b804-6a37dec297fc ] Request (EncryptionTypesV3RbacTest:test_create_volume_type_encryption): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 18:03:16.974 38 DEBUG tempest.lib.common.rest_client [req-48b0c22a-074a-4c03-b804-6a37dec297fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-48b0c22a-074a-4c03-b804-6a37dec297fc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "69540f753276430e9629bd6eabeb4dc5", "name": "tempest-EncryptionTypesV3RbacTest-970791869", "password_expires_at": null}, "audit_ids": ["ITAlsOSYSLu3LuAz_N_IGQ"], "expires_at": "2020-11-06T19:03:16.000000Z", "issued_at": "2020-11-06T18:03:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c438772b458f419e978fb1bbba39fd37", "name": "tempest-EncryptionTypesV3RbacTest-970791869"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:16.977 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:16.980 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_type_encryption:delete, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:17.066 37 INFO tempest.lib.common.rest_client [req-c6c000b3-02f0-464e-8c0f-2054096429ba ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:03:17.067 37 DEBUG tempest.lib.common.rest_client [req-c6c000b3-02f0-464e-8c0f-2054096429ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c6c000b3-02f0-464e-8c0f-2054096429ba', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["tYGgTxWYQMmiI-rOP72BBA"], "expires_at": "2020-11-06T19:03:17.000000Z", "issued_at": "2020-11-06T18:03:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:17.113 37 INFO tempest.lib.common.rest_client [req-ef2bb5c2-68ef-40aa-ac70-ac14646a6207 ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.045s 2020-11-06 18:03:17.114 37 DEBUG tempest.lib.common.rest_client [req-ef2bb5c2-68ef-40aa-ac70-ac14646a6207 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ef2bb5c2-68ef-40aa-ac70-ac14646a6207', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:17.164 37 INFO tempest.lib.common.rest_client [req-f3a9709f-c435-4af0-b8ba-99a1807a1243 ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.049s 2020-11-06 18:03:17.165 37 DEBUG tempest.lib.common.rest_client [req-f3a9709f-c435-4af0-b8ba-99a1807a1243 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f3a9709f-c435-4af0-b8ba-99a1807a1243', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:17.166 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:03:17.166 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:17.181 40 INFO tempest.lib.common.rest_client [req-12d28fcc-fdcf-490e-8675-eadd2b8a81a1 ] Request (LimitsV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=48ab5b94202448008c56eb20e2bdbf35&name=default 0.331s 2020-11-06 18:03:17.182 40 DEBUG tempest.lib.common.rest_client [req-12d28fcc-fdcf-490e-8675-eadd2b8a81a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-12d28fcc-fdcf-490e-8675-eadd2b8a81a1', 'date': 'Fri, 06 Nov 2020 18:03:17 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=48ab5b94202448008c56eb20e2bdbf35&name=default'} Body: b'{"security_groups": [{"id": "954b4aca-bfe9-424a-a13c-bab2f9d89cf3", "name": "default", "stateful": true, "tenant_id": "48ab5b94202448008c56eb20e2bdbf35", "description": "Default security group", "security_group_rules": [{"id": "00559470-4f89-48da-8749-f02d18ccc483", "tenant_id": "48ab5b94202448008c56eb20e2bdbf35", "security_group_id": "954b4aca-bfe9-424a-a13c-bab2f9d89cf3", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:17Z", "updated_at": "2020-11-06T18:03:17Z", "revision_number": 0, "project_id": "48ab5b94202448008c56eb20e2bdbf35"}, {"id": "021dae45-8036-472e-8981-84fc7d37f64f", "tenant_id": "48ab5b94202448008c56eb20e2bdbf35", "security_group_id": "954b4aca-bfe9-424a-a13c-bab2f9d89cf3", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "954b4aca-bfe9-424a-a13c-bab2f9d89cf3", "description": null, "tags": [], "created_at": "2020-11-06T18:03:17Z", "updated_at": "2020-11-06T18:03:17Z", "revision_number": 0, "project_id": "48ab5b94202448008c56eb20e2bdbf35"}, {"id": "03024754-8548-47a9-8851-2bd35f98e7a2", "tenant_id": "48ab5b94202448008c56eb20e2bdbf35", "security_group_id": "954b4aca-bfe9-424a-a13c-bab2f9d89cf3", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:17Z", "updated_at": "2020-11-06T18:03:17Z", "revision_number": 0, "project_id": "48ab5b94202448008c56eb20e2bdbf35"}, {"id": "e63cafb8-1859-4845-a94c-eec4bd2ca31e", "tenant_id": "48ab5b94202448008c56eb20e2bdbf35", "security_group_id": "954b4aca-bfe9-424a-a13c-bab2f9d89cf3", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "954b4aca-bfe9-424a-a13c-bab2f9d89cf3", "description": null, "tags": [], "created_at": "2020-11-06T18:03:17Z", "updated_at": "2020-11-06T18:03:17Z", "revision_number": 0, "project_id": "48ab5b94202448008c56eb20e2bdbf35"}], "tags": [], "created_at": "2020-11-06T18:03:17Z", "updated_at": "2020-11-06T18:03:17Z", "revision_number": 1, "project_id": "48ab5b94202448008c56eb20e2bdbf35"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:17.203 38 INFO tempest.lib.common.rest_client [req-9d8f6096-7ea3-4711-a0ce-e1e0f48b60c4 ] Request (EncryptionTypesV3RbacTest:test_delete_volume_type_encryption): 200 POST http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types 0.221s 2020-11-06 18:03:17.204 38 DEBUG tempest.lib.common.rest_client [req-9d8f6096-7ea3-4711-a0ce-e1e0f48b60c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-EncryptionTypesV3RbacTest-volume-type-1738834604"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-9d8f6096-7ea3-4711-a0ce-e1e0f48b60c4', 'content-length': '231', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9d8f6096-7ea3-4711-a0ce-e1e0f48b60c4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types'} Body: b'{"volume_type": {"id": "2899766a-e204-4836-990f-7d11918109e7", "name": "tempest-EncryptionTypesV3RbacTest-volume-type-1738834604", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:17.217 37 INFO tempest.lib.common.rest_client [req-c98241f2-2d08-4bb7-b99a-f967aef77c3b ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/b1e15ec001c246eeaed4d81f090f15a9/users/9af9fb0270034e8792467b7672208c8c/roles 0.049s 2020-11-06 18:03:17.217 37 DEBUG tempest.lib.common.rest_client [req-c98241f2-2d08-4bb7-b99a-f967aef77c3b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c98241f2-2d08-4bb7-b99a-f967aef77c3b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b1e15ec001c246eeaed4d81f090f15a9/users/9af9fb0270034e8792467b7672208c8c/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b1e15ec001c246eeaed4d81f090f15a9/users/9af9fb0270034e8792467b7672208c8c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:17.259 38 INFO tempest.lib.common.rest_client [req-93ba2faf-530a-4f80-a343-b5579856dc74 ] Request (EncryptionTypesV3RbacTest:test_delete_volume_type_encryption): 200 POST http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/2899766a-e204-4836-990f-7d11918109e7/encryption 0.051s 2020-11-06 18:03:17.260 38 DEBUG tempest.lib.common.rest_client [req-93ba2faf-530a-4f80-a343-b5579856dc74 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"encryption": {"provider": "nova.volume.encryptors.luks.LuksEncryptor", "control_location": "front-end"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-93ba2faf-530a-4f80-a343-b5579856dc74', 'content-length': '221', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-93ba2faf-530a-4f80-a343-b5579856dc74', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/2899766a-e204-4836-990f-7d11918109e7/encryption'} Body: b'{"encryption": {"provider": "nova.volume.encryptors.luks.LuksEncryptor", "control_location": "front-end", "volume_type_id": "2899766a-e204-4836-990f-7d11918109e7", "encryption_id": "d5d7a90b-b93c-4fa4-84bd-2efd248b512d"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:17.262 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:17.271 37 INFO tempest.lib.common.rest_client [req-94f83d4e-d8b6-415c-b07a-a41b5e84eddb ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/b1e15ec001c246eeaed4d81f090f15a9/users/9af9fb0270034e8792467b7672208c8c/roles/72a4576c553448cd941b052c1ca0cf2d 0.053s 2020-11-06 18:03:17.272 37 DEBUG tempest.lib.common.rest_client [req-94f83d4e-d8b6-415c-b07a-a41b5e84eddb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-94f83d4e-d8b6-415c-b07a-a41b5e84eddb', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/b1e15ec001c246eeaed4d81f090f15a9/users/9af9fb0270034e8792467b7672208c8c/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:17.302 40 INFO tempest.lib.common.rest_client [req-171e4770-8431-4b32-a561-319ea016e5d2 ] Request (LimitsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/954b4aca-bfe9-424a-a13c-bab2f9d89cf3 0.118s 2020-11-06 18:03:17.302 40 DEBUG tempest.lib.common.rest_client [req-171e4770-8431-4b32-a561-319ea016e5d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-171e4770-8431-4b32-a561-319ea016e5d2', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:03:17 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/954b4aca-bfe9-424a-a13c-bab2f9d89cf3'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:17.320 39 INFO tempest.lib.common.rest_client [req-29aede7f-59c6-4024-abc0-b8cf7f389c42 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.771s 2020-11-06 18:03:17.321 39 DEBUG tempest.lib.common.rest_client [req-29aede7f-59c6-4024-abc0-b8cf7f389c42 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-29aede7f-59c6-4024-abc0-b8cf7f389c42', 'x-compute-request-id': 'req-29aede7f-59c6-4024-abc0-b8cf7f389c42', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:17.364 38 INFO tempest.lib.common.rest_client [req-afd1b641-35ed-4b93-b96a-170de4dd1e63 ] Request (EncryptionTypesV3RbacTest:test_delete_volume_type_encryption): 200 GET http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles 0.101s 2020-11-06 18:03:17.364 38 DEBUG tempest.lib.common.rest_client [req-afd1b641-35ed-4b93-b96a-170de4dd1e63 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-afd1b641-35ed-4b93-b96a-170de4dd1e63', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:17.377 37 INFO tempest.lib.common.rest_client [req-ddad17a2-2bf6-4754-a236-25bafb7bc334 ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/b1e15ec001c246eeaed4d81f090f15a9/users/9af9fb0270034e8792467b7672208c8c/roles/a629c95d64b3416fb80ae90af4f69c05 0.104s 2020-11-06 18:03:17.378 37 DEBUG tempest.lib.common.rest_client [req-ddad17a2-2bf6-4754-a236-25bafb7bc334 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ddad17a2-2bf6-4754-a236-25bafb7bc334', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/b1e15ec001c246eeaed4d81f090f15a9/users/9af9fb0270034e8792467b7672208c8c/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:17.451 38 INFO tempest.lib.common.rest_client [req-4256af2d-7f4c-4051-a8b2-30fb87bca489 ] Request (EncryptionTypesV3RbacTest:test_delete_volume_type_encryption): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:03:17.451 38 DEBUG tempest.lib.common.rest_client [req-4256af2d-7f4c-4051-a8b2-30fb87bca489 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4256af2d-7f4c-4051-a8b2-30fb87bca489', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "69540f753276430e9629bd6eabeb4dc5", "name": "tempest-EncryptionTypesV3RbacTest-970791869", "password_expires_at": null}, "audit_ids": ["IxTAvR38RWKOrs9-QO63Qg"], "expires_at": "2020-11-06T19:03:17.000000Z", "issued_at": "2020-11-06T18:03:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c438772b458f419e978fb1bbba39fd37", "name": "tempest-EncryptionTypesV3RbacTest-970791869"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:17.491 40 INFO tempest.lib.common.rest_client [req-b91fef9d-87e6-4d65-8c4b-7f2b7dabaeb1 ] Request (LimitsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/48ab5b94202448008c56eb20e2bdbf35 0.188s 2020-11-06 18:03:17.491 40 DEBUG tempest.lib.common.rest_client [req-b91fef9d-87e6-4d65-8c4b-7f2b7dabaeb1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b91fef9d-87e6-4d65-8c4b-7f2b7dabaeb1', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/48ab5b94202448008c56eb20e2bdbf35'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:17.589 40 INFO tempest.lib.common.rest_client [req-31aa4519-1b61-4ebf-9b1f-116364bc4b33 ] Request (VolumeQOSV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-11-06 18:03:17.590 40 DEBUG tempest.lib.common.rest_client [req-31aa4519-1b61-4ebf-9b1f-116364bc4b33 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-31aa4519-1b61-4ebf-9b1f-116364bc4b33', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["7ag6xlTLRkmHOLmxNt31Jg"], "expires_at": "2020-11-06T19:03:17.000000Z", "issued_at": "2020-11-06T18:03:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:17.639 40 INFO tempest.lib.common.rest_client [req-ba5c466a-1747-4b21-8d98-2303858093dd ] Request (VolumeQOSV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:03:17.639 40 DEBUG tempest.lib.common.rest_client [req-ba5c466a-1747-4b21-8d98-2303858093dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ba5c466a-1747-4b21-8d98-2303858093dd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["al4ZIfl8QpaAFeuzI2BK6Q"], "expires_at": "2020-11-06T19:03:17.000000Z", "issued_at": "2020-11-06T18:03:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:17.663 38 INFO tempest.lib.common.rest_client [req-1c09e719-5cbe-4668-9430-f65df5c3c20f ] Request (EncryptionTypesV3RbacTest:test_delete_volume_type_encryption): 202 DELETE http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/2899766a-e204-4836-990f-7d11918109e7/encryption/provider 0.210s 2020-11-06 18:03:17.663 38 DEBUG tempest.lib.common.rest_client [req-1c09e719-5cbe-4668-9430-f65df5c3c20f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1c09e719-5cbe-4668-9430-f65df5c3c20f', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/2899766a-e204-4836-990f-7d11918109e7/encryption/provider'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:17.664 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:17.751 40 INFO tempest.lib.common.rest_client [req-29e49ac8-7c43-4614-b65c-800fcc034c06 ] Request (VolumeQOSV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.110s 2020-11-06 18:03:17.751 40 DEBUG tempest.lib.common.rest_client [req-29e49ac8-7c43-4614-b65c-800fcc034c06 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-29e49ac8-7c43-4614-b65c-800fcc034c06', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:17.772 38 INFO tempest.lib.common.rest_client [req-8c3b2640-e3f3-4145-a503-8b7509458a9a ] Request (EncryptionTypesV3RbacTest:test_delete_volume_type_encryption): 200 GET http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles 0.107s 2020-11-06 18:03:17.773 38 DEBUG tempest.lib.common.rest_client [req-8c3b2640-e3f3-4145-a503-8b7509458a9a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8c3b2640-e3f3-4145-a503-8b7509458a9a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:17.810 38 INFO tempest.lib.common.rest_client [req-250691b0-8f53-43a5-a50d-7338de79221d ] Request (EncryptionTypesV3RbacTest:test_delete_volume_type_encryption): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:03:17.811 38 DEBUG tempest.lib.common.rest_client [req-250691b0-8f53-43a5-a50d-7338de79221d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-250691b0-8f53-43a5-a50d-7338de79221d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "69540f753276430e9629bd6eabeb4dc5", "name": "tempest-EncryptionTypesV3RbacTest-970791869", "password_expires_at": null}, "audit_ids": ["18LPhZRISpqZYfR1YD6gqw"], "expires_at": "2020-11-06T19:03:17.000000Z", "issued_at": "2020-11-06T18:03:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c438772b458f419e978fb1bbba39fd37", "name": "tempest-EncryptionTypesV3RbacTest-970791869"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:17.813 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:17.814 40 INFO tempest.lib.common.rest_client [req-0c9a995c-800d-4e5f-873e-e1bd700ec0bd ] Request (VolumeQOSV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.062s 2020-11-06 18:03:17.815 40 DEBUG tempest.lib.common.rest_client [req-0c9a995c-800d-4e5f-873e-e1bd700ec0bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumeQOSV3RbacTest-571965261-desc", "domain_id": "default", "name": "tempest-VolumeQOSV3RbacTest-571965261"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '374', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0c9a995c-800d-4e5f-873e-e1bd700ec0bd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "9a623ebca89d45ecbc65193cf9959c3e", "name": "tempest-VolumeQOSV3RbacTest-571965261", "domain_id": "default", "description": "tempest-VolumeQOSV3RbacTest-571965261-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:17.815 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_type_encryption:get, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:17.937 40 INFO tempest.lib.common.rest_client [req-9f1053ca-8dfe-4e8e-8ee2-2cf94a709b5f ] Request (VolumeQOSV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.121s 2020-11-06 18:03:17.937 40 DEBUG tempest.lib.common.rest_client [req-9f1053ca-8dfe-4e8e-8ee2-2cf94a709b5f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumeQOSV3RbacTest-571965261", "password": "J4@Ace=nYiQwe^=", "project_id": "9a623ebca89d45ecbc65193cf9959c3e", "email": "tempest-VolumeQOSV3RbacTest-73924708@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '391', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9f1053ca-8dfe-4e8e-8ee2-2cf94a709b5f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "9a623ebca89d45ecbc65193cf9959c3e", "email": "tempest-VolumeQOSV3RbacTest-73924708@example.com", "id": "c1d2ecd3ecc741afb7e9a8880afcf666", "name": "tempest-VolumeQOSV3RbacTest-571965261", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/c1d2ecd3ecc741afb7e9a8880afcf666"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:17.991 40 INFO tempest.lib.common.rest_client [req-e0104938-791e-4896-9c88-eca2f89d8549 ] Request (VolumeQOSV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.052s 2020-11-06 18:03:17.991 40 DEBUG tempest.lib.common.rest_client [req-e0104938-791e-4896-9c88-eca2f89d8549 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e0104938-791e-4896-9c88-eca2f89d8549', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:18.046 40 INFO tempest.lib.common.rest_client [req-3471bcae-1990-45cf-b301-f8eb66848bab ] Request (VolumeQOSV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.053s 2020-11-06 18:03:18.047 40 DEBUG tempest.lib.common.rest_client [req-3471bcae-1990-45cf-b301-f8eb66848bab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3471bcae-1990-45cf-b301-f8eb66848bab', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:18.115 38 INFO tempest.lib.common.rest_client [req-890ebd86-6dee-43aa-bac1-ce1aa70f8532 ] Request (EncryptionTypesV3RbacTest:test_show_encryption_specs_item): 200 POST http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types 0.299s 2020-11-06 18:03:18.116 38 DEBUG tempest.lib.common.rest_client [req-890ebd86-6dee-43aa-bac1-ce1aa70f8532 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-EncryptionTypesV3RbacTest-volume-type-1350125825"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-890ebd86-6dee-43aa-bac1-ce1aa70f8532', 'content-length': '231', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-890ebd86-6dee-43aa-bac1-ce1aa70f8532', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types'} Body: b'{"volume_type": {"id": "6f251e22-2955-486f-b03e-08b4ad008d93", "name": "tempest-EncryptionTypesV3RbacTest-volume-type-1350125825", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:18.120 40 INFO tempest.lib.common.rest_client [req-3984a1a0-0d25-4a42-985e-6a0ff323c236 ] Request (VolumeQOSV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles/72a4576c553448cd941b052c1ca0cf2d 0.072s 2020-11-06 18:03:18.120 40 DEBUG tempest.lib.common.rest_client [req-3984a1a0-0d25-4a42-985e-6a0ff323c236 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3984a1a0-0d25-4a42-985e-6a0ff323c236', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:18.121 40 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumeQOSV3RbacTest-571965261', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '9a623ebca89d45ecbc65193cf9959c3e', 'project_name': 'tempest-VolumeQOSV3RbacTest-571965261', 'tenant_id': '9a623ebca89d45ecbc65193cf9959c3e', 'tenant_name': 'tempest-VolumeQOSV3RbacTest-571965261', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'c1d2ecd3ecc741afb7e9a8880afcf666'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:18.121 40 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumeQOSV3RbacTest-571965261', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '9a623ebca89d45ecbc65193cf9959c3e', 'project_name': 'tempest-VolumeQOSV3RbacTest-571965261', 'tenant_id': '9a623ebca89d45ecbc65193cf9959c3e', 'tenant_name': 'tempest-VolumeQOSV3RbacTest-571965261', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'c1d2ecd3ecc741afb7e9a8880afcf666'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:18.178 38 INFO tempest.lib.common.rest_client [req-8efc3318-526a-444d-b3e5-a8f8a13d9576 ] Request (EncryptionTypesV3RbacTest:test_show_encryption_specs_item): 200 POST http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/6f251e22-2955-486f-b03e-08b4ad008d93/encryption 0.057s 2020-11-06 18:03:18.179 38 DEBUG tempest.lib.common.rest_client [req-8efc3318-526a-444d-b3e5-a8f8a13d9576 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"encryption": {"provider": "nova.volume.encryptors.luks.LuksEncryptor", "control_location": "front-end"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-8efc3318-526a-444d-b3e5-a8f8a13d9576', 'content-length': '221', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8efc3318-526a-444d-b3e5-a8f8a13d9576', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/6f251e22-2955-486f-b03e-08b4ad008d93/encryption'} Body: b'{"encryption": {"provider": "nova.volume.encryptors.luks.LuksEncryptor", "control_location": "front-end", "volume_type_id": "6f251e22-2955-486f-b03e-08b4ad008d93", "encryption_id": "e3f9e81f-dc21-4842-a36f-031ab4599d00"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:18.182 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:18.229 40 INFO tempest.lib.common.rest_client [req-c589476b-ba40-40dc-be03-01830a2b2964 ] Request (VolumeQOSV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-11-06 18:03:18.230 40 DEBUG tempest.lib.common.rest_client [req-c589476b-ba40-40dc-be03-01830a2b2964 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6567', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c589476b-ba40-40dc-be03-01830a2b2964', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c1d2ecd3ecc741afb7e9a8880afcf666", "name": "tempest-VolumeQOSV3RbacTest-571965261", "password_expires_at": null}, "audit_ids": ["iavku2KqRom4o9jO5d4EAg"], "expires_at": "2020-11-06T19:03:18.000000Z", "issued_at": "2020-11-06T18:03:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a623ebca89d45ecbc65193cf9959c3e", "name": "tempest-VolumeQOSV3RbacTest-571965261"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30. _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:18.264 40 INFO tempest.lib.common.rest_client [req-574b9dc3-6307-4170-96f6-a9b7e7cd83c4 ] Request (VolumeQOSV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:03:18.265 40 DEBUG tempest.lib.common.rest_client [req-574b9dc3-6307-4170-96f6-a9b7e7cd83c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-574b9dc3-6307-4170-96f6-a9b7e7cd83c4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["Q8xD_-EHSOe3BmXTXz-S8A"], "expires_at": "2020-11-06T19:03:18.000000Z", "issued_at": "2020-11-06T18:03:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:18.290 38 INFO tempest.lib.common.rest_client [req-7efbd84a-6650-49ed-9e02-c65fcce1821d ] Request (EncryptionTypesV3RbacTest:test_show_encryption_specs_item): 200 GET http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles 0.107s 2020-11-06 18:03:18.291 38 DEBUG tempest.lib.common.rest_client [req-7efbd84a-6650-49ed-9e02-c65fcce1821d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7efbd84a-6650-49ed-9e02-c65fcce1821d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:18.307 40 INFO tempest.lib.common.rest_client [req-97cbbc11-cb59-466b-b781-5314a8463e5b ] Request (VolumeQOSV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:03:18.308 40 DEBUG tempest.lib.common.rest_client [req-97cbbc11-cb59-466b-b781-5314a8463e5b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-97cbbc11-cb59-466b-b781-5314a8463e5b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["yuA0Z7ABTc-WxQ0vOIy69w"], "expires_at": "2020-11-06T19:03:18.000000Z", "issued_at": "2020-11-06T18:03:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:18.358 40 INFO tempest.lib.common.rest_client [req-19e14701-ad2e-40aa-bfc5-8de465f3334c ] Request (VolumeQOSV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.049s 2020-11-06 18:03:18.358 40 DEBUG tempest.lib.common.rest_client [req-19e14701-ad2e-40aa-bfc5-8de465f3334c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-19e14701-ad2e-40aa-bfc5-8de465f3334c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:18.379 38 INFO tempest.lib.common.rest_client [req-70260096-1d35-48bd-9fdc-da44b73670d9 ] Request (EncryptionTypesV3RbacTest:test_show_encryption_specs_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-11-06 18:03:18.380 38 DEBUG tempest.lib.common.rest_client [req-70260096-1d35-48bd-9fdc-da44b73670d9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-70260096-1d35-48bd-9fdc-da44b73670d9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "69540f753276430e9629bd6eabeb4dc5", "name": "tempest-EncryptionTypesV3RbacTest-970791869", "password_expires_at": null}, "audit_ids": ["OTqivp5oSj6VMv_TdtGezQ"], "expires_at": "2020-11-06T19:03:18.000000Z", "issued_at": "2020-11-06T18:03:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c438772b458f419e978fb1bbba39fd37", "name": "tempest-EncryptionTypesV3RbacTest-970791869"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:18.407 40 INFO tempest.lib.common.rest_client [req-cf03b330-de75-4db6-a86c-eff912cd2721 ] Request (VolumeQOSV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.048s 2020-11-06 18:03:18.408 40 DEBUG tempest.lib.common.rest_client [req-cf03b330-de75-4db6-a86c-eff912cd2721 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cf03b330-de75-4db6-a86c-eff912cd2721', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:18.408 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:03:18.408 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:18.454 40 INFO tempest.lib.common.rest_client [req-1e40cf8e-8c30-4873-9c5d-23a12afd82b5 ] Request (VolumeQOSV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles 0.044s 2020-11-06 18:03:18.454 40 DEBUG tempest.lib.common.rest_client [req-1e40cf8e-8c30-4873-9c5d-23a12afd82b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1e40cf8e-8c30-4873-9c5d-23a12afd82b5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:18.463 37 INFO tempest.lib.common.rest_client [req-b6deb3bc-642d-4130-8a56-3e183a551bdc ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 18:03:18.463 37 DEBUG tempest.lib.common.rest_client [req-b6deb3bc-642d-4130-8a56-3e183a551bdc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6654', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b6deb3bc-642d-4130-8a56-3e183a551bdc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9af9fb0270034e8792467b7672208c8c", "name": "tempest-FlavorsServiceProfileExtRbacTest-658214980", "password_expires_at": null}, "audit_ids": ["pa3jzSnXRaWHBKplYiwMPw"], "expires_at": "2020-11-06T19:03:18.000000Z", "issued_at": "2020-11-06T18:03:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b1e15ec001c246eeaed4d81f090f15a9", "name": "tempest-FlavorsServiceProfileExtRbacTest-658214980"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a6 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:18.512 38 INFO tempest.lib.common.rest_client [req-1f7bbcdd-be11-4101-9580-3efd5e5f579a ] Request (EncryptionTypesV3RbacTest:test_show_encryption_specs_item): 200 GET http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/6f251e22-2955-486f-b03e-08b4ad008d93/encryption/provider 0.130s 2020-11-06 18:03:18.513 38 DEBUG tempest.lib.common.rest_client [req-1f7bbcdd-be11-4101-9580-3efd5e5f579a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-1f7bbcdd-be11-4101-9580-3efd5e5f579a', 'content-length': '57', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1f7bbcdd-be11-4101-9580-3efd5e5f579a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/6f251e22-2955-486f-b03e-08b4ad008d93/encryption/provider'} Body: b'{"provider": "nova.volume.encryptors.luks.LuksEncryptor"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:18.513 40 INFO tempest.lib.common.rest_client [req-9f7ff326-635f-4793-916f-40b61ff04e78 ] Request (VolumeQOSV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles/72a4576c553448cd941b052c1ca0cf2d 0.057s 2020-11-06 18:03:18.513 40 DEBUG tempest.lib.common.rest_client [req-9f7ff326-635f-4793-916f-40b61ff04e78 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9f7ff326-635f-4793-916f-40b61ff04e78', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:18.514 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:18.566 37 INFO tempest.lib.common.rest_client [req-5cef8317-3495-4347-9f6a-df75139d848e ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.102s 2020-11-06 18:03:18.567 37 DEBUG tempest.lib.common.rest_client [req-5cef8317-3495-4347-9f6a-df75139d848e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6654', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5cef8317-3495-4347-9f6a-df75139d848e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9af9fb0270034e8792467b7672208c8c", "name": "tempest-FlavorsServiceProfileExtRbacTest-658214980", "password_expires_at": null}, "audit_ids": ["J44u2m0iTq-CnVy1UhxD9w"], "expires_at": "2020-11-06T19:03:18.000000Z", "issued_at": "2020-11-06T18:03:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b1e15ec001c246eeaed4d81f090f15a9", "name": "tempest-FlavorsServiceProfileExtRbacTest-658214980"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a6 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:18.608 39 INFO tempest.lib.common.rest_client [req-f9692c6b-f403-412d-b16e-e526c2b1da2f ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.279s 2020-11-06 18:03:18.609 39 DEBUG tempest.lib.common.rest_client [req-f9692c6b-f403-412d-b16e-e526c2b1da2f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f9692c6b-f403-412d-b16e-e526c2b1da2f', 'x-compute-request-id': 'req-f9692c6b-f403-412d-b16e-e526c2b1da2f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:18.618 38 INFO tempest.lib.common.rest_client [req-56efcca1-88e1-4d0b-9f0d-ce40abe82dc5 ] Request (EncryptionTypesV3RbacTest:test_show_encryption_specs_item): 200 GET http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles 0.103s 2020-11-06 18:03:18.619 38 DEBUG tempest.lib.common.rest_client [req-56efcca1-88e1-4d0b-9f0d-ce40abe82dc5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-56efcca1-88e1-4d0b-9f0d-ce40abe82dc5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:18.622 40 INFO tempest.lib.common.rest_client [req-dacf2caa-3c2d-49a1-9df1-2baeb8c83be2 ] Request (VolumeQOSV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles/a629c95d64b3416fb80ae90af4f69c05 0.108s 2020-11-06 18:03:18.623 40 DEBUG tempest.lib.common.rest_client [req-dacf2caa-3c2d-49a1-9df1-2baeb8c83be2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dacf2caa-3c2d-49a1-9df1-2baeb8c83be2', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:18.703 38 INFO tempest.lib.common.rest_client [req-618f14b8-2b7f-4037-b4e0-87cfe4568b82 ] Request (EncryptionTypesV3RbacTest:test_show_encryption_specs_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 18:03:18.704 38 DEBUG tempest.lib.common.rest_client [req-618f14b8-2b7f-4037-b4e0-87cfe4568b82 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-618f14b8-2b7f-4037-b4e0-87cfe4568b82', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "69540f753276430e9629bd6eabeb4dc5", "name": "tempest-EncryptionTypesV3RbacTest-970791869", "password_expires_at": null}, "audit_ids": ["3PB2Y-qoSeeMT2xETLSenA"], "expires_at": "2020-11-06T19:03:18.000000Z", "issued_at": "2020-11-06T18:03:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c438772b458f419e978fb1bbba39fd37", "name": "tempest-EncryptionTypesV3RbacTest-970791869"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:18.706 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:18.708 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_type_encryption:get, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:18.795 37 INFO tempest.lib.common.rest_client [req-bb64dc4e-c425-49b2-a320-244776d6611e ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 200 GET http://172.30.13.94:9696/v2.0/service-providers 0.226s 2020-11-06 18:03:18.795 37 DEBUG tempest.lib.common.rest_client [req-bb64dc4e-c425-49b2-a320-244776d6611e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '304', 'x-openstack-request-id': 'req-bb64dc4e-c425-49b2-a320-244776d6611e', 'date': 'Fri, 06 Nov 2020 18:03:18 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/service-providers'} Body: b'{"service_providers": [{"service_type": "L3_ROUTER_NAT", "name": "dvrha", "default": false}, {"service_type": "L3_ROUTER_NAT", "name": "dvr", "default": false}, {"service_type": "L3_ROUTER_NAT", "name": "ha", "default": false}, {"service_type": "L3_ROUTER_NAT", "name": "single_node", "default": false}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:18.824 37 INFO tempest.lib.common.rest_client [req-4900fc70-985a-4aaf-be4a-796ac70cd3cf ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/flavors 0.027s 2020-11-06 18:03:18.824 37 DEBUG tempest.lib.common.rest_client [req-4900fc70-985a-4aaf-be4a-796ac70cd3cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"flavor": {"service_type": "L3_ROUTER_NAT"}} Response - Headers: {'content-type': 'application/json', 'content-length': '163', 'x-openstack-request-id': 'req-4900fc70-985a-4aaf-be4a-796ac70cd3cf', 'date': 'Fri, 06 Nov 2020 18:03:18 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors'} Body: b'{"flavor": {"id": "8be98339-2848-4df0-851b-a2e3a81fe504", "name": "", "description": "", "service_type": "L3_ROUTER_NAT", "enabled": true, "service_profiles": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:18.844 37 INFO tempest.lib.common.rest_client [req-ccefc272-0606-424a-8a57-48d4c817335d ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/service_profiles 0.019s 2020-11-06 18:03:18.845 37 DEBUG tempest.lib.common.rest_client [req-ccefc272-0606-424a-8a57-48d4c817335d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"service_profile": {"metainfo": "{\"foo\": \"bar\"}"}} Response - Headers: {'content-type': 'application/json', 'content-length': '151', 'x-openstack-request-id': 'req-ccefc272-0606-424a-8a57-48d4c817335d', 'date': 'Fri, 06 Nov 2020 18:03:18 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/service_profiles'} Body: b'{"service_profile": {"id": "8013af23-2b17-4d5e-b1f8-48a0f5482bc6", "description": "", "driver": "", "enabled": true, "metainfo": "{\\"foo\\": \\"bar\\"}"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:18.846 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:18.848 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_flavor_service_profile, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:18.848 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:18.864 38 INFO tempest.lib.common.rest_client [req-a2a8dee1-4edd-40f4-a475-cc453fcc1d2b ] Request (EncryptionTypesV3RbacTest:test_show_volume_type_encryption): 200 POST http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types 0.156s 2020-11-06 18:03:18.865 38 DEBUG tempest.lib.common.rest_client [req-a2a8dee1-4edd-40f4-a475-cc453fcc1d2b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-EncryptionTypesV3RbacTest-volume-type-1559640356"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a2a8dee1-4edd-40f4-a475-cc453fcc1d2b', 'content-length': '231', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a2a8dee1-4edd-40f4-a475-cc453fcc1d2b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types'} Body: b'{"volume_type": {"id": "93bf381a-7042-4fa4-af6a-4adef301aad4", "name": "tempest-EncryptionTypesV3RbacTest-volume-type-1559640356", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:18.923 38 INFO tempest.lib.common.rest_client [req-aaf283a1-03a4-4a0d-a04c-1fbd5241a82d ] Request (EncryptionTypesV3RbacTest:test_show_volume_type_encryption): 200 POST http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/93bf381a-7042-4fa4-af6a-4adef301aad4/encryption 0.052s 2020-11-06 18:03:18.924 38 DEBUG tempest.lib.common.rest_client [req-aaf283a1-03a4-4a0d-a04c-1fbd5241a82d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"encryption": {"provider": "nova.volume.encryptors.luks.LuksEncryptor", "control_location": "front-end"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-aaf283a1-03a4-4a0d-a04c-1fbd5241a82d', 'content-length': '221', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-aaf283a1-03a4-4a0d-a04c-1fbd5241a82d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/93bf381a-7042-4fa4-af6a-4adef301aad4/encryption'} Body: b'{"encryption": {"provider": "nova.volume.encryptors.luks.LuksEncryptor", "control_location": "front-end", "volume_type_id": "93bf381a-7042-4fa4-af6a-4adef301aad4", "encryption_id": "65975418-18fc-4c69-a943-b21805e746f5"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:18.927 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:18.960 37 INFO tempest.lib.common.rest_client [req-65c072d5-d502-4dae-95d6-5f8950a5cb4e ] Request (FlavorsServiceProfileExtRbacTest:test_create_flavor_service_profile): 200 GET http://172.30.13.94/identity/v3/projects/b1e15ec001c246eeaed4d81f090f15a9/users/9af9fb0270034e8792467b7672208c8c/roles 0.109s 2020-11-06 18:03:18.961 37 DEBUG tempest.lib.common.rest_client [req-65c072d5-d502-4dae-95d6-5f8950a5cb4e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-65c072d5-d502-4dae-95d6-5f8950a5cb4e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b1e15ec001c246eeaed4d81f090f15a9/users/9af9fb0270034e8792467b7672208c8c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b1e15ec001c246eeaed4d81f090f15a9/users/9af9fb0270034e8792467b7672208c8c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:18.975 38 INFO tempest.lib.common.rest_client [req-5bcc49f4-36a0-42cb-a5d9-4b78b152b2d6 ] Request (EncryptionTypesV3RbacTest:test_show_volume_type_encryption): 200 GET http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles 0.047s 2020-11-06 18:03:18.975 38 DEBUG tempest.lib.common.rest_client [req-5bcc49f4-36a0-42cb-a5d9-4b78b152b2d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5bcc49f4-36a0-42cb-a5d9-4b78b152b2d6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.004 37 INFO tempest.lib.common.rest_client [req-2f976247-046e-4d67-8dae-6f1dae746136 ] Request (FlavorsServiceProfileExtRbacTest:test_create_flavor_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-11-06 18:03:19.004 37 DEBUG tempest.lib.common.rest_client [req-2f976247-046e-4d67-8dae-6f1dae746136 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6654', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2f976247-046e-4d67-8dae-6f1dae746136', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9af9fb0270034e8792467b7672208c8c", "name": "tempest-FlavorsServiceProfileExtRbacTest-658214980", "password_expires_at": null}, "audit_ids": ["nHiyxOSfSB2wFdtI-__L7g"], "expires_at": "2020-11-06T19:03:18.000000Z", "issued_at": "2020-11-06T18:03:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b1e15ec001c246eeaed4d81f090f15a9", "name": "tempest-FlavorsServiceProfileExtRbacTest-658214980"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a6 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.010 38 INFO tempest.lib.common.rest_client [req-0b2edc01-b0a9-42c4-bde1-2cf654e3fad1 ] Request (EncryptionTypesV3RbacTest:test_show_volume_type_encryption): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:03:19.010 38 DEBUG tempest.lib.common.rest_client [req-0b2edc01-b0a9-42c4-bde1-2cf654e3fad1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0b2edc01-b0a9-42c4-bde1-2cf654e3fad1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "69540f753276430e9629bd6eabeb4dc5", "name": "tempest-EncryptionTypesV3RbacTest-970791869", "password_expires_at": null}, "audit_ids": ["r2ySW2qsSm2KDplfTvC5cg"], "expires_at": "2020-11-06T19:03:19.000000Z", "issued_at": "2020-11-06T18:03:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c438772b458f419e978fb1bbba39fd37", "name": "tempest-EncryptionTypesV3RbacTest-970791869"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.040 37 INFO tempest.lib.common.rest_client [req-372927e2-c7be-4c3e-b651-1f6653ca313c ] Request (FlavorsServiceProfileExtRbacTest:test_create_flavor_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:03:19.040 37 DEBUG tempest.lib.common.rest_client [req-372927e2-c7be-4c3e-b651-1f6653ca313c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6654', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-372927e2-c7be-4c3e-b651-1f6653ca313c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9af9fb0270034e8792467b7672208c8c", "name": "tempest-FlavorsServiceProfileExtRbacTest-658214980", "password_expires_at": null}, "audit_ids": ["BqFanuCzT7qiiRiBMKaZ_Q"], "expires_at": "2020-11-06T19:03:19.000000Z", "issued_at": "2020-11-06T18:03:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b1e15ec001c246eeaed4d81f090f15a9", "name": "tempest-FlavorsServiceProfileExtRbacTest-658214980"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a6 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.106 38 INFO tempest.lib.common.rest_client [req-022d46c7-1fb3-473f-8e6d-902583fe05a6 ] Request (EncryptionTypesV3RbacTest:test_show_volume_type_encryption): 200 GET http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/93bf381a-7042-4fa4-af6a-4adef301aad4/encryption 0.094s 2020-11-06 18:03:19.107 38 DEBUG tempest.lib.common.rest_client [req-022d46c7-1fb3-473f-8e6d-902583fe05a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-022d46c7-1fb3-473f-8e6d-902583fe05a6', 'content-length': '341', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-022d46c7-1fb3-473f-8e6d-902583fe05a6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/93bf381a-7042-4fa4-af6a-4adef301aad4/encryption'} Body: b'{"created_at": "2020-11-06T18:03:19.000000", "updated_at": null, "deleted_at": null, "deleted": false, "encryption_id": "65975418-18fc-4c69-a943-b21805e746f5", "cipher": null, "key_size": null, "provider": "nova.volume.encryptors.luks.LuksEncryptor", "control_location": "front-end", "volume_type_id": "93bf381a-7042-4fa4-af6a-4adef301aad4"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.111 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:19.154 37 INFO tempest.lib.common.rest_client [req-af47be3f-3fd8-461e-a7ce-c106f4c71cf5 ] Request (FlavorsServiceProfileExtRbacTest:test_create_flavor_service_profile): 201 POST http://172.30.13.94:9696/v2.0/flavors/8be98339-2848-4df0-851b-a2e3a81fe504/service_profiles 0.112s 2020-11-06 18:03:19.155 37 DEBUG tempest.lib.common.rest_client [req-af47be3f-3fd8-461e-a7ce-c106f4c71cf5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"service_profile": {"id": "8013af23-2b17-4d5e-b1f8-48a0f5482bc6"}} Response - Headers: {'content-type': 'application/json', 'content-length': '67', 'x-openstack-request-id': 'req-af47be3f-3fd8-461e-a7ce-c106f4c71cf5', 'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors/8be98339-2848-4df0-851b-a2e3a81fe504/service_profiles'} Body: b'{"service_profile": {"id": "8be98339-2848-4df0-851b-a2e3a81fe504"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.155 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:19.163 38 INFO tempest.lib.common.rest_client [req-1a4f0f6d-b3b0-47f0-b470-19eb78d7d325 ] Request (EncryptionTypesV3RbacTest:test_show_volume_type_encryption): 200 GET http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles 0.051s 2020-11-06 18:03:19.163 38 DEBUG tempest.lib.common.rest_client [req-1a4f0f6d-b3b0-47f0-b470-19eb78d7d325 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1a4f0f6d-b3b0-47f0-b470-19eb78d7d325', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.198 38 INFO tempest.lib.common.rest_client [req-c930fa11-6f88-40f2-84f5-91d2e8e14707 ] Request (EncryptionTypesV3RbacTest:test_show_volume_type_encryption): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:03:19.198 38 DEBUG tempest.lib.common.rest_client [req-c930fa11-6f88-40f2-84f5-91d2e8e14707 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c930fa11-6f88-40f2-84f5-91d2e8e14707', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "69540f753276430e9629bd6eabeb4dc5", "name": "tempest-EncryptionTypesV3RbacTest-970791869", "password_expires_at": null}, "audit_ids": ["NzFo9jjFRHqRhjbrSsj__g"], "expires_at": "2020-11-06T19:03:19.000000Z", "issued_at": "2020-11-06T18:03:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c438772b458f419e978fb1bbba39fd37", "name": "tempest-EncryptionTypesV3RbacTest-970791869"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.201 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:19.204 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_type_encryption:update, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:19.213 37 INFO tempest.lib.common.rest_client [req-6594b7c3-2488-4978-9279-f3f808d651b0 ] Request (FlavorsServiceProfileExtRbacTest:test_create_flavor_service_profile): 200 GET http://172.30.13.94/identity/v3/projects/b1e15ec001c246eeaed4d81f090f15a9/users/9af9fb0270034e8792467b7672208c8c/roles 0.056s 2020-11-06 18:03:19.213 37 DEBUG tempest.lib.common.rest_client [req-6594b7c3-2488-4978-9279-f3f808d651b0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6594b7c3-2488-4978-9279-f3f808d651b0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b1e15ec001c246eeaed4d81f090f15a9/users/9af9fb0270034e8792467b7672208c8c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b1e15ec001c246eeaed4d81f090f15a9/users/9af9fb0270034e8792467b7672208c8c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.253 37 INFO tempest.lib.common.rest_client [req-d154fec7-9749-473d-bbfc-ac1836e7d98f ] Request (FlavorsServiceProfileExtRbacTest:test_create_flavor_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:03:19.254 37 DEBUG tempest.lib.common.rest_client [req-d154fec7-9749-473d-bbfc-ac1836e7d98f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6654', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d154fec7-9749-473d-bbfc-ac1836e7d98f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9af9fb0270034e8792467b7672208c8c", "name": "tempest-FlavorsServiceProfileExtRbacTest-658214980", "password_expires_at": null}, "audit_ids": ["pu3sGKnhRm-ng8J76iRhYw"], "expires_at": "2020-11-06T19:03:19.000000Z", "issued_at": "2020-11-06T18:03:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b1e15ec001c246eeaed4d81f090f15a9", "name": "tempest-FlavorsServiceProfileExtRbacTest-658214980"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a6 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.291 37 INFO tempest.lib.common.rest_client [req-28b75927-af82-4044-b6a3-02a0daf789aa ] Request (FlavorsServiceProfileExtRbacTest:test_create_flavor_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:03:19.292 37 DEBUG tempest.lib.common.rest_client [req-28b75927-af82-4044-b6a3-02a0daf789aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6654', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-28b75927-af82-4044-b6a3-02a0daf789aa', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9af9fb0270034e8792467b7672208c8c", "name": "tempest-FlavorsServiceProfileExtRbacTest-658214980", "password_expires_at": null}, "audit_ids": ["Eml6eLrOQkmlyqOyEVvIDw"], "expires_at": "2020-11-06T19:03:19.000000Z", "issued_at": "2020-11-06T18:03:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b1e15ec001c246eeaed4d81f090f15a9", "name": "tempest-FlavorsServiceProfileExtRbacTest-658214980"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a6 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.318 38 INFO tempest.lib.common.rest_client [req-2b9716c6-f33b-444c-b911-02c0f62542a7 ] Request (EncryptionTypesV3RbacTest:test_update_volume_type_encryption): 200 POST http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types 0.113s 2020-11-06 18:03:19.318 38 DEBUG tempest.lib.common.rest_client [req-2b9716c6-f33b-444c-b911-02c0f62542a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-EncryptionTypesV3RbacTest-volume-type-1939333517"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-2b9716c6-f33b-444c-b911-02c0f62542a7', 'content-length': '231', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2b9716c6-f33b-444c-b911-02c0f62542a7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types'} Body: b'{"volume_type": {"id": "0a499425-6532-4289-9593-38f5c83d188b", "name": "tempest-EncryptionTypesV3RbacTest-volume-type-1939333517", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.370 38 INFO tempest.lib.common.rest_client [req-3fa9759f-79c5-46a6-8411-507db922d91f ] Request (EncryptionTypesV3RbacTest:test_update_volume_type_encryption): 200 POST http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/0a499425-6532-4289-9593-38f5c83d188b/encryption 0.048s 2020-11-06 18:03:19.371 38 DEBUG tempest.lib.common.rest_client [req-3fa9759f-79c5-46a6-8411-507db922d91f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"encryption": {"provider": "nova.volume.encryptors.luks.LuksEncryptor", "control_location": "front-end"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-3fa9759f-79c5-46a6-8411-507db922d91f', 'content-length': '221', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3fa9759f-79c5-46a6-8411-507db922d91f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/0a499425-6532-4289-9593-38f5c83d188b/encryption'} Body: b'{"encryption": {"provider": "nova.volume.encryptors.luks.LuksEncryptor", "control_location": "front-end", "volume_type_id": "0a499425-6532-4289-9593-38f5c83d188b", "encryption_id": "1823d32b-51ec-4f30-9839-0e2b950d4536"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.374 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:19.424 38 INFO tempest.lib.common.rest_client [req-cc008bfa-6edb-4fa0-a0e8-a251664dc012 ] Request (EncryptionTypesV3RbacTest:test_update_volume_type_encryption): 200 GET http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles 0.050s 2020-11-06 18:03:19.425 38 DEBUG tempest.lib.common.rest_client [req-cc008bfa-6edb-4fa0-a0e8-a251664dc012 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cc008bfa-6edb-4fa0-a0e8-a251664dc012', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.431 37 INFO tempest.lib.common.rest_client [req-ddf66490-114c-4b4e-b1ab-eb3b02f78a83 ] Request (FlavorsServiceProfileExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/flavors/8be98339-2848-4df0-851b-a2e3a81fe504/service_profiles/8013af23-2b17-4d5e-b1f8-48a0f5482bc6 0.137s 2020-11-06 18:03:19.431 37 DEBUG tempest.lib.common.rest_client [req-ddf66490-114c-4b4e-b1ab-eb3b02f78a83 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-ddf66490-114c-4b4e-b1ab-eb3b02f78a83', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors/8be98339-2848-4df0-851b-a2e3a81fe504/service_profiles/8013af23-2b17-4d5e-b1f8-48a0f5482bc6'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.434 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:19.437 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_flavor_service_profile, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:19.460 38 INFO tempest.lib.common.rest_client [req-708e19a3-333a-4e8d-b554-61e051e12ff8 ] Request (EncryptionTypesV3RbacTest:test_update_volume_type_encryption): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:03:19.461 38 DEBUG tempest.lib.common.rest_client [req-708e19a3-333a-4e8d-b554-61e051e12ff8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-708e19a3-333a-4e8d-b554-61e051e12ff8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "69540f753276430e9629bd6eabeb4dc5", "name": "tempest-EncryptionTypesV3RbacTest-970791869", "password_expires_at": null}, "audit_ids": ["BehT5Ls4TdaZO_oWPq8pbw"], "expires_at": "2020-11-06T19:03:19.000000Z", "issued_at": "2020-11-06T18:03:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c438772b458f419e978fb1bbba39fd37", "name": "tempest-EncryptionTypesV3RbacTest-970791869"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.520 37 INFO tempest.lib.common.rest_client [req-db482a7d-1804-4614-8154-88eb760ecee9 ] Request (FlavorsServiceProfileExtRbacTest:test_delete_flavor_service_profile): 201 POST http://172.30.13.94:9696/v2.0/flavors/8be98339-2848-4df0-851b-a2e3a81fe504/service_profiles 0.082s 2020-11-06 18:03:19.520 37 DEBUG tempest.lib.common.rest_client [req-db482a7d-1804-4614-8154-88eb760ecee9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"service_profile": {"id": "8013af23-2b17-4d5e-b1f8-48a0f5482bc6"}} Response - Headers: {'content-type': 'application/json', 'content-length': '67', 'x-openstack-request-id': 'req-db482a7d-1804-4614-8154-88eb760ecee9', 'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors/8be98339-2848-4df0-851b-a2e3a81fe504/service_profiles'} Body: b'{"service_profile": {"id": "8be98339-2848-4df0-851b-a2e3a81fe504"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.521 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:19.568 38 INFO tempest.lib.common.rest_client [req-fbdf67ec-f5f0-47b0-bad7-c1c9bb6cd70d ] Request (EncryptionTypesV3RbacTest:test_update_volume_type_encryption): 200 PUT http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/0a499425-6532-4289-9593-38f5c83d188b/encryption/provider 0.106s 2020-11-06 18:03:19.569 38 DEBUG tempest.lib.common.rest_client [req-fbdf67ec-f5f0-47b0-bad7-c1c9bb6cd70d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"encryption": {"control_location": "front-end"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-fbdf67ec-f5f0-47b0-bad7-c1c9bb6cd70d', 'content-length': '49', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-fbdf67ec-f5f0-47b0-bad7-c1c9bb6cd70d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/0a499425-6532-4289-9593-38f5c83d188b/encryption/provider'} Body: b'{"encryption": {"control_location": "front-end"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.572 37 INFO tempest.lib.common.rest_client [req-84ad37ee-9038-4abe-ad1a-b7a7a443f508 ] Request (FlavorsServiceProfileExtRbacTest:test_delete_flavor_service_profile): 200 GET http://172.30.13.94/identity/v3/projects/b1e15ec001c246eeaed4d81f090f15a9/users/9af9fb0270034e8792467b7672208c8c/roles 0.051s 2020-11-06 18:03:19.573 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:19.573 37 DEBUG tempest.lib.common.rest_client [req-84ad37ee-9038-4abe-ad1a-b7a7a443f508 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-84ad37ee-9038-4abe-ad1a-b7a7a443f508', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b1e15ec001c246eeaed4d81f090f15a9/users/9af9fb0270034e8792467b7672208c8c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b1e15ec001c246eeaed4d81f090f15a9/users/9af9fb0270034e8792467b7672208c8c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.608 37 INFO tempest.lib.common.rest_client [req-0a2fb49d-6edd-4a68-acda-9b9e8204a86d ] Request (FlavorsServiceProfileExtRbacTest:test_delete_flavor_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:03:19.609 37 DEBUG tempest.lib.common.rest_client [req-0a2fb49d-6edd-4a68-acda-9b9e8204a86d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6654', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0a2fb49d-6edd-4a68-acda-9b9e8204a86d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9af9fb0270034e8792467b7672208c8c", "name": "tempest-FlavorsServiceProfileExtRbacTest-658214980", "password_expires_at": null}, "audit_ids": ["Ei3C87BVQMWG6ev-Ed9KpA"], "expires_at": "2020-11-06T19:03:19.000000Z", "issued_at": "2020-11-06T18:03:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b1e15ec001c246eeaed4d81f090f15a9", "name": "tempest-FlavorsServiceProfileExtRbacTest-658214980"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a6 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.624 38 INFO tempest.lib.common.rest_client [req-59239ed0-309a-4c30-8c9e-2a55bb351f09 ] Request (EncryptionTypesV3RbacTest:test_update_volume_type_encryption): 200 GET http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles 0.050s 2020-11-06 18:03:19.625 38 DEBUG tempest.lib.common.rest_client [req-59239ed0-309a-4c30-8c9e-2a55bb351f09 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-59239ed0-309a-4c30-8c9e-2a55bb351f09', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37/users/69540f753276430e9629bd6eabeb4dc5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.643 37 INFO tempest.lib.common.rest_client [req-15deeb52-d5c8-4df7-9d99-9bf7482a809a ] Request (FlavorsServiceProfileExtRbacTest:test_delete_flavor_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:03:19.643 37 DEBUG tempest.lib.common.rest_client [req-15deeb52-d5c8-4df7-9d99-9bf7482a809a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6654', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-15deeb52-d5c8-4df7-9d99-9bf7482a809a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9af9fb0270034e8792467b7672208c8c", "name": "tempest-FlavorsServiceProfileExtRbacTest-658214980", "password_expires_at": null}, "audit_ids": ["rBiZln8aRp6qN_cUrnmdKA"], "expires_at": "2020-11-06T19:03:19.000000Z", "issued_at": "2020-11-06T18:03:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b1e15ec001c246eeaed4d81f090f15a9", "name": "tempest-FlavorsServiceProfileExtRbacTest-658214980"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a6 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.655 38 INFO tempest.lib.common.rest_client [req-7a9c4e35-8616-4ed5-b789-49dce88a91c7 ] Request (EncryptionTypesV3RbacTest:test_update_volume_type_encryption): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.029s 2020-11-06 18:03:19.656 38 DEBUG tempest.lib.common.rest_client [req-7a9c4e35-8616-4ed5-b789-49dce88a91c7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7a9c4e35-8616-4ed5-b789-49dce88a91c7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "69540f753276430e9629bd6eabeb4dc5", "name": "tempest-EncryptionTypesV3RbacTest-970791869", "password_expires_at": null}, "audit_ids": ["Q5ZN3AUPQC2reiQNSez6pg"], "expires_at": "2020-11-06T19:03:19.000000Z", "issued_at": "2020-11-06T18:03:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c438772b458f419e978fb1bbba39fd37", "name": "tempest-EncryptionTypesV3RbacTest-970791869"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c438772b458f419e978fb1bbba39fd37", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.718 40 INFO tempest.lib.common.rest_client [req-5a3f048b-5a99-4dbb-88f0-77f90088d1ca ] Request (VolumeQOSV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-11-06 18:03:19.718 40 DEBUG tempest.lib.common.rest_client [req-5a3f048b-5a99-4dbb-88f0-77f90088d1ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5a3f048b-5a99-4dbb-88f0-77f90088d1ca', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c1d2ecd3ecc741afb7e9a8880afcf666", "name": "tempest-VolumeQOSV3RbacTest-571965261", "password_expires_at": null}, "audit_ids": ["Q8CjfIz2Qv2-vhjmUCA7oA"], "expires_at": "2020-11-06T19:03:19.000000Z", "issued_at": "2020-11-06T18:03:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a623ebca89d45ecbc65193cf9959c3e", "name": "tempest-VolumeQOSV3RbacTest-571965261"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.721 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:19.726 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:qos_specs_manage:update, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:19.744 37 INFO tempest.lib.common.rest_client [req-430cc679-953e-40c9-bbda-1331da4bd1df ] Request (FlavorsServiceProfileExtRbacTest:test_delete_flavor_service_profile): 204 DELETE http://172.30.13.94:9696/v2.0/flavors/8be98339-2848-4df0-851b-a2e3a81fe504/service_profiles/8013af23-2b17-4d5e-b1f8-48a0f5482bc6 0.099s 2020-11-06 18:03:19.744 37 DEBUG tempest.lib.common.rest_client [req-430cc679-953e-40c9-bbda-1331da4bd1df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-430cc679-953e-40c9-bbda-1331da4bd1df', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors/8be98339-2848-4df0-851b-a2e3a81fe504/service_profiles/8013af23-2b17-4d5e-b1f8-48a0f5482bc6'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.744 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:19.779 38 INFO tempest.lib.common.rest_client [req-fdbebc0e-882a-4958-b37e-08f1a0643cc3 ] Request (EncryptionTypesV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/0a499425-6532-4289-9593-38f5c83d188b 0.121s 2020-11-06 18:03:19.780 38 DEBUG tempest.lib.common.rest_client [req-fdbebc0e-882a-4958-b37e-08f1a0643cc3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-fdbebc0e-882a-4958-b37e-08f1a0643cc3', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/0a499425-6532-4289-9593-38f5c83d188b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.796 37 INFO tempest.lib.common.rest_client [req-c50d7dbd-10c2-4a1b-97b0-a05d4d1fe030 ] Request (FlavorsServiceProfileExtRbacTest:test_delete_flavor_service_profile): 200 GET http://172.30.13.94/identity/v3/projects/b1e15ec001c246eeaed4d81f090f15a9/users/9af9fb0270034e8792467b7672208c8c/roles 0.050s 2020-11-06 18:03:19.796 37 DEBUG tempest.lib.common.rest_client [req-c50d7dbd-10c2-4a1b-97b0-a05d4d1fe030 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c50d7dbd-10c2-4a1b-97b0-a05d4d1fe030', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b1e15ec001c246eeaed4d81f090f15a9/users/9af9fb0270034e8792467b7672208c8c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b1e15ec001c246eeaed4d81f090f15a9/users/9af9fb0270034e8792467b7672208c8c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.799 38 INFO tempest.lib.common.rest_client [req-62701a7a-5dde-456f-82fc-2ccccdeb9280 ] Request (EncryptionTypesV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/0a499425-6532-4289-9593-38f5c83d188b 0.018s 2020-11-06 18:03:19.799 38 DEBUG tempest.lib.common.rest_client [req-62701a7a-5dde-456f-82fc-2ccccdeb9280 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-62701a7a-5dde-456f-82fc-2ccccdeb9280', 'x-openstack-request-id': 'req-62701a7a-5dde-456f-82fc-2ccccdeb9280', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/0a499425-6532-4289-9593-38f5c83d188b'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 0a499425-6532-4289-9593-38f5c83d188b could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.827 40 INFO tempest.lib.common.rest_client [req-a1bcffc1-2d6c-468b-94fb-d181af9ab7dc ] Request (VolumeQOSV3RbacTest:test_associate_qos): 200 POST http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs 0.099s 2020-11-06 18:03:19.828 40 DEBUG tempest.lib.common.rest_client [req-a1bcffc1-2d6c-468b-94fb-d181af9ab7dc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"qos_specs": {"name": "tempest-VolumeQOSV3RbacTest-QoS-1022848292", "consumer": "front-end"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a1bcffc1-2d6c-468b-94fb-d181af9ab7dc', 'content-length': '441', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a1bcffc1-2d6c-468b-94fb-d181af9ab7dc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs'} Body: b'{"qos_specs": {"id": "c5374ba4-a651-4358-89e1-5fa1286cf52d", "name": "tempest-VolumeQOSV3RbacTest-QoS-1022848292", "consumer": "front-end", "specs": {}}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/c5374ba4-a651-4358-89e1-5fa1286cf52d"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/c5374ba4-a651-4358-89e1-5fa1286cf52d"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.831 37 INFO tempest.lib.common.rest_client [req-53b0e6b1-e88a-424c-b98f-52ed7ec078fc ] Request (FlavorsServiceProfileExtRbacTest:test_delete_flavor_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:03:19.831 37 DEBUG tempest.lib.common.rest_client [req-53b0e6b1-e88a-424c-b98f-52ed7ec078fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6654', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-53b0e6b1-e88a-424c-b98f-52ed7ec078fc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9af9fb0270034e8792467b7672208c8c", "name": "tempest-FlavorsServiceProfileExtRbacTest-658214980", "password_expires_at": null}, "audit_ids": ["GH6hCTZrS1OR40IXmShwpg"], "expires_at": "2020-11-06T19:03:19.000000Z", "issued_at": "2020-11-06T18:03:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b1e15ec001c246eeaed4d81f090f15a9", "name": "tempest-FlavorsServiceProfileExtRbacTest-658214980"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a6 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.864 37 INFO tempest.lib.common.rest_client [req-1332688f-c259-4187-bd26-2ec9669a56fe ] Request (FlavorsServiceProfileExtRbacTest:test_delete_flavor_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:03:19.864 37 DEBUG tempest.lib.common.rest_client [req-1332688f-c259-4187-bd26-2ec9669a56fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6654', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1332688f-c259-4187-bd26-2ec9669a56fe', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9af9fb0270034e8792467b7672208c8c", "name": "tempest-FlavorsServiceProfileExtRbacTest-658214980", "password_expires_at": null}, "audit_ids": ["KDJMbwVWTvivGPTRQQNjbw"], "expires_at": "2020-11-06T19:03:19.000000Z", "issued_at": "2020-11-06T18:03:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b1e15ec001c246eeaed4d81f090f15a9", "name": "tempest-FlavorsServiceProfileExtRbacTest-658214980"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1e15ec001c246eeaed4d81f090f15a9", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a6 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.879 38 INFO tempest.lib.common.rest_client [req-d95e0298-fc0c-4ecd-9177-92c753914eca ] Request (EncryptionTypesV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/93bf381a-7042-4fa4-af6a-4adef301aad4 0.078s 2020-11-06 18:03:19.879 38 DEBUG tempest.lib.common.rest_client [req-d95e0298-fc0c-4ecd-9177-92c753914eca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d95e0298-fc0c-4ecd-9177-92c753914eca', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/93bf381a-7042-4fa4-af6a-4adef301aad4'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.880 40 INFO tempest.lib.common.rest_client [req-b1e4823a-da3e-4756-adac-5e518fc9721c ] Request (VolumeQOSV3RbacTest:test_associate_qos): 200 POST http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/types 0.047s 2020-11-06 18:03:19.881 40 DEBUG tempest.lib.common.rest_client [req-b1e4823a-da3e-4756-adac-5e518fc9721c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-VolumeQOSV3RbacTest-volume-type-79587772"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-b1e4823a-da3e-4756-adac-5e518fc9721c', 'content-length': '223', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b1e4823a-da3e-4756-adac-5e518fc9721c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/types'} Body: b'{"volume_type": {"id": "dd926011-52cc-46f5-a05e-ee1badfef80e", "name": "tempest-VolumeQOSV3RbacTest-volume-type-79587772", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.886 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:19.894 39 INFO tempest.lib.common.rest_client [req-5a46041f-5744-4965-893d-77ddabd194eb ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.267s 2020-11-06 18:03:19.894 39 DEBUG tempest.lib.common.rest_client [req-5a46041f-5744-4965-893d-77ddabd194eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5a46041f-5744-4965-893d-77ddabd194eb', 'x-compute-request-id': 'req-5a46041f-5744-4965-893d-77ddabd194eb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.905 38 INFO tempest.lib.common.rest_client [req-e80c9d73-3757-4bd7-b8ec-b6ab511a8daa ] Request (EncryptionTypesV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/93bf381a-7042-4fa4-af6a-4adef301aad4 0.024s 2020-11-06 18:03:19.905 38 DEBUG tempest.lib.common.rest_client [req-e80c9d73-3757-4bd7-b8ec-b6ab511a8daa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-e80c9d73-3757-4bd7-b8ec-b6ab511a8daa', 'x-openstack-request-id': 'req-e80c9d73-3757-4bd7-b8ec-b6ab511a8daa', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/93bf381a-7042-4fa4-af6a-4adef301aad4'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 93bf381a-7042-4fa4-af6a-4adef301aad4 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.942 40 INFO tempest.lib.common.rest_client [req-6df39439-f484-4572-98e8-9fb734e9f583 ] Request (VolumeQOSV3RbacTest:test_associate_qos): 200 GET http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles 0.054s 2020-11-06 18:03:19.942 40 DEBUG tempest.lib.common.rest_client [req-6df39439-f484-4572-98e8-9fb734e9f583 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6df39439-f484-4572-98e8-9fb734e9f583', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.955 37 INFO tempest.lib.common.rest_client [req-ac2b9bb9-faca-45c8-8dd7-4d8029225eb6 ] Request (FlavorsServiceProfileExtRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94:9696/v2.0/flavors/8be98339-2848-4df0-851b-a2e3a81fe504/service_profiles/8013af23-2b17-4d5e-b1f8-48a0f5482bc6 0.089s 2020-11-06 18:03:19.955 37 DEBUG tempest.lib.common.rest_client [req-ac2b9bb9-faca-45c8-8dd7-4d8029225eb6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '214', 'x-openstack-request-id': 'req-ac2b9bb9-faca-45c8-8dd7-4d8029225eb6', 'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors/8be98339-2848-4df0-851b-a2e3a81fe504/service_profiles/8013af23-2b17-4d5e-b1f8-48a0f5482bc6'} Body: b'{"NeutronError": {"type": "FlavorServiceProfileBindingNotFound", "message": "Service Profile 8013af23-2b17-4d5e-b1f8-48a0f5482bc6 is not associated with flavor 8be98339-2848-4df0-851b-a2e3a81fe504.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.976 38 INFO tempest.lib.common.rest_client [req-9aee6bdb-b83c-481c-9063-11b0d49ee87d ] Request (EncryptionTypesV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/6f251e22-2955-486f-b03e-08b4ad008d93 0.070s 2020-11-06 18:03:19.977 38 DEBUG tempest.lib.common.rest_client [req-9aee6bdb-b83c-481c-9063-11b0d49ee87d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9aee6bdb-b83c-481c-9063-11b0d49ee87d', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/6f251e22-2955-486f-b03e-08b4ad008d93'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.978 40 INFO tempest.lib.common.rest_client [req-def2dfcf-3b97-4e0f-afde-60bd528af1e5 ] Request (VolumeQOSV3RbacTest:test_associate_qos): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:03:19.979 40 DEBUG tempest.lib.common.rest_client [req-def2dfcf-3b97-4e0f-afde-60bd528af1e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-def2dfcf-3b97-4e0f-afde-60bd528af1e5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c1d2ecd3ecc741afb7e9a8880afcf666", "name": "tempest-VolumeQOSV3RbacTest-571965261", "password_expires_at": null}, "audit_ids": ["hEh5IHciS1i2PXwt5uLHrw"], "expires_at": "2020-11-06T19:03:19.000000Z", "issued_at": "2020-11-06T18:03:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a623ebca89d45ecbc65193cf9959c3e", "name": "tempest-VolumeQOSV3RbacTest-571965261"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:19.998 38 INFO tempest.lib.common.rest_client [req-13f7cc5c-2b9d-4233-8ace-dd7d343ce4b8 ] Request (EncryptionTypesV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/6f251e22-2955-486f-b03e-08b4ad008d93 0.021s 2020-11-06 18:03:19.998 38 DEBUG tempest.lib.common.rest_client [req-13f7cc5c-2b9d-4233-8ace-dd7d343ce4b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-13f7cc5c-2b9d-4233-8ace-dd7d343ce4b8', 'x-openstack-request-id': 'req-13f7cc5c-2b9d-4233-8ace-dd7d343ce4b8', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/6f251e22-2955-486f-b03e-08b4ad008d93'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 6f251e22-2955-486f-b03e-08b4ad008d93 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:20.023 37 INFO tempest.lib.common.rest_client [req-c378ac4d-24c0-43af-815d-ba64f5d4a7d3 ] Request (FlavorsServiceProfileExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/service_profiles/8013af23-2b17-4d5e-b1f8-48a0f5482bc6 0.065s 2020-11-06 18:03:20.023 37 DEBUG tempest.lib.common.rest_client [req-c378ac4d-24c0-43af-815d-ba64f5d4a7d3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-c378ac4d-24c0-43af-815d-ba64f5d4a7d3', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:03:20 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/service_profiles/8013af23-2b17-4d5e-b1f8-48a0f5482bc6'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:20.065 38 INFO tempest.lib.common.rest_client [req-0e6e193b-133c-48b9-a036-3b5df957c5ce ] Request (EncryptionTypesV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/2899766a-e204-4836-990f-7d11918109e7 0.066s 2020-11-06 18:03:20.065 38 DEBUG tempest.lib.common.rest_client [req-0e6e193b-133c-48b9-a036-3b5df957c5ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0e6e193b-133c-48b9-a036-3b5df957c5ce', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/2899766a-e204-4836-990f-7d11918109e7'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:20.084 38 INFO tempest.lib.common.rest_client [req-a0e40bcd-3042-461c-949c-6f96b9cc18cf ] Request (EncryptionTypesV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/2899766a-e204-4836-990f-7d11918109e7 0.018s 2020-11-06 18:03:20.085 38 DEBUG tempest.lib.common.rest_client [req-a0e40bcd-3042-461c-949c-6f96b9cc18cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-a0e40bcd-3042-461c-949c-6f96b9cc18cf', 'x-openstack-request-id': 'req-a0e40bcd-3042-461c-949c-6f96b9cc18cf', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/2899766a-e204-4836-990f-7d11918109e7'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 2899766a-e204-4836-990f-7d11918109e7 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:20.095 37 INFO tempest.lib.common.rest_client [req-ce7eba14-96d2-4b49-8cf3-87b6126fd4a6 ] Request (FlavorsServiceProfileExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/flavors/8be98339-2848-4df0-851b-a2e3a81fe504 0.070s 2020-11-06 18:03:20.095 37 DEBUG tempest.lib.common.rest_client [req-ce7eba14-96d2-4b49-8cf3-87b6126fd4a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-ce7eba14-96d2-4b49-8cf3-87b6126fd4a6', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:03:20 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors/8be98339-2848-4df0-851b-a2e3a81fe504'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:20.104 40 INFO tempest.lib.common.rest_client [req-30f22856-06ac-4114-a4b1-61b0279070dd ] Request (VolumeQOSV3RbacTest:test_associate_qos): 202 GET http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/c5374ba4-a651-4358-89e1-5fa1286cf52d/associate?vol_type_id=dd926011-52cc-46f5-a05e-ee1badfef80e 0.124s 2020-11-06 18:03:20.105 40 DEBUG tempest.lib.common.rest_client [req-30f22856-06ac-4114-a4b1-61b0279070dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-30f22856-06ac-4114-a4b1-61b0279070dd', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/c5374ba4-a651-4358-89e1-5fa1286cf52d/associate?vol_type_id=dd926011-52cc-46f5-a05e-ee1badfef80e'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:20.105 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:20.151 38 INFO tempest.lib.common.rest_client [req-888fdabd-7b3d-4717-a35a-1b7f07f8969f ] Request (EncryptionTypesV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/3607eaf2-d767-483e-9830-fe92cea27d83 0.065s 2020-11-06 18:03:20.151 38 DEBUG tempest.lib.common.rest_client [req-888fdabd-7b3d-4717-a35a-1b7f07f8969f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-888fdabd-7b3d-4717-a35a-1b7f07f8969f', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/3607eaf2-d767-483e-9830-fe92cea27d83'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:20.163 40 INFO tempest.lib.common.rest_client [req-e8e93821-9cc9-4176-ae64-4929a82951a1 ] Request (VolumeQOSV3RbacTest:test_associate_qos): 200 GET http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles 0.056s 2020-11-06 18:03:20.163 40 DEBUG tempest.lib.common.rest_client [req-e8e93821-9cc9-4176-ae64-4929a82951a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e8e93821-9cc9-4176-ae64-4929a82951a1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:20.171 38 INFO tempest.lib.common.rest_client [req-b06648cc-3ffa-4c94-be95-4fd7ef8e4503 ] Request (EncryptionTypesV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/3607eaf2-d767-483e-9830-fe92cea27d83 0.019s 2020-11-06 18:03:20.172 38 DEBUG tempest.lib.common.rest_client [req-b06648cc-3ffa-4c94-be95-4fd7ef8e4503 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-b06648cc-3ffa-4c94-be95-4fd7ef8e4503', 'x-openstack-request-id': 'req-b06648cc-3ffa-4c94-be95-4fd7ef8e4503', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/c438772b458f419e978fb1bbba39fd37/types/3607eaf2-d767-483e-9830-fe92cea27d83'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 3607eaf2-d767-483e-9830-fe92cea27d83 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:20.194 40 INFO tempest.lib.common.rest_client [req-19ed4e77-ea29-4fda-b172-1f383795731a ] Request (VolumeQOSV3RbacTest:test_associate_qos): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.029s 2020-11-06 18:03:20.194 40 DEBUG tempest.lib.common.rest_client [req-19ed4e77-ea29-4fda-b172-1f383795731a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-19ed4e77-ea29-4fda-b172-1f383795731a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c1d2ecd3ecc741afb7e9a8880afcf666", "name": "tempest-VolumeQOSV3RbacTest-571965261", "password_expires_at": null}, "audit_ids": ["lWWz0Lu9T8mn2lB5Mn5Cgg"], "expires_at": "2020-11-06T19:03:20.000000Z", "issued_at": "2020-11-06T18:03:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a623ebca89d45ecbc65193cf9959c3e", "name": "tempest-VolumeQOSV3RbacTest-571965261"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:20.225 37 INFO tempest.lib.common.rest_client [req-2aa9b537-1f73-4f7d-af92-6ddb607f0783 ] Request (FlavorsServiceProfileExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/9af9fb0270034e8792467b7672208c8c 0.129s 2020-11-06 18:03:20.226 37 DEBUG tempest.lib.common.rest_client [req-2aa9b537-1f73-4f7d-af92-6ddb607f0783 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2aa9b537-1f73-4f7d-af92-6ddb607f0783', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/9af9fb0270034e8792467b7672208c8c'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:20.296 38 INFO tempest.lib.common.rest_client [req-3ec9e037-a5dd-4186-b0c0-d4f8c20a3209 ] Request (EncryptionTypesV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/69540f753276430e9629bd6eabeb4dc5 0.123s 2020-11-06 18:03:20.296 38 DEBUG tempest.lib.common.rest_client [req-3ec9e037-a5dd-4186-b0c0-d4f8c20a3209 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3ec9e037-a5dd-4186-b0c0-d4f8c20a3209', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/69540f753276430e9629bd6eabeb4dc5'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:20.303 37 INFO tempest.lib.common.rest_client [req-6ca165c1-f5e8-4a2d-b607-ae6d53c9fc4c ] Request (FlavorsServiceProfileExtRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.076s 2020-11-06 18:03:20.303 37 DEBUG tempest.lib.common.rest_client [req-6ca165c1-f5e8-4a2d-b607-ae6d53c9fc4c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6ca165c1-f5e8-4a2d-b607-ae6d53c9fc4c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["VngEvHa1QZi8_NXBsb97vA"], "expires_at": "2020-11-06T19:03:20.000000Z", "issued_at": "2020-11-06T18:03:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:20.318 40 INFO tempest.lib.common.rest_client [req-93d86952-af6b-432d-b0d3-84705724cc23 ] Request (VolumeQOSV3RbacTest:_run_cleanups): 202 GET http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/c5374ba4-a651-4358-89e1-5fa1286cf52d/disassociate?vol_type_id=dd926011-52cc-46f5-a05e-ee1badfef80e 0.123s 2020-11-06 18:03:20.319 40 DEBUG tempest.lib.common.rest_client [req-93d86952-af6b-432d-b0d3-84705724cc23 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-93d86952-af6b-432d-b0d3-84705724cc23', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/c5374ba4-a651-4358-89e1-5fa1286cf52d/disassociate?vol_type_id=dd926011-52cc-46f5-a05e-ee1badfef80e'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:20.360 40 INFO tempest.lib.common.rest_client [req-d9e45a1e-895f-465d-aa00-83205611fbb7 ] Request (VolumeQOSV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/c5374ba4-a651-4358-89e1-5fa1286cf52d?force=False 0.039s 2020-11-06 18:03:20.360 40 DEBUG tempest.lib.common.rest_client [req-d9e45a1e-895f-465d-aa00-83205611fbb7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d9e45a1e-895f-465d-aa00-83205611fbb7', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/c5374ba4-a651-4358-89e1-5fa1286cf52d?force=False'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:20.363 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:20.366 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:qos_specs_manage:create, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:20.366 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:20.389 38 INFO tempest.lib.common.rest_client [req-4bccfa7f-9ab3-4148-9c7a-94a305189e45 ] Request (EncryptionTypesV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-11-06 18:03:20.389 38 DEBUG tempest.lib.common.rest_client [req-4bccfa7f-9ab3-4148-9c7a-94a305189e45 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4bccfa7f-9ab3-4148-9c7a-94a305189e45', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["lThAMd4QRnqAKOuRu2JsSA"], "expires_at": "2020-11-06T19:03:20.000000Z", "issued_at": "2020-11-06T18:03:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:20.433 40 INFO tempest.lib.common.rest_client [req-8ed5bfaf-c772-4036-82b5-538ece2326f6 ] Request (VolumeQOSV3RbacTest:test_create_qos_with_consumer): 200 GET http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles 0.066s 2020-11-06 18:03:20.433 40 DEBUG tempest.lib.common.rest_client [req-8ed5bfaf-c772-4036-82b5-538ece2326f6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8ed5bfaf-c772-4036-82b5-538ece2326f6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:20.516 40 INFO tempest.lib.common.rest_client [req-fdee5414-8be4-4338-af59-c7df8b8c0e2a ] Request (VolumeQOSV3RbacTest:test_create_qos_with_consumer): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 18:03:20.517 40 DEBUG tempest.lib.common.rest_client [req-fdee5414-8be4-4338-af59-c7df8b8c0e2a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fdee5414-8be4-4338-af59-c7df8b8c0e2a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c1d2ecd3ecc741afb7e9a8880afcf666", "name": "tempest-VolumeQOSV3RbacTest-571965261", "password_expires_at": null}, "audit_ids": ["M94HqNg5R--CbzmmvihhQA"], "expires_at": "2020-11-06T19:03:20.000000Z", "issued_at": "2020-11-06T18:03:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a623ebca89d45ecbc65193cf9959c3e", "name": "tempest-VolumeQOSV3RbacTest-571965261"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:20.656 40 INFO tempest.lib.common.rest_client [req-e538a141-02dc-414e-8f5f-a44e87d40774 ] Request (VolumeQOSV3RbacTest:test_create_qos_with_consumer): 200 POST http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs 0.138s 2020-11-06 18:03:20.656 40 DEBUG tempest.lib.common.rest_client [req-e538a141-02dc-414e-8f5f-a44e87d40774 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"qos_specs": {"name": "tempest-VolumeQOSV3RbacTest-QoS-719122825", "consumer": "front-end"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e538a141-02dc-414e-8f5f-a44e87d40774', 'content-length': '440', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e538a141-02dc-414e-8f5f-a44e87d40774', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs'} Body: b'{"qos_specs": {"id": "07f8e2ea-f402-43c2-a692-eea0ece1f437", "name": "tempest-VolumeQOSV3RbacTest-QoS-719122825", "consumer": "front-end", "specs": {}}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/07f8e2ea-f402-43c2-a692-eea0ece1f437"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/07f8e2ea-f402-43c2-a692-eea0ece1f437"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:20.662 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:20.723 40 INFO tempest.lib.common.rest_client [req-2ee8c905-7a1f-4d78-b6f4-9ffc9be02c55 ] Request (VolumeQOSV3RbacTest:test_create_qos_with_consumer): 200 GET http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles 0.060s 2020-11-06 18:03:20.723 40 DEBUG tempest.lib.common.rest_client [req-2ee8c905-7a1f-4d78-b6f4-9ffc9be02c55 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2ee8c905-7a1f-4d78-b6f4-9ffc9be02c55', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:20.723 37 INFO tempest.lib.common.rest_client [req-e25acc8d-315d-42f6-acc5-eed977c846db ] Request (FlavorsServiceProfileExtRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=b1e15ec001c246eeaed4d81f090f15a9&name=default 0.419s 2020-11-06 18:03:20.724 37 DEBUG tempest.lib.common.rest_client [req-e25acc8d-315d-42f6-acc5-eed977c846db ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-e25acc8d-315d-42f6-acc5-eed977c846db', 'date': 'Fri, 06 Nov 2020 18:03:20 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=b1e15ec001c246eeaed4d81f090f15a9&name=default'} Body: b'{"security_groups": [{"id": "8c591aad-a3f4-4b16-a5ed-87e2f42470f6", "name": "default", "stateful": true, "tenant_id": "b1e15ec001c246eeaed4d81f090f15a9", "description": "Default security group", "security_group_rules": [{"id": "0bbb66ba-a79d-4a1d-a99f-debfe55889e9", "tenant_id": "b1e15ec001c246eeaed4d81f090f15a9", "security_group_id": "8c591aad-a3f4-4b16-a5ed-87e2f42470f6", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:20Z", "updated_at": "2020-11-06T18:03:20Z", "revision_number": 0, "project_id": "b1e15ec001c246eeaed4d81f090f15a9"}, {"id": "4a57bcb2-4401-4385-90f6-e9d1a2bcf6af", "tenant_id": "b1e15ec001c246eeaed4d81f090f15a9", "security_group_id": "8c591aad-a3f4-4b16-a5ed-87e2f42470f6", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "8c591aad-a3f4-4b16-a5ed-87e2f42470f6", "description": null, "tags": [], "created_at": "2020-11-06T18:03:20Z", "updated_at": "2020-11-06T18:03:20Z", "revision_number": 0, "project_id": "b1e15ec001c246eeaed4d81f090f15a9"}, {"id": "77971942-aad7-4823-8c56-7ef0acf65473", "tenant_id": "b1e15ec001c246eeaed4d81f090f15a9", "security_group_id": "8c591aad-a3f4-4b16-a5ed-87e2f42470f6", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:20Z", "updated_at": "2020-11-06T18:03:20Z", "revision_number": 0, "project_id": "b1e15ec001c246eeaed4d81f090f15a9"}, {"id": "c0a92a0f-b1c4-42ec-a86f-5b070d33ca40", "tenant_id": "b1e15ec001c246eeaed4d81f090f15a9", "security_group_id": "8c591aad-a3f4-4b16-a5ed-87e2f42470f6", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "8c591aad-a3f4-4b16-a5ed-87e2f42470f6", "description": null, "tags": [], "created_at": "2020-11-06T18:03:20Z", "updated_at": "2020-11-06T18:03:20Z", "revision_number": 0, "project_id": "b1e15ec001c246eeaed4d81f090f15a9"}], "tags": [], "created_at": "2020-11-06T18:03:20Z", "updated_at": "2020-11-06T18:03:20Z", "revision_number": 1, "project_id": "b1e15ec001c246eeaed4d81f090f15a9"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:20.759 38 INFO tempest.lib.common.rest_client [req-f3850002-d1d8-404b-97e0-0fcceae36d69 ] Request (EncryptionTypesV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=c438772b458f419e978fb1bbba39fd37&name=default 0.368s 2020-11-06 18:03:20.760 38 DEBUG tempest.lib.common.rest_client [req-f3850002-d1d8-404b-97e0-0fcceae36d69 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-f3850002-d1d8-404b-97e0-0fcceae36d69', 'date': 'Fri, 06 Nov 2020 18:03:20 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=c438772b458f419e978fb1bbba39fd37&name=default'} Body: b'{"security_groups": [{"id": "93e5c9c3-5e76-4f37-98b5-cc808a119c5c", "name": "default", "stateful": true, "tenant_id": "c438772b458f419e978fb1bbba39fd37", "description": "Default security group", "security_group_rules": [{"id": "39dbf4c1-b0b2-4666-b72a-7612fcd10cc7", "tenant_id": "c438772b458f419e978fb1bbba39fd37", "security_group_id": "93e5c9c3-5e76-4f37-98b5-cc808a119c5c", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:20Z", "updated_at": "2020-11-06T18:03:20Z", "revision_number": 0, "project_id": "c438772b458f419e978fb1bbba39fd37"}, {"id": "b404768e-fc70-420f-9305-80c771ff1436", "tenant_id": "c438772b458f419e978fb1bbba39fd37", "security_group_id": "93e5c9c3-5e76-4f37-98b5-cc808a119c5c", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:20Z", "updated_at": "2020-11-06T18:03:20Z", "revision_number": 0, "project_id": "c438772b458f419e978fb1bbba39fd37"}, {"id": "b89c9d50-8e64-43de-b997-f74165b826d7", "tenant_id": "c438772b458f419e978fb1bbba39fd37", "security_group_id": "93e5c9c3-5e76-4f37-98b5-cc808a119c5c", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "93e5c9c3-5e76-4f37-98b5-cc808a119c5c", "description": null, "tags": [], "created_at": "2020-11-06T18:03:20Z", "updated_at": "2020-11-06T18:03:20Z", "revision_number": 0, "project_id": "c438772b458f419e978fb1bbba39fd37"}, {"id": "fded63d0-2b07-468d-94e3-6cd361fd38f7", "tenant_id": "c438772b458f419e978fb1bbba39fd37", "security_group_id": "93e5c9c3-5e76-4f37-98b5-cc808a119c5c", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "93e5c9c3-5e76-4f37-98b5-cc808a119c5c", "description": null, "tags": [], "created_at": "2020-11-06T18:03:20Z", "updated_at": "2020-11-06T18:03:20Z", "revision_number": 0, "project_id": "c438772b458f419e978fb1bbba39fd37"}], "tags": [], "created_at": "2020-11-06T18:03:20Z", "updated_at": "2020-11-06T18:03:20Z", "revision_number": 1, "project_id": "c438772b458f419e978fb1bbba39fd37"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:20.760 40 INFO tempest.lib.common.rest_client [req-0bde8493-9d65-46d7-b28c-ab50d0e574cd ] Request (VolumeQOSV3RbacTest:test_create_qos_with_consumer): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:03:20.761 40 DEBUG tempest.lib.common.rest_client [req-0bde8493-9d65-46d7-b28c-ab50d0e574cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0bde8493-9d65-46d7-b28c-ab50d0e574cd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c1d2ecd3ecc741afb7e9a8880afcf666", "name": "tempest-VolumeQOSV3RbacTest-571965261", "password_expires_at": null}, "audit_ids": ["nK8XLlZHR1una5fvsl9u9w"], "expires_at": "2020-11-06T19:03:20.000000Z", "issued_at": "2020-11-06T18:03:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a623ebca89d45ecbc65193cf9959c3e", "name": "tempest-VolumeQOSV3RbacTest-571965261"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:20.864 37 INFO tempest.lib.common.rest_client [req-3ef60c44-1b09-41ad-a8c1-461245cf81db ] Request (FlavorsServiceProfileExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/8c591aad-a3f4-4b16-a5ed-87e2f42470f6 0.139s 2020-11-06 18:03:20.865 37 DEBUG tempest.lib.common.rest_client [req-3ef60c44-1b09-41ad-a8c1-461245cf81db ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-3ef60c44-1b09-41ad-a8c1-461245cf81db', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:03:20 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/8c591aad-a3f4-4b16-a5ed-87e2f42470f6'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:20.873 40 INFO tempest.lib.common.rest_client [req-ded5c7b8-27eb-4b6e-8f90-51da5ed45853 ] Request (VolumeQOSV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/07f8e2ea-f402-43c2-a692-eea0ece1f437?force=False 0.110s 2020-11-06 18:03:20.873 40 DEBUG tempest.lib.common.rest_client [req-ded5c7b8-27eb-4b6e-8f90-51da5ed45853 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ded5c7b8-27eb-4b6e-8f90-51da5ed45853', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/07f8e2ea-f402-43c2-a692-eea0ece1f437?force=False'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:20.873 38 INFO tempest.lib.common.rest_client [req-30e368bf-ef96-4bfa-a7b5-51adf993e35f ] Request (EncryptionTypesV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/93e5c9c3-5e76-4f37-98b5-cc808a119c5c 0.112s 2020-11-06 18:03:20.874 38 DEBUG tempest.lib.common.rest_client [req-30e368bf-ef96-4bfa-a7b5-51adf993e35f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-30e368bf-ef96-4bfa-a7b5-51adf993e35f', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:03:20 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/93e5c9c3-5e76-4f37-98b5-cc808a119c5c'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:20.875 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:20.878 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:qos_specs_manage:delete, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:20.907 40 INFO tempest.lib.common.rest_client [req-cfd5062a-0ea1-49ea-b999-2c203739760e ] Request (VolumeQOSV3RbacTest:test_delete_qos_with_consumer): 200 POST http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs 0.028s 2020-11-06 18:03:20.907 40 DEBUG tempest.lib.common.rest_client [req-cfd5062a-0ea1-49ea-b999-2c203739760e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"qos_specs": {"name": "tempest-VolumeQOSV3RbacTest-QoS-654418121", "consumer": "front-end"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-cfd5062a-0ea1-49ea-b999-2c203739760e', 'content-length': '440', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-cfd5062a-0ea1-49ea-b999-2c203739760e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs'} Body: b'{"qos_specs": {"id": "3288825c-06e3-45e1-9b11-2b00400c16ad", "name": "tempest-VolumeQOSV3RbacTest-QoS-654418121", "consumer": "front-end", "specs": {}}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/3288825c-06e3-45e1-9b11-2b00400c16ad"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/3288825c-06e3-45e1-9b11-2b00400c16ad"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:20.910 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:20.967 40 INFO tempest.lib.common.rest_client [req-292bf86a-c58f-4007-a110-0bfcf1e8c8dc ] Request (VolumeQOSV3RbacTest:test_delete_qos_with_consumer): 200 GET http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles 0.056s 2020-11-06 18:03:20.967 40 DEBUG tempest.lib.common.rest_client [req-292bf86a-c58f-4007-a110-0bfcf1e8c8dc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-292bf86a-c58f-4007-a110-0bfcf1e8c8dc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:20.978 37 INFO tempest.lib.common.rest_client [req-d13df551-b6f8-4c49-b023-d5ccfc7bed45 ] Request (FlavorsServiceProfileExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/b1e15ec001c246eeaed4d81f090f15a9 0.112s 2020-11-06 18:03:20.979 37 DEBUG tempest.lib.common.rest_client [req-d13df551-b6f8-4c49-b023-d5ccfc7bed45 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d13df551-b6f8-4c49-b023-d5ccfc7bed45', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/b1e15ec001c246eeaed4d81f090f15a9'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:20.989 38 INFO tempest.lib.common.rest_client [req-46332aa6-98c1-4b0c-8de9-43cfbecc392e ] Request (EncryptionTypesV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37 0.114s 2020-11-06 18:03:20.990 38 DEBUG tempest.lib.common.rest_client [req-46332aa6-98c1-4b0c-8de9-43cfbecc392e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-46332aa6-98c1-4b0c-8de9-43cfbecc392e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c438772b458f419e978fb1bbba39fd37'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.050 40 INFO tempest.lib.common.rest_client [req-f0cf0be0-a82e-4bd4-84ac-5e645db0a228 ] Request (VolumeQOSV3RbacTest:test_delete_qos_with_consumer): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-11-06 18:03:21.050 40 DEBUG tempest.lib.common.rest_client [req-f0cf0be0-a82e-4bd4-84ac-5e645db0a228 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f0cf0be0-a82e-4bd4-84ac-5e645db0a228', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c1d2ecd3ecc741afb7e9a8880afcf666", "name": "tempest-VolumeQOSV3RbacTest-571965261", "password_expires_at": null}, "audit_ids": ["Q7cyeNnLTtCzuGyCnGloyg"], "expires_at": "2020-11-06T19:03:20.000000Z", "issued_at": "2020-11-06T18:03:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a623ebca89d45ecbc65193cf9959c3e", "name": "tempest-VolumeQOSV3RbacTest-571965261"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.062 37 INFO tempest.lib.common.rest_client [req-acc0631a-5f1e-4590-be60-88c68a71b26c ] Request (NetworksRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.080s 2020-11-06 18:03:21.062 37 DEBUG tempest.lib.common.rest_client [req-acc0631a-5f1e-4590-be60-88c68a71b26c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-acc0631a-5f1e-4590-be60-88c68a71b26c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["77x6LB00RKO0x9CWZ1tn5Q"], "expires_at": "2020-11-06T19:03:21.000000Z", "issued_at": "2020-11-06T18:03:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.081 38 INFO tempest.lib.common.rest_client [req-08833595-a85c-4271-bef0-96f849d6ff73 ] Request (SnapshotManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 18:03:21.082 38 DEBUG tempest.lib.common.rest_client [req-08833595-a85c-4271-bef0-96f849d6ff73 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-08833595-a85c-4271-bef0-96f849d6ff73', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["yZZh-5E7QJmqwLAJA_ZZKw"], "expires_at": "2020-11-06T19:03:21.000000Z", "issued_at": "2020-11-06T18:03:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.106 39 INFO tempest.lib.common.rest_client [req-4970659a-a8d2-40da-99ef-a4497b529617 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.199s 2020-11-06 18:03:21.106 37 INFO tempest.lib.common.rest_client [req-d5a0f7d9-43c2-4108-92d7-6f6ec4834c5d ] Request (NetworksRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:03:21.107 39 DEBUG tempest.lib.common.rest_client [req-4970659a-a8d2-40da-99ef-a4497b529617 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4970659a-a8d2-40da-99ef-a4497b529617', 'x-compute-request-id': 'req-4970659a-a8d2-40da-99ef-a4497b529617', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.107 37 DEBUG tempest.lib.common.rest_client [req-d5a0f7d9-43c2-4108-92d7-6f6ec4834c5d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d5a0f7d9-43c2-4108-92d7-6f6ec4834c5d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["nWR1m__wToeAO_3WhTEqmw"], "expires_at": "2020-11-06T19:03:21.000000Z", "issued_at": "2020-11-06T18:03:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.129 38 INFO tempest.lib.common.rest_client [req-84246bea-a4ec-455b-9ae9-1ab280a307ed ] Request (SnapshotManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:03:21.129 38 DEBUG tempest.lib.common.rest_client [req-84246bea-a4ec-455b-9ae9-1ab280a307ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-84246bea-a4ec-455b-9ae9-1ab280a307ed', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["7uKNh87hRtei7HphP_JW9g"], "expires_at": "2020-11-06T19:03:21.000000Z", "issued_at": "2020-11-06T18:03:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.158 37 INFO tempest.lib.common.rest_client [req-f7b00785-61bc-4e82-a4a5-a83c05178944 ] Request (NetworksRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.050s 2020-11-06 18:03:21.159 37 DEBUG tempest.lib.common.rest_client [req-f7b00785-61bc-4e82-a4a5-a83c05178944 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f7b00785-61bc-4e82-a4a5-a83c05178944', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.177 38 INFO tempest.lib.common.rest_client [req-439bc2df-a7b8-45d4-953b-ab689d0c700d ] Request (SnapshotManageRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.046s 2020-11-06 18:03:21.177 38 DEBUG tempest.lib.common.rest_client [req-439bc2df-a7b8-45d4-953b-ab689d0c700d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-439bc2df-a7b8-45d4-953b-ab689d0c700d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.213 40 INFO tempest.lib.common.rest_client [req-bb22c645-1e1d-466f-8a30-dd9388020d0f ] Request (VolumeQOSV3RbacTest:test_delete_qos_with_consumer): 202 DELETE http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/3288825c-06e3-45e1-9b11-2b00400c16ad?force=False 0.161s 2020-11-06 18:03:21.214 40 DEBUG tempest.lib.common.rest_client [req-bb22c645-1e1d-466f-8a30-dd9388020d0f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-bb22c645-1e1d-466f-8a30-dd9388020d0f', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/3288825c-06e3-45e1-9b11-2b00400c16ad?force=False'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.214 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:21.225 37 INFO tempest.lib.common.rest_client [req-0058085d-667a-4363-923f-618ee4da0779 ] Request (NetworksRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.064s 2020-11-06 18:03:21.226 37 DEBUG tempest.lib.common.rest_client [req-0058085d-667a-4363-923f-618ee4da0779 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-NetworksRbacTest-1207245799-desc", "domain_id": "default", "name": "tempest-NetworksRbacTest-1207245799"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '370', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0058085d-667a-4363-923f-618ee4da0779', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799", "domain_id": "default", "description": "tempest-NetworksRbacTest-1207245799-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.241 38 INFO tempest.lib.common.rest_client [req-02704bac-066f-46cb-9c14-343c00b06db5 ] Request (SnapshotManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.063s 2020-11-06 18:03:21.242 38 DEBUG tempest.lib.common.rest_client [req-02704bac-066f-46cb-9c14-343c00b06db5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-SnapshotManageRbacTest-305419301-desc", "domain_id": "default", "name": "tempest-SnapshotManageRbacTest-305419301"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '380', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-02704bac-066f-46cb-9c14-343c00b06db5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "8dca462f626644269229cf59ef328eab", "name": "tempest-SnapshotManageRbacTest-305419301", "domain_id": "default", "description": "tempest-SnapshotManageRbacTest-305419301-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/8dca462f626644269229cf59ef328eab"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.307 40 INFO tempest.lib.common.rest_client [req-3123c611-b509-4c15-879e-0e71fa14237b ] Request (VolumeQOSV3RbacTest:test_delete_qos_with_consumer): 200 GET http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles 0.092s 2020-11-06 18:03:21.308 40 DEBUG tempest.lib.common.rest_client [req-3123c611-b509-4c15-879e-0e71fa14237b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3123c611-b509-4c15-879e-0e71fa14237b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.327 37 INFO tempest.lib.common.rest_client [req-3d846387-5323-444a-9353-f982d9380ab8 ] Request (NetworksRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.100s 2020-11-06 18:03:21.328 37 DEBUG tempest.lib.common.rest_client [req-3d846387-5323-444a-9353-f982d9380ab8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-NetworksRbacTest-1207245799", "password": "P0&_IuHr_C89vGv", "project_id": "ed59c56def144c79842338c521c6c51e", "email": "tempest-NetworksRbacTest-1441500180@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '388', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3d846387-5323-444a-9353-f982d9380ab8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "ed59c56def144c79842338c521c6c51e", "email": "tempest-NetworksRbacTest-1441500180@example.com", "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/12f37a7905e84601b33c14fd5eb519b5"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.343 38 INFO tempest.lib.common.rest_client [req-99f6bc56-a60e-4854-ae49-2e75130c3f30 ] Request (SnapshotManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.100s 2020-11-06 18:03:21.343 38 DEBUG tempest.lib.common.rest_client [req-99f6bc56-a60e-4854-ae49-2e75130c3f30 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-SnapshotManageRbacTest-305419301", "password": "E1*3duqpd#2RHQa", "project_id": "8dca462f626644269229cf59ef328eab", "email": "tempest-SnapshotManageRbacTest-509418405@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '398', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-99f6bc56-a60e-4854-ae49-2e75130c3f30', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "8dca462f626644269229cf59ef328eab", "email": "tempest-SnapshotManageRbacTest-509418405@example.com", "id": "a7d4864e62d843a1be7af2b5102a735e", "name": "tempest-SnapshotManageRbacTest-305419301", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/a7d4864e62d843a1be7af2b5102a735e"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.374 37 INFO tempest.lib.common.rest_client [req-683a0fc1-64d0-4ac3-8f9e-bdfc906673ea ] Request (NetworksRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.045s 2020-11-06 18:03:21.375 37 DEBUG tempest.lib.common.rest_client [req-683a0fc1-64d0-4ac3-8f9e-bdfc906673ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-683a0fc1-64d0-4ac3-8f9e-bdfc906673ea', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.389 38 INFO tempest.lib.common.rest_client [req-54b7bc44-88d6-4fca-915b-5974defffc8e ] Request (SnapshotManageRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.045s 2020-11-06 18:03:21.389 38 DEBUG tempest.lib.common.rest_client [req-54b7bc44-88d6-4fca-915b-5974defffc8e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-54b7bc44-88d6-4fca-915b-5974defffc8e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.390 40 INFO tempest.lib.common.rest_client [req-02795d93-8f8f-4787-9468-5f3198ee546c ] Request (VolumeQOSV3RbacTest:test_delete_qos_with_consumer): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-11-06 18:03:21.390 40 DEBUG tempest.lib.common.rest_client [req-02795d93-8f8f-4787-9468-5f3198ee546c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-02795d93-8f8f-4787-9468-5f3198ee546c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c1d2ecd3ecc741afb7e9a8880afcf666", "name": "tempest-VolumeQOSV3RbacTest-571965261", "password_expires_at": null}, "audit_ids": ["o9CBhQAxTaGouEKyWtd1AA"], "expires_at": "2020-11-06T19:03:21.000000Z", "issued_at": "2020-11-06T18:03:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a623ebca89d45ecbc65193cf9959c3e", "name": "tempest-VolumeQOSV3RbacTest-571965261"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.420 37 INFO tempest.lib.common.rest_client [req-511fe929-2e74-4016-8820-0bdba7319e32 ] Request (NetworksRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.044s 2020-11-06 18:03:21.421 37 DEBUG tempest.lib.common.rest_client [req-511fe929-2e74-4016-8820-0bdba7319e32 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-511fe929-2e74-4016-8820-0bdba7319e32', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.440 38 INFO tempest.lib.common.rest_client [req-084ee3ea-eeb5-4869-b0b5-306243f87408 ] Request (SnapshotManageRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.050s 2020-11-06 18:03:21.441 38 DEBUG tempest.lib.common.rest_client [req-084ee3ea-eeb5-4869-b0b5-306243f87408 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-084ee3ea-eeb5-4869-b0b5-306243f87408', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.492 37 INFO tempest.lib.common.rest_client [req-1629c7c6-5c99-4b28-adde-783743455cca ] Request (NetworksRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles/72a4576c553448cd941b052c1ca0cf2d 0.070s 2020-11-06 18:03:21.492 37 DEBUG tempest.lib.common.rest_client [req-1629c7c6-5c99-4b28-adde-783743455cca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1629c7c6-5c99-4b28-adde-783743455cca', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.493 37 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-NetworksRbacTest-1207245799', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'ed59c56def144c79842338c521c6c51e', 'project_name': 'tempest-NetworksRbacTest-1207245799', 'tenant_id': 'ed59c56def144c79842338c521c6c51e', 'tenant_name': 'tempest-NetworksRbacTest-1207245799', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '12f37a7905e84601b33c14fd5eb519b5'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:21.494 37 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-NetworksRbacTest-1207245799', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'ed59c56def144c79842338c521c6c51e', 'project_name': 'tempest-NetworksRbacTest-1207245799', 'tenant_id': 'ed59c56def144c79842338c521c6c51e', 'tenant_name': 'tempest-NetworksRbacTest-1207245799', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '12f37a7905e84601b33c14fd5eb519b5'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:21.507 38 INFO tempest.lib.common.rest_client [req-56f35b40-be61-4ed4-8d71-3e937b101702 ] Request (SnapshotManageRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/8dca462f626644269229cf59ef328eab/users/a7d4864e62d843a1be7af2b5102a735e/roles/72a4576c553448cd941b052c1ca0cf2d 0.065s 2020-11-06 18:03:21.507 38 DEBUG tempest.lib.common.rest_client [req-56f35b40-be61-4ed4-8d71-3e937b101702 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-56f35b40-be61-4ed4-8d71-3e937b101702', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/8dca462f626644269229cf59ef328eab/users/a7d4864e62d843a1be7af2b5102a735e/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.508 38 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SnapshotManageRbacTest-305419301', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '8dca462f626644269229cf59ef328eab', 'project_name': 'tempest-SnapshotManageRbacTest-305419301', 'tenant_id': '8dca462f626644269229cf59ef328eab', 'tenant_name': 'tempest-SnapshotManageRbacTest-305419301', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'a7d4864e62d843a1be7af2b5102a735e'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:21.508 38 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SnapshotManageRbacTest-305419301', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '8dca462f626644269229cf59ef328eab', 'project_name': 'tempest-SnapshotManageRbacTest-305419301', 'tenant_id': '8dca462f626644269229cf59ef328eab', 'tenant_name': 'tempest-SnapshotManageRbacTest-305419301', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'a7d4864e62d843a1be7af2b5102a735e'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:21.521 40 INFO tempest.lib.common.rest_client [req-a0da5700-194f-4ff6-af87-8ce212524234 ] Request (VolumeQOSV3RbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/3288825c-06e3-45e1-9b11-2b00400c16ad?force=False 0.129s 2020-11-06 18:03:21.522 40 DEBUG tempest.lib.common.rest_client [req-a0da5700-194f-4ff6-af87-8ce212524234 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '100', 'content-type': 'application/json', 'x-compute-request-id': 'req-a0da5700-194f-4ff6-af87-8ce212524234', 'x-openstack-request-id': 'req-a0da5700-194f-4ff6-af87-8ce212524234', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/3288825c-06e3-45e1-9b11-2b00400c16ad?force=False'} Body: b'{"itemNotFound": {"code": 404, "message": "No such QoS spec 3288825c-06e3-45e1-9b11-2b00400c16ad."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.523 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:21.525 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:qos_specs_manage:update, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:21.557 40 INFO tempest.lib.common.rest_client [req-6e633a81-6bf8-4809-9852-bb64d4b95e96 ] Request (VolumeQOSV3RbacTest:test_disassociate_all_qos): 200 POST http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs 0.031s 2020-11-06 18:03:21.557 40 DEBUG tempest.lib.common.rest_client [req-6e633a81-6bf8-4809-9852-bb64d4b95e96 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"qos_specs": {"name": "tempest-VolumeQOSV3RbacTest-QoS-16466792", "consumer": "front-end"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6e633a81-6bf8-4809-9852-bb64d4b95e96', 'content-length': '439', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6e633a81-6bf8-4809-9852-bb64d4b95e96', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs'} Body: b'{"qos_specs": {"id": "f91abbde-0cea-46f0-8766-703e0f12bdaf", "name": "tempest-VolumeQOSV3RbacTest-QoS-16466792", "consumer": "front-end", "specs": {}}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/f91abbde-0cea-46f0-8766-703e0f12bdaf"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/f91abbde-0cea-46f0-8766-703e0f12bdaf"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.609 37 INFO tempest.lib.common.rest_client [req-1035a33c-37b5-4ec2-8168-b66f72a792e0 ] Request (NetworksRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.104s 2020-11-06 18:03:21.610 37 DEBUG tempest.lib.common.rest_client [req-1035a33c-37b5-4ec2-8168-b66f72a792e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6563', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1035a33c-37b5-4ec2-8168-b66f72a792e0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "password_expires_at": null}, "audit_ids": ["SoSv6LjsTxuL94FyFIYv_g"], "expires_at": "2020-11-06T19:03:21.000000Z", "issued_at": "2020-11-06T18:03:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.613 40 INFO tempest.lib.common.rest_client [req-0e369c75-3c53-4408-ac3b-25db494853ef ] Request (VolumeQOSV3RbacTest:test_disassociate_all_qos): 200 POST http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/types 0.051s 2020-11-06 18:03:21.614 40 DEBUG tempest.lib.common.rest_client [req-0e369c75-3c53-4408-ac3b-25db494853ef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-VolumeQOSV3RbacTest-volume-type-1189352357"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-0e369c75-3c53-4408-ac3b-25db494853ef', 'content-length': '225', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0e369c75-3c53-4408-ac3b-25db494853ef', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/types'} Body: b'{"volume_type": {"id": "71e414f1-a558-4fda-8ab4-50375ff4e1fe", "name": "tempest-VolumeQOSV3RbacTest-volume-type-1189352357", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.624 38 INFO tempest.lib.common.rest_client [req-c333721a-9f6a-48fd-8578-025942828a99 ] Request (SnapshotManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.106s 2020-11-06 18:03:21.624 38 DEBUG tempest.lib.common.rest_client [req-c333721a-9f6a-48fd-8578-025942828a99 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6573', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c333721a-9f6a-48fd-8578-025942828a99', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a7d4864e62d843a1be7af2b5102a735e", "name": "tempest-SnapshotManageRbacTest-305419301", "password_expires_at": null}, "audit_ids": ["Xg_3QHs_Rcm0PYpt61ly5g"], "expires_at": "2020-11-06T19:03:21.000000Z", "issued_at": "2020-11-06T18:03:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "8dca462f626644269229cf59ef328eab", "name": "tempest-SnapshotManageRbacTest-305419301"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/8dca462f626644269229cf59ef328eab", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/8dca462f626644269229cf59ef328eab", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_8dca462f626644269229cf59ef328eab", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_8dca462f626644269229cf59ef328eab", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_8dca462f626644269229cf59ef328eab", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://1 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.681 40 INFO tempest.lib.common.rest_client [req-345e6a71-65e2-4af5-8f0d-67134b132c04 ] Request (VolumeQOSV3RbacTest:test_disassociate_all_qos): 202 GET http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/f91abbde-0cea-46f0-8766-703e0f12bdaf/associate?vol_type_id=71e414f1-a558-4fda-8ab4-50375ff4e1fe 0.063s 2020-11-06 18:03:21.681 40 DEBUG tempest.lib.common.rest_client [req-345e6a71-65e2-4af5-8f0d-67134b132c04 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-345e6a71-65e2-4af5-8f0d-67134b132c04', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/f91abbde-0cea-46f0-8766-703e0f12bdaf/associate?vol_type_id=71e414f1-a558-4fda-8ab4-50375ff4e1fe'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.682 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:21.695 37 INFO tempest.lib.common.rest_client [req-a12f7f00-8bec-4a89-8060-2fa837a687da ] Request (NetworksRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-11-06 18:03:21.695 37 DEBUG tempest.lib.common.rest_client [req-a12f7f00-8bec-4a89-8060-2fa837a687da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a12f7f00-8bec-4a89-8060-2fa837a687da', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["U7a0_Yh-R563zweeJfDKPQ"], "expires_at": "2020-11-06T19:03:21.000000Z", "issued_at": "2020-11-06T18:03:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.714 38 INFO tempest.lib.common.rest_client [req-d601b48f-b889-43f5-9f98-a25b0a0294ac ] Request (SnapshotManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-11-06 18:03:21.715 38 DEBUG tempest.lib.common.rest_client [req-d601b48f-b889-43f5-9f98-a25b0a0294ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d601b48f-b889-43f5-9f98-a25b0a0294ac', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["obmBH7sUQ0WdEdMyXomXBg"], "expires_at": "2020-11-06T19:03:21.000000Z", "issued_at": "2020-11-06T18:03:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.740 37 INFO tempest.lib.common.rest_client [req-15ef853b-490f-4d19-a050-ff6a8f12e194 ] Request (NetworksRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:03:21.741 37 DEBUG tempest.lib.common.rest_client [req-15ef853b-490f-4d19-a050-ff6a8f12e194 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-15ef853b-490f-4d19-a050-ff6a8f12e194', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["RS4mhKgzTZGjadqJh6Tu1w"], "expires_at": "2020-11-06T19:03:21.000000Z", "issued_at": "2020-11-06T18:03:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.741 40 INFO tempest.lib.common.rest_client [req-76668764-c848-4cd9-b83a-34c17a596966 ] Request (VolumeQOSV3RbacTest:test_disassociate_all_qos): 200 GET http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles 0.058s 2020-11-06 18:03:21.741 40 DEBUG tempest.lib.common.rest_client [req-76668764-c848-4cd9-b83a-34c17a596966 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-76668764-c848-4cd9-b83a-34c17a596966', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.763 38 INFO tempest.lib.common.rest_client [req-4ee5cfeb-3da3-4709-a59d-7a941b6ce2cc ] Request (SnapshotManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:03:21.764 38 DEBUG tempest.lib.common.rest_client [req-4ee5cfeb-3da3-4709-a59d-7a941b6ce2cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4ee5cfeb-3da3-4709-a59d-7a941b6ce2cc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["gC7SZpEvTg-FodvHgELv7w"], "expires_at": "2020-11-06T19:03:21.000000Z", "issued_at": "2020-11-06T18:03:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.796 37 INFO tempest.lib.common.rest_client [req-9566a7b3-6ed2-4ec9-972c-7a43c1f3bf0f ] Request (NetworksRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.055s 2020-11-06 18:03:21.797 37 DEBUG tempest.lib.common.rest_client [req-9566a7b3-6ed2-4ec9-972c-7a43c1f3bf0f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9566a7b3-6ed2-4ec9-972c-7a43c1f3bf0f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.818 38 INFO tempest.lib.common.rest_client [req-8ecd0b43-c0c5-4d01-b0a6-ac9ea2554312 ] Request (SnapshotManageRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.053s 2020-11-06 18:03:21.818 38 DEBUG tempest.lib.common.rest_client [req-8ecd0b43-c0c5-4d01-b0a6-ac9ea2554312 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8ecd0b43-c0c5-4d01-b0a6-ac9ea2554312', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.830 40 INFO tempest.lib.common.rest_client [req-a55b6693-85f1-4ea1-b571-c2083fa0872a ] Request (VolumeQOSV3RbacTest:test_disassociate_all_qos): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 18:03:21.831 40 DEBUG tempest.lib.common.rest_client [req-a55b6693-85f1-4ea1-b571-c2083fa0872a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a55b6693-85f1-4ea1-b571-c2083fa0872a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c1d2ecd3ecc741afb7e9a8880afcf666", "name": "tempest-VolumeQOSV3RbacTest-571965261", "password_expires_at": null}, "audit_ids": ["WsZUGpGuRtCyjGuQWBtamQ"], "expires_at": "2020-11-06T19:03:21.000000Z", "issued_at": "2020-11-06T18:03:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a623ebca89d45ecbc65193cf9959c3e", "name": "tempest-VolumeQOSV3RbacTest-571965261"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.846 37 INFO tempest.lib.common.rest_client [req-87df5178-a9d0-4b24-b533-8bc98bd5e924 ] Request (NetworksRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.049s 2020-11-06 18:03:21.847 37 DEBUG tempest.lib.common.rest_client [req-87df5178-a9d0-4b24-b533-8bc98bd5e924 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-87df5178-a9d0-4b24-b533-8bc98bd5e924', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.848 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:03:21.848 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:21.876 38 INFO tempest.lib.common.rest_client [req-7e15484c-e06f-4fbd-94b0-bde5e3f51706 ] Request (SnapshotManageRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.057s 2020-11-06 18:03:21.877 38 DEBUG tempest.lib.common.rest_client [req-7e15484c-e06f-4fbd-94b0-bde5e3f51706 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7e15484c-e06f-4fbd-94b0-bde5e3f51706', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.877 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:03:21.878 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:21.905 37 INFO tempest.lib.common.rest_client [req-aa09f8ef-9090-4f81-a0c9-7a525987ed76 ] Request (NetworksRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles 0.056s 2020-11-06 18:03:21.906 37 DEBUG tempest.lib.common.rest_client [req-aa09f8ef-9090-4f81-a0c9-7a525987ed76 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aa09f8ef-9090-4f81-a0c9-7a525987ed76', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.930 38 INFO tempest.lib.common.rest_client [req-c254f142-f023-4414-95ff-3ef349b0958b ] Request (SnapshotManageRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/8dca462f626644269229cf59ef328eab/users/a7d4864e62d843a1be7af2b5102a735e/roles 0.051s 2020-11-06 18:03:21.930 38 DEBUG tempest.lib.common.rest_client [req-c254f142-f023-4414-95ff-3ef349b0958b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c254f142-f023-4414-95ff-3ef349b0958b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/8dca462f626644269229cf59ef328eab/users/a7d4864e62d843a1be7af2b5102a735e/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/8dca462f626644269229cf59ef328eab/users/a7d4864e62d843a1be7af2b5102a735e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.963 37 INFO tempest.lib.common.rest_client [req-7d0ddf38-a043-4bd1-a5fb-09d2a8e53bea ] Request (NetworksRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles/72a4576c553448cd941b052c1ca0cf2d 0.055s 2020-11-06 18:03:21.963 37 DEBUG tempest.lib.common.rest_client [req-7d0ddf38-a043-4bd1-a5fb-09d2a8e53bea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7d0ddf38-a043-4bd1-a5fb-09d2a8e53bea', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:21.988 38 INFO tempest.lib.common.rest_client [req-faa25a89-7c1d-431d-832a-05fbc3a5b231 ] Request (SnapshotManageRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/8dca462f626644269229cf59ef328eab/users/a7d4864e62d843a1be7af2b5102a735e/roles/72a4576c553448cd941b052c1ca0cf2d 0.056s 2020-11-06 18:03:21.988 38 DEBUG tempest.lib.common.rest_client [req-faa25a89-7c1d-431d-832a-05fbc3a5b231 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-faa25a89-7c1d-431d-832a-05fbc3a5b231', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/8dca462f626644269229cf59ef328eab/users/a7d4864e62d843a1be7af2b5102a735e/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:22.003 40 INFO tempest.lib.common.rest_client [req-58141e38-919c-46d6-8a6c-9214a76f1d20 ] Request (VolumeQOSV3RbacTest:test_disassociate_all_qos): 202 GET http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/f91abbde-0cea-46f0-8766-703e0f12bdaf/disassociate_all 0.170s 2020-11-06 18:03:22.003 40 DEBUG tempest.lib.common.rest_client [req-58141e38-919c-46d6-8a6c-9214a76f1d20 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-58141e38-919c-46d6-8a6c-9214a76f1d20', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/f91abbde-0cea-46f0-8766-703e0f12bdaf/disassociate_all'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:22.004 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:22.098 38 INFO tempest.lib.common.rest_client [req-65d9756e-d838-4823-95cf-e2ebc09326d1 ] Request (SnapshotManageRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/8dca462f626644269229cf59ef328eab/users/a7d4864e62d843a1be7af2b5102a735e/roles/a629c95d64b3416fb80ae90af4f69c05 0.108s 2020-11-06 18:03:22.098 38 DEBUG tempest.lib.common.rest_client [req-65d9756e-d838-4823-95cf-e2ebc09326d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-65d9756e-d838-4823-95cf-e2ebc09326d1', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/8dca462f626644269229cf59ef328eab/users/a7d4864e62d843a1be7af2b5102a735e/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:22.113 37 INFO tempest.lib.common.rest_client [req-9f35fc88-3fb2-4079-9541-243cb410d22e ] Request (NetworksRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles/a629c95d64b3416fb80ae90af4f69c05 0.148s 2020-11-06 18:03:22.113 37 DEBUG tempest.lib.common.rest_client [req-9f35fc88-3fb2-4079-9541-243cb410d22e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9f35fc88-3fb2-4079-9541-243cb410d22e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:22.118 40 INFO tempest.lib.common.rest_client [req-b8dbd714-b097-404e-a07f-30f9ca4ddd32 ] Request (VolumeQOSV3RbacTest:test_disassociate_all_qos): 200 GET http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles 0.113s 2020-11-06 18:03:22.118 40 DEBUG tempest.lib.common.rest_client [req-b8dbd714-b097-404e-a07f-30f9ca4ddd32 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b8dbd714-b097-404e-a07f-30f9ca4ddd32', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:22.208 40 INFO tempest.lib.common.rest_client [req-546b6122-a657-4559-8c2d-2cf65e1c4e25 ] Request (VolumeQOSV3RbacTest:test_disassociate_all_qos): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-11-06 18:03:22.209 40 DEBUG tempest.lib.common.rest_client [req-546b6122-a657-4559-8c2d-2cf65e1c4e25 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-546b6122-a657-4559-8c2d-2cf65e1c4e25', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c1d2ecd3ecc741afb7e9a8880afcf666", "name": "tempest-VolumeQOSV3RbacTest-571965261", "password_expires_at": null}, "audit_ids": ["s5VVEtsBS6Sj01fJqk-aVQ"], "expires_at": "2020-11-06T19:03:22.000000Z", "issued_at": "2020-11-06T18:03:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a623ebca89d45ecbc65193cf9959c3e", "name": "tempest-VolumeQOSV3RbacTest-571965261"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:22.334 39 INFO tempest.lib.common.rest_client [req-36012ac4-bf95-436a-af4f-fcf83ed8831b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.212s 2020-11-06 18:03:22.335 39 DEBUG tempest.lib.common.rest_client [req-36012ac4-bf95-436a-af4f-fcf83ed8831b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-36012ac4-bf95-436a-af4f-fcf83ed8831b', 'x-compute-request-id': 'req-36012ac4-bf95-436a-af4f-fcf83ed8831b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:22.411 40 INFO tempest.lib.common.rest_client [req-2ec1a750-b4bb-4fbf-855e-354e96429c61 ] Request (VolumeQOSV3RbacTest:test_disassociate_all_qos): 200 GET http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/f91abbde-0cea-46f0-8766-703e0f12bdaf/associations 0.201s 2020-11-06 18:03:22.411 40 DEBUG tempest.lib.common.rest_client [req-2ec1a750-b4bb-4fbf-855e-354e96429c61 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-2ec1a750-b4bb-4fbf-855e-354e96429c61', 'content-length': '24', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2ec1a750-b4bb-4fbf-855e-354e96429c61', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/f91abbde-0cea-46f0-8766-703e0f12bdaf/associations'} Body: b'{"qos_associations": []}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:22.447 40 INFO tempest.lib.common.rest_client [req-ecbee67a-8b87-4571-98d1-d63beb5fd028 ] Request (VolumeQOSV3RbacTest:_run_cleanups): 202 GET http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/f91abbde-0cea-46f0-8766-703e0f12bdaf/disassociate?vol_type_id=71e414f1-a558-4fda-8ab4-50375ff4e1fe 0.033s 2020-11-06 18:03:22.447 40 DEBUG tempest.lib.common.rest_client [req-ecbee67a-8b87-4571-98d1-d63beb5fd028 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ecbee67a-8b87-4571-98d1-d63beb5fd028', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/f91abbde-0cea-46f0-8766-703e0f12bdaf/disassociate?vol_type_id=71e414f1-a558-4fda-8ab4-50375ff4e1fe'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:22.489 40 INFO tempest.lib.common.rest_client [req-c5281bee-5cc1-4ebf-afec-b1cb40429d3b ] Request (VolumeQOSV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/f91abbde-0cea-46f0-8766-703e0f12bdaf?force=False 0.040s 2020-11-06 18:03:22.489 40 DEBUG tempest.lib.common.rest_client [req-c5281bee-5cc1-4ebf-afec-b1cb40429d3b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c5281bee-5cc1-4ebf-afec-b1cb40429d3b', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/f91abbde-0cea-46f0-8766-703e0f12bdaf?force=False'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:22.492 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:22.495 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:qos_specs_manage:update, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:22.523 40 INFO tempest.lib.common.rest_client [req-f1b5af0b-9d06-4795-a72a-78dda4c9e035 ] Request (VolumeQOSV3RbacTest:test_disassociate_qos): 200 POST http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs 0.027s 2020-11-06 18:03:22.524 40 DEBUG tempest.lib.common.rest_client [req-f1b5af0b-9d06-4795-a72a-78dda4c9e035 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"qos_specs": {"name": "tempest-VolumeQOSV3RbacTest-QoS-1651314861", "consumer": "front-end"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-f1b5af0b-9d06-4795-a72a-78dda4c9e035', 'content-length': '441', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f1b5af0b-9d06-4795-a72a-78dda4c9e035', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs'} Body: b'{"qos_specs": {"id": "ffd8bfcc-c9dd-452c-969a-bd30fd0c0214", "name": "tempest-VolumeQOSV3RbacTest-QoS-1651314861", "consumer": "front-end", "specs": {}}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/ffd8bfcc-c9dd-452c-969a-bd30fd0c0214"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/ffd8bfcc-c9dd-452c-969a-bd30fd0c0214"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:22.571 40 INFO tempest.lib.common.rest_client [req-dfb5bdbc-02e2-4162-af60-a61be8d15d2a ] Request (VolumeQOSV3RbacTest:test_disassociate_qos): 200 POST http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/types 0.043s 2020-11-06 18:03:22.572 40 DEBUG tempest.lib.common.rest_client [req-dfb5bdbc-02e2-4162-af60-a61be8d15d2a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-VolumeQOSV3RbacTest-volume-type-758569261"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-dfb5bdbc-02e2-4162-af60-a61be8d15d2a', 'content-length': '224', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-dfb5bdbc-02e2-4162-af60-a61be8d15d2a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/types'} Body: b'{"volume_type": {"id": "392383e3-ed65-46e3-9670-d2723c4dffb9", "name": "tempest-VolumeQOSV3RbacTest-volume-type-758569261", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:22.622 40 INFO tempest.lib.common.rest_client [req-3c62aeee-01d4-4ad1-9f26-bd53677209b5 ] Request (VolumeQOSV3RbacTest:test_disassociate_qos): 202 GET http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/ffd8bfcc-c9dd-452c-969a-bd30fd0c0214/associate?vol_type_id=392383e3-ed65-46e3-9670-d2723c4dffb9 0.046s 2020-11-06 18:03:22.622 40 DEBUG tempest.lib.common.rest_client [req-3c62aeee-01d4-4ad1-9f26-bd53677209b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3c62aeee-01d4-4ad1-9f26-bd53677209b5', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/ffd8bfcc-c9dd-452c-969a-bd30fd0c0214/associate?vol_type_id=392383e3-ed65-46e3-9670-d2723c4dffb9'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:22.622 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:22.780 40 INFO tempest.lib.common.rest_client [req-4efae7c0-eb9c-486b-815b-69a852a5b491 ] Request (VolumeQOSV3RbacTest:test_disassociate_qos): 200 GET http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles 0.157s 2020-11-06 18:03:22.781 40 DEBUG tempest.lib.common.rest_client [req-4efae7c0-eb9c-486b-815b-69a852a5b491 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4efae7c0-eb9c-486b-815b-69a852a5b491', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:22.821 40 INFO tempest.lib.common.rest_client [req-ac407797-d9a8-4767-a7ed-f4488a0aaa29 ] Request (VolumeQOSV3RbacTest:test_disassociate_qos): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:03:22.822 40 DEBUG tempest.lib.common.rest_client [req-ac407797-d9a8-4767-a7ed-f4488a0aaa29 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ac407797-d9a8-4767-a7ed-f4488a0aaa29', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c1d2ecd3ecc741afb7e9a8880afcf666", "name": "tempest-VolumeQOSV3RbacTest-571965261", "password_expires_at": null}, "audit_ids": ["k_W1dLACRL-7DsLaws2I1g"], "expires_at": "2020-11-06T19:03:22.000000Z", "issued_at": "2020-11-06T18:03:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a623ebca89d45ecbc65193cf9959c3e", "name": "tempest-VolumeQOSV3RbacTest-571965261"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:22.929 40 INFO tempest.lib.common.rest_client [req-38ccbbd4-8ae8-4721-a20a-30009c0c7c81 ] Request (VolumeQOSV3RbacTest:test_disassociate_qos): 202 GET http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/ffd8bfcc-c9dd-452c-969a-bd30fd0c0214/disassociate?vol_type_id=392383e3-ed65-46e3-9670-d2723c4dffb9 0.106s 2020-11-06 18:03:22.930 40 DEBUG tempest.lib.common.rest_client [req-38ccbbd4-8ae8-4721-a20a-30009c0c7c81 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-38ccbbd4-8ae8-4721-a20a-30009c0c7c81', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/ffd8bfcc-c9dd-452c-969a-bd30fd0c0214/disassociate?vol_type_id=392383e3-ed65-46e3-9670-d2723c4dffb9'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:22.930 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:22.975 40 INFO tempest.lib.common.rest_client [req-5d28811f-5a29-4829-81b2-902fedf73bb7 ] Request (VolumeQOSV3RbacTest:test_disassociate_qos): 200 GET http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles 0.044s 2020-11-06 18:03:22.975 40 DEBUG tempest.lib.common.rest_client [req-5d28811f-5a29-4829-81b2-902fedf73bb7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5d28811f-5a29-4829-81b2-902fedf73bb7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:23.008 40 INFO tempest.lib.common.rest_client [req-af96e9c4-5e99-4ab1-bbb6-2a8f9114de72 ] Request (VolumeQOSV3RbacTest:test_disassociate_qos): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:03:23.009 40 DEBUG tempest.lib.common.rest_client [req-af96e9c4-5e99-4ab1-bbb6-2a8f9114de72 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-af96e9c4-5e99-4ab1-bbb6-2a8f9114de72', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c1d2ecd3ecc741afb7e9a8880afcf666", "name": "tempest-VolumeQOSV3RbacTest-571965261", "password_expires_at": null}, "audit_ids": ["a3JuWxkHTo-E7vslHAmKnQ"], "expires_at": "2020-11-06T19:03:23.000000Z", "issued_at": "2020-11-06T18:03:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a623ebca89d45ecbc65193cf9959c3e", "name": "tempest-VolumeQOSV3RbacTest-571965261"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:23.103 40 INFO tempest.lib.common.rest_client [req-66b6403b-c172-4be7-9859-39a731187e55 ] Request (VolumeQOSV3RbacTest:test_disassociate_qos): 200 GET http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/ffd8bfcc-c9dd-452c-969a-bd30fd0c0214/associations 0.094s 2020-11-06 18:03:23.104 40 DEBUG tempest.lib.common.rest_client [req-66b6403b-c172-4be7-9859-39a731187e55 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-66b6403b-c172-4be7-9859-39a731187e55', 'content-length': '24', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-66b6403b-c172-4be7-9859-39a731187e55', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/ffd8bfcc-c9dd-452c-969a-bd30fd0c0214/associations'} Body: b'{"qos_associations": []}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:23.146 40 INFO tempest.lib.common.rest_client [req-8a4a4fdd-8c87-4dae-86f0-e06aac80b159 ] Request (VolumeQOSV3RbacTest:_run_cleanups): 202 GET http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/ffd8bfcc-c9dd-452c-969a-bd30fd0c0214/disassociate?vol_type_id=392383e3-ed65-46e3-9670-d2723c4dffb9 0.038s 2020-11-06 18:03:23.147 40 DEBUG tempest.lib.common.rest_client [req-8a4a4fdd-8c87-4dae-86f0-e06aac80b159 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8a4a4fdd-8c87-4dae-86f0-e06aac80b159', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/ffd8bfcc-c9dd-452c-969a-bd30fd0c0214/disassociate?vol_type_id=392383e3-ed65-46e3-9670-d2723c4dffb9'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:23.190 38 INFO tempest.lib.common.rest_client [req-c506cb1b-923d-4f0c-8265-fe8922cf1fd5 ] Request (SnapshotManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-11-06 18:03:23.191 38 DEBUG tempest.lib.common.rest_client [req-c506cb1b-923d-4f0c-8265-fe8922cf1fd5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c506cb1b-923d-4f0c-8265-fe8922cf1fd5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a7d4864e62d843a1be7af2b5102a735e", "name": "tempest-SnapshotManageRbacTest-305419301", "password_expires_at": null}, "audit_ids": ["pSlb9m7VQjaWM93zTEj52Q"], "expires_at": "2020-11-06T19:03:23.000000Z", "issued_at": "2020-11-06T18:03:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "8dca462f626644269229cf59ef328eab", "name": "tempest-SnapshotManageRbacTest-305419301"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/8dca462f626644269229cf59ef328eab", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/8dca462f626644269229cf59ef328eab", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_8dca462f626644269229cf59ef328eab", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_8dca462f626644269229cf59ef328eab", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_8dca462f626644269229cf59ef328eab", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:23.195 40 INFO tempest.lib.common.rest_client [req-ea94bc60-a5aa-4c3f-90a8-a9a6db7ea380 ] Request (VolumeQOSV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/ffd8bfcc-c9dd-452c-969a-bd30fd0c0214?force=False 0.048s 2020-11-06 18:03:23.196 40 DEBUG tempest.lib.common.rest_client [req-ea94bc60-a5aa-4c3f-90a8-a9a6db7ea380 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ea94bc60-a5aa-4c3f-90a8-a9a6db7ea380', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/ffd8bfcc-c9dd-452c-969a-bd30fd0c0214?force=False'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:23.199 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:23.203 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:qos_specs_manage:get_all, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:23.229 40 INFO tempest.lib.common.rest_client [req-044ee772-2e5c-41f8-bc78-29d6a5f87e1d ] Request (VolumeQOSV3RbacTest:test_get_association_qos): 200 POST http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs 0.025s 2020-11-06 18:03:23.230 40 DEBUG tempest.lib.common.rest_client [req-044ee772-2e5c-41f8-bc78-29d6a5f87e1d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"qos_specs": {"name": "tempest-VolumeQOSV3RbacTest-QoS-1206163852", "consumer": "front-end"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-044ee772-2e5c-41f8-bc78-29d6a5f87e1d', 'content-length': '441', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-044ee772-2e5c-41f8-bc78-29d6a5f87e1d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs'} Body: b'{"qos_specs": {"id": "5912348d-064b-4e15-bb79-4f6b05134cf8", "name": "tempest-VolumeQOSV3RbacTest-QoS-1206163852", "consumer": "front-end", "specs": {}}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/5912348d-064b-4e15-bb79-4f6b05134cf8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/5912348d-064b-4e15-bb79-4f6b05134cf8"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:23.280 40 INFO tempest.lib.common.rest_client [req-605fa786-a4e8-44f8-8683-6ed1b16f2d2c ] Request (VolumeQOSV3RbacTest:test_get_association_qos): 200 POST http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/types 0.046s 2020-11-06 18:03:23.281 40 DEBUG tempest.lib.common.rest_client [req-605fa786-a4e8-44f8-8683-6ed1b16f2d2c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-VolumeQOSV3RbacTest-volume-type-1764443447"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-605fa786-a4e8-44f8-8683-6ed1b16f2d2c', 'content-length': '225', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-605fa786-a4e8-44f8-8683-6ed1b16f2d2c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/types'} Body: b'{"volume_type": {"id": "6fced907-1ba1-4ee2-a720-a6a39e737e44", "name": "tempest-VolumeQOSV3RbacTest-volume-type-1764443447", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:23.299 37 INFO tempest.lib.common.rest_client [req-ee425273-b3e7-47f9-9c32-4fd1b3997546 ] Request (NetworksRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.184s 2020-11-06 18:03:23.300 37 DEBUG tempest.lib.common.rest_client [req-ee425273-b3e7-47f9-9c32-4fd1b3997546 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ee425273-b3e7-47f9-9c32-4fd1b3997546', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "password_expires_at": null}, "audit_ids": ["4ZYAvclMSZOq7TId6AeHlQ"], "expires_at": "2020-11-06T19:03:23.000000Z", "issued_at": "2020-11-06T18:03:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:23.336 40 INFO tempest.lib.common.rest_client [req-2d5f03f6-d2f8-478f-be09-77240dd7dc75 ] Request (VolumeQOSV3RbacTest:test_get_association_qos): 202 GET http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/5912348d-064b-4e15-bb79-4f6b05134cf8/associate?vol_type_id=6fced907-1ba1-4ee2-a720-a6a39e737e44 0.051s 2020-11-06 18:03:23.336 40 DEBUG tempest.lib.common.rest_client [req-2d5f03f6-d2f8-478f-be09-77240dd7dc75 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2d5f03f6-d2f8-478f-be09-77240dd7dc75', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/5912348d-064b-4e15-bb79-4f6b05134cf8/associate?vol_type_id=6fced907-1ba1-4ee2-a720-a6a39e737e44'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:23.337 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:23.397 40 INFO tempest.lib.common.rest_client [req-aadea152-eab0-46bb-b820-14aac8b79129 ] Request (VolumeQOSV3RbacTest:test_get_association_qos): 200 GET http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles 0.059s 2020-11-06 18:03:23.398 40 DEBUG tempest.lib.common.rest_client [req-aadea152-eab0-46bb-b820-14aac8b79129 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aadea152-eab0-46bb-b820-14aac8b79129', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:23.431 40 INFO tempest.lib.common.rest_client [req-3f28b6fd-871b-496a-becf-7926462d2dc9 ] Request (VolumeQOSV3RbacTest:test_get_association_qos): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:03:23.432 40 DEBUG tempest.lib.common.rest_client [req-3f28b6fd-871b-496a-becf-7926462d2dc9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3f28b6fd-871b-496a-becf-7926462d2dc9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c1d2ecd3ecc741afb7e9a8880afcf666", "name": "tempest-VolumeQOSV3RbacTest-571965261", "password_expires_at": null}, "audit_ids": ["2BoL1pofT-SBbCliQ4r1SQ"], "expires_at": "2020-11-06T19:03:23.000000Z", "issued_at": "2020-11-06T18:03:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a623ebca89d45ecbc65193cf9959c3e", "name": "tempest-VolumeQOSV3RbacTest-571965261"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:23.525 40 INFO tempest.lib.common.rest_client [req-c4c8e2a9-cebb-4b55-9de7-1571eda2eb7e ] Request (VolumeQOSV3RbacTest:test_get_association_qos): 200 GET http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/5912348d-064b-4e15-bb79-4f6b05134cf8/associations 0.092s 2020-11-06 18:03:23.526 40 DEBUG tempest.lib.common.rest_client [req-c4c8e2a9-cebb-4b55-9de7-1571eda2eb7e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c4c8e2a9-cebb-4b55-9de7-1571eda2eb7e', 'content-length': '167', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c4c8e2a9-cebb-4b55-9de7-1571eda2eb7e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/5912348d-064b-4e15-bb79-4f6b05134cf8/associations'} Body: b'{"qos_associations": [{"association_type": "volume_type", "name": "tempest-VolumeQOSV3RbacTest-volume-type-1764443447", "id": "6fced907-1ba1-4ee2-a720-a6a39e737e44"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:23.529 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:23.533 38 INFO tempest.lib.common.rest_client [req-cfd4485b-21b1-4bb7-afd1-fd0f9c7ac364 ] Request (SnapshotManageRbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/volumes 0.339s 2020-11-06 18:03:23.533 38 DEBUG tempest.lib.common.rest_client [req-cfd4485b-21b1-4bb7-afd1-fd0f9c7ac364 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-SnapshotManageRbacTest-Volume-497767618"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-cfd4485b-21b1-4bb7-afd1-fd0f9c7ac364', 'content-length': '842', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-cfd4485b-21b1-4bb7-afd1-fd0f9c7ac364', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/volumes'} Body: b'{"volume": {"id": "dc76691e-cb82-4ec9-b116-b3eb17eb17e5", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:03:23.000000", "updated_at": null, "name": "tempest-SnapshotManageRbacTest-Volume-497767618", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/volumes/dc76691e-cb82-4ec9-b116-b3eb17eb17e5"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/8dca462f626644269229cf59ef328eab/volumes/dc76691e-cb82-4ec9-b116-b3eb17eb17e5"}], "user_id": "a7d4864e62d843a1be7af2b5102a735e", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:23.583 40 INFO tempest.lib.common.rest_client [req-f0e51ede-30ec-4cab-83d5-d825c85c8a00 ] Request (VolumeQOSV3RbacTest:test_get_association_qos): 200 GET http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles 0.052s 2020-11-06 18:03:23.583 40 DEBUG tempest.lib.common.rest_client [req-f0e51ede-30ec-4cab-83d5-d825c85c8a00 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f0e51ede-30ec-4cab-83d5-d825c85c8a00', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:23.603 39 INFO tempest.lib.common.rest_client [req-68e7ccd6-8f77-415c-8d8c-e3ef4dcfb7d2 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.254s 2020-11-06 18:03:23.604 39 DEBUG tempest.lib.common.rest_client [req-68e7ccd6-8f77-415c-8d8c-e3ef4dcfb7d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-68e7ccd6-8f77-415c-8d8c-e3ef4dcfb7d2', 'x-compute-request-id': 'req-68e7ccd6-8f77-415c-8d8c-e3ef4dcfb7d2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:23.611 40 INFO tempest.lib.common.rest_client [req-6ea51d24-084c-4048-9c37-8fadd6ee4b04 ] Request (VolumeQOSV3RbacTest:test_get_association_qos): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.027s 2020-11-06 18:03:23.612 40 DEBUG tempest.lib.common.rest_client [req-6ea51d24-084c-4048-9c37-8fadd6ee4b04 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6ea51d24-084c-4048-9c37-8fadd6ee4b04', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c1d2ecd3ecc741afb7e9a8880afcf666", "name": "tempest-VolumeQOSV3RbacTest-571965261", "password_expires_at": null}, "audit_ids": ["DQFUD9iyQUis4EdIbGknIg"], "expires_at": "2020-11-06T19:03:23.000000Z", "issued_at": "2020-11-06T18:03:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a623ebca89d45ecbc65193cf9959c3e", "name": "tempest-VolumeQOSV3RbacTest-571965261"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:23.612 38 INFO tempest.lib.common.rest_client [req-aa6f432a-dd72-4578-be0e-2bdf0321e467 ] Request (SnapshotManageRbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/volumes/dc76691e-cb82-4ec9-b116-b3eb17eb17e5 0.066s 2020-11-06 18:03:23.612 38 DEBUG tempest.lib.common.rest_client [req-aa6f432a-dd72-4578-be0e-2bdf0321e467 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-aa6f432a-dd72-4578-be0e-2bdf0321e467', 'content-length': '1064', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-aa6f432a-dd72-4578-be0e-2bdf0321e467', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/volumes/dc76691e-cb82-4ec9-b116-b3eb17eb17e5'} Body: b'{"volume": {"id": "dc76691e-cb82-4ec9-b116-b3eb17eb17e5", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:03:23.000000", "updated_at": "2020-11-06T18:03:24.000000", "name": "tempest-SnapshotManageRbacTest-Volume-497767618", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/volumes/dc76691e-cb82-4ec9-b116-b3eb17eb17e5"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/8dca462f626644269229cf59ef328eab/volumes/dc76691e-cb82-4ec9-b116-b3eb17eb17e5"}], "user_id": "a7d4864e62d843a1be7af2b5102a735e", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "8dca462f626644269229cf59ef328eab"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:23.718 40 INFO tempest.lib.common.rest_client [req-544966e7-46c4-43e6-825d-b2ee58da4180 ] Request (VolumeQOSV3RbacTest:_run_cleanups): 202 GET http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/5912348d-064b-4e15-bb79-4f6b05134cf8/disassociate?vol_type_id=6fced907-1ba1-4ee2-a720-a6a39e737e44 0.105s 2020-11-06 18:03:23.719 40 DEBUG tempest.lib.common.rest_client [req-544966e7-46c4-43e6-825d-b2ee58da4180 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-544966e7-46c4-43e6-825d-b2ee58da4180', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/5912348d-064b-4e15-bb79-4f6b05134cf8/disassociate?vol_type_id=6fced907-1ba1-4ee2-a720-a6a39e737e44'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:23.743 37 INFO tempest.lib.common.rest_client [req-d557aef9-00ab-47f2-b665-80875581eea5 ] Request (NetworksRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.442s 2020-11-06 18:03:23.744 37 DEBUG tempest.lib.common.rest_client [req-d557aef9-00ab-47f2-b665-80875581eea5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-NetworksRbacTest-test-network-429600096"}} Response - Headers: {'content-type': 'application/json', 'content-length': '736', 'x-openstack-request-id': 'req-d557aef9-00ab-47f2-b665-80875581eea5', 'date': 'Fri, 06 Nov 2020 18:03:23 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"21087cdc-18ee-4a54-a645-561312615479","name":"tempest-NetworksRbacTest-test-network-429600096","tenant_id":"ed59c56def144c79842338c521c6c51e","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"ed59c56def144c79842338c521c6c51e","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":49,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:03:23Z","updated_at":"2020-11-06T18:03:23Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:23.780 40 INFO tempest.lib.common.rest_client [req-f904436c-79c9-49e7-955d-64a07e74685d ] Request (VolumeQOSV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/5912348d-064b-4e15-bb79-4f6b05134cf8?force=False 0.060s 2020-11-06 18:03:23.781 40 DEBUG tempest.lib.common.rest_client [req-f904436c-79c9-49e7-955d-64a07e74685d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f904436c-79c9-49e7-955d-64a07e74685d', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/5912348d-064b-4e15-bb79-4f6b05134cf8?force=False'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:23.784 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:23.787 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:qos_specs_manage:get_all, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:23.787 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:23.845 40 INFO tempest.lib.common.rest_client [req-364232bd-6caf-4cfd-8c00-2197ca59b83e ] Request (VolumeQOSV3RbacTest:test_list_qos): 200 GET http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles 0.057s 2020-11-06 18:03:23.846 40 DEBUG tempest.lib.common.rest_client [req-364232bd-6caf-4cfd-8c00-2197ca59b83e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-364232bd-6caf-4cfd-8c00-2197ca59b83e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:23.880 40 INFO tempest.lib.common.rest_client [req-85cc3539-dcd0-47d5-9b54-f865958d5af3 ] Request (VolumeQOSV3RbacTest:test_list_qos): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:03:23.881 40 DEBUG tempest.lib.common.rest_client [req-85cc3539-dcd0-47d5-9b54-f865958d5af3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-85cc3539-dcd0-47d5-9b54-f865958d5af3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c1d2ecd3ecc741afb7e9a8880afcf666", "name": "tempest-VolumeQOSV3RbacTest-571965261", "password_expires_at": null}, "audit_ids": ["IgKdHmJcToGxzbQBwI1jRw"], "expires_at": "2020-11-06T19:03:23.000000Z", "issued_at": "2020-11-06T18:03:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a623ebca89d45ecbc65193cf9959c3e", "name": "tempest-VolumeQOSV3RbacTest-571965261"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:23.975 40 INFO tempest.lib.common.rest_client [req-3c2c6753-d526-40ec-ba5b-426bae5c154c ] Request (VolumeQOSV3RbacTest:test_list_qos): 200 GET http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs 0.093s 2020-11-06 18:03:23.976 40 DEBUG tempest.lib.common.rest_client [req-3c2c6753-d526-40ec-ba5b-426bae5c154c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-3c2c6753-d526-40ec-ba5b-426bae5c154c', 'content-length': '17', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3c2c6753-d526-40ec-ba5b-426bae5c154c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs'} Body: b'{"qos_specs": []}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:23.980 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:24.108 40 INFO tempest.lib.common.rest_client [req-436119b2-21f9-43f9-b5e1-b05ae896acbe ] Request (VolumeQOSV3RbacTest:test_list_qos): 200 GET http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles 0.127s 2020-11-06 18:03:24.109 40 DEBUG tempest.lib.common.rest_client [req-436119b2-21f9-43f9-b5e1-b05ae896acbe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-436119b2-21f9-43f9-b5e1-b05ae896acbe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:24.142 40 INFO tempest.lib.common.rest_client [req-c50eac76-5394-412b-a17d-22f818df57bc ] Request (VolumeQOSV3RbacTest:test_list_qos): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:03:24.142 40 DEBUG tempest.lib.common.rest_client [req-c50eac76-5394-412b-a17d-22f818df57bc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c50eac76-5394-412b-a17d-22f818df57bc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c1d2ecd3ecc741afb7e9a8880afcf666", "name": "tempest-VolumeQOSV3RbacTest-571965261", "password_expires_at": null}, "audit_ids": ["-lEgQBt6Q0SgmPDhxIn41w"], "expires_at": "2020-11-06T19:03:24.000000Z", "issued_at": "2020-11-06T18:03:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a623ebca89d45ecbc65193cf9959c3e", "name": "tempest-VolumeQOSV3RbacTest-571965261"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:24.144 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:24.147 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:qos_specs_manage:update, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:24.225 40 INFO tempest.lib.common.rest_client [req-77e3a2b6-9727-4892-a62b-30ac3859cdce ] Request (VolumeQOSV3RbacTest:test_set_qos_key): 200 POST http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs 0.077s 2020-11-06 18:03:24.225 40 DEBUG tempest.lib.common.rest_client [req-77e3a2b6-9727-4892-a62b-30ac3859cdce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"qos_specs": {"name": "tempest-VolumeQOSV3RbacTest-QoS-226024619", "consumer": "front-end"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-77e3a2b6-9727-4892-a62b-30ac3859cdce', 'content-length': '440', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-77e3a2b6-9727-4892-a62b-30ac3859cdce', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs'} Body: b'{"qos_specs": {"id": "56b10348-673b-4d57-92a5-54d67839ddc7", "name": "tempest-VolumeQOSV3RbacTest-QoS-226024619", "consumer": "front-end", "specs": {}}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/56b10348-673b-4d57-92a5-54d67839ddc7"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/56b10348-673b-4d57-92a5-54d67839ddc7"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:24.230 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:24.279 40 INFO tempest.lib.common.rest_client [req-52c83218-b705-4820-9a02-5f208c5b6c54 ] Request (VolumeQOSV3RbacTest:test_set_qos_key): 200 GET http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles 0.048s 2020-11-06 18:03:24.280 40 DEBUG tempest.lib.common.rest_client [req-52c83218-b705-4820-9a02-5f208c5b6c54 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-52c83218-b705-4820-9a02-5f208c5b6c54', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:24.314 40 INFO tempest.lib.common.rest_client [req-51d89803-2afd-4392-9387-38d39343e87c ] Request (VolumeQOSV3RbacTest:test_set_qos_key): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:03:24.315 40 DEBUG tempest.lib.common.rest_client [req-51d89803-2afd-4392-9387-38d39343e87c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-51d89803-2afd-4392-9387-38d39343e87c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c1d2ecd3ecc741afb7e9a8880afcf666", "name": "tempest-VolumeQOSV3RbacTest-571965261", "password_expires_at": null}, "audit_ids": ["d1ECsGXvSyKNHCIIunjLzA"], "expires_at": "2020-11-06T19:03:24.000000Z", "issued_at": "2020-11-06T18:03:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a623ebca89d45ecbc65193cf9959c3e", "name": "tempest-VolumeQOSV3RbacTest-571965261"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:24.398 40 INFO tempest.lib.common.rest_client [req-a3830867-5796-4eb0-acef-162cfa459bd5 ] Request (VolumeQOSV3RbacTest:test_set_qos_key): 200 PUT http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/56b10348-673b-4d57-92a5-54d67839ddc7 0.082s 2020-11-06 18:03:24.399 40 DEBUG tempest.lib.common.rest_client [req-a3830867-5796-4eb0-acef-162cfa459bd5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"qos_specs": {"iops_bytes": "500"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a3830867-5796-4eb0-acef-162cfa459bd5', 'content-length': '36', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a3830867-5796-4eb0-acef-162cfa459bd5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/56b10348-673b-4d57-92a5-54d67839ddc7'} Body: b'{"qos_specs": {"iops_bytes": "500"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:24.401 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:24.448 40 INFO tempest.lib.common.rest_client [req-a153b308-47bc-41ea-b203-528bb058163b ] Request (VolumeQOSV3RbacTest:test_set_qos_key): 200 GET http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles 0.046s 2020-11-06 18:03:24.449 40 DEBUG tempest.lib.common.rest_client [req-a153b308-47bc-41ea-b203-528bb058163b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a153b308-47bc-41ea-b203-528bb058163b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:24.483 40 INFO tempest.lib.common.rest_client [req-868c3e8e-01f2-4130-a8e7-22d0bde7f8d1 ] Request (VolumeQOSV3RbacTest:test_set_qos_key): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:03:24.483 40 DEBUG tempest.lib.common.rest_client [req-868c3e8e-01f2-4130-a8e7-22d0bde7f8d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-868c3e8e-01f2-4130-a8e7-22d0bde7f8d1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c1d2ecd3ecc741afb7e9a8880afcf666", "name": "tempest-VolumeQOSV3RbacTest-571965261", "password_expires_at": null}, "audit_ids": ["n1g7x2tTRx61OjfAxYR3jw"], "expires_at": "2020-11-06T19:03:24.000000Z", "issued_at": "2020-11-06T18:03:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a623ebca89d45ecbc65193cf9959c3e", "name": "tempest-VolumeQOSV3RbacTest-571965261"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:24.582 40 INFO tempest.lib.common.rest_client [req-f72282f3-f999-4c9e-a1c7-d2c3274e6bd1 ] Request (VolumeQOSV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/56b10348-673b-4d57-92a5-54d67839ddc7?force=False 0.097s 2020-11-06 18:03:24.582 40 DEBUG tempest.lib.common.rest_client [req-f72282f3-f999-4c9e-a1c7-d2c3274e6bd1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f72282f3-f999-4c9e-a1c7-d2c3274e6bd1', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/56b10348-673b-4d57-92a5-54d67839ddc7?force=False'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:24.585 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:24.588 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:qos_specs_manage:get, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:24.616 40 INFO tempest.lib.common.rest_client [req-b06404fd-1a29-46c5-be88-28f0a03e5fb4 ] Request (VolumeQOSV3RbacTest:test_show_qos): 200 POST http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs 0.027s 2020-11-06 18:03:24.617 40 DEBUG tempest.lib.common.rest_client [req-b06404fd-1a29-46c5-be88-28f0a03e5fb4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"qos_specs": {"name": "tempest-VolumeQOSV3RbacTest-QoS-648406103", "consumer": "front-end"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-b06404fd-1a29-46c5-be88-28f0a03e5fb4', 'content-length': '440', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b06404fd-1a29-46c5-be88-28f0a03e5fb4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs'} Body: b'{"qos_specs": {"id": "57d3711c-1c3d-4acf-9b99-20e6e4c577d5", "name": "tempest-VolumeQOSV3RbacTest-QoS-648406103", "consumer": "front-end", "specs": {}}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/57d3711c-1c3d-4acf-9b99-20e6e4c577d5"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/57d3711c-1c3d-4acf-9b99-20e6e4c577d5"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:24.620 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:24.668 40 INFO tempest.lib.common.rest_client [req-1e4d66f6-72a7-4b3c-bb7c-38f228717b17 ] Request (VolumeQOSV3RbacTest:test_show_qos): 200 GET http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles 0.047s 2020-11-06 18:03:24.669 40 DEBUG tempest.lib.common.rest_client [req-1e4d66f6-72a7-4b3c-bb7c-38f228717b17 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1e4d66f6-72a7-4b3c-bb7c-38f228717b17', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:24.698 38 INFO tempest.lib.common.rest_client [req-670646d3-f3b7-4e2c-a117-09133ba34b0c ] Request (SnapshotManageRbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/volumes/dc76691e-cb82-4ec9-b116-b3eb17eb17e5 0.069s 2020-11-06 18:03:24.698 38 DEBUG tempest.lib.common.rest_client [req-670646d3-f3b7-4e2c-a117-09133ba34b0c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-670646d3-f3b7-4e2c-a117-09133ba34b0c', 'content-length': '1065', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-670646d3-f3b7-4e2c-a117-09133ba34b0c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/volumes/dc76691e-cb82-4ec9-b116-b3eb17eb17e5'} Body: b'{"volume": {"id": "dc76691e-cb82-4ec9-b116-b3eb17eb17e5", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:03:23.000000", "updated_at": "2020-11-06T18:03:24.000000", "name": "tempest-SnapshotManageRbacTest-Volume-497767618", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/volumes/dc76691e-cb82-4ec9-b116-b3eb17eb17e5"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/8dca462f626644269229cf59ef328eab/volumes/dc76691e-cb82-4ec9-b116-b3eb17eb17e5"}], "user_id": "a7d4864e62d843a1be7af2b5102a735e", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "8dca462f626644269229cf59ef328eab"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:24.705 40 INFO tempest.lib.common.rest_client [req-cc40f44c-9dcc-4b2b-8656-de0425f2f3d8 ] Request (VolumeQOSV3RbacTest:test_show_qos): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:03:24.706 40 DEBUG tempest.lib.common.rest_client [req-cc40f44c-9dcc-4b2b-8656-de0425f2f3d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cc40f44c-9dcc-4b2b-8656-de0425f2f3d8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c1d2ecd3ecc741afb7e9a8880afcf666", "name": "tempest-VolumeQOSV3RbacTest-571965261", "password_expires_at": null}, "audit_ids": ["ZbyrawZRQSe2f3f2Bhdorw"], "expires_at": "2020-11-06T19:03:24.000000Z", "issued_at": "2020-11-06T18:03:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a623ebca89d45ecbc65193cf9959c3e", "name": "tempest-VolumeQOSV3RbacTest-571965261"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:24.714 38 INFO tempest.common.waiters [-] volume dc76691e-cb82-4ec9-b116-b3eb17eb17e5 reached available after waiting for 1.714045 seconds 2020-11-06 18:03:24.790 40 INFO tempest.lib.common.rest_client [req-f6495f81-680c-41bf-9cd9-0109d49005e1 ] Request (VolumeQOSV3RbacTest:test_show_qos): 200 GET http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/57d3711c-1c3d-4acf-9b99-20e6e4c577d5 0.083s 2020-11-06 18:03:24.790 40 DEBUG tempest.lib.common.rest_client [req-f6495f81-680c-41bf-9cd9-0109d49005e1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-f6495f81-680c-41bf-9cd9-0109d49005e1', 'content-length': '440', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f6495f81-680c-41bf-9cd9-0109d49005e1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/57d3711c-1c3d-4acf-9b99-20e6e4c577d5'} Body: b'{"qos_specs": {"id": "57d3711c-1c3d-4acf-9b99-20e6e4c577d5", "name": "tempest-VolumeQOSV3RbacTest-QoS-648406103", "consumer": "front-end", "specs": {}}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/57d3711c-1c3d-4acf-9b99-20e6e4c577d5"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/57d3711c-1c3d-4acf-9b99-20e6e4c577d5"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:24.795 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:24.806 39 INFO tempest.lib.common.rest_client [req-2f2da659-364b-4a72-94fa-38b6f8f08855 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.186s 2020-11-06 18:03:24.807 39 DEBUG tempest.lib.common.rest_client [req-2f2da659-364b-4a72-94fa-38b6f8f08855 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2f2da659-364b-4a72-94fa-38b6f8f08855', 'x-compute-request-id': 'req-2f2da659-364b-4a72-94fa-38b6f8f08855', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:24.853 40 INFO tempest.lib.common.rest_client [req-005414d8-175b-4c39-977a-f4290828fc82 ] Request (VolumeQOSV3RbacTest:test_show_qos): 200 GET http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles 0.057s 2020-11-06 18:03:24.854 40 DEBUG tempest.lib.common.rest_client [req-005414d8-175b-4c39-977a-f4290828fc82 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-005414d8-175b-4c39-977a-f4290828fc82', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:24.880 37 INFO tempest.lib.common.rest_client [req-58cb3067-c686-4fd0-98f7-a087a5241118 ] Request (NetworksRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 1.135s 2020-11-06 18:03:24.881 37 DEBUG tempest.lib.common.rest_client [req-58cb3067-c686-4fd0-98f7-a087a5241118 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "21087cdc-18ee-4a54-a645-561312615479", "cidr": "192.168.120.0/24", "ip_version": 4, "gateway_ip": "192.168.120.1", "enable_dhcp": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '663', 'x-openstack-request-id': 'req-58cb3067-c686-4fd0-98f7-a087a5241118', 'date': 'Fri, 06 Nov 2020 18:03:24 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"ffa8a86f-cd0d-49a5-bbfa-72cdd54b7ee6","name":"","tenant_id":"ed59c56def144c79842338c521c6c51e","network_id":"21087cdc-18ee-4a54-a645-561312615479","ip_version":4,"subnetpool_id":null,"enable_dhcp":false,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/24","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.254"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-11-06T18:03:23Z","updated_at":"2020-11-06T18:03:23Z","revision_number":0,"project_id":"ed59c56def144c79842338c521c6c51e"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:24.882 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:24.886 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_network, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:24.887 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:24.889 40 INFO tempest.lib.common.rest_client [req-66680f45-68cf-42fe-ad8b-5f75c2563c1e ] Request (VolumeQOSV3RbacTest:test_show_qos): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:03:24.889 40 DEBUG tempest.lib.common.rest_client [req-66680f45-68cf-42fe-ad8b-5f75c2563c1e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-66680f45-68cf-42fe-ad8b-5f75c2563c1e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c1d2ecd3ecc741afb7e9a8880afcf666", "name": "tempest-VolumeQOSV3RbacTest-571965261", "password_expires_at": null}, "audit_ids": ["WkX-1CihTJKnXX6gnbZuHA"], "expires_at": "2020-11-06T19:03:24.000000Z", "issued_at": "2020-11-06T18:03:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a623ebca89d45ecbc65193cf9959c3e", "name": "tempest-VolumeQOSV3RbacTest-571965261"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:24.927 38 INFO tempest.lib.common.rest_client [req-9600d3c1-74d4-4481-86a4-8ef74960f390 ] Request (SnapshotManageRbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/snapshots 0.212s 2020-11-06 18:03:24.927 38 DEBUG tempest.lib.common.rest_client [req-9600d3c1-74d4-4481-86a4-8ef74960f390 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"snapshot": {"volume_id": "dc76691e-cb82-4ec9-b116-b3eb17eb17e5", "name": "tempest-SnapshotManageRbacTest-Snapshot-1272037834"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-9600d3c1-74d4-4481-86a4-8ef74960f390', 'content-length': '309', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9600d3c1-74d4-4481-86a4-8ef74960f390', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/snapshots'} Body: b'{"snapshot": {"id": "1297937d-0b85-4a58-867d-8a861a8b027b", "created_at": "2020-11-06T18:03:24.851379", "updated_at": null, "name": "tempest-SnapshotManageRbacTest-Snapshot-1272037834", "description": null, "volume_id": "dc76691e-cb82-4ec9-b116-b3eb17eb17e5", "status": "creating", "size": 1, "metadata": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:24.941 37 INFO tempest.lib.common.rest_client [req-6bcb0686-bb4c-405c-826e-658daf1c067f ] Request (NetworksRbacTest:test_create_network): 200 GET http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles 0.053s 2020-11-06 18:03:24.941 37 DEBUG tempest.lib.common.rest_client [req-6bcb0686-bb4c-405c-826e-658daf1c067f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6bcb0686-bb4c-405c-826e-658daf1c067f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:24.962 38 INFO tempest.lib.common.rest_client [req-ae1dc0ff-0829-4636-a763-ba99b2a8320b ] Request (SnapshotManageRbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/snapshots/1297937d-0b85-4a58-867d-8a861a8b027b 0.029s 2020-11-06 18:03:24.962 38 DEBUG tempest.lib.common.rest_client [req-ae1dc0ff-0829-4636-a763-ba99b2a8320b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ae1dc0ff-0829-4636-a763-ba99b2a8320b', 'content-length': '441', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ae1dc0ff-0829-4636-a763-ba99b2a8320b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/snapshots/1297937d-0b85-4a58-867d-8a861a8b027b'} Body: b'{"snapshot": {"id": "1297937d-0b85-4a58-867d-8a861a8b027b", "created_at": "2020-11-06T18:03:25.000000", "updated_at": null, "name": "tempest-SnapshotManageRbacTest-Snapshot-1272037834", "description": null, "volume_id": "dc76691e-cb82-4ec9-b116-b3eb17eb17e5", "status": "creating", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "8dca462f626644269229cf59ef328eab", "os-extended-snapshot-attributes:progress": "0%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:24.974 37 INFO tempest.lib.common.rest_client [req-2ae65816-c52d-4f27-9682-5de5753182af ] Request (NetworksRbacTest:test_create_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:03:24.975 37 DEBUG tempest.lib.common.rest_client [req-2ae65816-c52d-4f27-9682-5de5753182af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2ae65816-c52d-4f27-9682-5de5753182af', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "password_expires_at": null}, "audit_ids": ["wrn6bIY-SGWk_XpzkWHKeg"], "expires_at": "2020-11-06T19:03:24.000000Z", "issued_at": "2020-11-06T18:03:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:24.993 40 INFO tempest.lib.common.rest_client [req-4baaa70f-f2ec-44b7-8100-5bb0ae7f82ff ] Request (VolumeQOSV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/57d3711c-1c3d-4acf-9b99-20e6e4c577d5?force=False 0.102s 2020-11-06 18:03:24.994 40 DEBUG tempest.lib.common.rest_client [req-4baaa70f-f2ec-44b7-8100-5bb0ae7f82ff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4baaa70f-f2ec-44b7-8100-5bb0ae7f82ff', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/57d3711c-1c3d-4acf-9b99-20e6e4c577d5?force=False'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:24.996 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:24.998 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:qos_specs_manage:update, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:25.026 40 INFO tempest.lib.common.rest_client [req-73ea63cd-cc78-4678-9291-20ade40fb137 ] Request (VolumeQOSV3RbacTest:test_unset_qos_key): 200 POST http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs 0.027s 2020-11-06 18:03:25.027 40 DEBUG tempest.lib.common.rest_client [req-73ea63cd-cc78-4678-9291-20ade40fb137 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"qos_specs": {"name": "tempest-VolumeQOSV3RbacTest-QoS-1011679043", "consumer": "front-end"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-73ea63cd-cc78-4678-9291-20ade40fb137', 'content-length': '441', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-73ea63cd-cc78-4678-9291-20ade40fb137', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs'} Body: b'{"qos_specs": {"id": "704a78a3-d763-4eef-a06b-eafae289ca61", "name": "tempest-VolumeQOSV3RbacTest-QoS-1011679043", "consumer": "front-end", "specs": {}}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/704a78a3-d763-4eef-a06b-eafae289ca61"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/704a78a3-d763-4eef-a06b-eafae289ca61"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:25.069 40 INFO tempest.lib.common.rest_client [req-5e421235-a064-40f6-bb59-e1cad6db2b68 ] Request (VolumeQOSV3RbacTest:test_unset_qos_key): 200 PUT http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/704a78a3-d763-4eef-a06b-eafae289ca61 0.038s 2020-11-06 18:03:25.070 40 DEBUG tempest.lib.common.rest_client [req-5e421235-a064-40f6-bb59-e1cad6db2b68 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"qos_specs": {"iops_bytes": "500"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-5e421235-a064-40f6-bb59-e1cad6db2b68', 'content-length': '36', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5e421235-a064-40f6-bb59-e1cad6db2b68', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/704a78a3-d763-4eef-a06b-eafae289ca61'} Body: b'{"qos_specs": {"iops_bytes": "500"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:25.072 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:25.129 40 INFO tempest.lib.common.rest_client [req-52945a00-ba2a-4dc1-a3ca-3eeed635a62b ] Request (VolumeQOSV3RbacTest:test_unset_qos_key): 200 GET http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles 0.056s 2020-11-06 18:03:25.129 40 DEBUG tempest.lib.common.rest_client [req-52945a00-ba2a-4dc1-a3ca-3eeed635a62b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-52945a00-ba2a-4dc1-a3ca-3eeed635a62b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:25.160 40 INFO tempest.lib.common.rest_client [req-48337d6c-742b-494d-a385-fb63ffb6f305 ] Request (VolumeQOSV3RbacTest:test_unset_qos_key): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.030s 2020-11-06 18:03:25.161 40 DEBUG tempest.lib.common.rest_client [req-48337d6c-742b-494d-a385-fb63ffb6f305 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-48337d6c-742b-494d-a385-fb63ffb6f305', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c1d2ecd3ecc741afb7e9a8880afcf666", "name": "tempest-VolumeQOSV3RbacTest-571965261", "password_expires_at": null}, "audit_ids": ["OQI_R3BZRp-NlCl2IPMXZw"], "expires_at": "2020-11-06T19:03:25.000000Z", "issued_at": "2020-11-06T18:03:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a623ebca89d45ecbc65193cf9959c3e", "name": "tempest-VolumeQOSV3RbacTest-571965261"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:25.256 40 INFO tempest.lib.common.rest_client [req-07c61840-6c46-40d0-b3b8-02e5a3bd4814 ] Request (VolumeQOSV3RbacTest:test_unset_qos_key): 202 PUT http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/704a78a3-d763-4eef-a06b-eafae289ca61/delete_keys 0.094s 2020-11-06 18:03:25.256 40 DEBUG tempest.lib.common.rest_client [req-07c61840-6c46-40d0-b3b8-02e5a3bd4814 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"keys": ["iops_bytes"]} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-07c61840-6c46-40d0-b3b8-02e5a3bd4814', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/704a78a3-d763-4eef-a06b-eafae289ca61/delete_keys'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:25.257 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:25.303 40 INFO tempest.lib.common.rest_client [req-3c91ceb4-1ff9-4a8e-a6d3-a6f46bb09c46 ] Request (VolumeQOSV3RbacTest:test_unset_qos_key): 200 GET http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles 0.045s 2020-11-06 18:03:25.303 40 DEBUG tempest.lib.common.rest_client [req-3c91ceb4-1ff9-4a8e-a6d3-a6f46bb09c46 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3c91ceb4-1ff9-4a8e-a6d3-a6f46bb09c46', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e/users/c1d2ecd3ecc741afb7e9a8880afcf666/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:25.307 37 INFO tempest.lib.common.rest_client [req-43bc7efb-ecd3-47de-887e-08d373304a62 ] Request (NetworksRbacTest:test_create_network): 201 POST http://172.30.13.94:9696/v2.0/networks 0.331s 2020-11-06 18:03:25.307 37 DEBUG tempest.lib.common.rest_client [req-43bc7efb-ecd3-47de-887e-08d373304a62 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-NetworksRbacTest-Network-1122992527"}} Response - Headers: {'content-type': 'application/json', 'content-length': '732', 'x-openstack-request-id': 'req-43bc7efb-ecd3-47de-887e-08d373304a62', 'date': 'Fri, 06 Nov 2020 18:03:25 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"0687f738-a5ee-429a-8d34-2d4e0bfade5d","name":"tempest-NetworksRbacTest-Network-1122992527","tenant_id":"ed59c56def144c79842338c521c6c51e","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"ed59c56def144c79842338c521c6c51e","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":53,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:03:25Z","updated_at":"2020-11-06T18:03:25Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:25.307 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:25.337 40 INFO tempest.lib.common.rest_client [req-e1976146-0d37-4688-8bed-c6413a5df4f3 ] Request (VolumeQOSV3RbacTest:test_unset_qos_key): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:03:25.338 40 DEBUG tempest.lib.common.rest_client [req-e1976146-0d37-4688-8bed-c6413a5df4f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e1976146-0d37-4688-8bed-c6413a5df4f3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c1d2ecd3ecc741afb7e9a8880afcf666", "name": "tempest-VolumeQOSV3RbacTest-571965261", "password_expires_at": null}, "audit_ids": ["CGUCvgpjTj2AgHg4hQm78g"], "expires_at": "2020-11-06T19:03:25.000000Z", "issued_at": "2020-11-06T18:03:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a623ebca89d45ecbc65193cf9959c3e", "name": "tempest-VolumeQOSV3RbacTest-571965261"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a623ebca89d45ecbc65193cf9959c3e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:25.360 37 INFO tempest.lib.common.rest_client [req-eaa9e65e-9ace-4eea-96f3-757d08aa68d0 ] Request (NetworksRbacTest:test_create_network): 200 GET http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles 0.052s 2020-11-06 18:03:25.360 37 DEBUG tempest.lib.common.rest_client [req-eaa9e65e-9ace-4eea-96f3-757d08aa68d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eaa9e65e-9ace-4eea-96f3-757d08aa68d0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:25.392 37 INFO tempest.lib.common.rest_client [req-84898297-dd28-4a24-aba9-38b0eda1e8e0 ] Request (NetworksRbacTest:test_create_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:03:25.393 37 DEBUG tempest.lib.common.rest_client [req-84898297-dd28-4a24-aba9-38b0eda1e8e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-84898297-dd28-4a24-aba9-38b0eda1e8e0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "password_expires_at": null}, "audit_ids": ["pzcGYjG0Qg2USy7KN2V5SQ"], "expires_at": "2020-11-06T19:03:25.000000Z", "issued_at": "2020-11-06T18:03:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:25.396 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:25.399 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_network, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:25.400 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:25.404 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_network:is_default, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:25.404 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:25.421 40 INFO tempest.lib.common.rest_client [req-6777ccbf-b9a2-42be-8752-df099848ccb4 ] Request (VolumeQOSV3RbacTest:test_unset_qos_key): 200 GET http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/704a78a3-d763-4eef-a06b-eafae289ca61 0.083s 2020-11-06 18:03:25.422 40 DEBUG tempest.lib.common.rest_client [req-6777ccbf-b9a2-42be-8752-df099848ccb4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6777ccbf-b9a2-42be-8752-df099848ccb4', 'content-length': '441', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6777ccbf-b9a2-42be-8752-df099848ccb4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/704a78a3-d763-4eef-a06b-eafae289ca61'} Body: b'{"qos_specs": {"id": "704a78a3-d763-4eef-a06b-eafae289ca61", "name": "tempest-VolumeQOSV3RbacTest-QoS-1011679043", "consumer": "front-end", "specs": {}}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/704a78a3-d763-4eef-a06b-eafae289ca61"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/704a78a3-d763-4eef-a06b-eafae289ca61"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:25.458 37 INFO tempest.lib.common.rest_client [req-40738148-1633-4528-a497-e0cbd2fd37b3 ] Request (NetworksRbacTest:test_create_network_is_default): 200 GET http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles 0.053s 2020-11-06 18:03:25.458 37 DEBUG tempest.lib.common.rest_client [req-40738148-1633-4528-a497-e0cbd2fd37b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-40738148-1633-4528-a497-e0cbd2fd37b3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:25.486 40 INFO tempest.lib.common.rest_client [req-2b9e2551-9927-4b38-a757-fe32e00187e0 ] Request (VolumeQOSV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/704a78a3-d763-4eef-a06b-eafae289ca61?force=False 0.061s 2020-11-06 18:03:25.486 40 DEBUG tempest.lib.common.rest_client [req-2b9e2551-9927-4b38-a757-fe32e00187e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2b9e2551-9927-4b38-a757-fe32e00187e0', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/qos-specs/704a78a3-d763-4eef-a06b-eafae289ca61?force=False'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:25.493 37 INFO tempest.lib.common.rest_client [req-c86e9f1c-b4be-43f7-8da5-dc1e322a098e ] Request (NetworksRbacTest:test_create_network_is_default): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:03:25.494 37 DEBUG tempest.lib.common.rest_client [req-c86e9f1c-b4be-43f7-8da5-dc1e322a098e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c86e9f1c-b4be-43f7-8da5-dc1e322a098e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "password_expires_at": null}, "audit_ids": ["hpkkPP5GQiK3KmZuEyjt1Q"], "expires_at": "2020-11-06T19:03:25.000000Z", "issued_at": "2020-11-06T18:03:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:25.556 40 INFO tempest.lib.common.rest_client [req-bdc4df3a-6caf-47e1-9041-e3b9b31c66f4 ] Request (VolumeQOSV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/types/6fced907-1ba1-4ee2-a720-a6a39e737e44 0.067s 2020-11-06 18:03:25.556 40 DEBUG tempest.lib.common.rest_client [req-bdc4df3a-6caf-47e1-9041-e3b9b31c66f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-bdc4df3a-6caf-47e1-9041-e3b9b31c66f4', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/types/6fced907-1ba1-4ee2-a720-a6a39e737e44'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:25.582 40 INFO tempest.lib.common.rest_client [req-720bdac2-4b31-4077-97bd-c2fcf7b77323 ] Request (VolumeQOSV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/types/6fced907-1ba1-4ee2-a720-a6a39e737e44 0.022s 2020-11-06 18:03:25.583 40 DEBUG tempest.lib.common.rest_client [req-720bdac2-4b31-4077-97bd-c2fcf7b77323 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-720bdac2-4b31-4077-97bd-c2fcf7b77323', 'x-openstack-request-id': 'req-720bdac2-4b31-4077-97bd-c2fcf7b77323', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/types/6fced907-1ba1-4ee2-a720-a6a39e737e44'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 6fced907-1ba1-4ee2-a720-a6a39e737e44 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:25.649 40 INFO tempest.lib.common.rest_client [req-41bfad8c-a118-4d27-9492-05c35ebfd42a ] Request (VolumeQOSV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/types/392383e3-ed65-46e3-9670-d2723c4dffb9 0.065s 2020-11-06 18:03:25.649 40 DEBUG tempest.lib.common.rest_client [req-41bfad8c-a118-4d27-9492-05c35ebfd42a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-41bfad8c-a118-4d27-9492-05c35ebfd42a', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/types/392383e3-ed65-46e3-9670-d2723c4dffb9'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:25.672 40 INFO tempest.lib.common.rest_client [req-b94cc123-062b-4583-b9af-cfa6fc88847e ] Request (VolumeQOSV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/types/392383e3-ed65-46e3-9670-d2723c4dffb9 0.022s 2020-11-06 18:03:25.673 40 DEBUG tempest.lib.common.rest_client [req-b94cc123-062b-4583-b9af-cfa6fc88847e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-b94cc123-062b-4583-b9af-cfa6fc88847e', 'x-openstack-request-id': 'req-b94cc123-062b-4583-b9af-cfa6fc88847e', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/types/392383e3-ed65-46e3-9670-d2723c4dffb9'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 392383e3-ed65-46e3-9670-d2723c4dffb9 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:25.717 37 INFO tempest.lib.common.rest_client [req-3511bfcb-6271-46d2-b942-aa212a64d7c4 ] Request (NetworksRbacTest:test_create_network_is_default): 409 POST http://172.30.13.94:9696/v2.0/networks 0.221s 2020-11-06 18:03:25.718 37 DEBUG tempest.lib.common.rest_client [req-3511bfcb-6271-46d2-b942-aa212a64d7c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-NetworksRbacTest-Network-1084810418", "is_default": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '167', 'x-openstack-request-id': 'req-3511bfcb-6271-46d2-b942-aa212a64d7c4', 'date': 'Fri, 06 Nov 2020 18:03:25 GMT', 'connection': 'close', 'status': '409', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"NeutronError": {"type": "DefaultExternalNetworkExists", "message": "A default external network already exists: 3fe4fc32-89a3-4f72-b166-6eb7100e1fea.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:25.718 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:25.740 40 INFO tempest.lib.common.rest_client [req-8a24d8fa-53e4-4936-9c35-311cb2f3f5a8 ] Request (VolumeQOSV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/types/71e414f1-a558-4fda-8ab4-50375ff4e1fe 0.066s 2020-11-06 18:03:25.741 40 DEBUG tempest.lib.common.rest_client [req-8a24d8fa-53e4-4936-9c35-311cb2f3f5a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8a24d8fa-53e4-4936-9c35-311cb2f3f5a8', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/types/71e414f1-a558-4fda-8ab4-50375ff4e1fe'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:25.762 40 INFO tempest.lib.common.rest_client [req-7c0c7dea-1afe-4edb-8128-56b7609cd353 ] Request (VolumeQOSV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/types/71e414f1-a558-4fda-8ab4-50375ff4e1fe 0.021s 2020-11-06 18:03:25.763 40 DEBUG tempest.lib.common.rest_client [req-7c0c7dea-1afe-4edb-8128-56b7609cd353 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-7c0c7dea-1afe-4edb-8128-56b7609cd353', 'x-openstack-request-id': 'req-7c0c7dea-1afe-4edb-8128-56b7609cd353', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/types/71e414f1-a558-4fda-8ab4-50375ff4e1fe'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 71e414f1-a558-4fda-8ab4-50375ff4e1fe could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:25.772 37 INFO tempest.lib.common.rest_client [req-8ff84ed9-defc-49c6-8670-90e0894d700f ] Request (NetworksRbacTest:test_create_network_is_default): 200 GET http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles 0.053s 2020-11-06 18:03:25.772 37 DEBUG tempest.lib.common.rest_client [req-8ff84ed9-defc-49c6-8670-90e0894d700f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8ff84ed9-defc-49c6-8670-90e0894d700f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:25.804 37 INFO tempest.lib.common.rest_client [req-911f8cb6-9f05-4851-8167-7e3ec1aae36f ] Request (NetworksRbacTest:test_create_network_is_default): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.030s 2020-11-06 18:03:25.805 37 DEBUG tempest.lib.common.rest_client [req-911f8cb6-9f05-4851-8167-7e3ec1aae36f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-911f8cb6-9f05-4851-8167-7e3ec1aae36f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "password_expires_at": null}, "audit_ids": ["mqlesQX5QaSUHzPqbdxYAg"], "expires_at": "2020-11-06T19:03:25.000000Z", "issued_at": "2020-11-06T18:03:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:25.808 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:25.811 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_network, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:25.811 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:25.813 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_network:provider:network_type, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:25.813 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:25.832 40 INFO tempest.lib.common.rest_client [req-9c9015c4-d590-4821-8a89-0b99dd661510 ] Request (VolumeQOSV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/types/dd926011-52cc-46f5-a05e-ee1badfef80e 0.068s 2020-11-06 18:03:25.832 40 DEBUG tempest.lib.common.rest_client [req-9c9015c4-d590-4821-8a89-0b99dd661510 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9c9015c4-d590-4821-8a89-0b99dd661510', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/types/dd926011-52cc-46f5-a05e-ee1badfef80e'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:25.853 40 INFO tempest.lib.common.rest_client [req-4586c3db-b6a7-4e62-a31f-172993c150e8 ] Request (VolumeQOSV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/types/dd926011-52cc-46f5-a05e-ee1badfef80e 0.019s 2020-11-06 18:03:25.853 37 INFO tempest.lib.common.rest_client [req-23ecc0af-480a-4976-bcb3-f0bfaa8241f9 ] Request (NetworksRbacTest:test_create_network_provider_network_type): 200 GET http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles 0.039s 2020-11-06 18:03:25.853 40 DEBUG tempest.lib.common.rest_client [req-4586c3db-b6a7-4e62-a31f-172993c150e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-4586c3db-b6a7-4e62-a31f-172993c150e8', 'x-openstack-request-id': 'req-4586c3db-b6a7-4e62-a31f-172993c150e8', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/9a623ebca89d45ecbc65193cf9959c3e/types/dd926011-52cc-46f5-a05e-ee1badfef80e'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type dd926011-52cc-46f5-a05e-ee1badfef80e could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:25.853 37 DEBUG tempest.lib.common.rest_client [req-23ecc0af-480a-4976-bcb3-f0bfaa8241f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-23ecc0af-480a-4976-bcb3-f0bfaa8241f9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:25.879 37 INFO tempest.lib.common.rest_client [req-82195b27-a2fb-42e0-8ec8-f593b7387697 ] Request (NetworksRbacTest:test_create_network_provider_network_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.025s 2020-11-06 18:03:25.880 37 DEBUG tempest.lib.common.rest_client [req-82195b27-a2fb-42e0-8ec8-f593b7387697 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-82195b27-a2fb-42e0-8ec8-f593b7387697', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "password_expires_at": null}, "audit_ids": ["pdxSigQbREqCHEJjtx-FkA"], "expires_at": "2020-11-06T19:03:25.000000Z", "issued_at": "2020-11-06T18:03:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:25.981 40 INFO tempest.lib.common.rest_client [req-815db0c9-434a-498a-ae56-8f30c13adae3 ] Request (VolumeQOSV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/c1d2ecd3ecc741afb7e9a8880afcf666 0.127s 2020-11-06 18:03:25.981 40 DEBUG tempest.lib.common.rest_client [req-815db0c9-434a-498a-ae56-8f30c13adae3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-815db0c9-434a-498a-ae56-8f30c13adae3', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/c1d2ecd3ecc741afb7e9a8880afcf666'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:26.006 38 INFO tempest.lib.common.rest_client [req-f2219f70-1a0a-4304-a8d9-9c6d09f46af6 ] Request (SnapshotManageRbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/snapshots/1297937d-0b85-4a58-867d-8a861a8b027b 0.038s 2020-11-06 18:03:26.007 38 DEBUG tempest.lib.common.rest_client [req-f2219f70-1a0a-4304-a8d9-9c6d09f46af6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-f2219f70-1a0a-4304-a8d9-9c6d09f46af6', 'content-length': '441', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f2219f70-1a0a-4304-a8d9-9c6d09f46af6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/snapshots/1297937d-0b85-4a58-867d-8a861a8b027b'} Body: b'{"snapshot": {"id": "1297937d-0b85-4a58-867d-8a861a8b027b", "created_at": "2020-11-06T18:03:25.000000", "updated_at": null, "name": "tempest-SnapshotManageRbacTest-Snapshot-1272037834", "description": null, "volume_id": "dc76691e-cb82-4ec9-b116-b3eb17eb17e5", "status": "creating", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "8dca462f626644269229cf59ef328eab", "os-extended-snapshot-attributes:progress": "0%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:26.024 39 INFO tempest.lib.common.rest_client [req-6f9f00f2-33d4-4d6b-99ea-f78558215918 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.203s 2020-11-06 18:03:26.025 39 DEBUG tempest.lib.common.rest_client [req-6f9f00f2-33d4-4d6b-99ea-f78558215918 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6f9f00f2-33d4-4d6b-99ea-f78558215918', 'x-compute-request-id': 'req-6f9f00f2-33d4-4d6b-99ea-f78558215918', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:26.048 40 INFO tempest.lib.common.rest_client [req-103831ff-2eaa-4129-8c5d-d2343dfb66cb ] Request (VolumeQOSV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.065s 2020-11-06 18:03:26.048 40 DEBUG tempest.lib.common.rest_client [req-103831ff-2eaa-4129-8c5d-d2343dfb66cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-103831ff-2eaa-4129-8c5d-d2343dfb66cb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["CX1zsWg1TlmSqdLzjFHeaA"], "expires_at": "2020-11-06T19:03:25.000000Z", "issued_at": "2020-11-06T18:03:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:26.188 37 INFO tempest.lib.common.rest_client [req-f8f14706-c1f2-4acf-8052-daaea5f21ad0 ] Request (NetworksRbacTest:test_create_network_provider_network_type): 201 POST http://172.30.13.94:9696/v2.0/networks 0.307s 2020-11-06 18:03:26.189 37 DEBUG tempest.lib.common.rest_client [req-f8f14706-c1f2-4acf-8052-daaea5f21ad0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-NetworksRbacTest-Network-1406662591", "provider:network_type": "vxlan"}} Response - Headers: {'content-type': 'application/json', 'content-length': '732', 'x-openstack-request-id': 'req-f8f14706-c1f2-4acf-8052-daaea5f21ad0', 'date': 'Fri, 06 Nov 2020 18:03:26 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"f0caa2d0-c94d-484b-832f-420cf8680927","name":"tempest-NetworksRbacTest-Network-1406662591","tenant_id":"ed59c56def144c79842338c521c6c51e","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"ed59c56def144c79842338c521c6c51e","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":57,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:03:26Z","updated_at":"2020-11-06T18:03:26Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:26.189 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:26.247 37 INFO tempest.lib.common.rest_client [req-94e36122-b996-4a9b-ae9b-d7c5870347d7 ] Request (NetworksRbacTest:test_create_network_provider_network_type): 200 GET http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles 0.056s 2020-11-06 18:03:26.247 37 DEBUG tempest.lib.common.rest_client [req-94e36122-b996-4a9b-ae9b-d7c5870347d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-94e36122-b996-4a9b-ae9b-d7c5870347d7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:26.296 40 INFO tempest.lib.common.rest_client [req-52c0f373-2ad7-4e49-a0a5-d453cf1999f9 ] Request (VolumeQOSV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=9a623ebca89d45ecbc65193cf9959c3e&name=default 0.246s 2020-11-06 18:03:26.296 40 DEBUG tempest.lib.common.rest_client [req-52c0f373-2ad7-4e49-a0a5-d453cf1999f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-52c0f373-2ad7-4e49-a0a5-d453cf1999f9', 'date': 'Fri, 06 Nov 2020 18:03:26 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=9a623ebca89d45ecbc65193cf9959c3e&name=default'} Body: b'{"security_groups": [{"id": "e2ec7a9c-faa3-417b-9f35-36814a668bda", "name": "default", "stateful": true, "tenant_id": "9a623ebca89d45ecbc65193cf9959c3e", "description": "Default security group", "security_group_rules": [{"id": "135e39b0-6f24-4a6b-a5cb-7522081b4163", "tenant_id": "9a623ebca89d45ecbc65193cf9959c3e", "security_group_id": "e2ec7a9c-faa3-417b-9f35-36814a668bda", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:26Z", "updated_at": "2020-11-06T18:03:26Z", "revision_number": 0, "project_id": "9a623ebca89d45ecbc65193cf9959c3e"}, {"id": "dc76fc56-5e6e-49a5-af3b-b5476d1e1a46", "tenant_id": "9a623ebca89d45ecbc65193cf9959c3e", "security_group_id": "e2ec7a9c-faa3-417b-9f35-36814a668bda", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "e2ec7a9c-faa3-417b-9f35-36814a668bda", "description": null, "tags": [], "created_at": "2020-11-06T18:03:26Z", "updated_at": "2020-11-06T18:03:26Z", "revision_number": 0, "project_id": "9a623ebca89d45ecbc65193cf9959c3e"}, {"id": "ddcf010b-edd0-4f57-8f7c-5efe8cdc6da8", "tenant_id": "9a623ebca89d45ecbc65193cf9959c3e", "security_group_id": "e2ec7a9c-faa3-417b-9f35-36814a668bda", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "e2ec7a9c-faa3-417b-9f35-36814a668bda", "description": null, "tags": [], "created_at": "2020-11-06T18:03:26Z", "updated_at": "2020-11-06T18:03:26Z", "revision_number": 0, "project_id": "9a623ebca89d45ecbc65193cf9959c3e"}, {"id": "f4fad4f4-9384-4bec-8be7-a42e7d2d4d39", "tenant_id": "9a623ebca89d45ecbc65193cf9959c3e", "security_group_id": "e2ec7a9c-faa3-417b-9f35-36814a668bda", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:26Z", "updated_at": "2020-11-06T18:03:26Z", "revision_number": 0, "project_id": "9a623ebca89d45ecbc65193cf9959c3e"}], "tags": [], "created_at": "2020-11-06T18:03:26Z", "updated_at": "2020-11-06T18:03:26Z", "revision_number": 1, "project_id": "9a623ebca89d45ecbc65193cf9959c3e"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:26.315 37 INFO tempest.lib.common.rest_client [req-8b95f080-b4b3-4b1b-8d05-3cc564be5d23 ] Request (NetworksRbacTest:test_create_network_provider_network_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.067s 2020-11-06 18:03:26.316 37 DEBUG tempest.lib.common.rest_client [req-8b95f080-b4b3-4b1b-8d05-3cc564be5d23 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8b95f080-b4b3-4b1b-8d05-3cc564be5d23', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "password_expires_at": null}, "audit_ids": ["xSeIWbRhQZmWJ3hBi4RzeQ"], "expires_at": "2020-11-06T19:03:26.000000Z", "issued_at": "2020-11-06T18:03:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:26.318 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:26.321 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_network, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:26.322 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:26.325 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_network:provider:physical_network, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:26.325 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:26.372 37 INFO tempest.lib.common.rest_client [req-30b259ae-baae-46be-b2d5-d5f8f2ab8b90 ] Request (NetworksRbacTest:test_create_network_provider_physical_network): 200 GET http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles 0.045s 2020-11-06 18:03:26.372 37 DEBUG tempest.lib.common.rest_client [req-30b259ae-baae-46be-b2d5-d5f8f2ab8b90 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-30b259ae-baae-46be-b2d5-d5f8f2ab8b90', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:26.406 37 INFO tempest.lib.common.rest_client [req-1544a3a4-24f7-4369-abc3-d96b8e9293d0 ] Request (NetworksRbacTest:test_create_network_provider_physical_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:03:26.407 37 DEBUG tempest.lib.common.rest_client [req-1544a3a4-24f7-4369-abc3-d96b8e9293d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1544a3a4-24f7-4369-abc3-d96b8e9293d0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "password_expires_at": null}, "audit_ids": ["hmJUBxN6RzSx5UTlLLZVpQ"], "expires_at": "2020-11-06T19:03:26.000000Z", "issued_at": "2020-11-06T18:03:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:26.644 37 INFO tempest.lib.common.rest_client [req-7baa8a92-e281-4da5-83b4-9180a18db8f8 ] Request (NetworksRbacTest:test_create_network_provider_physical_network): 400 POST http://172.30.13.94:9696/v2.0/networks 0.235s 2020-11-06 18:03:26.644 37 DEBUG tempest.lib.common.rest_client [req-7baa8a92-e281-4da5-83b4-9180a18db8f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-NetworksRbacTest-Network-1379801477", "provider:network_type": "flat", "provider:physical_network": "provider"}} Response - Headers: {'content-type': 'application/json', 'content-length': '162', 'x-openstack-request-id': 'req-7baa8a92-e281-4da5-83b4-9180a18db8f8', 'date': 'Fri, 06 Nov 2020 18:03:26 GMT', 'connection': 'close', 'status': '400', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"NeutronError": {"type": "InvalidInput", "message": "Invalid input for operation: physical_network \'provider\' unknown for flat provider network.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:26.645 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:26.681 40 INFO tempest.lib.common.rest_client [req-718f1c91-3209-48fd-83bd-eaabb6a41926 ] Request (VolumeQOSV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/e2ec7a9c-faa3-417b-9f35-36814a668bda 0.383s 2020-11-06 18:03:26.681 40 DEBUG tempest.lib.common.rest_client [req-718f1c91-3209-48fd-83bd-eaabb6a41926 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-718f1c91-3209-48fd-83bd-eaabb6a41926', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:03:26 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/e2ec7a9c-faa3-417b-9f35-36814a668bda'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:26.704 37 INFO tempest.lib.common.rest_client [req-17900d9f-bad4-4eb8-9fbc-6105be120d30 ] Request (NetworksRbacTest:test_create_network_provider_physical_network): 200 GET http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles 0.058s 2020-11-06 18:03:26.705 37 DEBUG tempest.lib.common.rest_client [req-17900d9f-bad4-4eb8-9fbc-6105be120d30 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-17900d9f-bad4-4eb8-9fbc-6105be120d30', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:26.740 37 INFO tempest.lib.common.rest_client [req-947c8489-2c5b-48bb-8beb-1ffe320f916b ] Request (NetworksRbacTest:test_create_network_provider_physical_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:03:26.741 37 DEBUG tempest.lib.common.rest_client [req-947c8489-2c5b-48bb-8beb-1ffe320f916b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-947c8489-2c5b-48bb-8beb-1ffe320f916b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "password_expires_at": null}, "audit_ids": ["og-ZqriITRyKeqyVguBihQ"], "expires_at": "2020-11-06T19:03:26.000000Z", "issued_at": "2020-11-06T18:03:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:26.744 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:26.748 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_network, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:26.748 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:26.752 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_network:router:external, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:26.752 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:26.803 40 INFO tempest.lib.common.rest_client [req-94d20e9b-066b-4904-a13c-10ac9801eda1 ] Request (VolumeQOSV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e 0.121s 2020-11-06 18:03:26.804 40 DEBUG tempest.lib.common.rest_client [req-94d20e9b-066b-4904-a13c-10ac9801eda1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-94d20e9b-066b-4904-a13c-10ac9801eda1', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a623ebca89d45ecbc65193cf9959c3e'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:26.839 40 INFO tempest.lib.common.rest_client [req-4ace05cc-f240-4154-b0fd-6ea99a76e230 ] Request (QuotaClassesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:03:26.840 40 DEBUG tempest.lib.common.rest_client [req-4ace05cc-f240-4154-b0fd-6ea99a76e230 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4ace05cc-f240-4154-b0fd-6ea99a76e230', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["pffUT4w-TwKOB35c7G9oEg"], "expires_at": "2020-11-06T19:03:26.000000Z", "issued_at": "2020-11-06T18:03:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:26.848 37 INFO tempest.lib.common.rest_client [req-aa4890b5-5d59-4d8a-8d38-d49a21945bef ] Request (NetworksRbacTest:test_create_network_router_external): 200 GET http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles 0.094s 2020-11-06 18:03:26.848 37 DEBUG tempest.lib.common.rest_client [req-aa4890b5-5d59-4d8a-8d38-d49a21945bef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aa4890b5-5d59-4d8a-8d38-d49a21945bef', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:26.880 40 INFO tempest.lib.common.rest_client [req-001b4876-f607-4448-8629-f76846cd76f0 ] Request (QuotaClassesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:03:26.880 40 DEBUG tempest.lib.common.rest_client [req-001b4876-f607-4448-8629-f76846cd76f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-001b4876-f607-4448-8629-f76846cd76f0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["oiYVvWCtRj23BwCNkpCF6g"], "expires_at": "2020-11-06T19:03:26.000000Z", "issued_at": "2020-11-06T18:03:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:26.927 40 INFO tempest.lib.common.rest_client [req-645b373b-4222-4bfc-ad68-c06481f08708 ] Request (QuotaClassesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.046s 2020-11-06 18:03:26.927 40 DEBUG tempest.lib.common.rest_client [req-645b373b-4222-4bfc-ad68-c06481f08708 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-645b373b-4222-4bfc-ad68-c06481f08708', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:26.930 37 INFO tempest.lib.common.rest_client [req-a1f703b4-6f37-4a14-9e13-5d9138a10244 ] Request (NetworksRbacTest:test_create_network_router_external): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-11-06 18:03:26.931 37 DEBUG tempest.lib.common.rest_client [req-a1f703b4-6f37-4a14-9e13-5d9138a10244 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a1f703b4-6f37-4a14-9e13-5d9138a10244', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "password_expires_at": null}, "audit_ids": ["J6cmShgpSkySrV_oHd6vjw"], "expires_at": "2020-11-06T19:03:26.000000Z", "issued_at": "2020-11-06T18:03:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:26.985 40 INFO tempest.lib.common.rest_client [req-1be12575-512a-4f14-b79d-5fc6a31f32b8 ] Request (QuotaClassesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.057s 2020-11-06 18:03:26.985 40 DEBUG tempest.lib.common.rest_client [req-1be12575-512a-4f14-b79d-5fc6a31f32b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-QuotaClassesV3RbacTest-648772236-desc", "domain_id": "default", "name": "tempest-QuotaClassesV3RbacTest-648772236"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '380', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1be12575-512a-4f14-b79d-5fc6a31f32b8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "864df67466274bb5bca566fc796a643b", "name": "tempest-QuotaClassesV3RbacTest-648772236", "domain_id": "default", "description": "tempest-QuotaClassesV3RbacTest-648772236-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/864df67466274bb5bca566fc796a643b"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:27.042 38 INFO tempest.lib.common.rest_client [req-a28adc32-3948-4ce8-8229-9ed871fca28f ] Request (SnapshotManageRbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/snapshots/1297937d-0b85-4a58-867d-8a861a8b027b 0.029s 2020-11-06 18:03:27.042 38 DEBUG tempest.lib.common.rest_client [req-a28adc32-3948-4ce8-8229-9ed871fca28f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a28adc32-3948-4ce8-8229-9ed871fca28f', 'content-length': '468', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a28adc32-3948-4ce8-8229-9ed871fca28f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/snapshots/1297937d-0b85-4a58-867d-8a861a8b027b'} Body: b'{"snapshot": {"id": "1297937d-0b85-4a58-867d-8a861a8b027b", "created_at": "2020-11-06T18:03:25.000000", "updated_at": "2020-11-06T18:03:26.000000", "name": "tempest-SnapshotManageRbacTest-Snapshot-1272037834", "description": null, "volume_id": "dc76691e-cb82-4ec9-b116-b3eb17eb17e5", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "8dca462f626644269229cf59ef328eab", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:27.045 38 INFO tempest.common.waiters [-] snapshot 1297937d-0b85-4a58-867d-8a861a8b027b reached available after waiting for 3.045919 seconds 2020-11-06 18:03:27.047 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:27.049 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: snapshot_extension:snapshot_manage, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:27.049 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:27.089 40 INFO tempest.lib.common.rest_client [req-0a69cc04-efe2-4d9c-a441-2e5e82d9127a ] Request (QuotaClassesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.103s 2020-11-06 18:03:27.089 40 DEBUG tempest.lib.common.rest_client [req-0a69cc04-efe2-4d9c-a441-2e5e82d9127a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-QuotaClassesV3RbacTest-648772236", "password": "T2@_FFP&AfU#2Ok", "project_id": "864df67466274bb5bca566fc796a643b", "email": "tempest-QuotaClassesV3RbacTest-216659390@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '398', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0a69cc04-efe2-4d9c-a441-2e5e82d9127a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "864df67466274bb5bca566fc796a643b", "email": "tempest-QuotaClassesV3RbacTest-216659390@example.com", "id": "626c6abde48b46e7a7b4b05ef37708bf", "name": "tempest-QuotaClassesV3RbacTest-648772236", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/626c6abde48b46e7a7b4b05ef37708bf"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:27.101 38 INFO tempest.lib.common.rest_client [req-f40f8f97-0cdc-4804-ae7b-d71d4ec8bfdd ] Request (SnapshotManageRbacTest:test_manage_snapshot_rbac): 200 GET http://172.30.13.94/identity/v3/projects/8dca462f626644269229cf59ef328eab/users/a7d4864e62d843a1be7af2b5102a735e/roles 0.051s 2020-11-06 18:03:27.102 38 DEBUG tempest.lib.common.rest_client [req-f40f8f97-0cdc-4804-ae7b-d71d4ec8bfdd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f40f8f97-0cdc-4804-ae7b-d71d4ec8bfdd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/8dca462f626644269229cf59ef328eab/users/a7d4864e62d843a1be7af2b5102a735e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/8dca462f626644269229cf59ef328eab/users/a7d4864e62d843a1be7af2b5102a735e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:27.147 40 INFO tempest.lib.common.rest_client [req-e1694a60-5a59-4c3c-858f-5d3f23ba8c0f ] Request (QuotaClassesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.057s 2020-11-06 18:03:27.148 40 DEBUG tempest.lib.common.rest_client [req-e1694a60-5a59-4c3c-858f-5d3f23ba8c0f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e1694a60-5a59-4c3c-858f-5d3f23ba8c0f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:27.195 40 INFO tempest.lib.common.rest_client [req-682d93b5-44a6-4ec3-a358-307dd5524563 ] Request (QuotaClassesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.045s 2020-11-06 18:03:27.195 40 DEBUG tempest.lib.common.rest_client [req-682d93b5-44a6-4ec3-a358-307dd5524563 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-682d93b5-44a6-4ec3-a358-307dd5524563', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:27.200 38 INFO tempest.lib.common.rest_client [req-a9232a88-ec5c-4420-b801-31f25d8ac706 ] Request (SnapshotManageRbacTest:test_manage_snapshot_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-11-06 18:03:27.201 38 DEBUG tempest.lib.common.rest_client [req-a9232a88-ec5c-4420-b801-31f25d8ac706 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a9232a88-ec5c-4420-b801-31f25d8ac706', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a7d4864e62d843a1be7af2b5102a735e", "name": "tempest-SnapshotManageRbacTest-305419301", "password_expires_at": null}, "audit_ids": ["G6JHzkrfRQCKRA7W1kC-YA"], "expires_at": "2020-11-06T19:03:27.000000Z", "issued_at": "2020-11-06T18:03:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "8dca462f626644269229cf59ef328eab", "name": "tempest-SnapshotManageRbacTest-305419301"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/8dca462f626644269229cf59ef328eab", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/8dca462f626644269229cf59ef328eab", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_8dca462f626644269229cf59ef328eab", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_8dca462f626644269229cf59ef328eab", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_8dca462f626644269229cf59ef328eab", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:27.274 40 INFO tempest.lib.common.rest_client [req-648056ef-2508-4c6c-ae8d-e22d2ab0f426 ] Request (QuotaClassesV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/864df67466274bb5bca566fc796a643b/users/626c6abde48b46e7a7b4b05ef37708bf/roles/72a4576c553448cd941b052c1ca0cf2d 0.077s 2020-11-06 18:03:27.275 40 DEBUG tempest.lib.common.rest_client [req-648056ef-2508-4c6c-ae8d-e22d2ab0f426 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-648056ef-2508-4c6c-ae8d-e22d2ab0f426', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/864df67466274bb5bca566fc796a643b/users/626c6abde48b46e7a7b4b05ef37708bf/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:27.276 40 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-QuotaClassesV3RbacTest-648772236', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '864df67466274bb5bca566fc796a643b', 'project_name': 'tempest-QuotaClassesV3RbacTest-648772236', 'tenant_id': '864df67466274bb5bca566fc796a643b', 'tenant_name': 'tempest-QuotaClassesV3RbacTest-648772236', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '626c6abde48b46e7a7b4b05ef37708bf'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:27.276 40 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-QuotaClassesV3RbacTest-648772236', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '864df67466274bb5bca566fc796a643b', 'project_name': 'tempest-QuotaClassesV3RbacTest-648772236', 'tenant_id': '864df67466274bb5bca566fc796a643b', 'tenant_name': 'tempest-QuotaClassesV3RbacTest-648772236', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '626c6abde48b46e7a7b4b05ef37708bf'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:27.296 39 INFO tempest.lib.common.rest_client [req-856c5c29-6a57-413b-aa3b-c6ef449ea9ff ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.254s 2020-11-06 18:03:27.296 39 DEBUG tempest.lib.common.rest_client [req-856c5c29-6a57-413b-aa3b-c6ef449ea9ff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-856c5c29-6a57-413b-aa3b-c6ef449ea9ff', 'x-compute-request-id': 'req-856c5c29-6a57-413b-aa3b-c6ef449ea9ff', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:27.406 40 INFO tempest.lib.common.rest_client [req-5f99c0f7-376b-459e-a664-fbaa9029d04c ] Request (QuotaClassesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.121s 2020-11-06 18:03:27.406 40 DEBUG tempest.lib.common.rest_client [req-5f99c0f7-376b-459e-a664-fbaa9029d04c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6573', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5f99c0f7-376b-459e-a664-fbaa9029d04c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "626c6abde48b46e7a7b4b05ef37708bf", "name": "tempest-QuotaClassesV3RbacTest-648772236", "password_expires_at": null}, "audit_ids": ["Vs4VCQklQsyIgsp9VHfKBw"], "expires_at": "2020-11-06T19:03:27.000000Z", "issued_at": "2020-11-06T18:03:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "864df67466274bb5bca566fc796a643b", "name": "tempest-QuotaClassesV3RbacTest-648772236"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/864df67466274bb5bca566fc796a643b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/864df67466274bb5bca566fc796a643b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/864df67466274bb5bca566fc796a643b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_864df67466274bb5bca566fc796a643b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_864df67466274bb5bca566fc796a643b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_864df67466274bb5bca566fc796a643b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://1 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:27.494 40 INFO tempest.lib.common.rest_client [req-de79d9a4-fb49-4f96-85b9-1048a0dcfec5 ] Request (QuotaClassesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-11-06 18:03:27.494 40 DEBUG tempest.lib.common.rest_client [req-de79d9a4-fb49-4f96-85b9-1048a0dcfec5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-de79d9a4-fb49-4f96-85b9-1048a0dcfec5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["wWExYzvPRaqcAVH-ffpH6Q"], "expires_at": "2020-11-06T19:03:27.000000Z", "issued_at": "2020-11-06T18:03:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:27.519 37 INFO tempest.lib.common.rest_client [req-5304fd76-3728-4852-91a0-756792c82663 ] Request (NetworksRbacTest:test_create_network_router_external): 201 POST http://172.30.13.94:9696/v2.0/networks 0.586s 2020-11-06 18:03:27.519 37 DEBUG tempest.lib.common.rest_client [req-5304fd76-3728-4852-91a0-756792c82663 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-NetworksRbacTest-Network-18032585", "router:external": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '729', 'x-openstack-request-id': 'req-5304fd76-3728-4852-91a0-756792c82663', 'date': 'Fri, 06 Nov 2020 18:03:27 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"350818cc-e1d6-4854-bc46-adb98f948cfe","name":"tempest-NetworksRbacTest-Network-18032585","tenant_id":"ed59c56def144c79842338c521c6c51e","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"ed59c56def144c79842338c521c6c51e","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":true,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":60,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:03:27Z","updated_at":"2020-11-06T18:03:27Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:27.520 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:27.546 40 INFO tempest.lib.common.rest_client [req-05799bf1-980e-406f-9a36-a1619c7aaf03 ] Request (QuotaClassesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-11-06 18:03:27.547 40 DEBUG tempest.lib.common.rest_client [req-05799bf1-980e-406f-9a36-a1619c7aaf03 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-05799bf1-980e-406f-9a36-a1619c7aaf03', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["6KQHowwOTFKx_QOue9dMFQ"], "expires_at": "2020-11-06T19:03:27.000000Z", "issued_at": "2020-11-06T18:03:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:27.577 37 INFO tempest.lib.common.rest_client [req-5f2d0abc-c864-4521-8d94-a72ae7bf8a3c ] Request (NetworksRbacTest:test_create_network_router_external): 200 GET http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles 0.056s 2020-11-06 18:03:27.577 37 DEBUG tempest.lib.common.rest_client [req-5f2d0abc-c864-4521-8d94-a72ae7bf8a3c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5f2d0abc-c864-4521-8d94-a72ae7bf8a3c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:27.600 40 INFO tempest.lib.common.rest_client [req-3fdc47da-7c5d-468f-8d01-4e36db7b1637 ] Request (QuotaClassesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.052s 2020-11-06 18:03:27.600 40 DEBUG tempest.lib.common.rest_client [req-3fdc47da-7c5d-468f-8d01-4e36db7b1637 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3fdc47da-7c5d-468f-8d01-4e36db7b1637', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:27.601 38 INFO tempest.lib.common.rest_client [req-26eecfed-db79-495f-b3c8-2a75274a5f04 ] Request (SnapshotManageRbacTest:test_manage_snapshot_rbac): 202 POST http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/os-snapshot-manage 0.399s 2020-11-06 18:03:27.602 38 DEBUG tempest.lib.common.rest_client [req-26eecfed-db79-495f-b3c8-2a75274a5f04 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"snapshot": {"volume_id": "dc76691e-cb82-4ec9-b116-b3eb17eb17e5", "ref": {"source-name": "snapshot-1297937d-0b85-4a58-867d-8a861a8b027b"}, "name": "tempest-SnapshotManageRbacTest-Managed-Snapshot-1302585069"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-26eecfed-db79-495f-b3c8-2a75274a5f04', 'content-length': '317', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-26eecfed-db79-495f-b3c8-2a75274a5f04', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/os-snapshot-manage'} Body: b'{"snapshot": {"id": "3df09bee-d049-4177-9696-ecc01157c8cf", "created_at": "2020-11-06T18:03:27.530237", "updated_at": null, "name": "tempest-SnapshotManageRbacTest-Managed-Snapshot-1302585069", "description": null, "volume_id": "dc76691e-cb82-4ec9-b116-b3eb17eb17e5", "status": "creating", "size": 1, "metadata": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:27.606 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:27.651 40 INFO tempest.lib.common.rest_client [req-bd6e5742-17e6-4a2c-9eb7-86460ffda406 ] Request (QuotaClassesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.049s 2020-11-06 18:03:27.651 40 DEBUG tempest.lib.common.rest_client [req-bd6e5742-17e6-4a2c-9eb7-86460ffda406 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bd6e5742-17e6-4a2c-9eb7-86460ffda406', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:27.652 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:03:27.652 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:27.662 38 INFO tempest.lib.common.rest_client [req-60941bd0-50ee-40a7-9862-ca8d45886d29 ] Request (SnapshotManageRbacTest:test_manage_snapshot_rbac): 200 GET http://172.30.13.94/identity/v3/projects/8dca462f626644269229cf59ef328eab/users/a7d4864e62d843a1be7af2b5102a735e/roles 0.055s 2020-11-06 18:03:27.662 38 DEBUG tempest.lib.common.rest_client [req-60941bd0-50ee-40a7-9862-ca8d45886d29 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-60941bd0-50ee-40a7-9862-ca8d45886d29', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/8dca462f626644269229cf59ef328eab/users/a7d4864e62d843a1be7af2b5102a735e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/8dca462f626644269229cf59ef328eab/users/a7d4864e62d843a1be7af2b5102a735e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:27.665 37 INFO tempest.lib.common.rest_client [req-183855a8-b7e8-4504-8bd7-6d79338979f9 ] Request (NetworksRbacTest:test_create_network_router_external): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-11-06 18:03:27.666 37 DEBUG tempest.lib.common.rest_client [req-183855a8-b7e8-4504-8bd7-6d79338979f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-183855a8-b7e8-4504-8bd7-6d79338979f9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "password_expires_at": null}, "audit_ids": ["0oLRLrECSACqqmJUWKwFqw"], "expires_at": "2020-11-06T19:03:27.000000Z", "issued_at": "2020-11-06T18:03:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:27.668 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:27.670 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_network, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:27.671 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:27.673 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_network:shared, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:27.674 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:27.694 38 INFO tempest.lib.common.rest_client [req-64a9b5ba-9b53-4e71-aba7-c99941f637b6 ] Request (SnapshotManageRbacTest:test_manage_snapshot_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:03:27.695 38 DEBUG tempest.lib.common.rest_client [req-64a9b5ba-9b53-4e71-aba7-c99941f637b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-64a9b5ba-9b53-4e71-aba7-c99941f637b6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a7d4864e62d843a1be7af2b5102a735e", "name": "tempest-SnapshotManageRbacTest-305419301", "password_expires_at": null}, "audit_ids": ["8Jddl2zMTHKmrMR59xnkDw"], "expires_at": "2020-11-06T19:03:27.000000Z", "issued_at": "2020-11-06T18:03:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "8dca462f626644269229cf59ef328eab", "name": "tempest-SnapshotManageRbacTest-305419301"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/8dca462f626644269229cf59ef328eab", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/8dca462f626644269229cf59ef328eab", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_8dca462f626644269229cf59ef328eab", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_8dca462f626644269229cf59ef328eab", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_8dca462f626644269229cf59ef328eab", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:27.701 40 INFO tempest.lib.common.rest_client [req-82e0654c-5970-434f-ad4e-6a765d8481e2 ] Request (QuotaClassesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/864df67466274bb5bca566fc796a643b/users/626c6abde48b46e7a7b4b05ef37708bf/roles 0.048s 2020-11-06 18:03:27.701 40 DEBUG tempest.lib.common.rest_client [req-82e0654c-5970-434f-ad4e-6a765d8481e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-82e0654c-5970-434f-ad4e-6a765d8481e2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/864df67466274bb5bca566fc796a643b/users/626c6abde48b46e7a7b4b05ef37708bf/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/864df67466274bb5bca566fc796a643b/users/626c6abde48b46e7a7b4b05ef37708bf/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:27.734 37 INFO tempest.lib.common.rest_client [req-fd4a24ca-d06c-4084-8877-2ce14f201ed4 ] Request (NetworksRbacTest:test_create_network_shared): 200 GET http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles 0.059s 2020-11-06 18:03:27.734 37 DEBUG tempest.lib.common.rest_client [req-fd4a24ca-d06c-4084-8877-2ce14f201ed4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fd4a24ca-d06c-4084-8877-2ce14f201ed4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:27.758 40 INFO tempest.lib.common.rest_client [req-555d80ba-6f15-4f70-bffd-3ee535a397cf ] Request (QuotaClassesV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/864df67466274bb5bca566fc796a643b/users/626c6abde48b46e7a7b4b05ef37708bf/roles/72a4576c553448cd941b052c1ca0cf2d 0.056s 2020-11-06 18:03:27.759 40 DEBUG tempest.lib.common.rest_client [req-555d80ba-6f15-4f70-bffd-3ee535a397cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-555d80ba-6f15-4f70-bffd-3ee535a397cf', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/864df67466274bb5bca566fc796a643b/users/626c6abde48b46e7a7b4b05ef37708bf/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:27.779 38 INFO tempest.lib.common.rest_client [req-1ef2434e-05c9-4338-a6ea-5ddf9894d612 ] Request (SnapshotManageRbacTest:test_manage_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/snapshots/3df09bee-d049-4177-9696-ecc01157c8cf 0.083s 2020-11-06 18:03:27.779 38 DEBUG tempest.lib.common.rest_client [req-1ef2434e-05c9-4338-a6ea-5ddf9894d612 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-1ef2434e-05c9-4338-a6ea-5ddf9894d612', 'content-length': '449', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1ef2434e-05c9-4338-a6ea-5ddf9894d612', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/snapshots/3df09bee-d049-4177-9696-ecc01157c8cf'} Body: b'{"snapshot": {"id": "3df09bee-d049-4177-9696-ecc01157c8cf", "created_at": "2020-11-06T18:03:28.000000", "updated_at": null, "name": "tempest-SnapshotManageRbacTest-Managed-Snapshot-1302585069", "description": null, "volume_id": "dc76691e-cb82-4ec9-b116-b3eb17eb17e5", "status": "creating", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "8dca462f626644269229cf59ef328eab", "os-extended-snapshot-attributes:progress": "0%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:27.809 37 INFO tempest.lib.common.rest_client [req-ac06e0b3-aee8-472c-aea8-18b58467466a ] Request (NetworksRbacTest:test_create_network_shared): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.074s 2020-11-06 18:03:27.810 37 DEBUG tempest.lib.common.rest_client [req-ac06e0b3-aee8-472c-aea8-18b58467466a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ac06e0b3-aee8-472c-aea8-18b58467466a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "password_expires_at": null}, "audit_ids": ["j873iWOhQDSYhR_01jWsYA"], "expires_at": "2020-11-06T19:03:27.000000Z", "issued_at": "2020-11-06T18:03:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:27.861 40 INFO tempest.lib.common.rest_client [req-0aa2b321-8a79-4c97-a971-59aadd857004 ] Request (QuotaClassesV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/864df67466274bb5bca566fc796a643b/users/626c6abde48b46e7a7b4b05ef37708bf/roles/a629c95d64b3416fb80ae90af4f69c05 0.100s 2020-11-06 18:03:27.861 40 DEBUG tempest.lib.common.rest_client [req-0aa2b321-8a79-4c97-a971-59aadd857004 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0aa2b321-8a79-4c97-a971-59aadd857004', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/864df67466274bb5bca566fc796a643b/users/626c6abde48b46e7a7b4b05ef37708bf/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:28.132 37 INFO tempest.lib.common.rest_client [req-ec43fb7b-2017-49ee-8da6-28d9f93f64f4 ] Request (NetworksRbacTest:test_create_network_shared): 201 POST http://172.30.13.94:9696/v2.0/networks 0.320s 2020-11-06 18:03:28.133 37 DEBUG tempest.lib.common.rest_client [req-ec43fb7b-2017-49ee-8da6-28d9f93f64f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-NetworksRbacTest-Network-981014966", "shared": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '730', 'x-openstack-request-id': 'req-ec43fb7b-2017-49ee-8da6-28d9f93f64f4', 'date': 'Fri, 06 Nov 2020 18:03:28 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"1720b2e9-0188-4cde-b035-30449e6a2c8f","name":"tempest-NetworksRbacTest-Network-981014966","tenant_id":"ed59c56def144c79842338c521c6c51e","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":true,"project_id":"ed59c56def144c79842338c521c6c51e","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":61,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:03:28Z","updated_at":"2020-11-06T18:03:28Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:28.134 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:28.273 37 INFO tempest.lib.common.rest_client [req-07d85426-f76d-4608-b277-af5af48d5245 ] Request (NetworksRbacTest:test_create_network_shared): 200 GET http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles 0.138s 2020-11-06 18:03:28.273 37 DEBUG tempest.lib.common.rest_client [req-07d85426-f76d-4608-b277-af5af48d5245 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-07d85426-f76d-4608-b277-af5af48d5245', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:28.433 37 INFO tempest.lib.common.rest_client [req-e98f8dcd-ad1e-4e11-b4a0-f5c8e72ef8ab ] Request (NetworksRbacTest:test_create_network_shared): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.158s 2020-11-06 18:03:28.433 37 DEBUG tempest.lib.common.rest_client [req-e98f8dcd-ad1e-4e11-b4a0-f5c8e72ef8ab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e98f8dcd-ad1e-4e11-b4a0-f5c8e72ef8ab', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "password_expires_at": null}, "audit_ids": ["t085DDxVTEGqXuJ4PALuzQ"], "expires_at": "2020-11-06T19:03:28.000000Z", "issued_at": "2020-11-06T18:03:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:28.436 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:28.441 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:28.441 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:28.445 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_network, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:28.512 39 INFO tempest.lib.common.rest_client [req-47d9b2d7-6f00-4da8-83af-c075badf646b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.201s 2020-11-06 18:03:28.513 39 DEBUG tempest.lib.common.rest_client [req-47d9b2d7-6f00-4da8-83af-c075badf646b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-47d9b2d7-6f00-4da8-83af-c075badf646b', 'x-compute-request-id': 'req-47d9b2d7-6f00-4da8-83af-c075badf646b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:28.740 37 INFO tempest.lib.common.rest_client [req-61187505-cbde-442d-9ea8-952b2bb28f58 ] Request (NetworksRbacTest:test_delete_network): 201 POST http://172.30.13.94:9696/v2.0/networks 0.294s 2020-11-06 18:03:28.740 37 DEBUG tempest.lib.common.rest_client [req-61187505-cbde-442d-9ea8-952b2bb28f58 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-NetworksRbacTest-Network-2122561827"}} Response - Headers: {'content-type': 'application/json', 'content-length': '732', 'x-openstack-request-id': 'req-61187505-cbde-442d-9ea8-952b2bb28f58', 'date': 'Fri, 06 Nov 2020 18:03:28 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"e9def81c-088f-40fe-92ef-cd663f9fc4b7","name":"tempest-NetworksRbacTest-Network-2122561827","tenant_id":"ed59c56def144c79842338c521c6c51e","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"ed59c56def144c79842338c521c6c51e","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":62,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:03:28Z","updated_at":"2020-11-06T18:03:28Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:28.741 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:28.794 37 INFO tempest.lib.common.rest_client [req-95954177-412a-4b3a-8052-ebd288ee645f ] Request (NetworksRbacTest:test_delete_network): 200 GET http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles 0.052s 2020-11-06 18:03:28.795 37 DEBUG tempest.lib.common.rest_client [req-95954177-412a-4b3a-8052-ebd288ee645f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-95954177-412a-4b3a-8052-ebd288ee645f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:28.816 38 INFO tempest.lib.common.rest_client [req-9a655392-be3e-4b94-ab27-f7c710754bba ] Request (SnapshotManageRbacTest:test_manage_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/snapshots/3df09bee-d049-4177-9696-ecc01157c8cf 0.030s 2020-11-06 18:03:28.817 38 DEBUG tempest.lib.common.rest_client [req-9a655392-be3e-4b94-ab27-f7c710754bba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-9a655392-be3e-4b94-ab27-f7c710754bba', 'content-length': '474', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9a655392-be3e-4b94-ab27-f7c710754bba', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/snapshots/3df09bee-d049-4177-9696-ecc01157c8cf'} Body: b'{"snapshot": {"id": "3df09bee-d049-4177-9696-ecc01157c8cf", "created_at": "2020-11-06T18:03:28.000000", "updated_at": "2020-11-06T18:03:28.000000", "name": "tempest-SnapshotManageRbacTest-Managed-Snapshot-1302585069", "description": null, "volume_id": "dc76691e-cb82-4ec9-b116-b3eb17eb17e5", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "8dca462f626644269229cf59ef328eab", "os-extended-snapshot-attributes:progress": "0%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:28.822 38 INFO tempest.common.waiters [-] snapshot 3df09bee-d049-4177-9696-ecc01157c8cf reached available after waiting for 1.822091 seconds 2020-11-06 18:03:28.829 37 INFO tempest.lib.common.rest_client [req-cfeff786-7f83-4b4a-acb3-3dfd8050ddcf ] Request (NetworksRbacTest:test_delete_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:03:28.830 37 DEBUG tempest.lib.common.rest_client [req-cfeff786-7f83-4b4a-acb3-3dfd8050ddcf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cfeff786-7f83-4b4a-acb3-3dfd8050ddcf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "password_expires_at": null}, "audit_ids": ["tPgF_160ST2RLd_Vu0kvUA"], "expires_at": "2020-11-06T19:03:28.000000Z", "issued_at": "2020-11-06T18:03:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:28.895 38 INFO tempest.lib.common.rest_client [req-11d368dd-0578-4e28-93c8-eb6b4d03bbda ] Request (SnapshotManageRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/snapshots/3df09bee-d049-4177-9696-ecc01157c8cf 0.073s 2020-11-06 18:03:28.896 38 DEBUG tempest.lib.common.rest_client [req-11d368dd-0578-4e28-93c8-eb6b4d03bbda ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-11d368dd-0578-4e28-93c8-eb6b4d03bbda', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/snapshots/3df09bee-d049-4177-9696-ecc01157c8cf'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:28.932 38 INFO tempest.lib.common.rest_client [req-485ce967-5966-444b-b478-99aa8b0fce1b ] Request (SnapshotManageRbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/snapshots/3df09bee-d049-4177-9696-ecc01157c8cf 0.036s 2020-11-06 18:03:28.933 38 DEBUG tempest.lib.common.rest_client [req-485ce967-5966-444b-b478-99aa8b0fce1b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-485ce967-5966-444b-b478-99aa8b0fce1b', 'content-length': '473', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-485ce967-5966-444b-b478-99aa8b0fce1b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/snapshots/3df09bee-d049-4177-9696-ecc01157c8cf'} Body: b'{"snapshot": {"id": "3df09bee-d049-4177-9696-ecc01157c8cf", "created_at": "2020-11-06T18:03:28.000000", "updated_at": "2020-11-06T18:03:29.000000", "name": "tempest-SnapshotManageRbacTest-Managed-Snapshot-1302585069", "description": null, "volume_id": "dc76691e-cb82-4ec9-b116-b3eb17eb17e5", "status": "deleting", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "8dca462f626644269229cf59ef328eab", "os-extended-snapshot-attributes:progress": "0%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:28.941 40 INFO tempest.lib.common.rest_client [req-c913cf5f-bc87-497c-9a32-547ea5f5bc75 ] Request (QuotaClassesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.077s 2020-11-06 18:03:28.941 40 DEBUG tempest.lib.common.rest_client [req-c913cf5f-bc87-497c-9a32-547ea5f5bc75 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c913cf5f-bc87-497c-9a32-547ea5f5bc75', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "626c6abde48b46e7a7b4b05ef37708bf", "name": "tempest-QuotaClassesV3RbacTest-648772236", "password_expires_at": null}, "audit_ids": ["nO38sCRvQCGKxCQTEjQ2IQ"], "expires_at": "2020-11-06T19:03:28.000000Z", "issued_at": "2020-11-06T18:03:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "864df67466274bb5bca566fc796a643b", "name": "tempest-QuotaClassesV3RbacTest-648772236"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/864df67466274bb5bca566fc796a643b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/864df67466274bb5bca566fc796a643b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/864df67466274bb5bca566fc796a643b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_864df67466274bb5bca566fc796a643b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_864df67466274bb5bca566fc796a643b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_864df67466274bb5bca566fc796a643b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:28.944 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:28.947 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:quota_classes, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:28.947 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:28.994 40 INFO tempest.lib.common.rest_client [req-8ab86e02-5157-45f0-8060-f1e3bfa20198 ] Request (QuotaClassesV3RbacTest:test_show_quota_class_set): 200 GET http://172.30.13.94/identity/v3/projects/864df67466274bb5bca566fc796a643b/users/626c6abde48b46e7a7b4b05ef37708bf/roles 0.047s 2020-11-06 18:03:28.995 40 DEBUG tempest.lib.common.rest_client [req-8ab86e02-5157-45f0-8060-f1e3bfa20198 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8ab86e02-5157-45f0-8060-f1e3bfa20198', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/864df67466274bb5bca566fc796a643b/users/626c6abde48b46e7a7b4b05ef37708bf/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/864df67466274bb5bca566fc796a643b/users/626c6abde48b46e7a7b4b05ef37708bf/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:29.027 40 INFO tempest.lib.common.rest_client [req-e5e51934-1758-471d-af07-522729436d36 ] Request (QuotaClassesV3RbacTest:test_show_quota_class_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:03:29.027 40 DEBUG tempest.lib.common.rest_client [req-e5e51934-1758-471d-af07-522729436d36 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e5e51934-1758-471d-af07-522729436d36', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "626c6abde48b46e7a7b4b05ef37708bf", "name": "tempest-QuotaClassesV3RbacTest-648772236", "password_expires_at": null}, "audit_ids": ["lJA7WqKFS8msWvh5LIjdQQ"], "expires_at": "2020-11-06T19:03:29.000000Z", "issued_at": "2020-11-06T18:03:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "864df67466274bb5bca566fc796a643b", "name": "tempest-QuotaClassesV3RbacTest-648772236"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/864df67466274bb5bca566fc796a643b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/864df67466274bb5bca566fc796a643b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/864df67466274bb5bca566fc796a643b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_864df67466274bb5bca566fc796a643b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_864df67466274bb5bca566fc796a643b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_864df67466274bb5bca566fc796a643b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:29.188 40 INFO tempest.lib.common.rest_client [req-8b05ea78-0e92-4a6e-91a0-fc1144290e99 ] Request (QuotaClassesV3RbacTest:test_show_quota_class_set): 200 GET http://172.30.13.94/compute/v2.1/os-quota-class-sets/tempest-QuotaClassesV3RbacTest-QuotaClass-1936831596 0.159s 2020-11-06 18:03:29.188 40 DEBUG tempest.lib.common.rest_client [req-8b05ea78-0e92-4a6e-91a0-fc1144290e99 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '348', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8b05ea78-0e92-4a6e-91a0-fc1144290e99', 'x-compute-request-id': 'req-8b05ea78-0e92-4a6e-91a0-fc1144290e99', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-quota-class-sets/tempest-QuotaClassesV3RbacTest-QuotaClass-1936831596'} Body: b'{"quota_class_set": {"id": "tempest-QuotaClassesV3RbacTest-QuotaClass-1936831596", "cores": 20, "fixed_ips": -1, "floating_ips": -1, "injected_file_content_bytes": 10240, "injected_file_path_bytes": 255, "injected_files": 5, "instances": 10, "key_pairs": 100, "metadata_items": 128, "ram": 51200, "security_group_rules": -1, "security_groups": -1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:29.194 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:29.246 40 INFO tempest.lib.common.rest_client [req-16aa5153-4a1a-42bd-a2a8-66f393bd94e6 ] Request (QuotaClassesV3RbacTest:test_show_quota_class_set): 200 GET http://172.30.13.94/identity/v3/projects/864df67466274bb5bca566fc796a643b/users/626c6abde48b46e7a7b4b05ef37708bf/roles 0.051s 2020-11-06 18:03:29.247 40 DEBUG tempest.lib.common.rest_client [req-16aa5153-4a1a-42bd-a2a8-66f393bd94e6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-16aa5153-4a1a-42bd-a2a8-66f393bd94e6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/864df67466274bb5bca566fc796a643b/users/626c6abde48b46e7a7b4b05ef37708bf/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/864df67466274bb5bca566fc796a643b/users/626c6abde48b46e7a7b4b05ef37708bf/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:29.283 40 INFO tempest.lib.common.rest_client [req-168a2ba6-916c-4c3a-8b74-d13e784b0011 ] Request (QuotaClassesV3RbacTest:test_show_quota_class_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:03:29.284 40 DEBUG tempest.lib.common.rest_client [req-168a2ba6-916c-4c3a-8b74-d13e784b0011 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-168a2ba6-916c-4c3a-8b74-d13e784b0011', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "626c6abde48b46e7a7b4b05ef37708bf", "name": "tempest-QuotaClassesV3RbacTest-648772236", "password_expires_at": null}, "audit_ids": ["ND6iM4nIS-m6q4sLK-9KTw"], "expires_at": "2020-11-06T19:03:29.000000Z", "issued_at": "2020-11-06T18:03:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "864df67466274bb5bca566fc796a643b", "name": "tempest-QuotaClassesV3RbacTest-648772236"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/864df67466274bb5bca566fc796a643b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/864df67466274bb5bca566fc796a643b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/864df67466274bb5bca566fc796a643b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_864df67466274bb5bca566fc796a643b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_864df67466274bb5bca566fc796a643b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_864df67466274bb5bca566fc796a643b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:29.287 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:29.290 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:quota_classes, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:29.379 40 INFO tempest.lib.common.rest_client [req-50804e94-633b-4d9b-8fff-67d697a805a7 ] Request (QuotaClassesV3RbacTest:test_update_quota_class_set): 200 GET http://172.30.13.94/compute/v2.1/os-quota-class-sets/tempest-QuotaClassesV3RbacTest-QuotaClass-1936831596 0.088s 2020-11-06 18:03:29.379 40 DEBUG tempest.lib.common.rest_client [req-50804e94-633b-4d9b-8fff-67d697a805a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '348', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-50804e94-633b-4d9b-8fff-67d697a805a7', 'x-compute-request-id': 'req-50804e94-633b-4d9b-8fff-67d697a805a7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-quota-class-sets/tempest-QuotaClassesV3RbacTest-QuotaClass-1936831596'} Body: b'{"quota_class_set": {"id": "tempest-QuotaClassesV3RbacTest-QuotaClass-1936831596", "cores": 20, "fixed_ips": -1, "floating_ips": -1, "injected_file_content_bytes": 10240, "injected_file_path_bytes": 255, "injected_files": 5, "instances": 10, "key_pairs": 100, "metadata_items": 128, "ram": 51200, "security_group_rules": -1, "security_groups": -1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:29.384 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:29.438 40 INFO tempest.lib.common.rest_client [req-9002bd5c-8c32-4b96-baac-7c366165c248 ] Request (QuotaClassesV3RbacTest:test_update_quota_class_set): 200 GET http://172.30.13.94/identity/v3/projects/864df67466274bb5bca566fc796a643b/users/626c6abde48b46e7a7b4b05ef37708bf/roles 0.053s 2020-11-06 18:03:29.439 40 DEBUG tempest.lib.common.rest_client [req-9002bd5c-8c32-4b96-baac-7c366165c248 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9002bd5c-8c32-4b96-baac-7c366165c248', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/864df67466274bb5bca566fc796a643b/users/626c6abde48b46e7a7b4b05ef37708bf/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/864df67466274bb5bca566fc796a643b/users/626c6abde48b46e7a7b4b05ef37708bf/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:29.470 40 INFO tempest.lib.common.rest_client [req-0558fdd6-5b04-4737-ad47-75781dff1826 ] Request (QuotaClassesV3RbacTest:test_update_quota_class_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.030s 2020-11-06 18:03:29.470 40 DEBUG tempest.lib.common.rest_client [req-0558fdd6-5b04-4737-ad47-75781dff1826 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0558fdd6-5b04-4737-ad47-75781dff1826', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "626c6abde48b46e7a7b4b05ef37708bf", "name": "tempest-QuotaClassesV3RbacTest-648772236", "password_expires_at": null}, "audit_ids": ["W0UT_aDARM6S3RKA1W6uqQ"], "expires_at": "2020-11-06T19:03:29.000000Z", "issued_at": "2020-11-06T18:03:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "864df67466274bb5bca566fc796a643b", "name": "tempest-QuotaClassesV3RbacTest-648772236"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/864df67466274bb5bca566fc796a643b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/864df67466274bb5bca566fc796a643b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/864df67466274bb5bca566fc796a643b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_864df67466274bb5bca566fc796a643b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_864df67466274bb5bca566fc796a643b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_864df67466274bb5bca566fc796a643b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:29.543 37 INFO tempest.lib.common.rest_client [req-adfe9aac-4f10-44d2-a78b-c6afa5445f97 ] Request (NetworksRbacTest:test_delete_network): 204 DELETE http://172.30.13.94:9696/v2.0/networks/e9def81c-088f-40fe-92ef-cd663f9fc4b7 0.712s 2020-11-06 18:03:29.544 37 DEBUG tempest.lib.common.rest_client [req-adfe9aac-4f10-44d2-a78b-c6afa5445f97 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-adfe9aac-4f10-44d2-a78b-c6afa5445f97', 'date': 'Fri, 06 Nov 2020 18:03:29 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/e9def81c-088f-40fe-92ef-cd663f9fc4b7'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:29.544 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:29.591 37 INFO tempest.lib.common.rest_client [req-bd5df9e3-c39f-43ff-b0d1-873273df8f11 ] Request (NetworksRbacTest:test_delete_network): 200 GET http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles 0.046s 2020-11-06 18:03:29.592 37 DEBUG tempest.lib.common.rest_client [req-bd5df9e3-c39f-43ff-b0d1-873273df8f11 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bd5df9e3-c39f-43ff-b0d1-873273df8f11', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:29.628 37 INFO tempest.lib.common.rest_client [req-f1751dda-edb8-4a20-8fce-cddf6e6aecf9 ] Request (NetworksRbacTest:test_delete_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:03:29.628 37 DEBUG tempest.lib.common.rest_client [req-f1751dda-edb8-4a20-8fce-cddf6e6aecf9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f1751dda-edb8-4a20-8fce-cddf6e6aecf9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "password_expires_at": null}, "audit_ids": ["ZFdzunG5T8CYQtEeyg9tew"], "expires_at": "2020-11-06T19:03:29.000000Z", "issued_at": "2020-11-06T18:03:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:29.631 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:29.635 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_dhcp-agents, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:29.636 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:29.689 37 INFO tempest.lib.common.rest_client [req-9b98a117-f64e-4985-8a08-ca2f36997f40 ] Request (NetworksRbacTest:test_list_dhcp_agents_on_hosting_network): 200 GET http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles 0.053s 2020-11-06 18:03:29.690 37 DEBUG tempest.lib.common.rest_client [req-9b98a117-f64e-4985-8a08-ca2f36997f40 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9b98a117-f64e-4985-8a08-ca2f36997f40', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:29.723 37 INFO tempest.lib.common.rest_client [req-0cfe299c-94af-4dd8-904b-361f9eb21095 ] Request (NetworksRbacTest:test_list_dhcp_agents_on_hosting_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:03:29.724 37 DEBUG tempest.lib.common.rest_client [req-0cfe299c-94af-4dd8-904b-361f9eb21095 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0cfe299c-94af-4dd8-904b-361f9eb21095', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "password_expires_at": null}, "audit_ids": ["4FCiHiNoSYWQmuuU9oUUrA"], "expires_at": "2020-11-06T19:03:29.000000Z", "issued_at": "2020-11-06T18:03:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:29.726 39 INFO tempest.lib.common.rest_client [req-cb022377-b24c-4b95-9fc8-f8bde6ba831b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.196s 2020-11-06 18:03:29.727 39 DEBUG tempest.lib.common.rest_client [req-cb022377-b24c-4b95-9fc8-f8bde6ba831b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cb022377-b24c-4b95-9fc8-f8bde6ba831b', 'x-compute-request-id': 'req-cb022377-b24c-4b95-9fc8-f8bde6ba831b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:29.746 40 INFO tempest.lib.common.rest_client [req-5cdb17dc-d98b-41c8-80e2-34cac2f4d539 ] Request (QuotaClassesV3RbacTest:test_update_quota_class_set): 200 PUT http://172.30.13.94/compute/v2.1/os-quota-class-sets/tempest-QuotaClassesV3RbacTest-QuotaClass-1936831596 0.274s 2020-11-06 18:03:29.747 40 DEBUG tempest.lib.common.rest_client [req-5cdb17dc-d98b-41c8-80e2-34cac2f4d539 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"quota_class_set": {"cores": 20, "fixed_ips": -1, "floating_ips": -1, "injected_file_content_bytes": 10240, "injected_file_path_bytes": 255, "injected_files": 5, "instances": 10, "key_pairs": 100, "metadata_items": 128, "ram": 51200, "security_group_rules": -1, "security_groups": -1}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '286', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5cdb17dc-d98b-41c8-80e2-34cac2f4d539', 'x-compute-request-id': 'req-5cdb17dc-d98b-41c8-80e2-34cac2f4d539', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-quota-class-sets/tempest-QuotaClassesV3RbacTest-QuotaClass-1936831596'} Body: b'{"quota_class_set": {"cores": 20, "fixed_ips": -1, "floating_ips": -1, "injected_file_content_bytes": 10240, "injected_file_path_bytes": 255, "injected_files": 5, "instances": 10, "key_pairs": 100, "metadata_items": 128, "ram": 51200, "security_group_rules": -1, "security_groups": -1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:29.751 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:29.799 40 INFO tempest.lib.common.rest_client [req-ce0de36a-7676-4759-8443-414f06b35608 ] Request (QuotaClassesV3RbacTest:test_update_quota_class_set): 200 GET http://172.30.13.94/identity/v3/projects/864df67466274bb5bca566fc796a643b/users/626c6abde48b46e7a7b4b05ef37708bf/roles 0.047s 2020-11-06 18:03:29.800 40 DEBUG tempest.lib.common.rest_client [req-ce0de36a-7676-4759-8443-414f06b35608 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ce0de36a-7676-4759-8443-414f06b35608', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/864df67466274bb5bca566fc796a643b/users/626c6abde48b46e7a7b4b05ef37708bf/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/864df67466274bb5bca566fc796a643b/users/626c6abde48b46e7a7b4b05ef37708bf/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:29.819 37 INFO tempest.lib.common.rest_client [req-43394f5f-8e53-47da-a46c-1b80c61f06f6 ] Request (NetworksRbacTest:test_list_dhcp_agents_on_hosting_network): 200 GET http://172.30.13.94:9696/v2.0/networks/21087cdc-18ee-4a54-a645-561312615479/dhcp-agents 0.094s 2020-11-06 18:03:29.819 37 DEBUG tempest.lib.common.rest_client [req-43394f5f-8e53-47da-a46c-1b80c61f06f6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '600', 'x-openstack-request-id': 'req-43394f5f-8e53-47da-a46c-1b80c61f06f6', 'date': 'Fri, 06 Nov 2020 18:03:29 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/21087cdc-18ee-4a54-a645-561312615479/dhcp-agents'} Body: b'{"agents": [{"id": "bc496462-aac8-4795-a8f9-6f5600fa0870", "agent_type": "DHCP agent", "binary": "neutron-dhcp-agent", "topic": "dhcp_agent", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:02", "started_at": "2020-10-07 12:07:02", "heartbeat_timestamp": "2020-11-06 18:03:17", "description": null, "resources_synced": null, "availability_zone": "nova", "alive": true, "configurations": {"dhcp_driver": "neutron.agent.linux.dhcp.Dnsmasq", "dhcp_lease_duration": 86400, "log_agent_heartbeats": false, "networks": 7, "ports": 15, "subnets": 8}, "resource_versions": {}}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:29.820 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:29.832 40 INFO tempest.lib.common.rest_client [req-cde07bc0-177a-4c65-a3e8-b441dfae2aab ] Request (QuotaClassesV3RbacTest:test_update_quota_class_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:03:29.833 40 DEBUG tempest.lib.common.rest_client [req-cde07bc0-177a-4c65-a3e8-b441dfae2aab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cde07bc0-177a-4c65-a3e8-b441dfae2aab', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "626c6abde48b46e7a7b4b05ef37708bf", "name": "tempest-QuotaClassesV3RbacTest-648772236", "password_expires_at": null}, "audit_ids": ["yToUOfQkTBK31p0F8oj8Qw"], "expires_at": "2020-11-06T19:03:29.000000Z", "issued_at": "2020-11-06T18:03:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "864df67466274bb5bca566fc796a643b", "name": "tempest-QuotaClassesV3RbacTest-648772236"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/864df67466274bb5bca566fc796a643b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/864df67466274bb5bca566fc796a643b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/864df67466274bb5bca566fc796a643b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_864df67466274bb5bca566fc796a643b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_864df67466274bb5bca566fc796a643b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_864df67466274bb5bca566fc796a643b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:29.868 37 INFO tempest.lib.common.rest_client [req-0cd22ff7-f77f-4d7c-8975-f6b8724c0097 ] Request (NetworksRbacTest:test_list_dhcp_agents_on_hosting_network): 200 GET http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles 0.046s 2020-11-06 18:03:29.868 37 DEBUG tempest.lib.common.rest_client [req-0cd22ff7-f77f-4d7c-8975-f6b8724c0097 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0cd22ff7-f77f-4d7c-8975-f6b8724c0097', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:29.899 37 INFO tempest.lib.common.rest_client [req-d5ee031c-991f-4780-abe8-a1111ea5b531 ] Request (NetworksRbacTest:test_list_dhcp_agents_on_hosting_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.030s 2020-11-06 18:03:29.900 37 DEBUG tempest.lib.common.rest_client [req-d5ee031c-991f-4780-abe8-a1111ea5b531 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d5ee031c-991f-4780-abe8-a1111ea5b531', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "password_expires_at": null}, "audit_ids": ["Ekws8G6kSvO0aeXrKzMCtA"], "expires_at": "2020-11-06T19:03:29.000000Z", "issued_at": "2020-11-06T18:03:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:29.902 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:29.906 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:29.906 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:29.951 37 INFO tempest.lib.common.rest_client [req-4c869710-2be0-4f00-872b-0c7b8926f6b7 ] Request (NetworksRbacTest:test_list_networks): 200 GET http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles 0.043s 2020-11-06 18:03:29.951 37 DEBUG tempest.lib.common.rest_client [req-4c869710-2be0-4f00-872b-0c7b8926f6b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4c869710-2be0-4f00-872b-0c7b8926f6b7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:29.977 38 INFO tempest.lib.common.rest_client [req-8bfbed17-79c6-4fe9-b744-c22faf81cf12 ] Request (SnapshotManageRbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/snapshots/3df09bee-d049-4177-9696-ecc01157c8cf 0.036s 2020-11-06 18:03:29.978 38 DEBUG tempest.lib.common.rest_client [req-8bfbed17-79c6-4fe9-b744-c22faf81cf12 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '111', 'content-type': 'application/json', 'x-compute-request-id': 'req-8bfbed17-79c6-4fe9-b744-c22faf81cf12', 'x-openstack-request-id': 'req-8bfbed17-79c6-4fe9-b744-c22faf81cf12', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/snapshots/3df09bee-d049-4177-9696-ecc01157c8cf'} Body: b'{"itemNotFound": {"code": 404, "message": "Snapshot 3df09bee-d049-4177-9696-ecc01157c8cf could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:29.985 37 INFO tempest.lib.common.rest_client [req-879e60a0-8d8f-43f2-a6ea-f49dd2b9bc82 ] Request (NetworksRbacTest:test_list_networks): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:03:29.986 37 DEBUG tempest.lib.common.rest_client [req-879e60a0-8d8f-43f2-a6ea-f49dd2b9bc82 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-879e60a0-8d8f-43f2-a6ea-f49dd2b9bc82', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "password_expires_at": null}, "audit_ids": ["jPpGVwT3SOmmNkxApUlTNQ"], "expires_at": "2020-11-06T19:03:29.000000Z", "issued_at": "2020-11-06T18:03:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:29.995 40 INFO tempest.lib.common.rest_client [req-9b90c4a1-edad-40fa-bc7a-2640eb0098c2 ] Request (QuotaClassesV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/626c6abde48b46e7a7b4b05ef37708bf 0.159s 2020-11-06 18:03:29.996 40 DEBUG tempest.lib.common.rest_client [req-9b90c4a1-edad-40fa-bc7a-2640eb0098c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9b90c4a1-edad-40fa-bc7a-2640eb0098c2', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/626c6abde48b46e7a7b4b05ef37708bf'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:30.055 38 INFO tempest.lib.common.rest_client [req-b9cf2b70-1b6c-4f36-9507-f91a65c3f23e ] Request (SnapshotManageRbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/snapshots/1297937d-0b85-4a58-867d-8a861a8b027b 0.074s 2020-11-06 18:03:30.056 38 DEBUG tempest.lib.common.rest_client [req-b9cf2b70-1b6c-4f36-9507-f91a65c3f23e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b9cf2b70-1b6c-4f36-9507-f91a65c3f23e', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/snapshots/1297937d-0b85-4a58-867d-8a861a8b027b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:30.089 38 INFO tempest.lib.common.rest_client [req-3bfda19a-e116-4413-bdb6-1c52510e7957 ] Request (SnapshotManageRbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/snapshots/1297937d-0b85-4a58-867d-8a861a8b027b 0.032s 2020-11-06 18:03:30.089 38 DEBUG tempest.lib.common.rest_client [req-3bfda19a-e116-4413-bdb6-1c52510e7957 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-3bfda19a-e116-4413-bdb6-1c52510e7957', 'content-length': '467', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3bfda19a-e116-4413-bdb6-1c52510e7957', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/snapshots/1297937d-0b85-4a58-867d-8a861a8b027b'} Body: b'{"snapshot": {"id": "1297937d-0b85-4a58-867d-8a861a8b027b", "created_at": "2020-11-06T18:03:25.000000", "updated_at": "2020-11-06T18:03:30.000000", "name": "tempest-SnapshotManageRbacTest-Snapshot-1272037834", "description": null, "volume_id": "dc76691e-cb82-4ec9-b116-b3eb17eb17e5", "status": "deleting", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "8dca462f626644269229cf59ef328eab", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:30.093 40 INFO tempest.lib.common.rest_client [req-1d110b4e-f2a2-44ca-9613-d149d815ad95 ] Request (QuotaClassesV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-11-06 18:03:30.094 40 DEBUG tempest.lib.common.rest_client [req-1d110b4e-f2a2-44ca-9613-d149d815ad95 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1d110b4e-f2a2-44ca-9613-d149d815ad95', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["pFNK_jt1R-Wr_qvFDK8hxw"], "expires_at": "2020-11-06T19:03:30.000000Z", "issued_at": "2020-11-06T18:03:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:30.360 37 INFO tempest.lib.common.rest_client [req-96e27aeb-b529-4c92-bb7a-5959930132f5 ] Request (NetworksRbacTest:test_list_networks): 200 GET http://172.30.13.94:9696/v2.0/networks?id=21087cdc-18ee-4a54-a645-561312615479 0.372s 2020-11-06 18:03:30.361 37 DEBUG tempest.lib.common.rest_client [req-96e27aeb-b529-4c92-bb7a-5959930132f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '764', 'x-openstack-request-id': 'req-96e27aeb-b529-4c92-bb7a-5959930132f5', 'date': 'Fri, 06 Nov 2020 18:03:30 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/networks?id=21087cdc-18ee-4a54-a645-561312615479'} Body: b'{"networks":[{"id":"21087cdc-18ee-4a54-a645-561312615479","name":"tempest-NetworksRbacTest-test-network-429600096","tenant_id":"ed59c56def144c79842338c521c6c51e","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["ffa8a86f-cd0d-49a5-bbfa-72cdd54b7ee6"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:03:23Z","updated_at":"2020-11-06T18:03:23Z","revision_number":2,"project_id":"ed59c56def144c79842338c521c6c51e","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":49}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:30.361 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:30.424 40 INFO tempest.lib.common.rest_client [req-f2fcf7d8-f2e6-466f-86cf-89f5cdc3cd7e ] Request (QuotaClassesV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=864df67466274bb5bca566fc796a643b&name=default 0.329s 2020-11-06 18:03:30.425 40 DEBUG tempest.lib.common.rest_client [req-f2fcf7d8-f2e6-466f-86cf-89f5cdc3cd7e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-f2fcf7d8-f2e6-466f-86cf-89f5cdc3cd7e', 'date': 'Fri, 06 Nov 2020 18:03:30 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=864df67466274bb5bca566fc796a643b&name=default'} Body: b'{"security_groups": [{"id": "cf7038c3-6e50-4bc0-b06d-bd30c8671fc4", "name": "default", "stateful": true, "tenant_id": "864df67466274bb5bca566fc796a643b", "description": "Default security group", "security_group_rules": [{"id": "27826204-a792-42f6-b666-ede558bf553e", "tenant_id": "864df67466274bb5bca566fc796a643b", "security_group_id": "cf7038c3-6e50-4bc0-b06d-bd30c8671fc4", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "cf7038c3-6e50-4bc0-b06d-bd30c8671fc4", "description": null, "tags": [], "created_at": "2020-11-06T18:03:30Z", "updated_at": "2020-11-06T18:03:30Z", "revision_number": 0, "project_id": "864df67466274bb5bca566fc796a643b"}, {"id": "55a57181-5ea5-4421-9a99-68975f1af2f2", "tenant_id": "864df67466274bb5bca566fc796a643b", "security_group_id": "cf7038c3-6e50-4bc0-b06d-bd30c8671fc4", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "cf7038c3-6e50-4bc0-b06d-bd30c8671fc4", "description": null, "tags": [], "created_at": "2020-11-06T18:03:30Z", "updated_at": "2020-11-06T18:03:30Z", "revision_number": 0, "project_id": "864df67466274bb5bca566fc796a643b"}, {"id": "6ffa9d62-6747-439e-8774-ffb8d7394d06", "tenant_id": "864df67466274bb5bca566fc796a643b", "security_group_id": "cf7038c3-6e50-4bc0-b06d-bd30c8671fc4", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:30Z", "updated_at": "2020-11-06T18:03:30Z", "revision_number": 0, "project_id": "864df67466274bb5bca566fc796a643b"}, {"id": "9e686ab0-b9cd-4fd8-a283-85450062a759", "tenant_id": "864df67466274bb5bca566fc796a643b", "security_group_id": "cf7038c3-6e50-4bc0-b06d-bd30c8671fc4", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:30Z", "updated_at": "2020-11-06T18:03:30Z", "revision_number": 0, "project_id": "864df67466274bb5bca566fc796a643b"}], "tags": [], "created_at": "2020-11-06T18:03:30Z", "updated_at": "2020-11-06T18:03:30Z", "revision_number": 1, "project_id": "864df67466274bb5bca566fc796a643b"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:30.426 37 INFO tempest.lib.common.rest_client [req-49d7535e-d728-4cea-a2f8-af1856f48008 ] Request (NetworksRbacTest:test_list_networks): 200 GET http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles 0.064s 2020-11-06 18:03:30.427 37 DEBUG tempest.lib.common.rest_client [req-49d7535e-d728-4cea-a2f8-af1856f48008 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-49d7535e-d728-4cea-a2f8-af1856f48008', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:30.462 37 INFO tempest.lib.common.rest_client [req-dcdbf61a-30f3-4226-ab38-2e34b85be68f ] Request (NetworksRbacTest:test_list_networks): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:03:30.463 37 DEBUG tempest.lib.common.rest_client [req-dcdbf61a-30f3-4226-ab38-2e34b85be68f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dcdbf61a-30f3-4226-ab38-2e34b85be68f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "password_expires_at": null}, "audit_ids": ["56o3oO-GTxyIehZa1LDRtA"], "expires_at": "2020-11-06T19:03:30.000000Z", "issued_at": "2020-11-06T18:03:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:30.466 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:30.470 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:30.471 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:30.524 37 INFO tempest.lib.common.rest_client [req-68083335-a3cf-4d2b-8c9f-db04e12d2ccd ] Request (NetworksRbacTest:test_show_network): 200 GET http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles 0.053s 2020-11-06 18:03:30.525 37 DEBUG tempest.lib.common.rest_client [req-68083335-a3cf-4d2b-8c9f-db04e12d2ccd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-68083335-a3cf-4d2b-8c9f-db04e12d2ccd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:30.558 40 INFO tempest.lib.common.rest_client [req-ab87ee44-1c6f-48fa-8d9c-58044ff6ccf6 ] Request (QuotaClassesV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/cf7038c3-6e50-4bc0-b06d-bd30c8671fc4 0.132s 2020-11-06 18:03:30.558 40 DEBUG tempest.lib.common.rest_client [req-ab87ee44-1c6f-48fa-8d9c-58044ff6ccf6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-ab87ee44-1c6f-48fa-8d9c-58044ff6ccf6', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:03:30 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/cf7038c3-6e50-4bc0-b06d-bd30c8671fc4'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:30.562 37 INFO tempest.lib.common.rest_client [req-5f325493-71c7-4d9a-995e-0114f56ba7b6 ] Request (NetworksRbacTest:test_show_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:03:30.563 37 DEBUG tempest.lib.common.rest_client [req-5f325493-71c7-4d9a-995e-0114f56ba7b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5f325493-71c7-4d9a-995e-0114f56ba7b6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "password_expires_at": null}, "audit_ids": ["mDGlZKVDS-yLYoIAsdAYVg"], "expires_at": "2020-11-06T19:03:30.000000Z", "issued_at": "2020-11-06T18:03:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:30.710 40 INFO tempest.lib.common.rest_client [req-d27d6d39-58b4-47cf-9b79-05987d9f6919 ] Request (QuotaClassesV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/864df67466274bb5bca566fc796a643b 0.151s 2020-11-06 18:03:30.711 40 DEBUG tempest.lib.common.rest_client [req-d27d6d39-58b4-47cf-9b79-05987d9f6919 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d27d6d39-58b4-47cf-9b79-05987d9f6919', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/864df67466274bb5bca566fc796a643b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:30.731 37 INFO tempest.lib.common.rest_client [req-ed392635-ea60-4117-837d-368ffdc404bd ] Request (NetworksRbacTest:test_show_network): 200 GET http://172.30.13.94:9696/v2.0/networks/21087cdc-18ee-4a54-a645-561312615479 0.168s 2020-11-06 18:03:30.732 37 DEBUG tempest.lib.common.rest_client [req-ed392635-ea60-4117-837d-368ffdc404bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '761', 'x-openstack-request-id': 'req-ed392635-ea60-4117-837d-368ffdc404bd', 'date': 'Fri, 06 Nov 2020 18:03:30 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/21087cdc-18ee-4a54-a645-561312615479'} Body: b'{"network":{"id":"21087cdc-18ee-4a54-a645-561312615479","name":"tempest-NetworksRbacTest-test-network-429600096","tenant_id":"ed59c56def144c79842338c521c6c51e","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["ffa8a86f-cd0d-49a5-bbfa-72cdd54b7ee6"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:03:23Z","updated_at":"2020-11-06T18:03:23Z","revision_number":2,"project_id":"ed59c56def144c79842338c521c6c51e","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":49}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:30.732 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:30.825 40 INFO tempest.lib.common.rest_client [req-88cb86b5-b7b6-44ca-bbaa-9421a9f27b63 ] Request (SchedulerStatsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.111s 2020-11-06 18:03:30.826 40 DEBUG tempest.lib.common.rest_client [req-88cb86b5-b7b6-44ca-bbaa-9421a9f27b63 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-88cb86b5-b7b6-44ca-bbaa-9421a9f27b63', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["1BC9shOCSZKiEaphf1Le-w"], "expires_at": "2020-11-06T19:03:30.000000Z", "issued_at": "2020-11-06T18:03:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:30.856 37 INFO tempest.lib.common.rest_client [req-8613d2b3-d52d-4d38-ab4f-a90cacfafb97 ] Request (NetworksRbacTest:test_show_network): 200 GET http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles 0.122s 2020-11-06 18:03:30.856 37 DEBUG tempest.lib.common.rest_client [req-8613d2b3-d52d-4d38-ab4f-a90cacfafb97 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8613d2b3-d52d-4d38-ab4f-a90cacfafb97', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:30.872 40 INFO tempest.lib.common.rest_client [req-081eca7c-8e69-47bd-9cbb-2cd16335b84c ] Request (SchedulerStatsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:03:30.873 40 DEBUG tempest.lib.common.rest_client [req-081eca7c-8e69-47bd-9cbb-2cd16335b84c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-081eca7c-8e69-47bd-9cbb-2cd16335b84c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["aMMhbRDPQ7eX4j4jVXPe2g"], "expires_at": "2020-11-06T19:03:30.000000Z", "issued_at": "2020-11-06T18:03:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:30.935 40 INFO tempest.lib.common.rest_client [req-faff1b32-810c-416a-9320-e6b88fe751ec ] Request (SchedulerStatsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.060s 2020-11-06 18:03:30.936 40 DEBUG tempest.lib.common.rest_client [req-faff1b32-810c-416a-9320-e6b88fe751ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-faff1b32-810c-416a-9320-e6b88fe751ec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:30.938 39 INFO tempest.lib.common.rest_client [req-bc44d0e0-c35c-4f28-8160-caf954875dd0 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.192s 2020-11-06 18:03:30.938 39 DEBUG tempest.lib.common.rest_client [req-bc44d0e0-c35c-4f28-8160-caf954875dd0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bc44d0e0-c35c-4f28-8160-caf954875dd0', 'x-compute-request-id': 'req-bc44d0e0-c35c-4f28-8160-caf954875dd0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:30.971 37 INFO tempest.lib.common.rest_client [req-69b69b9c-3f3e-4212-bee2-a867fdcd6aef ] Request (NetworksRbacTest:test_show_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.113s 2020-11-06 18:03:30.971 37 DEBUG tempest.lib.common.rest_client [req-69b69b9c-3f3e-4212-bee2-a867fdcd6aef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-69b69b9c-3f3e-4212-bee2-a867fdcd6aef', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "password_expires_at": null}, "audit_ids": ["_52krSDiQUugpKTHmT5pUw"], "expires_at": "2020-11-06T19:03:30.000000Z", "issued_at": "2020-11-06T18:03:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:30.974 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:30.979 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:30.979 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:30.983 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network:provider:network_type, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:30.983 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:31.003 40 INFO tempest.lib.common.rest_client [req-221534d7-bc61-4a58-983c-e09c8893c977 ] Request (SchedulerStatsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.066s 2020-11-06 18:03:31.004 40 DEBUG tempest.lib.common.rest_client [req-221534d7-bc61-4a58-983c-e09c8893c977 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-SchedulerStatsV3RbacTest-1946111849-desc", "domain_id": "default", "name": "tempest-SchedulerStatsV3RbacTest-1946111849"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '386', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-221534d7-bc61-4a58-983c-e09c8893c977', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "589ff128c9674687acb1ee3254a6003b", "name": "tempest-SchedulerStatsV3RbacTest-1946111849", "domain_id": "default", "description": "tempest-SchedulerStatsV3RbacTest-1946111849-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/589ff128c9674687acb1ee3254a6003b"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:31.098 37 INFO tempest.lib.common.rest_client [req-5cefe420-d4dc-4c88-b933-cc54e45ad17f ] Request (NetworksRbacTest:test_show_network_provider_network_type): 200 GET http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles 0.114s 2020-11-06 18:03:31.099 37 DEBUG tempest.lib.common.rest_client [req-5cefe420-d4dc-4c88-b933-cc54e45ad17f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5cefe420-d4dc-4c88-b933-cc54e45ad17f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:31.128 38 INFO tempest.lib.common.rest_client [req-0d8e6f3d-50aa-4157-be5d-26dd97d9e919 ] Request (SnapshotManageRbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/snapshots/1297937d-0b85-4a58-867d-8a861a8b027b 0.032s 2020-11-06 18:03:31.129 38 DEBUG tempest.lib.common.rest_client [req-0d8e6f3d-50aa-4157-be5d-26dd97d9e919 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '111', 'content-type': 'application/json', 'x-compute-request-id': 'req-0d8e6f3d-50aa-4157-be5d-26dd97d9e919', 'x-openstack-request-id': 'req-0d8e6f3d-50aa-4157-be5d-26dd97d9e919', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/snapshots/1297937d-0b85-4a58-867d-8a861a8b027b'} Body: b'{"itemNotFound": {"code": 404, "message": "Snapshot 1297937d-0b85-4a58-867d-8a861a8b027b could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:31.130 40 INFO tempest.lib.common.rest_client [req-f13e015e-9b4f-42a2-a126-cef5e7400bae ] Request (SchedulerStatsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.125s 2020-11-06 18:03:31.131 40 DEBUG tempest.lib.common.rest_client [req-f13e015e-9b4f-42a2-a126-cef5e7400bae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-SchedulerStatsV3RbacTest-1946111849", "password": "C9!j8!LagzsNj5J", "project_id": "589ff128c9674687acb1ee3254a6003b", "email": "tempest-SchedulerStatsV3RbacTest-1796314166@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '404', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f13e015e-9b4f-42a2-a126-cef5e7400bae', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "589ff128c9674687acb1ee3254a6003b", "email": "tempest-SchedulerStatsV3RbacTest-1796314166@example.com", "id": "f4e4bab9bb1d448b9f1fadbad55df8dc", "name": "tempest-SchedulerStatsV3RbacTest-1946111849", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/f4e4bab9bb1d448b9f1fadbad55df8dc"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:31.182 40 INFO tempest.lib.common.rest_client [req-7aed9e27-37b1-44ff-8fd5-c6fc6291e33e ] Request (SchedulerStatsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.050s 2020-11-06 18:03:31.183 40 DEBUG tempest.lib.common.rest_client [req-7aed9e27-37b1-44ff-8fd5-c6fc6291e33e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7aed9e27-37b1-44ff-8fd5-c6fc6291e33e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:31.188 37 INFO tempest.lib.common.rest_client [req-73665ad7-cc34-4ded-8355-df09d5f604e2 ] Request (NetworksRbacTest:test_show_network_provider_network_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 18:03:31.188 37 DEBUG tempest.lib.common.rest_client [req-73665ad7-cc34-4ded-8355-df09d5f604e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-73665ad7-cc34-4ded-8355-df09d5f604e2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "password_expires_at": null}, "audit_ids": ["MWa-vF2fQ2-gXimOQzXTVg"], "expires_at": "2020-11-06T19:03:31.000000Z", "issued_at": "2020-11-06T18:03:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:31.203 38 INFO tempest.lib.common.rest_client [req-0391828c-82f1-4177-bfd9-0e8c2269f8bf ] Request (SnapshotManageRbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/volumes/dc76691e-cb82-4ec9-b116-b3eb17eb17e5 0.072s 2020-11-06 18:03:31.203 38 DEBUG tempest.lib.common.rest_client [req-0391828c-82f1-4177-bfd9-0e8c2269f8bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0391828c-82f1-4177-bfd9-0e8c2269f8bf', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/volumes/dc76691e-cb82-4ec9-b116-b3eb17eb17e5'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:31.233 40 INFO tempest.lib.common.rest_client [req-aaf590c8-2963-49ce-9500-2493dd8ec1dd ] Request (SchedulerStatsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.049s 2020-11-06 18:03:31.233 40 DEBUG tempest.lib.common.rest_client [req-aaf590c8-2963-49ce-9500-2493dd8ec1dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aaf590c8-2963-49ce-9500-2493dd8ec1dd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:31.273 38 INFO tempest.lib.common.rest_client [req-db5f3f43-7b25-456d-95c1-394b5e7a0e3d ] Request (SnapshotManageRbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/volumes/dc76691e-cb82-4ec9-b116-b3eb17eb17e5 0.069s 2020-11-06 18:03:31.274 38 DEBUG tempest.lib.common.rest_client [req-db5f3f43-7b25-456d-95c1-394b5e7a0e3d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-db5f3f43-7b25-456d-95c1-394b5e7a0e3d', 'content-length': '1064', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-db5f3f43-7b25-456d-95c1-394b5e7a0e3d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/volumes/dc76691e-cb82-4ec9-b116-b3eb17eb17e5'} Body: b'{"volume": {"id": "dc76691e-cb82-4ec9-b116-b3eb17eb17e5", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:03:23.000000", "updated_at": "2020-11-06T18:03:31.000000", "name": "tempest-SnapshotManageRbacTest-Volume-497767618", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/volumes/dc76691e-cb82-4ec9-b116-b3eb17eb17e5"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/8dca462f626644269229cf59ef328eab/volumes/dc76691e-cb82-4ec9-b116-b3eb17eb17e5"}], "user_id": "a7d4864e62d843a1be7af2b5102a735e", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "8dca462f626644269229cf59ef328eab"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:31.303 40 INFO tempest.lib.common.rest_client [req-1c91e465-fe35-4f13-acb7-5e3c59425af8 ] Request (SchedulerStatsV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/589ff128c9674687acb1ee3254a6003b/users/f4e4bab9bb1d448b9f1fadbad55df8dc/roles/72a4576c553448cd941b052c1ca0cf2d 0.069s 2020-11-06 18:03:31.304 40 DEBUG tempest.lib.common.rest_client [req-1c91e465-fe35-4f13-acb7-5e3c59425af8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1c91e465-fe35-4f13-acb7-5e3c59425af8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/589ff128c9674687acb1ee3254a6003b/users/f4e4bab9bb1d448b9f1fadbad55df8dc/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:31.304 40 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SchedulerStatsV3RbacTest-1946111849', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '589ff128c9674687acb1ee3254a6003b', 'project_name': 'tempest-SchedulerStatsV3RbacTest-1946111849', 'tenant_id': '589ff128c9674687acb1ee3254a6003b', 'tenant_name': 'tempest-SchedulerStatsV3RbacTest-1946111849', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'f4e4bab9bb1d448b9f1fadbad55df8dc'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:31.305 40 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SchedulerStatsV3RbacTest-1946111849', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '589ff128c9674687acb1ee3254a6003b', 'project_name': 'tempest-SchedulerStatsV3RbacTest-1946111849', 'tenant_id': '589ff128c9674687acb1ee3254a6003b', 'tenant_name': 'tempest-SchedulerStatsV3RbacTest-1946111849', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'f4e4bab9bb1d448b9f1fadbad55df8dc'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:31.418 40 INFO tempest.lib.common.rest_client [req-f848dc44-c3f2-4851-8127-16b25fb496c8 ] Request (SchedulerStatsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.105s 2020-11-06 18:03:31.419 40 DEBUG tempest.lib.common.rest_client [req-f848dc44-c3f2-4851-8127-16b25fb496c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6579', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f848dc44-c3f2-4851-8127-16b25fb496c8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f4e4bab9bb1d448b9f1fadbad55df8dc", "name": "tempest-SchedulerStatsV3RbacTest-1946111849", "password_expires_at": null}, "audit_ids": ["W1HC1XeyT3mh3ipZespTSg"], "expires_at": "2020-11-06T19:03:31.000000Z", "issued_at": "2020-11-06T18:03:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "589ff128c9674687acb1ee3254a6003b", "name": "tempest-SchedulerStatsV3RbacTest-1946111849"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/589ff128c9674687acb1ee3254a6003b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/589ff128c9674687acb1ee3254a6003b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/589ff128c9674687acb1ee3254a6003b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_589ff128c9674687acb1ee3254a6003b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_589ff128c9674687acb1ee3254a6003b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_589ff128c9674687acb1ee3254a6003b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "ht _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:31.435 37 INFO tempest.lib.common.rest_client [req-de869572-5a63-42c8-9bf3-110426acc4be ] Request (NetworksRbacTest:test_show_network_provider_network_type): 200 GET http://172.30.13.94:9696/v2.0/networks/21087cdc-18ee-4a54-a645-561312615479?fields=provider%3Anetwork_type 0.246s 2020-11-06 18:03:31.436 37 DEBUG tempest.lib.common.rest_client [req-de869572-5a63-42c8-9bf3-110426acc4be ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '45', 'x-openstack-request-id': 'req-de869572-5a63-42c8-9bf3-110426acc4be', 'date': 'Fri, 06 Nov 2020 18:03:31 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/21087cdc-18ee-4a54-a645-561312615479?fields=provider%3Anetwork_type'} Body: b'{"network":{"provider:network_type":"vxlan"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:31.437 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:31.508 40 INFO tempest.lib.common.rest_client [req-a3b368c0-f201-4b4e-97c7-64a4eaa41482 ] Request (SchedulerStatsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-11-06 18:03:31.508 40 DEBUG tempest.lib.common.rest_client [req-a3b368c0-f201-4b4e-97c7-64a4eaa41482 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a3b368c0-f201-4b4e-97c7-64a4eaa41482', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["FmPooQYIR1mtIRDwXCTz8A"], "expires_at": "2020-11-06T19:03:31.000000Z", "issued_at": "2020-11-06T18:03:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:31.548 37 INFO tempest.lib.common.rest_client [req-097eb47f-b4f1-45ee-af00-935987cd2195 ] Request (NetworksRbacTest:test_show_network_provider_network_type): 200 GET http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles 0.110s 2020-11-06 18:03:31.548 37 DEBUG tempest.lib.common.rest_client [req-097eb47f-b4f1-45ee-af00-935987cd2195 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-097eb47f-b4f1-45ee-af00-935987cd2195', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:31.554 40 INFO tempest.lib.common.rest_client [req-1263ab63-8d8a-4ff6-a295-c73eeacfa22c ] Request (SchedulerStatsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:03:31.555 40 DEBUG tempest.lib.common.rest_client [req-1263ab63-8d8a-4ff6-a295-c73eeacfa22c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1263ab63-8d8a-4ff6-a295-c73eeacfa22c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["rMmUqv23S0yK6j44cZOtzg"], "expires_at": "2020-11-06T19:03:31.000000Z", "issued_at": "2020-11-06T18:03:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:31.600 40 INFO tempest.lib.common.rest_client [req-41f3a26a-6ea6-4c2b-ac89-e633db29ad8f ] Request (SchedulerStatsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.045s 2020-11-06 18:03:31.601 40 DEBUG tempest.lib.common.rest_client [req-41f3a26a-6ea6-4c2b-ac89-e633db29ad8f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-41f3a26a-6ea6-4c2b-ac89-e633db29ad8f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:31.628 37 INFO tempest.lib.common.rest_client [req-f87f07ad-80b1-4d3b-ac9c-712d7ba70816 ] Request (NetworksRbacTest:test_show_network_provider_network_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.079s 2020-11-06 18:03:31.629 37 DEBUG tempest.lib.common.rest_client [req-f87f07ad-80b1-4d3b-ac9c-712d7ba70816 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f87f07ad-80b1-4d3b-ac9c-712d7ba70816', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "password_expires_at": null}, "audit_ids": ["cUHcOoc_QZqfCACspBk_eA"], "expires_at": "2020-11-06T19:03:31.000000Z", "issued_at": "2020-11-06T18:03:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:31.632 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:31.636 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:31.637 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:31.640 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network:provider:physical_network, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:31.641 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:31.653 40 INFO tempest.lib.common.rest_client [req-3d078dc6-1405-4712-9304-2a546427d008 ] Request (SchedulerStatsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.051s 2020-11-06 18:03:31.654 40 DEBUG tempest.lib.common.rest_client [req-3d078dc6-1405-4712-9304-2a546427d008 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3d078dc6-1405-4712-9304-2a546427d008', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:31.654 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:03:31.655 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:31.691 37 INFO tempest.lib.common.rest_client [req-c509ddab-fbe2-496e-9fc6-9b9290364aa4 ] Request (NetworksRbacTest:test_show_network_provider_physical_network): 200 GET http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles 0.049s 2020-11-06 18:03:31.691 37 DEBUG tempest.lib.common.rest_client [req-c509ddab-fbe2-496e-9fc6-9b9290364aa4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c509ddab-fbe2-496e-9fc6-9b9290364aa4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:31.702 40 INFO tempest.lib.common.rest_client [req-defb4248-12ce-4faa-81c1-66f539e7afec ] Request (SchedulerStatsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/589ff128c9674687acb1ee3254a6003b/users/f4e4bab9bb1d448b9f1fadbad55df8dc/roles 0.047s 2020-11-06 18:03:31.703 40 DEBUG tempest.lib.common.rest_client [req-defb4248-12ce-4faa-81c1-66f539e7afec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-defb4248-12ce-4faa-81c1-66f539e7afec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/589ff128c9674687acb1ee3254a6003b/users/f4e4bab9bb1d448b9f1fadbad55df8dc/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/589ff128c9674687acb1ee3254a6003b/users/f4e4bab9bb1d448b9f1fadbad55df8dc/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:31.724 37 INFO tempest.lib.common.rest_client [req-156006b0-f5cf-4a78-a413-13b8a5147e67 ] Request (NetworksRbacTest:test_show_network_provider_physical_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:03:31.724 37 DEBUG tempest.lib.common.rest_client [req-156006b0-f5cf-4a78-a413-13b8a5147e67 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-156006b0-f5cf-4a78-a413-13b8a5147e67', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "password_expires_at": null}, "audit_ids": ["e7qFAWobR2GnGsZtb9_o7g"], "expires_at": "2020-11-06T19:03:31.000000Z", "issued_at": "2020-11-06T18:03:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:31.763 40 INFO tempest.lib.common.rest_client [req-e4486b9c-c643-48d5-818f-a5bf8aac542e ] Request (SchedulerStatsV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/589ff128c9674687acb1ee3254a6003b/users/f4e4bab9bb1d448b9f1fadbad55df8dc/roles/72a4576c553448cd941b052c1ca0cf2d 0.059s 2020-11-06 18:03:31.764 40 DEBUG tempest.lib.common.rest_client [req-e4486b9c-c643-48d5-818f-a5bf8aac542e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e4486b9c-c643-48d5-818f-a5bf8aac542e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/589ff128c9674687acb1ee3254a6003b/users/f4e4bab9bb1d448b9f1fadbad55df8dc/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:31.866 40 INFO tempest.lib.common.rest_client [req-7bae11c8-1299-46f7-b80b-a5474faeaa19 ] Request (SchedulerStatsV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/589ff128c9674687acb1ee3254a6003b/users/f4e4bab9bb1d448b9f1fadbad55df8dc/roles/a629c95d64b3416fb80ae90af4f69c05 0.101s 2020-11-06 18:03:31.866 40 DEBUG tempest.lib.common.rest_client [req-7bae11c8-1299-46f7-b80b-a5474faeaa19 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7bae11c8-1299-46f7-b80b-a5474faeaa19', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/589ff128c9674687acb1ee3254a6003b/users/f4e4bab9bb1d448b9f1fadbad55df8dc/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:32.092 37 INFO tempest.lib.common.rest_client [req-51f8dc8c-d2c2-476d-9bb1-a9df6866db35 ] Request (NetworksRbacTest:test_show_network_provider_physical_network): 200 GET http://172.30.13.94:9696/v2.0/networks/21087cdc-18ee-4a54-a645-561312615479?fields=provider%3Aphysical_network 0.366s 2020-11-06 18:03:32.093 37 DEBUG tempest.lib.common.rest_client [req-51f8dc8c-d2c2-476d-9bb1-a9df6866db35 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '46', 'x-openstack-request-id': 'req-51f8dc8c-d2c2-476d-9bb1-a9df6866db35', 'date': 'Fri, 06 Nov 2020 18:03:32 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/21087cdc-18ee-4a54-a645-561312615479?fields=provider%3Aphysical_network'} Body: b'{"network":{"provider:physical_network":null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:32.093 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:32.174 39 INFO tempest.lib.common.rest_client [req-78e273a3-6171-4f39-b46f-483b5bff260a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.220s 2020-11-06 18:03:32.175 39 DEBUG tempest.lib.common.rest_client [req-78e273a3-6171-4f39-b46f-483b5bff260a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-78e273a3-6171-4f39-b46f-483b5bff260a', 'x-compute-request-id': 'req-78e273a3-6171-4f39-b46f-483b5bff260a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:32.195 37 INFO tempest.lib.common.rest_client [req-e3e00084-b997-45a9-abee-9e51e82ddd2e ] Request (NetworksRbacTest:test_show_network_provider_physical_network): 200 GET http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles 0.100s 2020-11-06 18:03:32.196 37 DEBUG tempest.lib.common.rest_client [req-e3e00084-b997-45a9-abee-9e51e82ddd2e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e3e00084-b997-45a9-abee-9e51e82ddd2e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:32.285 37 INFO tempest.lib.common.rest_client [req-24c7336d-526d-4436-851d-9ae495e0b5e1 ] Request (NetworksRbacTest:test_show_network_provider_physical_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 18:03:32.286 37 DEBUG tempest.lib.common.rest_client [req-24c7336d-526d-4436-851d-9ae495e0b5e1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-24c7336d-526d-4436-851d-9ae495e0b5e1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "password_expires_at": null}, "audit_ids": ["3GmHeySpQna6LbQ8rRR1yQ"], "expires_at": "2020-11-06T19:03:32.000000Z", "issued_at": "2020-11-06T18:03:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:32.289 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:32.293 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:32.294 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:32.297 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network:provider:segmentation_id, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:32.297 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:32.334 38 INFO tempest.lib.common.rest_client [req-0eb03348-9d79-45d2-9fba-38c53ee94df9 ] Request (SnapshotManageRbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/volumes/dc76691e-cb82-4ec9-b116-b3eb17eb17e5 0.045s 2020-11-06 18:03:32.335 38 DEBUG tempest.lib.common.rest_client [req-0eb03348-9d79-45d2-9fba-38c53ee94df9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-0eb03348-9d79-45d2-9fba-38c53ee94df9', 'x-openstack-request-id': 'req-0eb03348-9d79-45d2-9fba-38c53ee94df9', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/8dca462f626644269229cf59ef328eab/volumes/dc76691e-cb82-4ec9-b116-b3eb17eb17e5'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume dc76691e-cb82-4ec9-b116-b3eb17eb17e5 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:32.350 37 INFO tempest.lib.common.rest_client [req-c9ffe544-9d40-4138-8785-2c7c0a2ec122 ] Request (NetworksRbacTest:test_show_network_provider_segmentation_id): 200 GET http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles 0.052s 2020-11-06 18:03:32.351 37 DEBUG tempest.lib.common.rest_client [req-c9ffe544-9d40-4138-8785-2c7c0a2ec122 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c9ffe544-9d40-4138-8785-2c7c0a2ec122', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:32.387 37 INFO tempest.lib.common.rest_client [req-61596ab5-6903-4ace-a379-d8d833d66c08 ] Request (NetworksRbacTest:test_show_network_provider_segmentation_id): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:03:32.388 37 DEBUG tempest.lib.common.rest_client [req-61596ab5-6903-4ace-a379-d8d833d66c08 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-61596ab5-6903-4ace-a379-d8d833d66c08', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "password_expires_at": null}, "audit_ids": ["gNRMbQHjRICeX9AcRbezzQ"], "expires_at": "2020-11-06T19:03:32.000000Z", "issued_at": "2020-11-06T18:03:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:32.449 38 INFO tempest.lib.common.rest_client [req-a02cc96a-cf72-4f1a-b2b7-f57125fb05d3 ] Request (SnapshotManageRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/a7d4864e62d843a1be7af2b5102a735e 0.113s 2020-11-06 18:03:32.450 38 DEBUG tempest.lib.common.rest_client [req-a02cc96a-cf72-4f1a-b2b7-f57125fb05d3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a02cc96a-cf72-4f1a-b2b7-f57125fb05d3', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/a7d4864e62d843a1be7af2b5102a735e'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:32.533 38 INFO tempest.lib.common.rest_client [req-24c1211a-6aca-4bee-b7b3-7b7bafcabd68 ] Request (SnapshotManageRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 18:03:32.534 38 DEBUG tempest.lib.common.rest_client [req-24c1211a-6aca-4bee-b7b3-7b7bafcabd68 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-24c1211a-6aca-4bee-b7b3-7b7bafcabd68', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["6ZTfg5eMTJ6khCxhIm6AUQ"], "expires_at": "2020-11-06T19:03:32.000000Z", "issued_at": "2020-11-06T18:03:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:32.769 37 INFO tempest.lib.common.rest_client [req-a6dd924e-8b2e-4a71-8df4-519d9307af54 ] Request (NetworksRbacTest:test_show_network_provider_segmentation_id): 200 GET http://172.30.13.94:9696/v2.0/networks/21087cdc-18ee-4a54-a645-561312615479?fields=provider%3Asegmentation_id 0.380s 2020-11-06 18:03:32.770 37 DEBUG tempest.lib.common.rest_client [req-a6dd924e-8b2e-4a71-8df4-519d9307af54 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '43', 'x-openstack-request-id': 'req-a6dd924e-8b2e-4a71-8df4-519d9307af54', 'date': 'Fri, 06 Nov 2020 18:03:32 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/21087cdc-18ee-4a54-a645-561312615479?fields=provider%3Asegmentation_id'} Body: b'{"network":{"provider:segmentation_id":49}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:32.771 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:32.827 37 INFO tempest.lib.common.rest_client [req-833212dd-c369-4d9d-9c39-a9e0a4e65d48 ] Request (NetworksRbacTest:test_show_network_provider_segmentation_id): 200 GET http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles 0.055s 2020-11-06 18:03:32.827 37 DEBUG tempest.lib.common.rest_client [req-833212dd-c369-4d9d-9c39-a9e0a4e65d48 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-833212dd-c369-4d9d-9c39-a9e0a4e65d48', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:32.868 37 INFO tempest.lib.common.rest_client [req-33d56d30-2fd6-452b-9e19-8c602bc47956 ] Request (NetworksRbacTest:test_show_network_provider_segmentation_id): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:03:32.869 37 DEBUG tempest.lib.common.rest_client [req-33d56d30-2fd6-452b-9e19-8c602bc47956 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-33d56d30-2fd6-452b-9e19-8c602bc47956', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "password_expires_at": null}, "audit_ids": ["hO-rkzzkTx2_zkD6jyi3Xw"], "expires_at": "2020-11-06T19:03:32.000000Z", "issued_at": "2020-11-06T18:03:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:32.872 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:32.876 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:32.877 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:32.877 38 INFO tempest.lib.common.rest_client [req-802ccd53-3be0-4a59-b20a-fe65ab6e4c34 ] Request (SnapshotManageRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=8dca462f626644269229cf59ef328eab&name=default 0.343s 2020-11-06 18:03:32.878 38 DEBUG tempest.lib.common.rest_client [req-802ccd53-3be0-4a59-b20a-fe65ab6e4c34 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-802ccd53-3be0-4a59-b20a-fe65ab6e4c34', 'date': 'Fri, 06 Nov 2020 18:03:32 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=8dca462f626644269229cf59ef328eab&name=default'} Body: b'{"security_groups": [{"id": "fed77107-70d1-47fa-aede-8be02a0b9e74", "name": "default", "stateful": true, "tenant_id": "8dca462f626644269229cf59ef328eab", "description": "Default security group", "security_group_rules": [{"id": "00c10f2c-03da-4ca1-bf67-81908955ac8c", "tenant_id": "8dca462f626644269229cf59ef328eab", "security_group_id": "fed77107-70d1-47fa-aede-8be02a0b9e74", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "fed77107-70d1-47fa-aede-8be02a0b9e74", "description": null, "tags": [], "created_at": "2020-11-06T18:03:32Z", "updated_at": "2020-11-06T18:03:32Z", "revision_number": 0, "project_id": "8dca462f626644269229cf59ef328eab"}, {"id": "1269cc2c-96d5-47c7-8902-9b5ced8a6246", "tenant_id": "8dca462f626644269229cf59ef328eab", "security_group_id": "fed77107-70d1-47fa-aede-8be02a0b9e74", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "fed77107-70d1-47fa-aede-8be02a0b9e74", "description": null, "tags": [], "created_at": "2020-11-06T18:03:32Z", "updated_at": "2020-11-06T18:03:32Z", "revision_number": 0, "project_id": "8dca462f626644269229cf59ef328eab"}, {"id": "688efb4d-5c01-4bde-8137-862513d78538", "tenant_id": "8dca462f626644269229cf59ef328eab", "security_group_id": "fed77107-70d1-47fa-aede-8be02a0b9e74", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:32Z", "updated_at": "2020-11-06T18:03:32Z", "revision_number": 0, "project_id": "8dca462f626644269229cf59ef328eab"}, {"id": "755ab325-9ae5-4305-bdad-8a2217ff9a46", "tenant_id": "8dca462f626644269229cf59ef328eab", "security_group_id": "fed77107-70d1-47fa-aede-8be02a0b9e74", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:32Z", "updated_at": "2020-11-06T18:03:32Z", "revision_number": 0, "project_id": "8dca462f626644269229cf59ef328eab"}], "tags": [], "created_at": "2020-11-06T18:03:32Z", "updated_at": "2020-11-06T18:03:32Z", "revision_number": 1, "project_id": "8dca462f626644269229cf59ef328eab"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:32.881 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network:router:external, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:32.881 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:32.937 37 INFO tempest.lib.common.rest_client [req-bf2d193b-ad6b-436e-9d8b-70312bbade0e ] Request (NetworksRbacTest:test_show_network_router_external): 200 GET http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles 0.055s 2020-11-06 18:03:32.937 37 DEBUG tempest.lib.common.rest_client [req-bf2d193b-ad6b-436e-9d8b-70312bbade0e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bf2d193b-ad6b-436e-9d8b-70312bbade0e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:32.976 37 INFO tempest.lib.common.rest_client [req-043482fe-f1f2-4354-b30f-80fb06e25913 ] Request (NetworksRbacTest:test_show_network_router_external): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:03:32.976 40 INFO tempest.lib.common.rest_client [req-cad81e98-2273-4472-a43f-c45e2f870961 ] Request (SchedulerStatsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.107s 2020-11-06 18:03:32.976 37 DEBUG tempest.lib.common.rest_client [req-043482fe-f1f2-4354-b30f-80fb06e25913 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-043482fe-f1f2-4354-b30f-80fb06e25913', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "password_expires_at": null}, "audit_ids": ["V0ERCkb4RR-9KImEhbeVWg"], "expires_at": "2020-11-06T19:03:32.000000Z", "issued_at": "2020-11-06T18:03:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:32.976 40 DEBUG tempest.lib.common.rest_client [req-cad81e98-2273-4472-a43f-c45e2f870961 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cad81e98-2273-4472-a43f-c45e2f870961', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f4e4bab9bb1d448b9f1fadbad55df8dc", "name": "tempest-SchedulerStatsV3RbacTest-1946111849", "password_expires_at": null}, "audit_ids": ["4-1oAIq0TE2Z0wNp_-6-7Q"], "expires_at": "2020-11-06T19:03:32.000000Z", "issued_at": "2020-11-06T18:03:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "589ff128c9674687acb1ee3254a6003b", "name": "tempest-SchedulerStatsV3RbacTest-1946111849"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/589ff128c9674687acb1ee3254a6003b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/589ff128c9674687acb1ee3254a6003b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/589ff128c9674687acb1ee3254a6003b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_589ff128c9674687acb1ee3254a6003b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_589ff128c9674687acb1ee3254a6003b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_589ff128c9674687acb1ee3254a6003b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:32.978 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:32.981 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: scheduler_extension:scheduler_stats:get_pools, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:32.982 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:32.992 38 INFO tempest.lib.common.rest_client [req-2e004f8f-9ab1-41db-99b5-fdf57742a31a ] Request (SnapshotManageRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/fed77107-70d1-47fa-aede-8be02a0b9e74 0.113s 2020-11-06 18:03:32.993 38 DEBUG tempest.lib.common.rest_client [req-2e004f8f-9ab1-41db-99b5-fdf57742a31a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-2e004f8f-9ab1-41db-99b5-fdf57742a31a', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:03:32 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/fed77107-70d1-47fa-aede-8be02a0b9e74'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:33.032 40 INFO tempest.lib.common.rest_client [req-a925a4d8-fe1c-481f-a386-610782f4d2b0 ] Request (SchedulerStatsV3RbacTest:test_list_back_end_storage_pools): 200 GET http://172.30.13.94/identity/v3/projects/589ff128c9674687acb1ee3254a6003b/users/f4e4bab9bb1d448b9f1fadbad55df8dc/roles 0.049s 2020-11-06 18:03:33.032 40 DEBUG tempest.lib.common.rest_client [req-a925a4d8-fe1c-481f-a386-610782f4d2b0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a925a4d8-fe1c-481f-a386-610782f4d2b0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/589ff128c9674687acb1ee3254a6003b/users/f4e4bab9bb1d448b9f1fadbad55df8dc/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/589ff128c9674687acb1ee3254a6003b/users/f4e4bab9bb1d448b9f1fadbad55df8dc/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:33.065 40 INFO tempest.lib.common.rest_client [req-fc7f997b-86dc-4901-91ce-ad590eb06182 ] Request (SchedulerStatsV3RbacTest:test_list_back_end_storage_pools): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:03:33.066 40 DEBUG tempest.lib.common.rest_client [req-fc7f997b-86dc-4901-91ce-ad590eb06182 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fc7f997b-86dc-4901-91ce-ad590eb06182', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f4e4bab9bb1d448b9f1fadbad55df8dc", "name": "tempest-SchedulerStatsV3RbacTest-1946111849", "password_expires_at": null}, "audit_ids": ["Ahw1-e6jRx-9EdTp52OcJQ"], "expires_at": "2020-11-06T19:03:33.000000Z", "issued_at": "2020-11-06T18:03:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "589ff128c9674687acb1ee3254a6003b", "name": "tempest-SchedulerStatsV3RbacTest-1946111849"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/589ff128c9674687acb1ee3254a6003b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/589ff128c9674687acb1ee3254a6003b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/589ff128c9674687acb1ee3254a6003b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_589ff128c9674687acb1ee3254a6003b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_589ff128c9674687acb1ee3254a6003b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_589ff128c9674687acb1ee3254a6003b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:33.109 38 INFO tempest.lib.common.rest_client [req-6e8e69c9-f34e-4b92-b3b5-e9037c1e29e8 ] Request (SnapshotManageRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/8dca462f626644269229cf59ef328eab 0.115s 2020-11-06 18:03:33.110 38 DEBUG tempest.lib.common.rest_client [req-6e8e69c9-f34e-4b92-b3b5-e9037c1e29e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6e8e69c9-f34e-4b92-b3b5-e9037c1e29e8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/8dca462f626644269229cf59ef328eab'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:33.177 37 INFO tempest.lib.common.rest_client [req-3db4271f-c0f2-4a85-86bf-2254e236891c ] Request (NetworksRbacTest:test_show_network_router_external): 200 GET http://172.30.13.94:9696/v2.0/networks/21087cdc-18ee-4a54-a645-561312615479?fields=router%3Aexternal 0.199s 2020-11-06 18:03:33.178 37 DEBUG tempest.lib.common.rest_client [req-3db4271f-c0f2-4a85-86bf-2254e236891c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '37', 'x-openstack-request-id': 'req-3db4271f-c0f2-4a85-86bf-2254e236891c', 'date': 'Fri, 06 Nov 2020 18:03:33 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/21087cdc-18ee-4a54-a645-561312615479?fields=router%3Aexternal'} Body: b'{"network":{"router:external":false}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:33.178 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:33.202 38 INFO tempest.lib.common.rest_client [req-1f668a07-84ea-44ee-91e2-7c50c2de161d ] Request (SnapshotsActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-11-06 18:03:33.202 38 DEBUG tempest.lib.common.rest_client [req-1f668a07-84ea-44ee-91e2-7c50c2de161d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1f668a07-84ea-44ee-91e2-7c50c2de161d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["S6OLBH3TTFOK7-N2yqEkPg"], "expires_at": "2020-11-06T19:03:33.000000Z", "issued_at": "2020-11-06T18:03:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:33.230 37 INFO tempest.lib.common.rest_client [req-58d1ff58-e3ee-4648-93be-5e80b0bb6c94 ] Request (NetworksRbacTest:test_show_network_router_external): 200 GET http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles 0.051s 2020-11-06 18:03:33.231 37 DEBUG tempest.lib.common.rest_client [req-58d1ff58-e3ee-4648-93be-5e80b0bb6c94 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-58d1ff58-e3ee-4648-93be-5e80b0bb6c94', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:33.246 38 INFO tempest.lib.common.rest_client [req-06d7859f-bdf7-4cac-bdcf-d86aadd2561b ] Request (SnapshotsActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:03:33.246 38 DEBUG tempest.lib.common.rest_client [req-06d7859f-bdf7-4cac-bdcf-d86aadd2561b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-06d7859f-bdf7-4cac-bdcf-d86aadd2561b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["2UbjJJuaTJ-nxkQakm3_6w"], "expires_at": "2020-11-06T19:03:33.000000Z", "issued_at": "2020-11-06T18:03:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:33.300 38 INFO tempest.lib.common.rest_client [req-1a373db1-952e-4ad3-a8f1-0441b7dc64ba ] Request (SnapshotsActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.053s 2020-11-06 18:03:33.301 38 DEBUG tempest.lib.common.rest_client [req-1a373db1-952e-4ad3-a8f1-0441b7dc64ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1a373db1-952e-4ad3-a8f1-0441b7dc64ba', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:33.318 37 INFO tempest.lib.common.rest_client [req-6e94eeb6-5bd9-49cd-9029-52a6dbddfb34 ] Request (NetworksRbacTest:test_show_network_router_external): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-11-06 18:03:33.319 37 DEBUG tempest.lib.common.rest_client [req-6e94eeb6-5bd9-49cd-9029-52a6dbddfb34 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6e94eeb6-5bd9-49cd-9029-52a6dbddfb34', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "password_expires_at": null}, "audit_ids": ["1ynuuH-RTuqk4Ybzn3dRmw"], "expires_at": "2020-11-06T19:03:33.000000Z", "issued_at": "2020-11-06T18:03:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:33.321 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:33.323 40 INFO tempest.lib.common.rest_client [req-90919824-237d-47c4-92e5-5084bf11056b ] Request (SchedulerStatsV3RbacTest:test_list_back_end_storage_pools): 200 GET http://172.30.13.94/volume/v3/589ff128c9674687acb1ee3254a6003b/scheduler-stats/get_pools 0.256s 2020-11-06 18:03:33.324 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:33.324 40 DEBUG tempest.lib.common.rest_client [req-90919824-237d-47c4-92e5-5084bf11056b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-90919824-237d-47c4-92e5-5084bf11056b', 'content-length': '81', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-90919824-237d-47c4-92e5-5084bf11056b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/589ff128c9674687acb1ee3254a6003b/scheduler-stats/get_pools'} Body: b'{"pools": [{"name": "lf-virtual9@ceph#ceph"}, {"name": "lf-virtual8@ceph#ceph"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:33.324 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:33.327 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_network, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:33.328 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:33.329 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:33.368 38 INFO tempest.lib.common.rest_client [req-786dc1a8-3562-4326-b900-1992f330e402 ] Request (SnapshotsActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.066s 2020-11-06 18:03:33.369 38 DEBUG tempest.lib.common.rest_client [req-786dc1a8-3562-4326-b900-1992f330e402 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-SnapshotsActionsV3RbacTest-1910342686-desc", "domain_id": "default", "name": "tempest-SnapshotsActionsV3RbacTest-1910342686"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '390', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-786dc1a8-3562-4326-b900-1992f330e402', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "3b4bab58d3e54d1dac1516c8a6695483", "name": "tempest-SnapshotsActionsV3RbacTest-1910342686", "domain_id": "default", "description": "tempest-SnapshotsActionsV3RbacTest-1910342686-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/3b4bab58d3e54d1dac1516c8a6695483"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:33.374 37 INFO tempest.lib.common.rest_client [req-cd3f7a2b-620a-4bb9-8a13-9f8bf5c37922 ] Request (NetworksRbacTest:test_update_network): 200 GET http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles 0.045s 2020-11-06 18:03:33.374 37 DEBUG tempest.lib.common.rest_client [req-cd3f7a2b-620a-4bb9-8a13-9f8bf5c37922 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cd3f7a2b-620a-4bb9-8a13-9f8bf5c37922', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:33.382 40 INFO tempest.lib.common.rest_client [req-882b4692-31ff-4043-a7fd-a1f650372178 ] Request (SchedulerStatsV3RbacTest:test_list_back_end_storage_pools): 200 GET http://172.30.13.94/identity/v3/projects/589ff128c9674687acb1ee3254a6003b/users/f4e4bab9bb1d448b9f1fadbad55df8dc/roles 0.053s 2020-11-06 18:03:33.383 40 DEBUG tempest.lib.common.rest_client [req-882b4692-31ff-4043-a7fd-a1f650372178 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-882b4692-31ff-4043-a7fd-a1f650372178', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/589ff128c9674687acb1ee3254a6003b/users/f4e4bab9bb1d448b9f1fadbad55df8dc/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/589ff128c9674687acb1ee3254a6003b/users/f4e4bab9bb1d448b9f1fadbad55df8dc/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:33.401 39 INFO tempest.lib.common.rest_client [req-2d8d05a6-cffe-45d6-b7e7-26626b50a451 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.211s 2020-11-06 18:03:33.402 39 DEBUG tempest.lib.common.rest_client [req-2d8d05a6-cffe-45d6-b7e7-26626b50a451 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2d8d05a6-cffe-45d6-b7e7-26626b50a451', 'x-compute-request-id': 'req-2d8d05a6-cffe-45d6-b7e7-26626b50a451', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:33.457 40 INFO tempest.lib.common.rest_client [req-ea6979fe-89f0-4c2c-be17-3751a6a0650f ] Request (SchedulerStatsV3RbacTest:test_list_back_end_storage_pools): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.073s 2020-11-06 18:03:33.458 40 DEBUG tempest.lib.common.rest_client [req-ea6979fe-89f0-4c2c-be17-3751a6a0650f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ea6979fe-89f0-4c2c-be17-3751a6a0650f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f4e4bab9bb1d448b9f1fadbad55df8dc", "name": "tempest-SchedulerStatsV3RbacTest-1946111849", "password_expires_at": null}, "audit_ids": ["XNE4dF7WRwGjTyWIiNvSSA"], "expires_at": "2020-11-06T19:03:33.000000Z", "issued_at": "2020-11-06T18:03:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "589ff128c9674687acb1ee3254a6003b", "name": "tempest-SchedulerStatsV3RbacTest-1946111849"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/589ff128c9674687acb1ee3254a6003b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/589ff128c9674687acb1ee3254a6003b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/589ff128c9674687acb1ee3254a6003b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_589ff128c9674687acb1ee3254a6003b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_589ff128c9674687acb1ee3254a6003b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_589ff128c9674687acb1ee3254a6003b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:33.461 37 INFO tempest.lib.common.rest_client [req-3cd3ed33-0bd2-450e-8b72-4719f8ac6c23 ] Request (NetworksRbacTest:test_update_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:03:33.462 37 DEBUG tempest.lib.common.rest_client [req-3cd3ed33-0bd2-450e-8b72-4719f8ac6c23 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3cd3ed33-0bd2-450e-8b72-4719f8ac6c23', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "password_expires_at": null}, "audit_ids": ["5HT2PnNhRrisBnAykZvgGQ"], "expires_at": "2020-11-06T19:03:33.000000Z", "issued_at": "2020-11-06T18:03:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:33.483 38 INFO tempest.lib.common.rest_client [req-15b33b45-19fe-44e4-a794-7d41fb583e09 ] Request (SnapshotsActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.113s 2020-11-06 18:03:33.484 38 DEBUG tempest.lib.common.rest_client [req-15b33b45-19fe-44e4-a794-7d41fb583e09 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-SnapshotsActionsV3RbacTest-1910342686", "password": "C3&Nun_!F#kHNYJ", "project_id": "3b4bab58d3e54d1dac1516c8a6695483", "email": "tempest-SnapshotsActionsV3RbacTest-498594698@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '407', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-15b33b45-19fe-44e4-a794-7d41fb583e09', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "3b4bab58d3e54d1dac1516c8a6695483", "email": "tempest-SnapshotsActionsV3RbacTest-498594698@example.com", "id": "c0192fceca894b0d97a9d2aaa0f9eb23", "name": "tempest-SnapshotsActionsV3RbacTest-1910342686", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/c0192fceca894b0d97a9d2aaa0f9eb23"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:33.532 38 INFO tempest.lib.common.rest_client [req-42d80028-9681-482c-b85b-890d3e842635 ] Request (SnapshotsActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.047s 2020-11-06 18:03:33.533 38 DEBUG tempest.lib.common.rest_client [req-42d80028-9681-482c-b85b-890d3e842635 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-42d80028-9681-482c-b85b-890d3e842635', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:33.582 38 INFO tempest.lib.common.rest_client [req-1c0ebab6-88bf-42d3-9f63-8430b89adaec ] Request (SnapshotsActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.048s 2020-11-06 18:03:33.582 38 DEBUG tempest.lib.common.rest_client [req-1c0ebab6-88bf-42d3-9f63-8430b89adaec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1c0ebab6-88bf-42d3-9f63-8430b89adaec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:33.586 40 INFO tempest.lib.common.rest_client [req-c71ff46a-a18b-4182-b192-617f4d03989d ] Request (SchedulerStatsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/f4e4bab9bb1d448b9f1fadbad55df8dc 0.127s 2020-11-06 18:03:33.587 40 DEBUG tempest.lib.common.rest_client [req-c71ff46a-a18b-4182-b192-617f4d03989d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c71ff46a-a18b-4182-b192-617f4d03989d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/f4e4bab9bb1d448b9f1fadbad55df8dc'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:33.673 40 INFO tempest.lib.common.rest_client [req-51f0874b-412b-4a60-8db6-8fccb3ecd074 ] Request (SchedulerStatsV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:03:33.674 40 DEBUG tempest.lib.common.rest_client [req-51f0874b-412b-4a60-8db6-8fccb3ecd074 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-51f0874b-412b-4a60-8db6-8fccb3ecd074', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["Q405_g5cSPC9alh6sAT8VQ"], "expires_at": "2020-11-06T19:03:33.000000Z", "issued_at": "2020-11-06T18:03:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:33.698 38 INFO tempest.lib.common.rest_client [req-a811f3ed-85d4-49fb-b026-625a4a238496 ] Request (SnapshotsActionsV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/3b4bab58d3e54d1dac1516c8a6695483/users/c0192fceca894b0d97a9d2aaa0f9eb23/roles/72a4576c553448cd941b052c1ca0cf2d 0.115s 2020-11-06 18:03:33.699 38 DEBUG tempest.lib.common.rest_client [req-a811f3ed-85d4-49fb-b026-625a4a238496 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a811f3ed-85d4-49fb-b026-625a4a238496', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3b4bab58d3e54d1dac1516c8a6695483/users/c0192fceca894b0d97a9d2aaa0f9eb23/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:33.699 38 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SnapshotsActionsV3RbacTest-1910342686', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '3b4bab58d3e54d1dac1516c8a6695483', 'project_name': 'tempest-SnapshotsActionsV3RbacTest-1910342686', 'tenant_id': '3b4bab58d3e54d1dac1516c8a6695483', 'tenant_name': 'tempest-SnapshotsActionsV3RbacTest-1910342686', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'c0192fceca894b0d97a9d2aaa0f9eb23'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:33.700 38 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SnapshotsActionsV3RbacTest-1910342686', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '3b4bab58d3e54d1dac1516c8a6695483', 'project_name': 'tempest-SnapshotsActionsV3RbacTest-1910342686', 'tenant_id': '3b4bab58d3e54d1dac1516c8a6695483', 'tenant_name': 'tempest-SnapshotsActionsV3RbacTest-1910342686', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'c0192fceca894b0d97a9d2aaa0f9eb23'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:33.810 38 INFO tempest.lib.common.rest_client [req-8772d05b-4c03-48aa-b96c-2d95504e93fb ] Request (SnapshotsActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.101s 2020-11-06 18:03:33.811 38 DEBUG tempest.lib.common.rest_client [req-8772d05b-4c03-48aa-b96c-2d95504e93fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6583', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8772d05b-4c03-48aa-b96c-2d95504e93fb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c0192fceca894b0d97a9d2aaa0f9eb23", "name": "tempest-SnapshotsActionsV3RbacTest-1910342686", "password_expires_at": null}, "audit_ids": ["RYvrcdE-QxyZYgWfJk6bHA"], "expires_at": "2020-11-06T19:03:33.000000Z", "issued_at": "2020-11-06T18:03:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3b4bab58d3e54d1dac1516c8a6695483", "name": "tempest-SnapshotsActionsV3RbacTest-1910342686"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:33.849 38 INFO tempest.lib.common.rest_client [req-a5df9363-5ede-4b07-b45f-5be3d56fab15 ] Request (SnapshotsActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:03:33.849 38 DEBUG tempest.lib.common.rest_client [req-a5df9363-5ede-4b07-b45f-5be3d56fab15 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a5df9363-5ede-4b07-b45f-5be3d56fab15', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["aBGRSccsR6-zq2DGeP43XA"], "expires_at": "2020-11-06T19:03:33.000000Z", "issued_at": "2020-11-06T18:03:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:33.896 38 INFO tempest.lib.common.rest_client [req-cd3c5951-044a-45fe-8d3b-bece1ac4f573 ] Request (SnapshotsActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:03:33.897 38 DEBUG tempest.lib.common.rest_client [req-cd3c5951-044a-45fe-8d3b-bece1ac4f573 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cd3c5951-044a-45fe-8d3b-bece1ac4f573', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["D-Hq8VUrQWeultN1-1zodA"], "expires_at": "2020-11-06T19:03:33.000000Z", "issued_at": "2020-11-06T18:03:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:33.941 38 INFO tempest.lib.common.rest_client [req-102dc7b8-700f-49f0-a666-f108655cd5b6 ] Request (SnapshotsActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.042s 2020-11-06 18:03:33.941 38 DEBUG tempest.lib.common.rest_client [req-102dc7b8-700f-49f0-a666-f108655cd5b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-102dc7b8-700f-49f0-a666-f108655cd5b6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:33.988 38 INFO tempest.lib.common.rest_client [req-a05caaa7-2266-4024-ae1c-9f1801a5aa96 ] Request (SnapshotsActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.045s 2020-11-06 18:03:33.988 38 DEBUG tempest.lib.common.rest_client [req-a05caaa7-2266-4024-ae1c-9f1801a5aa96 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a05caaa7-2266-4024-ae1c-9f1801a5aa96', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:33.989 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:03:33.989 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:33.996 40 INFO tempest.lib.common.rest_client [req-089fca20-1d51-4ddd-ba87-ecbe47e03f99 ] Request (SchedulerStatsV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=589ff128c9674687acb1ee3254a6003b&name=default 0.321s 2020-11-06 18:03:33.997 40 DEBUG tempest.lib.common.rest_client [req-089fca20-1d51-4ddd-ba87-ecbe47e03f99 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-089fca20-1d51-4ddd-ba87-ecbe47e03f99', 'date': 'Fri, 06 Nov 2020 18:03:33 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=589ff128c9674687acb1ee3254a6003b&name=default'} Body: b'{"security_groups": [{"id": "1362bdc2-c34e-4687-b89e-de34fac1fd0b", "name": "default", "stateful": true, "tenant_id": "589ff128c9674687acb1ee3254a6003b", "description": "Default security group", "security_group_rules": [{"id": "46fe907d-443f-4df3-b06f-fcee63dcd949", "tenant_id": "589ff128c9674687acb1ee3254a6003b", "security_group_id": "1362bdc2-c34e-4687-b89e-de34fac1fd0b", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "1362bdc2-c34e-4687-b89e-de34fac1fd0b", "description": null, "tags": [], "created_at": "2020-11-06T18:03:33Z", "updated_at": "2020-11-06T18:03:33Z", "revision_number": 0, "project_id": "589ff128c9674687acb1ee3254a6003b"}, {"id": "6efa6e0e-8d17-40d9-8f70-180644dacb66", "tenant_id": "589ff128c9674687acb1ee3254a6003b", "security_group_id": "1362bdc2-c34e-4687-b89e-de34fac1fd0b", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:33Z", "updated_at": "2020-11-06T18:03:33Z", "revision_number": 0, "project_id": "589ff128c9674687acb1ee3254a6003b"}, {"id": "f3b39e47-4a6c-43bb-a659-c2721f659c9f", "tenant_id": "589ff128c9674687acb1ee3254a6003b", "security_group_id": "1362bdc2-c34e-4687-b89e-de34fac1fd0b", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "1362bdc2-c34e-4687-b89e-de34fac1fd0b", "description": null, "tags": [], "created_at": "2020-11-06T18:03:33Z", "updated_at": "2020-11-06T18:03:33Z", "revision_number": 0, "project_id": "589ff128c9674687acb1ee3254a6003b"}, {"id": "fe7cdd64-ce84-41c6-99da-052d58142556", "tenant_id": "589ff128c9674687acb1ee3254a6003b", "security_group_id": "1362bdc2-c34e-4687-b89e-de34fac1fd0b", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:33Z", "updated_at": "2020-11-06T18:03:33Z", "revision_number": 0, "project_id": "589ff128c9674687acb1ee3254a6003b"}], "tags": [], "created_at": "2020-11-06T18:03:33Z", "updated_at": "2020-11-06T18:03:33Z", "revision_number": 1, "project_id": "589ff128c9674687acb1ee3254a6003b"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:34.031 38 INFO tempest.lib.common.rest_client [req-fd4c0877-dffa-4633-88c7-1b23f111425b ] Request (SnapshotsActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/3b4bab58d3e54d1dac1516c8a6695483/users/c0192fceca894b0d97a9d2aaa0f9eb23/roles 0.041s 2020-11-06 18:03:34.031 38 DEBUG tempest.lib.common.rest_client [req-fd4c0877-dffa-4633-88c7-1b23f111425b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fd4c0877-dffa-4633-88c7-1b23f111425b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3b4bab58d3e54d1dac1516c8a6695483/users/c0192fceca894b0d97a9d2aaa0f9eb23/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3b4bab58d3e54d1dac1516c8a6695483/users/c0192fceca894b0d97a9d2aaa0f9eb23/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:34.099 38 INFO tempest.lib.common.rest_client [req-1cbcc311-2661-43b8-9837-fb405a3f2a3f ] Request (SnapshotsActionsV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/3b4bab58d3e54d1dac1516c8a6695483/users/c0192fceca894b0d97a9d2aaa0f9eb23/roles/72a4576c553448cd941b052c1ca0cf2d 0.066s 2020-11-06 18:03:34.099 38 DEBUG tempest.lib.common.rest_client [req-1cbcc311-2661-43b8-9837-fb405a3f2a3f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1cbcc311-2661-43b8-9837-fb405a3f2a3f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3b4bab58d3e54d1dac1516c8a6695483/users/c0192fceca894b0d97a9d2aaa0f9eb23/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:34.163 40 INFO tempest.lib.common.rest_client [req-cb3aad56-c94e-46b7-9ce7-72fdc108b175 ] Request (SchedulerStatsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/1362bdc2-c34e-4687-b89e-de34fac1fd0b 0.164s 2020-11-06 18:03:34.163 40 DEBUG tempest.lib.common.rest_client [req-cb3aad56-c94e-46b7-9ce7-72fdc108b175 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-cb3aad56-c94e-46b7-9ce7-72fdc108b175', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:03:34 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/1362bdc2-c34e-4687-b89e-de34fac1fd0b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:34.197 38 INFO tempest.lib.common.rest_client [req-076ca8e0-7c14-4ee3-ba5b-5dd985045fb0 ] Request (SnapshotsActionsV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/3b4bab58d3e54d1dac1516c8a6695483/users/c0192fceca894b0d97a9d2aaa0f9eb23/roles/a629c95d64b3416fb80ae90af4f69c05 0.097s 2020-11-06 18:03:34.197 38 DEBUG tempest.lib.common.rest_client [req-076ca8e0-7c14-4ee3-ba5b-5dd985045fb0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-076ca8e0-7c14-4ee3-ba5b-5dd985045fb0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3b4bab58d3e54d1dac1516c8a6695483/users/c0192fceca894b0d97a9d2aaa0f9eb23/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:34.210 37 INFO tempest.lib.common.rest_client [req-a5acf06a-3520-4e7e-8f17-54cd022856fc ] Request (NetworksRbacTest:test_update_network): 200 PUT http://172.30.13.94:9696/v2.0/networks/21087cdc-18ee-4a54-a645-561312615479 0.746s 2020-11-06 18:03:34.210 37 DEBUG tempest.lib.common.rest_client [req-a5acf06a-3520-4e7e-8f17-54cd022856fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-NetworksRbacTest-Network-18667912"}} Response - Headers: {'content-type': 'application/json', 'content-length': '755', 'x-openstack-request-id': 'req-a5acf06a-3520-4e7e-8f17-54cd022856fc', 'date': 'Fri, 06 Nov 2020 18:03:34 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/21087cdc-18ee-4a54-a645-561312615479'} Body: b'{"network":{"id":"21087cdc-18ee-4a54-a645-561312615479","name":"tempest-NetworksRbacTest-Network-18667912","tenant_id":"ed59c56def144c79842338c521c6c51e","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["ffa8a86f-cd0d-49a5-bbfa-72cdd54b7ee6"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:03:23Z","updated_at":"2020-11-06T18:03:33Z","revision_number":3,"project_id":"ed59c56def144c79842338c521c6c51e","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":49}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:34.210 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:34.282 40 INFO tempest.lib.common.rest_client [req-f8968cfa-9fc4-42e3-a21e-caad03a1319d ] Request (SchedulerStatsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/589ff128c9674687acb1ee3254a6003b 0.118s 2020-11-06 18:03:34.282 40 DEBUG tempest.lib.common.rest_client [req-f8968cfa-9fc4-42e3-a21e-caad03a1319d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f8968cfa-9fc4-42e3-a21e-caad03a1319d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/589ff128c9674687acb1ee3254a6003b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:34.304 37 INFO tempest.lib.common.rest_client [req-179f0b9e-3203-4345-9321-d70327aa091c ] Request (NetworksRbacTest:test_update_network): 200 GET http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles 0.093s 2020-11-06 18:03:34.305 37 DEBUG tempest.lib.common.rest_client [req-179f0b9e-3203-4345-9321-d70327aa091c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-179f0b9e-3203-4345-9321-d70327aa091c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:34.373 40 INFO tempest.lib.common.rest_client [req-4edf8e5c-5f89-49b3-a92a-c3dff52247f3 ] Request (MessagesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-11-06 18:03:34.373 40 DEBUG tempest.lib.common.rest_client [req-4edf8e5c-5f89-49b3-a92a-c3dff52247f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4edf8e5c-5f89-49b3-a92a-c3dff52247f3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["5DAQTiTDQEm_OmekH5k8Kw"], "expires_at": "2020-11-06T19:03:34.000000Z", "issued_at": "2020-11-06T18:03:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:34.386 37 INFO tempest.lib.common.rest_client [req-453483a8-2939-4d41-901b-d9855949b247 ] Request (NetworksRbacTest:test_update_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.080s 2020-11-06 18:03:34.386 37 DEBUG tempest.lib.common.rest_client [req-453483a8-2939-4d41-901b-d9855949b247 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-453483a8-2939-4d41-901b-d9855949b247', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "password_expires_at": null}, "audit_ids": ["9Oe1_dTFQDiT0uZwJ2hyww"], "expires_at": "2020-11-06T19:03:34.000000Z", "issued_at": "2020-11-06T18:03:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:34.392 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:34.395 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:34.395 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:34.397 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_network, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:34.397 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:34.399 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_network:router:external, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:34.411 40 INFO tempest.lib.common.rest_client [req-fc784cd3-c7f6-47d9-bde8-3a61072244c8 ] Request (MessagesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:03:34.412 40 DEBUG tempest.lib.common.rest_client [req-fc784cd3-c7f6-47d9-bde8-3a61072244c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fc784cd3-c7f6-47d9-bde8-3a61072244c8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["DkBnhuAuQKeHVf9fbtu97Q"], "expires_at": "2020-11-06T19:03:34.000000Z", "issued_at": "2020-11-06T18:03:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:34.477 40 INFO tempest.lib.common.rest_client [req-ca374c85-5b10-4548-9eef-5e8b38d54e15 ] Request (MessagesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.065s 2020-11-06 18:03:34.478 40 DEBUG tempest.lib.common.rest_client [req-ca374c85-5b10-4548-9eef-5e8b38d54e15 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ca374c85-5b10-4548-9eef-5e8b38d54e15', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:34.539 40 INFO tempest.lib.common.rest_client [req-1839a6db-bd16-4c8c-a8a9-f24edb8509c8 ] Request (MessagesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.060s 2020-11-06 18:03:34.539 40 DEBUG tempest.lib.common.rest_client [req-1839a6db-bd16-4c8c-a8a9-f24edb8509c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-MessagesV3RbacTest-760507370-desc", "domain_id": "default", "name": "tempest-MessagesV3RbacTest-760507370"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '372', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1839a6db-bd16-4c8c-a8a9-f24edb8509c8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "ab3da161f64548ccbbc06a3c44a43601", "name": "tempest-MessagesV3RbacTest-760507370", "domain_id": "default", "description": "tempest-MessagesV3RbacTest-760507370-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/ab3da161f64548ccbbc06a3c44a43601"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:34.639 40 INFO tempest.lib.common.rest_client [req-62d918c6-ffb9-4488-a97c-4a9238d15f2c ] Request (MessagesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.099s 2020-11-06 18:03:34.640 40 DEBUG tempest.lib.common.rest_client [req-62d918c6-ffb9-4488-a97c-4a9238d15f2c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-MessagesV3RbacTest-760507370", "password": "Y5=Fp%8YosGcwHz", "project_id": "ab3da161f64548ccbbc06a3c44a43601", "email": "tempest-MessagesV3RbacTest-595280744@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '390', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-62d918c6-ffb9-4488-a97c-4a9238d15f2c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "ab3da161f64548ccbbc06a3c44a43601", "email": "tempest-MessagesV3RbacTest-595280744@example.com", "id": "dc99fa4bc34c44bcae6bc29c8718a979", "name": "tempest-MessagesV3RbacTest-760507370", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/dc99fa4bc34c44bcae6bc29c8718a979"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:34.657 39 INFO tempest.lib.common.rest_client [req-25102b9b-61f4-4809-8ac8-5d6d4c0c1789 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.242s 2020-11-06 18:03:34.658 39 DEBUG tempest.lib.common.rest_client [req-25102b9b-61f4-4809-8ac8-5d6d4c0c1789 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-25102b9b-61f4-4809-8ac8-5d6d4c0c1789', 'x-compute-request-id': 'req-25102b9b-61f4-4809-8ac8-5d6d4c0c1789', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:34.696 40 INFO tempest.lib.common.rest_client [req-73d4699c-76c1-4780-b35c-8024a700c2c5 ] Request (MessagesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.054s 2020-11-06 18:03:34.696 40 DEBUG tempest.lib.common.rest_client [req-73d4699c-76c1-4780-b35c-8024a700c2c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-73d4699c-76c1-4780-b35c-8024a700c2c5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:34.736 37 INFO tempest.lib.common.rest_client [req-9295c130-9e97-4e72-b60f-93650a482ffc ] Request (NetworksRbacTest:test_update_network_router_external): 201 POST http://172.30.13.94:9696/v2.0/networks 0.336s 2020-11-06 18:03:34.737 37 DEBUG tempest.lib.common.rest_client [req-9295c130-9e97-4e72-b60f-93650a482ffc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-NetworksRbacTest-Network-530483616"}} Response - Headers: {'content-type': 'application/json', 'content-length': '731', 'x-openstack-request-id': 'req-9295c130-9e97-4e72-b60f-93650a482ffc', 'date': 'Fri, 06 Nov 2020 18:03:34 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"5ebc3582-c51c-4ce6-a5c0-27185ff023c2","name":"tempest-NetworksRbacTest-Network-530483616","tenant_id":"ed59c56def144c79842338c521c6c51e","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"ed59c56def144c79842338c521c6c51e","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":62,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:03:34Z","updated_at":"2020-11-06T18:03:34Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:34.738 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:34.742 40 INFO tempest.lib.common.rest_client [req-7a4c8c11-8bb7-4915-9c0b-ad287e1548ee ] Request (MessagesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.045s 2020-11-06 18:03:34.743 40 DEBUG tempest.lib.common.rest_client [req-7a4c8c11-8bb7-4915-9c0b-ad287e1548ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7a4c8c11-8bb7-4915-9c0b-ad287e1548ee', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:34.798 37 INFO tempest.lib.common.rest_client [req-4a5ebcf4-2ecc-44d4-8940-e5e99cc77bb0 ] Request (NetworksRbacTest:test_update_network_router_external): 200 GET http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles 0.060s 2020-11-06 18:03:34.799 37 DEBUG tempest.lib.common.rest_client [req-4a5ebcf4-2ecc-44d4-8940-e5e99cc77bb0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4a5ebcf4-2ecc-44d4-8940-e5e99cc77bb0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:34.810 40 INFO tempest.lib.common.rest_client [req-791dfe39-8a0f-42ae-8a49-6e00b183d345 ] Request (MessagesV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/ab3da161f64548ccbbc06a3c44a43601/users/dc99fa4bc34c44bcae6bc29c8718a979/roles/72a4576c553448cd941b052c1ca0cf2d 0.066s 2020-11-06 18:03:34.810 40 DEBUG tempest.lib.common.rest_client [req-791dfe39-8a0f-42ae-8a49-6e00b183d345 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-791dfe39-8a0f-42ae-8a49-6e00b183d345', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ab3da161f64548ccbbc06a3c44a43601/users/dc99fa4bc34c44bcae6bc29c8718a979/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:34.811 40 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-MessagesV3RbacTest-760507370', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'ab3da161f64548ccbbc06a3c44a43601', 'project_name': 'tempest-MessagesV3RbacTest-760507370', 'tenant_id': 'ab3da161f64548ccbbc06a3c44a43601', 'tenant_name': 'tempest-MessagesV3RbacTest-760507370', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'dc99fa4bc34c44bcae6bc29c8718a979'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:34.811 40 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-MessagesV3RbacTest-760507370', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'ab3da161f64548ccbbc06a3c44a43601', 'project_name': 'tempest-MessagesV3RbacTest-760507370', 'tenant_id': 'ab3da161f64548ccbbc06a3c44a43601', 'tenant_name': 'tempest-MessagesV3RbacTest-760507370', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'dc99fa4bc34c44bcae6bc29c8718a979'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:34.890 37 INFO tempest.lib.common.rest_client [req-e4ec1e0d-a41f-4582-9e35-608b8768ed5a ] Request (NetworksRbacTest:test_update_network_router_external): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-11-06 18:03:34.891 37 DEBUG tempest.lib.common.rest_client [req-e4ec1e0d-a41f-4582-9e35-608b8768ed5a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e4ec1e0d-a41f-4582-9e35-608b8768ed5a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "password_expires_at": null}, "audit_ids": ["74iUNLDMR9CsZWGt5ihw4Q"], "expires_at": "2020-11-06T19:03:34.000000Z", "issued_at": "2020-11-06T18:03:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:34.928 40 INFO tempest.lib.common.rest_client [req-cf26434a-6986-4f8f-a026-60ddb2260ba9 ] Request (MessagesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.108s 2020-11-06 18:03:34.929 40 DEBUG tempest.lib.common.rest_client [req-cf26434a-6986-4f8f-a026-60ddb2260ba9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6565', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cf26434a-6986-4f8f-a026-60ddb2260ba9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "dc99fa4bc34c44bcae6bc29c8718a979", "name": "tempest-MessagesV3RbacTest-760507370", "password_expires_at": null}, "audit_ids": ["42kr5yBVRrW1_tSuqg9row"], "expires_at": "2020-11-06T19:03:34.000000Z", "issued_at": "2020-11-06T18:03:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ab3da161f64548ccbbc06a3c44a43601", "name": "tempest-MessagesV3RbacTest-760507370"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:35.017 40 INFO tempest.lib.common.rest_client [req-ca6dd163-1557-4c48-b812-f3a20ff89ce8 ] Request (MessagesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-11-06 18:03:35.018 40 DEBUG tempest.lib.common.rest_client [req-ca6dd163-1557-4c48-b812-f3a20ff89ce8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ca6dd163-1557-4c48-b812-f3a20ff89ce8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["x1Nde6ODRRSerh8iXiYeIw"], "expires_at": "2020-11-06T19:03:34.000000Z", "issued_at": "2020-11-06T18:03:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:35.063 40 INFO tempest.lib.common.rest_client [req-41008c46-abe3-463c-8a06-e166a70777c1 ] Request (MessagesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:03:35.064 40 DEBUG tempest.lib.common.rest_client [req-41008c46-abe3-463c-8a06-e166a70777c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-41008c46-abe3-463c-8a06-e166a70777c1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["vcuu9b8ERfem8bQYSh1X9A"], "expires_at": "2020-11-06T19:03:35.000000Z", "issued_at": "2020-11-06T18:03:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:35.113 40 INFO tempest.lib.common.rest_client [req-7d9b6e9c-2ce0-4846-b5bc-c24110c56ebb ] Request (MessagesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.048s 2020-11-06 18:03:35.113 40 DEBUG tempest.lib.common.rest_client [req-7d9b6e9c-2ce0-4846-b5bc-c24110c56ebb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7d9b6e9c-2ce0-4846-b5bc-c24110c56ebb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:35.166 40 INFO tempest.lib.common.rest_client [req-edf6bd43-2587-4c7c-b3c2-8c44442b3696 ] Request (MessagesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.052s 2020-11-06 18:03:35.167 40 DEBUG tempest.lib.common.rest_client [req-edf6bd43-2587-4c7c-b3c2-8c44442b3696 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-edf6bd43-2587-4c7c-b3c2-8c44442b3696', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:35.167 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:03:35.168 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:35.228 40 INFO tempest.lib.common.rest_client [req-cfa30e37-c1fc-4075-abbf-7d4366cf8401 ] Request (MessagesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/ab3da161f64548ccbbc06a3c44a43601/users/dc99fa4bc34c44bcae6bc29c8718a979/roles 0.059s 2020-11-06 18:03:35.228 40 DEBUG tempest.lib.common.rest_client [req-cfa30e37-c1fc-4075-abbf-7d4366cf8401 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cfa30e37-c1fc-4075-abbf-7d4366cf8401', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ab3da161f64548ccbbc06a3c44a43601/users/dc99fa4bc34c44bcae6bc29c8718a979/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ab3da161f64548ccbbc06a3c44a43601/users/dc99fa4bc34c44bcae6bc29c8718a979/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:35.288 40 INFO tempest.lib.common.rest_client [req-de73fcae-6cc9-437c-ae00-1ee54085131b ] Request (MessagesV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/ab3da161f64548ccbbc06a3c44a43601/users/dc99fa4bc34c44bcae6bc29c8718a979/roles/72a4576c553448cd941b052c1ca0cf2d 0.058s 2020-11-06 18:03:35.288 40 DEBUG tempest.lib.common.rest_client [req-de73fcae-6cc9-437c-ae00-1ee54085131b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-de73fcae-6cc9-437c-ae00-1ee54085131b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ab3da161f64548ccbbc06a3c44a43601/users/dc99fa4bc34c44bcae6bc29c8718a979/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:35.290 38 INFO tempest.lib.common.rest_client [req-b70e5716-4ae7-407b-b322-cc22272e6f92 ] Request (SnapshotsActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-11-06 18:03:35.290 38 DEBUG tempest.lib.common.rest_client [req-b70e5716-4ae7-407b-b322-cc22272e6f92 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b70e5716-4ae7-407b-b322-cc22272e6f92', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c0192fceca894b0d97a9d2aaa0f9eb23", "name": "tempest-SnapshotsActionsV3RbacTest-1910342686", "password_expires_at": null}, "audit_ids": ["kBVrU1kKTTWTJkWNZF51iw"], "expires_at": "2020-11-06T19:03:35.000000Z", "issued_at": "2020-11-06T18:03:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3b4bab58d3e54d1dac1516c8a6695483", "name": "tempest-SnapshotsActionsV3RbacTest-1910342686"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:35.377 37 INFO tempest.lib.common.rest_client [req-b23b748b-8341-46cd-ad62-55b0815efa22 ] Request (NetworksRbacTest:test_update_network_router_external): 200 PUT http://172.30.13.94:9696/v2.0/networks/5ebc3582-c51c-4ce6-a5c0-27185ff023c2 0.485s 2020-11-06 18:03:35.378 37 DEBUG tempest.lib.common.rest_client [req-b23b748b-8341-46cd-ad62-55b0815efa22 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"router:external": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '730', 'x-openstack-request-id': 'req-b23b748b-8341-46cd-ad62-55b0815efa22', 'date': 'Fri, 06 Nov 2020 18:03:35 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/5ebc3582-c51c-4ce6-a5c0-27185ff023c2'} Body: b'{"network":{"id":"5ebc3582-c51c-4ce6-a5c0-27185ff023c2","name":"tempest-NetworksRbacTest-Network-530483616","tenant_id":"ed59c56def144c79842338c521c6c51e","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"availability_zone_hints":[],"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":true,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"is_default":false,"tags":[],"created_at":"2020-11-06T18:03:34Z","updated_at":"2020-11-06T18:03:35Z","revision_number":2,"project_id":"ed59c56def144c79842338c521c6c51e","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":62}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:35.379 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:35.401 40 INFO tempest.lib.common.rest_client [req-ca3f0e44-f34d-47e1-b8ab-76d144efe9c0 ] Request (MessagesV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/ab3da161f64548ccbbc06a3c44a43601/users/dc99fa4bc34c44bcae6bc29c8718a979/roles/a629c95d64b3416fb80ae90af4f69c05 0.111s 2020-11-06 18:03:35.401 40 DEBUG tempest.lib.common.rest_client [req-ca3f0e44-f34d-47e1-b8ab-76d144efe9c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ca3f0e44-f34d-47e1-b8ab-76d144efe9c0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ab3da161f64548ccbbc06a3c44a43601/users/dc99fa4bc34c44bcae6bc29c8718a979/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:35.506 37 INFO tempest.lib.common.rest_client [req-19188b8a-07ee-40ff-9d96-38eaa8662fe4 ] Request (NetworksRbacTest:test_update_network_router_external): 200 GET http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles 0.127s 2020-11-06 18:03:35.507 37 DEBUG tempest.lib.common.rest_client [req-19188b8a-07ee-40ff-9d96-38eaa8662fe4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-19188b8a-07ee-40ff-9d96-38eaa8662fe4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:35.590 37 INFO tempest.lib.common.rest_client [req-8fb17e77-648a-4b51-8fdf-f071b0b425c5 ] Request (NetworksRbacTest:test_update_network_router_external): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 18:03:35.591 37 DEBUG tempest.lib.common.rest_client [req-8fb17e77-648a-4b51-8fdf-f071b0b425c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8fb17e77-648a-4b51-8fdf-f071b0b425c5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "password_expires_at": null}, "audit_ids": ["I8YkqCHMSaiumK96TAT0hQ"], "expires_at": "2020-11-06T19:03:35.000000Z", "issued_at": "2020-11-06T18:03:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:35.594 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:35.598 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:35.598 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:35.600 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_network, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:35.600 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:35.602 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_network:shared, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:35.603 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:35.654 37 INFO tempest.lib.common.rest_client [req-bfa37a45-4b05-4b7c-8330-abee94677372 ] Request (NetworksRbacTest:test_update_network_shared): 200 GET http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles 0.050s 2020-11-06 18:03:35.654 37 DEBUG tempest.lib.common.rest_client [req-bfa37a45-4b05-4b7c-8330-abee94677372 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bfa37a45-4b05-4b7c-8330-abee94677372', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:35.695 37 INFO tempest.lib.common.rest_client [req-1666b6aa-f13d-435f-a3dd-c492c11f0b05 ] Request (NetworksRbacTest:test_update_network_shared): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:03:35.695 37 DEBUG tempest.lib.common.rest_client [req-1666b6aa-f13d-435f-a3dd-c492c11f0b05 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1666b6aa-f13d-435f-a3dd-c492c11f0b05', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "password_expires_at": null}, "audit_ids": ["jxRQb2AGRgC0Eja1jNEZQg"], "expires_at": "2020-11-06T19:03:35.000000Z", "issued_at": "2020-11-06T18:03:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:35.751 38 INFO tempest.lib.common.rest_client [req-190d4a01-ce6a-4566-a35a-4832192c5200 ] Request (SnapshotsActionsV3RbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/volumes 0.459s 2020-11-06 18:03:35.751 38 DEBUG tempest.lib.common.rest_client [req-190d4a01-ce6a-4566-a35a-4832192c5200 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-SnapshotsActionsV3RbacTest-Volume-341272005"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-190d4a01-ce6a-4566-a35a-4832192c5200', 'content-length': '846', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-190d4a01-ce6a-4566-a35a-4832192c5200', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/volumes'} Body: b'{"volume": {"id": "bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:03:36.000000", "updated_at": null, "name": "tempest-SnapshotsActionsV3RbacTest-Volume-341272005", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/volumes/bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3b4bab58d3e54d1dac1516c8a6695483/volumes/bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6"}], "user_id": "c0192fceca894b0d97a9d2aaa0f9eb23", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:35.832 38 INFO tempest.lib.common.rest_client [req-8690001d-76b4-4150-8a9f-c604cbbab590 ] Request (SnapshotsActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/volumes/bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6 0.071s 2020-11-06 18:03:35.832 38 DEBUG tempest.lib.common.rest_client [req-8690001d-76b4-4150-8a9f-c604cbbab590 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-8690001d-76b4-4150-8a9f-c604cbbab590', 'content-length': '1025', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8690001d-76b4-4150-8a9f-c604cbbab590', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/volumes/bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6'} Body: b'{"volume": {"id": "bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:03:36.000000", "updated_at": null, "name": "tempest-SnapshotsActionsV3RbacTest-Volume-341272005", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/volumes/bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3b4bab58d3e54d1dac1516c8a6695483/volumes/bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6"}], "user_id": "c0192fceca894b0d97a9d2aaa0f9eb23", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": null, "os-vol-tenant-attr:tenant_id": "3b4bab58d3e54d1dac1516c8a6695483"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:35.863 39 INFO tempest.lib.common.rest_client [req-67c6fcce-0ec7-435f-8e81-975af9b66bd5 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.188s 2020-11-06 18:03:35.864 39 DEBUG tempest.lib.common.rest_client [req-67c6fcce-0ec7-435f-8e81-975af9b66bd5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-67c6fcce-0ec7-435f-8e81-975af9b66bd5', 'x-compute-request-id': 'req-67c6fcce-0ec7-435f-8e81-975af9b66bd5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:36.260 37 INFO tempest.lib.common.rest_client [req-96bc4390-c3f2-496e-b580-53555299d8f1 ] Request (NetworksRbacTest:test_update_network_shared): 200 PUT http://172.30.13.94:9696/v2.0/networks/21087cdc-18ee-4a54-a645-561312615479 0.563s 2020-11-06 18:03:36.260 37 DEBUG tempest.lib.common.rest_client [req-96bc4390-c3f2-496e-b580-53555299d8f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"shared": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '754', 'x-openstack-request-id': 'req-96bc4390-c3f2-496e-b580-53555299d8f1', 'date': 'Fri, 06 Nov 2020 18:03:36 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/21087cdc-18ee-4a54-a645-561312615479'} Body: b'{"network":{"id":"21087cdc-18ee-4a54-a645-561312615479","name":"tempest-NetworksRbacTest-Network-18667912","tenant_id":"ed59c56def144c79842338c521c6c51e","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["ffa8a86f-cd0d-49a5-bbfa-72cdd54b7ee6"],"shared":true,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:03:23Z","updated_at":"2020-11-06T18:03:36Z","revision_number":4,"project_id":"ed59c56def144c79842338c521c6c51e","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":49}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:36.261 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:36.355 37 INFO tempest.lib.common.rest_client [req-866b393c-8cac-43de-b87b-a3a26f243eb6 ] Request (NetworksRbacTest:test_update_network_shared): 200 GET http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles 0.093s 2020-11-06 18:03:36.355 37 DEBUG tempest.lib.common.rest_client [req-866b393c-8cac-43de-b87b-a3a26f243eb6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-866b393c-8cac-43de-b87b-a3a26f243eb6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e/users/12f37a7905e84601b33c14fd5eb519b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:36.441 37 INFO tempest.lib.common.rest_client [req-907b0b84-0843-4871-a75b-4897656f4740 ] Request (NetworksRbacTest:test_update_network_shared): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:03:36.442 37 DEBUG tempest.lib.common.rest_client [req-907b0b84-0843-4871-a75b-4897656f4740 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-907b0b84-0843-4871-a75b-4897656f4740', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "12f37a7905e84601b33c14fd5eb519b5", "name": "tempest-NetworksRbacTest-1207245799", "password_expires_at": null}, "audit_ids": ["LjjoJ5IASE2iN4onr9-imw"], "expires_at": "2020-11-06T19:03:36.000000Z", "issued_at": "2020-11-06T18:03:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ed59c56def144c79842338c521c6c51e", "name": "tempest-NetworksRbacTest-1207245799"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ed59c56def144c79842338c521c6c51e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:36.486 40 INFO tempest.lib.common.rest_client [req-4e06c20d-a22d-437a-880b-6b0fa64fe7e1 ] Request (MessagesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 18:03:36.487 40 DEBUG tempest.lib.common.rest_client [req-4e06c20d-a22d-437a-880b-6b0fa64fe7e1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4e06c20d-a22d-437a-880b-6b0fa64fe7e1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "dc99fa4bc34c44bcae6bc29c8718a979", "name": "tempest-MessagesV3RbacTest-760507370", "password_expires_at": null}, "audit_ids": ["RwJBA4xmRLK8oJmCNUYeJw"], "expires_at": "2020-11-06T19:03:36.000000Z", "issued_at": "2020-11-06T18:03:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ab3da161f64548ccbbc06a3c44a43601", "name": "tempest-MessagesV3RbacTest-760507370"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:36.490 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:36.493 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: message:delete, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:36.753 40 INFO tempest.lib.common.rest_client [req-d276bfae-c824-4343-9514-62a6461d9ec5 ] Request (MessagesV3RbacTest:test_delete_message): 200 POST http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/types 0.259s 2020-11-06 18:03:36.754 40 DEBUG tempest.lib.common.rest_client [req-d276bfae-c824-4343-9514-62a6461d9ec5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-MessagesV3RbacTest-volume-type-54281547", "extra_specs": {"storage_protocol": "tempest-MessagesV3RbacTest-storage_protocol-1246050179", "vendor_name": "tempest-MessagesV3RbacTest-vendor_name-956781614"}}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d276bfae-c824-4343-9514-62a6461d9ec5', 'content-length': '365', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d276bfae-c824-4343-9514-62a6461d9ec5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/types'} Body: b'{"volume_type": {"id": "112d5318-4e73-4e8e-a497-60cd8a9f8571", "name": "tempest-MessagesV3RbacTest-volume-type-54281547", "is_public": true, "extra_specs": {"storage_protocol": "tempest-MessagesV3RbacTest-storage_protocol-1246050179", "vendor_name": "tempest-MessagesV3RbacTest-vendor_name-956781614"}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:36.926 38 INFO tempest.lib.common.rest_client [req-df10ac57-823c-4337-81e9-82938deb77dc ] Request (SnapshotsActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/volumes/bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6 0.078s 2020-11-06 18:03:36.927 38 DEBUG tempest.lib.common.rest_client [req-df10ac57-823c-4337-81e9-82938deb77dc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-df10ac57-823c-4337-81e9-82938deb77dc', 'content-length': '1069', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-df10ac57-823c-4337-81e9-82938deb77dc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/volumes/bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6'} Body: b'{"volume": {"id": "bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:03:36.000000", "updated_at": "2020-11-06T18:03:36.000000", "name": "tempest-SnapshotsActionsV3RbacTest-Volume-341272005", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/volumes/bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3b4bab58d3e54d1dac1516c8a6695483/volumes/bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6"}], "user_id": "c0192fceca894b0d97a9d2aaa0f9eb23", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3b4bab58d3e54d1dac1516c8a6695483"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:36.943 38 INFO tempest.common.waiters [-] volume bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6 reached available after waiting for 1.943148 seconds 2020-11-06 18:03:37.061 40 INFO tempest.lib.common.rest_client [req-21cff3b3-1127-4ff6-ac78-3cb8c5a655c5 ] Request (MessagesV3RbacTest:test_delete_message): 202 POST http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/volumes 0.301s 2020-11-06 18:03:37.061 40 DEBUG tempest.lib.common.rest_client [req-21cff3b3-1127-4ff6-ac78-3cb8c5a655c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.3', 'X-Auth-Token': ''} Body: {"volume": {"volume_type": "112d5318-4e73-4e8e-a497-60cd8a9f8571", "size": 1, "name": "tempest-MessagesV3RbacTest-Volume-2141607771"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-21cff3b3-1127-4ff6-ac78-3cb8c5a655c5', 'content-length': '882', 'openstack-api-version': 'volume 3.3', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-21cff3b3-1127-4ff6-ac78-3cb8c5a655c5', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/volumes'} Body: b'{"volume": {"id": "416dcb4a-972c-4913-ba8c-e2f6b40719d8", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:03:37.000000", "updated_at": null, "name": "tempest-MessagesV3RbacTest-Volume-2141607771", "description": null, "volume_type": "tempest-MessagesV3RbacTest-volume-type-54281547", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/volumes/416dcb4a-972c-4913-ba8c-e2f6b40719d8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ab3da161f64548ccbbc06a3c44a43601/volumes/416dcb4a-972c-4913-ba8c-e2f6b40719d8"}], "user_id": "dc99fa4bc34c44bcae6bc29c8718a979", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:37.113 38 INFO tempest.lib.common.rest_client [req-84e966ae-b8df-4ac7-9c3c-689f18bac322 ] Request (SnapshotsActionsV3RbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots 0.170s 2020-11-06 18:03:37.114 38 DEBUG tempest.lib.common.rest_client [req-84e966ae-b8df-4ac7-9c3c-689f18bac322 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"snapshot": {"volume_id": "bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6", "name": "tempest-SnapshotsActionsV3RbacTest-Snapshot-1827335522"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-84e966ae-b8df-4ac7-9c3c-689f18bac322', 'content-length': '313', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-84e966ae-b8df-4ac7-9c3c-689f18bac322', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots'} Body: b'{"snapshot": {"id": "fddfacea-0264-4d9b-8918-261e13690043", "created_at": "2020-11-06T18:03:37.046098", "updated_at": null, "name": "tempest-SnapshotsActionsV3RbacTest-Snapshot-1827335522", "description": null, "volume_id": "bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6", "status": "creating", "size": 1, "metadata": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:37.150 40 INFO tempest.lib.common.rest_client [req-49af08bb-8135-4284-959a-f8378820711b ] Request (MessagesV3RbacTest:test_delete_message): 200 GET http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/volumes/416dcb4a-972c-4913-ba8c-e2f6b40719d8 0.075s 2020-11-06 18:03:37.150 40 DEBUG tempest.lib.common.rest_client [req-49af08bb-8135-4284-959a-f8378820711b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.3', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-49af08bb-8135-4284-959a-f8378820711b', 'content-length': '1082', 'openstack-api-version': 'volume 3.3', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-49af08bb-8135-4284-959a-f8378820711b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/volumes/416dcb4a-972c-4913-ba8c-e2f6b40719d8'} Body: b'{"volume": {"id": "416dcb4a-972c-4913-ba8c-e2f6b40719d8", "status": "error", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:03:37.000000", "updated_at": "2020-11-06T18:03:37.000000", "name": "tempest-MessagesV3RbacTest-Volume-2141607771", "description": null, "volume_type": "tempest-MessagesV3RbacTest-volume-type-54281547", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/volumes/416dcb4a-972c-4913-ba8c-e2f6b40719d8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ab3da161f64548ccbbc06a3c44a43601/volumes/416dcb4a-972c-4913-ba8c-e2f6b40719d8"}], "user_id": "dc99fa4bc34c44bcae6bc29c8718a979", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": null, "os-vol-tenant-attr:tenant_id": "ab3da161f64548ccbbc06a3c44a43601"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:37.162 40 INFO tempest.common.waiters [-] volume 416dcb4a-972c-4913-ba8c-e2f6b40719d8 reached error after waiting for 0.162318 seconds 2020-11-06 18:03:37.167 38 INFO tempest.lib.common.rest_client [req-270dede7-07c5-4f0b-81f1-933e29d3b419 ] Request (SnapshotsActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/fddfacea-0264-4d9b-8918-261e13690043 0.048s 2020-11-06 18:03:37.168 38 DEBUG tempest.lib.common.rest_client [req-270dede7-07c5-4f0b-81f1-933e29d3b419 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-270dede7-07c5-4f0b-81f1-933e29d3b419', 'content-length': '445', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-270dede7-07c5-4f0b-81f1-933e29d3b419', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/fddfacea-0264-4d9b-8918-261e13690043'} Body: b'{"snapshot": {"id": "fddfacea-0264-4d9b-8918-261e13690043", "created_at": "2020-11-06T18:03:37.000000", "updated_at": null, "name": "tempest-SnapshotsActionsV3RbacTest-Snapshot-1827335522", "description": null, "volume_id": "bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6", "status": "creating", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "3b4bab58d3e54d1dac1516c8a6695483", "os-extended-snapshot-attributes:progress": "0%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:37.185 40 INFO tempest.lib.common.rest_client [req-f9029088-c345-4c73-97e5-6bf3d4cd3c57 ] Request (MessagesV3RbacTest:test_delete_message): 200 GET http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/messages 0.022s 2020-11-06 18:03:37.186 40 DEBUG tempest.lib.common.rest_client [req-f9029088-c345-4c73-97e5-6bf3d4cd3c57 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.3', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-f9029088-c345-4c73-97e5-6bf3d4cd3c57', 'content-length': '1442', 'openstack-api-version': 'volume 3.3', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f9029088-c345-4c73-97e5-6bf3d4cd3c57', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/messages'} Body: b'{"messages": [{"id": "5c1c7254-ab5a-4c67-a972-6e7ec868a72e", "event_id": "VOLUME_VOLUME_001_003", "user_message": "schedule allocate volume:Could not find any available weighted backend.", "message_level": "ERROR", "created_at": "2020-11-06T18:03:37.000000", "guaranteed_until": "2020-12-06T18:03:37.000000", "request_id": "req-21cff3b3-1127-4ff6-ac78-3cb8c5a655c5", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/messages/5c1c7254-ab5a-4c67-a972-6e7ec868a72e"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ab3da161f64548ccbbc06a3c44a43601/messages/5c1c7254-ab5a-4c67-a972-6e7ec868a72e"}], "resource_type": "VOLUME", "resource_uuid": "416dcb4a-972c-4913-ba8c-e2f6b40719d8"}, {"id": "10c9e676-902f-49f7-99b6-e47fb3a16e51", "event_id": "VOLUME_VOLUME_001_001", "user_message": "schedule allocate volume:An unknown error occurred.", "message_level": "ERROR", "created_at": "2020-10-07T12:09:04.000000", "guaranteed_until": "2020-11-06T12:09:04.000000", "request_id": "req-1864b16e-8a1e-407f-b5f7-8942fab0b32b", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/messages/10c9e676-902f-49f7-99b6-e47fb3a16e51"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ab3da161f64548ccbbc06a3c44a43601/messages/10c9e676-902f-49f7-99b6-e47fb3a16e51"}], "resource_type": "VOLUME", "resource_uuid": "0d29744c-47d9-4fb8-a4a9-5976c89a6d42"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:37.191 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:37.334 40 INFO tempest.lib.common.rest_client [req-78863543-6c28-4ffb-85f3-f6f83adb42bb ] Request (MessagesV3RbacTest:test_delete_message): 200 GET http://172.30.13.94/identity/v3/projects/ab3da161f64548ccbbc06a3c44a43601/users/dc99fa4bc34c44bcae6bc29c8718a979/roles 0.142s 2020-11-06 18:03:37.335 40 DEBUG tempest.lib.common.rest_client [req-78863543-6c28-4ffb-85f3-f6f83adb42bb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-78863543-6c28-4ffb-85f3-f6f83adb42bb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ab3da161f64548ccbbc06a3c44a43601/users/dc99fa4bc34c44bcae6bc29c8718a979/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ab3da161f64548ccbbc06a3c44a43601/users/dc99fa4bc34c44bcae6bc29c8718a979/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:37.415 40 INFO tempest.lib.common.rest_client [req-14dc07fb-605a-4cd5-9d8f-8f9379459eba ] Request (MessagesV3RbacTest:test_delete_message): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.080s 2020-11-06 18:03:37.416 40 DEBUG tempest.lib.common.rest_client [req-14dc07fb-605a-4cd5-9d8f-8f9379459eba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-14dc07fb-605a-4cd5-9d8f-8f9379459eba', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "dc99fa4bc34c44bcae6bc29c8718a979", "name": "tempest-MessagesV3RbacTest-760507370", "password_expires_at": null}, "audit_ids": ["BMCiYD6ISZ28vxeZBEnd3g"], "expires_at": "2020-11-06T19:03:37.000000Z", "issued_at": "2020-11-06T18:03:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ab3da161f64548ccbbc06a3c44a43601", "name": "tempest-MessagesV3RbacTest-760507370"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:37.550 40 INFO tempest.lib.common.rest_client [req-b61e3edf-63d2-4d41-a4b3-23c9e6b830d8 ] Request (MessagesV3RbacTest:test_delete_message): 204 DELETE http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/messages/5c1c7254-ab5a-4c67-a972-6e7ec868a72e 0.133s 2020-11-06 18:03:37.551 40 DEBUG tempest.lib.common.rest_client [req-b61e3edf-63d2-4d41-a4b3-23c9e6b830d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.3', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.3', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b61e3edf-63d2-4d41-a4b3-23c9e6b830d8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/messages/5c1c7254-ab5a-4c67-a972-6e7ec868a72e'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:37.551 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:37.649 40 INFO tempest.lib.common.rest_client [req-bc127c38-e673-4ffd-ba90-c7d7cfdbc3f7 ] Request (MessagesV3RbacTest:test_delete_message): 200 GET http://172.30.13.94/identity/v3/projects/ab3da161f64548ccbbc06a3c44a43601/users/dc99fa4bc34c44bcae6bc29c8718a979/roles 0.097s 2020-11-06 18:03:37.650 40 DEBUG tempest.lib.common.rest_client [req-bc127c38-e673-4ffd-ba90-c7d7cfdbc3f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bc127c38-e673-4ffd-ba90-c7d7cfdbc3f7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ab3da161f64548ccbbc06a3c44a43601/users/dc99fa4bc34c44bcae6bc29c8718a979/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ab3da161f64548ccbbc06a3c44a43601/users/dc99fa4bc34c44bcae6bc29c8718a979/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:37.715 40 INFO tempest.lib.common.rest_client [req-beb87e65-3995-4106-b8b3-6ee31970d9a3 ] Request (MessagesV3RbacTest:test_delete_message): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.064s 2020-11-06 18:03:37.715 40 DEBUG tempest.lib.common.rest_client [req-beb87e65-3995-4106-b8b3-6ee31970d9a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-beb87e65-3995-4106-b8b3-6ee31970d9a3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "dc99fa4bc34c44bcae6bc29c8718a979", "name": "tempest-MessagesV3RbacTest-760507370", "password_expires_at": null}, "audit_ids": ["A9JBgSJ3Qh2Fm0_rPICrWw"], "expires_at": "2020-11-06T19:03:37.000000Z", "issued_at": "2020-11-06T18:03:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ab3da161f64548ccbbc06a3c44a43601", "name": "tempest-MessagesV3RbacTest-760507370"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:37.831 40 INFO tempest.lib.common.rest_client [req-933f6da2-d55e-4028-b5e8-33e6aecdee77 ] Request (MessagesV3RbacTest:test_delete_message): 404 GET http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/messages/5c1c7254-ab5a-4c67-a972-6e7ec868a72e 0.115s 2020-11-06 18:03:37.832 40 DEBUG tempest.lib.common.rest_client [req-933f6da2-d55e-4028-b5e8-33e6aecdee77 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.3', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.3', 'vary': 'OpenStack-API-Version', 'content-length': '110', 'content-type': 'application/json', 'x-compute-request-id': 'req-933f6da2-d55e-4028-b5e8-33e6aecdee77', 'x-openstack-request-id': 'req-933f6da2-d55e-4028-b5e8-33e6aecdee77', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/messages/5c1c7254-ab5a-4c67-a972-6e7ec868a72e'} Body: b'{"itemNotFound": {"code": 404, "message": "Message 5c1c7254-ab5a-4c67-a972-6e7ec868a72e could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:37.848 40 INFO tempest.lib.common.rest_client [req-496c77d8-8ef5-4d32-bf89-ca3d63429d7e ] Request (MessagesV3RbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/messages/5c1c7254-ab5a-4c67-a972-6e7ec868a72e 0.015s 2020-11-06 18:03:37.848 40 DEBUG tempest.lib.common.rest_client [req-496c77d8-8ef5-4d32-bf89-ca3d63429d7e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.3', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.3', 'vary': 'OpenStack-API-Version', 'content-length': '110', 'content-type': 'application/json', 'x-compute-request-id': 'req-496c77d8-8ef5-4d32-bf89-ca3d63429d7e', 'x-openstack-request-id': 'req-496c77d8-8ef5-4d32-bf89-ca3d63429d7e', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/messages/5c1c7254-ab5a-4c67-a972-6e7ec868a72e'} Body: b'{"itemNotFound": {"code": 404, "message": "Message 5c1c7254-ab5a-4c67-a972-6e7ec868a72e could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:37.850 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:37.852 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: message:get_all, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:37.852 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:37.952 40 INFO tempest.lib.common.rest_client [req-4819c69f-0842-4201-9844-7caae3db0947 ] Request (MessagesV3RbacTest:test_list_messages): 200 GET http://172.30.13.94/identity/v3/projects/ab3da161f64548ccbbc06a3c44a43601/users/dc99fa4bc34c44bcae6bc29c8718a979/roles 0.099s 2020-11-06 18:03:37.953 40 DEBUG tempest.lib.common.rest_client [req-4819c69f-0842-4201-9844-7caae3db0947 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4819c69f-0842-4201-9844-7caae3db0947', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ab3da161f64548ccbbc06a3c44a43601/users/dc99fa4bc34c44bcae6bc29c8718a979/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ab3da161f64548ccbbc06a3c44a43601/users/dc99fa4bc34c44bcae6bc29c8718a979/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:37.987 40 INFO tempest.lib.common.rest_client [req-3dfc59c1-bf0b-4758-9d0c-3869cdcd025c ] Request (MessagesV3RbacTest:test_list_messages): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:03:37.988 40 DEBUG tempest.lib.common.rest_client [req-3dfc59c1-bf0b-4758-9d0c-3869cdcd025c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3dfc59c1-bf0b-4758-9d0c-3869cdcd025c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "dc99fa4bc34c44bcae6bc29c8718a979", "name": "tempest-MessagesV3RbacTest-760507370", "password_expires_at": null}, "audit_ids": ["eRPGPJdQSDqAm3q8Cmt7qA"], "expires_at": "2020-11-06T19:03:37.000000Z", "issued_at": "2020-11-06T18:03:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ab3da161f64548ccbbc06a3c44a43601", "name": "tempest-MessagesV3RbacTest-760507370"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:38.081 40 INFO tempest.lib.common.rest_client [req-fa40bef6-5917-4659-aace-6efdf981e004 ] Request (MessagesV3RbacTest:test_list_messages): 200 GET http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/messages 0.092s 2020-11-06 18:03:38.081 40 DEBUG tempest.lib.common.rest_client [req-fa40bef6-5917-4659-aace-6efdf981e004 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.3', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-fa40bef6-5917-4659-aace-6efdf981e004', 'content-length': '718', 'openstack-api-version': 'volume 3.3', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-fa40bef6-5917-4659-aace-6efdf981e004', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/messages'} Body: b'{"messages": [{"id": "10c9e676-902f-49f7-99b6-e47fb3a16e51", "event_id": "VOLUME_VOLUME_001_001", "user_message": "schedule allocate volume:An unknown error occurred.", "message_level": "ERROR", "created_at": "2020-10-07T12:09:04.000000", "guaranteed_until": "2020-11-06T12:09:04.000000", "request_id": "req-1864b16e-8a1e-407f-b5f7-8942fab0b32b", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/messages/10c9e676-902f-49f7-99b6-e47fb3a16e51"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ab3da161f64548ccbbc06a3c44a43601/messages/10c9e676-902f-49f7-99b6-e47fb3a16e51"}], "resource_type": "VOLUME", "resource_uuid": "0d29744c-47d9-4fb8-a4a9-5976c89a6d42"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:38.087 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:38.108 39 INFO tempest.lib.common.rest_client [req-51f0d31a-88af-4a24-b330-3eb605b0ed72 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 1.226s 2020-11-06 18:03:38.109 39 DEBUG tempest.lib.common.rest_client [req-51f0d31a-88af-4a24-b330-3eb605b0ed72 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-51f0d31a-88af-4a24-b330-3eb605b0ed72', 'x-compute-request-id': 'req-51f0d31a-88af-4a24-b330-3eb605b0ed72', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:38.146 40 INFO tempest.lib.common.rest_client [req-11fe5a88-bcd2-4a50-81a7-eeaf152d0c99 ] Request (MessagesV3RbacTest:test_list_messages): 200 GET http://172.30.13.94/identity/v3/projects/ab3da161f64548ccbbc06a3c44a43601/users/dc99fa4bc34c44bcae6bc29c8718a979/roles 0.059s 2020-11-06 18:03:38.147 40 DEBUG tempest.lib.common.rest_client [req-11fe5a88-bcd2-4a50-81a7-eeaf152d0c99 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-11fe5a88-bcd2-4a50-81a7-eeaf152d0c99', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ab3da161f64548ccbbc06a3c44a43601/users/dc99fa4bc34c44bcae6bc29c8718a979/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ab3da161f64548ccbbc06a3c44a43601/users/dc99fa4bc34c44bcae6bc29c8718a979/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:38.185 40 INFO tempest.lib.common.rest_client [req-06b739b3-da9d-4d76-aade-ce8f5fb74ac6 ] Request (MessagesV3RbacTest:test_list_messages): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:03:38.186 40 DEBUG tempest.lib.common.rest_client [req-06b739b3-da9d-4d76-aade-ce8f5fb74ac6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-06b739b3-da9d-4d76-aade-ce8f5fb74ac6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "dc99fa4bc34c44bcae6bc29c8718a979", "name": "tempest-MessagesV3RbacTest-760507370", "password_expires_at": null}, "audit_ids": ["Ha1UpdcDQB-3yq1siyadCQ"], "expires_at": "2020-11-06T19:03:38.000000Z", "issued_at": "2020-11-06T18:03:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ab3da161f64548ccbbc06a3c44a43601", "name": "tempest-MessagesV3RbacTest-760507370"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:38.189 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:38.192 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: message:get, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:38.207 38 INFO tempest.lib.common.rest_client [req-ba970164-5609-4005-8af8-f5779a3fd1b1 ] Request (SnapshotsActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/fddfacea-0264-4d9b-8918-261e13690043 0.033s 2020-11-06 18:03:38.208 38 DEBUG tempest.lib.common.rest_client [req-ba970164-5609-4005-8af8-f5779a3fd1b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ba970164-5609-4005-8af8-f5779a3fd1b1', 'content-length': '445', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ba970164-5609-4005-8af8-f5779a3fd1b1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/fddfacea-0264-4d9b-8918-261e13690043'} Body: b'{"snapshot": {"id": "fddfacea-0264-4d9b-8918-261e13690043", "created_at": "2020-11-06T18:03:37.000000", "updated_at": null, "name": "tempest-SnapshotsActionsV3RbacTest-Snapshot-1827335522", "description": null, "volume_id": "bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6", "status": "creating", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "3b4bab58d3e54d1dac1516c8a6695483", "os-extended-snapshot-attributes:progress": "0%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:38.309 40 INFO tempest.lib.common.rest_client [req-f57c63bc-e191-4472-8664-87562ae7222b ] Request (MessagesV3RbacTest:test_show_message): 200 POST http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/types 0.116s 2020-11-06 18:03:38.310 40 DEBUG tempest.lib.common.rest_client [req-f57c63bc-e191-4472-8664-87562ae7222b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-MessagesV3RbacTest-volume-type-179738099", "extra_specs": {"storage_protocol": "tempest-MessagesV3RbacTest-storage_protocol-355724068", "vendor_name": "tempest-MessagesV3RbacTest-vendor_name-986026687"}}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-f57c63bc-e191-4472-8664-87562ae7222b', 'content-length': '365', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f57c63bc-e191-4472-8664-87562ae7222b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/types'} Body: b'{"volume_type": {"id": "b6a40816-a84d-410b-b339-c1443f40e9dc", "name": "tempest-MessagesV3RbacTest-volume-type-179738099", "is_public": true, "extra_specs": {"storage_protocol": "tempest-MessagesV3RbacTest-storage_protocol-355724068", "vendor_name": "tempest-MessagesV3RbacTest-vendor_name-986026687"}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:38.340 37 INFO tempest.lib.common.rest_client [req-adf8b1dd-43f5-4f22-b687-d2824f3bc11c ] Request (NetworksRbacTest:_run_cleanups): 200 PUT http://172.30.13.94:9696/v2.0/networks/21087cdc-18ee-4a54-a645-561312615479 1.896s 2020-11-06 18:03:38.341 37 DEBUG tempest.lib.common.rest_client [req-adf8b1dd-43f5-4f22-b687-d2824f3bc11c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"shared": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '755', 'x-openstack-request-id': 'req-adf8b1dd-43f5-4f22-b687-d2824f3bc11c', 'date': 'Fri, 06 Nov 2020 18:03:38 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/21087cdc-18ee-4a54-a645-561312615479'} Body: b'{"network":{"id":"21087cdc-18ee-4a54-a645-561312615479","name":"tempest-NetworksRbacTest-Network-18667912","tenant_id":"ed59c56def144c79842338c521c6c51e","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["ffa8a86f-cd0d-49a5-bbfa-72cdd54b7ee6"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:03:23Z","updated_at":"2020-11-06T18:03:38Z","revision_number":5,"project_id":"ed59c56def144c79842338c521c6c51e","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":49}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:38.633 40 INFO tempest.lib.common.rest_client [req-54d7a377-4979-4b66-a659-f5a1296f7945 ] Request (MessagesV3RbacTest:test_show_message): 202 POST http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/volumes 0.318s 2020-11-06 18:03:38.634 40 DEBUG tempest.lib.common.rest_client [req-54d7a377-4979-4b66-a659-f5a1296f7945 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.3', 'X-Auth-Token': ''} Body: {"volume": {"volume_type": "b6a40816-a84d-410b-b339-c1443f40e9dc", "size": 1, "name": "tempest-MessagesV3RbacTest-Volume-861171145"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-54d7a377-4979-4b66-a659-f5a1296f7945', 'content-length': '882', 'openstack-api-version': 'volume 3.3', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-54d7a377-4979-4b66-a659-f5a1296f7945', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/volumes'} Body: b'{"volume": {"id": "b44cde39-08ad-4922-a493-0fe5c2041037", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:03:38.000000", "updated_at": null, "name": "tempest-MessagesV3RbacTest-Volume-861171145", "description": null, "volume_type": "tempest-MessagesV3RbacTest-volume-type-179738099", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/volumes/b44cde39-08ad-4922-a493-0fe5c2041037"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ab3da161f64548ccbbc06a3c44a43601/volumes/b44cde39-08ad-4922-a493-0fe5c2041037"}], "user_id": "dc99fa4bc34c44bcae6bc29c8718a979", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:38.718 40 INFO tempest.lib.common.rest_client [req-32674cc3-513d-4823-b443-1c27edc0a72f ] Request (MessagesV3RbacTest:test_show_message): 200 GET http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/volumes/b44cde39-08ad-4922-a493-0fe5c2041037 0.071s 2020-11-06 18:03:38.719 40 DEBUG tempest.lib.common.rest_client [req-32674cc3-513d-4823-b443-1c27edc0a72f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.3', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-32674cc3-513d-4823-b443-1c27edc0a72f', 'content-length': '1082', 'openstack-api-version': 'volume 3.3', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-32674cc3-513d-4823-b443-1c27edc0a72f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/volumes/b44cde39-08ad-4922-a493-0fe5c2041037'} Body: b'{"volume": {"id": "b44cde39-08ad-4922-a493-0fe5c2041037", "status": "error", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:03:38.000000", "updated_at": "2020-11-06T18:03:39.000000", "name": "tempest-MessagesV3RbacTest-Volume-861171145", "description": null, "volume_type": "tempest-MessagesV3RbacTest-volume-type-179738099", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/volumes/b44cde39-08ad-4922-a493-0fe5c2041037"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ab3da161f64548ccbbc06a3c44a43601/volumes/b44cde39-08ad-4922-a493-0fe5c2041037"}], "user_id": "dc99fa4bc34c44bcae6bc29c8718a979", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": null, "os-vol-tenant-attr:tenant_id": "ab3da161f64548ccbbc06a3c44a43601"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:38.733 40 INFO tempest.common.waiters [-] volume b44cde39-08ad-4922-a493-0fe5c2041037 reached error after waiting for 0.733095 seconds 2020-11-06 18:03:38.751 40 INFO tempest.lib.common.rest_client [req-942cfb0a-2298-4815-9c2e-999c19e78ce7 ] Request (MessagesV3RbacTest:test_show_message): 200 GET http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/messages 0.017s 2020-11-06 18:03:38.751 40 DEBUG tempest.lib.common.rest_client [req-942cfb0a-2298-4815-9c2e-999c19e78ce7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.3', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-942cfb0a-2298-4815-9c2e-999c19e78ce7', 'content-length': '1442', 'openstack-api-version': 'volume 3.3', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-942cfb0a-2298-4815-9c2e-999c19e78ce7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/messages'} Body: b'{"messages": [{"id": "8d207739-69e1-4acc-a985-6ebd6013e34b", "event_id": "VOLUME_VOLUME_001_003", "user_message": "schedule allocate volume:Could not find any available weighted backend.", "message_level": "ERROR", "created_at": "2020-11-06T18:03:39.000000", "guaranteed_until": "2020-12-06T18:03:39.000000", "request_id": "req-54d7a377-4979-4b66-a659-f5a1296f7945", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/messages/8d207739-69e1-4acc-a985-6ebd6013e34b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ab3da161f64548ccbbc06a3c44a43601/messages/8d207739-69e1-4acc-a985-6ebd6013e34b"}], "resource_type": "VOLUME", "resource_uuid": "b44cde39-08ad-4922-a493-0fe5c2041037"}, {"id": "10c9e676-902f-49f7-99b6-e47fb3a16e51", "event_id": "VOLUME_VOLUME_001_001", "user_message": "schedule allocate volume:An unknown error occurred.", "message_level": "ERROR", "created_at": "2020-10-07T12:09:04.000000", "guaranteed_until": "2020-11-06T12:09:04.000000", "request_id": "req-1864b16e-8a1e-407f-b5f7-8942fab0b32b", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/messages/10c9e676-902f-49f7-99b6-e47fb3a16e51"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ab3da161f64548ccbbc06a3c44a43601/messages/10c9e676-902f-49f7-99b6-e47fb3a16e51"}], "resource_type": "VOLUME", "resource_uuid": "0d29744c-47d9-4fb8-a4a9-5976c89a6d42"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:38.758 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:38.810 40 INFO tempest.lib.common.rest_client [req-ff1694bb-5b46-454e-8c7c-78e85e423d21 ] Request (MessagesV3RbacTest:test_show_message): 200 GET http://172.30.13.94/identity/v3/projects/ab3da161f64548ccbbc06a3c44a43601/users/dc99fa4bc34c44bcae6bc29c8718a979/roles 0.050s 2020-11-06 18:03:38.810 40 DEBUG tempest.lib.common.rest_client [req-ff1694bb-5b46-454e-8c7c-78e85e423d21 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ff1694bb-5b46-454e-8c7c-78e85e423d21', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ab3da161f64548ccbbc06a3c44a43601/users/dc99fa4bc34c44bcae6bc29c8718a979/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ab3da161f64548ccbbc06a3c44a43601/users/dc99fa4bc34c44bcae6bc29c8718a979/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:38.850 40 INFO tempest.lib.common.rest_client [req-8b551e6d-439f-454d-90df-7e0d7a34cc6e ] Request (MessagesV3RbacTest:test_show_message): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:03:38.851 40 DEBUG tempest.lib.common.rest_client [req-8b551e6d-439f-454d-90df-7e0d7a34cc6e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8b551e6d-439f-454d-90df-7e0d7a34cc6e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "dc99fa4bc34c44bcae6bc29c8718a979", "name": "tempest-MessagesV3RbacTest-760507370", "password_expires_at": null}, "audit_ids": ["ZdWnxuteRIK1UIOhX5XWRQ"], "expires_at": "2020-11-06T19:03:38.000000Z", "issued_at": "2020-11-06T18:03:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ab3da161f64548ccbbc06a3c44a43601", "name": "tempest-MessagesV3RbacTest-760507370"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:38.932 40 INFO tempest.lib.common.rest_client [req-7401e843-394b-43b7-a91a-7eb961ca66c4 ] Request (MessagesV3RbacTest:test_show_message): 200 GET http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/messages/8d207739-69e1-4acc-a985-6ebd6013e34b 0.080s 2020-11-06 18:03:38.933 40 DEBUG tempest.lib.common.rest_client [req-7401e843-394b-43b7-a91a-7eb961ca66c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.3', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-7401e843-394b-43b7-a91a-7eb961ca66c4', 'content-length': '735', 'openstack-api-version': 'volume 3.3', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7401e843-394b-43b7-a91a-7eb961ca66c4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/messages/8d207739-69e1-4acc-a985-6ebd6013e34b'} Body: b'{"message": {"id": "8d207739-69e1-4acc-a985-6ebd6013e34b", "event_id": "VOLUME_VOLUME_001_003", "user_message": "schedule allocate volume:Could not find any available weighted backend.", "message_level": "ERROR", "created_at": "2020-11-06T18:03:39.000000", "guaranteed_until": "2020-12-06T18:03:39.000000", "request_id": "req-54d7a377-4979-4b66-a659-f5a1296f7945", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/messages/8d207739-69e1-4acc-a985-6ebd6013e34b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ab3da161f64548ccbbc06a3c44a43601/messages/8d207739-69e1-4acc-a985-6ebd6013e34b"}], "resource_type": "VOLUME", "resource_uuid": "b44cde39-08ad-4922-a493-0fe5c2041037"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:38.939 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:38.978 37 INFO tempest.lib.common.rest_client [req-825549fc-34f2-4817-bf9b-7c19f37a9df8 ] Request (NetworksRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/5ebc3582-c51c-4ce6-a5c0-27185ff023c2 0.634s 2020-11-06 18:03:38.978 37 DEBUG tempest.lib.common.rest_client [req-825549fc-34f2-4817-bf9b-7c19f37a9df8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-825549fc-34f2-4817-bf9b-7c19f37a9df8', 'date': 'Fri, 06 Nov 2020 18:03:38 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/5ebc3582-c51c-4ce6-a5c0-27185ff023c2'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:38.985 40 INFO tempest.lib.common.rest_client [req-18f02e7f-c79a-443a-aa4d-19ab5100bfb8 ] Request (MessagesV3RbacTest:test_show_message): 200 GET http://172.30.13.94/identity/v3/projects/ab3da161f64548ccbbc06a3c44a43601/users/dc99fa4bc34c44bcae6bc29c8718a979/roles 0.044s 2020-11-06 18:03:38.985 40 DEBUG tempest.lib.common.rest_client [req-18f02e7f-c79a-443a-aa4d-19ab5100bfb8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-18f02e7f-c79a-443a-aa4d-19ab5100bfb8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ab3da161f64548ccbbc06a3c44a43601/users/dc99fa4bc34c44bcae6bc29c8718a979/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ab3da161f64548ccbbc06a3c44a43601/users/dc99fa4bc34c44bcae6bc29c8718a979/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:39.017 37 INFO tempest.lib.common.rest_client [req-f321fed1-b5f1-4bfe-aa9c-a76d42ac8da7 ] Request (NetworksRbacTest:tearDownClass): 404 DELETE http://172.30.13.94:9696/v2.0/networks/e9def81c-088f-40fe-92ef-cd663f9fc4b7 0.037s 2020-11-06 18:03:39.017 37 DEBUG tempest.lib.common.rest_client [req-f321fed1-b5f1-4bfe-aa9c-a76d42ac8da7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '138', 'x-openstack-request-id': 'req-f321fed1-b5f1-4bfe-aa9c-a76d42ac8da7', 'date': 'Fri, 06 Nov 2020 18:03:39 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/e9def81c-088f-40fe-92ef-cd663f9fc4b7'} Body: b'{"NeutronError": {"type": "NetworkNotFound", "message": "Network e9def81c-088f-40fe-92ef-cd663f9fc4b7 could not be found.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:39.020 40 INFO tempest.lib.common.rest_client [req-271334aa-a780-4b3d-a852-82be5d442a04 ] Request (MessagesV3RbacTest:test_show_message): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:03:39.021 40 DEBUG tempest.lib.common.rest_client [req-271334aa-a780-4b3d-a852-82be5d442a04 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-271334aa-a780-4b3d-a852-82be5d442a04', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "dc99fa4bc34c44bcae6bc29c8718a979", "name": "tempest-MessagesV3RbacTest-760507370", "password_expires_at": null}, "audit_ids": ["CU9HICpXR6Okg8ACCfIyfA"], "expires_at": "2020-11-06T19:03:39.000000Z", "issued_at": "2020-11-06T18:03:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ab3da161f64548ccbbc06a3c44a43601", "name": "tempest-MessagesV3RbacTest-760507370"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ab3da161f64548ccbbc06a3c44a43601", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:39.099 40 INFO tempest.lib.common.rest_client [req-c3b7edb6-a82f-44f3-8657-7581c2d6843f ] Request (MessagesV3RbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/messages/8d207739-69e1-4acc-a985-6ebd6013e34b 0.076s 2020-11-06 18:03:39.100 40 DEBUG tempest.lib.common.rest_client [req-c3b7edb6-a82f-44f3-8657-7581c2d6843f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.3', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.3', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c3b7edb6-a82f-44f3-8657-7581c2d6843f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/messages/8d207739-69e1-4acc-a985-6ebd6013e34b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:39.248 38 INFO tempest.lib.common.rest_client [req-808b1943-a53a-4c26-92b3-364170f8d6c4 ] Request (SnapshotsActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/fddfacea-0264-4d9b-8918-261e13690043 0.034s 2020-11-06 18:03:39.249 38 DEBUG tempest.lib.common.rest_client [req-808b1943-a53a-4c26-92b3-364170f8d6c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-808b1943-a53a-4c26-92b3-364170f8d6c4', 'content-length': '472', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-808b1943-a53a-4c26-92b3-364170f8d6c4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/fddfacea-0264-4d9b-8918-261e13690043'} Body: b'{"snapshot": {"id": "fddfacea-0264-4d9b-8918-261e13690043", "created_at": "2020-11-06T18:03:37.000000", "updated_at": "2020-11-06T18:03:38.000000", "name": "tempest-SnapshotsActionsV3RbacTest-Snapshot-1827335522", "description": null, "volume_id": "bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "3b4bab58d3e54d1dac1516c8a6695483", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:39.254 38 INFO tempest.common.waiters [-] snapshot fddfacea-0264-4d9b-8918-261e13690043 reached available after waiting for 2.254675 seconds 2020-11-06 18:03:39.256 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:39.259 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:snapshot_admin_actions:reset_status, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:39.259 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:39.294 40 INFO tempest.lib.common.rest_client [req-0e4438cd-e1ab-4a47-8cb2-586bfc807bdd ] Request (MessagesV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/volumes/b44cde39-08ad-4922-a493-0fe5c2041037 0.192s 2020-11-06 18:03:39.294 40 DEBUG tempest.lib.common.rest_client [req-0e4438cd-e1ab-4a47-8cb2-586bfc807bdd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0e4438cd-e1ab-4a47-8cb2-586bfc807bdd', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/volumes/b44cde39-08ad-4922-a493-0fe5c2041037'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:39.315 38 INFO tempest.lib.common.rest_client [req-d96c6c72-21cc-45c9-a81d-38ff68d78c4e ] Request (SnapshotsActionsV3RbacTest:test_reset_snapshot_status): 200 GET http://172.30.13.94/identity/v3/projects/3b4bab58d3e54d1dac1516c8a6695483/users/c0192fceca894b0d97a9d2aaa0f9eb23/roles 0.055s 2020-11-06 18:03:39.316 38 DEBUG tempest.lib.common.rest_client [req-d96c6c72-21cc-45c9-a81d-38ff68d78c4e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d96c6c72-21cc-45c9-a81d-38ff68d78c4e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3b4bab58d3e54d1dac1516c8a6695483/users/c0192fceca894b0d97a9d2aaa0f9eb23/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3b4bab58d3e54d1dac1516c8a6695483/users/c0192fceca894b0d97a9d2aaa0f9eb23/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:39.323 39 INFO tempest.lib.common.rest_client [req-48570a99-d765-4472-a1dd-506fbacf40ba ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.195s 2020-11-06 18:03:39.324 39 DEBUG tempest.lib.common.rest_client [req-48570a99-d765-4472-a1dd-506fbacf40ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-48570a99-d765-4472-a1dd-506fbacf40ba', 'x-compute-request-id': 'req-48570a99-d765-4472-a1dd-506fbacf40ba', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:39.338 40 INFO tempest.lib.common.rest_client [req-a579bd5e-6ec2-42ca-8853-2fd02624d46f ] Request (MessagesV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/volumes/b44cde39-08ad-4922-a493-0fe5c2041037 0.042s 2020-11-06 18:03:39.339 40 DEBUG tempest.lib.common.rest_client [req-a579bd5e-6ec2-42ca-8853-2fd02624d46f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-a579bd5e-6ec2-42ca-8853-2fd02624d46f', 'x-openstack-request-id': 'req-a579bd5e-6ec2-42ca-8853-2fd02624d46f', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/volumes/b44cde39-08ad-4922-a493-0fe5c2041037'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume b44cde39-08ad-4922-a493-0fe5c2041037 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:39.401 38 INFO tempest.lib.common.rest_client [req-0ea7f2f6-949f-4375-bffc-723d6cb9bb3c ] Request (SnapshotsActionsV3RbacTest:test_reset_snapshot_status): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-11-06 18:03:39.402 38 DEBUG tempest.lib.common.rest_client [req-0ea7f2f6-949f-4375-bffc-723d6cb9bb3c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0ea7f2f6-949f-4375-bffc-723d6cb9bb3c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c0192fceca894b0d97a9d2aaa0f9eb23", "name": "tempest-SnapshotsActionsV3RbacTest-1910342686", "password_expires_at": null}, "audit_ids": ["IrARrgcQSySf5lN_crjfFg"], "expires_at": "2020-11-06T19:03:39.000000Z", "issued_at": "2020-11-06T18:03:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3b4bab58d3e54d1dac1516c8a6695483", "name": "tempest-SnapshotsActionsV3RbacTest-1910342686"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:39.417 40 INFO tempest.lib.common.rest_client [req-c9058577-7eba-4096-97a3-5554ca2494ba ] Request (MessagesV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/types/b6a40816-a84d-410b-b339-c1443f40e9dc 0.077s 2020-11-06 18:03:39.418 40 DEBUG tempest.lib.common.rest_client [req-c9058577-7eba-4096-97a3-5554ca2494ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c9058577-7eba-4096-97a3-5554ca2494ba', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/types/b6a40816-a84d-410b-b339-c1443f40e9dc'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:39.435 40 INFO tempest.lib.common.rest_client [req-f4a1433f-9b24-48a5-a464-c7cbc6ebf6ed ] Request (MessagesV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/types/b6a40816-a84d-410b-b339-c1443f40e9dc 0.016s 2020-11-06 18:03:39.435 40 DEBUG tempest.lib.common.rest_client [req-f4a1433f-9b24-48a5-a464-c7cbc6ebf6ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-f4a1433f-9b24-48a5-a464-c7cbc6ebf6ed', 'x-openstack-request-id': 'req-f4a1433f-9b24-48a5-a464-c7cbc6ebf6ed', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/types/b6a40816-a84d-410b-b339-c1443f40e9dc'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type b6a40816-a84d-410b-b339-c1443f40e9dc could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:39.589 40 INFO tempest.lib.common.rest_client [req-267877ec-455a-4c68-a21f-80f8253ca0b1 ] Request (MessagesV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/volumes/416dcb4a-972c-4913-ba8c-e2f6b40719d8 0.153s 2020-11-06 18:03:39.590 40 DEBUG tempest.lib.common.rest_client [req-267877ec-455a-4c68-a21f-80f8253ca0b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-267877ec-455a-4c68-a21f-80f8253ca0b1', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/volumes/416dcb4a-972c-4913-ba8c-e2f6b40719d8'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:39.635 40 INFO tempest.lib.common.rest_client [req-1614f37f-5940-4111-b1e0-7646d2416b77 ] Request (MessagesV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/volumes/416dcb4a-972c-4913-ba8c-e2f6b40719d8 0.045s 2020-11-06 18:03:39.636 40 DEBUG tempest.lib.common.rest_client [req-1614f37f-5940-4111-b1e0-7646d2416b77 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-1614f37f-5940-4111-b1e0-7646d2416b77', 'x-openstack-request-id': 'req-1614f37f-5940-4111-b1e0-7646d2416b77', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/volumes/416dcb4a-972c-4913-ba8c-e2f6b40719d8'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 416dcb4a-972c-4913-ba8c-e2f6b40719d8 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:39.681 38 INFO tempest.lib.common.rest_client [req-34b42cc7-e074-4a79-8967-8587c9bfef4f ] Request (SnapshotsActionsV3RbacTest:test_reset_snapshot_status): 202 POST http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/fddfacea-0264-4d9b-8918-261e13690043/action 0.278s 2020-11-06 18:03:39.682 38 DEBUG tempest.lib.common.rest_client [req-34b42cc7-e074-4a79-8967-8587c9bfef4f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-reset_status": {"status": "error"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-34b42cc7-e074-4a79-8967-8587c9bfef4f', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-34b42cc7-e074-4a79-8967-8587c9bfef4f', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/fddfacea-0264-4d9b-8918-261e13690043/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:39.682 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:39.705 40 INFO tempest.lib.common.rest_client [req-0b2dbb97-b1d0-4719-92dc-46859f4d3ed4 ] Request (MessagesV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/types/112d5318-4e73-4e8e-a497-60cd8a9f8571 0.067s 2020-11-06 18:03:39.705 40 DEBUG tempest.lib.common.rest_client [req-0b2dbb97-b1d0-4719-92dc-46859f4d3ed4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0b2dbb97-b1d0-4719-92dc-46859f4d3ed4', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/types/112d5318-4e73-4e8e-a497-60cd8a9f8571'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:39.728 40 INFO tempest.lib.common.rest_client [req-7981f310-47e1-4196-8b5e-41003fac9cb3 ] Request (MessagesV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/types/112d5318-4e73-4e8e-a497-60cd8a9f8571 0.022s 2020-11-06 18:03:39.729 40 DEBUG tempest.lib.common.rest_client [req-7981f310-47e1-4196-8b5e-41003fac9cb3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-7981f310-47e1-4196-8b5e-41003fac9cb3', 'x-openstack-request-id': 'req-7981f310-47e1-4196-8b5e-41003fac9cb3', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/ab3da161f64548ccbbc06a3c44a43601/types/112d5318-4e73-4e8e-a497-60cd8a9f8571'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 112d5318-4e73-4e8e-a497-60cd8a9f8571 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:39.730 38 INFO tempest.lib.common.rest_client [req-a01087ad-4a7f-42d6-94a5-45c2576b3160 ] Request (SnapshotsActionsV3RbacTest:test_reset_snapshot_status): 200 GET http://172.30.13.94/identity/v3/projects/3b4bab58d3e54d1dac1516c8a6695483/users/c0192fceca894b0d97a9d2aaa0f9eb23/roles 0.046s 2020-11-06 18:03:39.730 38 DEBUG tempest.lib.common.rest_client [req-a01087ad-4a7f-42d6-94a5-45c2576b3160 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a01087ad-4a7f-42d6-94a5-45c2576b3160', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3b4bab58d3e54d1dac1516c8a6695483/users/c0192fceca894b0d97a9d2aaa0f9eb23/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3b4bab58d3e54d1dac1516c8a6695483/users/c0192fceca894b0d97a9d2aaa0f9eb23/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:39.765 38 INFO tempest.lib.common.rest_client [req-bab3eaa5-2426-4567-928d-3b69568ab692 ] Request (SnapshotsActionsV3RbacTest:test_reset_snapshot_status): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:03:39.766 38 DEBUG tempest.lib.common.rest_client [req-bab3eaa5-2426-4567-928d-3b69568ab692 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bab3eaa5-2426-4567-928d-3b69568ab692', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c0192fceca894b0d97a9d2aaa0f9eb23", "name": "tempest-SnapshotsActionsV3RbacTest-1910342686", "password_expires_at": null}, "audit_ids": ["Z5Py5bKmToS9vjZ7DzRHNA"], "expires_at": "2020-11-06T19:03:39.000000Z", "issued_at": "2020-11-06T18:03:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3b4bab58d3e54d1dac1516c8a6695483", "name": "tempest-SnapshotsActionsV3RbacTest-1910342686"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:39.769 37 INFO tempest.lib.common.rest_client [req-3afca028-30aa-4d00-9a0a-fcb65056f3d0 ] Request (NetworksRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/1720b2e9-0188-4cde-b035-30449e6a2c8f 0.750s 2020-11-06 18:03:39.769 37 DEBUG tempest.lib.common.rest_client [req-3afca028-30aa-4d00-9a0a-fcb65056f3d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-3afca028-30aa-4d00-9a0a-fcb65056f3d0', 'date': 'Fri, 06 Nov 2020 18:03:39 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/1720b2e9-0188-4cde-b035-30449e6a2c8f'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:39.849 40 INFO tempest.lib.common.rest_client [req-b1bd4138-2ce4-489d-a059-87d628f60fec ] Request (MessagesV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/dc99fa4bc34c44bcae6bc29c8718a979 0.119s 2020-11-06 18:03:39.849 40 DEBUG tempest.lib.common.rest_client [req-b1bd4138-2ce4-489d-a059-87d628f60fec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b1bd4138-2ce4-489d-a059-87d628f60fec', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/dc99fa4bc34c44bcae6bc29c8718a979'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:39.857 38 INFO tempest.lib.common.rest_client [req-8abbe5bc-46e8-4230-8c3c-576c32dd6258 ] Request (SnapshotsActionsV3RbacTest:test_reset_snapshot_status): 200 GET http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/fddfacea-0264-4d9b-8918-261e13690043 0.090s 2020-11-06 18:03:39.857 38 DEBUG tempest.lib.common.rest_client [req-8abbe5bc-46e8-4230-8c3c-576c32dd6258 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-8abbe5bc-46e8-4230-8c3c-576c32dd6258', 'content-length': '468', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8abbe5bc-46e8-4230-8c3c-576c32dd6258', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/fddfacea-0264-4d9b-8918-261e13690043'} Body: b'{"snapshot": {"id": "fddfacea-0264-4d9b-8918-261e13690043", "created_at": "2020-11-06T18:03:37.000000", "updated_at": "2020-11-06T18:03:40.000000", "name": "tempest-SnapshotsActionsV3RbacTest-Snapshot-1827335522", "description": null, "volume_id": "bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6", "status": "error", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "3b4bab58d3e54d1dac1516c8a6695483", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:39.863 38 INFO tempest.common.waiters [-] snapshot fddfacea-0264-4d9b-8918-261e13690043 reached error after waiting for 0.863309 seconds 2020-11-06 18:03:39.939 40 INFO tempest.lib.common.rest_client [req-a66f773d-1ec5-4456-b0e1-e60275e4e2c7 ] Request (MessagesV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 18:03:39.939 40 DEBUG tempest.lib.common.rest_client [req-a66f773d-1ec5-4456-b0e1-e60275e4e2c7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a66f773d-1ec5-4456-b0e1-e60275e4e2c7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["6AXOOjoWTC21c1LW5MPmtg"], "expires_at": "2020-11-06T19:03:39.000000Z", "issued_at": "2020-11-06T18:03:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:40.016 38 INFO tempest.lib.common.rest_client [req-aa3e7b68-c171-4396-b092-e3cf37404665 ] Request (SnapshotsActionsV3RbacTest:tearDown): 202 POST http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/fddfacea-0264-4d9b-8918-261e13690043/action 0.152s 2020-11-06 18:03:40.016 38 DEBUG tempest.lib.common.rest_client [req-aa3e7b68-c171-4396-b092-e3cf37404665 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-reset_status": {"status": "available"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-aa3e7b68-c171-4396-b092-e3cf37404665', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-aa3e7b68-c171-4396-b092-e3cf37404665', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/fddfacea-0264-4d9b-8918-261e13690043/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:40.048 38 INFO tempest.lib.common.rest_client [req-284d72da-1c76-40dc-9124-71a0fd0e0e24 ] Request (SnapshotsActionsV3RbacTest:tearDown): 200 GET http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/fddfacea-0264-4d9b-8918-261e13690043 0.031s 2020-11-06 18:03:40.049 38 DEBUG tempest.lib.common.rest_client [req-284d72da-1c76-40dc-9124-71a0fd0e0e24 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-284d72da-1c76-40dc-9124-71a0fd0e0e24', 'content-length': '472', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-284d72da-1c76-40dc-9124-71a0fd0e0e24', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/fddfacea-0264-4d9b-8918-261e13690043'} Body: b'{"snapshot": {"id": "fddfacea-0264-4d9b-8918-261e13690043", "created_at": "2020-11-06T18:03:37.000000", "updated_at": "2020-11-06T18:03:40.000000", "name": "tempest-SnapshotsActionsV3RbacTest-Snapshot-1827335522", "description": null, "volume_id": "bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "3b4bab58d3e54d1dac1516c8a6695483", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:40.054 38 INFO tempest.common.waiters [-] snapshot fddfacea-0264-4d9b-8918-261e13690043 reached available after waiting for 0.054522 seconds 2020-11-06 18:03:40.056 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:40.058 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:snapshot_admin_actions:force_delete, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:40.222 38 INFO tempest.lib.common.rest_client [req-989a1ea6-93bf-4090-a8fd-adf57a60977a ] Request (SnapshotsActionsV3RbacTest:test_snapshot_force_delete): 202 POST http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots 0.163s 2020-11-06 18:03:40.222 38 DEBUG tempest.lib.common.rest_client [req-989a1ea6-93bf-4090-a8fd-adf57a60977a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"snapshot": {"volume_id": "bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6", "name": "tempest-SnapshotsActionsV3RbacTest-Snapshot-1999252678"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-989a1ea6-93bf-4090-a8fd-adf57a60977a', 'content-length': '313', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-989a1ea6-93bf-4090-a8fd-adf57a60977a', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots'} Body: b'{"snapshot": {"id": "a1a2cd77-14f6-4306-a63f-1a2b23e4b762", "created_at": "2020-11-06T18:03:40.150121", "updated_at": null, "name": "tempest-SnapshotsActionsV3RbacTest-Snapshot-1999252678", "description": null, "volume_id": "bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6", "status": "creating", "size": 1, "metadata": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:40.258 38 INFO tempest.lib.common.rest_client [req-baa28b7f-69fe-497a-a7e5-c645fb7735e0 ] Request (SnapshotsActionsV3RbacTest:test_snapshot_force_delete): 200 GET http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/a1a2cd77-14f6-4306-a63f-1a2b23e4b762 0.030s 2020-11-06 18:03:40.259 38 DEBUG tempest.lib.common.rest_client [req-baa28b7f-69fe-497a-a7e5-c645fb7735e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-baa28b7f-69fe-497a-a7e5-c645fb7735e0', 'content-length': '445', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-baa28b7f-69fe-497a-a7e5-c645fb7735e0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/a1a2cd77-14f6-4306-a63f-1a2b23e4b762'} Body: b'{"snapshot": {"id": "a1a2cd77-14f6-4306-a63f-1a2b23e4b762", "created_at": "2020-11-06T18:03:40.000000", "updated_at": null, "name": "tempest-SnapshotsActionsV3RbacTest-Snapshot-1999252678", "description": null, "volume_id": "bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6", "status": "creating", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "3b4bab58d3e54d1dac1516c8a6695483", "os-extended-snapshot-attributes:progress": "0%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:40.421 37 INFO tempest.lib.common.rest_client [req-7902c098-5765-4588-ad2a-13acd30ab554 ] Request (NetworksRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/350818cc-e1d6-4854-bc46-adb98f948cfe 0.651s 2020-11-06 18:03:40.421 37 DEBUG tempest.lib.common.rest_client [req-7902c098-5765-4588-ad2a-13acd30ab554 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-7902c098-5765-4588-ad2a-13acd30ab554', 'date': 'Fri, 06 Nov 2020 18:03:40 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/350818cc-e1d6-4854-bc46-adb98f948cfe'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:40.550 40 INFO tempest.lib.common.rest_client [req-3c2df757-e555-4fa4-8851-dea061466885 ] Request (MessagesV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=ab3da161f64548ccbbc06a3c44a43601&name=default 0.609s 2020-11-06 18:03:40.550 40 DEBUG tempest.lib.common.rest_client [req-3c2df757-e555-4fa4-8851-dea061466885 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-3c2df757-e555-4fa4-8851-dea061466885', 'date': 'Fri, 06 Nov 2020 18:03:40 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=ab3da161f64548ccbbc06a3c44a43601&name=default'} Body: b'{"security_groups": [{"id": "b24a1cb0-baad-409f-80f2-234e6bfc6583", "name": "default", "stateful": true, "tenant_id": "ab3da161f64548ccbbc06a3c44a43601", "description": "Default security group", "security_group_rules": [{"id": "0e9c909f-76fb-4ec6-ad24-870ff73505a4", "tenant_id": "ab3da161f64548ccbbc06a3c44a43601", "security_group_id": "b24a1cb0-baad-409f-80f2-234e6bfc6583", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:40Z", "updated_at": "2020-11-06T18:03:40Z", "revision_number": 0, "project_id": "ab3da161f64548ccbbc06a3c44a43601"}, {"id": "6a501225-1721-4d1f-b1be-614101e3b828", "tenant_id": "ab3da161f64548ccbbc06a3c44a43601", "security_group_id": "b24a1cb0-baad-409f-80f2-234e6bfc6583", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "b24a1cb0-baad-409f-80f2-234e6bfc6583", "description": null, "tags": [], "created_at": "2020-11-06T18:03:40Z", "updated_at": "2020-11-06T18:03:40Z", "revision_number": 0, "project_id": "ab3da161f64548ccbbc06a3c44a43601"}, {"id": "819a0e9a-8fe4-4964-98ad-0646a4c5e3de", "tenant_id": "ab3da161f64548ccbbc06a3c44a43601", "security_group_id": "b24a1cb0-baad-409f-80f2-234e6bfc6583", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:40Z", "updated_at": "2020-11-06T18:03:40Z", "revision_number": 0, "project_id": "ab3da161f64548ccbbc06a3c44a43601"}, {"id": "d7b6107a-1852-4836-ac50-fec3cb157916", "tenant_id": "ab3da161f64548ccbbc06a3c44a43601", "security_group_id": "b24a1cb0-baad-409f-80f2-234e6bfc6583", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "b24a1cb0-baad-409f-80f2-234e6bfc6583", "description": null, "tags": [], "created_at": "2020-11-06T18:03:40Z", "updated_at": "2020-11-06T18:03:40Z", "revision_number": 0, "project_id": "ab3da161f64548ccbbc06a3c44a43601"}], "tags": [], "created_at": "2020-11-06T18:03:40Z", "updated_at": "2020-11-06T18:03:40Z", "revision_number": 1, "project_id": "ab3da161f64548ccbbc06a3c44a43601"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:40.556 39 INFO tempest.lib.common.rest_client [req-8e1086a9-7e8b-4037-8db7-585f74a4037f ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.216s 2020-11-06 18:03:40.557 39 DEBUG tempest.lib.common.rest_client [req-8e1086a9-7e8b-4037-8db7-585f74a4037f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8e1086a9-7e8b-4037-8db7-585f74a4037f', 'x-compute-request-id': 'req-8e1086a9-7e8b-4037-8db7-585f74a4037f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:41.298 38 INFO tempest.lib.common.rest_client [req-cdfd4e88-25a0-46d9-a8d3-e05a0dc2a1d7 ] Request (SnapshotsActionsV3RbacTest:test_snapshot_force_delete): 200 GET http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/a1a2cd77-14f6-4306-a63f-1a2b23e4b762 0.034s 2020-11-06 18:03:41.299 38 DEBUG tempest.lib.common.rest_client [req-cdfd4e88-25a0-46d9-a8d3-e05a0dc2a1d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-cdfd4e88-25a0-46d9-a8d3-e05a0dc2a1d7', 'content-length': '445', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-cdfd4e88-25a0-46d9-a8d3-e05a0dc2a1d7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/a1a2cd77-14f6-4306-a63f-1a2b23e4b762'} Body: b'{"snapshot": {"id": "a1a2cd77-14f6-4306-a63f-1a2b23e4b762", "created_at": "2020-11-06T18:03:40.000000", "updated_at": null, "name": "tempest-SnapshotsActionsV3RbacTest-Snapshot-1999252678", "description": null, "volume_id": "bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6", "status": "creating", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "3b4bab58d3e54d1dac1516c8a6695483", "os-extended-snapshot-attributes:progress": "0%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:41.899 40 INFO tempest.lib.common.rest_client [req-1e3b44ae-6a98-48e0-999c-10581d5e4182 ] Request (MessagesV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/b24a1cb0-baad-409f-80f2-234e6bfc6583 1.348s 2020-11-06 18:03:41.900 40 DEBUG tempest.lib.common.rest_client [req-1e3b44ae-6a98-48e0-999c-10581d5e4182 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-1e3b44ae-6a98-48e0-999c-10581d5e4182', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:03:41 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/b24a1cb0-baad-409f-80f2-234e6bfc6583'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:42.077 40 INFO tempest.lib.common.rest_client [req-7233ec64-c5e2-4321-a614-cc687f4b3b3e ] Request (MessagesV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/ab3da161f64548ccbbc06a3c44a43601 0.176s 2020-11-06 18:03:42.077 40 DEBUG tempest.lib.common.rest_client [req-7233ec64-c5e2-4321-a614-cc687f4b3b3e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7233ec64-c5e2-4321-a614-cc687f4b3b3e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ab3da161f64548ccbbc06a3c44a43601'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:42.174 40 INFO tempest.lib.common.rest_client [req-406dcc30-a49e-4900-a707-c8b5bb483f25 ] Request (VolumesActionsV310RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-11-06 18:03:42.174 40 DEBUG tempest.lib.common.rest_client [req-406dcc30-a49e-4900-a707-c8b5bb483f25 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-406dcc30-a49e-4900-a707-c8b5bb483f25', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["f4mCaZf1REOOoB_Ksc9pbQ"], "expires_at": "2020-11-06T19:03:42.000000Z", "issued_at": "2020-11-06T18:03:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:42.215 40 INFO tempest.lib.common.rest_client [req-7084020b-6ae6-4aaf-bd0c-507c2367c3be ] Request (VolumesActionsV310RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:03:42.215 40 DEBUG tempest.lib.common.rest_client [req-7084020b-6ae6-4aaf-bd0c-507c2367c3be ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7084020b-6ae6-4aaf-bd0c-507c2367c3be', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["UJV4N-C8SSCTEFgF9B159A"], "expires_at": "2020-11-06T19:03:42.000000Z", "issued_at": "2020-11-06T18:03:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:42.313 37 INFO tempest.lib.common.rest_client [req-f48f0061-8c8e-480b-bd1a-61b25e4e78fa ] Request (NetworksRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/f0caa2d0-c94d-484b-832f-420cf8680927 1.891s 2020-11-06 18:03:42.313 37 DEBUG tempest.lib.common.rest_client [req-f48f0061-8c8e-480b-bd1a-61b25e4e78fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-f48f0061-8c8e-480b-bd1a-61b25e4e78fa', 'date': 'Fri, 06 Nov 2020 18:03:42 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/f0caa2d0-c94d-484b-832f-420cf8680927'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:42.314 40 INFO tempest.lib.common.rest_client [req-be81766e-c012-4769-9052-18710a52b237 ] Request (VolumesActionsV310RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.097s 2020-11-06 18:03:42.315 40 DEBUG tempest.lib.common.rest_client [req-be81766e-c012-4769-9052-18710a52b237 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-be81766e-c012-4769-9052-18710a52b237', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:42.337 38 INFO tempest.lib.common.rest_client [req-0d88b46f-d00c-45c0-96ad-bdb5259647de ] Request (SnapshotsActionsV3RbacTest:test_snapshot_force_delete): 200 GET http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/a1a2cd77-14f6-4306-a63f-1a2b23e4b762 0.032s 2020-11-06 18:03:42.338 38 DEBUG tempest.lib.common.rest_client [req-0d88b46f-d00c-45c0-96ad-bdb5259647de ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-0d88b46f-d00c-45c0-96ad-bdb5259647de', 'content-length': '472', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0d88b46f-d00c-45c0-96ad-bdb5259647de', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/a1a2cd77-14f6-4306-a63f-1a2b23e4b762'} Body: b'{"snapshot": {"id": "a1a2cd77-14f6-4306-a63f-1a2b23e4b762", "created_at": "2020-11-06T18:03:40.000000", "updated_at": "2020-11-06T18:03:41.000000", "name": "tempest-SnapshotsActionsV3RbacTest-Snapshot-1999252678", "description": null, "volume_id": "bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "3b4bab58d3e54d1dac1516c8a6695483", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:42.345 38 INFO tempest.common.waiters [-] snapshot a1a2cd77-14f6-4306-a63f-1a2b23e4b762 reached available after waiting for 2.345008 seconds 2020-11-06 18:03:42.345 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:42.378 40 INFO tempest.lib.common.rest_client [req-c402a92e-43dc-4360-a67e-569cbd1d0059 ] Request (VolumesActionsV310RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.062s 2020-11-06 18:03:42.379 40 DEBUG tempest.lib.common.rest_client [req-c402a92e-43dc-4360-a67e-569cbd1d0059 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumesActionsV310RbacTest-1710022807-desc", "domain_id": "default", "name": "tempest-VolumesActionsV310RbacTest-1710022807"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '390', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c402a92e-43dc-4360-a67e-569cbd1d0059', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "68335a62eaf549cda40ba242685cb95c", "name": "tempest-VolumesActionsV310RbacTest-1710022807", "domain_id": "default", "description": "tempest-VolumesActionsV310RbacTest-1710022807-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/68335a62eaf549cda40ba242685cb95c"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:42.403 38 INFO tempest.lib.common.rest_client [req-d53edc69-6e4f-4a06-aa03-f0d42c2ba664 ] Request (SnapshotsActionsV3RbacTest:test_snapshot_force_delete): 200 GET http://172.30.13.94/identity/v3/projects/3b4bab58d3e54d1dac1516c8a6695483/users/c0192fceca894b0d97a9d2aaa0f9eb23/roles 0.058s 2020-11-06 18:03:42.404 38 DEBUG tempest.lib.common.rest_client [req-d53edc69-6e4f-4a06-aa03-f0d42c2ba664 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d53edc69-6e4f-4a06-aa03-f0d42c2ba664', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3b4bab58d3e54d1dac1516c8a6695483/users/c0192fceca894b0d97a9d2aaa0f9eb23/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3b4bab58d3e54d1dac1516c8a6695483/users/c0192fceca894b0d97a9d2aaa0f9eb23/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:42.484 40 INFO tempest.lib.common.rest_client [req-9beb7864-a117-443c-ab9d-9d9c58ebe9db ] Request (VolumesActionsV310RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.104s 2020-11-06 18:03:42.485 40 DEBUG tempest.lib.common.rest_client [req-9beb7864-a117-443c-ab9d-9d9c58ebe9db ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumesActionsV310RbacTest-1710022807", "password": "H5@F&w&kFwNktIg", "project_id": "68335a62eaf549cda40ba242685cb95c", "email": "tempest-VolumesActionsV310RbacTest-1710001486@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '408', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9beb7864-a117-443c-ab9d-9d9c58ebe9db', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "68335a62eaf549cda40ba242685cb95c", "email": "tempest-VolumesActionsV310RbacTest-1710001486@example.com", "id": "9bdbf6356f534045a5482b7b7136964d", "name": "tempest-VolumesActionsV310RbacTest-1710022807", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/9bdbf6356f534045a5482b7b7136964d"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:42.488 39 INFO tempest.lib.common.rest_client [req-6e641532-bd71-4270-ae42-3c29d40c937e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.914s 2020-11-06 18:03:42.489 39 DEBUG tempest.lib.common.rest_client [req-6e641532-bd71-4270-ae42-3c29d40c937e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6e641532-bd71-4270-ae42-3c29d40c937e', 'x-compute-request-id': 'req-6e641532-bd71-4270-ae42-3c29d40c937e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:42.489 38 INFO tempest.lib.common.rest_client [req-95896cc6-dc1a-4857-8bc5-4d08bf6d761a ] Request (SnapshotsActionsV3RbacTest:test_snapshot_force_delete): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-11-06 18:03:42.490 38 DEBUG tempest.lib.common.rest_client [req-95896cc6-dc1a-4857-8bc5-4d08bf6d761a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-95896cc6-dc1a-4857-8bc5-4d08bf6d761a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c0192fceca894b0d97a9d2aaa0f9eb23", "name": "tempest-SnapshotsActionsV3RbacTest-1910342686", "password_expires_at": null}, "audit_ids": ["iaVv4j6YTa6RtFTeaMoyBQ"], "expires_at": "2020-11-06T19:03:42.000000Z", "issued_at": "2020-11-06T18:03:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3b4bab58d3e54d1dac1516c8a6695483", "name": "tempest-SnapshotsActionsV3RbacTest-1910342686"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:42.534 40 INFO tempest.lib.common.rest_client [req-8fc3923c-0161-46ac-99b8-73f37e5f512e ] Request (VolumesActionsV310RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.048s 2020-11-06 18:03:42.534 40 DEBUG tempest.lib.common.rest_client [req-8fc3923c-0161-46ac-99b8-73f37e5f512e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8fc3923c-0161-46ac-99b8-73f37e5f512e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:42.635 40 INFO tempest.lib.common.rest_client [req-74f4d3e3-1842-4d31-81c4-c4046cb3abde ] Request (VolumesActionsV310RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.100s 2020-11-06 18:03:42.636 40 DEBUG tempest.lib.common.rest_client [req-74f4d3e3-1842-4d31-81c4-c4046cb3abde ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-74f4d3e3-1842-4d31-81c4-c4046cb3abde', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:42.702 40 INFO tempest.lib.common.rest_client [req-b4589baf-d47d-4c7f-a5f4-a091e0b91667 ] Request (VolumesActionsV310RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/68335a62eaf549cda40ba242685cb95c/users/9bdbf6356f534045a5482b7b7136964d/roles/72a4576c553448cd941b052c1ca0cf2d 0.065s 2020-11-06 18:03:42.702 40 DEBUG tempest.lib.common.rest_client [req-b4589baf-d47d-4c7f-a5f4-a091e0b91667 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b4589baf-d47d-4c7f-a5f4-a091e0b91667', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/68335a62eaf549cda40ba242685cb95c/users/9bdbf6356f534045a5482b7b7136964d/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:42.703 40 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesActionsV310RbacTest-1710022807', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '68335a62eaf549cda40ba242685cb95c', 'project_name': 'tempest-VolumesActionsV310RbacTest-1710022807', 'tenant_id': '68335a62eaf549cda40ba242685cb95c', 'tenant_name': 'tempest-VolumesActionsV310RbacTest-1710022807', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '9bdbf6356f534045a5482b7b7136964d'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:42.703 40 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesActionsV310RbacTest-1710022807', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '68335a62eaf549cda40ba242685cb95c', 'project_name': 'tempest-VolumesActionsV310RbacTest-1710022807', 'tenant_id': '68335a62eaf549cda40ba242685cb95c', 'tenant_name': 'tempest-VolumesActionsV310RbacTest-1710022807', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '9bdbf6356f534045a5482b7b7136964d'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:42.775 38 INFO tempest.lib.common.rest_client [req-eec68626-2199-4d86-bd1e-c5cb0106f5bb ] Request (SnapshotsActionsV3RbacTest:test_snapshot_force_delete): 202 POST http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/a1a2cd77-14f6-4306-a63f-1a2b23e4b762/action 0.283s 2020-11-06 18:03:42.775 38 DEBUG tempest.lib.common.rest_client [req-eec68626-2199-4d86-bd1e-c5cb0106f5bb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-force_delete": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-eec68626-2199-4d86-bd1e-c5cb0106f5bb', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-eec68626-2199-4d86-bd1e-c5cb0106f5bb', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/a1a2cd77-14f6-4306-a63f-1a2b23e4b762/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:42.776 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:42.820 40 INFO tempest.lib.common.rest_client [req-6b24b0e2-003e-440f-bbfe-590f929d1493 ] Request (VolumesActionsV310RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.105s 2020-11-06 18:03:42.821 40 DEBUG tempest.lib.common.rest_client [req-6b24b0e2-003e-440f-bbfe-590f929d1493 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6583', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6b24b0e2-003e-440f-bbfe-590f929d1493', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9bdbf6356f534045a5482b7b7136964d", "name": "tempest-VolumesActionsV310RbacTest-1710022807", "password_expires_at": null}, "audit_ids": ["ebJPD87BSx6ZShqXWOOeFg"], "expires_at": "2020-11-06T19:03:42.000000Z", "issued_at": "2020-11-06T18:03:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "68335a62eaf549cda40ba242685cb95c", "name": "tempest-VolumesActionsV310RbacTest-1710022807"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/68335a62eaf549cda40ba242685cb95c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/68335a62eaf549cda40ba242685cb95c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/68335a62eaf549cda40ba242685cb95c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_68335a62eaf549cda40ba242685cb95c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_68335a62eaf549cda40ba242685cb95c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_68335a62eaf549cda40ba242685cb95c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:42.858 40 INFO tempest.lib.common.rest_client [req-b92411a8-8d55-4367-8e08-2fc93863fe83 ] Request (VolumesActionsV310RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:03:42.858 40 DEBUG tempest.lib.common.rest_client [req-b92411a8-8d55-4367-8e08-2fc93863fe83 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b92411a8-8d55-4367-8e08-2fc93863fe83', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["Wt46JYrcRna--TIruWK18w"], "expires_at": "2020-11-06T19:03:42.000000Z", "issued_at": "2020-11-06T18:03:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:42.886 38 INFO tempest.lib.common.rest_client [req-572d5c91-d307-4417-9a83-42983af88184 ] Request (SnapshotsActionsV3RbacTest:test_snapshot_force_delete): 200 GET http://172.30.13.94/identity/v3/projects/3b4bab58d3e54d1dac1516c8a6695483/users/c0192fceca894b0d97a9d2aaa0f9eb23/roles 0.108s 2020-11-06 18:03:42.886 38 DEBUG tempest.lib.common.rest_client [req-572d5c91-d307-4417-9a83-42983af88184 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-572d5c91-d307-4417-9a83-42983af88184', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3b4bab58d3e54d1dac1516c8a6695483/users/c0192fceca894b0d97a9d2aaa0f9eb23/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3b4bab58d3e54d1dac1516c8a6695483/users/c0192fceca894b0d97a9d2aaa0f9eb23/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:42.906 40 INFO tempest.lib.common.rest_client [req-755a0659-8fbd-4975-b1f5-4e657add7f55 ] Request (VolumesActionsV310RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:03:42.906 40 DEBUG tempest.lib.common.rest_client [req-755a0659-8fbd-4975-b1f5-4e657add7f55 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-755a0659-8fbd-4975-b1f5-4e657add7f55', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["_Mabp02jQZWZH2mv8Ldfjg"], "expires_at": "2020-11-06T19:03:42.000000Z", "issued_at": "2020-11-06T18:03:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:42.925 37 INFO tempest.lib.common.rest_client [req-e5bd968d-f431-4df9-96fc-59f3141b74db ] Request (NetworksRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/0687f738-a5ee-429a-8d34-2d4e0bfade5d 0.610s 2020-11-06 18:03:42.925 37 DEBUG tempest.lib.common.rest_client [req-e5bd968d-f431-4df9-96fc-59f3141b74db ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-e5bd968d-f431-4df9-96fc-59f3141b74db', 'date': 'Fri, 06 Nov 2020 18:03:42 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/0687f738-a5ee-429a-8d34-2d4e0bfade5d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:42.962 40 INFO tempest.lib.common.rest_client [req-5c6d756c-880d-47d7-bf7d-6fb390aa78db ] Request (VolumesActionsV310RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.055s 2020-11-06 18:03:42.962 40 DEBUG tempest.lib.common.rest_client [req-5c6d756c-880d-47d7-bf7d-6fb390aa78db ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5c6d756c-880d-47d7-bf7d-6fb390aa78db', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:42.974 38 INFO tempest.lib.common.rest_client [req-f9092b4e-cd11-45a6-b0fa-b64a14c0151f ] Request (SnapshotsActionsV3RbacTest:test_snapshot_force_delete): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-11-06 18:03:42.975 38 DEBUG tempest.lib.common.rest_client [req-f9092b4e-cd11-45a6-b0fa-b64a14c0151f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f9092b4e-cd11-45a6-b0fa-b64a14c0151f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c0192fceca894b0d97a9d2aaa0f9eb23", "name": "tempest-SnapshotsActionsV3RbacTest-1910342686", "password_expires_at": null}, "audit_ids": ["4ZCQZdxERp-JGaCGf6aMJQ"], "expires_at": "2020-11-06T19:03:42.000000Z", "issued_at": "2020-11-06T18:03:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3b4bab58d3e54d1dac1516c8a6695483", "name": "tempest-SnapshotsActionsV3RbacTest-1910342686"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:43.006 40 INFO tempest.lib.common.rest_client [req-9c3d98cd-9d0b-4551-9e59-d06c88706617 ] Request (VolumesActionsV310RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.043s 2020-11-06 18:03:43.007 40 DEBUG tempest.lib.common.rest_client [req-9c3d98cd-9d0b-4551-9e59-d06c88706617 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9c3d98cd-9d0b-4551-9e59-d06c88706617', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:43.007 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:03:43.008 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:43.058 40 INFO tempest.lib.common.rest_client [req-bdaeaf78-c0cb-4c8a-84c9-6ca7cf21271b ] Request (VolumesActionsV310RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/68335a62eaf549cda40ba242685cb95c/users/9bdbf6356f534045a5482b7b7136964d/roles 0.049s 2020-11-06 18:03:43.058 40 DEBUG tempest.lib.common.rest_client [req-bdaeaf78-c0cb-4c8a-84c9-6ca7cf21271b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bdaeaf78-c0cb-4c8a-84c9-6ca7cf21271b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/68335a62eaf549cda40ba242685cb95c/users/9bdbf6356f534045a5482b7b7136964d/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/68335a62eaf549cda40ba242685cb95c/users/9bdbf6356f534045a5482b7b7136964d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:43.104 38 INFO tempest.lib.common.rest_client [req-232b866f-119e-4616-a30b-5a920238c7ec ] Request (SnapshotsActionsV3RbacTest:test_snapshot_force_delete): 200 GET http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/a1a2cd77-14f6-4306-a63f-1a2b23e4b762 0.128s 2020-11-06 18:03:43.105 38 DEBUG tempest.lib.common.rest_client [req-232b866f-119e-4616-a30b-5a920238c7ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-232b866f-119e-4616-a30b-5a920238c7ec', 'content-length': '471', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-232b866f-119e-4616-a30b-5a920238c7ec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/a1a2cd77-14f6-4306-a63f-1a2b23e4b762'} Body: b'{"snapshot": {"id": "a1a2cd77-14f6-4306-a63f-1a2b23e4b762", "created_at": "2020-11-06T18:03:40.000000", "updated_at": "2020-11-06T18:03:43.000000", "name": "tempest-SnapshotsActionsV3RbacTest-Snapshot-1999252678", "description": null, "volume_id": "bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6", "status": "deleting", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "3b4bab58d3e54d1dac1516c8a6695483", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:43.116 40 INFO tempest.lib.common.rest_client [req-39e867cf-d5bb-4b13-8c0a-0cefccf716fa ] Request (VolumesActionsV310RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/68335a62eaf549cda40ba242685cb95c/users/9bdbf6356f534045a5482b7b7136964d/roles/72a4576c553448cd941b052c1ca0cf2d 0.056s 2020-11-06 18:03:43.116 40 DEBUG tempest.lib.common.rest_client [req-39e867cf-d5bb-4b13-8c0a-0cefccf716fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-39e867cf-d5bb-4b13-8c0a-0cefccf716fa', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/68335a62eaf549cda40ba242685cb95c/users/9bdbf6356f534045a5482b7b7136964d/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:43.213 40 INFO tempest.lib.common.rest_client [req-ae7c20cb-d4b2-4e0e-bbb3-eaed590d6ead ] Request (VolumesActionsV310RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/68335a62eaf549cda40ba242685cb95c/users/9bdbf6356f534045a5482b7b7136964d/roles/a629c95d64b3416fb80ae90af4f69c05 0.096s 2020-11-06 18:03:43.214 40 DEBUG tempest.lib.common.rest_client [req-ae7c20cb-d4b2-4e0e-bbb3-eaed590d6ead ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ae7c20cb-d4b2-4e0e-bbb3-eaed590d6ead', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/68335a62eaf549cda40ba242685cb95c/users/9bdbf6356f534045a5482b7b7136964d/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:43.378 37 INFO tempest.lib.common.rest_client [req-9034de36-2514-457f-b5a8-d3dde021374b ] Request (NetworksRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/ffa8a86f-cd0d-49a5-bbfa-72cdd54b7ee6 0.452s 2020-11-06 18:03:43.379 37 DEBUG tempest.lib.common.rest_client [req-9034de36-2514-457f-b5a8-d3dde021374b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-9034de36-2514-457f-b5a8-d3dde021374b', 'date': 'Fri, 06 Nov 2020 18:03:43 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/ffa8a86f-cd0d-49a5-bbfa-72cdd54b7ee6'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:43.726 39 INFO tempest.lib.common.rest_client [req-68f7945f-89cb-4992-932f-6fdaeae4034d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.220s 2020-11-06 18:03:43.727 39 DEBUG tempest.lib.common.rest_client [req-68f7945f-89cb-4992-932f-6fdaeae4034d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-68f7945f-89cb-4992-932f-6fdaeae4034d', 'x-compute-request-id': 'req-68f7945f-89cb-4992-932f-6fdaeae4034d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:43.920 37 INFO tempest.lib.common.rest_client [req-7fadf525-42dc-4b31-b5e7-d7967d352892 ] Request (NetworksRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/21087cdc-18ee-4a54-a645-561312615479 0.540s 2020-11-06 18:03:43.921 37 DEBUG tempest.lib.common.rest_client [req-7fadf525-42dc-4b31-b5e7-d7967d352892 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-7fadf525-42dc-4b31-b5e7-d7967d352892', 'date': 'Fri, 06 Nov 2020 18:03:43 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/21087cdc-18ee-4a54-a645-561312615479'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:44.116 37 INFO tempest.lib.common.rest_client [req-f51f5482-c2ac-498d-9181-70e251dcd863 ] Request (NetworksRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/12f37a7905e84601b33c14fd5eb519b5 0.194s 2020-11-06 18:03:44.117 37 DEBUG tempest.lib.common.rest_client [req-f51f5482-c2ac-498d-9181-70e251dcd863 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f51f5482-c2ac-498d-9181-70e251dcd863', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/12f37a7905e84601b33c14fd5eb519b5'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:44.145 38 INFO tempest.lib.common.rest_client [req-98f11569-89fa-401c-a156-d7c6896e9ec6 ] Request (SnapshotsActionsV3RbacTest:test_snapshot_force_delete): 404 GET http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/a1a2cd77-14f6-4306-a63f-1a2b23e4b762 0.033s 2020-11-06 18:03:44.146 38 DEBUG tempest.lib.common.rest_client [req-98f11569-89fa-401c-a156-d7c6896e9ec6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '111', 'content-type': 'application/json', 'x-compute-request-id': 'req-98f11569-89fa-401c-a156-d7c6896e9ec6', 'x-openstack-request-id': 'req-98f11569-89fa-401c-a156-d7c6896e9ec6', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/a1a2cd77-14f6-4306-a63f-1a2b23e4b762'} Body: b'{"itemNotFound": {"code": 404, "message": "Snapshot a1a2cd77-14f6-4306-a63f-1a2b23e4b762 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:44.204 37 INFO tempest.lib.common.rest_client [req-ee66645e-bb3f-4966-91ff-056ec47cc0f3 ] Request (NetworksRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-11-06 18:03:44.205 37 DEBUG tempest.lib.common.rest_client [req-ee66645e-bb3f-4966-91ff-056ec47cc0f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ee66645e-bb3f-4966-91ff-056ec47cc0f3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["DUB70oTDSZ2wHbIU84yjWw"], "expires_at": "2020-11-06T19:03:44.000000Z", "issued_at": "2020-11-06T18:03:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:44.289 38 INFO tempest.lib.common.rest_client [req-1762f26d-882d-4e64-86ab-4a649f8e7ccf ] Request (SnapshotsActionsV3RbacTest:tearDown): 202 POST http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/fddfacea-0264-4d9b-8918-261e13690043/action 0.142s 2020-11-06 18:03:44.290 38 DEBUG tempest.lib.common.rest_client [req-1762f26d-882d-4e64-86ab-4a649f8e7ccf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-reset_status": {"status": "available"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-1762f26d-882d-4e64-86ab-4a649f8e7ccf', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1762f26d-882d-4e64-86ab-4a649f8e7ccf', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/fddfacea-0264-4d9b-8918-261e13690043/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:44.297 40 INFO tempest.lib.common.rest_client [req-d912ac4f-39f7-4fda-857f-5941b7615668 ] Request (VolumesActionsV310RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-11-06 18:03:44.298 40 DEBUG tempest.lib.common.rest_client [req-d912ac4f-39f7-4fda-857f-5941b7615668 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d912ac4f-39f7-4fda-857f-5941b7615668', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9bdbf6356f534045a5482b7b7136964d", "name": "tempest-VolumesActionsV310RbacTest-1710022807", "password_expires_at": null}, "audit_ids": ["WjrC7MAvTs-5pApOfn1j3g"], "expires_at": "2020-11-06T19:03:44.000000Z", "issued_at": "2020-11-06T18:03:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "68335a62eaf549cda40ba242685cb95c", "name": "tempest-VolumesActionsV310RbacTest-1710022807"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/68335a62eaf549cda40ba242685cb95c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/68335a62eaf549cda40ba242685cb95c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/68335a62eaf549cda40ba242685cb95c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_68335a62eaf549cda40ba242685cb95c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_68335a62eaf549cda40ba242685cb95c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_68335a62eaf549cda40ba242685cb95c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:44.323 38 INFO tempest.lib.common.rest_client [req-5daa5bc9-c584-495f-809a-8e617f48b91f ] Request (SnapshotsActionsV3RbacTest:tearDown): 200 GET http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/fddfacea-0264-4d9b-8918-261e13690043 0.031s 2020-11-06 18:03:44.323 38 DEBUG tempest.lib.common.rest_client [req-5daa5bc9-c584-495f-809a-8e617f48b91f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-5daa5bc9-c584-495f-809a-8e617f48b91f', 'content-length': '472', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5daa5bc9-c584-495f-809a-8e617f48b91f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/fddfacea-0264-4d9b-8918-261e13690043'} Body: b'{"snapshot": {"id": "fddfacea-0264-4d9b-8918-261e13690043", "created_at": "2020-11-06T18:03:37.000000", "updated_at": "2020-11-06T18:03:44.000000", "name": "tempest-SnapshotsActionsV3RbacTest-Snapshot-1827335522", "description": null, "volume_id": "bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "3b4bab58d3e54d1dac1516c8a6695483", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:44.328 38 INFO tempest.common.waiters [-] snapshot fddfacea-0264-4d9b-8918-261e13690043 reached available after waiting for 0.328037 seconds 2020-11-06 18:03:44.330 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:44.333 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: snapshot_extension:snapshot_actions:update_snapshot_status, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:44.417 37 INFO tempest.lib.common.rest_client [req-13051123-bc48-4ce3-9503-85118690184f ] Request (NetworksRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=ed59c56def144c79842338c521c6c51e&name=default 0.211s 2020-11-06 18:03:44.418 37 DEBUG tempest.lib.common.rest_client [req-13051123-bc48-4ce3-9503-85118690184f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-13051123-bc48-4ce3-9503-85118690184f', 'date': 'Fri, 06 Nov 2020 18:03:44 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=ed59c56def144c79842338c521c6c51e&name=default'} Body: b'{"security_groups": [{"id": "689984a8-0bb4-424a-a305-cd3a5c167a3a", "name": "default", "stateful": true, "tenant_id": "ed59c56def144c79842338c521c6c51e", "description": "Default security group", "security_group_rules": [{"id": "0979c7c8-4017-4ff1-8074-b5b485bf7784", "tenant_id": "ed59c56def144c79842338c521c6c51e", "security_group_id": "689984a8-0bb4-424a-a305-cd3a5c167a3a", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:23Z", "updated_at": "2020-11-06T18:03:23Z", "revision_number": 0, "project_id": "ed59c56def144c79842338c521c6c51e"}, {"id": "19011fa2-af37-42db-85ae-bdd6fa81b3fd", "tenant_id": "ed59c56def144c79842338c521c6c51e", "security_group_id": "689984a8-0bb4-424a-a305-cd3a5c167a3a", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "689984a8-0bb4-424a-a305-cd3a5c167a3a", "description": null, "tags": [], "created_at": "2020-11-06T18:03:23Z", "updated_at": "2020-11-06T18:03:23Z", "revision_number": 0, "project_id": "ed59c56def144c79842338c521c6c51e"}, {"id": "5829a20c-33cb-4996-800d-c4e6892870b9", "tenant_id": "ed59c56def144c79842338c521c6c51e", "security_group_id": "689984a8-0bb4-424a-a305-cd3a5c167a3a", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "689984a8-0bb4-424a-a305-cd3a5c167a3a", "description": null, "tags": [], "created_at": "2020-11-06T18:03:23Z", "updated_at": "2020-11-06T18:03:23Z", "revision_number": 0, "project_id": "ed59c56def144c79842338c521c6c51e"}, {"id": "f0c3c14d-3bb0-4c9e-8f5c-113c9816754d", "tenant_id": "ed59c56def144c79842338c521c6c51e", "security_group_id": "689984a8-0bb4-424a-a305-cd3a5c167a3a", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:23Z", "updated_at": "2020-11-06T18:03:23Z", "revision_number": 0, "project_id": "ed59c56def144c79842338c521c6c51e"}], "tags": [], "created_at": "2020-11-06T18:03:23Z", "updated_at": "2020-11-06T18:03:23Z", "revision_number": 1, "project_id": "ed59c56def144c79842338c521c6c51e"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:44.481 38 INFO tempest.lib.common.rest_client [req-4a75bed1-646d-45b3-8437-28545150e63c ] Request (SnapshotsActionsV3RbacTest:test_update_snapshot_status): 202 POST http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/fddfacea-0264-4d9b-8918-261e13690043/action 0.147s 2020-11-06 18:03:44.481 38 DEBUG tempest.lib.common.rest_client [req-4a75bed1-646d-45b3-8437-28545150e63c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-reset_status": {"status": "creating"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-4a75bed1-646d-45b3-8437-28545150e63c', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4a75bed1-646d-45b3-8437-28545150e63c', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/fddfacea-0264-4d9b-8918-261e13690043/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:44.516 38 INFO tempest.lib.common.rest_client [req-5c41a1c8-c8c2-4cfc-8fbc-a7330db93523 ] Request (SnapshotsActionsV3RbacTest:test_update_snapshot_status): 200 GET http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/fddfacea-0264-4d9b-8918-261e13690043 0.033s 2020-11-06 18:03:44.517 38 DEBUG tempest.lib.common.rest_client [req-5c41a1c8-c8c2-4cfc-8fbc-a7330db93523 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-5c41a1c8-c8c2-4cfc-8fbc-a7330db93523', 'content-length': '471', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5c41a1c8-c8c2-4cfc-8fbc-a7330db93523', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/fddfacea-0264-4d9b-8918-261e13690043'} Body: b'{"snapshot": {"id": "fddfacea-0264-4d9b-8918-261e13690043", "created_at": "2020-11-06T18:03:37.000000", "updated_at": "2020-11-06T18:03:44.000000", "name": "tempest-SnapshotsActionsV3RbacTest-Snapshot-1827335522", "description": null, "volume_id": "bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6", "status": "creating", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "3b4bab58d3e54d1dac1516c8a6695483", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:44.522 38 INFO tempest.common.waiters [-] snapshot fddfacea-0264-4d9b-8918-261e13690043 reached creating after waiting for 0.522787 seconds 2020-11-06 18:03:44.523 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:44.539 37 INFO tempest.lib.common.rest_client [req-7548b395-7144-4709-8dae-4a83e0743a3c ] Request (NetworksRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/689984a8-0bb4-424a-a305-cd3a5c167a3a 0.120s 2020-11-06 18:03:44.539 37 DEBUG tempest.lib.common.rest_client [req-7548b395-7144-4709-8dae-4a83e0743a3c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-7548b395-7144-4709-8dae-4a83e0743a3c', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:03:44 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/689984a8-0bb4-424a-a305-cd3a5c167a3a'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:44.579 38 INFO tempest.lib.common.rest_client [req-7497d562-cd73-4329-975c-11ea287e1e08 ] Request (SnapshotsActionsV3RbacTest:test_update_snapshot_status): 200 GET http://172.30.13.94/identity/v3/projects/3b4bab58d3e54d1dac1516c8a6695483/users/c0192fceca894b0d97a9d2aaa0f9eb23/roles 0.055s 2020-11-06 18:03:44.579 38 DEBUG tempest.lib.common.rest_client [req-7497d562-cd73-4329-975c-11ea287e1e08 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7497d562-cd73-4329-975c-11ea287e1e08', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3b4bab58d3e54d1dac1516c8a6695483/users/c0192fceca894b0d97a9d2aaa0f9eb23/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3b4bab58d3e54d1dac1516c8a6695483/users/c0192fceca894b0d97a9d2aaa0f9eb23/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:44.661 37 INFO tempest.lib.common.rest_client [req-85b098d2-2435-4e43-8c02-f1dc369e98ca ] Request (NetworksRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e 0.120s 2020-11-06 18:03:44.662 37 DEBUG tempest.lib.common.rest_client [req-85b098d2-2435-4e43-8c02-f1dc369e98ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-85b098d2-2435-4e43-8c02-f1dc369e98ca', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ed59c56def144c79842338c521c6c51e'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:44.668 38 INFO tempest.lib.common.rest_client [req-60b8de48-349e-4db2-89e0-fca3eb8b6799 ] Request (SnapshotsActionsV3RbacTest:test_update_snapshot_status): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 18:03:44.669 38 DEBUG tempest.lib.common.rest_client [req-60b8de48-349e-4db2-89e0-fca3eb8b6799 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-60b8de48-349e-4db2-89e0-fca3eb8b6799', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c0192fceca894b0d97a9d2aaa0f9eb23", "name": "tempest-SnapshotsActionsV3RbacTest-1910342686", "password_expires_at": null}, "audit_ids": ["rhNuSNS_TGKxWKiNFFCs2Q"], "expires_at": "2020-11-06T19:03:44.000000Z", "issued_at": "2020-11-06T18:03:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3b4bab58d3e54d1dac1516c8a6695483", "name": "tempest-SnapshotsActionsV3RbacTest-1910342686"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:44.716 40 INFO tempest.lib.common.rest_client [req-991b2e27-bf2a-4780-9a76-c178f58370fc ] Request (VolumesActionsV310RbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/68335a62eaf549cda40ba242685cb95c/volumes 0.416s 2020-11-06 18:03:44.716 40 DEBUG tempest.lib.common.rest_client [req-991b2e27-bf2a-4780-9a76-c178f58370fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-VolumesActionsV310RbacTest-Volume-664382291"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-991b2e27-bf2a-4780-9a76-c178f58370fc', 'content-length': '846', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-991b2e27-bf2a-4780-9a76-c178f58370fc', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/68335a62eaf549cda40ba242685cb95c/volumes'} Body: b'{"volume": {"id": "4ac5b3d2-38d3-4d09-9f25-62a79d5e2871", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:03:45.000000", "updated_at": null, "name": "tempest-VolumesActionsV310RbacTest-Volume-664382291", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/68335a62eaf549cda40ba242685cb95c/volumes/4ac5b3d2-38d3-4d09-9f25-62a79d5e2871"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/68335a62eaf549cda40ba242685cb95c/volumes/4ac5b3d2-38d3-4d09-9f25-62a79d5e2871"}], "user_id": "9bdbf6356f534045a5482b7b7136964d", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:44.744 37 INFO tempest.lib.common.rest_client [req-efad1d44-5e76-47ee-922d-48e44f334f03 ] Request (SecGroupRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.079s 2020-11-06 18:03:44.745 37 DEBUG tempest.lib.common.rest_client [req-efad1d44-5e76-47ee-922d-48e44f334f03 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-efad1d44-5e76-47ee-922d-48e44f334f03', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["vIYeM4qJTFimkmHoCN4cEg"], "expires_at": "2020-11-06T19:03:44.000000Z", "issued_at": "2020-11-06T18:03:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:44.784 37 INFO tempest.lib.common.rest_client [req-ef1aca55-617b-45a6-9e80-c151aa959c1f ] Request (SecGroupRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:03:44.785 37 DEBUG tempest.lib.common.rest_client [req-ef1aca55-617b-45a6-9e80-c151aa959c1f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ef1aca55-617b-45a6-9e80-c151aa959c1f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["Bmp0BVTVR4a7tJtnBqFzeA"], "expires_at": "2020-11-06T19:03:44.000000Z", "issued_at": "2020-11-06T18:03:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:44.801 40 INFO tempest.lib.common.rest_client [req-b3073f9d-0d4a-43d3-9765-4b530d5abfae ] Request (VolumesActionsV310RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/68335a62eaf549cda40ba242685cb95c/volumes/4ac5b3d2-38d3-4d09-9f25-62a79d5e2871 0.071s 2020-11-06 18:03:44.801 40 DEBUG tempest.lib.common.rest_client [req-b3073f9d-0d4a-43d3-9765-4b530d5abfae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-b3073f9d-0d4a-43d3-9765-4b530d5abfae', 'content-length': '1025', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b3073f9d-0d4a-43d3-9765-4b530d5abfae', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/68335a62eaf549cda40ba242685cb95c/volumes/4ac5b3d2-38d3-4d09-9f25-62a79d5e2871'} Body: b'{"volume": {"id": "4ac5b3d2-38d3-4d09-9f25-62a79d5e2871", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:03:45.000000", "updated_at": null, "name": "tempest-VolumesActionsV310RbacTest-Volume-664382291", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/68335a62eaf549cda40ba242685cb95c/volumes/4ac5b3d2-38d3-4d09-9f25-62a79d5e2871"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/68335a62eaf549cda40ba242685cb95c/volumes/4ac5b3d2-38d3-4d09-9f25-62a79d5e2871"}], "user_id": "9bdbf6356f534045a5482b7b7136964d", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": null, "os-vol-tenant-attr:tenant_id": "68335a62eaf549cda40ba242685cb95c"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:44.834 37 INFO tempest.lib.common.rest_client [req-3cdbd356-9641-471e-9ecf-4b53c61661eb ] Request (SecGroupRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.049s 2020-11-06 18:03:44.835 37 DEBUG tempest.lib.common.rest_client [req-3cdbd356-9641-471e-9ecf-4b53c61661eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3cdbd356-9641-471e-9ecf-4b53c61661eb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:44.866 38 INFO tempest.lib.common.rest_client [req-3012f2c7-212b-4921-aed4-e2cff995fb42 ] Request (SnapshotsActionsV3RbacTest:test_update_snapshot_status): 202 POST http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/fddfacea-0264-4d9b-8918-261e13690043/action 0.195s 2020-11-06 18:03:44.867 38 DEBUG tempest.lib.common.rest_client [req-3012f2c7-212b-4921-aed4-e2cff995fb42 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-update_snapshot_status": {"status": "creating"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3012f2c7-212b-4921-aed4-e2cff995fb42', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/fddfacea-0264-4d9b-8918-261e13690043/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:44.867 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:44.923 38 INFO tempest.lib.common.rest_client [req-255cd711-790c-4f2f-9b50-0dd8ef7af8f7 ] Request (SnapshotsActionsV3RbacTest:test_update_snapshot_status): 200 GET http://172.30.13.94/identity/v3/projects/3b4bab58d3e54d1dac1516c8a6695483/users/c0192fceca894b0d97a9d2aaa0f9eb23/roles 0.054s 2020-11-06 18:03:44.923 38 DEBUG tempest.lib.common.rest_client [req-255cd711-790c-4f2f-9b50-0dd8ef7af8f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-255cd711-790c-4f2f-9b50-0dd8ef7af8f7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3b4bab58d3e54d1dac1516c8a6695483/users/c0192fceca894b0d97a9d2aaa0f9eb23/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3b4bab58d3e54d1dac1516c8a6695483/users/c0192fceca894b0d97a9d2aaa0f9eb23/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:44.944 39 INFO tempest.lib.common.rest_client [req-bb389785-2142-431b-9206-e67060575969 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.201s 2020-11-06 18:03:44.944 39 DEBUG tempest.lib.common.rest_client [req-bb389785-2142-431b-9206-e67060575969 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bb389785-2142-431b-9206-e67060575969', 'x-compute-request-id': 'req-bb389785-2142-431b-9206-e67060575969', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:44.965 38 INFO tempest.lib.common.rest_client [req-d6e22a3a-26a3-4d57-ac27-7d251121247a ] Request (SnapshotsActionsV3RbacTest:test_update_snapshot_status): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:03:44.965 38 DEBUG tempest.lib.common.rest_client [req-d6e22a3a-26a3-4d57-ac27-7d251121247a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d6e22a3a-26a3-4d57-ac27-7d251121247a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c0192fceca894b0d97a9d2aaa0f9eb23", "name": "tempest-SnapshotsActionsV3RbacTest-1910342686", "password_expires_at": null}, "audit_ids": ["HAHVP6pnRY-CsYp5BYyZIA"], "expires_at": "2020-11-06T19:03:44.000000Z", "issued_at": "2020-11-06T18:03:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3b4bab58d3e54d1dac1516c8a6695483", "name": "tempest-SnapshotsActionsV3RbacTest-1910342686"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3b4bab58d3e54d1dac1516c8a6695483", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:44.998 37 INFO tempest.lib.common.rest_client [req-e92e63ce-e37e-48c4-a009-b6fac100e2a3 ] Request (SecGroupRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.161s 2020-11-06 18:03:44.998 37 DEBUG tempest.lib.common.rest_client [req-e92e63ce-e37e-48c4-a009-b6fac100e2a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-SecGroupRbacTest-42509981-desc", "domain_id": "default", "name": "tempest-SecGroupRbacTest-42509981"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '366', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e92e63ce-e37e-48c4-a009-b6fac100e2a3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "cc24780b195147e98cb75b931ea85ecf", "name": "tempest-SecGroupRbacTest-42509981", "domain_id": "default", "description": "tempest-SecGroupRbacTest-42509981-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:45.116 37 INFO tempest.lib.common.rest_client [req-271ebaff-326f-4747-afcf-fd84a950c38b ] Request (SecGroupRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.116s 2020-11-06 18:03:45.116 37 DEBUG tempest.lib.common.rest_client [req-271ebaff-326f-4747-afcf-fd84a950c38b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-SecGroupRbacTest-42509981", "password": "A8#9VgRq4_B^m%e", "project_id": "cc24780b195147e98cb75b931ea85ecf", "email": "tempest-SecGroupRbacTest-62224002@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '384', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-271ebaff-326f-4747-afcf-fd84a950c38b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "cc24780b195147e98cb75b931ea85ecf", "email": "tempest-SecGroupRbacTest-62224002@example.com", "id": "e9a02263742b4429a0e0760047fcd20d", "name": "tempest-SecGroupRbacTest-42509981", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/e9a02263742b4429a0e0760047fcd20d"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:45.164 38 INFO tempest.lib.common.rest_client [req-e9873412-00f8-4ae5-ac6c-993831e6ca47 ] Request (SnapshotsActionsV3RbacTest:test_update_snapshot_status): 200 GET http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/fddfacea-0264-4d9b-8918-261e13690043 0.197s 2020-11-06 18:03:45.164 38 DEBUG tempest.lib.common.rest_client [req-e9873412-00f8-4ae5-ac6c-993831e6ca47 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e9873412-00f8-4ae5-ac6c-993831e6ca47', 'content-length': '471', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e9873412-00f8-4ae5-ac6c-993831e6ca47', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/fddfacea-0264-4d9b-8918-261e13690043'} Body: b'{"snapshot": {"id": "fddfacea-0264-4d9b-8918-261e13690043", "created_at": "2020-11-06T18:03:37.000000", "updated_at": "2020-11-06T18:03:45.000000", "name": "tempest-SnapshotsActionsV3RbacTest-Snapshot-1827335522", "description": null, "volume_id": "bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6", "status": "creating", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "3b4bab58d3e54d1dac1516c8a6695483", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:45.164 37 INFO tempest.lib.common.rest_client [req-e3f2c7de-b914-4317-b034-dbff7995c43a ] Request (SecGroupRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.047s 2020-11-06 18:03:45.165 37 DEBUG tempest.lib.common.rest_client [req-e3f2c7de-b914-4317-b034-dbff7995c43a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e3f2c7de-b914-4317-b034-dbff7995c43a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:45.170 38 INFO tempest.common.waiters [-] snapshot fddfacea-0264-4d9b-8918-261e13690043 reached creating after waiting for 0.170929 seconds 2020-11-06 18:03:45.220 37 INFO tempest.lib.common.rest_client [req-b4215b68-8c64-46a7-a284-21f64f85c550 ] Request (SecGroupRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.054s 2020-11-06 18:03:45.221 37 DEBUG tempest.lib.common.rest_client [req-b4215b68-8c64-46a7-a284-21f64f85c550 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b4215b68-8c64-46a7-a284-21f64f85c550', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:45.318 37 INFO tempest.lib.common.rest_client [req-d49b5ea1-6052-4900-b193-cbd9c398d430 ] Request (SecGroupRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles/72a4576c553448cd941b052c1ca0cf2d 0.096s 2020-11-06 18:03:45.318 37 DEBUG tempest.lib.common.rest_client [req-d49b5ea1-6052-4900-b193-cbd9c398d430 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d49b5ea1-6052-4900-b193-cbd9c398d430', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:45.319 37 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SecGroupRbacTest-42509981', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'cc24780b195147e98cb75b931ea85ecf', 'project_name': 'tempest-SecGroupRbacTest-42509981', 'tenant_id': 'cc24780b195147e98cb75b931ea85ecf', 'tenant_name': 'tempest-SecGroupRbacTest-42509981', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'e9a02263742b4429a0e0760047fcd20d'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:45.319 37 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SecGroupRbacTest-42509981', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'cc24780b195147e98cb75b931ea85ecf', 'project_name': 'tempest-SecGroupRbacTest-42509981', 'tenant_id': 'cc24780b195147e98cb75b931ea85ecf', 'tenant_name': 'tempest-SecGroupRbacTest-42509981', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'e9a02263742b4429a0e0760047fcd20d'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:45.330 38 INFO tempest.lib.common.rest_client [req-2b6fff53-0736-45fd-a1f3-f82e183a614b ] Request (SnapshotsActionsV3RbacTest:tearDown): 202 POST http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/fddfacea-0264-4d9b-8918-261e13690043/action 0.158s 2020-11-06 18:03:45.330 38 DEBUG tempest.lib.common.rest_client [req-2b6fff53-0736-45fd-a1f3-f82e183a614b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-reset_status": {"status": "available"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-2b6fff53-0736-45fd-a1f3-f82e183a614b', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2b6fff53-0736-45fd-a1f3-f82e183a614b', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/fddfacea-0264-4d9b-8918-261e13690043/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:45.362 38 INFO tempest.lib.common.rest_client [req-05054d30-0b78-48a7-a34c-416c36be9e25 ] Request (SnapshotsActionsV3RbacTest:tearDown): 200 GET http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/fddfacea-0264-4d9b-8918-261e13690043 0.031s 2020-11-06 18:03:45.363 38 DEBUG tempest.lib.common.rest_client [req-05054d30-0b78-48a7-a34c-416c36be9e25 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-05054d30-0b78-48a7-a34c-416c36be9e25', 'content-length': '472', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-05054d30-0b78-48a7-a34c-416c36be9e25', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/fddfacea-0264-4d9b-8918-261e13690043'} Body: b'{"snapshot": {"id": "fddfacea-0264-4d9b-8918-261e13690043", "created_at": "2020-11-06T18:03:37.000000", "updated_at": "2020-11-06T18:03:45.000000", "name": "tempest-SnapshotsActionsV3RbacTest-Snapshot-1827335522", "description": null, "volume_id": "bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "3b4bab58d3e54d1dac1516c8a6695483", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:45.369 38 INFO tempest.common.waiters [-] snapshot fddfacea-0264-4d9b-8918-261e13690043 reached available after waiting for 0.369637 seconds 2020-11-06 18:03:45.401 38 INFO tempest.lib.common.rest_client [req-5711368f-239e-4379-8e1d-b79f5ff9f633 ] Request (SnapshotsActionsV3RbacTest:tearDownClass): 404 DELETE http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/a1a2cd77-14f6-4306-a63f-1a2b23e4b762 0.029s 2020-11-06 18:03:45.402 38 DEBUG tempest.lib.common.rest_client [req-5711368f-239e-4379-8e1d-b79f5ff9f633 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '111', 'content-type': 'application/json', 'x-compute-request-id': 'req-5711368f-239e-4379-8e1d-b79f5ff9f633', 'x-openstack-request-id': 'req-5711368f-239e-4379-8e1d-b79f5ff9f633', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/a1a2cd77-14f6-4306-a63f-1a2b23e4b762'} Body: b'{"itemNotFound": {"code": 404, "message": "Snapshot a1a2cd77-14f6-4306-a63f-1a2b23e4b762 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:45.447 37 INFO tempest.lib.common.rest_client [req-3ba96636-4d8e-4068-bca4-44d9d8a5b87b ] Request (SecGroupRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.115s 2020-11-06 18:03:45.448 37 DEBUG tempest.lib.common.rest_client [req-3ba96636-4d8e-4068-bca4-44d9d8a5b87b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6559', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3ba96636-4d8e-4068-bca4-44d9d8a5b87b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e9a02263742b4429a0e0760047fcd20d", "name": "tempest-SecGroupRbacTest-42509981", "password_expires_at": null}, "audit_ids": ["hSGImU2NTKyFKuQ0LBCzzA"], "expires_at": "2020-11-06T19:03:45.000000Z", "issued_at": "2020-11-06T18:03:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cc24780b195147e98cb75b931ea85ecf", "name": "tempest-SecGroupRbacTest-42509981"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/im _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:45.494 38 INFO tempest.lib.common.rest_client [req-4f1ced74-a825-45e1-98d1-bdf06fc0c98e ] Request (SnapshotsActionsV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/fddfacea-0264-4d9b-8918-261e13690043 0.091s 2020-11-06 18:03:45.494 38 DEBUG tempest.lib.common.rest_client [req-4f1ced74-a825-45e1-98d1-bdf06fc0c98e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4f1ced74-a825-45e1-98d1-bdf06fc0c98e', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/fddfacea-0264-4d9b-8918-261e13690043'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:45.521 38 INFO tempest.lib.common.rest_client [req-e56f6469-3051-42e3-ac3e-e2bf1a1d5091 ] Request (SnapshotsActionsV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/fddfacea-0264-4d9b-8918-261e13690043 0.026s 2020-11-06 18:03:45.522 38 DEBUG tempest.lib.common.rest_client [req-e56f6469-3051-42e3-ac3e-e2bf1a1d5091 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e56f6469-3051-42e3-ac3e-e2bf1a1d5091', 'content-length': '471', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e56f6469-3051-42e3-ac3e-e2bf1a1d5091', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/fddfacea-0264-4d9b-8918-261e13690043'} Body: b'{"snapshot": {"id": "fddfacea-0264-4d9b-8918-261e13690043", "created_at": "2020-11-06T18:03:37.000000", "updated_at": "2020-11-06T18:03:45.000000", "name": "tempest-SnapshotsActionsV3RbacTest-Snapshot-1827335522", "description": null, "volume_id": "bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6", "status": "deleting", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "3b4bab58d3e54d1dac1516c8a6695483", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:45.551 37 INFO tempest.lib.common.rest_client [req-ef87348d-4bed-4b5d-b05e-3c99d6dfa261 ] Request (SecGroupRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.101s 2020-11-06 18:03:45.552 37 DEBUG tempest.lib.common.rest_client [req-ef87348d-4bed-4b5d-b05e-3c99d6dfa261 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ef87348d-4bed-4b5d-b05e-3c99d6dfa261', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["t6ieKAulQp-GOr2jlJ-NOg"], "expires_at": "2020-11-06T19:03:45.000000Z", "issued_at": "2020-11-06T18:03:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:45.601 37 INFO tempest.lib.common.rest_client [req-78024391-5080-4b04-8cfb-7acdab4fc3c7 ] Request (SecGroupRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:03:45.601 37 DEBUG tempest.lib.common.rest_client [req-78024391-5080-4b04-8cfb-7acdab4fc3c7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-78024391-5080-4b04-8cfb-7acdab4fc3c7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["mXBA_V0lSSWbztnNvFEEZQ"], "expires_at": "2020-11-06T19:03:45.000000Z", "issued_at": "2020-11-06T18:03:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:45.650 37 INFO tempest.lib.common.rest_client [req-b067b507-bb9e-4391-b930-22c0fe3a5baf ] Request (SecGroupRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.048s 2020-11-06 18:03:45.651 37 DEBUG tempest.lib.common.rest_client [req-b067b507-bb9e-4391-b930-22c0fe3a5baf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b067b507-bb9e-4391-b930-22c0fe3a5baf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:45.702 37 INFO tempest.lib.common.rest_client [req-36144746-8355-4f9b-8560-afc22a0b4715 ] Request (SecGroupRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.051s 2020-11-06 18:03:45.703 37 DEBUG tempest.lib.common.rest_client [req-36144746-8355-4f9b-8560-afc22a0b4715 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-36144746-8355-4f9b-8560-afc22a0b4715', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:45.703 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:03:45.704 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:45.752 37 INFO tempest.lib.common.rest_client [req-62b9bfe3-23ca-4620-8b23-e64ed4b6a752 ] Request (SecGroupRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles 0.047s 2020-11-06 18:03:45.752 37 DEBUG tempest.lib.common.rest_client [req-62b9bfe3-23ca-4620-8b23-e64ed4b6a752 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-62b9bfe3-23ca-4620-8b23-e64ed4b6a752', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:45.836 37 INFO tempest.lib.common.rest_client [req-f6a50214-8cdc-4c97-a1a9-4cfd576851cd ] Request (SecGroupRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles/72a4576c553448cd941b052c1ca0cf2d 0.083s 2020-11-06 18:03:45.837 37 DEBUG tempest.lib.common.rest_client [req-f6a50214-8cdc-4c97-a1a9-4cfd576851cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f6a50214-8cdc-4c97-a1a9-4cfd576851cd', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:45.890 40 INFO tempest.lib.common.rest_client [req-b257c1aa-78b0-4f59-85cd-e1861a339bb6 ] Request (VolumesActionsV310RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/68335a62eaf549cda40ba242685cb95c/volumes/4ac5b3d2-38d3-4d09-9f25-62a79d5e2871 0.078s 2020-11-06 18:03:45.891 40 DEBUG tempest.lib.common.rest_client [req-b257c1aa-78b0-4f59-85cd-e1861a339bb6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-b257c1aa-78b0-4f59-85cd-e1861a339bb6', 'content-length': '1069', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b257c1aa-78b0-4f59-85cd-e1861a339bb6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/68335a62eaf549cda40ba242685cb95c/volumes/4ac5b3d2-38d3-4d09-9f25-62a79d5e2871'} Body: b'{"volume": {"id": "4ac5b3d2-38d3-4d09-9f25-62a79d5e2871", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:03:45.000000", "updated_at": "2020-11-06T18:03:45.000000", "name": "tempest-VolumesActionsV310RbacTest-Volume-664382291", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/68335a62eaf549cda40ba242685cb95c/volumes/4ac5b3d2-38d3-4d09-9f25-62a79d5e2871"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/68335a62eaf549cda40ba242685cb95c/volumes/4ac5b3d2-38d3-4d09-9f25-62a79d5e2871"}], "user_id": "9bdbf6356f534045a5482b7b7136964d", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "68335a62eaf549cda40ba242685cb95c"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:45.902 40 INFO tempest.common.waiters [-] volume 4ac5b3d2-38d3-4d09-9f25-62a79d5e2871 reached available after waiting for 1.902594 seconds 2020-11-06 18:03:45.903 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:45.905 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_actions:upload_image, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:45.905 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:45.955 37 INFO tempest.lib.common.rest_client [req-12dd0a5b-b763-4181-ab47-798747c83af0 ] Request (SecGroupRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles/a629c95d64b3416fb80ae90af4f69c05 0.117s 2020-11-06 18:03:45.955 37 DEBUG tempest.lib.common.rest_client [req-12dd0a5b-b763-4181-ab47-798747c83af0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-12dd0a5b-b763-4181-ab47-798747c83af0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:45.958 40 INFO tempest.lib.common.rest_client [req-db3af1b7-ec58-45d6-82be-e4f736aa7d4d ] Request (VolumesActionsV310RbacTest:test_volume_upload_image): 200 GET http://172.30.13.94/identity/v3/projects/68335a62eaf549cda40ba242685cb95c/users/9bdbf6356f534045a5482b7b7136964d/roles 0.052s 2020-11-06 18:03:45.959 40 DEBUG tempest.lib.common.rest_client [req-db3af1b7-ec58-45d6-82be-e4f736aa7d4d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-db3af1b7-ec58-45d6-82be-e4f736aa7d4d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/68335a62eaf549cda40ba242685cb95c/users/9bdbf6356f534045a5482b7b7136964d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/68335a62eaf549cda40ba242685cb95c/users/9bdbf6356f534045a5482b7b7136964d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:46.037 40 INFO tempest.lib.common.rest_client [req-eeb3cb47-d9a0-409b-8a6b-b1b6b10672ee ] Request (VolumesActionsV310RbacTest:test_volume_upload_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.077s 2020-11-06 18:03:46.037 40 DEBUG tempest.lib.common.rest_client [req-eeb3cb47-d9a0-409b-8a6b-b1b6b10672ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eeb3cb47-d9a0-409b-8a6b-b1b6b10672ee', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9bdbf6356f534045a5482b7b7136964d", "name": "tempest-VolumesActionsV310RbacTest-1710022807", "password_expires_at": null}, "audit_ids": ["Bbhh4s98SP2JkJ0hza-auQ"], "expires_at": "2020-11-06T19:03:45.000000Z", "issued_at": "2020-11-06T18:03:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "68335a62eaf549cda40ba242685cb95c", "name": "tempest-VolumesActionsV310RbacTest-1710022807"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/68335a62eaf549cda40ba242685cb95c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/68335a62eaf549cda40ba242685cb95c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/68335a62eaf549cda40ba242685cb95c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_68335a62eaf549cda40ba242685cb95c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_68335a62eaf549cda40ba242685cb95c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_68335a62eaf549cda40ba242685cb95c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:46.170 39 INFO tempest.lib.common.rest_client [req-959f8c54-c879-409b-bef5-b4ba98b7ab5f ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.207s 2020-11-06 18:03:46.170 39 DEBUG tempest.lib.common.rest_client [req-959f8c54-c879-409b-bef5-b4ba98b7ab5f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-959f8c54-c879-409b-bef5-b4ba98b7ab5f', 'x-compute-request-id': 'req-959f8c54-c879-409b-bef5-b4ba98b7ab5f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:46.387 40 INFO tempest.lib.common.rest_client [req-071f9571-1bc6-4091-9d1a-3c2ed620208a ] Request (VolumesActionsV310RbacTest:test_volume_upload_image): 202 POST http://172.30.13.94/volume/v3/68335a62eaf549cda40ba242685cb95c/volumes/4ac5b3d2-38d3-4d09-9f25-62a79d5e2871/action 0.349s 2020-11-06 18:03:46.388 40 DEBUG tempest.lib.common.rest_client [req-071f9571-1bc6-4091-9d1a-3c2ed620208a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.10', 'X-Auth-Token': ''} Body: {"os-volume_upload_image": {"image_name": "tempest-VolumesActionsV310RbacTest-Image-1168947243", "visibility": "private", "disk_format": "raw"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-071f9571-1bc6-4091-9d1a-3c2ed620208a', 'content-length': '688', 'openstack-api-version': 'volume 3.10', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-071f9571-1bc6-4091-9d1a-3c2ed620208a', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/68335a62eaf549cda40ba242685cb95c/volumes/4ac5b3d2-38d3-4d09-9f25-62a79d5e2871/action'} Body: b'{"os-volume_upload_image": {"id": "4ac5b3d2-38d3-4d09-9f25-62a79d5e2871", "updated_at": "2020-11-06T18:03:45.000000", "status": "uploading", "display_description": null, "size": 1, "volume_type": {"id": "8f9ae869-3a34-4ca4-bf0a-bc1352b23a27", "name": "ceph", "description": null, "is_public": true, "extra_specs": {"volume_backend_name": "ceph"}, "qos_specs_id": null, "created_at": "2020-10-07T12:09:08.000000", "updated_at": null, "deleted_at": null, "deleted": false}, "image_id": "50cf6715-568d-494e-b14a-4bce1106cc09", "container_format": "bare", "disk_format": "raw", "image_name": "tempest-VolumesActionsV310RbacTest-Image-1168947243", "protected": false, "visibility": "private"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:46.389 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:46.498 40 INFO tempest.lib.common.rest_client [req-42e48942-6bf4-4b0a-927a-ecc380cf4602 ] Request (VolumesActionsV310RbacTest:test_volume_upload_image): 200 GET http://172.30.13.94/identity/v3/projects/68335a62eaf549cda40ba242685cb95c/users/9bdbf6356f534045a5482b7b7136964d/roles 0.108s 2020-11-06 18:03:46.498 40 DEBUG tempest.lib.common.rest_client [req-42e48942-6bf4-4b0a-927a-ecc380cf4602 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-42e48942-6bf4-4b0a-927a-ecc380cf4602', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/68335a62eaf549cda40ba242685cb95c/users/9bdbf6356f534045a5482b7b7136964d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/68335a62eaf549cda40ba242685cb95c/users/9bdbf6356f534045a5482b7b7136964d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:46.535 40 INFO tempest.lib.common.rest_client [req-44f128ca-397e-4252-b018-1ae772e348ea ] Request (VolumesActionsV310RbacTest:test_volume_upload_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:03:46.536 40 DEBUG tempest.lib.common.rest_client [req-44f128ca-397e-4252-b018-1ae772e348ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-44f128ca-397e-4252-b018-1ae772e348ea', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9bdbf6356f534045a5482b7b7136964d", "name": "tempest-VolumesActionsV310RbacTest-1710022807", "password_expires_at": null}, "audit_ids": ["wgRk3x1hRz6ZfQhDichPDg"], "expires_at": "2020-11-06T19:03:46.000000Z", "issued_at": "2020-11-06T18:03:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "68335a62eaf549cda40ba242685cb95c", "name": "tempest-VolumesActionsV310RbacTest-1710022807"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/68335a62eaf549cda40ba242685cb95c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/68335a62eaf549cda40ba242685cb95c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/68335a62eaf549cda40ba242685cb95c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_68335a62eaf549cda40ba242685cb95c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_68335a62eaf549cda40ba242685cb95c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_68335a62eaf549cda40ba242685cb95c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:46.569 38 INFO tempest.lib.common.rest_client [req-847e0069-0b29-4de3-bf6b-9e63b11bacdf ] Request (SnapshotsActionsV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/fddfacea-0264-4d9b-8918-261e13690043 0.040s 2020-11-06 18:03:46.570 38 DEBUG tempest.lib.common.rest_client [req-847e0069-0b29-4de3-bf6b-9e63b11bacdf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '111', 'content-type': 'application/json', 'x-compute-request-id': 'req-847e0069-0b29-4de3-bf6b-9e63b11bacdf', 'x-openstack-request-id': 'req-847e0069-0b29-4de3-bf6b-9e63b11bacdf', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/snapshots/fddfacea-0264-4d9b-8918-261e13690043'} Body: b'{"itemNotFound": {"code": 404, "message": "Snapshot fddfacea-0264-4d9b-8918-261e13690043 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:46.647 38 INFO tempest.lib.common.rest_client [req-9840adde-790a-4a72-906f-ff1822914d57 ] Request (SnapshotsActionsV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/volumes/bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6 0.076s 2020-11-06 18:03:46.647 38 DEBUG tempest.lib.common.rest_client [req-9840adde-790a-4a72-906f-ff1822914d57 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9840adde-790a-4a72-906f-ff1822914d57', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/volumes/bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:46.675 40 INFO tempest.lib.common.rest_client [req-570d324a-e5c3-4bba-9226-749c839d122b ] Request (VolumesActionsV310RbacTest:test_volume_upload_image): 200 GET http://172.30.13.94/image/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09 0.138s 2020-11-06 18:03:46.676 40 DEBUG tempest.lib.common.rest_client [req-570d324a-e5c3-4bba-9226-749c839d122b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '659', 'content-type': 'application/json', 'x-openstack-request-id': 'req-570d324a-e5c3-4bba-9226-749c839d122b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09'} Body: b'{"name": "tempest-VolumesActionsV310RbacTest-Image-1168947243", "disk_format": "raw", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "68335a62eaf549cda40ba242685cb95c", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "50cf6715-568d-494e-b14a-4bce1106cc09", "created_at": "2020-11-06T18:03:46Z", "updated_at": "2020-11-06T18:03:46Z", "tags": [], "self": "/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09", "file": "/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:46.716 38 INFO tempest.lib.common.rest_client [req-8d30eea6-00d1-41a9-b940-b596b2442216 ] Request (SnapshotsActionsV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/volumes/bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6 0.068s 2020-11-06 18:03:46.716 38 DEBUG tempest.lib.common.rest_client [req-8d30eea6-00d1-41a9-b940-b596b2442216 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-8d30eea6-00d1-41a9-b940-b596b2442216', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8d30eea6-00d1-41a9-b940-b596b2442216', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/volumes/bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6'} Body: b'{"volume": {"id": "bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:03:36.000000", "updated_at": "2020-11-06T18:03:47.000000", "name": "tempest-SnapshotsActionsV3RbacTest-Volume-341272005", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/volumes/bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3b4bab58d3e54d1dac1516c8a6695483/volumes/bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6"}], "user_id": "c0192fceca894b0d97a9d2aaa0f9eb23", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3b4bab58d3e54d1dac1516c8a6695483"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:47.042 37 INFO tempest.lib.common.rest_client [req-8adcefaa-2aae-4aa2-a75e-b51c8e36ec92 ] Request (SecGroupRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:03:47.043 37 DEBUG tempest.lib.common.rest_client [req-8adcefaa-2aae-4aa2-a75e-b51c8e36ec92 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8adcefaa-2aae-4aa2-a75e-b51c8e36ec92', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e9a02263742b4429a0e0760047fcd20d", "name": "tempest-SecGroupRbacTest-42509981", "password_expires_at": null}, "audit_ids": ["Ke2mYm3dRtGX2Z6b4NKtig"], "expires_at": "2020-11-06T19:03:46.000000Z", "issued_at": "2020-11-06T18:03:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cc24780b195147e98cb75b931ea85ecf", "name": "tempest-SecGroupRbacTest-42509981"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:47.474 39 INFO tempest.lib.common.rest_client [req-343c22d6-a746-4589-b8d6-373923d754ee ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.288s 2020-11-06 18:03:47.475 39 DEBUG tempest.lib.common.rest_client [req-343c22d6-a746-4589-b8d6-373923d754ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-343c22d6-a746-4589-b8d6-373923d754ee', 'x-compute-request-id': 'req-343c22d6-a746-4589-b8d6-373923d754ee', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:47.519 37 INFO tempest.lib.common.rest_client [req-61cc5075-dfbe-4d7b-9b91-18fefabed0fd ] Request (SecGroupRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/security-groups 0.474s 2020-11-06 18:03:47.520 37 DEBUG tempest.lib.common.rest_client [req-61cc5075-dfbe-4d7b-9b91-18fefabed0fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group": {"name": "tempest-SecGroupRbacTest-secgroup-1115235571"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1394', 'x-openstack-request-id': 'req-61cc5075-dfbe-4d7b-9b91-18fefabed0fd', 'date': 'Fri, 06 Nov 2020 18:03:47 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups'} Body: b'{"security_group": {"id": "779647eb-fa30-4869-b0a8-4e934dbf5318", "name": "tempest-SecGroupRbacTest-secgroup-1115235571", "stateful": true, "tenant_id": "cc24780b195147e98cb75b931ea85ecf", "description": "", "security_group_rules": [{"id": "d870e181-5177-40d4-aeab-7d213c3597a5", "tenant_id": "cc24780b195147e98cb75b931ea85ecf", "security_group_id": "779647eb-fa30-4869-b0a8-4e934dbf5318", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:47Z", "updated_at": "2020-11-06T18:03:47Z", "revision_number": 0, "project_id": "cc24780b195147e98cb75b931ea85ecf"}, {"id": "f0eb003e-dd22-4472-b722-906e2f1b072e", "tenant_id": "cc24780b195147e98cb75b931ea85ecf", "security_group_id": "779647eb-fa30-4869-b0a8-4e934dbf5318", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:47Z", "updated_at": "2020-11-06T18:03:47Z", "revision_number": 0, "project_id": "cc24780b195147e98cb75b931ea85ecf"}], "tags": [], "created_at": "2020-11-06T18:03:47Z", "updated_at": "2020-11-06T18:03:47Z", "revision_number": 1, "project_id": "cc24780b195147e98cb75b931ea85ecf"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:47.521 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:47.526 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_security_group, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:47.526 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:47.578 37 INFO tempest.lib.common.rest_client [req-893a8617-721b-475d-aa96-24ee24a6126e ] Request (SecGroupRbacTest:test_create_security_group): 200 GET http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles 0.051s 2020-11-06 18:03:47.579 37 DEBUG tempest.lib.common.rest_client [req-893a8617-721b-475d-aa96-24ee24a6126e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-893a8617-721b-475d-aa96-24ee24a6126e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:47.613 37 INFO tempest.lib.common.rest_client [req-2560541b-e647-4ff8-ba90-225f27d39ba8 ] Request (SecGroupRbacTest:test_create_security_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:03:47.613 37 DEBUG tempest.lib.common.rest_client [req-2560541b-e647-4ff8-ba90-225f27d39ba8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2560541b-e647-4ff8-ba90-225f27d39ba8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e9a02263742b4429a0e0760047fcd20d", "name": "tempest-SecGroupRbacTest-42509981", "password_expires_at": null}, "audit_ids": ["tEf-6iypSH2B_Qpl9nYjig"], "expires_at": "2020-11-06T19:03:47.000000Z", "issued_at": "2020-11-06T18:03:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cc24780b195147e98cb75b931ea85ecf", "name": "tempest-SecGroupRbacTest-42509981"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:47.703 40 INFO tempest.lib.common.rest_client [req-52b0f613-1134-4b44-a752-af8c72e0aae6 ] Request (VolumesActionsV310RbacTest:test_volume_upload_image): 200 GET http://172.30.13.94/image/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09 0.025s 2020-11-06 18:03:47.703 40 DEBUG tempest.lib.common.rest_client [req-52b0f613-1134-4b44-a752-af8c72e0aae6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '659', 'content-type': 'application/json', 'x-openstack-request-id': 'req-52b0f613-1134-4b44-a752-af8c72e0aae6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09'} Body: b'{"name": "tempest-VolumesActionsV310RbacTest-Image-1168947243", "disk_format": "raw", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "68335a62eaf549cda40ba242685cb95c", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "50cf6715-568d-494e-b14a-4bce1106cc09", "created_at": "2020-11-06T18:03:46Z", "updated_at": "2020-11-06T18:03:47Z", "tags": [], "self": "/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09", "file": "/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:47.786 38 INFO tempest.lib.common.rest_client [req-92f02f15-79f3-494b-8da0-7e9bac04509e ] Request (SnapshotsActionsV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/volumes/bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6 0.055s 2020-11-06 18:03:47.786 38 DEBUG tempest.lib.common.rest_client [req-92f02f15-79f3-494b-8da0-7e9bac04509e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-92f02f15-79f3-494b-8da0-7e9bac04509e', 'x-openstack-request-id': 'req-92f02f15-79f3-494b-8da0-7e9bac04509e', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/3b4bab58d3e54d1dac1516c8a6695483/volumes/bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume bb7abd2d-28bb-4347-a4d1-5a83b05f1ad6 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:47.837 37 INFO tempest.lib.common.rest_client [req-eff57719-0068-4367-b7e3-fffa63ec2b8a ] Request (SecGroupRbacTest:test_create_security_group): 201 POST http://172.30.13.94:9696/v2.0/security-groups 0.223s 2020-11-06 18:03:47.838 37 DEBUG tempest.lib.common.rest_client [req-eff57719-0068-4367-b7e3-fffa63ec2b8a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group": {"name": "tempest-SecGroupRbacTest-secgroup-1038660408"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1394', 'x-openstack-request-id': 'req-eff57719-0068-4367-b7e3-fffa63ec2b8a', 'date': 'Fri, 06 Nov 2020 18:03:47 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups'} Body: b'{"security_group": {"id": "50a5d6dc-e601-40f8-830a-ad5656ce543e", "name": "tempest-SecGroupRbacTest-secgroup-1038660408", "stateful": true, "tenant_id": "cc24780b195147e98cb75b931ea85ecf", "description": "", "security_group_rules": [{"id": "71272670-2ccd-43b4-a0f8-a89012411765", "tenant_id": "cc24780b195147e98cb75b931ea85ecf", "security_group_id": "50a5d6dc-e601-40f8-830a-ad5656ce543e", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:47Z", "updated_at": "2020-11-06T18:03:47Z", "revision_number": 0, "project_id": "cc24780b195147e98cb75b931ea85ecf"}, {"id": "f1bd5d4c-bdca-42c9-b75c-f59883cc78dc", "tenant_id": "cc24780b195147e98cb75b931ea85ecf", "security_group_id": "50a5d6dc-e601-40f8-830a-ad5656ce543e", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:47Z", "updated_at": "2020-11-06T18:03:47Z", "revision_number": 0, "project_id": "cc24780b195147e98cb75b931ea85ecf"}], "tags": [], "created_at": "2020-11-06T18:03:47Z", "updated_at": "2020-11-06T18:03:47Z", "revision_number": 1, "project_id": "cc24780b195147e98cb75b931ea85ecf"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:47.838 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:47.890 37 INFO tempest.lib.common.rest_client [req-573fac86-2884-4877-8a5b-a1bf93b9f97c ] Request (SecGroupRbacTest:test_create_security_group): 200 GET http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles 0.046s 2020-11-06 18:03:47.893 37 DEBUG tempest.lib.common.rest_client [req-573fac86-2884-4877-8a5b-a1bf93b9f97c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-573fac86-2884-4877-8a5b-a1bf93b9f97c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:47.915 38 INFO tempest.lib.common.rest_client [req-722aaf61-23b0-4335-a83d-8a82260d0d20 ] Request (SnapshotsActionsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/c0192fceca894b0d97a9d2aaa0f9eb23 0.128s 2020-11-06 18:03:47.916 38 DEBUG tempest.lib.common.rest_client [req-722aaf61-23b0-4335-a83d-8a82260d0d20 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-722aaf61-23b0-4335-a83d-8a82260d0d20', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/c0192fceca894b0d97a9d2aaa0f9eb23'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:47.980 37 INFO tempest.lib.common.rest_client [req-2f9bc686-280a-41bf-839e-193513fa13f5 ] Request (SecGroupRbacTest:test_create_security_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-11-06 18:03:47.981 37 DEBUG tempest.lib.common.rest_client [req-2f9bc686-280a-41bf-839e-193513fa13f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2f9bc686-280a-41bf-839e-193513fa13f5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e9a02263742b4429a0e0760047fcd20d", "name": "tempest-SecGroupRbacTest-42509981", "password_expires_at": null}, "audit_ids": ["ONdRou1jQQeAUs7NL3PXoQ"], "expires_at": "2020-11-06T19:03:47.000000Z", "issued_at": "2020-11-06T18:03:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cc24780b195147e98cb75b931ea85ecf", "name": "tempest-SecGroupRbacTest-42509981"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:48.008 38 INFO tempest.lib.common.rest_client [req-e7ff2835-0d55-4404-a07d-eb5546188ea6 ] Request (SnapshotsActionsV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-11-06 18:03:48.009 38 DEBUG tempest.lib.common.rest_client [req-e7ff2835-0d55-4404-a07d-eb5546188ea6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e7ff2835-0d55-4404-a07d-eb5546188ea6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["KXw0M4BsSYW2Yyf4sJagrg"], "expires_at": "2020-11-06T19:03:47.000000Z", "issued_at": "2020-11-06T18:03:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:48.227 37 INFO tempest.lib.common.rest_client [req-c4c78cb0-f6c9-4f70-b745-ad9edac6def0 ] Request (SecGroupRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/50a5d6dc-e601-40f8-830a-ad5656ce543e 0.244s 2020-11-06 18:03:48.228 37 DEBUG tempest.lib.common.rest_client [req-c4c78cb0-f6c9-4f70-b745-ad9edac6def0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-c4c78cb0-f6c9-4f70-b745-ad9edac6def0', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:03:48 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/50a5d6dc-e601-40f8-830a-ad5656ce543e'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:48.232 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:48.235 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_security_group_rule, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:48.236 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:48.288 37 INFO tempest.lib.common.rest_client [req-cdc633e0-eecb-43ca-a922-51635e62f651 ] Request (SecGroupRbacTest:test_create_security_group_rule): 200 GET http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles 0.051s 2020-11-06 18:03:48.288 37 DEBUG tempest.lib.common.rest_client [req-cdc633e0-eecb-43ca-a922-51635e62f651 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cdc633e0-eecb-43ca-a922-51635e62f651', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:48.327 37 INFO tempest.lib.common.rest_client [req-b8904313-ca57-46ed-a9fe-6c6d0cd445f1 ] Request (SecGroupRbacTest:test_create_security_group_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:03:48.328 37 DEBUG tempest.lib.common.rest_client [req-b8904313-ca57-46ed-a9fe-6c6d0cd445f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b8904313-ca57-46ed-a9fe-6c6d0cd445f1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e9a02263742b4429a0e0760047fcd20d", "name": "tempest-SecGroupRbacTest-42509981", "password_expires_at": null}, "audit_ids": ["8gketwtNS7S2tpbBZKzgjw"], "expires_at": "2020-11-06T19:03:48.000000Z", "issued_at": "2020-11-06T18:03:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cc24780b195147e98cb75b931ea85ecf", "name": "tempest-SecGroupRbacTest-42509981"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:48.354 38 INFO tempest.lib.common.rest_client [req-a73ce823-0d61-4fac-959d-1d92cd7894be ] Request (SnapshotsActionsV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=3b4bab58d3e54d1dac1516c8a6695483&name=default 0.345s 2020-11-06 18:03:48.355 38 DEBUG tempest.lib.common.rest_client [req-a73ce823-0d61-4fac-959d-1d92cd7894be ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-a73ce823-0d61-4fac-959d-1d92cd7894be', 'date': 'Fri, 06 Nov 2020 18:03:48 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=3b4bab58d3e54d1dac1516c8a6695483&name=default'} Body: b'{"security_groups": [{"id": "712ef775-ec2f-4d35-b5b8-484672806f1d", "name": "default", "stateful": true, "tenant_id": "3b4bab58d3e54d1dac1516c8a6695483", "description": "Default security group", "security_group_rules": [{"id": "13a4db38-8abd-40c4-b340-3a1351bff667", "tenant_id": "3b4bab58d3e54d1dac1516c8a6695483", "security_group_id": "712ef775-ec2f-4d35-b5b8-484672806f1d", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "712ef775-ec2f-4d35-b5b8-484672806f1d", "description": null, "tags": [], "created_at": "2020-11-06T18:03:48Z", "updated_at": "2020-11-06T18:03:48Z", "revision_number": 0, "project_id": "3b4bab58d3e54d1dac1516c8a6695483"}, {"id": "4ae9c368-2007-4143-adda-3855c9a05cb6", "tenant_id": "3b4bab58d3e54d1dac1516c8a6695483", "security_group_id": "712ef775-ec2f-4d35-b5b8-484672806f1d", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "712ef775-ec2f-4d35-b5b8-484672806f1d", "description": null, "tags": [], "created_at": "2020-11-06T18:03:48Z", "updated_at": "2020-11-06T18:03:48Z", "revision_number": 0, "project_id": "3b4bab58d3e54d1dac1516c8a6695483"}, {"id": "79107947-60c7-4434-81b8-91007875d6a5", "tenant_id": "3b4bab58d3e54d1dac1516c8a6695483", "security_group_id": "712ef775-ec2f-4d35-b5b8-484672806f1d", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:48Z", "updated_at": "2020-11-06T18:03:48Z", "revision_number": 0, "project_id": "3b4bab58d3e54d1dac1516c8a6695483"}, {"id": "e729037f-d09a-47b3-8bb9-09fe0757fa96", "tenant_id": "3b4bab58d3e54d1dac1516c8a6695483", "security_group_id": "712ef775-ec2f-4d35-b5b8-484672806f1d", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:48Z", "updated_at": "2020-11-06T18:03:48Z", "revision_number": 0, "project_id": "3b4bab58d3e54d1dac1516c8a6695483"}], "tags": [], "created_at": "2020-11-06T18:03:48Z", "updated_at": "2020-11-06T18:03:48Z", "revision_number": 1, "project_id": "3b4bab58d3e54d1dac1516c8a6695483"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:48.492 38 INFO tempest.lib.common.rest_client [req-1b6db995-6361-47b4-932f-8687ae704aad ] Request (SnapshotsActionsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/712ef775-ec2f-4d35-b5b8-484672806f1d 0.135s 2020-11-06 18:03:48.492 38 DEBUG tempest.lib.common.rest_client [req-1b6db995-6361-47b4-932f-8687ae704aad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-1b6db995-6361-47b4-932f-8687ae704aad', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:03:48 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/712ef775-ec2f-4d35-b5b8-484672806f1d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:48.586 37 INFO tempest.lib.common.rest_client [req-8e6ec4ea-ca6b-4de2-9820-7320009e23af ] Request (SecGroupRbacTest:test_create_security_group_rule): 201 POST http://172.30.13.94:9696/v2.0/security-group-rules 0.257s 2020-11-06 18:03:48.587 37 DEBUG tempest.lib.common.rest_client [req-8e6ec4ea-ca6b-4de2-9820-7320009e23af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group_rule": {"security_group_id": "779647eb-fa30-4869-b0a8-4e934dbf5318", "direction": "ingress", "protocol": "tcp", "port_range_min": 99, "port_range_max": 99}} Response - Headers: {'content-type': 'application/json', 'content-length': '507', 'x-openstack-request-id': 'req-8e6ec4ea-ca6b-4de2-9820-7320009e23af', 'date': 'Fri, 06 Nov 2020 18:03:48 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/security-group-rules'} Body: b'{"security_group_rule": {"id": "703189da-f4c7-4ef5-9dc7-8fd87cab9f52", "tenant_id": "cc24780b195147e98cb75b931ea85ecf", "security_group_id": "779647eb-fa30-4869-b0a8-4e934dbf5318", "ethertype": "IPv4", "direction": "ingress", "protocol": "tcp", "port_range_min": 99, "port_range_max": 99, "remote_ip_prefix": null, "remote_group_id": null, "description": "", "created_at": "2020-11-06T18:03:48Z", "updated_at": "2020-11-06T18:03:48Z", "revision_number": 0, "project_id": "cc24780b195147e98cb75b931ea85ecf"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:48.588 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:48.632 38 INFO tempest.lib.common.rest_client [req-6f3ae099-93b5-49a7-85fd-f9e9f490a0fc ] Request (SnapshotsActionsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/3b4bab58d3e54d1dac1516c8a6695483 0.139s 2020-11-06 18:03:48.633 38 DEBUG tempest.lib.common.rest_client [req-6f3ae099-93b5-49a7-85fd-f9e9f490a0fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6f3ae099-93b5-49a7-85fd-f9e9f490a0fc', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3b4bab58d3e54d1dac1516c8a6695483'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:48.672 38 INFO tempest.lib.common.rest_client [req-cad9fa5e-abd5-4670-8caf-6c043fdea4a2 ] Request (SnapshotMetadataV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:03:48.673 38 DEBUG tempest.lib.common.rest_client [req-cad9fa5e-abd5-4670-8caf-6c043fdea4a2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cad9fa5e-abd5-4670-8caf-6c043fdea4a2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["iJaGOHjOTb-qDPD-J3MHaA"], "expires_at": "2020-11-06T19:03:48.000000Z", "issued_at": "2020-11-06T18:03:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:48.691 37 INFO tempest.lib.common.rest_client [req-9f2b776c-861a-4c54-a83f-995fe176b9fd ] Request (SecGroupRbacTest:test_create_security_group_rule): 200 GET http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles 0.102s 2020-11-06 18:03:48.692 37 DEBUG tempest.lib.common.rest_client [req-9f2b776c-861a-4c54-a83f-995fe176b9fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9f2b776c-861a-4c54-a83f-995fe176b9fd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:48.715 38 INFO tempest.lib.common.rest_client [req-0884d232-e540-4793-aa65-d9b99f3fcbd6 ] Request (SnapshotMetadataV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:03:48.716 38 DEBUG tempest.lib.common.rest_client [req-0884d232-e540-4793-aa65-d9b99f3fcbd6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0884d232-e540-4793-aa65-d9b99f3fcbd6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["eP8HphsOS8mZMR6aV_zSzg"], "expires_at": "2020-11-06T19:03:48.000000Z", "issued_at": "2020-11-06T18:03:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:48.728 40 INFO tempest.lib.common.rest_client [req-36971522-16d5-4cde-85da-156ca0aebf1a ] Request (VolumesActionsV310RbacTest:test_volume_upload_image): 200 GET http://172.30.13.94/image/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09 0.022s 2020-11-06 18:03:48.729 40 DEBUG tempest.lib.common.rest_client [req-36971522-16d5-4cde-85da-156ca0aebf1a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '659', 'content-type': 'application/json', 'x-openstack-request-id': 'req-36971522-16d5-4cde-85da-156ca0aebf1a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09'} Body: b'{"name": "tempest-VolumesActionsV310RbacTest-Image-1168947243", "disk_format": "raw", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "68335a62eaf549cda40ba242685cb95c", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "50cf6715-568d-494e-b14a-4bce1106cc09", "created_at": "2020-11-06T18:03:46Z", "updated_at": "2020-11-06T18:03:47Z", "tags": [], "self": "/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09", "file": "/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:48.775 38 INFO tempest.lib.common.rest_client [req-1d1706c0-c650-419a-9daf-9b02eb992adb ] Request (SnapshotMetadataV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.058s 2020-11-06 18:03:48.776 38 DEBUG tempest.lib.common.rest_client [req-1d1706c0-c650-419a-9daf-9b02eb992adb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1d1706c0-c650-419a-9daf-9b02eb992adb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:48.790 37 INFO tempest.lib.common.rest_client [req-63d5d32f-2b87-4b3b-bfba-4b303e690080 ] Request (SecGroupRbacTest:test_create_security_group_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-11-06 18:03:48.791 37 DEBUG tempest.lib.common.rest_client [req-63d5d32f-2b87-4b3b-bfba-4b303e690080 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-63d5d32f-2b87-4b3b-bfba-4b303e690080', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e9a02263742b4429a0e0760047fcd20d", "name": "tempest-SecGroupRbacTest-42509981", "password_expires_at": null}, "audit_ids": ["hUFqqH6mSSSWWnMCzuGPcg"], "expires_at": "2020-11-06T19:03:48.000000Z", "issued_at": "2020-11-06T18:03:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cc24780b195147e98cb75b931ea85ecf", "name": "tempest-SecGroupRbacTest-42509981"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:48.831 39 INFO tempest.lib.common.rest_client [req-2ef07c7c-5b84-4a0e-bd93-19bdbfccd636 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.343s 2020-11-06 18:03:48.832 39 DEBUG tempest.lib.common.rest_client [req-2ef07c7c-5b84-4a0e-bd93-19bdbfccd636 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2ef07c7c-5b84-4a0e-bd93-19bdbfccd636', 'x-compute-request-id': 'req-2ef07c7c-5b84-4a0e-bd93-19bdbfccd636', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:48.854 38 INFO tempest.lib.common.rest_client [req-27e2a90a-bad6-40bd-a0da-d0075447ec9d ] Request (SnapshotMetadataV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.077s 2020-11-06 18:03:48.854 38 DEBUG tempest.lib.common.rest_client [req-27e2a90a-bad6-40bd-a0da-d0075447ec9d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-SnapshotMetadataV3RbacTest-1218928268-desc", "domain_id": "default", "name": "tempest-SnapshotMetadataV3RbacTest-1218928268"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '390', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-27e2a90a-bad6-40bd-a0da-d0075447ec9d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "4964902d2f0d436ab7937b9f24638d16", "name": "tempest-SnapshotMetadataV3RbacTest-1218928268", "domain_id": "default", "description": "tempest-SnapshotMetadataV3RbacTest-1218928268-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:48.978 38 INFO tempest.lib.common.rest_client [req-aaf77a91-4a5f-4eef-aace-dff040c4ca22 ] Request (SnapshotMetadataV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.122s 2020-11-06 18:03:48.978 38 DEBUG tempest.lib.common.rest_client [req-aaf77a91-4a5f-4eef-aace-dff040c4ca22 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-SnapshotMetadataV3RbacTest-1218928268", "password": "E6*KF3E_q3Si2Kd", "project_id": "4964902d2f0d436ab7937b9f24638d16", "email": "tempest-SnapshotMetadataV3RbacTest-737377220@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '407', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aaf77a91-4a5f-4eef-aace-dff040c4ca22', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "4964902d2f0d436ab7937b9f24638d16", "email": "tempest-SnapshotMetadataV3RbacTest-737377220@example.com", "id": "f6b999658b6f47d29b15006a8d570185", "name": "tempest-SnapshotMetadataV3RbacTest-1218928268", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/f6b999658b6f47d29b15006a8d570185"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:49.031 38 INFO tempest.lib.common.rest_client [req-93b24905-d62a-4b34-b443-5cb3b2fc55f6 ] Request (SnapshotMetadataV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.052s 2020-11-06 18:03:49.032 38 DEBUG tempest.lib.common.rest_client [req-93b24905-d62a-4b34-b443-5cb3b2fc55f6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-93b24905-d62a-4b34-b443-5cb3b2fc55f6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:49.084 38 INFO tempest.lib.common.rest_client [req-706ac3f8-b923-40d0-8074-b2c450f63e02 ] Request (SnapshotMetadataV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.052s 2020-11-06 18:03:49.085 38 DEBUG tempest.lib.common.rest_client [req-706ac3f8-b923-40d0-8074-b2c450f63e02 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-706ac3f8-b923-40d0-8074-b2c450f63e02', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:49.153 38 INFO tempest.lib.common.rest_client [req-e5faec20-b39c-4b0f-b682-6277e5a79ddd ] Request (SnapshotMetadataV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles/72a4576c553448cd941b052c1ca0cf2d 0.067s 2020-11-06 18:03:49.154 38 DEBUG tempest.lib.common.rest_client [req-e5faec20-b39c-4b0f-b682-6277e5a79ddd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e5faec20-b39c-4b0f-b682-6277e5a79ddd', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:49.154 38 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SnapshotMetadataV3RbacTest-1218928268', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '4964902d2f0d436ab7937b9f24638d16', 'project_name': 'tempest-SnapshotMetadataV3RbacTest-1218928268', 'tenant_id': '4964902d2f0d436ab7937b9f24638d16', 'tenant_name': 'tempest-SnapshotMetadataV3RbacTest-1218928268', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'f6b999658b6f47d29b15006a8d570185'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:49.155 38 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SnapshotMetadataV3RbacTest-1218928268', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '4964902d2f0d436ab7937b9f24638d16', 'project_name': 'tempest-SnapshotMetadataV3RbacTest-1218928268', 'tenant_id': '4964902d2f0d436ab7937b9f24638d16', 'tenant_name': 'tempest-SnapshotMetadataV3RbacTest-1218928268', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'f6b999658b6f47d29b15006a8d570185'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:49.201 37 INFO tempest.lib.common.rest_client [req-1e440c91-b4c7-4ff3-a18b-5a15ee02b342 ] Request (SecGroupRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/security-group-rules/703189da-f4c7-4ef5-9dc7-8fd87cab9f52 0.408s 2020-11-06 18:03:49.202 37 DEBUG tempest.lib.common.rest_client [req-1e440c91-b4c7-4ff3-a18b-5a15ee02b342 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-1e440c91-b4c7-4ff3-a18b-5a15ee02b342', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:03:49 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-group-rules/703189da-f4c7-4ef5-9dc7-8fd87cab9f52'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:49.204 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:49.208 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_security_group, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:49.209 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:49.212 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_security_group, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:49.260 38 INFO tempest.lib.common.rest_client [req-1ff4a787-c5b9-42dd-b2eb-6afa1760e549 ] Request (SnapshotMetadataV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-11-06 18:03:49.260 38 DEBUG tempest.lib.common.rest_client [req-1ff4a787-c5b9-42dd-b2eb-6afa1760e549 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6583', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1ff4a787-c5b9-42dd-b2eb-6afa1760e549', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f6b999658b6f47d29b15006a8d570185", "name": "tempest-SnapshotMetadataV3RbacTest-1218928268", "password_expires_at": null}, "audit_ids": ["JxflMTA7Tmab3YxPkY7ifA"], "expires_at": "2020-11-06T19:03:49.000000Z", "issued_at": "2020-11-06T18:03:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4964902d2f0d436ab7937b9f24638d16", "name": "tempest-SnapshotMetadataV3RbacTest-1218928268"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:49.345 38 INFO tempest.lib.common.rest_client [req-55a407f0-ebe9-4aa7-a58d-483e83e23cbb ] Request (SnapshotMetadataV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-11-06 18:03:49.346 38 DEBUG tempest.lib.common.rest_client [req-55a407f0-ebe9-4aa7-a58d-483e83e23cbb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-55a407f0-ebe9-4aa7-a58d-483e83e23cbb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["rPypSLUPSEixzNTU65olNA"], "expires_at": "2020-11-06T19:03:49.000000Z", "issued_at": "2020-11-06T18:03:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:49.394 38 INFO tempest.lib.common.rest_client [req-b6d0a98f-573c-4b18-b37f-b9722ff50fc8 ] Request (SnapshotMetadataV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:03:49.395 38 DEBUG tempest.lib.common.rest_client [req-b6d0a98f-573c-4b18-b37f-b9722ff50fc8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b6d0a98f-573c-4b18-b37f-b9722ff50fc8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["hDHsV2MgSwmq4PupSr-5og"], "expires_at": "2020-11-06T19:03:49.000000Z", "issued_at": "2020-11-06T18:03:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:49.396 37 INFO tempest.lib.common.rest_client [req-4fe02bcc-1568-4eef-a0c2-2b73d5fefa7d ] Request (SecGroupRbacTest:test_delete_security_group): 201 POST http://172.30.13.94:9696/v2.0/security-groups 0.183s 2020-11-06 18:03:49.397 37 DEBUG tempest.lib.common.rest_client [req-4fe02bcc-1568-4eef-a0c2-2b73d5fefa7d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group": {"name": "tempest-SecGroupRbacTest-secgroup-1884721765"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1394', 'x-openstack-request-id': 'req-4fe02bcc-1568-4eef-a0c2-2b73d5fefa7d', 'date': 'Fri, 06 Nov 2020 18:03:49 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups'} Body: b'{"security_group": {"id": "8cde0415-1b5d-4cb9-a487-7f58f36496c9", "name": "tempest-SecGroupRbacTest-secgroup-1884721765", "stateful": true, "tenant_id": "cc24780b195147e98cb75b931ea85ecf", "description": "", "security_group_rules": [{"id": "8ee5caa2-4090-4ce8-8ab0-d9f1b2e72a2a", "tenant_id": "cc24780b195147e98cb75b931ea85ecf", "security_group_id": "8cde0415-1b5d-4cb9-a487-7f58f36496c9", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:49Z", "updated_at": "2020-11-06T18:03:49Z", "revision_number": 0, "project_id": "cc24780b195147e98cb75b931ea85ecf"}, {"id": "bdfc9cd3-1aa8-44e1-ac45-cce82e2ab551", "tenant_id": "cc24780b195147e98cb75b931ea85ecf", "security_group_id": "8cde0415-1b5d-4cb9-a487-7f58f36496c9", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:49Z", "updated_at": "2020-11-06T18:03:49Z", "revision_number": 0, "project_id": "cc24780b195147e98cb75b931ea85ecf"}], "tags": [], "created_at": "2020-11-06T18:03:49Z", "updated_at": "2020-11-06T18:03:49Z", "revision_number": 1, "project_id": "cc24780b195147e98cb75b931ea85ecf"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:49.398 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:49.448 37 INFO tempest.lib.common.rest_client [req-24c25fb7-47c1-4b47-a4a6-a44c9276c397 ] Request (SecGroupRbacTest:test_delete_security_group): 200 GET http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles 0.049s 2020-11-06 18:03:49.449 37 DEBUG tempest.lib.common.rest_client [req-24c25fb7-47c1-4b47-a4a6-a44c9276c397 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-24c25fb7-47c1-4b47-a4a6-a44c9276c397', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:49.451 38 INFO tempest.lib.common.rest_client [req-c6b12ef1-934a-497e-8a4c-ddd366b88c22 ] Request (SnapshotMetadataV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.055s 2020-11-06 18:03:49.451 38 DEBUG tempest.lib.common.rest_client [req-c6b12ef1-934a-497e-8a4c-ddd366b88c22 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c6b12ef1-934a-497e-8a4c-ddd366b88c22', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:49.497 38 INFO tempest.lib.common.rest_client [req-479ec2c2-7acc-4a8b-8069-d251685a7102 ] Request (SnapshotMetadataV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.045s 2020-11-06 18:03:49.498 38 DEBUG tempest.lib.common.rest_client [req-479ec2c2-7acc-4a8b-8069-d251685a7102 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-479ec2c2-7acc-4a8b-8069-d251685a7102', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:49.498 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:03:49.499 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:49.527 37 INFO tempest.lib.common.rest_client [req-913bd052-5c84-447f-a855-941217a4df25 ] Request (SecGroupRbacTest:test_delete_security_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.077s 2020-11-06 18:03:49.527 37 DEBUG tempest.lib.common.rest_client [req-913bd052-5c84-447f-a855-941217a4df25 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-913bd052-5c84-447f-a855-941217a4df25', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e9a02263742b4429a0e0760047fcd20d", "name": "tempest-SecGroupRbacTest-42509981", "password_expires_at": null}, "audit_ids": ["hqNubvyFS_23NgzyRjJ8Sw"], "expires_at": "2020-11-06T19:03:49.000000Z", "issued_at": "2020-11-06T18:03:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cc24780b195147e98cb75b931ea85ecf", "name": "tempest-SecGroupRbacTest-42509981"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:49.544 38 INFO tempest.lib.common.rest_client [req-145a81ae-eee5-4465-aec7-d45d209d864d ] Request (SnapshotMetadataV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles 0.044s 2020-11-06 18:03:49.544 38 DEBUG tempest.lib.common.rest_client [req-145a81ae-eee5-4465-aec7-d45d209d864d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-145a81ae-eee5-4465-aec7-d45d209d864d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:49.596 38 INFO tempest.lib.common.rest_client [req-eb992b9a-3877-4d85-85ff-4ab6241580ac ] Request (SnapshotMetadataV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles/72a4576c553448cd941b052c1ca0cf2d 0.050s 2020-11-06 18:03:49.596 38 DEBUG tempest.lib.common.rest_client [req-eb992b9a-3877-4d85-85ff-4ab6241580ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eb992b9a-3877-4d85-85ff-4ab6241580ac', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:49.696 38 INFO tempest.lib.common.rest_client [req-31d0bc9f-9052-409c-a72d-f4eb388b5563 ] Request (SnapshotMetadataV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles/a629c95d64b3416fb80ae90af4f69c05 0.099s 2020-11-06 18:03:49.696 38 DEBUG tempest.lib.common.rest_client [req-31d0bc9f-9052-409c-a72d-f4eb388b5563 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-31d0bc9f-9052-409c-a72d-f4eb388b5563', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:49.760 40 INFO tempest.lib.common.rest_client [req-909f58a5-6ebe-490f-b040-e9a355f7bb1d ] Request (VolumesActionsV310RbacTest:test_volume_upload_image): 200 GET http://172.30.13.94/image/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09 0.029s 2020-11-06 18:03:49.761 40 DEBUG tempest.lib.common.rest_client [req-909f58a5-6ebe-490f-b040-e9a355f7bb1d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '659', 'content-type': 'application/json', 'x-openstack-request-id': 'req-909f58a5-6ebe-490f-b040-e9a355f7bb1d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09'} Body: b'{"name": "tempest-VolumesActionsV310RbacTest-Image-1168947243", "disk_format": "raw", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "68335a62eaf549cda40ba242685cb95c", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "50cf6715-568d-494e-b14a-4bce1106cc09", "created_at": "2020-11-06T18:03:46Z", "updated_at": "2020-11-06T18:03:47Z", "tags": [], "self": "/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09", "file": "/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:49.858 37 INFO tempest.lib.common.rest_client [req-42ee799b-4ddc-463e-83c2-57bb67870086 ] Request (SecGroupRbacTest:test_delete_security_group): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/8cde0415-1b5d-4cb9-a487-7f58f36496c9 0.329s 2020-11-06 18:03:49.858 37 DEBUG tempest.lib.common.rest_client [req-42ee799b-4ddc-463e-83c2-57bb67870086 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-42ee799b-4ddc-463e-83c2-57bb67870086', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:03:49 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/8cde0415-1b5d-4cb9-a487-7f58f36496c9'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:49.859 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:49.952 37 INFO tempest.lib.common.rest_client [req-e1fa8f0c-925f-483b-be12-b3f37877b9b8 ] Request (SecGroupRbacTest:test_delete_security_group): 200 GET http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles 0.092s 2020-11-06 18:03:49.953 37 DEBUG tempest.lib.common.rest_client [req-e1fa8f0c-925f-483b-be12-b3f37877b9b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e1fa8f0c-925f-483b-be12-b3f37877b9b8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:50.049 37 INFO tempest.lib.common.rest_client [req-5994f599-edfb-4df9-aea1-04fcabc43f4a ] Request (SecGroupRbacTest:test_delete_security_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-11-06 18:03:50.050 37 DEBUG tempest.lib.common.rest_client [req-5994f599-edfb-4df9-aea1-04fcabc43f4a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5994f599-edfb-4df9-aea1-04fcabc43f4a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e9a02263742b4429a0e0760047fcd20d", "name": "tempest-SecGroupRbacTest-42509981", "password_expires_at": null}, "audit_ids": ["OcJph_LzSQ25Uiulx7p5XQ"], "expires_at": "2020-11-06T19:03:49.000000Z", "issued_at": "2020-11-06T18:03:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cc24780b195147e98cb75b931ea85ecf", "name": "tempest-SecGroupRbacTest-42509981"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:50.061 39 INFO tempest.lib.common.rest_client [req-b9caf4ae-559f-4d65-b4a0-2935e2e90493 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.215s 2020-11-06 18:03:50.061 39 DEBUG tempest.lib.common.rest_client [req-b9caf4ae-559f-4d65-b4a0-2935e2e90493 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b9caf4ae-559f-4d65-b4a0-2935e2e90493', 'x-compute-request-id': 'req-b9caf4ae-559f-4d65-b4a0-2935e2e90493', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:50.197 37 INFO tempest.lib.common.rest_client [req-58cded63-cb97-48b8-8a27-27ffd4d423c2 ] Request (SecGroupRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94:9696/v2.0/security-groups/8cde0415-1b5d-4cb9-a487-7f58f36496c9 0.146s 2020-11-06 18:03:50.198 37 DEBUG tempest.lib.common.rest_client [req-58cded63-cb97-48b8-8a27-27ffd4d423c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '146', 'x-openstack-request-id': 'req-58cded63-cb97-48b8-8a27-27ffd4d423c2', 'date': 'Fri, 06 Nov 2020 18:03:50 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/8cde0415-1b5d-4cb9-a487-7f58f36496c9'} Body: b'{"NeutronError": {"type": "SecurityGroupNotFound", "message": "Security group 8cde0415-1b5d-4cb9-a487-7f58f36496c9 does not exist", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:50.200 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:50.204 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_security_group_rule, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:50.205 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:50.207 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_security_group_rule, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:50.381 37 INFO tempest.lib.common.rest_client [req-beeddee9-198a-44e4-aae1-5dff6cffc212 ] Request (SecGroupRbacTest:test_delete_security_group_rule): 201 POST http://172.30.13.94:9696/v2.0/security-group-rules 0.173s 2020-11-06 18:03:50.381 37 DEBUG tempest.lib.common.rest_client [req-beeddee9-198a-44e4-aae1-5dff6cffc212 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group_rule": {"security_group_id": "779647eb-fa30-4869-b0a8-4e934dbf5318", "direction": "ingress", "protocol": "tcp", "port_range_min": 99, "port_range_max": 99}} Response - Headers: {'content-type': 'application/json', 'content-length': '507', 'x-openstack-request-id': 'req-beeddee9-198a-44e4-aae1-5dff6cffc212', 'date': 'Fri, 06 Nov 2020 18:03:50 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/security-group-rules'} Body: b'{"security_group_rule": {"id": "916879aa-2365-4b5f-8fbb-799de6d17e4c", "tenant_id": "cc24780b195147e98cb75b931ea85ecf", "security_group_id": "779647eb-fa30-4869-b0a8-4e934dbf5318", "ethertype": "IPv4", "direction": "ingress", "protocol": "tcp", "port_range_min": 99, "port_range_max": 99, "remote_ip_prefix": null, "remote_group_id": null, "description": "", "created_at": "2020-11-06T18:03:50Z", "updated_at": "2020-11-06T18:03:50Z", "revision_number": 0, "project_id": "cc24780b195147e98cb75b931ea85ecf"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:50.382 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:50.433 37 INFO tempest.lib.common.rest_client [req-313fce3b-4aa1-4e31-900f-85cda02bdfc6 ] Request (SecGroupRbacTest:test_delete_security_group_rule): 200 GET http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles 0.051s 2020-11-06 18:03:50.434 37 DEBUG tempest.lib.common.rest_client [req-313fce3b-4aa1-4e31-900f-85cda02bdfc6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-313fce3b-4aa1-4e31-900f-85cda02bdfc6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:50.467 37 INFO tempest.lib.common.rest_client [req-9785f1a0-c8b8-4ccb-87ac-c25339bf3884 ] Request (SecGroupRbacTest:test_delete_security_group_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:03:50.467 37 DEBUG tempest.lib.common.rest_client [req-9785f1a0-c8b8-4ccb-87ac-c25339bf3884 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9785f1a0-c8b8-4ccb-87ac-c25339bf3884', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e9a02263742b4429a0e0760047fcd20d", "name": "tempest-SecGroupRbacTest-42509981", "password_expires_at": null}, "audit_ids": ["6qEP5_tqQ0a1KkAXUYfAvw"], "expires_at": "2020-11-06T19:03:50.000000Z", "issued_at": "2020-11-06T18:03:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cc24780b195147e98cb75b931ea85ecf", "name": "tempest-SecGroupRbacTest-42509981"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:50.615 37 INFO tempest.lib.common.rest_client [req-57c06201-e688-423d-868f-447d16996ed5 ] Request (SecGroupRbacTest:test_delete_security_group_rule): 204 DELETE http://172.30.13.94:9696/v2.0/security-group-rules/916879aa-2365-4b5f-8fbb-799de6d17e4c 0.146s 2020-11-06 18:03:50.615 37 DEBUG tempest.lib.common.rest_client [req-57c06201-e688-423d-868f-447d16996ed5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-57c06201-e688-423d-868f-447d16996ed5', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:03:50 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-group-rules/916879aa-2365-4b5f-8fbb-799de6d17e4c'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:50.615 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:50.664 37 INFO tempest.lib.common.rest_client [req-afe2d1a3-f58a-45cc-a587-d6ec4ceac25d ] Request (SecGroupRbacTest:test_delete_security_group_rule): 200 GET http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles 0.048s 2020-11-06 18:03:50.665 37 DEBUG tempest.lib.common.rest_client [req-afe2d1a3-f58a-45cc-a587-d6ec4ceac25d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-afe2d1a3-f58a-45cc-a587-d6ec4ceac25d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:50.701 37 INFO tempest.lib.common.rest_client [req-2c50d0dc-dd1f-49ac-bef9-c6c94d1c7867 ] Request (SecGroupRbacTest:test_delete_security_group_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:03:50.702 37 DEBUG tempest.lib.common.rest_client [req-2c50d0dc-dd1f-49ac-bef9-c6c94d1c7867 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2c50d0dc-dd1f-49ac-bef9-c6c94d1c7867', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e9a02263742b4429a0e0760047fcd20d", "name": "tempest-SecGroupRbacTest-42509981", "password_expires_at": null}, "audit_ids": ["NirGqmSLRT-mmBl9jVxkpg"], "expires_at": "2020-11-06T19:03:50.000000Z", "issued_at": "2020-11-06T18:03:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cc24780b195147e98cb75b931ea85ecf", "name": "tempest-SecGroupRbacTest-42509981"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:50.780 38 INFO tempest.lib.common.rest_client [req-1298e917-0b00-47d9-8de7-31dd0f9865bb ] Request (SnapshotMetadataV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-11-06 18:03:50.780 38 DEBUG tempest.lib.common.rest_client [req-1298e917-0b00-47d9-8de7-31dd0f9865bb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1298e917-0b00-47d9-8de7-31dd0f9865bb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f6b999658b6f47d29b15006a8d570185", "name": "tempest-SnapshotMetadataV3RbacTest-1218928268", "password_expires_at": null}, "audit_ids": ["W9caBuQ0RFi6hU_6HIgcvA"], "expires_at": "2020-11-06T19:03:50.000000Z", "issued_at": "2020-11-06T18:03:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4964902d2f0d436ab7937b9f24638d16", "name": "tempest-SnapshotMetadataV3RbacTest-1218928268"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:50.786 40 INFO tempest.lib.common.rest_client [req-c3071f39-19c2-4a05-9d84-2c34b9fd6b73 ] Request (VolumesActionsV310RbacTest:test_volume_upload_image): 200 GET http://172.30.13.94/image/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09 0.023s 2020-11-06 18:03:50.787 40 DEBUG tempest.lib.common.rest_client [req-c3071f39-19c2-4a05-9d84-2c34b9fd6b73 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '659', 'content-type': 'application/json', 'x-openstack-request-id': 'req-c3071f39-19c2-4a05-9d84-2c34b9fd6b73', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09'} Body: b'{"name": "tempest-VolumesActionsV310RbacTest-Image-1168947243", "disk_format": "raw", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "68335a62eaf549cda40ba242685cb95c", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "50cf6715-568d-494e-b14a-4bce1106cc09", "created_at": "2020-11-06T18:03:46Z", "updated_at": "2020-11-06T18:03:47Z", "tags": [], "self": "/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09", "file": "/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:50.797 37 INFO tempest.lib.common.rest_client [req-dab28f5c-4dc4-4996-bc5b-6f51a83de19d ] Request (SecGroupRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94:9696/v2.0/security-group-rules/916879aa-2365-4b5f-8fbb-799de6d17e4c 0.094s 2020-11-06 18:03:50.798 37 DEBUG tempest.lib.common.rest_client [req-dab28f5c-4dc4-4996-bc5b-6f51a83de19d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '155', 'x-openstack-request-id': 'req-dab28f5c-4dc4-4996-bc5b-6f51a83de19d', 'date': 'Fri, 06 Nov 2020 18:03:50 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/security-group-rules/916879aa-2365-4b5f-8fbb-799de6d17e4c'} Body: b'{"NeutronError": {"type": "SecurityGroupRuleNotFound", "message": "Security group rule 916879aa-2365-4b5f-8fbb-799de6d17e4c does not exist", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:50.800 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:50.804 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_security_group_rule, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:50.805 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:50.853 37 INFO tempest.lib.common.rest_client [req-b128ec3b-f24c-4156-97b6-c6be7b2d9008 ] Request (SecGroupRbacTest:test_list_security_group_rules): 200 GET http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles 0.047s 2020-11-06 18:03:50.854 37 DEBUG tempest.lib.common.rest_client [req-b128ec3b-f24c-4156-97b6-c6be7b2d9008 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b128ec3b-f24c-4156-97b6-c6be7b2d9008', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:50.890 37 INFO tempest.lib.common.rest_client [req-3a2a6362-9000-45bb-96d8-2e0efd72cb31 ] Request (SecGroupRbacTest:test_list_security_group_rules): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:03:50.891 37 DEBUG tempest.lib.common.rest_client [req-3a2a6362-9000-45bb-96d8-2e0efd72cb31 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3a2a6362-9000-45bb-96d8-2e0efd72cb31', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e9a02263742b4429a0e0760047fcd20d", "name": "tempest-SecGroupRbacTest-42509981", "password_expires_at": null}, "audit_ids": ["zMGuI1QQSPiyn62tuu13zQ"], "expires_at": "2020-11-06T19:03:50.000000Z", "issued_at": "2020-11-06T18:03:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cc24780b195147e98cb75b931ea85ecf", "name": "tempest-SecGroupRbacTest-42509981"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:51.093 37 INFO tempest.lib.common.rest_client [req-0cecdfc8-d40f-4fe7-8f4e-590429c342ef ] Request (SecGroupRbacTest:test_list_security_group_rules): 200 GET http://172.30.13.94:9696/v2.0/security-group-rules 0.201s 2020-11-06 18:03:51.095 37 DEBUG tempest.lib.common.rest_client [req-0cecdfc8-d40f-4fe7-8f4e-590429c342ef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '131829', 'x-openstack-request-id': 'req-0cecdfc8-d40f-4fe7-8f4e-590429c342ef', 'date': 'Fri, 06 Nov 2020 18:03:51 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-group-rules'} Body: b'{"security_group_rules": [{"id": "0079c5db-80be-44e9-991b-2d9d16903112", "tenant_id": "2215d234de4a49abaff22bbaeec9fc37", "security_group_id": "11f7b334-6e22-4c32-a41d-e55f66a82c85", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "created_at": "2020-10-10T08:53:36Z", "updated_at": "2020-10-10T08:53:36Z", "revision_number": 0, "project_id": "2215d234de4a49abaff22bbaeec9fc37"}, {"id": "03f69956-3444-4baa-9f7e-c382c93290c4", "tenant_id": "d179774643044dfcae031d89abc20e34", "security_group_id": "f9378e3b-7d2f-48e6-934a-14e82a7dad78", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "created_at": "2020-10-19T13:45:02Z", "updated_at": "2020-10-19T13:45:02Z", "revision_number": 0, "project_id": "d179774643044dfcae031d89abc20e34"}, {"id": "05fa3153-aed2-4de5-8314-ffb53cead17b", "tenant_id": "b5a1d686fea648a8a8cd8484ef3238bd", "security_group_id": "db9ba17e-7a4f-44df-981e-65be947dbf74", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "created_at": "2020-10-08T06:09:14Z", "updated_at": "2020-10-08T06:09:14Z", "revision_number": 0, "project_id": "b5a1d686fea648a8a8cd8484ef3238bd"}, {"id": "083f921e-d39a-496b-90b9-220928265931", "tenant_id": "30ef7ad0e9f84c3e86996b3d2c616548", "security_group_id": "8cb55ecd-8eec-47fa-8800-af8c5165a089", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "created_at": "2020-10-24T13:24:12Z", "updated_at": "2020-10-24T13:24:12Z", "revision_number": 0, "project_id": "30ef7ad0e9f84c3e86996b3d2c616548"}, {"id": "09a6359f-34a9-4da6-8458-70a55d437a77", "tenant_id": "", "security_group_id": "791bd17a-f6c1-407a-999d-6b22fee91a75", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "791bd17a-f6c1-407a-999d-6b22fee91a75", "description": null, "created_at": "2020-10-07T12:07:48Z", "updated_at": "2020-10-07T12:07:48Z", "revision_number": 0, "project_id": ""}, {"id": "0cc594c1-88e3-4df4-b670-b0c5cc3ef768", "tenant_id": "35a7a01cc29046a8a9a3737b0562ad90", "security_group_id": "dc8af0cc-fa0d-4de0-852d-681f87177637", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "dc8af0cc-fa0d-4de0-852d-681f87177637", "description": null, "created_at": "2020-10-31T12:39:04Z", "updated_at": "2020-10-31T12:39:04Z", "revision_number": 0, "project_id": "35a7a01cc29046a8a9a3737b0562ad90"}, {"id": "0cff77d2-7fc7-4178-903c-52c3024f52bf", "tenant_id": "8c7b027d69d84d2b96321caa60f03171", "security_group_id": "d26c780c-51ee-4e2b-bdfd-ca3557a648e6", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "created_at": "2020-10-31T12:45:24Z", "updated_at": "2020-10-31T12:45:24Z", "revision_number": 0, "project_id": "8c7b027d69d84d2b96321caa60f03171"}, {"id": "0e7ea1ad-a709-42e6-ab5f-a01807d437ef", "tenant_id": "ac52ae57c38544319ba3dc244ec1bed9", "security_group_id": "64e6eee9-af62-480f-9495-da39940ea24e", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "created_at": "2020-10-24T13:21:59Z", "updated_at": "2020-10-24T13:21:59Z", "revision_number": 0, "project_id": "ac52ae57c38544319ba3dc244ec1bed9"}, {"id": "0ee7f861-034f-4315-b908-49d13ec2fc9f", "tenant_id": "c85b6a0b308a47908212ed3cd88cf19c", "security_group_id": "a7b8ac47-28d0-49f9-b5d1-bacae80d2e23", " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:51.097 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:51.154 37 INFO tempest.lib.common.rest_client [req-c5869722-58fc-4269-b095-b8c47a8e8573 ] Request (SecGroupRbacTest:test_list_security_group_rules): 200 GET http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles 0.056s 2020-11-06 18:03:51.155 37 DEBUG tempest.lib.common.rest_client [req-c5869722-58fc-4269-b095-b8c47a8e8573 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c5869722-58fc-4269-b095-b8c47a8e8573', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:51.182 38 INFO tempest.lib.common.rest_client [req-a315a365-ecac-4621-a6a5-da87d7bdd6e4 ] Request (SnapshotMetadataV3RbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/volumes 0.400s 2020-11-06 18:03:51.183 38 DEBUG tempest.lib.common.rest_client [req-a315a365-ecac-4621-a6a5-da87d7bdd6e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-SnapshotMetadataV3RbacTest-Volume-1318338761"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a315a365-ecac-4621-a6a5-da87d7bdd6e4', 'content-length': '847', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a315a365-ecac-4621-a6a5-da87d7bdd6e4', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/volumes'} Body: b'{"volume": {"id": "cd3195b3-34ec-4be1-b54e-b7a282dc90c4", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:03:51.000000", "updated_at": null, "name": "tempest-SnapshotMetadataV3RbacTest-Volume-1318338761", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/volumes/cd3195b3-34ec-4be1-b54e-b7a282dc90c4"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/4964902d2f0d436ab7937b9f24638d16/volumes/cd3195b3-34ec-4be1-b54e-b7a282dc90c4"}], "user_id": "f6b999658b6f47d29b15006a8d570185", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:51.191 37 INFO tempest.lib.common.rest_client [req-30481b1d-5bc0-43bd-b557-e0fce831323f ] Request (SecGroupRbacTest:test_list_security_group_rules): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:03:51.192 37 DEBUG tempest.lib.common.rest_client [req-30481b1d-5bc0-43bd-b557-e0fce831323f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-30481b1d-5bc0-43bd-b557-e0fce831323f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e9a02263742b4429a0e0760047fcd20d", "name": "tempest-SecGroupRbacTest-42509981", "password_expires_at": null}, "audit_ids": ["Wxt4aPQVTOS5FJMiMG9EeQ"], "expires_at": "2020-11-06T19:03:51.000000Z", "issued_at": "2020-11-06T18:03:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cc24780b195147e98cb75b931ea85ecf", "name": "tempest-SecGroupRbacTest-42509981"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:51.195 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:51.199 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_security_group, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:51.200 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:51.261 37 INFO tempest.lib.common.rest_client [req-3b4b8053-7b8c-46c5-a3e3-a8d5e1da5349 ] Request (SecGroupRbacTest:test_list_security_groups): 200 GET http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles 0.060s 2020-11-06 18:03:51.262 37 DEBUG tempest.lib.common.rest_client [req-3b4b8053-7b8c-46c5-a3e3-a8d5e1da5349 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3b4b8053-7b8c-46c5-a3e3-a8d5e1da5349', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:51.265 38 INFO tempest.lib.common.rest_client [req-1312aca5-4c1b-4191-8539-6dc79d79f15f ] Request (SnapshotMetadataV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/volumes/cd3195b3-34ec-4be1-b54e-b7a282dc90c4 0.066s 2020-11-06 18:03:51.266 38 DEBUG tempest.lib.common.rest_client [req-1312aca5-4c1b-4191-8539-6dc79d79f15f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-1312aca5-4c1b-4191-8539-6dc79d79f15f', 'content-length': '1026', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1312aca5-4c1b-4191-8539-6dc79d79f15f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/volumes/cd3195b3-34ec-4be1-b54e-b7a282dc90c4'} Body: b'{"volume": {"id": "cd3195b3-34ec-4be1-b54e-b7a282dc90c4", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:03:51.000000", "updated_at": null, "name": "tempest-SnapshotMetadataV3RbacTest-Volume-1318338761", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/volumes/cd3195b3-34ec-4be1-b54e-b7a282dc90c4"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/4964902d2f0d436ab7937b9f24638d16/volumes/cd3195b3-34ec-4be1-b54e-b7a282dc90c4"}], "user_id": "f6b999658b6f47d29b15006a8d570185", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": null, "os-vol-tenant-attr:tenant_id": "4964902d2f0d436ab7937b9f24638d16"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:51.286 39 INFO tempest.lib.common.rest_client [req-7646f665-2b8a-45cb-8cdb-c4b17ecf5e00 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.210s 2020-11-06 18:03:51.287 39 DEBUG tempest.lib.common.rest_client [req-7646f665-2b8a-45cb-8cdb-c4b17ecf5e00 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7646f665-2b8a-45cb-8cdb-c4b17ecf5e00', 'x-compute-request-id': 'req-7646f665-2b8a-45cb-8cdb-c4b17ecf5e00', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:51.298 37 INFO tempest.lib.common.rest_client [req-c44d205b-9b5c-4c0d-8e1a-4825f58cfc35 ] Request (SecGroupRbacTest:test_list_security_groups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:03:51.298 37 DEBUG tempest.lib.common.rest_client [req-c44d205b-9b5c-4c0d-8e1a-4825f58cfc35 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c44d205b-9b5c-4c0d-8e1a-4825f58cfc35', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e9a02263742b4429a0e0760047fcd20d", "name": "tempest-SecGroupRbacTest-42509981", "password_expires_at": null}, "audit_ids": ["zn1oeYL8R5OP8WOSOc_Mjw"], "expires_at": "2020-11-06T19:03:51.000000Z", "issued_at": "2020-11-06T18:03:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cc24780b195147e98cb75b931ea85ecf", "name": "tempest-SecGroupRbacTest-42509981"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:51.417 37 INFO tempest.lib.common.rest_client [req-87c6f941-b39b-4fbf-8f08-4b088a32346b ] Request (SecGroupRbacTest:test_list_security_groups): 200 GET http://172.30.13.94:9696/v2.0/security-groups?id=779647eb-fa30-4869-b0a8-4e934dbf5318 0.117s 2020-11-06 18:03:51.417 37 DEBUG tempest.lib.common.rest_client [req-87c6f941-b39b-4fbf-8f08-4b088a32346b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '1397', 'x-openstack-request-id': 'req-87c6f941-b39b-4fbf-8f08-4b088a32346b', 'date': 'Fri, 06 Nov 2020 18:03:51 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?id=779647eb-fa30-4869-b0a8-4e934dbf5318'} Body: b'{"security_groups": [{"id": "779647eb-fa30-4869-b0a8-4e934dbf5318", "name": "tempest-SecGroupRbacTest-secgroup-1115235571", "stateful": true, "tenant_id": "cc24780b195147e98cb75b931ea85ecf", "description": "", "security_group_rules": [{"id": "d870e181-5177-40d4-aeab-7d213c3597a5", "tenant_id": "cc24780b195147e98cb75b931ea85ecf", "security_group_id": "779647eb-fa30-4869-b0a8-4e934dbf5318", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:47Z", "updated_at": "2020-11-06T18:03:47Z", "revision_number": 0, "project_id": "cc24780b195147e98cb75b931ea85ecf"}, {"id": "f0eb003e-dd22-4472-b722-906e2f1b072e", "tenant_id": "cc24780b195147e98cb75b931ea85ecf", "security_group_id": "779647eb-fa30-4869-b0a8-4e934dbf5318", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:47Z", "updated_at": "2020-11-06T18:03:47Z", "revision_number": 0, "project_id": "cc24780b195147e98cb75b931ea85ecf"}], "tags": [], "created_at": "2020-11-06T18:03:47Z", "updated_at": "2020-11-06T18:03:50Z", "revision_number": 5, "project_id": "cc24780b195147e98cb75b931ea85ecf"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:51.418 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:51.471 37 INFO tempest.lib.common.rest_client [req-36c70e8e-6b12-4cc2-b052-1ec8f2168e5d ] Request (SecGroupRbacTest:test_list_security_groups): 200 GET http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles 0.052s 2020-11-06 18:03:51.471 37 DEBUG tempest.lib.common.rest_client [req-36c70e8e-6b12-4cc2-b052-1ec8f2168e5d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-36c70e8e-6b12-4cc2-b052-1ec8f2168e5d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:51.509 37 INFO tempest.lib.common.rest_client [req-e6c33033-0383-449c-867c-70bb5760b89a ] Request (SecGroupRbacTest:test_list_security_groups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:03:51.510 37 DEBUG tempest.lib.common.rest_client [req-e6c33033-0383-449c-867c-70bb5760b89a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e6c33033-0383-449c-867c-70bb5760b89a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e9a02263742b4429a0e0760047fcd20d", "name": "tempest-SecGroupRbacTest-42509981", "password_expires_at": null}, "audit_ids": ["6jwcYFQGQ8mRiWyYruHYcg"], "expires_at": "2020-11-06T19:03:51.000000Z", "issued_at": "2020-11-06T18:03:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cc24780b195147e98cb75b931ea85ecf", "name": "tempest-SecGroupRbacTest-42509981"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:51.513 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:51.517 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_security_group, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:51.517 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:51.582 37 INFO tempest.lib.common.rest_client [req-25d4531f-1d74-4e8f-80fd-bef8a43a864a ] Request (SecGroupRbacTest:test_show_security_group): 200 GET http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles 0.063s 2020-11-06 18:03:51.583 37 DEBUG tempest.lib.common.rest_client [req-25d4531f-1d74-4e8f-80fd-bef8a43a864a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-25d4531f-1d74-4e8f-80fd-bef8a43a864a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:51.622 37 INFO tempest.lib.common.rest_client [req-08dce35e-d9ea-4837-8706-e872fd06ac26 ] Request (SecGroupRbacTest:test_show_security_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:03:51.622 37 DEBUG tempest.lib.common.rest_client [req-08dce35e-d9ea-4837-8706-e872fd06ac26 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-08dce35e-d9ea-4837-8706-e872fd06ac26', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e9a02263742b4429a0e0760047fcd20d", "name": "tempest-SecGroupRbacTest-42509981", "password_expires_at": null}, "audit_ids": ["zF5nqlUdQLqvCQhxHy3bSQ"], "expires_at": "2020-11-06T19:03:51.000000Z", "issued_at": "2020-11-06T18:03:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cc24780b195147e98cb75b931ea85ecf", "name": "tempest-SecGroupRbacTest-42509981"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:51.734 37 INFO tempest.lib.common.rest_client [req-4c60d1b0-41db-4828-acfe-a71d43c9fcbd ] Request (SecGroupRbacTest:test_show_security_group): 200 GET http://172.30.13.94:9696/v2.0/security-groups/779647eb-fa30-4869-b0a8-4e934dbf5318 0.110s 2020-11-06 18:03:51.735 37 DEBUG tempest.lib.common.rest_client [req-4c60d1b0-41db-4828-acfe-a71d43c9fcbd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '1394', 'x-openstack-request-id': 'req-4c60d1b0-41db-4828-acfe-a71d43c9fcbd', 'date': 'Fri, 06 Nov 2020 18:03:51 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/779647eb-fa30-4869-b0a8-4e934dbf5318'} Body: b'{"security_group": {"id": "779647eb-fa30-4869-b0a8-4e934dbf5318", "name": "tempest-SecGroupRbacTest-secgroup-1115235571", "stateful": true, "tenant_id": "cc24780b195147e98cb75b931ea85ecf", "description": "", "security_group_rules": [{"id": "d870e181-5177-40d4-aeab-7d213c3597a5", "tenant_id": "cc24780b195147e98cb75b931ea85ecf", "security_group_id": "779647eb-fa30-4869-b0a8-4e934dbf5318", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:47Z", "updated_at": "2020-11-06T18:03:47Z", "revision_number": 0, "project_id": "cc24780b195147e98cb75b931ea85ecf"}, {"id": "f0eb003e-dd22-4472-b722-906e2f1b072e", "tenant_id": "cc24780b195147e98cb75b931ea85ecf", "security_group_id": "779647eb-fa30-4869-b0a8-4e934dbf5318", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:47Z", "updated_at": "2020-11-06T18:03:47Z", "revision_number": 0, "project_id": "cc24780b195147e98cb75b931ea85ecf"}], "tags": [], "created_at": "2020-11-06T18:03:47Z", "updated_at": "2020-11-06T18:03:50Z", "revision_number": 5, "project_id": "cc24780b195147e98cb75b931ea85ecf"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:51.735 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:51.788 37 INFO tempest.lib.common.rest_client [req-6aacc80c-5989-4596-8f5f-58fee6ce8f43 ] Request (SecGroupRbacTest:test_show_security_group): 200 GET http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles 0.052s 2020-11-06 18:03:51.789 37 DEBUG tempest.lib.common.rest_client [req-6aacc80c-5989-4596-8f5f-58fee6ce8f43 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6aacc80c-5989-4596-8f5f-58fee6ce8f43', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:51.810 40 INFO tempest.lib.common.rest_client [req-ba6d1b80-e826-4df9-b94a-8adc5357cedd ] Request (VolumesActionsV310RbacTest:test_volume_upload_image): 200 GET http://172.30.13.94/image/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09 0.020s 2020-11-06 18:03:51.810 40 DEBUG tempest.lib.common.rest_client [req-ba6d1b80-e826-4df9-b94a-8adc5357cedd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '659', 'content-type': 'application/json', 'x-openstack-request-id': 'req-ba6d1b80-e826-4df9-b94a-8adc5357cedd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09'} Body: b'{"name": "tempest-VolumesActionsV310RbacTest-Image-1168947243", "disk_format": "raw", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "68335a62eaf549cda40ba242685cb95c", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "50cf6715-568d-494e-b14a-4bce1106cc09", "created_at": "2020-11-06T18:03:46Z", "updated_at": "2020-11-06T18:03:47Z", "tags": [], "self": "/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09", "file": "/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:51.825 37 INFO tempest.lib.common.rest_client [req-417270f9-45e7-4a36-b050-122a3cee3da1 ] Request (SecGroupRbacTest:test_show_security_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:03:51.826 37 DEBUG tempest.lib.common.rest_client [req-417270f9-45e7-4a36-b050-122a3cee3da1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-417270f9-45e7-4a36-b050-122a3cee3da1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e9a02263742b4429a0e0760047fcd20d", "name": "tempest-SecGroupRbacTest-42509981", "password_expires_at": null}, "audit_ids": ["90_V8i33T2-tMpeoN-GUZA"], "expires_at": "2020-11-06T19:03:51.000000Z", "issued_at": "2020-11-06T18:03:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cc24780b195147e98cb75b931ea85ecf", "name": "tempest-SecGroupRbacTest-42509981"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:51.828 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:51.832 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_security_group_rule, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:52.105 37 INFO tempest.lib.common.rest_client [req-47a458ea-79a5-4ed6-b307-a6e1d9e9d81b ] Request (SecGroupRbacTest:test_show_security_group_rule): 201 POST http://172.30.13.94:9696/v2.0/security-group-rules 0.272s 2020-11-06 18:03:52.106 37 DEBUG tempest.lib.common.rest_client [req-47a458ea-79a5-4ed6-b307-a6e1d9e9d81b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group_rule": {"security_group_id": "779647eb-fa30-4869-b0a8-4e934dbf5318", "direction": "ingress", "protocol": "tcp", "port_range_min": 99, "port_range_max": 99}} Response - Headers: {'content-type': 'application/json', 'content-length': '507', 'x-openstack-request-id': 'req-47a458ea-79a5-4ed6-b307-a6e1d9e9d81b', 'date': 'Fri, 06 Nov 2020 18:03:52 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/security-group-rules'} Body: b'{"security_group_rule": {"id": "b01ae2bf-6b9a-4400-b0ef-a7a8f683d1eb", "tenant_id": "cc24780b195147e98cb75b931ea85ecf", "security_group_id": "779647eb-fa30-4869-b0a8-4e934dbf5318", "ethertype": "IPv4", "direction": "ingress", "protocol": "tcp", "port_range_min": 99, "port_range_max": 99, "remote_ip_prefix": null, "remote_group_id": null, "description": "", "created_at": "2020-11-06T18:03:52Z", "updated_at": "2020-11-06T18:03:52Z", "revision_number": 0, "project_id": "cc24780b195147e98cb75b931ea85ecf"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:52.106 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:52.156 37 INFO tempest.lib.common.rest_client [req-c3174f50-60b2-4646-b58e-3d9bc2c00333 ] Request (SecGroupRbacTest:test_show_security_group_rule): 200 GET http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles 0.049s 2020-11-06 18:03:52.157 37 DEBUG tempest.lib.common.rest_client [req-c3174f50-60b2-4646-b58e-3d9bc2c00333 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c3174f50-60b2-4646-b58e-3d9bc2c00333', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:52.193 37 INFO tempest.lib.common.rest_client [req-65182003-9424-4aa9-ac1a-63f8115a47ca ] Request (SecGroupRbacTest:test_show_security_group_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:03:52.194 37 DEBUG tempest.lib.common.rest_client [req-65182003-9424-4aa9-ac1a-63f8115a47ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-65182003-9424-4aa9-ac1a-63f8115a47ca', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e9a02263742b4429a0e0760047fcd20d", "name": "tempest-SecGroupRbacTest-42509981", "password_expires_at": null}, "audit_ids": ["JY8ynbBcQSOMOYTTSrFWig"], "expires_at": "2020-11-06T19:03:52.000000Z", "issued_at": "2020-11-06T18:03:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cc24780b195147e98cb75b931ea85ecf", "name": "tempest-SecGroupRbacTest-42509981"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:52.290 37 INFO tempest.lib.common.rest_client [req-b1953e94-9db3-4898-951b-79147227e020 ] Request (SecGroupRbacTest:test_show_security_group_rule): 200 GET http://172.30.13.94:9696/v2.0/security-group-rules/b01ae2bf-6b9a-4400-b0ef-a7a8f683d1eb 0.095s 2020-11-06 18:03:52.291 37 DEBUG tempest.lib.common.rest_client [req-b1953e94-9db3-4898-951b-79147227e020 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '507', 'x-openstack-request-id': 'req-b1953e94-9db3-4898-951b-79147227e020', 'date': 'Fri, 06 Nov 2020 18:03:52 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-group-rules/b01ae2bf-6b9a-4400-b0ef-a7a8f683d1eb'} Body: b'{"security_group_rule": {"id": "b01ae2bf-6b9a-4400-b0ef-a7a8f683d1eb", "tenant_id": "cc24780b195147e98cb75b931ea85ecf", "security_group_id": "779647eb-fa30-4869-b0a8-4e934dbf5318", "ethertype": "IPv4", "direction": "ingress", "protocol": "tcp", "port_range_min": 99, "port_range_max": 99, "remote_ip_prefix": null, "remote_group_id": null, "description": "", "created_at": "2020-11-06T18:03:52Z", "updated_at": "2020-11-06T18:03:52Z", "revision_number": 0, "project_id": "cc24780b195147e98cb75b931ea85ecf"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:52.292 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:52.348 38 INFO tempest.lib.common.rest_client [req-ffaf255c-ec28-4f6a-8370-5eeef87ce49f ] Request (SnapshotMetadataV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/volumes/cd3195b3-34ec-4be1-b54e-b7a282dc90c4 0.072s 2020-11-06 18:03:52.348 38 DEBUG tempest.lib.common.rest_client [req-ffaf255c-ec28-4f6a-8370-5eeef87ce49f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ffaf255c-ec28-4f6a-8370-5eeef87ce49f', 'content-length': '1070', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ffaf255c-ec28-4f6a-8370-5eeef87ce49f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/volumes/cd3195b3-34ec-4be1-b54e-b7a282dc90c4'} Body: b'{"volume": {"id": "cd3195b3-34ec-4be1-b54e-b7a282dc90c4", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:03:51.000000", "updated_at": "2020-11-06T18:03:51.000000", "name": "tempest-SnapshotMetadataV3RbacTest-Volume-1318338761", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/volumes/cd3195b3-34ec-4be1-b54e-b7a282dc90c4"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/4964902d2f0d436ab7937b9f24638d16/volumes/cd3195b3-34ec-4be1-b54e-b7a282dc90c4"}], "user_id": "f6b999658b6f47d29b15006a8d570185", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "4964902d2f0d436ab7937b9f24638d16"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:52.351 37 INFO tempest.lib.common.rest_client [req-0d3403eb-472c-4319-927c-bca6a7f52d12 ] Request (SecGroupRbacTest:test_show_security_group_rule): 200 GET http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles 0.059s 2020-11-06 18:03:52.352 37 DEBUG tempest.lib.common.rest_client [req-0d3403eb-472c-4319-927c-bca6a7f52d12 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0d3403eb-472c-4319-927c-bca6a7f52d12', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:52.360 38 INFO tempest.common.waiters [-] volume cd3195b3-34ec-4be1-b54e-b7a282dc90c4 reached available after waiting for 1.360399 seconds 2020-11-06 18:03:52.391 37 INFO tempest.lib.common.rest_client [req-db5747b8-f5f5-4fb0-9bc3-03c85e859055 ] Request (SecGroupRbacTest:test_show_security_group_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:03:52.392 37 DEBUG tempest.lib.common.rest_client [req-db5747b8-f5f5-4fb0-9bc3-03c85e859055 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-db5747b8-f5f5-4fb0-9bc3-03c85e859055', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e9a02263742b4429a0e0760047fcd20d", "name": "tempest-SecGroupRbacTest-42509981", "password_expires_at": null}, "audit_ids": ["bNXpF9v-Te62RDeXll4hUg"], "expires_at": "2020-11-06T19:03:52.000000Z", "issued_at": "2020-11-06T18:03:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cc24780b195147e98cb75b931ea85ecf", "name": "tempest-SecGroupRbacTest-42509981"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:52.492 39 INFO tempest.lib.common.rest_client [req-9b7ca014-374c-48ee-ba4e-7381e2e40869 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.192s 2020-11-06 18:03:52.493 39 DEBUG tempest.lib.common.rest_client [req-9b7ca014-374c-48ee-ba4e-7381e2e40869 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9b7ca014-374c-48ee-ba4e-7381e2e40869', 'x-compute-request-id': 'req-9b7ca014-374c-48ee-ba4e-7381e2e40869', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:52.574 37 INFO tempest.lib.common.rest_client [req-da12fe7a-1291-4a61-aed0-52794f27e3e7 ] Request (SecGroupRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/security-group-rules/b01ae2bf-6b9a-4400-b0ef-a7a8f683d1eb 0.181s 2020-11-06 18:03:52.575 37 DEBUG tempest.lib.common.rest_client [req-da12fe7a-1291-4a61-aed0-52794f27e3e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-da12fe7a-1291-4a61-aed0-52794f27e3e7', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:03:52 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-group-rules/b01ae2bf-6b9a-4400-b0ef-a7a8f683d1eb'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:52.576 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:52.579 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_security_group, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:52.579 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:52.581 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_security_group, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:52.589 38 INFO tempest.lib.common.rest_client [req-891f3242-eb9c-4129-92ea-5248aeb0f5f6 ] Request (SnapshotMetadataV3RbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/snapshots 0.228s 2020-11-06 18:03:52.589 38 DEBUG tempest.lib.common.rest_client [req-891f3242-eb9c-4129-92ea-5248aeb0f5f6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"snapshot": {"volume_id": "cd3195b3-34ec-4be1-b54e-b7a282dc90c4", "name": "tempest-SnapshotMetadataV3RbacTest-Snapshot-811289194"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-891f3242-eb9c-4129-92ea-5248aeb0f5f6', 'content-length': '312', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-891f3242-eb9c-4129-92ea-5248aeb0f5f6', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/snapshots'} Body: b'{"snapshot": {"id": "07d58ada-924b-473e-87d6-2d688354054f", "created_at": "2020-11-06T18:03:52.487290", "updated_at": null, "name": "tempest-SnapshotMetadataV3RbacTest-Snapshot-811289194", "description": null, "volume_id": "cd3195b3-34ec-4be1-b54e-b7a282dc90c4", "status": "creating", "size": 1, "metadata": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:52.636 38 INFO tempest.lib.common.rest_client [req-4bba5f0c-8216-4748-b896-3752aeb465e1 ] Request (SnapshotMetadataV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/snapshots/07d58ada-924b-473e-87d6-2d688354054f 0.042s 2020-11-06 18:03:52.637 38 DEBUG tempest.lib.common.rest_client [req-4bba5f0c-8216-4748-b896-3752aeb465e1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4bba5f0c-8216-4748-b896-3752aeb465e1', 'content-length': '444', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4bba5f0c-8216-4748-b896-3752aeb465e1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/snapshots/07d58ada-924b-473e-87d6-2d688354054f'} Body: b'{"snapshot": {"id": "07d58ada-924b-473e-87d6-2d688354054f", "created_at": "2020-11-06T18:03:52.000000", "updated_at": null, "name": "tempest-SnapshotMetadataV3RbacTest-Snapshot-811289194", "description": null, "volume_id": "cd3195b3-34ec-4be1-b54e-b7a282dc90c4", "status": "creating", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "4964902d2f0d436ab7937b9f24638d16", "os-extended-snapshot-attributes:progress": "0%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:52.763 37 INFO tempest.lib.common.rest_client [req-284528e4-558c-4f44-a5d0-f32710d9d0c1 ] Request (SecGroupRbacTest:test_update_security_group): 201 POST http://172.30.13.94:9696/v2.0/security-groups 0.181s 2020-11-06 18:03:52.763 37 DEBUG tempest.lib.common.rest_client [req-284528e4-558c-4f44-a5d0-f32710d9d0c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group": {"name": "tempest-SecGroupRbacTest-secgroup-1372615099"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1394', 'x-openstack-request-id': 'req-284528e4-558c-4f44-a5d0-f32710d9d0c1', 'date': 'Fri, 06 Nov 2020 18:03:52 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups'} Body: b'{"security_group": {"id": "8e2dd376-f87f-45f3-882a-c5710edb9057", "name": "tempest-SecGroupRbacTest-secgroup-1372615099", "stateful": true, "tenant_id": "cc24780b195147e98cb75b931ea85ecf", "description": "", "security_group_rules": [{"id": "27d76c91-f9fd-4b66-b0da-52984088828e", "tenant_id": "cc24780b195147e98cb75b931ea85ecf", "security_group_id": "8e2dd376-f87f-45f3-882a-c5710edb9057", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:52Z", "updated_at": "2020-11-06T18:03:52Z", "revision_number": 0, "project_id": "cc24780b195147e98cb75b931ea85ecf"}, {"id": "f7626ea6-b515-4175-a76f-6e07930d7265", "tenant_id": "cc24780b195147e98cb75b931ea85ecf", "security_group_id": "8e2dd376-f87f-45f3-882a-c5710edb9057", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:52Z", "updated_at": "2020-11-06T18:03:52Z", "revision_number": 0, "project_id": "cc24780b195147e98cb75b931ea85ecf"}], "tags": [], "created_at": "2020-11-06T18:03:52Z", "updated_at": "2020-11-06T18:03:52Z", "revision_number": 1, "project_id": "cc24780b195147e98cb75b931ea85ecf"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:52.764 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:52.838 40 INFO tempest.lib.common.rest_client [req-832ed32c-e8b5-40bb-b10c-8148fe632046 ] Request (VolumesActionsV310RbacTest:test_volume_upload_image): 200 GET http://172.30.13.94/image/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09 0.025s 2020-11-06 18:03:52.839 40 DEBUG tempest.lib.common.rest_client [req-832ed32c-e8b5-40bb-b10c-8148fe632046 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '659', 'content-type': 'application/json', 'x-openstack-request-id': 'req-832ed32c-e8b5-40bb-b10c-8148fe632046', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09'} Body: b'{"name": "tempest-VolumesActionsV310RbacTest-Image-1168947243", "disk_format": "raw", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "68335a62eaf549cda40ba242685cb95c", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "50cf6715-568d-494e-b14a-4bce1106cc09", "created_at": "2020-11-06T18:03:46Z", "updated_at": "2020-11-06T18:03:47Z", "tags": [], "self": "/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09", "file": "/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:52.872 37 INFO tempest.lib.common.rest_client [req-b2cfca12-a573-44a7-bf4c-bb20759d8d62 ] Request (SecGroupRbacTest:test_update_security_group): 200 GET http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles 0.107s 2020-11-06 18:03:52.873 37 DEBUG tempest.lib.common.rest_client [req-b2cfca12-a573-44a7-bf4c-bb20759d8d62 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b2cfca12-a573-44a7-bf4c-bb20759d8d62', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:52.964 37 INFO tempest.lib.common.rest_client [req-41737e81-f8d8-4f52-a1ef-6be6ba036ab3 ] Request (SecGroupRbacTest:test_update_security_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-11-06 18:03:52.965 37 DEBUG tempest.lib.common.rest_client [req-41737e81-f8d8-4f52-a1ef-6be6ba036ab3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-41737e81-f8d8-4f52-a1ef-6be6ba036ab3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e9a02263742b4429a0e0760047fcd20d", "name": "tempest-SecGroupRbacTest-42509981", "password_expires_at": null}, "audit_ids": ["sRBhNLIERVK-PIKDnecV_w"], "expires_at": "2020-11-06T19:03:52.000000Z", "issued_at": "2020-11-06T18:03:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cc24780b195147e98cb75b931ea85ecf", "name": "tempest-SecGroupRbacTest-42509981"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:53.152 37 INFO tempest.lib.common.rest_client [req-72631423-f082-468c-a7ca-3b6582f6ed92 ] Request (SecGroupRbacTest:test_update_security_group): 200 PUT http://172.30.13.94:9696/v2.0/security-groups/8e2dd376-f87f-45f3-882a-c5710edb9057 0.186s 2020-11-06 18:03:53.153 37 DEBUG tempest.lib.common.rest_client [req-72631423-f082-468c-a7ca-3b6582f6ed92 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group": {"description": "test description"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1410', 'x-openstack-request-id': 'req-72631423-f082-468c-a7ca-3b6582f6ed92', 'date': 'Fri, 06 Nov 2020 18:03:53 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/8e2dd376-f87f-45f3-882a-c5710edb9057'} Body: b'{"security_group": {"id": "8e2dd376-f87f-45f3-882a-c5710edb9057", "name": "tempest-SecGroupRbacTest-secgroup-1372615099", "stateful": true, "tenant_id": "cc24780b195147e98cb75b931ea85ecf", "description": "test description", "security_group_rules": [{"id": "27d76c91-f9fd-4b66-b0da-52984088828e", "tenant_id": "cc24780b195147e98cb75b931ea85ecf", "security_group_id": "8e2dd376-f87f-45f3-882a-c5710edb9057", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:52Z", "updated_at": "2020-11-06T18:03:52Z", "revision_number": 0, "project_id": "cc24780b195147e98cb75b931ea85ecf"}, {"id": "f7626ea6-b515-4175-a76f-6e07930d7265", "tenant_id": "cc24780b195147e98cb75b931ea85ecf", "security_group_id": "8e2dd376-f87f-45f3-882a-c5710edb9057", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:52Z", "updated_at": "2020-11-06T18:03:52Z", "revision_number": 0, "project_id": "cc24780b195147e98cb75b931ea85ecf"}], "tags": [], "created_at": "2020-11-06T18:03:52Z", "updated_at": "2020-11-06T18:03:53Z", "revision_number": 1, "project_id": "cc24780b195147e98cb75b931ea85ecf"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:53.153 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:53.209 37 INFO tempest.lib.common.rest_client [req-28283dcf-15d5-4f31-9d9d-4e915cacba41 ] Request (SecGroupRbacTest:test_update_security_group): 200 GET http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles 0.055s 2020-11-06 18:03:53.209 37 DEBUG tempest.lib.common.rest_client [req-28283dcf-15d5-4f31-9d9d-4e915cacba41 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-28283dcf-15d5-4f31-9d9d-4e915cacba41', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf/users/e9a02263742b4429a0e0760047fcd20d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:53.244 37 INFO tempest.lib.common.rest_client [req-e2ffdc61-e998-4ffe-a2ed-5729fc2ab3e5 ] Request (SecGroupRbacTest:test_update_security_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:03:53.244 37 DEBUG tempest.lib.common.rest_client [req-e2ffdc61-e998-4ffe-a2ed-5729fc2ab3e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e2ffdc61-e998-4ffe-a2ed-5729fc2ab3e5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e9a02263742b4429a0e0760047fcd20d", "name": "tempest-SecGroupRbacTest-42509981", "password_expires_at": null}, "audit_ids": ["y3I3B15rRpqa2u90UvAZVA"], "expires_at": "2020-11-06T19:03:53.000000Z", "issued_at": "2020-11-06T18:03:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cc24780b195147e98cb75b931ea85ecf", "name": "tempest-SecGroupRbacTest-42509981"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc24780b195147e98cb75b931ea85ecf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:53.532 37 INFO tempest.lib.common.rest_client [req-e63cd1a2-d40d-4640-a24b-de6ee3e5c052 ] Request (SecGroupRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/8e2dd376-f87f-45f3-882a-c5710edb9057 0.286s 2020-11-06 18:03:53.533 37 DEBUG tempest.lib.common.rest_client [req-e63cd1a2-d40d-4640-a24b-de6ee3e5c052 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-e63cd1a2-d40d-4640-a24b-de6ee3e5c052', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:03:53 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/8e2dd376-f87f-45f3-882a-c5710edb9057'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:53.677 38 INFO tempest.lib.common.rest_client [req-c8594dcb-2358-47f4-a5a4-d9f1ee989e78 ] Request (SnapshotMetadataV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/snapshots/07d58ada-924b-473e-87d6-2d688354054f 0.033s 2020-11-06 18:03:53.678 38 DEBUG tempest.lib.common.rest_client [req-c8594dcb-2358-47f4-a5a4-d9f1ee989e78 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c8594dcb-2358-47f4-a5a4-d9f1ee989e78', 'content-length': '471', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c8594dcb-2358-47f4-a5a4-d9f1ee989e78', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/snapshots/07d58ada-924b-473e-87d6-2d688354054f'} Body: b'{"snapshot": {"id": "07d58ada-924b-473e-87d6-2d688354054f", "created_at": "2020-11-06T18:03:52.000000", "updated_at": "2020-11-06T18:03:53.000000", "name": "tempest-SnapshotMetadataV3RbacTest-Snapshot-811289194", "description": null, "volume_id": "cd3195b3-34ec-4be1-b54e-b7a282dc90c4", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "4964902d2f0d436ab7937b9f24638d16", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:53.683 38 INFO tempest.common.waiters [-] snapshot 07d58ada-924b-473e-87d6-2d688354054f reached available after waiting for 1.683853 seconds 2020-11-06 18:03:53.685 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:53.687 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:delete_snapshot_metadata, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:53.782 38 INFO tempest.lib.common.rest_client [req-fe67d543-2a4e-4efa-888f-1c106879bbb2 ] Request (SnapshotMetadataV3RbacTest:test_delete_snapshot_metadata_item): 200 POST http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/snapshots/07d58ada-924b-473e-87d6-2d688354054f/metadata 0.095s 2020-11-06 18:03:53.783 38 DEBUG tempest.lib.common.rest_client [req-fe67d543-2a4e-4efa-888f-1c106879bbb2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"key1": "value1", "key2": "value2", "key3": "value3"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-fe67d543-2a4e-4efa-888f-1c106879bbb2', 'content-length': '68', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-fe67d543-2a4e-4efa-888f-1c106879bbb2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/snapshots/07d58ada-924b-473e-87d6-2d688354054f/metadata'} Body: b'{"metadata": {"key1": "value1", "key2": "value2", "key3": "value3"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:53.785 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:53.832 37 INFO tempest.lib.common.rest_client [req-1f50ad37-543f-4868-aab3-0c72b07a0087 ] Request (SecGroupRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/779647eb-fa30-4869-b0a8-4e934dbf5318 0.296s 2020-11-06 18:03:53.832 37 DEBUG tempest.lib.common.rest_client [req-1f50ad37-543f-4868-aab3-0c72b07a0087 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-1f50ad37-543f-4868-aab3-0c72b07a0087', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:03:53 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/779647eb-fa30-4869-b0a8-4e934dbf5318'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:53.854 39 INFO tempest.lib.common.rest_client [req-241e36ec-f0aa-457f-b303-f29fbb4d8706 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.346s 2020-11-06 18:03:53.855 39 DEBUG tempest.lib.common.rest_client [req-241e36ec-f0aa-457f-b303-f29fbb4d8706 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-241e36ec-f0aa-457f-b303-f29fbb4d8706', 'x-compute-request-id': 'req-241e36ec-f0aa-457f-b303-f29fbb4d8706', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:53.867 40 INFO tempest.lib.common.rest_client [req-1f23a5f5-f4fd-44b6-9f62-d310aa026568 ] Request (VolumesActionsV310RbacTest:test_volume_upload_image): 200 GET http://172.30.13.94/image/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09 0.025s 2020-11-06 18:03:53.867 40 DEBUG tempest.lib.common.rest_client [req-1f23a5f5-f4fd-44b6-9f62-d310aa026568 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '659', 'content-type': 'application/json', 'x-openstack-request-id': 'req-1f23a5f5-f4fd-44b6-9f62-d310aa026568', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09'} Body: b'{"name": "tempest-VolumesActionsV310RbacTest-Image-1168947243", "disk_format": "raw", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "68335a62eaf549cda40ba242685cb95c", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "50cf6715-568d-494e-b14a-4bce1106cc09", "created_at": "2020-11-06T18:03:46Z", "updated_at": "2020-11-06T18:03:47Z", "tags": [], "self": "/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09", "file": "/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:53.947 38 INFO tempest.lib.common.rest_client [req-e719eec2-0645-494f-bc93-53486dd279e7 ] Request (SnapshotMetadataV3RbacTest:test_delete_snapshot_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles 0.160s 2020-11-06 18:03:53.947 38 DEBUG tempest.lib.common.rest_client [req-e719eec2-0645-494f-bc93-53486dd279e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e719eec2-0645-494f-bc93-53486dd279e7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:54.026 38 INFO tempest.lib.common.rest_client [req-377f2c57-a384-4a6f-9c34-7eb972ea3c45 ] Request (SnapshotMetadataV3RbacTest:test_delete_snapshot_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-11-06 18:03:54.027 38 DEBUG tempest.lib.common.rest_client [req-377f2c57-a384-4a6f-9c34-7eb972ea3c45 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-377f2c57-a384-4a6f-9c34-7eb972ea3c45', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f6b999658b6f47d29b15006a8d570185", "name": "tempest-SnapshotMetadataV3RbacTest-1218928268", "password_expires_at": null}, "audit_ids": ["zOZwbYf2QrKXQbGDq_EgCA"], "expires_at": "2020-11-06T19:03:53.000000Z", "issued_at": "2020-11-06T18:03:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4964902d2f0d436ab7937b9f24638d16", "name": "tempest-SnapshotMetadataV3RbacTest-1218928268"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:54.058 37 INFO tempest.lib.common.rest_client [req-0e16bf55-32df-4c77-9897-9dfa935ff2af ] Request (SecGroupRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/e9a02263742b4429a0e0760047fcd20d 0.224s 2020-11-06 18:03:54.058 37 DEBUG tempest.lib.common.rest_client [req-0e16bf55-32df-4c77-9897-9dfa935ff2af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0e16bf55-32df-4c77-9897-9dfa935ff2af', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/e9a02263742b4429a0e0760047fcd20d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:54.150 37 INFO tempest.lib.common.rest_client [req-b622064a-84c7-498b-b642-dc89ca3cb010 ] Request (SecGroupRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-11-06 18:03:54.151 37 DEBUG tempest.lib.common.rest_client [req-b622064a-84c7-498b-b642-dc89ca3cb010 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b622064a-84c7-498b-b642-dc89ca3cb010', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["YcHg-WgURJmjIVIbYcfnqQ"], "expires_at": "2020-11-06T19:03:54.000000Z", "issued_at": "2020-11-06T18:03:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:54.279 38 INFO tempest.lib.common.rest_client [req-ea29c6bb-2f39-42fc-8a51-915111ed4a6b ] Request (SnapshotMetadataV3RbacTest:test_delete_snapshot_metadata_item): 200 DELETE http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/snapshots/07d58ada-924b-473e-87d6-2d688354054f/metadata/key1 0.251s 2020-11-06 18:03:54.279 38 DEBUG tempest.lib.common.rest_client [req-ea29c6bb-2f39-42fc-8a51-915111ed4a6b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version,Accept-Encoding', 'x-openstack-request-id': 'req-ea29c6bb-2f39-42fc-8a51-915111ed4a6b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/snapshots/07d58ada-924b-473e-87d6-2d688354054f/metadata/key1'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:54.280 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:54.343 38 INFO tempest.lib.common.rest_client [req-f7235dbd-4d42-4911-88d8-257000fc4f5f ] Request (SnapshotMetadataV3RbacTest:test_delete_snapshot_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles 0.063s 2020-11-06 18:03:54.344 38 DEBUG tempest.lib.common.rest_client [req-f7235dbd-4d42-4911-88d8-257000fc4f5f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f7235dbd-4d42-4911-88d8-257000fc4f5f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:54.378 38 INFO tempest.lib.common.rest_client [req-fdb0060d-1607-4202-bb51-3e131b27e607 ] Request (SnapshotMetadataV3RbacTest:test_delete_snapshot_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:03:54.379 38 DEBUG tempest.lib.common.rest_client [req-fdb0060d-1607-4202-bb51-3e131b27e607 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fdb0060d-1607-4202-bb51-3e131b27e607', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f6b999658b6f47d29b15006a8d570185", "name": "tempest-SnapshotMetadataV3RbacTest-1218928268", "password_expires_at": null}, "audit_ids": ["Gbeubw6nSKGJjsxljUeXHg"], "expires_at": "2020-11-06T19:03:54.000000Z", "issued_at": "2020-11-06T18:03:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4964902d2f0d436ab7937b9f24638d16", "name": "tempest-SnapshotMetadataV3RbacTest-1218928268"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:54.380 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:54.383 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:get_snapshot_metadata, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:54.545 38 INFO tempest.lib.common.rest_client [req-f4ab0789-98e3-4ef6-9924-4f42f02dec02 ] Request (SnapshotMetadataV3RbacTest:test_get_snapshot_metadata): 200 POST http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/snapshots/07d58ada-924b-473e-87d6-2d688354054f/metadata 0.161s 2020-11-06 18:03:54.545 38 DEBUG tempest.lib.common.rest_client [req-f4ab0789-98e3-4ef6-9924-4f42f02dec02 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"key1": "value1", "key2": "value2", "key3": "value3"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-f4ab0789-98e3-4ef6-9924-4f42f02dec02', 'content-length': '68', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f4ab0789-98e3-4ef6-9924-4f42f02dec02', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/snapshots/07d58ada-924b-473e-87d6-2d688354054f/metadata'} Body: b'{"metadata": {"key2": "value2", "key3": "value3", "key1": "value1"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:54.546 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:54.658 38 INFO tempest.lib.common.rest_client [req-66bc064f-953f-42c6-a0c9-0fd17a2688ab ] Request (SnapshotMetadataV3RbacTest:test_get_snapshot_metadata): 200 GET http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles 0.111s 2020-11-06 18:03:54.658 38 DEBUG tempest.lib.common.rest_client [req-66bc064f-953f-42c6-a0c9-0fd17a2688ab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-66bc064f-953f-42c6-a0c9-0fd17a2688ab', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:54.739 38 INFO tempest.lib.common.rest_client [req-4250c168-e9f6-4b75-ac66-961fdb47d9a8 ] Request (SnapshotMetadataV3RbacTest:test_get_snapshot_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.079s 2020-11-06 18:03:54.740 38 DEBUG tempest.lib.common.rest_client [req-4250c168-e9f6-4b75-ac66-961fdb47d9a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4250c168-e9f6-4b75-ac66-961fdb47d9a8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f6b999658b6f47d29b15006a8d570185", "name": "tempest-SnapshotMetadataV3RbacTest-1218928268", "password_expires_at": null}, "audit_ids": ["_iSx5gvFR5OAJYN80RD8OA"], "expires_at": "2020-11-06T19:03:54.000000Z", "issued_at": "2020-11-06T18:03:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4964902d2f0d436ab7937b9f24638d16", "name": "tempest-SnapshotMetadataV3RbacTest-1218928268"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:54.890 38 INFO tempest.lib.common.rest_client [req-9cd46147-b78a-494a-bece-6d7e7d10fb3a ] Request (SnapshotMetadataV3RbacTest:test_get_snapshot_metadata): 200 GET http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/snapshots/07d58ada-924b-473e-87d6-2d688354054f/metadata 0.149s 2020-11-06 18:03:54.891 38 DEBUG tempest.lib.common.rest_client [req-9cd46147-b78a-494a-bece-6d7e7d10fb3a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-9cd46147-b78a-494a-bece-6d7e7d10fb3a', 'content-length': '68', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9cd46147-b78a-494a-bece-6d7e7d10fb3a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/snapshots/07d58ada-924b-473e-87d6-2d688354054f/metadata'} Body: b'{"metadata": {"key2": "value2", "key3": "value3", "key1": "value1"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:54.894 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:54.898 40 INFO tempest.lib.common.rest_client [req-fc25e4fc-601b-4b3a-b5b9-50493ca86a1d ] Request (VolumesActionsV310RbacTest:test_volume_upload_image): 200 GET http://172.30.13.94/image/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09 0.028s 2020-11-06 18:03:54.898 40 DEBUG tempest.lib.common.rest_client [req-fc25e4fc-601b-4b3a-b5b9-50493ca86a1d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '831', 'content-type': 'application/json', 'x-openstack-request-id': 'req-fc25e4fc-601b-4b3a-b5b9-50493ca86a1d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09'} Body: b'{"name": "tempest-VolumesActionsV310RbacTest-Image-1168947243", "disk_format": "raw", "container_format": "bare", "visibility": "private", "size": 1073741824, "virtual_size": 1073741824, "status": "active", "checksum": "cd573cfaace07e7949bc0c46028904ff", "protected": false, "min_ram": 0, "min_disk": 0, "owner": "68335a62eaf549cda40ba242685cb95c", "os_hidden": false, "os_hash_algo": "sha512", "os_hash_value": "c5041ae163cf0f65600acfe7f6a63f212101687d41a57a4e18ffd2a07a452cd8175b8f5a4868dd2330bfe5ae123f18216bdbc9e0f80d131e64b94913a7b40bb5", "id": "50cf6715-568d-494e-b14a-4bce1106cc09", "created_at": "2020-11-06T18:03:46Z", "updated_at": "2020-11-06T18:03:55Z", "tags": [], "self": "/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09", "file": "/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:54.968 40 INFO tempest.lib.common.rest_client [req-2ffe18d4-81ce-4871-808a-d0d54363207c ] Request (VolumesActionsV310RbacTest:test_volume_upload_image): 200 GET http://172.30.13.94/volume/v3/68335a62eaf549cda40ba242685cb95c/volumes/4ac5b3d2-38d3-4d09-9f25-62a79d5e2871 0.068s 2020-11-06 18:03:54.968 40 DEBUG tempest.lib.common.rest_client [req-2ffe18d4-81ce-4871-808a-d0d54363207c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.10', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-2ffe18d4-81ce-4871-808a-d0d54363207c', 'content-length': '1069', 'openstack-api-version': 'volume 3.10', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2ffe18d4-81ce-4871-808a-d0d54363207c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/68335a62eaf549cda40ba242685cb95c/volumes/4ac5b3d2-38d3-4d09-9f25-62a79d5e2871'} Body: b'{"volume": {"id": "4ac5b3d2-38d3-4d09-9f25-62a79d5e2871", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:03:45.000000", "updated_at": "2020-11-06T18:03:55.000000", "name": "tempest-VolumesActionsV310RbacTest-Volume-664382291", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/68335a62eaf549cda40ba242685cb95c/volumes/4ac5b3d2-38d3-4d09-9f25-62a79d5e2871"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/68335a62eaf549cda40ba242685cb95c/volumes/4ac5b3d2-38d3-4d09-9f25-62a79d5e2871"}], "user_id": "9bdbf6356f534045a5482b7b7136964d", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "68335a62eaf549cda40ba242685cb95c"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:54.979 40 INFO tempest.common.waiters [-] volume 4ac5b3d2-38d3-4d09-9f25-62a79d5e2871 reached available after waiting for 0.979693 seconds 2020-11-06 18:03:55.001 38 INFO tempest.lib.common.rest_client [req-bbec4b25-8e10-48ac-a98e-a855c5a756cc ] Request (SnapshotMetadataV3RbacTest:test_get_snapshot_metadata): 200 GET http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles 0.106s 2020-11-06 18:03:55.002 38 DEBUG tempest.lib.common.rest_client [req-bbec4b25-8e10-48ac-a98e-a855c5a756cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bbec4b25-8e10-48ac-a98e-a855c5a756cc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:55.046 38 INFO tempest.lib.common.rest_client [req-dd480581-ca99-4e6b-be10-4d0eb276e0bf ] Request (SnapshotMetadataV3RbacTest:test_get_snapshot_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-11-06 18:03:55.047 38 DEBUG tempest.lib.common.rest_client [req-dd480581-ca99-4e6b-be10-4d0eb276e0bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dd480581-ca99-4e6b-be10-4d0eb276e0bf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f6b999658b6f47d29b15006a8d570185", "name": "tempest-SnapshotMetadataV3RbacTest-1218928268", "password_expires_at": null}, "audit_ids": ["tbDNvkEKRHGSfkreNNVQqg"], "expires_at": "2020-11-06T19:03:55.000000Z", "issued_at": "2020-11-06T18:03:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4964902d2f0d436ab7937b9f24638d16", "name": "tempest-SnapshotMetadataV3RbacTest-1218928268"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:55.050 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:55.053 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_tenant_attribute, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:55.197 39 INFO tempest.lib.common.rest_client [req-9942f14e-1cba-4fb0-ae9a-b177fb085695 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.326s 2020-11-06 18:03:55.198 39 DEBUG tempest.lib.common.rest_client [req-9942f14e-1cba-4fb0-ae9a-b177fb085695 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9942f14e-1cba-4fb0-ae9a-b177fb085695', 'x-compute-request-id': 'req-9942f14e-1cba-4fb0-ae9a-b177fb085695', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:55.201 38 INFO tempest.lib.common.rest_client [req-5dc9730b-3dfa-4354-b1b4-b5368acf12d8 ] Request (SnapshotMetadataV3RbacTest:test_get_snapshot_metadata_for_volume_tenant): 200 POST http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/snapshots/07d58ada-924b-473e-87d6-2d688354054f/metadata 0.148s 2020-11-06 18:03:55.202 38 DEBUG tempest.lib.common.rest_client [req-5dc9730b-3dfa-4354-b1b4-b5368acf12d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"key1": "value1", "key2": "value2", "key3": "value3"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-5dc9730b-3dfa-4354-b1b4-b5368acf12d8', 'content-length': '68', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5dc9730b-3dfa-4354-b1b4-b5368acf12d8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/snapshots/07d58ada-924b-473e-87d6-2d688354054f/metadata'} Body: b'{"metadata": {"key2": "value2", "key3": "value3", "key1": "value1"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:55.204 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:55.256 38 INFO tempest.lib.common.rest_client [req-366e5450-4fde-44cb-a8b3-884df6e5b15d ] Request (SnapshotMetadataV3RbacTest:test_get_snapshot_metadata_for_volume_tenant): 200 GET http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles 0.050s 2020-11-06 18:03:55.256 38 DEBUG tempest.lib.common.rest_client [req-366e5450-4fde-44cb-a8b3-884df6e5b15d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-366e5450-4fde-44cb-a8b3-884df6e5b15d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:55.292 38 INFO tempest.lib.common.rest_client [req-301b0b4e-4717-4478-9427-8e261305a04f ] Request (SnapshotMetadataV3RbacTest:test_get_snapshot_metadata_for_volume_tenant): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:03:55.292 38 DEBUG tempest.lib.common.rest_client [req-301b0b4e-4717-4478-9427-8e261305a04f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-301b0b4e-4717-4478-9427-8e261305a04f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f6b999658b6f47d29b15006a8d570185", "name": "tempest-SnapshotMetadataV3RbacTest-1218928268", "password_expires_at": null}, "audit_ids": ["E7vm3tg6S1adqNJS6GHnxg"], "expires_at": "2020-11-06T19:03:55.000000Z", "issued_at": "2020-11-06T18:03:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4964902d2f0d436ab7937b9f24638d16", "name": "tempest-SnapshotMetadataV3RbacTest-1218928268"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:55.392 38 INFO tempest.lib.common.rest_client [req-ca1ebd63-6c99-47fa-a672-767961a592a1 ] Request (SnapshotMetadataV3RbacTest:test_get_snapshot_metadata_for_volume_tenant): 200 GET http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/snapshots/07d58ada-924b-473e-87d6-2d688354054f/metadata 0.098s 2020-11-06 18:03:55.393 38 DEBUG tempest.lib.common.rest_client [req-ca1ebd63-6c99-47fa-a672-767961a592a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ca1ebd63-6c99-47fa-a672-767961a592a1', 'content-length': '68', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ca1ebd63-6c99-47fa-a672-767961a592a1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/snapshots/07d58ada-924b-473e-87d6-2d688354054f/metadata'} Body: b'{"metadata": {"key2": "value2", "key3": "value3", "key1": "value1"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:55.395 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:55.429 37 INFO tempest.lib.common.rest_client [req-2ba016ac-66b7-450e-97e1-b4041ace858d ] Request (SecGroupRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=cc24780b195147e98cb75b931ea85ecf&name=default 1.277s 2020-11-06 18:03:55.430 37 DEBUG tempest.lib.common.rest_client [req-2ba016ac-66b7-450e-97e1-b4041ace858d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-2ba016ac-66b7-450e-97e1-b4041ace858d', 'date': 'Fri, 06 Nov 2020 18:03:55 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=cc24780b195147e98cb75b931ea85ecf&name=default'} Body: b'{"security_groups": [{"id": "b5eaac5d-163e-482d-af6a-761558dde744", "name": "default", "stateful": true, "tenant_id": "cc24780b195147e98cb75b931ea85ecf", "description": "Default security group", "security_group_rules": [{"id": "4c27dfe3-aea6-47a2-8225-39098a4b16b5", "tenant_id": "cc24780b195147e98cb75b931ea85ecf", "security_group_id": "b5eaac5d-163e-482d-af6a-761558dde744", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "b5eaac5d-163e-482d-af6a-761558dde744", "description": null, "tags": [], "created_at": "2020-11-06T18:03:47Z", "updated_at": "2020-11-06T18:03:47Z", "revision_number": 0, "project_id": "cc24780b195147e98cb75b931ea85ecf"}, {"id": "b8a05cd6-b1ea-4cae-a68e-6d1ffb28b1cc", "tenant_id": "cc24780b195147e98cb75b931ea85ecf", "security_group_id": "b5eaac5d-163e-482d-af6a-761558dde744", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:47Z", "updated_at": "2020-11-06T18:03:47Z", "revision_number": 0, "project_id": "cc24780b195147e98cb75b931ea85ecf"}, {"id": "cf0306a0-b166-4ac4-a16f-85fae815656c", "tenant_id": "cc24780b195147e98cb75b931ea85ecf", "security_group_id": "b5eaac5d-163e-482d-af6a-761558dde744", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "b5eaac5d-163e-482d-af6a-761558dde744", "description": null, "tags": [], "created_at": "2020-11-06T18:03:47Z", "updated_at": "2020-11-06T18:03:47Z", "revision_number": 0, "project_id": "cc24780b195147e98cb75b931ea85ecf"}, {"id": "d3e577f1-94e8-4c89-8d7f-07ade44c4c1f", "tenant_id": "cc24780b195147e98cb75b931ea85ecf", "security_group_id": "b5eaac5d-163e-482d-af6a-761558dde744", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:47Z", "updated_at": "2020-11-06T18:03:47Z", "revision_number": 0, "project_id": "cc24780b195147e98cb75b931ea85ecf"}], "tags": [], "created_at": "2020-11-06T18:03:47Z", "updated_at": "2020-11-06T18:03:47Z", "revision_number": 1, "project_id": "cc24780b195147e98cb75b931ea85ecf"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:55.442 38 INFO tempest.lib.common.rest_client [req-3f03bd40-5e52-45c9-a48a-12947c223981 ] Request (SnapshotMetadataV3RbacTest:test_get_snapshot_metadata_for_volume_tenant): 200 GET http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles 0.046s 2020-11-06 18:03:55.443 38 DEBUG tempest.lib.common.rest_client [req-3f03bd40-5e52-45c9-a48a-12947c223981 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3f03bd40-5e52-45c9-a48a-12947c223981', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:55.447 40 INFO tempest.lib.common.rest_client [req-af737d31-f00a-4333-9f6d-4bb3a79f0426 ] Request (VolumesActionsV310RbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09 0.467s 2020-11-06 18:03:55.448 40 DEBUG tempest.lib.common.rest_client [req-af737d31-f00a-4333-9f6d-4bb3a79f0426 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-af737d31-f00a-4333-9f6d-4bb3a79f0426', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/50cf6715-568d-494e-b14a-4bce1106cc09'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:55.451 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:55.454 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_actions:upload_public, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:55.455 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:55.479 38 INFO tempest.lib.common.rest_client [req-cef174a7-92a8-4032-8911-aff6ec293b0c ] Request (SnapshotMetadataV3RbacTest:test_get_snapshot_metadata_for_volume_tenant): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:03:55.480 38 DEBUG tempest.lib.common.rest_client [req-cef174a7-92a8-4032-8911-aff6ec293b0c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cef174a7-92a8-4032-8911-aff6ec293b0c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f6b999658b6f47d29b15006a8d570185", "name": "tempest-SnapshotMetadataV3RbacTest-1218928268", "password_expires_at": null}, "audit_ids": ["9xlLl2tJR1mtpQMAxuhh5g"], "expires_at": "2020-11-06T19:03:55.000000Z", "issued_at": "2020-11-06T18:03:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4964902d2f0d436ab7937b9f24638d16", "name": "tempest-SnapshotMetadataV3RbacTest-1218928268"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:55.482 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:55.485 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:get_snapshot_metadata, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:55.515 40 INFO tempest.lib.common.rest_client [req-7775a678-37a6-431b-90ae-2ec67a3279b9 ] Request (VolumesActionsV310RbacTest:test_volume_upload_public): 200 GET http://172.30.13.94/identity/v3/projects/68335a62eaf549cda40ba242685cb95c/users/9bdbf6356f534045a5482b7b7136964d/roles 0.059s 2020-11-06 18:03:55.516 40 DEBUG tempest.lib.common.rest_client [req-7775a678-37a6-431b-90ae-2ec67a3279b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7775a678-37a6-431b-90ae-2ec67a3279b9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/68335a62eaf549cda40ba242685cb95c/users/9bdbf6356f534045a5482b7b7136964d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/68335a62eaf549cda40ba242685cb95c/users/9bdbf6356f534045a5482b7b7136964d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:55.598 40 INFO tempest.lib.common.rest_client [req-d48c0a98-8f0d-4bff-bbed-c75d54e6ee7a ] Request (VolumesActionsV310RbacTest:test_volume_upload_public): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-11-06 18:03:55.598 40 DEBUG tempest.lib.common.rest_client [req-d48c0a98-8f0d-4bff-bbed-c75d54e6ee7a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d48c0a98-8f0d-4bff-bbed-c75d54e6ee7a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9bdbf6356f534045a5482b7b7136964d", "name": "tempest-VolumesActionsV310RbacTest-1710022807", "password_expires_at": null}, "audit_ids": ["R1hV3-k2S7y_UuQzy5W4sQ"], "expires_at": "2020-11-06T19:03:55.000000Z", "issued_at": "2020-11-06T18:03:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "68335a62eaf549cda40ba242685cb95c", "name": "tempest-VolumesActionsV310RbacTest-1710022807"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/68335a62eaf549cda40ba242685cb95c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/68335a62eaf549cda40ba242685cb95c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/68335a62eaf549cda40ba242685cb95c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_68335a62eaf549cda40ba242685cb95c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_68335a62eaf549cda40ba242685cb95c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_68335a62eaf549cda40ba242685cb95c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:55.604 38 INFO tempest.lib.common.rest_client [req-1fe87274-2d88-4a71-8d79-ff21ffd94649 ] Request (SnapshotMetadataV3RbacTest:test_show_snapshot_metadata_item): 200 POST http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/snapshots/07d58ada-924b-473e-87d6-2d688354054f/metadata 0.117s 2020-11-06 18:03:55.604 38 DEBUG tempest.lib.common.rest_client [req-1fe87274-2d88-4a71-8d79-ff21ffd94649 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"key1": "value1", "key2": "value2", "key3": "value3"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-1fe87274-2d88-4a71-8d79-ff21ffd94649', 'content-length': '68', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1fe87274-2d88-4a71-8d79-ff21ffd94649', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/snapshots/07d58ada-924b-473e-87d6-2d688354054f/metadata'} Body: b'{"metadata": {"key2": "value2", "key3": "value3", "key1": "value1"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:55.607 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:55.660 38 INFO tempest.lib.common.rest_client [req-571605d5-5d46-44bc-a2d0-bd33a198c94b ] Request (SnapshotMetadataV3RbacTest:test_show_snapshot_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles 0.053s 2020-11-06 18:03:55.661 38 DEBUG tempest.lib.common.rest_client [req-571605d5-5d46-44bc-a2d0-bd33a198c94b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-571605d5-5d46-44bc-a2d0-bd33a198c94b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:55.689 37 INFO tempest.lib.common.rest_client [req-9690e6ba-74da-4b92-96cb-6c22ad136869 ] Request (SecGroupRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/b5eaac5d-163e-482d-af6a-761558dde744 0.257s 2020-11-06 18:03:55.689 37 DEBUG tempest.lib.common.rest_client [req-9690e6ba-74da-4b92-96cb-6c22ad136869 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-9690e6ba-74da-4b92-96cb-6c22ad136869', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:03:55 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/b5eaac5d-163e-482d-af6a-761558dde744'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:55.695 38 INFO tempest.lib.common.rest_client [req-e88928ad-9232-480b-8e18-07bb8dff65c8 ] Request (SnapshotMetadataV3RbacTest:test_show_snapshot_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:03:55.696 38 DEBUG tempest.lib.common.rest_client [req-e88928ad-9232-480b-8e18-07bb8dff65c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e88928ad-9232-480b-8e18-07bb8dff65c8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f6b999658b6f47d29b15006a8d570185", "name": "tempest-SnapshotMetadataV3RbacTest-1218928268", "password_expires_at": null}, "audit_ids": ["QgDTWsFSSvy1MSKEY5qoLg"], "expires_at": "2020-11-06T19:03:55.000000Z", "issued_at": "2020-11-06T18:03:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4964902d2f0d436ab7937b9f24638d16", "name": "tempest-SnapshotMetadataV3RbacTest-1218928268"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:55.790 38 INFO tempest.lib.common.rest_client [req-d6ab64c0-0335-490e-8c50-a35d0750159c ] Request (SnapshotMetadataV3RbacTest:test_show_snapshot_metadata_item): 200 GET http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/snapshots/07d58ada-924b-473e-87d6-2d688354054f/metadata/key3 0.093s 2020-11-06 18:03:55.791 38 DEBUG tempest.lib.common.rest_client [req-d6ab64c0-0335-490e-8c50-a35d0750159c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d6ab64c0-0335-490e-8c50-a35d0750159c', 'content-length': '28', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d6ab64c0-0335-490e-8c50-a35d0750159c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/snapshots/07d58ada-924b-473e-87d6-2d688354054f/metadata/key3'} Body: b'{"meta": {"key3": "value3"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:55.797 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:55.814 37 INFO tempest.lib.common.rest_client [req-62392261-440d-4867-a4fd-d179fefc81e4 ] Request (SecGroupRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf 0.124s 2020-11-06 18:03:55.815 37 DEBUG tempest.lib.common.rest_client [req-62392261-440d-4867-a4fd-d179fefc81e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-62392261-440d-4867-a4fd-d179fefc81e4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc24780b195147e98cb75b931ea85ecf'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:55.835 40 INFO tempest.lib.common.rest_client [req-fa6672e0-67e4-49db-a89a-7758797f39ac ] Request (VolumesActionsV310RbacTest:test_volume_upload_public): 202 POST http://172.30.13.94/volume/v3/68335a62eaf549cda40ba242685cb95c/volumes/4ac5b3d2-38d3-4d09-9f25-62a79d5e2871/action 0.236s 2020-11-06 18:03:55.835 40 DEBUG tempest.lib.common.rest_client [req-fa6672e0-67e4-49db-a89a-7758797f39ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.10', 'X-Auth-Token': ''} Body: {"os-volume_upload_image": {"image_name": "tempest-VolumesActionsV310RbacTest-Image-742747194", "visibility": "public", "disk_format": "raw"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-fa6672e0-67e4-49db-a89a-7758797f39ac', 'content-length': '686', 'openstack-api-version': 'volume 3.10', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-fa6672e0-67e4-49db-a89a-7758797f39ac', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/68335a62eaf549cda40ba242685cb95c/volumes/4ac5b3d2-38d3-4d09-9f25-62a79d5e2871/action'} Body: b'{"os-volume_upload_image": {"id": "4ac5b3d2-38d3-4d09-9f25-62a79d5e2871", "updated_at": "2020-11-06T18:03:55.000000", "status": "uploading", "display_description": null, "size": 1, "volume_type": {"id": "8f9ae869-3a34-4ca4-bf0a-bc1352b23a27", "name": "ceph", "description": null, "is_public": true, "extra_specs": {"volume_backend_name": "ceph"}, "qos_specs_id": null, "created_at": "2020-10-07T12:09:08.000000", "updated_at": null, "deleted_at": null, "deleted": false}, "image_id": "8a82ffef-13e5-42ed-9604-43a36a1a4694", "container_format": "bare", "disk_format": "raw", "image_name": "tempest-VolumesActionsV310RbacTest-Image-742747194", "protected": false, "visibility": "public"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:55.836 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:55.902 37 INFO tempest.lib.common.rest_client [req-879debf4-6044-4647-9baa-99fd39d97cf5 ] Request (SegmentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-11-06 18:03:55.903 37 DEBUG tempest.lib.common.rest_client [req-879debf4-6044-4647-9baa-99fd39d97cf5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-879debf4-6044-4647-9baa-99fd39d97cf5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["nU7Ri2ZcSE2BjXi1RPWweQ"], "expires_at": "2020-11-06T19:03:55.000000Z", "issued_at": "2020-11-06T18:03:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:55.914 38 INFO tempest.lib.common.rest_client [req-0c72af03-974b-4197-83d4-90117ec88ab2 ] Request (SnapshotMetadataV3RbacTest:test_show_snapshot_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles 0.115s 2020-11-06 18:03:55.915 38 DEBUG tempest.lib.common.rest_client [req-0c72af03-974b-4197-83d4-90117ec88ab2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0c72af03-974b-4197-83d4-90117ec88ab2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:55.941 37 INFO tempest.lib.common.rest_client [req-f3640f15-1f35-41cf-8967-083fb99cc897 ] Request (SegmentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:03:55.942 37 DEBUG tempest.lib.common.rest_client [req-f3640f15-1f35-41cf-8967-083fb99cc897 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f3640f15-1f35-41cf-8967-083fb99cc897', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["6QdYvKwnQg6dc3jv3zzHlw"], "expires_at": "2020-11-06T19:03:55.000000Z", "issued_at": "2020-11-06T18:03:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:55.942 40 INFO tempest.lib.common.rest_client [req-a1d7a0ac-6b5e-4977-8041-1ce6cf75c0b5 ] Request (VolumesActionsV310RbacTest:test_volume_upload_public): 200 GET http://172.30.13.94/identity/v3/projects/68335a62eaf549cda40ba242685cb95c/users/9bdbf6356f534045a5482b7b7136964d/roles 0.105s 2020-11-06 18:03:55.943 40 DEBUG tempest.lib.common.rest_client [req-a1d7a0ac-6b5e-4977-8041-1ce6cf75c0b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a1d7a0ac-6b5e-4977-8041-1ce6cf75c0b5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/68335a62eaf549cda40ba242685cb95c/users/9bdbf6356f534045a5482b7b7136964d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/68335a62eaf549cda40ba242685cb95c/users/9bdbf6356f534045a5482b7b7136964d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:55.990 38 INFO tempest.lib.common.rest_client [req-e7b26bae-e1a4-4c6e-88fd-d7e653fa0fb5 ] Request (SnapshotMetadataV3RbacTest:test_show_snapshot_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.074s 2020-11-06 18:03:55.991 37 INFO tempest.lib.common.rest_client [req-2bda97be-e444-414d-8bcf-9cb915526fd4 ] Request (SegmentsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.048s 2020-11-06 18:03:55.991 38 DEBUG tempest.lib.common.rest_client [req-e7b26bae-e1a4-4c6e-88fd-d7e653fa0fb5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e7b26bae-e1a4-4c6e-88fd-d7e653fa0fb5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f6b999658b6f47d29b15006a8d570185", "name": "tempest-SnapshotMetadataV3RbacTest-1218928268", "password_expires_at": null}, "audit_ids": ["dgCD0KFGRPyLh4OUtUZy3Q"], "expires_at": "2020-11-06T19:03:55.000000Z", "issued_at": "2020-11-06T18:03:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4964902d2f0d436ab7937b9f24638d16", "name": "tempest-SnapshotMetadataV3RbacTest-1218928268"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:55.991 37 DEBUG tempest.lib.common.rest_client [req-2bda97be-e444-414d-8bcf-9cb915526fd4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2bda97be-e444-414d-8bcf-9cb915526fd4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:55.996 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:56.000 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:update_snapshot_metadata, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:56.020 40 INFO tempest.lib.common.rest_client [req-690731d0-6198-4aaf-9dad-fdf28bfc3a5f ] Request (VolumesActionsV310RbacTest:test_volume_upload_public): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.076s 2020-11-06 18:03:56.021 40 DEBUG tempest.lib.common.rest_client [req-690731d0-6198-4aaf-9dad-fdf28bfc3a5f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-690731d0-6198-4aaf-9dad-fdf28bfc3a5f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9bdbf6356f534045a5482b7b7136964d", "name": "tempest-VolumesActionsV310RbacTest-1710022807", "password_expires_at": null}, "audit_ids": ["wCEJ3xeITn685lEEPWMGXg"], "expires_at": "2020-11-06T19:03:55.000000Z", "issued_at": "2020-11-06T18:03:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "68335a62eaf549cda40ba242685cb95c", "name": "tempest-VolumesActionsV310RbacTest-1710022807"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/68335a62eaf549cda40ba242685cb95c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/68335a62eaf549cda40ba242685cb95c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/68335a62eaf549cda40ba242685cb95c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_68335a62eaf549cda40ba242685cb95c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_68335a62eaf549cda40ba242685cb95c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_68335a62eaf549cda40ba242685cb95c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:56.065 37 INFO tempest.lib.common.rest_client [req-d5c66387-c47a-4cb8-b3fa-ca4d076bdabc ] Request (SegmentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.072s 2020-11-06 18:03:56.066 37 DEBUG tempest.lib.common.rest_client [req-d5c66387-c47a-4cb8-b3fa-ca4d076bdabc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-SegmentsExtRbacTest-1555770406-desc", "domain_id": "default", "name": "tempest-SegmentsExtRbacTest-1555770406"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '376', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d5c66387-c47a-4cb8-b3fa-ca4d076bdabc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "37beb2770ac54b99abb39614cfe7a87c", "name": "tempest-SegmentsExtRbacTest-1555770406", "domain_id": "default", "description": "tempest-SegmentsExtRbacTest-1555770406-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:56.173 37 INFO tempest.lib.common.rest_client [req-27717a55-8123-4229-a723-2cdf0cdf9ade ] Request (SegmentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.105s 2020-11-06 18:03:56.174 37 DEBUG tempest.lib.common.rest_client [req-27717a55-8123-4229-a723-2cdf0cdf9ade ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-SegmentsExtRbacTest-1555770406", "password": "R7=~zawsG@J&%TB", "project_id": "37beb2770ac54b99abb39614cfe7a87c", "email": "tempest-SegmentsExtRbacTest-1080105581@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '394', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-27717a55-8123-4229-a723-2cdf0cdf9ade', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "37beb2770ac54b99abb39614cfe7a87c", "email": "tempest-SegmentsExtRbacTest-1080105581@example.com", "id": "977c2419d0a74d95af2a492c919014aa", "name": "tempest-SegmentsExtRbacTest-1555770406", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/977c2419d0a74d95af2a492c919014aa"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:56.223 37 INFO tempest.lib.common.rest_client [req-9e20c0c2-8bcd-497d-b1a3-cfe656aab066 ] Request (SegmentsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.047s 2020-11-06 18:03:56.223 37 DEBUG tempest.lib.common.rest_client [req-9e20c0c2-8bcd-497d-b1a3-cfe656aab066 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9e20c0c2-8bcd-497d-b1a3-cfe656aab066', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:56.230 40 INFO tempest.lib.common.rest_client [req-941a5f2d-4cb0-4856-8c71-a3c95cf0cb1f ] Request (VolumesActionsV310RbacTest:test_volume_upload_public): 200 GET http://172.30.13.94/image/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694 0.207s 2020-11-06 18:03:56.230 40 DEBUG tempest.lib.common.rest_client [req-941a5f2d-4cb0-4856-8c71-a3c95cf0cb1f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '657', 'content-type': 'application/json', 'x-openstack-request-id': 'req-941a5f2d-4cb0-4856-8c71-a3c95cf0cb1f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694'} Body: b'{"name": "tempest-VolumesActionsV310RbacTest-Image-742747194", "disk_format": "raw", "container_format": "bare", "visibility": "public", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "68335a62eaf549cda40ba242685cb95c", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "8a82ffef-13e5-42ed-9604-43a36a1a4694", "created_at": "2020-11-06T18:03:56Z", "updated_at": "2020-11-06T18:03:56Z", "tags": [], "self": "/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694", "file": "/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:56.243 38 INFO tempest.lib.common.rest_client [req-ec67158a-c9be-4f4b-b6ce-dbf2672b92a6 ] Request (SnapshotMetadataV3RbacTest:test_update_snapshot_metadata): 200 POST http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/snapshots/07d58ada-924b-473e-87d6-2d688354054f/metadata 0.242s 2020-11-06 18:03:56.244 38 DEBUG tempest.lib.common.rest_client [req-ec67158a-c9be-4f4b-b6ce-dbf2672b92a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"key1": "value1", "key2": "value2", "key3": "value3"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ec67158a-c9be-4f4b-b6ce-dbf2672b92a6', 'content-length': '68', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ec67158a-c9be-4f4b-b6ce-dbf2672b92a6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/snapshots/07d58ada-924b-473e-87d6-2d688354054f/metadata'} Body: b'{"metadata": {"key2": "value2", "key3": "value3", "key1": "value1"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:56.247 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:56.272 37 INFO tempest.lib.common.rest_client [req-0142a23a-a259-4f84-8a2f-7b9566c7ece7 ] Request (SegmentsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.048s 2020-11-06 18:03:56.273 37 DEBUG tempest.lib.common.rest_client [req-0142a23a-a259-4f84-8a2f-7b9566c7ece7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0142a23a-a259-4f84-8a2f-7b9566c7ece7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:56.295 38 INFO tempest.lib.common.rest_client [req-da57a905-a3d1-438f-859f-c1c00e3f7064 ] Request (SnapshotMetadataV3RbacTest:test_update_snapshot_metadata): 200 GET http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles 0.047s 2020-11-06 18:03:56.295 38 DEBUG tempest.lib.common.rest_client [req-da57a905-a3d1-438f-859f-c1c00e3f7064 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-da57a905-a3d1-438f-859f-c1c00e3f7064', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:56.328 38 INFO tempest.lib.common.rest_client [req-033291b5-c578-4903-b8f6-be9e69a85fd4 ] Request (SnapshotMetadataV3RbacTest:test_update_snapshot_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:03:56.329 38 DEBUG tempest.lib.common.rest_client [req-033291b5-c578-4903-b8f6-be9e69a85fd4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-033291b5-c578-4903-b8f6-be9e69a85fd4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f6b999658b6f47d29b15006a8d570185", "name": "tempest-SnapshotMetadataV3RbacTest-1218928268", "password_expires_at": null}, "audit_ids": ["FJ3YktFAR8KlAgRT-iQkCg"], "expires_at": "2020-11-06T19:03:56.000000Z", "issued_at": "2020-11-06T18:03:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4964902d2f0d436ab7937b9f24638d16", "name": "tempest-SnapshotMetadataV3RbacTest-1218928268"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:56.333 37 INFO tempest.lib.common.rest_client [req-85f1ab04-166b-475c-9a0d-aedd98e0743a ] Request (SegmentsExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles/72a4576c553448cd941b052c1ca0cf2d 0.059s 2020-11-06 18:03:56.334 37 DEBUG tempest.lib.common.rest_client [req-85f1ab04-166b-475c-9a0d-aedd98e0743a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-85f1ab04-166b-475c-9a0d-aedd98e0743a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:56.334 37 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SegmentsExtRbacTest-1555770406', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '37beb2770ac54b99abb39614cfe7a87c', 'project_name': 'tempest-SegmentsExtRbacTest-1555770406', 'tenant_id': '37beb2770ac54b99abb39614cfe7a87c', 'tenant_name': 'tempest-SegmentsExtRbacTest-1555770406', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '977c2419d0a74d95af2a492c919014aa'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:56.335 37 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SegmentsExtRbacTest-1555770406', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '37beb2770ac54b99abb39614cfe7a87c', 'project_name': 'tempest-SegmentsExtRbacTest-1555770406', 'tenant_id': '37beb2770ac54b99abb39614cfe7a87c', 'tenant_name': 'tempest-SegmentsExtRbacTest-1555770406', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '977c2419d0a74d95af2a492c919014aa'}, Network: None, Subnet: None, Router: None 2020-11-06 18:03:56.447 37 INFO tempest.lib.common.rest_client [req-90bd40a9-95e8-4e5d-b706-9989a9dabb64 ] Request (SegmentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.100s 2020-11-06 18:03:56.448 37 DEBUG tempest.lib.common.rest_client [req-90bd40a9-95e8-4e5d-b706-9989a9dabb64 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6569', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-90bd40a9-95e8-4e5d-b706-9989a9dabb64', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "977c2419d0a74d95af2a492c919014aa", "name": "tempest-SegmentsExtRbacTest-1555770406", "password_expires_at": null}, "audit_ids": ["qZGq_ZdRQx61AwyqYmRFYA"], "expires_at": "2020-11-06T19:03:56.000000Z", "issued_at": "2020-11-06T18:03:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37beb2770ac54b99abb39614cfe7a87c", "name": "tempest-SegmentsExtRbacTest-1555770406"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.3 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:56.449 37 WARNING tempest.manager [-] tempest.manager.Manager is not a stable interface and as such it should not be imported directly. It will be removed as soon as the client manager becomes available in tempest.lib. 2020-11-06 18:03:56.465 39 INFO tempest.lib.common.rest_client [req-48435eed-3bf6-4da5-bfb4-64806a7f2999 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.255s 2020-11-06 18:03:56.466 39 DEBUG tempest.lib.common.rest_client [req-48435eed-3bf6-4da5-bfb4-64806a7f2999 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-48435eed-3bf6-4da5-bfb4-64806a7f2999', 'x-compute-request-id': 'req-48435eed-3bf6-4da5-bfb4-64806a7f2999', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:56.543 37 INFO tempest.lib.common.rest_client [req-7d6b7499-3259-4a4e-bd96-b84485b46105 ] Request (SegmentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-11-06 18:03:56.543 37 DEBUG tempest.lib.common.rest_client [req-7d6b7499-3259-4a4e-bd96-b84485b46105 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7d6b7499-3259-4a4e-bd96-b84485b46105', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["e3GhKvo3RP2vW1H_K-7K5g"], "expires_at": "2020-11-06T19:03:56.000000Z", "issued_at": "2020-11-06T18:03:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:56.564 38 INFO tempest.lib.common.rest_client [req-842906e4-36bc-4859-8030-cdf0a1455604 ] Request (SnapshotMetadataV3RbacTest:test_update_snapshot_metadata): 200 PUT http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/snapshots/07d58ada-924b-473e-87d6-2d688354054f/metadata 0.234s 2020-11-06 18:03:56.565 38 DEBUG tempest.lib.common.rest_client [req-842906e4-36bc-4859-8030-cdf0a1455604 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"key3": "value3_update", "key4": "value4"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-842906e4-36bc-4859-8030-cdf0a1455604', 'content-length': '57', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-842906e4-36bc-4859-8030-cdf0a1455604', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/snapshots/07d58ada-924b-473e-87d6-2d688354054f/metadata'} Body: b'{"metadata": {"key3": "value3_update", "key4": "value4"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:56.567 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:56.586 37 INFO tempest.lib.common.rest_client [req-7a45d383-b0a0-4a7b-aa08-3c69ed296fa4 ] Request (SegmentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:03:56.587 37 DEBUG tempest.lib.common.rest_client [req-7a45d383-b0a0-4a7b-aa08-3c69ed296fa4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7a45d383-b0a0-4a7b-aa08-3c69ed296fa4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["E1LI__2FTh29mjyDMf_Qfw"], "expires_at": "2020-11-06T19:03:56.000000Z", "issued_at": "2020-11-06T18:03:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:56.622 38 INFO tempest.lib.common.rest_client [req-8fee3468-670c-48d1-818b-a456e347c455 ] Request (SnapshotMetadataV3RbacTest:test_update_snapshot_metadata): 200 GET http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles 0.053s 2020-11-06 18:03:56.622 38 DEBUG tempest.lib.common.rest_client [req-8fee3468-670c-48d1-818b-a456e347c455 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8fee3468-670c-48d1-818b-a456e347c455', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:56.633 37 INFO tempest.lib.common.rest_client [req-bd053121-b3c5-420e-bda9-4701d5b90ef8 ] Request (SegmentsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.045s 2020-11-06 18:03:56.633 37 DEBUG tempest.lib.common.rest_client [req-bd053121-b3c5-420e-bda9-4701d5b90ef8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bd053121-b3c5-420e-bda9-4701d5b90ef8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:56.656 38 INFO tempest.lib.common.rest_client [req-282b13d2-c364-487a-a7d4-b7cea47e89a2 ] Request (SnapshotMetadataV3RbacTest:test_update_snapshot_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:03:56.657 38 DEBUG tempest.lib.common.rest_client [req-282b13d2-c364-487a-a7d4-b7cea47e89a2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-282b13d2-c364-487a-a7d4-b7cea47e89a2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f6b999658b6f47d29b15006a8d570185", "name": "tempest-SnapshotMetadataV3RbacTest-1218928268", "password_expires_at": null}, "audit_ids": ["MKABgVt2R2aoPjP5BDUsZg"], "expires_at": "2020-11-06T19:03:56.000000Z", "issued_at": "2020-11-06T18:03:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4964902d2f0d436ab7937b9f24638d16", "name": "tempest-SnapshotMetadataV3RbacTest-1218928268"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:56.659 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:56.662 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:update_snapshot_metadata, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:56.683 37 INFO tempest.lib.common.rest_client [req-fa32b1ce-a79c-4ff2-801c-198264f8ebac ] Request (SegmentsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.049s 2020-11-06 18:03:56.683 37 DEBUG tempest.lib.common.rest_client [req-fa32b1ce-a79c-4ff2-801c-198264f8ebac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fa32b1ce-a79c-4ff2-801c-198264f8ebac', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:56.684 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:03:56.684 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:56.735 37 INFO tempest.lib.common.rest_client [req-1a905672-3c88-49f0-9c1a-5dff90eda954 ] Request (SegmentsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles 0.050s 2020-11-06 18:03:56.735 37 DEBUG tempest.lib.common.rest_client [req-1a905672-3c88-49f0-9c1a-5dff90eda954 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1a905672-3c88-49f0-9c1a-5dff90eda954', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:56.802 37 INFO tempest.lib.common.rest_client [req-0eb1ddc6-4d4a-41a2-bd9f-451b259a6f69 ] Request (SegmentsExtRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles/72a4576c553448cd941b052c1ca0cf2d 0.065s 2020-11-06 18:03:56.803 37 DEBUG tempest.lib.common.rest_client [req-0eb1ddc6-4d4a-41a2-bd9f-451b259a6f69 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0eb1ddc6-4d4a-41a2-bd9f-451b259a6f69', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:56.806 38 INFO tempest.lib.common.rest_client [req-44b3367c-edc9-4a03-8082-a4d1ac83076a ] Request (SnapshotMetadataV3RbacTest:test_update_snapshot_metadata_item): 200 POST http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/snapshots/07d58ada-924b-473e-87d6-2d688354054f/metadata 0.142s 2020-11-06 18:03:56.806 38 DEBUG tempest.lib.common.rest_client [req-44b3367c-edc9-4a03-8082-a4d1ac83076a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"key1": "value1", "key2": "value2", "key3": "value3"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-44b3367c-edc9-4a03-8082-a4d1ac83076a', 'content-length': '86', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-44b3367c-edc9-4a03-8082-a4d1ac83076a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/snapshots/07d58ada-924b-473e-87d6-2d688354054f/metadata'} Body: b'{"metadata": {"key3": "value3", "key4": "value4", "key1": "value1", "key2": "value2"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:56.809 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:56.894 38 INFO tempest.lib.common.rest_client [req-947e579b-eb66-4f98-85b4-0b43cac95009 ] Request (SnapshotMetadataV3RbacTest:test_update_snapshot_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles 0.084s 2020-11-06 18:03:56.895 38 DEBUG tempest.lib.common.rest_client [req-947e579b-eb66-4f98-85b4-0b43cac95009 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-947e579b-eb66-4f98-85b4-0b43cac95009', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:56.922 37 INFO tempest.lib.common.rest_client [req-0cfb8de6-4f4a-43d1-82ba-52788fadf0e9 ] Request (SegmentsExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles/a629c95d64b3416fb80ae90af4f69c05 0.118s 2020-11-06 18:03:56.922 37 DEBUG tempest.lib.common.rest_client [req-0cfb8de6-4f4a-43d1-82ba-52788fadf0e9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0cfb8de6-4f4a-43d1-82ba-52788fadf0e9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:56.981 38 INFO tempest.lib.common.rest_client [req-d22af7e6-2db8-492c-a0f2-fbe0928f14b5 ] Request (SnapshotMetadataV3RbacTest:test_update_snapshot_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:03:56.982 38 DEBUG tempest.lib.common.rest_client [req-d22af7e6-2db8-492c-a0f2-fbe0928f14b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d22af7e6-2db8-492c-a0f2-fbe0928f14b5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f6b999658b6f47d29b15006a8d570185", "name": "tempest-SnapshotMetadataV3RbacTest-1218928268", "password_expires_at": null}, "audit_ids": ["sz-9JnkXQR-9Zvanl9nVSw"], "expires_at": "2020-11-06T19:03:56.000000Z", "issued_at": "2020-11-06T18:03:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4964902d2f0d436ab7937b9f24638d16", "name": "tempest-SnapshotMetadataV3RbacTest-1218928268"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:57.173 38 INFO tempest.lib.common.rest_client [req-fbcf7a13-f57e-44cf-b1d2-9a3fcdaf92d2 ] Request (SnapshotMetadataV3RbacTest:test_update_snapshot_metadata_item): 200 PUT http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/snapshots/07d58ada-924b-473e-87d6-2d688354054f/metadata/key3 0.189s 2020-11-06 18:03:57.173 38 DEBUG tempest.lib.common.rest_client [req-fbcf7a13-f57e-44cf-b1d2-9a3fcdaf92d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"meta": {"key3": "value3_update"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-fbcf7a13-f57e-44cf-b1d2-9a3fcdaf92d2', 'content-length': '35', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-fbcf7a13-f57e-44cf-b1d2-9a3fcdaf92d2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/snapshots/07d58ada-924b-473e-87d6-2d688354054f/metadata/key3'} Body: b'{"meta": {"key3": "value3_update"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:57.176 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:57.253 40 INFO tempest.lib.common.rest_client [req-7a58e82d-613e-4153-8edd-1885ba69d0b7 ] Request (VolumesActionsV310RbacTest:test_volume_upload_public): 200 GET http://172.30.13.94/image/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694 0.020s 2020-11-06 18:03:57.253 40 DEBUG tempest.lib.common.rest_client [req-7a58e82d-613e-4153-8edd-1885ba69d0b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '657', 'content-type': 'application/json', 'x-openstack-request-id': 'req-7a58e82d-613e-4153-8edd-1885ba69d0b7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694'} Body: b'{"name": "tempest-VolumesActionsV310RbacTest-Image-742747194", "disk_format": "raw", "container_format": "bare", "visibility": "public", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "68335a62eaf549cda40ba242685cb95c", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "8a82ffef-13e5-42ed-9604-43a36a1a4694", "created_at": "2020-11-06T18:03:56Z", "updated_at": "2020-11-06T18:03:56Z", "tags": [], "self": "/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694", "file": "/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:57.291 38 INFO tempest.lib.common.rest_client [req-e07cfdab-97c0-42cd-9d17-c471d318ce03 ] Request (SnapshotMetadataV3RbacTest:test_update_snapshot_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles 0.114s 2020-11-06 18:03:57.292 38 DEBUG tempest.lib.common.rest_client [req-e07cfdab-97c0-42cd-9d17-c471d318ce03 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e07cfdab-97c0-42cd-9d17-c471d318ce03', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16/users/f6b999658b6f47d29b15006a8d570185/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:57.331 38 INFO tempest.lib.common.rest_client [req-a9881e24-6955-464a-9f62-ee36cd3845b5 ] Request (SnapshotMetadataV3RbacTest:test_update_snapshot_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:03:57.331 38 DEBUG tempest.lib.common.rest_client [req-a9881e24-6955-464a-9f62-ee36cd3845b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a9881e24-6955-464a-9f62-ee36cd3845b5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f6b999658b6f47d29b15006a8d570185", "name": "tempest-SnapshotMetadataV3RbacTest-1218928268", "password_expires_at": null}, "audit_ids": ["8rz0p1ogSiCgdWBektHTTw"], "expires_at": "2020-11-06T19:03:57.000000Z", "issued_at": "2020-11-06T18:03:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4964902d2f0d436ab7937b9f24638d16", "name": "tempest-SnapshotMetadataV3RbacTest-1218928268"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4964902d2f0d436ab7937b9f24638d16", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:57.481 38 INFO tempest.lib.common.rest_client [req-b43a9508-b48d-4aa8-84bb-7b495e5a6db8 ] Request (SnapshotMetadataV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/snapshots/07d58ada-924b-473e-87d6-2d688354054f 0.147s 2020-11-06 18:03:57.482 38 DEBUG tempest.lib.common.rest_client [req-b43a9508-b48d-4aa8-84bb-7b495e5a6db8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b43a9508-b48d-4aa8-84bb-7b495e5a6db8', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/snapshots/07d58ada-924b-473e-87d6-2d688354054f'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:57.516 38 INFO tempest.lib.common.rest_client [req-4fe80f43-9615-4219-bd77-271e67c99125 ] Request (SnapshotMetadataV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/snapshots/07d58ada-924b-473e-87d6-2d688354054f 0.033s 2020-11-06 18:03:57.517 38 DEBUG tempest.lib.common.rest_client [req-4fe80f43-9615-4219-bd77-271e67c99125 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4fe80f43-9615-4219-bd77-271e67c99125', 'content-length': '547', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4fe80f43-9615-4219-bd77-271e67c99125', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/snapshots/07d58ada-924b-473e-87d6-2d688354054f'} Body: b'{"snapshot": {"id": "07d58ada-924b-473e-87d6-2d688354054f", "created_at": "2020-11-06T18:03:52.000000", "updated_at": "2020-11-06T18:03:57.000000", "name": "tempest-SnapshotMetadataV3RbacTest-Snapshot-811289194", "description": null, "volume_id": "cd3195b3-34ec-4be1-b54e-b7a282dc90c4", "status": "deleting", "size": 1, "metadata": {"key3": "value3_update", "key4": "value4", "key1": "value1", "key2": "value2"}, "os-extended-snapshot-attributes:project_id": "4964902d2f0d436ab7937b9f24638d16", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:57.674 39 INFO tempest.lib.common.rest_client [req-e0d53946-d052-4510-9017-30de07f3ae7a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.191s 2020-11-06 18:03:57.674 39 DEBUG tempest.lib.common.rest_client [req-e0d53946-d052-4510-9017-30de07f3ae7a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e0d53946-d052-4510-9017-30de07f3ae7a', 'x-compute-request-id': 'req-e0d53946-d052-4510-9017-30de07f3ae7a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:58.021 37 INFO tempest.lib.common.rest_client [req-c27674ca-a5aa-41ea-985e-41d73c202f8f ] Request (SegmentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-11-06 18:03:58.022 37 DEBUG tempest.lib.common.rest_client [req-c27674ca-a5aa-41ea-985e-41d73c202f8f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c27674ca-a5aa-41ea-985e-41d73c202f8f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "977c2419d0a74d95af2a492c919014aa", "name": "tempest-SegmentsExtRbacTest-1555770406", "password_expires_at": null}, "audit_ids": ["UW_FTar0RBOpNKi6BP5p8g"], "expires_at": "2020-11-06T19:03:57.000000Z", "issued_at": "2020-11-06T18:03:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37beb2770ac54b99abb39614cfe7a87c", "name": "tempest-SegmentsExtRbacTest-1555770406"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:58.067 37 INFO tempest.lib.common.rest_client [req-2a891803-cb40-4f2b-b002-d4fb917d572d ] Request (SegmentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-11-06 18:03:58.068 37 DEBUG tempest.lib.common.rest_client [req-2a891803-cb40-4f2b-b002-d4fb917d572d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2a891803-cb40-4f2b-b002-d4fb917d572d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "977c2419d0a74d95af2a492c919014aa", "name": "tempest-SegmentsExtRbacTest-1555770406", "password_expires_at": null}, "audit_ids": ["FoOi41jvS1atz0JV_cOQ-A"], "expires_at": "2020-11-06T19:03:58.000000Z", "issued_at": "2020-11-06T18:03:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37beb2770ac54b99abb39614cfe7a87c", "name": "tempest-SegmentsExtRbacTest-1555770406"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:58.279 40 INFO tempest.lib.common.rest_client [req-0a7b73f7-f8a7-41f7-9553-f5e3ea3f7302 ] Request (VolumesActionsV310RbacTest:test_volume_upload_public): 200 GET http://172.30.13.94/image/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694 0.023s 2020-11-06 18:03:58.280 40 DEBUG tempest.lib.common.rest_client [req-0a7b73f7-f8a7-41f7-9553-f5e3ea3f7302 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '657', 'content-type': 'application/json', 'x-openstack-request-id': 'req-0a7b73f7-f8a7-41f7-9553-f5e3ea3f7302', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694'} Body: b'{"name": "tempest-VolumesActionsV310RbacTest-Image-742747194", "disk_format": "raw", "container_format": "bare", "visibility": "public", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "68335a62eaf549cda40ba242685cb95c", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "8a82ffef-13e5-42ed-9604-43a36a1a4694", "created_at": "2020-11-06T18:03:56Z", "updated_at": "2020-11-06T18:03:56Z", "tags": [], "self": "/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694", "file": "/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:58.554 38 INFO tempest.lib.common.rest_client [req-d106b58d-f9b4-4d93-9de0-803e47c057b6 ] Request (SnapshotMetadataV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/snapshots/07d58ada-924b-473e-87d6-2d688354054f 0.029s 2020-11-06 18:03:58.555 38 DEBUG tempest.lib.common.rest_client [req-d106b58d-f9b4-4d93-9de0-803e47c057b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '111', 'content-type': 'application/json', 'x-compute-request-id': 'req-d106b58d-f9b4-4d93-9de0-803e47c057b6', 'x-openstack-request-id': 'req-d106b58d-f9b4-4d93-9de0-803e47c057b6', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/snapshots/07d58ada-924b-473e-87d6-2d688354054f'} Body: b'{"itemNotFound": {"code": 404, "message": "Snapshot 07d58ada-924b-473e-87d6-2d688354054f could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:58.635 38 INFO tempest.lib.common.rest_client [req-7d30f1b1-301a-4dbc-ac58-8f2a99112181 ] Request (SnapshotMetadataV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/volumes/cd3195b3-34ec-4be1-b54e-b7a282dc90c4 0.079s 2020-11-06 18:03:58.636 38 DEBUG tempest.lib.common.rest_client [req-7d30f1b1-301a-4dbc-ac58-8f2a99112181 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7d30f1b1-301a-4dbc-ac58-8f2a99112181', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/volumes/cd3195b3-34ec-4be1-b54e-b7a282dc90c4'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:58.715 38 INFO tempest.lib.common.rest_client [req-6c350fc8-060d-4510-93b5-a2dde2a0bf06 ] Request (SnapshotMetadataV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/volumes/cd3195b3-34ec-4be1-b54e-b7a282dc90c4 0.077s 2020-11-06 18:03:58.715 38 DEBUG tempest.lib.common.rest_client [req-6c350fc8-060d-4510-93b5-a2dde2a0bf06 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6c350fc8-060d-4510-93b5-a2dde2a0bf06', 'content-length': '1069', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6c350fc8-060d-4510-93b5-a2dde2a0bf06', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/volumes/cd3195b3-34ec-4be1-b54e-b7a282dc90c4'} Body: b'{"volume": {"id": "cd3195b3-34ec-4be1-b54e-b7a282dc90c4", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:03:51.000000", "updated_at": "2020-11-06T18:03:59.000000", "name": "tempest-SnapshotMetadataV3RbacTest-Volume-1318338761", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/volumes/cd3195b3-34ec-4be1-b54e-b7a282dc90c4"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/4964902d2f0d436ab7937b9f24638d16/volumes/cd3195b3-34ec-4be1-b54e-b7a282dc90c4"}], "user_id": "f6b999658b6f47d29b15006a8d570185", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "4964902d2f0d436ab7937b9f24638d16"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:58.887 39 INFO tempest.lib.common.rest_client [req-82649c68-e800-4aa9-a7cf-192a60403b07 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.199s 2020-11-06 18:03:58.888 39 DEBUG tempest.lib.common.rest_client [req-82649c68-e800-4aa9-a7cf-192a60403b07 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-82649c68-e800-4aa9-a7cf-192a60403b07', 'x-compute-request-id': 'req-82649c68-e800-4aa9-a7cf-192a60403b07', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:59.306 40 INFO tempest.lib.common.rest_client [req-74d6a22d-5ee9-49ba-823f-306cfe4e5f42 ] Request (VolumesActionsV310RbacTest:test_volume_upload_public): 200 GET http://172.30.13.94/image/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694 0.024s 2020-11-06 18:03:59.307 40 DEBUG tempest.lib.common.rest_client [req-74d6a22d-5ee9-49ba-823f-306cfe4e5f42 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '657', 'content-type': 'application/json', 'x-openstack-request-id': 'req-74d6a22d-5ee9-49ba-823f-306cfe4e5f42', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694'} Body: b'{"name": "tempest-VolumesActionsV310RbacTest-Image-742747194", "disk_format": "raw", "container_format": "bare", "visibility": "public", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "68335a62eaf549cda40ba242685cb95c", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "8a82ffef-13e5-42ed-9604-43a36a1a4694", "created_at": "2020-11-06T18:03:56Z", "updated_at": "2020-11-06T18:03:56Z", "tags": [], "self": "/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694", "file": "/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:59.930 37 INFO tempest.lib.common.rest_client [req-ab7f7ec4-8b55-4ed0-b7fe-8b0954fbe306 ] Request (SegmentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 1.861s 2020-11-06 18:03:59.931 37 DEBUG tempest.lib.common.rest_client [req-ab7f7ec4-8b55-4ed0-b7fe-8b0954fbe306 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-SegmentsExtRbacTest-test-network-1989164770"}} Response - Headers: {'content-type': 'application/json', 'content-length': '740', 'x-openstack-request-id': 'req-ab7f7ec4-8b55-4ed0-b7fe-8b0954fbe306', 'date': 'Fri, 06 Nov 2020 18:03:59 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"d0f33d73-abbf-414f-8261-ffc8bfe4141c","name":"tempest-SegmentsExtRbacTest-test-network-1989164770","tenant_id":"37beb2770ac54b99abb39614cfe7a87c","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"37beb2770ac54b99abb39614cfe7a87c","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":49,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:03:59Z","updated_at":"2020-11-06T18:03:59Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:03:59.932 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:03:59.935 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_segment, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:03:59.936 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:03:59.959 38 INFO tempest.lib.common.rest_client [req-bc94d997-ba3a-4c5b-b26b-f629111b4894 ] Request (SnapshotMetadataV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/volumes/cd3195b3-34ec-4be1-b54e-b7a282dc90c4 0.228s 2020-11-06 18:03:59.960 38 DEBUG tempest.lib.common.rest_client [req-bc94d997-ba3a-4c5b-b26b-f629111b4894 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-bc94d997-ba3a-4c5b-b26b-f629111b4894', 'x-openstack-request-id': 'req-bc94d997-ba3a-4c5b-b26b-f629111b4894', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/4964902d2f0d436ab7937b9f24638d16/volumes/cd3195b3-34ec-4be1-b54e-b7a282dc90c4'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume cd3195b3-34ec-4be1-b54e-b7a282dc90c4 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:00.089 39 INFO tempest.lib.common.rest_client [req-a3937baa-fbae-4ec1-ba4c-6f249454a069 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.187s 2020-11-06 18:04:00.090 39 DEBUG tempest.lib.common.rest_client [req-a3937baa-fbae-4ec1-ba4c-6f249454a069 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a3937baa-fbae-4ec1-ba4c-6f249454a069', 'x-compute-request-id': 'req-a3937baa-fbae-4ec1-ba4c-6f249454a069', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:00.139 38 INFO tempest.lib.common.rest_client [req-446dd1d6-c572-46e0-be49-4c1c2f37d6dc ] Request (SnapshotMetadataV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/f6b999658b6f47d29b15006a8d570185 0.178s 2020-11-06 18:04:00.139 38 DEBUG tempest.lib.common.rest_client [req-446dd1d6-c572-46e0-be49-4c1c2f37d6dc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-446dd1d6-c572-46e0-be49-4c1c2f37d6dc', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/f6b999658b6f47d29b15006a8d570185'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:00.166 37 INFO tempest.lib.common.rest_client [req-8adb53af-d2bf-4ca3-9638-00e20ee3d8ac ] Request (SegmentsExtRbacTest:test_create_segment): 200 GET http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles 0.229s 2020-11-06 18:04:00.167 37 DEBUG tempest.lib.common.rest_client [req-8adb53af-d2bf-4ca3-9638-00e20ee3d8ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:03:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8adb53af-d2bf-4ca3-9638-00e20ee3d8ac', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:00.219 38 INFO tempest.lib.common.rest_client [req-ca510498-b981-4148-92f4-ab4ea5b92226 ] Request (SnapshotMetadataV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.079s 2020-11-06 18:04:00.220 38 DEBUG tempest.lib.common.rest_client [req-ca510498-b981-4148-92f4-ab4ea5b92226 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ca510498-b981-4148-92f4-ab4ea5b92226', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["lAwLE-BcTG29HoXVpbCDpA"], "expires_at": "2020-11-06T19:04:00.000000Z", "issued_at": "2020-11-06T18:04:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:00.251 37 INFO tempest.lib.common.rest_client [req-20e9ade3-c437-4e4e-8ec0-46d9ac3d798e ] Request (SegmentsExtRbacTest:test_create_segment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-11-06 18:04:00.252 37 DEBUG tempest.lib.common.rest_client [req-20e9ade3-c437-4e4e-8ec0-46d9ac3d798e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-20e9ade3-c437-4e4e-8ec0-46d9ac3d798e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "977c2419d0a74d95af2a492c919014aa", "name": "tempest-SegmentsExtRbacTest-1555770406", "password_expires_at": null}, "audit_ids": ["5vaJcRKlQ3eZqUWgrvXq5g"], "expires_at": "2020-11-06T19:04:00.000000Z", "issued_at": "2020-11-06T18:04:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37beb2770ac54b99abb39614cfe7a87c", "name": "tempest-SegmentsExtRbacTest-1555770406"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:00.279 37 INFO tempest.lib.common.rest_client [req-e433aca2-2641-436d-a504-eac0d7eeb1d0 ] Request (SegmentsExtRbacTest:test_create_segment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.026s 2020-11-06 18:04:00.280 37 DEBUG tempest.lib.common.rest_client [req-e433aca2-2641-436d-a504-eac0d7eeb1d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e433aca2-2641-436d-a504-eac0d7eeb1d0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "977c2419d0a74d95af2a492c919014aa", "name": "tempest-SegmentsExtRbacTest-1555770406", "password_expires_at": null}, "audit_ids": ["kq_g8J7lRSWKv80KYeGIJw"], "expires_at": "2020-11-06T19:04:00.000000Z", "issued_at": "2020-11-06T18:04:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37beb2770ac54b99abb39614cfe7a87c", "name": "tempest-SegmentsExtRbacTest-1555770406"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:00.330 40 INFO tempest.lib.common.rest_client [req-ee3d6704-7b49-4203-855b-3227461df84d ] Request (VolumesActionsV310RbacTest:test_volume_upload_public): 200 GET http://172.30.13.94/image/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694 0.021s 2020-11-06 18:04:00.331 40 DEBUG tempest.lib.common.rest_client [req-ee3d6704-7b49-4203-855b-3227461df84d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '657', 'content-type': 'application/json', 'x-openstack-request-id': 'req-ee3d6704-7b49-4203-855b-3227461df84d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694'} Body: b'{"name": "tempest-VolumesActionsV310RbacTest-Image-742747194", "disk_format": "raw", "container_format": "bare", "visibility": "public", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "68335a62eaf549cda40ba242685cb95c", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "8a82ffef-13e5-42ed-9604-43a36a1a4694", "created_at": "2020-11-06T18:03:56Z", "updated_at": "2020-11-06T18:03:56Z", "tags": [], "self": "/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694", "file": "/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:00.467 37 INFO tempest.lib.common.rest_client [req-9b38201d-1673-493e-a9fb-7674ff7de382 ] Request (SegmentsExtRbacTest:test_create_segment): 200 GET http://172.30.13.94:9696/v2.0/segments 0.185s 2020-11-06 18:04:00.468 37 DEBUG tempest.lib.common.rest_client [req-9b38201d-1673-493e-a9fb-7674ff7de382 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '18550', 'x-openstack-request-id': 'req-9b38201d-1673-493e-a9fb-7674ff7de382', 'date': 'Fri, 06 Nov 2020 18:04:00 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/segments'} Body: b'{"segments": [{"id": "02b25095-41f1-4387-8d95-2ed51ebfc9a5", "network_id": "f51f957c-1c2a-4b94-a3da-5062f99b8f13", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 29, "created_at": "2020-10-26T13:55:33Z", "updated_at": "2020-10-26T13:55:33Z", "revision_number": 0}, {"id": "08d77bc3-1ae2-4614-82eb-dc68485a6892", "network_id": "b110fd8c-218d-4728-a53a-c7c232521b94", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 18, "created_at": "2020-10-10T11:05:48Z", "updated_at": "2020-10-10T11:05:48Z", "revision_number": 0}, {"id": "0a844538-f669-4e59-8bd4-ad8f7b4139b2", "network_id": "375af6bf-6b1d-4a79-a8e4-364fd12eb5ce", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 7, "created_at": "2020-10-07T13:45:24Z", "updated_at": "2020-10-07T13:45:24Z", "revision_number": 0}, {"id": "138af7c0-2892-42ca-bc12-945b1ed1f36f", "network_id": "3c0df36c-3ee6-4537-9024-19fde4d0c732", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 6, "created_at": "2020-10-08T07:58:23Z", "updated_at": "2020-10-08T07:58:23Z", "revision_number": 0}, {"id": "15564e89-1f58-4f69-bd70-0aa9f10c5345", "network_id": "a95ee1a9-0c56-4f70-8e0d-1502f45a1a5d", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 17, "created_at": "2020-10-08T07:46:47Z", "updated_at": "2020-10-08T07:46:47Z", "revision_number": 0}, {"id": "1f59d239-ed67-4a86-b5fa-e6ae880313b3", "network_id": "621c5dd4-7ec0-457a-b399-b4b3b35a5feb", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 31, "created_at": "2020-10-19T13:54:02Z", "updated_at": "2020-10-19T13:54:02Z", "revision_number": 0}, {"id": "2b06e399-b32f-42ec-bbda-1d53c65697a1", "network_id": "cadadb33-2658-4e64-b40a-9a6849c0527b", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 28, "created_at": "2020-10-16T17:08:16Z", "updated_at": "2020-10-16T17:08:16Z", "revision_number": 0}, {"id": "2eb99341-02b6-49fe-9aaf-f30b11f2dc46", "network_id": "c34fd91c-bb90-4ab1-9086-bb633e5a7d87", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 4, "created_at": "2020-10-07T13:54:57Z", "updated_at": "2020-10-07T13:54:57Z", "revision_number": 0}, {"id": "3335d8d0-bd00-425a-aecf-31c71bc99eb3", "network_id": "795afc26-787e-4d38-9bc1-bc29e5b00fbc", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 55, "created_at": "2020-11-06T17:59:07Z", "updated_at": "2020-11-06T17:59:07Z", "revision_number": 0}, {"id": "3dcc8169-a45d-43e5-ab7d-7e0e9b4650f5", "network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "name": null, "description": null, "physical_network": "public", "network_type": "flat", "segmentation_id": null, "created_at": "2020-10-07T12:07:37Z", "updated_at": "2020-10-07T12:07:37Z", "revision_number": 1}, {"id": "3e5c0208-debf-435d-b693-ffa5c91aed5b", "network_id": "c55607fb-e16c-4581-9bed-d91dad3d4770", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 10, "created_at": "2020-10-07T18:29:18Z", "updated_at": "2020-10-07T18:29:18Z", "revision_number": 0}, {"id": "3fe25cb9-2352-456a-8fd8-6e9c7fde4f50", "network_id": "988e27c5-ee9a-4f6f-b8ff-f53f82c2c38f", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 19, "created_at": "2020-10-11T11:29:25Z", "updated_at": "2020-10-11T11:29:25Z", "revision_number": 0}, {"id": "4024453f-4470-4322-9cd6-e82f0bd622a3", "network_id": "fd379896-8909-4063-9277-3474a2630b40", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 26, "created_at": "2020-10-12T13:54:07Z", "updated_at": "2020-10-12T13:54:07Z", "revision_number": 0}, {"id": "42f2fc3e-7180-446b-9c84-0626e5d5ed73", "network_id": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:00.588 38 INFO tempest.lib.common.rest_client [req-ba1740f9-d9b7-4f9a-8b02-33e5116c6580 ] Request (SnapshotMetadataV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=4964902d2f0d436ab7937b9f24638d16&name=default 0.367s 2020-11-06 18:04:00.588 38 DEBUG tempest.lib.common.rest_client [req-ba1740f9-d9b7-4f9a-8b02-33e5116c6580 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-ba1740f9-d9b7-4f9a-8b02-33e5116c6580', 'date': 'Fri, 06 Nov 2020 18:04:00 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=4964902d2f0d436ab7937b9f24638d16&name=default'} Body: b'{"security_groups": [{"id": "4c02ac15-6a25-4593-bcd4-77b8fdacf96c", "name": "default", "stateful": true, "tenant_id": "4964902d2f0d436ab7937b9f24638d16", "description": "Default security group", "security_group_rules": [{"id": "3bd0d16b-ccd9-4f4e-bea3-bf944de619eb", "tenant_id": "4964902d2f0d436ab7937b9f24638d16", "security_group_id": "4c02ac15-6a25-4593-bcd4-77b8fdacf96c", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "4c02ac15-6a25-4593-bcd4-77b8fdacf96c", "description": null, "tags": [], "created_at": "2020-11-06T18:04:00Z", "updated_at": "2020-11-06T18:04:00Z", "revision_number": 0, "project_id": "4964902d2f0d436ab7937b9f24638d16"}, {"id": "68e20ea1-6223-4acc-ad2f-0a31338a3714", "tenant_id": "4964902d2f0d436ab7937b9f24638d16", "security_group_id": "4c02ac15-6a25-4593-bcd4-77b8fdacf96c", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:04:00Z", "updated_at": "2020-11-06T18:04:00Z", "revision_number": 0, "project_id": "4964902d2f0d436ab7937b9f24638d16"}, {"id": "ccf11bb2-3cbb-49cf-b4f7-0b4b9043e4ca", "tenant_id": "4964902d2f0d436ab7937b9f24638d16", "security_group_id": "4c02ac15-6a25-4593-bcd4-77b8fdacf96c", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:04:00Z", "updated_at": "2020-11-06T18:04:00Z", "revision_number": 0, "project_id": "4964902d2f0d436ab7937b9f24638d16"}, {"id": "f07a84be-6e03-463b-81e1-b3e4f8dd2cdf", "tenant_id": "4964902d2f0d436ab7937b9f24638d16", "security_group_id": "4c02ac15-6a25-4593-bcd4-77b8fdacf96c", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "4c02ac15-6a25-4593-bcd4-77b8fdacf96c", "description": null, "tags": [], "created_at": "2020-11-06T18:04:00Z", "updated_at": "2020-11-06T18:04:00Z", "revision_number": 0, "project_id": "4964902d2f0d436ab7937b9f24638d16"}], "tags": [], "created_at": "2020-11-06T18:04:00Z", "updated_at": "2020-11-06T18:04:00Z", "revision_number": 1, "project_id": "4964902d2f0d436ab7937b9f24638d16"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:00.733 38 INFO tempest.lib.common.rest_client [req-4542eeb1-2aa2-474f-ba94-4e74faa71bbf ] Request (SnapshotMetadataV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/4c02ac15-6a25-4593-bcd4-77b8fdacf96c 0.144s 2020-11-06 18:04:00.734 38 DEBUG tempest.lib.common.rest_client [req-4542eeb1-2aa2-474f-ba94-4e74faa71bbf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-4542eeb1-2aa2-474f-ba94-4e74faa71bbf', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:04:00 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/4c02ac15-6a25-4593-bcd4-77b8fdacf96c'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:00.870 37 INFO tempest.lib.common.rest_client [req-efb1663c-5a7c-4d86-9c00-96d158a38f30 ] Request (SegmentsExtRbacTest:test_create_segment): 201 POST http://172.30.13.94:9696/v2.0/segments 0.400s 2020-11-06 18:04:00.871 37 DEBUG tempest.lib.common.rest_client [req-efb1663c-5a7c-4d86-9c00-96d158a38f30 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"segment": {"network_id": "d0f33d73-abbf-414f-8261-ffc8bfe4141c", "network_type": "gre", "segmentation_id": 1387}} Response - Headers: {'content-type': 'application/json', 'content-length': '318', 'x-openstack-request-id': 'req-efb1663c-5a7c-4d86-9c00-96d158a38f30', 'date': 'Fri, 06 Nov 2020 18:04:00 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/segments'} Body: b'{"segment": {"id": "77b36aab-17c3-48ab-893a-f7e03424a58b", "network_id": "d0f33d73-abbf-414f-8261-ffc8bfe4141c", "name": null, "description": "", "physical_network": null, "network_type": "gre", "segmentation_id": 1387, "created_at": "2020-11-06T18:04:00Z", "updated_at": "2020-11-06T18:04:00Z", "revision_number": 1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:00.871 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:00.905 38 INFO tempest.lib.common.rest_client [req-b91a6bc0-05d4-4330-90fe-64bc21e962bb ] Request (SnapshotMetadataV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16 0.170s 2020-11-06 18:04:00.905 38 DEBUG tempest.lib.common.rest_client [req-b91a6bc0-05d4-4330-90fe-64bc21e962bb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b91a6bc0-05d4-4330-90fe-64bc21e962bb', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/4964902d2f0d436ab7937b9f24638d16'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:00.985 37 INFO tempest.lib.common.rest_client [req-6c6a5858-c2d8-4f49-a733-1cbc3eb4bc7b ] Request (SegmentsExtRbacTest:test_create_segment): 200 GET http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles 0.113s 2020-11-06 18:04:00.986 37 DEBUG tempest.lib.common.rest_client [req-6c6a5858-c2d8-4f49-a733-1cbc3eb4bc7b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6c6a5858-c2d8-4f49-a733-1cbc3eb4bc7b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:01.008 38 INFO tempest.lib.common.rest_client [req-f2e39aad-b544-4692-ad41-ffe22665ee38 ] Request (VolumesBackupsV39RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-11-06 18:04:01.008 38 DEBUG tempest.lib.common.rest_client [req-f2e39aad-b544-4692-ad41-ffe22665ee38 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f2e39aad-b544-4692-ad41-ffe22665ee38', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["IzA8gIVrTmWYnufTYGTEQg"], "expires_at": "2020-11-06T19:04:00.000000Z", "issued_at": "2020-11-06T18:04:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:01.048 38 INFO tempest.lib.common.rest_client [req-4c99c771-1a01-4a86-abde-7b2d4882ae7a ] Request (VolumesBackupsV39RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:04:01.049 38 DEBUG tempest.lib.common.rest_client [req-4c99c771-1a01-4a86-abde-7b2d4882ae7a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4c99c771-1a01-4a86-abde-7b2d4882ae7a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["iwYbwTpzSE-YDAl3XjVtOg"], "expires_at": "2020-11-06T19:04:01.000000Z", "issued_at": "2020-11-06T18:04:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:01.075 37 INFO tempest.lib.common.rest_client [req-5e3928a8-1b31-4044-a7ff-1e0fa6ee93a6 ] Request (SegmentsExtRbacTest:test_create_segment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 18:04:01.075 37 DEBUG tempest.lib.common.rest_client [req-5e3928a8-1b31-4044-a7ff-1e0fa6ee93a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5e3928a8-1b31-4044-a7ff-1e0fa6ee93a6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "977c2419d0a74d95af2a492c919014aa", "name": "tempest-SegmentsExtRbacTest-1555770406", "password_expires_at": null}, "audit_ids": ["3egwyPY3SJGaGVqMB6mgFA"], "expires_at": "2020-11-06T19:04:01.000000Z", "issued_at": "2020-11-06T18:04:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37beb2770ac54b99abb39614cfe7a87c", "name": "tempest-SegmentsExtRbacTest-1555770406"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:01.107 38 INFO tempest.lib.common.rest_client [req-21cf0131-ad60-4170-bad0-6e8f481cf0d8 ] Request (VolumesBackupsV39RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.057s 2020-11-06 18:04:01.107 38 DEBUG tempest.lib.common.rest_client [req-21cf0131-ad60-4170-bad0-6e8f481cf0d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-21cf0131-ad60-4170-bad0-6e8f481cf0d8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:01.109 37 INFO tempest.lib.common.rest_client [req-90f339d6-5a57-4b54-b20c-ab74e7fdf65c ] Request (SegmentsExtRbacTest:test_create_segment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:04:01.109 37 DEBUG tempest.lib.common.rest_client [req-90f339d6-5a57-4b54-b20c-ab74e7fdf65c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-90f339d6-5a57-4b54-b20c-ab74e7fdf65c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "977c2419d0a74d95af2a492c919014aa", "name": "tempest-SegmentsExtRbacTest-1555770406", "password_expires_at": null}, "audit_ids": ["HOL9lvrSR5yJR8m_q_5PCg"], "expires_at": "2020-11-06T19:04:01.000000Z", "issued_at": "2020-11-06T18:04:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37beb2770ac54b99abb39614cfe7a87c", "name": "tempest-SegmentsExtRbacTest-1555770406"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:01.112 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:01.115 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_segment, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:01.115 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:01.118 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_segment, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:01.190 38 INFO tempest.lib.common.rest_client [req-bc349f44-efdc-4c9f-909f-15a1e7dcdfe6 ] Request (VolumesBackupsV39RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.082s 2020-11-06 18:04:01.191 38 DEBUG tempest.lib.common.rest_client [req-bc349f44-efdc-4c9f-909f-15a1e7dcdfe6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumesBackupsV39RbacTest-1462512000-desc", "domain_id": "default", "name": "tempest-VolumesBackupsV39RbacTest-1462512000"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '388', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bc349f44-efdc-4c9f-909f-15a1e7dcdfe6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "6e5eb63f6e094f9a811f03f7ef90d48b", "name": "tempest-VolumesBackupsV39RbacTest-1462512000", "domain_id": "default", "description": "tempest-VolumesBackupsV39RbacTest-1462512000-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/6e5eb63f6e094f9a811f03f7ef90d48b"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:01.278 39 INFO tempest.lib.common.rest_client [req-d511a35d-af61-4efc-875b-7d1a4b6b2a88 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.173s 2020-11-06 18:04:01.279 39 DEBUG tempest.lib.common.rest_client [req-d511a35d-af61-4efc-875b-7d1a4b6b2a88 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d511a35d-af61-4efc-875b-7d1a4b6b2a88', 'x-compute-request-id': 'req-d511a35d-af61-4efc-875b-7d1a4b6b2a88', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:01.350 38 INFO tempest.lib.common.rest_client [req-429e3b0f-caac-489b-b79c-1a3b7ab9e73a ] Request (VolumesBackupsV39RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.158s 2020-11-06 18:04:01.351 38 DEBUG tempest.lib.common.rest_client [req-429e3b0f-caac-489b-b79c-1a3b7ab9e73a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumesBackupsV39RbacTest-1462512000", "password": "M9+l9r!eu%o@_Dd", "project_id": "6e5eb63f6e094f9a811f03f7ef90d48b", "email": "tempest-VolumesBackupsV39RbacTest-1030287886@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '406', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-429e3b0f-caac-489b-b79c-1a3b7ab9e73a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "6e5eb63f6e094f9a811f03f7ef90d48b", "email": "tempest-VolumesBackupsV39RbacTest-1030287886@example.com", "id": "5783426bf5c648628cf94a3bb7d0d766", "name": "tempest-VolumesBackupsV39RbacTest-1462512000", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/5783426bf5c648628cf94a3bb7d0d766"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:01.355 40 INFO tempest.lib.common.rest_client [req-b6275072-1230-445b-b6ea-ffbe76567ad0 ] Request (VolumesActionsV310RbacTest:test_volume_upload_public): 200 GET http://172.30.13.94/image/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694 0.021s 2020-11-06 18:04:01.355 40 DEBUG tempest.lib.common.rest_client [req-b6275072-1230-445b-b6ea-ffbe76567ad0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '657', 'content-type': 'application/json', 'x-openstack-request-id': 'req-b6275072-1230-445b-b6ea-ffbe76567ad0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694'} Body: b'{"name": "tempest-VolumesActionsV310RbacTest-Image-742747194", "disk_format": "raw", "container_format": "bare", "visibility": "public", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "68335a62eaf549cda40ba242685cb95c", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "8a82ffef-13e5-42ed-9604-43a36a1a4694", "created_at": "2020-11-06T18:03:56Z", "updated_at": "2020-11-06T18:03:56Z", "tags": [], "self": "/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694", "file": "/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:01.383 37 INFO tempest.lib.common.rest_client [req-cdad980a-6a49-48c0-812b-f88fd0663e12 ] Request (SegmentsExtRbacTest:test_delete_segment): 200 GET http://172.30.13.94:9696/v2.0/segments 0.265s 2020-11-06 18:04:01.384 37 DEBUG tempest.lib.common.rest_client [req-cdad980a-6a49-48c0-812b-f88fd0663e12 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '18857', 'x-openstack-request-id': 'req-cdad980a-6a49-48c0-812b-f88fd0663e12', 'date': 'Fri, 06 Nov 2020 18:04:01 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/segments'} Body: b'{"segments": [{"id": "02b25095-41f1-4387-8d95-2ed51ebfc9a5", "network_id": "f51f957c-1c2a-4b94-a3da-5062f99b8f13", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 29, "created_at": "2020-10-26T13:55:33Z", "updated_at": "2020-10-26T13:55:33Z", "revision_number": 0}, {"id": "08d77bc3-1ae2-4614-82eb-dc68485a6892", "network_id": "b110fd8c-218d-4728-a53a-c7c232521b94", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 18, "created_at": "2020-10-10T11:05:48Z", "updated_at": "2020-10-10T11:05:48Z", "revision_number": 0}, {"id": "0a844538-f669-4e59-8bd4-ad8f7b4139b2", "network_id": "375af6bf-6b1d-4a79-a8e4-364fd12eb5ce", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 7, "created_at": "2020-10-07T13:45:24Z", "updated_at": "2020-10-07T13:45:24Z", "revision_number": 0}, {"id": "138af7c0-2892-42ca-bc12-945b1ed1f36f", "network_id": "3c0df36c-3ee6-4537-9024-19fde4d0c732", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 6, "created_at": "2020-10-08T07:58:23Z", "updated_at": "2020-10-08T07:58:23Z", "revision_number": 0}, {"id": "15564e89-1f58-4f69-bd70-0aa9f10c5345", "network_id": "a95ee1a9-0c56-4f70-8e0d-1502f45a1a5d", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 17, "created_at": "2020-10-08T07:46:47Z", "updated_at": "2020-10-08T07:46:47Z", "revision_number": 0}, {"id": "1f59d239-ed67-4a86-b5fa-e6ae880313b3", "network_id": "621c5dd4-7ec0-457a-b399-b4b3b35a5feb", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 31, "created_at": "2020-10-19T13:54:02Z", "updated_at": "2020-10-19T13:54:02Z", "revision_number": 0}, {"id": "2b06e399-b32f-42ec-bbda-1d53c65697a1", "network_id": "cadadb33-2658-4e64-b40a-9a6849c0527b", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 28, "created_at": "2020-10-16T17:08:16Z", "updated_at": "2020-10-16T17:08:16Z", "revision_number": 0}, {"id": "2eb99341-02b6-49fe-9aaf-f30b11f2dc46", "network_id": "c34fd91c-bb90-4ab1-9086-bb633e5a7d87", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 4, "created_at": "2020-10-07T13:54:57Z", "updated_at": "2020-10-07T13:54:57Z", "revision_number": 0}, {"id": "3335d8d0-bd00-425a-aecf-31c71bc99eb3", "network_id": "795afc26-787e-4d38-9bc1-bc29e5b00fbc", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 55, "created_at": "2020-11-06T17:59:07Z", "updated_at": "2020-11-06T17:59:07Z", "revision_number": 0}, {"id": "3dcc8169-a45d-43e5-ab7d-7e0e9b4650f5", "network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "name": null, "description": null, "physical_network": "public", "network_type": "flat", "segmentation_id": null, "created_at": "2020-10-07T12:07:37Z", "updated_at": "2020-10-07T12:07:37Z", "revision_number": 1}, {"id": "3e5c0208-debf-435d-b693-ffa5c91aed5b", "network_id": "c55607fb-e16c-4581-9bed-d91dad3d4770", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 10, "created_at": "2020-10-07T18:29:18Z", "updated_at": "2020-10-07T18:29:18Z", "revision_number": 0}, {"id": "3fe25cb9-2352-456a-8fd8-6e9c7fde4f50", "network_id": "988e27c5-ee9a-4f6f-b8ff-f53f82c2c38f", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 19, "created_at": "2020-10-11T11:29:25Z", "updated_at": "2020-10-11T11:29:25Z", "revision_number": 0}, {"id": "4024453f-4470-4322-9cd6-e82f0bd622a3", "network_id": "fd379896-8909-4063-9277-3474a2630b40", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 26, "created_at": "2020-10-12T13:54:07Z", "updated_at": "2020-10-12T13:54:07Z", "revision_number": 0}, {"id": "42f2fc3e-7180-446b-9c84-0626e5d5ed73", "network_id": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:01.459 38 INFO tempest.lib.common.rest_client [req-526b1eb1-eff8-446c-9132-97106af0ce6e ] Request (VolumesBackupsV39RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.107s 2020-11-06 18:04:01.460 38 DEBUG tempest.lib.common.rest_client [req-526b1eb1-eff8-446c-9132-97106af0ce6e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-526b1eb1-eff8-446c-9132-97106af0ce6e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:01.575 38 INFO tempest.lib.common.rest_client [req-e7b13355-1140-41c7-813b-f030692eb30a ] Request (VolumesBackupsV39RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.114s 2020-11-06 18:04:01.576 38 DEBUG tempest.lib.common.rest_client [req-e7b13355-1140-41c7-813b-f030692eb30a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e7b13355-1140-41c7-813b-f030692eb30a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:01.651 38 INFO tempest.lib.common.rest_client [req-1d2622b6-541a-4960-afa2-0f88334d631f ] Request (VolumesBackupsV39RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/6e5eb63f6e094f9a811f03f7ef90d48b/users/5783426bf5c648628cf94a3bb7d0d766/roles/72a4576c553448cd941b052c1ca0cf2d 0.073s 2020-11-06 18:04:01.652 38 DEBUG tempest.lib.common.rest_client [req-1d2622b6-541a-4960-afa2-0f88334d631f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1d2622b6-541a-4960-afa2-0f88334d631f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6e5eb63f6e094f9a811f03f7ef90d48b/users/5783426bf5c648628cf94a3bb7d0d766/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:01.653 38 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesBackupsV39RbacTest-1462512000', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '6e5eb63f6e094f9a811f03f7ef90d48b', 'project_name': 'tempest-VolumesBackupsV39RbacTest-1462512000', 'tenant_id': '6e5eb63f6e094f9a811f03f7ef90d48b', 'tenant_name': 'tempest-VolumesBackupsV39RbacTest-1462512000', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '5783426bf5c648628cf94a3bb7d0d766'}, Network: None, Subnet: None, Router: None 2020-11-06 18:04:01.653 38 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesBackupsV39RbacTest-1462512000', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '6e5eb63f6e094f9a811f03f7ef90d48b', 'project_name': 'tempest-VolumesBackupsV39RbacTest-1462512000', 'tenant_id': '6e5eb63f6e094f9a811f03f7ef90d48b', 'tenant_name': 'tempest-VolumesBackupsV39RbacTest-1462512000', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '5783426bf5c648628cf94a3bb7d0d766'}, Network: None, Subnet: None, Router: None 2020-11-06 18:04:01.787 38 INFO tempest.lib.common.rest_client [req-2870f200-948a-4e6a-be0e-064f7a57e937 ] Request (VolumesBackupsV39RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.120s 2020-11-06 18:04:01.787 38 DEBUG tempest.lib.common.rest_client [req-2870f200-948a-4e6a-be0e-064f7a57e937 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6581', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2870f200-948a-4e6a-be0e-064f7a57e937', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5783426bf5c648628cf94a3bb7d0d766", "name": "tempest-VolumesBackupsV39RbacTest-1462512000", "password_expires_at": null}, "audit_ids": ["Fm2YyRyZRRisDF0pOZfznw"], "expires_at": "2020-11-06T19:04:01.000000Z", "issued_at": "2020-11-06T18:04:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6e5eb63f6e094f9a811f03f7ef90d48b", "name": "tempest-VolumesBackupsV39RbacTest-1462512000"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6e5eb63f6e094f9a811f03f7ef90d48b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6e5eb63f6e094f9a811f03f7ef90d48b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e5eb63f6e094f9a811f03f7ef90d48b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e5eb63f6e094f9a811f03f7ef90d48b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e5eb63f6e094f9a811f03f7ef90d48b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:01.804 37 INFO tempest.lib.common.rest_client [req-9847968f-a875-4a54-a629-a906e70d182c ] Request (SegmentsExtRbacTest:test_delete_segment): 201 POST http://172.30.13.94:9696/v2.0/segments 0.418s 2020-11-06 18:04:01.805 37 DEBUG tempest.lib.common.rest_client [req-9847968f-a875-4a54-a629-a906e70d182c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"segment": {"network_id": "d0f33d73-abbf-414f-8261-ffc8bfe4141c", "network_type": "gre", "segmentation_id": 2874}} Response - Headers: {'content-type': 'application/json', 'content-length': '318', 'x-openstack-request-id': 'req-9847968f-a875-4a54-a629-a906e70d182c', 'date': 'Fri, 06 Nov 2020 18:04:01 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/segments'} Body: b'{"segment": {"id": "4a5c17c9-a7a1-4456-884f-1432a8834880", "network_id": "d0f33d73-abbf-414f-8261-ffc8bfe4141c", "name": null, "description": "", "physical_network": null, "network_type": "gre", "segmentation_id": 2874, "created_at": "2020-11-06T18:04:01Z", "updated_at": "2020-11-06T18:04:01Z", "revision_number": 1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:01.805 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:01.872 38 INFO tempest.lib.common.rest_client [req-ed3f333f-1e09-443d-a274-d7e02caf4405 ] Request (VolumesBackupsV39RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 18:04:01.878 38 DEBUG tempest.lib.common.rest_client [req-ed3f333f-1e09-443d-a274-d7e02caf4405 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ed3f333f-1e09-443d-a274-d7e02caf4405', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["igaYxp4TQI6dvyKMbPQUOA"], "expires_at": "2020-11-06T19:04:01.000000Z", "issued_at": "2020-11-06T18:04:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:01.920 37 INFO tempest.lib.common.rest_client [req-02e2c7b6-b720-46cd-b580-e8a8084dc4c1 ] Request (SegmentsExtRbacTest:test_delete_segment): 200 GET http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles 0.114s 2020-11-06 18:04:01.921 37 DEBUG tempest.lib.common.rest_client [req-02e2c7b6-b720-46cd-b580-e8a8084dc4c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-02e2c7b6-b720-46cd-b580-e8a8084dc4c1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:01.922 38 INFO tempest.lib.common.rest_client [req-88144e59-a16b-4ecb-9f48-19037bfc011d ] Request (VolumesBackupsV39RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:04:01.923 38 DEBUG tempest.lib.common.rest_client [req-88144e59-a16b-4ecb-9f48-19037bfc011d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-88144e59-a16b-4ecb-9f48-19037bfc011d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["Cydtq7eMRaCT_EYQUJnZBA"], "expires_at": "2020-11-06T19:04:01.000000Z", "issued_at": "2020-11-06T18:04:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:01.974 38 INFO tempest.lib.common.rest_client [req-f7b79488-887f-4c5d-9ace-40fb7dd4d16a ] Request (VolumesBackupsV39RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.050s 2020-11-06 18:04:01.975 38 DEBUG tempest.lib.common.rest_client [req-f7b79488-887f-4c5d-9ace-40fb7dd4d16a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f7b79488-887f-4c5d-9ace-40fb7dd4d16a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:02.014 37 INFO tempest.lib.common.rest_client [req-c5399ddf-3a26-461e-9310-ae6d610cfdea ] Request (SegmentsExtRbacTest:test_delete_segment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-11-06 18:04:02.015 37 DEBUG tempest.lib.common.rest_client [req-c5399ddf-3a26-461e-9310-ae6d610cfdea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c5399ddf-3a26-461e-9310-ae6d610cfdea', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "977c2419d0a74d95af2a492c919014aa", "name": "tempest-SegmentsExtRbacTest-1555770406", "password_expires_at": null}, "audit_ids": ["BXw-9lpMReSrhsGBNGjfyg"], "expires_at": "2020-11-06T19:04:01.000000Z", "issued_at": "2020-11-06T18:04:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37beb2770ac54b99abb39614cfe7a87c", "name": "tempest-SegmentsExtRbacTest-1555770406"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:02.033 38 INFO tempest.lib.common.rest_client [req-b44e1142-97a0-4711-88f4-8698a706fa30 ] Request (VolumesBackupsV39RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.057s 2020-11-06 18:04:02.034 38 DEBUG tempest.lib.common.rest_client [req-b44e1142-97a0-4711-88f4-8698a706fa30 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b44e1142-97a0-4711-88f4-8698a706fa30', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:02.035 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:04:02.035 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:02.051 37 INFO tempest.lib.common.rest_client [req-cc9545f4-d720-4fe4-85b3-b3b30921e0df ] Request (SegmentsExtRbacTest:test_delete_segment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:04:02.051 37 DEBUG tempest.lib.common.rest_client [req-cc9545f4-d720-4fe4-85b3-b3b30921e0df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cc9545f4-d720-4fe4-85b3-b3b30921e0df', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "977c2419d0a74d95af2a492c919014aa", "name": "tempest-SegmentsExtRbacTest-1555770406", "password_expires_at": null}, "audit_ids": ["UhCBjzpDSPePFi0k1M6w_Q"], "expires_at": "2020-11-06T19:04:02.000000Z", "issued_at": "2020-11-06T18:04:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37beb2770ac54b99abb39614cfe7a87c", "name": "tempest-SegmentsExtRbacTest-1555770406"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:02.093 38 INFO tempest.lib.common.rest_client [req-e7bcd978-2017-4842-a4d7-689224d68db4 ] Request (VolumesBackupsV39RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/6e5eb63f6e094f9a811f03f7ef90d48b/users/5783426bf5c648628cf94a3bb7d0d766/roles 0.057s 2020-11-06 18:04:02.094 38 DEBUG tempest.lib.common.rest_client [req-e7bcd978-2017-4842-a4d7-689224d68db4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e7bcd978-2017-4842-a4d7-689224d68db4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6e5eb63f6e094f9a811f03f7ef90d48b/users/5783426bf5c648628cf94a3bb7d0d766/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6e5eb63f6e094f9a811f03f7ef90d48b/users/5783426bf5c648628cf94a3bb7d0d766/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:02.169 38 INFO tempest.lib.common.rest_client [req-a59ebbf9-e2b2-4434-8837-9f10726be54e ] Request (VolumesBackupsV39RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/6e5eb63f6e094f9a811f03f7ef90d48b/users/5783426bf5c648628cf94a3bb7d0d766/roles/72a4576c553448cd941b052c1ca0cf2d 0.074s 2020-11-06 18:04:02.170 38 DEBUG tempest.lib.common.rest_client [req-a59ebbf9-e2b2-4434-8837-9f10726be54e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a59ebbf9-e2b2-4434-8837-9f10726be54e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6e5eb63f6e094f9a811f03f7ef90d48b/users/5783426bf5c648628cf94a3bb7d0d766/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:02.278 38 INFO tempest.lib.common.rest_client [req-69d7d7eb-381a-451a-b2ed-e33e7f90634f ] Request (VolumesBackupsV39RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/6e5eb63f6e094f9a811f03f7ef90d48b/users/5783426bf5c648628cf94a3bb7d0d766/roles/a629c95d64b3416fb80ae90af4f69c05 0.107s 2020-11-06 18:04:02.278 38 DEBUG tempest.lib.common.rest_client [req-69d7d7eb-381a-451a-b2ed-e33e7f90634f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-69d7d7eb-381a-451a-b2ed-e33e7f90634f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6e5eb63f6e094f9a811f03f7ef90d48b/users/5783426bf5c648628cf94a3bb7d0d766/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:02.380 40 INFO tempest.lib.common.rest_client [req-a4fd254b-93f3-4969-ac78-0b0ad00c3767 ] Request (VolumesActionsV310RbacTest:test_volume_upload_public): 200 GET http://172.30.13.94/image/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694 0.022s 2020-11-06 18:04:02.381 40 DEBUG tempest.lib.common.rest_client [req-a4fd254b-93f3-4969-ac78-0b0ad00c3767 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '657', 'content-type': 'application/json', 'x-openstack-request-id': 'req-a4fd254b-93f3-4969-ac78-0b0ad00c3767', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694'} Body: b'{"name": "tempest-VolumesActionsV310RbacTest-Image-742747194", "disk_format": "raw", "container_format": "bare", "visibility": "public", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "68335a62eaf549cda40ba242685cb95c", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "8a82ffef-13e5-42ed-9604-43a36a1a4694", "created_at": "2020-11-06T18:03:56Z", "updated_at": "2020-11-06T18:03:56Z", "tags": [], "self": "/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694", "file": "/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:02.553 37 INFO tempest.lib.common.rest_client [req-340f0db7-fc49-4c5c-9f86-39a2b98bfb3b ] Request (SegmentsExtRbacTest:test_delete_segment): 204 DELETE http://172.30.13.94:9696/v2.0/segments/4a5c17c9-a7a1-4456-884f-1432a8834880 0.501s 2020-11-06 18:04:02.554 37 DEBUG tempest.lib.common.rest_client [req-340f0db7-fc49-4c5c-9f86-39a2b98bfb3b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-340f0db7-fc49-4c5c-9f86-39a2b98bfb3b', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:04:02 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/segments/4a5c17c9-a7a1-4456-884f-1432a8834880'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:02.554 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:02.564 39 INFO tempest.lib.common.rest_client [req-f2975ff9-24b4-4bc8-9277-f4a380af8966 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.271s 2020-11-06 18:04:02.565 39 DEBUG tempest.lib.common.rest_client [req-f2975ff9-24b4-4bc8-9277-f4a380af8966 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f2975ff9-24b4-4bc8-9277-f4a380af8966', 'x-compute-request-id': 'req-f2975ff9-24b4-4bc8-9277-f4a380af8966', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:02.652 37 INFO tempest.lib.common.rest_client [req-2dcb33d8-903e-472f-9501-5f5077df96ed ] Request (SegmentsExtRbacTest:test_delete_segment): 200 GET http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles 0.097s 2020-11-06 18:04:02.653 37 DEBUG tempest.lib.common.rest_client [req-2dcb33d8-903e-472f-9501-5f5077df96ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2dcb33d8-903e-472f-9501-5f5077df96ed', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:02.733 37 INFO tempest.lib.common.rest_client [req-091ff542-6e72-458c-929e-f230e04216d7 ] Request (SegmentsExtRbacTest:test_delete_segment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.079s 2020-11-06 18:04:02.734 37 DEBUG tempest.lib.common.rest_client [req-091ff542-6e72-458c-929e-f230e04216d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-091ff542-6e72-458c-929e-f230e04216d7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "977c2419d0a74d95af2a492c919014aa", "name": "tempest-SegmentsExtRbacTest-1555770406", "password_expires_at": null}, "audit_ids": ["_mKHfW8kQGGVn5W8dPZIYQ"], "expires_at": "2020-11-06T19:04:02.000000Z", "issued_at": "2020-11-06T18:04:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37beb2770ac54b99abb39614cfe7a87c", "name": "tempest-SegmentsExtRbacTest-1555770406"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:02.762 37 INFO tempest.lib.common.rest_client [req-bb15cb83-41e7-4ed4-9d37-518941b38b5d ] Request (SegmentsExtRbacTest:test_delete_segment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.027s 2020-11-06 18:04:02.762 37 DEBUG tempest.lib.common.rest_client [req-bb15cb83-41e7-4ed4-9d37-518941b38b5d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bb15cb83-41e7-4ed4-9d37-518941b38b5d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "977c2419d0a74d95af2a492c919014aa", "name": "tempest-SegmentsExtRbacTest-1555770406", "password_expires_at": null}, "audit_ids": ["_dHnSP7xQ4uDggJGxXYusw"], "expires_at": "2020-11-06T19:04:02.000000Z", "issued_at": "2020-11-06T18:04:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37beb2770ac54b99abb39614cfe7a87c", "name": "tempest-SegmentsExtRbacTest-1555770406"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:02.764 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:02.767 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_segment, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:02.930 37 INFO tempest.lib.common.rest_client [req-4dcf9d47-9424-47c3-af43-4666c7fcfc7d ] Request (SegmentsExtRbacTest:test_list_segments): 200 GET http://172.30.13.94:9696/v2.0/segments 0.162s 2020-11-06 18:04:02.931 37 DEBUG tempest.lib.common.rest_client [req-4dcf9d47-9424-47c3-af43-4666c7fcfc7d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '18857', 'x-openstack-request-id': 'req-4dcf9d47-9424-47c3-af43-4666c7fcfc7d', 'date': 'Fri, 06 Nov 2020 18:04:02 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/segments'} Body: b'{"segments": [{"id": "02b25095-41f1-4387-8d95-2ed51ebfc9a5", "network_id": "f51f957c-1c2a-4b94-a3da-5062f99b8f13", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 29, "created_at": "2020-10-26T13:55:33Z", "updated_at": "2020-10-26T13:55:33Z", "revision_number": 0}, {"id": "08d77bc3-1ae2-4614-82eb-dc68485a6892", "network_id": "b110fd8c-218d-4728-a53a-c7c232521b94", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 18, "created_at": "2020-10-10T11:05:48Z", "updated_at": "2020-10-10T11:05:48Z", "revision_number": 0}, {"id": "0a844538-f669-4e59-8bd4-ad8f7b4139b2", "network_id": "375af6bf-6b1d-4a79-a8e4-364fd12eb5ce", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 7, "created_at": "2020-10-07T13:45:24Z", "updated_at": "2020-10-07T13:45:24Z", "revision_number": 0}, {"id": "138af7c0-2892-42ca-bc12-945b1ed1f36f", "network_id": "3c0df36c-3ee6-4537-9024-19fde4d0c732", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 6, "created_at": "2020-10-08T07:58:23Z", "updated_at": "2020-10-08T07:58:23Z", "revision_number": 0}, {"id": "15564e89-1f58-4f69-bd70-0aa9f10c5345", "network_id": "a95ee1a9-0c56-4f70-8e0d-1502f45a1a5d", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 17, "created_at": "2020-10-08T07:46:47Z", "updated_at": "2020-10-08T07:46:47Z", "revision_number": 0}, {"id": "1f59d239-ed67-4a86-b5fa-e6ae880313b3", "network_id": "621c5dd4-7ec0-457a-b399-b4b3b35a5feb", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 31, "created_at": "2020-10-19T13:54:02Z", "updated_at": "2020-10-19T13:54:02Z", "revision_number": 0}, {"id": "2b06e399-b32f-42ec-bbda-1d53c65697a1", "network_id": "cadadb33-2658-4e64-b40a-9a6849c0527b", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 28, "created_at": "2020-10-16T17:08:16Z", "updated_at": "2020-10-16T17:08:16Z", "revision_number": 0}, {"id": "2eb99341-02b6-49fe-9aaf-f30b11f2dc46", "network_id": "c34fd91c-bb90-4ab1-9086-bb633e5a7d87", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 4, "created_at": "2020-10-07T13:54:57Z", "updated_at": "2020-10-07T13:54:57Z", "revision_number": 0}, {"id": "3335d8d0-bd00-425a-aecf-31c71bc99eb3", "network_id": "795afc26-787e-4d38-9bc1-bc29e5b00fbc", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 55, "created_at": "2020-11-06T17:59:07Z", "updated_at": "2020-11-06T17:59:07Z", "revision_number": 0}, {"id": "3dcc8169-a45d-43e5-ab7d-7e0e9b4650f5", "network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "name": null, "description": null, "physical_network": "public", "network_type": "flat", "segmentation_id": null, "created_at": "2020-10-07T12:07:37Z", "updated_at": "2020-10-07T12:07:37Z", "revision_number": 1}, {"id": "3e5c0208-debf-435d-b693-ffa5c91aed5b", "network_id": "c55607fb-e16c-4581-9bed-d91dad3d4770", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 10, "created_at": "2020-10-07T18:29:18Z", "updated_at": "2020-10-07T18:29:18Z", "revision_number": 0}, {"id": "3fe25cb9-2352-456a-8fd8-6e9c7fde4f50", "network_id": "988e27c5-ee9a-4f6f-b8ff-f53f82c2c38f", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 19, "created_at": "2020-10-11T11:29:25Z", "updated_at": "2020-10-11T11:29:25Z", "revision_number": 0}, {"id": "4024453f-4470-4322-9cd6-e82f0bd622a3", "network_id": "fd379896-8909-4063-9277-3474a2630b40", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 26, "created_at": "2020-10-12T13:54:07Z", "updated_at": "2020-10-12T13:54:07Z", "revision_number": 0}, {"id": "42f2fc3e-7180-446b-9c84-0626e5d5ed73", "network_id": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:03.372 38 INFO tempest.lib.common.rest_client [req-32247cb8-4148-4934-a352-5071ce9d880b ] Request (VolumesBackupsV39RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-11-06 18:04:03.373 38 DEBUG tempest.lib.common.rest_client [req-32247cb8-4148-4934-a352-5071ce9d880b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-32247cb8-4148-4934-a352-5071ce9d880b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5783426bf5c648628cf94a3bb7d0d766", "name": "tempest-VolumesBackupsV39RbacTest-1462512000", "password_expires_at": null}, "audit_ids": ["BQsSLpJhTcqAZ6NvL6zCjg"], "expires_at": "2020-11-06T19:04:03.000000Z", "issued_at": "2020-11-06T18:04:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6e5eb63f6e094f9a811f03f7ef90d48b", "name": "tempest-VolumesBackupsV39RbacTest-1462512000"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6e5eb63f6e094f9a811f03f7ef90d48b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6e5eb63f6e094f9a811f03f7ef90d48b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e5eb63f6e094f9a811f03f7ef90d48b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e5eb63f6e094f9a811f03f7ef90d48b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e5eb63f6e094f9a811f03f7ef90d48b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:03.400 40 INFO tempest.lib.common.rest_client [req-6158f638-7faf-410d-91c6-ea244ae40e70 ] Request (VolumesActionsV310RbacTest:test_volume_upload_public): 200 GET http://172.30.13.94/image/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694 0.017s 2020-11-06 18:04:03.400 40 DEBUG tempest.lib.common.rest_client [req-6158f638-7faf-410d-91c6-ea244ae40e70 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '657', 'content-type': 'application/json', 'x-openstack-request-id': 'req-6158f638-7faf-410d-91c6-ea244ae40e70', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694'} Body: b'{"name": "tempest-VolumesActionsV310RbacTest-Image-742747194", "disk_format": "raw", "container_format": "bare", "visibility": "public", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "68335a62eaf549cda40ba242685cb95c", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "8a82ffef-13e5-42ed-9604-43a36a1a4694", "created_at": "2020-11-06T18:03:56Z", "updated_at": "2020-11-06T18:03:56Z", "tags": [], "self": "/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694", "file": "/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:03.523 37 INFO tempest.lib.common.rest_client [req-e93a7ea2-2916-424d-b8e5-a60ec9456f5a ] Request (SegmentsExtRbacTest:test_list_segments): 201 POST http://172.30.13.94:9696/v2.0/segments 0.591s 2020-11-06 18:04:03.526 37 DEBUG tempest.lib.common.rest_client [req-e93a7ea2-2916-424d-b8e5-a60ec9456f5a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"segment": {"network_id": "d0f33d73-abbf-414f-8261-ffc8bfe4141c", "network_type": "gre", "segmentation_id": 4155}} Response - Headers: {'content-type': 'application/json', 'content-length': '318', 'x-openstack-request-id': 'req-e93a7ea2-2916-424d-b8e5-a60ec9456f5a', 'date': 'Fri, 06 Nov 2020 18:04:03 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/segments'} Body: b'{"segment": {"id": "b5724143-4fcf-479a-8a78-119bee17e25a", "network_id": "d0f33d73-abbf-414f-8261-ffc8bfe4141c", "name": null, "description": "", "physical_network": null, "network_type": "gre", "segmentation_id": 4155, "created_at": "2020-11-06T18:04:02Z", "updated_at": "2020-11-06T18:04:03Z", "revision_number": 1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:03.527 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:03.582 37 INFO tempest.lib.common.rest_client [req-47f67e0c-5532-487c-83b9-f40f74755210 ] Request (SegmentsExtRbacTest:test_list_segments): 200 GET http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles 0.054s 2020-11-06 18:04:03.583 37 DEBUG tempest.lib.common.rest_client [req-47f67e0c-5532-487c-83b9-f40f74755210 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-47f67e0c-5532-487c-83b9-f40f74755210', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:03.615 37 INFO tempest.lib.common.rest_client [req-fdbdceb7-69a3-4a25-be61-e4d371ed6e40 ] Request (SegmentsExtRbacTest:test_list_segments): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:04:03.615 37 DEBUG tempest.lib.common.rest_client [req-fdbdceb7-69a3-4a25-be61-e4d371ed6e40 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fdbdceb7-69a3-4a25-be61-e4d371ed6e40', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "977c2419d0a74d95af2a492c919014aa", "name": "tempest-SegmentsExtRbacTest-1555770406", "password_expires_at": null}, "audit_ids": ["CCxtqHtXTKSZbOJwa-iykw"], "expires_at": "2020-11-06T19:04:03.000000Z", "issued_at": "2020-11-06T18:04:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37beb2770ac54b99abb39614cfe7a87c", "name": "tempest-SegmentsExtRbacTest-1555770406"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:03.651 37 INFO tempest.lib.common.rest_client [req-21cc3502-d1ba-4081-9406-c11d95b64dd9 ] Request (SegmentsExtRbacTest:test_list_segments): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:04:03.652 37 DEBUG tempest.lib.common.rest_client [req-21cc3502-d1ba-4081-9406-c11d95b64dd9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-21cc3502-d1ba-4081-9406-c11d95b64dd9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "977c2419d0a74d95af2a492c919014aa", "name": "tempest-SegmentsExtRbacTest-1555770406", "password_expires_at": null}, "audit_ids": ["npnqyiM8Rliic-7BsH086A"], "expires_at": "2020-11-06T19:04:03.000000Z", "issued_at": "2020-11-06T18:04:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37beb2770ac54b99abb39614cfe7a87c", "name": "tempest-SegmentsExtRbacTest-1555770406"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:03.749 37 INFO tempest.lib.common.rest_client [req-325565e0-31b2-4905-94ba-b35faa180313 ] Request (SegmentsExtRbacTest:test_list_segments): 200 GET http://172.30.13.94:9696/v2.0/segments?id=b5724143-4fcf-479a-8a78-119bee17e25a 0.096s 2020-11-06 18:04:03.750 37 DEBUG tempest.lib.common.rest_client [req-325565e0-31b2-4905-94ba-b35faa180313 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '321', 'x-openstack-request-id': 'req-325565e0-31b2-4905-94ba-b35faa180313', 'date': 'Fri, 06 Nov 2020 18:04:03 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/segments?id=b5724143-4fcf-479a-8a78-119bee17e25a'} Body: b'{"segments": [{"id": "b5724143-4fcf-479a-8a78-119bee17e25a", "network_id": "d0f33d73-abbf-414f-8261-ffc8bfe4141c", "name": null, "description": "", "physical_network": null, "network_type": "gre", "segmentation_id": 4155, "created_at": "2020-11-06T18:04:02Z", "updated_at": "2020-11-06T18:04:03Z", "revision_number": 1}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:03.751 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:03.789 38 INFO tempest.lib.common.rest_client [req-5890cd23-33e8-479a-9a4b-ea0fa70436e7 ] Request (VolumesBackupsV39RbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/volumes 0.414s 2020-11-06 18:04:03.789 38 DEBUG tempest.lib.common.rest_client [req-5890cd23-33e8-479a-9a4b-ea0fa70436e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-VolumesBackupsV39RbacTest-Volume-212677935"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-5890cd23-33e8-479a-9a4b-ea0fa70436e7', 'content-length': '845', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5890cd23-33e8-479a-9a4b-ea0fa70436e7', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/volumes'} Body: b'{"volume": {"id": "c49c04c4-6ebf-4333-8119-acd6994c14e2", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:04.000000", "updated_at": null, "name": "tempest-VolumesBackupsV39RbacTest-Volume-212677935", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/volumes/c49c04c4-6ebf-4333-8119-acd6994c14e2"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6e5eb63f6e094f9a811f03f7ef90d48b/volumes/c49c04c4-6ebf-4333-8119-acd6994c14e2"}], "user_id": "5783426bf5c648628cf94a3bb7d0d766", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:03.800 37 INFO tempest.lib.common.rest_client [req-62d23e77-7212-4eb0-8cf5-8737e30669f2 ] Request (SegmentsExtRbacTest:test_list_segments): 200 GET http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles 0.049s 2020-11-06 18:04:03.801 37 DEBUG tempest.lib.common.rest_client [req-62d23e77-7212-4eb0-8cf5-8737e30669f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-62d23e77-7212-4eb0-8cf5-8737e30669f2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:03.838 37 INFO tempest.lib.common.rest_client [req-764ba075-3278-4a51-a23e-b7805aa0c3fc ] Request (SegmentsExtRbacTest:test_list_segments): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:04:03.838 37 DEBUG tempest.lib.common.rest_client [req-764ba075-3278-4a51-a23e-b7805aa0c3fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-764ba075-3278-4a51-a23e-b7805aa0c3fc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "977c2419d0a74d95af2a492c919014aa", "name": "tempest-SegmentsExtRbacTest-1555770406", "password_expires_at": null}, "audit_ids": ["-hjpEcfoTz6r6zLVhcSs0g"], "expires_at": "2020-11-06T19:04:03.000000Z", "issued_at": "2020-11-06T18:04:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37beb2770ac54b99abb39614cfe7a87c", "name": "tempest-SegmentsExtRbacTest-1555770406"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:03.867 38 INFO tempest.lib.common.rest_client [req-a39179f5-ef3c-4f5c-8a37-b61424c9d13b ] Request (VolumesBackupsV39RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/volumes/c49c04c4-6ebf-4333-8119-acd6994c14e2 0.064s 2020-11-06 18:04:03.868 38 DEBUG tempest.lib.common.rest_client [req-a39179f5-ef3c-4f5c-8a37-b61424c9d13b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a39179f5-ef3c-4f5c-8a37-b61424c9d13b', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a39179f5-ef3c-4f5c-8a37-b61424c9d13b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/volumes/c49c04c4-6ebf-4333-8119-acd6994c14e2'} Body: b'{"volume": {"id": "c49c04c4-6ebf-4333-8119-acd6994c14e2", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:04.000000", "updated_at": "2020-11-06T18:04:04.000000", "name": "tempest-VolumesBackupsV39RbacTest-Volume-212677935", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/volumes/c49c04c4-6ebf-4333-8119-acd6994c14e2"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6e5eb63f6e094f9a811f03f7ef90d48b/volumes/c49c04c4-6ebf-4333-8119-acd6994c14e2"}], "user_id": "5783426bf5c648628cf94a3bb7d0d766", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "6e5eb63f6e094f9a811f03f7ef90d48b"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:03.873 37 INFO tempest.lib.common.rest_client [req-cb0c45c4-f490-4d5a-86fa-83f55484bb8f ] Request (SegmentsExtRbacTest:test_list_segments): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:04:03.874 37 DEBUG tempest.lib.common.rest_client [req-cb0c45c4-f490-4d5a-86fa-83f55484bb8f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cb0c45c4-f490-4d5a-86fa-83f55484bb8f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "977c2419d0a74d95af2a492c919014aa", "name": "tempest-SegmentsExtRbacTest-1555770406", "password_expires_at": null}, "audit_ids": ["aKtlToPYR1CdLy6ofaOmow"], "expires_at": "2020-11-06T19:04:03.000000Z", "issued_at": "2020-11-06T18:04:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37beb2770ac54b99abb39614cfe7a87c", "name": "tempest-SegmentsExtRbacTest-1555770406"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:03.877 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:03.880 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_segment, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:03.991 37 INFO tempest.lib.common.rest_client [req-0c40d886-e773-435a-84fc-8a1a84dc2249 ] Request (SegmentsExtRbacTest:test_show_segment): 200 GET http://172.30.13.94:9696/v2.0/segments 0.110s 2020-11-06 18:04:03.992 37 DEBUG tempest.lib.common.rest_client [req-0c40d886-e773-435a-84fc-8a1a84dc2249 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '19164', 'x-openstack-request-id': 'req-0c40d886-e773-435a-84fc-8a1a84dc2249', 'date': 'Fri, 06 Nov 2020 18:04:03 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/segments'} Body: b'{"segments": [{"id": "02b25095-41f1-4387-8d95-2ed51ebfc9a5", "network_id": "f51f957c-1c2a-4b94-a3da-5062f99b8f13", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 29, "created_at": "2020-10-26T13:55:33Z", "updated_at": "2020-10-26T13:55:33Z", "revision_number": 0}, {"id": "08d77bc3-1ae2-4614-82eb-dc68485a6892", "network_id": "b110fd8c-218d-4728-a53a-c7c232521b94", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 18, "created_at": "2020-10-10T11:05:48Z", "updated_at": "2020-10-10T11:05:48Z", "revision_number": 0}, {"id": "0a844538-f669-4e59-8bd4-ad8f7b4139b2", "network_id": "375af6bf-6b1d-4a79-a8e4-364fd12eb5ce", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 7, "created_at": "2020-10-07T13:45:24Z", "updated_at": "2020-10-07T13:45:24Z", "revision_number": 0}, {"id": "138af7c0-2892-42ca-bc12-945b1ed1f36f", "network_id": "3c0df36c-3ee6-4537-9024-19fde4d0c732", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 6, "created_at": "2020-10-08T07:58:23Z", "updated_at": "2020-10-08T07:58:23Z", "revision_number": 0}, {"id": "15564e89-1f58-4f69-bd70-0aa9f10c5345", "network_id": "a95ee1a9-0c56-4f70-8e0d-1502f45a1a5d", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 17, "created_at": "2020-10-08T07:46:47Z", "updated_at": "2020-10-08T07:46:47Z", "revision_number": 0}, {"id": "1f59d239-ed67-4a86-b5fa-e6ae880313b3", "network_id": "621c5dd4-7ec0-457a-b399-b4b3b35a5feb", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 31, "created_at": "2020-10-19T13:54:02Z", "updated_at": "2020-10-19T13:54:02Z", "revision_number": 0}, {"id": "2b06e399-b32f-42ec-bbda-1d53c65697a1", "network_id": "cadadb33-2658-4e64-b40a-9a6849c0527b", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 28, "created_at": "2020-10-16T17:08:16Z", "updated_at": "2020-10-16T17:08:16Z", "revision_number": 0}, {"id": "2eb99341-02b6-49fe-9aaf-f30b11f2dc46", "network_id": "c34fd91c-bb90-4ab1-9086-bb633e5a7d87", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 4, "created_at": "2020-10-07T13:54:57Z", "updated_at": "2020-10-07T13:54:57Z", "revision_number": 0}, {"id": "3335d8d0-bd00-425a-aecf-31c71bc99eb3", "network_id": "795afc26-787e-4d38-9bc1-bc29e5b00fbc", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 55, "created_at": "2020-11-06T17:59:07Z", "updated_at": "2020-11-06T17:59:07Z", "revision_number": 0}, {"id": "3dcc8169-a45d-43e5-ab7d-7e0e9b4650f5", "network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "name": null, "description": null, "physical_network": "public", "network_type": "flat", "segmentation_id": null, "created_at": "2020-10-07T12:07:37Z", "updated_at": "2020-10-07T12:07:37Z", "revision_number": 1}, {"id": "3e5c0208-debf-435d-b693-ffa5c91aed5b", "network_id": "c55607fb-e16c-4581-9bed-d91dad3d4770", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 10, "created_at": "2020-10-07T18:29:18Z", "updated_at": "2020-10-07T18:29:18Z", "revision_number": 0}, {"id": "3fe25cb9-2352-456a-8fd8-6e9c7fde4f50", "network_id": "988e27c5-ee9a-4f6f-b8ff-f53f82c2c38f", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 19, "created_at": "2020-10-11T11:29:25Z", "updated_at": "2020-10-11T11:29:25Z", "revision_number": 0}, {"id": "4024453f-4470-4322-9cd6-e82f0bd622a3", "network_id": "fd379896-8909-4063-9277-3474a2630b40", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 26, "created_at": "2020-10-12T13:54:07Z", "updated_at": "2020-10-12T13:54:07Z", "revision_number": 0}, {"id": "42f2fc3e-7180-446b-9c84-0626e5d5ed73", "network_id": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:04.426 40 INFO tempest.lib.common.rest_client [req-cb62897b-7b26-4813-8952-434895fa37ae ] Request (VolumesActionsV310RbacTest:test_volume_upload_public): 200 GET http://172.30.13.94/image/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694 0.024s 2020-11-06 18:04:04.426 40 DEBUG tempest.lib.common.rest_client [req-cb62897b-7b26-4813-8952-434895fa37ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '829', 'content-type': 'application/json', 'x-openstack-request-id': 'req-cb62897b-7b26-4813-8952-434895fa37ae', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694'} Body: b'{"name": "tempest-VolumesActionsV310RbacTest-Image-742747194", "disk_format": "raw", "container_format": "bare", "visibility": "public", "size": 1073741824, "virtual_size": 1073741824, "status": "active", "checksum": "cd573cfaace07e7949bc0c46028904ff", "protected": false, "min_ram": 0, "min_disk": 0, "owner": "68335a62eaf549cda40ba242685cb95c", "os_hidden": false, "os_hash_algo": "sha512", "os_hash_value": "c5041ae163cf0f65600acfe7f6a63f212101687d41a57a4e18ffd2a07a452cd8175b8f5a4868dd2330bfe5ae123f18216bdbc9e0f80d131e64b94913a7b40bb5", "id": "8a82ffef-13e5-42ed-9604-43a36a1a4694", "created_at": "2020-11-06T18:03:56Z", "updated_at": "2020-11-06T18:04:04Z", "tags": [], "self": "/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694", "file": "/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:04.509 40 INFO tempest.lib.common.rest_client [req-eaa1c9a6-a134-47be-b6e9-141fcfc0c5cf ] Request (VolumesActionsV310RbacTest:test_volume_upload_public): 200 GET http://172.30.13.94/volume/v3/68335a62eaf549cda40ba242685cb95c/volumes/4ac5b3d2-38d3-4d09-9f25-62a79d5e2871 0.082s 2020-11-06 18:04:04.510 40 DEBUG tempest.lib.common.rest_client [req-eaa1c9a6-a134-47be-b6e9-141fcfc0c5cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.10', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-eaa1c9a6-a134-47be-b6e9-141fcfc0c5cf', 'content-length': '1069', 'openstack-api-version': 'volume 3.10', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-eaa1c9a6-a134-47be-b6e9-141fcfc0c5cf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/68335a62eaf549cda40ba242685cb95c/volumes/4ac5b3d2-38d3-4d09-9f25-62a79d5e2871'} Body: b'{"volume": {"id": "4ac5b3d2-38d3-4d09-9f25-62a79d5e2871", "status": "uploading", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:03:45.000000", "updated_at": "2020-11-06T18:03:56.000000", "name": "tempest-VolumesActionsV310RbacTest-Volume-664382291", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/68335a62eaf549cda40ba242685cb95c/volumes/4ac5b3d2-38d3-4d09-9f25-62a79d5e2871"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/68335a62eaf549cda40ba242685cb95c/volumes/4ac5b3d2-38d3-4d09-9f25-62a79d5e2871"}], "user_id": "9bdbf6356f534045a5482b7b7136964d", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "68335a62eaf549cda40ba242685cb95c"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:04.525 37 INFO tempest.lib.common.rest_client [req-6fa31b2f-62e4-4194-95b7-3786c4587f54 ] Request (SegmentsExtRbacTest:test_show_segment): 201 POST http://172.30.13.94:9696/v2.0/segments 0.531s 2020-11-06 18:04:04.525 37 DEBUG tempest.lib.common.rest_client [req-6fa31b2f-62e4-4194-95b7-3786c4587f54 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"segment": {"network_id": "d0f33d73-abbf-414f-8261-ffc8bfe4141c", "network_type": "gre", "segmentation_id": 1754}} Response - Headers: {'content-type': 'application/json', 'content-length': '318', 'x-openstack-request-id': 'req-6fa31b2f-62e4-4194-95b7-3786c4587f54', 'date': 'Fri, 06 Nov 2020 18:04:04 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/segments'} Body: b'{"segment": {"id": "0ec8b5fc-c401-4f82-918a-bf28e07819af", "network_id": "d0f33d73-abbf-414f-8261-ffc8bfe4141c", "name": null, "description": "", "physical_network": null, "network_type": "gre", "segmentation_id": 1754, "created_at": "2020-11-06T18:04:04Z", "updated_at": "2020-11-06T18:04:04Z", "revision_number": 1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:04.526 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:04.579 37 INFO tempest.lib.common.rest_client [req-158d19db-7cb5-405c-8afd-10bdbe5ea96b ] Request (SegmentsExtRbacTest:test_show_segment): 200 GET http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles 0.052s 2020-11-06 18:04:04.580 37 DEBUG tempest.lib.common.rest_client [req-158d19db-7cb5-405c-8afd-10bdbe5ea96b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-158d19db-7cb5-405c-8afd-10bdbe5ea96b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:04.617 37 INFO tempest.lib.common.rest_client [req-a0c02255-3eb6-46f5-9228-065a04249447 ] Request (SegmentsExtRbacTest:test_show_segment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:04:04.618 37 DEBUG tempest.lib.common.rest_client [req-a0c02255-3eb6-46f5-9228-065a04249447 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a0c02255-3eb6-46f5-9228-065a04249447', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "977c2419d0a74d95af2a492c919014aa", "name": "tempest-SegmentsExtRbacTest-1555770406", "password_expires_at": null}, "audit_ids": ["lmLtf7TlQDm0Xiq9xTRoAg"], "expires_at": "2020-11-06T19:04:04.000000Z", "issued_at": "2020-11-06T18:04:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37beb2770ac54b99abb39614cfe7a87c", "name": "tempest-SegmentsExtRbacTest-1555770406"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:04.658 37 INFO tempest.lib.common.rest_client [req-88e9c6c0-c5d3-4f83-b7b1-4f617144dc5c ] Request (SegmentsExtRbacTest:test_show_segment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:04:04.658 37 DEBUG tempest.lib.common.rest_client [req-88e9c6c0-c5d3-4f83-b7b1-4f617144dc5c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-88e9c6c0-c5d3-4f83-b7b1-4f617144dc5c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "977c2419d0a74d95af2a492c919014aa", "name": "tempest-SegmentsExtRbacTest-1555770406", "password_expires_at": null}, "audit_ids": ["0QRvjMzES6WgrKzAYSD0EA"], "expires_at": "2020-11-06T19:04:04.000000Z", "issued_at": "2020-11-06T18:04:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37beb2770ac54b99abb39614cfe7a87c", "name": "tempest-SegmentsExtRbacTest-1555770406"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:04.774 37 INFO tempest.lib.common.rest_client [req-61679f44-8420-4bee-9888-ecc328017053 ] Request (SegmentsExtRbacTest:test_show_segment): 200 GET http://172.30.13.94:9696/v2.0/segments/0ec8b5fc-c401-4f82-918a-bf28e07819af 0.114s 2020-11-06 18:04:04.774 37 DEBUG tempest.lib.common.rest_client [req-61679f44-8420-4bee-9888-ecc328017053 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '318', 'x-openstack-request-id': 'req-61679f44-8420-4bee-9888-ecc328017053', 'date': 'Fri, 06 Nov 2020 18:04:04 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/segments/0ec8b5fc-c401-4f82-918a-bf28e07819af'} Body: b'{"segment": {"id": "0ec8b5fc-c401-4f82-918a-bf28e07819af", "network_id": "d0f33d73-abbf-414f-8261-ffc8bfe4141c", "name": null, "description": "", "physical_network": null, "network_type": "gre", "segmentation_id": 1754, "created_at": "2020-11-06T18:04:04Z", "updated_at": "2020-11-06T18:04:04Z", "revision_number": 1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:04.775 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:04.823 37 INFO tempest.lib.common.rest_client [req-17d9ff4d-d3fe-4a77-a2dd-6aa269e78b69 ] Request (SegmentsExtRbacTest:test_show_segment): 200 GET http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles 0.047s 2020-11-06 18:04:04.824 37 DEBUG tempest.lib.common.rest_client [req-17d9ff4d-d3fe-4a77-a2dd-6aa269e78b69 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-17d9ff4d-d3fe-4a77-a2dd-6aa269e78b69', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:04.948 37 INFO tempest.lib.common.rest_client [req-f4239453-ed13-459e-bb4d-96bbc74cfcd3 ] Request (SegmentsExtRbacTest:test_show_segment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.123s 2020-11-06 18:04:04.949 37 DEBUG tempest.lib.common.rest_client [req-f4239453-ed13-459e-bb4d-96bbc74cfcd3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f4239453-ed13-459e-bb4d-96bbc74cfcd3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "977c2419d0a74d95af2a492c919014aa", "name": "tempest-SegmentsExtRbacTest-1555770406", "password_expires_at": null}, "audit_ids": ["umCb6bs3TASDuw6lqAIfUQ"], "expires_at": "2020-11-06T19:04:04.000000Z", "issued_at": "2020-11-06T18:04:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37beb2770ac54b99abb39614cfe7a87c", "name": "tempest-SegmentsExtRbacTest-1555770406"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:04.958 38 INFO tempest.lib.common.rest_client [req-8c2d1da9-d02b-4eea-9d79-d044c81bf056 ] Request (VolumesBackupsV39RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/volumes/c49c04c4-6ebf-4333-8119-acd6994c14e2 0.075s 2020-11-06 18:04:04.958 38 DEBUG tempest.lib.common.rest_client [req-8c2d1da9-d02b-4eea-9d79-d044c81bf056 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-8c2d1da9-d02b-4eea-9d79-d044c81bf056', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8c2d1da9-d02b-4eea-9d79-d044c81bf056', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/volumes/c49c04c4-6ebf-4333-8119-acd6994c14e2'} Body: b'{"volume": {"id": "c49c04c4-6ebf-4333-8119-acd6994c14e2", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:04.000000", "updated_at": "2020-11-06T18:04:04.000000", "name": "tempest-VolumesBackupsV39RbacTest-Volume-212677935", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/volumes/c49c04c4-6ebf-4333-8119-acd6994c14e2"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6e5eb63f6e094f9a811f03f7ef90d48b/volumes/c49c04c4-6ebf-4333-8119-acd6994c14e2"}], "user_id": "5783426bf5c648628cf94a3bb7d0d766", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "6e5eb63f6e094f9a811f03f7ef90d48b"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:04.968 38 INFO tempest.common.waiters [-] volume c49c04c4-6ebf-4333-8119-acd6994c14e2 reached available after waiting for 1.968709 seconds 2020-11-06 18:04:04.991 37 INFO tempest.lib.common.rest_client [req-f8271de6-da12-4703-95d1-62e1d17b4c27 ] Request (SegmentsExtRbacTest:test_show_segment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:04:04.991 37 DEBUG tempest.lib.common.rest_client [req-f8271de6-da12-4703-95d1-62e1d17b4c27 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f8271de6-da12-4703-95d1-62e1d17b4c27', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "977c2419d0a74d95af2a492c919014aa", "name": "tempest-SegmentsExtRbacTest-1555770406", "password_expires_at": null}, "audit_ids": ["qG5sIK-zQrKmbnDuWsbJag"], "expires_at": "2020-11-06T19:04:04.000000Z", "issued_at": "2020-11-06T18:04:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37beb2770ac54b99abb39614cfe7a87c", "name": "tempest-SegmentsExtRbacTest-1555770406"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:04.994 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:04.996 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_segment, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:04.996 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:04.998 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_segment, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:05.077 39 INFO tempest.lib.common.rest_client [req-872d1167-0b88-493b-8fe9-7d160416ee22 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 1.496s 2020-11-06 18:04:05.078 39 DEBUG tempest.lib.common.rest_client [req-872d1167-0b88-493b-8fe9-7d160416ee22 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-872d1167-0b88-493b-8fe9-7d160416ee22', 'x-compute-request-id': 'req-872d1167-0b88-493b-8fe9-7d160416ee22', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:05.115 38 INFO tempest.lib.common.rest_client [req-83a429a7-3650-444e-8e18-c4fb032681f0 ] Request (VolumesBackupsV39RbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/backups 0.146s 2020-11-06 18:04:05.116 38 DEBUG tempest.lib.common.rest_client [req-83a429a7-3650-444e-8e18-c4fb032681f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"backup": {"volume_id": "c49c04c4-6ebf-4333-8119-acd6994c14e2", "name": "tempest-VolumesBackupsV39RbacTest-Backup-187499024"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-83a429a7-3650-444e-8e18-c4fb032681f0', 'content-length': '404', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-83a429a7-3650-444e-8e18-c4fb032681f0', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/backups'} Body: b'{"backup": {"id": "8e4f4347-a289-44c2-aa69-769e354b913a", "name": "tempest-VolumesBackupsV39RbacTest-Backup-187499024", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/backups/8e4f4347-a289-44c2-aa69-769e354b913a"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6e5eb63f6e094f9a811f03f7ef90d48b/backups/8e4f4347-a289-44c2-aa69-769e354b913a"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:05.140 37 INFO tempest.lib.common.rest_client [req-e65282d1-9578-4419-866e-01c9e8fd8e1f ] Request (SegmentsExtRbacTest:test_update_segment): 200 GET http://172.30.13.94:9696/v2.0/segments 0.142s 2020-11-06 18:04:05.141 37 DEBUG tempest.lib.common.rest_client [req-e65282d1-9578-4419-866e-01c9e8fd8e1f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '19471', 'x-openstack-request-id': 'req-e65282d1-9578-4419-866e-01c9e8fd8e1f', 'date': 'Fri, 06 Nov 2020 18:04:05 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/segments'} Body: b'{"segments": [{"id": "02b25095-41f1-4387-8d95-2ed51ebfc9a5", "network_id": "f51f957c-1c2a-4b94-a3da-5062f99b8f13", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 29, "created_at": "2020-10-26T13:55:33Z", "updated_at": "2020-10-26T13:55:33Z", "revision_number": 0}, {"id": "08d77bc3-1ae2-4614-82eb-dc68485a6892", "network_id": "b110fd8c-218d-4728-a53a-c7c232521b94", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 18, "created_at": "2020-10-10T11:05:48Z", "updated_at": "2020-10-10T11:05:48Z", "revision_number": 0}, {"id": "0a844538-f669-4e59-8bd4-ad8f7b4139b2", "network_id": "375af6bf-6b1d-4a79-a8e4-364fd12eb5ce", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 7, "created_at": "2020-10-07T13:45:24Z", "updated_at": "2020-10-07T13:45:24Z", "revision_number": 0}, {"id": "0ec8b5fc-c401-4f82-918a-bf28e07819af", "network_id": "d0f33d73-abbf-414f-8261-ffc8bfe4141c", "name": null, "description": "", "physical_network": null, "network_type": "gre", "segmentation_id": 1754, "created_at": "2020-11-06T18:04:04Z", "updated_at": "2020-11-06T18:04:04Z", "revision_number": 1}, {"id": "138af7c0-2892-42ca-bc12-945b1ed1f36f", "network_id": "3c0df36c-3ee6-4537-9024-19fde4d0c732", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 6, "created_at": "2020-10-08T07:58:23Z", "updated_at": "2020-10-08T07:58:23Z", "revision_number": 0}, {"id": "15564e89-1f58-4f69-bd70-0aa9f10c5345", "network_id": "a95ee1a9-0c56-4f70-8e0d-1502f45a1a5d", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 17, "created_at": "2020-10-08T07:46:47Z", "updated_at": "2020-10-08T07:46:47Z", "revision_number": 0}, {"id": "1f59d239-ed67-4a86-b5fa-e6ae880313b3", "network_id": "621c5dd4-7ec0-457a-b399-b4b3b35a5feb", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 31, "created_at": "2020-10-19T13:54:02Z", "updated_at": "2020-10-19T13:54:02Z", "revision_number": 0}, {"id": "2b06e399-b32f-42ec-bbda-1d53c65697a1", "network_id": "cadadb33-2658-4e64-b40a-9a6849c0527b", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 28, "created_at": "2020-10-16T17:08:16Z", "updated_at": "2020-10-16T17:08:16Z", "revision_number": 0}, {"id": "2eb99341-02b6-49fe-9aaf-f30b11f2dc46", "network_id": "c34fd91c-bb90-4ab1-9086-bb633e5a7d87", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 4, "created_at": "2020-10-07T13:54:57Z", "updated_at": "2020-10-07T13:54:57Z", "revision_number": 0}, {"id": "3335d8d0-bd00-425a-aecf-31c71bc99eb3", "network_id": "795afc26-787e-4d38-9bc1-bc29e5b00fbc", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 55, "created_at": "2020-11-06T17:59:07Z", "updated_at": "2020-11-06T17:59:07Z", "revision_number": 0}, {"id": "3dcc8169-a45d-43e5-ab7d-7e0e9b4650f5", "network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "name": null, "description": null, "physical_network": "public", "network_type": "flat", "segmentation_id": null, "created_at": "2020-10-07T12:07:37Z", "updated_at": "2020-10-07T12:07:37Z", "revision_number": 1}, {"id": "3e5c0208-debf-435d-b693-ffa5c91aed5b", "network_id": "c55607fb-e16c-4581-9bed-d91dad3d4770", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 10, "created_at": "2020-10-07T18:29:18Z", "updated_at": "2020-10-07T18:29:18Z", "revision_number": 0}, {"id": "3fe25cb9-2352-456a-8fd8-6e9c7fde4f50", "network_id": "988e27c5-ee9a-4f6f-b8ff-f53f82c2c38f", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 19, "created_at": "2020-10-11T11:29:25Z", "updated_at": "2020-10-11T11:29:25Z", "revision_number": 0}, {"id": "4024453f-4470-4322-9cd6-e82f0bd622a3", "network_id": "f _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:05.150 38 INFO tempest.lib.common.rest_client [req-096d23b0-bbd0-401a-9909-7ff0e2c0c05e ] Request (VolumesBackupsV39RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/backups/8e4f4347-a289-44c2-aa69-769e354b913a 0.029s 2020-11-06 18:04:05.151 38 DEBUG tempest.lib.common.rest_client [req-096d23b0-bbd0-401a-9909-7ff0e2c0c05e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-096d23b0-bbd0-401a-9909-7ff0e2c0c05e', 'content-length': '811', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-096d23b0-bbd0-401a-9909-7ff0e2c0c05e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/backups/8e4f4347-a289-44c2-aa69-769e354b913a'} Body: b'{"backup": {"id": "8e4f4347-a289-44c2-aa69-769e354b913a", "status": "creating", "size": 1, "object_count": 0, "availability_zone": null, "container": null, "created_at": "2020-11-06T18:04:05.000000", "updated_at": "2020-11-06T18:04:05.000000", "name": "tempest-VolumesBackupsV39RbacTest-Backup-187499024", "description": null, "fail_reason": null, "volume_id": "c49c04c4-6ebf-4333-8119-acd6994c14e2", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/backups/8e4f4347-a289-44c2-aa69-769e354b913a"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6e5eb63f6e094f9a811f03f7ef90d48b/backups/8e4f4347-a289-44c2-aa69-769e354b913a"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-11-06T18:04:05.000000"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:05.592 40 INFO tempest.lib.common.rest_client [req-b5a609d4-5c8b-4e48-adf7-e0b888af5214 ] Request (VolumesActionsV310RbacTest:test_volume_upload_public): 200 GET http://172.30.13.94/volume/v3/68335a62eaf549cda40ba242685cb95c/volumes/4ac5b3d2-38d3-4d09-9f25-62a79d5e2871 0.069s 2020-11-06 18:04:05.593 40 DEBUG tempest.lib.common.rest_client [req-b5a609d4-5c8b-4e48-adf7-e0b888af5214 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.10', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-b5a609d4-5c8b-4e48-adf7-e0b888af5214', 'content-length': '1069', 'openstack-api-version': 'volume 3.10', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b5a609d4-5c8b-4e48-adf7-e0b888af5214', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/68335a62eaf549cda40ba242685cb95c/volumes/4ac5b3d2-38d3-4d09-9f25-62a79d5e2871'} Body: b'{"volume": {"id": "4ac5b3d2-38d3-4d09-9f25-62a79d5e2871", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:03:45.000000", "updated_at": "2020-11-06T18:04:04.000000", "name": "tempest-VolumesActionsV310RbacTest-Volume-664382291", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/68335a62eaf549cda40ba242685cb95c/volumes/4ac5b3d2-38d3-4d09-9f25-62a79d5e2871"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/68335a62eaf549cda40ba242685cb95c/volumes/4ac5b3d2-38d3-4d09-9f25-62a79d5e2871"}], "user_id": "9bdbf6356f534045a5482b7b7136964d", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "68335a62eaf549cda40ba242685cb95c"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:05.603 40 INFO tempest.common.waiters [-] volume 4ac5b3d2-38d3-4d09-9f25-62a79d5e2871 reached available after waiting for 1.603877 seconds 2020-11-06 18:04:06.186 40 INFO tempest.lib.common.rest_client [req-812ceafd-0cb5-490a-82db-1bd6fbe319ae ] Request (VolumesActionsV310RbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694 0.581s 2020-11-06 18:04:06.186 40 DEBUG tempest.lib.common.rest_client [req-812ceafd-0cb5-490a-82db-1bd6fbe319ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-812ceafd-0cb5-490a-82db-1bd6fbe319ae', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/8a82ffef-13e5-42ed-9604-43a36a1a4694'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:06.191 38 INFO tempest.lib.common.rest_client [req-354a6ea3-24b7-413f-a207-a04b483c9f39 ] Request (VolumesBackupsV39RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/backups/8e4f4347-a289-44c2-aa69-769e354b913a 0.029s 2020-11-06 18:04:06.191 38 DEBUG tempest.lib.common.rest_client [req-354a6ea3-24b7-413f-a207-a04b483c9f39 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-354a6ea3-24b7-413f-a207-a04b483c9f39', 'content-length': '816', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-354a6ea3-24b7-413f-a207-a04b483c9f39', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/backups/8e4f4347-a289-44c2-aa69-769e354b913a'} Body: b'{"backup": {"id": "8e4f4347-a289-44c2-aa69-769e354b913a", "status": "creating", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-11-06T18:04:05.000000", "updated_at": "2020-11-06T18:04:06.000000", "name": "tempest-VolumesBackupsV39RbacTest-Backup-187499024", "description": null, "fail_reason": null, "volume_id": "c49c04c4-6ebf-4333-8119-acd6994c14e2", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/backups/8e4f4347-a289-44c2-aa69-769e354b913a"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6e5eb63f6e094f9a811f03f7ef90d48b/backups/8e4f4347-a289-44c2-aa69-769e354b913a"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-11-06T18:04:05.000000"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:06.305 39 INFO tempest.lib.common.rest_client [req-a357bdcd-54c4-43cd-8166-e21e4be0a69c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.210s 2020-11-06 18:04:06.305 39 DEBUG tempest.lib.common.rest_client [req-a357bdcd-54c4-43cd-8166-e21e4be0a69c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a357bdcd-54c4-43cd-8166-e21e4be0a69c', 'x-compute-request-id': 'req-a357bdcd-54c4-43cd-8166-e21e4be0a69c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:06.306 40 INFO tempest.lib.common.rest_client [req-2df3847c-26cf-4193-9d1b-3d77bafa9f71 ] Request (VolumesActionsV310RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/68335a62eaf549cda40ba242685cb95c/volumes/4ac5b3d2-38d3-4d09-9f25-62a79d5e2871 0.118s 2020-11-06 18:04:06.306 40 DEBUG tempest.lib.common.rest_client [req-2df3847c-26cf-4193-9d1b-3d77bafa9f71 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2df3847c-26cf-4193-9d1b-3d77bafa9f71', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/68335a62eaf549cda40ba242685cb95c/volumes/4ac5b3d2-38d3-4d09-9f25-62a79d5e2871'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:06.378 40 INFO tempest.lib.common.rest_client [req-79e4e87c-1e83-4105-a11c-a10b4e4ca6cf ] Request (VolumesActionsV310RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/68335a62eaf549cda40ba242685cb95c/volumes/4ac5b3d2-38d3-4d09-9f25-62a79d5e2871 0.071s 2020-11-06 18:04:06.378 40 DEBUG tempest.lib.common.rest_client [req-79e4e87c-1e83-4105-a11c-a10b4e4ca6cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-79e4e87c-1e83-4105-a11c-a10b4e4ca6cf', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-79e4e87c-1e83-4105-a11c-a10b4e4ca6cf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/68335a62eaf549cda40ba242685cb95c/volumes/4ac5b3d2-38d3-4d09-9f25-62a79d5e2871'} Body: b'{"volume": {"id": "4ac5b3d2-38d3-4d09-9f25-62a79d5e2871", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:03:45.000000", "updated_at": "2020-11-06T18:04:06.000000", "name": "tempest-VolumesActionsV310RbacTest-Volume-664382291", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/68335a62eaf549cda40ba242685cb95c/volumes/4ac5b3d2-38d3-4d09-9f25-62a79d5e2871"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/68335a62eaf549cda40ba242685cb95c/volumes/4ac5b3d2-38d3-4d09-9f25-62a79d5e2871"}], "user_id": "9bdbf6356f534045a5482b7b7136964d", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "68335a62eaf549cda40ba242685cb95c"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:06.729 37 INFO tempest.lib.common.rest_client [req-9e5841b6-cf34-4d6a-9c66-e58c08de4ceb ] Request (SegmentsExtRbacTest:test_update_segment): 201 POST http://172.30.13.94:9696/v2.0/segments 1.586s 2020-11-06 18:04:06.730 37 DEBUG tempest.lib.common.rest_client [req-9e5841b6-cf34-4d6a-9c66-e58c08de4ceb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"segment": {"network_id": "d0f33d73-abbf-414f-8261-ffc8bfe4141c", "network_type": "gre", "segmentation_id": 2495}} Response - Headers: {'content-type': 'application/json', 'content-length': '318', 'x-openstack-request-id': 'req-9e5841b6-cf34-4d6a-9c66-e58c08de4ceb', 'date': 'Fri, 06 Nov 2020 18:04:06 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/segments'} Body: b'{"segment": {"id": "bdd39c36-7222-47a9-b869-77f563ecbda0", "network_id": "d0f33d73-abbf-414f-8261-ffc8bfe4141c", "name": null, "description": "", "physical_network": null, "network_type": "gre", "segmentation_id": 2495, "created_at": "2020-11-06T18:04:05Z", "updated_at": "2020-11-06T18:04:06Z", "revision_number": 1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:06.730 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:06.784 37 INFO tempest.lib.common.rest_client [req-4b7fec45-0585-44f5-a94b-f6a72a6d338a ] Request (SegmentsExtRbacTest:test_update_segment): 200 GET http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles 0.053s 2020-11-06 18:04:06.785 37 DEBUG tempest.lib.common.rest_client [req-4b7fec45-0585-44f5-a94b-f6a72a6d338a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4b7fec45-0585-44f5-a94b-f6a72a6d338a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:06.820 37 INFO tempest.lib.common.rest_client [req-be076ea9-33da-424d-adad-9a5d9b38b655 ] Request (SegmentsExtRbacTest:test_update_segment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:04:06.821 37 DEBUG tempest.lib.common.rest_client [req-be076ea9-33da-424d-adad-9a5d9b38b655 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-be076ea9-33da-424d-adad-9a5d9b38b655', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "977c2419d0a74d95af2a492c919014aa", "name": "tempest-SegmentsExtRbacTest-1555770406", "password_expires_at": null}, "audit_ids": ["sybLUnkWS3OZy9kyjZPfJA"], "expires_at": "2020-11-06T19:04:06.000000Z", "issued_at": "2020-11-06T18:04:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37beb2770ac54b99abb39614cfe7a87c", "name": "tempest-SegmentsExtRbacTest-1555770406"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:06.853 37 INFO tempest.lib.common.rest_client [req-82416a87-2408-49fa-8554-3872d65e77a7 ] Request (SegmentsExtRbacTest:test_update_segment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:04:06.853 37 DEBUG tempest.lib.common.rest_client [req-82416a87-2408-49fa-8554-3872d65e77a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-82416a87-2408-49fa-8554-3872d65e77a7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "977c2419d0a74d95af2a492c919014aa", "name": "tempest-SegmentsExtRbacTest-1555770406", "password_expires_at": null}, "audit_ids": ["EGSdGUO1SHad7VmeBrx8BA"], "expires_at": "2020-11-06T19:04:06.000000Z", "issued_at": "2020-11-06T18:04:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37beb2770ac54b99abb39614cfe7a87c", "name": "tempest-SegmentsExtRbacTest-1555770406"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:06.984 37 INFO tempest.lib.common.rest_client [req-df1829b5-7370-4c85-a04a-78df94308838 ] Request (SegmentsExtRbacTest:test_update_segment): 200 PUT http://172.30.13.94:9696/v2.0/segments/bdd39c36-7222-47a9-b869-77f563ecbda0 0.129s 2020-11-06 18:04:06.984 37 DEBUG tempest.lib.common.rest_client [req-df1829b5-7370-4c85-a04a-78df94308838 ] Request - Headers: {'X-Auth-Token': ''} Body: {"segment": {"name": "NewName"}} Response - Headers: {'content-type': 'application/json', 'content-length': '323', 'x-openstack-request-id': 'req-df1829b5-7370-4c85-a04a-78df94308838', 'date': 'Fri, 06 Nov 2020 18:04:06 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/segments/bdd39c36-7222-47a9-b869-77f563ecbda0'} Body: b'{"segment": {"id": "bdd39c36-7222-47a9-b869-77f563ecbda0", "network_id": "d0f33d73-abbf-414f-8261-ffc8bfe4141c", "name": "NewName", "description": "", "physical_network": null, "network_type": "gre", "segmentation_id": 2495, "created_at": "2020-11-06T18:04:05Z", "updated_at": "2020-11-06T18:04:06Z", "revision_number": 2}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:06.985 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:07.044 37 INFO tempest.lib.common.rest_client [req-f7aff2eb-f2eb-4870-80c4-9138d39ef4dd ] Request (SegmentsExtRbacTest:test_update_segment): 200 GET http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles 0.058s 2020-11-06 18:04:07.045 37 DEBUG tempest.lib.common.rest_client [req-f7aff2eb-f2eb-4870-80c4-9138d39ef4dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f7aff2eb-f2eb-4870-80c4-9138d39ef4dd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c/users/977c2419d0a74d95af2a492c919014aa/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:07.081 37 INFO tempest.lib.common.rest_client [req-35f19fb0-ceac-41a1-82cb-feb1962423af ] Request (SegmentsExtRbacTest:test_update_segment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:04:07.081 37 DEBUG tempest.lib.common.rest_client [req-35f19fb0-ceac-41a1-82cb-feb1962423af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-35f19fb0-ceac-41a1-82cb-feb1962423af', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "977c2419d0a74d95af2a492c919014aa", "name": "tempest-SegmentsExtRbacTest-1555770406", "password_expires_at": null}, "audit_ids": ["R5YBmjTeQwOs2-0RlwnP4g"], "expires_at": "2020-11-06T19:04:07.000000Z", "issued_at": "2020-11-06T18:04:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37beb2770ac54b99abb39614cfe7a87c", "name": "tempest-SegmentsExtRbacTest-1555770406"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:07.117 37 INFO tempest.lib.common.rest_client [req-b4485766-4206-4347-ade1-b99872666484 ] Request (SegmentsExtRbacTest:test_update_segment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:04:07.118 37 DEBUG tempest.lib.common.rest_client [req-b4485766-4206-4347-ade1-b99872666484 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b4485766-4206-4347-ade1-b99872666484', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "977c2419d0a74d95af2a492c919014aa", "name": "tempest-SegmentsExtRbacTest-1555770406", "password_expires_at": null}, "audit_ids": ["RI4Y1EUnSzufss-FtrWS0A"], "expires_at": "2020-11-06T19:04:07.000000Z", "issued_at": "2020-11-06T18:04:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37beb2770ac54b99abb39614cfe7a87c", "name": "tempest-SegmentsExtRbacTest-1555770406"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37beb2770ac54b99abb39614cfe7a87c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:07.237 38 INFO tempest.lib.common.rest_client [req-1872f61d-fae7-48e5-b2f4-aa724f96a2d2 ] Request (VolumesBackupsV39RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/backups/8e4f4347-a289-44c2-aa69-769e354b913a 0.039s 2020-11-06 18:04:07.237 38 DEBUG tempest.lib.common.rest_client [req-1872f61d-fae7-48e5-b2f4-aa724f96a2d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-1872f61d-fae7-48e5-b2f4-aa724f96a2d2', 'content-length': '816', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1872f61d-fae7-48e5-b2f4-aa724f96a2d2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/backups/8e4f4347-a289-44c2-aa69-769e354b913a'} Body: b'{"backup": {"id": "8e4f4347-a289-44c2-aa69-769e354b913a", "status": "creating", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-11-06T18:04:05.000000", "updated_at": "2020-11-06T18:04:06.000000", "name": "tempest-VolumesBackupsV39RbacTest-Backup-187499024", "description": null, "fail_reason": null, "volume_id": "c49c04c4-6ebf-4333-8119-acd6994c14e2", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/backups/8e4f4347-a289-44c2-aa69-769e354b913a"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6e5eb63f6e094f9a811f03f7ef90d48b/backups/8e4f4347-a289-44c2-aa69-769e354b913a"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-11-06T18:04:05.000000"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:07.447 40 INFO tempest.lib.common.rest_client [req-e7d259c4-6c32-40a7-8ec8-0d3b925eecbe ] Request (VolumesActionsV310RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/68335a62eaf549cda40ba242685cb95c/volumes/4ac5b3d2-38d3-4d09-9f25-62a79d5e2871 0.057s 2020-11-06 18:04:07.448 40 DEBUG tempest.lib.common.rest_client [req-e7d259c4-6c32-40a7-8ec8-0d3b925eecbe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-e7d259c4-6c32-40a7-8ec8-0d3b925eecbe', 'x-openstack-request-id': 'req-e7d259c4-6c32-40a7-8ec8-0d3b925eecbe', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/68335a62eaf549cda40ba242685cb95c/volumes/4ac5b3d2-38d3-4d09-9f25-62a79d5e2871'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 4ac5b3d2-38d3-4d09-9f25-62a79d5e2871 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:07.513 39 INFO tempest.lib.common.rest_client [req-78501ae9-83bd-4a1d-b7d3-98cbaebf4c60 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.195s 2020-11-06 18:04:07.514 39 DEBUG tempest.lib.common.rest_client [req-78501ae9-83bd-4a1d-b7d3-98cbaebf4c60 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-78501ae9-83bd-4a1d-b7d3-98cbaebf4c60', 'x-compute-request-id': 'req-78501ae9-83bd-4a1d-b7d3-98cbaebf4c60', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:07.573 40 INFO tempest.lib.common.rest_client [req-9d243cc3-3bde-47ae-aec7-d8a07734a4f3 ] Request (VolumesActionsV310RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/9bdbf6356f534045a5482b7b7136964d 0.124s 2020-11-06 18:04:07.574 40 DEBUG tempest.lib.common.rest_client [req-9d243cc3-3bde-47ae-aec7-d8a07734a4f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9d243cc3-3bde-47ae-aec7-d8a07734a4f3', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/9bdbf6356f534045a5482b7b7136964d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:07.652 40 INFO tempest.lib.common.rest_client [req-4d885e35-c9be-4b91-8d36-797466db3ac5 ] Request (VolumesActionsV310RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.077s 2020-11-06 18:04:07.652 40 DEBUG tempest.lib.common.rest_client [req-4d885e35-c9be-4b91-8d36-797466db3ac5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4d885e35-c9be-4b91-8d36-797466db3ac5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["CvOFzh60QO6Bv6DzF9oXew"], "expires_at": "2020-11-06T19:04:07.000000Z", "issued_at": "2020-11-06T18:04:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:07.898 37 INFO tempest.lib.common.rest_client [req-b85ec95f-b670-426c-9921-5d0b79b07309 ] Request (SegmentsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/segments/bdd39c36-7222-47a9-b869-77f563ecbda0 0.777s 2020-11-06 18:04:07.899 37 DEBUG tempest.lib.common.rest_client [req-b85ec95f-b670-426c-9921-5d0b79b07309 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-b85ec95f-b670-426c-9921-5d0b79b07309', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:04:07 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/segments/bdd39c36-7222-47a9-b869-77f563ecbda0'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:07.916 40 INFO tempest.lib.common.rest_client [req-3593c64e-ebce-4f02-88e9-b339789a52e7 ] Request (VolumesActionsV310RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=68335a62eaf549cda40ba242685cb95c&name=default 0.263s 2020-11-06 18:04:07.917 40 DEBUG tempest.lib.common.rest_client [req-3593c64e-ebce-4f02-88e9-b339789a52e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-3593c64e-ebce-4f02-88e9-b339789a52e7', 'date': 'Fri, 06 Nov 2020 18:04:07 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=68335a62eaf549cda40ba242685cb95c&name=default'} Body: b'{"security_groups": [{"id": "12a1e966-3cb6-49cb-93c2-07f8e0bac7fb", "name": "default", "stateful": true, "tenant_id": "68335a62eaf549cda40ba242685cb95c", "description": "Default security group", "security_group_rules": [{"id": "0cff999b-d72e-4e3b-b2d8-f0210460bae6", "tenant_id": "68335a62eaf549cda40ba242685cb95c", "security_group_id": "12a1e966-3cb6-49cb-93c2-07f8e0bac7fb", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "12a1e966-3cb6-49cb-93c2-07f8e0bac7fb", "description": null, "tags": [], "created_at": "2020-11-06T18:04:07Z", "updated_at": "2020-11-06T18:04:07Z", "revision_number": 0, "project_id": "68335a62eaf549cda40ba242685cb95c"}, {"id": "1996a1b6-df8f-4dc7-8c36-9eae44c3ebc9", "tenant_id": "68335a62eaf549cda40ba242685cb95c", "security_group_id": "12a1e966-3cb6-49cb-93c2-07f8e0bac7fb", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "12a1e966-3cb6-49cb-93c2-07f8e0bac7fb", "description": null, "tags": [], "created_at": "2020-11-06T18:04:07Z", "updated_at": "2020-11-06T18:04:07Z", "revision_number": 0, "project_id": "68335a62eaf549cda40ba242685cb95c"}, {"id": "7cb8966e-2bf8-4e23-83af-6a695179bd92", "tenant_id": "68335a62eaf549cda40ba242685cb95c", "security_group_id": "12a1e966-3cb6-49cb-93c2-07f8e0bac7fb", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:04:07Z", "updated_at": "2020-11-06T18:04:07Z", "revision_number": 0, "project_id": "68335a62eaf549cda40ba242685cb95c"}, {"id": "a5ced62d-4fc3-414a-a28a-a8f131812dcf", "tenant_id": "68335a62eaf549cda40ba242685cb95c", "security_group_id": "12a1e966-3cb6-49cb-93c2-07f8e0bac7fb", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:04:07Z", "updated_at": "2020-11-06T18:04:07Z", "revision_number": 0, "project_id": "68335a62eaf549cda40ba242685cb95c"}], "tags": [], "created_at": "2020-11-06T18:04:07Z", "updated_at": "2020-11-06T18:04:07Z", "revision_number": 1, "project_id": "68335a62eaf549cda40ba242685cb95c"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:08.239 40 INFO tempest.lib.common.rest_client [req-50ad00ec-cb11-4876-b143-cb2a51392637 ] Request (VolumesActionsV310RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/12a1e966-3cb6-49cb-93c2-07f8e0bac7fb 0.321s 2020-11-06 18:04:08.240 40 DEBUG tempest.lib.common.rest_client [req-50ad00ec-cb11-4876-b143-cb2a51392637 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-50ad00ec-cb11-4876-b143-cb2a51392637', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:04:08 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/12a1e966-3cb6-49cb-93c2-07f8e0bac7fb'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:08.277 38 INFO tempest.lib.common.rest_client [req-7cbd39e6-86b6-4b9b-a27f-3360cf66ae91 ] Request (VolumesBackupsV39RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/backups/8e4f4347-a289-44c2-aa69-769e354b913a 0.029s 2020-11-06 18:04:08.277 38 DEBUG tempest.lib.common.rest_client [req-7cbd39e6-86b6-4b9b-a27f-3360cf66ae91 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-7cbd39e6-86b6-4b9b-a27f-3360cf66ae91', 'content-length': '817', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7cbd39e6-86b6-4b9b-a27f-3360cf66ae91', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/backups/8e4f4347-a289-44c2-aa69-769e354b913a'} Body: b'{"backup": {"id": "8e4f4347-a289-44c2-aa69-769e354b913a", "status": "available", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-11-06T18:04:05.000000", "updated_at": "2020-11-06T18:04:07.000000", "name": "tempest-VolumesBackupsV39RbacTest-Backup-187499024", "description": null, "fail_reason": null, "volume_id": "c49c04c4-6ebf-4333-8119-acd6994c14e2", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/backups/8e4f4347-a289-44c2-aa69-769e354b913a"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6e5eb63f6e094f9a811f03f7ef90d48b/backups/8e4f4347-a289-44c2-aa69-769e354b913a"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-11-06T18:04:05.000000"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:08.285 38 INFO tempest.common.waiters [-] backup 8e4f4347-a289-44c2-aa69-769e354b913a reached available after waiting for 3.285828 seconds 2020-11-06 18:04:08.338 37 INFO tempest.lib.common.rest_client [req-b53569cf-3813-41d1-a383-a6d1c05920ee ] Request (SegmentsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/segments/0ec8b5fc-c401-4f82-918a-bf28e07819af 0.438s 2020-11-06 18:04:08.338 37 DEBUG tempest.lib.common.rest_client [req-b53569cf-3813-41d1-a383-a6d1c05920ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-b53569cf-3813-41d1-a383-a6d1c05920ee', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:04:08 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/segments/0ec8b5fc-c401-4f82-918a-bf28e07819af'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:08.357 38 INFO tempest.lib.common.rest_client [req-5df81165-4086-4c64-b1d1-a762c22c4948 ] Request (VolumesBackupsV39RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/volumes/c49c04c4-6ebf-4333-8119-acd6994c14e2 0.071s 2020-11-06 18:04:08.358 38 DEBUG tempest.lib.common.rest_client [req-5df81165-4086-4c64-b1d1-a762c22c4948 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-5df81165-4086-4c64-b1d1-a762c22c4948', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5df81165-4086-4c64-b1d1-a762c22c4948', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/volumes/c49c04c4-6ebf-4333-8119-acd6994c14e2'} Body: b'{"volume": {"id": "c49c04c4-6ebf-4333-8119-acd6994c14e2", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:04.000000", "updated_at": "2020-11-06T18:04:07.000000", "name": "tempest-VolumesBackupsV39RbacTest-Volume-212677935", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/volumes/c49c04c4-6ebf-4333-8119-acd6994c14e2"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6e5eb63f6e094f9a811f03f7ef90d48b/volumes/c49c04c4-6ebf-4333-8119-acd6994c14e2"}], "user_id": "5783426bf5c648628cf94a3bb7d0d766", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "6e5eb63f6e094f9a811f03f7ef90d48b"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:08.367 38 INFO tempest.common.waiters [-] volume c49c04c4-6ebf-4333-8119-acd6994c14e2 reached available after waiting for 0.367909 seconds 2020-11-06 18:04:08.368 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:08.370 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: backup:update, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:08.371 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:08.392 40 INFO tempest.lib.common.rest_client [req-5fe0cb4e-74a4-4840-93c4-04f073607cdb ] Request (VolumesActionsV310RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/68335a62eaf549cda40ba242685cb95c 0.151s 2020-11-06 18:04:08.393 40 DEBUG tempest.lib.common.rest_client [req-5fe0cb4e-74a4-4840-93c4-04f073607cdb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5fe0cb4e-74a4-4840-93c4-04f073607cdb', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/68335a62eaf549cda40ba242685cb95c'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:08.470 38 INFO tempest.lib.common.rest_client [req-077beb3a-fb2f-492c-bde9-9c6a6f4d689b ] Request (VolumesBackupsV39RbacTest:test_backup_update): 200 GET http://172.30.13.94/identity/v3/projects/6e5eb63f6e094f9a811f03f7ef90d48b/users/5783426bf5c648628cf94a3bb7d0d766/roles 0.099s 2020-11-06 18:04:08.470 38 DEBUG tempest.lib.common.rest_client [req-077beb3a-fb2f-492c-bde9-9c6a6f4d689b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-077beb3a-fb2f-492c-bde9-9c6a6f4d689b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6e5eb63f6e094f9a811f03f7ef90d48b/users/5783426bf5c648628cf94a3bb7d0d766/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6e5eb63f6e094f9a811f03f7ef90d48b/users/5783426bf5c648628cf94a3bb7d0d766/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:08.473 40 INFO tempest.lib.common.rest_client [req-ddae58aa-f80b-425b-bf90-e494b4e5d123 ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.077s 2020-11-06 18:04:08.474 40 DEBUG tempest.lib.common.rest_client [req-ddae58aa-f80b-425b-bf90-e494b4e5d123 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ddae58aa-f80b-425b-bf90-e494b4e5d123', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["z7FWox-nT5q31O9Iqm85Wg"], "expires_at": "2020-11-06T19:04:08.000000Z", "issued_at": "2020-11-06T18:04:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:08.513 40 INFO tempest.lib.common.rest_client [req-5b13b6bf-be7a-41b4-b149-fb4e1e0b2593 ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:04:08.513 40 DEBUG tempest.lib.common.rest_client [req-5b13b6bf-be7a-41b4-b149-fb4e1e0b2593 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5b13b6bf-be7a-41b4-b149-fb4e1e0b2593', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["d3iu32XwQKON8z45sz0JnQ"], "expires_at": "2020-11-06T19:04:08.000000Z", "issued_at": "2020-11-06T18:04:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:08.550 38 INFO tempest.lib.common.rest_client [req-90224410-fa23-4774-bca5-f0b648aa07cf ] Request (VolumesBackupsV39RbacTest:test_backup_update): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.079s 2020-11-06 18:04:08.551 38 DEBUG tempest.lib.common.rest_client [req-90224410-fa23-4774-bca5-f0b648aa07cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-90224410-fa23-4774-bca5-f0b648aa07cf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5783426bf5c648628cf94a3bb7d0d766", "name": "tempest-VolumesBackupsV39RbacTest-1462512000", "password_expires_at": null}, "audit_ids": ["E9y9mmcGSi-Dd3-xErYPmA"], "expires_at": "2020-11-06T19:04:08.000000Z", "issued_at": "2020-11-06T18:04:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6e5eb63f6e094f9a811f03f7ef90d48b", "name": "tempest-VolumesBackupsV39RbacTest-1462512000"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6e5eb63f6e094f9a811f03f7ef90d48b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6e5eb63f6e094f9a811f03f7ef90d48b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e5eb63f6e094f9a811f03f7ef90d48b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e5eb63f6e094f9a811f03f7ef90d48b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e5eb63f6e094f9a811f03f7ef90d48b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:08.563 40 INFO tempest.lib.common.rest_client [req-1163af9a-a5ca-4212-96a7-aa9fa53121ea ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.048s 2020-11-06 18:04:08.563 40 DEBUG tempest.lib.common.rest_client [req-1163af9a-a5ca-4212-96a7-aa9fa53121ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1163af9a-a5ca-4212-96a7-aa9fa53121ea', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:08.621 40 INFO tempest.lib.common.rest_client [req-454dae75-be23-4c92-9e7b-2e79a346a139 ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.057s 2020-11-06 18:04:08.621 40 DEBUG tempest.lib.common.rest_client [req-454dae75-be23-4c92-9e7b-2e79a346a139 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumesBasicCrudV3RbacTest-773376419-desc", "domain_id": "default", "name": "tempest-VolumesBasicCrudV3RbacTest-773376419"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '388', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-454dae75-be23-4c92-9e7b-2e79a346a139', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "c70129f43ea14e7c8b66bff39d8e9aeb", "name": "tempest-VolumesBasicCrudV3RbacTest-773376419", "domain_id": "default", "description": "tempest-VolumesBasicCrudV3RbacTest-773376419-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:08.721 40 INFO tempest.lib.common.rest_client [req-857d3fda-2125-4f17-9d3d-4f6843a23b8e ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.098s 2020-11-06 18:04:08.721 40 DEBUG tempest.lib.common.rest_client [req-857d3fda-2125-4f17-9d3d-4f6843a23b8e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumesBasicCrudV3RbacTest-773376419", "password": "Q5_5Jb&O*y7X9Ze", "project_id": "c70129f43ea14e7c8b66bff39d8e9aeb", "email": "tempest-VolumesBasicCrudV3RbacTest-1313150535@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '407', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-857d3fda-2125-4f17-9d3d-4f6843a23b8e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "c70129f43ea14e7c8b66bff39d8e9aeb", "email": "tempest-VolumesBasicCrudV3RbacTest-1313150535@example.com", "id": "9497097058db40ffabed3f7664e6f4b0", "name": "tempest-VolumesBasicCrudV3RbacTest-773376419", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/9497097058db40ffabed3f7664e6f4b0"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:08.766 40 INFO tempest.lib.common.rest_client [req-e64de0e6-31b4-4ef1-8978-1732db532797 ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.045s 2020-11-06 18:04:08.766 40 DEBUG tempest.lib.common.rest_client [req-e64de0e6-31b4-4ef1-8978-1732db532797 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e64de0e6-31b4-4ef1-8978-1732db532797', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:08.778 38 INFO tempest.lib.common.rest_client [req-afa3965b-ef3f-4b0e-8e8f-b72ede4353a2 ] Request (VolumesBackupsV39RbacTest:test_backup_update): 200 PUT http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/backups/8e4f4347-a289-44c2-aa69-769e354b913a 0.226s 2020-11-06 18:04:08.778 38 DEBUG tempest.lib.common.rest_client [req-afa3965b-ef3f-4b0e-8e8f-b72ede4353a2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.9', 'X-Auth-Token': ''} Body: {"backup": {"name": "tempest-VolumesBackupsV39RbacTest-Backup-1156063216", "description": "tempest-volume-backup-description-809682657"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-afa3965b-ef3f-4b0e-8e8f-b72ede4353a2', 'content-length': '405', 'openstack-api-version': 'volume 3.9', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-afa3965b-ef3f-4b0e-8e8f-b72ede4353a2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/backups/8e4f4347-a289-44c2-aa69-769e354b913a'} Body: b'{"backup": {"id": "8e4f4347-a289-44c2-aa69-769e354b913a", "name": "tempest-VolumesBackupsV39RbacTest-Backup-1156063216", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/backups/8e4f4347-a289-44c2-aa69-769e354b913a"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6e5eb63f6e094f9a811f03f7ef90d48b/backups/8e4f4347-a289-44c2-aa69-769e354b913a"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:08.781 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:08.812 40 INFO tempest.lib.common.rest_client [req-8b4f7fc1-be21-4ffa-ab11-66f5ff4a1172 ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.045s 2020-11-06 18:04:08.812 40 DEBUG tempest.lib.common.rest_client [req-8b4f7fc1-be21-4ffa-ab11-66f5ff4a1172 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8b4f7fc1-be21-4ffa-ab11-66f5ff4a1172', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:08.828 38 INFO tempest.lib.common.rest_client [req-38953c15-cc0b-407a-ab87-434a9f6f0f6e ] Request (VolumesBackupsV39RbacTest:test_backup_update): 200 GET http://172.30.13.94/identity/v3/projects/6e5eb63f6e094f9a811f03f7ef90d48b/users/5783426bf5c648628cf94a3bb7d0d766/roles 0.046s 2020-11-06 18:04:08.828 38 DEBUG tempest.lib.common.rest_client [req-38953c15-cc0b-407a-ab87-434a9f6f0f6e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-38953c15-cc0b-407a-ab87-434a9f6f0f6e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6e5eb63f6e094f9a811f03f7ef90d48b/users/5783426bf5c648628cf94a3bb7d0d766/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6e5eb63f6e094f9a811f03f7ef90d48b/users/5783426bf5c648628cf94a3bb7d0d766/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:08.861 38 INFO tempest.lib.common.rest_client [req-78c3d39b-fff0-44ae-b97b-ba47d80159cb ] Request (VolumesBackupsV39RbacTest:test_backup_update): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:04:08.861 38 DEBUG tempest.lib.common.rest_client [req-78c3d39b-fff0-44ae-b97b-ba47d80159cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-78c3d39b-fff0-44ae-b97b-ba47d80159cb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5783426bf5c648628cf94a3bb7d0d766", "name": "tempest-VolumesBackupsV39RbacTest-1462512000", "password_expires_at": null}, "audit_ids": ["UFbQilZ2QbeME1IfQOtiSQ"], "expires_at": "2020-11-06T19:04:08.000000Z", "issued_at": "2020-11-06T18:04:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6e5eb63f6e094f9a811f03f7ef90d48b", "name": "tempest-VolumesBackupsV39RbacTest-1462512000"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6e5eb63f6e094f9a811f03f7ef90d48b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6e5eb63f6e094f9a811f03f7ef90d48b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e5eb63f6e094f9a811f03f7ef90d48b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e5eb63f6e094f9a811f03f7ef90d48b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e5eb63f6e094f9a811f03f7ef90d48b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:08.865 39 INFO tempest.lib.common.rest_client [req-3d87ae0a-803b-4e15-ad9d-39753c592d00 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.335s 2020-11-06 18:04:08.866 39 DEBUG tempest.lib.common.rest_client [req-3d87ae0a-803b-4e15-ad9d-39753c592d00 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3d87ae0a-803b-4e15-ad9d-39753c592d00', 'x-compute-request-id': 'req-3d87ae0a-803b-4e15-ad9d-39753c592d00', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:08.872 40 INFO tempest.lib.common.rest_client [req-c832a01c-bd0e-42bd-99cc-898e4c064680 ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles/72a4576c553448cd941b052c1ca0cf2d 0.059s 2020-11-06 18:04:08.873 40 DEBUG tempest.lib.common.rest_client [req-c832a01c-bd0e-42bd-99cc-898e4c064680 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c832a01c-bd0e-42bd-99cc-898e4c064680', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:08.873 40 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesBasicCrudV3RbacTest-773376419', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'c70129f43ea14e7c8b66bff39d8e9aeb', 'project_name': 'tempest-VolumesBasicCrudV3RbacTest-773376419', 'tenant_id': 'c70129f43ea14e7c8b66bff39d8e9aeb', 'tenant_name': 'tempest-VolumesBasicCrudV3RbacTest-773376419', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '9497097058db40ffabed3f7664e6f4b0'}, Network: None, Subnet: None, Router: None 2020-11-06 18:04:08.874 40 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesBasicCrudV3RbacTest-773376419', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'c70129f43ea14e7c8b66bff39d8e9aeb', 'project_name': 'tempest-VolumesBasicCrudV3RbacTest-773376419', 'tenant_id': 'c70129f43ea14e7c8b66bff39d8e9aeb', 'tenant_name': 'tempest-VolumesBasicCrudV3RbacTest-773376419', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '9497097058db40ffabed3f7664e6f4b0'}, Network: None, Subnet: None, Router: None 2020-11-06 18:04:08.982 40 INFO tempest.lib.common.rest_client [req-e9fb0782-285d-41f0-9313-af0b109edaf8 ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.100s 2020-11-06 18:04:08.983 40 DEBUG tempest.lib.common.rest_client [req-e9fb0782-285d-41f0-9313-af0b109edaf8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6581', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e9fb0782-285d-41f0-9313-af0b109edaf8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9497097058db40ffabed3f7664e6f4b0", "name": "tempest-VolumesBasicCrudV3RbacTest-773376419", "password_expires_at": null}, "audit_ids": ["Um-fuGWpTg6k5SQrtmS69A"], "expires_at": "2020-11-06T19:04:08.000000Z", "issued_at": "2020-11-06T18:04:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c70129f43ea14e7c8b66bff39d8e9aeb", "name": "tempest-VolumesBasicCrudV3RbacTest-773376419"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:09.078 40 INFO tempest.lib.common.rest_client [req-f0173783-ac28-4f60-a248-b820378bc91e ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-11-06 18:04:09.079 40 DEBUG tempest.lib.common.rest_client [req-f0173783-ac28-4f60-a248-b820378bc91e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f0173783-ac28-4f60-a248-b820378bc91e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["uI-88f7DSdmH97b58a_hDQ"], "expires_at": "2020-11-06T19:04:09.000000Z", "issued_at": "2020-11-06T18:04:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:09.091 38 INFO tempest.lib.common.rest_client [req-9e6d83f1-1330-478b-bf17-b97363282b7e ] Request (VolumesBackupsV39RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/backups/8e4f4347-a289-44c2-aa69-769e354b913a 0.217s 2020-11-06 18:04:09.091 38 DEBUG tempest.lib.common.rest_client [req-9e6d83f1-1330-478b-bf17-b97363282b7e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-9e6d83f1-1330-478b-bf17-b97363282b7e', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9e6d83f1-1330-478b-bf17-b97363282b7e', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/backups/8e4f4347-a289-44c2-aa69-769e354b913a'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:09.126 40 INFO tempest.lib.common.rest_client [req-b3898fbe-6344-46a3-9303-d4559b290e8a ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:04:09.126 40 DEBUG tempest.lib.common.rest_client [req-b3898fbe-6344-46a3-9303-d4559b290e8a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b3898fbe-6344-46a3-9303-d4559b290e8a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["R0aAk7YPR0i4DK90tx5Byw"], "expires_at": "2020-11-06T19:04:09.000000Z", "issued_at": "2020-11-06T18:04:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:09.172 40 INFO tempest.lib.common.rest_client [req-47837d6c-6233-4590-b9e3-fc11d04ea533 ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.045s 2020-11-06 18:04:09.173 40 DEBUG tempest.lib.common.rest_client [req-47837d6c-6233-4590-b9e3-fc11d04ea533 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-47837d6c-6233-4590-b9e3-fc11d04ea533', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:09.180 38 INFO tempest.lib.common.rest_client [req-a55f8499-395a-41ae-ab84-55a0c45fa141 ] Request (VolumesBackupsV39RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/volumes/c49c04c4-6ebf-4333-8119-acd6994c14e2 0.088s 2020-11-06 18:04:09.180 38 DEBUG tempest.lib.common.rest_client [req-a55f8499-395a-41ae-ab84-55a0c45fa141 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a55f8499-395a-41ae-ab84-55a0c45fa141', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/volumes/c49c04c4-6ebf-4333-8119-acd6994c14e2'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:09.222 40 INFO tempest.lib.common.rest_client [req-f637185f-fef5-4f3e-a220-b0c3ed44f9c4 ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.049s 2020-11-06 18:04:09.222 40 DEBUG tempest.lib.common.rest_client [req-f637185f-fef5-4f3e-a220-b0c3ed44f9c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f637185f-fef5-4f3e-a220-b0c3ed44f9c4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:09.223 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:04:09.223 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:09.249 38 INFO tempest.lib.common.rest_client [req-6f7baffb-21d5-409c-9556-6559b7386fe6 ] Request (VolumesBackupsV39RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/volumes/c49c04c4-6ebf-4333-8119-acd6994c14e2 0.069s 2020-11-06 18:04:09.250 38 DEBUG tempest.lib.common.rest_client [req-6f7baffb-21d5-409c-9556-6559b7386fe6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6f7baffb-21d5-409c-9556-6559b7386fe6', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6f7baffb-21d5-409c-9556-6559b7386fe6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/volumes/c49c04c4-6ebf-4333-8119-acd6994c14e2'} Body: b'{"volume": {"id": "c49c04c4-6ebf-4333-8119-acd6994c14e2", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:04.000000", "updated_at": "2020-11-06T18:04:09.000000", "name": "tempest-VolumesBackupsV39RbacTest-Volume-212677935", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/volumes/c49c04c4-6ebf-4333-8119-acd6994c14e2"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6e5eb63f6e094f9a811f03f7ef90d48b/volumes/c49c04c4-6ebf-4333-8119-acd6994c14e2"}], "user_id": "5783426bf5c648628cf94a3bb7d0d766", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "6e5eb63f6e094f9a811f03f7ef90d48b"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:09.279 40 INFO tempest.lib.common.rest_client [req-871360e9-4a36-4f17-a5a4-392bea9a43ae ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles 0.055s 2020-11-06 18:04:09.279 40 DEBUG tempest.lib.common.rest_client [req-871360e9-4a36-4f17-a5a4-392bea9a43ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-871360e9-4a36-4f17-a5a4-392bea9a43ae', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:09.341 40 INFO tempest.lib.common.rest_client [req-45c306f1-5a03-49e5-b7e3-0c576242bc58 ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles/72a4576c553448cd941b052c1ca0cf2d 0.061s 2020-11-06 18:04:09.342 40 DEBUG tempest.lib.common.rest_client [req-45c306f1-5a03-49e5-b7e3-0c576242bc58 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-45c306f1-5a03-49e5-b7e3-0c576242bc58', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:09.453 40 INFO tempest.lib.common.rest_client [req-fbb4f4a9-8629-4880-8e98-9219ea5b7c7f ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles/a629c95d64b3416fb80ae90af4f69c05 0.110s 2020-11-06 18:04:09.454 40 DEBUG tempest.lib.common.rest_client [req-fbb4f4a9-8629-4880-8e98-9219ea5b7c7f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fbb4f4a9-8629-4880-8e98-9219ea5b7c7f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:09.957 37 INFO tempest.lib.common.rest_client [req-c503245e-1919-4ade-a5fb-b2439d647da9 ] Request (SegmentsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/segments/b5724143-4fcf-479a-8a78-119bee17e25a 1.617s 2020-11-06 18:04:09.957 37 DEBUG tempest.lib.common.rest_client [req-c503245e-1919-4ade-a5fb-b2439d647da9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-c503245e-1919-4ade-a5fb-b2439d647da9', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:04:09 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/segments/b5724143-4fcf-479a-8a78-119bee17e25a'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:09.978 37 INFO tempest.lib.common.rest_client [req-061df8b4-024c-4e03-be35-2368b5626efc ] Request (SegmentsExtRbacTest:tearDownClass): 404 DELETE http://172.30.13.94:9696/v2.0/segments/4a5c17c9-a7a1-4456-884f-1432a8834880 0.019s 2020-11-06 18:04:09.978 37 DEBUG tempest.lib.common.rest_client [req-061df8b4-024c-4e03-be35-2368b5626efc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '138', 'x-openstack-request-id': 'req-061df8b4-024c-4e03-be35-2368b5626efc', 'date': 'Fri, 06 Nov 2020 18:04:09 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/segments/4a5c17c9-a7a1-4456-884f-1432a8834880'} Body: b'{"NeutronError": {"type": "SegmentNotFound", "message": "Segment 4a5c17c9-a7a1-4456-884f-1432a8834880 could not be found.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:10.208 39 INFO tempest.lib.common.rest_client [req-541a428c-0267-42ef-9c97-3470784ed0d6 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.323s 2020-11-06 18:04:10.209 39 DEBUG tempest.lib.common.rest_client [req-541a428c-0267-42ef-9c97-3470784ed0d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-541a428c-0267-42ef-9c97-3470784ed0d6', 'x-compute-request-id': 'req-541a428c-0267-42ef-9c97-3470784ed0d6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:10.536 38 INFO tempest.lib.common.rest_client [req-72fdbca9-1b4e-47fe-94d0-1fb4fa4b55c4 ] Request (VolumesBackupsV39RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/volumes/c49c04c4-6ebf-4333-8119-acd6994c14e2 0.274s 2020-11-06 18:04:10.536 38 DEBUG tempest.lib.common.rest_client [req-72fdbca9-1b4e-47fe-94d0-1fb4fa4b55c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-72fdbca9-1b4e-47fe-94d0-1fb4fa4b55c4', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-72fdbca9-1b4e-47fe-94d0-1fb4fa4b55c4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/volumes/c49c04c4-6ebf-4333-8119-acd6994c14e2'} Body: b'{"volume": {"id": "c49c04c4-6ebf-4333-8119-acd6994c14e2", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:04.000000", "updated_at": "2020-11-06T18:04:09.000000", "name": "tempest-VolumesBackupsV39RbacTest-Volume-212677935", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/volumes/c49c04c4-6ebf-4333-8119-acd6994c14e2"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6e5eb63f6e094f9a811f03f7ef90d48b/volumes/c49c04c4-6ebf-4333-8119-acd6994c14e2"}], "user_id": "5783426bf5c648628cf94a3bb7d0d766", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "6e5eb63f6e094f9a811f03f7ef90d48b"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:10.545 40 INFO tempest.lib.common.rest_client [req-ee5f1d19-3d1a-4946-803c-2c817752a7f1 ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-11-06 18:04:10.546 40 DEBUG tempest.lib.common.rest_client [req-ee5f1d19-3d1a-4946-803c-2c817752a7f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ee5f1d19-3d1a-4946-803c-2c817752a7f1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9497097058db40ffabed3f7664e6f4b0", "name": "tempest-VolumesBasicCrudV3RbacTest-773376419", "password_expires_at": null}, "audit_ids": ["6FNqBVNFSA-90iFsl9OoIQ"], "expires_at": "2020-11-06T19:04:10.000000Z", "issued_at": "2020-11-06T18:04:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c70129f43ea14e7c8b66bff39d8e9aeb", "name": "tempest-VolumesBasicCrudV3RbacTest-773376419"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:10.624 37 INFO tempest.lib.common.rest_client [req-06cef6e1-ee4e-4d61-ba2d-73c439632219 ] Request (SegmentsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/segments/77b36aab-17c3-48ab-893a-f7e03424a58b 0.644s 2020-11-06 18:04:10.624 37 DEBUG tempest.lib.common.rest_client [req-06cef6e1-ee4e-4d61-ba2d-73c439632219 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-06cef6e1-ee4e-4d61-ba2d-73c439632219', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:04:10 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/segments/77b36aab-17c3-48ab-893a-f7e03424a58b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:10.926 40 INFO tempest.lib.common.rest_client [req-0e876459-ddf8-4227-b754-dc2f5c658194 ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes 0.378s 2020-11-06 18:04:10.927 40 DEBUG tempest.lib.common.rest_client [req-0e876459-ddf8-4227-b754-dc2f5c658194 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-766319570"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-0e876459-ddf8-4227-b754-dc2f5c658194', 'content-length': '846', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0e876459-ddf8-4227-b754-dc2f5c658194', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes'} Body: b'{"volume": {"id": "c35703a5-6915-41b9-846d-3f7cb72d3baa", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:11.000000", "updated_at": null, "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-766319570", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/c35703a5-6915-41b9-846d-3f7cb72d3baa"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/c35703a5-6915-41b9-846d-3f7cb72d3baa"}], "user_id": "9497097058db40ffabed3f7664e6f4b0", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:11.007 40 INFO tempest.lib.common.rest_client [req-8f0beb5b-e8d5-4911-a4c4-acad351376ee ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/c35703a5-6915-41b9-846d-3f7cb72d3baa 0.067s 2020-11-06 18:04:11.008 40 DEBUG tempest.lib.common.rest_client [req-8f0beb5b-e8d5-4911-a4c4-acad351376ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-8f0beb5b-e8d5-4911-a4c4-acad351376ee', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8f0beb5b-e8d5-4911-a4c4-acad351376ee', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/c35703a5-6915-41b9-846d-3f7cb72d3baa'} Body: b'{"volume": {"id": "c35703a5-6915-41b9-846d-3f7cb72d3baa", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:11.000000", "updated_at": "2020-11-06T18:04:11.000000", "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-766319570", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/c35703a5-6915-41b9-846d-3f7cb72d3baa"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/c35703a5-6915-41b9-846d-3f7cb72d3baa"}], "user_id": "9497097058db40ffabed3f7664e6f4b0", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "c70129f43ea14e7c8b66bff39d8e9aeb"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:11.452 37 INFO tempest.lib.common.rest_client [req-77d388fc-ced6-40b3-9f22-2ea867c39134 ] Request (SegmentsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/d0f33d73-abbf-414f-8261-ffc8bfe4141c 0.827s 2020-11-06 18:04:11.453 37 DEBUG tempest.lib.common.rest_client [req-77d388fc-ced6-40b3-9f22-2ea867c39134 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-77d388fc-ced6-40b3-9f22-2ea867c39134', 'date': 'Fri, 06 Nov 2020 18:04:11 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/d0f33d73-abbf-414f-8261-ffc8bfe4141c'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:11.496 39 INFO tempest.lib.common.rest_client [req-275f96f6-7ddb-4189-a134-bc225e8e813c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.269s 2020-11-06 18:04:11.497 39 DEBUG tempest.lib.common.rest_client [req-275f96f6-7ddb-4189-a134-bc225e8e813c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-275f96f6-7ddb-4189-a134-bc225e8e813c', 'x-compute-request-id': 'req-275f96f6-7ddb-4189-a134-bc225e8e813c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:11.595 38 INFO tempest.lib.common.rest_client [req-b9cf492d-73ed-4bbc-98ed-d4340e441ac7 ] Request (VolumesBackupsV39RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/volumes/c49c04c4-6ebf-4333-8119-acd6994c14e2 0.048s 2020-11-06 18:04:11.595 38 DEBUG tempest.lib.common.rest_client [req-b9cf492d-73ed-4bbc-98ed-d4340e441ac7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-b9cf492d-73ed-4bbc-98ed-d4340e441ac7', 'x-openstack-request-id': 'req-b9cf492d-73ed-4bbc-98ed-d4340e441ac7', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/6e5eb63f6e094f9a811f03f7ef90d48b/volumes/c49c04c4-6ebf-4333-8119-acd6994c14e2'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume c49c04c4-6ebf-4333-8119-acd6994c14e2 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:11.609 37 INFO tempest.lib.common.rest_client [req-814932dd-a5f0-4696-8a8d-7f67ef5b792b ] Request (SegmentsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/977c2419d0a74d95af2a492c919014aa 0.156s 2020-11-06 18:04:11.610 37 DEBUG tempest.lib.common.rest_client [req-814932dd-a5f0-4696-8a8d-7f67ef5b792b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-814932dd-a5f0-4696-8a8d-7f67ef5b792b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/977c2419d0a74d95af2a492c919014aa'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:11.786 38 INFO tempest.lib.common.rest_client [req-040ae042-78a8-4f4b-b784-5f56f7aaecb1 ] Request (VolumesBackupsV39RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/5783426bf5c648628cf94a3bb7d0d766 0.190s 2020-11-06 18:04:11.786 38 DEBUG tempest.lib.common.rest_client [req-040ae042-78a8-4f4b-b784-5f56f7aaecb1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-040ae042-78a8-4f4b-b784-5f56f7aaecb1', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/5783426bf5c648628cf94a3bb7d0d766'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:11.811 37 INFO tempest.lib.common.rest_client [req-bd5bad4e-167c-4126-aceb-293bf50add37 ] Request (SegmentsExtRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.200s 2020-11-06 18:04:11.812 37 DEBUG tempest.lib.common.rest_client [req-bd5bad4e-167c-4126-aceb-293bf50add37 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bd5bad4e-167c-4126-aceb-293bf50add37', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["Ru6nZ4iwQlCu3CLqM1gcjA"], "expires_at": "2020-11-06T19:04:11.000000Z", "issued_at": "2020-11-06T18:04:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:11.865 38 INFO tempest.lib.common.rest_client [req-41909422-17e5-4007-85e1-ef42e7ce98d0 ] Request (VolumesBackupsV39RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-11-06 18:04:11.865 38 DEBUG tempest.lib.common.rest_client [req-41909422-17e5-4007-85e1-ef42e7ce98d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-41909422-17e5-4007-85e1-ef42e7ce98d0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["U1qviXI4Seu_g1FHsF5dlA"], "expires_at": "2020-11-06T19:04:11.000000Z", "issued_at": "2020-11-06T18:04:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:11.983 37 INFO tempest.lib.common.rest_client [req-65dee2d1-384b-4beb-922c-f1fb07f7d076 ] Request (SegmentsExtRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=37beb2770ac54b99abb39614cfe7a87c&name=default 0.170s 2020-11-06 18:04:11.983 37 DEBUG tempest.lib.common.rest_client [req-65dee2d1-384b-4beb-922c-f1fb07f7d076 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-65dee2d1-384b-4beb-922c-f1fb07f7d076', 'date': 'Fri, 06 Nov 2020 18:04:11 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=37beb2770ac54b99abb39614cfe7a87c&name=default'} Body: b'{"security_groups": [{"id": "b977178b-9ac7-41e9-9fcc-80a8221ca7cb", "name": "default", "stateful": true, "tenant_id": "37beb2770ac54b99abb39614cfe7a87c", "description": "Default security group", "security_group_rules": [{"id": "b52df355-6ab5-4914-a33c-9fdb7fc359b4", "tenant_id": "37beb2770ac54b99abb39614cfe7a87c", "security_group_id": "b977178b-9ac7-41e9-9fcc-80a8221ca7cb", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "b977178b-9ac7-41e9-9fcc-80a8221ca7cb", "description": null, "tags": [], "created_at": "2020-11-06T18:03:58Z", "updated_at": "2020-11-06T18:03:58Z", "revision_number": 0, "project_id": "37beb2770ac54b99abb39614cfe7a87c"}, {"id": "bcb58cab-8a04-4906-bf82-a8cda2663065", "tenant_id": "37beb2770ac54b99abb39614cfe7a87c", "security_group_id": "b977178b-9ac7-41e9-9fcc-80a8221ca7cb", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:58Z", "updated_at": "2020-11-06T18:03:58Z", "revision_number": 0, "project_id": "37beb2770ac54b99abb39614cfe7a87c"}, {"id": "f5d3fe39-c2f5-43a8-8a28-e8ffce49c3db", "tenant_id": "37beb2770ac54b99abb39614cfe7a87c", "security_group_id": "b977178b-9ac7-41e9-9fcc-80a8221ca7cb", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:03:58Z", "updated_at": "2020-11-06T18:03:58Z", "revision_number": 0, "project_id": "37beb2770ac54b99abb39614cfe7a87c"}, {"id": "fd32a406-b0a5-432d-8baf-c78b01d2615b", "tenant_id": "37beb2770ac54b99abb39614cfe7a87c", "security_group_id": "b977178b-9ac7-41e9-9fcc-80a8221ca7cb", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "b977178b-9ac7-41e9-9fcc-80a8221ca7cb", "description": null, "tags": [], "created_at": "2020-11-06T18:03:58Z", "updated_at": "2020-11-06T18:03:58Z", "revision_number": 0, "project_id": "37beb2770ac54b99abb39614cfe7a87c"}], "tags": [], "created_at": "2020-11-06T18:03:58Z", "updated_at": "2020-11-06T18:03:58Z", "revision_number": 1, "project_id": "37beb2770ac54b99abb39614cfe7a87c"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:12.107 38 INFO tempest.lib.common.rest_client [req-490b4d7d-d37f-4a8c-9171-df19d10c4bb6 ] Request (VolumesBackupsV39RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=6e5eb63f6e094f9a811f03f7ef90d48b&name=default 0.241s 2020-11-06 18:04:12.108 38 DEBUG tempest.lib.common.rest_client [req-490b4d7d-d37f-4a8c-9171-df19d10c4bb6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-490b4d7d-d37f-4a8c-9171-df19d10c4bb6', 'date': 'Fri, 06 Nov 2020 18:04:12 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=6e5eb63f6e094f9a811f03f7ef90d48b&name=default'} Body: b'{"security_groups": [{"id": "f24c95ad-8ba5-4a96-a9f3-c77b172f3bbd", "name": "default", "stateful": true, "tenant_id": "6e5eb63f6e094f9a811f03f7ef90d48b", "description": "Default security group", "security_group_rules": [{"id": "15516ff3-652e-4279-8190-6e441cb95c19", "tenant_id": "6e5eb63f6e094f9a811f03f7ef90d48b", "security_group_id": "f24c95ad-8ba5-4a96-a9f3-c77b172f3bbd", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "f24c95ad-8ba5-4a96-a9f3-c77b172f3bbd", "description": null, "tags": [], "created_at": "2020-11-06T18:04:12Z", "updated_at": "2020-11-06T18:04:12Z", "revision_number": 0, "project_id": "6e5eb63f6e094f9a811f03f7ef90d48b"}, {"id": "a0246807-9eb5-4456-87f3-b0dcc876a415", "tenant_id": "6e5eb63f6e094f9a811f03f7ef90d48b", "security_group_id": "f24c95ad-8ba5-4a96-a9f3-c77b172f3bbd", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "f24c95ad-8ba5-4a96-a9f3-c77b172f3bbd", "description": null, "tags": [], "created_at": "2020-11-06T18:04:12Z", "updated_at": "2020-11-06T18:04:12Z", "revision_number": 0, "project_id": "6e5eb63f6e094f9a811f03f7ef90d48b"}, {"id": "b239f173-14aa-4e9a-af1a-4e8495a26e49", "tenant_id": "6e5eb63f6e094f9a811f03f7ef90d48b", "security_group_id": "f24c95ad-8ba5-4a96-a9f3-c77b172f3bbd", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:04:12Z", "updated_at": "2020-11-06T18:04:12Z", "revision_number": 0, "project_id": "6e5eb63f6e094f9a811f03f7ef90d48b"}, {"id": "de6fd1b0-7d55-4d44-81b1-adfe2f32896e", "tenant_id": "6e5eb63f6e094f9a811f03f7ef90d48b", "security_group_id": "f24c95ad-8ba5-4a96-a9f3-c77b172f3bbd", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:04:12Z", "updated_at": "2020-11-06T18:04:12Z", "revision_number": 0, "project_id": "6e5eb63f6e094f9a811f03f7ef90d48b"}], "tags": [], "created_at": "2020-11-06T18:04:11Z", "updated_at": "2020-11-06T18:04:12Z", "revision_number": 1, "project_id": "6e5eb63f6e094f9a811f03f7ef90d48b"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:12.234 40 INFO tempest.lib.common.rest_client [req-fe5f1f79-9df7-446e-910c-d9bccd86786d ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/c35703a5-6915-41b9-846d-3f7cb72d3baa 0.212s 2020-11-06 18:04:12.234 40 DEBUG tempest.lib.common.rest_client [req-fe5f1f79-9df7-446e-910c-d9bccd86786d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-fe5f1f79-9df7-446e-910c-d9bccd86786d', 'content-length': '1069', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-fe5f1f79-9df7-446e-910c-d9bccd86786d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/c35703a5-6915-41b9-846d-3f7cb72d3baa'} Body: b'{"volume": {"id": "c35703a5-6915-41b9-846d-3f7cb72d3baa", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:11.000000", "updated_at": "2020-11-06T18:04:11.000000", "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-766319570", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/c35703a5-6915-41b9-846d-3f7cb72d3baa"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/c35703a5-6915-41b9-846d-3f7cb72d3baa"}], "user_id": "9497097058db40ffabed3f7664e6f4b0", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "c70129f43ea14e7c8b66bff39d8e9aeb"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:12.236 38 INFO tempest.lib.common.rest_client [req-2f132c47-c932-41dd-a5c5-bbb11b6aae6b ] Request (VolumesBackupsV39RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/f24c95ad-8ba5-4a96-a9f3-c77b172f3bbd 0.127s 2020-11-06 18:04:12.237 38 DEBUG tempest.lib.common.rest_client [req-2f132c47-c932-41dd-a5c5-bbb11b6aae6b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-2f132c47-c932-41dd-a5c5-bbb11b6aae6b', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:04:12 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/f24c95ad-8ba5-4a96-a9f3-c77b172f3bbd'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:12.246 40 INFO tempest.common.waiters [-] volume c35703a5-6915-41b9-846d-3f7cb72d3baa reached available after waiting for 1.246926 seconds 2020-11-06 18:04:12.248 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:12.250 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:create, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:12.250 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:12.301 40 INFO tempest.lib.common.rest_client [req-46338d1a-4146-45ce-b1f7-cb3215fca812 ] Request (VolumesBasicCrudV3RbacTest:test_create_volume): 200 GET http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles 0.050s 2020-11-06 18:04:12.302 40 DEBUG tempest.lib.common.rest_client [req-46338d1a-4146-45ce-b1f7-cb3215fca812 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-46338d1a-4146-45ce-b1f7-cb3215fca812', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:12.327 38 INFO tempest.lib.common.rest_client [req-0c4131a4-65c0-4930-8476-e387257bda64 ] Request (VolumesBackupsV39RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/6e5eb63f6e094f9a811f03f7ef90d48b 0.089s 2020-11-06 18:04:12.328 38 DEBUG tempest.lib.common.rest_client [req-0c4131a4-65c0-4930-8476-e387257bda64 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0c4131a4-65c0-4930-8476-e387257bda64', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6e5eb63f6e094f9a811f03f7ef90d48b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:12.384 40 INFO tempest.lib.common.rest_client [req-075ff071-be61-4bfd-82d4-adf1d6aafa22 ] Request (VolumesBasicCrudV3RbacTest:test_create_volume): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-11-06 18:04:12.385 40 DEBUG tempest.lib.common.rest_client [req-075ff071-be61-4bfd-82d4-adf1d6aafa22 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-075ff071-be61-4bfd-82d4-adf1d6aafa22', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9497097058db40ffabed3f7664e6f4b0", "name": "tempest-VolumesBasicCrudV3RbacTest-773376419", "password_expires_at": null}, "audit_ids": ["2N2PTf0MS0SbHciAd0udTw"], "expires_at": "2020-11-06T19:04:12.000000Z", "issued_at": "2020-11-06T18:04:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c70129f43ea14e7c8b66bff39d8e9aeb", "name": "tempest-VolumesBasicCrudV3RbacTest-773376419"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:12.422 37 INFO tempest.lib.common.rest_client [req-08ecce78-3b72-4027-8081-42c6644c5236 ] Request (SegmentsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/b977178b-9ac7-41e9-9fcc-80a8221ca7cb 0.437s 2020-11-06 18:04:12.422 37 DEBUG tempest.lib.common.rest_client [req-08ecce78-3b72-4027-8081-42c6644c5236 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-08ecce78-3b72-4027-8081-42c6644c5236', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:04:12 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/b977178b-9ac7-41e9-9fcc-80a8221ca7cb'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:12.593 37 INFO tempest.lib.common.rest_client [req-c58216c0-a1b1-4464-b856-22282413d383 ] Request (SegmentsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c 0.170s 2020-11-06 18:04:12.593 37 DEBUG tempest.lib.common.rest_client [req-c58216c0-a1b1-4464-b856-22282413d383 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c58216c0-a1b1-4464-b856-22282413d383', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/37beb2770ac54b99abb39614cfe7a87c'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:12.688 37 INFO tempest.lib.common.rest_client [req-d3615766-0af9-4015-9a13-703f46a15863 ] Request (ServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-11-06 18:04:12.688 37 DEBUG tempest.lib.common.rest_client [req-d3615766-0af9-4015-9a13-703f46a15863 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d3615766-0af9-4015-9a13-703f46a15863', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["ifI_Pl48QzOFZOe3NOCVXQ"], "expires_at": "2020-11-06T19:04:12.000000Z", "issued_at": "2020-11-06T18:04:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:12.727 39 INFO tempest.lib.common.rest_client [req-8053efd7-1d88-4db1-90e4-9a7c466d2f84 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.214s 2020-11-06 18:04:12.728 39 DEBUG tempest.lib.common.rest_client [req-8053efd7-1d88-4db1-90e4-9a7c466d2f84 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8053efd7-1d88-4db1-90e4-9a7c466d2f84', 'x-compute-request-id': 'req-8053efd7-1d88-4db1-90e4-9a7c466d2f84', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:12.735 37 INFO tempest.lib.common.rest_client [req-f4907a4e-f47c-4e6b-aa97-e8b8224381af ] Request (ServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:04:12.736 37 DEBUG tempest.lib.common.rest_client [req-f4907a4e-f47c-4e6b-aa97-e8b8224381af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f4907a4e-f47c-4e6b-aa97-e8b8224381af', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["_N91jkvjQQWPuBXBtNRutQ"], "expires_at": "2020-11-06T19:04:12.000000Z", "issued_at": "2020-11-06T18:04:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:12.791 37 INFO tempest.lib.common.rest_client [req-4b39bf6a-0d72-445b-9418-8dea77c8c315 ] Request (ServiceProfileExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.054s 2020-11-06 18:04:12.792 37 DEBUG tempest.lib.common.rest_client [req-4b39bf6a-0d72-445b-9418-8dea77c8c315 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4b39bf6a-0d72-445b-9418-8dea77c8c315', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:12.848 37 INFO tempest.lib.common.rest_client [req-1513b639-f6bf-4fc8-9835-32269e84a242 ] Request (ServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.054s 2020-11-06 18:04:12.848 37 DEBUG tempest.lib.common.rest_client [req-1513b639-f6bf-4fc8-9835-32269e84a242 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ServiceProfileExtRbacTest-403357465-desc", "domain_id": "default", "name": "tempest-ServiceProfileExtRbacTest-403357465"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '386', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1513b639-f6bf-4fc8-9835-32269e84a242', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "45a718d9e7cb4350a7ca65b4f934faaf", "name": "tempest-ServiceProfileExtRbacTest-403357465", "domain_id": "default", "description": "tempest-ServiceProfileExtRbacTest-403357465-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/45a718d9e7cb4350a7ca65b4f934faaf"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:12.956 37 INFO tempest.lib.common.rest_client [req-abf78858-01e6-4b78-8eac-0163649ce07a ] Request (ServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.106s 2020-11-06 18:04:12.956 37 DEBUG tempest.lib.common.rest_client [req-abf78858-01e6-4b78-8eac-0163649ce07a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ServiceProfileExtRbacTest-403357465", "password": "O3~4~=rg2fYD^NK", "project_id": "45a718d9e7cb4350a7ca65b4f934faaf", "email": "tempest-ServiceProfileExtRbacTest-7280150@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '402', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-abf78858-01e6-4b78-8eac-0163649ce07a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "45a718d9e7cb4350a7ca65b4f934faaf", "email": "tempest-ServiceProfileExtRbacTest-7280150@example.com", "id": "385500322a6f417aaa5825ea06838716", "name": "tempest-ServiceProfileExtRbacTest-403357465", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/385500322a6f417aaa5825ea06838716"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:13.006 37 INFO tempest.lib.common.rest_client [req-ae4e7e49-b23c-4396-b0fb-78f7dbd2b519 ] Request (ServiceProfileExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.048s 2020-11-06 18:04:13.007 37 DEBUG tempest.lib.common.rest_client [req-ae4e7e49-b23c-4396-b0fb-78f7dbd2b519 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ae4e7e49-b23c-4396-b0fb-78f7dbd2b519', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:13.056 37 INFO tempest.lib.common.rest_client [req-d37c923a-d3f0-42e5-9d61-433e19526bd1 ] Request (ServiceProfileExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.048s 2020-11-06 18:04:13.057 37 DEBUG tempest.lib.common.rest_client [req-d37c923a-d3f0-42e5-9d61-433e19526bd1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d37c923a-d3f0-42e5-9d61-433e19526bd1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:13.076 40 INFO tempest.lib.common.rest_client [req-a38dd654-b47d-448d-99a5-6156a04a9175 ] Request (VolumesBasicCrudV3RbacTest:test_create_volume): 202 POST http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes 0.690s 2020-11-06 18:04:13.077 40 DEBUG tempest.lib.common.rest_client [req-a38dd654-b47d-448d-99a5-6156a04a9175 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"name": "tempest-VolumesBasicCrudV3RbacTest-Volume-795464637", "size": 1}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a38dd654-b47d-448d-99a5-6156a04a9175', 'content-length': '846', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a38dd654-b47d-448d-99a5-6156a04a9175', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes'} Body: b'{"volume": {"id": "9e5332c6-45c6-40eb-b5f0-ac5827ee3838", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:13.000000", "updated_at": null, "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-795464637", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/9e5332c6-45c6-40eb-b5f0-ac5827ee3838"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/9e5332c6-45c6-40eb-b5f0-ac5827ee3838"}], "user_id": "9497097058db40ffabed3f7664e6f4b0", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:13.090 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:13.129 37 INFO tempest.lib.common.rest_client [req-aa6759fa-0bdc-4fb5-a6cc-9fd736056911 ] Request (ServiceProfileExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/45a718d9e7cb4350a7ca65b4f934faaf/users/385500322a6f417aaa5825ea06838716/roles/72a4576c553448cd941b052c1ca0cf2d 0.070s 2020-11-06 18:04:13.129 37 DEBUG tempest.lib.common.rest_client [req-aa6759fa-0bdc-4fb5-a6cc-9fd736056911 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aa6759fa-0bdc-4fb5-a6cc-9fd736056911', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/45a718d9e7cb4350a7ca65b4f934faaf/users/385500322a6f417aaa5825ea06838716/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:13.130 37 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServiceProfileExtRbacTest-403357465', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '45a718d9e7cb4350a7ca65b4f934faaf', 'project_name': 'tempest-ServiceProfileExtRbacTest-403357465', 'tenant_id': '45a718d9e7cb4350a7ca65b4f934faaf', 'tenant_name': 'tempest-ServiceProfileExtRbacTest-403357465', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '385500322a6f417aaa5825ea06838716'}, Network: None, Subnet: None, Router: None 2020-11-06 18:04:13.130 37 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServiceProfileExtRbacTest-403357465', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '45a718d9e7cb4350a7ca65b4f934faaf', 'project_name': 'tempest-ServiceProfileExtRbacTest-403357465', 'tenant_id': '45a718d9e7cb4350a7ca65b4f934faaf', 'tenant_name': 'tempest-ServiceProfileExtRbacTest-403357465', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '385500322a6f417aaa5825ea06838716'}, Network: None, Subnet: None, Router: None 2020-11-06 18:04:13.136 40 INFO tempest.lib.common.rest_client [req-0e855e4f-6150-4341-9326-71fdb8397202 ] Request (VolumesBasicCrudV3RbacTest:test_create_volume): 200 GET http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles 0.045s 2020-11-06 18:04:13.136 40 DEBUG tempest.lib.common.rest_client [req-0e855e4f-6150-4341-9326-71fdb8397202 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0e855e4f-6150-4341-9326-71fdb8397202', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:13.248 37 INFO tempest.lib.common.rest_client [req-910d5e7b-858e-44e2-8a3d-81f3eea85d2d ] Request (ServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.108s 2020-11-06 18:04:13.249 37 DEBUG tempest.lib.common.rest_client [req-910d5e7b-858e-44e2-8a3d-81f3eea85d2d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6579', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-910d5e7b-858e-44e2-8a3d-81f3eea85d2d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "385500322a6f417aaa5825ea06838716", "name": "tempest-ServiceProfileExtRbacTest-403357465", "password_expires_at": null}, "audit_ids": ["EZuOjzgTQ0qSU-KN67z3xQ"], "expires_at": "2020-11-06T19:04:13.000000Z", "issued_at": "2020-11-06T18:04:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "45a718d9e7cb4350a7ca65b4f934faaf", "name": "tempest-ServiceProfileExtRbacTest-403357465"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "ht _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:13.250 37 WARNING tempest.manager [-] tempest.manager.Manager is not a stable interface and as such it should not be imported directly. It will be removed as soon as the client manager becomes available in tempest.lib. 2020-11-06 18:04:13.308 40 INFO tempest.lib.common.rest_client [req-897d8ba5-3719-450e-ab78-974f457b06d0 ] Request (VolumesBasicCrudV3RbacTest:test_create_volume): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.170s 2020-11-06 18:04:13.309 40 DEBUG tempest.lib.common.rest_client [req-897d8ba5-3719-450e-ab78-974f457b06d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-897d8ba5-3719-450e-ab78-974f457b06d0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9497097058db40ffabed3f7664e6f4b0", "name": "tempest-VolumesBasicCrudV3RbacTest-773376419", "password_expires_at": null}, "audit_ids": ["f7KBPuUiRYqvkRDOKe7PZQ"], "expires_at": "2020-11-06T19:04:13.000000Z", "issued_at": "2020-11-06T18:04:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c70129f43ea14e7c8b66bff39d8e9aeb", "name": "tempest-VolumesBasicCrudV3RbacTest-773376419"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:13.347 37 INFO tempest.lib.common.rest_client [req-868a6c74-dc6b-4f62-ae7d-7f679c63e5b8 ] Request (ServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-11-06 18:04:13.348 37 DEBUG tempest.lib.common.rest_client [req-868a6c74-dc6b-4f62-ae7d-7f679c63e5b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-868a6c74-dc6b-4f62-ae7d-7f679c63e5b8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["mpvgc2LZQwipnCtWPZpdOQ"], "expires_at": "2020-11-06T19:04:13.000000Z", "issued_at": "2020-11-06T18:04:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:13.396 37 INFO tempest.lib.common.rest_client [req-9432c78f-2627-45c7-96cc-5fc3a6d81721 ] Request (ServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:04:13.397 37 DEBUG tempest.lib.common.rest_client [req-9432c78f-2627-45c7-96cc-5fc3a6d81721 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9432c78f-2627-45c7-96cc-5fc3a6d81721', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["JQZzmw9qSq2Da64Ei0jlcw"], "expires_at": "2020-11-06T19:04:13.000000Z", "issued_at": "2020-11-06T18:04:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:13.448 37 INFO tempest.lib.common.rest_client [req-869c6d4f-349b-46e5-834c-f34cd6cd9676 ] Request (ServiceProfileExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.051s 2020-11-06 18:04:13.449 37 DEBUG tempest.lib.common.rest_client [req-869c6d4f-349b-46e5-834c-f34cd6cd9676 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-869c6d4f-349b-46e5-834c-f34cd6cd9676', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:13.504 37 INFO tempest.lib.common.rest_client [req-59e7ad7f-982b-4ce4-b15b-03786ade21ac ] Request (ServiceProfileExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.054s 2020-11-06 18:04:13.505 37 DEBUG tempest.lib.common.rest_client [req-59e7ad7f-982b-4ce4-b15b-03786ade21ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-59e7ad7f-982b-4ce4-b15b-03786ade21ac', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:13.505 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:04:13.506 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:13.539 40 INFO tempest.lib.common.rest_client [req-4ce5af76-7205-4f0a-a1e1-098d271d9f9e ] Request (VolumesBasicCrudV3RbacTest:test_create_volume): 200 GET http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/9e5332c6-45c6-40eb-b5f0-ac5827ee3838 0.229s 2020-11-06 18:04:13.540 40 DEBUG tempest.lib.common.rest_client [req-4ce5af76-7205-4f0a-a1e1-098d271d9f9e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4ce5af76-7205-4f0a-a1e1-098d271d9f9e', 'content-length': '1069', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4ce5af76-7205-4f0a-a1e1-098d271d9f9e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/9e5332c6-45c6-40eb-b5f0-ac5827ee3838'} Body: b'{"volume": {"id": "9e5332c6-45c6-40eb-b5f0-ac5827ee3838", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:13.000000", "updated_at": "2020-11-06T18:04:13.000000", "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-795464637", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/9e5332c6-45c6-40eb-b5f0-ac5827ee3838"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/9e5332c6-45c6-40eb-b5f0-ac5827ee3838"}], "user_id": "9497097058db40ffabed3f7664e6f4b0", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "c70129f43ea14e7c8b66bff39d8e9aeb"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:13.554 37 INFO tempest.lib.common.rest_client [req-9ad93daa-8aa3-4c5a-a5a0-abf51d97bd3f ] Request (ServiceProfileExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/45a718d9e7cb4350a7ca65b4f934faaf/users/385500322a6f417aaa5825ea06838716/roles 0.047s 2020-11-06 18:04:13.554 40 INFO tempest.common.waiters [-] volume 9e5332c6-45c6-40eb-b5f0-ac5827ee3838 reached available after waiting for 0.554594 seconds 2020-11-06 18:04:13.554 37 DEBUG tempest.lib.common.rest_client [req-9ad93daa-8aa3-4c5a-a5a0-abf51d97bd3f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9ad93daa-8aa3-4c5a-a5a0-abf51d97bd3f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/45a718d9e7cb4350a7ca65b4f934faaf/users/385500322a6f417aaa5825ea06838716/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/45a718d9e7cb4350a7ca65b4f934faaf/users/385500322a6f417aaa5825ea06838716/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:13.612 37 INFO tempest.lib.common.rest_client [req-97ebf765-70ef-4195-9a8a-f6516a662edb ] Request (ServiceProfileExtRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/45a718d9e7cb4350a7ca65b4f934faaf/users/385500322a6f417aaa5825ea06838716/roles/72a4576c553448cd941b052c1ca0cf2d 0.057s 2020-11-06 18:04:13.613 37 DEBUG tempest.lib.common.rest_client [req-97ebf765-70ef-4195-9a8a-f6516a662edb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-97ebf765-70ef-4195-9a8a-f6516a662edb', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/45a718d9e7cb4350a7ca65b4f934faaf/users/385500322a6f417aaa5825ea06838716/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:13.629 40 INFO tempest.lib.common.rest_client [req-1ea554a8-dab4-45a1-b6a2-573d8b7d1ed6 ] Request (VolumesBasicCrudV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/9e5332c6-45c6-40eb-b5f0-ac5827ee3838 0.074s 2020-11-06 18:04:13.630 40 DEBUG tempest.lib.common.rest_client [req-1ea554a8-dab4-45a1-b6a2-573d8b7d1ed6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1ea554a8-dab4-45a1-b6a2-573d8b7d1ed6', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/9e5332c6-45c6-40eb-b5f0-ac5827ee3838'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:13.700 40 INFO tempest.lib.common.rest_client [req-730d6273-f62f-4bae-8a07-83ec7c534741 ] Request (VolumesBasicCrudV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/9e5332c6-45c6-40eb-b5f0-ac5827ee3838 0.069s 2020-11-06 18:04:13.700 40 DEBUG tempest.lib.common.rest_client [req-730d6273-f62f-4bae-8a07-83ec7c534741 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-730d6273-f62f-4bae-8a07-83ec7c534741', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-730d6273-f62f-4bae-8a07-83ec7c534741', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/9e5332c6-45c6-40eb-b5f0-ac5827ee3838'} Body: b'{"volume": {"id": "9e5332c6-45c6-40eb-b5f0-ac5827ee3838", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:13.000000", "updated_at": "2020-11-06T18:04:14.000000", "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-795464637", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/9e5332c6-45c6-40eb-b5f0-ac5827ee3838"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/9e5332c6-45c6-40eb-b5f0-ac5827ee3838"}], "user_id": "9497097058db40ffabed3f7664e6f4b0", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "c70129f43ea14e7c8b66bff39d8e9aeb"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:13.722 37 INFO tempest.lib.common.rest_client [req-843e304d-7b14-4ee0-abb6-9bd716fc8f33 ] Request (ServiceProfileExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/45a718d9e7cb4350a7ca65b4f934faaf/users/385500322a6f417aaa5825ea06838716/roles/a629c95d64b3416fb80ae90af4f69c05 0.107s 2020-11-06 18:04:13.722 37 DEBUG tempest.lib.common.rest_client [req-843e304d-7b14-4ee0-abb6-9bd716fc8f33 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-843e304d-7b14-4ee0-abb6-9bd716fc8f33', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/45a718d9e7cb4350a7ca65b4f934faaf/users/385500322a6f417aaa5825ea06838716/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:13.952 39 INFO tempest.lib.common.rest_client [req-03203b49-3051-45c9-89e5-041247d523c3 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.212s 2020-11-06 18:04:13.953 39 DEBUG tempest.lib.common.rest_client [req-03203b49-3051-45c9-89e5-041247d523c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-03203b49-3051-45c9-89e5-041247d523c3', 'x-compute-request-id': 'req-03203b49-3051-45c9-89e5-041247d523c3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:14.756 40 INFO tempest.lib.common.rest_client [req-422d2dc3-8a4a-4771-8a0e-36d0053a2449 ] Request (VolumesBasicCrudV3RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/9e5332c6-45c6-40eb-b5f0-ac5827ee3838 0.044s 2020-11-06 18:04:14.756 40 DEBUG tempest.lib.common.rest_client [req-422d2dc3-8a4a-4771-8a0e-36d0053a2449 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-422d2dc3-8a4a-4771-8a0e-36d0053a2449', 'x-openstack-request-id': 'req-422d2dc3-8a4a-4771-8a0e-36d0053a2449', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/9e5332c6-45c6-40eb-b5f0-ac5827ee3838'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 9e5332c6-45c6-40eb-b5f0-ac5827ee3838 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:14.759 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:14.762 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:create_from_image, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:14.762 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:14.811 37 INFO tempest.lib.common.rest_client [req-a30de07a-7aa2-47ea-8c8c-8a4f601a2025 ] Request (ServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-11-06 18:04:14.812 37 DEBUG tempest.lib.common.rest_client [req-a30de07a-7aa2-47ea-8c8c-8a4f601a2025 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a30de07a-7aa2-47ea-8c8c-8a4f601a2025', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "385500322a6f417aaa5825ea06838716", "name": "tempest-ServiceProfileExtRbacTest-403357465", "password_expires_at": null}, "audit_ids": ["6t68QzeJQOmvho-lyTBOLg"], "expires_at": "2020-11-06T19:04:14.000000Z", "issued_at": "2020-11-06T18:04:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "45a718d9e7cb4350a7ca65b4f934faaf", "name": "tempest-ServiceProfileExtRbacTest-403357465"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:14.851 37 INFO tempest.lib.common.rest_client [req-5e008fb4-d6cc-48ca-90c5-0449480ad525 ] Request (ServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:04:14.851 37 DEBUG tempest.lib.common.rest_client [req-5e008fb4-d6cc-48ca-90c5-0449480ad525 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5e008fb4-d6cc-48ca-90c5-0449480ad525', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "385500322a6f417aaa5825ea06838716", "name": "tempest-ServiceProfileExtRbacTest-403357465", "password_expires_at": null}, "audit_ids": ["t8wN2fesRiOPoOKht_aI1w"], "expires_at": "2020-11-06T19:04:14.000000Z", "issued_at": "2020-11-06T18:04:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "45a718d9e7cb4350a7ca65b4f934faaf", "name": "tempest-ServiceProfileExtRbacTest-403357465"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:14.854 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:14.857 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_service_profile, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:14.857 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:14.875 40 INFO tempest.lib.common.rest_client [req-03eecff5-ff82-4055-8c17-38fa94c79b64 ] Request (VolumesBasicCrudV3RbacTest:test_create_volume_from_image): 200 GET http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles 0.112s 2020-11-06 18:04:14.876 40 DEBUG tempest.lib.common.rest_client [req-03eecff5-ff82-4055-8c17-38fa94c79b64 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-03eecff5-ff82-4055-8c17-38fa94c79b64', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:14.915 37 INFO tempest.lib.common.rest_client [req-2daaa756-169d-4430-a357-912b7d3e7ec7 ] Request (ServiceProfileExtRbacTest:test_create_service_profile): 200 GET http://172.30.13.94/identity/v3/projects/45a718d9e7cb4350a7ca65b4f934faaf/users/385500322a6f417aaa5825ea06838716/roles 0.057s 2020-11-06 18:04:14.916 37 DEBUG tempest.lib.common.rest_client [req-2daaa756-169d-4430-a357-912b7d3e7ec7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2daaa756-169d-4430-a357-912b7d3e7ec7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/45a718d9e7cb4350a7ca65b4f934faaf/users/385500322a6f417aaa5825ea06838716/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/45a718d9e7cb4350a7ca65b4f934faaf/users/385500322a6f417aaa5825ea06838716/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:14.955 37 INFO tempest.lib.common.rest_client [req-73743ba5-8688-4317-b606-fe7a25f004e8 ] Request (ServiceProfileExtRbacTest:test_create_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:04:14.956 37 DEBUG tempest.lib.common.rest_client [req-73743ba5-8688-4317-b606-fe7a25f004e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-73743ba5-8688-4317-b606-fe7a25f004e8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "385500322a6f417aaa5825ea06838716", "name": "tempest-ServiceProfileExtRbacTest-403357465", "password_expires_at": null}, "audit_ids": ["dHyiqTgKR5u0jnMWscdnbA"], "expires_at": "2020-11-06T19:04:14.000000Z", "issued_at": "2020-11-06T18:04:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "45a718d9e7cb4350a7ca65b4f934faaf", "name": "tempest-ServiceProfileExtRbacTest-403357465"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:14.959 40 INFO tempest.lib.common.rest_client [req-a656705c-999f-47b1-b0ed-24e1123b3797 ] Request (VolumesBasicCrudV3RbacTest:test_create_volume_from_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 18:04:14.960 40 DEBUG tempest.lib.common.rest_client [req-a656705c-999f-47b1-b0ed-24e1123b3797 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a656705c-999f-47b1-b0ed-24e1123b3797', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9497097058db40ffabed3f7664e6f4b0", "name": "tempest-VolumesBasicCrudV3RbacTest-773376419", "password_expires_at": null}, "audit_ids": ["1IobNkZxSVWZHH7y4ve1-Q"], "expires_at": "2020-11-06T19:04:14.000000Z", "issued_at": "2020-11-06T18:04:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c70129f43ea14e7c8b66bff39d8e9aeb", "name": "tempest-VolumesBasicCrudV3RbacTest-773376419"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:14.992 37 INFO tempest.lib.common.rest_client [req-2b9333df-34d2-4795-bad7-2f9559ffadd5 ] Request (ServiceProfileExtRbacTest:test_create_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:04:14.993 37 DEBUG tempest.lib.common.rest_client [req-2b9333df-34d2-4795-bad7-2f9559ffadd5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2b9333df-34d2-4795-bad7-2f9559ffadd5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "385500322a6f417aaa5825ea06838716", "name": "tempest-ServiceProfileExtRbacTest-403357465", "password_expires_at": null}, "audit_ids": ["ebrySWcPSaK-pEUyoxrmXg"], "expires_at": "2020-11-06T19:04:14.000000Z", "issued_at": "2020-11-06T18:04:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "45a718d9e7cb4350a7ca65b4f934faaf", "name": "tempest-ServiceProfileExtRbacTest-403357465"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:15.131 37 INFO tempest.lib.common.rest_client [req-69350d6c-7f38-4350-b778-680ba607e099 ] Request (ServiceProfileExtRbacTest:test_create_service_profile): 201 POST http://172.30.13.94:9696/v2.0/service_profiles 0.136s 2020-11-06 18:04:15.132 37 DEBUG tempest.lib.common.rest_client [req-69350d6c-7f38-4350-b778-680ba607e099 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"service_profile": {"metainfo": "{\"foo\": \"bar\"}"}} Response - Headers: {'content-type': 'application/json', 'content-length': '151', 'x-openstack-request-id': 'req-69350d6c-7f38-4350-b778-680ba607e099', 'date': 'Fri, 06 Nov 2020 18:04:15 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/service_profiles'} Body: b'{"service_profile": {"id": "fb10d6dc-28e3-4e84-b1d7-72b0f37f8316", "description": "", "driver": "", "enabled": true, "metainfo": "{\\"foo\\": \\"bar\\"}"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:15.132 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:15.181 37 INFO tempest.lib.common.rest_client [req-020daf28-728b-4049-8f1d-65aa4dbf2ac5 ] Request (ServiceProfileExtRbacTest:test_create_service_profile): 200 GET http://172.30.13.94/identity/v3/projects/45a718d9e7cb4350a7ca65b4f934faaf/users/385500322a6f417aaa5825ea06838716/roles 0.047s 2020-11-06 18:04:15.181 37 DEBUG tempest.lib.common.rest_client [req-020daf28-728b-4049-8f1d-65aa4dbf2ac5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-020daf28-728b-4049-8f1d-65aa4dbf2ac5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/45a718d9e7cb4350a7ca65b4f934faaf/users/385500322a6f417aaa5825ea06838716/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/45a718d9e7cb4350a7ca65b4f934faaf/users/385500322a6f417aaa5825ea06838716/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:15.206 39 INFO tempest.lib.common.rest_client [req-73ad8511-c45e-4abc-b1da-e79378ec1412 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.238s 2020-11-06 18:04:15.207 39 DEBUG tempest.lib.common.rest_client [req-73ad8511-c45e-4abc-b1da-e79378ec1412 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-73ad8511-c45e-4abc-b1da-e79378ec1412', 'x-compute-request-id': 'req-73ad8511-c45e-4abc-b1da-e79378ec1412', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:15.220 37 INFO tempest.lib.common.rest_client [req-5cf9cf82-ab55-4ffc-abba-121bbf805d11 ] Request (ServiceProfileExtRbacTest:test_create_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:04:15.221 37 DEBUG tempest.lib.common.rest_client [req-5cf9cf82-ab55-4ffc-abba-121bbf805d11 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5cf9cf82-ab55-4ffc-abba-121bbf805d11', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "385500322a6f417aaa5825ea06838716", "name": "tempest-ServiceProfileExtRbacTest-403357465", "password_expires_at": null}, "audit_ids": ["lUDgbrnVQFWo96Xfl-2kqw"], "expires_at": "2020-11-06T19:04:15.000000Z", "issued_at": "2020-11-06T18:04:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "45a718d9e7cb4350a7ca65b4f934faaf", "name": "tempest-ServiceProfileExtRbacTest-403357465"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:15.258 37 INFO tempest.lib.common.rest_client [req-cb51a026-4b1c-4e99-b525-f73557c44a84 ] Request (ServiceProfileExtRbacTest:test_create_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:04:15.258 37 DEBUG tempest.lib.common.rest_client [req-cb51a026-4b1c-4e99-b525-f73557c44a84 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cb51a026-4b1c-4e99-b525-f73557c44a84', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "385500322a6f417aaa5825ea06838716", "name": "tempest-ServiceProfileExtRbacTest-403357465", "password_expires_at": null}, "audit_ids": ["amel8HqMSIO7zcXhokj8wg"], "expires_at": "2020-11-06T19:04:15.000000Z", "issued_at": "2020-11-06T18:04:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "45a718d9e7cb4350a7ca65b4f934faaf", "name": "tempest-ServiceProfileExtRbacTest-403357465"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:15.263 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:15.267 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_service_profile, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:15.267 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:15.270 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_service_profile, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:15.387 37 INFO tempest.lib.common.rest_client [req-5b48568e-747c-455c-a8ce-4a4004aefdf3 ] Request (ServiceProfileExtRbacTest:test_delete_service_profile): 201 POST http://172.30.13.94:9696/v2.0/service_profiles 0.116s 2020-11-06 18:04:15.387 37 DEBUG tempest.lib.common.rest_client [req-5b48568e-747c-455c-a8ce-4a4004aefdf3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"service_profile": {"metainfo": "{\"foo\": \"bar\"}"}} Response - Headers: {'content-type': 'application/json', 'content-length': '151', 'x-openstack-request-id': 'req-5b48568e-747c-455c-a8ce-4a4004aefdf3', 'date': 'Fri, 06 Nov 2020 18:04:15 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/service_profiles'} Body: b'{"service_profile": {"id": "5a913a95-2628-4770-876a-63914d498eb2", "description": "", "driver": "", "enabled": true, "metainfo": "{\\"foo\\": \\"bar\\"}"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:15.388 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:15.440 37 INFO tempest.lib.common.rest_client [req-906cb1f5-070d-4566-b880-1309b5911d1d ] Request (ServiceProfileExtRbacTest:test_delete_service_profile): 200 GET http://172.30.13.94/identity/v3/projects/45a718d9e7cb4350a7ca65b4f934faaf/users/385500322a6f417aaa5825ea06838716/roles 0.051s 2020-11-06 18:04:15.441 37 DEBUG tempest.lib.common.rest_client [req-906cb1f5-070d-4566-b880-1309b5911d1d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-906cb1f5-070d-4566-b880-1309b5911d1d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/45a718d9e7cb4350a7ca65b4f934faaf/users/385500322a6f417aaa5825ea06838716/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/45a718d9e7cb4350a7ca65b4f934faaf/users/385500322a6f417aaa5825ea06838716/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:15.474 37 INFO tempest.lib.common.rest_client [req-4cb70a03-5874-4839-98f3-a93ac2ffff76 ] Request (ServiceProfileExtRbacTest:test_delete_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:04:15.474 37 DEBUG tempest.lib.common.rest_client [req-4cb70a03-5874-4839-98f3-a93ac2ffff76 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4cb70a03-5874-4839-98f3-a93ac2ffff76', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "385500322a6f417aaa5825ea06838716", "name": "tempest-ServiceProfileExtRbacTest-403357465", "password_expires_at": null}, "audit_ids": ["s_w-pe-nSRez6yOQLkRccw"], "expires_at": "2020-11-06T19:04:15.000000Z", "issued_at": "2020-11-06T18:04:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "45a718d9e7cb4350a7ca65b4f934faaf", "name": "tempest-ServiceProfileExtRbacTest-403357465"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:15.475 40 INFO tempest.lib.common.rest_client [req-2b03f71b-0e23-4a4c-acf0-633a185c173d ] Request (VolumesBasicCrudV3RbacTest:test_create_volume_from_image): 202 POST http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes 0.514s 2020-11-06 18:04:15.476 40 DEBUG tempest.lib.common.rest_client [req-2b03f71b-0e23-4a4c-acf0-633a185c173d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"name": "tempest-VolumesBasicCrudV3RbacTest-Volume-198199036", "size": 1, "imageRef": "56b368f6-9136-40ec-a04c-564d02c95e42"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-2b03f71b-0e23-4a4c-acf0-633a185c173d', 'content-length': '846', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2b03f71b-0e23-4a4c-acf0-633a185c173d', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes'} Body: b'{"volume": {"id": "43e2b2ff-4bb3-4ed0-b427-68966fe4aa01", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:15.000000", "updated_at": null, "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-198199036", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/43e2b2ff-4bb3-4ed0-b427-68966fe4aa01"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/43e2b2ff-4bb3-4ed0-b427-68966fe4aa01"}], "user_id": "9497097058db40ffabed3f7664e6f4b0", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:15.486 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:15.507 37 INFO tempest.lib.common.rest_client [req-cc6b5f7e-7af7-4493-8d77-a612dcf32604 ] Request (ServiceProfileExtRbacTest:test_delete_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:04:15.507 37 DEBUG tempest.lib.common.rest_client [req-cc6b5f7e-7af7-4493-8d77-a612dcf32604 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cc6b5f7e-7af7-4493-8d77-a612dcf32604', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "385500322a6f417aaa5825ea06838716", "name": "tempest-ServiceProfileExtRbacTest-403357465", "password_expires_at": null}, "audit_ids": ["MB5vNxW_QZy7cuCIVG-Bdw"], "expires_at": "2020-11-06T19:04:15.000000Z", "issued_at": "2020-11-06T18:04:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "45a718d9e7cb4350a7ca65b4f934faaf", "name": "tempest-ServiceProfileExtRbacTest-403357465"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:15.550 40 INFO tempest.lib.common.rest_client [req-d45517ce-d19c-4b44-93c5-7c86a88888e3 ] Request (VolumesBasicCrudV3RbacTest:test_create_volume_from_image): 200 GET http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles 0.063s 2020-11-06 18:04:15.551 40 DEBUG tempest.lib.common.rest_client [req-d45517ce-d19c-4b44-93c5-7c86a88888e3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d45517ce-d19c-4b44-93c5-7c86a88888e3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:15.597 40 INFO tempest.lib.common.rest_client [req-95770068-398f-4498-a276-67d7fc9e065a ] Request (VolumesBasicCrudV3RbacTest:test_create_volume_from_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-11-06 18:04:15.598 40 DEBUG tempest.lib.common.rest_client [req-95770068-398f-4498-a276-67d7fc9e065a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-95770068-398f-4498-a276-67d7fc9e065a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9497097058db40ffabed3f7664e6f4b0", "name": "tempest-VolumesBasicCrudV3RbacTest-773376419", "password_expires_at": null}, "audit_ids": ["xngjTRfzTsCCxHdPTHQ5ww"], "expires_at": "2020-11-06T19:04:15.000000Z", "issued_at": "2020-11-06T18:04:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c70129f43ea14e7c8b66bff39d8e9aeb", "name": "tempest-VolumesBasicCrudV3RbacTest-773376419"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:15.609 37 INFO tempest.lib.common.rest_client [req-f77a78d8-8de8-4eaf-92dc-08a240bcfc9e ] Request (ServiceProfileExtRbacTest:test_delete_service_profile): 204 DELETE http://172.30.13.94:9696/v2.0/service_profiles/5a913a95-2628-4770-876a-63914d498eb2 0.100s 2020-11-06 18:04:15.609 37 DEBUG tempest.lib.common.rest_client [req-f77a78d8-8de8-4eaf-92dc-08a240bcfc9e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-f77a78d8-8de8-4eaf-92dc-08a240bcfc9e', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:04:15 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/service_profiles/5a913a95-2628-4770-876a-63914d498eb2'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:15.610 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:15.654 37 INFO tempest.lib.common.rest_client [req-4da23430-dc6a-475d-b1e6-7b35ed715760 ] Request (ServiceProfileExtRbacTest:test_delete_service_profile): 200 GET http://172.30.13.94/identity/v3/projects/45a718d9e7cb4350a7ca65b4f934faaf/users/385500322a6f417aaa5825ea06838716/roles 0.043s 2020-11-06 18:04:15.654 37 DEBUG tempest.lib.common.rest_client [req-4da23430-dc6a-475d-b1e6-7b35ed715760 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4da23430-dc6a-475d-b1e6-7b35ed715760', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/45a718d9e7cb4350a7ca65b4f934faaf/users/385500322a6f417aaa5825ea06838716/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/45a718d9e7cb4350a7ca65b4f934faaf/users/385500322a6f417aaa5825ea06838716/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:15.681 37 INFO tempest.lib.common.rest_client [req-c56c4a76-b133-4060-a3e9-664b104bf8fb ] Request (ServiceProfileExtRbacTest:test_delete_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.026s 2020-11-06 18:04:15.682 37 DEBUG tempest.lib.common.rest_client [req-c56c4a76-b133-4060-a3e9-664b104bf8fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c56c4a76-b133-4060-a3e9-664b104bf8fb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "385500322a6f417aaa5825ea06838716", "name": "tempest-ServiceProfileExtRbacTest-403357465", "password_expires_at": null}, "audit_ids": ["R9Qtf3i7SFyfgDhWetBTeQ"], "expires_at": "2020-11-06T19:04:15.000000Z", "issued_at": "2020-11-06T18:04:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "45a718d9e7cb4350a7ca65b4f934faaf", "name": "tempest-ServiceProfileExtRbacTest-403357465"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:15.725 37 INFO tempest.lib.common.rest_client [req-57365f89-6582-4657-a0a3-6493d6a29e38 ] Request (ServiceProfileExtRbacTest:test_delete_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-11-06 18:04:15.725 37 DEBUG tempest.lib.common.rest_client [req-57365f89-6582-4657-a0a3-6493d6a29e38 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-57365f89-6582-4657-a0a3-6493d6a29e38', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "385500322a6f417aaa5825ea06838716", "name": "tempest-ServiceProfileExtRbacTest-403357465", "password_expires_at": null}, "audit_ids": ["K46mpfSmTWyFSj8DRnXrvw"], "expires_at": "2020-11-06T19:04:15.000000Z", "issued_at": "2020-11-06T18:04:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "45a718d9e7cb4350a7ca65b4f934faaf", "name": "tempest-ServiceProfileExtRbacTest-403357465"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:15.729 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:15.733 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_service_profile, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:15.746 40 INFO tempest.lib.common.rest_client [req-c8590f52-9cc0-468b-9cff-36278fc272ed ] Request (VolumesBasicCrudV3RbacTest:test_create_volume_from_image): 200 GET http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/43e2b2ff-4bb3-4ed0-b427-68966fe4aa01 0.147s 2020-11-06 18:04:15.747 40 DEBUG tempest.lib.common.rest_client [req-c8590f52-9cc0-468b-9cff-36278fc272ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c8590f52-9cc0-468b-9cff-36278fc272ed', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c8590f52-9cc0-468b-9cff-36278fc272ed', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/43e2b2ff-4bb3-4ed0-b427-68966fe4aa01'} Body: b'{"volume": {"id": "43e2b2ff-4bb3-4ed0-b427-68966fe4aa01", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:15.000000", "updated_at": "2020-11-06T18:04:16.000000", "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-198199036", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/43e2b2ff-4bb3-4ed0-b427-68966fe4aa01"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/43e2b2ff-4bb3-4ed0-b427-68966fe4aa01"}], "user_id": "9497097058db40ffabed3f7664e6f4b0", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "c70129f43ea14e7c8b66bff39d8e9aeb"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:15.818 37 INFO tempest.lib.common.rest_client [req-328b43c6-34c6-4dc1-89e8-837755fa5935 ] Request (ServiceProfileExtRbacTest:test_show_service_profile): 201 POST http://172.30.13.94:9696/v2.0/service_profiles 0.083s 2020-11-06 18:04:15.818 37 DEBUG tempest.lib.common.rest_client [req-328b43c6-34c6-4dc1-89e8-837755fa5935 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"service_profile": {"metainfo": "{\"foo\": \"bar\"}"}} Response - Headers: {'content-type': 'application/json', 'content-length': '151', 'x-openstack-request-id': 'req-328b43c6-34c6-4dc1-89e8-837755fa5935', 'date': 'Fri, 06 Nov 2020 18:04:15 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/service_profiles'} Body: b'{"service_profile": {"id": "ce01b80c-7308-417e-bc2a-a76876b0cd08", "description": "", "driver": "", "enabled": true, "metainfo": "{\\"foo\\": \\"bar\\"}"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:15.819 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:15.869 37 INFO tempest.lib.common.rest_client [req-01b014db-4dd8-4c0b-957d-47b5d7bed012 ] Request (ServiceProfileExtRbacTest:test_show_service_profile): 200 GET http://172.30.13.94/identity/v3/projects/45a718d9e7cb4350a7ca65b4f934faaf/users/385500322a6f417aaa5825ea06838716/roles 0.049s 2020-11-06 18:04:15.870 37 DEBUG tempest.lib.common.rest_client [req-01b014db-4dd8-4c0b-957d-47b5d7bed012 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-01b014db-4dd8-4c0b-957d-47b5d7bed012', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/45a718d9e7cb4350a7ca65b4f934faaf/users/385500322a6f417aaa5825ea06838716/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/45a718d9e7cb4350a7ca65b4f934faaf/users/385500322a6f417aaa5825ea06838716/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:15.903 37 INFO tempest.lib.common.rest_client [req-3eb7506a-4c78-472f-a7ca-792b4b5dbef4 ] Request (ServiceProfileExtRbacTest:test_show_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:04:15.904 37 DEBUG tempest.lib.common.rest_client [req-3eb7506a-4c78-472f-a7ca-792b4b5dbef4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3eb7506a-4c78-472f-a7ca-792b4b5dbef4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "385500322a6f417aaa5825ea06838716", "name": "tempest-ServiceProfileExtRbacTest-403357465", "password_expires_at": null}, "audit_ids": ["J9fLI7URQH22w_MTcRH65Q"], "expires_at": "2020-11-06T19:04:15.000000Z", "issued_at": "2020-11-06T18:04:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "45a718d9e7cb4350a7ca65b4f934faaf", "name": "tempest-ServiceProfileExtRbacTest-403357465"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:15.946 37 INFO tempest.lib.common.rest_client [req-e0d77173-183b-4aff-891f-29321be80532 ] Request (ServiceProfileExtRbacTest:test_show_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-11-06 18:04:15.947 37 DEBUG tempest.lib.common.rest_client [req-e0d77173-183b-4aff-891f-29321be80532 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e0d77173-183b-4aff-891f-29321be80532', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "385500322a6f417aaa5825ea06838716", "name": "tempest-ServiceProfileExtRbacTest-403357465", "password_expires_at": null}, "audit_ids": ["t85_DDdyRXuk05-3vph9eg"], "expires_at": "2020-11-06T19:04:15.000000Z", "issued_at": "2020-11-06T18:04:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "45a718d9e7cb4350a7ca65b4f934faaf", "name": "tempest-ServiceProfileExtRbacTest-403357465"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:16.029 37 INFO tempest.lib.common.rest_client [req-66a99d2f-5236-46e4-83ee-06cc3fbfe7e2 ] Request (ServiceProfileExtRbacTest:test_show_service_profile): 200 GET http://172.30.13.94:9696/v2.0/service_profiles/ce01b80c-7308-417e-bc2a-a76876b0cd08 0.080s 2020-11-06 18:04:16.029 37 DEBUG tempest.lib.common.rest_client [req-66a99d2f-5236-46e4-83ee-06cc3fbfe7e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '151', 'x-openstack-request-id': 'req-66a99d2f-5236-46e4-83ee-06cc3fbfe7e2', 'date': 'Fri, 06 Nov 2020 18:04:16 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/service_profiles/ce01b80c-7308-417e-bc2a-a76876b0cd08'} Body: b'{"service_profile": {"id": "ce01b80c-7308-417e-bc2a-a76876b0cd08", "description": "", "driver": "", "enabled": true, "metainfo": "{\\"foo\\": \\"bar\\"}"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:16.030 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:16.078 37 INFO tempest.lib.common.rest_client [req-b69dba37-ac5e-4806-8b20-7d099efc5d84 ] Request (ServiceProfileExtRbacTest:test_show_service_profile): 200 GET http://172.30.13.94/identity/v3/projects/45a718d9e7cb4350a7ca65b4f934faaf/users/385500322a6f417aaa5825ea06838716/roles 0.047s 2020-11-06 18:04:16.078 37 DEBUG tempest.lib.common.rest_client [req-b69dba37-ac5e-4806-8b20-7d099efc5d84 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b69dba37-ac5e-4806-8b20-7d099efc5d84', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/45a718d9e7cb4350a7ca65b4f934faaf/users/385500322a6f417aaa5825ea06838716/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/45a718d9e7cb4350a7ca65b4f934faaf/users/385500322a6f417aaa5825ea06838716/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:16.109 37 INFO tempest.lib.common.rest_client [req-a1f637ea-c42c-4215-a824-ba4ba1e8fea0 ] Request (ServiceProfileExtRbacTest:test_show_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.030s 2020-11-06 18:04:16.110 37 DEBUG tempest.lib.common.rest_client [req-a1f637ea-c42c-4215-a824-ba4ba1e8fea0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a1f637ea-c42c-4215-a824-ba4ba1e8fea0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "385500322a6f417aaa5825ea06838716", "name": "tempest-ServiceProfileExtRbacTest-403357465", "password_expires_at": null}, "audit_ids": ["kP4owpzaSs6hVtke9d3xZQ"], "expires_at": "2020-11-06T19:04:16.000000Z", "issued_at": "2020-11-06T18:04:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "45a718d9e7cb4350a7ca65b4f934faaf", "name": "tempest-ServiceProfileExtRbacTest-403357465"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:16.140 37 INFO tempest.lib.common.rest_client [req-91e5f5ae-004d-4cdb-b42b-a5e33b10adb9 ] Request (ServiceProfileExtRbacTest:test_show_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.029s 2020-11-06 18:04:16.140 37 DEBUG tempest.lib.common.rest_client [req-91e5f5ae-004d-4cdb-b42b-a5e33b10adb9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-91e5f5ae-004d-4cdb-b42b-a5e33b10adb9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "385500322a6f417aaa5825ea06838716", "name": "tempest-ServiceProfileExtRbacTest-403357465", "password_expires_at": null}, "audit_ids": ["sD8YS3i_Q4SJySP2u1RzKA"], "expires_at": "2020-11-06T19:04:16.000000Z", "issued_at": "2020-11-06T18:04:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "45a718d9e7cb4350a7ca65b4f934faaf", "name": "tempest-ServiceProfileExtRbacTest-403357465"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:16.143 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:16.147 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_service_profile, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:16.147 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:16.150 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_service_profile, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:16.241 37 INFO tempest.lib.common.rest_client [req-da5182ab-fc66-450f-bbe1-3863b60dff5e ] Request (ServiceProfileExtRbacTest:test_update_service_profile): 201 POST http://172.30.13.94:9696/v2.0/service_profiles 0.091s 2020-11-06 18:04:16.242 37 DEBUG tempest.lib.common.rest_client [req-da5182ab-fc66-450f-bbe1-3863b60dff5e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"service_profile": {"metainfo": "{\"foo\": \"bar\"}"}} Response - Headers: {'content-type': 'application/json', 'content-length': '151', 'x-openstack-request-id': 'req-da5182ab-fc66-450f-bbe1-3863b60dff5e', 'date': 'Fri, 06 Nov 2020 18:04:16 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/service_profiles'} Body: b'{"service_profile": {"id": "b520e6ef-9ff0-4b07-a24f-cfa5a22e8c3b", "description": "", "driver": "", "enabled": true, "metainfo": "{\\"foo\\": \\"bar\\"}"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:16.242 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:16.299 37 INFO tempest.lib.common.rest_client [req-5b318f36-9266-43df-8e70-20b3f049683f ] Request (ServiceProfileExtRbacTest:test_update_service_profile): 200 GET http://172.30.13.94/identity/v3/projects/45a718d9e7cb4350a7ca65b4f934faaf/users/385500322a6f417aaa5825ea06838716/roles 0.055s 2020-11-06 18:04:16.300 37 DEBUG tempest.lib.common.rest_client [req-5b318f36-9266-43df-8e70-20b3f049683f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5b318f36-9266-43df-8e70-20b3f049683f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/45a718d9e7cb4350a7ca65b4f934faaf/users/385500322a6f417aaa5825ea06838716/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/45a718d9e7cb4350a7ca65b4f934faaf/users/385500322a6f417aaa5825ea06838716/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:16.335 37 INFO tempest.lib.common.rest_client [req-52d0c350-dae1-44bd-922b-01ab2197a0b3 ] Request (ServiceProfileExtRbacTest:test_update_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:04:16.336 37 DEBUG tempest.lib.common.rest_client [req-52d0c350-dae1-44bd-922b-01ab2197a0b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-52d0c350-dae1-44bd-922b-01ab2197a0b3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "385500322a6f417aaa5825ea06838716", "name": "tempest-ServiceProfileExtRbacTest-403357465", "password_expires_at": null}, "audit_ids": ["am_IUS_0SJyTgzEXRulOPA"], "expires_at": "2020-11-06T19:04:16.000000Z", "issued_at": "2020-11-06T18:04:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "45a718d9e7cb4350a7ca65b4f934faaf", "name": "tempest-ServiceProfileExtRbacTest-403357465"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:16.369 37 INFO tempest.lib.common.rest_client [req-4003c6c8-318a-4cf2-baed-46b88650d508 ] Request (ServiceProfileExtRbacTest:test_update_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:04:16.370 37 DEBUG tempest.lib.common.rest_client [req-4003c6c8-318a-4cf2-baed-46b88650d508 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4003c6c8-318a-4cf2-baed-46b88650d508', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "385500322a6f417aaa5825ea06838716", "name": "tempest-ServiceProfileExtRbacTest-403357465", "password_expires_at": null}, "audit_ids": ["Nw0FltybQWSM_n_Q24-19Q"], "expires_at": "2020-11-06T19:04:16.000000Z", "issued_at": "2020-11-06T18:04:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "45a718d9e7cb4350a7ca65b4f934faaf", "name": "tempest-ServiceProfileExtRbacTest-403357465"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:16.442 39 INFO tempest.lib.common.rest_client [req-03e09518-970b-4008-b365-1ab213a631b2 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.221s 2020-11-06 18:04:16.443 39 DEBUG tempest.lib.common.rest_client [req-03e09518-970b-4008-b365-1ab213a631b2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-03e09518-970b-4008-b365-1ab213a631b2', 'x-compute-request-id': 'req-03e09518-970b-4008-b365-1ab213a631b2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:16.832 40 INFO tempest.lib.common.rest_client [req-9d5d6085-892e-4930-af93-9ffccfd4f06a ] Request (VolumesBasicCrudV3RbacTest:test_create_volume_from_image): 200 GET http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/43e2b2ff-4bb3-4ed0-b427-68966fe4aa01 0.072s 2020-11-06 18:04:16.848 40 DEBUG tempest.lib.common.rest_client [req-9d5d6085-892e-4930-af93-9ffccfd4f06a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-9d5d6085-892e-4930-af93-9ffccfd4f06a', 'content-length': '1126', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9d5d6085-892e-4930-af93-9ffccfd4f06a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/43e2b2ff-4bb3-4ed0-b427-68966fe4aa01'} Body: b'{"volume": {"id": "43e2b2ff-4bb3-4ed0-b427-68966fe4aa01", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:15.000000", "updated_at": "2020-11-06T18:04:16.000000", "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-198199036", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/43e2b2ff-4bb3-4ed0-b427-68966fe4aa01"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/43e2b2ff-4bb3-4ed0-b427-68966fe4aa01"}], "user_id": "9497097058db40ffabed3f7664e6f4b0", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "volume_image_metadata": {"signature_verified": "False"}, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "c70129f43ea14e7c8b66bff39d8e9aeb"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:17.767 37 INFO tempest.lib.common.rest_client [req-4d076f88-1e53-4a2f-a9c1-fc4794c21b51 ] Request (ServiceProfileExtRbacTest:test_update_service_profile): 200 PUT http://172.30.13.94:9696/v2.0/service_profiles/b520e6ef-9ff0-4b07-a24f-cfa5a22e8c3b 1.395s 2020-11-06 18:04:17.767 37 DEBUG tempest.lib.common.rest_client [req-4d076f88-1e53-4a2f-a9c1-fc4794c21b51 ] Request - Headers: {'X-Auth-Token': ''} Body: {"service_profile": {"enabled": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '152', 'x-openstack-request-id': 'req-4d076f88-1e53-4a2f-a9c1-fc4794c21b51', 'date': 'Fri, 06 Nov 2020 18:04:17 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/service_profiles/b520e6ef-9ff0-4b07-a24f-cfa5a22e8c3b'} Body: b'{"service_profile": {"id": "b520e6ef-9ff0-4b07-a24f-cfa5a22e8c3b", "description": "", "driver": "", "enabled": false, "metainfo": "{\\"foo\\": \\"bar\\"}"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:17.768 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:17.819 37 INFO tempest.lib.common.rest_client [req-b7804ed4-7b30-4b35-a0a6-847a5919eb43 ] Request (ServiceProfileExtRbacTest:test_update_service_profile): 200 GET http://172.30.13.94/identity/v3/projects/45a718d9e7cb4350a7ca65b4f934faaf/users/385500322a6f417aaa5825ea06838716/roles 0.050s 2020-11-06 18:04:17.820 37 DEBUG tempest.lib.common.rest_client [req-b7804ed4-7b30-4b35-a0a6-847a5919eb43 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b7804ed4-7b30-4b35-a0a6-847a5919eb43', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/45a718d9e7cb4350a7ca65b4f934faaf/users/385500322a6f417aaa5825ea06838716/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/45a718d9e7cb4350a7ca65b4f934faaf/users/385500322a6f417aaa5825ea06838716/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:17.856 37 INFO tempest.lib.common.rest_client [req-d197a50a-0b16-4d8b-a487-8e8e8d11a236 ] Request (ServiceProfileExtRbacTest:test_update_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:04:17.857 37 DEBUG tempest.lib.common.rest_client [req-d197a50a-0b16-4d8b-a487-8e8e8d11a236 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d197a50a-0b16-4d8b-a487-8e8e8d11a236', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "385500322a6f417aaa5825ea06838716", "name": "tempest-ServiceProfileExtRbacTest-403357465", "password_expires_at": null}, "audit_ids": ["LHTRQkU5Sb6zuwhmk8VQVg"], "expires_at": "2020-11-06T19:04:17.000000Z", "issued_at": "2020-11-06T18:04:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "45a718d9e7cb4350a7ca65b4f934faaf", "name": "tempest-ServiceProfileExtRbacTest-403357465"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:17.894 37 INFO tempest.lib.common.rest_client [req-36bf581b-28c7-499a-b440-f00e3f2271fa ] Request (ServiceProfileExtRbacTest:test_update_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:04:17.894 37 DEBUG tempest.lib.common.rest_client [req-36bf581b-28c7-499a-b440-f00e3f2271fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-36bf581b-28c7-499a-b440-f00e3f2271fa', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "385500322a6f417aaa5825ea06838716", "name": "tempest-ServiceProfileExtRbacTest-403357465", "password_expires_at": null}, "audit_ids": ["c88wKkrkS0OOo2KPDz2KvQ"], "expires_at": "2020-11-06T19:04:17.000000Z", "issued_at": "2020-11-06T18:04:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "45a718d9e7cb4350a7ca65b4f934faaf", "name": "tempest-ServiceProfileExtRbacTest-403357465"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45a718d9e7cb4350a7ca65b4f934faaf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:17.928 40 INFO tempest.lib.common.rest_client [req-b9292733-373b-4811-a9e1-c775e5b0a5f0 ] Request (VolumesBasicCrudV3RbacTest:test_create_volume_from_image): 200 GET http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/43e2b2ff-4bb3-4ed0-b427-68966fe4aa01 0.069s 2020-11-06 18:04:17.929 40 DEBUG tempest.lib.common.rest_client [req-b9292733-373b-4811-a9e1-c775e5b0a5f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-b9292733-373b-4811-a9e1-c775e5b0a5f0', 'content-length': '1126', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b9292733-373b-4811-a9e1-c775e5b0a5f0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/43e2b2ff-4bb3-4ed0-b427-68966fe4aa01'} Body: b'{"volume": {"id": "43e2b2ff-4bb3-4ed0-b427-68966fe4aa01", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:15.000000", "updated_at": "2020-11-06T18:04:16.000000", "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-198199036", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/43e2b2ff-4bb3-4ed0-b427-68966fe4aa01"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/43e2b2ff-4bb3-4ed0-b427-68966fe4aa01"}], "user_id": "9497097058db40ffabed3f7664e6f4b0", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "volume_image_metadata": {"signature_verified": "False"}, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "c70129f43ea14e7c8b66bff39d8e9aeb"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:18.210 39 INFO tempest.lib.common.rest_client [req-9d2a235f-a300-4e0b-843d-c0fab6acf766 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.753s 2020-11-06 18:04:18.211 39 DEBUG tempest.lib.common.rest_client [req-9d2a235f-a300-4e0b-843d-c0fab6acf766 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9d2a235f-a300-4e0b-843d-c0fab6acf766', 'x-compute-request-id': 'req-9d2a235f-a300-4e0b-843d-c0fab6acf766', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:18.416 37 INFO tempest.lib.common.rest_client [req-2ddcbad0-ddab-4558-9476-945238887bc9 ] Request (ServiceProfileExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/service_profiles/b520e6ef-9ff0-4b07-a24f-cfa5a22e8c3b 0.518s 2020-11-06 18:04:18.416 37 DEBUG tempest.lib.common.rest_client [req-2ddcbad0-ddab-4558-9476-945238887bc9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-2ddcbad0-ddab-4558-9476-945238887bc9', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:04:18 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/service_profiles/b520e6ef-9ff0-4b07-a24f-cfa5a22e8c3b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:18.467 37 INFO tempest.lib.common.rest_client [req-bf880b8d-def0-4d3c-8d90-8a573343f96d ] Request (ServiceProfileExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/service_profiles/ce01b80c-7308-417e-bc2a-a76876b0cd08 0.050s 2020-11-06 18:04:18.468 37 DEBUG tempest.lib.common.rest_client [req-bf880b8d-def0-4d3c-8d90-8a573343f96d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-bf880b8d-def0-4d3c-8d90-8a573343f96d', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:04:18 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/service_profiles/ce01b80c-7308-417e-bc2a-a76876b0cd08'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:18.482 37 INFO tempest.lib.common.rest_client [req-cca08c46-1ea2-4809-b253-7dd954686fb9 ] Request (ServiceProfileExtRbacTest:tearDownClass): 404 DELETE http://172.30.13.94:9696/v2.0/service_profiles/5a913a95-2628-4770-876a-63914d498eb2 0.014s 2020-11-06 18:04:18.483 37 DEBUG tempest.lib.common.rest_client [req-cca08c46-1ea2-4809-b253-7dd954686fb9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '153', 'x-openstack-request-id': 'req-cca08c46-1ea2-4809-b253-7dd954686fb9', 'date': 'Fri, 06 Nov 2020 18:04:18 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/service_profiles/5a913a95-2628-4770-876a-63914d498eb2'} Body: b'{"NeutronError": {"type": "ServiceProfileNotFound", "message": "Service Profile 5a913a95-2628-4770-876a-63914d498eb2 could not be found.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:18.518 37 INFO tempest.lib.common.rest_client [req-6b90434d-6965-4196-9388-ae669b8911e4 ] Request (ServiceProfileExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/service_profiles/fb10d6dc-28e3-4e84-b1d7-72b0f37f8316 0.034s 2020-11-06 18:04:18.518 37 DEBUG tempest.lib.common.rest_client [req-6b90434d-6965-4196-9388-ae669b8911e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-6b90434d-6965-4196-9388-ae669b8911e4', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:04:18 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/service_profiles/fb10d6dc-28e3-4e84-b1d7-72b0f37f8316'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:18.630 37 INFO tempest.lib.common.rest_client [req-d3c51ad0-762a-41b4-856d-7dd30d1e8196 ] Request (ServiceProfileExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/385500322a6f417aaa5825ea06838716 0.110s 2020-11-06 18:04:18.630 37 DEBUG tempest.lib.common.rest_client [req-d3c51ad0-762a-41b4-856d-7dd30d1e8196 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d3c51ad0-762a-41b4-856d-7dd30d1e8196', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/385500322a6f417aaa5825ea06838716'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:18.716 37 INFO tempest.lib.common.rest_client [req-86af64d6-7bae-48cd-ac09-11ec1b1c42f1 ] Request (ServiceProfileExtRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:04:18.717 37 DEBUG tempest.lib.common.rest_client [req-86af64d6-7bae-48cd-ac09-11ec1b1c42f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-86af64d6-7bae-48cd-ac09-11ec1b1c42f1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["xe9f2G3lQIqr6YgLRQe9wA"], "expires_at": "2020-11-06T19:04:18.000000Z", "issued_at": "2020-11-06T18:04:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:19.013 40 INFO tempest.lib.common.rest_client [req-3e982441-e1da-46a6-b769-1313148c738c ] Request (VolumesBasicCrudV3RbacTest:test_create_volume_from_image): 200 GET http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/43e2b2ff-4bb3-4ed0-b427-68966fe4aa01 0.071s 2020-11-06 18:04:19.013 40 DEBUG tempest.lib.common.rest_client [req-3e982441-e1da-46a6-b769-1313148c738c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-3e982441-e1da-46a6-b769-1313148c738c', 'content-length': '1129', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3e982441-e1da-46a6-b769-1313148c738c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/43e2b2ff-4bb3-4ed0-b427-68966fe4aa01'} Body: b'{"volume": {"id": "43e2b2ff-4bb3-4ed0-b427-68966fe4aa01", "status": "downloading", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:15.000000", "updated_at": "2020-11-06T18:04:18.000000", "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-198199036", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/43e2b2ff-4bb3-4ed0-b427-68966fe4aa01"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/43e2b2ff-4bb3-4ed0-b427-68966fe4aa01"}], "user_id": "9497097058db40ffabed3f7664e6f4b0", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "volume_image_metadata": {"signature_verified": "False"}, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "c70129f43ea14e7c8b66bff39d8e9aeb"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:19.076 37 INFO tempest.lib.common.rest_client [req-d3cffe24-5761-4983-b4b6-f3b15760473a ] Request (ServiceProfileExtRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=45a718d9e7cb4350a7ca65b4f934faaf&name=default 0.358s 2020-11-06 18:04:19.076 37 DEBUG tempest.lib.common.rest_client [req-d3cffe24-5761-4983-b4b6-f3b15760473a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-d3cffe24-5761-4983-b4b6-f3b15760473a', 'date': 'Fri, 06 Nov 2020 18:04:19 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=45a718d9e7cb4350a7ca65b4f934faaf&name=default'} Body: b'{"security_groups": [{"id": "a2ca9c8b-17bd-4857-af51-a382681bdd5e", "name": "default", "stateful": true, "tenant_id": "45a718d9e7cb4350a7ca65b4f934faaf", "description": "Default security group", "security_group_rules": [{"id": "384bac92-2d42-44a8-a04d-ed24a6652ff7", "tenant_id": "45a718d9e7cb4350a7ca65b4f934faaf", "security_group_id": "a2ca9c8b-17bd-4857-af51-a382681bdd5e", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:04:18Z", "updated_at": "2020-11-06T18:04:18Z", "revision_number": 0, "project_id": "45a718d9e7cb4350a7ca65b4f934faaf"}, {"id": "5d83e864-5f85-4ba5-9051-7323e0db2402", "tenant_id": "45a718d9e7cb4350a7ca65b4f934faaf", "security_group_id": "a2ca9c8b-17bd-4857-af51-a382681bdd5e", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "a2ca9c8b-17bd-4857-af51-a382681bdd5e", "description": null, "tags": [], "created_at": "2020-11-06T18:04:18Z", "updated_at": "2020-11-06T18:04:18Z", "revision_number": 0, "project_id": "45a718d9e7cb4350a7ca65b4f934faaf"}, {"id": "6f8425ca-6d7a-4a6a-8fc7-5421d9af484c", "tenant_id": "45a718d9e7cb4350a7ca65b4f934faaf", "security_group_id": "a2ca9c8b-17bd-4857-af51-a382681bdd5e", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:04:18Z", "updated_at": "2020-11-06T18:04:18Z", "revision_number": 0, "project_id": "45a718d9e7cb4350a7ca65b4f934faaf"}, {"id": "ffc4938d-da77-4dc7-bed0-1938d1332d6c", "tenant_id": "45a718d9e7cb4350a7ca65b4f934faaf", "security_group_id": "a2ca9c8b-17bd-4857-af51-a382681bdd5e", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "a2ca9c8b-17bd-4857-af51-a382681bdd5e", "description": null, "tags": [], "created_at": "2020-11-06T18:04:18Z", "updated_at": "2020-11-06T18:04:18Z", "revision_number": 0, "project_id": "45a718d9e7cb4350a7ca65b4f934faaf"}], "tags": [], "created_at": "2020-11-06T18:04:18Z", "updated_at": "2020-11-06T18:04:18Z", "revision_number": 1, "project_id": "45a718d9e7cb4350a7ca65b4f934faaf"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:19.273 37 INFO tempest.lib.common.rest_client [req-81ab6a3b-c0fc-496b-8ffa-309289672664 ] Request (ServiceProfileExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/a2ca9c8b-17bd-4857-af51-a382681bdd5e 0.195s 2020-11-06 18:04:19.273 37 DEBUG tempest.lib.common.rest_client [req-81ab6a3b-c0fc-496b-8ffa-309289672664 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-81ab6a3b-c0fc-496b-8ffa-309289672664', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:04:19 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/a2ca9c8b-17bd-4857-af51-a382681bdd5e'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:19.395 37 INFO tempest.lib.common.rest_client [req-fdce987d-2209-4fd5-a003-16dcff688c37 ] Request (ServiceProfileExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/45a718d9e7cb4350a7ca65b4f934faaf 0.121s 2020-11-06 18:04:19.396 37 DEBUG tempest.lib.common.rest_client [req-fdce987d-2209-4fd5-a003-16dcff688c37 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fdce987d-2209-4fd5-a003-16dcff688c37', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/45a718d9e7cb4350a7ca65b4f934faaf'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:19.485 37 INFO tempest.lib.common.rest_client [req-dd052765-6e99-42a6-935b-0ff35f30fefa ] Request (GroupSnaphotsV314RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-11-06 18:04:19.485 39 INFO tempest.lib.common.rest_client [req-ddc824b8-3c01-466d-94a5-dd058ac9e63c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.259s 2020-11-06 18:04:19.486 37 DEBUG tempest.lib.common.rest_client [req-dd052765-6e99-42a6-935b-0ff35f30fefa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dd052765-6e99-42a6-935b-0ff35f30fefa', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["b_5uQIc0Si-V6pT1KdwUhg"], "expires_at": "2020-11-06T19:04:19.000000Z", "issued_at": "2020-11-06T18:04:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:19.486 39 DEBUG tempest.lib.common.rest_client [req-ddc824b8-3c01-466d-94a5-dd058ac9e63c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ddc824b8-3c01-466d-94a5-dd058ac9e63c', 'x-compute-request-id': 'req-ddc824b8-3c01-466d-94a5-dd058ac9e63c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:19.531 37 INFO tempest.lib.common.rest_client [req-0bd2b7fd-b45b-4121-9471-1be60220e649 ] Request (GroupSnaphotsV314RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:04:19.531 37 DEBUG tempest.lib.common.rest_client [req-0bd2b7fd-b45b-4121-9471-1be60220e649 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0bd2b7fd-b45b-4121-9471-1be60220e649', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["kwgioOdRTSe9TuApKd6d9g"], "expires_at": "2020-11-06T19:04:19.000000Z", "issued_at": "2020-11-06T18:04:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:19.595 37 INFO tempest.lib.common.rest_client [req-6f29e1b1-fa6c-413b-9e91-db4e4fc65454 ] Request (GroupSnaphotsV314RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.063s 2020-11-06 18:04:19.596 37 DEBUG tempest.lib.common.rest_client [req-6f29e1b1-fa6c-413b-9e91-db4e4fc65454 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6f29e1b1-fa6c-413b-9e91-db4e4fc65454', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:19.664 37 INFO tempest.lib.common.rest_client [req-19cc07c2-3819-4900-820a-7a11810c578f ] Request (GroupSnaphotsV314RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.067s 2020-11-06 18:04:19.665 37 DEBUG tempest.lib.common.rest_client [req-19cc07c2-3819-4900-820a-7a11810c578f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-GroupSnaphotsV314RbacTest-640793486-desc", "domain_id": "default", "name": "tempest-GroupSnaphotsV314RbacTest-640793486"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '386', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-19cc07c2-3819-4900-820a-7a11810c578f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "479cc71352d449a5aae47dadceb27a30", "name": "tempest-GroupSnaphotsV314RbacTest-640793486", "domain_id": "default", "description": "tempest-GroupSnaphotsV314RbacTest-640793486-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/479cc71352d449a5aae47dadceb27a30"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:19.778 37 INFO tempest.lib.common.rest_client [req-69a145cd-54f9-41e7-9e79-96f58ee16e1c ] Request (GroupSnaphotsV314RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.112s 2020-11-06 18:04:19.779 37 DEBUG tempest.lib.common.rest_client [req-69a145cd-54f9-41e7-9e79-96f58ee16e1c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-GroupSnaphotsV314RbacTest-640793486", "password": "Z8&v&1FAAdk741=", "project_id": "479cc71352d449a5aae47dadceb27a30", "email": "tempest-GroupSnaphotsV314RbacTest-1086651367@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '405', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-69a145cd-54f9-41e7-9e79-96f58ee16e1c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "479cc71352d449a5aae47dadceb27a30", "email": "tempest-GroupSnaphotsV314RbacTest-1086651367@example.com", "id": "79626ff2a9f24f28b269e0967e684da6", "name": "tempest-GroupSnaphotsV314RbacTest-640793486", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/79626ff2a9f24f28b269e0967e684da6"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:19.831 37 INFO tempest.lib.common.rest_client [req-da19e1a8-cdeb-4a02-9e5b-8e7b37eb76d6 ] Request (GroupSnaphotsV314RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.050s 2020-11-06 18:04:19.831 37 DEBUG tempest.lib.common.rest_client [req-da19e1a8-cdeb-4a02-9e5b-8e7b37eb76d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-da19e1a8-cdeb-4a02-9e5b-8e7b37eb76d6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:19.881 37 INFO tempest.lib.common.rest_client [req-e6dd0233-6920-4c94-b085-96709ad29a90 ] Request (GroupSnaphotsV314RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.048s 2020-11-06 18:04:19.881 37 DEBUG tempest.lib.common.rest_client [req-e6dd0233-6920-4c94-b085-96709ad29a90 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e6dd0233-6920-4c94-b085-96709ad29a90', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:19.949 37 INFO tempest.lib.common.rest_client [req-6b6146b7-77b9-46ff-b03a-8b13ec941049 ] Request (GroupSnaphotsV314RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/479cc71352d449a5aae47dadceb27a30/users/79626ff2a9f24f28b269e0967e684da6/roles/72a4576c553448cd941b052c1ca0cf2d 0.067s 2020-11-06 18:04:19.950 37 DEBUG tempest.lib.common.rest_client [req-6b6146b7-77b9-46ff-b03a-8b13ec941049 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6b6146b7-77b9-46ff-b03a-8b13ec941049', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/479cc71352d449a5aae47dadceb27a30/users/79626ff2a9f24f28b269e0967e684da6/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:19.950 37 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-GroupSnaphotsV314RbacTest-640793486', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '479cc71352d449a5aae47dadceb27a30', 'project_name': 'tempest-GroupSnaphotsV314RbacTest-640793486', 'tenant_id': '479cc71352d449a5aae47dadceb27a30', 'tenant_name': 'tempest-GroupSnaphotsV314RbacTest-640793486', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '79626ff2a9f24f28b269e0967e684da6'}, Network: None, Subnet: None, Router: None 2020-11-06 18:04:19.951 37 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-GroupSnaphotsV314RbacTest-640793486', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '479cc71352d449a5aae47dadceb27a30', 'project_name': 'tempest-GroupSnaphotsV314RbacTest-640793486', 'tenant_id': '479cc71352d449a5aae47dadceb27a30', 'tenant_name': 'tempest-GroupSnaphotsV314RbacTest-640793486', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '79626ff2a9f24f28b269e0967e684da6'}, Network: None, Subnet: None, Router: None 2020-11-06 18:04:20.078 37 INFO tempest.lib.common.rest_client [req-698310bd-878a-49c7-b588-69d005261e97 ] Request (GroupSnaphotsV314RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.115s 2020-11-06 18:04:20.078 37 DEBUG tempest.lib.common.rest_client [req-698310bd-878a-49c7-b588-69d005261e97 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6579', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-698310bd-878a-49c7-b588-69d005261e97', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "79626ff2a9f24f28b269e0967e684da6", "name": "tempest-GroupSnaphotsV314RbacTest-640793486", "password_expires_at": null}, "audit_ids": ["wAkfTqgnRD2H6CVIfyXlZQ"], "expires_at": "2020-11-06T19:04:19.000000Z", "issued_at": "2020-11-06T18:04:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "479cc71352d449a5aae47dadceb27a30", "name": "tempest-GroupSnaphotsV314RbacTest-640793486"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "ht _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:20.099 40 INFO tempest.lib.common.rest_client [req-b9c8d6c3-57d9-4e5d-95e4-5971021b9ff3 ] Request (VolumesBasicCrudV3RbacTest:test_create_volume_from_image): 200 GET http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/43e2b2ff-4bb3-4ed0-b427-68966fe4aa01 0.071s 2020-11-06 18:04:20.099 40 DEBUG tempest.lib.common.rest_client [req-b9c8d6c3-57d9-4e5d-95e4-5971021b9ff3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-b9c8d6c3-57d9-4e5d-95e4-5971021b9ff3', 'content-length': '1129', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b9c8d6c3-57d9-4e5d-95e4-5971021b9ff3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/43e2b2ff-4bb3-4ed0-b427-68966fe4aa01'} Body: b'{"volume": {"id": "43e2b2ff-4bb3-4ed0-b427-68966fe4aa01", "status": "downloading", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:15.000000", "updated_at": "2020-11-06T18:04:18.000000", "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-198199036", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/43e2b2ff-4bb3-4ed0-b427-68966fe4aa01"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/43e2b2ff-4bb3-4ed0-b427-68966fe4aa01"}], "user_id": "9497097058db40ffabed3f7664e6f4b0", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "volume_image_metadata": {"signature_verified": "False"}, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "c70129f43ea14e7c8b66bff39d8e9aeb"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:20.156 37 INFO tempest.lib.common.rest_client [req-a08b0fc5-7379-408e-8239-41b7c0de45bd ] Request (GroupSnaphotsV314RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.077s 2020-11-06 18:04:20.157 37 DEBUG tempest.lib.common.rest_client [req-a08b0fc5-7379-408e-8239-41b7c0de45bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a08b0fc5-7379-408e-8239-41b7c0de45bd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["DwQrStwLSuaP2Tdh3zL6Jw"], "expires_at": "2020-11-06T19:04:20.000000Z", "issued_at": "2020-11-06T18:04:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:20.201 37 INFO tempest.lib.common.rest_client [req-854a9677-7892-4f1e-90ef-2791aa59c8b2 ] Request (GroupSnaphotsV314RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:04:20.201 37 DEBUG tempest.lib.common.rest_client [req-854a9677-7892-4f1e-90ef-2791aa59c8b2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-854a9677-7892-4f1e-90ef-2791aa59c8b2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["J1f7dwliTTSB_SvsItMfYA"], "expires_at": "2020-11-06T19:04:20.000000Z", "issued_at": "2020-11-06T18:04:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:20.308 37 INFO tempest.lib.common.rest_client [req-3655c64f-0fc7-47a8-a6a9-21f66c99884a ] Request (GroupSnaphotsV314RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.106s 2020-11-06 18:04:20.309 37 DEBUG tempest.lib.common.rest_client [req-3655c64f-0fc7-47a8-a6a9-21f66c99884a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3655c64f-0fc7-47a8-a6a9-21f66c99884a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:20.363 37 INFO tempest.lib.common.rest_client [req-249e8814-e04e-4fe6-95c4-cf1e572e281d ] Request (GroupSnaphotsV314RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.054s 2020-11-06 18:04:20.364 37 DEBUG tempest.lib.common.rest_client [req-249e8814-e04e-4fe6-95c4-cf1e572e281d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-249e8814-e04e-4fe6-95c4-cf1e572e281d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:20.364 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:04:20.365 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:20.414 37 INFO tempest.lib.common.rest_client [req-43a7c3ad-5ded-45e3-a15d-01405310e94c ] Request (GroupSnaphotsV314RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/479cc71352d449a5aae47dadceb27a30/users/79626ff2a9f24f28b269e0967e684da6/roles 0.048s 2020-11-06 18:04:20.415 37 DEBUG tempest.lib.common.rest_client [req-43a7c3ad-5ded-45e3-a15d-01405310e94c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-43a7c3ad-5ded-45e3-a15d-01405310e94c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/479cc71352d449a5aae47dadceb27a30/users/79626ff2a9f24f28b269e0967e684da6/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/479cc71352d449a5aae47dadceb27a30/users/79626ff2a9f24f28b269e0967e684da6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:20.476 37 INFO tempest.lib.common.rest_client [req-2fec0924-9d67-42f6-94d5-7dda159f9b15 ] Request (GroupSnaphotsV314RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/479cc71352d449a5aae47dadceb27a30/users/79626ff2a9f24f28b269e0967e684da6/roles/72a4576c553448cd941b052c1ca0cf2d 0.060s 2020-11-06 18:04:20.477 37 DEBUG tempest.lib.common.rest_client [req-2fec0924-9d67-42f6-94d5-7dda159f9b15 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2fec0924-9d67-42f6-94d5-7dda159f9b15', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/479cc71352d449a5aae47dadceb27a30/users/79626ff2a9f24f28b269e0967e684da6/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:20.585 37 INFO tempest.lib.common.rest_client [req-d4d82a87-29ac-4f58-85d9-d80e0279495a ] Request (GroupSnaphotsV314RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/479cc71352d449a5aae47dadceb27a30/users/79626ff2a9f24f28b269e0967e684da6/roles/a629c95d64b3416fb80ae90af4f69c05 0.107s 2020-11-06 18:04:20.585 37 DEBUG tempest.lib.common.rest_client [req-d4d82a87-29ac-4f58-85d9-d80e0279495a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d4d82a87-29ac-4f58-85d9-d80e0279495a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/479cc71352d449a5aae47dadceb27a30/users/79626ff2a9f24f28b269e0967e684da6/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:20.820 39 INFO tempest.lib.common.rest_client [req-03249869-33b9-48e2-8502-7cc2eed929cf ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.318s 2020-11-06 18:04:20.821 39 DEBUG tempest.lib.common.rest_client [req-03249869-33b9-48e2-8502-7cc2eed929cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-03249869-33b9-48e2-8502-7cc2eed929cf', 'x-compute-request-id': 'req-03249869-33b9-48e2-8502-7cc2eed929cf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:21.186 40 INFO tempest.lib.common.rest_client [req-abb6fe0e-fa2a-4b6a-8f97-459f771b0bba ] Request (VolumesBasicCrudV3RbacTest:test_create_volume_from_image): 200 GET http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/43e2b2ff-4bb3-4ed0-b427-68966fe4aa01 0.070s 2020-11-06 18:04:21.187 40 DEBUG tempest.lib.common.rest_client [req-abb6fe0e-fa2a-4b6a-8f97-459f771b0bba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-abb6fe0e-fa2a-4b6a-8f97-459f771b0bba', 'content-length': '1722', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-abb6fe0e-fa2a-4b6a-8f97-459f771b0bba', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/43e2b2ff-4bb3-4ed0-b427-68966fe4aa01'} Body: b'{"volume": {"id": "43e2b2ff-4bb3-4ed0-b427-68966fe4aa01", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:15.000000", "updated_at": "2020-11-06T18:04:20.000000", "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-198199036", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/43e2b2ff-4bb3-4ed0-b427-68966fe4aa01"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/43e2b2ff-4bb3-4ed0-b427-68966fe4aa01"}], "user_id": "9497097058db40ffabed3f7664e6f4b0", "bootable": "true", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "volume_image_metadata": {"signature_verified": "False", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "image_id": "56b368f6-9136-40ec-a04c-564d02c95e42", "image_name": "patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "checksum": "443b7623e27ecf03dc9e01ee93f67afe", "container_format": "bare", "disk_format": "qcow2", "min_disk": "0", "min_ram": "0", "size": "12716032"}, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "c70129f43ea14e7c8b66bff39d8e9aeb"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:21.202 40 INFO tempest.common.waiters [-] volume 43e2b2ff-4bb3-4ed0-b427-68966fe4aa01 reached available after waiting for 6.202574 seconds 2020-11-06 18:04:21.273 40 INFO tempest.lib.common.rest_client [req-b7e421b3-282d-4154-ba47-fe87270bbe51 ] Request (VolumesBasicCrudV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/43e2b2ff-4bb3-4ed0-b427-68966fe4aa01 0.070s 2020-11-06 18:04:21.274 40 DEBUG tempest.lib.common.rest_client [req-b7e421b3-282d-4154-ba47-fe87270bbe51 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b7e421b3-282d-4154-ba47-fe87270bbe51', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/43e2b2ff-4bb3-4ed0-b427-68966fe4aa01'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:21.352 40 INFO tempest.lib.common.rest_client [req-834c5034-ffd6-4577-97f2-ba3e472a3865 ] Request (VolumesBasicCrudV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/43e2b2ff-4bb3-4ed0-b427-68966fe4aa01 0.077s 2020-11-06 18:04:21.352 40 DEBUG tempest.lib.common.rest_client [req-834c5034-ffd6-4577-97f2-ba3e472a3865 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-834c5034-ffd6-4577-97f2-ba3e472a3865', 'content-length': '1721', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-834c5034-ffd6-4577-97f2-ba3e472a3865', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/43e2b2ff-4bb3-4ed0-b427-68966fe4aa01'} Body: b'{"volume": {"id": "43e2b2ff-4bb3-4ed0-b427-68966fe4aa01", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:15.000000", "updated_at": "2020-11-06T18:04:21.000000", "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-198199036", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/43e2b2ff-4bb3-4ed0-b427-68966fe4aa01"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/43e2b2ff-4bb3-4ed0-b427-68966fe4aa01"}], "user_id": "9497097058db40ffabed3f7664e6f4b0", "bootable": "true", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "volume_image_metadata": {"signature_verified": "False", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "image_id": "56b368f6-9136-40ec-a04c-564d02c95e42", "image_name": "patrole_reader-img_30048f18-b96b-4343-a720-1173982b59b8", "checksum": "443b7623e27ecf03dc9e01ee93f67afe", "container_format": "bare", "disk_format": "qcow2", "min_disk": "0", "min_ram": "0", "size": "12716032"}, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "c70129f43ea14e7c8b66bff39d8e9aeb"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:21.680 37 INFO tempest.lib.common.rest_client [req-93ff40a7-ef51-4571-99d8-74db9150fd75 ] Request (GroupSnaphotsV314RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-11-06 18:04:21.680 37 DEBUG tempest.lib.common.rest_client [req-93ff40a7-ef51-4571-99d8-74db9150fd75 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-93ff40a7-ef51-4571-99d8-74db9150fd75', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "79626ff2a9f24f28b269e0967e684da6", "name": "tempest-GroupSnaphotsV314RbacTest-640793486", "password_expires_at": null}, "audit_ids": ["pGv281PPRwWiqaeMcrIfXg"], "expires_at": "2020-11-06T19:04:21.000000Z", "issued_at": "2020-11-06T18:04:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "479cc71352d449a5aae47dadceb27a30", "name": "tempest-GroupSnaphotsV314RbacTest-640793486"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:21.887 37 INFO tempest.lib.common.rest_client [req-ddd0d7b5-63b5-4349-aaae-d1175791a427 ] Request (GroupSnaphotsV314RbacTest:setUp): 200 POST http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/types 0.203s 2020-11-06 18:04:21.888 37 DEBUG tempest.lib.common.rest_client [req-ddd0d7b5-63b5-4349-aaae-d1175791a427 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-GroupSnaphotsV314RbacTest-volume-type-1532267561"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ddd0d7b5-63b5-4349-aaae-d1175791a427', 'content-length': '231', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ddd0d7b5-63b5-4349-aaae-d1175791a427', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/types'} Body: b'{"volume_type": {"id": "a993444b-aecd-4be2-a630-97aa45840329", "name": "tempest-GroupSnaphotsV314RbacTest-volume-type-1532267561", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:21.938 37 INFO tempest.lib.common.rest_client [req-ee5da37e-6ad9-4a72-be28-ccb17f530192 ] Request (GroupSnaphotsV314RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_types 0.047s 2020-11-06 18:04:21.939 37 DEBUG tempest.lib.common.rest_client [req-ee5da37e-6ad9-4a72-be28-ccb17f530192 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupSnaphotsV314RbacTest-group-type-183848954"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ee5da37e-6ad9-4a72-be28-ccb17f530192', 'content-length': '187', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ee5da37e-6ad9-4a72-be28-ccb17f530192', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_types'} Body: b'{"group_type": {"id": "ae9d7ad0-15d9-476d-bd34-65ff46529805", "name": "tempest-GroupSnaphotsV314RbacTest-group-type-183848954", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:22.045 37 INFO tempest.lib.common.rest_client [req-caceed9e-c305-49dc-871a-967cb31e9c69 ] Request (GroupSnaphotsV314RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups 0.102s 2020-11-06 18:04:22.045 37 DEBUG tempest.lib.common.rest_client [req-caceed9e-c305-49dc-871a-967cb31e9c69 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"group": {"group_type": "ae9d7ad0-15d9-476d-bd34-65ff46529805", "volume_types": ["a993444b-aecd-4be2-a630-97aa45840329"], "name": "tempest-GroupSnaphotsV314RbacTest-Group-118762254"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-caceed9e-c305-49dc-871a-967cb31e9c69', 'content-length': '118', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-caceed9e-c305-49dc-871a-967cb31e9c69', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups'} Body: b'{"group": {"id": "3aa8d773-02b1-4745-8dd8-3b3344f7e56e", "name": "tempest-GroupSnaphotsV314RbacTest-Group-118762254"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:22.066 39 INFO tempest.lib.common.rest_client [req-207bdff0-0128-481b-a9a1-e91acedcd301 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.228s 2020-11-06 18:04:22.066 39 DEBUG tempest.lib.common.rest_client [req-207bdff0-0128-481b-a9a1-e91acedcd301 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-207bdff0-0128-481b-a9a1-e91acedcd301', 'x-compute-request-id': 'req-207bdff0-0128-481b-a9a1-e91acedcd301', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:22.091 37 INFO tempest.lib.common.rest_client [req-996e5db8-4b0b-46c6-845a-d46c64789a24 ] Request (GroupSnaphotsV314RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups/3aa8d773-02b1-4745-8dd8-3b3344f7e56e 0.044s 2020-11-06 18:04:22.092 37 DEBUG tempest.lib.common.rest_client [req-996e5db8-4b0b-46c6-845a-d46c64789a24 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-996e5db8-4b0b-46c6-845a-d46c64789a24', 'content-length': '398', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-996e5db8-4b0b-46c6-845a-d46c64789a24', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups/3aa8d773-02b1-4745-8dd8-3b3344f7e56e'} Body: b'{"group": {"id": "3aa8d773-02b1-4745-8dd8-3b3344f7e56e", "status": "creating", "availability_zone": "nova", "created_at": "2020-11-06T18:04:22.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Group-118762254", "description": null, "group_type": "ae9d7ad0-15d9-476d-bd34-65ff46529805", "volume_types": ["a993444b-aecd-4be2-a630-97aa45840329"], "group_snapshot_id": null, "source_group_id": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:22.422 40 INFO tempest.lib.common.rest_client [req-2c77c3e3-b5fe-4aae-8c34-86d72e7d81e5 ] Request (VolumesBasicCrudV3RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/43e2b2ff-4bb3-4ed0-b427-68966fe4aa01 0.054s 2020-11-06 18:04:22.422 40 DEBUG tempest.lib.common.rest_client [req-2c77c3e3-b5fe-4aae-8c34-86d72e7d81e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-2c77c3e3-b5fe-4aae-8c34-86d72e7d81e5', 'x-openstack-request-id': 'req-2c77c3e3-b5fe-4aae-8c34-86d72e7d81e5', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/43e2b2ff-4bb3-4ed0-b427-68966fe4aa01'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 43e2b2ff-4bb3-4ed0-b427-68966fe4aa01 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:22.424 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:22.428 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:delete, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:22.645 40 INFO tempest.lib.common.rest_client [req-15fa09df-6471-4121-a0ce-7f3ef729b96b ] Request (VolumesBasicCrudV3RbacTest:test_delete_volume): 202 POST http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes 0.216s 2020-11-06 18:04:22.645 40 DEBUG tempest.lib.common.rest_client [req-15fa09df-6471-4121-a0ce-7f3ef729b96b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-720315159"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-15fa09df-6471-4121-a0ce-7f3ef729b96b', 'content-length': '846', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-15fa09df-6471-4121-a0ce-7f3ef729b96b', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes'} Body: b'{"volume": {"id": "0837a50c-8a9d-450c-989a-31153120a419", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:23.000000", "updated_at": null, "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-720315159", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/0837a50c-8a9d-450c-989a-31153120a419"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/0837a50c-8a9d-450c-989a-31153120a419"}], "user_id": "9497097058db40ffabed3f7664e6f4b0", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:22.725 40 INFO tempest.lib.common.rest_client [req-a25442b2-fae5-4e50-ac7b-b574eb813678 ] Request (VolumesBasicCrudV3RbacTest:test_delete_volume): 200 GET http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/0837a50c-8a9d-450c-989a-31153120a419 0.070s 2020-11-06 18:04:22.725 40 DEBUG tempest.lib.common.rest_client [req-a25442b2-fae5-4e50-ac7b-b574eb813678 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a25442b2-fae5-4e50-ac7b-b574eb813678', 'content-length': '1025', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a25442b2-fae5-4e50-ac7b-b574eb813678', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/0837a50c-8a9d-450c-989a-31153120a419'} Body: b'{"volume": {"id": "0837a50c-8a9d-450c-989a-31153120a419", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:23.000000", "updated_at": null, "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-720315159", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/0837a50c-8a9d-450c-989a-31153120a419"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/0837a50c-8a9d-450c-989a-31153120a419"}], "user_id": "9497097058db40ffabed3f7664e6f4b0", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": null, "os-vol-tenant-attr:tenant_id": "c70129f43ea14e7c8b66bff39d8e9aeb"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:23.142 37 INFO tempest.lib.common.rest_client [req-91c43a48-6992-4be3-ab95-0bb23085cc7a ] Request (GroupSnaphotsV314RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups/3aa8d773-02b1-4745-8dd8-3b3344f7e56e 0.044s 2020-11-06 18:04:23.143 37 DEBUG tempest.lib.common.rest_client [req-91c43a48-6992-4be3-ab95-0bb23085cc7a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-91c43a48-6992-4be3-ab95-0bb23085cc7a', 'content-length': '399', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-91c43a48-6992-4be3-ab95-0bb23085cc7a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups/3aa8d773-02b1-4745-8dd8-3b3344f7e56e'} Body: b'{"group": {"id": "3aa8d773-02b1-4745-8dd8-3b3344f7e56e", "status": "available", "availability_zone": "nova", "created_at": "2020-11-06T18:04:22.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Group-118762254", "description": null, "group_type": "ae9d7ad0-15d9-476d-bd34-65ff46529805", "volume_types": ["a993444b-aecd-4be2-a630-97aa45840329"], "group_snapshot_id": null, "source_group_id": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:23.149 37 INFO tempest.common.waiters [-] group 3aa8d773-02b1-4745-8dd8-3b3344f7e56e reached available after waiting for 1.148933 seconds 2020-11-06 18:04:23.299 39 INFO tempest.lib.common.rest_client [req-dbbb5c43-2ece-48dc-8477-b83c55cb94c0 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.214s 2020-11-06 18:04:23.299 39 DEBUG tempest.lib.common.rest_client [req-dbbb5c43-2ece-48dc-8477-b83c55cb94c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dbbb5c43-2ece-48dc-8477-b83c55cb94c0', 'x-compute-request-id': 'req-dbbb5c43-2ece-48dc-8477-b83c55cb94c0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:23.504 37 INFO tempest.lib.common.rest_client [req-c20dfea8-d34e-4ed5-bfbe-f85a4e3599eb ] Request (GroupSnaphotsV314RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes 0.354s 2020-11-06 18:04:23.504 37 DEBUG tempest.lib.common.rest_client [req-c20dfea8-d34e-4ed5-bfbe-f85a4e3599eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"volume": {"volume_type": "a993444b-aecd-4be2-a630-97aa45840329", "group_id": "3aa8d773-02b1-4745-8dd8-3b3344f7e56e", "size": 1, "name": "tempest-GroupSnaphotsV314RbacTest-Volume-1400797055"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c20dfea8-d34e-4ed5-bfbe-f85a4e3599eb', 'content-length': '950', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c20dfea8-d34e-4ed5-bfbe-f85a4e3599eb', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes'} Body: b'{"volume": {"id": "51a53e23-ae8f-4ff2-9bd3-c88627c9cbf4", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:23.000000", "updated_at": null, "name": "tempest-GroupSnaphotsV314RbacTest-Volume-1400797055", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-1532267561", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/51a53e23-ae8f-4ff2-9bd3-c88627c9cbf4"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/479cc71352d449a5aae47dadceb27a30/volumes/51a53e23-ae8f-4ff2-9bd3-c88627c9cbf4"}], "user_id": "79626ff2a9f24f28b269e0967e684da6", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "3aa8d773-02b1-4745-8dd8-3b3344f7e56e"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:23.609 37 INFO tempest.lib.common.rest_client [req-89617ea0-ddf8-4682-bfc2-0f8074780436 ] Request (GroupSnaphotsV314RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/51a53e23-ae8f-4ff2-9bd3-c88627c9cbf4 0.093s 2020-11-06 18:04:23.610 37 DEBUG tempest.lib.common.rest_client [req-89617ea0-ddf8-4682-bfc2-0f8074780436 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-89617ea0-ddf8-4682-bfc2-0f8074780436', 'content-length': '1172', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-89617ea0-ddf8-4682-bfc2-0f8074780436', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/51a53e23-ae8f-4ff2-9bd3-c88627c9cbf4'} Body: b'{"volume": {"id": "51a53e23-ae8f-4ff2-9bd3-c88627c9cbf4", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:23.000000", "updated_at": "2020-11-06T18:04:23.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-1400797055", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-1532267561", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/51a53e23-ae8f-4ff2-9bd3-c88627c9cbf4"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/479cc71352d449a5aae47dadceb27a30/volumes/51a53e23-ae8f-4ff2-9bd3-c88627c9cbf4"}], "user_id": "79626ff2a9f24f28b269e0967e684da6", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "3aa8d773-02b1-4745-8dd8-3b3344f7e56e", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "479cc71352d449a5aae47dadceb27a30"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:23.806 40 INFO tempest.lib.common.rest_client [req-dc9238f2-49ba-4111-b328-4067cb0d91bd ] Request (VolumesBasicCrudV3RbacTest:test_delete_volume): 200 GET http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/0837a50c-8a9d-450c-989a-31153120a419 0.067s 2020-11-06 18:04:23.806 40 DEBUG tempest.lib.common.rest_client [req-dc9238f2-49ba-4111-b328-4067cb0d91bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-dc9238f2-49ba-4111-b328-4067cb0d91bd', 'content-length': '1069', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-dc9238f2-49ba-4111-b328-4067cb0d91bd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/0837a50c-8a9d-450c-989a-31153120a419'} Body: b'{"volume": {"id": "0837a50c-8a9d-450c-989a-31153120a419", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:23.000000", "updated_at": "2020-11-06T18:04:23.000000", "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-720315159", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/0837a50c-8a9d-450c-989a-31153120a419"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/0837a50c-8a9d-450c-989a-31153120a419"}], "user_id": "9497097058db40ffabed3f7664e6f4b0", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "c70129f43ea14e7c8b66bff39d8e9aeb"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:23.815 40 INFO tempest.common.waiters [-] volume 0837a50c-8a9d-450c-989a-31153120a419 reached available after waiting for 1.815331 seconds 2020-11-06 18:04:23.815 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:23.916 40 INFO tempest.lib.common.rest_client [req-8ddaeb2d-9d60-4c0e-b7f9-eecaaee987ec ] Request (VolumesBasicCrudV3RbacTest:test_delete_volume): 200 GET http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles 0.100s 2020-11-06 18:04:23.917 40 DEBUG tempest.lib.common.rest_client [req-8ddaeb2d-9d60-4c0e-b7f9-eecaaee987ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8ddaeb2d-9d60-4c0e-b7f9-eecaaee987ec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:23.996 40 INFO tempest.lib.common.rest_client [req-e9a017fc-6066-4e97-bdd2-509fa1d07d74 ] Request (VolumesBasicCrudV3RbacTest:test_delete_volume): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.079s 2020-11-06 18:04:23.997 40 DEBUG tempest.lib.common.rest_client [req-e9a017fc-6066-4e97-bdd2-509fa1d07d74 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e9a017fc-6066-4e97-bdd2-509fa1d07d74', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9497097058db40ffabed3f7664e6f4b0", "name": "tempest-VolumesBasicCrudV3RbacTest-773376419", "password_expires_at": null}, "audit_ids": ["uyl9QbSLSaCsRBzSHn_TPg"], "expires_at": "2020-11-06T19:04:23.000000Z", "issued_at": "2020-11-06T18:04:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c70129f43ea14e7c8b66bff39d8e9aeb", "name": "tempest-VolumesBasicCrudV3RbacTest-773376419"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:24.130 40 INFO tempest.lib.common.rest_client [req-87c2ff99-6278-457d-b56c-04c5bcfce7ec ] Request (VolumesBasicCrudV3RbacTest:test_delete_volume): 202 DELETE http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/0837a50c-8a9d-450c-989a-31153120a419 0.131s 2020-11-06 18:04:24.130 40 DEBUG tempest.lib.common.rest_client [req-87c2ff99-6278-457d-b56c-04c5bcfce7ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-87c2ff99-6278-457d-b56c-04c5bcfce7ec', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/0837a50c-8a9d-450c-989a-31153120a419'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:24.131 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:24.191 40 INFO tempest.lib.common.rest_client [req-460882c7-a1c4-4325-9a63-bbfc551e5746 ] Request (VolumesBasicCrudV3RbacTest:test_delete_volume): 200 GET http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles 0.059s 2020-11-06 18:04:24.191 40 DEBUG tempest.lib.common.rest_client [req-460882c7-a1c4-4325-9a63-bbfc551e5746 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-460882c7-a1c4-4325-9a63-bbfc551e5746', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:24.226 40 INFO tempest.lib.common.rest_client [req-17001897-6129-493b-bc12-e345606907dc ] Request (VolumesBasicCrudV3RbacTest:test_delete_volume): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:04:24.226 40 DEBUG tempest.lib.common.rest_client [req-17001897-6129-493b-bc12-e345606907dc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-17001897-6129-493b-bc12-e345606907dc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9497097058db40ffabed3f7664e6f4b0", "name": "tempest-VolumesBasicCrudV3RbacTest-773376419", "password_expires_at": null}, "audit_ids": ["RqI94PZqQ36Cw8867VLZUA"], "expires_at": "2020-11-06T19:04:24.000000Z", "issued_at": "2020-11-06T18:04:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c70129f43ea14e7c8b66bff39d8e9aeb", "name": "tempest-VolumesBasicCrudV3RbacTest-773376419"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:24.363 40 INFO tempest.lib.common.rest_client [req-ad82156d-7ee4-4563-a1ff-7215123c1bcc ] Request (VolumesBasicCrudV3RbacTest:test_delete_volume): 200 GET http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/0837a50c-8a9d-450c-989a-31153120a419 0.136s 2020-11-06 18:04:24.364 40 DEBUG tempest.lib.common.rest_client [req-ad82156d-7ee4-4563-a1ff-7215123c1bcc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ad82156d-7ee4-4563-a1ff-7215123c1bcc', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ad82156d-7ee4-4563-a1ff-7215123c1bcc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/0837a50c-8a9d-450c-989a-31153120a419'} Body: b'{"volume": {"id": "0837a50c-8a9d-450c-989a-31153120a419", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:23.000000", "updated_at": "2020-11-06T18:04:24.000000", "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-720315159", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/0837a50c-8a9d-450c-989a-31153120a419"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/0837a50c-8a9d-450c-989a-31153120a419"}], "user_id": "9497097058db40ffabed3f7664e6f4b0", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "c70129f43ea14e7c8b66bff39d8e9aeb"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:24.735 37 INFO tempest.lib.common.rest_client [req-d6283799-5c14-4fa9-9ee3-f61adce9efd6 ] Request (GroupSnaphotsV314RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/51a53e23-ae8f-4ff2-9bd3-c88627c9cbf4 0.109s 2020-11-06 18:04:24.735 37 DEBUG tempest.lib.common.rest_client [req-d6283799-5c14-4fa9-9ee3-f61adce9efd6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d6283799-5c14-4fa9-9ee3-f61adce9efd6', 'content-length': '1173', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d6283799-5c14-4fa9-9ee3-f61adce9efd6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/51a53e23-ae8f-4ff2-9bd3-c88627c9cbf4'} Body: b'{"volume": {"id": "51a53e23-ae8f-4ff2-9bd3-c88627c9cbf4", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:23.000000", "updated_at": "2020-11-06T18:04:24.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-1400797055", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-1532267561", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/51a53e23-ae8f-4ff2-9bd3-c88627c9cbf4"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/479cc71352d449a5aae47dadceb27a30/volumes/51a53e23-ae8f-4ff2-9bd3-c88627c9cbf4"}], "user_id": "79626ff2a9f24f28b269e0967e684da6", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "3aa8d773-02b1-4745-8dd8-3b3344f7e56e", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "479cc71352d449a5aae47dadceb27a30"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:24.750 37 INFO tempest.common.waiters [-] volume 51a53e23-ae8f-4ff2-9bd3-c88627c9cbf4 reached available after waiting for 1.750617 seconds 2020-11-06 18:04:24.751 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:24.771 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:create_group_snapshot, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:24.771 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:24.828 37 INFO tempest.lib.common.rest_client [req-9fc1bc49-9feb-4d5d-b50f-705e98cf7856 ] Request (GroupSnaphotsV314RbacTest:test_create_group_snapshot): 200 GET http://172.30.13.94/identity/v3/projects/479cc71352d449a5aae47dadceb27a30/users/79626ff2a9f24f28b269e0967e684da6/roles 0.056s 2020-11-06 18:04:24.828 37 DEBUG tempest.lib.common.rest_client [req-9fc1bc49-9feb-4d5d-b50f-705e98cf7856 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9fc1bc49-9feb-4d5d-b50f-705e98cf7856', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/479cc71352d449a5aae47dadceb27a30/users/79626ff2a9f24f28b269e0967e684da6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/479cc71352d449a5aae47dadceb27a30/users/79626ff2a9f24f28b269e0967e684da6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:24.913 37 INFO tempest.lib.common.rest_client [req-ffb315c5-8aff-4a45-94d5-58f9e43fede1 ] Request (GroupSnaphotsV314RbacTest:test_create_group_snapshot): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 18:04:24.913 37 DEBUG tempest.lib.common.rest_client [req-ffb315c5-8aff-4a45-94d5-58f9e43fede1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ffb315c5-8aff-4a45-94d5-58f9e43fede1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "79626ff2a9f24f28b269e0967e684da6", "name": "tempest-GroupSnaphotsV314RbacTest-640793486", "password_expires_at": null}, "audit_ids": ["OHNLrCg3R6m9IGs-tDlFIQ"], "expires_at": "2020-11-06T19:04:24.000000Z", "issued_at": "2020-11-06T18:04:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "479cc71352d449a5aae47dadceb27a30", "name": "tempest-GroupSnaphotsV314RbacTest-640793486"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:25.330 37 INFO tempest.lib.common.rest_client [req-5396bafe-2b73-43c7-a575-e97c5d0cb316 ] Request (GroupSnaphotsV314RbacTest:test_create_group_snapshot): 202 POST http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_snapshots 0.416s 2020-11-06 18:04:25.331 37 DEBUG tempest.lib.common.rest_client [req-5396bafe-2b73-43c7-a575-e97c5d0cb316 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"group_snapshot": {"name": "tempest-GroupSnaphotsV314RbacTest-Group_Snapshot-366180704", "group_id": "3aa8d773-02b1-4745-8dd8-3b3344f7e56e"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-5396bafe-2b73-43c7-a575-e97c5d0cb316', 'content-length': '193', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5396bafe-2b73-43c7-a575-e97c5d0cb316', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_snapshots'} Body: b'{"group_snapshot": {"id": "7a628204-0e41-4b55-852f-a4a79413c888", "name": "tempest-GroupSnaphotsV314RbacTest-Group_Snapshot-366180704", "group_type_id": "ae9d7ad0-15d9-476d-bd34-65ff46529805"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:25.332 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:25.388 37 INFO tempest.lib.common.rest_client [req-df9f9f0b-52d0-43ac-b8a2-ee0e20e64139 ] Request (GroupSnaphotsV314RbacTest:test_create_group_snapshot): 200 GET http://172.30.13.94/identity/v3/projects/479cc71352d449a5aae47dadceb27a30/users/79626ff2a9f24f28b269e0967e684da6/roles 0.055s 2020-11-06 18:04:25.389 37 DEBUG tempest.lib.common.rest_client [req-df9f9f0b-52d0-43ac-b8a2-ee0e20e64139 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-df9f9f0b-52d0-43ac-b8a2-ee0e20e64139', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/479cc71352d449a5aae47dadceb27a30/users/79626ff2a9f24f28b269e0967e684da6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/479cc71352d449a5aae47dadceb27a30/users/79626ff2a9f24f28b269e0967e684da6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:25.424 37 INFO tempest.lib.common.rest_client [req-62507c0a-dc12-4ce0-8f44-b82243c3382f ] Request (GroupSnaphotsV314RbacTest:test_create_group_snapshot): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:04:25.424 37 DEBUG tempest.lib.common.rest_client [req-62507c0a-dc12-4ce0-8f44-b82243c3382f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-62507c0a-dc12-4ce0-8f44-b82243c3382f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "79626ff2a9f24f28b269e0967e684da6", "name": "tempest-GroupSnaphotsV314RbacTest-640793486", "password_expires_at": null}, "audit_ids": ["G4RI0Ag0S0KHlREii0K86g"], "expires_at": "2020-11-06T19:04:25.000000Z", "issued_at": "2020-11-06T18:04:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "479cc71352d449a5aae47dadceb27a30", "name": "tempest-GroupSnaphotsV314RbacTest-640793486"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:25.428 40 INFO tempest.lib.common.rest_client [req-63a108ec-3d80-491e-8233-13ad80595e23 ] Request (VolumesBasicCrudV3RbacTest:test_delete_volume): 404 GET http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/0837a50c-8a9d-450c-989a-31153120a419 0.049s 2020-11-06 18:04:25.428 40 DEBUG tempest.lib.common.rest_client [req-63a108ec-3d80-491e-8233-13ad80595e23 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-63a108ec-3d80-491e-8233-13ad80595e23', 'x-openstack-request-id': 'req-63a108ec-3d80-491e-8233-13ad80595e23', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/0837a50c-8a9d-450c-989a-31153120a419'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 0837a50c-8a9d-450c-989a-31153120a419 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:25.431 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:25.435 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:get_all, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:25.435 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:25.489 40 INFO tempest.lib.common.rest_client [req-bd0ee970-2ca6-4821-8002-8ca2a59597f1 ] Request (VolumesBasicCrudV3RbacTest:test_list_volumes): 200 GET http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles 0.053s 2020-11-06 18:04:25.490 40 DEBUG tempest.lib.common.rest_client [req-bd0ee970-2ca6-4821-8002-8ca2a59597f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bd0ee970-2ca6-4821-8002-8ca2a59597f1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:25.506 37 INFO tempest.lib.common.rest_client [req-8675e569-75bf-4e15-87f7-70498ed5cabc ] Request (GroupSnaphotsV314RbacTest:test_create_group_snapshot): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_snapshots/7a628204-0e41-4b55-852f-a4a79413c888 0.080s 2020-11-06 18:04:25.507 37 DEBUG tempest.lib.common.rest_client [req-8675e569-75bf-4e15-87f7-70498ed5cabc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-8675e569-75bf-4e15-87f7-70498ed5cabc', 'content-length': '332', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8675e569-75bf-4e15-87f7-70498ed5cabc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_snapshots/7a628204-0e41-4b55-852f-a4a79413c888'} Body: b'{"group_snapshot": {"id": "7a628204-0e41-4b55-852f-a4a79413c888", "group_id": "3aa8d773-02b1-4745-8dd8-3b3344f7e56e", "group_type_id": "ae9d7ad0-15d9-476d-bd34-65ff46529805", "status": "creating", "created_at": "2020-11-06T18:04:25.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Group_Snapshot-366180704", "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:25.523 40 INFO tempest.lib.common.rest_client [req-12e142b5-ef9d-4af6-8c01-9aa3debcadbc ] Request (VolumesBasicCrudV3RbacTest:test_list_volumes): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:04:25.523 40 DEBUG tempest.lib.common.rest_client [req-12e142b5-ef9d-4af6-8c01-9aa3debcadbc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-12e142b5-ef9d-4af6-8c01-9aa3debcadbc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9497097058db40ffabed3f7664e6f4b0", "name": "tempest-VolumesBasicCrudV3RbacTest-773376419", "password_expires_at": null}, "audit_ids": ["6ev7sq__THKJyaG6YlwnUQ"], "expires_at": "2020-11-06T19:04:25.000000Z", "issued_at": "2020-11-06T18:04:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c70129f43ea14e7c8b66bff39d8e9aeb", "name": "tempest-VolumesBasicCrudV3RbacTest-773376419"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:25.630 40 INFO tempest.lib.common.rest_client [req-eaf9eab2-b86b-49a9-bcd6-0616783ec483 ] Request (VolumesBasicCrudV3RbacTest:test_list_volumes): 200 GET http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes 0.105s 2020-11-06 18:04:25.630 40 DEBUG tempest.lib.common.rest_client [req-eaf9eab2-b86b-49a9-bcd6-0616783ec483 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-eaf9eab2-b86b-49a9-bcd6-0616783ec483', 'content-length': '408', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-eaf9eab2-b86b-49a9-bcd6-0616783ec483', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes'} Body: b'{"volumes": [{"id": "c35703a5-6915-41b9-846d-3f7cb72d3baa", "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-766319570", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/c35703a5-6915-41b9-846d-3f7cb72d3baa"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/c35703a5-6915-41b9-846d-3f7cb72d3baa"}]}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:25.636 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:25.685 40 INFO tempest.lib.common.rest_client [req-eef9a6d7-08d2-4c27-9f61-9529ac0efe49 ] Request (VolumesBasicCrudV3RbacTest:test_list_volumes): 200 GET http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles 0.048s 2020-11-06 18:04:25.686 40 DEBUG tempest.lib.common.rest_client [req-eef9a6d7-08d2-4c27-9f61-9529ac0efe49 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eef9a6d7-08d2-4c27-9f61-9529ac0efe49', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:25.712 39 INFO tempest.lib.common.rest_client [req-d042ace0-dc37-476b-99af-824d7b21cab0 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 1.400s 2020-11-06 18:04:25.713 39 DEBUG tempest.lib.common.rest_client [req-d042ace0-dc37-476b-99af-824d7b21cab0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d042ace0-dc37-476b-99af-824d7b21cab0', 'x-compute-request-id': 'req-d042ace0-dc37-476b-99af-824d7b21cab0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:25.717 40 INFO tempest.lib.common.rest_client [req-4903a186-2657-4b01-8575-4574e5986fd0 ] Request (VolumesBasicCrudV3RbacTest:test_list_volumes): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:04:25.718 40 DEBUG tempest.lib.common.rest_client [req-4903a186-2657-4b01-8575-4574e5986fd0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4903a186-2657-4b01-8575-4574e5986fd0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9497097058db40ffabed3f7664e6f4b0", "name": "tempest-VolumesBasicCrudV3RbacTest-773376419", "password_expires_at": null}, "audit_ids": ["zw6_3ZRUT2OoUhanlah3cg"], "expires_at": "2020-11-06T19:04:25.000000Z", "issued_at": "2020-11-06T18:04:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c70129f43ea14e7c8b66bff39d8e9aeb", "name": "tempest-VolumesBasicCrudV3RbacTest-773376419"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:25.720 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:25.723 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:get_all, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:25.724 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:25.771 40 INFO tempest.lib.common.rest_client [req-f4f8aacf-f64b-4a07-82ef-213a620719de ] Request (VolumesBasicCrudV3RbacTest:test_list_volumes_with_details): 200 GET http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles 0.046s 2020-11-06 18:04:25.771 40 DEBUG tempest.lib.common.rest_client [req-f4f8aacf-f64b-4a07-82ef-213a620719de ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f4f8aacf-f64b-4a07-82ef-213a620719de', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:25.805 40 INFO tempest.lib.common.rest_client [req-49710220-12d2-44a3-b667-e38e7138760a ] Request (VolumesBasicCrudV3RbacTest:test_list_volumes_with_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:04:25.805 40 DEBUG tempest.lib.common.rest_client [req-49710220-12d2-44a3-b667-e38e7138760a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-49710220-12d2-44a3-b667-e38e7138760a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9497097058db40ffabed3f7664e6f4b0", "name": "tempest-VolumesBasicCrudV3RbacTest-773376419", "password_expires_at": null}, "audit_ids": ["c7blzldaRKePsn3gJuy36g"], "expires_at": "2020-11-06T19:04:25.000000Z", "issued_at": "2020-11-06T18:04:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c70129f43ea14e7c8b66bff39d8e9aeb", "name": "tempest-VolumesBasicCrudV3RbacTest-773376419"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:25.927 40 INFO tempest.lib.common.rest_client [req-c587a801-4b53-4daf-9341-28d69dea7de4 ] Request (VolumesBasicCrudV3RbacTest:test_list_volumes_with_details): 200 GET http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/detail 0.120s 2020-11-06 18:04:25.928 40 DEBUG tempest.lib.common.rest_client [req-c587a801-4b53-4daf-9341-28d69dea7de4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c587a801-4b53-4daf-9341-28d69dea7de4', 'content-length': '1072', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c587a801-4b53-4daf-9341-28d69dea7de4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/detail'} Body: b'{"volumes": [{"id": "c35703a5-6915-41b9-846d-3f7cb72d3baa", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:11.000000", "updated_at": "2020-11-06T18:04:11.000000", "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-766319570", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/c35703a5-6915-41b9-846d-3f7cb72d3baa"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/c35703a5-6915-41b9-846d-3f7cb72d3baa"}], "user_id": "9497097058db40ffabed3f7664e6f4b0", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "c70129f43ea14e7c8b66bff39d8e9aeb"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:25.939 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:25.984 40 INFO tempest.lib.common.rest_client [req-fea6fb21-57ec-4a85-95ad-d3d93dfc44ad ] Request (VolumesBasicCrudV3RbacTest:test_list_volumes_with_details): 200 GET http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles 0.044s 2020-11-06 18:04:25.985 40 DEBUG tempest.lib.common.rest_client [req-fea6fb21-57ec-4a85-95ad-d3d93dfc44ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fea6fb21-57ec-4a85-95ad-d3d93dfc44ad', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:26.017 40 INFO tempest.lib.common.rest_client [req-416a1c16-b595-4f89-8759-4aaf99c82a76 ] Request (VolumesBasicCrudV3RbacTest:test_list_volumes_with_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:04:26.018 40 DEBUG tempest.lib.common.rest_client [req-416a1c16-b595-4f89-8759-4aaf99c82a76 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-416a1c16-b595-4f89-8759-4aaf99c82a76', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9497097058db40ffabed3f7664e6f4b0", "name": "tempest-VolumesBasicCrudV3RbacTest-773376419", "password_expires_at": null}, "audit_ids": ["9A6xG2UCQMmTwtWt4N7biA"], "expires_at": "2020-11-06T19:04:26.000000Z", "issued_at": "2020-11-06T18:04:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c70129f43ea14e7c8b66bff39d8e9aeb", "name": "tempest-VolumesBasicCrudV3RbacTest-773376419"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:26.020 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:26.023 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:get, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:26.023 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:26.073 40 INFO tempest.lib.common.rest_client [req-34fdf48b-3db4-40b7-82f3-defa94612a1e ] Request (VolumesBasicCrudV3RbacTest:test_show_volume): 200 GET http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles 0.049s 2020-11-06 18:04:26.074 40 DEBUG tempest.lib.common.rest_client [req-34fdf48b-3db4-40b7-82f3-defa94612a1e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-34fdf48b-3db4-40b7-82f3-defa94612a1e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:26.105 40 INFO tempest.lib.common.rest_client [req-1f668c45-6174-4992-97f4-d41523893339 ] Request (VolumesBasicCrudV3RbacTest:test_show_volume): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:04:26.106 40 DEBUG tempest.lib.common.rest_client [req-1f668c45-6174-4992-97f4-d41523893339 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1f668c45-6174-4992-97f4-d41523893339', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9497097058db40ffabed3f7664e6f4b0", "name": "tempest-VolumesBasicCrudV3RbacTest-773376419", "password_expires_at": null}, "audit_ids": ["XTfTf3d3QFG8btxMhD3hlw"], "expires_at": "2020-11-06T19:04:26.000000Z", "issued_at": "2020-11-06T18:04:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c70129f43ea14e7c8b66bff39d8e9aeb", "name": "tempest-VolumesBasicCrudV3RbacTest-773376419"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:26.246 40 INFO tempest.lib.common.rest_client [req-4981ca9d-f234-4f81-87c1-0ef36b7771a7 ] Request (VolumesBasicCrudV3RbacTest:test_show_volume): 200 GET http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/c35703a5-6915-41b9-846d-3f7cb72d3baa 0.139s 2020-11-06 18:04:26.247 40 DEBUG tempest.lib.common.rest_client [req-4981ca9d-f234-4f81-87c1-0ef36b7771a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4981ca9d-f234-4f81-87c1-0ef36b7771a7', 'content-length': '1069', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4981ca9d-f234-4f81-87c1-0ef36b7771a7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/c35703a5-6915-41b9-846d-3f7cb72d3baa'} Body: b'{"volume": {"id": "c35703a5-6915-41b9-846d-3f7cb72d3baa", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:11.000000", "updated_at": "2020-11-06T18:04:11.000000", "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-766319570", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/c35703a5-6915-41b9-846d-3f7cb72d3baa"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/c35703a5-6915-41b9-846d-3f7cb72d3baa"}], "user_id": "9497097058db40ffabed3f7664e6f4b0", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "c70129f43ea14e7c8b66bff39d8e9aeb"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:26.259 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:26.308 40 INFO tempest.lib.common.rest_client [req-0b0d1eb6-a614-41dc-a715-f84eb92ea5ca ] Request (VolumesBasicCrudV3RbacTest:test_show_volume): 200 GET http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles 0.048s 2020-11-06 18:04:26.308 40 DEBUG tempest.lib.common.rest_client [req-0b0d1eb6-a614-41dc-a715-f84eb92ea5ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0b0d1eb6-a614-41dc-a715-f84eb92ea5ca', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:26.342 40 INFO tempest.lib.common.rest_client [req-e4113179-f0dd-4ea0-bb55-99cb45370641 ] Request (VolumesBasicCrudV3RbacTest:test_show_volume): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:04:26.343 40 DEBUG tempest.lib.common.rest_client [req-e4113179-f0dd-4ea0-bb55-99cb45370641 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e4113179-f0dd-4ea0-bb55-99cb45370641', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9497097058db40ffabed3f7664e6f4b0", "name": "tempest-VolumesBasicCrudV3RbacTest-773376419", "password_expires_at": null}, "audit_ids": ["ojymXkmMTXO2HdeM8cQhfw"], "expires_at": "2020-11-06T19:04:26.000000Z", "issued_at": "2020-11-06T18:04:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c70129f43ea14e7c8b66bff39d8e9aeb", "name": "tempest-VolumesBasicCrudV3RbacTest-773376419"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:26.345 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:26.348 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:update, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:26.348 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:26.394 40 INFO tempest.lib.common.rest_client [req-65973e5c-0441-4164-a174-67a9ece95a0c ] Request (VolumesBasicCrudV3RbacTest:test_update_volume): 200 GET http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles 0.045s 2020-11-06 18:04:26.395 40 DEBUG tempest.lib.common.rest_client [req-65973e5c-0441-4164-a174-67a9ece95a0c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-65973e5c-0441-4164-a174-67a9ece95a0c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:26.425 40 INFO tempest.lib.common.rest_client [req-3b562c54-db57-44cd-bb61-1eed061372da ] Request (VolumesBasicCrudV3RbacTest:test_update_volume): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.029s 2020-11-06 18:04:26.425 40 DEBUG tempest.lib.common.rest_client [req-3b562c54-db57-44cd-bb61-1eed061372da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3b562c54-db57-44cd-bb61-1eed061372da', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9497097058db40ffabed3f7664e6f4b0", "name": "tempest-VolumesBasicCrudV3RbacTest-773376419", "password_expires_at": null}, "audit_ids": ["csa_04r6QGSvvetzgU0pGg"], "expires_at": "2020-11-06T19:04:26.000000Z", "issued_at": "2020-11-06T18:04:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c70129f43ea14e7c8b66bff39d8e9aeb", "name": "tempest-VolumesBasicCrudV3RbacTest-773376419"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:26.537 37 INFO tempest.lib.common.rest_client [req-57c60304-c6ab-40b8-a9e1-11863800cc7c ] Request (GroupSnaphotsV314RbacTest:test_create_group_snapshot): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_snapshots/7a628204-0e41-4b55-852f-a4a79413c888 0.025s 2020-11-06 18:04:26.537 37 DEBUG tempest.lib.common.rest_client [req-57c60304-c6ab-40b8-a9e1-11863800cc7c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-57c60304-c6ab-40b8-a9e1-11863800cc7c', 'content-length': '333', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-57c60304-c6ab-40b8-a9e1-11863800cc7c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_snapshots/7a628204-0e41-4b55-852f-a4a79413c888'} Body: b'{"group_snapshot": {"id": "7a628204-0e41-4b55-852f-a4a79413c888", "group_id": "3aa8d773-02b1-4745-8dd8-3b3344f7e56e", "group_type_id": "ae9d7ad0-15d9-476d-bd34-65ff46529805", "status": "available", "created_at": "2020-11-06T18:04:25.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Group_Snapshot-366180704", "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:26.541 37 INFO tempest.common.waiters [-] group_snapshot 7a628204-0e41-4b55-852f-a4a79413c888 reached available after waiting for 1.541764 seconds 2020-11-06 18:04:26.572 37 INFO tempest.lib.common.rest_client [req-2fac34cc-af9b-49e3-b930-f8fa6af9b4f4 ] Request (GroupSnaphotsV314RbacTest:test_create_group_snapshot): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/snapshots/detail 0.029s 2020-11-06 18:04:26.572 37 DEBUG tempest.lib.common.rest_client [req-2fac34cc-af9b-49e3-b930-f8fa6af9b4f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-2fac34cc-af9b-49e3-b930-f8fa6af9b4f4', 'content-length': '479', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2fac34cc-af9b-49e3-b930-f8fa6af9b4f4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/snapshots/detail'} Body: b'{"snapshots": [{"id": "33a2cc53-ba2f-4bd3-a72a-6e0031794f4a", "created_at": "2020-11-06T18:04:25.000000", "updated_at": "2020-11-06T18:04:26.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Group_Snapshot-366180704", "description": null, "volume_id": "51a53e23-ae8f-4ff2-9bd3-c88627c9cbf4", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "479cc71352d449a5aae47dadceb27a30", "os-extended-snapshot-attributes:progress": "100%"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:26.616 37 INFO tempest.lib.common.rest_client [req-f5341101-10f2-45fe-8dc1-abbc2e2286c9 ] Request (GroupSnaphotsV314RbacTest:test_create_group_snapshot): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/snapshots/33a2cc53-ba2f-4bd3-a72a-6e0031794f4a 0.036s 2020-11-06 18:04:26.616 37 DEBUG tempest.lib.common.rest_client [req-f5341101-10f2-45fe-8dc1-abbc2e2286c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-f5341101-10f2-45fe-8dc1-abbc2e2286c9', 'content-length': '476', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f5341101-10f2-45fe-8dc1-abbc2e2286c9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/snapshots/33a2cc53-ba2f-4bd3-a72a-6e0031794f4a'} Body: b'{"snapshot": {"id": "33a2cc53-ba2f-4bd3-a72a-6e0031794f4a", "created_at": "2020-11-06T18:04:25.000000", "updated_at": "2020-11-06T18:04:26.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Group_Snapshot-366180704", "description": null, "volume_id": "51a53e23-ae8f-4ff2-9bd3-c88627c9cbf4", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "479cc71352d449a5aae47dadceb27a30", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:26.619 37 INFO tempest.common.waiters [-] snapshot 33a2cc53-ba2f-4bd3-a72a-6e0031794f4a reached available after waiting for 0.619837 seconds 2020-11-06 18:04:26.675 37 INFO tempest.lib.common.rest_client [req-a8b88417-5514-472c-9dab-63cb8e66c52e ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_snapshots/7a628204-0e41-4b55-852f-a4a79413c888 0.054s 2020-11-06 18:04:26.676 37 DEBUG tempest.lib.common.rest_client [req-a8b88417-5514-472c-9dab-63cb8e66c52e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a8b88417-5514-472c-9dab-63cb8e66c52e', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_snapshots/7a628204-0e41-4b55-852f-a4a79413c888'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:26.761 37 INFO tempest.lib.common.rest_client [req-ebbfb51f-a7df-4e1d-8f71-732be0afdfab ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/detail 0.084s 2020-11-06 18:04:26.762 37 DEBUG tempest.lib.common.rest_client [req-ebbfb51f-a7df-4e1d-8f71-732be0afdfab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ebbfb51f-a7df-4e1d-8f71-732be0afdfab', 'content-length': '1176', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ebbfb51f-a7df-4e1d-8f71-732be0afdfab', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/detail'} Body: b'{"volumes": [{"id": "51a53e23-ae8f-4ff2-9bd3-c88627c9cbf4", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:23.000000", "updated_at": "2020-11-06T18:04:24.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-1400797055", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-1532267561", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/51a53e23-ae8f-4ff2-9bd3-c88627c9cbf4"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/479cc71352d449a5aae47dadceb27a30/volumes/51a53e23-ae8f-4ff2-9bd3-c88627c9cbf4"}], "user_id": "79626ff2a9f24f28b269e0967e684da6", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "3aa8d773-02b1-4745-8dd8-3b3344f7e56e", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "479cc71352d449a5aae47dadceb27a30"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:26.762 40 INFO tempest.lib.common.rest_client [req-39c4210c-073d-4318-a67f-6145b9900171 ] Request (VolumesBasicCrudV3RbacTest:test_update_volume): 200 PUT http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/c35703a5-6915-41b9-846d-3f7cb72d3baa 0.335s 2020-11-06 18:04:26.762 40 DEBUG tempest.lib.common.rest_client [req-39c4210c-073d-4318-a67f-6145b9900171 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"name": "tempest-VolumesBasicCrudV3RbacTestvolume-504649582"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-39c4210c-073d-4318-a67f-6145b9900171', 'content-length': '870', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-39c4210c-073d-4318-a67f-6145b9900171', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/c35703a5-6915-41b9-846d-3f7cb72d3baa'} Body: b'{"volume": {"id": "c35703a5-6915-41b9-846d-3f7cb72d3baa", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:11.000000", "updated_at": "2020-11-06T18:04:11.000000", "name": "tempest-VolumesBasicCrudV3RbacTestvolume-504649582", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/c35703a5-6915-41b9-846d-3f7cb72d3baa"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/c35703a5-6915-41b9-846d-3f7cb72d3baa"}], "user_id": "9497097058db40ffabed3f7664e6f4b0", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:26.776 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:26.813 37 INFO tempest.lib.common.rest_client [req-50f7faa1-319f-464d-a949-564e66a14a26 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/snapshots/detail 0.036s 2020-11-06 18:04:26.814 37 DEBUG tempest.lib.common.rest_client [req-50f7faa1-319f-464d-a949-564e66a14a26 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-50f7faa1-319f-464d-a949-564e66a14a26', 'content-length': '478', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-50f7faa1-319f-464d-a949-564e66a14a26', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/snapshots/detail'} Body: b'{"snapshots": [{"id": "33a2cc53-ba2f-4bd3-a72a-6e0031794f4a", "created_at": "2020-11-06T18:04:25.000000", "updated_at": "2020-11-06T18:04:27.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Group_Snapshot-366180704", "description": null, "volume_id": "51a53e23-ae8f-4ff2-9bd3-c88627c9cbf4", "status": "deleting", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "479cc71352d449a5aae47dadceb27a30", "os-extended-snapshot-attributes:progress": "100%"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:26.825 40 INFO tempest.lib.common.rest_client [req-7cef449d-1aaf-4db8-9059-ff8a4c075fb1 ] Request (VolumesBasicCrudV3RbacTest:test_update_volume): 200 GET http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles 0.049s 2020-11-06 18:04:26.826 40 DEBUG tempest.lib.common.rest_client [req-7cef449d-1aaf-4db8-9059-ff8a4c075fb1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7cef449d-1aaf-4db8-9059-ff8a4c075fb1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb/users/9497097058db40ffabed3f7664e6f4b0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:26.847 37 INFO tempest.lib.common.rest_client [req-70593a11-c292-431a-8819-344f8a0ce130 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/snapshots/33a2cc53-ba2f-4bd3-a72a-6e0031794f4a 0.025s 2020-11-06 18:04:26.848 37 DEBUG tempest.lib.common.rest_client [req-70593a11-c292-431a-8819-344f8a0ce130 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-70593a11-c292-431a-8819-344f8a0ce130', 'content-length': '475', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-70593a11-c292-431a-8819-344f8a0ce130', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/snapshots/33a2cc53-ba2f-4bd3-a72a-6e0031794f4a'} Body: b'{"snapshot": {"id": "33a2cc53-ba2f-4bd3-a72a-6e0031794f4a", "created_at": "2020-11-06T18:04:25.000000", "updated_at": "2020-11-06T18:04:27.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Group_Snapshot-366180704", "description": null, "volume_id": "51a53e23-ae8f-4ff2-9bd3-c88627c9cbf4", "status": "deleting", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "479cc71352d449a5aae47dadceb27a30", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:26.861 40 INFO tempest.lib.common.rest_client [req-70d6829d-6e76-4050-bbbd-34f0facd09c5 ] Request (VolumesBasicCrudV3RbacTest:test_update_volume): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:04:26.862 40 DEBUG tempest.lib.common.rest_client [req-70d6829d-6e76-4050-bbbd-34f0facd09c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-70d6829d-6e76-4050-bbbd-34f0facd09c5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9497097058db40ffabed3f7664e6f4b0", "name": "tempest-VolumesBasicCrudV3RbacTest-773376419", "password_expires_at": null}, "audit_ids": ["95yl_QJfQOeZXgBEeqxJjA"], "expires_at": "2020-11-06T19:04:26.000000Z", "issued_at": "2020-11-06T18:04:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c70129f43ea14e7c8b66bff39d8e9aeb", "name": "tempest-VolumesBasicCrudV3RbacTest-773376419"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c70129f43ea14e7c8b66bff39d8e9aeb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:26.964 39 INFO tempest.lib.common.rest_client [req-b28cb06a-b8f3-4541-bace-1cceccdf3941 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.234s 2020-11-06 18:04:26.965 39 DEBUG tempest.lib.common.rest_client [req-b28cb06a-b8f3-4541-bace-1cceccdf3941 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b28cb06a-b8f3-4541-bace-1cceccdf3941', 'x-compute-request-id': 'req-b28cb06a-b8f3-4541-bace-1cceccdf3941', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:26.972 40 INFO tempest.lib.common.rest_client [req-636cd504-2acd-4e31-90ce-db805fde1c2b ] Request (VolumesBasicCrudV3RbacTest:tearDownClass): 404 DELETE http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/0837a50c-8a9d-450c-989a-31153120a419 0.106s 2020-11-06 18:04:26.972 40 DEBUG tempest.lib.common.rest_client [req-636cd504-2acd-4e31-90ce-db805fde1c2b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-636cd504-2acd-4e31-90ce-db805fde1c2b', 'x-openstack-request-id': 'req-636cd504-2acd-4e31-90ce-db805fde1c2b', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/0837a50c-8a9d-450c-989a-31153120a419'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 0837a50c-8a9d-450c-989a-31153120a419 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:27.043 40 INFO tempest.lib.common.rest_client [req-076cf17e-71d7-4a9d-805f-792f07f3bd98 ] Request (VolumesBasicCrudV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/c35703a5-6915-41b9-846d-3f7cb72d3baa 0.069s 2020-11-06 18:04:27.043 40 DEBUG tempest.lib.common.rest_client [req-076cf17e-71d7-4a9d-805f-792f07f3bd98 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-076cf17e-71d7-4a9d-805f-792f07f3bd98', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/c35703a5-6915-41b9-846d-3f7cb72d3baa'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:27.119 40 INFO tempest.lib.common.rest_client [req-375e94ed-9b3f-4b1d-8cb1-1b21d53dce22 ] Request (VolumesBasicCrudV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/c35703a5-6915-41b9-846d-3f7cb72d3baa 0.075s 2020-11-06 18:04:27.120 40 DEBUG tempest.lib.common.rest_client [req-375e94ed-9b3f-4b1d-8cb1-1b21d53dce22 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-375e94ed-9b3f-4b1d-8cb1-1b21d53dce22', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-375e94ed-9b3f-4b1d-8cb1-1b21d53dce22', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/c35703a5-6915-41b9-846d-3f7cb72d3baa'} Body: b'{"volume": {"id": "c35703a5-6915-41b9-846d-3f7cb72d3baa", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:11.000000", "updated_at": "2020-11-06T18:04:27.000000", "name": "tempest-VolumesBasicCrudV3RbacTestvolume-504649582", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/c35703a5-6915-41b9-846d-3f7cb72d3baa"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/c35703a5-6915-41b9-846d-3f7cb72d3baa"}], "user_id": "9497097058db40ffabed3f7664e6f4b0", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "c70129f43ea14e7c8b66bff39d8e9aeb"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:27.885 37 INFO tempest.lib.common.rest_client [req-70a12fd4-4b5d-4216-a296-021495f3de97 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/snapshots/33a2cc53-ba2f-4bd3-a72a-6e0031794f4a 0.030s 2020-11-06 18:04:27.886 37 DEBUG tempest.lib.common.rest_client [req-70a12fd4-4b5d-4216-a296-021495f3de97 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '111', 'content-type': 'application/json', 'x-compute-request-id': 'req-70a12fd4-4b5d-4216-a296-021495f3de97', 'x-openstack-request-id': 'req-70a12fd4-4b5d-4216-a296-021495f3de97', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/snapshots/33a2cc53-ba2f-4bd3-a72a-6e0031794f4a'} Body: b'{"itemNotFound": {"code": 404, "message": "Snapshot 33a2cc53-ba2f-4bd3-a72a-6e0031794f4a could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:27.903 37 INFO tempest.lib.common.rest_client [req-d6af4f3d-cdb4-4cca-9120-d0fad0ef4c11 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_snapshots/7a628204-0e41-4b55-852f-a4a79413c888 0.016s 2020-11-06 18:04:27.904 37 DEBUG tempest.lib.common.rest_client [req-d6af4f3d-cdb4-4cca-9120-d0fad0ef4c11 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'content-length': '116', 'content-type': 'application/json', 'x-compute-request-id': 'req-d6af4f3d-cdb4-4cca-9120-d0fad0ef4c11', 'x-openstack-request-id': 'req-d6af4f3d-cdb4-4cca-9120-d0fad0ef4c11', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_snapshots/7a628204-0e41-4b55-852f-a4a79413c888'} Body: b'{"itemNotFound": {"code": 404, "message": "GroupSnapshot 7a628204-0e41-4b55-852f-a4a79413c888 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:28.001 37 INFO tempest.lib.common.rest_client [req-4ca58e39-3717-4e58-8e42-c65dd2faacbf ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/detail 0.096s 2020-11-06 18:04:28.002 37 DEBUG tempest.lib.common.rest_client [req-4ca58e39-3717-4e58-8e42-c65dd2faacbf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4ca58e39-3717-4e58-8e42-c65dd2faacbf', 'content-length': '1176', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4ca58e39-3717-4e58-8e42-c65dd2faacbf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/detail'} Body: b'{"volumes": [{"id": "51a53e23-ae8f-4ff2-9bd3-c88627c9cbf4", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:23.000000", "updated_at": "2020-11-06T18:04:24.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-1400797055", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-1532267561", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/51a53e23-ae8f-4ff2-9bd3-c88627c9cbf4"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/479cc71352d449a5aae47dadceb27a30/volumes/51a53e23-ae8f-4ff2-9bd3-c88627c9cbf4"}], "user_id": "79626ff2a9f24f28b269e0967e684da6", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "3aa8d773-02b1-4745-8dd8-3b3344f7e56e", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "479cc71352d449a5aae47dadceb27a30"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:28.121 37 INFO tempest.lib.common.rest_client [req-fa2f2fe7-8e9b-43ba-8107-ea27a45828c5 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 202 POST http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups/3aa8d773-02b1-4745-8dd8-3b3344f7e56e/action 0.104s 2020-11-06 18:04:28.122 37 DEBUG tempest.lib.common.rest_client [req-fa2f2fe7-8e9b-43ba-8107-ea27a45828c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"delete": {"delete-volumes": true}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-fa2f2fe7-8e9b-43ba-8107-ea27a45828c5', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups/3aa8d773-02b1-4745-8dd8-3b3344f7e56e/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:28.175 40 INFO tempest.lib.common.rest_client [req-4ddd49b8-c961-4c4c-9c7d-066248e6ed0c ] Request (VolumesBasicCrudV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/c35703a5-6915-41b9-846d-3f7cb72d3baa 0.041s 2020-11-06 18:04:28.175 40 DEBUG tempest.lib.common.rest_client [req-4ddd49b8-c961-4c4c-9c7d-066248e6ed0c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-4ddd49b8-c961-4c4c-9c7d-066248e6ed0c', 'x-openstack-request-id': 'req-4ddd49b8-c961-4c4c-9c7d-066248e6ed0c', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/c70129f43ea14e7c8b66bff39d8e9aeb/volumes/c35703a5-6915-41b9-846d-3f7cb72d3baa'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume c35703a5-6915-41b9-846d-3f7cb72d3baa could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:28.227 37 INFO tempest.lib.common.rest_client [req-e0655c1a-fd9f-4847-ab38-e2fd3735f2e3 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/51a53e23-ae8f-4ff2-9bd3-c88627c9cbf4 0.104s 2020-11-06 18:04:28.228 37 DEBUG tempest.lib.common.rest_client [req-e0655c1a-fd9f-4847-ab38-e2fd3735f2e3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e0655c1a-fd9f-4847-ab38-e2fd3735f2e3', 'content-length': '1172', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e0655c1a-fd9f-4847-ab38-e2fd3735f2e3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/51a53e23-ae8f-4ff2-9bd3-c88627c9cbf4'} Body: b'{"volume": {"id": "51a53e23-ae8f-4ff2-9bd3-c88627c9cbf4", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:23.000000", "updated_at": "2020-11-06T18:04:28.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-1400797055", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-1532267561", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/51a53e23-ae8f-4ff2-9bd3-c88627c9cbf4"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/479cc71352d449a5aae47dadceb27a30/volumes/51a53e23-ae8f-4ff2-9bd3-c88627c9cbf4"}], "user_id": "79626ff2a9f24f28b269e0967e684da6", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "3aa8d773-02b1-4745-8dd8-3b3344f7e56e", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "479cc71352d449a5aae47dadceb27a30"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:28.231 39 INFO tempest.lib.common.rest_client [req-861d75ad-0f8e-4a96-9739-b2deb070bfe1 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.255s 2020-11-06 18:04:28.232 39 DEBUG tempest.lib.common.rest_client [req-861d75ad-0f8e-4a96-9739-b2deb070bfe1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-861d75ad-0f8e-4a96-9739-b2deb070bfe1', 'x-compute-request-id': 'req-861d75ad-0f8e-4a96-9739-b2deb070bfe1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:28.302 40 INFO tempest.lib.common.rest_client [req-e7d507bd-4243-4824-bd06-66ef8e22134f ] Request (VolumesBasicCrudV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/9497097058db40ffabed3f7664e6f4b0 0.125s 2020-11-06 18:04:28.302 40 DEBUG tempest.lib.common.rest_client [req-e7d507bd-4243-4824-bd06-66ef8e22134f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e7d507bd-4243-4824-bd06-66ef8e22134f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/9497097058db40ffabed3f7664e6f4b0'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:28.376 40 INFO tempest.lib.common.rest_client [req-da36ab5a-b17c-4b8a-863e-ec9d828f9056 ] Request (VolumesBasicCrudV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.073s 2020-11-06 18:04:28.377 40 DEBUG tempest.lib.common.rest_client [req-da36ab5a-b17c-4b8a-863e-ec9d828f9056 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-da36ab5a-b17c-4b8a-863e-ec9d828f9056', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["DHoaRNH_QfWl590Sr3d8RQ"], "expires_at": "2020-11-06T19:04:28.000000Z", "issued_at": "2020-11-06T18:04:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:28.636 40 INFO tempest.lib.common.rest_client [req-1f545336-0792-4d72-903e-446b18379c3b ] Request (VolumesBasicCrudV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=c70129f43ea14e7c8b66bff39d8e9aeb&name=default 0.258s 2020-11-06 18:04:28.636 40 DEBUG tempest.lib.common.rest_client [req-1f545336-0792-4d72-903e-446b18379c3b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-1f545336-0792-4d72-903e-446b18379c3b', 'date': 'Fri, 06 Nov 2020 18:04:28 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=c70129f43ea14e7c8b66bff39d8e9aeb&name=default'} Body: b'{"security_groups": [{"id": "f8e42d71-d096-4cec-a64a-f9ea29118615", "name": "default", "stateful": true, "tenant_id": "c70129f43ea14e7c8b66bff39d8e9aeb", "description": "Default security group", "security_group_rules": [{"id": "248cea49-9f5f-427a-ab6e-538898ca18ef", "tenant_id": "c70129f43ea14e7c8b66bff39d8e9aeb", "security_group_id": "f8e42d71-d096-4cec-a64a-f9ea29118615", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:04:28Z", "updated_at": "2020-11-06T18:04:28Z", "revision_number": 0, "project_id": "c70129f43ea14e7c8b66bff39d8e9aeb"}, {"id": "490b7fb5-eeef-4266-aa31-fe4195df7f44", "tenant_id": "c70129f43ea14e7c8b66bff39d8e9aeb", "security_group_id": "f8e42d71-d096-4cec-a64a-f9ea29118615", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "f8e42d71-d096-4cec-a64a-f9ea29118615", "description": null, "tags": [], "created_at": "2020-11-06T18:04:28Z", "updated_at": "2020-11-06T18:04:28Z", "revision_number": 0, "project_id": "c70129f43ea14e7c8b66bff39d8e9aeb"}, {"id": "7eb8068f-b3f7-49fa-8ecd-36d36af64837", "tenant_id": "c70129f43ea14e7c8b66bff39d8e9aeb", "security_group_id": "f8e42d71-d096-4cec-a64a-f9ea29118615", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:04:28Z", "updated_at": "2020-11-06T18:04:28Z", "revision_number": 0, "project_id": "c70129f43ea14e7c8b66bff39d8e9aeb"}, {"id": "cb02aa5a-691e-41d2-ab9c-e28751b1cf83", "tenant_id": "c70129f43ea14e7c8b66bff39d8e9aeb", "security_group_id": "f8e42d71-d096-4cec-a64a-f9ea29118615", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "f8e42d71-d096-4cec-a64a-f9ea29118615", "description": null, "tags": [], "created_at": "2020-11-06T18:04:28Z", "updated_at": "2020-11-06T18:04:28Z", "revision_number": 0, "project_id": "c70129f43ea14e7c8b66bff39d8e9aeb"}], "tags": [], "created_at": "2020-11-06T18:04:28Z", "updated_at": "2020-11-06T18:04:28Z", "revision_number": 1, "project_id": "c70129f43ea14e7c8b66bff39d8e9aeb"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:28.762 40 INFO tempest.lib.common.rest_client [req-26455418-7c14-47e5-988b-f5344d473152 ] Request (VolumesBasicCrudV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/f8e42d71-d096-4cec-a64a-f9ea29118615 0.125s 2020-11-06 18:04:28.763 40 DEBUG tempest.lib.common.rest_client [req-26455418-7c14-47e5-988b-f5344d473152 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-26455418-7c14-47e5-988b-f5344d473152', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:04:28 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/f8e42d71-d096-4cec-a64a-f9ea29118615'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:28.890 40 INFO tempest.lib.common.rest_client [req-9e7236b3-f00b-4819-b6f4-9d82f522b44c ] Request (VolumesBasicCrudV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb 0.126s 2020-11-06 18:04:28.891 40 DEBUG tempest.lib.common.rest_client [req-9e7236b3-f00b-4819-b6f4-9d82f522b44c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9e7236b3-f00b-4819-b6f4-9d82f522b44c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c70129f43ea14e7c8b66bff39d8e9aeb'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:28.981 40 INFO tempest.lib.common.rest_client [req-6a886ecc-b794-4b40-9aff-210809a3c222 ] Request (VolumeTypesAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-11-06 18:04:28.982 40 DEBUG tempest.lib.common.rest_client [req-6a886ecc-b794-4b40-9aff-210809a3c222 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6a886ecc-b794-4b40-9aff-210809a3c222', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["IwfrQdjgT8a4qqPnuCAxww"], "expires_at": "2020-11-06T19:04:28.000000Z", "issued_at": "2020-11-06T18:04:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:29.022 40 INFO tempest.lib.common.rest_client [req-7e682756-94a6-4a31-aecf-8f33a6b1ea3b ] Request (VolumeTypesAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:04:29.022 40 DEBUG tempest.lib.common.rest_client [req-7e682756-94a6-4a31-aecf-8f33a6b1ea3b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7e682756-94a6-4a31-aecf-8f33a6b1ea3b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["1LI-h1upS-u25m1RlFRUWA"], "expires_at": "2020-11-06T19:04:29.000000Z", "issued_at": "2020-11-06T18:04:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:29.077 40 INFO tempest.lib.common.rest_client [req-07b4c2ec-d9c7-4bbc-9d52-0edb05345be8 ] Request (VolumeTypesAccessRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.054s 2020-11-06 18:04:29.078 40 DEBUG tempest.lib.common.rest_client [req-07b4c2ec-d9c7-4bbc-9d52-0edb05345be8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-07b4c2ec-d9c7-4bbc-9d52-0edb05345be8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:29.140 40 INFO tempest.lib.common.rest_client [req-b4474a06-9606-4e00-b0fb-65b9b84ebbf7 ] Request (VolumeTypesAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.061s 2020-11-06 18:04:29.140 40 DEBUG tempest.lib.common.rest_client [req-b4474a06-9606-4e00-b0fb-65b9b84ebbf7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumeTypesAccessRbacTest-608335782-desc", "domain_id": "default", "name": "tempest-VolumeTypesAccessRbacTest-608335782"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '386', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b4474a06-9606-4e00-b0fb-65b9b84ebbf7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "142f16ba5e4745838cfbbffd90e1bf70", "name": "tempest-VolumeTypesAccessRbacTest-608335782", "domain_id": "default", "description": "tempest-VolumeTypesAccessRbacTest-608335782-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/142f16ba5e4745838cfbbffd90e1bf70"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:29.247 40 INFO tempest.lib.common.rest_client [req-d0c77a5d-5189-455b-ae74-8404c7f694b0 ] Request (VolumeTypesAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.105s 2020-11-06 18:04:29.247 40 DEBUG tempest.lib.common.rest_client [req-d0c77a5d-5189-455b-ae74-8404c7f694b0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumeTypesAccessRbacTest-608335782", "password": "E2_4pc98@JDWc3U", "project_id": "142f16ba5e4745838cfbbffd90e1bf70", "email": "tempest-VolumeTypesAccessRbacTest-965373549@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '404', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d0c77a5d-5189-455b-ae74-8404c7f694b0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "142f16ba5e4745838cfbbffd90e1bf70", "email": "tempest-VolumeTypesAccessRbacTest-965373549@example.com", "id": "b6e36d0933e6425398c6880bc2cfa2de", "name": "tempest-VolumeTypesAccessRbacTest-608335782", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/b6e36d0933e6425398c6880bc2cfa2de"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:29.295 37 INFO tempest.lib.common.rest_client [req-6baafd12-ec2d-4788-8147-3cd5dc9332e2 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/51a53e23-ae8f-4ff2-9bd3-c88627c9cbf4 0.049s 2020-11-06 18:04:29.296 37 DEBUG tempest.lib.common.rest_client [req-6baafd12-ec2d-4788-8147-3cd5dc9332e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-6baafd12-ec2d-4788-8147-3cd5dc9332e2', 'x-openstack-request-id': 'req-6baafd12-ec2d-4788-8147-3cd5dc9332e2', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/51a53e23-ae8f-4ff2-9bd3-c88627c9cbf4'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 51a53e23-ae8f-4ff2-9bd3-c88627c9cbf4 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:29.297 40 INFO tempest.lib.common.rest_client [req-afda31cf-f3de-4e3e-9206-9487ff429f7c ] Request (VolumeTypesAccessRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.048s 2020-11-06 18:04:29.297 40 DEBUG tempest.lib.common.rest_client [req-afda31cf-f3de-4e3e-9206-9487ff429f7c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-afda31cf-f3de-4e3e-9206-9487ff429f7c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:29.312 37 INFO tempest.lib.common.rest_client [req-18b94b64-44e8-44ad-8fbb-cd56cf94167a ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups/3aa8d773-02b1-4745-8dd8-3b3344f7e56e 0.015s 2020-11-06 18:04:29.313 37 DEBUG tempest.lib.common.rest_client [req-18b94b64-44e8-44ad-8fbb-cd56cf94167a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'content-length': '108', 'content-type': 'application/json', 'x-compute-request-id': 'req-18b94b64-44e8-44ad-8fbb-cd56cf94167a', 'x-openstack-request-id': 'req-18b94b64-44e8-44ad-8fbb-cd56cf94167a', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups/3aa8d773-02b1-4745-8dd8-3b3344f7e56e'} Body: b'{"itemNotFound": {"code": 404, "message": "Group 3aa8d773-02b1-4745-8dd8-3b3344f7e56e could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:29.339 40 INFO tempest.lib.common.rest_client [req-26446245-a50d-460a-b6e3-0e4b9184bdce ] Request (VolumeTypesAccessRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.041s 2020-11-06 18:04:29.340 40 DEBUG tempest.lib.common.rest_client [req-26446245-a50d-460a-b6e3-0e4b9184bdce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-26446245-a50d-460a-b6e3-0e4b9184bdce', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:29.353 37 INFO tempest.lib.common.rest_client [req-b30301f1-dd3e-43a8-9a61-0eeba769c010 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_types/ae9d7ad0-15d9-476d-bd34-65ff46529805 0.039s 2020-11-06 18:04:29.353 37 DEBUG tempest.lib.common.rest_client [req-b30301f1-dd3e-43a8-9a61-0eeba769c010 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b30301f1-dd3e-43a8-9a61-0eeba769c010', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_types/ae9d7ad0-15d9-476d-bd34-65ff46529805'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:29.403 40 INFO tempest.lib.common.rest_client [req-0d3e442b-21ba-467f-b953-edeb4873f911 ] Request (VolumeTypesAccessRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/142f16ba5e4745838cfbbffd90e1bf70/users/b6e36d0933e6425398c6880bc2cfa2de/roles/72a4576c553448cd941b052c1ca0cf2d 0.063s 2020-11-06 18:04:29.404 40 DEBUG tempest.lib.common.rest_client [req-0d3e442b-21ba-467f-b953-edeb4873f911 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0d3e442b-21ba-467f-b953-edeb4873f911', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/142f16ba5e4745838cfbbffd90e1bf70/users/b6e36d0933e6425398c6880bc2cfa2de/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:29.404 40 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumeTypesAccessRbacTest-608335782', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '142f16ba5e4745838cfbbffd90e1bf70', 'project_name': 'tempest-VolumeTypesAccessRbacTest-608335782', 'tenant_id': '142f16ba5e4745838cfbbffd90e1bf70', 'tenant_name': 'tempest-VolumeTypesAccessRbacTest-608335782', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'b6e36d0933e6425398c6880bc2cfa2de'}, Network: None, Subnet: None, Router: None 2020-11-06 18:04:29.404 40 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumeTypesAccessRbacTest-608335782', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '142f16ba5e4745838cfbbffd90e1bf70', 'project_name': 'tempest-VolumeTypesAccessRbacTest-608335782', 'tenant_id': '142f16ba5e4745838cfbbffd90e1bf70', 'tenant_name': 'tempest-VolumeTypesAccessRbacTest-608335782', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'b6e36d0933e6425398c6880bc2cfa2de'}, Network: None, Subnet: None, Router: None 2020-11-06 18:04:29.406 37 INFO tempest.lib.common.rest_client [req-a33682fd-8e26-4ced-ad0c-94197d3ca6fb ] Request (GroupSnaphotsV314RbacTest:setUp): 200 POST http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/types 0.049s 2020-11-06 18:04:29.407 37 DEBUG tempest.lib.common.rest_client [req-a33682fd-8e26-4ced-ad0c-94197d3ca6fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-GroupSnaphotsV314RbacTest-volume-type-581628133"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a33682fd-8e26-4ced-ad0c-94197d3ca6fb', 'content-length': '230', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a33682fd-8e26-4ced-ad0c-94197d3ca6fb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/types'} Body: b'{"volume_type": {"id": "d54d3b7e-1806-46b6-bd02-1deb389d2b17", "name": "tempest-GroupSnaphotsV314RbacTest-volume-type-581628133", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:29.455 37 INFO tempest.lib.common.rest_client [req-32ce50c0-dda5-4ade-86c7-2303dc73b702 ] Request (GroupSnaphotsV314RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_types 0.043s 2020-11-06 18:04:29.456 37 DEBUG tempest.lib.common.rest_client [req-32ce50c0-dda5-4ade-86c7-2303dc73b702 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupSnaphotsV314RbacTest-group-type-57234917"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-32ce50c0-dda5-4ade-86c7-2303dc73b702', 'content-length': '186', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-32ce50c0-dda5-4ade-86c7-2303dc73b702', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_types'} Body: b'{"group_type": {"id": "7681bb3a-1cb4-48d8-8029-984cfc12ac8e", "name": "tempest-GroupSnaphotsV314RbacTest-group-type-57234917", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:29.484 39 INFO tempest.lib.common.rest_client [req-02995fcd-faec-4672-8d5f-1f9305cd7198 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.237s 2020-11-06 18:04:29.484 39 DEBUG tempest.lib.common.rest_client [req-02995fcd-faec-4672-8d5f-1f9305cd7198 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-02995fcd-faec-4672-8d5f-1f9305cd7198', 'x-compute-request-id': 'req-02995fcd-faec-4672-8d5f-1f9305cd7198', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:29.514 40 INFO tempest.lib.common.rest_client [req-c5d607d4-7f1d-4a87-b338-e5940405656b ] Request (VolumeTypesAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.103s 2020-11-06 18:04:29.515 40 DEBUG tempest.lib.common.rest_client [req-c5d607d4-7f1d-4a87-b338-e5940405656b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6579', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c5d607d4-7f1d-4a87-b338-e5940405656b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b6e36d0933e6425398c6880bc2cfa2de", "name": "tempest-VolumeTypesAccessRbacTest-608335782", "password_expires_at": null}, "audit_ids": ["S6SUXq6CSyeIvS641IndqQ"], "expires_at": "2020-11-06T19:04:29.000000Z", "issued_at": "2020-11-06T18:04:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "142f16ba5e4745838cfbbffd90e1bf70", "name": "tempest-VolumeTypesAccessRbacTest-608335782"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "ht _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:29.554 37 INFO tempest.lib.common.rest_client [req-efe28e30-1a4d-420c-b5fe-a21e7e343ed7 ] Request (GroupSnaphotsV314RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups 0.094s 2020-11-06 18:04:29.555 37 DEBUG tempest.lib.common.rest_client [req-efe28e30-1a4d-420c-b5fe-a21e7e343ed7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"group": {"group_type": "7681bb3a-1cb4-48d8-8029-984cfc12ac8e", "volume_types": ["d54d3b7e-1806-46b6-bd02-1deb389d2b17"], "name": "tempest-GroupSnaphotsV314RbacTest-Group-2070574435"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-efe28e30-1a4d-420c-b5fe-a21e7e343ed7', 'content-length': '119', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-efe28e30-1a4d-420c-b5fe-a21e7e343ed7', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups'} Body: b'{"group": {"id": "73a3ead6-89d0-4f34-815a-f1a5578459dd", "name": "tempest-GroupSnaphotsV314RbacTest-Group-2070574435"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:29.592 37 INFO tempest.lib.common.rest_client [req-22bbb8f3-0bea-46bc-af3e-5e777d4ca1a2 ] Request (GroupSnaphotsV314RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups/73a3ead6-89d0-4f34-815a-f1a5578459dd 0.034s 2020-11-06 18:04:29.592 37 DEBUG tempest.lib.common.rest_client [req-22bbb8f3-0bea-46bc-af3e-5e777d4ca1a2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-22bbb8f3-0bea-46bc-af3e-5e777d4ca1a2', 'content-length': '399', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-22bbb8f3-0bea-46bc-af3e-5e777d4ca1a2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups/73a3ead6-89d0-4f34-815a-f1a5578459dd'} Body: b'{"group": {"id": "73a3ead6-89d0-4f34-815a-f1a5578459dd", "status": "creating", "availability_zone": "nova", "created_at": "2020-11-06T18:04:30.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Group-2070574435", "description": null, "group_type": "7681bb3a-1cb4-48d8-8029-984cfc12ac8e", "volume_types": ["d54d3b7e-1806-46b6-bd02-1deb389d2b17"], "group_snapshot_id": null, "source_group_id": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:29.595 40 INFO tempest.lib.common.rest_client [req-857fd05f-1338-49a0-a6b8-271c3a07a4a9 ] Request (VolumeTypesAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.079s 2020-11-06 18:04:29.596 40 DEBUG tempest.lib.common.rest_client [req-857fd05f-1338-49a0-a6b8-271c3a07a4a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-857fd05f-1338-49a0-a6b8-271c3a07a4a9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["AEeaNdCCTqWm2ch4eH4vsg"], "expires_at": "2020-11-06T19:04:29.000000Z", "issued_at": "2020-11-06T18:04:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:29.640 40 INFO tempest.lib.common.rest_client [req-73a6fe5a-653d-49e1-93a0-8cdfaa08ed89 ] Request (VolumeTypesAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:04:29.640 40 DEBUG tempest.lib.common.rest_client [req-73a6fe5a-653d-49e1-93a0-8cdfaa08ed89 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-73a6fe5a-653d-49e1-93a0-8cdfaa08ed89', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["fZOzFTtYTEi_a1Mqni91uQ"], "expires_at": "2020-11-06T19:04:29.000000Z", "issued_at": "2020-11-06T18:04:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:29.685 40 INFO tempest.lib.common.rest_client [req-6ae8b175-d087-4989-8291-020589308994 ] Request (VolumeTypesAccessRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.044s 2020-11-06 18:04:29.685 40 DEBUG tempest.lib.common.rest_client [req-6ae8b175-d087-4989-8291-020589308994 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6ae8b175-d087-4989-8291-020589308994', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:29.730 40 INFO tempest.lib.common.rest_client [req-c799dbd1-56b6-4db4-9c73-51bfb8c1c249 ] Request (VolumeTypesAccessRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.044s 2020-11-06 18:04:29.730 40 DEBUG tempest.lib.common.rest_client [req-c799dbd1-56b6-4db4-9c73-51bfb8c1c249 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c799dbd1-56b6-4db4-9c73-51bfb8c1c249', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:29.731 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:04:29.731 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:29.777 40 INFO tempest.lib.common.rest_client [req-c3606172-d504-4846-a792-2cb22825721a ] Request (VolumeTypesAccessRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/142f16ba5e4745838cfbbffd90e1bf70/users/b6e36d0933e6425398c6880bc2cfa2de/roles 0.044s 2020-11-06 18:04:29.777 40 DEBUG tempest.lib.common.rest_client [req-c3606172-d504-4846-a792-2cb22825721a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c3606172-d504-4846-a792-2cb22825721a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/142f16ba5e4745838cfbbffd90e1bf70/users/b6e36d0933e6425398c6880bc2cfa2de/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/142f16ba5e4745838cfbbffd90e1bf70/users/b6e36d0933e6425398c6880bc2cfa2de/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:29.827 40 INFO tempest.lib.common.rest_client [req-d985e2d7-8cd6-40ac-837d-188e27b1beb0 ] Request (VolumeTypesAccessRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/142f16ba5e4745838cfbbffd90e1bf70/users/b6e36d0933e6425398c6880bc2cfa2de/roles/72a4576c553448cd941b052c1ca0cf2d 0.049s 2020-11-06 18:04:29.828 40 DEBUG tempest.lib.common.rest_client [req-d985e2d7-8cd6-40ac-837d-188e27b1beb0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d985e2d7-8cd6-40ac-837d-188e27b1beb0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/142f16ba5e4745838cfbbffd90e1bf70/users/b6e36d0933e6425398c6880bc2cfa2de/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:29.925 40 INFO tempest.lib.common.rest_client [req-5b9854b4-d7af-451e-9a76-afb19bec6da1 ] Request (VolumeTypesAccessRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/142f16ba5e4745838cfbbffd90e1bf70/users/b6e36d0933e6425398c6880bc2cfa2de/roles/a629c95d64b3416fb80ae90af4f69c05 0.096s 2020-11-06 18:04:29.926 40 DEBUG tempest.lib.common.rest_client [req-5b9854b4-d7af-451e-9a76-afb19bec6da1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5b9854b4-d7af-451e-9a76-afb19bec6da1', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/142f16ba5e4745838cfbbffd90e1bf70/users/b6e36d0933e6425398c6880bc2cfa2de/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:30.652 37 INFO tempest.lib.common.rest_client [req-b4419cb1-ef77-4bd0-b96c-ad901e2d1d3a ] Request (GroupSnaphotsV314RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups/73a3ead6-89d0-4f34-815a-f1a5578459dd 0.052s 2020-11-06 18:04:30.653 37 DEBUG tempest.lib.common.rest_client [req-b4419cb1-ef77-4bd0-b96c-ad901e2d1d3a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-b4419cb1-ef77-4bd0-b96c-ad901e2d1d3a', 'content-length': '400', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b4419cb1-ef77-4bd0-b96c-ad901e2d1d3a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups/73a3ead6-89d0-4f34-815a-f1a5578459dd'} Body: b'{"group": {"id": "73a3ead6-89d0-4f34-815a-f1a5578459dd", "status": "available", "availability_zone": "nova", "created_at": "2020-11-06T18:04:30.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Group-2070574435", "description": null, "group_type": "7681bb3a-1cb4-48d8-8029-984cfc12ac8e", "volume_types": ["d54d3b7e-1806-46b6-bd02-1deb389d2b17"], "group_snapshot_id": null, "source_group_id": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:30.658 37 INFO tempest.common.waiters [-] group 73a3ead6-89d0-4f34-815a-f1a5578459dd reached available after waiting for 1.658301 seconds 2020-11-06 18:04:30.704 39 INFO tempest.lib.common.rest_client [req-3752e923-217a-4e9c-bcab-ea34519e21c9 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.206s 2020-11-06 18:04:30.704 39 DEBUG tempest.lib.common.rest_client [req-3752e923-217a-4e9c-bcab-ea34519e21c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3752e923-217a-4e9c-bcab-ea34519e21c9', 'x-compute-request-id': 'req-3752e923-217a-4e9c-bcab-ea34519e21c9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:31.004 40 INFO tempest.lib.common.rest_client [req-4c6290aa-121c-4e03-bf2b-bd156c0220ed ] Request (VolumeTypesAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.076s 2020-11-06 18:04:31.005 40 DEBUG tempest.lib.common.rest_client [req-4c6290aa-121c-4e03-bf2b-bd156c0220ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4c6290aa-121c-4e03-bf2b-bd156c0220ed', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b6e36d0933e6425398c6880bc2cfa2de", "name": "tempest-VolumeTypesAccessRbacTest-608335782", "password_expires_at": null}, "audit_ids": ["-yip08aqQxeGQAdByABr8g"], "expires_at": "2020-11-06T19:04:30.000000Z", "issued_at": "2020-11-06T18:04:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "142f16ba5e4745838cfbbffd90e1bf70", "name": "tempest-VolumeTypesAccessRbacTest-608335782"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:31.008 37 INFO tempest.lib.common.rest_client [req-485b2f40-a5d9-4e7d-ba3b-f608ebe55f13 ] Request (GroupSnaphotsV314RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes 0.349s 2020-11-06 18:04:31.008 37 DEBUG tempest.lib.common.rest_client [req-485b2f40-a5d9-4e7d-ba3b-f608ebe55f13 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"volume": {"volume_type": "d54d3b7e-1806-46b6-bd02-1deb389d2b17", "group_id": "73a3ead6-89d0-4f34-815a-f1a5578459dd", "size": 1, "name": "tempest-GroupSnaphotsV314RbacTest-Volume-1071617123"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-485b2f40-a5d9-4e7d-ba3b-f608ebe55f13', 'content-length': '949', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-485b2f40-a5d9-4e7d-ba3b-f608ebe55f13', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes'} Body: b'{"volume": {"id": "6279c1fa-2fc9-487e-9ed9-0a6154caa6f8", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:31.000000", "updated_at": null, "name": "tempest-GroupSnaphotsV314RbacTest-Volume-1071617123", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-581628133", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/6279c1fa-2fc9-487e-9ed9-0a6154caa6f8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/479cc71352d449a5aae47dadceb27a30/volumes/6279c1fa-2fc9-487e-9ed9-0a6154caa6f8"}], "user_id": "79626ff2a9f24f28b269e0967e684da6", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "73a3ead6-89d0-4f34-815a-f1a5578459dd"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:31.115 40 INFO tempest.lib.common.rest_client [req-26640081-eae3-4a4d-b699-5463303d5c4f ] Request (VolumeTypesAccessRbacTest:setUpClass): 200 POST http://172.30.13.94/volume/v3/142f16ba5e4745838cfbbffd90e1bf70/types 0.109s 2020-11-06 18:04:31.116 40 DEBUG tempest.lib.common.rest_client [req-26640081-eae3-4a4d-b699-5463303d5c4f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-VolumeTypesAccessRbacTest-volume-type-1236806925", "os-volume-type-access:is_public": false}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-26640081-eae3-4a4d-b699-5463303d5c4f', 'content-length': '233', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-26640081-eae3-4a4d-b699-5463303d5c4f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/142f16ba5e4745838cfbbffd90e1bf70/types'} Body: b'{"volume_type": {"id": "6c691462-74ee-419b-9e6e-dcaade4e3f79", "name": "tempest-VolumeTypesAccessRbacTest-volume-type-1236806925", "is_public": false, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": false}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:31.120 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:31.123 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_type_access:addProjectAccess, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:31.124 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:31.140 37 INFO tempest.lib.common.rest_client [req-45529102-dfb7-4d79-8361-c8cb7237af7c ] Request (GroupSnaphotsV314RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/6279c1fa-2fc9-487e-9ed9-0a6154caa6f8 0.117s 2020-11-06 18:04:31.141 37 DEBUG tempest.lib.common.rest_client [req-45529102-dfb7-4d79-8361-c8cb7237af7c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-45529102-dfb7-4d79-8361-c8cb7237af7c', 'content-length': '1171', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-45529102-dfb7-4d79-8361-c8cb7237af7c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/6279c1fa-2fc9-487e-9ed9-0a6154caa6f8'} Body: b'{"volume": {"id": "6279c1fa-2fc9-487e-9ed9-0a6154caa6f8", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:31.000000", "updated_at": "2020-11-06T18:04:31.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-1071617123", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-581628133", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/6279c1fa-2fc9-487e-9ed9-0a6154caa6f8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/479cc71352d449a5aae47dadceb27a30/volumes/6279c1fa-2fc9-487e-9ed9-0a6154caa6f8"}], "user_id": "79626ff2a9f24f28b269e0967e684da6", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "73a3ead6-89d0-4f34-815a-f1a5578459dd", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "479cc71352d449a5aae47dadceb27a30"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:31.234 40 INFO tempest.lib.common.rest_client [req-d21387b6-321e-4c49-8fca-ce8777575a17 ] Request (VolumeTypesAccessRbacTest:test_add_type_access): 200 GET http://172.30.13.94/identity/v3/projects/142f16ba5e4745838cfbbffd90e1bf70/users/b6e36d0933e6425398c6880bc2cfa2de/roles 0.109s 2020-11-06 18:04:31.234 40 DEBUG tempest.lib.common.rest_client [req-d21387b6-321e-4c49-8fca-ce8777575a17 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d21387b6-321e-4c49-8fca-ce8777575a17', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/142f16ba5e4745838cfbbffd90e1bf70/users/b6e36d0933e6425398c6880bc2cfa2de/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/142f16ba5e4745838cfbbffd90e1bf70/users/b6e36d0933e6425398c6880bc2cfa2de/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:31.268 40 INFO tempest.lib.common.rest_client [req-28b117a7-e71d-48f7-9d98-3d8cd3baf4c1 ] Request (VolumeTypesAccessRbacTest:test_add_type_access): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:04:31.268 40 DEBUG tempest.lib.common.rest_client [req-28b117a7-e71d-48f7-9d98-3d8cd3baf4c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-28b117a7-e71d-48f7-9d98-3d8cd3baf4c1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b6e36d0933e6425398c6880bc2cfa2de", "name": "tempest-VolumeTypesAccessRbacTest-608335782", "password_expires_at": null}, "audit_ids": ["z3-Z3bXRTUOyKpdTk5wklA"], "expires_at": "2020-11-06T19:04:31.000000Z", "issued_at": "2020-11-06T18:04:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "142f16ba5e4745838cfbbffd90e1bf70", "name": "tempest-VolumeTypesAccessRbacTest-608335782"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:31.364 40 INFO tempest.lib.common.rest_client [req-368d8842-bb6a-4a08-8d41-849ca63d2f0a ] Request (VolumeTypesAccessRbacTest:test_add_type_access): 202 POST http://172.30.13.94/volume/v3/142f16ba5e4745838cfbbffd90e1bf70/types/6c691462-74ee-419b-9e6e-dcaade4e3f79/action 0.094s 2020-11-06 18:04:31.364 40 DEBUG tempest.lib.common.rest_client [req-368d8842-bb6a-4a08-8d41-849ca63d2f0a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"addProjectAccess": {"project": "142f16ba5e4745838cfbbffd90e1bf70"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-368d8842-bb6a-4a08-8d41-849ca63d2f0a', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/142f16ba5e4745838cfbbffd90e1bf70/types/6c691462-74ee-419b-9e6e-dcaade4e3f79/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:31.365 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:31.422 40 INFO tempest.lib.common.rest_client [req-8610fa44-1a56-4c1e-b821-9d0348ea0e40 ] Request (VolumeTypesAccessRbacTest:test_add_type_access): 200 GET http://172.30.13.94/identity/v3/projects/142f16ba5e4745838cfbbffd90e1bf70/users/b6e36d0933e6425398c6880bc2cfa2de/roles 0.056s 2020-11-06 18:04:31.423 40 DEBUG tempest.lib.common.rest_client [req-8610fa44-1a56-4c1e-b821-9d0348ea0e40 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8610fa44-1a56-4c1e-b821-9d0348ea0e40', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/142f16ba5e4745838cfbbffd90e1bf70/users/b6e36d0933e6425398c6880bc2cfa2de/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/142f16ba5e4745838cfbbffd90e1bf70/users/b6e36d0933e6425398c6880bc2cfa2de/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:31.457 40 INFO tempest.lib.common.rest_client [req-b01c662e-16ee-4183-8b76-634217207880 ] Request (VolumeTypesAccessRbacTest:test_add_type_access): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:04:31.458 40 DEBUG tempest.lib.common.rest_client [req-b01c662e-16ee-4183-8b76-634217207880 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b01c662e-16ee-4183-8b76-634217207880', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b6e36d0933e6425398c6880bc2cfa2de", "name": "tempest-VolumeTypesAccessRbacTest-608335782", "password_expires_at": null}, "audit_ids": ["CromY1cBQkeWW1iJnp_wXA"], "expires_at": "2020-11-06T19:04:31.000000Z", "issued_at": "2020-11-06T18:04:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "142f16ba5e4745838cfbbffd90e1bf70", "name": "tempest-VolumeTypesAccessRbacTest-608335782"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:31.550 40 INFO tempest.lib.common.rest_client [req-43632adf-f0b0-4141-93c0-a08d0604fdce ] Request (VolumeTypesAccessRbacTest:_run_cleanups): 202 POST http://172.30.13.94/volume/v3/142f16ba5e4745838cfbbffd90e1bf70/types/6c691462-74ee-419b-9e6e-dcaade4e3f79/action 0.091s 2020-11-06 18:04:31.550 40 DEBUG tempest.lib.common.rest_client [req-43632adf-f0b0-4141-93c0-a08d0604fdce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"removeProjectAccess": {"project": "142f16ba5e4745838cfbbffd90e1bf70"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-43632adf-f0b0-4141-93c0-a08d0604fdce', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/142f16ba5e4745838cfbbffd90e1bf70/types/6c691462-74ee-419b-9e6e-dcaade4e3f79/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:31.553 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:31.555 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_type_access, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:31.584 40 INFO tempest.lib.common.rest_client [req-75774ad4-1e8b-4eb1-a43f-c414e55d2a57 ] Request (VolumeTypesAccessRbacTest:test_list_type_access): 202 POST http://172.30.13.94/volume/v3/142f16ba5e4745838cfbbffd90e1bf70/types/6c691462-74ee-419b-9e6e-dcaade4e3f79/action 0.028s 2020-11-06 18:04:31.584 40 DEBUG tempest.lib.common.rest_client [req-75774ad4-1e8b-4eb1-a43f-c414e55d2a57 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"addProjectAccess": {"project": "142f16ba5e4745838cfbbffd90e1bf70"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-75774ad4-1e8b-4eb1-a43f-c414e55d2a57', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/142f16ba5e4745838cfbbffd90e1bf70/types/6c691462-74ee-419b-9e6e-dcaade4e3f79/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:31.585 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:31.632 40 INFO tempest.lib.common.rest_client [req-451b1abd-f860-4ca3-938b-3441f996acef ] Request (VolumeTypesAccessRbacTest:test_list_type_access): 200 GET http://172.30.13.94/identity/v3/projects/142f16ba5e4745838cfbbffd90e1bf70/users/b6e36d0933e6425398c6880bc2cfa2de/roles 0.047s 2020-11-06 18:04:31.632 40 DEBUG tempest.lib.common.rest_client [req-451b1abd-f860-4ca3-938b-3441f996acef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-451b1abd-f860-4ca3-938b-3441f996acef', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/142f16ba5e4745838cfbbffd90e1bf70/users/b6e36d0933e6425398c6880bc2cfa2de/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/142f16ba5e4745838cfbbffd90e1bf70/users/b6e36d0933e6425398c6880bc2cfa2de/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:31.665 40 INFO tempest.lib.common.rest_client [req-3a995022-0fea-410c-9566-f7e78a4170ac ] Request (VolumeTypesAccessRbacTest:test_list_type_access): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:04:31.666 40 DEBUG tempest.lib.common.rest_client [req-3a995022-0fea-410c-9566-f7e78a4170ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3a995022-0fea-410c-9566-f7e78a4170ac', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b6e36d0933e6425398c6880bc2cfa2de", "name": "tempest-VolumeTypesAccessRbacTest-608335782", "password_expires_at": null}, "audit_ids": ["XuFJWDnxRwumdOjchNK9WA"], "expires_at": "2020-11-06T19:04:31.000000Z", "issued_at": "2020-11-06T18:04:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "142f16ba5e4745838cfbbffd90e1bf70", "name": "tempest-VolumeTypesAccessRbacTest-608335782"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:31.755 40 INFO tempest.lib.common.rest_client [req-229d2559-b011-41cb-a11f-d8704fb5cd76 ] Request (VolumeTypesAccessRbacTest:test_list_type_access): 200 GET http://172.30.13.94/volume/v3/142f16ba5e4745838cfbbffd90e1bf70/types/6c691462-74ee-419b-9e6e-dcaade4e3f79/os-volume-type-access 0.088s 2020-11-06 18:04:31.756 40 DEBUG tempest.lib.common.rest_client [req-229d2559-b011-41cb-a11f-d8704fb5cd76 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-229d2559-b011-41cb-a11f-d8704fb5cd76', 'content-length': '134', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-229d2559-b011-41cb-a11f-d8704fb5cd76', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/142f16ba5e4745838cfbbffd90e1bf70/types/6c691462-74ee-419b-9e6e-dcaade4e3f79/os-volume-type-access'} Body: b'{"volume_type_access": [{"volume_type_id": "6c691462-74ee-419b-9e6e-dcaade4e3f79", "project_id": "142f16ba5e4745838cfbbffd90e1bf70"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:31.761 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:31.816 40 INFO tempest.lib.common.rest_client [req-2ac23075-4c4c-430a-90e1-ef88f3c547d9 ] Request (VolumeTypesAccessRbacTest:test_list_type_access): 200 GET http://172.30.13.94/identity/v3/projects/142f16ba5e4745838cfbbffd90e1bf70/users/b6e36d0933e6425398c6880bc2cfa2de/roles 0.054s 2020-11-06 18:04:31.816 40 DEBUG tempest.lib.common.rest_client [req-2ac23075-4c4c-430a-90e1-ef88f3c547d9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2ac23075-4c4c-430a-90e1-ef88f3c547d9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/142f16ba5e4745838cfbbffd90e1bf70/users/b6e36d0933e6425398c6880bc2cfa2de/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/142f16ba5e4745838cfbbffd90e1bf70/users/b6e36d0933e6425398c6880bc2cfa2de/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:31.849 40 INFO tempest.lib.common.rest_client [req-4da35a72-2ea3-45b1-90ed-d6b10ec69422 ] Request (VolumeTypesAccessRbacTest:test_list_type_access): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:04:31.849 40 DEBUG tempest.lib.common.rest_client [req-4da35a72-2ea3-45b1-90ed-d6b10ec69422 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4da35a72-2ea3-45b1-90ed-d6b10ec69422', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b6e36d0933e6425398c6880bc2cfa2de", "name": "tempest-VolumeTypesAccessRbacTest-608335782", "password_expires_at": null}, "audit_ids": ["ABfymDxuQxyVDRxNWaI5uA"], "expires_at": "2020-11-06T19:04:31.000000Z", "issued_at": "2020-11-06T18:04:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "142f16ba5e4745838cfbbffd90e1bf70", "name": "tempest-VolumeTypesAccessRbacTest-608335782"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:31.939 40 INFO tempest.lib.common.rest_client [req-f9ff9fef-019e-42c5-b121-834c9121e7da ] Request (VolumeTypesAccessRbacTest:_run_cleanups): 202 POST http://172.30.13.94/volume/v3/142f16ba5e4745838cfbbffd90e1bf70/types/6c691462-74ee-419b-9e6e-dcaade4e3f79/action 0.088s 2020-11-06 18:04:31.939 40 DEBUG tempest.lib.common.rest_client [req-f9ff9fef-019e-42c5-b121-834c9121e7da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"removeProjectAccess": {"project": "142f16ba5e4745838cfbbffd90e1bf70"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f9ff9fef-019e-42c5-b121-834c9121e7da', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/142f16ba5e4745838cfbbffd90e1bf70/types/6c691462-74ee-419b-9e6e-dcaade4e3f79/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:31.941 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:31.943 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_type_access:removeProjectAccess, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:31.973 40 INFO tempest.lib.common.rest_client [req-de61c8a4-63c5-445f-b1bf-1fea0c7a7a65 ] Request (VolumeTypesAccessRbacTest:test_remove_type_access): 202 POST http://172.30.13.94/volume/v3/142f16ba5e4745838cfbbffd90e1bf70/types/6c691462-74ee-419b-9e6e-dcaade4e3f79/action 0.029s 2020-11-06 18:04:31.973 40 DEBUG tempest.lib.common.rest_client [req-de61c8a4-63c5-445f-b1bf-1fea0c7a7a65 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"addProjectAccess": {"project": "142f16ba5e4745838cfbbffd90e1bf70"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-de61c8a4-63c5-445f-b1bf-1fea0c7a7a65', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/142f16ba5e4745838cfbbffd90e1bf70/types/6c691462-74ee-419b-9e6e-dcaade4e3f79/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:31.973 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:32.021 40 INFO tempest.lib.common.rest_client [req-36878b31-8634-4ecb-80d9-ad6bb42a5d2b ] Request (VolumeTypesAccessRbacTest:test_remove_type_access): 200 GET http://172.30.13.94/identity/v3/projects/142f16ba5e4745838cfbbffd90e1bf70/users/b6e36d0933e6425398c6880bc2cfa2de/roles 0.047s 2020-11-06 18:04:32.021 40 DEBUG tempest.lib.common.rest_client [req-36878b31-8634-4ecb-80d9-ad6bb42a5d2b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-36878b31-8634-4ecb-80d9-ad6bb42a5d2b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/142f16ba5e4745838cfbbffd90e1bf70/users/b6e36d0933e6425398c6880bc2cfa2de/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/142f16ba5e4745838cfbbffd90e1bf70/users/b6e36d0933e6425398c6880bc2cfa2de/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:32.064 40 INFO tempest.lib.common.rest_client [req-3de180f9-5672-40aa-8969-53c2c30adaba ] Request (VolumeTypesAccessRbacTest:test_remove_type_access): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-11-06 18:04:32.065 40 DEBUG tempest.lib.common.rest_client [req-3de180f9-5672-40aa-8969-53c2c30adaba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3de180f9-5672-40aa-8969-53c2c30adaba', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b6e36d0933e6425398c6880bc2cfa2de", "name": "tempest-VolumeTypesAccessRbacTest-608335782", "password_expires_at": null}, "audit_ids": ["fgxYdFTyQ6KXRZUM-1KXiw"], "expires_at": "2020-11-06T19:04:32.000000Z", "issued_at": "2020-11-06T18:04:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "142f16ba5e4745838cfbbffd90e1bf70", "name": "tempest-VolumeTypesAccessRbacTest-608335782"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:32.168 40 INFO tempest.lib.common.rest_client [req-39f549d9-c6d3-4fc1-bc63-dc52794a5d36 ] Request (VolumeTypesAccessRbacTest:test_remove_type_access): 202 POST http://172.30.13.94/volume/v3/142f16ba5e4745838cfbbffd90e1bf70/types/6c691462-74ee-419b-9e6e-dcaade4e3f79/action 0.102s 2020-11-06 18:04:32.169 40 DEBUG tempest.lib.common.rest_client [req-39f549d9-c6d3-4fc1-bc63-dc52794a5d36 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"removeProjectAccess": {"project": "142f16ba5e4745838cfbbffd90e1bf70"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-39f549d9-c6d3-4fc1-bc63-dc52794a5d36', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/142f16ba5e4745838cfbbffd90e1bf70/types/6c691462-74ee-419b-9e6e-dcaade4e3f79/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:32.170 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:32.245 37 INFO tempest.lib.common.rest_client [req-64d66078-c5ff-4707-81c6-086c54ad7fa1 ] Request (GroupSnaphotsV314RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/6279c1fa-2fc9-487e-9ed9-0a6154caa6f8 0.090s 2020-11-06 18:04:32.246 37 DEBUG tempest.lib.common.rest_client [req-64d66078-c5ff-4707-81c6-086c54ad7fa1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-64d66078-c5ff-4707-81c6-086c54ad7fa1', 'content-length': '1172', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-64d66078-c5ff-4707-81c6-086c54ad7fa1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/6279c1fa-2fc9-487e-9ed9-0a6154caa6f8'} Body: b'{"volume": {"id": "6279c1fa-2fc9-487e-9ed9-0a6154caa6f8", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:31.000000", "updated_at": "2020-11-06T18:04:31.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-1071617123", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-581628133", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/6279c1fa-2fc9-487e-9ed9-0a6154caa6f8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/479cc71352d449a5aae47dadceb27a30/volumes/6279c1fa-2fc9-487e-9ed9-0a6154caa6f8"}], "user_id": "79626ff2a9f24f28b269e0967e684da6", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "73a3ead6-89d0-4f34-815a-f1a5578459dd", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "479cc71352d449a5aae47dadceb27a30"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:32.259 37 INFO tempest.common.waiters [-] volume 6279c1fa-2fc9-487e-9ed9-0a6154caa6f8 reached available after waiting for 1.259935 seconds 2020-11-06 18:04:32.260 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:32.265 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:delete_group_snapshot, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:32.271 40 INFO tempest.lib.common.rest_client [req-13b9d297-3157-46e1-a9e2-20cebb4555cd ] Request (VolumeTypesAccessRbacTest:test_remove_type_access): 200 GET http://172.30.13.94/identity/v3/projects/142f16ba5e4745838cfbbffd90e1bf70/users/b6e36d0933e6425398c6880bc2cfa2de/roles 0.100s 2020-11-06 18:04:32.271 40 DEBUG tempest.lib.common.rest_client [req-13b9d297-3157-46e1-a9e2-20cebb4555cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-13b9d297-3157-46e1-a9e2-20cebb4555cd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/142f16ba5e4745838cfbbffd90e1bf70/users/b6e36d0933e6425398c6880bc2cfa2de/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/142f16ba5e4745838cfbbffd90e1bf70/users/b6e36d0933e6425398c6880bc2cfa2de/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:32.349 40 INFO tempest.lib.common.rest_client [req-63720657-7ca6-4d83-bf5c-2be33e8d7a81 ] Request (VolumeTypesAccessRbacTest:test_remove_type_access): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.076s 2020-11-06 18:04:32.349 40 DEBUG tempest.lib.common.rest_client [req-63720657-7ca6-4d83-bf5c-2be33e8d7a81 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-63720657-7ca6-4d83-bf5c-2be33e8d7a81', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b6e36d0933e6425398c6880bc2cfa2de", "name": "tempest-VolumeTypesAccessRbacTest-608335782", "password_expires_at": null}, "audit_ids": ["fGhFsT8tSHmLdgj9zAWmvw"], "expires_at": "2020-11-06T19:04:32.000000Z", "issued_at": "2020-11-06T18:04:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "142f16ba5e4745838cfbbffd90e1bf70", "name": "tempest-VolumeTypesAccessRbacTest-608335782"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_142f16ba5e4745838cfbbffd90e1bf70", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:32.415 37 INFO tempest.lib.common.rest_client [req-43a07055-4318-46d3-9aaa-00c22ed3dedf ] Request (GroupSnaphotsV314RbacTest:test_delete_group_snapshot_rbac): 202 POST http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_snapshots 0.149s 2020-11-06 18:04:32.416 37 DEBUG tempest.lib.common.rest_client [req-43a07055-4318-46d3-9aaa-00c22ed3dedf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"group_snapshot": {"group_id": "73a3ead6-89d0-4f34-815a-f1a5578459dd", "name": "tempest-group_snapshot-1209014363"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-43a07055-4318-46d3-9aaa-00c22ed3dedf', 'content-length': '168', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-43a07055-4318-46d3-9aaa-00c22ed3dedf', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_snapshots'} Body: b'{"group_snapshot": {"id": "98ebb6ba-1e4f-4855-87de-5ab331f5a962", "name": "tempest-group_snapshot-1209014363", "group_type_id": "7681bb3a-1cb4-48d8-8029-984cfc12ac8e"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:32.442 37 INFO tempest.lib.common.rest_client [req-061a8405-b9ee-4f02-bdb1-e5319de9e28e ] Request (GroupSnaphotsV314RbacTest:test_delete_group_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_snapshots/98ebb6ba-1e4f-4855-87de-5ab331f5a962 0.022s 2020-11-06 18:04:32.442 37 DEBUG tempest.lib.common.rest_client [req-061a8405-b9ee-4f02-bdb1-e5319de9e28e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-061a8405-b9ee-4f02-bdb1-e5319de9e28e', 'content-length': '307', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-061a8405-b9ee-4f02-bdb1-e5319de9e28e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_snapshots/98ebb6ba-1e4f-4855-87de-5ab331f5a962'} Body: b'{"group_snapshot": {"id": "98ebb6ba-1e4f-4855-87de-5ab331f5a962", "group_id": "73a3ead6-89d0-4f34-815a-f1a5578459dd", "group_type_id": "7681bb3a-1cb4-48d8-8029-984cfc12ac8e", "status": "creating", "created_at": "2020-11-06T18:04:32.000000", "name": "tempest-group_snapshot-1209014363", "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:32.480 40 INFO tempest.lib.common.rest_client [req-c9ca5073-f895-476f-9509-0de9c20b771b ] Request (VolumeTypesAccessRbacTest:_run_cleanups): 404 POST http://172.30.13.94/volume/v3/142f16ba5e4745838cfbbffd90e1bf70/types/6c691462-74ee-419b-9e6e-dcaade4e3f79/action 0.129s 2020-11-06 18:04:32.480 40 DEBUG tempest.lib.common.rest_client [req-c9ca5073-f895-476f-9509-0de9c20b771b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"removeProjectAccess": {"project": "142f16ba5e4745838cfbbffd90e1bf70"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '163', 'content-type': 'application/json', 'x-compute-request-id': 'req-c9ca5073-f895-476f-9509-0de9c20b771b', 'x-openstack-request-id': 'req-c9ca5073-f895-476f-9509-0de9c20b771b', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/142f16ba5e4745838cfbbffd90e1bf70/types/6c691462-74ee-419b-9e6e-dcaade4e3f79/action'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type access not found for 6c691462-74ee-419b-9e6e-dcaade4e3f79 / 142f16ba5e4745838cfbbffd90e1bf70 combination."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:32.556 40 INFO tempest.lib.common.rest_client [req-9064c257-af80-4046-9933-c4a7b9cb212e ] Request (VolumeTypesAccessRbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/142f16ba5e4745838cfbbffd90e1bf70/types/6c691462-74ee-419b-9e6e-dcaade4e3f79 0.073s 2020-11-06 18:04:32.557 40 DEBUG tempest.lib.common.rest_client [req-9064c257-af80-4046-9933-c4a7b9cb212e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9064c257-af80-4046-9933-c4a7b9cb212e', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/142f16ba5e4745838cfbbffd90e1bf70/types/6c691462-74ee-419b-9e6e-dcaade4e3f79'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:32.579 40 INFO tempest.lib.common.rest_client [req-b5b83356-80ca-4069-a1fd-26af27017f6c ] Request (VolumeTypesAccessRbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/142f16ba5e4745838cfbbffd90e1bf70/types/6c691462-74ee-419b-9e6e-dcaade4e3f79 0.021s 2020-11-06 18:04:32.579 40 DEBUG tempest.lib.common.rest_client [req-b5b83356-80ca-4069-a1fd-26af27017f6c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-b5b83356-80ca-4069-a1fd-26af27017f6c', 'x-openstack-request-id': 'req-b5b83356-80ca-4069-a1fd-26af27017f6c', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/142f16ba5e4745838cfbbffd90e1bf70/types/6c691462-74ee-419b-9e6e-dcaade4e3f79'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 6c691462-74ee-419b-9e6e-dcaade4e3f79 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:32.715 40 INFO tempest.lib.common.rest_client [req-59d3b25c-0f67-4c8c-9535-684545352da3 ] Request (VolumeTypesAccessRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/b6e36d0933e6425398c6880bc2cfa2de 0.134s 2020-11-06 18:04:32.715 40 DEBUG tempest.lib.common.rest_client [req-59d3b25c-0f67-4c8c-9535-684545352da3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-59d3b25c-0f67-4c8c-9535-684545352da3', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/b6e36d0933e6425398c6880bc2cfa2de'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:32.800 40 INFO tempest.lib.common.rest_client [req-3b5c48cc-1279-4136-8e5c-5cdc61504e0b ] Request (VolumeTypesAccessRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 18:04:32.800 40 DEBUG tempest.lib.common.rest_client [req-3b5c48cc-1279-4136-8e5c-5cdc61504e0b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3b5c48cc-1279-4136-8e5c-5cdc61504e0b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["1Iv223b2RLW2pobrOlq2aA"], "expires_at": "2020-11-06T19:04:32.000000Z", "issued_at": "2020-11-06T18:04:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:33.055 39 INFO tempest.lib.common.rest_client [req-2f37c0f0-97a1-498d-ba1f-58d6a6257d4c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 1.333s 2020-11-06 18:04:33.055 39 DEBUG tempest.lib.common.rest_client [req-2f37c0f0-97a1-498d-ba1f-58d6a6257d4c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2f37c0f0-97a1-498d-ba1f-58d6a6257d4c', 'x-compute-request-id': 'req-2f37c0f0-97a1-498d-ba1f-58d6a6257d4c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:33.064 40 INFO tempest.lib.common.rest_client [req-723161e9-80c7-4990-8e9d-66e2053f529b ] Request (VolumeTypesAccessRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=142f16ba5e4745838cfbbffd90e1bf70&name=default 0.262s 2020-11-06 18:04:33.064 40 DEBUG tempest.lib.common.rest_client [req-723161e9-80c7-4990-8e9d-66e2053f529b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-723161e9-80c7-4990-8e9d-66e2053f529b', 'date': 'Fri, 06 Nov 2020 18:04:33 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=142f16ba5e4745838cfbbffd90e1bf70&name=default'} Body: b'{"security_groups": [{"id": "650ba735-453a-4224-ae94-96c18d0a859d", "name": "default", "stateful": true, "tenant_id": "142f16ba5e4745838cfbbffd90e1bf70", "description": "Default security group", "security_group_rules": [{"id": "4755b02b-5b4e-4cc6-8fa2-95358bf63ce9", "tenant_id": "142f16ba5e4745838cfbbffd90e1bf70", "security_group_id": "650ba735-453a-4224-ae94-96c18d0a859d", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:04:32Z", "updated_at": "2020-11-06T18:04:32Z", "revision_number": 0, "project_id": "142f16ba5e4745838cfbbffd90e1bf70"}, {"id": "c2f7e095-70ae-46f6-86bc-c9d2f66933b8", "tenant_id": "142f16ba5e4745838cfbbffd90e1bf70", "security_group_id": "650ba735-453a-4224-ae94-96c18d0a859d", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "650ba735-453a-4224-ae94-96c18d0a859d", "description": null, "tags": [], "created_at": "2020-11-06T18:04:32Z", "updated_at": "2020-11-06T18:04:32Z", "revision_number": 0, "project_id": "142f16ba5e4745838cfbbffd90e1bf70"}, {"id": "ede9ae13-650c-4e94-9ac4-81da2addcb5a", "tenant_id": "142f16ba5e4745838cfbbffd90e1bf70", "security_group_id": "650ba735-453a-4224-ae94-96c18d0a859d", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "650ba735-453a-4224-ae94-96c18d0a859d", "description": null, "tags": [], "created_at": "2020-11-06T18:04:32Z", "updated_at": "2020-11-06T18:04:32Z", "revision_number": 0, "project_id": "142f16ba5e4745838cfbbffd90e1bf70"}, {"id": "eff0b897-8ff7-4734-b3e2-21edea72218c", "tenant_id": "142f16ba5e4745838cfbbffd90e1bf70", "security_group_id": "650ba735-453a-4224-ae94-96c18d0a859d", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:04:32Z", "updated_at": "2020-11-06T18:04:32Z", "revision_number": 0, "project_id": "142f16ba5e4745838cfbbffd90e1bf70"}], "tags": [], "created_at": "2020-11-06T18:04:32Z", "updated_at": "2020-11-06T18:04:32Z", "revision_number": 1, "project_id": "142f16ba5e4745838cfbbffd90e1bf70"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:33.171 40 INFO tempest.lib.common.rest_client [req-a9807aed-7ee1-4fb3-9d07-4e2df08fe903 ] Request (VolumeTypesAccessRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/650ba735-453a-4224-ae94-96c18d0a859d 0.106s 2020-11-06 18:04:33.172 40 DEBUG tempest.lib.common.rest_client [req-a9807aed-7ee1-4fb3-9d07-4e2df08fe903 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-a9807aed-7ee1-4fb3-9d07-4e2df08fe903', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:04:33 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/650ba735-453a-4224-ae94-96c18d0a859d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:33.329 40 INFO tempest.lib.common.rest_client [req-931e1c39-2ceb-4c9e-968d-f09d7bb73493 ] Request (VolumeTypesAccessRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/142f16ba5e4745838cfbbffd90e1bf70 0.156s 2020-11-06 18:04:33.329 40 DEBUG tempest.lib.common.rest_client [req-931e1c39-2ceb-4c9e-968d-f09d7bb73493 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-931e1c39-2ceb-4c9e-968d-f09d7bb73493', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/142f16ba5e4745838cfbbffd90e1bf70'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:33.424 40 INFO tempest.lib.common.rest_client [req-9671ec20-f640-4ee5-8479-875530c1a1ee ] Request (VolumeTypesExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-11-06 18:04:33.425 40 DEBUG tempest.lib.common.rest_client [req-9671ec20-f640-4ee5-8479-875530c1a1ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9671ec20-f640-4ee5-8479-875530c1a1ee', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["B4cN8F1MSNm6XrFXtwX-nw"], "expires_at": "2020-11-06T19:04:33.000000Z", "issued_at": "2020-11-06T18:04:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:33.466 40 INFO tempest.lib.common.rest_client [req-531dddf6-e516-45d3-bfea-f5c3ad24dcc4 ] Request (VolumeTypesExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:04:33.467 40 DEBUG tempest.lib.common.rest_client [req-531dddf6-e516-45d3-bfea-f5c3ad24dcc4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-531dddf6-e516-45d3-bfea-f5c3ad24dcc4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["yFRqz3K7QDmO7os3hFN5TQ"], "expires_at": "2020-11-06T19:04:33.000000Z", "issued_at": "2020-11-06T18:04:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:33.474 37 INFO tempest.lib.common.rest_client [req-e2f85362-01ef-4cbf-83f5-ba8334ce6d3e ] Request (GroupSnaphotsV314RbacTest:test_delete_group_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_snapshots/98ebb6ba-1e4f-4855-87de-5ab331f5a962 0.026s 2020-11-06 18:04:33.474 37 DEBUG tempest.lib.common.rest_client [req-e2f85362-01ef-4cbf-83f5-ba8334ce6d3e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e2f85362-01ef-4cbf-83f5-ba8334ce6d3e', 'content-length': '308', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e2f85362-01ef-4cbf-83f5-ba8334ce6d3e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_snapshots/98ebb6ba-1e4f-4855-87de-5ab331f5a962'} Body: b'{"group_snapshot": {"id": "98ebb6ba-1e4f-4855-87de-5ab331f5a962", "group_id": "73a3ead6-89d0-4f34-815a-f1a5578459dd", "group_type_id": "7681bb3a-1cb4-48d8-8029-984cfc12ac8e", "status": "available", "created_at": "2020-11-06T18:04:32.000000", "name": "tempest-group_snapshot-1209014363", "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:33.478 37 INFO tempest.common.waiters [-] group_snapshot 98ebb6ba-1e4f-4855-87de-5ab331f5a962 reached available after waiting for 1.478789 seconds 2020-11-06 18:04:33.504 37 INFO tempest.lib.common.rest_client [req-53ec9162-8e29-42fe-8ed8-bad7446e6e3e ] Request (GroupSnaphotsV314RbacTest:test_delete_group_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/snapshots/detail 0.025s 2020-11-06 18:04:33.505 37 DEBUG tempest.lib.common.rest_client [req-53ec9162-8e29-42fe-8ed8-bad7446e6e3e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-53ec9162-8e29-42fe-8ed8-bad7446e6e3e', 'content-length': '454', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-53ec9162-8e29-42fe-8ed8-bad7446e6e3e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/snapshots/detail'} Body: b'{"snapshots": [{"id": "c04cb2b3-656e-4bd0-96ba-90b1f2077c7a", "created_at": "2020-11-06T18:04:32.000000", "updated_at": "2020-11-06T18:04:33.000000", "name": "tempest-group_snapshot-1209014363", "description": null, "volume_id": "6279c1fa-2fc9-487e-9ed9-0a6154caa6f8", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "479cc71352d449a5aae47dadceb27a30", "os-extended-snapshot-attributes:progress": "100%"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:33.516 40 INFO tempest.lib.common.rest_client [req-bf90b3c5-3ad6-4c71-87d8-29894c210d96 ] Request (VolumeTypesExtraSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.048s 2020-11-06 18:04:33.517 40 DEBUG tempest.lib.common.rest_client [req-bf90b3c5-3ad6-4c71-87d8-29894c210d96 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bf90b3c5-3ad6-4c71-87d8-29894c210d96', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:33.541 37 INFO tempest.lib.common.rest_client [req-42c8dd17-41c4-4889-9ca3-e778d6bc07f5 ] Request (GroupSnaphotsV314RbacTest:test_delete_group_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/snapshots/c04cb2b3-656e-4bd0-96ba-90b1f2077c7a 0.030s 2020-11-06 18:04:33.541 37 DEBUG tempest.lib.common.rest_client [req-42c8dd17-41c4-4889-9ca3-e778d6bc07f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-42c8dd17-41c4-4889-9ca3-e778d6bc07f5', 'content-length': '451', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-42c8dd17-41c4-4889-9ca3-e778d6bc07f5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/snapshots/c04cb2b3-656e-4bd0-96ba-90b1f2077c7a'} Body: b'{"snapshot": {"id": "c04cb2b3-656e-4bd0-96ba-90b1f2077c7a", "created_at": "2020-11-06T18:04:32.000000", "updated_at": "2020-11-06T18:04:33.000000", "name": "tempest-group_snapshot-1209014363", "description": null, "volume_id": "6279c1fa-2fc9-487e-9ed9-0a6154caa6f8", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "479cc71352d449a5aae47dadceb27a30", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:33.545 37 INFO tempest.common.waiters [-] snapshot c04cb2b3-656e-4bd0-96ba-90b1f2077c7a reached available after waiting for 0.545943 seconds 2020-11-06 18:04:33.546 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:33.582 40 INFO tempest.lib.common.rest_client [req-cc5a458c-9e5b-4f2e-a825-019196b04ea4 ] Request (VolumeTypesExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.064s 2020-11-06 18:04:33.583 40 DEBUG tempest.lib.common.rest_client [req-cc5a458c-9e5b-4f2e-a825-019196b04ea4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumeTypesExtraSpecsRbacTest-1643276433-desc", "domain_id": "default", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1643276433"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '396', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cc5a458c-9e5b-4f2e-a825-019196b04ea4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "cc5d04441be94f4a95ba5bd641c7252d", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1643276433", "domain_id": "default", "description": "tempest-VolumeTypesExtraSpecsRbacTest-1643276433-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:33.597 37 INFO tempest.lib.common.rest_client [req-234bc85b-3259-47bf-8afb-77a73fd2d995 ] Request (GroupSnaphotsV314RbacTest:test_delete_group_snapshot_rbac): 200 GET http://172.30.13.94/identity/v3/projects/479cc71352d449a5aae47dadceb27a30/users/79626ff2a9f24f28b269e0967e684da6/roles 0.050s 2020-11-06 18:04:33.597 37 DEBUG tempest.lib.common.rest_client [req-234bc85b-3259-47bf-8afb-77a73fd2d995 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-234bc85b-3259-47bf-8afb-77a73fd2d995', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/479cc71352d449a5aae47dadceb27a30/users/79626ff2a9f24f28b269e0967e684da6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/479cc71352d449a5aae47dadceb27a30/users/79626ff2a9f24f28b269e0967e684da6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:33.675 37 INFO tempest.lib.common.rest_client [req-55cf9e8f-5ee5-4c1c-8e1a-e04231d01d6f ] Request (GroupSnaphotsV314RbacTest:test_delete_group_snapshot_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.076s 2020-11-06 18:04:33.676 37 DEBUG tempest.lib.common.rest_client [req-55cf9e8f-5ee5-4c1c-8e1a-e04231d01d6f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-55cf9e8f-5ee5-4c1c-8e1a-e04231d01d6f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "79626ff2a9f24f28b269e0967e684da6", "name": "tempest-GroupSnaphotsV314RbacTest-640793486", "password_expires_at": null}, "audit_ids": ["A9ufeZs0R9yYJQjLprkVTw"], "expires_at": "2020-11-06T19:04:33.000000Z", "issued_at": "2020-11-06T18:04:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "479cc71352d449a5aae47dadceb27a30", "name": "tempest-GroupSnaphotsV314RbacTest-640793486"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:33.693 40 INFO tempest.lib.common.rest_client [req-e791612a-d7e4-41d7-8994-1ce4fa21eb30 ] Request (VolumeTypesExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.109s 2020-11-06 18:04:33.693 40 DEBUG tempest.lib.common.rest_client [req-e791612a-d7e4-41d7-8994-1ce4fa21eb30 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumeTypesExtraSpecsRbacTest-1643276433", "password": "D0~vWG9aG_iOJ+p", "project_id": "cc5d04441be94f4a95ba5bd641c7252d", "email": "tempest-VolumeTypesExtraSpecsRbacTest-1492198365@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '414', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e791612a-d7e4-41d7-8994-1ce4fa21eb30', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "cc5d04441be94f4a95ba5bd641c7252d", "email": "tempest-VolumeTypesExtraSpecsRbacTest-1492198365@example.com", "id": "8e8e24949d5b4644ac4093346e68f855", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1643276433", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/8e8e24949d5b4644ac4093346e68f855"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:33.739 40 INFO tempest.lib.common.rest_client [req-46f4ca0f-ed4e-48a0-9cd5-f8479f6dd686 ] Request (VolumeTypesExtraSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.045s 2020-11-06 18:04:33.740 40 DEBUG tempest.lib.common.rest_client [req-46f4ca0f-ed4e-48a0-9cd5-f8479f6dd686 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-46f4ca0f-ed4e-48a0-9cd5-f8479f6dd686', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:33.785 40 INFO tempest.lib.common.rest_client [req-b24c1b9e-cf12-4015-983d-40ee0f07de7c ] Request (VolumeTypesExtraSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.044s 2020-11-06 18:04:33.785 40 DEBUG tempest.lib.common.rest_client [req-b24c1b9e-cf12-4015-983d-40ee0f07de7c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b24c1b9e-cf12-4015-983d-40ee0f07de7c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:33.850 40 INFO tempest.lib.common.rest_client [req-aac8bff5-36bb-472d-8b91-7ec7dffe263c ] Request (VolumeTypesExtraSpecsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles/72a4576c553448cd941b052c1ca0cf2d 0.063s 2020-11-06 18:04:33.850 40 DEBUG tempest.lib.common.rest_client [req-aac8bff5-36bb-472d-8b91-7ec7dffe263c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aac8bff5-36bb-472d-8b91-7ec7dffe263c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:33.851 40 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumeTypesExtraSpecsRbacTest-1643276433', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'cc5d04441be94f4a95ba5bd641c7252d', 'project_name': 'tempest-VolumeTypesExtraSpecsRbacTest-1643276433', 'tenant_id': 'cc5d04441be94f4a95ba5bd641c7252d', 'tenant_name': 'tempest-VolumeTypesExtraSpecsRbacTest-1643276433', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '8e8e24949d5b4644ac4093346e68f855'}, Network: None, Subnet: None, Router: None 2020-11-06 18:04:33.851 40 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumeTypesExtraSpecsRbacTest-1643276433', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'cc5d04441be94f4a95ba5bd641c7252d', 'project_name': 'tempest-VolumeTypesExtraSpecsRbacTest-1643276433', 'tenant_id': 'cc5d04441be94f4a95ba5bd641c7252d', 'tenant_name': 'tempest-VolumeTypesExtraSpecsRbacTest-1643276433', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '8e8e24949d5b4644ac4093346e68f855'}, Network: None, Subnet: None, Router: None 2020-11-06 18:04:33.874 37 INFO tempest.lib.common.rest_client [req-b8e08de2-3ac1-4c55-937a-586cf19ba648 ] Request (GroupSnaphotsV314RbacTest:test_delete_group_snapshot_rbac): 202 DELETE http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_snapshots/98ebb6ba-1e4f-4855-87de-5ab331f5a962 0.197s 2020-11-06 18:04:33.874 37 DEBUG tempest.lib.common.rest_client [req-b8e08de2-3ac1-4c55-937a-586cf19ba648 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b8e08de2-3ac1-4c55-937a-586cf19ba648', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_snapshots/98ebb6ba-1e4f-4855-87de-5ab331f5a962'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:33.875 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:33.969 40 INFO tempest.lib.common.rest_client [req-58430d5c-68f5-4940-91ba-fc8489d9fc77 ] Request (VolumeTypesExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.107s 2020-11-06 18:04:33.969 40 DEBUG tempest.lib.common.rest_client [req-58430d5c-68f5-4940-91ba-fc8489d9fc77 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6589', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-58430d5c-68f5-4940-91ba-fc8489d9fc77', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8e8e24949d5b4644ac4093346e68f855", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1643276433", "password_expires_at": null}, "audit_ids": ["VLEMSzeSTmqQLA_ENFWskw"], "expires_at": "2020-11-06T19:04:33.000000Z", "issued_at": "2020-11-06T18:04:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cc5d04441be94f4a95ba5bd641c7252d", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1643276433"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:33.992 37 INFO tempest.lib.common.rest_client [req-a417cad2-acf8-4589-b59c-5ef660b9a6ce ] Request (GroupSnaphotsV314RbacTest:test_delete_group_snapshot_rbac): 200 GET http://172.30.13.94/identity/v3/projects/479cc71352d449a5aae47dadceb27a30/users/79626ff2a9f24f28b269e0967e684da6/roles 0.116s 2020-11-06 18:04:33.992 37 DEBUG tempest.lib.common.rest_client [req-a417cad2-acf8-4589-b59c-5ef660b9a6ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a417cad2-acf8-4589-b59c-5ef660b9a6ce', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/479cc71352d449a5aae47dadceb27a30/users/79626ff2a9f24f28b269e0967e684da6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/479cc71352d449a5aae47dadceb27a30/users/79626ff2a9f24f28b269e0967e684da6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:34.055 40 INFO tempest.lib.common.rest_client [req-dbb63681-1d99-413a-821b-e9ccbaa1f733 ] Request (VolumeTypesExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-11-06 18:04:34.056 40 DEBUG tempest.lib.common.rest_client [req-dbb63681-1d99-413a-821b-e9ccbaa1f733 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dbb63681-1d99-413a-821b-e9ccbaa1f733', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["sgPjBGD5TC-ypASl9pnpxA"], "expires_at": "2020-11-06T19:04:33.000000Z", "issued_at": "2020-11-06T18:04:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:34.082 37 INFO tempest.lib.common.rest_client [req-34ba5edc-8d1f-42a9-9cdc-730bf7cb139d ] Request (GroupSnaphotsV314RbacTest:test_delete_group_snapshot_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 18:04:34.082 37 DEBUG tempest.lib.common.rest_client [req-34ba5edc-8d1f-42a9-9cdc-730bf7cb139d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-34ba5edc-8d1f-42a9-9cdc-730bf7cb139d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "79626ff2a9f24f28b269e0967e684da6", "name": "tempest-GroupSnaphotsV314RbacTest-640793486", "password_expires_at": null}, "audit_ids": ["mfAJDmXqTUincziRlCNCbQ"], "expires_at": "2020-11-06T19:04:34.000000Z", "issued_at": "2020-11-06T18:04:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "479cc71352d449a5aae47dadceb27a30", "name": "tempest-GroupSnaphotsV314RbacTest-640793486"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:34.106 40 INFO tempest.lib.common.rest_client [req-0bb8c1a2-c92c-47e1-bbd3-9720e7993d88 ] Request (VolumeTypesExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:04:34.106 40 DEBUG tempest.lib.common.rest_client [req-0bb8c1a2-c92c-47e1-bbd3-9720e7993d88 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0bb8c1a2-c92c-47e1-bbd3-9720e7993d88', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["1-9gMJv6SvSj-Azy_5OCsg"], "expires_at": "2020-11-06T19:04:34.000000Z", "issued_at": "2020-11-06T18:04:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:34.157 40 INFO tempest.lib.common.rest_client [req-64073dd0-6727-44d2-9190-018d16a3c7ed ] Request (VolumeTypesExtraSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.050s 2020-11-06 18:04:34.158 40 DEBUG tempest.lib.common.rest_client [req-64073dd0-6727-44d2-9190-018d16a3c7ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-64073dd0-6727-44d2-9190-018d16a3c7ed', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:34.212 40 INFO tempest.lib.common.rest_client [req-045c1121-a17f-41bf-9c0d-ff8e2e6adbd4 ] Request (VolumeTypesExtraSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.053s 2020-11-06 18:04:34.213 40 DEBUG tempest.lib.common.rest_client [req-045c1121-a17f-41bf-9c0d-ff8e2e6adbd4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-045c1121-a17f-41bf-9c0d-ff8e2e6adbd4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:34.213 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:04:34.214 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:34.262 37 INFO tempest.lib.common.rest_client [req-853a4530-72e0-4a01-bf6b-025ed8e2c2aa ] Request (GroupSnaphotsV314RbacTest:test_delete_group_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/detail 0.178s 2020-11-06 18:04:34.263 37 DEBUG tempest.lib.common.rest_client [req-853a4530-72e0-4a01-bf6b-025ed8e2c2aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-853a4530-72e0-4a01-bf6b-025ed8e2c2aa', 'content-length': '1175', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-853a4530-72e0-4a01-bf6b-025ed8e2c2aa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/detail'} Body: b'{"volumes": [{"id": "6279c1fa-2fc9-487e-9ed9-0a6154caa6f8", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:31.000000", "updated_at": "2020-11-06T18:04:31.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-1071617123", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-581628133", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/6279c1fa-2fc9-487e-9ed9-0a6154caa6f8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/479cc71352d449a5aae47dadceb27a30/volumes/6279c1fa-2fc9-487e-9ed9-0a6154caa6f8"}], "user_id": "79626ff2a9f24f28b269e0967e684da6", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "73a3ead6-89d0-4f34-815a-f1a5578459dd", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "479cc71352d449a5aae47dadceb27a30"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:34.263 40 INFO tempest.lib.common.rest_client [req-238edc42-219d-445c-b96f-a3cd48c3a391 ] Request (VolumeTypesExtraSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles 0.048s 2020-11-06 18:04:34.263 40 DEBUG tempest.lib.common.rest_client [req-238edc42-219d-445c-b96f-a3cd48c3a391 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-238edc42-219d-445c-b96f-a3cd48c3a391', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:34.308 37 INFO tempest.lib.common.rest_client [req-2819a475-ae82-4be3-b2af-6352dddc226e ] Request (GroupSnaphotsV314RbacTest:test_delete_group_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/snapshots/detail 0.030s 2020-11-06 18:04:34.308 37 DEBUG tempest.lib.common.rest_client [req-2819a475-ae82-4be3-b2af-6352dddc226e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-2819a475-ae82-4be3-b2af-6352dddc226e', 'content-length': '17', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2819a475-ae82-4be3-b2af-6352dddc226e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/snapshots/detail'} Body: b'{"snapshots": []}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:34.329 40 INFO tempest.lib.common.rest_client [req-16b97fe5-3713-406e-935c-a7fe9b826182 ] Request (VolumeTypesExtraSpecsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles/72a4576c553448cd941b052c1ca0cf2d 0.064s 2020-11-06 18:04:34.329 40 DEBUG tempest.lib.common.rest_client [req-16b97fe5-3713-406e-935c-a7fe9b826182 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-16b97fe5-3713-406e-935c-a7fe9b826182', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:34.331 37 INFO tempest.lib.common.rest_client [req-be2ecf97-84b5-4d70-bbe3-40e124ce3881 ] Request (GroupSnaphotsV314RbacTest:test_delete_group_snapshot_rbac): 404 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_snapshots/98ebb6ba-1e4f-4855-87de-5ab331f5a962 0.016s 2020-11-06 18:04:34.332 37 DEBUG tempest.lib.common.rest_client [req-be2ecf97-84b5-4d70-bbe3-40e124ce3881 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'content-length': '116', 'content-type': 'application/json', 'x-compute-request-id': 'req-be2ecf97-84b5-4d70-bbe3-40e124ce3881', 'x-openstack-request-id': 'req-be2ecf97-84b5-4d70-bbe3-40e124ce3881', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_snapshots/98ebb6ba-1e4f-4855-87de-5ab331f5a962'} Body: b'{"itemNotFound": {"code": 404, "message": "GroupSnapshot 98ebb6ba-1e4f-4855-87de-5ab331f5a962 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:34.350 37 INFO tempest.lib.common.rest_client [req-dab2c42a-bc88-4b8d-91ca-6d575d6a3ae7 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_snapshots/98ebb6ba-1e4f-4855-87de-5ab331f5a962 0.017s 2020-11-06 18:04:34.351 37 DEBUG tempest.lib.common.rest_client [req-dab2c42a-bc88-4b8d-91ca-6d575d6a3ae7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'content-length': '116', 'content-type': 'application/json', 'x-compute-request-id': 'req-dab2c42a-bc88-4b8d-91ca-6d575d6a3ae7', 'x-openstack-request-id': 'req-dab2c42a-bc88-4b8d-91ca-6d575d6a3ae7', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_snapshots/98ebb6ba-1e4f-4855-87de-5ab331f5a962'} Body: b'{"itemNotFound": {"code": 404, "message": "GroupSnapshot 98ebb6ba-1e4f-4855-87de-5ab331f5a962 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:34.403 39 INFO tempest.lib.common.rest_client [req-2fc65ea8-3af4-405b-9af0-2c7a63ad0d1c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.333s 2020-11-06 18:04:34.403 39 DEBUG tempest.lib.common.rest_client [req-2fc65ea8-3af4-405b-9af0-2c7a63ad0d1c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2fc65ea8-3af4-405b-9af0-2c7a63ad0d1c', 'x-compute-request-id': 'req-2fc65ea8-3af4-405b-9af0-2c7a63ad0d1c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:34.429 37 INFO tempest.lib.common.rest_client [req-816e4784-3840-483a-9cff-e58ca8622dba ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/detail 0.076s 2020-11-06 18:04:34.429 37 DEBUG tempest.lib.common.rest_client [req-816e4784-3840-483a-9cff-e58ca8622dba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-816e4784-3840-483a-9cff-e58ca8622dba', 'content-length': '1175', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-816e4784-3840-483a-9cff-e58ca8622dba', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/detail'} Body: b'{"volumes": [{"id": "6279c1fa-2fc9-487e-9ed9-0a6154caa6f8", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:31.000000", "updated_at": "2020-11-06T18:04:31.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-1071617123", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-581628133", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/6279c1fa-2fc9-487e-9ed9-0a6154caa6f8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/479cc71352d449a5aae47dadceb27a30/volumes/6279c1fa-2fc9-487e-9ed9-0a6154caa6f8"}], "user_id": "79626ff2a9f24f28b269e0967e684da6", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "73a3ead6-89d0-4f34-815a-f1a5578459dd", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "479cc71352d449a5aae47dadceb27a30"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:34.437 40 INFO tempest.lib.common.rest_client [req-95b974b3-a8ae-409d-8eee-046a7b4d7605 ] Request (VolumeTypesExtraSpecsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles/a629c95d64b3416fb80ae90af4f69c05 0.107s 2020-11-06 18:04:34.438 40 DEBUG tempest.lib.common.rest_client [req-95b974b3-a8ae-409d-8eee-046a7b4d7605 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-95b974b3-a8ae-409d-8eee-046a7b4d7605', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:34.558 37 INFO tempest.lib.common.rest_client [req-7f5dc2cb-db17-4f8c-b1ba-7d83739e5ce2 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 202 POST http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups/73a3ead6-89d0-4f34-815a-f1a5578459dd/action 0.113s 2020-11-06 18:04:34.558 37 DEBUG tempest.lib.common.rest_client [req-7f5dc2cb-db17-4f8c-b1ba-7d83739e5ce2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"delete": {"delete-volumes": true}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7f5dc2cb-db17-4f8c-b1ba-7d83739e5ce2', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups/73a3ead6-89d0-4f34-815a-f1a5578459dd/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:34.655 37 INFO tempest.lib.common.rest_client [req-e1119ae1-4cb3-4661-87ee-8d08806c3e17 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/6279c1fa-2fc9-487e-9ed9-0a6154caa6f8 0.096s 2020-11-06 18:04:34.656 37 DEBUG tempest.lib.common.rest_client [req-e1119ae1-4cb3-4661-87ee-8d08806c3e17 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e1119ae1-4cb3-4661-87ee-8d08806c3e17', 'content-length': '1171', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e1119ae1-4cb3-4661-87ee-8d08806c3e17', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/6279c1fa-2fc9-487e-9ed9-0a6154caa6f8'} Body: b'{"volume": {"id": "6279c1fa-2fc9-487e-9ed9-0a6154caa6f8", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:31.000000", "updated_at": "2020-11-06T18:04:35.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-1071617123", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-581628133", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/6279c1fa-2fc9-487e-9ed9-0a6154caa6f8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/479cc71352d449a5aae47dadceb27a30/volumes/6279c1fa-2fc9-487e-9ed9-0a6154caa6f8"}], "user_id": "79626ff2a9f24f28b269e0967e684da6", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "73a3ead6-89d0-4f34-815a-f1a5578459dd", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "479cc71352d449a5aae47dadceb27a30"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:35.530 40 INFO tempest.lib.common.rest_client [req-b56baff6-3db1-4e34-9977-c9a94aa61b3a ] Request (VolumeTypesExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-11-06 18:04:35.531 40 DEBUG tempest.lib.common.rest_client [req-b56baff6-3db1-4e34-9977-c9a94aa61b3a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b56baff6-3db1-4e34-9977-c9a94aa61b3a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8e8e24949d5b4644ac4093346e68f855", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1643276433", "password_expires_at": null}, "audit_ids": ["1sxklfXTTLOFM79I4YOWTA"], "expires_at": "2020-11-06T19:04:35.000000Z", "issued_at": "2020-11-06T18:04:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cc5d04441be94f4a95ba5bd641c7252d", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1643276433"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:35.645 40 INFO tempest.lib.common.rest_client [req-ee09dc53-0beb-47d7-8c08-425383d4dbab ] Request (VolumeTypesExtraSpecsRbacTest:setUpClass): 200 POST http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d/types 0.112s 2020-11-06 18:04:35.645 40 DEBUG tempest.lib.common.rest_client [req-ee09dc53-0beb-47d7-8c08-425383d4dbab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-VolumeTypesExtraSpecsRbacTest-volume-type-745130137"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ee09dc53-0beb-47d7-8c08-425383d4dbab', 'content-length': '234', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ee09dc53-0beb-47d7-8c08-425383d4dbab', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d/types'} Body: b'{"volume_type": {"id": "8d098780-99e3-4f7b-8aa2-9037ce4ae037", "name": "tempest-VolumeTypesExtraSpecsRbacTest-volume-type-745130137", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:35.650 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:35.653 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:types_extra_specs:create, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:35.654 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:35.668 39 INFO tempest.lib.common.rest_client [req-dc4cd933-0720-46c9-ade3-e9b8bdc59421 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.251s 2020-11-06 18:04:35.669 39 DEBUG tempest.lib.common.rest_client [req-dc4cd933-0720-46c9-ade3-e9b8bdc59421 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dc4cd933-0720-46c9-ade3-e9b8bdc59421', 'x-compute-request-id': 'req-dc4cd933-0720-46c9-ade3-e9b8bdc59421', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:35.724 37 INFO tempest.lib.common.rest_client [req-162e4b7d-782c-4b9b-bcc5-c1fbbf1b59d8 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/6279c1fa-2fc9-487e-9ed9-0a6154caa6f8 0.051s 2020-11-06 18:04:35.725 37 DEBUG tempest.lib.common.rest_client [req-162e4b7d-782c-4b9b-bcc5-c1fbbf1b59d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-162e4b7d-782c-4b9b-bcc5-c1fbbf1b59d8', 'x-openstack-request-id': 'req-162e4b7d-782c-4b9b-bcc5-c1fbbf1b59d8', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/6279c1fa-2fc9-487e-9ed9-0a6154caa6f8'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 6279c1fa-2fc9-487e-9ed9-0a6154caa6f8 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:35.743 37 INFO tempest.lib.common.rest_client [req-a9e37609-6ce9-4159-abe3-438238780142 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups/73a3ead6-89d0-4f34-815a-f1a5578459dd 0.017s 2020-11-06 18:04:35.744 37 DEBUG tempest.lib.common.rest_client [req-a9e37609-6ce9-4159-abe3-438238780142 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'content-length': '108', 'content-type': 'application/json', 'x-compute-request-id': 'req-a9e37609-6ce9-4159-abe3-438238780142', 'x-openstack-request-id': 'req-a9e37609-6ce9-4159-abe3-438238780142', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups/73a3ead6-89d0-4f34-815a-f1a5578459dd'} Body: b'{"itemNotFound": {"code": 404, "message": "Group 73a3ead6-89d0-4f34-815a-f1a5578459dd could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:35.751 40 INFO tempest.lib.common.rest_client [req-16849fec-590e-4446-b636-e6d5402a8aa9 ] Request (VolumeTypesExtraSpecsRbacTest:test_create_volume_type_extra_specs): 200 GET http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles 0.096s 2020-11-06 18:04:35.752 40 DEBUG tempest.lib.common.rest_client [req-16849fec-590e-4446-b636-e6d5402a8aa9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-16849fec-590e-4446-b636-e6d5402a8aa9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:35.781 37 INFO tempest.lib.common.rest_client [req-5f6d36cd-5d53-432a-a87f-fd50d9184374 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_types/7681bb3a-1cb4-48d8-8029-984cfc12ac8e 0.036s 2020-11-06 18:04:35.782 37 DEBUG tempest.lib.common.rest_client [req-5f6d36cd-5d53-432a-a87f-fd50d9184374 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5f6d36cd-5d53-432a-a87f-fd50d9184374', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_types/7681bb3a-1cb4-48d8-8029-984cfc12ac8e'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:35.784 40 INFO tempest.lib.common.rest_client [req-f10dbfce-d3c0-46f8-95c0-15c12e32ec4e ] Request (VolumeTypesExtraSpecsRbacTest:test_create_volume_type_extra_specs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:04:35.785 40 DEBUG tempest.lib.common.rest_client [req-f10dbfce-d3c0-46f8-95c0-15c12e32ec4e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f10dbfce-d3c0-46f8-95c0-15c12e32ec4e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8e8e24949d5b4644ac4093346e68f855", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1643276433", "password_expires_at": null}, "audit_ids": ["DUywkFj_TTS_4ALYbb-r8g"], "expires_at": "2020-11-06T19:04:35.000000Z", "issued_at": "2020-11-06T18:04:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cc5d04441be94f4a95ba5bd641c7252d", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1643276433"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:35.828 37 INFO tempest.lib.common.rest_client [req-75de27f4-c482-44fa-919e-8370d41c3f95 ] Request (GroupSnaphotsV314RbacTest:setUp): 200 POST http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/types 0.042s 2020-11-06 18:04:35.828 37 DEBUG tempest.lib.common.rest_client [req-75de27f4-c482-44fa-919e-8370d41c3f95 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-GroupSnaphotsV314RbacTest-volume-type-849147758"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-75de27f4-c482-44fa-919e-8370d41c3f95', 'content-length': '230', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-75de27f4-c482-44fa-919e-8370d41c3f95', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/types'} Body: b'{"volume_type": {"id": "1f3992ad-0c48-4dc2-9b67-208faf6b7ece", "name": "tempest-GroupSnaphotsV314RbacTest-volume-type-849147758", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:35.872 37 INFO tempest.lib.common.rest_client [req-5e02c3d4-aa2c-4b5c-a001-05a9eb83fad3 ] Request (GroupSnaphotsV314RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_types 0.039s 2020-11-06 18:04:35.873 37 DEBUG tempest.lib.common.rest_client [req-5e02c3d4-aa2c-4b5c-a001-05a9eb83fad3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupSnaphotsV314RbacTest-group-type-853804044"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-5e02c3d4-aa2c-4b5c-a001-05a9eb83fad3', 'content-length': '187', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5e02c3d4-aa2c-4b5c-a001-05a9eb83fad3', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_types'} Body: b'{"group_type": {"id": "0497c6a8-b9f4-4eac-a7c9-89f358fca2e5", "name": "tempest-GroupSnaphotsV314RbacTest-group-type-853804044", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:35.951 40 INFO tempest.lib.common.rest_client [req-74954b44-4fa4-4c18-8250-485a826a7056 ] Request (VolumeTypesExtraSpecsRbacTest:test_create_volume_type_extra_specs): 200 POST http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d/types/8d098780-99e3-4f7b-8aa2-9037ce4ae037/extra_specs 0.164s 2020-11-06 18:04:35.951 40 DEBUG tempest.lib.common.rest_client [req-74954b44-4fa4-4c18-8250-485a826a7056 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"extra_specs": {"tempest-VolumeTypesExtraSpecsRbacTest-Spec-1381372347": "val1"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-74954b44-4fa4-4c18-8250-485a826a7056', 'content-length': '82', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-74954b44-4fa4-4c18-8250-485a826a7056', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d/types/8d098780-99e3-4f7b-8aa2-9037ce4ae037/extra_specs'} Body: b'{"extra_specs": {"tempest-VolumeTypesExtraSpecsRbacTest-Spec-1381372347": "val1"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:35.953 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:35.982 37 INFO tempest.lib.common.rest_client [req-ac9154c7-b32d-4035-8454-7ceb83251f8a ] Request (GroupSnaphotsV314RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups 0.104s 2020-11-06 18:04:35.983 37 DEBUG tempest.lib.common.rest_client [req-ac9154c7-b32d-4035-8454-7ceb83251f8a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"group": {"group_type": "0497c6a8-b9f4-4eac-a7c9-89f358fca2e5", "volume_types": ["1f3992ad-0c48-4dc2-9b67-208faf6b7ece"], "name": "tempest-GroupSnaphotsV314RbacTest-Group-1342668314"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ac9154c7-b32d-4035-8454-7ceb83251f8a', 'content-length': '119', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ac9154c7-b32d-4035-8454-7ceb83251f8a', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups'} Body: b'{"group": {"id": "7fe5095d-eae7-4db3-84f1-4d1777d8c5b2", "name": "tempest-GroupSnaphotsV314RbacTest-Group-1342668314"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:36.015 40 INFO tempest.lib.common.rest_client [req-942b14c9-1113-4f88-98ea-701a43439ba0 ] Request (VolumeTypesExtraSpecsRbacTest:test_create_volume_type_extra_specs): 200 GET http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles 0.061s 2020-11-06 18:04:36.015 40 DEBUG tempest.lib.common.rest_client [req-942b14c9-1113-4f88-98ea-701a43439ba0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-942b14c9-1113-4f88-98ea-701a43439ba0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:36.020 37 INFO tempest.lib.common.rest_client [req-f277b40a-e966-4697-9fb2-b7d5685284df ] Request (GroupSnaphotsV314RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups/7fe5095d-eae7-4db3-84f1-4d1777d8c5b2 0.033s 2020-11-06 18:04:36.020 37 DEBUG tempest.lib.common.rest_client [req-f277b40a-e966-4697-9fb2-b7d5685284df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-f277b40a-e966-4697-9fb2-b7d5685284df', 'content-length': '399', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f277b40a-e966-4697-9fb2-b7d5685284df', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups/7fe5095d-eae7-4db3-84f1-4d1777d8c5b2'} Body: b'{"group": {"id": "7fe5095d-eae7-4db3-84f1-4d1777d8c5b2", "status": "creating", "availability_zone": "nova", "created_at": "2020-11-06T18:04:36.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Group-1342668314", "description": null, "group_type": "0497c6a8-b9f4-4eac-a7c9-89f358fca2e5", "volume_types": ["1f3992ad-0c48-4dc2-9b67-208faf6b7ece"], "group_snapshot_id": null, "source_group_id": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:36.052 40 INFO tempest.lib.common.rest_client [req-3c54f361-8777-4144-9b93-9fe1e9d98cca ] Request (VolumeTypesExtraSpecsRbacTest:test_create_volume_type_extra_specs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:04:36.053 40 DEBUG tempest.lib.common.rest_client [req-3c54f361-8777-4144-9b93-9fe1e9d98cca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3c54f361-8777-4144-9b93-9fe1e9d98cca', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8e8e24949d5b4644ac4093346e68f855", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1643276433", "password_expires_at": null}, "audit_ids": ["C-zqbP_ARHOwtW8CrcpzMA"], "expires_at": "2020-11-06T19:04:36.000000Z", "issued_at": "2020-11-06T18:04:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cc5d04441be94f4a95ba5bd641c7252d", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1643276433"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:36.182 40 INFO tempest.lib.common.rest_client [req-b21cc917-1a6f-411a-b411-1e974bb4b2ef ] Request (VolumeTypesExtraSpecsRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d/types/8d098780-99e3-4f7b-8aa2-9037ce4ae037/extra_specs/tempest-VolumeTypesExtraSpecsRbacTest-Spec-1381372347 0.129s 2020-11-06 18:04:36.183 40 DEBUG tempest.lib.common.rest_client [req-b21cc917-1a6f-411a-b411-1e974bb4b2ef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-b21cc917-1a6f-411a-b411-1e974bb4b2ef', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b21cc917-1a6f-411a-b411-1e974bb4b2ef', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d/types/8d098780-99e3-4f7b-8aa2-9037ce4ae037/extra_specs/tempest-VolumeTypesExtraSpecsRbacTest-Spec-1381372347'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:36.185 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:36.188 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:types_extra_specs:delete, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:36.280 40 INFO tempest.lib.common.rest_client [req-2175f4aa-56ee-4721-865e-c7337863bc47 ] Request (VolumeTypesExtraSpecsRbacTest:test_delete_volume_type_extra_specs): 200 POST http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d/types/8d098780-99e3-4f7b-8aa2-9037ce4ae037/extra_specs 0.090s 2020-11-06 18:04:36.280 40 DEBUG tempest.lib.common.rest_client [req-2175f4aa-56ee-4721-865e-c7337863bc47 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"extra_specs": {"tempest-VolumeTypesExtraSpecsRbacTest-Spec-1381372347": "val1"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-2175f4aa-56ee-4721-865e-c7337863bc47', 'content-length': '82', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2175f4aa-56ee-4721-865e-c7337863bc47', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d/types/8d098780-99e3-4f7b-8aa2-9037ce4ae037/extra_specs'} Body: b'{"extra_specs": {"tempest-VolumeTypesExtraSpecsRbacTest-Spec-1381372347": "val1"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:36.283 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:36.332 40 INFO tempest.lib.common.rest_client [req-22b3bc3a-1347-4c20-8a87-a39346b2d5a4 ] Request (VolumeTypesExtraSpecsRbacTest:test_delete_volume_type_extra_specs): 200 GET http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles 0.048s 2020-11-06 18:04:36.332 40 DEBUG tempest.lib.common.rest_client [req-22b3bc3a-1347-4c20-8a87-a39346b2d5a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-22b3bc3a-1347-4c20-8a87-a39346b2d5a4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:36.371 40 INFO tempest.lib.common.rest_client [req-69db649f-6a1a-418c-8a75-a0b540862c91 ] Request (VolumeTypesExtraSpecsRbacTest:test_delete_volume_type_extra_specs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:04:36.372 40 DEBUG tempest.lib.common.rest_client [req-69db649f-6a1a-418c-8a75-a0b540862c91 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-69db649f-6a1a-418c-8a75-a0b540862c91', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8e8e24949d5b4644ac4093346e68f855", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1643276433", "password_expires_at": null}, "audit_ids": ["auDQa-O_Qwu0x3aeZDXwdQ"], "expires_at": "2020-11-06T19:04:36.000000Z", "issued_at": "2020-11-06T18:04:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cc5d04441be94f4a95ba5bd641c7252d", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1643276433"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:36.508 40 INFO tempest.lib.common.rest_client [req-0daa96dc-1691-404a-8e9f-afa2b5346458 ] Request (VolumeTypesExtraSpecsRbacTest:test_delete_volume_type_extra_specs): 202 DELETE http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d/types/8d098780-99e3-4f7b-8aa2-9037ce4ae037/extra_specs/tempest-VolumeTypesExtraSpecsRbacTest-Spec-1381372347 0.135s 2020-11-06 18:04:36.509 40 DEBUG tempest.lib.common.rest_client [req-0daa96dc-1691-404a-8e9f-afa2b5346458 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-0daa96dc-1691-404a-8e9f-afa2b5346458', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0daa96dc-1691-404a-8e9f-afa2b5346458', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d/types/8d098780-99e3-4f7b-8aa2-9037ce4ae037/extra_specs/tempest-VolumeTypesExtraSpecsRbacTest-Spec-1381372347'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:36.509 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:36.559 40 INFO tempest.lib.common.rest_client [req-b3d34a9a-b757-4c27-9642-1789ffe66844 ] Request (VolumeTypesExtraSpecsRbacTest:test_delete_volume_type_extra_specs): 200 GET http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles 0.048s 2020-11-06 18:04:36.559 40 DEBUG tempest.lib.common.rest_client [req-b3d34a9a-b757-4c27-9642-1789ffe66844 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b3d34a9a-b757-4c27-9642-1789ffe66844', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:36.594 40 INFO tempest.lib.common.rest_client [req-63a836d2-9cb8-4234-b973-c8db6ecdd1f7 ] Request (VolumeTypesExtraSpecsRbacTest:test_delete_volume_type_extra_specs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:04:36.594 40 DEBUG tempest.lib.common.rest_client [req-63a836d2-9cb8-4234-b973-c8db6ecdd1f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-63a836d2-9cb8-4234-b973-c8db6ecdd1f7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8e8e24949d5b4644ac4093346e68f855", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1643276433", "password_expires_at": null}, "audit_ids": ["x8GltdhET6uX52vr8vbJ1A"], "expires_at": "2020-11-06T19:04:36.000000Z", "issued_at": "2020-11-06T18:04:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cc5d04441be94f4a95ba5bd641c7252d", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1643276433"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:36.724 40 INFO tempest.lib.common.rest_client [req-abc11322-df77-4368-b5cd-df1be8373a0a ] Request (VolumeTypesExtraSpecsRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d/types/8d098780-99e3-4f7b-8aa2-9037ce4ae037/extra_specs/tempest-VolumeTypesExtraSpecsRbacTest-Spec-1381372347 0.128s 2020-11-06 18:04:36.725 40 DEBUG tempest.lib.common.rest_client [req-abc11322-df77-4368-b5cd-df1be8373a0a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '177', 'content-type': 'application/json', 'x-compute-request-id': 'req-abc11322-df77-4368-b5cd-df1be8373a0a', 'x-openstack-request-id': 'req-abc11322-df77-4368-b5cd-df1be8373a0a', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d/types/8d098780-99e3-4f7b-8aa2-9037ce4ae037/extra_specs/tempest-VolumeTypesExtraSpecsRbacTest-Spec-1381372347'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume Type 8d098780-99e3-4f7b-8aa2-9037ce4ae037 has no extra specs with key tempest-VolumeTypesExtraSpecsRbacTest-Spec-1381372347."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:36.728 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:36.731 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:types_extra_specs:index, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:36.732 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:36.834 40 INFO tempest.lib.common.rest_client [req-b62734d9-8e14-4856-8b98-3ba71307171c ] Request (VolumeTypesExtraSpecsRbacTest:test_list_volume_types_extra_specs): 200 GET http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles 0.102s 2020-11-06 18:04:36.835 40 DEBUG tempest.lib.common.rest_client [req-b62734d9-8e14-4856-8b98-3ba71307171c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b62734d9-8e14-4856-8b98-3ba71307171c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:36.919 40 INFO tempest.lib.common.rest_client [req-c34b806d-c7d2-4158-9561-5680d95271d4 ] Request (VolumeTypesExtraSpecsRbacTest:test_list_volume_types_extra_specs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-11-06 18:04:36.920 40 DEBUG tempest.lib.common.rest_client [req-c34b806d-c7d2-4158-9561-5680d95271d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c34b806d-c7d2-4158-9561-5680d95271d4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8e8e24949d5b4644ac4093346e68f855", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1643276433", "password_expires_at": null}, "audit_ids": ["Um84hX7PQSGJt2NHcyE9wg"], "expires_at": "2020-11-06T19:04:36.000000Z", "issued_at": "2020-11-06T18:04:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cc5d04441be94f4a95ba5bd641c7252d", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1643276433"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:36.923 39 INFO tempest.lib.common.rest_client [req-8c73bda0-1644-4df6-a6d7-c996a271c005 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.238s 2020-11-06 18:04:36.923 39 DEBUG tempest.lib.common.rest_client [req-8c73bda0-1644-4df6-a6d7-c996a271c005 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8c73bda0-1644-4df6-a6d7-c996a271c005', 'x-compute-request-id': 'req-8c73bda0-1644-4df6-a6d7-c996a271c005', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:37.059 40 INFO tempest.lib.common.rest_client [req-0f1297af-3f20-4e77-831b-4b829aee8feb ] Request (VolumeTypesExtraSpecsRbacTest:test_list_volume_types_extra_specs): 200 GET http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d/types/8d098780-99e3-4f7b-8aa2-9037ce4ae037/extra_specs 0.137s 2020-11-06 18:04:37.059 40 DEBUG tempest.lib.common.rest_client [req-0f1297af-3f20-4e77-831b-4b829aee8feb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-0f1297af-3f20-4e77-831b-4b829aee8feb', 'content-length': '19', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0f1297af-3f20-4e77-831b-4b829aee8feb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d/types/8d098780-99e3-4f7b-8aa2-9037ce4ae037/extra_specs'} Body: b'{"extra_specs": {}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:37.062 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:37.072 37 INFO tempest.lib.common.rest_client [req-86b9574c-39c3-4777-a147-00af9ba06ff1 ] Request (GroupSnaphotsV314RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups/7fe5095d-eae7-4db3-84f1-4d1777d8c5b2 0.044s 2020-11-06 18:04:37.073 37 DEBUG tempest.lib.common.rest_client [req-86b9574c-39c3-4777-a147-00af9ba06ff1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-86b9574c-39c3-4777-a147-00af9ba06ff1', 'content-length': '400', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-86b9574c-39c3-4777-a147-00af9ba06ff1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups/7fe5095d-eae7-4db3-84f1-4d1777d8c5b2'} Body: b'{"group": {"id": "7fe5095d-eae7-4db3-84f1-4d1777d8c5b2", "status": "available", "availability_zone": "nova", "created_at": "2020-11-06T18:04:36.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Group-1342668314", "description": null, "group_type": "0497c6a8-b9f4-4eac-a7c9-89f358fca2e5", "volume_types": ["1f3992ad-0c48-4dc2-9b67-208faf6b7ece"], "group_snapshot_id": null, "source_group_id": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:37.077 37 INFO tempest.common.waiters [-] group 7fe5095d-eae7-4db3-84f1-4d1777d8c5b2 reached available after waiting for 1.077820 seconds 2020-11-06 18:04:37.126 40 INFO tempest.lib.common.rest_client [req-3abbb130-7816-47a3-b5d5-b74914af21bb ] Request (VolumeTypesExtraSpecsRbacTest:test_list_volume_types_extra_specs): 200 GET http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles 0.063s 2020-11-06 18:04:37.127 40 DEBUG tempest.lib.common.rest_client [req-3abbb130-7816-47a3-b5d5-b74914af21bb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3abbb130-7816-47a3-b5d5-b74914af21bb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:37.168 40 INFO tempest.lib.common.rest_client [req-a6cae0cd-7c1c-4feb-9887-b192feb060c3 ] Request (VolumeTypesExtraSpecsRbacTest:test_list_volume_types_extra_specs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:04:37.169 40 DEBUG tempest.lib.common.rest_client [req-a6cae0cd-7c1c-4feb-9887-b192feb060c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a6cae0cd-7c1c-4feb-9887-b192feb060c3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8e8e24949d5b4644ac4093346e68f855", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1643276433", "password_expires_at": null}, "audit_ids": ["3WqZ398cTfScvguI7RKY-A"], "expires_at": "2020-11-06T19:04:37.000000Z", "issued_at": "2020-11-06T18:04:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cc5d04441be94f4a95ba5bd641c7252d", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1643276433"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:37.172 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:37.175 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:types_extra_specs:show, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:37.321 40 INFO tempest.lib.common.rest_client [req-0ce64766-8276-4e5f-801c-49e8e98b22bf ] Request (VolumeTypesExtraSpecsRbacTest:test_show_volume_type_extra_specs): 200 POST http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d/types/8d098780-99e3-4f7b-8aa2-9037ce4ae037/extra_specs 0.145s 2020-11-06 18:04:37.322 40 DEBUG tempest.lib.common.rest_client [req-0ce64766-8276-4e5f-801c-49e8e98b22bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"extra_specs": {"tempest-VolumeTypesExtraSpecsRbacTest-Spec-1381372347": "val1"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-0ce64766-8276-4e5f-801c-49e8e98b22bf', 'content-length': '82', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0ce64766-8276-4e5f-801c-49e8e98b22bf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d/types/8d098780-99e3-4f7b-8aa2-9037ce4ae037/extra_specs'} Body: b'{"extra_specs": {"tempest-VolumeTypesExtraSpecsRbacTest-Spec-1381372347": "val1"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:37.324 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:37.435 40 INFO tempest.lib.common.rest_client [req-578005cd-a68b-4c1d-83bc-99b70acbae1f ] Request (VolumeTypesExtraSpecsRbacTest:test_show_volume_type_extra_specs): 200 GET http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles 0.109s 2020-11-06 18:04:37.435 40 DEBUG tempest.lib.common.rest_client [req-578005cd-a68b-4c1d-83bc-99b70acbae1f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-578005cd-a68b-4c1d-83bc-99b70acbae1f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:37.437 37 INFO tempest.lib.common.rest_client [req-c03d63e5-8c4e-44fd-9a1a-f86be391a6b3 ] Request (GroupSnaphotsV314RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes 0.358s 2020-11-06 18:04:37.437 37 DEBUG tempest.lib.common.rest_client [req-c03d63e5-8c4e-44fd-9a1a-f86be391a6b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"volume": {"volume_type": "1f3992ad-0c48-4dc2-9b67-208faf6b7ece", "group_id": "7fe5095d-eae7-4db3-84f1-4d1777d8c5b2", "size": 1, "name": "tempest-GroupSnaphotsV314RbacTest-Volume-2132606517"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c03d63e5-8c4e-44fd-9a1a-f86be391a6b3', 'content-length': '949', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c03d63e5-8c4e-44fd-9a1a-f86be391a6b3', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes'} Body: b'{"volume": {"id": "6fcb24e7-f733-4933-bd08-a1880f3a51e7", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:37.000000", "updated_at": null, "name": "tempest-GroupSnaphotsV314RbacTest-Volume-2132606517", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-849147758", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/6fcb24e7-f733-4933-bd08-a1880f3a51e7"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/479cc71352d449a5aae47dadceb27a30/volumes/6fcb24e7-f733-4933-bd08-a1880f3a51e7"}], "user_id": "79626ff2a9f24f28b269e0967e684da6", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "7fe5095d-eae7-4db3-84f1-4d1777d8c5b2"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:37.528 40 INFO tempest.lib.common.rest_client [req-b66b46b5-71b6-4aa2-9112-e5f75257f1e0 ] Request (VolumeTypesExtraSpecsRbacTest:test_show_volume_type_extra_specs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-11-06 18:04:37.528 40 DEBUG tempest.lib.common.rest_client [req-b66b46b5-71b6-4aa2-9112-e5f75257f1e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b66b46b5-71b6-4aa2-9112-e5f75257f1e0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8e8e24949d5b4644ac4093346e68f855", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1643276433", "password_expires_at": null}, "audit_ids": ["MJ5TAhGTSZSP0L908nhVyQ"], "expires_at": "2020-11-06T19:04:37.000000Z", "issued_at": "2020-11-06T18:04:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cc5d04441be94f4a95ba5bd641c7252d", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1643276433"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:37.544 37 INFO tempest.lib.common.rest_client [req-ad77e042-00cc-4e7c-a4cf-3303b06cb590 ] Request (GroupSnaphotsV314RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/6fcb24e7-f733-4933-bd08-a1880f3a51e7 0.093s 2020-11-06 18:04:37.545 37 DEBUG tempest.lib.common.rest_client [req-ad77e042-00cc-4e7c-a4cf-3303b06cb590 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ad77e042-00cc-4e7c-a4cf-3303b06cb590', 'content-length': '1171', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ad77e042-00cc-4e7c-a4cf-3303b06cb590', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/6fcb24e7-f733-4933-bd08-a1880f3a51e7'} Body: b'{"volume": {"id": "6fcb24e7-f733-4933-bd08-a1880f3a51e7", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:37.000000", "updated_at": "2020-11-06T18:04:37.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-2132606517", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-849147758", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/6fcb24e7-f733-4933-bd08-a1880f3a51e7"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/479cc71352d449a5aae47dadceb27a30/volumes/6fcb24e7-f733-4933-bd08-a1880f3a51e7"}], "user_id": "79626ff2a9f24f28b269e0967e684da6", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "7fe5095d-eae7-4db3-84f1-4d1777d8c5b2", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "479cc71352d449a5aae47dadceb27a30"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:37.770 40 INFO tempest.lib.common.rest_client [req-2d326c40-8d9c-493d-a4cb-9a4d43d0ea04 ] Request (VolumeTypesExtraSpecsRbacTest:test_show_volume_type_extra_specs): 200 GET http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d/types/8d098780-99e3-4f7b-8aa2-9037ce4ae037/extra_specs/tempest-VolumeTypesExtraSpecsRbacTest-Spec-1381372347 0.241s 2020-11-06 18:04:37.771 40 DEBUG tempest.lib.common.rest_client [req-2d326c40-8d9c-493d-a4cb-9a4d43d0ea04 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-2d326c40-8d9c-493d-a4cb-9a4d43d0ea04', 'content-length': '65', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2d326c40-8d9c-493d-a4cb-9a4d43d0ea04', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d/types/8d098780-99e3-4f7b-8aa2-9037ce4ae037/extra_specs/tempest-VolumeTypesExtraSpecsRbacTest-Spec-1381372347'} Body: b'{"tempest-VolumeTypesExtraSpecsRbacTest-Spec-1381372347": "val1"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:37.773 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:37.877 40 INFO tempest.lib.common.rest_client [req-e19ebad7-7811-467c-b544-431011643375 ] Request (VolumeTypesExtraSpecsRbacTest:test_show_volume_type_extra_specs): 200 GET http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles 0.103s 2020-11-06 18:04:37.878 40 DEBUG tempest.lib.common.rest_client [req-e19ebad7-7811-467c-b544-431011643375 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e19ebad7-7811-467c-b544-431011643375', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:37.967 40 INFO tempest.lib.common.rest_client [req-ff8c40ef-b4ac-4edd-9af2-9b8562559f34 ] Request (VolumeTypesExtraSpecsRbacTest:test_show_volume_type_extra_specs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-11-06 18:04:37.968 40 DEBUG tempest.lib.common.rest_client [req-ff8c40ef-b4ac-4edd-9af2-9b8562559f34 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ff8c40ef-b4ac-4edd-9af2-9b8562559f34', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8e8e24949d5b4644ac4093346e68f855", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1643276433", "password_expires_at": null}, "audit_ids": ["CtD4LKb3R_-DxBIkZsdmMw"], "expires_at": "2020-11-06T19:04:37.000000Z", "issued_at": "2020-11-06T18:04:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cc5d04441be94f4a95ba5bd641c7252d", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1643276433"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:38.173 39 INFO tempest.lib.common.rest_client [req-765b4a94-e23a-4a15-b07b-8cc80975f3dd ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.237s 2020-11-06 18:04:38.173 39 DEBUG tempest.lib.common.rest_client [req-765b4a94-e23a-4a15-b07b-8cc80975f3dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-765b4a94-e23a-4a15-b07b-8cc80975f3dd', 'x-compute-request-id': 'req-765b4a94-e23a-4a15-b07b-8cc80975f3dd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:38.174 40 INFO tempest.lib.common.rest_client [req-cdb5be90-0cc9-4223-b0d4-f99236ddffbe ] Request (VolumeTypesExtraSpecsRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d/types/8d098780-99e3-4f7b-8aa2-9037ce4ae037/extra_specs/tempest-VolumeTypesExtraSpecsRbacTest-Spec-1381372347 0.205s 2020-11-06 18:04:38.175 40 DEBUG tempest.lib.common.rest_client [req-cdb5be90-0cc9-4223-b0d4-f99236ddffbe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-cdb5be90-0cc9-4223-b0d4-f99236ddffbe', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-cdb5be90-0cc9-4223-b0d4-f99236ddffbe', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d/types/8d098780-99e3-4f7b-8aa2-9037ce4ae037/extra_specs/tempest-VolumeTypesExtraSpecsRbacTest-Spec-1381372347'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:38.177 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:38.180 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:types_extra_specs:update, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:38.279 40 INFO tempest.lib.common.rest_client [req-e6075d96-033b-4552-8443-7d5ce4eaf9d8 ] Request (VolumeTypesExtraSpecsRbacTest:test_update_volume_type_extra_specs): 200 POST http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d/types/8d098780-99e3-4f7b-8aa2-9037ce4ae037/extra_specs 0.098s 2020-11-06 18:04:38.280 40 DEBUG tempest.lib.common.rest_client [req-e6075d96-033b-4552-8443-7d5ce4eaf9d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"extra_specs": {"tempest-VolumeTypesExtraSpecsRbacTest-Spec-1381372347": "val1"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e6075d96-033b-4552-8443-7d5ce4eaf9d8', 'content-length': '82', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e6075d96-033b-4552-8443-7d5ce4eaf9d8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d/types/8d098780-99e3-4f7b-8aa2-9037ce4ae037/extra_specs'} Body: b'{"extra_specs": {"tempest-VolumeTypesExtraSpecsRbacTest-Spec-1381372347": "val1"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:38.283 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:38.410 40 INFO tempest.lib.common.rest_client [req-95ffc3a4-cef2-46b7-971a-fef761dc52f7 ] Request (VolumeTypesExtraSpecsRbacTest:test_update_volume_type_extra_specs): 200 GET http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles 0.126s 2020-11-06 18:04:38.410 40 DEBUG tempest.lib.common.rest_client [req-95ffc3a4-cef2-46b7-971a-fef761dc52f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-95ffc3a4-cef2-46b7-971a-fef761dc52f7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:38.505 40 INFO tempest.lib.common.rest_client [req-6328481e-1519-415f-bdbf-75d43f3abf59 ] Request (VolumeTypesExtraSpecsRbacTest:test_update_volume_type_extra_specs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-11-06 18:04:38.506 40 DEBUG tempest.lib.common.rest_client [req-6328481e-1519-415f-bdbf-75d43f3abf59 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6328481e-1519-415f-bdbf-75d43f3abf59', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8e8e24949d5b4644ac4093346e68f855", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1643276433", "password_expires_at": null}, "audit_ids": ["pmiqcsOeRWaP6NDEeZqKtw"], "expires_at": "2020-11-06T19:04:38.000000Z", "issued_at": "2020-11-06T18:04:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cc5d04441be94f4a95ba5bd641c7252d", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1643276433"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:38.647 37 INFO tempest.lib.common.rest_client [req-8bcad18f-fb40-4806-a175-fe10bb2f683f ] Request (GroupSnaphotsV314RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/6fcb24e7-f733-4933-bd08-a1880f3a51e7 0.089s 2020-11-06 18:04:38.647 37 DEBUG tempest.lib.common.rest_client [req-8bcad18f-fb40-4806-a175-fe10bb2f683f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-8bcad18f-fb40-4806-a175-fe10bb2f683f', 'content-length': '1172', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8bcad18f-fb40-4806-a175-fe10bb2f683f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/6fcb24e7-f733-4933-bd08-a1880f3a51e7'} Body: b'{"volume": {"id": "6fcb24e7-f733-4933-bd08-a1880f3a51e7", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:37.000000", "updated_at": "2020-11-06T18:04:38.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-2132606517", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-849147758", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/6fcb24e7-f733-4933-bd08-a1880f3a51e7"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/479cc71352d449a5aae47dadceb27a30/volumes/6fcb24e7-f733-4933-bd08-a1880f3a51e7"}], "user_id": "79626ff2a9f24f28b269e0967e684da6", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "7fe5095d-eae7-4db3-84f1-4d1777d8c5b2", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "479cc71352d449a5aae47dadceb27a30"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:38.660 37 INFO tempest.common.waiters [-] volume 6fcb24e7-f733-4933-bd08-a1880f3a51e7 reached available after waiting for 1.660381 seconds 2020-11-06 18:04:38.660 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:38.662 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:get_all_group_snapshots, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:38.663 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:38.689 40 INFO tempest.lib.common.rest_client [req-12957325-21c8-4e06-b418-2e52a8f87821 ] Request (VolumeTypesExtraSpecsRbacTest:test_update_volume_type_extra_specs): 200 PUT http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d/types/8d098780-99e3-4f7b-8aa2-9037ce4ae037/extra_specs/tempest-VolumeTypesExtraSpecsRbacTest-Spec-1381372347 0.182s 2020-11-06 18:04:38.690 40 DEBUG tempest.lib.common.rest_client [req-12957325-21c8-4e06-b418-2e52a8f87821 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"tempest-VolumeTypesExtraSpecsRbacTest-Spec-1381372347": "val2"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-12957325-21c8-4e06-b418-2e52a8f87821', 'content-length': '65', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-12957325-21c8-4e06-b418-2e52a8f87821', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d/types/8d098780-99e3-4f7b-8aa2-9037ce4ae037/extra_specs/tempest-VolumeTypesExtraSpecsRbacTest-Spec-1381372347'} Body: b'{"tempest-VolumeTypesExtraSpecsRbacTest-Spec-1381372347": "val2"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:38.692 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:38.788 37 INFO tempest.lib.common.rest_client [req-e9c1336b-7f65-4736-be76-9d8bacae1911 ] Request (GroupSnaphotsV314RbacTest:test_list_group_snapshot_rbac): 200 GET http://172.30.13.94/identity/v3/projects/479cc71352d449a5aae47dadceb27a30/users/79626ff2a9f24f28b269e0967e684da6/roles 0.124s 2020-11-06 18:04:38.789 37 DEBUG tempest.lib.common.rest_client [req-e9c1336b-7f65-4736-be76-9d8bacae1911 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e9c1336b-7f65-4736-be76-9d8bacae1911', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/479cc71352d449a5aae47dadceb27a30/users/79626ff2a9f24f28b269e0967e684da6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/479cc71352d449a5aae47dadceb27a30/users/79626ff2a9f24f28b269e0967e684da6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:38.807 40 INFO tempest.lib.common.rest_client [req-6eaa8515-f8e3-4b41-8cc3-b2bc671155f3 ] Request (VolumeTypesExtraSpecsRbacTest:test_update_volume_type_extra_specs): 200 GET http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles 0.115s 2020-11-06 18:04:38.808 40 DEBUG tempest.lib.common.rest_client [req-6eaa8515-f8e3-4b41-8cc3-b2bc671155f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6eaa8515-f8e3-4b41-8cc3-b2bc671155f3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d/users/8e8e24949d5b4644ac4093346e68f855/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:38.875 37 INFO tempest.lib.common.rest_client [req-8f499d28-9c94-492f-ba6a-6fa209234c80 ] Request (GroupSnaphotsV314RbacTest:test_list_group_snapshot_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:04:38.875 37 DEBUG tempest.lib.common.rest_client [req-8f499d28-9c94-492f-ba6a-6fa209234c80 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8f499d28-9c94-492f-ba6a-6fa209234c80', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "79626ff2a9f24f28b269e0967e684da6", "name": "tempest-GroupSnaphotsV314RbacTest-640793486", "password_expires_at": null}, "audit_ids": ["pQzgPWMCSXeN2MSf1gHHPw"], "expires_at": "2020-11-06T19:04:38.000000Z", "issued_at": "2020-11-06T18:04:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "479cc71352d449a5aae47dadceb27a30", "name": "tempest-GroupSnaphotsV314RbacTest-640793486"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:38.894 40 INFO tempest.lib.common.rest_client [req-f33c81fe-76ad-4ac5-9c79-63a3e4f5a955 ] Request (VolumeTypesExtraSpecsRbacTest:test_update_volume_type_extra_specs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:04:38.895 40 DEBUG tempest.lib.common.rest_client [req-f33c81fe-76ad-4ac5-9c79-63a3e4f5a955 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f33c81fe-76ad-4ac5-9c79-63a3e4f5a955', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8e8e24949d5b4644ac4093346e68f855", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1643276433", "password_expires_at": null}, "audit_ids": ["OEkApTUHStyMBhmetf0OqA"], "expires_at": "2020-11-06T19:04:38.000000Z", "issued_at": "2020-11-06T18:04:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cc5d04441be94f4a95ba5bd641c7252d", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1643276433"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cc5d04441be94f4a95ba5bd641c7252d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:39.005 37 INFO tempest.lib.common.rest_client [req-fdf0dd3c-8f9f-4b3f-8e4f-59012cf5539d ] Request (GroupSnaphotsV314RbacTest:test_list_group_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_snapshots 0.128s 2020-11-06 18:04:39.005 37 DEBUG tempest.lib.common.rest_client [req-fdf0dd3c-8f9f-4b3f-8e4f-59012cf5539d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-fdf0dd3c-8f9f-4b3f-8e4f-59012cf5539d', 'content-length': '23', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-fdf0dd3c-8f9f-4b3f-8e4f-59012cf5539d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_snapshots'} Body: b'{"group_snapshots": []}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:39.009 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:39.059 37 INFO tempest.lib.common.rest_client [req-8853fc96-8eb7-43c4-a02a-a18a721a99a8 ] Request (GroupSnaphotsV314RbacTest:test_list_group_snapshot_rbac): 200 GET http://172.30.13.94/identity/v3/projects/479cc71352d449a5aae47dadceb27a30/users/79626ff2a9f24f28b269e0967e684da6/roles 0.049s 2020-11-06 18:04:39.059 37 DEBUG tempest.lib.common.rest_client [req-8853fc96-8eb7-43c4-a02a-a18a721a99a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8853fc96-8eb7-43c4-a02a-a18a721a99a8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/479cc71352d449a5aae47dadceb27a30/users/79626ff2a9f24f28b269e0967e684da6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/479cc71352d449a5aae47dadceb27a30/users/79626ff2a9f24f28b269e0967e684da6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:39.091 40 INFO tempest.lib.common.rest_client [req-e29862b8-e503-41ee-a634-50ae9706dfb8 ] Request (VolumeTypesExtraSpecsRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d/types/8d098780-99e3-4f7b-8aa2-9037ce4ae037/extra_specs/tempest-VolumeTypesExtraSpecsRbacTest-Spec-1381372347 0.195s 2020-11-06 18:04:39.091 40 DEBUG tempest.lib.common.rest_client [req-e29862b8-e503-41ee-a634-50ae9706dfb8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-e29862b8-e503-41ee-a634-50ae9706dfb8', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e29862b8-e503-41ee-a634-50ae9706dfb8', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d/types/8d098780-99e3-4f7b-8aa2-9037ce4ae037/extra_specs/tempest-VolumeTypesExtraSpecsRbacTest-Spec-1381372347'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:39.096 37 INFO tempest.lib.common.rest_client [req-dcc7b3d5-a905-4c31-89f9-f377a2ddbb28 ] Request (GroupSnaphotsV314RbacTest:test_list_group_snapshot_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:04:39.096 37 DEBUG tempest.lib.common.rest_client [req-dcc7b3d5-a905-4c31-89f9-f377a2ddbb28 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dcc7b3d5-a905-4c31-89f9-f377a2ddbb28', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "79626ff2a9f24f28b269e0967e684da6", "name": "tempest-GroupSnaphotsV314RbacTest-640793486", "password_expires_at": null}, "audit_ids": ["rz32TBrHRCyZGh--pCb0iw"], "expires_at": "2020-11-06T19:04:39.000000Z", "issued_at": "2020-11-06T18:04:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "479cc71352d449a5aae47dadceb27a30", "name": "tempest-GroupSnaphotsV314RbacTest-640793486"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:39.173 40 INFO tempest.lib.common.rest_client [req-4af2f24f-2d21-4d0d-aebf-5175dbe9bbb9 ] Request (VolumeTypesExtraSpecsRbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d/types/8d098780-99e3-4f7b-8aa2-9037ce4ae037 0.079s 2020-11-06 18:04:39.174 40 DEBUG tempest.lib.common.rest_client [req-4af2f24f-2d21-4d0d-aebf-5175dbe9bbb9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4af2f24f-2d21-4d0d-aebf-5175dbe9bbb9', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d/types/8d098780-99e3-4f7b-8aa2-9037ce4ae037'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:39.199 40 INFO tempest.lib.common.rest_client [req-ea04d505-2f0c-4fe1-b785-5600cf83e54b ] Request (VolumeTypesExtraSpecsRbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d/types/8d098780-99e3-4f7b-8aa2-9037ce4ae037 0.024s 2020-11-06 18:04:39.199 40 DEBUG tempest.lib.common.rest_client [req-ea04d505-2f0c-4fe1-b785-5600cf83e54b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-ea04d505-2f0c-4fe1-b785-5600cf83e54b', 'x-openstack-request-id': 'req-ea04d505-2f0c-4fe1-b785-5600cf83e54b', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/cc5d04441be94f4a95ba5bd641c7252d/types/8d098780-99e3-4f7b-8aa2-9037ce4ae037'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 8d098780-99e3-4f7b-8aa2-9037ce4ae037 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:39.249 37 INFO tempest.lib.common.rest_client [req-b237eddc-d255-480c-a031-f0d0a2b50c76 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/detail 0.151s 2020-11-06 18:04:39.249 37 DEBUG tempest.lib.common.rest_client [req-b237eddc-d255-480c-a031-f0d0a2b50c76 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-b237eddc-d255-480c-a031-f0d0a2b50c76', 'content-length': '1175', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b237eddc-d255-480c-a031-f0d0a2b50c76', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/detail'} Body: b'{"volumes": [{"id": "6fcb24e7-f733-4933-bd08-a1880f3a51e7", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:37.000000", "updated_at": "2020-11-06T18:04:38.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-2132606517", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-849147758", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/6fcb24e7-f733-4933-bd08-a1880f3a51e7"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/479cc71352d449a5aae47dadceb27a30/volumes/6fcb24e7-f733-4933-bd08-a1880f3a51e7"}], "user_id": "79626ff2a9f24f28b269e0967e684da6", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "7fe5095d-eae7-4db3-84f1-4d1777d8c5b2", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "479cc71352d449a5aae47dadceb27a30"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:39.320 40 INFO tempest.lib.common.rest_client [req-dc93ccab-db8b-46ca-a891-aef50718d356 ] Request (VolumeTypesExtraSpecsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/8e8e24949d5b4644ac4093346e68f855 0.120s 2020-11-06 18:04:39.321 40 DEBUG tempest.lib.common.rest_client [req-dc93ccab-db8b-46ca-a891-aef50718d356 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dc93ccab-db8b-46ca-a891-aef50718d356', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/8e8e24949d5b4644ac4093346e68f855'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:39.364 37 INFO tempest.lib.common.rest_client [req-3ae41f13-ff41-4207-ac6b-6a6b31128c25 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 202 POST http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups/7fe5095d-eae7-4db3-84f1-4d1777d8c5b2/action 0.102s 2020-11-06 18:04:39.364 37 DEBUG tempest.lib.common.rest_client [req-3ae41f13-ff41-4207-ac6b-6a6b31128c25 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"delete": {"delete-volumes": true}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3ae41f13-ff41-4207-ac6b-6a6b31128c25', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups/7fe5095d-eae7-4db3-84f1-4d1777d8c5b2/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:39.383 39 INFO tempest.lib.common.rest_client [req-e02a9d33-9781-466b-9314-d909e577a36f ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.198s 2020-11-06 18:04:39.383 39 DEBUG tempest.lib.common.rest_client [req-e02a9d33-9781-466b-9314-d909e577a36f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e02a9d33-9781-466b-9314-d909e577a36f', 'x-compute-request-id': 'req-e02a9d33-9781-466b-9314-d909e577a36f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:39.400 40 INFO tempest.lib.common.rest_client [req-d6eb3fbd-54d5-4d0f-b54f-7ea1f61de0e1 ] Request (VolumeTypesExtraSpecsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-11-06 18:04:39.401 40 DEBUG tempest.lib.common.rest_client [req-d6eb3fbd-54d5-4d0f-b54f-7ea1f61de0e1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d6eb3fbd-54d5-4d0f-b54f-7ea1f61de0e1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["Q2f4cQzlTVyKShfeg-wPOA"], "expires_at": "2020-11-06T19:04:39.000000Z", "issued_at": "2020-11-06T18:04:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:39.468 37 INFO tempest.lib.common.rest_client [req-f7ab4ac9-b73a-448b-b2b9-133598a98223 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/6fcb24e7-f733-4933-bd08-a1880f3a51e7 0.103s 2020-11-06 18:04:39.469 37 DEBUG tempest.lib.common.rest_client [req-f7ab4ac9-b73a-448b-b2b9-133598a98223 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-f7ab4ac9-b73a-448b-b2b9-133598a98223', 'content-length': '1171', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f7ab4ac9-b73a-448b-b2b9-133598a98223', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/6fcb24e7-f733-4933-bd08-a1880f3a51e7'} Body: b'{"volume": {"id": "6fcb24e7-f733-4933-bd08-a1880f3a51e7", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:37.000000", "updated_at": "2020-11-06T18:04:39.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-2132606517", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-849147758", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/6fcb24e7-f733-4933-bd08-a1880f3a51e7"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/479cc71352d449a5aae47dadceb27a30/volumes/6fcb24e7-f733-4933-bd08-a1880f3a51e7"}], "user_id": "79626ff2a9f24f28b269e0967e684da6", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "7fe5095d-eae7-4db3-84f1-4d1777d8c5b2", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "479cc71352d449a5aae47dadceb27a30"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:39.738 40 INFO tempest.lib.common.rest_client [req-a19ff626-3ff3-4300-aace-11cbf5c0c078 ] Request (VolumeTypesExtraSpecsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=cc5d04441be94f4a95ba5bd641c7252d&name=default 0.336s 2020-11-06 18:04:39.739 40 DEBUG tempest.lib.common.rest_client [req-a19ff626-3ff3-4300-aace-11cbf5c0c078 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-a19ff626-3ff3-4300-aace-11cbf5c0c078', 'date': 'Fri, 06 Nov 2020 18:04:39 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=cc5d04441be94f4a95ba5bd641c7252d&name=default'} Body: b'{"security_groups": [{"id": "aefc2630-3490-4f3d-aa8a-8879eaae9c71", "name": "default", "stateful": true, "tenant_id": "cc5d04441be94f4a95ba5bd641c7252d", "description": "Default security group", "security_group_rules": [{"id": "1eba50a4-5e54-4365-b9c5-692ef25c454c", "tenant_id": "cc5d04441be94f4a95ba5bd641c7252d", "security_group_id": "aefc2630-3490-4f3d-aa8a-8879eaae9c71", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:04:39Z", "updated_at": "2020-11-06T18:04:39Z", "revision_number": 0, "project_id": "cc5d04441be94f4a95ba5bd641c7252d"}, {"id": "46728685-1913-4526-998c-a50d8f5361fe", "tenant_id": "cc5d04441be94f4a95ba5bd641c7252d", "security_group_id": "aefc2630-3490-4f3d-aa8a-8879eaae9c71", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "aefc2630-3490-4f3d-aa8a-8879eaae9c71", "description": null, "tags": [], "created_at": "2020-11-06T18:04:39Z", "updated_at": "2020-11-06T18:04:39Z", "revision_number": 0, "project_id": "cc5d04441be94f4a95ba5bd641c7252d"}, {"id": "863da4ea-7ee8-4734-a6fd-13b81ef5a6dc", "tenant_id": "cc5d04441be94f4a95ba5bd641c7252d", "security_group_id": "aefc2630-3490-4f3d-aa8a-8879eaae9c71", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "aefc2630-3490-4f3d-aa8a-8879eaae9c71", "description": null, "tags": [], "created_at": "2020-11-06T18:04:39Z", "updated_at": "2020-11-06T18:04:39Z", "revision_number": 0, "project_id": "cc5d04441be94f4a95ba5bd641c7252d"}, {"id": "bae3c72f-489d-4cbe-8fd7-f3461574912f", "tenant_id": "cc5d04441be94f4a95ba5bd641c7252d", "security_group_id": "aefc2630-3490-4f3d-aa8a-8879eaae9c71", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:04:39Z", "updated_at": "2020-11-06T18:04:39Z", "revision_number": 0, "project_id": "cc5d04441be94f4a95ba5bd641c7252d"}], "tags": [], "created_at": "2020-11-06T18:04:39Z", "updated_at": "2020-11-06T18:04:39Z", "revision_number": 1, "project_id": "cc5d04441be94f4a95ba5bd641c7252d"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:39.867 40 INFO tempest.lib.common.rest_client [req-bb08b0d1-d2da-452d-98a1-a3edcd97303b ] Request (VolumeTypesExtraSpecsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/aefc2630-3490-4f3d-aa8a-8879eaae9c71 0.127s 2020-11-06 18:04:39.867 40 DEBUG tempest.lib.common.rest_client [req-bb08b0d1-d2da-452d-98a1-a3edcd97303b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-bb08b0d1-d2da-452d-98a1-a3edcd97303b', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:04:39 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/aefc2630-3490-4f3d-aa8a-8879eaae9c71'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:39.973 40 INFO tempest.lib.common.rest_client [req-ba707526-b298-4d88-beea-2fb1b03531ed ] Request (VolumeTypesExtraSpecsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d 0.105s 2020-11-06 18:04:39.974 40 DEBUG tempest.lib.common.rest_client [req-ba707526-b298-4d88-beea-2fb1b03531ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ba707526-b298-4d88-beea-2fb1b03531ed', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/cc5d04441be94f4a95ba5bd641c7252d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:40.058 40 INFO tempest.lib.common.rest_client [req-c09ac1bb-60b6-468b-b80a-e3e721c7e0a0 ] Request (VolumesSnapshotV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-11-06 18:04:40.059 40 DEBUG tempest.lib.common.rest_client [req-c09ac1bb-60b6-468b-b80a-e3e721c7e0a0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c09ac1bb-60b6-468b-b80a-e3e721c7e0a0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["eA6pSSPQSoOT6VWft_n0XQ"], "expires_at": "2020-11-06T19:04:40.000000Z", "issued_at": "2020-11-06T18:04:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:40.100 40 INFO tempest.lib.common.rest_client [req-043d5237-9202-4c72-8926-a2b21e27f9b3 ] Request (VolumesSnapshotV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:04:40.100 40 DEBUG tempest.lib.common.rest_client [req-043d5237-9202-4c72-8926-a2b21e27f9b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-043d5237-9202-4c72-8926-a2b21e27f9b3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["jSqmwPjuRL2kmEZYf-AENw"], "expires_at": "2020-11-06T19:04:40.000000Z", "issued_at": "2020-11-06T18:04:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:40.150 40 INFO tempest.lib.common.rest_client [req-6d13640b-b279-4fb0-b761-bc967d745735 ] Request (VolumesSnapshotV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.049s 2020-11-06 18:04:40.151 40 DEBUG tempest.lib.common.rest_client [req-6d13640b-b279-4fb0-b761-bc967d745735 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6d13640b-b279-4fb0-b761-bc967d745735', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:40.206 40 INFO tempest.lib.common.rest_client [req-1df06e13-761d-4513-b4e3-b3a032ef564a ] Request (VolumesSnapshotV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.054s 2020-11-06 18:04:40.206 40 DEBUG tempest.lib.common.rest_client [req-1df06e13-761d-4513-b4e3-b3a032ef564a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumesSnapshotV3RbacTest-1458153338-desc", "domain_id": "default", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '388', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1df06e13-761d-4513-b4e3-b3a032ef564a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "e5f74addf2f94d10bfa96014547b3c32", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338", "domain_id": "default", "description": "tempest-VolumesSnapshotV3RbacTest-1458153338-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:40.308 40 INFO tempest.lib.common.rest_client [req-15afbb28-66e7-427d-b986-17fe4979133c ] Request (VolumesSnapshotV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.100s 2020-11-06 18:04:40.308 40 DEBUG tempest.lib.common.rest_client [req-15afbb28-66e7-427d-b986-17fe4979133c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumesSnapshotV3RbacTest-1458153338", "password": "H5&6U!IiQTvKIFx", "project_id": "e5f74addf2f94d10bfa96014547b3c32", "email": "tempest-VolumesSnapshotV3RbacTest-1099398322@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '406', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-15afbb28-66e7-427d-b986-17fe4979133c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "e5f74addf2f94d10bfa96014547b3c32", "email": "tempest-VolumesSnapshotV3RbacTest-1099398322@example.com", "id": "37807e3082a247158f6d1f5307e00c1a", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/37807e3082a247158f6d1f5307e00c1a"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:40.352 40 INFO tempest.lib.common.rest_client [req-52051133-e44f-4ac9-bcf1-d00685f45349 ] Request (VolumesSnapshotV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.042s 2020-11-06 18:04:40.352 40 DEBUG tempest.lib.common.rest_client [req-52051133-e44f-4ac9-bcf1-d00685f45349 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-52051133-e44f-4ac9-bcf1-d00685f45349', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:40.397 40 INFO tempest.lib.common.rest_client [req-70b963c2-55a0-4263-8105-4ac61b08b6b7 ] Request (VolumesSnapshotV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.043s 2020-11-06 18:04:40.397 40 DEBUG tempest.lib.common.rest_client [req-70b963c2-55a0-4263-8105-4ac61b08b6b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-70b963c2-55a0-4263-8105-4ac61b08b6b7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:40.458 40 INFO tempest.lib.common.rest_client [req-f04fa3a7-2fdc-47fb-95af-b4c1a0bae4b8 ] Request (VolumesSnapshotV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles/72a4576c553448cd941b052c1ca0cf2d 0.060s 2020-11-06 18:04:40.459 40 DEBUG tempest.lib.common.rest_client [req-f04fa3a7-2fdc-47fb-95af-b4c1a0bae4b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f04fa3a7-2fdc-47fb-95af-b4c1a0bae4b8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:40.459 40 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesSnapshotV3RbacTest-1458153338', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'e5f74addf2f94d10bfa96014547b3c32', 'project_name': 'tempest-VolumesSnapshotV3RbacTest-1458153338', 'tenant_id': 'e5f74addf2f94d10bfa96014547b3c32', 'tenant_name': 'tempest-VolumesSnapshotV3RbacTest-1458153338', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '37807e3082a247158f6d1f5307e00c1a'}, Network: None, Subnet: None, Router: None 2020-11-06 18:04:40.460 40 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesSnapshotV3RbacTest-1458153338', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'e5f74addf2f94d10bfa96014547b3c32', 'project_name': 'tempest-VolumesSnapshotV3RbacTest-1458153338', 'tenant_id': 'e5f74addf2f94d10bfa96014547b3c32', 'tenant_name': 'tempest-VolumesSnapshotV3RbacTest-1458153338', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '37807e3082a247158f6d1f5307e00c1a'}, Network: None, Subnet: None, Router: None 2020-11-06 18:04:40.535 37 INFO tempest.lib.common.rest_client [req-9ae4730a-cbdc-434b-acb6-ddad4465f750 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/6fcb24e7-f733-4933-bd08-a1880f3a51e7 0.053s 2020-11-06 18:04:40.535 37 DEBUG tempest.lib.common.rest_client [req-9ae4730a-cbdc-434b-acb6-ddad4465f750 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-9ae4730a-cbdc-434b-acb6-ddad4465f750', 'x-openstack-request-id': 'req-9ae4730a-cbdc-434b-acb6-ddad4465f750', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/6fcb24e7-f733-4933-bd08-a1880f3a51e7'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 6fcb24e7-f733-4933-bd08-a1880f3a51e7 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:40.554 37 INFO tempest.lib.common.rest_client [req-8c378112-48bc-4c08-b66a-95166ce45f95 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups/7fe5095d-eae7-4db3-84f1-4d1777d8c5b2 0.017s 2020-11-06 18:04:40.554 37 DEBUG tempest.lib.common.rest_client [req-8c378112-48bc-4c08-b66a-95166ce45f95 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'content-length': '108', 'content-type': 'application/json', 'x-compute-request-id': 'req-8c378112-48bc-4c08-b66a-95166ce45f95', 'x-openstack-request-id': 'req-8c378112-48bc-4c08-b66a-95166ce45f95', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups/7fe5095d-eae7-4db3-84f1-4d1777d8c5b2'} Body: b'{"itemNotFound": {"code": 404, "message": "Group 7fe5095d-eae7-4db3-84f1-4d1777d8c5b2 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:40.569 40 INFO tempest.lib.common.rest_client [req-e74b4c3d-128d-488a-bba8-e13645eb6b74 ] Request (VolumesSnapshotV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.101s 2020-11-06 18:04:40.570 40 DEBUG tempest.lib.common.rest_client [req-e74b4c3d-128d-488a-bba8-e13645eb6b74 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6581', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e74b4c3d-128d-488a-bba8-e13645eb6b74', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "37807e3082a247158f6d1f5307e00c1a", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338", "password_expires_at": null}, "audit_ids": ["P6DjjiHuTWOp7jMyrYR72g"], "expires_at": "2020-11-06T19:04:40.000000Z", "issued_at": "2020-11-06T18:04:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e5f74addf2f94d10bfa96014547b3c32", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:40.593 37 INFO tempest.lib.common.rest_client [req-eab172de-accc-4ba0-a8aa-34c018eba7bc ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_types/0497c6a8-b9f4-4eac-a7c9-89f358fca2e5 0.037s 2020-11-06 18:04:40.593 37 DEBUG tempest.lib.common.rest_client [req-eab172de-accc-4ba0-a8aa-34c018eba7bc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-eab172de-accc-4ba0-a8aa-34c018eba7bc', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_types/0497c6a8-b9f4-4eac-a7c9-89f358fca2e5'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:40.644 39 INFO tempest.lib.common.rest_client [req-3ef5c13d-ccd5-47a7-85ea-4d3a99dbbe78 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.244s 2020-11-06 18:04:40.644 39 DEBUG tempest.lib.common.rest_client [req-3ef5c13d-ccd5-47a7-85ea-4d3a99dbbe78 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3ef5c13d-ccd5-47a7-85ea-4d3a99dbbe78', 'x-compute-request-id': 'req-3ef5c13d-ccd5-47a7-85ea-4d3a99dbbe78', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:40.644 37 INFO tempest.lib.common.rest_client [req-ff2c4b56-4d1b-4c9b-9824-fa2840168db2 ] Request (GroupSnaphotsV314RbacTest:setUp): 200 POST http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/types 0.047s 2020-11-06 18:04:40.645 37 DEBUG tempest.lib.common.rest_client [req-ff2c4b56-4d1b-4c9b-9824-fa2840168db2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-GroupSnaphotsV314RbacTest-volume-type-1483929768"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ff2c4b56-4d1b-4c9b-9824-fa2840168db2', 'content-length': '231', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ff2c4b56-4d1b-4c9b-9824-fa2840168db2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/types'} Body: b'{"volume_type": {"id": "593a963f-e7b6-4ffb-a1cd-12cc211be44b", "name": "tempest-GroupSnaphotsV314RbacTest-volume-type-1483929768", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:40.653 40 INFO tempest.lib.common.rest_client [req-663a8aa4-9825-4469-a28b-c53af12294a4 ] Request (VolumesSnapshotV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-11-06 18:04:40.654 40 DEBUG tempest.lib.common.rest_client [req-663a8aa4-9825-4469-a28b-c53af12294a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-663a8aa4-9825-4469-a28b-c53af12294a4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["r4wtIuWwR7eGGcoZ3FtVrQ"], "expires_at": "2020-11-06T19:04:40.000000Z", "issued_at": "2020-11-06T18:04:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:40.694 37 INFO tempest.lib.common.rest_client [req-c407e400-25f0-4971-8b7c-93f05eb648fb ] Request (GroupSnaphotsV314RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_types 0.044s 2020-11-06 18:04:40.694 37 DEBUG tempest.lib.common.rest_client [req-c407e400-25f0-4971-8b7c-93f05eb648fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupSnaphotsV314RbacTest-group-type-1263589953"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c407e400-25f0-4971-8b7c-93f05eb648fb', 'content-length': '188', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c407e400-25f0-4971-8b7c-93f05eb648fb', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_types'} Body: b'{"group_type": {"id": "fbf58350-2f49-4f4d-856e-2ff56e12dbb9", "name": "tempest-GroupSnaphotsV314RbacTest-group-type-1263589953", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:40.791 37 INFO tempest.lib.common.rest_client [req-ea99ee6f-1e48-457e-997b-cc14aa074be0 ] Request (GroupSnaphotsV314RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups 0.093s 2020-11-06 18:04:40.791 37 DEBUG tempest.lib.common.rest_client [req-ea99ee6f-1e48-457e-997b-cc14aa074be0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"group": {"group_type": "fbf58350-2f49-4f4d-856e-2ff56e12dbb9", "volume_types": ["593a963f-e7b6-4ffb-a1cd-12cc211be44b"], "name": "tempest-GroupSnaphotsV314RbacTest-Group-164939584"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ea99ee6f-1e48-457e-997b-cc14aa074be0', 'content-length': '118', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ea99ee6f-1e48-457e-997b-cc14aa074be0', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups'} Body: b'{"group": {"id": "db906edf-72a2-420b-b34e-9b42e0dbcaa6", "name": "tempest-GroupSnaphotsV314RbacTest-Group-164939584"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:40.830 37 INFO tempest.lib.common.rest_client [req-ac47d6c8-db92-4064-bcf0-45ca2323abd7 ] Request (GroupSnaphotsV314RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups/db906edf-72a2-420b-b34e-9b42e0dbcaa6 0.035s 2020-11-06 18:04:40.831 37 DEBUG tempest.lib.common.rest_client [req-ac47d6c8-db92-4064-bcf0-45ca2323abd7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ac47d6c8-db92-4064-bcf0-45ca2323abd7', 'content-length': '398', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ac47d6c8-db92-4064-bcf0-45ca2323abd7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups/db906edf-72a2-420b-b34e-9b42e0dbcaa6'} Body: b'{"group": {"id": "db906edf-72a2-420b-b34e-9b42e0dbcaa6", "status": "creating", "availability_zone": "nova", "created_at": "2020-11-06T18:04:41.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Group-164939584", "description": null, "group_type": "fbf58350-2f49-4f4d-856e-2ff56e12dbb9", "volume_types": ["593a963f-e7b6-4ffb-a1cd-12cc211be44b"], "group_snapshot_id": null, "source_group_id": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:40.858 40 INFO tempest.lib.common.rest_client [req-c45e594b-0006-462e-a924-2786d1f23b40 ] Request (VolumesSnapshotV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-11-06 18:04:40.858 40 DEBUG tempest.lib.common.rest_client [req-c45e594b-0006-462e-a924-2786d1f23b40 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c45e594b-0006-462e-a924-2786d1f23b40', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["N6h6JQT4TFyYNLPmkcMcBQ"], "expires_at": "2020-11-06T19:04:40.000000Z", "issued_at": "2020-11-06T18:04:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:40.916 40 INFO tempest.lib.common.rest_client [req-403f220d-5f49-48bf-aa35-62b8b729cd7b ] Request (VolumesSnapshotV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.056s 2020-11-06 18:04:40.916 40 DEBUG tempest.lib.common.rest_client [req-403f220d-5f49-48bf-aa35-62b8b729cd7b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-403f220d-5f49-48bf-aa35-62b8b729cd7b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:40.973 40 INFO tempest.lib.common.rest_client [req-e97081ca-c73d-4e5e-9b26-31396fedfe66 ] Request (VolumesSnapshotV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-11-06 18:04:40.973 40 DEBUG tempest.lib.common.rest_client [req-e97081ca-c73d-4e5e-9b26-31396fedfe66 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e97081ca-c73d-4e5e-9b26-31396fedfe66', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:40.974 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:04:40.975 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:41.057 40 INFO tempest.lib.common.rest_client [req-1a66ca5b-657d-4227-a478-6e632aca83ec ] Request (VolumesSnapshotV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles 0.081s 2020-11-06 18:04:41.058 40 DEBUG tempest.lib.common.rest_client [req-1a66ca5b-657d-4227-a478-6e632aca83ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1a66ca5b-657d-4227-a478-6e632aca83ec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:41.114 40 INFO tempest.lib.common.rest_client [req-ae72f6ff-79b5-4576-ab40-0a733443511c ] Request (VolumesSnapshotV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles/72a4576c553448cd941b052c1ca0cf2d 0.056s 2020-11-06 18:04:41.115 40 DEBUG tempest.lib.common.rest_client [req-ae72f6ff-79b5-4576-ab40-0a733443511c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ae72f6ff-79b5-4576-ab40-0a733443511c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:41.217 40 INFO tempest.lib.common.rest_client [req-5bfe7ae9-ba93-4c20-89bd-ebbf24679aad ] Request (VolumesSnapshotV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles/a629c95d64b3416fb80ae90af4f69c05 0.101s 2020-11-06 18:04:41.218 40 DEBUG tempest.lib.common.rest_client [req-5bfe7ae9-ba93-4c20-89bd-ebbf24679aad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5bfe7ae9-ba93-4c20-89bd-ebbf24679aad', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:41.874 37 INFO tempest.lib.common.rest_client [req-4a44aa41-bb8b-4f98-b032-8cbce972efc5 ] Request (GroupSnaphotsV314RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups/db906edf-72a2-420b-b34e-9b42e0dbcaa6 0.037s 2020-11-06 18:04:41.875 37 DEBUG tempest.lib.common.rest_client [req-4a44aa41-bb8b-4f98-b032-8cbce972efc5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4a44aa41-bb8b-4f98-b032-8cbce972efc5', 'content-length': '399', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4a44aa41-bb8b-4f98-b032-8cbce972efc5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups/db906edf-72a2-420b-b34e-9b42e0dbcaa6'} Body: b'{"group": {"id": "db906edf-72a2-420b-b34e-9b42e0dbcaa6", "status": "available", "availability_zone": "nova", "created_at": "2020-11-06T18:04:41.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Group-164939584", "description": null, "group_type": "fbf58350-2f49-4f4d-856e-2ff56e12dbb9", "volume_types": ["593a963f-e7b6-4ffb-a1cd-12cc211be44b"], "group_snapshot_id": null, "source_group_id": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:41.881 37 INFO tempest.common.waiters [-] group db906edf-72a2-420b-b34e-9b42e0dbcaa6 reached available after waiting for 1.881257 seconds 2020-11-06 18:04:42.072 39 INFO tempest.lib.common.rest_client [req-6ac41025-fd38-4142-8b91-50bb47689fb4 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.415s 2020-11-06 18:04:42.072 39 DEBUG tempest.lib.common.rest_client [req-6ac41025-fd38-4142-8b91-50bb47689fb4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6ac41025-fd38-4142-8b91-50bb47689fb4', 'x-compute-request-id': 'req-6ac41025-fd38-4142-8b91-50bb47689fb4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:42.144 37 INFO tempest.lib.common.rest_client [req-e565d5ce-b365-4b2b-9fea-3108d9ccc31e ] Request (GroupSnaphotsV314RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes 0.262s 2020-11-06 18:04:42.144 37 DEBUG tempest.lib.common.rest_client [req-e565d5ce-b365-4b2b-9fea-3108d9ccc31e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"volume": {"volume_type": "593a963f-e7b6-4ffb-a1cd-12cc211be44b", "group_id": "db906edf-72a2-420b-b34e-9b42e0dbcaa6", "size": 1, "name": "tempest-GroupSnaphotsV314RbacTest-Volume-1672076166"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e565d5ce-b365-4b2b-9fea-3108d9ccc31e', 'content-length': '950', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e565d5ce-b365-4b2b-9fea-3108d9ccc31e', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes'} Body: b'{"volume": {"id": "9c994895-c172-4291-85cb-c2984979a3ec", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:42.000000", "updated_at": null, "name": "tempest-GroupSnaphotsV314RbacTest-Volume-1672076166", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-1483929768", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/9c994895-c172-4291-85cb-c2984979a3ec"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/479cc71352d449a5aae47dadceb27a30/volumes/9c994895-c172-4291-85cb-c2984979a3ec"}], "user_id": "79626ff2a9f24f28b269e0967e684da6", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "db906edf-72a2-420b-b34e-9b42e0dbcaa6"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:42.264 37 INFO tempest.lib.common.rest_client [req-bb4ac370-f6f5-414c-98b4-e427916b0b48 ] Request (GroupSnaphotsV314RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/9c994895-c172-4291-85cb-c2984979a3ec 0.107s 2020-11-06 18:04:42.265 37 DEBUG tempest.lib.common.rest_client [req-bb4ac370-f6f5-414c-98b4-e427916b0b48 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-bb4ac370-f6f5-414c-98b4-e427916b0b48', 'content-length': '1172', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-bb4ac370-f6f5-414c-98b4-e427916b0b48', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/9c994895-c172-4291-85cb-c2984979a3ec'} Body: b'{"volume": {"id": "9c994895-c172-4291-85cb-c2984979a3ec", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:42.000000", "updated_at": "2020-11-06T18:04:42.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-1672076166", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-1483929768", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/9c994895-c172-4291-85cb-c2984979a3ec"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/479cc71352d449a5aae47dadceb27a30/volumes/9c994895-c172-4291-85cb-c2984979a3ec"}], "user_id": "79626ff2a9f24f28b269e0967e684da6", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "db906edf-72a2-420b-b34e-9b42e0dbcaa6", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "479cc71352d449a5aae47dadceb27a30"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:42.315 40 INFO tempest.lib.common.rest_client [req-a90a758e-67f1-411e-9bcf-96c1826f1ee5 ] Request (VolumesSnapshotV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-11-06 18:04:42.316 40 DEBUG tempest.lib.common.rest_client [req-a90a758e-67f1-411e-9bcf-96c1826f1ee5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a90a758e-67f1-411e-9bcf-96c1826f1ee5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "37807e3082a247158f6d1f5307e00c1a", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338", "password_expires_at": null}, "audit_ids": ["RQLXW67cSMeok0EsHBG0gA"], "expires_at": "2020-11-06T19:04:42.000000Z", "issued_at": "2020-11-06T18:04:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e5f74addf2f94d10bfa96014547b3c32", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:42.746 40 INFO tempest.lib.common.rest_client [req-46ffc904-01cc-44a8-b005-fb8d831612d0 ] Request (VolumesSnapshotV3RbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/volumes 0.428s 2020-11-06 18:04:42.746 40 DEBUG tempest.lib.common.rest_client [req-46ffc904-01cc-44a8-b005-fb8d831612d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-VolumesSnapshotV3RbacTest-Volume-1749236545"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-46ffc904-01cc-44a8-b005-fb8d831612d0', 'content-length': '846', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-46ffc904-01cc-44a8-b005-fb8d831612d0', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/volumes'} Body: b'{"volume": {"id": "b501e219-7469-4db0-9331-084d6f1807c1", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:43.000000", "updated_at": null, "name": "tempest-VolumesSnapshotV3RbacTest-Volume-1749236545", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/volumes/b501e219-7469-4db0-9331-084d6f1807c1"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/e5f74addf2f94d10bfa96014547b3c32/volumes/b501e219-7469-4db0-9331-084d6f1807c1"}], "user_id": "37807e3082a247158f6d1f5307e00c1a", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:42.827 40 INFO tempest.lib.common.rest_client [req-769414b3-6722-4138-96cf-69938d4a46c1 ] Request (VolumesSnapshotV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/volumes/b501e219-7469-4db0-9331-084d6f1807c1 0.072s 2020-11-06 18:04:42.828 40 DEBUG tempest.lib.common.rest_client [req-769414b3-6722-4138-96cf-69938d4a46c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-769414b3-6722-4138-96cf-69938d4a46c1', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-769414b3-6722-4138-96cf-69938d4a46c1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/volumes/b501e219-7469-4db0-9331-084d6f1807c1'} Body: b'{"volume": {"id": "b501e219-7469-4db0-9331-084d6f1807c1", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:43.000000", "updated_at": "2020-11-06T18:04:43.000000", "name": "tempest-VolumesSnapshotV3RbacTest-Volume-1749236545", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/volumes/b501e219-7469-4db0-9331-084d6f1807c1"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/e5f74addf2f94d10bfa96014547b3c32/volumes/b501e219-7469-4db0-9331-084d6f1807c1"}], "user_id": "37807e3082a247158f6d1f5307e00c1a", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "e5f74addf2f94d10bfa96014547b3c32"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:43.286 39 INFO tempest.lib.common.rest_client [req-4557303c-19ed-4075-ad3f-c870bf308b9e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.202s 2020-11-06 18:04:43.287 39 DEBUG tempest.lib.common.rest_client [req-4557303c-19ed-4075-ad3f-c870bf308b9e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4557303c-19ed-4075-ad3f-c870bf308b9e', 'x-compute-request-id': 'req-4557303c-19ed-4075-ad3f-c870bf308b9e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:43.380 37 INFO tempest.lib.common.rest_client [req-9ebda2fe-9c3a-4f48-a9c8-b008bceb06a5 ] Request (GroupSnaphotsV314RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/9c994895-c172-4291-85cb-c2984979a3ec 0.100s 2020-11-06 18:04:43.380 37 DEBUG tempest.lib.common.rest_client [req-9ebda2fe-9c3a-4f48-a9c8-b008bceb06a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-9ebda2fe-9c3a-4f48-a9c8-b008bceb06a5', 'content-length': '1173', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9ebda2fe-9c3a-4f48-a9c8-b008bceb06a5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/9c994895-c172-4291-85cb-c2984979a3ec'} Body: b'{"volume": {"id": "9c994895-c172-4291-85cb-c2984979a3ec", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:42.000000", "updated_at": "2020-11-06T18:04:42.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-1672076166", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-1483929768", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/9c994895-c172-4291-85cb-c2984979a3ec"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/479cc71352d449a5aae47dadceb27a30/volumes/9c994895-c172-4291-85cb-c2984979a3ec"}], "user_id": "79626ff2a9f24f28b269e0967e684da6", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "db906edf-72a2-420b-b34e-9b42e0dbcaa6", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "479cc71352d449a5aae47dadceb27a30"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:43.395 37 INFO tempest.common.waiters [-] volume 9c994895-c172-4291-85cb-c2984979a3ec reached available after waiting for 1.395756 seconds 2020-11-06 18:04:43.396 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:43.398 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:get_group_snapshot, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:43.567 37 INFO tempest.lib.common.rest_client [req-ea43d335-09af-4d27-b127-558813e0caff ] Request (GroupSnaphotsV314RbacTest:test_show_group_snapshot_rbac): 202 POST http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_snapshots 0.168s 2020-11-06 18:04:43.568 37 DEBUG tempest.lib.common.rest_client [req-ea43d335-09af-4d27-b127-558813e0caff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"group_snapshot": {"group_id": "db906edf-72a2-420b-b34e-9b42e0dbcaa6", "name": "tempest-group_snapshot-319038854"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ea43d335-09af-4d27-b127-558813e0caff', 'content-length': '167', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ea43d335-09af-4d27-b127-558813e0caff', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_snapshots'} Body: b'{"group_snapshot": {"id": "f69753e9-a04b-4768-bc20-460eb6c5a25c", "name": "tempest-group_snapshot-319038854", "group_type_id": "fbf58350-2f49-4f4d-856e-2ff56e12dbb9"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:43.596 37 INFO tempest.lib.common.rest_client [req-dcbe423b-9c26-4ec2-8480-e19c6d57a052 ] Request (GroupSnaphotsV314RbacTest:test_show_group_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_snapshots/f69753e9-a04b-4768-bc20-460eb6c5a25c 0.025s 2020-11-06 18:04:43.597 37 DEBUG tempest.lib.common.rest_client [req-dcbe423b-9c26-4ec2-8480-e19c6d57a052 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-dcbe423b-9c26-4ec2-8480-e19c6d57a052', 'content-length': '306', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-dcbe423b-9c26-4ec2-8480-e19c6d57a052', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_snapshots/f69753e9-a04b-4768-bc20-460eb6c5a25c'} Body: b'{"group_snapshot": {"id": "f69753e9-a04b-4768-bc20-460eb6c5a25c", "group_id": "db906edf-72a2-420b-b34e-9b42e0dbcaa6", "group_type_id": "fbf58350-2f49-4f4d-856e-2ff56e12dbb9", "status": "creating", "created_at": "2020-11-06T18:04:43.000000", "name": "tempest-group_snapshot-319038854", "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:43.906 40 INFO tempest.lib.common.rest_client [req-6f4ea754-59db-43ab-922d-c927cb89f58f ] Request (VolumesSnapshotV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/volumes/b501e219-7469-4db0-9331-084d6f1807c1 0.066s 2020-11-06 18:04:43.907 40 DEBUG tempest.lib.common.rest_client [req-6f4ea754-59db-43ab-922d-c927cb89f58f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6f4ea754-59db-43ab-922d-c927cb89f58f', 'content-length': '1069', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6f4ea754-59db-43ab-922d-c927cb89f58f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/volumes/b501e219-7469-4db0-9331-084d6f1807c1'} Body: b'{"volume": {"id": "b501e219-7469-4db0-9331-084d6f1807c1", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:43.000000", "updated_at": "2020-11-06T18:04:43.000000", "name": "tempest-VolumesSnapshotV3RbacTest-Volume-1749236545", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/volumes/b501e219-7469-4db0-9331-084d6f1807c1"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/e5f74addf2f94d10bfa96014547b3c32/volumes/b501e219-7469-4db0-9331-084d6f1807c1"}], "user_id": "37807e3082a247158f6d1f5307e00c1a", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "e5f74addf2f94d10bfa96014547b3c32"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:43.921 40 INFO tempest.common.waiters [-] volume b501e219-7469-4db0-9331-084d6f1807c1 reached available after waiting for 1.921175 seconds 2020-11-06 18:04:44.263 40 INFO tempest.lib.common.rest_client [req-25a8ed17-649e-4a88-bc59-3c3e59bf7a68 ] Request (VolumesSnapshotV3RbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots 0.341s 2020-11-06 18:04:44.263 40 DEBUG tempest.lib.common.rest_client [req-25a8ed17-649e-4a88-bc59-3c3e59bf7a68 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"snapshot": {"volume_id": "b501e219-7469-4db0-9331-084d6f1807c1", "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-1637289534"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-25a8ed17-649e-4a88-bc59-3c3e59bf7a68', 'content-length': '312', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-25a8ed17-649e-4a88-bc59-3c3e59bf7a68', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots'} Body: b'{"snapshot": {"id": "b8392366-94a1-43a9-b4f8-1cd6622950d6", "created_at": "2020-11-06T18:04:44.189085", "updated_at": null, "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-1637289534", "description": null, "volume_id": "b501e219-7469-4db0-9331-084d6f1807c1", "status": "creating", "size": 1, "metadata": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:44.300 40 INFO tempest.lib.common.rest_client [req-2e266a14-90f0-4532-9146-c44d978f5b98 ] Request (VolumesSnapshotV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/b8392366-94a1-43a9-b4f8-1cd6622950d6 0.031s 2020-11-06 18:04:44.300 40 DEBUG tempest.lib.common.rest_client [req-2e266a14-90f0-4532-9146-c44d978f5b98 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-2e266a14-90f0-4532-9146-c44d978f5b98', 'content-length': '444', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2e266a14-90f0-4532-9146-c44d978f5b98', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/b8392366-94a1-43a9-b4f8-1cd6622950d6'} Body: b'{"snapshot": {"id": "b8392366-94a1-43a9-b4f8-1cd6622950d6", "created_at": "2020-11-06T18:04:44.000000", "updated_at": null, "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-1637289534", "description": null, "volume_id": "b501e219-7469-4db0-9331-084d6f1807c1", "status": "creating", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "e5f74addf2f94d10bfa96014547b3c32", "os-extended-snapshot-attributes:progress": "0%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:44.492 39 INFO tempest.lib.common.rest_client [req-e78e5a15-01f9-4464-92a9-9700d5b17acb ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.193s 2020-11-06 18:04:44.493 39 DEBUG tempest.lib.common.rest_client [req-e78e5a15-01f9-4464-92a9-9700d5b17acb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e78e5a15-01f9-4464-92a9-9700d5b17acb', 'x-compute-request-id': 'req-e78e5a15-01f9-4464-92a9-9700d5b17acb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:44.632 37 INFO tempest.lib.common.rest_client [req-36c57769-df29-4427-ac1c-a28227c9879a ] Request (GroupSnaphotsV314RbacTest:test_show_group_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_snapshots/f69753e9-a04b-4768-bc20-460eb6c5a25c 0.029s 2020-11-06 18:04:44.632 37 DEBUG tempest.lib.common.rest_client [req-36c57769-df29-4427-ac1c-a28227c9879a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-36c57769-df29-4427-ac1c-a28227c9879a', 'content-length': '307', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-36c57769-df29-4427-ac1c-a28227c9879a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_snapshots/f69753e9-a04b-4768-bc20-460eb6c5a25c'} Body: b'{"group_snapshot": {"id": "f69753e9-a04b-4768-bc20-460eb6c5a25c", "group_id": "db906edf-72a2-420b-b34e-9b42e0dbcaa6", "group_type_id": "fbf58350-2f49-4f4d-856e-2ff56e12dbb9", "status": "available", "created_at": "2020-11-06T18:04:43.000000", "name": "tempest-group_snapshot-319038854", "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:44.637 37 INFO tempest.common.waiters [-] group_snapshot f69753e9-a04b-4768-bc20-460eb6c5a25c reached available after waiting for 1.637784 seconds 2020-11-06 18:04:44.667 37 INFO tempest.lib.common.rest_client [req-05b285ce-e2e3-4928-a1d4-ffcb94931832 ] Request (GroupSnaphotsV314RbacTest:test_show_group_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/snapshots/detail 0.028s 2020-11-06 18:04:44.667 37 DEBUG tempest.lib.common.rest_client [req-05b285ce-e2e3-4928-a1d4-ffcb94931832 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-05b285ce-e2e3-4928-a1d4-ffcb94931832', 'content-length': '453', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-05b285ce-e2e3-4928-a1d4-ffcb94931832', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/snapshots/detail'} Body: b'{"snapshots": [{"id": "7ea4922e-3c99-4afb-8b17-6368450846fc", "created_at": "2020-11-06T18:04:44.000000", "updated_at": "2020-11-06T18:04:44.000000", "name": "tempest-group_snapshot-319038854", "description": null, "volume_id": "9c994895-c172-4291-85cb-c2984979a3ec", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "479cc71352d449a5aae47dadceb27a30", "os-extended-snapshot-attributes:progress": "100%"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:44.704 37 INFO tempest.lib.common.rest_client [req-bce3a5e7-e5e9-45a5-8f63-1b55a7e2ce49 ] Request (GroupSnaphotsV314RbacTest:test_show_group_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/snapshots/7ea4922e-3c99-4afb-8b17-6368450846fc 0.032s 2020-11-06 18:04:44.704 37 DEBUG tempest.lib.common.rest_client [req-bce3a5e7-e5e9-45a5-8f63-1b55a7e2ce49 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-bce3a5e7-e5e9-45a5-8f63-1b55a7e2ce49', 'content-length': '450', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-bce3a5e7-e5e9-45a5-8f63-1b55a7e2ce49', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/snapshots/7ea4922e-3c99-4afb-8b17-6368450846fc'} Body: b'{"snapshot": {"id": "7ea4922e-3c99-4afb-8b17-6368450846fc", "created_at": "2020-11-06T18:04:44.000000", "updated_at": "2020-11-06T18:04:44.000000", "name": "tempest-group_snapshot-319038854", "description": null, "volume_id": "9c994895-c172-4291-85cb-c2984979a3ec", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "479cc71352d449a5aae47dadceb27a30", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:44.710 37 INFO tempest.common.waiters [-] snapshot 7ea4922e-3c99-4afb-8b17-6368450846fc reached available after waiting for 0.710113 seconds 2020-11-06 18:04:44.710 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:44.854 37 INFO tempest.lib.common.rest_client [req-145c27f1-3edc-407f-93ab-51712fe96046 ] Request (GroupSnaphotsV314RbacTest:test_show_group_snapshot_rbac): 200 GET http://172.30.13.94/identity/v3/projects/479cc71352d449a5aae47dadceb27a30/users/79626ff2a9f24f28b269e0967e684da6/roles 0.143s 2020-11-06 18:04:44.855 37 DEBUG tempest.lib.common.rest_client [req-145c27f1-3edc-407f-93ab-51712fe96046 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-145c27f1-3edc-407f-93ab-51712fe96046', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/479cc71352d449a5aae47dadceb27a30/users/79626ff2a9f24f28b269e0967e684da6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/479cc71352d449a5aae47dadceb27a30/users/79626ff2a9f24f28b269e0967e684da6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:44.943 37 INFO tempest.lib.common.rest_client [req-1a1e194d-54ea-482b-9371-cdbd485b653d ] Request (GroupSnaphotsV314RbacTest:test_show_group_snapshot_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-11-06 18:04:44.944 37 DEBUG tempest.lib.common.rest_client [req-1a1e194d-54ea-482b-9371-cdbd485b653d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1a1e194d-54ea-482b-9371-cdbd485b653d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "79626ff2a9f24f28b269e0967e684da6", "name": "tempest-GroupSnaphotsV314RbacTest-640793486", "password_expires_at": null}, "audit_ids": ["CSQvQJbES7KwrJNNK9MdbA"], "expires_at": "2020-11-06T19:04:44.000000Z", "issued_at": "2020-11-06T18:04:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "479cc71352d449a5aae47dadceb27a30", "name": "tempest-GroupSnaphotsV314RbacTest-640793486"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:45.080 37 INFO tempest.lib.common.rest_client [req-4327f549-966a-4537-86fe-3b6b39ab0600 ] Request (GroupSnaphotsV314RbacTest:test_show_group_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_snapshots/f69753e9-a04b-4768-bc20-460eb6c5a25c 0.135s 2020-11-06 18:04:45.081 37 DEBUG tempest.lib.common.rest_client [req-4327f549-966a-4537-86fe-3b6b39ab0600 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4327f549-966a-4537-86fe-3b6b39ab0600', 'content-length': '307', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4327f549-966a-4537-86fe-3b6b39ab0600', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_snapshots/f69753e9-a04b-4768-bc20-460eb6c5a25c'} Body: b'{"group_snapshot": {"id": "f69753e9-a04b-4768-bc20-460eb6c5a25c", "group_id": "db906edf-72a2-420b-b34e-9b42e0dbcaa6", "group_type_id": "fbf58350-2f49-4f4d-856e-2ff56e12dbb9", "status": "available", "created_at": "2020-11-06T18:04:43.000000", "name": "tempest-group_snapshot-319038854", "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:45.085 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:45.185 37 INFO tempest.lib.common.rest_client [req-23d59fd1-4671-42c2-8ce9-2ffab1e36714 ] Request (GroupSnaphotsV314RbacTest:test_show_group_snapshot_rbac): 200 GET http://172.30.13.94/identity/v3/projects/479cc71352d449a5aae47dadceb27a30/users/79626ff2a9f24f28b269e0967e684da6/roles 0.099s 2020-11-06 18:04:45.186 37 DEBUG tempest.lib.common.rest_client [req-23d59fd1-4671-42c2-8ce9-2ffab1e36714 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-23d59fd1-4671-42c2-8ce9-2ffab1e36714', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/479cc71352d449a5aae47dadceb27a30/users/79626ff2a9f24f28b269e0967e684da6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/479cc71352d449a5aae47dadceb27a30/users/79626ff2a9f24f28b269e0967e684da6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:45.264 37 INFO tempest.lib.common.rest_client [req-c85d5fdd-6b22-497e-9718-9115af14a0e8 ] Request (GroupSnaphotsV314RbacTest:test_show_group_snapshot_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.077s 2020-11-06 18:04:45.265 37 DEBUG tempest.lib.common.rest_client [req-c85d5fdd-6b22-497e-9718-9115af14a0e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c85d5fdd-6b22-497e-9718-9115af14a0e8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "79626ff2a9f24f28b269e0967e684da6", "name": "tempest-GroupSnaphotsV314RbacTest-640793486", "password_expires_at": null}, "audit_ids": ["tD0y5HLaT_uJeKHGCgGkHQ"], "expires_at": "2020-11-06T19:04:45.000000Z", "issued_at": "2020-11-06T18:04:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "479cc71352d449a5aae47dadceb27a30", "name": "tempest-GroupSnaphotsV314RbacTest-640793486"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_479cc71352d449a5aae47dadceb27a30", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:45.336 40 INFO tempest.lib.common.rest_client [req-cef7d07e-6cf4-40a0-af77-c4e59a2c7586 ] Request (VolumesSnapshotV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/b8392366-94a1-43a9-b4f8-1cd6622950d6 0.031s 2020-11-06 18:04:45.337 40 DEBUG tempest.lib.common.rest_client [req-cef7d07e-6cf4-40a0-af77-c4e59a2c7586 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-cef7d07e-6cf4-40a0-af77-c4e59a2c7586', 'content-length': '471', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-cef7d07e-6cf4-40a0-af77-c4e59a2c7586', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/b8392366-94a1-43a9-b4f8-1cd6622950d6'} Body: b'{"snapshot": {"id": "b8392366-94a1-43a9-b4f8-1cd6622950d6", "created_at": "2020-11-06T18:04:44.000000", "updated_at": "2020-11-06T18:04:45.000000", "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-1637289534", "description": null, "volume_id": "b501e219-7469-4db0-9331-084d6f1807c1", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "e5f74addf2f94d10bfa96014547b3c32", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:45.343 40 INFO tempest.common.waiters [-] snapshot b8392366-94a1-43a9-b4f8-1cd6622950d6 reached available after waiting for 1.343566 seconds 2020-11-06 18:04:45.345 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:45.348 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:create_snapshot, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:45.348 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:45.440 37 INFO tempest.lib.common.rest_client [req-20df4995-8cd0-42e6-bb01-88ca0b7af5ed ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_snapshots/f69753e9-a04b-4768-bc20-460eb6c5a25c 0.174s 2020-11-06 18:04:45.441 37 DEBUG tempest.lib.common.rest_client [req-20df4995-8cd0-42e6-bb01-88ca0b7af5ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-20df4995-8cd0-42e6-bb01-88ca0b7af5ed', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_snapshots/f69753e9-a04b-4768-bc20-460eb6c5a25c'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:45.466 40 INFO tempest.lib.common.rest_client [req-1ca6bc7e-1b76-4059-90a1-2c0b3c9867ec ] Request (VolumesSnapshotV3RbacTest:test_create_snapshot): 200 GET http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles 0.116s 2020-11-06 18:04:45.466 40 DEBUG tempest.lib.common.rest_client [req-1ca6bc7e-1b76-4059-90a1-2c0b3c9867ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1ca6bc7e-1b76-4059-90a1-2c0b3c9867ec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:45.530 37 INFO tempest.lib.common.rest_client [req-0519caa9-e8ea-4ab0-affb-e43899ad4734 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/detail 0.088s 2020-11-06 18:04:45.530 37 DEBUG tempest.lib.common.rest_client [req-0519caa9-e8ea-4ab0-affb-e43899ad4734 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-0519caa9-e8ea-4ab0-affb-e43899ad4734', 'content-length': '1176', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0519caa9-e8ea-4ab0-affb-e43899ad4734', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/detail'} Body: b'{"volumes": [{"id": "9c994895-c172-4291-85cb-c2984979a3ec", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:42.000000", "updated_at": "2020-11-06T18:04:42.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-1672076166", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-1483929768", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/9c994895-c172-4291-85cb-c2984979a3ec"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/479cc71352d449a5aae47dadceb27a30/volumes/9c994895-c172-4291-85cb-c2984979a3ec"}], "user_id": "79626ff2a9f24f28b269e0967e684da6", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "db906edf-72a2-420b-b34e-9b42e0dbcaa6", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "479cc71352d449a5aae47dadceb27a30"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:45.552 40 INFO tempest.lib.common.rest_client [req-b0abd8e6-5625-4f21-8b6d-37fe3f325f90 ] Request (VolumesSnapshotV3RbacTest:test_create_snapshot): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:04:45.553 40 DEBUG tempest.lib.common.rest_client [req-b0abd8e6-5625-4f21-8b6d-37fe3f325f90 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b0abd8e6-5625-4f21-8b6d-37fe3f325f90', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "37807e3082a247158f6d1f5307e00c1a", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338", "password_expires_at": null}, "audit_ids": ["C_Um4E4KQqa0g5UG567r2g"], "expires_at": "2020-11-06T19:04:45.000000Z", "issued_at": "2020-11-06T18:04:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e5f74addf2f94d10bfa96014547b3c32", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:45.568 37 INFO tempest.lib.common.rest_client [req-ac2a2718-1703-414a-854c-042c1254fe64 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/snapshots/detail 0.025s 2020-11-06 18:04:45.568 37 DEBUG tempest.lib.common.rest_client [req-ac2a2718-1703-414a-854c-042c1254fe64 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ac2a2718-1703-414a-854c-042c1254fe64', 'content-length': '452', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ac2a2718-1703-414a-854c-042c1254fe64', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/snapshots/detail'} Body: b'{"snapshots": [{"id": "7ea4922e-3c99-4afb-8b17-6368450846fc", "created_at": "2020-11-06T18:04:44.000000", "updated_at": "2020-11-06T18:04:45.000000", "name": "tempest-group_snapshot-319038854", "description": null, "volume_id": "9c994895-c172-4291-85cb-c2984979a3ec", "status": "deleting", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "479cc71352d449a5aae47dadceb27a30", "os-extended-snapshot-attributes:progress": "100%"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:45.610 37 INFO tempest.lib.common.rest_client [req-0ea899d3-6d24-4e76-971a-84cae9f9428d ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/snapshots/7ea4922e-3c99-4afb-8b17-6368450846fc 0.032s 2020-11-06 18:04:45.611 37 DEBUG tempest.lib.common.rest_client [req-0ea899d3-6d24-4e76-971a-84cae9f9428d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-0ea899d3-6d24-4e76-971a-84cae9f9428d', 'content-length': '449', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0ea899d3-6d24-4e76-971a-84cae9f9428d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/snapshots/7ea4922e-3c99-4afb-8b17-6368450846fc'} Body: b'{"snapshot": {"id": "7ea4922e-3c99-4afb-8b17-6368450846fc", "created_at": "2020-11-06T18:04:44.000000", "updated_at": "2020-11-06T18:04:45.000000", "name": "tempest-group_snapshot-319038854", "description": null, "volume_id": "9c994895-c172-4291-85cb-c2984979a3ec", "status": "deleting", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "479cc71352d449a5aae47dadceb27a30", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:45.726 39 INFO tempest.lib.common.rest_client [req-58305003-374e-4183-b669-eca02cd14321 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.216s 2020-11-06 18:04:45.727 39 DEBUG tempest.lib.common.rest_client [req-58305003-374e-4183-b669-eca02cd14321 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-58305003-374e-4183-b669-eca02cd14321', 'x-compute-request-id': 'req-58305003-374e-4183-b669-eca02cd14321', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:45.919 40 INFO tempest.lib.common.rest_client [req-656ec99e-5857-4b3f-927a-6876dee307cd ] Request (VolumesSnapshotV3RbacTest:test_create_snapshot): 202 POST http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots 0.365s 2020-11-06 18:04:45.920 40 DEBUG tempest.lib.common.rest_client [req-656ec99e-5857-4b3f-927a-6876dee307cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"snapshot": {"volume_id": "b501e219-7469-4db0-9331-084d6f1807c1", "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-829743124"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-656ec99e-5857-4b3f-927a-6876dee307cd', 'content-length': '311', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-656ec99e-5857-4b3f-927a-6876dee307cd', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots'} Body: b'{"snapshot": {"id": "7512a7db-f86f-49a6-a813-7081b0738a52", "created_at": "2020-11-06T18:04:45.826150", "updated_at": null, "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-829743124", "description": null, "volume_id": "b501e219-7469-4db0-9331-084d6f1807c1", "status": "creating", "size": 1, "metadata": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:45.956 40 INFO tempest.lib.common.rest_client [req-07f1d702-bbdf-43d9-a6e2-d0aa8be72e08 ] Request (VolumesSnapshotV3RbacTest:test_create_snapshot): 200 GET http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/7512a7db-f86f-49a6-a813-7081b0738a52 0.032s 2020-11-06 18:04:45.956 40 DEBUG tempest.lib.common.rest_client [req-07f1d702-bbdf-43d9-a6e2-d0aa8be72e08 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-07f1d702-bbdf-43d9-a6e2-d0aa8be72e08', 'content-length': '443', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-07f1d702-bbdf-43d9-a6e2-d0aa8be72e08', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/7512a7db-f86f-49a6-a813-7081b0738a52'} Body: b'{"snapshot": {"id": "7512a7db-f86f-49a6-a813-7081b0738a52", "created_at": "2020-11-06T18:04:46.000000", "updated_at": null, "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-829743124", "description": null, "volume_id": "b501e219-7469-4db0-9331-084d6f1807c1", "status": "creating", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "e5f74addf2f94d10bfa96014547b3c32", "os-extended-snapshot-attributes:progress": "0%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:46.650 37 INFO tempest.lib.common.rest_client [req-c8d7d32f-fbae-4eea-aae7-69140eca9d7c ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/snapshots/7ea4922e-3c99-4afb-8b17-6368450846fc 0.033s 2020-11-06 18:04:46.651 37 DEBUG tempest.lib.common.rest_client [req-c8d7d32f-fbae-4eea-aae7-69140eca9d7c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '111', 'content-type': 'application/json', 'x-compute-request-id': 'req-c8d7d32f-fbae-4eea-aae7-69140eca9d7c', 'x-openstack-request-id': 'req-c8d7d32f-fbae-4eea-aae7-69140eca9d7c', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/snapshots/7ea4922e-3c99-4afb-8b17-6368450846fc'} Body: b'{"itemNotFound": {"code": 404, "message": "Snapshot 7ea4922e-3c99-4afb-8b17-6368450846fc could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:46.670 37 INFO tempest.lib.common.rest_client [req-cc81aed6-736b-47ee-a781-a7ea8a2bbff3 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_snapshots/f69753e9-a04b-4768-bc20-460eb6c5a25c 0.017s 2020-11-06 18:04:46.671 37 DEBUG tempest.lib.common.rest_client [req-cc81aed6-736b-47ee-a781-a7ea8a2bbff3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'content-length': '116', 'content-type': 'application/json', 'x-compute-request-id': 'req-cc81aed6-736b-47ee-a781-a7ea8a2bbff3', 'x-openstack-request-id': 'req-cc81aed6-736b-47ee-a781-a7ea8a2bbff3', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_snapshots/f69753e9-a04b-4768-bc20-460eb6c5a25c'} Body: b'{"itemNotFound": {"code": 404, "message": "GroupSnapshot f69753e9-a04b-4768-bc20-460eb6c5a25c could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:46.759 37 INFO tempest.lib.common.rest_client [req-d8b38342-1c40-4575-a21a-57e3c15b719e ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/detail 0.087s 2020-11-06 18:04:46.760 37 DEBUG tempest.lib.common.rest_client [req-d8b38342-1c40-4575-a21a-57e3c15b719e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d8b38342-1c40-4575-a21a-57e3c15b719e', 'content-length': '1176', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d8b38342-1c40-4575-a21a-57e3c15b719e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/detail'} Body: b'{"volumes": [{"id": "9c994895-c172-4291-85cb-c2984979a3ec", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:42.000000", "updated_at": "2020-11-06T18:04:42.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-1672076166", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-1483929768", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/9c994895-c172-4291-85cb-c2984979a3ec"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/479cc71352d449a5aae47dadceb27a30/volumes/9c994895-c172-4291-85cb-c2984979a3ec"}], "user_id": "79626ff2a9f24f28b269e0967e684da6", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "db906edf-72a2-420b-b34e-9b42e0dbcaa6", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "479cc71352d449a5aae47dadceb27a30"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:46.885 37 INFO tempest.lib.common.rest_client [req-27a63b76-095b-4c48-8060-ac398b77dbdb ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 202 POST http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups/db906edf-72a2-420b-b34e-9b42e0dbcaa6/action 0.108s 2020-11-06 18:04:46.885 37 DEBUG tempest.lib.common.rest_client [req-27a63b76-095b-4c48-8060-ac398b77dbdb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"delete": {"delete-volumes": true}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-27a63b76-095b-4c48-8060-ac398b77dbdb', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups/db906edf-72a2-420b-b34e-9b42e0dbcaa6/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:46.993 37 INFO tempest.lib.common.rest_client [req-72e55a81-4655-4834-8f15-08ee3aa7c899 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/9c994895-c172-4291-85cb-c2984979a3ec 0.106s 2020-11-06 18:04:46.993 37 DEBUG tempest.lib.common.rest_client [req-72e55a81-4655-4834-8f15-08ee3aa7c899 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-72e55a81-4655-4834-8f15-08ee3aa7c899', 'content-length': '1172', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-72e55a81-4655-4834-8f15-08ee3aa7c899', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/9c994895-c172-4291-85cb-c2984979a3ec'} Body: b'{"volume": {"id": "9c994895-c172-4291-85cb-c2984979a3ec", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:42.000000", "updated_at": "2020-11-06T18:04:47.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-1672076166", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-1483929768", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/9c994895-c172-4291-85cb-c2984979a3ec"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/479cc71352d449a5aae47dadceb27a30/volumes/9c994895-c172-4291-85cb-c2984979a3ec"}], "user_id": "79626ff2a9f24f28b269e0967e684da6", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "db906edf-72a2-420b-b34e-9b42e0dbcaa6", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "479cc71352d449a5aae47dadceb27a30"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:47.000 40 INFO tempest.lib.common.rest_client [req-7facb4c2-382c-4369-ae54-b4efe9612745 ] Request (VolumesSnapshotV3RbacTest:test_create_snapshot): 200 GET http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/7512a7db-f86f-49a6-a813-7081b0738a52 0.036s 2020-11-06 18:04:47.000 40 DEBUG tempest.lib.common.rest_client [req-7facb4c2-382c-4369-ae54-b4efe9612745 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-7facb4c2-382c-4369-ae54-b4efe9612745', 'content-length': '470', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7facb4c2-382c-4369-ae54-b4efe9612745', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/7512a7db-f86f-49a6-a813-7081b0738a52'} Body: b'{"snapshot": {"id": "7512a7db-f86f-49a6-a813-7081b0738a52", "created_at": "2020-11-06T18:04:46.000000", "updated_at": "2020-11-06T18:04:46.000000", "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-829743124", "description": null, "volume_id": "b501e219-7469-4db0-9331-084d6f1807c1", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "e5f74addf2f94d10bfa96014547b3c32", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:47.006 40 INFO tempest.common.waiters [-] snapshot 7512a7db-f86f-49a6-a813-7081b0738a52 reached available after waiting for 2.006659 seconds 2020-11-06 18:04:47.007 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:47.031 39 INFO tempest.lib.common.rest_client [req-b862cac1-e4f8-4659-b43a-53310c48a44c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.289s 2020-11-06 18:04:47.032 39 DEBUG tempest.lib.common.rest_client [req-b862cac1-e4f8-4659-b43a-53310c48a44c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b862cac1-e4f8-4659-b43a-53310c48a44c', 'x-compute-request-id': 'req-b862cac1-e4f8-4659-b43a-53310c48a44c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:47.177 40 INFO tempest.lib.common.rest_client [req-45d88965-c62c-4aca-ab6f-35756c018b6d ] Request (VolumesSnapshotV3RbacTest:test_create_snapshot): 200 GET http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles 0.170s 2020-11-06 18:04:47.177 40 DEBUG tempest.lib.common.rest_client [req-45d88965-c62c-4aca-ab6f-35756c018b6d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-45d88965-c62c-4aca-ab6f-35756c018b6d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:47.268 40 INFO tempest.lib.common.rest_client [req-6c2a745d-e32b-4860-a615-f0d2ee6dec2d ] Request (VolumesSnapshotV3RbacTest:test_create_snapshot): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-11-06 18:04:47.268 40 DEBUG tempest.lib.common.rest_client [req-6c2a745d-e32b-4860-a615-f0d2ee6dec2d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6c2a745d-e32b-4860-a615-f0d2ee6dec2d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "37807e3082a247158f6d1f5307e00c1a", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338", "password_expires_at": null}, "audit_ids": ["d4BKjCxORmmJE75EWvKo0A"], "expires_at": "2020-11-06T19:04:47.000000Z", "issued_at": "2020-11-06T18:04:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e5f74addf2f94d10bfa96014547b3c32", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:47.270 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:47.272 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:delete_snapshot, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:47.570 40 INFO tempest.lib.common.rest_client [req-90580bfb-fa7b-426d-bfd4-1f9fafb3dfcc ] Request (VolumesSnapshotV3RbacTest:test_delete_snapshot): 202 POST http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots 0.297s 2020-11-06 18:04:47.571 40 DEBUG tempest.lib.common.rest_client [req-90580bfb-fa7b-426d-bfd4-1f9fafb3dfcc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"snapshot": {"volume_id": "b501e219-7469-4db0-9331-084d6f1807c1", "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-1171492542"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-90580bfb-fa7b-426d-bfd4-1f9fafb3dfcc', 'content-length': '312', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-90580bfb-fa7b-426d-bfd4-1f9fafb3dfcc', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots'} Body: b'{"snapshot": {"id": "d94e3ceb-51cc-4797-8651-f6d7c32ea8d2", "created_at": "2020-11-06T18:04:47.499690", "updated_at": null, "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-1171492542", "description": null, "volume_id": "b501e219-7469-4db0-9331-084d6f1807c1", "status": "creating", "size": 1, "metadata": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:47.606 40 INFO tempest.lib.common.rest_client [req-41281a72-62bf-4006-9e26-a198dcafaa4a ] Request (VolumesSnapshotV3RbacTest:test_delete_snapshot): 200 GET http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/d94e3ceb-51cc-4797-8651-f6d7c32ea8d2 0.031s 2020-11-06 18:04:47.606 40 DEBUG tempest.lib.common.rest_client [req-41281a72-62bf-4006-9e26-a198dcafaa4a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-41281a72-62bf-4006-9e26-a198dcafaa4a', 'content-length': '444', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-41281a72-62bf-4006-9e26-a198dcafaa4a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/d94e3ceb-51cc-4797-8651-f6d7c32ea8d2'} Body: b'{"snapshot": {"id": "d94e3ceb-51cc-4797-8651-f6d7c32ea8d2", "created_at": "2020-11-06T18:04:47.000000", "updated_at": null, "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-1171492542", "description": null, "volume_id": "b501e219-7469-4db0-9331-084d6f1807c1", "status": "creating", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "e5f74addf2f94d10bfa96014547b3c32", "os-extended-snapshot-attributes:progress": "0%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:48.054 37 INFO tempest.lib.common.rest_client [req-cc8e071b-3e6b-44bd-966a-e6e3f5b92da2 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/9c994895-c172-4291-85cb-c2984979a3ec 0.044s 2020-11-06 18:04:48.054 37 DEBUG tempest.lib.common.rest_client [req-cc8e071b-3e6b-44bd-966a-e6e3f5b92da2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-cc8e071b-3e6b-44bd-966a-e6e3f5b92da2', 'x-openstack-request-id': 'req-cc8e071b-3e6b-44bd-966a-e6e3f5b92da2', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/9c994895-c172-4291-85cb-c2984979a3ec'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 9c994895-c172-4291-85cb-c2984979a3ec could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:48.071 37 INFO tempest.lib.common.rest_client [req-530af002-bfce-4e96-9485-98482250125d ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups/db906edf-72a2-420b-b34e-9b42e0dbcaa6 0.016s 2020-11-06 18:04:48.072 37 DEBUG tempest.lib.common.rest_client [req-530af002-bfce-4e96-9485-98482250125d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'content-length': '108', 'content-type': 'application/json', 'x-compute-request-id': 'req-530af002-bfce-4e96-9485-98482250125d', 'x-openstack-request-id': 'req-530af002-bfce-4e96-9485-98482250125d', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/groups/db906edf-72a2-420b-b34e-9b42e0dbcaa6'} Body: b'{"itemNotFound": {"code": 404, "message": "Group db906edf-72a2-420b-b34e-9b42e0dbcaa6 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:48.111 37 INFO tempest.lib.common.rest_client [req-9fff451a-35a8-4918-9102-005af41e984d ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_types/fbf58350-2f49-4f4d-856e-2ff56e12dbb9 0.038s 2020-11-06 18:04:48.112 37 DEBUG tempest.lib.common.rest_client [req-9fff451a-35a8-4918-9102-005af41e984d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9fff451a-35a8-4918-9102-005af41e984d', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/group_types/fbf58350-2f49-4f4d-856e-2ff56e12dbb9'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:48.152 37 INFO tempest.lib.common.rest_client [req-f393dec2-c023-4a02-87c9-59f43676601d ] Request (GroupSnaphotsV314RbacTest:tearDownClass): 404 DELETE http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/9c994895-c172-4291-85cb-c2984979a3ec 0.037s 2020-11-06 18:04:48.153 37 DEBUG tempest.lib.common.rest_client [req-f393dec2-c023-4a02-87c9-59f43676601d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-f393dec2-c023-4a02-87c9-59f43676601d', 'x-openstack-request-id': 'req-f393dec2-c023-4a02-87c9-59f43676601d', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/9c994895-c172-4291-85cb-c2984979a3ec'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 9c994895-c172-4291-85cb-c2984979a3ec could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:48.222 37 INFO tempest.lib.common.rest_client [req-49ea3c97-5357-401b-bcd6-93eeba28e9d8 ] Request (GroupSnaphotsV314RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/types/593a963f-e7b6-4ffb-a1cd-12cc211be44b 0.068s 2020-11-06 18:04:48.222 37 DEBUG tempest.lib.common.rest_client [req-49ea3c97-5357-401b-bcd6-93eeba28e9d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-49ea3c97-5357-401b-bcd6-93eeba28e9d8', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/types/593a963f-e7b6-4ffb-a1cd-12cc211be44b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:48.235 39 INFO tempest.lib.common.rest_client [req-65311534-ad55-4c5a-863f-449991ed0ee4 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.189s 2020-11-06 18:04:48.236 39 DEBUG tempest.lib.common.rest_client [req-65311534-ad55-4c5a-863f-449991ed0ee4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-65311534-ad55-4c5a-863f-449991ed0ee4', 'x-compute-request-id': 'req-65311534-ad55-4c5a-863f-449991ed0ee4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:48.243 37 INFO tempest.lib.common.rest_client [req-03b10d51-064f-4d86-bb52-aa9c3bc7c3e7 ] Request (GroupSnaphotsV314RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/types/593a963f-e7b6-4ffb-a1cd-12cc211be44b 0.019s 2020-11-06 18:04:48.243 37 DEBUG tempest.lib.common.rest_client [req-03b10d51-064f-4d86-bb52-aa9c3bc7c3e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-03b10d51-064f-4d86-bb52-aa9c3bc7c3e7', 'x-openstack-request-id': 'req-03b10d51-064f-4d86-bb52-aa9c3bc7c3e7', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/types/593a963f-e7b6-4ffb-a1cd-12cc211be44b'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 593a963f-e7b6-4ffb-a1cd-12cc211be44b could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:48.294 37 INFO tempest.lib.common.rest_client [req-4e453ba0-afbc-4dbb-ae49-7cffd42d56c8 ] Request (GroupSnaphotsV314RbacTest:tearDownClass): 404 DELETE http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/6fcb24e7-f733-4933-bd08-a1880f3a51e7 0.050s 2020-11-06 18:04:48.295 37 DEBUG tempest.lib.common.rest_client [req-4e453ba0-afbc-4dbb-ae49-7cffd42d56c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-4e453ba0-afbc-4dbb-ae49-7cffd42d56c8', 'x-openstack-request-id': 'req-4e453ba0-afbc-4dbb-ae49-7cffd42d56c8', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/6fcb24e7-f733-4933-bd08-a1880f3a51e7'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 6fcb24e7-f733-4933-bd08-a1880f3a51e7 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:48.388 37 INFO tempest.lib.common.rest_client [req-b453b21b-9473-4b3c-a414-9339b283fe8b ] Request (GroupSnaphotsV314RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/types/1f3992ad-0c48-4dc2-9b67-208faf6b7ece 0.092s 2020-11-06 18:04:48.388 37 DEBUG tempest.lib.common.rest_client [req-b453b21b-9473-4b3c-a414-9339b283fe8b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b453b21b-9473-4b3c-a414-9339b283fe8b', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/types/1f3992ad-0c48-4dc2-9b67-208faf6b7ece'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:48.409 37 INFO tempest.lib.common.rest_client [req-3917d856-7950-458f-8f3f-89bb72fcda93 ] Request (GroupSnaphotsV314RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/types/1f3992ad-0c48-4dc2-9b67-208faf6b7ece 0.019s 2020-11-06 18:04:48.409 37 DEBUG tempest.lib.common.rest_client [req-3917d856-7950-458f-8f3f-89bb72fcda93 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-3917d856-7950-458f-8f3f-89bb72fcda93', 'x-openstack-request-id': 'req-3917d856-7950-458f-8f3f-89bb72fcda93', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/types/1f3992ad-0c48-4dc2-9b67-208faf6b7ece'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 1f3992ad-0c48-4dc2-9b67-208faf6b7ece could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:48.446 37 INFO tempest.lib.common.rest_client [req-01c8148a-1081-4643-b5f5-bf0cbbfb8eac ] Request (GroupSnaphotsV314RbacTest:tearDownClass): 404 DELETE http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/6279c1fa-2fc9-487e-9ed9-0a6154caa6f8 0.035s 2020-11-06 18:04:48.446 37 DEBUG tempest.lib.common.rest_client [req-01c8148a-1081-4643-b5f5-bf0cbbfb8eac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-01c8148a-1081-4643-b5f5-bf0cbbfb8eac', 'x-openstack-request-id': 'req-01c8148a-1081-4643-b5f5-bf0cbbfb8eac', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/6279c1fa-2fc9-487e-9ed9-0a6154caa6f8'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 6279c1fa-2fc9-487e-9ed9-0a6154caa6f8 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:48.512 37 INFO tempest.lib.common.rest_client [req-2631d148-c967-4ea3-ac25-d7c29077a30e ] Request (GroupSnaphotsV314RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/types/d54d3b7e-1806-46b6-bd02-1deb389d2b17 0.065s 2020-11-06 18:04:48.513 37 DEBUG tempest.lib.common.rest_client [req-2631d148-c967-4ea3-ac25-d7c29077a30e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2631d148-c967-4ea3-ac25-d7c29077a30e', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/types/d54d3b7e-1806-46b6-bd02-1deb389d2b17'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:48.532 37 INFO tempest.lib.common.rest_client [req-b60d32d7-036d-4a71-a5a2-d00bcf2e8057 ] Request (GroupSnaphotsV314RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/types/d54d3b7e-1806-46b6-bd02-1deb389d2b17 0.018s 2020-11-06 18:04:48.533 37 DEBUG tempest.lib.common.rest_client [req-b60d32d7-036d-4a71-a5a2-d00bcf2e8057 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-b60d32d7-036d-4a71-a5a2-d00bcf2e8057', 'x-openstack-request-id': 'req-b60d32d7-036d-4a71-a5a2-d00bcf2e8057', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/types/d54d3b7e-1806-46b6-bd02-1deb389d2b17'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type d54d3b7e-1806-46b6-bd02-1deb389d2b17 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:48.577 37 INFO tempest.lib.common.rest_client [req-7c145e46-5eb4-4934-a94c-00cf29296e7e ] Request (GroupSnaphotsV314RbacTest:tearDownClass): 404 DELETE http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/51a53e23-ae8f-4ff2-9bd3-c88627c9cbf4 0.044s 2020-11-06 18:04:48.578 37 DEBUG tempest.lib.common.rest_client [req-7c145e46-5eb4-4934-a94c-00cf29296e7e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-7c145e46-5eb4-4934-a94c-00cf29296e7e', 'x-openstack-request-id': 'req-7c145e46-5eb4-4934-a94c-00cf29296e7e', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/volumes/51a53e23-ae8f-4ff2-9bd3-c88627c9cbf4'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 51a53e23-ae8f-4ff2-9bd3-c88627c9cbf4 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:48.637 40 INFO tempest.lib.common.rest_client [req-d9096255-91d3-4117-bf78-babc6f5beb96 ] Request (VolumesSnapshotV3RbacTest:test_delete_snapshot): 200 GET http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/d94e3ceb-51cc-4797-8651-f6d7c32ea8d2 0.027s 2020-11-06 18:04:48.638 40 DEBUG tempest.lib.common.rest_client [req-d9096255-91d3-4117-bf78-babc6f5beb96 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d9096255-91d3-4117-bf78-babc6f5beb96', 'content-length': '471', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d9096255-91d3-4117-bf78-babc6f5beb96', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/d94e3ceb-51cc-4797-8651-f6d7c32ea8d2'} Body: b'{"snapshot": {"id": "d94e3ceb-51cc-4797-8651-f6d7c32ea8d2", "created_at": "2020-11-06T18:04:47.000000", "updated_at": "2020-11-06T18:04:48.000000", "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-1171492542", "description": null, "volume_id": "b501e219-7469-4db0-9331-084d6f1807c1", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "e5f74addf2f94d10bfa96014547b3c32", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:48.644 40 INFO tempest.common.waiters [-] snapshot d94e3ceb-51cc-4797-8651-f6d7c32ea8d2 reached available after waiting for 1.644110 seconds 2020-11-06 18:04:48.644 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:48.649 37 INFO tempest.lib.common.rest_client [req-39d38cb0-296a-4e17-9680-7a02d458c563 ] Request (GroupSnaphotsV314RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/types/a993444b-aecd-4be2-a630-97aa45840329 0.069s 2020-11-06 18:04:48.649 37 DEBUG tempest.lib.common.rest_client [req-39d38cb0-296a-4e17-9680-7a02d458c563 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-39d38cb0-296a-4e17-9680-7a02d458c563', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/types/a993444b-aecd-4be2-a630-97aa45840329'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:48.669 37 INFO tempest.lib.common.rest_client [req-2e958635-ff6a-430b-b65c-56d3ce7c6735 ] Request (GroupSnaphotsV314RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/types/a993444b-aecd-4be2-a630-97aa45840329 0.019s 2020-11-06 18:04:48.669 37 DEBUG tempest.lib.common.rest_client [req-2e958635-ff6a-430b-b65c-56d3ce7c6735 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-2e958635-ff6a-430b-b65c-56d3ce7c6735', 'x-openstack-request-id': 'req-2e958635-ff6a-430b-b65c-56d3ce7c6735', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/479cc71352d449a5aae47dadceb27a30/types/a993444b-aecd-4be2-a630-97aa45840329'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type a993444b-aecd-4be2-a630-97aa45840329 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:48.764 40 INFO tempest.lib.common.rest_client [req-5335e41f-2ffe-4afa-87ef-1a1d3e2aeab7 ] Request (VolumesSnapshotV3RbacTest:test_delete_snapshot): 200 GET http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles 0.118s 2020-11-06 18:04:48.764 40 DEBUG tempest.lib.common.rest_client [req-5335e41f-2ffe-4afa-87ef-1a1d3e2aeab7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5335e41f-2ffe-4afa-87ef-1a1d3e2aeab7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:48.832 37 INFO tempest.lib.common.rest_client [req-d81dcff2-ab52-44e5-9b11-1bf537ce71ee ] Request (GroupSnaphotsV314RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/79626ff2a9f24f28b269e0967e684da6 0.162s 2020-11-06 18:04:48.832 37 DEBUG tempest.lib.common.rest_client [req-d81dcff2-ab52-44e5-9b11-1bf537ce71ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d81dcff2-ab52-44e5-9b11-1bf537ce71ee', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/79626ff2a9f24f28b269e0967e684da6'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:48.855 40 INFO tempest.lib.common.rest_client [req-dde614e2-0cdb-4d77-9312-9dedab442625 ] Request (VolumesSnapshotV3RbacTest:test_delete_snapshot): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-11-06 18:04:48.856 40 DEBUG tempest.lib.common.rest_client [req-dde614e2-0cdb-4d77-9312-9dedab442625 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dde614e2-0cdb-4d77-9312-9dedab442625', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "37807e3082a247158f6d1f5307e00c1a", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338", "password_expires_at": null}, "audit_ids": ["GttKn-UuTI65fzykTC9i4Q"], "expires_at": "2020-11-06T19:04:48.000000Z", "issued_at": "2020-11-06T18:04:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e5f74addf2f94d10bfa96014547b3c32", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:48.909 37 INFO tempest.lib.common.rest_client [req-013745a4-709b-4dbf-9e68-ec9c0dbab373 ] Request (GroupSnaphotsV314RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.075s 2020-11-06 18:04:48.909 37 DEBUG tempest.lib.common.rest_client [req-013745a4-709b-4dbf-9e68-ec9c0dbab373 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-013745a4-709b-4dbf-9e68-ec9c0dbab373', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["LL0DmQo0RO2HL8xw20fW8w"], "expires_at": "2020-11-06T19:04:48.000000Z", "issued_at": "2020-11-06T18:04:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:49.098 40 INFO tempest.lib.common.rest_client [req-e7b1e7a7-70cf-4b44-b31c-b86042b1aaaf ] Request (VolumesSnapshotV3RbacTest:test_delete_snapshot): 202 DELETE http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/d94e3ceb-51cc-4797-8651-f6d7c32ea8d2 0.241s 2020-11-06 18:04:49.098 40 DEBUG tempest.lib.common.rest_client [req-e7b1e7a7-70cf-4b44-b31c-b86042b1aaaf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e7b1e7a7-70cf-4b44-b31c-b86042b1aaaf', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/d94e3ceb-51cc-4797-8651-f6d7c32ea8d2'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:49.099 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:49.160 40 INFO tempest.lib.common.rest_client [req-fc70d1ad-0388-4692-a2fc-f7c80ed4e3b7 ] Request (VolumesSnapshotV3RbacTest:test_delete_snapshot): 200 GET http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles 0.060s 2020-11-06 18:04:49.160 40 DEBUG tempest.lib.common.rest_client [req-fc70d1ad-0388-4692-a2fc-f7c80ed4e3b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fc70d1ad-0388-4692-a2fc-f7c80ed4e3b7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:49.195 40 INFO tempest.lib.common.rest_client [req-64093b8c-16be-47e7-81b3-f2546852ebe6 ] Request (VolumesSnapshotV3RbacTest:test_delete_snapshot): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:04:49.195 40 DEBUG tempest.lib.common.rest_client [req-64093b8c-16be-47e7-81b3-f2546852ebe6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-64093b8c-16be-47e7-81b3-f2546852ebe6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "37807e3082a247158f6d1f5307e00c1a", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338", "password_expires_at": null}, "audit_ids": ["x2NVpnDjQJmt7vYOmE7LqA"], "expires_at": "2020-11-06T19:04:49.000000Z", "issued_at": "2020-11-06T18:04:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e5f74addf2f94d10bfa96014547b3c32", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:49.236 37 INFO tempest.lib.common.rest_client [req-5f12d3e4-07e5-45f3-ae4f-51ae186ae0e8 ] Request (GroupSnaphotsV314RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=479cc71352d449a5aae47dadceb27a30&name=default 0.325s 2020-11-06 18:04:49.236 37 DEBUG tempest.lib.common.rest_client [req-5f12d3e4-07e5-45f3-ae4f-51ae186ae0e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-5f12d3e4-07e5-45f3-ae4f-51ae186ae0e8', 'date': 'Fri, 06 Nov 2020 18:04:49 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=479cc71352d449a5aae47dadceb27a30&name=default'} Body: b'{"security_groups": [{"id": "d0645554-cc3f-4e25-b5d5-313871ea9d91", "name": "default", "stateful": true, "tenant_id": "479cc71352d449a5aae47dadceb27a30", "description": "Default security group", "security_group_rules": [{"id": "07d51b53-74d3-49e5-b9c1-7bf24cbd574e", "tenant_id": "479cc71352d449a5aae47dadceb27a30", "security_group_id": "d0645554-cc3f-4e25-b5d5-313871ea9d91", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "d0645554-cc3f-4e25-b5d5-313871ea9d91", "description": null, "tags": [], "created_at": "2020-11-06T18:04:49Z", "updated_at": "2020-11-06T18:04:49Z", "revision_number": 0, "project_id": "479cc71352d449a5aae47dadceb27a30"}, {"id": "5c82c2b4-9219-4408-9dfb-366627acf8e5", "tenant_id": "479cc71352d449a5aae47dadceb27a30", "security_group_id": "d0645554-cc3f-4e25-b5d5-313871ea9d91", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:04:49Z", "updated_at": "2020-11-06T18:04:49Z", "revision_number": 0, "project_id": "479cc71352d449a5aae47dadceb27a30"}, {"id": "d369d136-bed5-4b6d-b8f2-0fe2944b493a", "tenant_id": "479cc71352d449a5aae47dadceb27a30", "security_group_id": "d0645554-cc3f-4e25-b5d5-313871ea9d91", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:04:49Z", "updated_at": "2020-11-06T18:04:49Z", "revision_number": 0, "project_id": "479cc71352d449a5aae47dadceb27a30"}, {"id": "dd6fffdc-78a4-4e12-a178-ac212b3e6af5", "tenant_id": "479cc71352d449a5aae47dadceb27a30", "security_group_id": "d0645554-cc3f-4e25-b5d5-313871ea9d91", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "d0645554-cc3f-4e25-b5d5-313871ea9d91", "description": null, "tags": [], "created_at": "2020-11-06T18:04:49Z", "updated_at": "2020-11-06T18:04:49Z", "revision_number": 0, "project_id": "479cc71352d449a5aae47dadceb27a30"}], "tags": [], "created_at": "2020-11-06T18:04:49Z", "updated_at": "2020-11-06T18:04:49Z", "revision_number": 1, "project_id": "479cc71352d449a5aae47dadceb27a30"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:49.340 40 INFO tempest.lib.common.rest_client [req-292b4d3c-e76f-4863-af6a-ef010dd3008c ] Request (VolumesSnapshotV3RbacTest:test_delete_snapshot): 200 GET http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/d94e3ceb-51cc-4797-8651-f6d7c32ea8d2 0.143s 2020-11-06 18:04:49.340 40 DEBUG tempest.lib.common.rest_client [req-292b4d3c-e76f-4863-af6a-ef010dd3008c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-292b4d3c-e76f-4863-af6a-ef010dd3008c', 'content-length': '470', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-292b4d3c-e76f-4863-af6a-ef010dd3008c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/d94e3ceb-51cc-4797-8651-f6d7c32ea8d2'} Body: b'{"snapshot": {"id": "d94e3ceb-51cc-4797-8651-f6d7c32ea8d2", "created_at": "2020-11-06T18:04:47.000000", "updated_at": "2020-11-06T18:04:49.000000", "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-1171492542", "description": null, "volume_id": "b501e219-7469-4db0-9331-084d6f1807c1", "status": "deleting", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "e5f74addf2f94d10bfa96014547b3c32", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:49.389 37 INFO tempest.lib.common.rest_client [req-bff43155-8627-47e6-bad5-3d69e67814b1 ] Request (GroupSnaphotsV314RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/d0645554-cc3f-4e25-b5d5-313871ea9d91 0.152s 2020-11-06 18:04:49.390 37 DEBUG tempest.lib.common.rest_client [req-bff43155-8627-47e6-bad5-3d69e67814b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-bff43155-8627-47e6-bad5-3d69e67814b1', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:04:49 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/d0645554-cc3f-4e25-b5d5-313871ea9d91'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:49.502 37 INFO tempest.lib.common.rest_client [req-aa6f6f61-7132-45b7-bac9-f788ce23b99c ] Request (GroupSnaphotsV314RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/479cc71352d449a5aae47dadceb27a30 0.111s 2020-11-06 18:04:49.503 37 DEBUG tempest.lib.common.rest_client [req-aa6f6f61-7132-45b7-bac9-f788ce23b99c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aa6f6f61-7132-45b7-bac9-f788ce23b99c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/479cc71352d449a5aae47dadceb27a30'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:49.518 39 INFO tempest.lib.common.rest_client [req-e40c3d23-d1a9-412d-98be-17b92995e9a1 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.270s 2020-11-06 18:04:49.518 39 DEBUG tempest.lib.common.rest_client [req-e40c3d23-d1a9-412d-98be-17b92995e9a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e40c3d23-d1a9-412d-98be-17b92995e9a1', 'x-compute-request-id': 'req-e40c3d23-d1a9-412d-98be-17b92995e9a1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:49.593 37 INFO tempest.lib.common.rest_client [req-ff04c884-0f2e-4422-99a3-ee45c0b05e8a ] Request (GroupSnaphotsV319RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:04:49.594 37 DEBUG tempest.lib.common.rest_client [req-ff04c884-0f2e-4422-99a3-ee45c0b05e8a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ff04c884-0f2e-4422-99a3-ee45c0b05e8a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["WVNcWPM_TbKNOxRtFwI0eA"], "expires_at": "2020-11-06T19:04:49.000000Z", "issued_at": "2020-11-06T18:04:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:49.640 37 INFO tempest.lib.common.rest_client [req-d9f009bb-d632-46e6-9d2c-6f8772f1e5e3 ] Request (GroupSnaphotsV319RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:04:49.640 37 DEBUG tempest.lib.common.rest_client [req-d9f009bb-d632-46e6-9d2c-6f8772f1e5e3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d9f009bb-d632-46e6-9d2c-6f8772f1e5e3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["tJm7di5SRR6uW5frCnUsjw"], "expires_at": "2020-11-06T19:04:49.000000Z", "issued_at": "2020-11-06T18:04:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:49.689 37 INFO tempest.lib.common.rest_client [req-13232199-cad1-48d6-bdcb-4a7d7d2754c4 ] Request (GroupSnaphotsV319RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.047s 2020-11-06 18:04:49.689 37 DEBUG tempest.lib.common.rest_client [req-13232199-cad1-48d6-bdcb-4a7d7d2754c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-13232199-cad1-48d6-bdcb-4a7d7d2754c4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:49.751 37 INFO tempest.lib.common.rest_client [req-8de3ad98-1edd-4ab2-bed7-81d5877bda84 ] Request (GroupSnaphotsV319RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.060s 2020-11-06 18:04:49.751 37 DEBUG tempest.lib.common.rest_client [req-8de3ad98-1edd-4ab2-bed7-81d5877bda84 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-GroupSnaphotsV319RbacTest-516084698-desc", "domain_id": "default", "name": "tempest-GroupSnaphotsV319RbacTest-516084698"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '386', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8de3ad98-1edd-4ab2-bed7-81d5877bda84', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "a65625c81d8743eebcddd70e63ff93ab", "name": "tempest-GroupSnaphotsV319RbacTest-516084698", "domain_id": "default", "description": "tempest-GroupSnaphotsV319RbacTest-516084698-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/a65625c81d8743eebcddd70e63ff93ab"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:49.858 37 INFO tempest.lib.common.rest_client [req-3866fafb-9a0f-4db6-b5b0-3621f0d3369d ] Request (GroupSnaphotsV319RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.106s 2020-11-06 18:04:49.859 37 DEBUG tempest.lib.common.rest_client [req-3866fafb-9a0f-4db6-b5b0-3621f0d3369d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-GroupSnaphotsV319RbacTest-516084698", "password": "C2+&_6@ki79mgjP", "project_id": "a65625c81d8743eebcddd70e63ff93ab", "email": "tempest-GroupSnaphotsV319RbacTest-661345868@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '404', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3866fafb-9a0f-4db6-b5b0-3621f0d3369d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "a65625c81d8743eebcddd70e63ff93ab", "email": "tempest-GroupSnaphotsV319RbacTest-661345868@example.com", "id": "fd8eb607df114b998ce22252078b28ec", "name": "tempest-GroupSnaphotsV319RbacTest-516084698", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/fd8eb607df114b998ce22252078b28ec"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:49.912 37 INFO tempest.lib.common.rest_client [req-a69d1e1a-d3af-41cd-85cf-d629aa63b309 ] Request (GroupSnaphotsV319RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.052s 2020-11-06 18:04:49.912 37 DEBUG tempest.lib.common.rest_client [req-a69d1e1a-d3af-41cd-85cf-d629aa63b309 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a69d1e1a-d3af-41cd-85cf-d629aa63b309', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:49.964 37 INFO tempest.lib.common.rest_client [req-bf221dc8-725d-4ff1-8062-48afc065c3e8 ] Request (GroupSnaphotsV319RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.051s 2020-11-06 18:04:49.965 37 DEBUG tempest.lib.common.rest_client [req-bf221dc8-725d-4ff1-8062-48afc065c3e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bf221dc8-725d-4ff1-8062-48afc065c3e8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:50.030 37 INFO tempest.lib.common.rest_client [req-aa9dda44-0302-4daa-b056-76623e3c36cb ] Request (GroupSnaphotsV319RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/a65625c81d8743eebcddd70e63ff93ab/users/fd8eb607df114b998ce22252078b28ec/roles/72a4576c553448cd941b052c1ca0cf2d 0.065s 2020-11-06 18:04:50.031 37 DEBUG tempest.lib.common.rest_client [req-aa9dda44-0302-4daa-b056-76623e3c36cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aa9dda44-0302-4daa-b056-76623e3c36cb', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a65625c81d8743eebcddd70e63ff93ab/users/fd8eb607df114b998ce22252078b28ec/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:50.031 37 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-GroupSnaphotsV319RbacTest-516084698', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'a65625c81d8743eebcddd70e63ff93ab', 'project_name': 'tempest-GroupSnaphotsV319RbacTest-516084698', 'tenant_id': 'a65625c81d8743eebcddd70e63ff93ab', 'tenant_name': 'tempest-GroupSnaphotsV319RbacTest-516084698', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'fd8eb607df114b998ce22252078b28ec'}, Network: None, Subnet: None, Router: None 2020-11-06 18:04:50.032 37 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-GroupSnaphotsV319RbacTest-516084698', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'a65625c81d8743eebcddd70e63ff93ab', 'project_name': 'tempest-GroupSnaphotsV319RbacTest-516084698', 'tenant_id': 'a65625c81d8743eebcddd70e63ff93ab', 'tenant_name': 'tempest-GroupSnaphotsV319RbacTest-516084698', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'fd8eb607df114b998ce22252078b28ec'}, Network: None, Subnet: None, Router: None 2020-11-06 18:04:50.134 37 INFO tempest.lib.common.rest_client [req-d30b8e09-f37d-4a26-af7a-a1df25306fbc ] Request (GroupSnaphotsV319RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-11-06 18:04:50.135 37 DEBUG tempest.lib.common.rest_client [req-d30b8e09-f37d-4a26-af7a-a1df25306fbc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6579', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d30b8e09-f37d-4a26-af7a-a1df25306fbc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fd8eb607df114b998ce22252078b28ec", "name": "tempest-GroupSnaphotsV319RbacTest-516084698", "password_expires_at": null}, "audit_ids": ["LfwxEJ2-RZmHPxVc8onMXA"], "expires_at": "2020-11-06T19:04:50.000000Z", "issued_at": "2020-11-06T18:04:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a65625c81d8743eebcddd70e63ff93ab", "name": "tempest-GroupSnaphotsV319RbacTest-516084698"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a65625c81d8743eebcddd70e63ff93ab", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a65625c81d8743eebcddd70e63ff93ab", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a65625c81d8743eebcddd70e63ff93ab", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a65625c81d8743eebcddd70e63ff93ab", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a65625c81d8743eebcddd70e63ff93ab", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "ht _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:50.222 37 INFO tempest.lib.common.rest_client [req-37bbbb09-a2fe-43dd-b97f-75277d2c184e ] Request (GroupSnaphotsV319RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:04:50.222 37 DEBUG tempest.lib.common.rest_client [req-37bbbb09-a2fe-43dd-b97f-75277d2c184e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-37bbbb09-a2fe-43dd-b97f-75277d2c184e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["nXxj6lTyT6Gzw6Tdq3JkfA"], "expires_at": "2020-11-06T19:04:50.000000Z", "issued_at": "2020-11-06T18:04:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:50.268 37 INFO tempest.lib.common.rest_client [req-fe073bd1-f786-4dfb-8eeb-b9a63ad47bfc ] Request (GroupSnaphotsV319RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:04:50.269 37 DEBUG tempest.lib.common.rest_client [req-fe073bd1-f786-4dfb-8eeb-b9a63ad47bfc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fe073bd1-f786-4dfb-8eeb-b9a63ad47bfc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["PmGL-e2yQEqn7-KMCtEYqQ"], "expires_at": "2020-11-06T19:04:50.000000Z", "issued_at": "2020-11-06T18:04:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:50.319 37 INFO tempest.lib.common.rest_client [req-fde7ff70-77fc-4726-9975-fc77adeb196c ] Request (GroupSnaphotsV319RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.050s 2020-11-06 18:04:50.320 37 DEBUG tempest.lib.common.rest_client [req-fde7ff70-77fc-4726-9975-fc77adeb196c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fde7ff70-77fc-4726-9975-fc77adeb196c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:50.376 37 INFO tempest.lib.common.rest_client [req-31c97140-0e05-4855-8a9e-f4fa795e5f4f ] Request (GroupSnaphotsV319RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-11-06 18:04:50.376 37 DEBUG tempest.lib.common.rest_client [req-31c97140-0e05-4855-8a9e-f4fa795e5f4f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-31c97140-0e05-4855-8a9e-f4fa795e5f4f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:50.377 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:04:50.377 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:50.379 40 INFO tempest.lib.common.rest_client [req-ba0e979e-361b-40e5-b6df-2dbf7ff86e4d ] Request (VolumesSnapshotV3RbacTest:test_delete_snapshot): 404 GET http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/d94e3ceb-51cc-4797-8651-f6d7c32ea8d2 0.031s 2020-11-06 18:04:50.379 40 DEBUG tempest.lib.common.rest_client [req-ba0e979e-361b-40e5-b6df-2dbf7ff86e4d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '111', 'content-type': 'application/json', 'x-compute-request-id': 'req-ba0e979e-361b-40e5-b6df-2dbf7ff86e4d', 'x-openstack-request-id': 'req-ba0e979e-361b-40e5-b6df-2dbf7ff86e4d', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/d94e3ceb-51cc-4797-8651-f6d7c32ea8d2'} Body: b'{"itemNotFound": {"code": 404, "message": "Snapshot d94e3ceb-51cc-4797-8651-f6d7c32ea8d2 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:50.382 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:50.385 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:get_all_snapshots, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:50.386 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:50.430 37 INFO tempest.lib.common.rest_client [req-ee7afc5e-7ea9-4fcb-b299-eae58ba7924e ] Request (GroupSnaphotsV319RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/a65625c81d8743eebcddd70e63ff93ab/users/fd8eb607df114b998ce22252078b28ec/roles 0.052s 2020-11-06 18:04:50.431 37 DEBUG tempest.lib.common.rest_client [req-ee7afc5e-7ea9-4fcb-b299-eae58ba7924e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ee7afc5e-7ea9-4fcb-b299-eae58ba7924e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a65625c81d8743eebcddd70e63ff93ab/users/fd8eb607df114b998ce22252078b28ec/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a65625c81d8743eebcddd70e63ff93ab/users/fd8eb607df114b998ce22252078b28ec/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:50.442 40 INFO tempest.lib.common.rest_client [req-baf3d95c-422b-4439-95bf-4efb236dcf19 ] Request (VolumesSnapshotV3RbacTest:test_list_snapshots): 200 GET http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles 0.055s 2020-11-06 18:04:50.443 40 DEBUG tempest.lib.common.rest_client [req-baf3d95c-422b-4439-95bf-4efb236dcf19 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-baf3d95c-422b-4439-95bf-4efb236dcf19', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:50.483 37 INFO tempest.lib.common.rest_client [req-6808912e-5f09-4b93-87b5-c54385fdfacc ] Request (GroupSnaphotsV319RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/a65625c81d8743eebcddd70e63ff93ab/users/fd8eb607df114b998ce22252078b28ec/roles/72a4576c553448cd941b052c1ca0cf2d 0.051s 2020-11-06 18:04:50.483 37 DEBUG tempest.lib.common.rest_client [req-6808912e-5f09-4b93-87b5-c54385fdfacc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6808912e-5f09-4b93-87b5-c54385fdfacc', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a65625c81d8743eebcddd70e63ff93ab/users/fd8eb607df114b998ce22252078b28ec/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:50.526 40 INFO tempest.lib.common.rest_client [req-0de54410-7a6c-436a-96d1-495131a18fa2 ] Request (VolumesSnapshotV3RbacTest:test_list_snapshots): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 18:04:50.527 40 DEBUG tempest.lib.common.rest_client [req-0de54410-7a6c-436a-96d1-495131a18fa2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0de54410-7a6c-436a-96d1-495131a18fa2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "37807e3082a247158f6d1f5307e00c1a", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338", "password_expires_at": null}, "audit_ids": ["7YIAkaujTAeCA4uTHwrSug"], "expires_at": "2020-11-06T19:04:50.000000Z", "issued_at": "2020-11-06T18:04:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e5f74addf2f94d10bfa96014547b3c32", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:50.598 37 INFO tempest.lib.common.rest_client [req-5ca1bb5c-bd07-4be0-a878-8916b77ad710 ] Request (GroupSnaphotsV319RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/a65625c81d8743eebcddd70e63ff93ab/users/fd8eb607df114b998ce22252078b28ec/roles/a629c95d64b3416fb80ae90af4f69c05 0.113s 2020-11-06 18:04:50.598 37 DEBUG tempest.lib.common.rest_client [req-5ca1bb5c-bd07-4be0-a878-8916b77ad710 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5ca1bb5c-bd07-4be0-a878-8916b77ad710', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a65625c81d8743eebcddd70e63ff93ab/users/fd8eb607df114b998ce22252078b28ec/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:50.739 39 INFO tempest.lib.common.rest_client [req-d2ddadd7-5556-42bf-a10c-8a07cac0dbb7 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.209s 2020-11-06 18:04:50.740 39 DEBUG tempest.lib.common.rest_client [req-d2ddadd7-5556-42bf-a10c-8a07cac0dbb7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d2ddadd7-5556-42bf-a10c-8a07cac0dbb7', 'x-compute-request-id': 'req-d2ddadd7-5556-42bf-a10c-8a07cac0dbb7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:50.767 40 INFO tempest.lib.common.rest_client [req-bd972f0c-a9ee-42e2-bdde-f97d9963e509 ] Request (VolumesSnapshotV3RbacTest:test_list_snapshots): 200 GET http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots?name=tempest-VolumesSnapshotV3RbacTest-Snapshot-1637289534 0.239s 2020-11-06 18:04:50.767 40 DEBUG tempest.lib.common.rest_client [req-bd972f0c-a9ee-42e2-bdde-f97d9963e509 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-bd972f0c-a9ee-42e2-bdde-f97d9963e509', 'content-length': '340', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-bd972f0c-a9ee-42e2-bdde-f97d9963e509', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots?name=tempest-VolumesSnapshotV3RbacTest-Snapshot-1637289534'} Body: b'{"snapshots": [{"id": "b8392366-94a1-43a9-b4f8-1cd6622950d6", "created_at": "2020-11-06T18:04:44.000000", "updated_at": "2020-11-06T18:04:45.000000", "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-1637289534", "description": null, "volume_id": "b501e219-7469-4db0-9331-084d6f1807c1", "status": "available", "size": 1, "metadata": {}}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:50.774 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:50.887 40 INFO tempest.lib.common.rest_client [req-49b24edc-278d-4640-8587-1a5cd17ebbbf ] Request (VolumesSnapshotV3RbacTest:test_list_snapshots): 200 GET http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles 0.112s 2020-11-06 18:04:50.888 40 DEBUG tempest.lib.common.rest_client [req-49b24edc-278d-4640-8587-1a5cd17ebbbf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-49b24edc-278d-4640-8587-1a5cd17ebbbf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:50.923 40 INFO tempest.lib.common.rest_client [req-416eea5c-e094-4b19-95fb-d3d7e06b2dbd ] Request (VolumesSnapshotV3RbacTest:test_list_snapshots): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:04:50.923 40 DEBUG tempest.lib.common.rest_client [req-416eea5c-e094-4b19-95fb-d3d7e06b2dbd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-416eea5c-e094-4b19-95fb-d3d7e06b2dbd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "37807e3082a247158f6d1f5307e00c1a", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338", "password_expires_at": null}, "audit_ids": ["O7t5b4s6TQGtKdD2hY2_VQ"], "expires_at": "2020-11-06T19:04:50.000000Z", "issued_at": "2020-11-06T18:04:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e5f74addf2f94d10bfa96014547b3c32", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:50.926 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:50.929 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:get_all_snapshots, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:50.929 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:50.979 40 INFO tempest.lib.common.rest_client [req-a48e7331-4c75-41e8-a649-ce8e0d5b847b ] Request (VolumesSnapshotV3RbacTest:test_list_snapshots_details): 200 GET http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles 0.049s 2020-11-06 18:04:50.979 40 DEBUG tempest.lib.common.rest_client [req-a48e7331-4c75-41e8-a649-ce8e0d5b847b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a48e7331-4c75-41e8-a649-ce8e0d5b847b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:51.017 40 INFO tempest.lib.common.rest_client [req-b4cee227-3696-4260-878c-f7831f354b81 ] Request (VolumesSnapshotV3RbacTest:test_list_snapshots_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:04:51.017 40 DEBUG tempest.lib.common.rest_client [req-b4cee227-3696-4260-878c-f7831f354b81 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b4cee227-3696-4260-878c-f7831f354b81', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "37807e3082a247158f6d1f5307e00c1a", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338", "password_expires_at": null}, "audit_ids": ["QoeY2tJAQU6opiaU9YCrjQ"], "expires_at": "2020-11-06T19:04:51.000000Z", "issued_at": "2020-11-06T18:04:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e5f74addf2f94d10bfa96014547b3c32", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:51.178 40 INFO tempest.lib.common.rest_client [req-c88c37c8-f5c8-4ae8-b980-b8ecffc79b35 ] Request (VolumesSnapshotV3RbacTest:test_list_snapshots_details): 200 GET http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/detail?name=tempest-VolumesSnapshotV3RbacTest-Snapshot-1637289534 0.159s 2020-11-06 18:04:51.178 40 DEBUG tempest.lib.common.rest_client [req-c88c37c8-f5c8-4ae8-b980-b8ecffc79b35 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c88c37c8-f5c8-4ae8-b980-b8ecffc79b35', 'content-length': '474', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c88c37c8-f5c8-4ae8-b980-b8ecffc79b35', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/detail?name=tempest-VolumesSnapshotV3RbacTest-Snapshot-1637289534'} Body: b'{"snapshots": [{"id": "b8392366-94a1-43a9-b4f8-1cd6622950d6", "created_at": "2020-11-06T18:04:44.000000", "updated_at": "2020-11-06T18:04:45.000000", "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-1637289534", "description": null, "volume_id": "b501e219-7469-4db0-9331-084d6f1807c1", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "e5f74addf2f94d10bfa96014547b3c32", "os-extended-snapshot-attributes:progress": "100%"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:51.184 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:51.242 40 INFO tempest.lib.common.rest_client [req-24a7ab8d-f5e7-49fb-a097-660516a196eb ] Request (VolumesSnapshotV3RbacTest:test_list_snapshots_details): 200 GET http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles 0.057s 2020-11-06 18:04:51.243 40 DEBUG tempest.lib.common.rest_client [req-24a7ab8d-f5e7-49fb-a097-660516a196eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-24a7ab8d-f5e7-49fb-a097-660516a196eb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:51.284 40 INFO tempest.lib.common.rest_client [req-b609aa3d-f745-4242-85b8-2511d0b098c8 ] Request (VolumesSnapshotV3RbacTest:test_list_snapshots_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:04:51.285 40 DEBUG tempest.lib.common.rest_client [req-b609aa3d-f745-4242-85b8-2511d0b098c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b609aa3d-f745-4242-85b8-2511d0b098c8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "37807e3082a247158f6d1f5307e00c1a", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338", "password_expires_at": null}, "audit_ids": ["SzcOXX1NQ0yzNGUYg0sJ7w"], "expires_at": "2020-11-06T19:04:51.000000Z", "issued_at": "2020-11-06T18:04:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e5f74addf2f94d10bfa96014547b3c32", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:51.288 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:51.290 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:extended_snapshot_attributes, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:51.291 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:51.352 40 INFO tempest.lib.common.rest_client [req-7948de1f-75cc-41af-a3db-5e6b33340a6f ] Request (VolumesSnapshotV3RbacTest:test_list_snapshots_details_with_extended_attributes): 200 GET http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles 0.060s 2020-11-06 18:04:51.352 40 DEBUG tempest.lib.common.rest_client [req-7948de1f-75cc-41af-a3db-5e6b33340a6f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7948de1f-75cc-41af-a3db-5e6b33340a6f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:51.394 40 INFO tempest.lib.common.rest_client [req-79095f2c-69cf-454e-9cb1-7e71143d1d8c ] Request (VolumesSnapshotV3RbacTest:test_list_snapshots_details_with_extended_attributes): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:04:51.395 40 DEBUG tempest.lib.common.rest_client [req-79095f2c-69cf-454e-9cb1-7e71143d1d8c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-79095f2c-69cf-454e-9cb1-7e71143d1d8c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "37807e3082a247158f6d1f5307e00c1a", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338", "password_expires_at": null}, "audit_ids": ["yB4pfEDZS926RjolKWLFmw"], "expires_at": "2020-11-06T19:04:51.000000Z", "issued_at": "2020-11-06T18:04:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e5f74addf2f94d10bfa96014547b3c32", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:51.497 40 INFO tempest.lib.common.rest_client [req-8ec971bb-628d-40da-8803-ca207faae5ec ] Request (VolumesSnapshotV3RbacTest:test_list_snapshots_details_with_extended_attributes): 200 GET http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/detail?name=tempest-VolumesSnapshotV3RbacTest-Snapshot-1637289534 0.101s 2020-11-06 18:04:51.498 40 DEBUG tempest.lib.common.rest_client [req-8ec971bb-628d-40da-8803-ca207faae5ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-8ec971bb-628d-40da-8803-ca207faae5ec', 'content-length': '474', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8ec971bb-628d-40da-8803-ca207faae5ec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/detail?name=tempest-VolumesSnapshotV3RbacTest-Snapshot-1637289534'} Body: b'{"snapshots": [{"id": "b8392366-94a1-43a9-b4f8-1cd6622950d6", "created_at": "2020-11-06T18:04:44.000000", "updated_at": "2020-11-06T18:04:45.000000", "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-1637289534", "description": null, "volume_id": "b501e219-7469-4db0-9331-084d6f1807c1", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "e5f74addf2f94d10bfa96014547b3c32", "os-extended-snapshot-attributes:progress": "100%"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:51.505 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:51.559 40 INFO tempest.lib.common.rest_client [req-0def7faa-48f8-4612-8d2c-5d1257292002 ] Request (VolumesSnapshotV3RbacTest:test_list_snapshots_details_with_extended_attributes): 200 GET http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles 0.054s 2020-11-06 18:04:51.560 40 DEBUG tempest.lib.common.rest_client [req-0def7faa-48f8-4612-8d2c-5d1257292002 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0def7faa-48f8-4612-8d2c-5d1257292002', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:51.597 40 INFO tempest.lib.common.rest_client [req-6bc40ec8-4524-417d-b373-26d5171dc1d1 ] Request (VolumesSnapshotV3RbacTest:test_list_snapshots_details_with_extended_attributes): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:04:51.598 40 DEBUG tempest.lib.common.rest_client [req-6bc40ec8-4524-417d-b373-26d5171dc1d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6bc40ec8-4524-417d-b373-26d5171dc1d1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "37807e3082a247158f6d1f5307e00c1a", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338", "password_expires_at": null}, "audit_ids": ["8tlAoGFQQnGhDhmeypjZLQ"], "expires_at": "2020-11-06T19:04:51.000000Z", "issued_at": "2020-11-06T18:04:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e5f74addf2f94d10bfa96014547b3c32", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:51.600 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:51.608 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:get_snapshot, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:51.609 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:51.662 40 INFO tempest.lib.common.rest_client [req-4a45941b-96a7-4c9b-8427-8bc285fec3be ] Request (VolumesSnapshotV3RbacTest:test_show_snapshot): 200 GET http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles 0.053s 2020-11-06 18:04:51.663 40 DEBUG tempest.lib.common.rest_client [req-4a45941b-96a7-4c9b-8427-8bc285fec3be ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4a45941b-96a7-4c9b-8427-8bc285fec3be', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:51.704 40 INFO tempest.lib.common.rest_client [req-6e8d0f28-8e2f-49df-9133-6b7f635d56ca ] Request (VolumesSnapshotV3RbacTest:test_show_snapshot): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:04:51.704 40 DEBUG tempest.lib.common.rest_client [req-6e8d0f28-8e2f-49df-9133-6b7f635d56ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6e8d0f28-8e2f-49df-9133-6b7f635d56ca', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "37807e3082a247158f6d1f5307e00c1a", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338", "password_expires_at": null}, "audit_ids": ["2d_e8n2GTHevT_8CC3c79g"], "expires_at": "2020-11-06T19:04:51.000000Z", "issued_at": "2020-11-06T18:04:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e5f74addf2f94d10bfa96014547b3c32", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:51.705 37 INFO tempest.lib.common.rest_client [req-a4cb4693-fde4-4317-92f2-1dfecce45c5a ] Request (GroupSnaphotsV319RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.104s 2020-11-06 18:04:51.705 37 DEBUG tempest.lib.common.rest_client [req-a4cb4693-fde4-4317-92f2-1dfecce45c5a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a4cb4693-fde4-4317-92f2-1dfecce45c5a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fd8eb607df114b998ce22252078b28ec", "name": "tempest-GroupSnaphotsV319RbacTest-516084698", "password_expires_at": null}, "audit_ids": ["kkZV6ZElScmXbF1cBYzDSg"], "expires_at": "2020-11-06T19:04:51.000000Z", "issued_at": "2020-11-06T18:04:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a65625c81d8743eebcddd70e63ff93ab", "name": "tempest-GroupSnaphotsV319RbacTest-516084698"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a65625c81d8743eebcddd70e63ff93ab", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a65625c81d8743eebcddd70e63ff93ab", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a65625c81d8743eebcddd70e63ff93ab", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a65625c81d8743eebcddd70e63ff93ab", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a65625c81d8743eebcddd70e63ff93ab", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:51.806 40 INFO tempest.lib.common.rest_client [req-f20a8ef0-2312-4708-b3ae-9dd7ff54e0cc ] Request (VolumesSnapshotV3RbacTest:test_show_snapshot): 200 GET http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/b8392366-94a1-43a9-b4f8-1cd6622950d6 0.100s 2020-11-06 18:04:51.807 40 DEBUG tempest.lib.common.rest_client [req-f20a8ef0-2312-4708-b3ae-9dd7ff54e0cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-f20a8ef0-2312-4708-b3ae-9dd7ff54e0cc', 'content-length': '471', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f20a8ef0-2312-4708-b3ae-9dd7ff54e0cc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/b8392366-94a1-43a9-b4f8-1cd6622950d6'} Body: b'{"snapshot": {"id": "b8392366-94a1-43a9-b4f8-1cd6622950d6", "created_at": "2020-11-06T18:04:44.000000", "updated_at": "2020-11-06T18:04:45.000000", "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-1637289534", "description": null, "volume_id": "b501e219-7469-4db0-9331-084d6f1807c1", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "e5f74addf2f94d10bfa96014547b3c32", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:51.813 37 INFO tempest.lib.common.rest_client [req-237c5aea-8b60-4234-8c48-bc2a628a1704 ] Request (GroupSnaphotsV319RbacTest:setUp): 200 POST http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/types 0.105s 2020-11-06 18:04:51.813 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:51.814 37 DEBUG tempest.lib.common.rest_client [req-237c5aea-8b60-4234-8c48-bc2a628a1704 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-GroupSnaphotsV319RbacTest-volume-type-199598522"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-237c5aea-8b60-4234-8c48-bc2a628a1704', 'content-length': '230', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-237c5aea-8b60-4234-8c48-bc2a628a1704', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/types'} Body: b'{"volume_type": {"id": "add7214c-e9b0-4b46-abd0-419a6c5d155e", "name": "tempest-GroupSnaphotsV319RbacTest-volume-type-199598522", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:51.855 37 INFO tempest.lib.common.rest_client [req-ffce80b1-a18a-4ef2-bdcb-6132ac6afd27 ] Request (GroupSnaphotsV319RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/group_types 0.036s 2020-11-06 18:04:51.856 37 DEBUG tempest.lib.common.rest_client [req-ffce80b1-a18a-4ef2-bdcb-6132ac6afd27 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupSnaphotsV319RbacTest-group-type-263441291"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ffce80b1-a18a-4ef2-bdcb-6132ac6afd27', 'content-length': '187', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ffce80b1-a18a-4ef2-bdcb-6132ac6afd27', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/group_types'} Body: b'{"group_type": {"id": "56e36eca-92ef-4edb-bb6d-69c3a4d1ff1b", "name": "tempest-GroupSnaphotsV319RbacTest-group-type-263441291", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:51.868 40 INFO tempest.lib.common.rest_client [req-e64ac3ea-2003-459c-8a7c-9f3a53b41c7a ] Request (VolumesSnapshotV3RbacTest:test_show_snapshot): 200 GET http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles 0.054s 2020-11-06 18:04:51.871 40 DEBUG tempest.lib.common.rest_client [req-e64ac3ea-2003-459c-8a7c-9f3a53b41c7a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e64ac3ea-2003-459c-8a7c-9f3a53b41c7a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:51.903 40 INFO tempest.lib.common.rest_client [req-dd6878b8-8c75-45cd-9262-531d1bcb583b ] Request (VolumesSnapshotV3RbacTest:test_show_snapshot): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:04:51.904 40 DEBUG tempest.lib.common.rest_client [req-dd6878b8-8c75-45cd-9262-531d1bcb583b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dd6878b8-8c75-45cd-9262-531d1bcb583b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "37807e3082a247158f6d1f5307e00c1a", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338", "password_expires_at": null}, "audit_ids": ["knXQOcXnRRewSjtf7izReA"], "expires_at": "2020-11-06T19:04:51.000000Z", "issued_at": "2020-11-06T18:04:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e5f74addf2f94d10bfa96014547b3c32", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:51.907 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:51.910 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:extended_snapshot_attributes, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:51.910 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:51.957 40 INFO tempest.lib.common.rest_client [req-4b904ad5-0dda-4de9-b85a-402092a91dc5 ] Request (VolumesSnapshotV3RbacTest:test_show_snapshot_with_extended_attributes): 200 GET http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles 0.046s 2020-11-06 18:04:51.958 40 DEBUG tempest.lib.common.rest_client [req-4b904ad5-0dda-4de9-b85a-402092a91dc5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4b904ad5-0dda-4de9-b85a-402092a91dc5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:51.989 39 INFO tempest.lib.common.rest_client [req-d0bbe4c1-a506-4511-a72c-2fac11f815bd ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.235s 2020-11-06 18:04:51.989 39 DEBUG tempest.lib.common.rest_client [req-d0bbe4c1-a506-4511-a72c-2fac11f815bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d0bbe4c1-a506-4511-a72c-2fac11f815bd', 'x-compute-request-id': 'req-d0bbe4c1-a506-4511-a72c-2fac11f815bd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:51.992 37 INFO tempest.lib.common.rest_client [req-d2bc4695-3045-4421-ac66-f6562832daf7 ] Request (GroupSnaphotsV319RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/groups 0.132s 2020-11-06 18:04:51.992 37 DEBUG tempest.lib.common.rest_client [req-d2bc4695-3045-4421-ac66-f6562832daf7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: {"group": {"group_type": "56e36eca-92ef-4edb-bb6d-69c3a4d1ff1b", "volume_types": ["add7214c-e9b0-4b46-abd0-419a6c5d155e"], "name": "tempest-GroupSnaphotsV319RbacTest-Group-749807834"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d2bc4695-3045-4421-ac66-f6562832daf7', 'content-length': '118', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d2bc4695-3045-4421-ac66-f6562832daf7', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/groups'} Body: b'{"group": {"id": "9e58e93c-467b-479a-86b8-b0561043fa4f", "name": "tempest-GroupSnaphotsV319RbacTest-Group-749807834"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:51.996 40 INFO tempest.lib.common.rest_client [req-aacf139f-22a8-496e-b0e9-594a18cdf201 ] Request (VolumesSnapshotV3RbacTest:test_show_snapshot_with_extended_attributes): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:04:51.997 40 DEBUG tempest.lib.common.rest_client [req-aacf139f-22a8-496e-b0e9-594a18cdf201 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aacf139f-22a8-496e-b0e9-594a18cdf201', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "37807e3082a247158f6d1f5307e00c1a", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338", "password_expires_at": null}, "audit_ids": ["iOv6BZ9xRXykrJ6Gb7m3mw"], "expires_at": "2020-11-06T19:04:51.000000Z", "issued_at": "2020-11-06T18:04:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e5f74addf2f94d10bfa96014547b3c32", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:52.032 37 INFO tempest.lib.common.rest_client [req-3239f857-1763-497b-9104-bc536880c780 ] Request (GroupSnaphotsV319RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/groups/9e58e93c-467b-479a-86b8-b0561043fa4f 0.036s 2020-11-06 18:04:52.033 37 DEBUG tempest.lib.common.rest_client [req-3239f857-1763-497b-9104-bc536880c780 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-3239f857-1763-497b-9104-bc536880c780', 'content-length': '398', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3239f857-1763-497b-9104-bc536880c780', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/groups/9e58e93c-467b-479a-86b8-b0561043fa4f'} Body: b'{"group": {"id": "9e58e93c-467b-479a-86b8-b0561043fa4f", "status": "creating", "availability_zone": "nova", "created_at": "2020-11-06T18:04:52.000000", "name": "tempest-GroupSnaphotsV319RbacTest-Group-749807834", "description": null, "group_type": "56e36eca-92ef-4edb-bb6d-69c3a4d1ff1b", "volume_types": ["add7214c-e9b0-4b46-abd0-419a6c5d155e"], "group_snapshot_id": null, "source_group_id": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:52.085 40 INFO tempest.lib.common.rest_client [req-aba87ceb-fe23-44c2-8f26-4f46fc801120 ] Request (VolumesSnapshotV3RbacTest:test_show_snapshot_with_extended_attributes): 200 GET http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/b8392366-94a1-43a9-b4f8-1cd6622950d6 0.087s 2020-11-06 18:04:52.086 40 DEBUG tempest.lib.common.rest_client [req-aba87ceb-fe23-44c2-8f26-4f46fc801120 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-aba87ceb-fe23-44c2-8f26-4f46fc801120', 'content-length': '471', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-aba87ceb-fe23-44c2-8f26-4f46fc801120', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/b8392366-94a1-43a9-b4f8-1cd6622950d6'} Body: b'{"snapshot": {"id": "b8392366-94a1-43a9-b4f8-1cd6622950d6", "created_at": "2020-11-06T18:04:44.000000", "updated_at": "2020-11-06T18:04:45.000000", "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-1637289534", "description": null, "volume_id": "b501e219-7469-4db0-9331-084d6f1807c1", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "e5f74addf2f94d10bfa96014547b3c32", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:52.092 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:52.157 40 INFO tempest.lib.common.rest_client [req-a71ce5a6-01d8-48b3-b1ad-157a2c8ffd71 ] Request (VolumesSnapshotV3RbacTest:test_show_snapshot_with_extended_attributes): 200 GET http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles 0.064s 2020-11-06 18:04:52.158 40 DEBUG tempest.lib.common.rest_client [req-a71ce5a6-01d8-48b3-b1ad-157a2c8ffd71 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a71ce5a6-01d8-48b3-b1ad-157a2c8ffd71', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:52.197 40 INFO tempest.lib.common.rest_client [req-7dd1a96b-78f6-41f2-8f76-8489cda4d164 ] Request (VolumesSnapshotV3RbacTest:test_show_snapshot_with_extended_attributes): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:04:52.198 40 DEBUG tempest.lib.common.rest_client [req-7dd1a96b-78f6-41f2-8f76-8489cda4d164 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7dd1a96b-78f6-41f2-8f76-8489cda4d164', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "37807e3082a247158f6d1f5307e00c1a", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338", "password_expires_at": null}, "audit_ids": ["lGBKd8HoTraz5PbhddT-qA"], "expires_at": "2020-11-06T19:04:52.000000Z", "issued_at": "2020-11-06T18:04:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e5f74addf2f94d10bfa96014547b3c32", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:52.201 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:52.204 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:update_snapshot, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:52.205 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:52.256 40 INFO tempest.lib.common.rest_client [req-174a99e9-b632-4bc6-a93b-9d43517b174b ] Request (VolumesSnapshotV3RbacTest:test_update_snapshot): 200 GET http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles 0.051s 2020-11-06 18:04:52.257 40 DEBUG tempest.lib.common.rest_client [req-174a99e9-b632-4bc6-a93b-9d43517b174b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-174a99e9-b632-4bc6-a93b-9d43517b174b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:52.296 40 INFO tempest.lib.common.rest_client [req-036ef6b7-0a5d-452b-b16a-84dcb15dc553 ] Request (VolumesSnapshotV3RbacTest:test_update_snapshot): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:04:52.297 40 DEBUG tempest.lib.common.rest_client [req-036ef6b7-0a5d-452b-b16a-84dcb15dc553 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-036ef6b7-0a5d-452b-b16a-84dcb15dc553', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "37807e3082a247158f6d1f5307e00c1a", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338", "password_expires_at": null}, "audit_ids": ["uawiy8IiSuGvylOiyjLzmQ"], "expires_at": "2020-11-06T19:04:52.000000Z", "issued_at": "2020-11-06T18:04:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e5f74addf2f94d10bfa96014547b3c32", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:52.470 40 INFO tempest.lib.common.rest_client [req-7b03e8d8-c2fa-48a4-afa4-19ba4d410e34 ] Request (VolumesSnapshotV3RbacTest:test_update_snapshot): 200 PUT http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/b8392366-94a1-43a9-b4f8-1cd6622950d6 0.172s 2020-11-06 18:04:52.470 40 DEBUG tempest.lib.common.rest_client [req-7b03e8d8-c2fa-48a4-afa4-19ba4d410e34 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"snapshot": {"description": "This is the new description of snapshot."}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-7b03e8d8-c2fa-48a4-afa4-19ba4d410e34', 'content-length': '375', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7b03e8d8-c2fa-48a4-afa4-19ba4d410e34', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/b8392366-94a1-43a9-b4f8-1cd6622950d6'} Body: b'{"snapshot": {"id": "b8392366-94a1-43a9-b4f8-1cd6622950d6", "created_at": "2020-11-06T18:04:44.000000", "updated_at": "2020-11-06T18:04:45.000000", "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-1637289534", "description": "This is the new description of snapshot.", "volume_id": "b501e219-7469-4db0-9331-084d6f1807c1", "status": "available", "size": 1, "metadata": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:52.475 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:52.531 40 INFO tempest.lib.common.rest_client [req-671e86a9-85c7-4666-8ba8-e4e7ae6cc7b4 ] Request (VolumesSnapshotV3RbacTest:test_update_snapshot): 200 GET http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles 0.055s 2020-11-06 18:04:52.531 40 DEBUG tempest.lib.common.rest_client [req-671e86a9-85c7-4666-8ba8-e4e7ae6cc7b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-671e86a9-85c7-4666-8ba8-e4e7ae6cc7b4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32/users/37807e3082a247158f6d1f5307e00c1a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:52.564 40 INFO tempest.lib.common.rest_client [req-4f43e622-d6f5-4780-b341-6cc0e25b2467 ] Request (VolumesSnapshotV3RbacTest:test_update_snapshot): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:04:52.565 40 DEBUG tempest.lib.common.rest_client [req-4f43e622-d6f5-4780-b341-6cc0e25b2467 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4f43e622-d6f5-4780-b341-6cc0e25b2467', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "37807e3082a247158f6d1f5307e00c1a", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338", "password_expires_at": null}, "audit_ids": ["pP3m8_xPRgK3vIJ0ijRV7w"], "expires_at": "2020-11-06T19:04:52.000000Z", "issued_at": "2020-11-06T18:04:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e5f74addf2f94d10bfa96014547b3c32", "name": "tempest-VolumesSnapshotV3RbacTest-1458153338"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e5f74addf2f94d10bfa96014547b3c32", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:52.662 40 INFO tempest.lib.common.rest_client [req-61f1a95f-8c74-4b24-83d5-3bd71b9c98d1 ] Request (VolumesSnapshotV3RbacTest:test_update_snapshot): 200 GET http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/b8392366-94a1-43a9-b4f8-1cd6622950d6 0.096s 2020-11-06 18:04:52.663 40 DEBUG tempest.lib.common.rest_client [req-61f1a95f-8c74-4b24-83d5-3bd71b9c98d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-61f1a95f-8c74-4b24-83d5-3bd71b9c98d1', 'content-length': '509', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-61f1a95f-8c74-4b24-83d5-3bd71b9c98d1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/b8392366-94a1-43a9-b4f8-1cd6622950d6'} Body: b'{"snapshot": {"id": "b8392366-94a1-43a9-b4f8-1cd6622950d6", "created_at": "2020-11-06T18:04:44.000000", "updated_at": "2020-11-06T18:04:52.000000", "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-1637289534", "description": "This is the new description of snapshot.", "volume_id": "b501e219-7469-4db0-9331-084d6f1807c1", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "e5f74addf2f94d10bfa96014547b3c32", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:52.668 40 INFO tempest.common.waiters [-] snapshot b8392366-94a1-43a9-b4f8-1cd6622950d6 reached available after waiting for 0.668615 seconds 2020-11-06 18:04:52.705 40 INFO tempest.lib.common.rest_client [req-c0bee527-5a0c-48a2-9712-617a59f2871a ] Request (VolumesSnapshotV3RbacTest:tearDownClass): 404 DELETE http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/d94e3ceb-51cc-4797-8651-f6d7c32ea8d2 0.025s 2020-11-06 18:04:52.705 40 DEBUG tempest.lib.common.rest_client [req-c0bee527-5a0c-48a2-9712-617a59f2871a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '111', 'content-type': 'application/json', 'x-compute-request-id': 'req-c0bee527-5a0c-48a2-9712-617a59f2871a', 'x-openstack-request-id': 'req-c0bee527-5a0c-48a2-9712-617a59f2871a', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/d94e3ceb-51cc-4797-8651-f6d7c32ea8d2'} Body: b'{"itemNotFound": {"code": 404, "message": "Snapshot d94e3ceb-51cc-4797-8651-f6d7c32ea8d2 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:52.780 40 INFO tempest.lib.common.rest_client [req-ae24f40f-1543-4299-bead-d3d889f66f28 ] Request (VolumesSnapshotV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/7512a7db-f86f-49a6-a813-7081b0738a52 0.074s 2020-11-06 18:04:52.781 40 DEBUG tempest.lib.common.rest_client [req-ae24f40f-1543-4299-bead-d3d889f66f28 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ae24f40f-1543-4299-bead-d3d889f66f28', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/7512a7db-f86f-49a6-a813-7081b0738a52'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:52.812 40 INFO tempest.lib.common.rest_client [req-59c568b5-ac6c-4783-b194-7309d66d120b ] Request (VolumesSnapshotV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/7512a7db-f86f-49a6-a813-7081b0738a52 0.030s 2020-11-06 18:04:52.812 40 DEBUG tempest.lib.common.rest_client [req-59c568b5-ac6c-4783-b194-7309d66d120b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-59c568b5-ac6c-4783-b194-7309d66d120b', 'content-length': '469', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-59c568b5-ac6c-4783-b194-7309d66d120b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/7512a7db-f86f-49a6-a813-7081b0738a52'} Body: b'{"snapshot": {"id": "7512a7db-f86f-49a6-a813-7081b0738a52", "created_at": "2020-11-06T18:04:46.000000", "updated_at": "2020-11-06T18:04:53.000000", "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-829743124", "description": null, "volume_id": "b501e219-7469-4db0-9331-084d6f1807c1", "status": "deleting", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "e5f74addf2f94d10bfa96014547b3c32", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:53.077 37 INFO tempest.lib.common.rest_client [req-8c2b882c-ff9f-44fa-a986-9ee2367f981a ] Request (GroupSnaphotsV319RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/groups/9e58e93c-467b-479a-86b8-b0561043fa4f 0.037s 2020-11-06 18:04:53.078 37 DEBUG tempest.lib.common.rest_client [req-8c2b882c-ff9f-44fa-a986-9ee2367f981a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-8c2b882c-ff9f-44fa-a986-9ee2367f981a', 'content-length': '399', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8c2b882c-ff9f-44fa-a986-9ee2367f981a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/groups/9e58e93c-467b-479a-86b8-b0561043fa4f'} Body: b'{"group": {"id": "9e58e93c-467b-479a-86b8-b0561043fa4f", "status": "available", "availability_zone": "nova", "created_at": "2020-11-06T18:04:52.000000", "name": "tempest-GroupSnaphotsV319RbacTest-Group-749807834", "description": null, "group_type": "56e36eca-92ef-4edb-bb6d-69c3a4d1ff1b", "volume_types": ["add7214c-e9b0-4b46-abd0-419a6c5d155e"], "group_snapshot_id": null, "source_group_id": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:53.084 37 INFO tempest.common.waiters [-] group 9e58e93c-467b-479a-86b8-b0561043fa4f reached available after waiting for 1.084155 seconds 2020-11-06 18:04:53.350 39 INFO tempest.lib.common.rest_client [req-0bf09517-20a4-4173-9370-2e074064488a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.344s 2020-11-06 18:04:53.351 39 DEBUG tempest.lib.common.rest_client [req-0bf09517-20a4-4173-9370-2e074064488a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0bf09517-20a4-4173-9370-2e074064488a', 'x-compute-request-id': 'req-0bf09517-20a4-4173-9370-2e074064488a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:53.408 37 INFO tempest.lib.common.rest_client [req-eba946f6-1284-494a-b61e-0546c1173062 ] Request (GroupSnaphotsV319RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/volumes 0.323s 2020-11-06 18:04:53.409 37 DEBUG tempest.lib.common.rest_client [req-eba946f6-1284-494a-b61e-0546c1173062 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: {"volume": {"volume_type": "add7214c-e9b0-4b46-abd0-419a6c5d155e", "group_id": "9e58e93c-467b-479a-86b8-b0561043fa4f", "size": 1, "name": "tempest-GroupSnaphotsV319RbacTest-Volume-385527805"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-eba946f6-1284-494a-b61e-0546c1173062', 'content-length': '948', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-eba946f6-1284-494a-b61e-0546c1173062', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/volumes'} Body: b'{"volume": {"id": "12cfe795-871f-404c-afc8-55790f8ceebb", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:53.000000", "updated_at": null, "name": "tempest-GroupSnaphotsV319RbacTest-Volume-385527805", "description": null, "volume_type": "tempest-GroupSnaphotsV319RbacTest-volume-type-199598522", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/volumes/12cfe795-871f-404c-afc8-55790f8ceebb"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/a65625c81d8743eebcddd70e63ff93ab/volumes/12cfe795-871f-404c-afc8-55790f8ceebb"}], "user_id": "fd8eb607df114b998ce22252078b28ec", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "9e58e93c-467b-479a-86b8-b0561043fa4f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:53.503 37 INFO tempest.lib.common.rest_client [req-de615862-6f2d-43ec-887d-97971a6ac6d3 ] Request (GroupSnaphotsV319RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/volumes/12cfe795-871f-404c-afc8-55790f8ceebb 0.082s 2020-11-06 18:04:53.504 37 DEBUG tempest.lib.common.rest_client [req-de615862-6f2d-43ec-887d-97971a6ac6d3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-de615862-6f2d-43ec-887d-97971a6ac6d3', 'content-length': '1170', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-de615862-6f2d-43ec-887d-97971a6ac6d3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/volumes/12cfe795-871f-404c-afc8-55790f8ceebb'} Body: b'{"volume": {"id": "12cfe795-871f-404c-afc8-55790f8ceebb", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:53.000000", "updated_at": "2020-11-06T18:04:53.000000", "name": "tempest-GroupSnaphotsV319RbacTest-Volume-385527805", "description": null, "volume_type": "tempest-GroupSnaphotsV319RbacTest-volume-type-199598522", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/volumes/12cfe795-871f-404c-afc8-55790f8ceebb"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/a65625c81d8743eebcddd70e63ff93ab/volumes/12cfe795-871f-404c-afc8-55790f8ceebb"}], "user_id": "fd8eb607df114b998ce22252078b28ec", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "9e58e93c-467b-479a-86b8-b0561043fa4f", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "a65625c81d8743eebcddd70e63ff93ab"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:53.846 40 INFO tempest.lib.common.rest_client [req-b7ee7734-210e-46f8-8849-d8f3fb023373 ] Request (VolumesSnapshotV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/7512a7db-f86f-49a6-a813-7081b0738a52 0.029s 2020-11-06 18:04:53.847 40 DEBUG tempest.lib.common.rest_client [req-b7ee7734-210e-46f8-8849-d8f3fb023373 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '111', 'content-type': 'application/json', 'x-compute-request-id': 'req-b7ee7734-210e-46f8-8849-d8f3fb023373', 'x-openstack-request-id': 'req-b7ee7734-210e-46f8-8849-d8f3fb023373', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/7512a7db-f86f-49a6-a813-7081b0738a52'} Body: b'{"itemNotFound": {"code": 404, "message": "Snapshot 7512a7db-f86f-49a6-a813-7081b0738a52 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:53.919 40 INFO tempest.lib.common.rest_client [req-d3138db7-69f6-4672-95ea-04e3d5eae5a6 ] Request (VolumesSnapshotV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/b8392366-94a1-43a9-b4f8-1cd6622950d6 0.071s 2020-11-06 18:04:53.920 40 DEBUG tempest.lib.common.rest_client [req-d3138db7-69f6-4672-95ea-04e3d5eae5a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d3138db7-69f6-4672-95ea-04e3d5eae5a6', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/b8392366-94a1-43a9-b4f8-1cd6622950d6'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:53.949 40 INFO tempest.lib.common.rest_client [req-1b22155b-4435-4468-bd56-8a6015bb09e5 ] Request (VolumesSnapshotV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/b8392366-94a1-43a9-b4f8-1cd6622950d6 0.028s 2020-11-06 18:04:53.950 40 DEBUG tempest.lib.common.rest_client [req-1b22155b-4435-4468-bd56-8a6015bb09e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-1b22155b-4435-4468-bd56-8a6015bb09e5', 'content-length': '508', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1b22155b-4435-4468-bd56-8a6015bb09e5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/b8392366-94a1-43a9-b4f8-1cd6622950d6'} Body: b'{"snapshot": {"id": "b8392366-94a1-43a9-b4f8-1cd6622950d6", "created_at": "2020-11-06T18:04:44.000000", "updated_at": "2020-11-06T18:04:54.000000", "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-1637289534", "description": "This is the new description of snapshot.", "volume_id": "b501e219-7469-4db0-9331-084d6f1807c1", "status": "deleting", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "e5f74addf2f94d10bfa96014547b3c32", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:54.603 37 INFO tempest.lib.common.rest_client [req-01037d27-9f25-4545-a4b1-758d11729ae3 ] Request (GroupSnaphotsV319RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/volumes/12cfe795-871f-404c-afc8-55790f8ceebb 0.088s 2020-11-06 18:04:54.603 37 DEBUG tempest.lib.common.rest_client [req-01037d27-9f25-4545-a4b1-758d11729ae3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-01037d27-9f25-4545-a4b1-758d11729ae3', 'content-length': '1171', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-01037d27-9f25-4545-a4b1-758d11729ae3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/volumes/12cfe795-871f-404c-afc8-55790f8ceebb'} Body: b'{"volume": {"id": "12cfe795-871f-404c-afc8-55790f8ceebb", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:53.000000", "updated_at": "2020-11-06T18:04:54.000000", "name": "tempest-GroupSnaphotsV319RbacTest-Volume-385527805", "description": null, "volume_type": "tempest-GroupSnaphotsV319RbacTest-volume-type-199598522", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/volumes/12cfe795-871f-404c-afc8-55790f8ceebb"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/a65625c81d8743eebcddd70e63ff93ab/volumes/12cfe795-871f-404c-afc8-55790f8ceebb"}], "user_id": "fd8eb607df114b998ce22252078b28ec", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "9e58e93c-467b-479a-86b8-b0561043fa4f", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "a65625c81d8743eebcddd70e63ff93ab"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:54.614 37 INFO tempest.common.waiters [-] volume 12cfe795-871f-404c-afc8-55790f8ceebb reached available after waiting for 1.614017 seconds 2020-11-06 18:04:54.614 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:04:54.616 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:reset_group_snapshot_status, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:04:54.636 39 INFO tempest.lib.common.rest_client [req-27625970-7aac-45f8-b5d6-975d94c632ef ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.269s 2020-11-06 18:04:54.637 39 DEBUG tempest.lib.common.rest_client [req-27625970-7aac-45f8-b5d6-975d94c632ef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-27625970-7aac-45f8-b5d6-975d94c632ef', 'x-compute-request-id': 'req-27625970-7aac-45f8-b5d6-975d94c632ef', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:54.773 37 INFO tempest.lib.common.rest_client [req-03b56a4c-1e38-4f8b-850c-1e54d72d47cc ] Request (GroupSnaphotsV319RbacTest:test_reset_group_snapshot_rbac): 202 POST http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/group_snapshots 0.156s 2020-11-06 18:04:54.774 37 DEBUG tempest.lib.common.rest_client [req-03b56a4c-1e38-4f8b-850c-1e54d72d47cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: {"group_snapshot": {"group_id": "9e58e93c-467b-479a-86b8-b0561043fa4f", "name": "tempest-group_snapshot-1727360094"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-03b56a4c-1e38-4f8b-850c-1e54d72d47cc', 'content-length': '168', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-03b56a4c-1e38-4f8b-850c-1e54d72d47cc', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/group_snapshots'} Body: b'{"group_snapshot": {"id": "af05f44c-cdf0-450c-9d29-2d91e3c1c378", "name": "tempest-group_snapshot-1727360094", "group_type_id": "56e36eca-92ef-4edb-bb6d-69c3a4d1ff1b"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:54.800 37 INFO tempest.lib.common.rest_client [req-55cab2f5-df25-4bb6-9ba0-daf5c7f4f9fc ] Request (GroupSnaphotsV319RbacTest:test_reset_group_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/group_snapshots/af05f44c-cdf0-450c-9d29-2d91e3c1c378 0.023s 2020-11-06 18:04:54.801 37 DEBUG tempest.lib.common.rest_client [req-55cab2f5-df25-4bb6-9ba0-daf5c7f4f9fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-55cab2f5-df25-4bb6-9ba0-daf5c7f4f9fc', 'content-length': '307', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-55cab2f5-df25-4bb6-9ba0-daf5c7f4f9fc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/group_snapshots/af05f44c-cdf0-450c-9d29-2d91e3c1c378'} Body: b'{"group_snapshot": {"id": "af05f44c-cdf0-450c-9d29-2d91e3c1c378", "group_id": "9e58e93c-467b-479a-86b8-b0561043fa4f", "group_type_id": "56e36eca-92ef-4edb-bb6d-69c3a4d1ff1b", "status": "creating", "created_at": "2020-11-06T18:04:55.000000", "name": "tempest-group_snapshot-1727360094", "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:54.985 40 INFO tempest.lib.common.rest_client [req-df32f88b-0260-475d-88f7-b746c6b3bc96 ] Request (VolumesSnapshotV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/b8392366-94a1-43a9-b4f8-1cd6622950d6 0.028s 2020-11-06 18:04:54.986 40 DEBUG tempest.lib.common.rest_client [req-df32f88b-0260-475d-88f7-b746c6b3bc96 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-df32f88b-0260-475d-88f7-b746c6b3bc96', 'content-length': '508', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-df32f88b-0260-475d-88f7-b746c6b3bc96', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/b8392366-94a1-43a9-b4f8-1cd6622950d6'} Body: b'{"snapshot": {"id": "b8392366-94a1-43a9-b4f8-1cd6622950d6", "created_at": "2020-11-06T18:04:44.000000", "updated_at": "2020-11-06T18:04:54.000000", "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-1637289534", "description": "This is the new description of snapshot.", "volume_id": "b501e219-7469-4db0-9331-084d6f1807c1", "status": "deleting", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "e5f74addf2f94d10bfa96014547b3c32", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:55.829 37 INFO tempest.lib.common.rest_client [req-b01f800f-f9b0-4936-8b68-50fb3896c384 ] Request (GroupSnaphotsV319RbacTest:test_reset_group_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/group_snapshots/af05f44c-cdf0-450c-9d29-2d91e3c1c378 0.023s 2020-11-06 18:04:55.829 37 DEBUG tempest.lib.common.rest_client [req-b01f800f-f9b0-4936-8b68-50fb3896c384 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-b01f800f-f9b0-4936-8b68-50fb3896c384', 'content-length': '308', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b01f800f-f9b0-4936-8b68-50fb3896c384', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/group_snapshots/af05f44c-cdf0-450c-9d29-2d91e3c1c378'} Body: b'{"group_snapshot": {"id": "af05f44c-cdf0-450c-9d29-2d91e3c1c378", "group_id": "9e58e93c-467b-479a-86b8-b0561043fa4f", "group_type_id": "56e36eca-92ef-4edb-bb6d-69c3a4d1ff1b", "status": "available", "created_at": "2020-11-06T18:04:55.000000", "name": "tempest-group_snapshot-1727360094", "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:55.833 37 INFO tempest.common.waiters [-] group_snapshot af05f44c-cdf0-450c-9d29-2d91e3c1c378 reached available after waiting for 1.833772 seconds 2020-11-06 18:04:55.838 39 INFO tempest.lib.common.rest_client [req-8f242dc0-303e-4b80-9a3e-13bf026e763b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.188s 2020-11-06 18:04:55.839 39 DEBUG tempest.lib.common.rest_client [req-8f242dc0-303e-4b80-9a3e-13bf026e763b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8f242dc0-303e-4b80-9a3e-13bf026e763b', 'x-compute-request-id': 'req-8f242dc0-303e-4b80-9a3e-13bf026e763b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:55.860 37 INFO tempest.lib.common.rest_client [req-d751bb7f-d0e5-4843-a919-c186700f2380 ] Request (GroupSnaphotsV319RbacTest:test_reset_group_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/snapshots/detail 0.026s 2020-11-06 18:04:55.860 37 DEBUG tempest.lib.common.rest_client [req-d751bb7f-d0e5-4843-a919-c186700f2380 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d751bb7f-d0e5-4843-a919-c186700f2380', 'content-length': '454', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d751bb7f-d0e5-4843-a919-c186700f2380', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/snapshots/detail'} Body: b'{"snapshots": [{"id": "b716d1f3-c0b8-49bf-ad2c-8db668859e13", "created_at": "2020-11-06T18:04:55.000000", "updated_at": "2020-11-06T18:04:55.000000", "name": "tempest-group_snapshot-1727360094", "description": null, "volume_id": "12cfe795-871f-404c-afc8-55790f8ceebb", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "a65625c81d8743eebcddd70e63ff93ab", "os-extended-snapshot-attributes:progress": "100%"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:55.903 37 INFO tempest.lib.common.rest_client [req-1a265fe4-55d9-4215-9dbc-9db77cd175a0 ] Request (GroupSnaphotsV319RbacTest:test_reset_group_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/snapshots/b716d1f3-c0b8-49bf-ad2c-8db668859e13 0.036s 2020-11-06 18:04:55.904 37 DEBUG tempest.lib.common.rest_client [req-1a265fe4-55d9-4215-9dbc-9db77cd175a0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-1a265fe4-55d9-4215-9dbc-9db77cd175a0', 'content-length': '451', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1a265fe4-55d9-4215-9dbc-9db77cd175a0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/snapshots/b716d1f3-c0b8-49bf-ad2c-8db668859e13'} Body: b'{"snapshot": {"id": "b716d1f3-c0b8-49bf-ad2c-8db668859e13", "created_at": "2020-11-06T18:04:55.000000", "updated_at": "2020-11-06T18:04:55.000000", "name": "tempest-group_snapshot-1727360094", "description": null, "volume_id": "12cfe795-871f-404c-afc8-55790f8ceebb", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "a65625c81d8743eebcddd70e63ff93ab", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:55.908 37 INFO tempest.common.waiters [-] snapshot b716d1f3-c0b8-49bf-ad2c-8db668859e13 reached available after waiting for 0.908587 seconds 2020-11-06 18:04:55.908 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:56.019 40 INFO tempest.lib.common.rest_client [req-f5ae16bf-edde-4e51-90f2-e0ea88da3aee ] Request (VolumesSnapshotV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/b8392366-94a1-43a9-b4f8-1cd6622950d6 0.026s 2020-11-06 18:04:56.020 40 DEBUG tempest.lib.common.rest_client [req-f5ae16bf-edde-4e51-90f2-e0ea88da3aee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '111', 'content-type': 'application/json', 'x-compute-request-id': 'req-f5ae16bf-edde-4e51-90f2-e0ea88da3aee', 'x-openstack-request-id': 'req-f5ae16bf-edde-4e51-90f2-e0ea88da3aee', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/snapshots/b8392366-94a1-43a9-b4f8-1cd6622950d6'} Body: b'{"itemNotFound": {"code": 404, "message": "Snapshot b8392366-94a1-43a9-b4f8-1cd6622950d6 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:56.024 37 INFO tempest.lib.common.rest_client [req-767161aa-a316-44a5-91b7-7c4f7f60da49 ] Request (GroupSnaphotsV319RbacTest:test_reset_group_snapshot_rbac): 200 GET http://172.30.13.94/identity/v3/projects/a65625c81d8743eebcddd70e63ff93ab/users/fd8eb607df114b998ce22252078b28ec/roles 0.114s 2020-11-06 18:04:56.025 37 DEBUG tempest.lib.common.rest_client [req-767161aa-a316-44a5-91b7-7c4f7f60da49 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-767161aa-a316-44a5-91b7-7c4f7f60da49', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a65625c81d8743eebcddd70e63ff93ab/users/fd8eb607df114b998ce22252078b28ec/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a65625c81d8743eebcddd70e63ff93ab/users/fd8eb607df114b998ce22252078b28ec/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:56.094 40 INFO tempest.lib.common.rest_client [req-2b2dbd7d-6882-4750-acd9-c3755e2e6450 ] Request (VolumesSnapshotV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/volumes/b501e219-7469-4db0-9331-084d6f1807c1 0.073s 2020-11-06 18:04:56.095 40 DEBUG tempest.lib.common.rest_client [req-2b2dbd7d-6882-4750-acd9-c3755e2e6450 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2b2dbd7d-6882-4750-acd9-c3755e2e6450', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/volumes/b501e219-7469-4db0-9331-084d6f1807c1'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:56.115 37 INFO tempest.lib.common.rest_client [req-9cef98d5-6c18-4e09-a352-1fb6a7bd00ee ] Request (GroupSnaphotsV319RbacTest:test_reset_group_snapshot_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-11-06 18:04:56.116 37 DEBUG tempest.lib.common.rest_client [req-9cef98d5-6c18-4e09-a352-1fb6a7bd00ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9cef98d5-6c18-4e09-a352-1fb6a7bd00ee', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fd8eb607df114b998ce22252078b28ec", "name": "tempest-GroupSnaphotsV319RbacTest-516084698", "password_expires_at": null}, "audit_ids": ["WFHTGv4bSliW9rHyu9R1Uw"], "expires_at": "2020-11-06T19:04:56.000000Z", "issued_at": "2020-11-06T18:04:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a65625c81d8743eebcddd70e63ff93ab", "name": "tempest-GroupSnaphotsV319RbacTest-516084698"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a65625c81d8743eebcddd70e63ff93ab", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a65625c81d8743eebcddd70e63ff93ab", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a65625c81d8743eebcddd70e63ff93ab", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a65625c81d8743eebcddd70e63ff93ab", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a65625c81d8743eebcddd70e63ff93ab", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:56.172 40 INFO tempest.lib.common.rest_client [req-c349c1fb-160a-4d7a-b1a6-09e62bb067ab ] Request (VolumesSnapshotV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/volumes/b501e219-7469-4db0-9331-084d6f1807c1 0.076s 2020-11-06 18:04:56.172 40 DEBUG tempest.lib.common.rest_client [req-c349c1fb-160a-4d7a-b1a6-09e62bb067ab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c349c1fb-160a-4d7a-b1a6-09e62bb067ab', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c349c1fb-160a-4d7a-b1a6-09e62bb067ab', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/volumes/b501e219-7469-4db0-9331-084d6f1807c1'} Body: b'{"volume": {"id": "b501e219-7469-4db0-9331-084d6f1807c1", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:43.000000", "updated_at": "2020-11-06T18:04:56.000000", "name": "tempest-VolumesSnapshotV3RbacTest-Volume-1749236545", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/volumes/b501e219-7469-4db0-9331-084d6f1807c1"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/e5f74addf2f94d10bfa96014547b3c32/volumes/b501e219-7469-4db0-9331-084d6f1807c1"}], "user_id": "37807e3082a247158f6d1f5307e00c1a", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "e5f74addf2f94d10bfa96014547b3c32"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:56.286 37 INFO tempest.lib.common.rest_client [req-9c887479-4943-4ff0-8c85-43671faafd29 ] Request (GroupSnaphotsV319RbacTest:test_reset_group_snapshot_rbac): 202 POST http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/group_snapshots/af05f44c-cdf0-450c-9d29-2d91e3c1c378/action 0.169s 2020-11-06 18:04:56.286 37 DEBUG tempest.lib.common.rest_client [req-9c887479-4943-4ff0-8c85-43671faafd29 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: {"reset_status": {"status": "error"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9c887479-4943-4ff0-8c85-43671faafd29', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/group_snapshots/af05f44c-cdf0-450c-9d29-2d91e3c1c378/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:56.287 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:04:56.341 37 INFO tempest.lib.common.rest_client [req-e09e882e-2db8-4a57-a6e3-506882cd7056 ] Request (GroupSnaphotsV319RbacTest:test_reset_group_snapshot_rbac): 200 GET http://172.30.13.94/identity/v3/projects/a65625c81d8743eebcddd70e63ff93ab/users/fd8eb607df114b998ce22252078b28ec/roles 0.053s 2020-11-06 18:04:56.341 37 DEBUG tempest.lib.common.rest_client [req-e09e882e-2db8-4a57-a6e3-506882cd7056 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e09e882e-2db8-4a57-a6e3-506882cd7056', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a65625c81d8743eebcddd70e63ff93ab/users/fd8eb607df114b998ce22252078b28ec/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a65625c81d8743eebcddd70e63ff93ab/users/fd8eb607df114b998ce22252078b28ec/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:56.373 37 INFO tempest.lib.common.rest_client [req-c42f1e1f-b43b-46f4-89fa-e58dfa7c5e9c ] Request (GroupSnaphotsV319RbacTest:test_reset_group_snapshot_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:04:56.374 37 DEBUG tempest.lib.common.rest_client [req-c42f1e1f-b43b-46f4-89fa-e58dfa7c5e9c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c42f1e1f-b43b-46f4-89fa-e58dfa7c5e9c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fd8eb607df114b998ce22252078b28ec", "name": "tempest-GroupSnaphotsV319RbacTest-516084698", "password_expires_at": null}, "audit_ids": ["8pfbu-jKQfmgLrVueO5K4A"], "expires_at": "2020-11-06T19:04:56.000000Z", "issued_at": "2020-11-06T18:04:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a65625c81d8743eebcddd70e63ff93ab", "name": "tempest-GroupSnaphotsV319RbacTest-516084698"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a65625c81d8743eebcddd70e63ff93ab", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a65625c81d8743eebcddd70e63ff93ab", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a65625c81d8743eebcddd70e63ff93ab", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a65625c81d8743eebcddd70e63ff93ab", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a65625c81d8743eebcddd70e63ff93ab", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:56.467 37 INFO tempest.lib.common.rest_client [req-35d408f1-b056-46b6-8990-5b82c16a5260 ] Request (GroupSnaphotsV319RbacTest:test_reset_group_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/group_snapshots/af05f44c-cdf0-450c-9d29-2d91e3c1c378 0.092s 2020-11-06 18:04:56.468 37 DEBUG tempest.lib.common.rest_client [req-35d408f1-b056-46b6-8990-5b82c16a5260 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-35d408f1-b056-46b6-8990-5b82c16a5260', 'content-length': '304', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-35d408f1-b056-46b6-8990-5b82c16a5260', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/group_snapshots/af05f44c-cdf0-450c-9d29-2d91e3c1c378'} Body: b'{"group_snapshot": {"id": "af05f44c-cdf0-450c-9d29-2d91e3c1c378", "group_id": "9e58e93c-467b-479a-86b8-b0561043fa4f", "group_type_id": "56e36eca-92ef-4edb-bb6d-69c3a4d1ff1b", "status": "error", "created_at": "2020-11-06T18:04:55.000000", "name": "tempest-group_snapshot-1727360094", "description": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:56.472 37 INFO tempest.common.waiters [-] group_snapshot af05f44c-cdf0-450c-9d29-2d91e3c1c378 reached error after waiting for 0.472705 seconds 2020-11-06 18:04:56.527 37 INFO tempest.lib.common.rest_client [req-e6cba011-9b32-4362-aaf2-b531d2b6de31 ] Request (GroupSnaphotsV319RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/group_snapshots/af05f44c-cdf0-450c-9d29-2d91e3c1c378 0.054s 2020-11-06 18:04:56.528 37 DEBUG tempest.lib.common.rest_client [req-e6cba011-9b32-4362-aaf2-b531d2b6de31 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e6cba011-9b32-4362-aaf2-b531d2b6de31', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/group_snapshots/af05f44c-cdf0-450c-9d29-2d91e3c1c378'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:56.603 37 INFO tempest.lib.common.rest_client [req-173301a3-2aa8-4e24-bb1e-72084c4bd291 ] Request (GroupSnaphotsV319RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/volumes/detail 0.074s 2020-11-06 18:04:56.603 37 DEBUG tempest.lib.common.rest_client [req-173301a3-2aa8-4e24-bb1e-72084c4bd291 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-173301a3-2aa8-4e24-bb1e-72084c4bd291', 'content-length': '1174', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-173301a3-2aa8-4e24-bb1e-72084c4bd291', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/volumes/detail'} Body: b'{"volumes": [{"id": "12cfe795-871f-404c-afc8-55790f8ceebb", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:53.000000", "updated_at": "2020-11-06T18:04:54.000000", "name": "tempest-GroupSnaphotsV319RbacTest-Volume-385527805", "description": null, "volume_type": "tempest-GroupSnaphotsV319RbacTest-volume-type-199598522", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/volumes/12cfe795-871f-404c-afc8-55790f8ceebb"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/a65625c81d8743eebcddd70e63ff93ab/volumes/12cfe795-871f-404c-afc8-55790f8ceebb"}], "user_id": "fd8eb607df114b998ce22252078b28ec", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "9e58e93c-467b-479a-86b8-b0561043fa4f", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "a65625c81d8743eebcddd70e63ff93ab"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:56.643 37 INFO tempest.lib.common.rest_client [req-84e3f0b1-2dc9-4e00-ae0d-dd492bc9862c ] Request (GroupSnaphotsV319RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/snapshots/detail 0.025s 2020-11-06 18:04:56.643 37 DEBUG tempest.lib.common.rest_client [req-84e3f0b1-2dc9-4e00-ae0d-dd492bc9862c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-84e3f0b1-2dc9-4e00-ae0d-dd492bc9862c', 'content-length': '453', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-84e3f0b1-2dc9-4e00-ae0d-dd492bc9862c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/snapshots/detail'} Body: b'{"snapshots": [{"id": "b716d1f3-c0b8-49bf-ad2c-8db668859e13", "created_at": "2020-11-06T18:04:55.000000", "updated_at": "2020-11-06T18:04:57.000000", "name": "tempest-group_snapshot-1727360094", "description": null, "volume_id": "12cfe795-871f-404c-afc8-55790f8ceebb", "status": "deleting", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "a65625c81d8743eebcddd70e63ff93ab", "os-extended-snapshot-attributes:progress": "100%"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:56.680 37 INFO tempest.lib.common.rest_client [req-b148ec72-2b1a-4c43-ad44-33c4c075f003 ] Request (GroupSnaphotsV319RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/snapshots/b716d1f3-c0b8-49bf-ad2c-8db668859e13 0.031s 2020-11-06 18:04:56.680 37 DEBUG tempest.lib.common.rest_client [req-b148ec72-2b1a-4c43-ad44-33c4c075f003 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-b148ec72-2b1a-4c43-ad44-33c4c075f003', 'content-length': '450', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b148ec72-2b1a-4c43-ad44-33c4c075f003', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/snapshots/b716d1f3-c0b8-49bf-ad2c-8db668859e13'} Body: b'{"snapshot": {"id": "b716d1f3-c0b8-49bf-ad2c-8db668859e13", "created_at": "2020-11-06T18:04:55.000000", "updated_at": "2020-11-06T18:04:57.000000", "name": "tempest-group_snapshot-1727360094", "description": null, "volume_id": "12cfe795-871f-404c-afc8-55790f8ceebb", "status": "deleting", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "a65625c81d8743eebcddd70e63ff93ab", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:57.147 39 INFO tempest.lib.common.rest_client [req-01928171-9442-483c-adcc-ba8d8447733c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.294s 2020-11-06 18:04:57.147 39 DEBUG tempest.lib.common.rest_client [req-01928171-9442-483c-adcc-ba8d8447733c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-01928171-9442-483c-adcc-ba8d8447733c', 'x-compute-request-id': 'req-01928171-9442-483c-adcc-ba8d8447733c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:57.237 40 INFO tempest.lib.common.rest_client [req-db67600f-ed96-484a-a78f-c9fafb9576aa ] Request (VolumesSnapshotV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/volumes/b501e219-7469-4db0-9331-084d6f1807c1 0.051s 2020-11-06 18:04:57.238 40 DEBUG tempest.lib.common.rest_client [req-db67600f-ed96-484a-a78f-c9fafb9576aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-db67600f-ed96-484a-a78f-c9fafb9576aa', 'x-openstack-request-id': 'req-db67600f-ed96-484a-a78f-c9fafb9576aa', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/e5f74addf2f94d10bfa96014547b3c32/volumes/b501e219-7469-4db0-9331-084d6f1807c1'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume b501e219-7469-4db0-9331-084d6f1807c1 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:57.381 40 INFO tempest.lib.common.rest_client [req-2fec6031-ca8e-4f37-b9f8-61f6b189e46a ] Request (VolumesSnapshotV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/37807e3082a247158f6d1f5307e00c1a 0.142s 2020-11-06 18:04:57.381 40 DEBUG tempest.lib.common.rest_client [req-2fec6031-ca8e-4f37-b9f8-61f6b189e46a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2fec6031-ca8e-4f37-b9f8-61f6b189e46a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/37807e3082a247158f6d1f5307e00c1a'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:57.468 40 INFO tempest.lib.common.rest_client [req-2437a4cb-716e-4b12-adcc-cd2b4cf7ee62 ] Request (VolumesSnapshotV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:04:57.468 40 DEBUG tempest.lib.common.rest_client [req-2437a4cb-716e-4b12-adcc-cd2b4cf7ee62 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2437a4cb-716e-4b12-adcc-cd2b4cf7ee62', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["XMwQW5BySBCoKsZXjgeS4A"], "expires_at": "2020-11-06T19:04:57.000000Z", "issued_at": "2020-11-06T18:04:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:57.713 37 INFO tempest.lib.common.rest_client [req-474ea09a-eee3-4eff-be63-9821931992ec ] Request (GroupSnaphotsV319RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/snapshots/b716d1f3-c0b8-49bf-ad2c-8db668859e13 0.026s 2020-11-06 18:04:57.713 37 DEBUG tempest.lib.common.rest_client [req-474ea09a-eee3-4eff-be63-9821931992ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '111', 'content-type': 'application/json', 'x-compute-request-id': 'req-474ea09a-eee3-4eff-be63-9821931992ec', 'x-openstack-request-id': 'req-474ea09a-eee3-4eff-be63-9821931992ec', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/snapshots/b716d1f3-c0b8-49bf-ad2c-8db668859e13'} Body: b'{"itemNotFound": {"code": 404, "message": "Snapshot b716d1f3-c0b8-49bf-ad2c-8db668859e13 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:57.729 37 INFO tempest.lib.common.rest_client [req-f99d5368-f61c-42d6-ace2-f731a6b7eb78 ] Request (GroupSnaphotsV319RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/group_snapshots/af05f44c-cdf0-450c-9d29-2d91e3c1c378 0.015s 2020-11-06 18:04:57.729 37 DEBUG tempest.lib.common.rest_client [req-f99d5368-f61c-42d6-ace2-f731a6b7eb78 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'content-length': '116', 'content-type': 'application/json', 'x-compute-request-id': 'req-f99d5368-f61c-42d6-ace2-f731a6b7eb78', 'x-openstack-request-id': 'req-f99d5368-f61c-42d6-ace2-f731a6b7eb78', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/group_snapshots/af05f44c-cdf0-450c-9d29-2d91e3c1c378'} Body: b'{"itemNotFound": {"code": 404, "message": "GroupSnapshot af05f44c-cdf0-450c-9d29-2d91e3c1c378 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:57.812 37 INFO tempest.lib.common.rest_client [req-2ea0886a-f0ab-4186-8ebc-d5bf0e5a01fc ] Request (GroupSnaphotsV319RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/volumes/detail 0.082s 2020-11-06 18:04:57.812 37 DEBUG tempest.lib.common.rest_client [req-2ea0886a-f0ab-4186-8ebc-d5bf0e5a01fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-2ea0886a-f0ab-4186-8ebc-d5bf0e5a01fc', 'content-length': '1174', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2ea0886a-f0ab-4186-8ebc-d5bf0e5a01fc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/volumes/detail'} Body: b'{"volumes": [{"id": "12cfe795-871f-404c-afc8-55790f8ceebb", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:53.000000", "updated_at": "2020-11-06T18:04:54.000000", "name": "tempest-GroupSnaphotsV319RbacTest-Volume-385527805", "description": null, "volume_type": "tempest-GroupSnaphotsV319RbacTest-volume-type-199598522", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/volumes/12cfe795-871f-404c-afc8-55790f8ceebb"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/a65625c81d8743eebcddd70e63ff93ab/volumes/12cfe795-871f-404c-afc8-55790f8ceebb"}], "user_id": "fd8eb607df114b998ce22252078b28ec", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "9e58e93c-467b-479a-86b8-b0561043fa4f", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "a65625c81d8743eebcddd70e63ff93ab"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:57.839 40 INFO tempest.lib.common.rest_client [req-13940ba6-dcfa-4133-8ea5-968a5e82175d ] Request (VolumesSnapshotV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=e5f74addf2f94d10bfa96014547b3c32&name=default 0.369s 2020-11-06 18:04:57.839 40 DEBUG tempest.lib.common.rest_client [req-13940ba6-dcfa-4133-8ea5-968a5e82175d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-13940ba6-dcfa-4133-8ea5-968a5e82175d', 'date': 'Fri, 06 Nov 2020 18:04:57 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=e5f74addf2f94d10bfa96014547b3c32&name=default'} Body: b'{"security_groups": [{"id": "f157e6a6-e208-498f-acb2-3e25e5256520", "name": "default", "stateful": true, "tenant_id": "e5f74addf2f94d10bfa96014547b3c32", "description": "Default security group", "security_group_rules": [{"id": "3bda27d0-26e1-4910-a0af-c1557128097a", "tenant_id": "e5f74addf2f94d10bfa96014547b3c32", "security_group_id": "f157e6a6-e208-498f-acb2-3e25e5256520", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:04:57Z", "updated_at": "2020-11-06T18:04:57Z", "revision_number": 0, "project_id": "e5f74addf2f94d10bfa96014547b3c32"}, {"id": "551257f0-2510-4f50-8c40-b78f424314c5", "tenant_id": "e5f74addf2f94d10bfa96014547b3c32", "security_group_id": "f157e6a6-e208-498f-acb2-3e25e5256520", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "f157e6a6-e208-498f-acb2-3e25e5256520", "description": null, "tags": [], "created_at": "2020-11-06T18:04:57Z", "updated_at": "2020-11-06T18:04:57Z", "revision_number": 0, "project_id": "e5f74addf2f94d10bfa96014547b3c32"}, {"id": "86e895b5-a0e1-4c19-a54b-83f8cfe8282a", "tenant_id": "e5f74addf2f94d10bfa96014547b3c32", "security_group_id": "f157e6a6-e208-498f-acb2-3e25e5256520", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:04:57Z", "updated_at": "2020-11-06T18:04:57Z", "revision_number": 0, "project_id": "e5f74addf2f94d10bfa96014547b3c32"}, {"id": "d4c8fcfc-c487-441f-8cb9-e712c5cc4787", "tenant_id": "e5f74addf2f94d10bfa96014547b3c32", "security_group_id": "f157e6a6-e208-498f-acb2-3e25e5256520", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "f157e6a6-e208-498f-acb2-3e25e5256520", "description": null, "tags": [], "created_at": "2020-11-06T18:04:57Z", "updated_at": "2020-11-06T18:04:57Z", "revision_number": 0, "project_id": "e5f74addf2f94d10bfa96014547b3c32"}], "tags": [], "created_at": "2020-11-06T18:04:57Z", "updated_at": "2020-11-06T18:04:57Z", "revision_number": 1, "project_id": "e5f74addf2f94d10bfa96014547b3c32"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:57.937 37 INFO tempest.lib.common.rest_client [req-89a62779-d226-4f25-9c02-8150d7e8c61a ] Request (GroupSnaphotsV319RbacTest:_run_cleanups): 202 POST http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/groups/9e58e93c-467b-479a-86b8-b0561043fa4f/action 0.109s 2020-11-06 18:04:57.938 37 DEBUG tempest.lib.common.rest_client [req-89a62779-d226-4f25-9c02-8150d7e8c61a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: {"delete": {"delete-volumes": true}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-89a62779-d226-4f25-9c02-8150d7e8c61a', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/groups/9e58e93c-467b-479a-86b8-b0561043fa4f/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:57.987 40 INFO tempest.lib.common.rest_client [req-ad7625bd-33be-41dc-b6db-4afb1ff42bf5 ] Request (VolumesSnapshotV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/f157e6a6-e208-498f-acb2-3e25e5256520 0.147s 2020-11-06 18:04:57.988 40 DEBUG tempest.lib.common.rest_client [req-ad7625bd-33be-41dc-b6db-4afb1ff42bf5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-ad7625bd-33be-41dc-b6db-4afb1ff42bf5', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:04:57 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/f157e6a6-e208-498f-acb2-3e25e5256520'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:58.050 37 INFO tempest.lib.common.rest_client [req-4d4cfc65-4d50-4724-9a3e-3a4326a1fcc9 ] Request (GroupSnaphotsV319RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/volumes/12cfe795-871f-404c-afc8-55790f8ceebb 0.111s 2020-11-06 18:04:58.050 37 DEBUG tempest.lib.common.rest_client [req-4d4cfc65-4d50-4724-9a3e-3a4326a1fcc9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4d4cfc65-4d50-4724-9a3e-3a4326a1fcc9', 'content-length': '1170', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4d4cfc65-4d50-4724-9a3e-3a4326a1fcc9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/volumes/12cfe795-871f-404c-afc8-55790f8ceebb'} Body: b'{"volume": {"id": "12cfe795-871f-404c-afc8-55790f8ceebb", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:04:53.000000", "updated_at": "2020-11-06T18:04:58.000000", "name": "tempest-GroupSnaphotsV319RbacTest-Volume-385527805", "description": null, "volume_type": "tempest-GroupSnaphotsV319RbacTest-volume-type-199598522", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/volumes/12cfe795-871f-404c-afc8-55790f8ceebb"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/a65625c81d8743eebcddd70e63ff93ab/volumes/12cfe795-871f-404c-afc8-55790f8ceebb"}], "user_id": "fd8eb607df114b998ce22252078b28ec", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "9e58e93c-467b-479a-86b8-b0561043fa4f", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "a65625c81d8743eebcddd70e63ff93ab"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:58.106 40 INFO tempest.lib.common.rest_client [req-e9489d1e-130b-4cfb-901e-8e9f9be5e9ae ] Request (VolumesSnapshotV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32 0.117s 2020-11-06 18:04:58.107 40 DEBUG tempest.lib.common.rest_client [req-e9489d1e-130b-4cfb-901e-8e9f9be5e9ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e9489d1e-130b-4cfb-901e-8e9f9be5e9ae', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e5f74addf2f94d10bfa96014547b3c32'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:58.460 39 INFO tempest.lib.common.rest_client [req-42cc80c4-ac52-4028-8b58-33677f00d772 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.299s 2020-11-06 18:04:58.461 39 DEBUG tempest.lib.common.rest_client [req-42cc80c4-ac52-4028-8b58-33677f00d772 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-42cc80c4-ac52-4028-8b58-33677f00d772', 'x-compute-request-id': 'req-42cc80c4-ac52-4028-8b58-33677f00d772', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:59.117 37 INFO tempest.lib.common.rest_client [req-be01852c-5cff-43f4-9094-634af230389a ] Request (GroupSnaphotsV319RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/volumes/12cfe795-871f-404c-afc8-55790f8ceebb 0.050s 2020-11-06 18:04:59.118 37 DEBUG tempest.lib.common.rest_client [req-be01852c-5cff-43f4-9094-634af230389a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-be01852c-5cff-43f4-9094-634af230389a', 'x-openstack-request-id': 'req-be01852c-5cff-43f4-9094-634af230389a', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/volumes/12cfe795-871f-404c-afc8-55790f8ceebb'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 12cfe795-871f-404c-afc8-55790f8ceebb could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:59.139 37 INFO tempest.lib.common.rest_client [req-48ac23a8-cf60-4060-adea-51433da93cef ] Request (GroupSnaphotsV319RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/groups/9e58e93c-467b-479a-86b8-b0561043fa4f 0.020s 2020-11-06 18:04:59.139 37 DEBUG tempest.lib.common.rest_client [req-48ac23a8-cf60-4060-adea-51433da93cef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'content-length': '108', 'content-type': 'application/json', 'x-compute-request-id': 'req-48ac23a8-cf60-4060-adea-51433da93cef', 'x-openstack-request-id': 'req-48ac23a8-cf60-4060-adea-51433da93cef', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/groups/9e58e93c-467b-479a-86b8-b0561043fa4f'} Body: b'{"itemNotFound": {"code": 404, "message": "Group 9e58e93c-467b-479a-86b8-b0561043fa4f could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:59.178 37 INFO tempest.lib.common.rest_client [req-293a9ee9-4c49-4951-bdbe-4cac378484e9 ] Request (GroupSnaphotsV319RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/group_types/56e36eca-92ef-4edb-bb6d-69c3a4d1ff1b 0.038s 2020-11-06 18:04:59.179 37 DEBUG tempest.lib.common.rest_client [req-293a9ee9-4c49-4951-bdbe-4cac378484e9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-293a9ee9-4c49-4951-bdbe-4cac378484e9', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/group_types/56e36eca-92ef-4edb-bb6d-69c3a4d1ff1b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:59.235 37 INFO tempest.lib.common.rest_client [req-f56b90ce-483a-44e6-8e33-6809274c68b1 ] Request (GroupSnaphotsV319RbacTest:tearDownClass): 404 DELETE http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/volumes/12cfe795-871f-404c-afc8-55790f8ceebb 0.051s 2020-11-06 18:04:59.235 37 DEBUG tempest.lib.common.rest_client [req-f56b90ce-483a-44e6-8e33-6809274c68b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-f56b90ce-483a-44e6-8e33-6809274c68b1', 'x-openstack-request-id': 'req-f56b90ce-483a-44e6-8e33-6809274c68b1', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/volumes/12cfe795-871f-404c-afc8-55790f8ceebb'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 12cfe795-871f-404c-afc8-55790f8ceebb could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:59.309 37 INFO tempest.lib.common.rest_client [req-8b3c2305-67c9-4760-b901-335426e3121c ] Request (GroupSnaphotsV319RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/types/add7214c-e9b0-4b46-abd0-419a6c5d155e 0.073s 2020-11-06 18:04:59.310 37 DEBUG tempest.lib.common.rest_client [req-8b3c2305-67c9-4760-b901-335426e3121c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8b3c2305-67c9-4760-b901-335426e3121c', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/types/add7214c-e9b0-4b46-abd0-419a6c5d155e'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:59.332 37 INFO tempest.lib.common.rest_client [req-8cb96551-ac63-46c9-9e3b-07b62a5d5c8f ] Request (GroupSnaphotsV319RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/types/add7214c-e9b0-4b46-abd0-419a6c5d155e 0.021s 2020-11-06 18:04:59.333 37 DEBUG tempest.lib.common.rest_client [req-8cb96551-ac63-46c9-9e3b-07b62a5d5c8f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-8cb96551-ac63-46c9-9e3b-07b62a5d5c8f', 'x-openstack-request-id': 'req-8cb96551-ac63-46c9-9e3b-07b62a5d5c8f', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/a65625c81d8743eebcddd70e63ff93ab/types/add7214c-e9b0-4b46-abd0-419a6c5d155e'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type add7214c-e9b0-4b46-abd0-419a6c5d155e could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:59.516 37 INFO tempest.lib.common.rest_client [req-a0e324e2-4b20-42c2-afb4-2453f886c313 ] Request (GroupSnaphotsV319RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/fd8eb607df114b998ce22252078b28ec 0.182s 2020-11-06 18:04:59.516 37 DEBUG tempest.lib.common.rest_client [req-a0e324e2-4b20-42c2-afb4-2453f886c313 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a0e324e2-4b20-42c2-afb4-2453f886c313', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/fd8eb607df114b998ce22252078b28ec'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:59.601 37 INFO tempest.lib.common.rest_client [req-5d06f61c-498f-4fca-82de-4a1ae2b06b02 ] Request (GroupSnaphotsV319RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-11-06 18:04:59.602 37 DEBUG tempest.lib.common.rest_client [req-5d06f61c-498f-4fca-82de-4a1ae2b06b02 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5d06f61c-498f-4fca-82de-4a1ae2b06b02', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["8mcVHInVT-2Ono2Gj_iG2Q"], "expires_at": "2020-11-06T19:04:59.000000Z", "issued_at": "2020-11-06T18:04:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:04:59.688 39 INFO tempest.lib.common.rest_client [req-88198010-78bc-4bf2-8484-84e799bf3d78 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.214s 2020-11-06 18:04:59.688 39 DEBUG tempest.lib.common.rest_client [req-88198010-78bc-4bf2-8484-84e799bf3d78 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:04:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-88198010-78bc-4bf2-8484-84e799bf3d78', 'x-compute-request-id': 'req-88198010-78bc-4bf2-8484-84e799bf3d78', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:00.156 37 INFO tempest.lib.common.rest_client [req-8de77410-7323-4d1e-8cc0-6634b55b8ffc ] Request (GroupSnaphotsV319RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=a65625c81d8743eebcddd70e63ff93ab&name=default 0.553s 2020-11-06 18:05:00.156 37 DEBUG tempest.lib.common.rest_client [req-8de77410-7323-4d1e-8cc0-6634b55b8ffc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-8de77410-7323-4d1e-8cc0-6634b55b8ffc', 'date': 'Fri, 06 Nov 2020 18:05:00 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=a65625c81d8743eebcddd70e63ff93ab&name=default'} Body: b'{"security_groups": [{"id": "c79a0033-b671-4ffa-b80d-fc76dd141569", "name": "default", "stateful": true, "tenant_id": "a65625c81d8743eebcddd70e63ff93ab", "description": "Default security group", "security_group_rules": [{"id": "791c44b8-1965-4e1b-9c49-decf5d030880", "tenant_id": "a65625c81d8743eebcddd70e63ff93ab", "security_group_id": "c79a0033-b671-4ffa-b80d-fc76dd141569", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "c79a0033-b671-4ffa-b80d-fc76dd141569", "description": null, "tags": [], "created_at": "2020-11-06T18:04:59Z", "updated_at": "2020-11-06T18:04:59Z", "revision_number": 0, "project_id": "a65625c81d8743eebcddd70e63ff93ab"}, {"id": "b9674b1d-5d9f-4777-98ff-4f9f6064b0f6", "tenant_id": "a65625c81d8743eebcddd70e63ff93ab", "security_group_id": "c79a0033-b671-4ffa-b80d-fc76dd141569", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "c79a0033-b671-4ffa-b80d-fc76dd141569", "description": null, "tags": [], "created_at": "2020-11-06T18:04:59Z", "updated_at": "2020-11-06T18:04:59Z", "revision_number": 0, "project_id": "a65625c81d8743eebcddd70e63ff93ab"}, {"id": "d3b69610-9daa-4038-854a-37a00ebb01e7", "tenant_id": "a65625c81d8743eebcddd70e63ff93ab", "security_group_id": "c79a0033-b671-4ffa-b80d-fc76dd141569", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:04:59Z", "updated_at": "2020-11-06T18:04:59Z", "revision_number": 0, "project_id": "a65625c81d8743eebcddd70e63ff93ab"}, {"id": "dc5a762c-69f0-45ce-9f97-a5680f33b4ce", "tenant_id": "a65625c81d8743eebcddd70e63ff93ab", "security_group_id": "c79a0033-b671-4ffa-b80d-fc76dd141569", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:05:00Z", "updated_at": "2020-11-06T18:05:00Z", "revision_number": 0, "project_id": "a65625c81d8743eebcddd70e63ff93ab"}], "tags": [], "created_at": "2020-11-06T18:04:59Z", "updated_at": "2020-11-06T18:04:59Z", "revision_number": 1, "project_id": "a65625c81d8743eebcddd70e63ff93ab"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:00.919 39 INFO tempest.lib.common.rest_client [req-bf5ad7ca-c783-4998-987b-46b8dade7c0e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.214s 2020-11-06 18:05:00.920 39 DEBUG tempest.lib.common.rest_client [req-bf5ad7ca-c783-4998-987b-46b8dade7c0e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bf5ad7ca-c783-4998-987b-46b8dade7c0e', 'x-compute-request-id': 'req-bf5ad7ca-c783-4998-987b-46b8dade7c0e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:01.502 37 INFO tempest.lib.common.rest_client [req-87914800-d92f-4e88-a9c4-8cfcaefd2fbc ] Request (GroupSnaphotsV319RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/c79a0033-b671-4ffa-b80d-fc76dd141569 1.345s 2020-11-06 18:05:01.503 37 DEBUG tempest.lib.common.rest_client [req-87914800-d92f-4e88-a9c4-8cfcaefd2fbc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-87914800-d92f-4e88-a9c4-8cfcaefd2fbc', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:05:01 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/c79a0033-b671-4ffa-b80d-fc76dd141569'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:01.614 37 INFO tempest.lib.common.rest_client [req-f19f6250-aa4a-4b2f-9575-27afa7f7543a ] Request (GroupSnaphotsV319RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/a65625c81d8743eebcddd70e63ff93ab 0.110s 2020-11-06 18:05:01.615 37 DEBUG tempest.lib.common.rest_client [req-f19f6250-aa4a-4b2f-9575-27afa7f7543a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f19f6250-aa4a-4b2f-9575-27afa7f7543a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a65625c81d8743eebcddd70e63ff93ab'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:01.704 37 INFO tempest.lib.common.rest_client [req-eb9d3310-e203-4346-bfe6-187143d2d425 ] Request (GroupsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:05:01.705 37 DEBUG tempest.lib.common.rest_client [req-eb9d3310-e203-4346-bfe6-187143d2d425 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eb9d3310-e203-4346-bfe6-187143d2d425', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["iILP1EAIQ6y0ba9MR_Gc-Q"], "expires_at": "2020-11-06T19:05:01.000000Z", "issued_at": "2020-11-06T18:05:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:01.749 37 INFO tempest.lib.common.rest_client [req-8a7a6e36-0623-4b91-9f1d-04957f8d80a5 ] Request (GroupsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:05:01.749 37 DEBUG tempest.lib.common.rest_client [req-8a7a6e36-0623-4b91-9f1d-04957f8d80a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8a7a6e36-0623-4b91-9f1d-04957f8d80a5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["aNsdj-ewT0W1dRNoadbybA"], "expires_at": "2020-11-06T19:05:01.000000Z", "issued_at": "2020-11-06T18:05:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:01.806 37 INFO tempest.lib.common.rest_client [req-619eaf86-fcf3-4e71-b029-fad37cd6462e ] Request (GroupsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.055s 2020-11-06 18:05:01.807 37 DEBUG tempest.lib.common.rest_client [req-619eaf86-fcf3-4e71-b029-fad37cd6462e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-619eaf86-fcf3-4e71-b029-fad37cd6462e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:01.867 37 INFO tempest.lib.common.rest_client [req-5142da73-509f-4e76-a5df-a1facbf506e6 ] Request (GroupsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.059s 2020-11-06 18:05:01.867 37 DEBUG tempest.lib.common.rest_client [req-5142da73-509f-4e76-a5df-a1facbf506e6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-GroupsV3RbacTest-330621733-desc", "domain_id": "default", "name": "tempest-GroupsV3RbacTest-330621733"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '368', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5142da73-509f-4e76-a5df-a1facbf506e6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "c8922203e86b466eb1fafe17e3818538", "name": "tempest-GroupsV3RbacTest-330621733", "domain_id": "default", "description": "tempest-GroupsV3RbacTest-330621733-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:01.972 37 INFO tempest.lib.common.rest_client [req-2fe3f992-e520-4251-be04-b144330453e5 ] Request (GroupsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.103s 2020-11-06 18:05:01.972 37 DEBUG tempest.lib.common.rest_client [req-2fe3f992-e520-4251-be04-b144330453e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-GroupsV3RbacTest-330621733", "password": "J4#1buUYh5VkUAs", "project_id": "c8922203e86b466eb1fafe17e3818538", "email": "tempest-GroupsV3RbacTest-1925839281@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '387', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2fe3f992-e520-4251-be04-b144330453e5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "c8922203e86b466eb1fafe17e3818538", "email": "tempest-GroupsV3RbacTest-1925839281@example.com", "id": "4df30aea665c4905921e3145ddee0163", "name": "tempest-GroupsV3RbacTest-330621733", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/4df30aea665c4905921e3145ddee0163"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:02.025 37 INFO tempest.lib.common.rest_client [req-cffafc06-3df3-4415-ae2b-469a54186db1 ] Request (GroupsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.051s 2020-11-06 18:05:02.025 37 DEBUG tempest.lib.common.rest_client [req-cffafc06-3df3-4415-ae2b-469a54186db1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cffafc06-3df3-4415-ae2b-469a54186db1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:02.088 37 INFO tempest.lib.common.rest_client [req-c567361d-83ff-4913-acc8-e1cd4def962d ] Request (GroupsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.062s 2020-11-06 18:05:02.089 37 DEBUG tempest.lib.common.rest_client [req-c567361d-83ff-4913-acc8-e1cd4def962d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c567361d-83ff-4913-acc8-e1cd4def962d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:02.166 37 INFO tempest.lib.common.rest_client [req-29f22276-418b-4b9b-a4ae-799df6ea5bfc ] Request (GroupsV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles/72a4576c553448cd941b052c1ca0cf2d 0.077s 2020-11-06 18:05:02.167 37 DEBUG tempest.lib.common.rest_client [req-29f22276-418b-4b9b-a4ae-799df6ea5bfc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-29f22276-418b-4b9b-a4ae-799df6ea5bfc', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:02.168 37 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-GroupsV3RbacTest-330621733', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'c8922203e86b466eb1fafe17e3818538', 'project_name': 'tempest-GroupsV3RbacTest-330621733', 'tenant_id': 'c8922203e86b466eb1fafe17e3818538', 'tenant_name': 'tempest-GroupsV3RbacTest-330621733', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '4df30aea665c4905921e3145ddee0163'}, Network: None, Subnet: None, Router: None 2020-11-06 18:05:02.168 37 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-GroupsV3RbacTest-330621733', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'c8922203e86b466eb1fafe17e3818538', 'project_name': 'tempest-GroupsV3RbacTest-330621733', 'tenant_id': 'c8922203e86b466eb1fafe17e3818538', 'tenant_name': 'tempest-GroupsV3RbacTest-330621733', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '4df30aea665c4905921e3145ddee0163'}, Network: None, Subnet: None, Router: None 2020-11-06 18:05:02.193 39 INFO tempest.lib.common.rest_client [req-bfcfc4cd-02fd-4e7c-9001-0a3d59278b2a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.256s 2020-11-06 18:05:02.193 39 DEBUG tempest.lib.common.rest_client [req-bfcfc4cd-02fd-4e7c-9001-0a3d59278b2a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bfcfc4cd-02fd-4e7c-9001-0a3d59278b2a', 'x-compute-request-id': 'req-bfcfc4cd-02fd-4e7c-9001-0a3d59278b2a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:02.300 37 INFO tempest.lib.common.rest_client [req-ababc383-ee74-49a4-bf5c-201ddd576261 ] Request (GroupsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.118s 2020-11-06 18:05:02.301 37 DEBUG tempest.lib.common.rest_client [req-ababc383-ee74-49a4-bf5c-201ddd576261 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6561', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ababc383-ee74-49a4-bf5c-201ddd576261', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4df30aea665c4905921e3145ddee0163", "name": "tempest-GroupsV3RbacTest-330621733", "password_expires_at": null}, "audit_ids": ["qbAFeS7-Tp2TjZVVc-K9Zw"], "expires_at": "2020-11-06T19:05:02.000000Z", "issued_at": "2020-11-06T18:05:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c8922203e86b466eb1fafe17e3818538", "name": "tempest-GroupsV3RbacTest-330621733"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:02.391 37 INFO tempest.lib.common.rest_client [req-4fff671e-5fff-455b-a195-2c8f64adf34c ] Request (GroupsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 18:05:02.391 37 DEBUG tempest.lib.common.rest_client [req-4fff671e-5fff-455b-a195-2c8f64adf34c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4fff671e-5fff-455b-a195-2c8f64adf34c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["oNim0I1bSlOMv77w_lhI5g"], "expires_at": "2020-11-06T19:05:02.000000Z", "issued_at": "2020-11-06T18:05:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:02.440 37 INFO tempest.lib.common.rest_client [req-f87c5943-12c3-4e7e-8c0b-6a5618024360 ] Request (GroupsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:05:02.441 37 DEBUG tempest.lib.common.rest_client [req-f87c5943-12c3-4e7e-8c0b-6a5618024360 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f87c5943-12c3-4e7e-8c0b-6a5618024360', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["TJJMkZ3MRd6BnvSNaXK-Vg"], "expires_at": "2020-11-06T19:05:02.000000Z", "issued_at": "2020-11-06T18:05:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:02.495 37 INFO tempest.lib.common.rest_client [req-4abecf47-e580-4abd-b07c-dedaf28432e8 ] Request (GroupsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.052s 2020-11-06 18:05:02.495 37 DEBUG tempest.lib.common.rest_client [req-4abecf47-e580-4abd-b07c-dedaf28432e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4abecf47-e580-4abd-b07c-dedaf28432e8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:02.548 37 INFO tempest.lib.common.rest_client [req-6c930e4b-f03f-44b5-bebd-8139fd2c35e2 ] Request (GroupsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.052s 2020-11-06 18:05:02.549 37 DEBUG tempest.lib.common.rest_client [req-6c930e4b-f03f-44b5-bebd-8139fd2c35e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6c930e4b-f03f-44b5-bebd-8139fd2c35e2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:02.550 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:05:02.550 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:02.607 37 INFO tempest.lib.common.rest_client [req-2ed76f56-e033-4286-97cd-245c7e645719 ] Request (GroupsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles 0.056s 2020-11-06 18:05:02.607 37 DEBUG tempest.lib.common.rest_client [req-2ed76f56-e033-4286-97cd-245c7e645719 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2ed76f56-e033-4286-97cd-245c7e645719', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:02.716 37 INFO tempest.lib.common.rest_client [req-85a88a89-d49c-477b-af58-bbafe9764a6f ] Request (GroupsV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles/72a4576c553448cd941b052c1ca0cf2d 0.107s 2020-11-06 18:05:02.716 37 DEBUG tempest.lib.common.rest_client [req-85a88a89-d49c-477b-af58-bbafe9764a6f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-85a88a89-d49c-477b-af58-bbafe9764a6f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:02.817 37 INFO tempest.lib.common.rest_client [req-cb09832b-7db7-4170-ae54-beaf2e91f64a ] Request (GroupsV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles/a629c95d64b3416fb80ae90af4f69c05 0.100s 2020-11-06 18:05:02.818 37 DEBUG tempest.lib.common.rest_client [req-cb09832b-7db7-4170-ae54-beaf2e91f64a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cb09832b-7db7-4170-ae54-beaf2e91f64a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:03.436 39 INFO tempest.lib.common.rest_client [req-12152786-38b4-4480-b8dd-152a2336878c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.227s 2020-11-06 18:05:03.436 39 DEBUG tempest.lib.common.rest_client [req-12152786-38b4-4480-b8dd-152a2336878c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-12152786-38b4-4480-b8dd-152a2336878c', 'x-compute-request-id': 'req-12152786-38b4-4480-b8dd-152a2336878c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:03.917 37 INFO tempest.lib.common.rest_client [req-d1c3091b-e78a-44f6-8ca1-97e1c7bce196 ] Request (GroupsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-11-06 18:05:03.918 37 DEBUG tempest.lib.common.rest_client [req-d1c3091b-e78a-44f6-8ca1-97e1c7bce196 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d1c3091b-e78a-44f6-8ca1-97e1c7bce196', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4df30aea665c4905921e3145ddee0163", "name": "tempest-GroupsV3RbacTest-330621733", "password_expires_at": null}, "audit_ids": ["jISDiOO8RdeBzs_QiZExJA"], "expires_at": "2020-11-06T19:05:03.000000Z", "issued_at": "2020-11-06T18:05:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c8922203e86b466eb1fafe17e3818538", "name": "tempest-GroupsV3RbacTest-330621733"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:04.174 37 INFO tempest.lib.common.rest_client [req-111f1f76-2400-4753-86b5-97c02669f59a ] Request (GroupsV3RbacTest:setUp): 200 POST http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/types 0.253s 2020-11-06 18:05:04.175 37 DEBUG tempest.lib.common.rest_client [req-111f1f76-2400-4753-86b5-97c02669f59a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-GroupsV3RbacTest-volume-type-112872409"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-111f1f76-2400-4753-86b5-97c02669f59a', 'content-length': '221', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-111f1f76-2400-4753-86b5-97c02669f59a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/types'} Body: b'{"volume_type": {"id": "f5268641-5705-484f-9f32-51cf88e70a5d", "name": "tempest-GroupsV3RbacTest-volume-type-112872409", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:04.222 37 INFO tempest.lib.common.rest_client [req-2039c2ec-ba1e-413d-a295-be5cd35296aa ] Request (GroupsV3RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/group_types 0.042s 2020-11-06 18:05:04.222 37 DEBUG tempest.lib.common.rest_client [req-2039c2ec-ba1e-413d-a295-be5cd35296aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupsV3RbacTest-group-type-226599466"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-2039c2ec-ba1e-413d-a295-be5cd35296aa', 'content-length': '178', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2039c2ec-ba1e-413d-a295-be5cd35296aa', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/group_types'} Body: b'{"group_type": {"id": "98d8b407-492b-49f9-84c3-5a20e571d2c7", "name": "tempest-GroupsV3RbacTest-group-type-226599466", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:04.226 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:05:04.229 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:create, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:05:04.230 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:04.387 37 INFO tempest.lib.common.rest_client [req-e27b99a0-14fc-479f-bc5f-1c2bb0e079fa ] Request (GroupsV3RbacTest:test_create_group): 200 GET http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles 0.156s 2020-11-06 18:05:04.388 37 DEBUG tempest.lib.common.rest_client [req-e27b99a0-14fc-479f-bc5f-1c2bb0e079fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e27b99a0-14fc-479f-bc5f-1c2bb0e079fa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:04.478 37 INFO tempest.lib.common.rest_client [req-1d685e77-3f2c-43e5-b734-8e633574ece1 ] Request (GroupsV3RbacTest:test_create_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-11-06 18:05:04.478 37 DEBUG tempest.lib.common.rest_client [req-1d685e77-3f2c-43e5-b734-8e633574ece1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1d685e77-3f2c-43e5-b734-8e633574ece1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4df30aea665c4905921e3145ddee0163", "name": "tempest-GroupsV3RbacTest-330621733", "password_expires_at": null}, "audit_ids": ["G4EczzM2SN-ujrkBW-_E1A"], "expires_at": "2020-11-06T19:05:04.000000Z", "issued_at": "2020-11-06T18:05:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c8922203e86b466eb1fafe17e3818538", "name": "tempest-GroupsV3RbacTest-330621733"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:04.682 39 INFO tempest.lib.common.rest_client [req-331ea491-2ef2-4843-9d9d-b210feb2e882 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.232s 2020-11-06 18:05:04.682 39 DEBUG tempest.lib.common.rest_client [req-331ea491-2ef2-4843-9d9d-b210feb2e882 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-331ea491-2ef2-4843-9d9d-b210feb2e882', 'x-compute-request-id': 'req-331ea491-2ef2-4843-9d9d-b210feb2e882', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:04.794 37 INFO tempest.lib.common.rest_client [req-92c7e638-7fdb-43d7-95e8-3e156f404dd1 ] Request (GroupsV3RbacTest:test_create_group): 202 POST http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups 0.315s 2020-11-06 18:05:04.794 37 DEBUG tempest.lib.common.rest_client [req-92c7e638-7fdb-43d7-95e8-3e156f404dd1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: {"group": {"name": "tempest-GroupsV3RbacTest-Group-1788792230", "group_type": "98d8b407-492b-49f9-84c3-5a20e571d2c7", "volume_types": ["f5268641-5705-484f-9f32-51cf88e70a5d"]}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-92c7e638-7fdb-43d7-95e8-3e156f404dd1', 'content-length': '110', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-92c7e638-7fdb-43d7-95e8-3e156f404dd1', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups'} Body: b'{"group": {"id": "74b5b74e-de4d-40f0-baeb-12d09db35c01", "name": "tempest-GroupsV3RbacTest-Group-1788792230"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:04.797 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:04.903 37 INFO tempest.lib.common.rest_client [req-8a527930-d1c6-4298-ac4d-51582d7ebb58 ] Request (GroupsV3RbacTest:test_create_group): 200 GET http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles 0.104s 2020-11-06 18:05:04.904 37 DEBUG tempest.lib.common.rest_client [req-8a527930-d1c6-4298-ac4d-51582d7ebb58 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8a527930-d1c6-4298-ac4d-51582d7ebb58', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:04.939 37 INFO tempest.lib.common.rest_client [req-59fb550b-88e4-4c43-b13d-7f0f64dc5255 ] Request (GroupsV3RbacTest:test_create_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:05:04.940 37 DEBUG tempest.lib.common.rest_client [req-59fb550b-88e4-4c43-b13d-7f0f64dc5255 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-59fb550b-88e4-4c43-b13d-7f0f64dc5255', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4df30aea665c4905921e3145ddee0163", "name": "tempest-GroupsV3RbacTest-330621733", "password_expires_at": null}, "audit_ids": ["k9dtrVySQD2Po4N01dPPWQ"], "expires_at": "2020-11-06T19:05:04.000000Z", "issued_at": "2020-11-06T18:05:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c8922203e86b466eb1fafe17e3818538", "name": "tempest-GroupsV3RbacTest-330621733"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:05.030 37 INFO tempest.lib.common.rest_client [req-bdb3728a-ac74-4985-b7a2-e0b21b38115c ] Request (GroupsV3RbacTest:test_create_group): 200 GET http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/74b5b74e-de4d-40f0-baeb-12d09db35c01 0.090s 2020-11-06 18:05:05.031 37 DEBUG tempest.lib.common.rest_client [req-bdb3728a-ac74-4985-b7a2-e0b21b38115c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-bdb3728a-ac74-4985-b7a2-e0b21b38115c', 'content-length': '339', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-bdb3728a-ac74-4985-b7a2-e0b21b38115c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/74b5b74e-de4d-40f0-baeb-12d09db35c01'} Body: b'{"group": {"id": "74b5b74e-de4d-40f0-baeb-12d09db35c01", "status": "available", "availability_zone": "nova", "created_at": "2020-11-06T18:05:05.000000", "name": "tempest-GroupsV3RbacTest-Group-1788792230", "description": null, "group_type": "98d8b407-492b-49f9-84c3-5a20e571d2c7", "volume_types": ["f5268641-5705-484f-9f32-51cf88e70a5d"]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:05.037 37 INFO tempest.common.waiters [-] group 74b5b74e-de4d-40f0-baeb-12d09db35c01 reached available after waiting for 0.037405 seconds 2020-11-06 18:05:05.096 37 INFO tempest.lib.common.rest_client [req-e2853ae1-d10b-431a-bcc2-8fcb94157736 ] Request (GroupsV3RbacTest:_run_cleanups): 202 POST http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/74b5b74e-de4d-40f0-baeb-12d09db35c01/action 0.058s 2020-11-06 18:05:05.097 37 DEBUG tempest.lib.common.rest_client [req-e2853ae1-d10b-431a-bcc2-8fcb94157736 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: {"delete": {"delete-volumes": true}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e2853ae1-d10b-431a-bcc2-8fcb94157736', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/74b5b74e-de4d-40f0-baeb-12d09db35c01/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:05.139 37 INFO tempest.lib.common.rest_client [req-2676aa57-7732-4aa1-9f73-34501b9adbea ] Request (GroupsV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/74b5b74e-de4d-40f0-baeb-12d09db35c01 0.041s 2020-11-06 18:05:05.139 37 DEBUG tempest.lib.common.rest_client [req-2676aa57-7732-4aa1-9f73-34501b9adbea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-2676aa57-7732-4aa1-9f73-34501b9adbea', 'content-length': '338', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2676aa57-7732-4aa1-9f73-34501b9adbea', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/74b5b74e-de4d-40f0-baeb-12d09db35c01'} Body: b'{"group": {"id": "74b5b74e-de4d-40f0-baeb-12d09db35c01", "status": "deleting", "availability_zone": "nova", "created_at": "2020-11-06T18:05:05.000000", "name": "tempest-GroupsV3RbacTest-Group-1788792230", "description": null, "group_type": "98d8b407-492b-49f9-84c3-5a20e571d2c7", "volume_types": ["f5268641-5705-484f-9f32-51cf88e70a5d"]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:05.899 39 INFO tempest.lib.common.rest_client [req-ecde49ae-fb17-45f2-904c-74dc5fc202a6 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.202s 2020-11-06 18:05:05.900 39 DEBUG tempest.lib.common.rest_client [req-ecde49ae-fb17-45f2-904c-74dc5fc202a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ecde49ae-fb17-45f2-904c-74dc5fc202a6', 'x-compute-request-id': 'req-ecde49ae-fb17-45f2-904c-74dc5fc202a6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:06.163 37 INFO tempest.lib.common.rest_client [req-ba536557-af12-4fb9-8cdc-eabb3cbddc1f ] Request (GroupsV3RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/74b5b74e-de4d-40f0-baeb-12d09db35c01 0.016s 2020-11-06 18:05:06.164 37 DEBUG tempest.lib.common.rest_client [req-ba536557-af12-4fb9-8cdc-eabb3cbddc1f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'content-length': '108', 'content-type': 'application/json', 'x-compute-request-id': 'req-ba536557-af12-4fb9-8cdc-eabb3cbddc1f', 'x-openstack-request-id': 'req-ba536557-af12-4fb9-8cdc-eabb3cbddc1f', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/74b5b74e-de4d-40f0-baeb-12d09db35c01'} Body: b'{"itemNotFound": {"code": 404, "message": "Group 74b5b74e-de4d-40f0-baeb-12d09db35c01 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:06.217 37 INFO tempest.lib.common.rest_client [req-9ccf975c-a8f5-4ec9-af1a-158376a422f5 ] Request (GroupsV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/volumes/detail?all_tenants=True 0.051s 2020-11-06 18:05:06.217 37 DEBUG tempest.lib.common.rest_client [req-9ccf975c-a8f5-4ec9-af1a-158376a422f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-9ccf975c-a8f5-4ec9-af1a-158376a422f5', 'content-length': '15', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9ccf975c-a8f5-4ec9-af1a-158376a422f5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/volumes/detail?all_tenants=True'} Body: b'{"volumes": []}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:06.274 37 INFO tempest.lib.common.rest_client [req-e712578d-85cd-4369-9365-30ac4103c8e0 ] Request (GroupsV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/group_types/98d8b407-492b-49f9-84c3-5a20e571d2c7 0.045s 2020-11-06 18:05:06.275 37 DEBUG tempest.lib.common.rest_client [req-e712578d-85cd-4369-9365-30ac4103c8e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e712578d-85cd-4369-9365-30ac4103c8e0', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/group_types/98d8b407-492b-49f9-84c3-5a20e571d2c7'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:06.323 37 INFO tempest.lib.common.rest_client [req-64e3c960-d34c-4579-a9c7-afc6af19fb65 ] Request (GroupsV3RbacTest:setUp): 200 POST http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/types 0.045s 2020-11-06 18:05:06.323 37 DEBUG tempest.lib.common.rest_client [req-64e3c960-d34c-4579-a9c7-afc6af19fb65 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-GroupsV3RbacTest-volume-type-722291358"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-64e3c960-d34c-4579-a9c7-afc6af19fb65', 'content-length': '221', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-64e3c960-d34c-4579-a9c7-afc6af19fb65', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/types'} Body: b'{"volume_type": {"id": "6070f8ed-6c49-4ee6-b26e-66647b201ac1", "name": "tempest-GroupsV3RbacTest-volume-type-722291358", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:06.372 37 INFO tempest.lib.common.rest_client [req-ccf3104f-99e7-4e1f-a58a-c7e54913f9e5 ] Request (GroupsV3RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/group_types 0.044s 2020-11-06 18:05:06.372 37 DEBUG tempest.lib.common.rest_client [req-ccf3104f-99e7-4e1f-a58a-c7e54913f9e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupsV3RbacTest-group-type-672105125"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ccf3104f-99e7-4e1f-a58a-c7e54913f9e5', 'content-length': '178', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ccf3104f-99e7-4e1f-a58a-c7e54913f9e5', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/group_types'} Body: b'{"group_type": {"id": "487ee3d2-9853-4a09-891d-909ed7596210", "name": "tempest-GroupsV3RbacTest-group-type-672105125", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:06.376 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:05:06.379 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:delete, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:05:06.471 37 INFO tempest.lib.common.rest_client [req-52a66f31-d5a5-4d46-85f2-903f70606deb ] Request (GroupsV3RbacTest:test_delete_group): 202 POST http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups 0.090s 2020-11-06 18:05:06.471 37 DEBUG tempest.lib.common.rest_client [req-52a66f31-d5a5-4d46-85f2-903f70606deb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: {"group": {"name": "tempest-GroupsV3RbacTest-Group-1054572614", "group_type": "487ee3d2-9853-4a09-891d-909ed7596210", "volume_types": ["6070f8ed-6c49-4ee6-b26e-66647b201ac1"]}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-52a66f31-d5a5-4d46-85f2-903f70606deb', 'content-length': '110', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-52a66f31-d5a5-4d46-85f2-903f70606deb', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups'} Body: b'{"group": {"id": "1287c4a9-ea88-4dbf-972f-f31ee3bd44c0", "name": "tempest-GroupsV3RbacTest-Group-1054572614"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:06.529 37 INFO tempest.lib.common.rest_client [req-5404be09-af7a-4618-947e-4e260f5a23b9 ] Request (GroupsV3RbacTest:test_delete_group): 200 GET http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/1287c4a9-ea88-4dbf-972f-f31ee3bd44c0 0.054s 2020-11-06 18:05:06.530 37 DEBUG tempest.lib.common.rest_client [req-5404be09-af7a-4618-947e-4e260f5a23b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-5404be09-af7a-4618-947e-4e260f5a23b9', 'content-length': '338', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5404be09-af7a-4618-947e-4e260f5a23b9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/1287c4a9-ea88-4dbf-972f-f31ee3bd44c0'} Body: b'{"group": {"id": "1287c4a9-ea88-4dbf-972f-f31ee3bd44c0", "status": "creating", "availability_zone": "nova", "created_at": "2020-11-06T18:05:06.000000", "name": "tempest-GroupsV3RbacTest-Group-1054572614", "description": null, "group_type": "487ee3d2-9853-4a09-891d-909ed7596210", "volume_types": ["6070f8ed-6c49-4ee6-b26e-66647b201ac1"]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:07.131 39 INFO tempest.lib.common.rest_client [req-c8270190-45bd-4d80-a835-9c3736ef6be1 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.214s 2020-11-06 18:05:07.131 39 DEBUG tempest.lib.common.rest_client [req-c8270190-45bd-4d80-a835-9c3736ef6be1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c8270190-45bd-4d80-a835-9c3736ef6be1', 'x-compute-request-id': 'req-c8270190-45bd-4d80-a835-9c3736ef6be1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:07.574 37 INFO tempest.lib.common.rest_client [req-4276aa30-167d-4022-ba8d-e416b9839681 ] Request (GroupsV3RbacTest:test_delete_group): 200 GET http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/1287c4a9-ea88-4dbf-972f-f31ee3bd44c0 0.037s 2020-11-06 18:05:07.575 37 DEBUG tempest.lib.common.rest_client [req-4276aa30-167d-4022-ba8d-e416b9839681 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4276aa30-167d-4022-ba8d-e416b9839681', 'content-length': '339', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4276aa30-167d-4022-ba8d-e416b9839681', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/1287c4a9-ea88-4dbf-972f-f31ee3bd44c0'} Body: b'{"group": {"id": "1287c4a9-ea88-4dbf-972f-f31ee3bd44c0", "status": "available", "availability_zone": "nova", "created_at": "2020-11-06T18:05:07.000000", "name": "tempest-GroupsV3RbacTest-Group-1054572614", "description": null, "group_type": "487ee3d2-9853-4a09-891d-909ed7596210", "volume_types": ["6070f8ed-6c49-4ee6-b26e-66647b201ac1"]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:07.580 37 INFO tempest.common.waiters [-] group 1287c4a9-ea88-4dbf-972f-f31ee3bd44c0 reached available after waiting for 1.580596 seconds 2020-11-06 18:05:07.580 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:07.637 37 INFO tempest.lib.common.rest_client [req-7353d6eb-6e40-4334-bb31-b5d515bd7ad2 ] Request (GroupsV3RbacTest:test_delete_group): 200 GET http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles 0.056s 2020-11-06 18:05:07.638 37 DEBUG tempest.lib.common.rest_client [req-7353d6eb-6e40-4334-bb31-b5d515bd7ad2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7353d6eb-6e40-4334-bb31-b5d515bd7ad2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:07.676 37 INFO tempest.lib.common.rest_client [req-fdf0c801-80b6-4529-81e1-6e87a5ec9807 ] Request (GroupsV3RbacTest:test_delete_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:05:07.677 37 DEBUG tempest.lib.common.rest_client [req-fdf0c801-80b6-4529-81e1-6e87a5ec9807 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fdf0c801-80b6-4529-81e1-6e87a5ec9807', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4df30aea665c4905921e3145ddee0163", "name": "tempest-GroupsV3RbacTest-330621733", "password_expires_at": null}, "audit_ids": ["IFhwr20UQfG1C_YpuXYsIg"], "expires_at": "2020-11-06T19:05:07.000000Z", "issued_at": "2020-11-06T18:05:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c8922203e86b466eb1fafe17e3818538", "name": "tempest-GroupsV3RbacTest-330621733"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:07.814 37 INFO tempest.lib.common.rest_client [req-7502cb08-44de-4cee-9990-9c6a9603cca2 ] Request (GroupsV3RbacTest:test_delete_group): 202 POST http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/1287c4a9-ea88-4dbf-972f-f31ee3bd44c0/action 0.135s 2020-11-06 18:05:07.814 37 DEBUG tempest.lib.common.rest_client [req-7502cb08-44de-4cee-9990-9c6a9603cca2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: {"delete": {"delete-volumes": true}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7502cb08-44de-4cee-9990-9c6a9603cca2', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/1287c4a9-ea88-4dbf-972f-f31ee3bd44c0/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:07.815 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:07.866 37 INFO tempest.lib.common.rest_client [req-dfd14909-7037-4373-ad09-70be6dd0cb4e ] Request (GroupsV3RbacTest:test_delete_group): 200 GET http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles 0.051s 2020-11-06 18:05:07.867 37 DEBUG tempest.lib.common.rest_client [req-dfd14909-7037-4373-ad09-70be6dd0cb4e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dfd14909-7037-4373-ad09-70be6dd0cb4e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:07.905 37 INFO tempest.lib.common.rest_client [req-30be5418-45c5-4984-aae8-f44c3901f864 ] Request (GroupsV3RbacTest:test_delete_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:05:07.906 37 DEBUG tempest.lib.common.rest_client [req-30be5418-45c5-4984-aae8-f44c3901f864 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-30be5418-45c5-4984-aae8-f44c3901f864', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4df30aea665c4905921e3145ddee0163", "name": "tempest-GroupsV3RbacTest-330621733", "password_expires_at": null}, "audit_ids": ["QFTBBonFQ6G_Cb8tZk8Z1g"], "expires_at": "2020-11-06T19:05:07.000000Z", "issued_at": "2020-11-06T18:05:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c8922203e86b466eb1fafe17e3818538", "name": "tempest-GroupsV3RbacTest-330621733"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:07.988 37 INFO tempest.lib.common.rest_client [req-682e0194-43c1-4701-8995-9bf6d5cad083 ] Request (GroupsV3RbacTest:test_delete_group): 404 GET http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/1287c4a9-ea88-4dbf-972f-f31ee3bd44c0 0.081s 2020-11-06 18:05:07.989 37 DEBUG tempest.lib.common.rest_client [req-682e0194-43c1-4701-8995-9bf6d5cad083 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'content-length': '108', 'content-type': 'application/json', 'x-compute-request-id': 'req-682e0194-43c1-4701-8995-9bf6d5cad083', 'x-openstack-request-id': 'req-682e0194-43c1-4701-8995-9bf6d5cad083', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/1287c4a9-ea88-4dbf-972f-f31ee3bd44c0'} Body: b'{"itemNotFound": {"code": 404, "message": "Group 1287c4a9-ea88-4dbf-972f-f31ee3bd44c0 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:08.044 37 INFO tempest.lib.common.rest_client [req-a2d57512-c2a3-4e9f-aa14-52b830ef1a58 ] Request (GroupsV3RbacTest:test_delete_group): 200 GET http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/volumes/detail?all_tenants=True 0.054s 2020-11-06 18:05:08.045 37 DEBUG tempest.lib.common.rest_client [req-a2d57512-c2a3-4e9f-aa14-52b830ef1a58 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a2d57512-c2a3-4e9f-aa14-52b830ef1a58', 'content-length': '15', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a2d57512-c2a3-4e9f-aa14-52b830ef1a58', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/volumes/detail?all_tenants=True'} Body: b'{"volumes": []}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:08.076 37 INFO tempest.lib.common.rest_client [req-7349f6ac-11fd-4b9f-bffa-0a793dfa2866 ] Request (GroupsV3RbacTest:_run_cleanups): 404 POST http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/1287c4a9-ea88-4dbf-972f-f31ee3bd44c0/action 0.016s 2020-11-06 18:05:08.077 37 DEBUG tempest.lib.common.rest_client [req-7349f6ac-11fd-4b9f-bffa-0a793dfa2866 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: {"delete": {"delete-volumes": true}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'content-length': '108', 'content-type': 'application/json', 'x-compute-request-id': 'req-7349f6ac-11fd-4b9f-bffa-0a793dfa2866', 'x-openstack-request-id': 'req-7349f6ac-11fd-4b9f-bffa-0a793dfa2866', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/1287c4a9-ea88-4dbf-972f-f31ee3bd44c0/action'} Body: b'{"itemNotFound": {"code": 404, "message": "Group 1287c4a9-ea88-4dbf-972f-f31ee3bd44c0 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:08.126 37 INFO tempest.lib.common.rest_client [req-3369d619-9e9b-4fa5-8e24-47cf99b57860 ] Request (GroupsV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/group_types/487ee3d2-9853-4a09-891d-909ed7596210 0.048s 2020-11-06 18:05:08.127 37 DEBUG tempest.lib.common.rest_client [req-3369d619-9e9b-4fa5-8e24-47cf99b57860 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3369d619-9e9b-4fa5-8e24-47cf99b57860', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/group_types/487ee3d2-9853-4a09-891d-909ed7596210'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:08.168 37 INFO tempest.lib.common.rest_client [req-783f12bb-63ac-4156-ba80-041cd178416d ] Request (GroupsV3RbacTest:setUp): 200 POST http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/types 0.038s 2020-11-06 18:05:08.169 37 DEBUG tempest.lib.common.rest_client [req-783f12bb-63ac-4156-ba80-041cd178416d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-GroupsV3RbacTest-volume-type-1655518568"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-783f12bb-63ac-4156-ba80-041cd178416d', 'content-length': '222', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-783f12bb-63ac-4156-ba80-041cd178416d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/types'} Body: b'{"volume_type": {"id": "4117b0de-ad01-41f9-9476-4a7f7e7b6196", "name": "tempest-GroupsV3RbacTest-volume-type-1655518568", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:08.223 37 INFO tempest.lib.common.rest_client [req-c5c1e60e-3647-4eaf-ae49-ea8a4156f9f1 ] Request (GroupsV3RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/group_types 0.050s 2020-11-06 18:05:08.224 37 DEBUG tempest.lib.common.rest_client [req-c5c1e60e-3647-4eaf-ae49-ea8a4156f9f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupsV3RbacTest-group-type-97660514"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c5c1e60e-3647-4eaf-ae49-ea8a4156f9f1', 'content-length': '177', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c5c1e60e-3647-4eaf-ae49-ea8a4156f9f1', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/group_types'} Body: b'{"group_type": {"id": "a6919936-271f-48f1-a563-819be69c04fd", "name": "tempest-GroupsV3RbacTest-group-type-97660514", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:08.228 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:05:08.231 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:get_all, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:05:08.232 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:08.281 37 INFO tempest.lib.common.rest_client [req-07ac88c3-c47c-4943-875f-5ec1cb546449 ] Request (GroupsV3RbacTest:test_list_groups): 200 GET http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles 0.048s 2020-11-06 18:05:08.282 37 DEBUG tempest.lib.common.rest_client [req-07ac88c3-c47c-4943-875f-5ec1cb546449 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-07ac88c3-c47c-4943-875f-5ec1cb546449', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:08.315 37 INFO tempest.lib.common.rest_client [req-efaf02bc-78be-4773-bd4f-e3ec60505c9f ] Request (GroupsV3RbacTest:test_list_groups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:05:08.316 37 DEBUG tempest.lib.common.rest_client [req-efaf02bc-78be-4773-bd4f-e3ec60505c9f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-efaf02bc-78be-4773-bd4f-e3ec60505c9f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4df30aea665c4905921e3145ddee0163", "name": "tempest-GroupsV3RbacTest-330621733", "password_expires_at": null}, "audit_ids": ["6Ctyyo5SQKqsc_o8J_a-8g"], "expires_at": "2020-11-06T19:05:08.000000Z", "issued_at": "2020-11-06T18:05:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c8922203e86b466eb1fafe17e3818538", "name": "tempest-GroupsV3RbacTest-330621733"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:08.352 39 INFO tempest.lib.common.rest_client [req-951b38a9-02e2-4eeb-b39b-4fd911405fe4 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.207s 2020-11-06 18:05:08.353 39 DEBUG tempest.lib.common.rest_client [req-951b38a9-02e2-4eeb-b39b-4fd911405fe4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-951b38a9-02e2-4eeb-b39b-4fd911405fe4', 'x-compute-request-id': 'req-951b38a9-02e2-4eeb-b39b-4fd911405fe4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:08.396 37 INFO tempest.lib.common.rest_client [req-0a094d33-f540-4a55-b006-905c218fe3dc ] Request (GroupsV3RbacTest:test_list_groups): 200 GET http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups 0.079s 2020-11-06 18:05:08.396 37 DEBUG tempest.lib.common.rest_client [req-0a094d33-f540-4a55-b006-905c218fe3dc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-0a094d33-f540-4a55-b006-905c218fe3dc', 'content-length': '14', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0a094d33-f540-4a55-b006-905c218fe3dc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups'} Body: b'{"groups": []}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:08.399 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:08.452 37 INFO tempest.lib.common.rest_client [req-0c0966df-07cc-49ca-aaca-43bafae0cce4 ] Request (GroupsV3RbacTest:test_list_groups): 200 GET http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles 0.051s 2020-11-06 18:05:08.452 37 DEBUG tempest.lib.common.rest_client [req-0c0966df-07cc-49ca-aaca-43bafae0cce4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0c0966df-07cc-49ca-aaca-43bafae0cce4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:08.489 37 INFO tempest.lib.common.rest_client [req-8cdbc9c4-6020-4566-97f4-7ad97f604bb7 ] Request (GroupsV3RbacTest:test_list_groups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:05:08.490 37 DEBUG tempest.lib.common.rest_client [req-8cdbc9c4-6020-4566-97f4-7ad97f604bb7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8cdbc9c4-6020-4566-97f4-7ad97f604bb7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4df30aea665c4905921e3145ddee0163", "name": "tempest-GroupsV3RbacTest-330621733", "password_expires_at": null}, "audit_ids": ["CzeyWqaVToqXATHUm33PMA"], "expires_at": "2020-11-06T19:05:08.000000Z", "issued_at": "2020-11-06T18:05:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c8922203e86b466eb1fafe17e3818538", "name": "tempest-GroupsV3RbacTest-330621733"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:08.608 37 INFO tempest.lib.common.rest_client [req-4a195f5f-27a7-41a3-8383-5d29dc277591 ] Request (GroupsV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/group_types/a6919936-271f-48f1-a563-819be69c04fd 0.116s 2020-11-06 18:05:08.608 37 DEBUG tempest.lib.common.rest_client [req-4a195f5f-27a7-41a3-8383-5d29dc277591 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4a195f5f-27a7-41a3-8383-5d29dc277591', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/group_types/a6919936-271f-48f1-a563-819be69c04fd'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:08.658 37 INFO tempest.lib.common.rest_client [req-22d800ab-ee27-4e61-a14a-5deaaf67bc01 ] Request (GroupsV3RbacTest:setUp): 200 POST http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/types 0.047s 2020-11-06 18:05:08.659 37 DEBUG tempest.lib.common.rest_client [req-22d800ab-ee27-4e61-a14a-5deaaf67bc01 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-GroupsV3RbacTest-volume-type-1886289684"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-22d800ab-ee27-4e61-a14a-5deaaf67bc01', 'content-length': '222', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-22d800ab-ee27-4e61-a14a-5deaaf67bc01', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/types'} Body: b'{"volume_type": {"id": "d0bfb8ae-d085-4899-b263-84c5ba4dc4ae", "name": "tempest-GroupsV3RbacTest-volume-type-1886289684", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:08.709 37 INFO tempest.lib.common.rest_client [req-7d7cca6f-aae7-457b-96e3-7750e30ae918 ] Request (GroupsV3RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/group_types 0.046s 2020-11-06 18:05:08.710 37 DEBUG tempest.lib.common.rest_client [req-7d7cca6f-aae7-457b-96e3-7750e30ae918 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupsV3RbacTest-group-type-728753737"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-7d7cca6f-aae7-457b-96e3-7750e30ae918', 'content-length': '178', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7d7cca6f-aae7-457b-96e3-7750e30ae918', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/group_types'} Body: b'{"group_type": {"id": "3f12288f-c03f-4684-9191-a8922a9bb0a4", "name": "tempest-GroupsV3RbacTest-group-type-728753737", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:08.713 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:05:08.717 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:get_all, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:05:08.717 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:08.771 37 INFO tempest.lib.common.rest_client [req-cae13028-f2d2-4b5c-9966-b3dc9aac8658 ] Request (GroupsV3RbacTest:test_list_groups_with_details): 200 GET http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles 0.052s 2020-11-06 18:05:08.772 37 DEBUG tempest.lib.common.rest_client [req-cae13028-f2d2-4b5c-9966-b3dc9aac8658 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cae13028-f2d2-4b5c-9966-b3dc9aac8658', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:08.806 37 INFO tempest.lib.common.rest_client [req-238d539c-b270-4a9a-af90-08f9c9ef07b7 ] Request (GroupsV3RbacTest:test_list_groups_with_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:05:08.807 37 DEBUG tempest.lib.common.rest_client [req-238d539c-b270-4a9a-af90-08f9c9ef07b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-238d539c-b270-4a9a-af90-08f9c9ef07b7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4df30aea665c4905921e3145ddee0163", "name": "tempest-GroupsV3RbacTest-330621733", "password_expires_at": null}, "audit_ids": ["isoKxPVCQYaSO64TSQt8NA"], "expires_at": "2020-11-06T19:05:08.000000Z", "issued_at": "2020-11-06T18:05:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c8922203e86b466eb1fafe17e3818538", "name": "tempest-GroupsV3RbacTest-330621733"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:08.903 37 INFO tempest.lib.common.rest_client [req-05f397d9-44b5-4073-8367-f3919f325d81 ] Request (GroupsV3RbacTest:test_list_groups_with_details): 200 GET http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/detail 0.095s 2020-11-06 18:05:08.904 37 DEBUG tempest.lib.common.rest_client [req-05f397d9-44b5-4073-8367-f3919f325d81 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-05f397d9-44b5-4073-8367-f3919f325d81', 'content-length': '14', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-05f397d9-44b5-4073-8367-f3919f325d81', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/detail'} Body: b'{"groups": []}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:08.908 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:08.962 37 INFO tempest.lib.common.rest_client [req-31b7643c-faae-4e5a-8f76-41c9f9be7f38 ] Request (GroupsV3RbacTest:test_list_groups_with_details): 200 GET http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles 0.053s 2020-11-06 18:05:08.963 37 DEBUG tempest.lib.common.rest_client [req-31b7643c-faae-4e5a-8f76-41c9f9be7f38 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-31b7643c-faae-4e5a-8f76-41c9f9be7f38', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:09.002 37 INFO tempest.lib.common.rest_client [req-16966c20-2331-4a93-bfed-382c346f1e34 ] Request (GroupsV3RbacTest:test_list_groups_with_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:05:09.003 37 DEBUG tempest.lib.common.rest_client [req-16966c20-2331-4a93-bfed-382c346f1e34 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-16966c20-2331-4a93-bfed-382c346f1e34', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4df30aea665c4905921e3145ddee0163", "name": "tempest-GroupsV3RbacTest-330621733", "password_expires_at": null}, "audit_ids": ["jPnKIUO6TJCiNJYGdDSC9w"], "expires_at": "2020-11-06T19:05:08.000000Z", "issued_at": "2020-11-06T18:05:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c8922203e86b466eb1fafe17e3818538", "name": "tempest-GroupsV3RbacTest-330621733"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:09.117 37 INFO tempest.lib.common.rest_client [req-ef69f54a-1e8b-4a0d-bbdc-39fb3d442806 ] Request (GroupsV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/group_types/3f12288f-c03f-4684-9191-a8922a9bb0a4 0.112s 2020-11-06 18:05:09.117 37 DEBUG tempest.lib.common.rest_client [req-ef69f54a-1e8b-4a0d-bbdc-39fb3d442806 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ef69f54a-1e8b-4a0d-bbdc-39fb3d442806', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/group_types/3f12288f-c03f-4684-9191-a8922a9bb0a4'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:09.162 37 INFO tempest.lib.common.rest_client [req-bd79a183-5902-42a1-b3b4-910a251f5a15 ] Request (GroupsV3RbacTest:setUp): 200 POST http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/types 0.043s 2020-11-06 18:05:09.162 37 DEBUG tempest.lib.common.rest_client [req-bd79a183-5902-42a1-b3b4-910a251f5a15 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-GroupsV3RbacTest-volume-type-1462109616"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-bd79a183-5902-42a1-b3b4-910a251f5a15', 'content-length': '222', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-bd79a183-5902-42a1-b3b4-910a251f5a15', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/types'} Body: b'{"volume_type": {"id": "ad215401-87c6-433a-9444-a9b293637661", "name": "tempest-GroupsV3RbacTest-volume-type-1462109616", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:09.219 37 INFO tempest.lib.common.rest_client [req-164ed1cf-41df-41d3-81da-0cb01bcbf386 ] Request (GroupsV3RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/group_types 0.049s 2020-11-06 18:05:09.219 37 DEBUG tempest.lib.common.rest_client [req-164ed1cf-41df-41d3-81da-0cb01bcbf386 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupsV3RbacTest-group-type-1218292136"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-164ed1cf-41df-41d3-81da-0cb01bcbf386', 'content-length': '179', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-164ed1cf-41df-41d3-81da-0cb01bcbf386', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/group_types'} Body: b'{"group_type": {"id": "e4d6aa56-ba41-41e2-ba7c-02f1f5ec856d", "name": "tempest-GroupsV3RbacTest-group-type-1218292136", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:09.223 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:05:09.226 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:get, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:05:09.343 37 INFO tempest.lib.common.rest_client [req-c799b0d8-9846-4859-b36c-9e9b79840a3d ] Request (GroupsV3RbacTest:test_show_group): 202 POST http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups 0.116s 2020-11-06 18:05:09.344 37 DEBUG tempest.lib.common.rest_client [req-c799b0d8-9846-4859-b36c-9e9b79840a3d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: {"group": {"name": "tempest-GroupsV3RbacTest-Group-2095886989", "group_type": "e4d6aa56-ba41-41e2-ba7c-02f1f5ec856d", "volume_types": ["ad215401-87c6-433a-9444-a9b293637661"]}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c799b0d8-9846-4859-b36c-9e9b79840a3d', 'content-length': '110', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c799b0d8-9846-4859-b36c-9e9b79840a3d', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups'} Body: b'{"group": {"id": "5c049aea-e909-47c5-805c-b86b9a614c97", "name": "tempest-GroupsV3RbacTest-Group-2095886989"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:09.388 37 INFO tempest.lib.common.rest_client [req-2215560a-f00b-4b66-b2a3-431e66acccd3 ] Request (GroupsV3RbacTest:test_show_group): 200 GET http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/5c049aea-e909-47c5-805c-b86b9a614c97 0.041s 2020-11-06 18:05:09.389 37 DEBUG tempest.lib.common.rest_client [req-2215560a-f00b-4b66-b2a3-431e66acccd3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-2215560a-f00b-4b66-b2a3-431e66acccd3', 'content-length': '338', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2215560a-f00b-4b66-b2a3-431e66acccd3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/5c049aea-e909-47c5-805c-b86b9a614c97'} Body: b'{"group": {"id": "5c049aea-e909-47c5-805c-b86b9a614c97", "status": "creating", "availability_zone": "nova", "created_at": "2020-11-06T18:05:09.000000", "name": "tempest-GroupsV3RbacTest-Group-2095886989", "description": null, "group_type": "e4d6aa56-ba41-41e2-ba7c-02f1f5ec856d", "volume_types": ["ad215401-87c6-433a-9444-a9b293637661"]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:10.436 37 INFO tempest.lib.common.rest_client [req-2f3a842a-85ff-490a-92ac-f6c7f6c3b348 ] Request (GroupsV3RbacTest:test_show_group): 200 GET http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/5c049aea-e909-47c5-805c-b86b9a614c97 0.040s 2020-11-06 18:05:10.436 37 DEBUG tempest.lib.common.rest_client [req-2f3a842a-85ff-490a-92ac-f6c7f6c3b348 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-2f3a842a-85ff-490a-92ac-f6c7f6c3b348', 'content-length': '339', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2f3a842a-85ff-490a-92ac-f6c7f6c3b348', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/5c049aea-e909-47c5-805c-b86b9a614c97'} Body: b'{"group": {"id": "5c049aea-e909-47c5-805c-b86b9a614c97", "status": "available", "availability_zone": "nova", "created_at": "2020-11-06T18:05:09.000000", "name": "tempest-GroupsV3RbacTest-Group-2095886989", "description": null, "group_type": "e4d6aa56-ba41-41e2-ba7c-02f1f5ec856d", "volume_types": ["ad215401-87c6-433a-9444-a9b293637661"]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:10.442 37 INFO tempest.common.waiters [-] group 5c049aea-e909-47c5-805c-b86b9a614c97 reached available after waiting for 1.442827 seconds 2020-11-06 18:05:10.443 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:10.496 37 INFO tempest.lib.common.rest_client [req-b00767f5-bafc-41db-bb20-befd8e24cd3e ] Request (GroupsV3RbacTest:test_show_group): 200 GET http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles 0.051s 2020-11-06 18:05:10.496 37 DEBUG tempest.lib.common.rest_client [req-b00767f5-bafc-41db-bb20-befd8e24cd3e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b00767f5-bafc-41db-bb20-befd8e24cd3e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:10.532 37 INFO tempest.lib.common.rest_client [req-35b074d1-2e80-4818-9a37-a72d72567099 ] Request (GroupsV3RbacTest:test_show_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:05:10.533 37 DEBUG tempest.lib.common.rest_client [req-35b074d1-2e80-4818-9a37-a72d72567099 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-35b074d1-2e80-4818-9a37-a72d72567099', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4df30aea665c4905921e3145ddee0163", "name": "tempest-GroupsV3RbacTest-330621733", "password_expires_at": null}, "audit_ids": ["jEtvdRD9Qi6PfQKD6kC7Pg"], "expires_at": "2020-11-06T19:05:10.000000Z", "issued_at": "2020-11-06T18:05:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c8922203e86b466eb1fafe17e3818538", "name": "tempest-GroupsV3RbacTest-330621733"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:10.647 37 INFO tempest.lib.common.rest_client [req-82e3b96b-2ee2-40c2-ae2c-0f9d5e8bf67a ] Request (GroupsV3RbacTest:test_show_group): 200 GET http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/5c049aea-e909-47c5-805c-b86b9a614c97 0.113s 2020-11-06 18:05:10.648 37 DEBUG tempest.lib.common.rest_client [req-82e3b96b-2ee2-40c2-ae2c-0f9d5e8bf67a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-82e3b96b-2ee2-40c2-ae2c-0f9d5e8bf67a', 'content-length': '339', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-82e3b96b-2ee2-40c2-ae2c-0f9d5e8bf67a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/5c049aea-e909-47c5-805c-b86b9a614c97'} Body: b'{"group": {"id": "5c049aea-e909-47c5-805c-b86b9a614c97", "status": "available", "availability_zone": "nova", "created_at": "2020-11-06T18:05:09.000000", "name": "tempest-GroupsV3RbacTest-Group-2095886989", "description": null, "group_type": "e4d6aa56-ba41-41e2-ba7c-02f1f5ec856d", "volume_types": ["ad215401-87c6-433a-9444-a9b293637661"]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:10.655 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:10.698 39 INFO tempest.lib.common.rest_client [req-18991a58-c654-46ab-8dfd-0e93288d5b98 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 1.328s 2020-11-06 18:05:10.699 39 DEBUG tempest.lib.common.rest_client [req-18991a58-c654-46ab-8dfd-0e93288d5b98 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-18991a58-c654-46ab-8dfd-0e93288d5b98', 'x-compute-request-id': 'req-18991a58-c654-46ab-8dfd-0e93288d5b98', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:10.708 37 INFO tempest.lib.common.rest_client [req-a892d34d-4c6a-403f-b4b1-7f638b340f95 ] Request (GroupsV3RbacTest:test_show_group): 200 GET http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles 0.053s 2020-11-06 18:05:10.709 37 DEBUG tempest.lib.common.rest_client [req-a892d34d-4c6a-403f-b4b1-7f638b340f95 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a892d34d-4c6a-403f-b4b1-7f638b340f95', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:10.742 37 INFO tempest.lib.common.rest_client [req-c9d5b33a-dc38-4333-bd35-a885873fe805 ] Request (GroupsV3RbacTest:test_show_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:05:10.743 37 DEBUG tempest.lib.common.rest_client [req-c9d5b33a-dc38-4333-bd35-a885873fe805 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c9d5b33a-dc38-4333-bd35-a885873fe805', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4df30aea665c4905921e3145ddee0163", "name": "tempest-GroupsV3RbacTest-330621733", "password_expires_at": null}, "audit_ids": ["MwBpsG-xSY2xBOOlpPMnyQ"], "expires_at": "2020-11-06T19:05:10.000000Z", "issued_at": "2020-11-06T18:05:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c8922203e86b466eb1fafe17e3818538", "name": "tempest-GroupsV3RbacTest-330621733"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:10.903 37 INFO tempest.lib.common.rest_client [req-f9d062eb-2ef8-44c1-8ce4-0f2e6ea535a4 ] Request (GroupsV3RbacTest:_run_cleanups): 202 POST http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/5c049aea-e909-47c5-805c-b86b9a614c97/action 0.158s 2020-11-06 18:05:10.903 37 DEBUG tempest.lib.common.rest_client [req-f9d062eb-2ef8-44c1-8ce4-0f2e6ea535a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: {"delete": {"delete-volumes": true}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f9d062eb-2ef8-44c1-8ce4-0f2e6ea535a4', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/5c049aea-e909-47c5-805c-b86b9a614c97/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:10.947 37 INFO tempest.lib.common.rest_client [req-898755c4-98a9-425a-86b7-689d400e875a ] Request (GroupsV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/5c049aea-e909-47c5-805c-b86b9a614c97 0.042s 2020-11-06 18:05:10.948 37 DEBUG tempest.lib.common.rest_client [req-898755c4-98a9-425a-86b7-689d400e875a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-898755c4-98a9-425a-86b7-689d400e875a', 'content-length': '338', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-898755c4-98a9-425a-86b7-689d400e875a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/5c049aea-e909-47c5-805c-b86b9a614c97'} Body: b'{"group": {"id": "5c049aea-e909-47c5-805c-b86b9a614c97", "status": "deleting", "availability_zone": "nova", "created_at": "2020-11-06T18:05:09.000000", "name": "tempest-GroupsV3RbacTest-Group-2095886989", "description": null, "group_type": "e4d6aa56-ba41-41e2-ba7c-02f1f5ec856d", "volume_types": ["ad215401-87c6-433a-9444-a9b293637661"]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:11.972 37 INFO tempest.lib.common.rest_client [req-1552fc14-eaf6-4743-a1d4-4572558f7040 ] Request (GroupsV3RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/5c049aea-e909-47c5-805c-b86b9a614c97 0.019s 2020-11-06 18:05:11.973 37 DEBUG tempest.lib.common.rest_client [req-1552fc14-eaf6-4743-a1d4-4572558f7040 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'content-length': '108', 'content-type': 'application/json', 'x-compute-request-id': 'req-1552fc14-eaf6-4743-a1d4-4572558f7040', 'x-openstack-request-id': 'req-1552fc14-eaf6-4743-a1d4-4572558f7040', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/5c049aea-e909-47c5-805c-b86b9a614c97'} Body: b'{"itemNotFound": {"code": 404, "message": "Group 5c049aea-e909-47c5-805c-b86b9a614c97 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:12.029 39 INFO tempest.lib.common.rest_client [req-dcceb3c8-fa3f-400d-a83d-7dd30a0c236f ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.312s 2020-11-06 18:05:12.030 39 DEBUG tempest.lib.common.rest_client [req-dcceb3c8-fa3f-400d-a83d-7dd30a0c236f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dcceb3c8-fa3f-400d-a83d-7dd30a0c236f', 'x-compute-request-id': 'req-dcceb3c8-fa3f-400d-a83d-7dd30a0c236f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:12.032 37 INFO tempest.lib.common.rest_client [req-a784f3fc-487c-4b7f-8b66-496875a965a5 ] Request (GroupsV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/volumes/detail?all_tenants=True 0.057s 2020-11-06 18:05:12.032 37 DEBUG tempest.lib.common.rest_client [req-a784f3fc-487c-4b7f-8b66-496875a965a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a784f3fc-487c-4b7f-8b66-496875a965a5', 'content-length': '15', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a784f3fc-487c-4b7f-8b66-496875a965a5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/volumes/detail?all_tenants=True'} Body: b'{"volumes": []}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:12.084 37 INFO tempest.lib.common.rest_client [req-be545d31-d52d-450f-ba56-4164180659f2 ] Request (GroupsV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/group_types/e4d6aa56-ba41-41e2-ba7c-02f1f5ec856d 0.037s 2020-11-06 18:05:12.085 37 DEBUG tempest.lib.common.rest_client [req-be545d31-d52d-450f-ba56-4164180659f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-be545d31-d52d-450f-ba56-4164180659f2', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/group_types/e4d6aa56-ba41-41e2-ba7c-02f1f5ec856d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:12.142 37 INFO tempest.lib.common.rest_client [req-6df2c3f0-0c0d-444a-94ae-a9d153a6b5ed ] Request (GroupsV3RbacTest:setUp): 200 POST http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/types 0.053s 2020-11-06 18:05:12.143 37 DEBUG tempest.lib.common.rest_client [req-6df2c3f0-0c0d-444a-94ae-a9d153a6b5ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-GroupsV3RbacTest-volume-type-47905886"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6df2c3f0-0c0d-444a-94ae-a9d153a6b5ed', 'content-length': '220', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6df2c3f0-0c0d-444a-94ae-a9d153a6b5ed', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/types'} Body: b'{"volume_type": {"id": "7b4b449b-2e43-402e-aa12-af91d8986745", "name": "tempest-GroupsV3RbacTest-volume-type-47905886", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:12.196 37 INFO tempest.lib.common.rest_client [req-479b1550-e8a8-45c9-a362-5e7408315214 ] Request (GroupsV3RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/group_types 0.048s 2020-11-06 18:05:12.196 37 DEBUG tempest.lib.common.rest_client [req-479b1550-e8a8-45c9-a362-5e7408315214 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupsV3RbacTest-group-type-555569252"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-479b1550-e8a8-45c9-a362-5e7408315214', 'content-length': '178', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-479b1550-e8a8-45c9-a362-5e7408315214', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/group_types'} Body: b'{"group_type": {"id": "4b8746ff-65cc-4bab-9989-52bf80a82126", "name": "tempest-GroupsV3RbacTest-group-type-555569252", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:12.200 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:05:12.203 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:update, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:05:12.308 37 INFO tempest.lib.common.rest_client [req-6b52ee82-7930-4e90-b526-eb6e2684195b ] Request (GroupsV3RbacTest:test_update_group): 202 POST http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups 0.105s 2020-11-06 18:05:12.309 37 DEBUG tempest.lib.common.rest_client [req-6b52ee82-7930-4e90-b526-eb6e2684195b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: {"group": {"name": "tempest-GroupsV3RbacTest-Group-1023471904", "group_type": "4b8746ff-65cc-4bab-9989-52bf80a82126", "volume_types": ["7b4b449b-2e43-402e-aa12-af91d8986745"]}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6b52ee82-7930-4e90-b526-eb6e2684195b', 'content-length': '110', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6b52ee82-7930-4e90-b526-eb6e2684195b', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups'} Body: b'{"group": {"id": "eefb8663-51b6-4280-ae9c-dbe856c40814", "name": "tempest-GroupsV3RbacTest-Group-1023471904"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:12.355 37 INFO tempest.lib.common.rest_client [req-f09fbd51-be11-4019-9add-9267db85335a ] Request (GroupsV3RbacTest:test_update_group): 200 GET http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/eefb8663-51b6-4280-ae9c-dbe856c40814 0.042s 2020-11-06 18:05:12.356 37 DEBUG tempest.lib.common.rest_client [req-f09fbd51-be11-4019-9add-9267db85335a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-f09fbd51-be11-4019-9add-9267db85335a', 'content-length': '338', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f09fbd51-be11-4019-9add-9267db85335a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/eefb8663-51b6-4280-ae9c-dbe856c40814'} Body: b'{"group": {"id": "eefb8663-51b6-4280-ae9c-dbe856c40814", "status": "creating", "availability_zone": "nova", "created_at": "2020-11-06T18:05:12.000000", "name": "tempest-GroupsV3RbacTest-Group-1023471904", "description": null, "group_type": "4b8746ff-65cc-4bab-9989-52bf80a82126", "volume_types": ["7b4b449b-2e43-402e-aa12-af91d8986745"]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:13.406 37 INFO tempest.lib.common.rest_client [req-29aa40a0-e5cd-4030-b62d-e5e0cba0d545 ] Request (GroupsV3RbacTest:test_update_group): 200 GET http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/eefb8663-51b6-4280-ae9c-dbe856c40814 0.043s 2020-11-06 18:05:13.407 37 DEBUG tempest.lib.common.rest_client [req-29aa40a0-e5cd-4030-b62d-e5e0cba0d545 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-29aa40a0-e5cd-4030-b62d-e5e0cba0d545', 'content-length': '339', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-29aa40a0-e5cd-4030-b62d-e5e0cba0d545', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/eefb8663-51b6-4280-ae9c-dbe856c40814'} Body: b'{"group": {"id": "eefb8663-51b6-4280-ae9c-dbe856c40814", "status": "available", "availability_zone": "nova", "created_at": "2020-11-06T18:05:12.000000", "name": "tempest-GroupsV3RbacTest-Group-1023471904", "description": null, "group_type": "4b8746ff-65cc-4bab-9989-52bf80a82126", "volume_types": ["7b4b449b-2e43-402e-aa12-af91d8986745"]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:13.413 37 INFO tempest.common.waiters [-] group eefb8663-51b6-4280-ae9c-dbe856c40814 reached available after waiting for 1.413773 seconds 2020-11-06 18:05:13.414 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:13.459 37 INFO tempest.lib.common.rest_client [req-b471af7e-9804-4a45-9743-25676ace4dc4 ] Request (GroupsV3RbacTest:test_update_group): 200 GET http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles 0.044s 2020-11-06 18:05:13.460 37 DEBUG tempest.lib.common.rest_client [req-b471af7e-9804-4a45-9743-25676ace4dc4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b471af7e-9804-4a45-9743-25676ace4dc4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:13.494 39 INFO tempest.lib.common.rest_client [req-8051ef3c-38a6-4cd7-a0d3-0d19c53463b5 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.447s 2020-11-06 18:05:13.494 39 DEBUG tempest.lib.common.rest_client [req-8051ef3c-38a6-4cd7-a0d3-0d19c53463b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8051ef3c-38a6-4cd7-a0d3-0d19c53463b5', 'x-compute-request-id': 'req-8051ef3c-38a6-4cd7-a0d3-0d19c53463b5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:13.498 37 INFO tempest.lib.common.rest_client [req-93044d72-937b-43aa-ac6a-107dbf60fdf2 ] Request (GroupsV3RbacTest:test_update_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:05:13.498 37 DEBUG tempest.lib.common.rest_client [req-93044d72-937b-43aa-ac6a-107dbf60fdf2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-93044d72-937b-43aa-ac6a-107dbf60fdf2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4df30aea665c4905921e3145ddee0163", "name": "tempest-GroupsV3RbacTest-330621733", "password_expires_at": null}, "audit_ids": ["CUSY47CSQM6e5YFYjhm4_w"], "expires_at": "2020-11-06T19:05:13.000000Z", "issued_at": "2020-11-06T18:05:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c8922203e86b466eb1fafe17e3818538", "name": "tempest-GroupsV3RbacTest-330621733"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:13.611 37 INFO tempest.lib.common.rest_client [req-4c447685-1686-48b6-ab02-d38b576fe858 ] Request (GroupsV3RbacTest:test_update_group): 202 PUT http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/eefb8663-51b6-4280-ae9c-dbe856c40814 0.112s 2020-11-06 18:05:13.612 37 DEBUG tempest.lib.common.rest_client [req-4c447685-1686-48b6-ab02-d38b576fe858 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: {"group": {"name": "tempest-GroupsV3RbacTest-Group-1577211088"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4c447685-1686-48b6-ab02-d38b576fe858', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/eefb8663-51b6-4280-ae9c-dbe856c40814'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:13.612 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:13.704 37 INFO tempest.lib.common.rest_client [req-43c68f90-ae89-4e64-accc-6d554f343c1f ] Request (GroupsV3RbacTest:test_update_group): 200 GET http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles 0.090s 2020-11-06 18:05:13.704 37 DEBUG tempest.lib.common.rest_client [req-43c68f90-ae89-4e64-accc-6d554f343c1f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-43c68f90-ae89-4e64-accc-6d554f343c1f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538/users/4df30aea665c4905921e3145ddee0163/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:13.786 37 INFO tempest.lib.common.rest_client [req-aeecad22-f9f0-4074-8f86-11faa8b1f47a ] Request (GroupsV3RbacTest:test_update_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.080s 2020-11-06 18:05:13.786 37 DEBUG tempest.lib.common.rest_client [req-aeecad22-f9f0-4074-8f86-11faa8b1f47a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aeecad22-f9f0-4074-8f86-11faa8b1f47a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4df30aea665c4905921e3145ddee0163", "name": "tempest-GroupsV3RbacTest-330621733", "password_expires_at": null}, "audit_ids": ["F9C6gD4wSKe9tKppHqL_4A"], "expires_at": "2020-11-06T19:05:13.000000Z", "issued_at": "2020-11-06T18:05:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c8922203e86b466eb1fafe17e3818538", "name": "tempest-GroupsV3RbacTest-330621733"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c8922203e86b466eb1fafe17e3818538", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:13.978 37 INFO tempest.lib.common.rest_client [req-00153167-4bea-48a3-b865-0a44f6906f8f ] Request (GroupsV3RbacTest:_run_cleanups): 202 POST http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/eefb8663-51b6-4280-ae9c-dbe856c40814/action 0.190s 2020-11-06 18:05:13.979 37 DEBUG tempest.lib.common.rest_client [req-00153167-4bea-48a3-b865-0a44f6906f8f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: {"delete": {"delete-volumes": true}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-00153167-4bea-48a3-b865-0a44f6906f8f', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/eefb8663-51b6-4280-ae9c-dbe856c40814/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:14.017 37 INFO tempest.lib.common.rest_client [req-ceab4f5c-6f84-4d3c-8356-87ba15926b7e ] Request (GroupsV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/eefb8663-51b6-4280-ae9c-dbe856c40814 0.037s 2020-11-06 18:05:14.018 37 DEBUG tempest.lib.common.rest_client [req-ceab4f5c-6f84-4d3c-8356-87ba15926b7e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ceab4f5c-6f84-4d3c-8356-87ba15926b7e', 'content-length': '338', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ceab4f5c-6f84-4d3c-8356-87ba15926b7e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/eefb8663-51b6-4280-ae9c-dbe856c40814'} Body: b'{"group": {"id": "eefb8663-51b6-4280-ae9c-dbe856c40814", "status": "deleting", "availability_zone": "nova", "created_at": "2020-11-06T18:05:12.000000", "name": "tempest-GroupsV3RbacTest-Group-1577211088", "description": null, "group_type": "4b8746ff-65cc-4bab-9989-52bf80a82126", "volume_types": ["7b4b449b-2e43-402e-aa12-af91d8986745"]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:14.752 39 INFO tempest.lib.common.rest_client [req-4e0d1f0c-7a48-4829-839a-28d731efe1aa ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.240s 2020-11-06 18:05:14.753 39 DEBUG tempest.lib.common.rest_client [req-4e0d1f0c-7a48-4829-839a-28d731efe1aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4e0d1f0c-7a48-4829-839a-28d731efe1aa', 'x-compute-request-id': 'req-4e0d1f0c-7a48-4829-839a-28d731efe1aa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:15.043 37 INFO tempest.lib.common.rest_client [req-099e32ac-a123-4e43-91af-d08444719ba6 ] Request (GroupsV3RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/eefb8663-51b6-4280-ae9c-dbe856c40814 0.019s 2020-11-06 18:05:15.044 37 DEBUG tempest.lib.common.rest_client [req-099e32ac-a123-4e43-91af-d08444719ba6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'content-length': '108', 'content-type': 'application/json', 'x-compute-request-id': 'req-099e32ac-a123-4e43-91af-d08444719ba6', 'x-openstack-request-id': 'req-099e32ac-a123-4e43-91af-d08444719ba6', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/groups/eefb8663-51b6-4280-ae9c-dbe856c40814'} Body: b'{"itemNotFound": {"code": 404, "message": "Group eefb8663-51b6-4280-ae9c-dbe856c40814 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:15.112 37 INFO tempest.lib.common.rest_client [req-5728f2aa-c1c0-4e52-8b1a-c99af3ecb4e1 ] Request (GroupsV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/volumes/detail?all_tenants=True 0.067s 2020-11-06 18:05:15.113 37 DEBUG tempest.lib.common.rest_client [req-5728f2aa-c1c0-4e52-8b1a-c99af3ecb4e1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-5728f2aa-c1c0-4e52-8b1a-c99af3ecb4e1', 'content-length': '15', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5728f2aa-c1c0-4e52-8b1a-c99af3ecb4e1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/volumes/detail?all_tenants=True'} Body: b'{"volumes": []}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:15.168 37 INFO tempest.lib.common.rest_client [req-86b2867c-5ecc-44ce-bdba-98e197d55e21 ] Request (GroupsV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/group_types/4b8746ff-65cc-4bab-9989-52bf80a82126 0.040s 2020-11-06 18:05:15.168 37 DEBUG tempest.lib.common.rest_client [req-86b2867c-5ecc-44ce-bdba-98e197d55e21 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-86b2867c-5ecc-44ce-bdba-98e197d55e21', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/group_types/4b8746ff-65cc-4bab-9989-52bf80a82126'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:15.248 37 INFO tempest.lib.common.rest_client [req-a9932ff9-8913-4767-b81b-1085713a9248 ] Request (GroupsV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/types/7b4b449b-2e43-402e-aa12-af91d8986745 0.076s 2020-11-06 18:05:15.248 37 DEBUG tempest.lib.common.rest_client [req-a9932ff9-8913-4767-b81b-1085713a9248 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a9932ff9-8913-4767-b81b-1085713a9248', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/types/7b4b449b-2e43-402e-aa12-af91d8986745'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:15.275 37 INFO tempest.lib.common.rest_client [req-6d6f8d6b-8ce2-475a-b27c-ccbddb7fb4d2 ] Request (GroupsV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/types/7b4b449b-2e43-402e-aa12-af91d8986745 0.025s 2020-11-06 18:05:15.275 37 DEBUG tempest.lib.common.rest_client [req-6d6f8d6b-8ce2-475a-b27c-ccbddb7fb4d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-6d6f8d6b-8ce2-475a-b27c-ccbddb7fb4d2', 'x-openstack-request-id': 'req-6d6f8d6b-8ce2-475a-b27c-ccbddb7fb4d2', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/types/7b4b449b-2e43-402e-aa12-af91d8986745'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 7b4b449b-2e43-402e-aa12-af91d8986745 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:15.344 37 INFO tempest.lib.common.rest_client [req-d96a2b0f-685a-4ea2-9ae1-417ff0acef19 ] Request (GroupsV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/types/ad215401-87c6-433a-9444-a9b293637661 0.068s 2020-11-06 18:05:15.345 37 DEBUG tempest.lib.common.rest_client [req-d96a2b0f-685a-4ea2-9ae1-417ff0acef19 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d96a2b0f-685a-4ea2-9ae1-417ff0acef19', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/types/ad215401-87c6-433a-9444-a9b293637661'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:15.366 37 INFO tempest.lib.common.rest_client [req-a038b0e6-6af5-4410-9695-2d86a27e6e7b ] Request (GroupsV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/types/ad215401-87c6-433a-9444-a9b293637661 0.020s 2020-11-06 18:05:15.366 37 DEBUG tempest.lib.common.rest_client [req-a038b0e6-6af5-4410-9695-2d86a27e6e7b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-a038b0e6-6af5-4410-9695-2d86a27e6e7b', 'x-openstack-request-id': 'req-a038b0e6-6af5-4410-9695-2d86a27e6e7b', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/types/ad215401-87c6-433a-9444-a9b293637661'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type ad215401-87c6-433a-9444-a9b293637661 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:15.445 37 INFO tempest.lib.common.rest_client [req-b1fc1272-0fce-4e21-ad2d-851aa3e453c7 ] Request (GroupsV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/types/d0bfb8ae-d085-4899-b263-84c5ba4dc4ae 0.077s 2020-11-06 18:05:15.445 37 DEBUG tempest.lib.common.rest_client [req-b1fc1272-0fce-4e21-ad2d-851aa3e453c7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b1fc1272-0fce-4e21-ad2d-851aa3e453c7', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/types/d0bfb8ae-d085-4899-b263-84c5ba4dc4ae'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:15.465 37 INFO tempest.lib.common.rest_client [req-56e88153-fd56-472d-8b7d-7712f69c651c ] Request (GroupsV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/types/d0bfb8ae-d085-4899-b263-84c5ba4dc4ae 0.019s 2020-11-06 18:05:15.466 37 DEBUG tempest.lib.common.rest_client [req-56e88153-fd56-472d-8b7d-7712f69c651c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-56e88153-fd56-472d-8b7d-7712f69c651c', 'x-openstack-request-id': 'req-56e88153-fd56-472d-8b7d-7712f69c651c', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/types/d0bfb8ae-d085-4899-b263-84c5ba4dc4ae'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type d0bfb8ae-d085-4899-b263-84c5ba4dc4ae could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:15.537 37 INFO tempest.lib.common.rest_client [req-8724d022-8fdc-4d12-9e4b-6894d6f5463f ] Request (GroupsV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/types/4117b0de-ad01-41f9-9476-4a7f7e7b6196 0.071s 2020-11-06 18:05:15.538 37 DEBUG tempest.lib.common.rest_client [req-8724d022-8fdc-4d12-9e4b-6894d6f5463f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8724d022-8fdc-4d12-9e4b-6894d6f5463f', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/types/4117b0de-ad01-41f9-9476-4a7f7e7b6196'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:15.559 37 INFO tempest.lib.common.rest_client [req-09df836b-482c-470c-b217-5217d711dd24 ] Request (GroupsV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/types/4117b0de-ad01-41f9-9476-4a7f7e7b6196 0.020s 2020-11-06 18:05:15.560 37 DEBUG tempest.lib.common.rest_client [req-09df836b-482c-470c-b217-5217d711dd24 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-09df836b-482c-470c-b217-5217d711dd24', 'x-openstack-request-id': 'req-09df836b-482c-470c-b217-5217d711dd24', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/types/4117b0de-ad01-41f9-9476-4a7f7e7b6196'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 4117b0de-ad01-41f9-9476-4a7f7e7b6196 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:15.629 37 INFO tempest.lib.common.rest_client [req-0e9756bd-2e4a-47fd-9d3f-3ab37fcceaac ] Request (GroupsV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/types/6070f8ed-6c49-4ee6-b26e-66647b201ac1 0.068s 2020-11-06 18:05:15.629 37 DEBUG tempest.lib.common.rest_client [req-0e9756bd-2e4a-47fd-9d3f-3ab37fcceaac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0e9756bd-2e4a-47fd-9d3f-3ab37fcceaac', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/types/6070f8ed-6c49-4ee6-b26e-66647b201ac1'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:15.651 37 INFO tempest.lib.common.rest_client [req-04519cd4-6384-4c27-8133-97813b6808b4 ] Request (GroupsV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/types/6070f8ed-6c49-4ee6-b26e-66647b201ac1 0.021s 2020-11-06 18:05:15.652 37 DEBUG tempest.lib.common.rest_client [req-04519cd4-6384-4c27-8133-97813b6808b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-04519cd4-6384-4c27-8133-97813b6808b4', 'x-openstack-request-id': 'req-04519cd4-6384-4c27-8133-97813b6808b4', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/types/6070f8ed-6c49-4ee6-b26e-66647b201ac1'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 6070f8ed-6c49-4ee6-b26e-66647b201ac1 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:15.720 37 INFO tempest.lib.common.rest_client [req-58f6dda6-8cec-4214-a7b6-131429c61000 ] Request (GroupsV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/types/f5268641-5705-484f-9f32-51cf88e70a5d 0.068s 2020-11-06 18:05:15.721 37 DEBUG tempest.lib.common.rest_client [req-58f6dda6-8cec-4214-a7b6-131429c61000 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-58f6dda6-8cec-4214-a7b6-131429c61000', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/types/f5268641-5705-484f-9f32-51cf88e70a5d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:15.742 37 INFO tempest.lib.common.rest_client [req-a46c7bbf-43be-4b0c-bce9-32f647b1d9f0 ] Request (GroupsV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/types/f5268641-5705-484f-9f32-51cf88e70a5d 0.020s 2020-11-06 18:05:15.743 37 DEBUG tempest.lib.common.rest_client [req-a46c7bbf-43be-4b0c-bce9-32f647b1d9f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-a46c7bbf-43be-4b0c-bce9-32f647b1d9f0', 'x-openstack-request-id': 'req-a46c7bbf-43be-4b0c-bce9-32f647b1d9f0', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/c8922203e86b466eb1fafe17e3818538/types/f5268641-5705-484f-9f32-51cf88e70a5d'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type f5268641-5705-484f-9f32-51cf88e70a5d could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:15.961 37 INFO tempest.lib.common.rest_client [req-c04927d7-8bec-4743-b13e-8e5305489ae9 ] Request (GroupsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/4df30aea665c4905921e3145ddee0163 0.217s 2020-11-06 18:05:15.962 37 DEBUG tempest.lib.common.rest_client [req-c04927d7-8bec-4743-b13e-8e5305489ae9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c04927d7-8bec-4743-b13e-8e5305489ae9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/4df30aea665c4905921e3145ddee0163'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:15.971 39 INFO tempest.lib.common.rest_client [req-e24873de-824b-442c-8411-c82a6da99928 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.203s 2020-11-06 18:05:15.972 39 DEBUG tempest.lib.common.rest_client [req-e24873de-824b-442c-8411-c82a6da99928 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e24873de-824b-442c-8411-c82a6da99928', 'x-compute-request-id': 'req-e24873de-824b-442c-8411-c82a6da99928', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:16.045 37 INFO tempest.lib.common.rest_client [req-b1c2962d-eead-49ca-9242-876404b5acef ] Request (GroupsV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 18:05:16.046 37 DEBUG tempest.lib.common.rest_client [req-b1c2962d-eead-49ca-9242-876404b5acef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b1c2962d-eead-49ca-9242-876404b5acef', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["-UuvSSoeTiy_MAbAdoLayA"], "expires_at": "2020-11-06T19:05:15.000000Z", "issued_at": "2020-11-06T18:05:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:16.315 37 INFO tempest.lib.common.rest_client [req-6547ba8b-c33c-45fe-92f0-ca0a22661ddd ] Request (GroupsV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=c8922203e86b466eb1fafe17e3818538&name=default 0.268s 2020-11-06 18:05:16.316 37 DEBUG tempest.lib.common.rest_client [req-6547ba8b-c33c-45fe-92f0-ca0a22661ddd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-6547ba8b-c33c-45fe-92f0-ca0a22661ddd', 'date': 'Fri, 06 Nov 2020 18:05:16 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=c8922203e86b466eb1fafe17e3818538&name=default'} Body: b'{"security_groups": [{"id": "52a9b64f-f438-4704-80db-03cd6b6aafd8", "name": "default", "stateful": true, "tenant_id": "c8922203e86b466eb1fafe17e3818538", "description": "Default security group", "security_group_rules": [{"id": "7367b534-6e5a-48c4-81fe-0e5afcad8be9", "tenant_id": "c8922203e86b466eb1fafe17e3818538", "security_group_id": "52a9b64f-f438-4704-80db-03cd6b6aafd8", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:05:16Z", "updated_at": "2020-11-06T18:05:16Z", "revision_number": 0, "project_id": "c8922203e86b466eb1fafe17e3818538"}, {"id": "b1b308a2-f188-4167-b129-904a989eba04", "tenant_id": "c8922203e86b466eb1fafe17e3818538", "security_group_id": "52a9b64f-f438-4704-80db-03cd6b6aafd8", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "52a9b64f-f438-4704-80db-03cd6b6aafd8", "description": null, "tags": [], "created_at": "2020-11-06T18:05:16Z", "updated_at": "2020-11-06T18:05:16Z", "revision_number": 0, "project_id": "c8922203e86b466eb1fafe17e3818538"}, {"id": "b8f970eb-b529-4358-952f-9811a1dec17a", "tenant_id": "c8922203e86b466eb1fafe17e3818538", "security_group_id": "52a9b64f-f438-4704-80db-03cd6b6aafd8", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:05:16Z", "updated_at": "2020-11-06T18:05:16Z", "revision_number": 0, "project_id": "c8922203e86b466eb1fafe17e3818538"}, {"id": "c043d8e2-50be-43ea-ba0d-86fe50188f22", "tenant_id": "c8922203e86b466eb1fafe17e3818538", "security_group_id": "52a9b64f-f438-4704-80db-03cd6b6aafd8", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "52a9b64f-f438-4704-80db-03cd6b6aafd8", "description": null, "tags": [], "created_at": "2020-11-06T18:05:16Z", "updated_at": "2020-11-06T18:05:16Z", "revision_number": 0, "project_id": "c8922203e86b466eb1fafe17e3818538"}], "tags": [], "created_at": "2020-11-06T18:05:16Z", "updated_at": "2020-11-06T18:05:16Z", "revision_number": 1, "project_id": "c8922203e86b466eb1fafe17e3818538"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:16.482 37 INFO tempest.lib.common.rest_client [req-50929769-c0b9-4f2d-b746-4605226a5603 ] Request (GroupsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/52a9b64f-f438-4704-80db-03cd6b6aafd8 0.165s 2020-11-06 18:05:16.483 37 DEBUG tempest.lib.common.rest_client [req-50929769-c0b9-4f2d-b746-4605226a5603 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-50929769-c0b9-4f2d-b746-4605226a5603', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:05:16 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/52a9b64f-f438-4704-80db-03cd6b6aafd8'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:16.598 37 INFO tempest.lib.common.rest_client [req-3add4297-bc0a-4d4e-a7f4-0b4519db5a54 ] Request (GroupsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538 0.114s 2020-11-06 18:05:16.598 37 DEBUG tempest.lib.common.rest_client [req-3add4297-bc0a-4d4e-a7f4-0b4519db5a54 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3add4297-bc0a-4d4e-a7f4-0b4519db5a54', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c8922203e86b466eb1fafe17e3818538'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:16.687 37 INFO tempest.lib.common.rest_client [req-6bfe6657-17c4-4af5-940b-a309ae152c20 ] Request (VolumeHostsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-11-06 18:05:16.688 37 DEBUG tempest.lib.common.rest_client [req-6bfe6657-17c4-4af5-940b-a309ae152c20 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6bfe6657-17c4-4af5-940b-a309ae152c20', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["a6r1T0x9SC2ON-XmPs5vZQ"], "expires_at": "2020-11-06T19:05:16.000000Z", "issued_at": "2020-11-06T18:05:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:16.735 37 INFO tempest.lib.common.rest_client [req-d028d38a-8665-4022-b75c-558b575e2336 ] Request (VolumeHostsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:05:16.736 37 DEBUG tempest.lib.common.rest_client [req-d028d38a-8665-4022-b75c-558b575e2336 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d028d38a-8665-4022-b75c-558b575e2336', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["yI4j2KzOSCaFXoDIGf8vTg"], "expires_at": "2020-11-06T19:05:16.000000Z", "issued_at": "2020-11-06T18:05:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:16.789 37 INFO tempest.lib.common.rest_client [req-20b554ed-9011-4465-9f67-07d5d254bf23 ] Request (VolumeHostsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.052s 2020-11-06 18:05:16.790 37 DEBUG tempest.lib.common.rest_client [req-20b554ed-9011-4465-9f67-07d5d254bf23 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-20b554ed-9011-4465-9f67-07d5d254bf23', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:16.855 37 INFO tempest.lib.common.rest_client [req-ed5b67c9-4f7f-4caf-9cff-1a3306a8c9ab ] Request (VolumeHostsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.064s 2020-11-06 18:05:16.856 37 DEBUG tempest.lib.common.rest_client [req-ed5b67c9-4f7f-4caf-9cff-1a3306a8c9ab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumeHostsV3RbacTest-484837972-desc", "domain_id": "default", "name": "tempest-VolumeHostsV3RbacTest-484837972"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '378', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ed5b67c9-4f7f-4caf-9cff-1a3306a8c9ab', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "91dd65c84554489daf8043c474e27aa7", "name": "tempest-VolumeHostsV3RbacTest-484837972", "domain_id": "default", "description": "tempest-VolumeHostsV3RbacTest-484837972-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/91dd65c84554489daf8043c474e27aa7"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:16.966 37 INFO tempest.lib.common.rest_client [req-68762ee6-22b5-450c-a1f6-e333a5402898 ] Request (VolumeHostsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.109s 2020-11-06 18:05:16.967 37 DEBUG tempest.lib.common.rest_client [req-68762ee6-22b5-450c-a1f6-e333a5402898 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumeHostsV3RbacTest-484837972", "password": "B1#@n5aW9lb@QJH", "project_id": "91dd65c84554489daf8043c474e27aa7", "email": "tempest-VolumeHostsV3RbacTest-778570630@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '396', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-68762ee6-22b5-450c-a1f6-e333a5402898', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "91dd65c84554489daf8043c474e27aa7", "email": "tempest-VolumeHostsV3RbacTest-778570630@example.com", "id": "6b397f2f0184450da1bf3e138a9b95b5", "name": "tempest-VolumeHostsV3RbacTest-484837972", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/6b397f2f0184450da1bf3e138a9b95b5"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:17.008 37 INFO tempest.lib.common.rest_client [req-a922973f-2506-451e-baac-7dfd22cbe748 ] Request (VolumeHostsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.040s 2020-11-06 18:05:17.008 37 DEBUG tempest.lib.common.rest_client [req-a922973f-2506-451e-baac-7dfd22cbe748 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a922973f-2506-451e-baac-7dfd22cbe748', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:17.056 37 INFO tempest.lib.common.rest_client [req-4c9d035f-ad7d-48fa-bebb-ed558a6b1514 ] Request (VolumeHostsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.046s 2020-11-06 18:05:17.056 37 DEBUG tempest.lib.common.rest_client [req-4c9d035f-ad7d-48fa-bebb-ed558a6b1514 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4c9d035f-ad7d-48fa-bebb-ed558a6b1514', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:17.134 37 INFO tempest.lib.common.rest_client [req-b31957c8-49a5-4a9c-a784-03d767e2c54b ] Request (VolumeHostsV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/91dd65c84554489daf8043c474e27aa7/users/6b397f2f0184450da1bf3e138a9b95b5/roles/72a4576c553448cd941b052c1ca0cf2d 0.076s 2020-11-06 18:05:17.134 37 DEBUG tempest.lib.common.rest_client [req-b31957c8-49a5-4a9c-a784-03d767e2c54b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b31957c8-49a5-4a9c-a784-03d767e2c54b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/91dd65c84554489daf8043c474e27aa7/users/6b397f2f0184450da1bf3e138a9b95b5/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:17.135 37 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumeHostsV3RbacTest-484837972', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '91dd65c84554489daf8043c474e27aa7', 'project_name': 'tempest-VolumeHostsV3RbacTest-484837972', 'tenant_id': '91dd65c84554489daf8043c474e27aa7', 'tenant_name': 'tempest-VolumeHostsV3RbacTest-484837972', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '6b397f2f0184450da1bf3e138a9b95b5'}, Network: None, Subnet: None, Router: None 2020-11-06 18:05:17.135 37 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumeHostsV3RbacTest-484837972', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '91dd65c84554489daf8043c474e27aa7', 'project_name': 'tempest-VolumeHostsV3RbacTest-484837972', 'tenant_id': '91dd65c84554489daf8043c474e27aa7', 'tenant_name': 'tempest-VolumeHostsV3RbacTest-484837972', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '6b397f2f0184450da1bf3e138a9b95b5'}, Network: None, Subnet: None, Router: None 2020-11-06 18:05:17.221 39 INFO tempest.lib.common.rest_client [req-16320191-b9d8-4019-a2ea-7ba23eddc523 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.232s 2020-11-06 18:05:17.221 39 DEBUG tempest.lib.common.rest_client [req-16320191-b9d8-4019-a2ea-7ba23eddc523 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-16320191-b9d8-4019-a2ea-7ba23eddc523', 'x-compute-request-id': 'req-16320191-b9d8-4019-a2ea-7ba23eddc523', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:17.258 37 INFO tempest.lib.common.rest_client [req-80ac0b9f-d59f-4b80-b5fe-1d2fabe1fd7e ] Request (VolumeHostsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.112s 2020-11-06 18:05:17.258 37 DEBUG tempest.lib.common.rest_client [req-80ac0b9f-d59f-4b80-b5fe-1d2fabe1fd7e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6571', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-80ac0b9f-d59f-4b80-b5fe-1d2fabe1fd7e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6b397f2f0184450da1bf3e138a9b95b5", "name": "tempest-VolumeHostsV3RbacTest-484837972", "password_expires_at": null}, "audit_ids": ["cEGiMkAkSTKZemJgoGS8Lw"], "expires_at": "2020-11-06T19:05:17.000000Z", "issued_at": "2020-11-06T18:05:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "91dd65c84554489daf8043c474e27aa7", "name": "tempest-VolumeHostsV3RbacTest-484837972"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/91dd65c84554489daf8043c474e27aa7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/91dd65c84554489daf8043c474e27aa7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/91dd65c84554489daf8043c474e27aa7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_91dd65c84554489daf8043c474e27aa7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_91dd65c84554489daf8043c474e27aa7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_91dd65c84554489daf8043c474e27aa7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:17.353 37 INFO tempest.lib.common.rest_client [req-c8c98da3-d59e-48c9-b66a-341d83ee7aeb ] Request (VolumeHostsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-11-06 18:05:17.354 37 DEBUG tempest.lib.common.rest_client [req-c8c98da3-d59e-48c9-b66a-341d83ee7aeb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c8c98da3-d59e-48c9-b66a-341d83ee7aeb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["7rTdSr-2TzuakeOtoV3sow"], "expires_at": "2020-11-06T19:05:17.000000Z", "issued_at": "2020-11-06T18:05:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:17.402 37 INFO tempest.lib.common.rest_client [req-3c121dd3-e489-4d33-8281-6338bf21670f ] Request (VolumeHostsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:05:17.402 37 DEBUG tempest.lib.common.rest_client [req-3c121dd3-e489-4d33-8281-6338bf21670f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3c121dd3-e489-4d33-8281-6338bf21670f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["Zb0F8vBYTO2a6BgkpClGOw"], "expires_at": "2020-11-06T19:05:17.000000Z", "issued_at": "2020-11-06T18:05:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:17.463 37 INFO tempest.lib.common.rest_client [req-223464e7-a86b-412e-b0a3-3f7e3faf0397 ] Request (VolumeHostsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.059s 2020-11-06 18:05:17.464 37 DEBUG tempest.lib.common.rest_client [req-223464e7-a86b-412e-b0a3-3f7e3faf0397 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-223464e7-a86b-412e-b0a3-3f7e3faf0397', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:17.521 37 INFO tempest.lib.common.rest_client [req-da5e2721-b719-40ff-9c2d-bf4d430902f7 ] Request (VolumeHostsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.056s 2020-11-06 18:05:17.521 37 DEBUG tempest.lib.common.rest_client [req-da5e2721-b719-40ff-9c2d-bf4d430902f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-da5e2721-b719-40ff-9c2d-bf4d430902f7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:17.522 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:05:17.522 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:17.578 37 INFO tempest.lib.common.rest_client [req-88582bcd-512f-4133-8dbb-6e54d1cf88f0 ] Request (VolumeHostsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/91dd65c84554489daf8043c474e27aa7/users/6b397f2f0184450da1bf3e138a9b95b5/roles 0.055s 2020-11-06 18:05:17.578 37 DEBUG tempest.lib.common.rest_client [req-88582bcd-512f-4133-8dbb-6e54d1cf88f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-88582bcd-512f-4133-8dbb-6e54d1cf88f0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/91dd65c84554489daf8043c474e27aa7/users/6b397f2f0184450da1bf3e138a9b95b5/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/91dd65c84554489daf8043c474e27aa7/users/6b397f2f0184450da1bf3e138a9b95b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:17.643 37 INFO tempest.lib.common.rest_client [req-821e283d-c69a-4247-a3e4-73046e296c03 ] Request (VolumeHostsV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/91dd65c84554489daf8043c474e27aa7/users/6b397f2f0184450da1bf3e138a9b95b5/roles/72a4576c553448cd941b052c1ca0cf2d 0.063s 2020-11-06 18:05:17.643 37 DEBUG tempest.lib.common.rest_client [req-821e283d-c69a-4247-a3e4-73046e296c03 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-821e283d-c69a-4247-a3e4-73046e296c03', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/91dd65c84554489daf8043c474e27aa7/users/6b397f2f0184450da1bf3e138a9b95b5/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:17.747 37 INFO tempest.lib.common.rest_client [req-e7704a3f-0996-4d9c-b62c-aa25a4405120 ] Request (VolumeHostsV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/91dd65c84554489daf8043c474e27aa7/users/6b397f2f0184450da1bf3e138a9b95b5/roles/a629c95d64b3416fb80ae90af4f69c05 0.102s 2020-11-06 18:05:17.747 37 DEBUG tempest.lib.common.rest_client [req-e7704a3f-0996-4d9c-b62c-aa25a4405120 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e7704a3f-0996-4d9c-b62c-aa25a4405120', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/91dd65c84554489daf8043c474e27aa7/users/6b397f2f0184450da1bf3e138a9b95b5/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:18.448 39 INFO tempest.lib.common.rest_client [req-bcf3598c-f88b-48de-a951-74281880aeb4 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.210s 2020-11-06 18:05:18.448 39 DEBUG tempest.lib.common.rest_client [req-bcf3598c-f88b-48de-a951-74281880aeb4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bcf3598c-f88b-48de-a951-74281880aeb4', 'x-compute-request-id': 'req-bcf3598c-f88b-48de-a951-74281880aeb4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:18.845 37 INFO tempest.lib.common.rest_client [req-1decc0a9-c449-4471-849f-a17e8a6101c0 ] Request (VolumeHostsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-11-06 18:05:18.845 37 DEBUG tempest.lib.common.rest_client [req-1decc0a9-c449-4471-849f-a17e8a6101c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1decc0a9-c449-4471-849f-a17e8a6101c0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6b397f2f0184450da1bf3e138a9b95b5", "name": "tempest-VolumeHostsV3RbacTest-484837972", "password_expires_at": null}, "audit_ids": ["nVatrbLBSwmRo5XTTFmCPQ"], "expires_at": "2020-11-06T19:05:18.000000Z", "issued_at": "2020-11-06T18:05:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "91dd65c84554489daf8043c474e27aa7", "name": "tempest-VolumeHostsV3RbacTest-484837972"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/91dd65c84554489daf8043c474e27aa7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/91dd65c84554489daf8043c474e27aa7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/91dd65c84554489daf8043c474e27aa7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_91dd65c84554489daf8043c474e27aa7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_91dd65c84554489daf8043c474e27aa7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_91dd65c84554489daf8043c474e27aa7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:18.848 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:05:18.851 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:hosts, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:05:18.852 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:18.959 37 INFO tempest.lib.common.rest_client [req-f699f523-1b85-4da8-8b86-ffee1df22e02 ] Request (VolumeHostsV3RbacTest:test_list_hosts): 200 GET http://172.30.13.94/identity/v3/projects/91dd65c84554489daf8043c474e27aa7/users/6b397f2f0184450da1bf3e138a9b95b5/roles 0.107s 2020-11-06 18:05:18.960 37 DEBUG tempest.lib.common.rest_client [req-f699f523-1b85-4da8-8b86-ffee1df22e02 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f699f523-1b85-4da8-8b86-ffee1df22e02', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/91dd65c84554489daf8043c474e27aa7/users/6b397f2f0184450da1bf3e138a9b95b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/91dd65c84554489daf8043c474e27aa7/users/6b397f2f0184450da1bf3e138a9b95b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:18.997 37 INFO tempest.lib.common.rest_client [req-aac77337-5c29-489d-8366-0c02ef1c170b ] Request (VolumeHostsV3RbacTest:test_list_hosts): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:05:18.997 37 DEBUG tempest.lib.common.rest_client [req-aac77337-5c29-489d-8366-0c02ef1c170b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aac77337-5c29-489d-8366-0c02ef1c170b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6b397f2f0184450da1bf3e138a9b95b5", "name": "tempest-VolumeHostsV3RbacTest-484837972", "password_expires_at": null}, "audit_ids": ["MJWGA1osSfOC_0_4-6QA6A"], "expires_at": "2020-11-06T19:05:18.000000Z", "issued_at": "2020-11-06T18:05:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "91dd65c84554489daf8043c474e27aa7", "name": "tempest-VolumeHostsV3RbacTest-484837972"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/91dd65c84554489daf8043c474e27aa7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/91dd65c84554489daf8043c474e27aa7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/91dd65c84554489daf8043c474e27aa7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_91dd65c84554489daf8043c474e27aa7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_91dd65c84554489daf8043c474e27aa7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_91dd65c84554489daf8043c474e27aa7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:19.197 37 INFO tempest.lib.common.rest_client [req-33f5415d-eb4c-46b5-827f-d54196acbfb6 ] Request (VolumeHostsV3RbacTest:test_list_hosts): 200 GET http://172.30.13.94/volume/v3/91dd65c84554489daf8043c474e27aa7/os-hosts 0.198s 2020-11-06 18:05:19.198 37 DEBUG tempest.lib.common.rest_client [req-33f5415d-eb4c-46b5-827f-d54196acbfb6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-33f5415d-eb4c-46b5-827f-d54196acbfb6', 'content-length': '736', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-33f5415d-eb4c-46b5-827f-d54196acbfb6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/91dd65c84554489daf8043c474e27aa7/os-hosts'} Body: b'{"hosts": [{"host_name": "lf-virtual9@ceph", "service": "cinder-volume", "zone": "nova", "service-status": "available", "service-state": "enabled", "last-update": "2020-11-06T18:05:18.000000"}, {"host_name": "lf-virtual9", "service": "cinder-scheduler", "zone": "nova", "service-status": "available", "service-state": "enabled", "last-update": "2020-11-06T18:05:17.000000"}, {"host_name": "lf-virtual9", "service": "cinder-backup", "zone": "nova", "service-status": "available", "service-state": "enabled", "last-update": "2020-11-06T18:05:19.000000"}, {"host_name": "lf-virtual8@ceph", "service": "cinder-volume", "zone": "nova", "service-status": "available", "service-state": "enabled", "last-update": "2020-11-06T18:05:12.000000"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:19.203 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:19.251 37 INFO tempest.lib.common.rest_client [req-4294dc26-8834-408e-b25f-3e9525c42480 ] Request (VolumeHostsV3RbacTest:test_list_hosts): 200 GET http://172.30.13.94/identity/v3/projects/91dd65c84554489daf8043c474e27aa7/users/6b397f2f0184450da1bf3e138a9b95b5/roles 0.046s 2020-11-06 18:05:19.251 37 DEBUG tempest.lib.common.rest_client [req-4294dc26-8834-408e-b25f-3e9525c42480 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4294dc26-8834-408e-b25f-3e9525c42480', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/91dd65c84554489daf8043c474e27aa7/users/6b397f2f0184450da1bf3e138a9b95b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/91dd65c84554489daf8043c474e27aa7/users/6b397f2f0184450da1bf3e138a9b95b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:19.291 37 INFO tempest.lib.common.rest_client [req-657edf8c-a95e-4d71-a162-1c60dc101bcd ] Request (VolumeHostsV3RbacTest:test_list_hosts): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:05:19.292 37 DEBUG tempest.lib.common.rest_client [req-657edf8c-a95e-4d71-a162-1c60dc101bcd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-657edf8c-a95e-4d71-a162-1c60dc101bcd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6b397f2f0184450da1bf3e138a9b95b5", "name": "tempest-VolumeHostsV3RbacTest-484837972", "password_expires_at": null}, "audit_ids": ["kagKNIKsTSyQBfnzvIZkUA"], "expires_at": "2020-11-06T19:05:19.000000Z", "issued_at": "2020-11-06T18:05:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "91dd65c84554489daf8043c474e27aa7", "name": "tempest-VolumeHostsV3RbacTest-484837972"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/91dd65c84554489daf8043c474e27aa7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/91dd65c84554489daf8043c474e27aa7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/91dd65c84554489daf8043c474e27aa7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_91dd65c84554489daf8043c474e27aa7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_91dd65c84554489daf8043c474e27aa7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_91dd65c84554489daf8043c474e27aa7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:19.295 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:05:19.298 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:hosts, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:05:19.409 37 INFO tempest.lib.common.rest_client [req-ba000beb-b443-40e9-8b21-50288fdfe29d ] Request (VolumeHostsV3RbacTest:test_show_host): 200 GET http://172.30.13.94/volume/v3/91dd65c84554489daf8043c474e27aa7/os-hosts 0.109s 2020-11-06 18:05:19.410 37 DEBUG tempest.lib.common.rest_client [req-ba000beb-b443-40e9-8b21-50288fdfe29d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ba000beb-b443-40e9-8b21-50288fdfe29d', 'content-length': '736', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ba000beb-b443-40e9-8b21-50288fdfe29d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/91dd65c84554489daf8043c474e27aa7/os-hosts'} Body: b'{"hosts": [{"host_name": "lf-virtual9@ceph", "service": "cinder-volume", "zone": "nova", "service-status": "available", "service-state": "enabled", "last-update": "2020-11-06T18:05:18.000000"}, {"host_name": "lf-virtual9", "service": "cinder-scheduler", "zone": "nova", "service-status": "available", "service-state": "enabled", "last-update": "2020-11-06T18:05:17.000000"}, {"host_name": "lf-virtual9", "service": "cinder-backup", "zone": "nova", "service-status": "available", "service-state": "enabled", "last-update": "2020-11-06T18:05:19.000000"}, {"host_name": "lf-virtual8@ceph", "service": "cinder-volume", "zone": "nova", "service-status": "available", "service-state": "enabled", "last-update": "2020-11-06T18:05:12.000000"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:19.415 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:19.472 37 INFO tempest.lib.common.rest_client [req-4e677e21-6cd2-4700-9d88-6a9304ba2921 ] Request (VolumeHostsV3RbacTest:test_show_host): 200 GET http://172.30.13.94/identity/v3/projects/91dd65c84554489daf8043c474e27aa7/users/6b397f2f0184450da1bf3e138a9b95b5/roles 0.056s 2020-11-06 18:05:19.472 37 DEBUG tempest.lib.common.rest_client [req-4e677e21-6cd2-4700-9d88-6a9304ba2921 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4e677e21-6cd2-4700-9d88-6a9304ba2921', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/91dd65c84554489daf8043c474e27aa7/users/6b397f2f0184450da1bf3e138a9b95b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/91dd65c84554489daf8043c474e27aa7/users/6b397f2f0184450da1bf3e138a9b95b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:19.514 37 INFO tempest.lib.common.rest_client [req-abd01da6-0a6e-4336-a8d8-3389e3aef171 ] Request (VolumeHostsV3RbacTest:test_show_host): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:05:19.515 37 DEBUG tempest.lib.common.rest_client [req-abd01da6-0a6e-4336-a8d8-3389e3aef171 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-abd01da6-0a6e-4336-a8d8-3389e3aef171', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6b397f2f0184450da1bf3e138a9b95b5", "name": "tempest-VolumeHostsV3RbacTest-484837972", "password_expires_at": null}, "audit_ids": ["Q7cs9g8bQbiPUCsoVHn2Kg"], "expires_at": "2020-11-06T19:05:19.000000Z", "issued_at": "2020-11-06T18:05:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "91dd65c84554489daf8043c474e27aa7", "name": "tempest-VolumeHostsV3RbacTest-484837972"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/91dd65c84554489daf8043c474e27aa7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/91dd65c84554489daf8043c474e27aa7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/91dd65c84554489daf8043c474e27aa7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_91dd65c84554489daf8043c474e27aa7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_91dd65c84554489daf8043c474e27aa7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_91dd65c84554489daf8043c474e27aa7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:19.626 37 INFO tempest.lib.common.rest_client [req-f0f0542d-4734-407b-b4a3-a2968f926f53 ] Request (VolumeHostsV3RbacTest:test_show_host): 200 GET http://172.30.13.94/volume/v3/91dd65c84554489daf8043c474e27aa7/os-hosts/lf-virtual9@ceph 0.110s 2020-11-06 18:05:19.627 37 DEBUG tempest.lib.common.rest_client [req-f0f0542d-4734-407b-b4a3-a2968f926f53 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-f0f0542d-4734-407b-b4a3-a2968f926f53', 'content-length': '170', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f0f0542d-4734-407b-b4a3-a2968f926f53', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/91dd65c84554489daf8043c474e27aa7/os-hosts/lf-virtual9@ceph'} Body: b'{"host": [{"resource": {"host": "lf-virtual9@ceph", "project": "(total)", "volume_count": "0", "total_volume_gb": "0", "snapshot_count": "0", "total_snapshot_gb": "0"}}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:19.631 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:19.649 39 INFO tempest.lib.common.rest_client [req-bdab2dc3-1c19-41c1-8995-54c2b8f5d862 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.187s 2020-11-06 18:05:19.650 39 DEBUG tempest.lib.common.rest_client [req-bdab2dc3-1c19-41c1-8995-54c2b8f5d862 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bdab2dc3-1c19-41c1-8995-54c2b8f5d862', 'x-compute-request-id': 'req-bdab2dc3-1c19-41c1-8995-54c2b8f5d862', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:19.690 37 INFO tempest.lib.common.rest_client [req-943a6c55-2fc5-4e40-b976-7d339054c3ec ] Request (VolumeHostsV3RbacTest:test_show_host): 200 GET http://172.30.13.94/identity/v3/projects/91dd65c84554489daf8043c474e27aa7/users/6b397f2f0184450da1bf3e138a9b95b5/roles 0.057s 2020-11-06 18:05:19.691 37 DEBUG tempest.lib.common.rest_client [req-943a6c55-2fc5-4e40-b976-7d339054c3ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-943a6c55-2fc5-4e40-b976-7d339054c3ec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/91dd65c84554489daf8043c474e27aa7/users/6b397f2f0184450da1bf3e138a9b95b5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/91dd65c84554489daf8043c474e27aa7/users/6b397f2f0184450da1bf3e138a9b95b5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:19.731 37 INFO tempest.lib.common.rest_client [req-275bbcbc-90df-4748-8978-6bbfb0b0db30 ] Request (VolumeHostsV3RbacTest:test_show_host): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:05:19.732 37 DEBUG tempest.lib.common.rest_client [req-275bbcbc-90df-4748-8978-6bbfb0b0db30 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-275bbcbc-90df-4748-8978-6bbfb0b0db30', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6b397f2f0184450da1bf3e138a9b95b5", "name": "tempest-VolumeHostsV3RbacTest-484837972", "password_expires_at": null}, "audit_ids": ["yIM0M-3UR5KourQLImVQKA"], "expires_at": "2020-11-06T19:05:19.000000Z", "issued_at": "2020-11-06T18:05:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "91dd65c84554489daf8043c474e27aa7", "name": "tempest-VolumeHostsV3RbacTest-484837972"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/91dd65c84554489daf8043c474e27aa7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/91dd65c84554489daf8043c474e27aa7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/91dd65c84554489daf8043c474e27aa7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_91dd65c84554489daf8043c474e27aa7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_91dd65c84554489daf8043c474e27aa7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_91dd65c84554489daf8043c474e27aa7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:19.905 37 INFO tempest.lib.common.rest_client [req-c44eeafe-783b-45be-b3b0-590bc920deec ] Request (VolumeHostsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/6b397f2f0184450da1bf3e138a9b95b5 0.170s 2020-11-06 18:05:19.905 37 DEBUG tempest.lib.common.rest_client [req-c44eeafe-783b-45be-b3b0-590bc920deec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c44eeafe-783b-45be-b3b0-590bc920deec', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/6b397f2f0184450da1bf3e138a9b95b5'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:19.995 37 INFO tempest.lib.common.rest_client [req-9b0d3202-527b-4555-a7d8-77f49669a2f1 ] Request (VolumeHostsV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-11-06 18:05:19.996 37 DEBUG tempest.lib.common.rest_client [req-9b0d3202-527b-4555-a7d8-77f49669a2f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9b0d3202-527b-4555-a7d8-77f49669a2f1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["nltgNxYwTyqRh2uLrPFmXg"], "expires_at": "2020-11-06T19:05:19.000000Z", "issued_at": "2020-11-06T18:05:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:20.322 37 INFO tempest.lib.common.rest_client [req-e123138b-bf52-42de-827c-a3b2908f596b ] Request (VolumeHostsV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=91dd65c84554489daf8043c474e27aa7&name=default 0.325s 2020-11-06 18:05:20.322 37 DEBUG tempest.lib.common.rest_client [req-e123138b-bf52-42de-827c-a3b2908f596b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-e123138b-bf52-42de-827c-a3b2908f596b', 'date': 'Fri, 06 Nov 2020 18:05:20 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=91dd65c84554489daf8043c474e27aa7&name=default'} Body: b'{"security_groups": [{"id": "3f6ac225-3a9c-481a-b81b-66ecd98d2ee3", "name": "default", "stateful": true, "tenant_id": "91dd65c84554489daf8043c474e27aa7", "description": "Default security group", "security_group_rules": [{"id": "23a099e7-9014-4727-8c9b-c3b8c1da9c23", "tenant_id": "91dd65c84554489daf8043c474e27aa7", "security_group_id": "3f6ac225-3a9c-481a-b81b-66ecd98d2ee3", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:05:20Z", "updated_at": "2020-11-06T18:05:20Z", "revision_number": 0, "project_id": "91dd65c84554489daf8043c474e27aa7"}, {"id": "7b7b4524-f25c-487b-9f5d-afe2f1ece96f", "tenant_id": "91dd65c84554489daf8043c474e27aa7", "security_group_id": "3f6ac225-3a9c-481a-b81b-66ecd98d2ee3", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "3f6ac225-3a9c-481a-b81b-66ecd98d2ee3", "description": null, "tags": [], "created_at": "2020-11-06T18:05:20Z", "updated_at": "2020-11-06T18:05:20Z", "revision_number": 0, "project_id": "91dd65c84554489daf8043c474e27aa7"}, {"id": "a2e84850-914a-44db-bf80-6d05c2e49a68", "tenant_id": "91dd65c84554489daf8043c474e27aa7", "security_group_id": "3f6ac225-3a9c-481a-b81b-66ecd98d2ee3", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:05:20Z", "updated_at": "2020-11-06T18:05:20Z", "revision_number": 0, "project_id": "91dd65c84554489daf8043c474e27aa7"}, {"id": "df9090d4-82a9-4ef3-b9b9-145eb0c9996c", "tenant_id": "91dd65c84554489daf8043c474e27aa7", "security_group_id": "3f6ac225-3a9c-481a-b81b-66ecd98d2ee3", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "3f6ac225-3a9c-481a-b81b-66ecd98d2ee3", "description": null, "tags": [], "created_at": "2020-11-06T18:05:20Z", "updated_at": "2020-11-06T18:05:20Z", "revision_number": 0, "project_id": "91dd65c84554489daf8043c474e27aa7"}], "tags": [], "created_at": "2020-11-06T18:05:20Z", "updated_at": "2020-11-06T18:05:20Z", "revision_number": 1, "project_id": "91dd65c84554489daf8043c474e27aa7"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:20.460 37 INFO tempest.lib.common.rest_client [req-3fbaa130-efe3-4a13-b038-669df3939b74 ] Request (VolumeHostsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/3f6ac225-3a9c-481a-b81b-66ecd98d2ee3 0.137s 2020-11-06 18:05:20.461 37 DEBUG tempest.lib.common.rest_client [req-3fbaa130-efe3-4a13-b038-669df3939b74 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-3fbaa130-efe3-4a13-b038-669df3939b74', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:05:20 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/3f6ac225-3a9c-481a-b81b-66ecd98d2ee3'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:20.671 37 INFO tempest.lib.common.rest_client [req-374a098c-6d55-4bf0-ac6a-f3341237066a ] Request (VolumeHostsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/91dd65c84554489daf8043c474e27aa7 0.209s 2020-11-06 18:05:20.671 37 DEBUG tempest.lib.common.rest_client [req-374a098c-6d55-4bf0-ac6a-f3341237066a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-374a098c-6d55-4bf0-ac6a-f3341237066a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/91dd65c84554489daf8043c474e27aa7'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:20.794 37 INFO tempest.lib.common.rest_client [req-e3871a8a-3155-4a01-a17e-420a252f2765 ] Request (VolumeQuotasV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.119s 2020-11-06 18:05:20.795 37 DEBUG tempest.lib.common.rest_client [req-e3871a8a-3155-4a01-a17e-420a252f2765 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e3871a8a-3155-4a01-a17e-420a252f2765', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["ES7dCaNDQLyB3JIehLQ8mw"], "expires_at": "2020-11-06T19:05:20.000000Z", "issued_at": "2020-11-06T18:05:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:20.842 37 INFO tempest.lib.common.rest_client [req-6d3e8dfd-4ad2-4453-9413-a31cdd0705d9 ] Request (VolumeQuotasV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:05:20.843 37 DEBUG tempest.lib.common.rest_client [req-6d3e8dfd-4ad2-4453-9413-a31cdd0705d9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6d3e8dfd-4ad2-4453-9413-a31cdd0705d9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["g2yRJ69LSw-GuEcNZQS3pw"], "expires_at": "2020-11-06T19:05:20.000000Z", "issued_at": "2020-11-06T18:05:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:20.902 37 INFO tempest.lib.common.rest_client [req-8e816f4b-e69e-4666-9a30-25669943f115 ] Request (VolumeQuotasV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.057s 2020-11-06 18:05:20.902 37 DEBUG tempest.lib.common.rest_client [req-8e816f4b-e69e-4666-9a30-25669943f115 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8e816f4b-e69e-4666-9a30-25669943f115', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:20.964 37 INFO tempest.lib.common.rest_client [req-1234f1df-ff8d-4f46-9e08-78e98f30be28 ] Request (VolumeQuotasV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.061s 2020-11-06 18:05:20.965 37 DEBUG tempest.lib.common.rest_client [req-1234f1df-ff8d-4f46-9e08-78e98f30be28 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumeQuotasV3RbacTest-1784831785-desc", "domain_id": "default", "name": "tempest-VolumeQuotasV3RbacTest-1784831785"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '382', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1234f1df-ff8d-4f46-9e08-78e98f30be28', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "4dc12afb13e64f688d11fd5a6e46e7f7", "name": "tempest-VolumeQuotasV3RbacTest-1784831785", "domain_id": "default", "description": "tempest-VolumeQuotasV3RbacTest-1784831785-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:21.065 37 INFO tempest.lib.common.rest_client [req-f19840c2-f284-4164-8e6e-6cb61ad147c8 ] Request (VolumeQuotasV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.099s 2020-11-06 18:05:21.066 37 DEBUG tempest.lib.common.rest_client [req-f19840c2-f284-4164-8e6e-6cb61ad147c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumeQuotasV3RbacTest-1784831785", "password": "D2#^f4G+xErp!AJ", "project_id": "4dc12afb13e64f688d11fd5a6e46e7f7", "email": "tempest-VolumeQuotasV3RbacTest-965381776@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '399', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f19840c2-f284-4164-8e6e-6cb61ad147c8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "4dc12afb13e64f688d11fd5a6e46e7f7", "email": "tempest-VolumeQuotasV3RbacTest-965381776@example.com", "id": "8c460ff645b145109df8416ecd0585e6", "name": "tempest-VolumeQuotasV3RbacTest-1784831785", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/8c460ff645b145109df8416ecd0585e6"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:21.113 37 INFO tempest.lib.common.rest_client [req-9679bb1a-d734-4795-aa9f-4c1863b0a1f8 ] Request (VolumeQuotasV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.046s 2020-11-06 18:05:21.113 37 DEBUG tempest.lib.common.rest_client [req-9679bb1a-d734-4795-aa9f-4c1863b0a1f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9679bb1a-d734-4795-aa9f-4c1863b0a1f8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:21.169 37 INFO tempest.lib.common.rest_client [req-a60cb12c-8b38-44f3-afb4-4c5c43f921a9 ] Request (VolumeQuotasV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-11-06 18:05:21.170 37 DEBUG tempest.lib.common.rest_client [req-a60cb12c-8b38-44f3-afb4-4c5c43f921a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a60cb12c-8b38-44f3-afb4-4c5c43f921a9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:21.246 37 INFO tempest.lib.common.rest_client [req-73775ea2-0b42-435c-9c31-0a1c715c3e5d ] Request (VolumeQuotasV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles/72a4576c553448cd941b052c1ca0cf2d 0.075s 2020-11-06 18:05:21.247 37 DEBUG tempest.lib.common.rest_client [req-73775ea2-0b42-435c-9c31-0a1c715c3e5d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-73775ea2-0b42-435c-9c31-0a1c715c3e5d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:21.247 37 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumeQuotasV3RbacTest-1784831785', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '4dc12afb13e64f688d11fd5a6e46e7f7', 'project_name': 'tempest-VolumeQuotasV3RbacTest-1784831785', 'tenant_id': '4dc12afb13e64f688d11fd5a6e46e7f7', 'tenant_name': 'tempest-VolumeQuotasV3RbacTest-1784831785', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '8c460ff645b145109df8416ecd0585e6'}, Network: None, Subnet: None, Router: None 2020-11-06 18:05:21.248 37 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumeQuotasV3RbacTest-1784831785', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '4dc12afb13e64f688d11fd5a6e46e7f7', 'project_name': 'tempest-VolumeQuotasV3RbacTest-1784831785', 'tenant_id': '4dc12afb13e64f688d11fd5a6e46e7f7', 'tenant_name': 'tempest-VolumeQuotasV3RbacTest-1784831785', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '8c460ff645b145109df8416ecd0585e6'}, Network: None, Subnet: None, Router: None 2020-11-06 18:05:21.372 37 INFO tempest.lib.common.rest_client [req-27270c94-234d-4027-9045-271ff702d55b ] Request (VolumeQuotasV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.116s 2020-11-06 18:05:21.373 37 DEBUG tempest.lib.common.rest_client [req-27270c94-234d-4027-9045-271ff702d55b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6575', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-27270c94-234d-4027-9045-271ff702d55b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8c460ff645b145109df8416ecd0585e6", "name": "tempest-VolumeQuotasV3RbacTest-1784831785", "password_expires_at": null}, "audit_ids": ["eUMe-R4nRwWiq9Mx6LYNxA"], "expires_at": "2020-11-06T19:05:21.000000Z", "issued_at": "2020-11-06T18:05:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4dc12afb13e64f688d11fd5a6e46e7f7", "name": "tempest-VolumeQuotasV3RbacTest-1784831785"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http:/ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:21.462 37 INFO tempest.lib.common.rest_client [req-b956fe2e-0193-4c8b-a143-b7e9fa202480 ] Request (VolumeQuotasV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-11-06 18:05:21.462 37 DEBUG tempest.lib.common.rest_client [req-b956fe2e-0193-4c8b-a143-b7e9fa202480 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b956fe2e-0193-4c8b-a143-b7e9fa202480', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["sCpUguLfRgelyURBy_ZHTw"], "expires_at": "2020-11-06T19:05:21.000000Z", "issued_at": "2020-11-06T18:05:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:21.509 37 INFO tempest.lib.common.rest_client [req-c2c2c03b-d1e9-4822-aaac-d727bf8440ee ] Request (VolumeQuotasV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:05:21.509 37 DEBUG tempest.lib.common.rest_client [req-c2c2c03b-d1e9-4822-aaac-d727bf8440ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c2c2c03b-d1e9-4822-aaac-d727bf8440ee', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["k9ipmy5DSZKydmYjJFkebg"], "expires_at": "2020-11-06T19:05:21.000000Z", "issued_at": "2020-11-06T18:05:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:21.559 37 INFO tempest.lib.common.rest_client [req-bd19b087-0578-4864-beb9-46fd3cfe478c ] Request (VolumeQuotasV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.049s 2020-11-06 18:05:21.560 37 DEBUG tempest.lib.common.rest_client [req-bd19b087-0578-4864-beb9-46fd3cfe478c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bd19b087-0578-4864-beb9-46fd3cfe478c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:21.610 37 INFO tempest.lib.common.rest_client [req-f7cd2a3d-da0a-4440-ab17-4a1ee6d36d2e ] Request (VolumeQuotasV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.049s 2020-11-06 18:05:21.611 37 DEBUG tempest.lib.common.rest_client [req-f7cd2a3d-da0a-4440-ab17-4a1ee6d36d2e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f7cd2a3d-da0a-4440-ab17-4a1ee6d36d2e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:21.611 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:05:21.612 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:21.666 37 INFO tempest.lib.common.rest_client [req-6e575d6f-b222-4897-bf7b-f78f086400f1 ] Request (VolumeQuotasV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles 0.054s 2020-11-06 18:05:21.667 37 DEBUG tempest.lib.common.rest_client [req-6e575d6f-b222-4897-bf7b-f78f086400f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6e575d6f-b222-4897-bf7b-f78f086400f1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:21.725 37 INFO tempest.lib.common.rest_client [req-f3ca9d32-c3d3-4efc-8f22-54d1bfc38c38 ] Request (VolumeQuotasV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles/72a4576c553448cd941b052c1ca0cf2d 0.058s 2020-11-06 18:05:21.725 37 DEBUG tempest.lib.common.rest_client [req-f3ca9d32-c3d3-4efc-8f22-54d1bfc38c38 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f3ca9d32-c3d3-4efc-8f22-54d1bfc38c38', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:21.831 37 INFO tempest.lib.common.rest_client [req-e5f61610-4a7d-49d7-8e7a-d95b9724237a ] Request (VolumeQuotasV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles/a629c95d64b3416fb80ae90af4f69c05 0.105s 2020-11-06 18:05:21.832 37 DEBUG tempest.lib.common.rest_client [req-e5f61610-4a7d-49d7-8e7a-d95b9724237a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e5f61610-4a7d-49d7-8e7a-d95b9724237a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:22.328 39 INFO tempest.lib.common.rest_client [req-30493b60-295f-421e-b690-9d02e5624ffd ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 1.661s 2020-11-06 18:05:22.328 39 DEBUG tempest.lib.common.rest_client [req-30493b60-295f-421e-b690-9d02e5624ffd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-30493b60-295f-421e-b690-9d02e5624ffd', 'x-compute-request-id': 'req-30493b60-295f-421e-b690-9d02e5624ffd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:22.912 37 INFO tempest.lib.common.rest_client [req-78dc2756-5fd5-40c4-9b43-0fbbc51e475e ] Request (VolumeQuotasV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.079s 2020-11-06 18:05:22.913 37 DEBUG tempest.lib.common.rest_client [req-78dc2756-5fd5-40c4-9b43-0fbbc51e475e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-78dc2756-5fd5-40c4-9b43-0fbbc51e475e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8c460ff645b145109df8416ecd0585e6", "name": "tempest-VolumeQuotasV3RbacTest-1784831785", "password_expires_at": null}, "audit_ids": ["U57p0LE1T5mKVYaEP0HW7w"], "expires_at": "2020-11-06T19:05:22.000000Z", "issued_at": "2020-11-06T18:05:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4dc12afb13e64f688d11fd5a6e46e7f7", "name": "tempest-VolumeQuotasV3RbacTest-1784831785"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:22.915 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:05:22.917 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:quotas:delete, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:05:23.102 37 INFO tempest.lib.common.rest_client [req-4dba7b98-7cbc-4939-bcb6-cfb9b104e4b0 ] Request (VolumeQuotasV3RbacTest:test_delete_quota_set): 200 GET http://172.30.13.94/volume/v3/4dc12afb13e64f688d11fd5a6e46e7f7/os-quota-sets/4dc12afb13e64f688d11fd5a6e46e7f7/defaults 0.184s 2020-11-06 18:05:23.102 37 DEBUG tempest.lib.common.rest_client [req-4dba7b98-7cbc-4939-bcb6-cfb9b104e4b0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4dba7b98-7cbc-4939-bcb6-cfb9b104e4b0', 'content-length': '340', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4dba7b98-7cbc-4939-bcb6-cfb9b104e4b0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/4dc12afb13e64f688d11fd5a6e46e7f7/os-quota-sets/4dc12afb13e64f688d11fd5a6e46e7f7/defaults'} Body: b'{"quota_set": {"volumes": 10, "per_volume_gigabytes": -1, "snapshots": 10, "gigabytes": 1000, "backups": 10, "backup_gigabytes": 1000, "volumes_ceph": -1, "gigabytes_ceph": -1, "snapshots_ceph": -1, "volumes___DEFAULT__": -1, "gigabytes___DEFAULT__": -1, "snapshots___DEFAULT__": -1, "groups": 10, "id": "4dc12afb13e64f688d11fd5a6e46e7f7"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:23.107 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:23.213 37 INFO tempest.lib.common.rest_client [req-c19c9310-2dd0-4273-8eb8-99de87127d82 ] Request (VolumeQuotasV3RbacTest:test_delete_quota_set): 200 GET http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles 0.105s 2020-11-06 18:05:23.214 37 DEBUG tempest.lib.common.rest_client [req-c19c9310-2dd0-4273-8eb8-99de87127d82 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c19c9310-2dd0-4273-8eb8-99de87127d82', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:23.247 37 INFO tempest.lib.common.rest_client [req-8278eceb-a896-4423-8f96-935f6ccb5e30 ] Request (VolumeQuotasV3RbacTest:test_delete_quota_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:05:23.248 37 DEBUG tempest.lib.common.rest_client [req-8278eceb-a896-4423-8f96-935f6ccb5e30 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8278eceb-a896-4423-8f96-935f6ccb5e30', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8c460ff645b145109df8416ecd0585e6", "name": "tempest-VolumeQuotasV3RbacTest-1784831785", "password_expires_at": null}, "audit_ids": ["OLD41l5jS7K8a-uc-kEKYA"], "expires_at": "2020-11-06T19:05:23.000000Z", "issued_at": "2020-11-06T18:05:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4dc12afb13e64f688d11fd5a6e46e7f7", "name": "tempest-VolumeQuotasV3RbacTest-1784831785"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:23.336 37 INFO tempest.lib.common.rest_client [req-690ca151-08a8-4366-80c9-b78c883ba0e4 ] Request (VolumeQuotasV3RbacTest:test_delete_quota_set): 200 DELETE http://172.30.13.94/volume/v3/4dc12afb13e64f688d11fd5a6e46e7f7/os-quota-sets/4dc12afb13e64f688d11fd5a6e46e7f7 0.087s 2020-11-06 18:05:23.337 37 DEBUG tempest.lib.common.rest_client [req-690ca151-08a8-4366-80c9-b78c883ba0e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-690ca151-08a8-4366-80c9-b78c883ba0e4', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-690ca151-08a8-4366-80c9-b78c883ba0e4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/4dc12afb13e64f688d11fd5a6e46e7f7/os-quota-sets/4dc12afb13e64f688d11fd5a6e46e7f7'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:23.338 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:23.399 37 INFO tempest.lib.common.rest_client [req-2208336a-6428-4186-9842-f0220142cff4 ] Request (VolumeQuotasV3RbacTest:test_delete_quota_set): 200 GET http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles 0.061s 2020-11-06 18:05:23.400 37 DEBUG tempest.lib.common.rest_client [req-2208336a-6428-4186-9842-f0220142cff4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2208336a-6428-4186-9842-f0220142cff4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:23.440 37 INFO tempest.lib.common.rest_client [req-bc2862f5-ee0f-403a-a51f-ad4481ac68eb ] Request (VolumeQuotasV3RbacTest:test_delete_quota_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:05:23.441 37 DEBUG tempest.lib.common.rest_client [req-bc2862f5-ee0f-403a-a51f-ad4481ac68eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bc2862f5-ee0f-403a-a51f-ad4481ac68eb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8c460ff645b145109df8416ecd0585e6", "name": "tempest-VolumeQuotasV3RbacTest-1784831785", "password_expires_at": null}, "audit_ids": ["D-CZ9NTYT-qIVOt49ETE_w"], "expires_at": "2020-11-06T19:05:23.000000Z", "issued_at": "2020-11-06T18:05:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4dc12afb13e64f688d11fd5a6e46e7f7", "name": "tempest-VolumeQuotasV3RbacTest-1784831785"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:23.547 39 INFO tempest.lib.common.rest_client [req-6964a552-4dff-4c08-a731-a06207ba8cfb ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.201s 2020-11-06 18:05:23.547 39 DEBUG tempest.lib.common.rest_client [req-6964a552-4dff-4c08-a731-a06207ba8cfb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6964a552-4dff-4c08-a731-a06207ba8cfb', 'x-compute-request-id': 'req-6964a552-4dff-4c08-a731-a06207ba8cfb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:23.669 37 INFO tempest.lib.common.rest_client [req-00a97bc7-71af-4cfd-b495-ab146d140662 ] Request (VolumeQuotasV3RbacTest:_run_cleanups): 200 PUT http://172.30.13.94/volume/v3/4dc12afb13e64f688d11fd5a6e46e7f7/os-quota-sets/4dc12afb13e64f688d11fd5a6e46e7f7 0.226s 2020-11-06 18:05:23.670 37 DEBUG tempest.lib.common.rest_client [req-00a97bc7-71af-4cfd-b495-ab146d140662 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"quota_set": {"volumes": 10, "per_volume_gigabytes": -1, "snapshots": 10, "gigabytes": 1000, "backups": 10, "backup_gigabytes": 1000}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-00a97bc7-71af-4cfd-b495-ab146d140662', 'content-length': '298', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-00a97bc7-71af-4cfd-b495-ab146d140662', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/4dc12afb13e64f688d11fd5a6e46e7f7/os-quota-sets/4dc12afb13e64f688d11fd5a6e46e7f7'} Body: b'{"quota_set": {"volumes": 10, "per_volume_gigabytes": -1, "snapshots": 10, "gigabytes": 1000, "backups": 10, "backup_gigabytes": 1000, "volumes_ceph": -1, "gigabytes_ceph": -1, "snapshots_ceph": -1, "volumes___DEFAULT__": -1, "gigabytes___DEFAULT__": -1, "snapshots___DEFAULT__": -1, "groups": 10}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:23.675 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:05:23.677 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:quotas:show, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:05:23.677 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:23.726 37 INFO tempest.lib.common.rest_client [req-4dc7ec1e-6559-4d62-a246-c79e609702a9 ] Request (VolumeQuotasV3RbacTest:test_list_default_quotas): 200 GET http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles 0.049s 2020-11-06 18:05:23.726 37 DEBUG tempest.lib.common.rest_client [req-4dc7ec1e-6559-4d62-a246-c79e609702a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4dc7ec1e-6559-4d62-a246-c79e609702a9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:23.756 37 INFO tempest.lib.common.rest_client [req-e8a1b771-439e-4a1e-8923-6c86fb212319 ] Request (VolumeQuotasV3RbacTest:test_list_default_quotas): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.029s 2020-11-06 18:05:23.757 37 DEBUG tempest.lib.common.rest_client [req-e8a1b771-439e-4a1e-8923-6c86fb212319 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e8a1b771-439e-4a1e-8923-6c86fb212319', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8c460ff645b145109df8416ecd0585e6", "name": "tempest-VolumeQuotasV3RbacTest-1784831785", "password_expires_at": null}, "audit_ids": ["EMWK9w6JS8yBGnSWPpVdJw"], "expires_at": "2020-11-06T19:05:23.000000Z", "issued_at": "2020-11-06T18:05:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4dc12afb13e64f688d11fd5a6e46e7f7", "name": "tempest-VolumeQuotasV3RbacTest-1784831785"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:23.854 37 INFO tempest.lib.common.rest_client [req-daea6b32-63fa-436c-87bd-50fe1fcbc999 ] Request (VolumeQuotasV3RbacTest:test_list_default_quotas): 200 GET http://172.30.13.94/volume/v3/4dc12afb13e64f688d11fd5a6e46e7f7/os-quota-sets/4dc12afb13e64f688d11fd5a6e46e7f7/defaults 0.097s 2020-11-06 18:05:23.855 37 DEBUG tempest.lib.common.rest_client [req-daea6b32-63fa-436c-87bd-50fe1fcbc999 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-daea6b32-63fa-436c-87bd-50fe1fcbc999', 'content-length': '340', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-daea6b32-63fa-436c-87bd-50fe1fcbc999', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/4dc12afb13e64f688d11fd5a6e46e7f7/os-quota-sets/4dc12afb13e64f688d11fd5a6e46e7f7/defaults'} Body: b'{"quota_set": {"volumes": 10, "per_volume_gigabytes": -1, "snapshots": 10, "gigabytes": 1000, "backups": 10, "backup_gigabytes": 1000, "volumes_ceph": -1, "gigabytes_ceph": -1, "snapshots_ceph": -1, "volumes___DEFAULT__": -1, "gigabytes___DEFAULT__": -1, "snapshots___DEFAULT__": -1, "groups": 10, "id": "4dc12afb13e64f688d11fd5a6e46e7f7"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:23.859 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:23.911 37 INFO tempest.lib.common.rest_client [req-9b9b5409-3888-4198-8c2d-2df413d7be8d ] Request (VolumeQuotasV3RbacTest:test_list_default_quotas): 200 GET http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles 0.051s 2020-11-06 18:05:23.912 37 DEBUG tempest.lib.common.rest_client [req-9b9b5409-3888-4198-8c2d-2df413d7be8d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9b9b5409-3888-4198-8c2d-2df413d7be8d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:23.951 37 INFO tempest.lib.common.rest_client [req-3d4b3f84-7b7d-4002-9bdb-fb1217d1318e ] Request (VolumeQuotasV3RbacTest:test_list_default_quotas): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:05:23.951 37 DEBUG tempest.lib.common.rest_client [req-3d4b3f84-7b7d-4002-9bdb-fb1217d1318e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3d4b3f84-7b7d-4002-9bdb-fb1217d1318e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8c460ff645b145109df8416ecd0585e6", "name": "tempest-VolumeQuotasV3RbacTest-1784831785", "password_expires_at": null}, "audit_ids": ["KOjCpE5wRGSSQKbQhjY8dw"], "expires_at": "2020-11-06T19:05:23.000000Z", "issued_at": "2020-11-06T18:05:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4dc12afb13e64f688d11fd5a6e46e7f7", "name": "tempest-VolumeQuotasV3RbacTest-1784831785"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:23.953 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:05:23.955 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:quotas:show, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:05:23.955 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:24.016 37 INFO tempest.lib.common.rest_client [req-bc53cbba-304a-4199-aede-8cb12a1f7228 ] Request (VolumeQuotasV3RbacTest:test_list_quotas): 200 GET http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles 0.060s 2020-11-06 18:05:24.016 37 DEBUG tempest.lib.common.rest_client [req-bc53cbba-304a-4199-aede-8cb12a1f7228 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bc53cbba-304a-4199-aede-8cb12a1f7228', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:24.054 37 INFO tempest.lib.common.rest_client [req-2fcc1412-e212-4f79-92f6-6d90b51b7a4f ] Request (VolumeQuotasV3RbacTest:test_list_quotas): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:05:24.055 37 DEBUG tempest.lib.common.rest_client [req-2fcc1412-e212-4f79-92f6-6d90b51b7a4f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2fcc1412-e212-4f79-92f6-6d90b51b7a4f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8c460ff645b145109df8416ecd0585e6", "name": "tempest-VolumeQuotasV3RbacTest-1784831785", "password_expires_at": null}, "audit_ids": ["I5BcGq4YQ4yOqPPahtwMwg"], "expires_at": "2020-11-06T19:05:24.000000Z", "issued_at": "2020-11-06T18:05:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4dc12afb13e64f688d11fd5a6e46e7f7", "name": "tempest-VolumeQuotasV3RbacTest-1784831785"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:24.172 37 INFO tempest.lib.common.rest_client [req-0fbccc92-75e5-4997-9d5b-c601fee053d5 ] Request (VolumeQuotasV3RbacTest:test_list_quotas): 200 GET http://172.30.13.94/volume/v3/4dc12afb13e64f688d11fd5a6e46e7f7/os-quota-sets/4dc12afb13e64f688d11fd5a6e46e7f7 0.116s 2020-11-06 18:05:24.173 37 DEBUG tempest.lib.common.rest_client [req-0fbccc92-75e5-4997-9d5b-c601fee053d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-0fbccc92-75e5-4997-9d5b-c601fee053d5', 'content-length': '340', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0fbccc92-75e5-4997-9d5b-c601fee053d5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/4dc12afb13e64f688d11fd5a6e46e7f7/os-quota-sets/4dc12afb13e64f688d11fd5a6e46e7f7'} Body: b'{"quota_set": {"volumes": 10, "per_volume_gigabytes": -1, "snapshots": 10, "gigabytes": 1000, "backups": 10, "backup_gigabytes": 1000, "volumes_ceph": -1, "gigabytes_ceph": -1, "snapshots_ceph": -1, "volumes___DEFAULT__": -1, "gigabytes___DEFAULT__": -1, "snapshots___DEFAULT__": -1, "groups": 10, "id": "4dc12afb13e64f688d11fd5a6e46e7f7"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:24.178 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:24.224 37 INFO tempest.lib.common.rest_client [req-faaea144-82e2-4ca8-b8c7-5cf95a3e3b49 ] Request (VolumeQuotasV3RbacTest:test_list_quotas): 200 GET http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles 0.045s 2020-11-06 18:05:24.224 37 DEBUG tempest.lib.common.rest_client [req-faaea144-82e2-4ca8-b8c7-5cf95a3e3b49 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-faaea144-82e2-4ca8-b8c7-5cf95a3e3b49', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:24.259 37 INFO tempest.lib.common.rest_client [req-33fdd899-108c-4f22-b081-ab407b80d968 ] Request (VolumeQuotasV3RbacTest:test_list_quotas): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:05:24.259 37 DEBUG tempest.lib.common.rest_client [req-33fdd899-108c-4f22-b081-ab407b80d968 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-33fdd899-108c-4f22-b081-ab407b80d968', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8c460ff645b145109df8416ecd0585e6", "name": "tempest-VolumeQuotasV3RbacTest-1784831785", "password_expires_at": null}, "audit_ids": ["CbPhaL3jQjy-MLZO95K8Vw"], "expires_at": "2020-11-06T19:05:24.000000Z", "issued_at": "2020-11-06T18:05:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4dc12afb13e64f688d11fd5a6e46e7f7", "name": "tempest-VolumeQuotasV3RbacTest-1784831785"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:24.262 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:05:24.265 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:quotas:show, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:05:24.265 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:24.316 37 INFO tempest.lib.common.rest_client [req-d6adba1b-c625-450e-bdf0-c615203afc5b ] Request (VolumeQuotasV3RbacTest:test_list_quotas_usage_true): 200 GET http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles 0.050s 2020-11-06 18:05:24.316 37 DEBUG tempest.lib.common.rest_client [req-d6adba1b-c625-450e-bdf0-c615203afc5b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d6adba1b-c625-450e-bdf0-c615203afc5b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:24.355 37 INFO tempest.lib.common.rest_client [req-9044932e-e5cf-4719-b304-952cc1be64ed ] Request (VolumeQuotasV3RbacTest:test_list_quotas_usage_true): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:05:24.355 37 DEBUG tempest.lib.common.rest_client [req-9044932e-e5cf-4719-b304-952cc1be64ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9044932e-e5cf-4719-b304-952cc1be64ed', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8c460ff645b145109df8416ecd0585e6", "name": "tempest-VolumeQuotasV3RbacTest-1784831785", "password_expires_at": null}, "audit_ids": ["h-hezNPsQ8SCLeDbDl8FSg"], "expires_at": "2020-11-06T19:05:24.000000Z", "issued_at": "2020-11-06T18:05:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4dc12afb13e64f688d11fd5a6e46e7f7", "name": "tempest-VolumeQuotasV3RbacTest-1784831785"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:24.483 37 INFO tempest.lib.common.rest_client [req-e6a42b14-d683-4f2b-8170-93765d5da7de ] Request (VolumeQuotasV3RbacTest:test_list_quotas_usage_true): 200 GET http://172.30.13.94/volume/v3/4dc12afb13e64f688d11fd5a6e46e7f7/os-quota-sets/4dc12afb13e64f688d11fd5a6e46e7f7?usage=True 0.126s 2020-11-06 18:05:24.484 37 DEBUG tempest.lib.common.rest_client [req-e6a42b14-d683-4f2b-8170-93765d5da7de ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e6a42b14-d683-4f2b-8170-93765d5da7de', 'content-length': '1055', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e6a42b14-d683-4f2b-8170-93765d5da7de', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/4dc12afb13e64f688d11fd5a6e46e7f7/os-quota-sets/4dc12afb13e64f688d11fd5a6e46e7f7?usage=True'} Body: b'{"quota_set": {"volumes": {"limit": 10, "in_use": 0, "reserved": 0, "allocated": 0}, "per_volume_gigabytes": {"limit": -1, "in_use": 0, "reserved": 0, "allocated": 0}, "snapshots": {"limit": 10, "in_use": 0, "reserved": 0, "allocated": 0}, "gigabytes": {"limit": 1000, "in_use": 0, "reserved": 0, "allocated": 0}, "backups": {"limit": 10, "in_use": 0, "reserved": 0, "allocated": 0}, "backup_gigabytes": {"limit": 1000, "in_use": 0, "reserved": 0, "allocated": 0}, "volumes_ceph": {"limit": -1, "in_use": 0, "reserved": 0, "allocated": 0}, "gigabytes_ceph": {"limit": -1, "in_use": 0, "reserved": 0, "allocated": 0}, "snapshots_ceph": {"limit": -1, "in_use": 0, "reserved": 0, "allocated": 0}, "volumes___DEFAULT__": {"limit": -1, "in_use": 0, "reserved": 0, "allocated": 0}, "gigabytes___DEFAULT__": {"limit": -1, "in_use": 0, "reserved": 0, "allocated": 0}, "snapshots___DEFAULT__": {"limit": -1, "in_use": 0, "reserved": 0, "allocated": 0}, "groups": {"limit": 10, "in_use": 0, "reserved": 0, "allocated": 0}, "id": "4dc12afb13e64f688d11fd5a6e46e7f7"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:24.497 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:24.547 37 INFO tempest.lib.common.rest_client [req-98e6b807-15ed-4d84-aa64-225b9fe28a89 ] Request (VolumeQuotasV3RbacTest:test_list_quotas_usage_true): 200 GET http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles 0.049s 2020-11-06 18:05:24.547 37 DEBUG tempest.lib.common.rest_client [req-98e6b807-15ed-4d84-aa64-225b9fe28a89 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-98e6b807-15ed-4d84-aa64-225b9fe28a89', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:24.581 37 INFO tempest.lib.common.rest_client [req-f2a4848d-cff5-4de2-956c-241c7eeb27c4 ] Request (VolumeQuotasV3RbacTest:test_list_quotas_usage_true): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:05:24.582 37 DEBUG tempest.lib.common.rest_client [req-f2a4848d-cff5-4de2-956c-241c7eeb27c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f2a4848d-cff5-4de2-956c-241c7eeb27c4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8c460ff645b145109df8416ecd0585e6", "name": "tempest-VolumeQuotasV3RbacTest-1784831785", "password_expires_at": null}, "audit_ids": ["nKx0nWmQTsu3dfpjYIQJTg"], "expires_at": "2020-11-06T19:05:24.000000Z", "issued_at": "2020-11-06T18:05:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4dc12afb13e64f688d11fd5a6e46e7f7", "name": "tempest-VolumeQuotasV3RbacTest-1784831785"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:24.585 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:05:24.587 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:quotas:update, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:05:24.687 37 INFO tempest.lib.common.rest_client [req-b79a0b08-5fbc-45f7-82f4-51b954f81240 ] Request (VolumeQuotasV3RbacTest:test_update_quota_set): 200 GET http://172.30.13.94/volume/v3/4dc12afb13e64f688d11fd5a6e46e7f7/os-quota-sets/4dc12afb13e64f688d11fd5a6e46e7f7/defaults 0.098s 2020-11-06 18:05:24.687 37 DEBUG tempest.lib.common.rest_client [req-b79a0b08-5fbc-45f7-82f4-51b954f81240 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-b79a0b08-5fbc-45f7-82f4-51b954f81240', 'content-length': '340', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b79a0b08-5fbc-45f7-82f4-51b954f81240', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/4dc12afb13e64f688d11fd5a6e46e7f7/os-quota-sets/4dc12afb13e64f688d11fd5a6e46e7f7/defaults'} Body: b'{"quota_set": {"volumes": 10, "per_volume_gigabytes": -1, "snapshots": 10, "gigabytes": 1000, "backups": 10, "backup_gigabytes": 1000, "volumes_ceph": -1, "gigabytes_ceph": -1, "snapshots_ceph": -1, "volumes___DEFAULT__": -1, "gigabytes___DEFAULT__": -1, "snapshots___DEFAULT__": -1, "groups": 10, "id": "4dc12afb13e64f688d11fd5a6e46e7f7"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:24.692 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:24.745 37 INFO tempest.lib.common.rest_client [req-2acabd48-39cb-4aec-bdba-7f17999aedab ] Request (VolumeQuotasV3RbacTest:test_update_quota_set): 200 GET http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles 0.052s 2020-11-06 18:05:24.746 37 DEBUG tempest.lib.common.rest_client [req-2acabd48-39cb-4aec-bdba-7f17999aedab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2acabd48-39cb-4aec-bdba-7f17999aedab', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:24.784 37 INFO tempest.lib.common.rest_client [req-3318875d-374f-463d-b22d-503c815c80a4 ] Request (VolumeQuotasV3RbacTest:test_update_quota_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:05:24.784 37 DEBUG tempest.lib.common.rest_client [req-3318875d-374f-463d-b22d-503c815c80a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3318875d-374f-463d-b22d-503c815c80a4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8c460ff645b145109df8416ecd0585e6", "name": "tempest-VolumeQuotasV3RbacTest-1784831785", "password_expires_at": null}, "audit_ids": ["UhoWVmhbTwyi5v_CpphB-g"], "expires_at": "2020-11-06T19:05:24.000000Z", "issued_at": "2020-11-06T18:05:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4dc12afb13e64f688d11fd5a6e46e7f7", "name": "tempest-VolumeQuotasV3RbacTest-1784831785"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:24.829 39 INFO tempest.lib.common.rest_client [req-9580af00-dcc3-4ca5-8666-1f04c376a332 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.265s 2020-11-06 18:05:24.830 39 DEBUG tempest.lib.common.rest_client [req-9580af00-dcc3-4ca5-8666-1f04c376a332 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9580af00-dcc3-4ca5-8666-1f04c376a332', 'x-compute-request-id': 'req-9580af00-dcc3-4ca5-8666-1f04c376a332', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:24.965 37 INFO tempest.lib.common.rest_client [req-e883fd84-7b0c-45c5-b9c5-e8283b796ff2 ] Request (VolumeQuotasV3RbacTest:test_update_quota_set): 200 PUT http://172.30.13.94/volume/v3/4dc12afb13e64f688d11fd5a6e46e7f7/os-quota-sets/4dc12afb13e64f688d11fd5a6e46e7f7 0.179s 2020-11-06 18:05:24.966 37 DEBUG tempest.lib.common.rest_client [req-e883fd84-7b0c-45c5-b9c5-e8283b796ff2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"quota_set": {"gigabytes": 1009, "volumes": 11, "snapshots": 11}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e883fd84-7b0c-45c5-b9c5-e8283b796ff2', 'content-length': '298', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e883fd84-7b0c-45c5-b9c5-e8283b796ff2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/4dc12afb13e64f688d11fd5a6e46e7f7/os-quota-sets/4dc12afb13e64f688d11fd5a6e46e7f7'} Body: b'{"quota_set": {"volumes": 11, "per_volume_gigabytes": -1, "snapshots": 11, "gigabytes": 1009, "backups": 10, "backup_gigabytes": 1000, "volumes_ceph": -1, "gigabytes_ceph": -1, "snapshots_ceph": -1, "volumes___DEFAULT__": -1, "gigabytes___DEFAULT__": -1, "snapshots___DEFAULT__": -1, "groups": 10}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:24.970 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:25.029 37 INFO tempest.lib.common.rest_client [req-658bef86-3dfe-41d4-85ac-053452914da2 ] Request (VolumeQuotasV3RbacTest:test_update_quota_set): 200 GET http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles 0.058s 2020-11-06 18:05:25.030 37 DEBUG tempest.lib.common.rest_client [req-658bef86-3dfe-41d4-85ac-053452914da2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-658bef86-3dfe-41d4-85ac-053452914da2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7/users/8c460ff645b145109df8416ecd0585e6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:25.064 37 INFO tempest.lib.common.rest_client [req-81d44241-632a-49e0-b08a-ce7a04d0b9db ] Request (VolumeQuotasV3RbacTest:test_update_quota_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:05:25.065 37 DEBUG tempest.lib.common.rest_client [req-81d44241-632a-49e0-b08a-ce7a04d0b9db ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-81d44241-632a-49e0-b08a-ce7a04d0b9db', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8c460ff645b145109df8416ecd0585e6", "name": "tempest-VolumeQuotasV3RbacTest-1784831785", "password_expires_at": null}, "audit_ids": ["Y8OfWPkCQ5SQTtj4BJfMxw"], "expires_at": "2020-11-06T19:05:25.000000Z", "issued_at": "2020-11-06T18:05:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4dc12afb13e64f688d11fd5a6e46e7f7", "name": "tempest-VolumeQuotasV3RbacTest-1784831785"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4dc12afb13e64f688d11fd5a6e46e7f7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:25.271 37 INFO tempest.lib.common.rest_client [req-a81c02f2-016c-4429-9263-6ce8ed3c9d8b ] Request (VolumeQuotasV3RbacTest:_run_cleanups): 200 PUT http://172.30.13.94/volume/v3/4dc12afb13e64f688d11fd5a6e46e7f7/os-quota-sets/4dc12afb13e64f688d11fd5a6e46e7f7 0.205s 2020-11-06 18:05:25.271 37 DEBUG tempest.lib.common.rest_client [req-a81c02f2-016c-4429-9263-6ce8ed3c9d8b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"quota_set": {"volumes": 10, "per_volume_gigabytes": -1, "snapshots": 10, "gigabytes": 1000, "backups": 10, "backup_gigabytes": 1000}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a81c02f2-016c-4429-9263-6ce8ed3c9d8b', 'content-length': '298', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a81c02f2-016c-4429-9263-6ce8ed3c9d8b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/4dc12afb13e64f688d11fd5a6e46e7f7/os-quota-sets/4dc12afb13e64f688d11fd5a6e46e7f7'} Body: b'{"quota_set": {"volumes": 10, "per_volume_gigabytes": -1, "snapshots": 10, "gigabytes": 1000, "backups": 10, "backup_gigabytes": 1000, "volumes_ceph": -1, "gigabytes_ceph": -1, "snapshots_ceph": -1, "volumes___DEFAULT__": -1, "gigabytes___DEFAULT__": -1, "snapshots___DEFAULT__": -1, "groups": 10}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:25.416 37 INFO tempest.lib.common.rest_client [req-ac829e3a-c2e9-4b65-829b-c2db569a49d2 ] Request (VolumeQuotasV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/8c460ff645b145109df8416ecd0585e6 0.139s 2020-11-06 18:05:25.416 37 DEBUG tempest.lib.common.rest_client [req-ac829e3a-c2e9-4b65-829b-c2db569a49d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ac829e3a-c2e9-4b65-829b-c2db569a49d2', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/8c460ff645b145109df8416ecd0585e6'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:25.502 37 INFO tempest.lib.common.rest_client [req-de64b8bf-21dd-4ad8-b398-e17930611a4c ] Request (VolumeQuotasV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:05:25.503 37 DEBUG tempest.lib.common.rest_client [req-de64b8bf-21dd-4ad8-b398-e17930611a4c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-de64b8bf-21dd-4ad8-b398-e17930611a4c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["LFL4sLOPTnyPGGUf8JczXA"], "expires_at": "2020-11-06T19:05:25.000000Z", "issued_at": "2020-11-06T18:05:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:25.796 37 INFO tempest.lib.common.rest_client [req-08d7c406-8b5d-4ca2-9cac-67ffb461bd60 ] Request (VolumeQuotasV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=4dc12afb13e64f688d11fd5a6e46e7f7&name=default 0.292s 2020-11-06 18:05:25.796 37 DEBUG tempest.lib.common.rest_client [req-08d7c406-8b5d-4ca2-9cac-67ffb461bd60 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-08d7c406-8b5d-4ca2-9cac-67ffb461bd60', 'date': 'Fri, 06 Nov 2020 18:05:25 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=4dc12afb13e64f688d11fd5a6e46e7f7&name=default'} Body: b'{"security_groups": [{"id": "bc11367e-f4cb-4f5e-a1b2-e0dd58467e4a", "name": "default", "stateful": true, "tenant_id": "4dc12afb13e64f688d11fd5a6e46e7f7", "description": "Default security group", "security_group_rules": [{"id": "26ff4e29-4964-4b7e-be7f-c6eeb256c2c0", "tenant_id": "4dc12afb13e64f688d11fd5a6e46e7f7", "security_group_id": "bc11367e-f4cb-4f5e-a1b2-e0dd58467e4a", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:05:25Z", "updated_at": "2020-11-06T18:05:25Z", "revision_number": 0, "project_id": "4dc12afb13e64f688d11fd5a6e46e7f7"}, {"id": "744f5947-e283-4fd2-a054-77266964d316", "tenant_id": "4dc12afb13e64f688d11fd5a6e46e7f7", "security_group_id": "bc11367e-f4cb-4f5e-a1b2-e0dd58467e4a", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "bc11367e-f4cb-4f5e-a1b2-e0dd58467e4a", "description": null, "tags": [], "created_at": "2020-11-06T18:05:25Z", "updated_at": "2020-11-06T18:05:25Z", "revision_number": 0, "project_id": "4dc12afb13e64f688d11fd5a6e46e7f7"}, {"id": "9cc85351-4b8c-4164-8a71-4770809ec7fd", "tenant_id": "4dc12afb13e64f688d11fd5a6e46e7f7", "security_group_id": "bc11367e-f4cb-4f5e-a1b2-e0dd58467e4a", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:05:25Z", "updated_at": "2020-11-06T18:05:25Z", "revision_number": 0, "project_id": "4dc12afb13e64f688d11fd5a6e46e7f7"}, {"id": "dda062a1-0454-4128-9ae8-58efa3b5f267", "tenant_id": "4dc12afb13e64f688d11fd5a6e46e7f7", "security_group_id": "bc11367e-f4cb-4f5e-a1b2-e0dd58467e4a", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "bc11367e-f4cb-4f5e-a1b2-e0dd58467e4a", "description": null, "tags": [], "created_at": "2020-11-06T18:05:25Z", "updated_at": "2020-11-06T18:05:25Z", "revision_number": 0, "project_id": "4dc12afb13e64f688d11fd5a6e46e7f7"}], "tags": [], "created_at": "2020-11-06T18:05:25Z", "updated_at": "2020-11-06T18:05:25Z", "revision_number": 1, "project_id": "4dc12afb13e64f688d11fd5a6e46e7f7"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:25.927 37 INFO tempest.lib.common.rest_client [req-955e94c2-f6e3-471c-96e1-304718bfec06 ] Request (VolumeQuotasV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/bc11367e-f4cb-4f5e-a1b2-e0dd58467e4a 0.130s 2020-11-06 18:05:25.927 37 DEBUG tempest.lib.common.rest_client [req-955e94c2-f6e3-471c-96e1-304718bfec06 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-955e94c2-f6e3-471c-96e1-304718bfec06', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:05:25 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/bc11367e-f4cb-4f5e-a1b2-e0dd58467e4a'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:26.046 37 INFO tempest.lib.common.rest_client [req-dc2f3be7-432e-4d81-9405-eb7c3ba9ef81 ] Request (VolumeQuotasV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7 0.118s 2020-11-06 18:05:26.046 37 DEBUG tempest.lib.common.rest_client [req-dc2f3be7-432e-4d81-9405-eb7c3ba9ef81 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dc2f3be7-432e-4d81-9405-eb7c3ba9ef81', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/4dc12afb13e64f688d11fd5a6e46e7f7'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:26.155 37 INFO tempest.lib.common.rest_client [req-c8c519aa-fde3-46df-b336-93a29271f26e ] Request (VolumesTransfersV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.105s 2020-11-06 18:05:26.155 37 DEBUG tempest.lib.common.rest_client [req-c8c519aa-fde3-46df-b336-93a29271f26e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c8c519aa-fde3-46df-b336-93a29271f26e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["wdhydsCdQfmwZpJKlEDC3A"], "expires_at": "2020-11-06T19:05:26.000000Z", "issued_at": "2020-11-06T18:05:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:26.198 37 INFO tempest.lib.common.rest_client [req-2b134243-7d7e-4cd3-acc5-13b8204dea45 ] Request (VolumesTransfersV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:05:26.199 37 DEBUG tempest.lib.common.rest_client [req-2b134243-7d7e-4cd3-acc5-13b8204dea45 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2b134243-7d7e-4cd3-acc5-13b8204dea45', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["9ZnyDqzTTgelopM_NSNOzw"], "expires_at": "2020-11-06T19:05:26.000000Z", "issued_at": "2020-11-06T18:05:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:26.261 37 INFO tempest.lib.common.rest_client [req-301c6e17-887a-4936-8d6c-454540d18d51 ] Request (VolumesTransfersV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.061s 2020-11-06 18:05:26.261 37 DEBUG tempest.lib.common.rest_client [req-301c6e17-887a-4936-8d6c-454540d18d51 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-301c6e17-887a-4936-8d6c-454540d18d51', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:26.270 39 INFO tempest.lib.common.rest_client [req-f69f9055-c300-4965-83b7-c877586de5f5 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.423s 2020-11-06 18:05:26.271 39 DEBUG tempest.lib.common.rest_client [req-f69f9055-c300-4965-83b7-c877586de5f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f69f9055-c300-4965-83b7-c877586de5f5', 'x-compute-request-id': 'req-f69f9055-c300-4965-83b7-c877586de5f5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:26.332 37 INFO tempest.lib.common.rest_client [req-60335d83-c0f0-4dd8-a607-6fef89437807 ] Request (VolumesTransfersV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.069s 2020-11-06 18:05:26.332 37 DEBUG tempest.lib.common.rest_client [req-60335d83-c0f0-4dd8-a607-6fef89437807 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumesTransfersV3RbacTest-1022261755-desc", "domain_id": "default", "name": "tempest-VolumesTransfersV3RbacTest-1022261755"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '390', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-60335d83-c0f0-4dd8-a607-6fef89437807', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "b7671d967dff4cbea36459fa4f0d2f15", "name": "tempest-VolumesTransfersV3RbacTest-1022261755", "domain_id": "default", "description": "tempest-VolumesTransfersV3RbacTest-1022261755-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:26.451 37 INFO tempest.lib.common.rest_client [req-3c44b730-0ecf-4ba1-afe4-8253220faa9c ] Request (VolumesTransfersV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.117s 2020-11-06 18:05:26.451 37 DEBUG tempest.lib.common.rest_client [req-3c44b730-0ecf-4ba1-afe4-8253220faa9c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumesTransfersV3RbacTest-1022261755", "password": "B0^V20Oj^9#tBnu", "project_id": "b7671d967dff4cbea36459fa4f0d2f15", "email": "tempest-VolumesTransfersV3RbacTest-1717562703@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '408', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3c44b730-0ecf-4ba1-afe4-8253220faa9c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "b7671d967dff4cbea36459fa4f0d2f15", "email": "tempest-VolumesTransfersV3RbacTest-1717562703@example.com", "id": "090ad71ccaa24f9e8153791fe9327a79", "name": "tempest-VolumesTransfersV3RbacTest-1022261755", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/090ad71ccaa24f9e8153791fe9327a79"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:26.501 37 INFO tempest.lib.common.rest_client [req-0e4dfc30-44d6-426e-9041-375c3824457d ] Request (VolumesTransfersV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.048s 2020-11-06 18:05:26.502 37 DEBUG tempest.lib.common.rest_client [req-0e4dfc30-44d6-426e-9041-375c3824457d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0e4dfc30-44d6-426e-9041-375c3824457d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:26.556 37 INFO tempest.lib.common.rest_client [req-2e991e13-5eac-4692-b8d0-b76cf1a588f6 ] Request (VolumesTransfersV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.053s 2020-11-06 18:05:26.557 37 DEBUG tempest.lib.common.rest_client [req-2e991e13-5eac-4692-b8d0-b76cf1a588f6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2e991e13-5eac-4692-b8d0-b76cf1a588f6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:26.635 37 INFO tempest.lib.common.rest_client [req-34df6940-c826-4d93-bf03-cc5e71302c6b ] Request (VolumesTransfersV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles/72a4576c553448cd941b052c1ca0cf2d 0.077s 2020-11-06 18:05:26.636 37 DEBUG tempest.lib.common.rest_client [req-34df6940-c826-4d93-bf03-cc5e71302c6b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-34df6940-c826-4d93-bf03-cc5e71302c6b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:26.636 37 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesTransfersV3RbacTest-1022261755', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'b7671d967dff4cbea36459fa4f0d2f15', 'project_name': 'tempest-VolumesTransfersV3RbacTest-1022261755', 'tenant_id': 'b7671d967dff4cbea36459fa4f0d2f15', 'tenant_name': 'tempest-VolumesTransfersV3RbacTest-1022261755', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '090ad71ccaa24f9e8153791fe9327a79'}, Network: None, Subnet: None, Router: None 2020-11-06 18:05:26.637 37 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesTransfersV3RbacTest-1022261755', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'b7671d967dff4cbea36459fa4f0d2f15', 'project_name': 'tempest-VolumesTransfersV3RbacTest-1022261755', 'tenant_id': 'b7671d967dff4cbea36459fa4f0d2f15', 'tenant_name': 'tempest-VolumesTransfersV3RbacTest-1022261755', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '090ad71ccaa24f9e8153791fe9327a79'}, Network: None, Subnet: None, Router: None 2020-11-06 18:05:26.753 37 INFO tempest.lib.common.rest_client [req-16581e15-4cbf-4213-88e4-6f3873b813ff ] Request (VolumesTransfersV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.103s 2020-11-06 18:05:26.754 37 DEBUG tempest.lib.common.rest_client [req-16581e15-4cbf-4213-88e4-6f3873b813ff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6583', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-16581e15-4cbf-4213-88e4-6f3873b813ff', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "090ad71ccaa24f9e8153791fe9327a79", "name": "tempest-VolumesTransfersV3RbacTest-1022261755", "password_expires_at": null}, "audit_ids": ["RAEl3byDQkyzQM9jfvAW3g"], "expires_at": "2020-11-06T19:05:26.000000Z", "issued_at": "2020-11-06T18:05:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b7671d967dff4cbea36459fa4f0d2f15", "name": "tempest-VolumesTransfersV3RbacTest-1022261755"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:26.848 37 INFO tempest.lib.common.rest_client [req-42413806-fd09-4262-8330-cfbcc7d8ea16 ] Request (VolumesTransfersV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-11-06 18:05:26.848 37 DEBUG tempest.lib.common.rest_client [req-42413806-fd09-4262-8330-cfbcc7d8ea16 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-42413806-fd09-4262-8330-cfbcc7d8ea16', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["sJT8SSb-TCSFYzuK4fzthg"], "expires_at": "2020-11-06T19:05:26.000000Z", "issued_at": "2020-11-06T18:05:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:26.895 37 INFO tempest.lib.common.rest_client [req-c6da7922-00a0-4116-8846-cb8c1cd898ea ] Request (VolumesTransfersV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:05:26.895 37 DEBUG tempest.lib.common.rest_client [req-c6da7922-00a0-4116-8846-cb8c1cd898ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c6da7922-00a0-4116-8846-cb8c1cd898ea', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["4M25t4FoSlSUrm5YCteX2A"], "expires_at": "2020-11-06T19:05:26.000000Z", "issued_at": "2020-11-06T18:05:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:26.942 37 INFO tempest.lib.common.rest_client [req-7f8f1f7d-0094-43f4-a579-d9c9fc5ad20f ] Request (VolumesTransfersV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.046s 2020-11-06 18:05:26.942 37 DEBUG tempest.lib.common.rest_client [req-7f8f1f7d-0094-43f4-a579-d9c9fc5ad20f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7f8f1f7d-0094-43f4-a579-d9c9fc5ad20f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:26.995 37 INFO tempest.lib.common.rest_client [req-dd09a351-726d-432a-b52f-425ca657d4c1 ] Request (VolumesTransfersV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.052s 2020-11-06 18:05:26.995 37 DEBUG tempest.lib.common.rest_client [req-dd09a351-726d-432a-b52f-425ca657d4c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dd09a351-726d-432a-b52f-425ca657d4c1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:26.996 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:05:26.996 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:27.045 37 INFO tempest.lib.common.rest_client [req-3701c445-c765-4e6b-921c-b8793483f5aa ] Request (VolumesTransfersV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles 0.048s 2020-11-06 18:05:27.046 37 DEBUG tempest.lib.common.rest_client [req-3701c445-c765-4e6b-921c-b8793483f5aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3701c445-c765-4e6b-921c-b8793483f5aa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:27.097 37 INFO tempest.lib.common.rest_client [req-c2ba5bce-7553-4b21-aca4-71bf871b4f79 ] Request (VolumesTransfersV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles/72a4576c553448cd941b052c1ca0cf2d 0.051s 2020-11-06 18:05:27.098 37 DEBUG tempest.lib.common.rest_client [req-c2ba5bce-7553-4b21-aca4-71bf871b4f79 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c2ba5bce-7553-4b21-aca4-71bf871b4f79', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:27.211 37 INFO tempest.lib.common.rest_client [req-dac14d60-a561-4d47-88f0-f444ec37cf2b ] Request (VolumesTransfersV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles/a629c95d64b3416fb80ae90af4f69c05 0.112s 2020-11-06 18:05:27.211 37 DEBUG tempest.lib.common.rest_client [req-dac14d60-a561-4d47-88f0-f444ec37cf2b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dac14d60-a561-4d47-88f0-f444ec37cf2b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:27.479 39 INFO tempest.lib.common.rest_client [req-555bd40f-e183-4cc7-b81c-c345dd5d0d56 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.192s 2020-11-06 18:05:27.479 39 DEBUG tempest.lib.common.rest_client [req-555bd40f-e183-4cc7-b81c-c345dd5d0d56 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-555bd40f-e183-4cc7-b81c-c345dd5d0d56', 'x-compute-request-id': 'req-555bd40f-e183-4cc7-b81c-c345dd5d0d56', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:28.312 37 INFO tempest.lib.common.rest_client [req-0ca60482-53a2-4937-b458-7c60e726f2bf ] Request (VolumesTransfersV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.099s 2020-11-06 18:05:28.312 37 DEBUG tempest.lib.common.rest_client [req-0ca60482-53a2-4937-b458-7c60e726f2bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0ca60482-53a2-4937-b458-7c60e726f2bf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "090ad71ccaa24f9e8153791fe9327a79", "name": "tempest-VolumesTransfersV3RbacTest-1022261755", "password_expires_at": null}, "audit_ids": ["Iyr-JBj1TCql5sUOAJP00A"], "expires_at": "2020-11-06T19:05:28.000000Z", "issued_at": "2020-11-06T18:05:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b7671d967dff4cbea36459fa4f0d2f15", "name": "tempest-VolumesTransfersV3RbacTest-1022261755"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:28.740 37 INFO tempest.lib.common.rest_client [req-fb5ba1a9-819e-45a4-bf69-f43489f60520 ] Request (VolumesTransfersV3RbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes 0.426s 2020-11-06 18:05:28.740 37 DEBUG tempest.lib.common.rest_client [req-fb5ba1a9-819e-45a4-bf69-f43489f60520 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-VolumesTransfersV3RbacTest-Volume-1225747646"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-fb5ba1a9-819e-45a4-bf69-f43489f60520', 'content-length': '847', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-fb5ba1a9-819e-45a4-bf69-f43489f60520', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes'} Body: b'{"volume": {"id": "6ce88c37-377d-4c67-9b02-1b6b0a5e728e", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:05:29.000000", "updated_at": null, "name": "tempest-VolumesTransfersV3RbacTest-Volume-1225747646", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e"}], "user_id": "090ad71ccaa24f9e8153791fe9327a79", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:28.830 37 INFO tempest.lib.common.rest_client [req-8ce9674f-1081-48b9-b218-7c220a5ecce7 ] Request (VolumesTransfersV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e 0.075s 2020-11-06 18:05:28.831 37 DEBUG tempest.lib.common.rest_client [req-8ce9674f-1081-48b9-b218-7c220a5ecce7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-8ce9674f-1081-48b9-b218-7c220a5ecce7', 'content-length': '1026', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8ce9674f-1081-48b9-b218-7c220a5ecce7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e'} Body: b'{"volume": {"id": "6ce88c37-377d-4c67-9b02-1b6b0a5e728e", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:05:29.000000", "updated_at": null, "name": "tempest-VolumesTransfersV3RbacTest-Volume-1225747646", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e"}], "user_id": "090ad71ccaa24f9e8153791fe9327a79", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": null, "os-vol-tenant-attr:tenant_id": "b7671d967dff4cbea36459fa4f0d2f15"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:28.901 39 INFO tempest.lib.common.rest_client [req-f48484e8-7aa7-47c5-bca7-9b9fb0e9decd ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.403s 2020-11-06 18:05:28.902 39 DEBUG tempest.lib.common.rest_client [req-f48484e8-7aa7-47c5-bca7-9b9fb0e9decd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f48484e8-7aa7-47c5-bca7-9b9fb0e9decd', 'x-compute-request-id': 'req-f48484e8-7aa7-47c5-bca7-9b9fb0e9decd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:29.923 37 INFO tempest.lib.common.rest_client [req-eb0be0fe-23a9-4ab1-a022-f94eb0372857 ] Request (VolumesTransfersV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e 0.076s 2020-11-06 18:05:29.923 37 DEBUG tempest.lib.common.rest_client [req-eb0be0fe-23a9-4ab1-a022-f94eb0372857 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-eb0be0fe-23a9-4ab1-a022-f94eb0372857', 'content-length': '1070', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-eb0be0fe-23a9-4ab1-a022-f94eb0372857', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e'} Body: b'{"volume": {"id": "6ce88c37-377d-4c67-9b02-1b6b0a5e728e", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:05:29.000000", "updated_at": "2020-11-06T18:05:29.000000", "name": "tempest-VolumesTransfersV3RbacTest-Volume-1225747646", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e"}], "user_id": "090ad71ccaa24f9e8153791fe9327a79", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "b7671d967dff4cbea36459fa4f0d2f15"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:29.942 37 INFO tempest.common.waiters [-] volume 6ce88c37-377d-4c67-9b02-1b6b0a5e728e reached available after waiting for 1.942762 seconds 2020-11-06 18:05:29.944 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:05:29.947 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:accept_transfer, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:05:30.055 37 INFO tempest.lib.common.rest_client [req-8cf1bc69-b70a-4fca-84b5-d0ec61b58762 ] Request (VolumesTransfersV3RbacTest:test_accept_volume_transfer): 202 POST http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer 0.107s 2020-11-06 18:05:30.055 37 DEBUG tempest.lib.common.rest_client [req-8cf1bc69-b70a-4fca-84b5-d0ec61b58762 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"transfer": {"volume_id": "6ce88c37-377d-4c67-9b02-1b6b0a5e728e"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-8cf1bc69-b70a-4fca-84b5-d0ec61b58762', 'content-length': '509', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8cf1bc69-b70a-4fca-84b5-d0ec61b58762', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer'} Body: b'{"transfer": {"id": "cfaf0bf2-5f75-4bcb-9add-f19246eecf82", "created_at": "2020-11-06T18:05:30.030420", "name": null, "volume_id": "6ce88c37-377d-4c67-9b02-1b6b0a5e728e", "auth_key": "681538ebfd0fcb2a", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer/cfaf0bf2-5f75-4bcb-9add-f19246eecf82"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer/cfaf0bf2-5f75-4bcb-9add-f19246eecf82"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:30.154 37 INFO tempest.lib.common.rest_client [req-172ccbdb-28a8-425b-a5e6-ff120fede1f5 ] Request (VolumesTransfersV3RbacTest:test_accept_volume_transfer): 200 GET http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e 0.094s 2020-11-06 18:05:30.154 37 DEBUG tempest.lib.common.rest_client [req-172ccbdb-28a8-425b-a5e6-ff120fede1f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-172ccbdb-28a8-425b-a5e6-ff120fede1f5', 'content-length': '1078', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-172ccbdb-28a8-425b-a5e6-ff120fede1f5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e'} Body: b'{"volume": {"id": "6ce88c37-377d-4c67-9b02-1b6b0a5e728e", "status": "awaiting-transfer", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:05:29.000000", "updated_at": "2020-11-06T18:05:30.000000", "name": "tempest-VolumesTransfersV3RbacTest-Volume-1225747646", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e"}], "user_id": "090ad71ccaa24f9e8153791fe9327a79", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "b7671d967dff4cbea36459fa4f0d2f15"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:30.170 37 INFO tempest.common.waiters [-] volume 6ce88c37-377d-4c67-9b02-1b6b0a5e728e reached awaiting-transfer after waiting for 0.170406 seconds 2020-11-06 18:05:30.170 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:30.280 37 INFO tempest.lib.common.rest_client [req-04a8e0a4-ff9e-4b21-aaca-c05ca7fdb033 ] Request (VolumesTransfersV3RbacTest:test_accept_volume_transfer): 200 GET http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles 0.109s 2020-11-06 18:05:30.281 37 DEBUG tempest.lib.common.rest_client [req-04a8e0a4-ff9e-4b21-aaca-c05ca7fdb033 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-04a8e0a4-ff9e-4b21-aaca-c05ca7fdb033', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:30.294 39 INFO tempest.lib.common.rest_client [req-7923b025-42dc-41f9-afcd-0ed84f7aa29d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.378s 2020-11-06 18:05:30.295 39 DEBUG tempest.lib.common.rest_client [req-7923b025-42dc-41f9-afcd-0ed84f7aa29d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7923b025-42dc-41f9-afcd-0ed84f7aa29d', 'x-compute-request-id': 'req-7923b025-42dc-41f9-afcd-0ed84f7aa29d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:30.326 37 INFO tempest.lib.common.rest_client [req-c1f1f850-f15f-4ba2-a5f5-e572f09035f9 ] Request (VolumesTransfersV3RbacTest:test_accept_volume_transfer): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-11-06 18:05:30.327 37 DEBUG tempest.lib.common.rest_client [req-c1f1f850-f15f-4ba2-a5f5-e572f09035f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c1f1f850-f15f-4ba2-a5f5-e572f09035f9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "090ad71ccaa24f9e8153791fe9327a79", "name": "tempest-VolumesTransfersV3RbacTest-1022261755", "password_expires_at": null}, "audit_ids": ["RPepPrl2TjWHzGwJ8VPOug"], "expires_at": "2020-11-06T19:05:30.000000Z", "issued_at": "2020-11-06T18:05:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b7671d967dff4cbea36459fa4f0d2f15", "name": "tempest-VolumesTransfersV3RbacTest-1022261755"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:30.830 37 INFO tempest.lib.common.rest_client [req-d1d90549-6c1a-42dd-9013-5ed745683400 ] Request (VolumesTransfersV3RbacTest:test_accept_volume_transfer): 202 POST http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer/cfaf0bf2-5f75-4bcb-9add-f19246eecf82/accept 0.502s 2020-11-06 18:05:30.831 37 DEBUG tempest.lib.common.rest_client [req-d1d90549-6c1a-42dd-9013-5ed745683400 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"accept": {"auth_key": "681538ebfd0fcb2a"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d1d90549-6c1a-42dd-9013-5ed745683400', 'content-length': '433', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d1d90549-6c1a-42dd-9013-5ed745683400', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer/cfaf0bf2-5f75-4bcb-9add-f19246eecf82/accept'} Body: b'{"transfer": {"id": "cfaf0bf2-5f75-4bcb-9add-f19246eecf82", "volume_id": "6ce88c37-377d-4c67-9b02-1b6b0a5e728e", "name": null, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer/cfaf0bf2-5f75-4bcb-9add-f19246eecf82"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer/cfaf0bf2-5f75-4bcb-9add-f19246eecf82"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:30.834 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:30.888 37 INFO tempest.lib.common.rest_client [req-7f7c0122-303a-4ad0-b6f9-d44f550b2d15 ] Request (VolumesTransfersV3RbacTest:test_accept_volume_transfer): 200 GET http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles 0.053s 2020-11-06 18:05:30.889 37 DEBUG tempest.lib.common.rest_client [req-7f7c0122-303a-4ad0-b6f9-d44f550b2d15 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7f7c0122-303a-4ad0-b6f9-d44f550b2d15', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:30.925 37 INFO tempest.lib.common.rest_client [req-47abf341-d017-4dd3-a6d1-e9535dacaf60 ] Request (VolumesTransfersV3RbacTest:test_accept_volume_transfer): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:05:30.925 37 DEBUG tempest.lib.common.rest_client [req-47abf341-d017-4dd3-a6d1-e9535dacaf60 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-47abf341-d017-4dd3-a6d1-e9535dacaf60', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "090ad71ccaa24f9e8153791fe9327a79", "name": "tempest-VolumesTransfersV3RbacTest-1022261755", "password_expires_at": null}, "audit_ids": ["UKIzuj5qQ56p2_olfZUmjA"], "expires_at": "2020-11-06T19:05:30.000000Z", "issued_at": "2020-11-06T18:05:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b7671d967dff4cbea36459fa4f0d2f15", "name": "tempest-VolumesTransfersV3RbacTest-1022261755"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:31.057 37 INFO tempest.lib.common.rest_client [req-67ebc8f7-2182-45c7-ba5a-46bdcffa1a9c ] Request (VolumesTransfersV3RbacTest:test_accept_volume_transfer): 200 GET http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e 0.131s 2020-11-06 18:05:31.058 37 DEBUG tempest.lib.common.rest_client [req-67ebc8f7-2182-45c7-ba5a-46bdcffa1a9c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-67ebc8f7-2182-45c7-ba5a-46bdcffa1a9c', 'content-length': '1070', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-67ebc8f7-2182-45c7-ba5a-46bdcffa1a9c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e'} Body: b'{"volume": {"id": "6ce88c37-377d-4c67-9b02-1b6b0a5e728e", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:05:29.000000", "updated_at": "2020-11-06T18:05:31.000000", "name": "tempest-VolumesTransfersV3RbacTest-Volume-1225747646", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e"}], "user_id": "090ad71ccaa24f9e8153791fe9327a79", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "b7671d967dff4cbea36459fa4f0d2f15"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:31.070 37 INFO tempest.common.waiters [-] volume 6ce88c37-377d-4c67-9b02-1b6b0a5e728e reached available after waiting for 0.070742 seconds 2020-11-06 18:05:31.088 37 INFO tempest.lib.common.rest_client [req-9c754bd0-b436-4371-ac20-88bf1f58e460 ] Request (VolumesTransfersV3RbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer/cfaf0bf2-5f75-4bcb-9add-f19246eecf82 0.017s 2020-11-06 18:05:31.089 37 DEBUG tempest.lib.common.rest_client [req-9c754bd0-b436-4371-ac20-88bf1f58e460 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '111', 'content-type': 'application/json', 'x-compute-request-id': 'req-9c754bd0-b436-4371-ac20-88bf1f58e460', 'x-openstack-request-id': 'req-9c754bd0-b436-4371-ac20-88bf1f58e460', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer/cfaf0bf2-5f75-4bcb-9add-f19246eecf82'} Body: b'{"itemNotFound": {"code": 404, "message": "Transfer cfaf0bf2-5f75-4bcb-9add-f19246eecf82 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:31.162 37 INFO tempest.lib.common.rest_client [req-1d279a59-20bf-42dd-a6f0-b0e996e8f863 ] Request (VolumesTransfersV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e 0.072s 2020-11-06 18:05:31.163 37 DEBUG tempest.lib.common.rest_client [req-1d279a59-20bf-42dd-a6f0-b0e996e8f863 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-1d279a59-20bf-42dd-a6f0-b0e996e8f863', 'content-length': '1070', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1d279a59-20bf-42dd-a6f0-b0e996e8f863', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e'} Body: b'{"volume": {"id": "6ce88c37-377d-4c67-9b02-1b6b0a5e728e", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:05:29.000000", "updated_at": "2020-11-06T18:05:31.000000", "name": "tempest-VolumesTransfersV3RbacTest-Volume-1225747646", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e"}], "user_id": "090ad71ccaa24f9e8153791fe9327a79", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "b7671d967dff4cbea36459fa4f0d2f15"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:31.175 37 INFO tempest.common.waiters [-] volume 6ce88c37-377d-4c67-9b02-1b6b0a5e728e reached available after waiting for 0.175386 seconds 2020-11-06 18:05:31.177 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:05:31.179 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:create_transfer, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:05:31.179 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:31.235 37 INFO tempest.lib.common.rest_client [req-c5ff5993-acc0-47a6-acc1-60aa27c5128d ] Request (VolumesTransfersV3RbacTest:test_create_volume_transfer): 200 GET http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles 0.055s 2020-11-06 18:05:31.236 37 DEBUG tempest.lib.common.rest_client [req-c5ff5993-acc0-47a6-acc1-60aa27c5128d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c5ff5993-acc0-47a6-acc1-60aa27c5128d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:31.277 37 INFO tempest.lib.common.rest_client [req-06048b71-36a4-46f7-9417-157019117e14 ] Request (VolumesTransfersV3RbacTest:test_create_volume_transfer): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:05:31.277 37 DEBUG tempest.lib.common.rest_client [req-06048b71-36a4-46f7-9417-157019117e14 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-06048b71-36a4-46f7-9417-157019117e14', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "090ad71ccaa24f9e8153791fe9327a79", "name": "tempest-VolumesTransfersV3RbacTest-1022261755", "password_expires_at": null}, "audit_ids": ["SPxD2mrZTLOxT-CRoq-kHw"], "expires_at": "2020-11-06T19:05:31.000000Z", "issued_at": "2020-11-06T18:05:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b7671d967dff4cbea36459fa4f0d2f15", "name": "tempest-VolumesTransfersV3RbacTest-1022261755"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:31.434 37 INFO tempest.lib.common.rest_client [req-a35fcc0c-83a1-49aa-b8fa-7e2ae84c88a0 ] Request (VolumesTransfersV3RbacTest:test_create_volume_transfer): 202 POST http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer 0.155s 2020-11-06 18:05:31.434 37 DEBUG tempest.lib.common.rest_client [req-a35fcc0c-83a1-49aa-b8fa-7e2ae84c88a0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"transfer": {"volume_id": "6ce88c37-377d-4c67-9b02-1b6b0a5e728e"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a35fcc0c-83a1-49aa-b8fa-7e2ae84c88a0', 'content-length': '509', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a35fcc0c-83a1-49aa-b8fa-7e2ae84c88a0', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer'} Body: b'{"transfer": {"id": "21a3ffec-8719-4e28-bfc8-0e7fc14f407b", "created_at": "2020-11-06T18:05:31.409170", "name": null, "volume_id": "6ce88c37-377d-4c67-9b02-1b6b0a5e728e", "auth_key": "51aa61dc38309df3", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer/21a3ffec-8719-4e28-bfc8-0e7fc14f407b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer/21a3ffec-8719-4e28-bfc8-0e7fc14f407b"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:31.440 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:31.495 37 INFO tempest.lib.common.rest_client [req-a2f46bd0-9203-45ea-a2ec-7a68b42adc6c ] Request (VolumesTransfersV3RbacTest:test_create_volume_transfer): 200 GET http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles 0.054s 2020-11-06 18:05:31.496 37 DEBUG tempest.lib.common.rest_client [req-a2f46bd0-9203-45ea-a2ec-7a68b42adc6c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a2f46bd0-9203-45ea-a2ec-7a68b42adc6c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:31.517 39 INFO tempest.lib.common.rest_client [req-0f8da8b9-ad7e-4ca3-8383-25bae7653204 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.206s 2020-11-06 18:05:31.517 39 DEBUG tempest.lib.common.rest_client [req-0f8da8b9-ad7e-4ca3-8383-25bae7653204 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0f8da8b9-ad7e-4ca3-8383-25bae7653204', 'x-compute-request-id': 'req-0f8da8b9-ad7e-4ca3-8383-25bae7653204', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:31.532 37 INFO tempest.lib.common.rest_client [req-ae9e56d4-fa1e-4d26-9e14-41ef1e07395a ] Request (VolumesTransfersV3RbacTest:test_create_volume_transfer): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:05:31.532 37 DEBUG tempest.lib.common.rest_client [req-ae9e56d4-fa1e-4d26-9e14-41ef1e07395a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ae9e56d4-fa1e-4d26-9e14-41ef1e07395a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "090ad71ccaa24f9e8153791fe9327a79", "name": "tempest-VolumesTransfersV3RbacTest-1022261755", "password_expires_at": null}, "audit_ids": ["5Ck3zvzYQsilBkV1pShT6Q"], "expires_at": "2020-11-06T19:05:31.000000Z", "issued_at": "2020-11-06T18:05:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b7671d967dff4cbea36459fa4f0d2f15", "name": "tempest-VolumesTransfersV3RbacTest-1022261755"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:31.684 37 INFO tempest.lib.common.rest_client [req-e55e14ef-87ee-42f6-a053-3c04e30afac5 ] Request (VolumesTransfersV3RbacTest:test_create_volume_transfer): 200 GET http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e 0.150s 2020-11-06 18:05:31.685 37 DEBUG tempest.lib.common.rest_client [req-e55e14ef-87ee-42f6-a053-3c04e30afac5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e55e14ef-87ee-42f6-a053-3c04e30afac5', 'content-length': '1078', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e55e14ef-87ee-42f6-a053-3c04e30afac5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e'} Body: b'{"volume": {"id": "6ce88c37-377d-4c67-9b02-1b6b0a5e728e", "status": "awaiting-transfer", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:05:29.000000", "updated_at": "2020-11-06T18:05:31.000000", "name": "tempest-VolumesTransfersV3RbacTest-Volume-1225747646", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e"}], "user_id": "090ad71ccaa24f9e8153791fe9327a79", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "b7671d967dff4cbea36459fa4f0d2f15"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:31.699 37 INFO tempest.common.waiters [-] volume 6ce88c37-377d-4c67-9b02-1b6b0a5e728e reached awaiting-transfer after waiting for 0.699744 seconds 2020-11-06 18:05:31.797 37 INFO tempest.lib.common.rest_client [req-7a08e03b-7ed7-4893-90f0-f0afd7fc83e8 ] Request (VolumesTransfersV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer/21a3ffec-8719-4e28-bfc8-0e7fc14f407b 0.096s 2020-11-06 18:05:31.798 37 DEBUG tempest.lib.common.rest_client [req-7a08e03b-7ed7-4893-90f0-f0afd7fc83e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7a08e03b-7ed7-4893-90f0-f0afd7fc83e8', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer/21a3ffec-8719-4e28-bfc8-0e7fc14f407b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:31.872 37 INFO tempest.lib.common.rest_client [req-bbdc5c86-8e38-4170-818e-d993f16a6752 ] Request (VolumesTransfersV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e 0.073s 2020-11-06 18:05:31.872 37 DEBUG tempest.lib.common.rest_client [req-bbdc5c86-8e38-4170-818e-d993f16a6752 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-bbdc5c86-8e38-4170-818e-d993f16a6752', 'content-length': '1070', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-bbdc5c86-8e38-4170-818e-d993f16a6752', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e'} Body: b'{"volume": {"id": "6ce88c37-377d-4c67-9b02-1b6b0a5e728e", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:05:29.000000", "updated_at": "2020-11-06T18:05:32.000000", "name": "tempest-VolumesTransfersV3RbacTest-Volume-1225747646", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e"}], "user_id": "090ad71ccaa24f9e8153791fe9327a79", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "b7671d967dff4cbea36459fa4f0d2f15"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:31.883 37 INFO tempest.common.waiters [-] volume 6ce88c37-377d-4c67-9b02-1b6b0a5e728e reached available after waiting for 0.883608 seconds 2020-11-06 18:05:31.885 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:05:31.887 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:delete_transfer, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:05:31.996 37 INFO tempest.lib.common.rest_client [req-faf31775-a888-43c8-bb03-2243e9bea7bf ] Request (VolumesTransfersV3RbacTest:test_delete_volume_transfer): 202 POST http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer 0.109s 2020-11-06 18:05:31.997 37 DEBUG tempest.lib.common.rest_client [req-faf31775-a888-43c8-bb03-2243e9bea7bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"transfer": {"volume_id": "6ce88c37-377d-4c67-9b02-1b6b0a5e728e"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-faf31775-a888-43c8-bb03-2243e9bea7bf', 'content-length': '509', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-faf31775-a888-43c8-bb03-2243e9bea7bf', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer'} Body: b'{"transfer": {"id": "93e1b0e1-a60f-4c02-a98d-45f9b3692cf6", "created_at": "2020-11-06T18:05:31.962436", "name": null, "volume_id": "6ce88c37-377d-4c67-9b02-1b6b0a5e728e", "auth_key": "bb6413a5a88e25d1", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer/93e1b0e1-a60f-4c02-a98d-45f9b3692cf6"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer/93e1b0e1-a60f-4c02-a98d-45f9b3692cf6"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:32.071 37 INFO tempest.lib.common.rest_client [req-57a02d7d-7767-4c29-ad16-27c822e2dfb4 ] Request (VolumesTransfersV3RbacTest:test_delete_volume_transfer): 200 GET http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e 0.067s 2020-11-06 18:05:32.071 37 DEBUG tempest.lib.common.rest_client [req-57a02d7d-7767-4c29-ad16-27c822e2dfb4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-57a02d7d-7767-4c29-ad16-27c822e2dfb4', 'content-length': '1078', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-57a02d7d-7767-4c29-ad16-27c822e2dfb4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e'} Body: b'{"volume": {"id": "6ce88c37-377d-4c67-9b02-1b6b0a5e728e", "status": "awaiting-transfer", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:05:29.000000", "updated_at": "2020-11-06T18:05:32.000000", "name": "tempest-VolumesTransfersV3RbacTest-Volume-1225747646", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e"}], "user_id": "090ad71ccaa24f9e8153791fe9327a79", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "b7671d967dff4cbea36459fa4f0d2f15"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:32.086 37 INFO tempest.common.waiters [-] volume 6ce88c37-377d-4c67-9b02-1b6b0a5e728e reached awaiting-transfer after waiting for 0.086145 seconds 2020-11-06 18:05:32.086 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:32.150 37 INFO tempest.lib.common.rest_client [req-b3dcce8d-3496-4b07-8e94-6c06d24399da ] Request (VolumesTransfersV3RbacTest:test_delete_volume_transfer): 200 GET http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles 0.063s 2020-11-06 18:05:32.151 37 DEBUG tempest.lib.common.rest_client [req-b3dcce8d-3496-4b07-8e94-6c06d24399da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b3dcce8d-3496-4b07-8e94-6c06d24399da', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:32.186 37 INFO tempest.lib.common.rest_client [req-d1efd5e3-1cac-40e6-8ba9-02b9574795b4 ] Request (VolumesTransfersV3RbacTest:test_delete_volume_transfer): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:05:32.187 37 DEBUG tempest.lib.common.rest_client [req-d1efd5e3-1cac-40e6-8ba9-02b9574795b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d1efd5e3-1cac-40e6-8ba9-02b9574795b4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "090ad71ccaa24f9e8153791fe9327a79", "name": "tempest-VolumesTransfersV3RbacTest-1022261755", "password_expires_at": null}, "audit_ids": ["Q3pVJC-cTVCH7IQJVstaiA"], "expires_at": "2020-11-06T19:05:32.000000Z", "issued_at": "2020-11-06T18:05:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b7671d967dff4cbea36459fa4f0d2f15", "name": "tempest-VolumesTransfersV3RbacTest-1022261755"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:32.346 37 INFO tempest.lib.common.rest_client [req-fad56120-b181-4edb-8d66-e6919cfd5fba ] Request (VolumesTransfersV3RbacTest:test_delete_volume_transfer): 202 DELETE http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer/93e1b0e1-a60f-4c02-a98d-45f9b3692cf6 0.158s 2020-11-06 18:05:32.347 37 DEBUG tempest.lib.common.rest_client [req-fad56120-b181-4edb-8d66-e6919cfd5fba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-fad56120-b181-4edb-8d66-e6919cfd5fba', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer/93e1b0e1-a60f-4c02-a98d-45f9b3692cf6'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:32.347 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:32.403 37 INFO tempest.lib.common.rest_client [req-91d717cd-3024-4bfd-b555-5460f498e514 ] Request (VolumesTransfersV3RbacTest:test_delete_volume_transfer): 200 GET http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles 0.054s 2020-11-06 18:05:32.403 37 DEBUG tempest.lib.common.rest_client [req-91d717cd-3024-4bfd-b555-5460f498e514 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-91d717cd-3024-4bfd-b555-5460f498e514', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:32.439 37 INFO tempest.lib.common.rest_client [req-632cd591-d227-4832-96be-2a9bd4402389 ] Request (VolumesTransfersV3RbacTest:test_delete_volume_transfer): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:05:32.440 37 DEBUG tempest.lib.common.rest_client [req-632cd591-d227-4832-96be-2a9bd4402389 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-632cd591-d227-4832-96be-2a9bd4402389', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "090ad71ccaa24f9e8153791fe9327a79", "name": "tempest-VolumesTransfersV3RbacTest-1022261755", "password_expires_at": null}, "audit_ids": ["Zxt80eZ4Sfm8i4hAxfgbWw"], "expires_at": "2020-11-06T19:05:32.000000Z", "issued_at": "2020-11-06T18:05:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b7671d967dff4cbea36459fa4f0d2f15", "name": "tempest-VolumesTransfersV3RbacTest-1022261755"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:32.568 37 INFO tempest.lib.common.rest_client [req-6c22d09c-7a6d-4564-88c0-2147592c817a ] Request (VolumesTransfersV3RbacTest:test_delete_volume_transfer): 200 GET http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e 0.127s 2020-11-06 18:05:32.569 37 DEBUG tempest.lib.common.rest_client [req-6c22d09c-7a6d-4564-88c0-2147592c817a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6c22d09c-7a6d-4564-88c0-2147592c817a', 'content-length': '1070', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6c22d09c-7a6d-4564-88c0-2147592c817a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e'} Body: b'{"volume": {"id": "6ce88c37-377d-4c67-9b02-1b6b0a5e728e", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:05:29.000000", "updated_at": "2020-11-06T18:05:32.000000", "name": "tempest-VolumesTransfersV3RbacTest-Volume-1225747646", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e"}], "user_id": "090ad71ccaa24f9e8153791fe9327a79", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "b7671d967dff4cbea36459fa4f0d2f15"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:32.578 37 INFO tempest.common.waiters [-] volume 6ce88c37-377d-4c67-9b02-1b6b0a5e728e reached available after waiting for 0.578065 seconds 2020-11-06 18:05:32.596 37 INFO tempest.lib.common.rest_client [req-c78f9b07-d8fa-461d-bd0d-8a44554d0623 ] Request (VolumesTransfersV3RbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer/93e1b0e1-a60f-4c02-a98d-45f9b3692cf6 0.018s 2020-11-06 18:05:32.597 37 DEBUG tempest.lib.common.rest_client [req-c78f9b07-d8fa-461d-bd0d-8a44554d0623 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '111', 'content-type': 'application/json', 'x-compute-request-id': 'req-c78f9b07-d8fa-461d-bd0d-8a44554d0623', 'x-openstack-request-id': 'req-c78f9b07-d8fa-461d-bd0d-8a44554d0623', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer/93e1b0e1-a60f-4c02-a98d-45f9b3692cf6'} Body: b'{"itemNotFound": {"code": 404, "message": "Transfer 93e1b0e1-a60f-4c02-a98d-45f9b3692cf6 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:32.664 37 INFO tempest.lib.common.rest_client [req-13da03b4-415c-4cb2-a721-ca3c617d2131 ] Request (VolumesTransfersV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e 0.066s 2020-11-06 18:05:32.665 37 DEBUG tempest.lib.common.rest_client [req-13da03b4-415c-4cb2-a721-ca3c617d2131 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-13da03b4-415c-4cb2-a721-ca3c617d2131', 'content-length': '1070', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-13da03b4-415c-4cb2-a721-ca3c617d2131', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e'} Body: b'{"volume": {"id": "6ce88c37-377d-4c67-9b02-1b6b0a5e728e", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:05:29.000000", "updated_at": "2020-11-06T18:05:32.000000", "name": "tempest-VolumesTransfersV3RbacTest-Volume-1225747646", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e"}], "user_id": "090ad71ccaa24f9e8153791fe9327a79", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "b7671d967dff4cbea36459fa4f0d2f15"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:32.679 37 INFO tempest.common.waiters [-] volume 6ce88c37-377d-4c67-9b02-1b6b0a5e728e reached available after waiting for 0.679926 seconds 2020-11-06 18:05:32.681 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:05:32.684 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:get_transfer, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:05:32.714 39 INFO tempest.lib.common.rest_client [req-cbd12f1e-35c2-4c6f-86b7-69a7b58b886f ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.185s 2020-11-06 18:05:32.714 39 DEBUG tempest.lib.common.rest_client [req-cbd12f1e-35c2-4c6f-86b7-69a7b58b886f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cbd12f1e-35c2-4c6f-86b7-69a7b58b886f', 'x-compute-request-id': 'req-cbd12f1e-35c2-4c6f-86b7-69a7b58b886f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:32.801 37 INFO tempest.lib.common.rest_client [req-f1ae8c46-fbf4-4baa-8bbe-4bf38f57df3b ] Request (VolumesTransfersV3RbacTest:test_get_volume_transfer): 202 POST http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer 0.117s 2020-11-06 18:05:32.802 37 DEBUG tempest.lib.common.rest_client [req-f1ae8c46-fbf4-4baa-8bbe-4bf38f57df3b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"transfer": {"volume_id": "6ce88c37-377d-4c67-9b02-1b6b0a5e728e"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-f1ae8c46-fbf4-4baa-8bbe-4bf38f57df3b', 'content-length': '509', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f1ae8c46-fbf4-4baa-8bbe-4bf38f57df3b', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer'} Body: b'{"transfer": {"id": "b3a196dc-75a5-4682-9798-ceacb63c487e", "created_at": "2020-11-06T18:05:32.770795", "name": null, "volume_id": "6ce88c37-377d-4c67-9b02-1b6b0a5e728e", "auth_key": "c813188ca030e7c7", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer/b3a196dc-75a5-4682-9798-ceacb63c487e"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer/b3a196dc-75a5-4682-9798-ceacb63c487e"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:32.871 37 INFO tempest.lib.common.rest_client [req-610c7495-b46c-46d5-8105-51927269b416 ] Request (VolumesTransfersV3RbacTest:test_get_volume_transfer): 200 GET http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e 0.063s 2020-11-06 18:05:32.871 37 DEBUG tempest.lib.common.rest_client [req-610c7495-b46c-46d5-8105-51927269b416 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-610c7495-b46c-46d5-8105-51927269b416', 'content-length': '1078', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-610c7495-b46c-46d5-8105-51927269b416', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e'} Body: b'{"volume": {"id": "6ce88c37-377d-4c67-9b02-1b6b0a5e728e", "status": "awaiting-transfer", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:05:29.000000", "updated_at": "2020-11-06T18:05:33.000000", "name": "tempest-VolumesTransfersV3RbacTest-Volume-1225747646", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e"}], "user_id": "090ad71ccaa24f9e8153791fe9327a79", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "b7671d967dff4cbea36459fa4f0d2f15"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:32.880 37 INFO tempest.common.waiters [-] volume 6ce88c37-377d-4c67-9b02-1b6b0a5e728e reached awaiting-transfer after waiting for 0.880930 seconds 2020-11-06 18:05:32.881 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:32.934 37 INFO tempest.lib.common.rest_client [req-5c25fe8e-49f4-4509-9fd3-ace0c3fb65ef ] Request (VolumesTransfersV3RbacTest:test_get_volume_transfer): 200 GET http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles 0.053s 2020-11-06 18:05:32.935 37 DEBUG tempest.lib.common.rest_client [req-5c25fe8e-49f4-4509-9fd3-ace0c3fb65ef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5c25fe8e-49f4-4509-9fd3-ace0c3fb65ef', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:32.972 37 INFO tempest.lib.common.rest_client [req-ac21c684-e1c8-4146-9f95-6952407154fc ] Request (VolumesTransfersV3RbacTest:test_get_volume_transfer): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:05:32.973 37 DEBUG tempest.lib.common.rest_client [req-ac21c684-e1c8-4146-9f95-6952407154fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ac21c684-e1c8-4146-9f95-6952407154fc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "090ad71ccaa24f9e8153791fe9327a79", "name": "tempest-VolumesTransfersV3RbacTest-1022261755", "password_expires_at": null}, "audit_ids": ["H1xyvdvQQMGXas1U-ySzwg"], "expires_at": "2020-11-06T19:05:32.000000Z", "issued_at": "2020-11-06T18:05:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b7671d967dff4cbea36459fa4f0d2f15", "name": "tempest-VolumesTransfersV3RbacTest-1022261755"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:33.054 37 INFO tempest.lib.common.rest_client [req-cec85d98-93c5-4376-abaa-fd9b46d9e21e ] Request (VolumesTransfersV3RbacTest:test_get_volume_transfer): 200 GET http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer/b3a196dc-75a5-4682-9798-ceacb63c487e 0.080s 2020-11-06 18:05:33.055 37 DEBUG tempest.lib.common.rest_client [req-cec85d98-93c5-4376-abaa-fd9b46d9e21e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-cec85d98-93c5-4376-abaa-fd9b46d9e21e', 'content-length': '477', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-cec85d98-93c5-4376-abaa-fd9b46d9e21e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer/b3a196dc-75a5-4682-9798-ceacb63c487e'} Body: b'{"transfer": {"id": "b3a196dc-75a5-4682-9798-ceacb63c487e", "created_at": "2020-11-06T18:05:33.000000", "name": null, "volume_id": "6ce88c37-377d-4c67-9b02-1b6b0a5e728e", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer/b3a196dc-75a5-4682-9798-ceacb63c487e"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer/b3a196dc-75a5-4682-9798-ceacb63c487e"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:33.060 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:33.117 37 INFO tempest.lib.common.rest_client [req-8b4b530c-664c-4e93-bf8f-d05d49da8548 ] Request (VolumesTransfersV3RbacTest:test_get_volume_transfer): 200 GET http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles 0.056s 2020-11-06 18:05:33.117 37 DEBUG tempest.lib.common.rest_client [req-8b4b530c-664c-4e93-bf8f-d05d49da8548 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8b4b530c-664c-4e93-bf8f-d05d49da8548', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:33.155 37 INFO tempest.lib.common.rest_client [req-7208a096-c93a-4af8-b1c8-40ca58756504 ] Request (VolumesTransfersV3RbacTest:test_get_volume_transfer): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:05:33.155 37 DEBUG tempest.lib.common.rest_client [req-7208a096-c93a-4af8-b1c8-40ca58756504 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7208a096-c93a-4af8-b1c8-40ca58756504', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "090ad71ccaa24f9e8153791fe9327a79", "name": "tempest-VolumesTransfersV3RbacTest-1022261755", "password_expires_at": null}, "audit_ids": ["9RstD2OXQ-6mJjZtG3HSsg"], "expires_at": "2020-11-06T19:05:33.000000Z", "issued_at": "2020-11-06T18:05:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b7671d967dff4cbea36459fa4f0d2f15", "name": "tempest-VolumesTransfersV3RbacTest-1022261755"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:33.321 37 INFO tempest.lib.common.rest_client [req-31817286-79aa-4d69-99c9-dccf7204fc40 ] Request (VolumesTransfersV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer/b3a196dc-75a5-4682-9798-ceacb63c487e 0.164s 2020-11-06 18:05:33.322 37 DEBUG tempest.lib.common.rest_client [req-31817286-79aa-4d69-99c9-dccf7204fc40 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-31817286-79aa-4d69-99c9-dccf7204fc40', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer/b3a196dc-75a5-4682-9798-ceacb63c487e'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:33.411 37 INFO tempest.lib.common.rest_client [req-aeceadda-21b8-4b38-b262-eb8b473ca4a0 ] Request (VolumesTransfersV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e 0.087s 2020-11-06 18:05:33.412 37 DEBUG tempest.lib.common.rest_client [req-aeceadda-21b8-4b38-b262-eb8b473ca4a0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-aeceadda-21b8-4b38-b262-eb8b473ca4a0', 'content-length': '1070', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-aeceadda-21b8-4b38-b262-eb8b473ca4a0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e'} Body: b'{"volume": {"id": "6ce88c37-377d-4c67-9b02-1b6b0a5e728e", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:05:29.000000", "updated_at": "2020-11-06T18:05:33.000000", "name": "tempest-VolumesTransfersV3RbacTest-Volume-1225747646", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e"}], "user_id": "090ad71ccaa24f9e8153791fe9327a79", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "b7671d967dff4cbea36459fa4f0d2f15"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:33.425 37 INFO tempest.common.waiters [-] volume 6ce88c37-377d-4c67-9b02-1b6b0a5e728e reached available after waiting for 0.425236 seconds 2020-11-06 18:05:33.427 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:05:33.429 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:get_all_transfers, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:05:33.429 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:33.482 37 INFO tempest.lib.common.rest_client [req-150eb67d-64fa-4230-a7d2-06bda27426f7 ] Request (VolumesTransfersV3RbacTest:test_list_volume_transfers): 200 GET http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles 0.052s 2020-11-06 18:05:33.482 37 DEBUG tempest.lib.common.rest_client [req-150eb67d-64fa-4230-a7d2-06bda27426f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-150eb67d-64fa-4230-a7d2-06bda27426f7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:33.604 37 INFO tempest.lib.common.rest_client [req-e54dba40-d84c-42ed-852e-a00a823a98cf ] Request (VolumesTransfersV3RbacTest:test_list_volume_transfers): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.121s 2020-11-06 18:05:33.605 37 DEBUG tempest.lib.common.rest_client [req-e54dba40-d84c-42ed-852e-a00a823a98cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e54dba40-d84c-42ed-852e-a00a823a98cf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "090ad71ccaa24f9e8153791fe9327a79", "name": "tempest-VolumesTransfersV3RbacTest-1022261755", "password_expires_at": null}, "audit_ids": ["zmiyM8oTREK7SGkPx9qHBA"], "expires_at": "2020-11-06T19:05:33.000000Z", "issued_at": "2020-11-06T18:05:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b7671d967dff4cbea36459fa4f0d2f15", "name": "tempest-VolumesTransfersV3RbacTest-1022261755"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:33.686 37 INFO tempest.lib.common.rest_client [req-c1c056b9-2854-44b5-9e23-8b192010e352 ] Request (VolumesTransfersV3RbacTest:test_list_volume_transfers): 200 GET http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer 0.080s 2020-11-06 18:05:33.687 37 DEBUG tempest.lib.common.rest_client [req-c1c056b9-2854-44b5-9e23-8b192010e352 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c1c056b9-2854-44b5-9e23-8b192010e352', 'content-length': '17', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c1c056b9-2854-44b5-9e23-8b192010e352', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer'} Body: b'{"transfers": []}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:33.690 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:33.747 37 INFO tempest.lib.common.rest_client [req-f6d0af55-9054-483f-a69b-a7b8444dad2e ] Request (VolumesTransfersV3RbacTest:test_list_volume_transfers): 200 GET http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles 0.055s 2020-11-06 18:05:33.747 37 DEBUG tempest.lib.common.rest_client [req-f6d0af55-9054-483f-a69b-a7b8444dad2e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f6d0af55-9054-483f-a69b-a7b8444dad2e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:33.778 37 INFO tempest.lib.common.rest_client [req-06df65ce-1b14-4f18-9a95-f0e1d63047ad ] Request (VolumesTransfersV3RbacTest:test_list_volume_transfers): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.030s 2020-11-06 18:05:33.779 37 DEBUG tempest.lib.common.rest_client [req-06df65ce-1b14-4f18-9a95-f0e1d63047ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-06df65ce-1b14-4f18-9a95-f0e1d63047ad', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "090ad71ccaa24f9e8153791fe9327a79", "name": "tempest-VolumesTransfersV3RbacTest-1022261755", "password_expires_at": null}, "audit_ids": ["XqIn-vwJQbqFgE4yLEC6hw"], "expires_at": "2020-11-06T19:05:33.000000Z", "issued_at": "2020-11-06T18:05:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b7671d967dff4cbea36459fa4f0d2f15", "name": "tempest-VolumesTransfersV3RbacTest-1022261755"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:33.782 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:05:33.785 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:get_all_transfers, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:05:33.786 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:33.841 37 INFO tempest.lib.common.rest_client [req-0e17f1fc-0045-4e4c-b866-27f8b48b9cc3 ] Request (VolumesTransfersV3RbacTest:test_list_volume_transfers_details): 200 GET http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles 0.054s 2020-11-06 18:05:33.842 37 DEBUG tempest.lib.common.rest_client [req-0e17f1fc-0045-4e4c-b866-27f8b48b9cc3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0e17f1fc-0045-4e4c-b866-27f8b48b9cc3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:33.881 37 INFO tempest.lib.common.rest_client [req-45d27947-7b06-4cb4-822e-dd488032c23b ] Request (VolumesTransfersV3RbacTest:test_list_volume_transfers_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:05:33.882 37 DEBUG tempest.lib.common.rest_client [req-45d27947-7b06-4cb4-822e-dd488032c23b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-45d27947-7b06-4cb4-822e-dd488032c23b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "090ad71ccaa24f9e8153791fe9327a79", "name": "tempest-VolumesTransfersV3RbacTest-1022261755", "password_expires_at": null}, "audit_ids": ["C3Yltm01RVqLfs9BNZV_EQ"], "expires_at": "2020-11-06T19:05:33.000000Z", "issued_at": "2020-11-06T18:05:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b7671d967dff4cbea36459fa4f0d2f15", "name": "tempest-VolumesTransfersV3RbacTest-1022261755"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:33.941 39 INFO tempest.lib.common.rest_client [req-6835d655-c87e-4fe8-bbf8-35a7b23b3206 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.210s 2020-11-06 18:05:33.941 39 DEBUG tempest.lib.common.rest_client [req-6835d655-c87e-4fe8-bbf8-35a7b23b3206 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6835d655-c87e-4fe8-bbf8-35a7b23b3206', 'x-compute-request-id': 'req-6835d655-c87e-4fe8-bbf8-35a7b23b3206', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:33.985 37 INFO tempest.lib.common.rest_client [req-ae25d08c-b642-47bb-be85-dbedcb407b74 ] Request (VolumesTransfersV3RbacTest:test_list_volume_transfers_details): 200 GET http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer/detail 0.102s 2020-11-06 18:05:33.986 37 DEBUG tempest.lib.common.rest_client [req-ae25d08c-b642-47bb-be85-dbedcb407b74 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ae25d08c-b642-47bb-be85-dbedcb407b74', 'content-length': '17', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ae25d08c-b642-47bb-be85-dbedcb407b74', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/os-volume-transfer/detail'} Body: b'{"transfers": []}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:33.991 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:34.042 37 INFO tempest.lib.common.rest_client [req-cd9ba528-1bfc-4a50-ac34-0114bb767561 ] Request (VolumesTransfersV3RbacTest:test_list_volume_transfers_details): 200 GET http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles 0.050s 2020-11-06 18:05:34.042 37 DEBUG tempest.lib.common.rest_client [req-cd9ba528-1bfc-4a50-ac34-0114bb767561 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cd9ba528-1bfc-4a50-ac34-0114bb767561', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15/users/090ad71ccaa24f9e8153791fe9327a79/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:34.078 37 INFO tempest.lib.common.rest_client [req-d9bac69a-3a4d-4318-b97f-c9e30fc3db73 ] Request (VolumesTransfersV3RbacTest:test_list_volume_transfers_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:05:34.079 37 DEBUG tempest.lib.common.rest_client [req-d9bac69a-3a4d-4318-b97f-c9e30fc3db73 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d9bac69a-3a4d-4318-b97f-c9e30fc3db73', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "090ad71ccaa24f9e8153791fe9327a79", "name": "tempest-VolumesTransfersV3RbacTest-1022261755", "password_expires_at": null}, "audit_ids": ["UTmAEbpwTi6rT6XKCdrLVw"], "expires_at": "2020-11-06T19:05:34.000000Z", "issued_at": "2020-11-06T18:05:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b7671d967dff4cbea36459fa4f0d2f15", "name": "tempest-VolumesTransfersV3RbacTest-1022261755"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b7671d967dff4cbea36459fa4f0d2f15", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:34.227 37 INFO tempest.lib.common.rest_client [req-56f453ac-1c7d-42d4-8193-fa819c1c8a39 ] Request (VolumesTransfersV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e 0.145s 2020-11-06 18:05:34.227 37 DEBUG tempest.lib.common.rest_client [req-56f453ac-1c7d-42d4-8193-fa819c1c8a39 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-56f453ac-1c7d-42d4-8193-fa819c1c8a39', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:34.301 37 INFO tempest.lib.common.rest_client [req-fcbcd08e-c6d4-4e1b-b32a-1a2be902a30e ] Request (VolumesTransfersV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e 0.072s 2020-11-06 18:05:34.301 37 DEBUG tempest.lib.common.rest_client [req-fcbcd08e-c6d4-4e1b-b32a-1a2be902a30e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-fcbcd08e-c6d4-4e1b-b32a-1a2be902a30e', 'content-length': '1069', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-fcbcd08e-c6d4-4e1b-b32a-1a2be902a30e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e'} Body: b'{"volume": {"id": "6ce88c37-377d-4c67-9b02-1b6b0a5e728e", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:05:29.000000", "updated_at": "2020-11-06T18:05:34.000000", "name": "tempest-VolumesTransfersV3RbacTest-Volume-1225747646", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e"}], "user_id": "090ad71ccaa24f9e8153791fe9327a79", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "b7671d967dff4cbea36459fa4f0d2f15"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:35.138 39 INFO tempest.lib.common.rest_client [req-15d70477-4bd8-4fc8-a4af-2cdba6141a2a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.179s 2020-11-06 18:05:35.139 39 DEBUG tempest.lib.common.rest_client [req-15d70477-4bd8-4fc8-a4af-2cdba6141a2a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-15d70477-4bd8-4fc8-a4af-2cdba6141a2a', 'x-compute-request-id': 'req-15d70477-4bd8-4fc8-a4af-2cdba6141a2a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:35.369 37 INFO tempest.lib.common.rest_client [req-f16e83f0-19f8-458a-817d-6723892cad4e ] Request (VolumesTransfersV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e 0.048s 2020-11-06 18:05:35.370 37 DEBUG tempest.lib.common.rest_client [req-f16e83f0-19f8-458a-817d-6723892cad4e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-f16e83f0-19f8-458a-817d-6723892cad4e', 'x-openstack-request-id': 'req-f16e83f0-19f8-458a-817d-6723892cad4e', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/b7671d967dff4cbea36459fa4f0d2f15/volumes/6ce88c37-377d-4c67-9b02-1b6b0a5e728e'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 6ce88c37-377d-4c67-9b02-1b6b0a5e728e could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:35.509 37 INFO tempest.lib.common.rest_client [req-5dc2a322-6405-45b9-be1b-f2a0e185366d ] Request (VolumesTransfersV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/090ad71ccaa24f9e8153791fe9327a79 0.138s 2020-11-06 18:05:35.509 37 DEBUG tempest.lib.common.rest_client [req-5dc2a322-6405-45b9-be1b-f2a0e185366d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5dc2a322-6405-45b9-be1b-f2a0e185366d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/090ad71ccaa24f9e8153791fe9327a79'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:35.596 37 INFO tempest.lib.common.rest_client [req-d571a20d-b3d0-41a0-bf47-c074f06978a4 ] Request (VolumesTransfersV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:05:35.596 37 DEBUG tempest.lib.common.rest_client [req-d571a20d-b3d0-41a0-bf47-c074f06978a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d571a20d-b3d0-41a0-bf47-c074f06978a4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["M2qyl1cLSc2rFhb9lq4Oaw"], "expires_at": "2020-11-06T19:05:35.000000Z", "issued_at": "2020-11-06T18:05:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:35.862 37 INFO tempest.lib.common.rest_client [req-d273d54c-56e9-49a4-8a94-4fa87bf8796c ] Request (VolumesTransfersV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=b7671d967dff4cbea36459fa4f0d2f15&name=default 0.264s 2020-11-06 18:05:35.862 37 DEBUG tempest.lib.common.rest_client [req-d273d54c-56e9-49a4-8a94-4fa87bf8796c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-d273d54c-56e9-49a4-8a94-4fa87bf8796c', 'date': 'Fri, 06 Nov 2020 18:05:35 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=b7671d967dff4cbea36459fa4f0d2f15&name=default'} Body: b'{"security_groups": [{"id": "257e65f6-a3cf-4e84-acd2-b66c3a999070", "name": "default", "stateful": true, "tenant_id": "b7671d967dff4cbea36459fa4f0d2f15", "description": "Default security group", "security_group_rules": [{"id": "0975334f-1193-4e0f-b2da-644eb1a8aef1", "tenant_id": "b7671d967dff4cbea36459fa4f0d2f15", "security_group_id": "257e65f6-a3cf-4e84-acd2-b66c3a999070", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "257e65f6-a3cf-4e84-acd2-b66c3a999070", "description": null, "tags": [], "created_at": "2020-11-06T18:05:35Z", "updated_at": "2020-11-06T18:05:35Z", "revision_number": 0, "project_id": "b7671d967dff4cbea36459fa4f0d2f15"}, {"id": "514d54f6-0541-4907-85dd-b771fa1a3c32", "tenant_id": "b7671d967dff4cbea36459fa4f0d2f15", "security_group_id": "257e65f6-a3cf-4e84-acd2-b66c3a999070", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "257e65f6-a3cf-4e84-acd2-b66c3a999070", "description": null, "tags": [], "created_at": "2020-11-06T18:05:35Z", "updated_at": "2020-11-06T18:05:35Z", "revision_number": 0, "project_id": "b7671d967dff4cbea36459fa4f0d2f15"}, {"id": "6541cdb2-d8de-4a07-890c-d8378f889376", "tenant_id": "b7671d967dff4cbea36459fa4f0d2f15", "security_group_id": "257e65f6-a3cf-4e84-acd2-b66c3a999070", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:05:35Z", "updated_at": "2020-11-06T18:05:35Z", "revision_number": 0, "project_id": "b7671d967dff4cbea36459fa4f0d2f15"}, {"id": "6bd7ec35-621f-4cfa-9eae-b70d92f55c7b", "tenant_id": "b7671d967dff4cbea36459fa4f0d2f15", "security_group_id": "257e65f6-a3cf-4e84-acd2-b66c3a999070", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:05:35Z", "updated_at": "2020-11-06T18:05:35Z", "revision_number": 0, "project_id": "b7671d967dff4cbea36459fa4f0d2f15"}], "tags": [], "created_at": "2020-11-06T18:05:35Z", "updated_at": "2020-11-06T18:05:35Z", "revision_number": 1, "project_id": "b7671d967dff4cbea36459fa4f0d2f15"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:36.022 37 INFO tempest.lib.common.rest_client [req-0b43b799-2464-43c9-b9ea-e9194fb20f6b ] Request (VolumesTransfersV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/257e65f6-a3cf-4e84-acd2-b66c3a999070 0.158s 2020-11-06 18:05:36.022 37 DEBUG tempest.lib.common.rest_client [req-0b43b799-2464-43c9-b9ea-e9194fb20f6b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-0b43b799-2464-43c9-b9ea-e9194fb20f6b', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:05:36 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/257e65f6-a3cf-4e84-acd2-b66c3a999070'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:36.175 37 INFO tempest.lib.common.rest_client [req-f263e268-7bd4-486b-bcbb-d3b1353cd7b9 ] Request (VolumesTransfersV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15 0.151s 2020-11-06 18:05:36.175 37 DEBUG tempest.lib.common.rest_client [req-f263e268-7bd4-486b-bcbb-d3b1353cd7b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f263e268-7bd4-486b-bcbb-d3b1353cd7b9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/b7671d967dff4cbea36459fa4f0d2f15'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:36.264 37 INFO tempest.lib.common.rest_client [req-751599d0-726e-4963-a825-0865730f780d ] Request (VolumeTypesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-11-06 18:05:36.265 37 DEBUG tempest.lib.common.rest_client [req-751599d0-726e-4963-a825-0865730f780d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-751599d0-726e-4963-a825-0865730f780d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["vh1I1g4fRxaArLv0MDnj6w"], "expires_at": "2020-11-06T19:05:36.000000Z", "issued_at": "2020-11-06T18:05:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:36.316 37 INFO tempest.lib.common.rest_client [req-06caeec8-3341-485b-8309-481b36f0f05d ] Request (VolumeTypesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-11-06 18:05:36.316 37 DEBUG tempest.lib.common.rest_client [req-06caeec8-3341-485b-8309-481b36f0f05d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-06caeec8-3341-485b-8309-481b36f0f05d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["U8WlfO_ARIeByN5sfn5mIg"], "expires_at": "2020-11-06T19:05:36.000000Z", "issued_at": "2020-11-06T18:05:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:36.353 39 INFO tempest.lib.common.rest_client [req-05d18be9-e0e3-4785-ac65-0105eb7dc21d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.196s 2020-11-06 18:05:36.353 39 DEBUG tempest.lib.common.rest_client [req-05d18be9-e0e3-4785-ac65-0105eb7dc21d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-05d18be9-e0e3-4785-ac65-0105eb7dc21d', 'x-compute-request-id': 'req-05d18be9-e0e3-4785-ac65-0105eb7dc21d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:36.376 37 INFO tempest.lib.common.rest_client [req-305af1f2-dbfb-4807-a777-083b1a06ce20 ] Request (VolumeTypesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.059s 2020-11-06 18:05:36.377 37 DEBUG tempest.lib.common.rest_client [req-305af1f2-dbfb-4807-a777-083b1a06ce20 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-305af1f2-dbfb-4807-a777-083b1a06ce20', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:36.438 37 INFO tempest.lib.common.rest_client [req-cf52ab7f-f9da-4f74-8e35-45e00e8089c9 ] Request (VolumeTypesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.060s 2020-11-06 18:05:36.439 37 DEBUG tempest.lib.common.rest_client [req-cf52ab7f-f9da-4f74-8e35-45e00e8089c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumeTypesRbacTest-840261630-desc", "domain_id": "default", "name": "tempest-VolumeTypesRbacTest-840261630"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '374', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cf52ab7f-f9da-4f74-8e35-45e00e8089c9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "38c418aa54f246d1929b2ef779b60829", "name": "tempest-VolumeTypesRbacTest-840261630", "domain_id": "default", "description": "tempest-VolumeTypesRbacTest-840261630-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/38c418aa54f246d1929b2ef779b60829"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:36.555 37 INFO tempest.lib.common.rest_client [req-c6a5466f-126d-4ea2-b81e-d020e6199b26 ] Request (VolumeTypesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.115s 2020-11-06 18:05:36.555 37 DEBUG tempest.lib.common.rest_client [req-c6a5466f-126d-4ea2-b81e-d020e6199b26 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumeTypesRbacTest-840261630", "password": "R0@=m^e~_YwjGvH", "project_id": "38c418aa54f246d1929b2ef779b60829", "email": "tempest-VolumeTypesRbacTest-1195460049@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '393', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c6a5466f-126d-4ea2-b81e-d020e6199b26', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "38c418aa54f246d1929b2ef779b60829", "email": "tempest-VolumeTypesRbacTest-1195460049@example.com", "id": "b3cce602e0e0456b97519167c76721e4", "name": "tempest-VolumeTypesRbacTest-840261630", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/b3cce602e0e0456b97519167c76721e4"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:36.609 37 INFO tempest.lib.common.rest_client [req-ec4be7c1-f896-4545-987f-e8e31661c6d5 ] Request (VolumeTypesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.052s 2020-11-06 18:05:36.610 37 DEBUG tempest.lib.common.rest_client [req-ec4be7c1-f896-4545-987f-e8e31661c6d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ec4be7c1-f896-4545-987f-e8e31661c6d5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:36.669 37 INFO tempest.lib.common.rest_client [req-4d9192bd-9540-47c8-86c9-1467b9fe3d7a ] Request (VolumeTypesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.058s 2020-11-06 18:05:36.669 37 DEBUG tempest.lib.common.rest_client [req-4d9192bd-9540-47c8-86c9-1467b9fe3d7a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4d9192bd-9540-47c8-86c9-1467b9fe3d7a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:36.746 37 INFO tempest.lib.common.rest_client [req-2d6e3bf2-1367-465d-bc47-39ff8bb3da65 ] Request (VolumeTypesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/38c418aa54f246d1929b2ef779b60829/users/b3cce602e0e0456b97519167c76721e4/roles/72a4576c553448cd941b052c1ca0cf2d 0.076s 2020-11-06 18:05:36.746 37 DEBUG tempest.lib.common.rest_client [req-2d6e3bf2-1367-465d-bc47-39ff8bb3da65 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2d6e3bf2-1367-465d-bc47-39ff8bb3da65', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/38c418aa54f246d1929b2ef779b60829/users/b3cce602e0e0456b97519167c76721e4/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:36.747 37 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumeTypesRbacTest-840261630', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '38c418aa54f246d1929b2ef779b60829', 'project_name': 'tempest-VolumeTypesRbacTest-840261630', 'tenant_id': '38c418aa54f246d1929b2ef779b60829', 'tenant_name': 'tempest-VolumeTypesRbacTest-840261630', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'b3cce602e0e0456b97519167c76721e4'}, Network: None, Subnet: None, Router: None 2020-11-06 18:05:36.747 37 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumeTypesRbacTest-840261630', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '38c418aa54f246d1929b2ef779b60829', 'project_name': 'tempest-VolumeTypesRbacTest-840261630', 'tenant_id': '38c418aa54f246d1929b2ef779b60829', 'tenant_name': 'tempest-VolumeTypesRbacTest-840261630', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'b3cce602e0e0456b97519167c76721e4'}, Network: None, Subnet: None, Router: None 2020-11-06 18:05:36.868 37 INFO tempest.lib.common.rest_client [req-c74ad7a0-f605-4538-b7a1-d2981e5d7d35 ] Request (VolumeTypesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.109s 2020-11-06 18:05:36.869 37 DEBUG tempest.lib.common.rest_client [req-c74ad7a0-f605-4538-b7a1-d2981e5d7d35 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6567', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c74ad7a0-f605-4538-b7a1-d2981e5d7d35', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b3cce602e0e0456b97519167c76721e4", "name": "tempest-VolumeTypesRbacTest-840261630", "password_expires_at": null}, "audit_ids": ["Hui_q7TYR7aFd3RhcNkCpw"], "expires_at": "2020-11-06T19:05:36.000000Z", "issued_at": "2020-11-06T18:05:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "38c418aa54f246d1929b2ef779b60829", "name": "tempest-VolumeTypesRbacTest-840261630"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30. _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:36.956 37 INFO tempest.lib.common.rest_client [req-ac37beaa-3e27-4a72-bf6a-ff0eaa008487 ] Request (VolumeTypesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:05:36.957 37 DEBUG tempest.lib.common.rest_client [req-ac37beaa-3e27-4a72-bf6a-ff0eaa008487 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ac37beaa-3e27-4a72-bf6a-ff0eaa008487', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["K62HJs2CTZyOCBHcpe29uQ"], "expires_at": "2020-11-06T19:05:36.000000Z", "issued_at": "2020-11-06T18:05:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:37.008 37 INFO tempest.lib.common.rest_client [req-9205dc43-e432-45d7-a845-5108f397e06a ] Request (VolumeTypesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-11-06 18:05:37.009 37 DEBUG tempest.lib.common.rest_client [req-9205dc43-e432-45d7-a845-5108f397e06a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9205dc43-e432-45d7-a845-5108f397e06a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["GctUar2BSCy98rkAyFFlHA"], "expires_at": "2020-11-06T19:05:36.000000Z", "issued_at": "2020-11-06T18:05:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:37.071 37 INFO tempest.lib.common.rest_client [req-2e990a82-743a-42b1-8b8d-fc45e35974a4 ] Request (VolumeTypesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.061s 2020-11-06 18:05:37.071 37 DEBUG tempest.lib.common.rest_client [req-2e990a82-743a-42b1-8b8d-fc45e35974a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2e990a82-743a-42b1-8b8d-fc45e35974a4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:37.122 37 INFO tempest.lib.common.rest_client [req-4f702cd7-242a-46ba-b5ff-eb30494bac12 ] Request (VolumeTypesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.049s 2020-11-06 18:05:37.123 37 DEBUG tempest.lib.common.rest_client [req-4f702cd7-242a-46ba-b5ff-eb30494bac12 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4f702cd7-242a-46ba-b5ff-eb30494bac12', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:37.123 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:05:37.124 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:37.178 37 INFO tempest.lib.common.rest_client [req-b4819562-8809-431c-96a1-c26d5ce2ea20 ] Request (VolumeTypesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/38c418aa54f246d1929b2ef779b60829/users/b3cce602e0e0456b97519167c76721e4/roles 0.053s 2020-11-06 18:05:37.178 37 DEBUG tempest.lib.common.rest_client [req-b4819562-8809-431c-96a1-c26d5ce2ea20 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b4819562-8809-431c-96a1-c26d5ce2ea20', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/38c418aa54f246d1929b2ef779b60829/users/b3cce602e0e0456b97519167c76721e4/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/38c418aa54f246d1929b2ef779b60829/users/b3cce602e0e0456b97519167c76721e4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:37.233 37 INFO tempest.lib.common.rest_client [req-8f727c70-867a-4f8d-9df3-a1d7d91e1cd8 ] Request (VolumeTypesRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/38c418aa54f246d1929b2ef779b60829/users/b3cce602e0e0456b97519167c76721e4/roles/72a4576c553448cd941b052c1ca0cf2d 0.054s 2020-11-06 18:05:37.234 37 DEBUG tempest.lib.common.rest_client [req-8f727c70-867a-4f8d-9df3-a1d7d91e1cd8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8f727c70-867a-4f8d-9df3-a1d7d91e1cd8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/38c418aa54f246d1929b2ef779b60829/users/b3cce602e0e0456b97519167c76721e4/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:37.329 37 INFO tempest.lib.common.rest_client [req-b755343e-3e86-404a-bcd3-94cc5a678621 ] Request (VolumeTypesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/38c418aa54f246d1929b2ef779b60829/users/b3cce602e0e0456b97519167c76721e4/roles/a629c95d64b3416fb80ae90af4f69c05 0.094s 2020-11-06 18:05:37.330 37 DEBUG tempest.lib.common.rest_client [req-b755343e-3e86-404a-bcd3-94cc5a678621 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b755343e-3e86-404a-bcd3-94cc5a678621', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/38c418aa54f246d1929b2ef779b60829/users/b3cce602e0e0456b97519167c76721e4/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:38.431 37 INFO tempest.lib.common.rest_client [req-acf48368-f3dc-448a-beea-f40d8cb4b6b6 ] Request (VolumeTypesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.099s 2020-11-06 18:05:38.432 37 DEBUG tempest.lib.common.rest_client [req-acf48368-f3dc-448a-beea-f40d8cb4b6b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-acf48368-f3dc-448a-beea-f40d8cb4b6b6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b3cce602e0e0456b97519167c76721e4", "name": "tempest-VolumeTypesRbacTest-840261630", "password_expires_at": null}, "audit_ids": ["SzVJYbJERe6plB2PCteZ-w"], "expires_at": "2020-11-06T19:05:38.000000Z", "issued_at": "2020-11-06T18:05:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "38c418aa54f246d1929b2ef779b60829", "name": "tempest-VolumeTypesRbacTest-840261630"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:38.434 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:05:38.438 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:types_manage, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:05:38.438 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:38.551 37 INFO tempest.lib.common.rest_client [req-1febc708-68d5-4c4b-bd1c-2cb21a0ba204 ] Request (VolumeTypesRbacTest:test_create_volume_type): 200 GET http://172.30.13.94/identity/v3/projects/38c418aa54f246d1929b2ef779b60829/users/b3cce602e0e0456b97519167c76721e4/roles 0.112s 2020-11-06 18:05:38.552 37 DEBUG tempest.lib.common.rest_client [req-1febc708-68d5-4c4b-bd1c-2cb21a0ba204 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1febc708-68d5-4c4b-bd1c-2cb21a0ba204', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/38c418aa54f246d1929b2ef779b60829/users/b3cce602e0e0456b97519167c76721e4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/38c418aa54f246d1929b2ef779b60829/users/b3cce602e0e0456b97519167c76721e4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:38.589 37 INFO tempest.lib.common.rest_client [req-d49197ff-d461-4fd9-a1f3-19df50c24192 ] Request (VolumeTypesRbacTest:test_create_volume_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:05:38.590 37 DEBUG tempest.lib.common.rest_client [req-d49197ff-d461-4fd9-a1f3-19df50c24192 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d49197ff-d461-4fd9-a1f3-19df50c24192', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b3cce602e0e0456b97519167c76721e4", "name": "tempest-VolumeTypesRbacTest-840261630", "password_expires_at": null}, "audit_ids": ["iLdmsac2RsqKE8BjywyYnQ"], "expires_at": "2020-11-06T19:05:38.000000Z", "issued_at": "2020-11-06T18:05:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "38c418aa54f246d1929b2ef779b60829", "name": "tempest-VolumeTypesRbacTest-840261630"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:38.672 39 INFO tempest.lib.common.rest_client [req-7ae23f2c-2c11-42c1-b3fd-2eb8b197893b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 1.302s 2020-11-06 18:05:38.673 39 DEBUG tempest.lib.common.rest_client [req-7ae23f2c-2c11-42c1-b3fd-2eb8b197893b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7ae23f2c-2c11-42c1-b3fd-2eb8b197893b', 'x-compute-request-id': 'req-7ae23f2c-2c11-42c1-b3fd-2eb8b197893b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:38.798 37 INFO tempest.lib.common.rest_client [req-6bd70013-0edb-4cac-b543-59d90c0d9283 ] Request (VolumeTypesRbacTest:test_create_volume_type): 200 POST http://172.30.13.94/volume/v3/38c418aa54f246d1929b2ef779b60829/types 0.207s 2020-11-06 18:05:38.799 37 DEBUG tempest.lib.common.rest_client [req-6bd70013-0edb-4cac-b543-59d90c0d9283 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-VolumeTypesRbacTest-volume-type-1578204532"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6bd70013-0edb-4cac-b543-59d90c0d9283', 'content-length': '225', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6bd70013-0edb-4cac-b543-59d90c0d9283', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/38c418aa54f246d1929b2ef779b60829/types'} Body: b'{"volume_type": {"id": "fb0736a9-3a8a-41eb-8277-0f38574445f7", "name": "tempest-VolumeTypesRbacTest-volume-type-1578204532", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:38.803 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:38.859 37 INFO tempest.lib.common.rest_client [req-c0008594-0833-4329-8158-7f1faf1f1a23 ] Request (VolumeTypesRbacTest:test_create_volume_type): 200 GET http://172.30.13.94/identity/v3/projects/38c418aa54f246d1929b2ef779b60829/users/b3cce602e0e0456b97519167c76721e4/roles 0.055s 2020-11-06 18:05:38.859 37 DEBUG tempest.lib.common.rest_client [req-c0008594-0833-4329-8158-7f1faf1f1a23 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c0008594-0833-4329-8158-7f1faf1f1a23', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/38c418aa54f246d1929b2ef779b60829/users/b3cce602e0e0456b97519167c76721e4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/38c418aa54f246d1929b2ef779b60829/users/b3cce602e0e0456b97519167c76721e4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:38.893 37 INFO tempest.lib.common.rest_client [req-4df9de04-7c63-48e1-9218-f981ce841ad0 ] Request (VolumeTypesRbacTest:test_create_volume_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:05:38.894 37 DEBUG tempest.lib.common.rest_client [req-4df9de04-7c63-48e1-9218-f981ce841ad0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4df9de04-7c63-48e1-9218-f981ce841ad0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b3cce602e0e0456b97519167c76721e4", "name": "tempest-VolumeTypesRbacTest-840261630", "password_expires_at": null}, "audit_ids": ["98IHOB5uTS6k6960C-z0kg"], "expires_at": "2020-11-06T19:05:38.000000Z", "issued_at": "2020-11-06T18:05:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "38c418aa54f246d1929b2ef779b60829", "name": "tempest-VolumeTypesRbacTest-840261630"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:38.897 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:05:38.900 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:types_manage, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:05:39.023 37 INFO tempest.lib.common.rest_client [req-13f5b5ea-797b-4a59-86a0-e11bcf2d6e62 ] Request (VolumeTypesRbacTest:test_delete_volume_type): 200 POST http://172.30.13.94/volume/v3/38c418aa54f246d1929b2ef779b60829/types 0.122s 2020-11-06 18:05:39.024 37 DEBUG tempest.lib.common.rest_client [req-13f5b5ea-797b-4a59-86a0-e11bcf2d6e62 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-VolumeTypesRbacTest-volume-type-737668225"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-13f5b5ea-797b-4a59-86a0-e11bcf2d6e62', 'content-length': '224', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-13f5b5ea-797b-4a59-86a0-e11bcf2d6e62', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/38c418aa54f246d1929b2ef779b60829/types'} Body: b'{"volume_type": {"id": "f2fc6356-eebd-4c48-b2d0-99a11e2834d7", "name": "tempest-VolumeTypesRbacTest-volume-type-737668225", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:39.027 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:39.079 37 INFO tempest.lib.common.rest_client [req-195a3fe5-5e7f-4e20-a9ea-ce314427813c ] Request (VolumeTypesRbacTest:test_delete_volume_type): 200 GET http://172.30.13.94/identity/v3/projects/38c418aa54f246d1929b2ef779b60829/users/b3cce602e0e0456b97519167c76721e4/roles 0.050s 2020-11-06 18:05:39.079 37 DEBUG tempest.lib.common.rest_client [req-195a3fe5-5e7f-4e20-a9ea-ce314427813c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-195a3fe5-5e7f-4e20-a9ea-ce314427813c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/38c418aa54f246d1929b2ef779b60829/users/b3cce602e0e0456b97519167c76721e4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/38c418aa54f246d1929b2ef779b60829/users/b3cce602e0e0456b97519167c76721e4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:39.114 37 INFO tempest.lib.common.rest_client [req-2da0dbe4-e9a5-49bc-95aa-f90a6fcfc466 ] Request (VolumeTypesRbacTest:test_delete_volume_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:05:39.115 37 DEBUG tempest.lib.common.rest_client [req-2da0dbe4-e9a5-49bc-95aa-f90a6fcfc466 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2da0dbe4-e9a5-49bc-95aa-f90a6fcfc466', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b3cce602e0e0456b97519167c76721e4", "name": "tempest-VolumeTypesRbacTest-840261630", "password_expires_at": null}, "audit_ids": ["I85IdMIqTjqA33SKkJhtyA"], "expires_at": "2020-11-06T19:05:39.000000Z", "issued_at": "2020-11-06T18:05:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "38c418aa54f246d1929b2ef779b60829", "name": "tempest-VolumeTypesRbacTest-840261630"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:39.257 37 INFO tempest.lib.common.rest_client [req-c6f2f05e-8c73-4cf4-95f9-ea8c8641d5bd ] Request (VolumeTypesRbacTest:test_delete_volume_type): 202 DELETE http://172.30.13.94/volume/v3/38c418aa54f246d1929b2ef779b60829/types/f2fc6356-eebd-4c48-b2d0-99a11e2834d7 0.140s 2020-11-06 18:05:39.257 37 DEBUG tempest.lib.common.rest_client [req-c6f2f05e-8c73-4cf4-95f9-ea8c8641d5bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c6f2f05e-8c73-4cf4-95f9-ea8c8641d5bd', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/38c418aa54f246d1929b2ef779b60829/types/f2fc6356-eebd-4c48-b2d0-99a11e2834d7'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:39.258 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:39.307 37 INFO tempest.lib.common.rest_client [req-f972b6e3-d3ec-4496-90a6-a1d3bdee1daa ] Request (VolumeTypesRbacTest:test_delete_volume_type): 200 GET http://172.30.13.94/identity/v3/projects/38c418aa54f246d1929b2ef779b60829/users/b3cce602e0e0456b97519167c76721e4/roles 0.049s 2020-11-06 18:05:39.308 37 DEBUG tempest.lib.common.rest_client [req-f972b6e3-d3ec-4496-90a6-a1d3bdee1daa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f972b6e3-d3ec-4496-90a6-a1d3bdee1daa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/38c418aa54f246d1929b2ef779b60829/users/b3cce602e0e0456b97519167c76721e4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/38c418aa54f246d1929b2ef779b60829/users/b3cce602e0e0456b97519167c76721e4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:39.342 37 INFO tempest.lib.common.rest_client [req-28d854f8-74f5-4d51-a591-927d9fcd516c ] Request (VolumeTypesRbacTest:test_delete_volume_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:05:39.342 37 DEBUG tempest.lib.common.rest_client [req-28d854f8-74f5-4d51-a591-927d9fcd516c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-28d854f8-74f5-4d51-a591-927d9fcd516c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b3cce602e0e0456b97519167c76721e4", "name": "tempest-VolumeTypesRbacTest-840261630", "password_expires_at": null}, "audit_ids": ["3ssIGEHLTqSjb_gEPyrSJw"], "expires_at": "2020-11-06T19:05:39.000000Z", "issued_at": "2020-11-06T18:05:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "38c418aa54f246d1929b2ef779b60829", "name": "tempest-VolumeTypesRbacTest-840261630"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:39.418 37 INFO tempest.lib.common.rest_client [req-f8380c37-28ed-479a-9bfd-6c57df25502c ] Request (VolumeTypesRbacTest:test_delete_volume_type): 404 GET http://172.30.13.94/volume/v3/38c418aa54f246d1929b2ef779b60829/types/f2fc6356-eebd-4c48-b2d0-99a11e2834d7 0.074s 2020-11-06 18:05:39.419 37 DEBUG tempest.lib.common.rest_client [req-f8380c37-28ed-479a-9bfd-6c57df25502c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-f8380c37-28ed-479a-9bfd-6c57df25502c', 'x-openstack-request-id': 'req-f8380c37-28ed-479a-9bfd-6c57df25502c', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/38c418aa54f246d1929b2ef779b60829/types/f2fc6356-eebd-4c48-b2d0-99a11e2834d7'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type f2fc6356-eebd-4c48-b2d0-99a11e2834d7 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:39.421 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:05:39.425 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:types_manage, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:05:39.467 37 INFO tempest.lib.common.rest_client [req-c746868f-9d56-437a-8087-7c602e9acb72 ] Request (VolumeTypesRbacTest:test_update_volume_type): 200 POST http://172.30.13.94/volume/v3/38c418aa54f246d1929b2ef779b60829/types 0.041s 2020-11-06 18:05:39.467 37 DEBUG tempest.lib.common.rest_client [req-c746868f-9d56-437a-8087-7c602e9acb72 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-VolumeTypesRbacTest-volume-type-807704953"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c746868f-9d56-437a-8087-7c602e9acb72', 'content-length': '224', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c746868f-9d56-437a-8087-7c602e9acb72', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/38c418aa54f246d1929b2ef779b60829/types'} Body: b'{"volume_type": {"id": "6d8c767e-b174-45c6-807d-16edd5e534e2", "name": "tempest-VolumeTypesRbacTest-volume-type-807704953", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:39.470 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:39.515 37 INFO tempest.lib.common.rest_client [req-18503e4c-7e26-474f-bdc8-838215a1e550 ] Request (VolumeTypesRbacTest:test_update_volume_type): 200 GET http://172.30.13.94/identity/v3/projects/38c418aa54f246d1929b2ef779b60829/users/b3cce602e0e0456b97519167c76721e4/roles 0.044s 2020-11-06 18:05:39.516 37 DEBUG tempest.lib.common.rest_client [req-18503e4c-7e26-474f-bdc8-838215a1e550 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-18503e4c-7e26-474f-bdc8-838215a1e550', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/38c418aa54f246d1929b2ef779b60829/users/b3cce602e0e0456b97519167c76721e4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/38c418aa54f246d1929b2ef779b60829/users/b3cce602e0e0456b97519167c76721e4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:39.551 37 INFO tempest.lib.common.rest_client [req-0c070713-9529-471a-831d-1b7c2083c69c ] Request (VolumeTypesRbacTest:test_update_volume_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:05:39.552 37 DEBUG tempest.lib.common.rest_client [req-0c070713-9529-471a-831d-1b7c2083c69c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0c070713-9529-471a-831d-1b7c2083c69c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b3cce602e0e0456b97519167c76721e4", "name": "tempest-VolumeTypesRbacTest-840261630", "password_expires_at": null}, "audit_ids": ["sJDlKjdwQZ6lxr9xr9K9og"], "expires_at": "2020-11-06T19:05:39.000000Z", "issued_at": "2020-11-06T18:05:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "38c418aa54f246d1929b2ef779b60829", "name": "tempest-VolumeTypesRbacTest-840261630"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:39.656 37 INFO tempest.lib.common.rest_client [req-fd3aad61-d050-4335-9c4a-54f186d7c20d ] Request (VolumeTypesRbacTest:test_update_volume_type): 200 PUT http://172.30.13.94/volume/v3/38c418aa54f246d1929b2ef779b60829/types/6d8c767e-b174-45c6-807d-16edd5e534e2 0.103s 2020-11-06 18:05:39.657 37 DEBUG tempest.lib.common.rest_client [req-fd3aad61-d050-4335-9c4a-54f186d7c20d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"description": "updated-description"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-fd3aad61-d050-4335-9c4a-54f186d7c20d', 'content-length': '200', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-fd3aad61-d050-4335-9c4a-54f186d7c20d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/38c418aa54f246d1929b2ef779b60829/types/6d8c767e-b174-45c6-807d-16edd5e534e2'} Body: b'{"volume_type": {"id": "6d8c767e-b174-45c6-807d-16edd5e534e2", "name": "tempest-VolumeTypesRbacTest-volume-type-807704953", "is_public": true, "extra_specs": {}, "description": "updated-description"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:39.661 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:39.710 37 INFO tempest.lib.common.rest_client [req-806f1b19-022b-4dc7-824b-6c7b88366156 ] Request (VolumeTypesRbacTest:test_update_volume_type): 200 GET http://172.30.13.94/identity/v3/projects/38c418aa54f246d1929b2ef779b60829/users/b3cce602e0e0456b97519167c76721e4/roles 0.048s 2020-11-06 18:05:39.711 37 DEBUG tempest.lib.common.rest_client [req-806f1b19-022b-4dc7-824b-6c7b88366156 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-806f1b19-022b-4dc7-824b-6c7b88366156', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/38c418aa54f246d1929b2ef779b60829/users/b3cce602e0e0456b97519167c76721e4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/38c418aa54f246d1929b2ef779b60829/users/b3cce602e0e0456b97519167c76721e4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:39.746 37 INFO tempest.lib.common.rest_client [req-3850423f-4dec-4ae1-8589-5dd21744456a ] Request (VolumeTypesRbacTest:test_update_volume_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:05:39.746 37 DEBUG tempest.lib.common.rest_client [req-3850423f-4dec-4ae1-8589-5dd21744456a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3850423f-4dec-4ae1-8589-5dd21744456a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b3cce602e0e0456b97519167c76721e4", "name": "tempest-VolumeTypesRbacTest-840261630", "password_expires_at": null}, "audit_ids": ["Lt8HqsTYQWuiGlHen_zJMw"], "expires_at": "2020-11-06T19:05:39.000000Z", "issued_at": "2020-11-06T18:05:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "38c418aa54f246d1929b2ef779b60829", "name": "tempest-VolumeTypesRbacTest-840261630"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_38c418aa54f246d1929b2ef779b60829", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:39.879 39 INFO tempest.lib.common.rest_client [req-063a7b75-7a1b-47ff-94ea-65f49ce3c95a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.189s 2020-11-06 18:05:39.879 39 DEBUG tempest.lib.common.rest_client [req-063a7b75-7a1b-47ff-94ea-65f49ce3c95a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-063a7b75-7a1b-47ff-94ea-65f49ce3c95a', 'x-compute-request-id': 'req-063a7b75-7a1b-47ff-94ea-65f49ce3c95a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:39.889 37 INFO tempest.lib.common.rest_client [req-c8886961-5feb-4cc8-9a95-c296457121ac ] Request (VolumeTypesRbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/38c418aa54f246d1929b2ef779b60829/types/6d8c767e-b174-45c6-807d-16edd5e534e2 0.139s 2020-11-06 18:05:39.890 37 DEBUG tempest.lib.common.rest_client [req-c8886961-5feb-4cc8-9a95-c296457121ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c8886961-5feb-4cc8-9a95-c296457121ac', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/38c418aa54f246d1929b2ef779b60829/types/6d8c767e-b174-45c6-807d-16edd5e534e2'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:39.911 37 INFO tempest.lib.common.rest_client [req-fc2af060-3728-4aa9-92a3-85331a28c72b ] Request (VolumeTypesRbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/38c418aa54f246d1929b2ef779b60829/types/6d8c767e-b174-45c6-807d-16edd5e534e2 0.021s 2020-11-06 18:05:39.912 37 DEBUG tempest.lib.common.rest_client [req-fc2af060-3728-4aa9-92a3-85331a28c72b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-fc2af060-3728-4aa9-92a3-85331a28c72b', 'x-openstack-request-id': 'req-fc2af060-3728-4aa9-92a3-85331a28c72b', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/38c418aa54f246d1929b2ef779b60829/types/6d8c767e-b174-45c6-807d-16edd5e534e2'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 6d8c767e-b174-45c6-807d-16edd5e534e2 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:39.938 37 INFO tempest.lib.common.rest_client [req-d29d9a9e-bbcf-4986-a46c-172a2c2a65ff ] Request (VolumeTypesRbacTest:tearDownClass): 404 DELETE http://172.30.13.94/volume/v3/38c418aa54f246d1929b2ef779b60829/types/f2fc6356-eebd-4c48-b2d0-99a11e2834d7 0.026s 2020-11-06 18:05:39.939 37 DEBUG tempest.lib.common.rest_client [req-d29d9a9e-bbcf-4986-a46c-172a2c2a65ff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-d29d9a9e-bbcf-4986-a46c-172a2c2a65ff', 'x-openstack-request-id': 'req-d29d9a9e-bbcf-4986-a46c-172a2c2a65ff', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/38c418aa54f246d1929b2ef779b60829/types/f2fc6356-eebd-4c48-b2d0-99a11e2834d7'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type f2fc6356-eebd-4c48-b2d0-99a11e2834d7 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:39.959 37 INFO tempest.lib.common.rest_client [req-b2684579-7b98-4819-a633-378bf1a84931 ] Request (VolumeTypesRbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/38c418aa54f246d1929b2ef779b60829/types/f2fc6356-eebd-4c48-b2d0-99a11e2834d7 0.019s 2020-11-06 18:05:39.959 37 DEBUG tempest.lib.common.rest_client [req-b2684579-7b98-4819-a633-378bf1a84931 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-b2684579-7b98-4819-a633-378bf1a84931', 'x-openstack-request-id': 'req-b2684579-7b98-4819-a633-378bf1a84931', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/38c418aa54f246d1929b2ef779b60829/types/f2fc6356-eebd-4c48-b2d0-99a11e2834d7'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type f2fc6356-eebd-4c48-b2d0-99a11e2834d7 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:40.037 37 INFO tempest.lib.common.rest_client [req-632dd141-cf26-4941-9ff1-c48da62335f2 ] Request (VolumeTypesRbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/38c418aa54f246d1929b2ef779b60829/types/fb0736a9-3a8a-41eb-8277-0f38574445f7 0.077s 2020-11-06 18:05:40.038 37 DEBUG tempest.lib.common.rest_client [req-632dd141-cf26-4941-9ff1-c48da62335f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-632dd141-cf26-4941-9ff1-c48da62335f2', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/38c418aa54f246d1929b2ef779b60829/types/fb0736a9-3a8a-41eb-8277-0f38574445f7'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:40.059 37 INFO tempest.lib.common.rest_client [req-2c4bdbb9-885a-47aa-bf19-9d81f9ca9951 ] Request (VolumeTypesRbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/38c418aa54f246d1929b2ef779b60829/types/fb0736a9-3a8a-41eb-8277-0f38574445f7 0.020s 2020-11-06 18:05:40.059 37 DEBUG tempest.lib.common.rest_client [req-2c4bdbb9-885a-47aa-bf19-9d81f9ca9951 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-2c4bdbb9-885a-47aa-bf19-9d81f9ca9951', 'x-openstack-request-id': 'req-2c4bdbb9-885a-47aa-bf19-9d81f9ca9951', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/38c418aa54f246d1929b2ef779b60829/types/fb0736a9-3a8a-41eb-8277-0f38574445f7'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type fb0736a9-3a8a-41eb-8277-0f38574445f7 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:40.190 37 INFO tempest.lib.common.rest_client [req-3c50a2b6-e47c-4ec2-8423-f0952812bfe0 ] Request (VolumeTypesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/b3cce602e0e0456b97519167c76721e4 0.129s 2020-11-06 18:05:40.190 37 DEBUG tempest.lib.common.rest_client [req-3c50a2b6-e47c-4ec2-8423-f0952812bfe0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3c50a2b6-e47c-4ec2-8423-f0952812bfe0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/b3cce602e0e0456b97519167c76721e4'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:40.266 37 INFO tempest.lib.common.rest_client [req-89cbbd69-e9b6-458e-80dd-6ff3e4337637 ] Request (VolumeTypesRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.074s 2020-11-06 18:05:40.266 37 DEBUG tempest.lib.common.rest_client [req-89cbbd69-e9b6-458e-80dd-6ff3e4337637 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-89cbbd69-e9b6-458e-80dd-6ff3e4337637', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["JY7RVL1cSoyo7DJ3lphH_Q"], "expires_at": "2020-11-06T19:05:40.000000Z", "issued_at": "2020-11-06T18:05:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:40.594 37 INFO tempest.lib.common.rest_client [req-f6e3d68d-2e6f-40b7-83ba-b5796d25242e ] Request (VolumeTypesRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=38c418aa54f246d1929b2ef779b60829&name=default 0.327s 2020-11-06 18:05:40.595 37 DEBUG tempest.lib.common.rest_client [req-f6e3d68d-2e6f-40b7-83ba-b5796d25242e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-f6e3d68d-2e6f-40b7-83ba-b5796d25242e', 'date': 'Fri, 06 Nov 2020 18:05:40 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=38c418aa54f246d1929b2ef779b60829&name=default'} Body: b'{"security_groups": [{"id": "d5c02d41-e1cc-41f0-8cfc-a1badec9c8e3", "name": "default", "stateful": true, "tenant_id": "38c418aa54f246d1929b2ef779b60829", "description": "Default security group", "security_group_rules": [{"id": "08ac65f5-0ccf-4a5c-9745-0e539be59b3d", "tenant_id": "38c418aa54f246d1929b2ef779b60829", "security_group_id": "d5c02d41-e1cc-41f0-8cfc-a1badec9c8e3", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "d5c02d41-e1cc-41f0-8cfc-a1badec9c8e3", "description": null, "tags": [], "created_at": "2020-11-06T18:05:40Z", "updated_at": "2020-11-06T18:05:40Z", "revision_number": 0, "project_id": "38c418aa54f246d1929b2ef779b60829"}, {"id": "128b0f22-588f-4eb2-8938-0e305ad376b5", "tenant_id": "38c418aa54f246d1929b2ef779b60829", "security_group_id": "d5c02d41-e1cc-41f0-8cfc-a1badec9c8e3", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:05:40Z", "updated_at": "2020-11-06T18:05:40Z", "revision_number": 0, "project_id": "38c418aa54f246d1929b2ef779b60829"}, {"id": "207a6006-c95e-4c1b-9196-7050ec1391e4", "tenant_id": "38c418aa54f246d1929b2ef779b60829", "security_group_id": "d5c02d41-e1cc-41f0-8cfc-a1badec9c8e3", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "d5c02d41-e1cc-41f0-8cfc-a1badec9c8e3", "description": null, "tags": [], "created_at": "2020-11-06T18:05:40Z", "updated_at": "2020-11-06T18:05:40Z", "revision_number": 0, "project_id": "38c418aa54f246d1929b2ef779b60829"}, {"id": "c32fa558-6350-4c50-a5c3-0eb20d613161", "tenant_id": "38c418aa54f246d1929b2ef779b60829", "security_group_id": "d5c02d41-e1cc-41f0-8cfc-a1badec9c8e3", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:05:40Z", "updated_at": "2020-11-06T18:05:40Z", "revision_number": 0, "project_id": "38c418aa54f246d1929b2ef779b60829"}], "tags": [], "created_at": "2020-11-06T18:05:40Z", "updated_at": "2020-11-06T18:05:40Z", "revision_number": 1, "project_id": "38c418aa54f246d1929b2ef779b60829"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:40.754 37 INFO tempest.lib.common.rest_client [req-662c2b82-2d4a-4a67-9f06-62c099d8176f ] Request (VolumeTypesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/d5c02d41-e1cc-41f0-8cfc-a1badec9c8e3 0.158s 2020-11-06 18:05:40.755 37 DEBUG tempest.lib.common.rest_client [req-662c2b82-2d4a-4a67-9f06-62c099d8176f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-662c2b82-2d4a-4a67-9f06-62c099d8176f', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:05:40 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/d5c02d41-e1cc-41f0-8cfc-a1badec9c8e3'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:40.890 37 INFO tempest.lib.common.rest_client [req-0d0bfd4c-bfd3-4755-a09d-f03cf04994b8 ] Request (VolumeTypesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/38c418aa54f246d1929b2ef779b60829 0.134s 2020-11-06 18:05:40.890 37 DEBUG tempest.lib.common.rest_client [req-0d0bfd4c-bfd3-4755-a09d-f03cf04994b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0d0bfd4c-bfd3-4755-a09d-f03cf04994b8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/38c418aa54f246d1929b2ef779b60829'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:40.973 37 INFO tempest.lib.common.rest_client [req-352a5dca-6037-49ca-a030-7a2bbcda7afa ] Request (VolumesBackupsV318RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.079s 2020-11-06 18:05:40.973 37 DEBUG tempest.lib.common.rest_client [req-352a5dca-6037-49ca-a030-7a2bbcda7afa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-352a5dca-6037-49ca-a030-7a2bbcda7afa', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["CsGfCemEQuWlF2Ct2VAciQ"], "expires_at": "2020-11-06T19:05:40.000000Z", "issued_at": "2020-11-06T18:05:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:41.013 37 INFO tempest.lib.common.rest_client [req-0ceffafb-d933-4f01-ac7a-8cea8e9c68ea ] Request (VolumesBackupsV318RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:05:41.013 37 DEBUG tempest.lib.common.rest_client [req-0ceffafb-d933-4f01-ac7a-8cea8e9c68ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0ceffafb-d933-4f01-ac7a-8cea8e9c68ea', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["LwUBQArqQTSKVlRs_tt1zA"], "expires_at": "2020-11-06T19:05:41.000000Z", "issued_at": "2020-11-06T18:05:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:41.065 37 INFO tempest.lib.common.rest_client [req-3793cc2a-3967-4232-a520-64eb7dda5cf0 ] Request (VolumesBackupsV318RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.050s 2020-11-06 18:05:41.065 37 DEBUG tempest.lib.common.rest_client [req-3793cc2a-3967-4232-a520-64eb7dda5cf0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3793cc2a-3967-4232-a520-64eb7dda5cf0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:41.120 37 INFO tempest.lib.common.rest_client [req-7341dad5-cca6-4478-9822-d7543bcf6cfd ] Request (VolumesBackupsV318RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.054s 2020-11-06 18:05:41.121 37 DEBUG tempest.lib.common.rest_client [req-7341dad5-cca6-4478-9822-d7543bcf6cfd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumesBackupsV318RbacTest-550250222-desc", "domain_id": "default", "name": "tempest-VolumesBackupsV318RbacTest-550250222"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '388', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7341dad5-cca6-4478-9822-d7543bcf6cfd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "17d9a990cc32458cac38696626fe28f6", "name": "tempest-VolumesBackupsV318RbacTest-550250222", "domain_id": "default", "description": "tempest-VolumesBackupsV318RbacTest-550250222-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/17d9a990cc32458cac38696626fe28f6"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:41.224 37 INFO tempest.lib.common.rest_client [req-9af35c04-0388-4b70-905c-662d9b2a1985 ] Request (VolumesBackupsV318RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.102s 2020-11-06 18:05:41.225 37 DEBUG tempest.lib.common.rest_client [req-9af35c04-0388-4b70-905c-662d9b2a1985 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumesBackupsV318RbacTest-550250222", "password": "O3&9_ErgnC0glVR", "project_id": "17d9a990cc32458cac38696626fe28f6", "email": "tempest-VolumesBackupsV318RbacTest-1375749600@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '407', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9af35c04-0388-4b70-905c-662d9b2a1985', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "17d9a990cc32458cac38696626fe28f6", "email": "tempest-VolumesBackupsV318RbacTest-1375749600@example.com", "id": "8e4ae2230f2a49c690244a4b74a0374c", "name": "tempest-VolumesBackupsV318RbacTest-550250222", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/8e4ae2230f2a49c690244a4b74a0374c"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:41.269 37 INFO tempest.lib.common.rest_client [req-83224852-0ae5-4f69-8887-013f3f7c8f55 ] Request (VolumesBackupsV318RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.043s 2020-11-06 18:05:41.269 37 DEBUG tempest.lib.common.rest_client [req-83224852-0ae5-4f69-8887-013f3f7c8f55 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-83224852-0ae5-4f69-8887-013f3f7c8f55', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:41.375 37 INFO tempest.lib.common.rest_client [req-c8aa5c0c-e290-4671-ace6-44cc0d9ac06a ] Request (VolumesBackupsV318RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.104s 2020-11-06 18:05:41.375 37 DEBUG tempest.lib.common.rest_client [req-c8aa5c0c-e290-4671-ace6-44cc0d9ac06a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c8aa5c0c-e290-4671-ace6-44cc0d9ac06a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:41.449 37 INFO tempest.lib.common.rest_client [req-4d6418d1-caa3-4243-9bc2-c803f7bc60cc ] Request (VolumesBackupsV318RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/17d9a990cc32458cac38696626fe28f6/users/8e4ae2230f2a49c690244a4b74a0374c/roles/72a4576c553448cd941b052c1ca0cf2d 0.072s 2020-11-06 18:05:41.449 37 DEBUG tempest.lib.common.rest_client [req-4d6418d1-caa3-4243-9bc2-c803f7bc60cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4d6418d1-caa3-4243-9bc2-c803f7bc60cc', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/17d9a990cc32458cac38696626fe28f6/users/8e4ae2230f2a49c690244a4b74a0374c/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:41.450 37 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesBackupsV318RbacTest-550250222', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '17d9a990cc32458cac38696626fe28f6', 'project_name': 'tempest-VolumesBackupsV318RbacTest-550250222', 'tenant_id': '17d9a990cc32458cac38696626fe28f6', 'tenant_name': 'tempest-VolumesBackupsV318RbacTest-550250222', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '8e4ae2230f2a49c690244a4b74a0374c'}, Network: None, Subnet: None, Router: None 2020-11-06 18:05:41.450 37 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesBackupsV318RbacTest-550250222', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '17d9a990cc32458cac38696626fe28f6', 'project_name': 'tempest-VolumesBackupsV318RbacTest-550250222', 'tenant_id': '17d9a990cc32458cac38696626fe28f6', 'tenant_name': 'tempest-VolumesBackupsV318RbacTest-550250222', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '8e4ae2230f2a49c690244a4b74a0374c'}, Network: None, Subnet: None, Router: None 2020-11-06 18:05:41.571 37 INFO tempest.lib.common.rest_client [req-ca7d8ca1-d641-44d1-9326-7497926f7eff ] Request (VolumesBackupsV318RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.112s 2020-11-06 18:05:41.572 37 DEBUG tempest.lib.common.rest_client [req-ca7d8ca1-d641-44d1-9326-7497926f7eff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6581', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ca7d8ca1-d641-44d1-9326-7497926f7eff', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8e4ae2230f2a49c690244a4b74a0374c", "name": "tempest-VolumesBackupsV318RbacTest-550250222", "password_expires_at": null}, "audit_ids": ["B9L2OQrhRm6_aQGEH8hyPA"], "expires_at": "2020-11-06T19:05:41.000000Z", "issued_at": "2020-11-06T18:05:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "17d9a990cc32458cac38696626fe28f6", "name": "tempest-VolumesBackupsV318RbacTest-550250222"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/17d9a990cc32458cac38696626fe28f6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/17d9a990cc32458cac38696626fe28f6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17d9a990cc32458cac38696626fe28f6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17d9a990cc32458cac38696626fe28f6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17d9a990cc32458cac38696626fe28f6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:41.655 37 INFO tempest.lib.common.rest_client [req-63609fba-9d62-45a8-99e2-3d55e352e8d7 ] Request (VolumesBackupsV318RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-11-06 18:05:41.656 37 DEBUG tempest.lib.common.rest_client [req-63609fba-9d62-45a8-99e2-3d55e352e8d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-63609fba-9d62-45a8-99e2-3d55e352e8d7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["es5-29caRMW-7HOYGGwmUA"], "expires_at": "2020-11-06T19:05:41.000000Z", "issued_at": "2020-11-06T18:05:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:41.750 37 INFO tempest.lib.common.rest_client [req-549b473e-d000-4d65-9bbf-9676e2e4e6eb ] Request (VolumesBackupsV318RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 18:05:41.750 37 DEBUG tempest.lib.common.rest_client [req-549b473e-d000-4d65-9bbf-9676e2e4e6eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-549b473e-d000-4d65-9bbf-9676e2e4e6eb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["MqOZmFESQc6P8ClBPXTOww"], "expires_at": "2020-11-06T19:05:41.000000Z", "issued_at": "2020-11-06T18:05:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:41.800 37 INFO tempest.lib.common.rest_client [req-6fbd03fa-1155-45b1-a619-ef81d5fca898 ] Request (VolumesBackupsV318RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.048s 2020-11-06 18:05:41.800 37 DEBUG tempest.lib.common.rest_client [req-6fbd03fa-1155-45b1-a619-ef81d5fca898 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6fbd03fa-1155-45b1-a619-ef81d5fca898', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:41.855 37 INFO tempest.lib.common.rest_client [req-bba9c8e5-a8cf-4aa5-a10b-6fea525d92ad ] Request (VolumesBackupsV318RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.054s 2020-11-06 18:05:41.856 37 DEBUG tempest.lib.common.rest_client [req-bba9c8e5-a8cf-4aa5-a10b-6fea525d92ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bba9c8e5-a8cf-4aa5-a10b-6fea525d92ad', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:41.856 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:05:41.857 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:41.903 37 INFO tempest.lib.common.rest_client [req-b146856f-04a1-4e29-aeb9-d5a5666fd0b3 ] Request (VolumesBackupsV318RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/17d9a990cc32458cac38696626fe28f6/users/8e4ae2230f2a49c690244a4b74a0374c/roles 0.045s 2020-11-06 18:05:41.903 37 DEBUG tempest.lib.common.rest_client [req-b146856f-04a1-4e29-aeb9-d5a5666fd0b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b146856f-04a1-4e29-aeb9-d5a5666fd0b3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/17d9a990cc32458cac38696626fe28f6/users/8e4ae2230f2a49c690244a4b74a0374c/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/17d9a990cc32458cac38696626fe28f6/users/8e4ae2230f2a49c690244a4b74a0374c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:41.972 37 INFO tempest.lib.common.rest_client [req-3d759465-6dea-4390-8751-6bff65240bdf ] Request (VolumesBackupsV318RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/17d9a990cc32458cac38696626fe28f6/users/8e4ae2230f2a49c690244a4b74a0374c/roles/72a4576c553448cd941b052c1ca0cf2d 0.069s 2020-11-06 18:05:41.973 37 DEBUG tempest.lib.common.rest_client [req-3d759465-6dea-4390-8751-6bff65240bdf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3d759465-6dea-4390-8751-6bff65240bdf', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/17d9a990cc32458cac38696626fe28f6/users/8e4ae2230f2a49c690244a4b74a0374c/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:42.069 37 INFO tempest.lib.common.rest_client [req-cf8f40ac-442a-44d9-b923-c018da45029e ] Request (VolumesBackupsV318RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/17d9a990cc32458cac38696626fe28f6/users/8e4ae2230f2a49c690244a4b74a0374c/roles/a629c95d64b3416fb80ae90af4f69c05 0.095s 2020-11-06 18:05:42.069 37 DEBUG tempest.lib.common.rest_client [req-cf8f40ac-442a-44d9-b923-c018da45029e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cf8f40ac-442a-44d9-b923-c018da45029e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/17d9a990cc32458cac38696626fe28f6/users/8e4ae2230f2a49c690244a4b74a0374c/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:42.191 39 INFO tempest.lib.common.rest_client [req-b3fbd7ef-e4bd-4c72-8d9e-abfa7e90f68c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 1.300s 2020-11-06 18:05:42.192 39 DEBUG tempest.lib.common.rest_client [req-b3fbd7ef-e4bd-4c72-8d9e-abfa7e90f68c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b3fbd7ef-e4bd-4c72-8d9e-abfa7e90f68c', 'x-compute-request-id': 'req-b3fbd7ef-e4bd-4c72-8d9e-abfa7e90f68c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:43.162 37 INFO tempest.lib.common.rest_client [req-246fb37d-6734-4ed5-94e2-66a6610d59fb ] Request (VolumesBackupsV318RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-11-06 18:05:43.163 37 DEBUG tempest.lib.common.rest_client [req-246fb37d-6734-4ed5-94e2-66a6610d59fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-246fb37d-6734-4ed5-94e2-66a6610d59fb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8e4ae2230f2a49c690244a4b74a0374c", "name": "tempest-VolumesBackupsV318RbacTest-550250222", "password_expires_at": null}, "audit_ids": ["J-d3OwPoQBeipRSn_tb0dg"], "expires_at": "2020-11-06T19:05:43.000000Z", "issued_at": "2020-11-06T18:05:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "17d9a990cc32458cac38696626fe28f6", "name": "tempest-VolumesBackupsV318RbacTest-550250222"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/17d9a990cc32458cac38696626fe28f6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/17d9a990cc32458cac38696626fe28f6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17d9a990cc32458cac38696626fe28f6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17d9a990cc32458cac38696626fe28f6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17d9a990cc32458cac38696626fe28f6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:43.425 39 INFO tempest.lib.common.rest_client [req-c7e304d9-9b18-476f-934a-34932e818f9e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.215s 2020-11-06 18:05:43.425 39 DEBUG tempest.lib.common.rest_client [req-c7e304d9-9b18-476f-934a-34932e818f9e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c7e304d9-9b18-476f-934a-34932e818f9e', 'x-compute-request-id': 'req-c7e304d9-9b18-476f-934a-34932e818f9e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:43.705 37 INFO tempest.lib.common.rest_client [req-e80f6124-e668-47db-ae79-a1641137cdff ] Request (VolumesBackupsV318RbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/volumes 0.540s 2020-11-06 18:05:43.706 37 DEBUG tempest.lib.common.rest_client [req-e80f6124-e668-47db-ae79-a1641137cdff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-VolumesBackupsV318RbacTest-Volume-2064585068"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e80f6124-e668-47db-ae79-a1641137cdff', 'content-length': '847', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e80f6124-e668-47db-ae79-a1641137cdff', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/volumes'} Body: b'{"volume": {"id": "aab05be0-60e5-4959-af66-a8d495afeda1", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:05:44.000000", "updated_at": null, "name": "tempest-VolumesBackupsV318RbacTest-Volume-2064585068", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/volumes/aab05be0-60e5-4959-af66-a8d495afeda1"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/17d9a990cc32458cac38696626fe28f6/volumes/aab05be0-60e5-4959-af66-a8d495afeda1"}], "user_id": "8e4ae2230f2a49c690244a4b74a0374c", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:43.790 37 INFO tempest.lib.common.rest_client [req-1733228b-26e2-431b-8d1b-9038948df924 ] Request (VolumesBackupsV318RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/volumes/aab05be0-60e5-4959-af66-a8d495afeda1 0.071s 2020-11-06 18:05:43.790 37 DEBUG tempest.lib.common.rest_client [req-1733228b-26e2-431b-8d1b-9038948df924 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-1733228b-26e2-431b-8d1b-9038948df924', 'content-length': '1069', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1733228b-26e2-431b-8d1b-9038948df924', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/volumes/aab05be0-60e5-4959-af66-a8d495afeda1'} Body: b'{"volume": {"id": "aab05be0-60e5-4959-af66-a8d495afeda1", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:05:44.000000", "updated_at": "2020-11-06T18:05:44.000000", "name": "tempest-VolumesBackupsV318RbacTest-Volume-2064585068", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/volumes/aab05be0-60e5-4959-af66-a8d495afeda1"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/17d9a990cc32458cac38696626fe28f6/volumes/aab05be0-60e5-4959-af66-a8d495afeda1"}], "user_id": "8e4ae2230f2a49c690244a4b74a0374c", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "17d9a990cc32458cac38696626fe28f6"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:44.676 39 INFO tempest.lib.common.rest_client [req-69804011-e4f2-4d3c-ac8e-1e4e6b745e42 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.240s 2020-11-06 18:05:44.677 39 DEBUG tempest.lib.common.rest_client [req-69804011-e4f2-4d3c-ac8e-1e4e6b745e42 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-69804011-e4f2-4d3c-ac8e-1e4e6b745e42', 'x-compute-request-id': 'req-69804011-e4f2-4d3c-ac8e-1e4e6b745e42', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:44.902 37 INFO tempest.lib.common.rest_client [req-d79e8e93-4340-449f-8bd5-6f4a2b1d216d ] Request (VolumesBackupsV318RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/volumes/aab05be0-60e5-4959-af66-a8d495afeda1 0.097s 2020-11-06 18:05:44.903 37 DEBUG tempest.lib.common.rest_client [req-d79e8e93-4340-449f-8bd5-6f4a2b1d216d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d79e8e93-4340-449f-8bd5-6f4a2b1d216d', 'content-length': '1070', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d79e8e93-4340-449f-8bd5-6f4a2b1d216d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/volumes/aab05be0-60e5-4959-af66-a8d495afeda1'} Body: b'{"volume": {"id": "aab05be0-60e5-4959-af66-a8d495afeda1", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:05:44.000000", "updated_at": "2020-11-06T18:05:44.000000", "name": "tempest-VolumesBackupsV318RbacTest-Volume-2064585068", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/volumes/aab05be0-60e5-4959-af66-a8d495afeda1"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/17d9a990cc32458cac38696626fe28f6/volumes/aab05be0-60e5-4959-af66-a8d495afeda1"}], "user_id": "8e4ae2230f2a49c690244a4b74a0374c", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "17d9a990cc32458cac38696626fe28f6"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:44.918 37 INFO tempest.common.waiters [-] volume aab05be0-60e5-4959-af66-a8d495afeda1 reached available after waiting for 1.918231 seconds 2020-11-06 18:05:45.035 37 INFO tempest.lib.common.rest_client [req-349a0e61-cadb-436d-88d9-ba6f8a3e3f70 ] Request (VolumesBackupsV318RbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/backups 0.116s 2020-11-06 18:05:45.035 37 DEBUG tempest.lib.common.rest_client [req-349a0e61-cadb-436d-88d9-ba6f8a3e3f70 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"backup": {"volume_id": "aab05be0-60e5-4959-af66-a8d495afeda1", "name": "tempest-VolumesBackupsV318RbacTest-Backup-751991229"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-349a0e61-cadb-436d-88d9-ba6f8a3e3f70', 'content-length': '405', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-349a0e61-cadb-436d-88d9-ba6f8a3e3f70', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/backups'} Body: b'{"backup": {"id": "4b914217-7788-4c34-bdfa-0e577a90bcd1", "name": "tempest-VolumesBackupsV318RbacTest-Backup-751991229", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/backups/4b914217-7788-4c34-bdfa-0e577a90bcd1"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/17d9a990cc32458cac38696626fe28f6/backups/4b914217-7788-4c34-bdfa-0e577a90bcd1"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:45.063 37 INFO tempest.lib.common.rest_client [req-d4950060-2e59-4101-a013-96f68002d648 ] Request (VolumesBackupsV318RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/backups/4b914217-7788-4c34-bdfa-0e577a90bcd1 0.023s 2020-11-06 18:05:45.064 37 DEBUG tempest.lib.common.rest_client [req-d4950060-2e59-4101-a013-96f68002d648 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d4950060-2e59-4101-a013-96f68002d648', 'content-length': '812', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d4950060-2e59-4101-a013-96f68002d648', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/backups/4b914217-7788-4c34-bdfa-0e577a90bcd1'} Body: b'{"backup": {"id": "4b914217-7788-4c34-bdfa-0e577a90bcd1", "status": "creating", "size": 1, "object_count": 0, "availability_zone": null, "container": null, "created_at": "2020-11-06T18:05:45.000000", "updated_at": "2020-11-06T18:05:45.000000", "name": "tempest-VolumesBackupsV318RbacTest-Backup-751991229", "description": null, "fail_reason": null, "volume_id": "aab05be0-60e5-4959-af66-a8d495afeda1", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/backups/4b914217-7788-4c34-bdfa-0e577a90bcd1"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/17d9a990cc32458cac38696626fe28f6/backups/4b914217-7788-4c34-bdfa-0e577a90bcd1"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-11-06T18:05:45.000000"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:45.902 39 INFO tempest.lib.common.rest_client [req-5e85d619-ee00-4c97-827e-ab963fa39404 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.210s 2020-11-06 18:05:45.903 39 DEBUG tempest.lib.common.rest_client [req-5e85d619-ee00-4c97-827e-ab963fa39404 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5e85d619-ee00-4c97-827e-ab963fa39404', 'x-compute-request-id': 'req-5e85d619-ee00-4c97-827e-ab963fa39404', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:46.102 37 INFO tempest.lib.common.rest_client [req-65a85576-3c82-48e3-a713-6a7b36024e4b ] Request (VolumesBackupsV318RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/backups/4b914217-7788-4c34-bdfa-0e577a90bcd1 0.028s 2020-11-06 18:05:46.102 37 DEBUG tempest.lib.common.rest_client [req-65a85576-3c82-48e3-a713-6a7b36024e4b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-65a85576-3c82-48e3-a713-6a7b36024e4b', 'content-length': '817', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-65a85576-3c82-48e3-a713-6a7b36024e4b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/backups/4b914217-7788-4c34-bdfa-0e577a90bcd1'} Body: b'{"backup": {"id": "4b914217-7788-4c34-bdfa-0e577a90bcd1", "status": "creating", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-11-06T18:05:45.000000", "updated_at": "2020-11-06T18:05:46.000000", "name": "tempest-VolumesBackupsV318RbacTest-Backup-751991229", "description": null, "fail_reason": null, "volume_id": "aab05be0-60e5-4959-af66-a8d495afeda1", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/backups/4b914217-7788-4c34-bdfa-0e577a90bcd1"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/17d9a990cc32458cac38696626fe28f6/backups/4b914217-7788-4c34-bdfa-0e577a90bcd1"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-11-06T18:05:45.000000"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:47.151 37 INFO tempest.lib.common.rest_client [req-beb12031-3fe2-4c86-9f3a-ed1584c71246 ] Request (VolumesBackupsV318RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/backups/4b914217-7788-4c34-bdfa-0e577a90bcd1 0.039s 2020-11-06 18:05:47.152 37 DEBUG tempest.lib.common.rest_client [req-beb12031-3fe2-4c86-9f3a-ed1584c71246 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-beb12031-3fe2-4c86-9f3a-ed1584c71246', 'content-length': '817', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-beb12031-3fe2-4c86-9f3a-ed1584c71246', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/backups/4b914217-7788-4c34-bdfa-0e577a90bcd1'} Body: b'{"backup": {"id": "4b914217-7788-4c34-bdfa-0e577a90bcd1", "status": "creating", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-11-06T18:05:45.000000", "updated_at": "2020-11-06T18:05:46.000000", "name": "tempest-VolumesBackupsV318RbacTest-Backup-751991229", "description": null, "fail_reason": null, "volume_id": "aab05be0-60e5-4959-af66-a8d495afeda1", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/backups/4b914217-7788-4c34-bdfa-0e577a90bcd1"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/17d9a990cc32458cac38696626fe28f6/backups/4b914217-7788-4c34-bdfa-0e577a90bcd1"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-11-06T18:05:45.000000"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:47.183 39 INFO tempest.lib.common.rest_client [req-94abc614-5ad6-4973-bd8f-5254fa5c9ab4 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.268s 2020-11-06 18:05:47.184 39 DEBUG tempest.lib.common.rest_client [req-94abc614-5ad6-4973-bd8f-5254fa5c9ab4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-94abc614-5ad6-4973-bd8f-5254fa5c9ab4', 'x-compute-request-id': 'req-94abc614-5ad6-4973-bd8f-5254fa5c9ab4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:48.196 37 INFO tempest.lib.common.rest_client [req-2b0c9e21-4dfd-47e9-950c-644e27ed1c8c ] Request (VolumesBackupsV318RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/backups/4b914217-7788-4c34-bdfa-0e577a90bcd1 0.033s 2020-11-06 18:05:48.197 37 DEBUG tempest.lib.common.rest_client [req-2b0c9e21-4dfd-47e9-950c-644e27ed1c8c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-2b0c9e21-4dfd-47e9-950c-644e27ed1c8c', 'content-length': '818', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2b0c9e21-4dfd-47e9-950c-644e27ed1c8c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/backups/4b914217-7788-4c34-bdfa-0e577a90bcd1'} Body: b'{"backup": {"id": "4b914217-7788-4c34-bdfa-0e577a90bcd1", "status": "available", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-11-06T18:05:45.000000", "updated_at": "2020-11-06T18:05:47.000000", "name": "tempest-VolumesBackupsV318RbacTest-Backup-751991229", "description": null, "fail_reason": null, "volume_id": "aab05be0-60e5-4959-af66-a8d495afeda1", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/backups/4b914217-7788-4c34-bdfa-0e577a90bcd1"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/17d9a990cc32458cac38696626fe28f6/backups/4b914217-7788-4c34-bdfa-0e577a90bcd1"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-11-06T18:05:45.000000"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:48.206 37 INFO tempest.common.waiters [-] backup 4b914217-7788-4c34-bdfa-0e577a90bcd1 reached available after waiting for 3.206035 seconds 2020-11-06 18:05:48.274 37 INFO tempest.lib.common.rest_client [req-a3e51905-9ae3-42d3-ad95-3ecbd6fe9f2f ] Request (VolumesBackupsV318RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/volumes/aab05be0-60e5-4959-af66-a8d495afeda1 0.068s 2020-11-06 18:05:48.275 37 DEBUG tempest.lib.common.rest_client [req-a3e51905-9ae3-42d3-ad95-3ecbd6fe9f2f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a3e51905-9ae3-42d3-ad95-3ecbd6fe9f2f', 'content-length': '1070', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a3e51905-9ae3-42d3-ad95-3ecbd6fe9f2f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/volumes/aab05be0-60e5-4959-af66-a8d495afeda1'} Body: b'{"volume": {"id": "aab05be0-60e5-4959-af66-a8d495afeda1", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:05:44.000000", "updated_at": "2020-11-06T18:05:47.000000", "name": "tempest-VolumesBackupsV318RbacTest-Volume-2064585068", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/volumes/aab05be0-60e5-4959-af66-a8d495afeda1"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/17d9a990cc32458cac38696626fe28f6/volumes/aab05be0-60e5-4959-af66-a8d495afeda1"}], "user_id": "8e4ae2230f2a49c690244a4b74a0374c", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "17d9a990cc32458cac38696626fe28f6"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:48.290 37 INFO tempest.common.waiters [-] volume aab05be0-60e5-4959-af66-a8d495afeda1 reached available after waiting for 0.290511 seconds 2020-11-06 18:05:48.291 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:05:48.293 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: backup:backup_project_attribute, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:05:48.293 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:48.381 39 INFO tempest.lib.common.rest_client [req-b2f26a2a-7910-4904-9591-322d2239a5d8 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.180s 2020-11-06 18:05:48.382 39 DEBUG tempest.lib.common.rest_client [req-b2f26a2a-7910-4904-9591-322d2239a5d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b2f26a2a-7910-4904-9591-322d2239a5d8', 'x-compute-request-id': 'req-b2f26a2a-7910-4904-9591-322d2239a5d8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:48.401 37 INFO tempest.lib.common.rest_client [req-3efb4a0a-069a-4a48-8380-601e2a887e63 ] Request (VolumesBackupsV318RbacTest:test_list_backup_details_project_attribute): 200 GET http://172.30.13.94/identity/v3/projects/17d9a990cc32458cac38696626fe28f6/users/8e4ae2230f2a49c690244a4b74a0374c/roles 0.107s 2020-11-06 18:05:48.401 37 DEBUG tempest.lib.common.rest_client [req-3efb4a0a-069a-4a48-8380-601e2a887e63 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3efb4a0a-069a-4a48-8380-601e2a887e63', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/17d9a990cc32458cac38696626fe28f6/users/8e4ae2230f2a49c690244a4b74a0374c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/17d9a990cc32458cac38696626fe28f6/users/8e4ae2230f2a49c690244a4b74a0374c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:48.441 37 INFO tempest.lib.common.rest_client [req-950fbd65-7916-4b2b-bdf4-c6924bea3806 ] Request (VolumesBackupsV318RbacTest:test_list_backup_details_project_attribute): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:05:48.442 37 DEBUG tempest.lib.common.rest_client [req-950fbd65-7916-4b2b-bdf4-c6924bea3806 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-950fbd65-7916-4b2b-bdf4-c6924bea3806', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8e4ae2230f2a49c690244a4b74a0374c", "name": "tempest-VolumesBackupsV318RbacTest-550250222", "password_expires_at": null}, "audit_ids": ["r4DxVFC0RDqt9IfD2wy3Vg"], "expires_at": "2020-11-06T19:05:48.000000Z", "issued_at": "2020-11-06T18:05:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "17d9a990cc32458cac38696626fe28f6", "name": "tempest-VolumesBackupsV318RbacTest-550250222"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/17d9a990cc32458cac38696626fe28f6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/17d9a990cc32458cac38696626fe28f6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17d9a990cc32458cac38696626fe28f6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17d9a990cc32458cac38696626fe28f6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17d9a990cc32458cac38696626fe28f6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:48.539 37 INFO tempest.lib.common.rest_client [req-ab185f1b-6f32-415c-a975-e941d06a8125 ] Request (VolumesBackupsV318RbacTest:test_list_backup_details_project_attribute): 200 GET http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/backups/detail 0.096s 2020-11-06 18:05:48.540 37 DEBUG tempest.lib.common.rest_client [req-ab185f1b-6f32-415c-a975-e941d06a8125 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.18', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ab185f1b-6f32-415c-a975-e941d06a8125', 'content-length': '894', 'openstack-api-version': 'volume 3.18', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ab185f1b-6f32-415c-a975-e941d06a8125', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/backups/detail'} Body: b'{"backups": [{"id": "4b914217-7788-4c34-bdfa-0e577a90bcd1", "status": "available", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-11-06T18:05:45.000000", "updated_at": "2020-11-06T18:05:47.000000", "name": "tempest-VolumesBackupsV318RbacTest-Backup-751991229", "description": null, "fail_reason": null, "volume_id": "aab05be0-60e5-4959-af66-a8d495afeda1", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/backups/4b914217-7788-4c34-bdfa-0e577a90bcd1"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/17d9a990cc32458cac38696626fe28f6/backups/4b914217-7788-4c34-bdfa-0e577a90bcd1"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-11-06T18:05:45.000000", "os-backup-project-attr:project_id": "17d9a990cc32458cac38696626fe28f6"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:48.553 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:48.660 37 INFO tempest.lib.common.rest_client [req-6aa42654-4c9d-4055-b981-6c1797d346e1 ] Request (VolumesBackupsV318RbacTest:test_list_backup_details_project_attribute): 200 GET http://172.30.13.94/identity/v3/projects/17d9a990cc32458cac38696626fe28f6/users/8e4ae2230f2a49c690244a4b74a0374c/roles 0.104s 2020-11-06 18:05:48.661 37 DEBUG tempest.lib.common.rest_client [req-6aa42654-4c9d-4055-b981-6c1797d346e1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6aa42654-4c9d-4055-b981-6c1797d346e1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/17d9a990cc32458cac38696626fe28f6/users/8e4ae2230f2a49c690244a4b74a0374c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/17d9a990cc32458cac38696626fe28f6/users/8e4ae2230f2a49c690244a4b74a0374c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:48.747 37 INFO tempest.lib.common.rest_client [req-f97ea89a-1e95-429a-b2b0-57b28089e429 ] Request (VolumesBackupsV318RbacTest:test_list_backup_details_project_attribute): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-11-06 18:05:48.748 37 DEBUG tempest.lib.common.rest_client [req-f97ea89a-1e95-429a-b2b0-57b28089e429 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f97ea89a-1e95-429a-b2b0-57b28089e429', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8e4ae2230f2a49c690244a4b74a0374c", "name": "tempest-VolumesBackupsV318RbacTest-550250222", "password_expires_at": null}, "audit_ids": ["xJxuoULEQRuWcJolVezVxw"], "expires_at": "2020-11-06T19:05:48.000000Z", "issued_at": "2020-11-06T18:05:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "17d9a990cc32458cac38696626fe28f6", "name": "tempest-VolumesBackupsV318RbacTest-550250222"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/17d9a990cc32458cac38696626fe28f6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/17d9a990cc32458cac38696626fe28f6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17d9a990cc32458cac38696626fe28f6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17d9a990cc32458cac38696626fe28f6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17d9a990cc32458cac38696626fe28f6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:48.751 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:05:48.755 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: backup:backup_project_attribute, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:05:48.755 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:48.866 37 INFO tempest.lib.common.rest_client [req-f6426af0-8d29-4210-b652-9c4a13f642dc ] Request (VolumesBackupsV318RbacTest:test_show_backup_project_attribute): 200 GET http://172.30.13.94/identity/v3/projects/17d9a990cc32458cac38696626fe28f6/users/8e4ae2230f2a49c690244a4b74a0374c/roles 0.111s 2020-11-06 18:05:48.867 37 DEBUG tempest.lib.common.rest_client [req-f6426af0-8d29-4210-b652-9c4a13f642dc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f6426af0-8d29-4210-b652-9c4a13f642dc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/17d9a990cc32458cac38696626fe28f6/users/8e4ae2230f2a49c690244a4b74a0374c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/17d9a990cc32458cac38696626fe28f6/users/8e4ae2230f2a49c690244a4b74a0374c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:48.902 37 INFO tempest.lib.common.rest_client [req-85f70db3-30df-4295-abc5-c36da7a766ec ] Request (VolumesBackupsV318RbacTest:test_show_backup_project_attribute): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:05:48.902 37 DEBUG tempest.lib.common.rest_client [req-85f70db3-30df-4295-abc5-c36da7a766ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-85f70db3-30df-4295-abc5-c36da7a766ec', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8e4ae2230f2a49c690244a4b74a0374c", "name": "tempest-VolumesBackupsV318RbacTest-550250222", "password_expires_at": null}, "audit_ids": ["MhGW8UwgTHWExUeFwkN3dw"], "expires_at": "2020-11-06T19:05:48.000000Z", "issued_at": "2020-11-06T18:05:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "17d9a990cc32458cac38696626fe28f6", "name": "tempest-VolumesBackupsV318RbacTest-550250222"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/17d9a990cc32458cac38696626fe28f6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/17d9a990cc32458cac38696626fe28f6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17d9a990cc32458cac38696626fe28f6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17d9a990cc32458cac38696626fe28f6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17d9a990cc32458cac38696626fe28f6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:49.042 37 INFO tempest.lib.common.rest_client [req-6c5bb7d9-9990-4929-adde-5ddf93b223a2 ] Request (VolumesBackupsV318RbacTest:test_show_backup_project_attribute): 200 GET http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/backups/4b914217-7788-4c34-bdfa-0e577a90bcd1 0.138s 2020-11-06 18:05:49.043 37 DEBUG tempest.lib.common.rest_client [req-6c5bb7d9-9990-4929-adde-5ddf93b223a2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.18', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6c5bb7d9-9990-4929-adde-5ddf93b223a2', 'content-length': '891', 'openstack-api-version': 'volume 3.18', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6c5bb7d9-9990-4929-adde-5ddf93b223a2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/backups/4b914217-7788-4c34-bdfa-0e577a90bcd1'} Body: b'{"backup": {"id": "4b914217-7788-4c34-bdfa-0e577a90bcd1", "status": "available", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-11-06T18:05:45.000000", "updated_at": "2020-11-06T18:05:47.000000", "name": "tempest-VolumesBackupsV318RbacTest-Backup-751991229", "description": null, "fail_reason": null, "volume_id": "aab05be0-60e5-4959-af66-a8d495afeda1", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/backups/4b914217-7788-4c34-bdfa-0e577a90bcd1"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/17d9a990cc32458cac38696626fe28f6/backups/4b914217-7788-4c34-bdfa-0e577a90bcd1"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-11-06T18:05:45.000000", "os-backup-project-attr:project_id": "17d9a990cc32458cac38696626fe28f6"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:49.052 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:49.106 37 INFO tempest.lib.common.rest_client [req-dd1356b9-78b7-40d7-8a1a-0a9047441978 ] Request (VolumesBackupsV318RbacTest:test_show_backup_project_attribute): 200 GET http://172.30.13.94/identity/v3/projects/17d9a990cc32458cac38696626fe28f6/users/8e4ae2230f2a49c690244a4b74a0374c/roles 0.053s 2020-11-06 18:05:49.106 37 DEBUG tempest.lib.common.rest_client [req-dd1356b9-78b7-40d7-8a1a-0a9047441978 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dd1356b9-78b7-40d7-8a1a-0a9047441978', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/17d9a990cc32458cac38696626fe28f6/users/8e4ae2230f2a49c690244a4b74a0374c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/17d9a990cc32458cac38696626fe28f6/users/8e4ae2230f2a49c690244a4b74a0374c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:49.149 37 INFO tempest.lib.common.rest_client [req-b6c185a9-e22e-4300-af8f-f46feab885bf ] Request (VolumesBackupsV318RbacTest:test_show_backup_project_attribute): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-11-06 18:05:49.149 37 DEBUG tempest.lib.common.rest_client [req-b6c185a9-e22e-4300-af8f-f46feab885bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b6c185a9-e22e-4300-af8f-f46feab885bf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8e4ae2230f2a49c690244a4b74a0374c", "name": "tempest-VolumesBackupsV318RbacTest-550250222", "password_expires_at": null}, "audit_ids": ["PpELfc5ARZ6xJ7LJknInCA"], "expires_at": "2020-11-06T19:05:49.000000Z", "issued_at": "2020-11-06T18:05:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "17d9a990cc32458cac38696626fe28f6", "name": "tempest-VolumesBackupsV318RbacTest-550250222"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/17d9a990cc32458cac38696626fe28f6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/17d9a990cc32458cac38696626fe28f6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17d9a990cc32458cac38696626fe28f6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17d9a990cc32458cac38696626fe28f6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17d9a990cc32458cac38696626fe28f6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:49.264 37 INFO tempest.lib.common.rest_client [req-e734e051-69c5-408a-b091-a296ae2e7427 ] Request (VolumesBackupsV318RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/backups/4b914217-7788-4c34-bdfa-0e577a90bcd1 0.112s 2020-11-06 18:05:49.264 37 DEBUG tempest.lib.common.rest_client [req-e734e051-69c5-408a-b091-a296ae2e7427 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-e734e051-69c5-408a-b091-a296ae2e7427', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e734e051-69c5-408a-b091-a296ae2e7427', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/backups/4b914217-7788-4c34-bdfa-0e577a90bcd1'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:49.341 37 INFO tempest.lib.common.rest_client [req-5680ad9d-da81-4686-a90a-c61b9588b40b ] Request (VolumesBackupsV318RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/volumes/aab05be0-60e5-4959-af66-a8d495afeda1 0.076s 2020-11-06 18:05:49.342 37 DEBUG tempest.lib.common.rest_client [req-5680ad9d-da81-4686-a90a-c61b9588b40b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5680ad9d-da81-4686-a90a-c61b9588b40b', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/volumes/aab05be0-60e5-4959-af66-a8d495afeda1'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:49.414 37 INFO tempest.lib.common.rest_client [req-e9aa01ad-bb2e-470d-9450-94a63eec6a90 ] Request (VolumesBackupsV318RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/volumes/aab05be0-60e5-4959-af66-a8d495afeda1 0.071s 2020-11-06 18:05:49.414 37 DEBUG tempest.lib.common.rest_client [req-e9aa01ad-bb2e-470d-9450-94a63eec6a90 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e9aa01ad-bb2e-470d-9450-94a63eec6a90', 'content-length': '1069', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e9aa01ad-bb2e-470d-9450-94a63eec6a90', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/volumes/aab05be0-60e5-4959-af66-a8d495afeda1'} Body: b'{"volume": {"id": "aab05be0-60e5-4959-af66-a8d495afeda1", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:05:44.000000", "updated_at": "2020-11-06T18:05:49.000000", "name": "tempest-VolumesBackupsV318RbacTest-Volume-2064585068", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/volumes/aab05be0-60e5-4959-af66-a8d495afeda1"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/17d9a990cc32458cac38696626fe28f6/volumes/aab05be0-60e5-4959-af66-a8d495afeda1"}], "user_id": "8e4ae2230f2a49c690244a4b74a0374c", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "17d9a990cc32458cac38696626fe28f6"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:49.606 39 INFO tempest.lib.common.rest_client [req-40a2b4e2-7e0e-4877-a5a5-babb21190850 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.211s 2020-11-06 18:05:49.607 39 DEBUG tempest.lib.common.rest_client [req-40a2b4e2-7e0e-4877-a5a5-babb21190850 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-40a2b4e2-7e0e-4877-a5a5-babb21190850', 'x-compute-request-id': 'req-40a2b4e2-7e0e-4877-a5a5-babb21190850', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:50.506 37 INFO tempest.lib.common.rest_client [req-c3b97485-3411-4d34-aac9-f8f614c5ac63 ] Request (VolumesBackupsV318RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/volumes/aab05be0-60e5-4959-af66-a8d495afeda1 0.076s 2020-11-06 18:05:50.507 37 DEBUG tempest.lib.common.rest_client [req-c3b97485-3411-4d34-aac9-f8f614c5ac63 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c3b97485-3411-4d34-aac9-f8f614c5ac63', 'content-length': '1069', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c3b97485-3411-4d34-aac9-f8f614c5ac63', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/volumes/aab05be0-60e5-4959-af66-a8d495afeda1'} Body: b'{"volume": {"id": "aab05be0-60e5-4959-af66-a8d495afeda1", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:05:44.000000", "updated_at": "2020-11-06T18:05:49.000000", "name": "tempest-VolumesBackupsV318RbacTest-Volume-2064585068", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/volumes/aab05be0-60e5-4959-af66-a8d495afeda1"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/17d9a990cc32458cac38696626fe28f6/volumes/aab05be0-60e5-4959-af66-a8d495afeda1"}], "user_id": "8e4ae2230f2a49c690244a4b74a0374c", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "17d9a990cc32458cac38696626fe28f6"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:50.851 39 INFO tempest.lib.common.rest_client [req-0ef2af53-d51b-4533-9e8b-d11fd5db8383 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.229s 2020-11-06 18:05:50.852 39 DEBUG tempest.lib.common.rest_client [req-0ef2af53-d51b-4533-9e8b-d11fd5db8383 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0ef2af53-d51b-4533-9e8b-d11fd5db8383', 'x-compute-request-id': 'req-0ef2af53-d51b-4533-9e8b-d11fd5db8383', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:51.578 37 INFO tempest.lib.common.rest_client [req-ce1dad6c-5a30-4e66-9f0d-03a688780130 ] Request (VolumesBackupsV318RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/volumes/aab05be0-60e5-4959-af66-a8d495afeda1 0.056s 2020-11-06 18:05:51.579 37 DEBUG tempest.lib.common.rest_client [req-ce1dad6c-5a30-4e66-9f0d-03a688780130 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-ce1dad6c-5a30-4e66-9f0d-03a688780130', 'x-openstack-request-id': 'req-ce1dad6c-5a30-4e66-9f0d-03a688780130', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/17d9a990cc32458cac38696626fe28f6/volumes/aab05be0-60e5-4959-af66-a8d495afeda1'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume aab05be0-60e5-4959-af66-a8d495afeda1 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:51.705 37 INFO tempest.lib.common.rest_client [req-1e411445-c0ad-41c0-bd1b-a45f7af8a1b4 ] Request (VolumesBackupsV318RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/8e4ae2230f2a49c690244a4b74a0374c 0.125s 2020-11-06 18:05:51.705 37 DEBUG tempest.lib.common.rest_client [req-1e411445-c0ad-41c0-bd1b-a45f7af8a1b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1e411445-c0ad-41c0-bd1b-a45f7af8a1b4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/8e4ae2230f2a49c690244a4b74a0374c'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:51.800 37 INFO tempest.lib.common.rest_client [req-6367fbbe-8443-42c2-8f61-c6879e49a17d ] Request (VolumesBackupsV318RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-11-06 18:05:51.800 37 DEBUG tempest.lib.common.rest_client [req-6367fbbe-8443-42c2-8f61-c6879e49a17d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6367fbbe-8443-42c2-8f61-c6879e49a17d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["MLsaD3snTuSWphTcF2SLtw"], "expires_at": "2020-11-06T19:05:51.000000Z", "issued_at": "2020-11-06T18:05:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:52.094 37 INFO tempest.lib.common.rest_client [req-c686b4fd-fbef-4b4d-82bd-b475f41948d3 ] Request (VolumesBackupsV318RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=17d9a990cc32458cac38696626fe28f6&name=default 0.292s 2020-11-06 18:05:52.094 37 DEBUG tempest.lib.common.rest_client [req-c686b4fd-fbef-4b4d-82bd-b475f41948d3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-c686b4fd-fbef-4b4d-82bd-b475f41948d3', 'date': 'Fri, 06 Nov 2020 18:05:52 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=17d9a990cc32458cac38696626fe28f6&name=default'} Body: b'{"security_groups": [{"id": "548ba2af-ff20-431a-8b38-71808f5da81a", "name": "default", "stateful": true, "tenant_id": "17d9a990cc32458cac38696626fe28f6", "description": "Default security group", "security_group_rules": [{"id": "1fdffd05-c1a8-4040-a49c-6733598678a7", "tenant_id": "17d9a990cc32458cac38696626fe28f6", "security_group_id": "548ba2af-ff20-431a-8b38-71808f5da81a", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "548ba2af-ff20-431a-8b38-71808f5da81a", "description": null, "tags": [], "created_at": "2020-11-06T18:05:52Z", "updated_at": "2020-11-06T18:05:52Z", "revision_number": 0, "project_id": "17d9a990cc32458cac38696626fe28f6"}, {"id": "5daab771-7778-4b4e-b7b7-56b1f0819f21", "tenant_id": "17d9a990cc32458cac38696626fe28f6", "security_group_id": "548ba2af-ff20-431a-8b38-71808f5da81a", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:05:52Z", "updated_at": "2020-11-06T18:05:52Z", "revision_number": 0, "project_id": "17d9a990cc32458cac38696626fe28f6"}, {"id": "81994189-7dff-4751-9cbf-287ebe6df702", "tenant_id": "17d9a990cc32458cac38696626fe28f6", "security_group_id": "548ba2af-ff20-431a-8b38-71808f5da81a", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "548ba2af-ff20-431a-8b38-71808f5da81a", "description": null, "tags": [], "created_at": "2020-11-06T18:05:52Z", "updated_at": "2020-11-06T18:05:52Z", "revision_number": 0, "project_id": "17d9a990cc32458cac38696626fe28f6"}, {"id": "ea0e4d9a-1e53-4c11-9696-51ce8e4dc2fa", "tenant_id": "17d9a990cc32458cac38696626fe28f6", "security_group_id": "548ba2af-ff20-431a-8b38-71808f5da81a", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:05:52Z", "updated_at": "2020-11-06T18:05:52Z", "revision_number": 0, "project_id": "17d9a990cc32458cac38696626fe28f6"}], "tags": [], "created_at": "2020-11-06T18:05:51Z", "updated_at": "2020-11-06T18:05:52Z", "revision_number": 1, "project_id": "17d9a990cc32458cac38696626fe28f6"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:52.213 39 INFO tempest.lib.common.rest_client [req-363e25ae-b888-4abe-9499-bf96297d143a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.344s 2020-11-06 18:05:52.214 39 DEBUG tempest.lib.common.rest_client [req-363e25ae-b888-4abe-9499-bf96297d143a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-363e25ae-b888-4abe-9499-bf96297d143a', 'x-compute-request-id': 'req-363e25ae-b888-4abe-9499-bf96297d143a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:52.236 37 INFO tempest.lib.common.rest_client [req-e3a06342-a35a-4f0f-8839-091051bfed1f ] Request (VolumesBackupsV318RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/548ba2af-ff20-431a-8b38-71808f5da81a 0.140s 2020-11-06 18:05:52.236 37 DEBUG tempest.lib.common.rest_client [req-e3a06342-a35a-4f0f-8839-091051bfed1f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-e3a06342-a35a-4f0f-8839-091051bfed1f', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:05:52 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/548ba2af-ff20-431a-8b38-71808f5da81a'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:52.372 37 INFO tempest.lib.common.rest_client [req-7ad9752f-3886-44ac-a4e2-fe63a28be074 ] Request (VolumesBackupsV318RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/17d9a990cc32458cac38696626fe28f6 0.135s 2020-11-06 18:05:52.373 37 DEBUG tempest.lib.common.rest_client [req-7ad9752f-3886-44ac-a4e2-fe63a28be074 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7ad9752f-3886-44ac-a4e2-fe63a28be074', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/17d9a990cc32458cac38696626fe28f6'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:52.477 37 INFO tempest.lib.common.rest_client [req-21b5e38b-2055-43b1-acfa-46c974bc29e0 ] Request (VolumesBackupsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.100s 2020-11-06 18:05:52.478 37 DEBUG tempest.lib.common.rest_client [req-21b5e38b-2055-43b1-acfa-46c974bc29e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-21b5e38b-2055-43b1-acfa-46c974bc29e0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["VdH2nygdS8O4aasC3O2CdQ"], "expires_at": "2020-11-06T19:05:52.000000Z", "issued_at": "2020-11-06T18:05:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:52.524 37 INFO tempest.lib.common.rest_client [req-7a05b4e6-4281-4bca-ac2f-9ca4ff12a548 ] Request (VolumesBackupsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:05:52.525 37 DEBUG tempest.lib.common.rest_client [req-7a05b4e6-4281-4bca-ac2f-9ca4ff12a548 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7a05b4e6-4281-4bca-ac2f-9ca4ff12a548', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["AosxP7KHQd6L7LsM_TyMlQ"], "expires_at": "2020-11-06T19:05:52.000000Z", "issued_at": "2020-11-06T18:05:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:52.589 37 INFO tempest.lib.common.rest_client [req-96d4b595-b10e-4b41-b535-36c2e981392d ] Request (VolumesBackupsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.063s 2020-11-06 18:05:52.590 37 DEBUG tempest.lib.common.rest_client [req-96d4b595-b10e-4b41-b535-36c2e981392d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-96d4b595-b10e-4b41-b535-36c2e981392d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:52.661 37 INFO tempest.lib.common.rest_client [req-4d958666-fc6d-45cf-bac6-6bfb4f8e535b ] Request (VolumesBackupsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.069s 2020-11-06 18:05:52.661 37 DEBUG tempest.lib.common.rest_client [req-4d958666-fc6d-45cf-bac6-6bfb4f8e535b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumesBackupsV3RbacTest-960704696-desc", "domain_id": "default", "name": "tempest-VolumesBackupsV3RbacTest-960704696"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '384', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4d958666-fc6d-45cf-bac6-6bfb4f8e535b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "08ca8e8d43a54acea340e660c49fdd02", "name": "tempest-VolumesBackupsV3RbacTest-960704696", "domain_id": "default", "description": "tempest-VolumesBackupsV3RbacTest-960704696-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:52.781 37 INFO tempest.lib.common.rest_client [req-03d3f947-1e45-4b95-81c6-00f20bc11aa5 ] Request (VolumesBackupsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.118s 2020-11-06 18:05:52.782 37 DEBUG tempest.lib.common.rest_client [req-03d3f947-1e45-4b95-81c6-00f20bc11aa5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumesBackupsV3RbacTest-960704696", "password": "U6_qc8~U=7eu7nC", "project_id": "08ca8e8d43a54acea340e660c49fdd02", "email": "tempest-VolumesBackupsV3RbacTest-2082517843@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '403', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-03d3f947-1e45-4b95-81c6-00f20bc11aa5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "08ca8e8d43a54acea340e660c49fdd02", "email": "tempest-VolumesBackupsV3RbacTest-2082517843@example.com", "id": "9bdff6dfab034591b5acf2726711414b", "name": "tempest-VolumesBackupsV3RbacTest-960704696", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/9bdff6dfab034591b5acf2726711414b"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:52.835 37 INFO tempest.lib.common.rest_client [req-74056746-82a2-4ea2-8fa4-9bd4970fa7b1 ] Request (VolumesBackupsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.052s 2020-11-06 18:05:52.835 37 DEBUG tempest.lib.common.rest_client [req-74056746-82a2-4ea2-8fa4-9bd4970fa7b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-74056746-82a2-4ea2-8fa4-9bd4970fa7b1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:52.891 37 INFO tempest.lib.common.rest_client [req-988863ab-cab9-4372-9c45-3610f2ac426c ] Request (VolumesBackupsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.054s 2020-11-06 18:05:52.891 37 DEBUG tempest.lib.common.rest_client [req-988863ab-cab9-4372-9c45-3610f2ac426c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-988863ab-cab9-4372-9c45-3610f2ac426c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:52.956 37 INFO tempest.lib.common.rest_client [req-f1ad48ed-9d1d-4480-8d8b-e5f527a1bd55 ] Request (VolumesBackupsV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles/72a4576c553448cd941b052c1ca0cf2d 0.063s 2020-11-06 18:05:52.957 37 DEBUG tempest.lib.common.rest_client [req-f1ad48ed-9d1d-4480-8d8b-e5f527a1bd55 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f1ad48ed-9d1d-4480-8d8b-e5f527a1bd55', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:52.957 37 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesBackupsV3RbacTest-960704696', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '08ca8e8d43a54acea340e660c49fdd02', 'project_name': 'tempest-VolumesBackupsV3RbacTest-960704696', 'tenant_id': '08ca8e8d43a54acea340e660c49fdd02', 'tenant_name': 'tempest-VolumesBackupsV3RbacTest-960704696', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '9bdff6dfab034591b5acf2726711414b'}, Network: None, Subnet: None, Router: None 2020-11-06 18:05:52.958 37 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesBackupsV3RbacTest-960704696', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '08ca8e8d43a54acea340e660c49fdd02', 'project_name': 'tempest-VolumesBackupsV3RbacTest-960704696', 'tenant_id': '08ca8e8d43a54acea340e660c49fdd02', 'tenant_name': 'tempest-VolumesBackupsV3RbacTest-960704696', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '9bdff6dfab034591b5acf2726711414b'}, Network: None, Subnet: None, Router: None 2020-11-06 18:05:53.085 37 INFO tempest.lib.common.rest_client [req-b9547e4d-cd42-44da-a50d-cc1f89cd84cf ] Request (VolumesBackupsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.116s 2020-11-06 18:05:53.086 37 DEBUG tempest.lib.common.rest_client [req-b9547e4d-cd42-44da-a50d-cc1f89cd84cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6577', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b9547e4d-cd42-44da-a50d-cc1f89cd84cf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9bdff6dfab034591b5acf2726711414b", "name": "tempest-VolumesBackupsV3RbacTest-960704696", "password_expires_at": null}, "audit_ids": ["bzQdccexRlWd3frYkhaBdQ"], "expires_at": "2020-11-06T19:05:53.000000Z", "issued_at": "2020-11-06T18:05:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "08ca8e8d43a54acea340e660c49fdd02", "name": "tempest-VolumesBackupsV3RbacTest-960704696"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:53.191 37 INFO tempest.lib.common.rest_client [req-7fc4b6d7-b85e-49c5-97a7-1c522fb7b42a ] Request (VolumesBackupsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.104s 2020-11-06 18:05:53.192 37 DEBUG tempest.lib.common.rest_client [req-7fc4b6d7-b85e-49c5-97a7-1c522fb7b42a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7fc4b6d7-b85e-49c5-97a7-1c522fb7b42a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["Q9dDzdvuQAamwm5DsicuFQ"], "expires_at": "2020-11-06T19:05:53.000000Z", "issued_at": "2020-11-06T18:05:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:53.243 37 INFO tempest.lib.common.rest_client [req-218cb216-3195-4574-ba0e-6ef369f0929c ] Request (VolumesBackupsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-11-06 18:05:53.244 37 DEBUG tempest.lib.common.rest_client [req-218cb216-3195-4574-ba0e-6ef369f0929c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-218cb216-3195-4574-ba0e-6ef369f0929c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["2Nr4Nl31RPmVSmU1lGi9JQ"], "expires_at": "2020-11-06T19:05:53.000000Z", "issued_at": "2020-11-06T18:05:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:53.304 37 INFO tempest.lib.common.rest_client [req-28857c27-66cb-4655-86f6-5c4ad4ac386a ] Request (VolumesBackupsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.058s 2020-11-06 18:05:53.304 37 DEBUG tempest.lib.common.rest_client [req-28857c27-66cb-4655-86f6-5c4ad4ac386a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-28857c27-66cb-4655-86f6-5c4ad4ac386a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:53.363 37 INFO tempest.lib.common.rest_client [req-05a4e674-60db-4898-bafd-b99ee45c6023 ] Request (VolumesBackupsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.057s 2020-11-06 18:05:53.363 37 DEBUG tempest.lib.common.rest_client [req-05a4e674-60db-4898-bafd-b99ee45c6023 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-05a4e674-60db-4898-bafd-b99ee45c6023', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:53.364 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:05:53.364 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:53.418 37 INFO tempest.lib.common.rest_client [req-c18161cd-a694-4c2c-9975-0f884cf352fd ] Request (VolumesBackupsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles 0.053s 2020-11-06 18:05:53.419 37 DEBUG tempest.lib.common.rest_client [req-c18161cd-a694-4c2c-9975-0f884cf352fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c18161cd-a694-4c2c-9975-0f884cf352fd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:53.427 39 INFO tempest.lib.common.rest_client [req-49b9152c-95b3-4035-8091-09f7e41262d4 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.197s 2020-11-06 18:05:53.427 39 DEBUG tempest.lib.common.rest_client [req-49b9152c-95b3-4035-8091-09f7e41262d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-49b9152c-95b3-4035-8091-09f7e41262d4', 'x-compute-request-id': 'req-49b9152c-95b3-4035-8091-09f7e41262d4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:53.480 37 INFO tempest.lib.common.rest_client [req-f9cf446c-a2f3-44d3-8c0c-855ad65a7291 ] Request (VolumesBackupsV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles/72a4576c553448cd941b052c1ca0cf2d 0.060s 2020-11-06 18:05:53.480 37 DEBUG tempest.lib.common.rest_client [req-f9cf446c-a2f3-44d3-8c0c-855ad65a7291 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f9cf446c-a2f3-44d3-8c0c-855ad65a7291', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:53.589 37 INFO tempest.lib.common.rest_client [req-36cdbe62-b593-4ff9-aad5-f42d4f0d1c02 ] Request (VolumesBackupsV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles/a629c95d64b3416fb80ae90af4f69c05 0.107s 2020-11-06 18:05:53.589 37 DEBUG tempest.lib.common.rest_client [req-36cdbe62-b593-4ff9-aad5-f42d4f0d1c02 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-36cdbe62-b593-4ff9-aad5-f42d4f0d1c02', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:54.673 37 INFO tempest.lib.common.rest_client [req-b1262896-49be-417a-9f69-b13e77fad40c ] Request (VolumesBackupsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 18:05:54.674 37 DEBUG tempest.lib.common.rest_client [req-b1262896-49be-417a-9f69-b13e77fad40c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b1262896-49be-417a-9f69-b13e77fad40c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9bdff6dfab034591b5acf2726711414b", "name": "tempest-VolumesBackupsV3RbacTest-960704696", "password_expires_at": null}, "audit_ids": ["jBRNbbsYS0Cr8FBB4i3qEg"], "expires_at": "2020-11-06T19:05:54.000000Z", "issued_at": "2020-11-06T18:05:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "08ca8e8d43a54acea340e660c49fdd02", "name": "tempest-VolumesBackupsV3RbacTest-960704696"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:55.116 37 INFO tempest.lib.common.rest_client [req-7009ef1e-5619-4cf0-9ca2-70736d710e26 ] Request (VolumesBackupsV3RbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes 0.441s 2020-11-06 18:05:55.117 37 DEBUG tempest.lib.common.rest_client [req-7009ef1e-5619-4cf0-9ca2-70736d710e26 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-VolumesBackupsV3RbacTest-Volume-978432898"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-7009ef1e-5619-4cf0-9ca2-70736d710e26', 'content-length': '844', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7009ef1e-5619-4cf0-9ca2-70736d710e26', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes'} Body: b'{"volume": {"id": "d5454f08-c508-485b-be85-b2805017b535", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:05:55.000000", "updated_at": null, "name": "tempest-VolumesBackupsV3RbacTest-Volume-978432898", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535"}], "user_id": "9bdff6dfab034591b5acf2726711414b", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:55.226 37 INFO tempest.lib.common.rest_client [req-08c22b31-1682-493b-b17c-14ff236bcb04 ] Request (VolumesBackupsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535 0.095s 2020-11-06 18:05:55.227 37 DEBUG tempest.lib.common.rest_client [req-08c22b31-1682-493b-b17c-14ff236bcb04 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-08c22b31-1682-493b-b17c-14ff236bcb04', 'content-length': '1066', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-08c22b31-1682-493b-b17c-14ff236bcb04', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535'} Body: b'{"volume": {"id": "d5454f08-c508-485b-be85-b2805017b535", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:05:55.000000", "updated_at": "2020-11-06T18:05:55.000000", "name": "tempest-VolumesBackupsV3RbacTest-Volume-978432898", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535"}], "user_id": "9bdff6dfab034591b5acf2726711414b", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "08ca8e8d43a54acea340e660c49fdd02"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:55.483 39 INFO tempest.lib.common.rest_client [req-ae8a1f73-fcd2-470e-a5b8-f26ae679381a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 1.038s 2020-11-06 18:05:55.484 39 DEBUG tempest.lib.common.rest_client [req-ae8a1f73-fcd2-470e-a5b8-f26ae679381a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ae8a1f73-fcd2-470e-a5b8-f26ae679381a', 'x-compute-request-id': 'req-ae8a1f73-fcd2-470e-a5b8-f26ae679381a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:56.323 37 INFO tempest.lib.common.rest_client [req-fceb3f40-78ad-43d0-a369-1bb8e44776fe ] Request (VolumesBackupsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535 0.079s 2020-11-06 18:05:56.323 37 DEBUG tempest.lib.common.rest_client [req-fceb3f40-78ad-43d0-a369-1bb8e44776fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-fceb3f40-78ad-43d0-a369-1bb8e44776fe', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-fceb3f40-78ad-43d0-a369-1bb8e44776fe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535'} Body: b'{"volume": {"id": "d5454f08-c508-485b-be85-b2805017b535", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:05:55.000000", "updated_at": "2020-11-06T18:05:55.000000", "name": "tempest-VolumesBackupsV3RbacTest-Volume-978432898", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535"}], "user_id": "9bdff6dfab034591b5acf2726711414b", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "08ca8e8d43a54acea340e660c49fdd02"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:56.335 37 INFO tempest.common.waiters [-] volume d5454f08-c508-485b-be85-b2805017b535 reached available after waiting for 1.335379 seconds 2020-11-06 18:05:56.499 37 INFO tempest.lib.common.rest_client [req-66e52f99-8ce6-4ca8-9338-725ae887c531 ] Request (VolumesBackupsV3RbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups 0.163s 2020-11-06 18:05:56.500 37 DEBUG tempest.lib.common.rest_client [req-66e52f99-8ce6-4ca8-9338-725ae887c531 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"backup": {"volume_id": "d5454f08-c508-485b-be85-b2805017b535", "name": "tempest-VolumesBackupsV3RbacTest-Backup-912808735"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-66e52f99-8ce6-4ca8-9338-725ae887c531', 'content-length': '403', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-66e52f99-8ce6-4ca8-9338-725ae887c531', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups'} Body: b'{"backup": {"id": "67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480", "name": "tempest-VolumesBackupsV3RbacTest-Backup-912808735", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:56.539 37 INFO tempest.lib.common.rest_client [req-861480e5-52e8-4c88-95a6-455b9d188f55 ] Request (VolumesBackupsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480 0.035s 2020-11-06 18:05:56.540 37 DEBUG tempest.lib.common.rest_client [req-861480e5-52e8-4c88-95a6-455b9d188f55 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-861480e5-52e8-4c88-95a6-455b9d188f55', 'content-length': '810', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-861480e5-52e8-4c88-95a6-455b9d188f55', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480'} Body: b'{"backup": {"id": "67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480", "status": "creating", "size": 1, "object_count": 0, "availability_zone": null, "container": null, "created_at": "2020-11-06T18:05:56.000000", "updated_at": "2020-11-06T18:05:56.000000", "name": "tempest-VolumesBackupsV3RbacTest-Backup-912808735", "description": null, "fail_reason": null, "volume_id": "d5454f08-c508-485b-be85-b2805017b535", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-11-06T18:05:56.000000"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:56.737 39 INFO tempest.lib.common.rest_client [req-50d2da06-f262-4ad4-961d-4e88d89a69d8 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.236s 2020-11-06 18:05:56.737 39 DEBUG tempest.lib.common.rest_client [req-50d2da06-f262-4ad4-961d-4e88d89a69d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-50d2da06-f262-4ad4-961d-4e88d89a69d8', 'x-compute-request-id': 'req-50d2da06-f262-4ad4-961d-4e88d89a69d8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:57.582 37 INFO tempest.lib.common.rest_client [req-90ad5162-8255-4398-81b4-3c532bc60a03 ] Request (VolumesBackupsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480 0.032s 2020-11-06 18:05:57.582 37 DEBUG tempest.lib.common.rest_client [req-90ad5162-8255-4398-81b4-3c532bc60a03 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-90ad5162-8255-4398-81b4-3c532bc60a03', 'content-length': '815', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-90ad5162-8255-4398-81b4-3c532bc60a03', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480'} Body: b'{"backup": {"id": "67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480", "status": "creating", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-11-06T18:05:56.000000", "updated_at": "2020-11-06T18:05:57.000000", "name": "tempest-VolumesBackupsV3RbacTest-Backup-912808735", "description": null, "fail_reason": null, "volume_id": "d5454f08-c508-485b-be85-b2805017b535", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-11-06T18:05:56.000000"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:57.972 39 INFO tempest.lib.common.rest_client [req-6e420598-5a54-4d6e-ab72-7ad262f18dfe ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.218s 2020-11-06 18:05:57.972 39 DEBUG tempest.lib.common.rest_client [req-6e420598-5a54-4d6e-ab72-7ad262f18dfe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6e420598-5a54-4d6e-ab72-7ad262f18dfe', 'x-compute-request-id': 'req-6e420598-5a54-4d6e-ab72-7ad262f18dfe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:58.627 37 INFO tempest.lib.common.rest_client [req-cb349409-66f1-4f83-a45d-e5a0d95aae4c ] Request (VolumesBackupsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480 0.036s 2020-11-06 18:05:58.627 37 DEBUG tempest.lib.common.rest_client [req-cb349409-66f1-4f83-a45d-e5a0d95aae4c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-cb349409-66f1-4f83-a45d-e5a0d95aae4c', 'content-length': '815', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-cb349409-66f1-4f83-a45d-e5a0d95aae4c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480'} Body: b'{"backup": {"id": "67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480", "status": "creating", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-11-06T18:05:56.000000", "updated_at": "2020-11-06T18:05:57.000000", "name": "tempest-VolumesBackupsV3RbacTest-Backup-912808735", "description": null, "fail_reason": null, "volume_id": "d5454f08-c508-485b-be85-b2805017b535", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-11-06T18:05:56.000000"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:59.199 39 INFO tempest.lib.common.rest_client [req-3e77ce50-b1ea-424f-b51b-b0bb6a0d3667 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.210s 2020-11-06 18:05:59.200 39 DEBUG tempest.lib.common.rest_client [req-3e77ce50-b1ea-424f-b51b-b0bb6a0d3667 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3e77ce50-b1ea-424f-b51b-b0bb6a0d3667', 'x-compute-request-id': 'req-3e77ce50-b1ea-424f-b51b-b0bb6a0d3667', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:59.668 37 INFO tempest.lib.common.rest_client [req-aa21b743-e91c-45c1-8bcb-d95dfc1b96f5 ] Request (VolumesBackupsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480 0.030s 2020-11-06 18:05:59.668 37 DEBUG tempest.lib.common.rest_client [req-aa21b743-e91c-45c1-8bcb-d95dfc1b96f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-aa21b743-e91c-45c1-8bcb-d95dfc1b96f5', 'content-length': '816', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-aa21b743-e91c-45c1-8bcb-d95dfc1b96f5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480'} Body: b'{"backup": {"id": "67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480", "status": "available", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-11-06T18:05:56.000000", "updated_at": "2020-11-06T18:05:59.000000", "name": "tempest-VolumesBackupsV3RbacTest-Backup-912808735", "description": null, "fail_reason": null, "volume_id": "d5454f08-c508-485b-be85-b2805017b535", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-11-06T18:05:56.000000"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:59.677 37 INFO tempest.common.waiters [-] backup 67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480 reached available after waiting for 3.677579 seconds 2020-11-06 18:05:59.744 37 INFO tempest.lib.common.rest_client [req-70d19ffd-b07b-4209-9c25-455226a175c4 ] Request (VolumesBackupsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535 0.066s 2020-11-06 18:05:59.745 37 DEBUG tempest.lib.common.rest_client [req-70d19ffd-b07b-4209-9c25-455226a175c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-70d19ffd-b07b-4209-9c25-455226a175c4', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-70d19ffd-b07b-4209-9c25-455226a175c4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535'} Body: b'{"volume": {"id": "d5454f08-c508-485b-be85-b2805017b535", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:05:55.000000", "updated_at": "2020-11-06T18:05:59.000000", "name": "tempest-VolumesBackupsV3RbacTest-Volume-978432898", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535"}], "user_id": "9bdff6dfab034591b5acf2726711414b", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "08ca8e8d43a54acea340e660c49fdd02"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:59.758 37 INFO tempest.common.waiters [-] volume d5454f08-c508-485b-be85-b2805017b535 reached available after waiting for 0.758886 seconds 2020-11-06 18:05:59.759 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:05:59.761 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: backup:create, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:05:59.761 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:05:59.867 37 INFO tempest.lib.common.rest_client [req-f4628acc-019f-4870-80d1-2dcc49cdd292 ] Request (VolumesBackupsV3RbacTest:test_create_backup): 200 GET http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles 0.105s 2020-11-06 18:05:59.868 37 DEBUG tempest.lib.common.rest_client [req-f4628acc-019f-4870-80d1-2dcc49cdd292 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f4628acc-019f-4870-80d1-2dcc49cdd292', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:05:59.905 37 INFO tempest.lib.common.rest_client [req-5a9e43d4-63e4-47d2-bb0d-61a379904914 ] Request (VolumesBackupsV3RbacTest:test_create_backup): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:05:59.906 37 DEBUG tempest.lib.common.rest_client [req-5a9e43d4-63e4-47d2-bb0d-61a379904914 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5a9e43d4-63e4-47d2-bb0d-61a379904914', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9bdff6dfab034591b5acf2726711414b", "name": "tempest-VolumesBackupsV3RbacTest-960704696", "password_expires_at": null}, "audit_ids": ["XGjLZYMiTBS_oc1JwkEWmg"], "expires_at": "2020-11-06T19:05:59.000000Z", "issued_at": "2020-11-06T18:05:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "08ca8e8d43a54acea340e660c49fdd02", "name": "tempest-VolumesBackupsV3RbacTest-960704696"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:00.109 37 INFO tempest.lib.common.rest_client [req-b964f631-3ed7-43dc-8515-990ac7b083e9 ] Request (VolumesBackupsV3RbacTest:test_create_backup): 202 POST http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups 0.203s 2020-11-06 18:06:00.110 37 DEBUG tempest.lib.common.rest_client [req-b964f631-3ed7-43dc-8515-990ac7b083e9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"backup": {"volume_id": "d5454f08-c508-485b-be85-b2805017b535", "name": "tempest-VolumesBackupsV3RbacTest-Backup-2063926050"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:05:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-b964f631-3ed7-43dc-8515-990ac7b083e9', 'content-length': '404', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b964f631-3ed7-43dc-8515-990ac7b083e9', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups'} Body: b'{"backup": {"id": "ab5d0c09-bc39-456d-9c5a-0ddb6dcad2f4", "name": "tempest-VolumesBackupsV3RbacTest-Backup-2063926050", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/ab5d0c09-bc39-456d-9c5a-0ddb6dcad2f4"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/backups/ab5d0c09-bc39-456d-9c5a-0ddb6dcad2f4"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:00.115 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:06:00.162 37 INFO tempest.lib.common.rest_client [req-6cf4ca0b-6759-4f59-a342-aa12768ef7c7 ] Request (VolumesBackupsV3RbacTest:test_create_backup): 200 GET http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles 0.046s 2020-11-06 18:06:00.163 37 DEBUG tempest.lib.common.rest_client [req-6cf4ca0b-6759-4f59-a342-aa12768ef7c7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6cf4ca0b-6759-4f59-a342-aa12768ef7c7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:00.199 37 INFO tempest.lib.common.rest_client [req-35d2a846-2f6e-470a-8833-b8dca6227bf4 ] Request (VolumesBackupsV3RbacTest:test_create_backup): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:06:00.200 37 DEBUG tempest.lib.common.rest_client [req-35d2a846-2f6e-470a-8833-b8dca6227bf4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-35d2a846-2f6e-470a-8833-b8dca6227bf4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9bdff6dfab034591b5acf2726711414b", "name": "tempest-VolumesBackupsV3RbacTest-960704696", "password_expires_at": null}, "audit_ids": ["qG3TPVgdRdy8OetefMgJRw"], "expires_at": "2020-11-06T19:06:00.000000Z", "issued_at": "2020-11-06T18:06:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "08ca8e8d43a54acea340e660c49fdd02", "name": "tempest-VolumesBackupsV3RbacTest-960704696"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:00.290 37 INFO tempest.lib.common.rest_client [req-acfcf337-d10b-4147-bf2f-9d827ae160df ] Request (VolumesBackupsV3RbacTest:test_create_backup): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/ab5d0c09-bc39-456d-9c5a-0ddb6dcad2f4 0.088s 2020-11-06 18:06:00.290 37 DEBUG tempest.lib.common.rest_client [req-acfcf337-d10b-4147-bf2f-9d827ae160df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-acfcf337-d10b-4147-bf2f-9d827ae160df', 'content-length': '811', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-acfcf337-d10b-4147-bf2f-9d827ae160df', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/ab5d0c09-bc39-456d-9c5a-0ddb6dcad2f4'} Body: b'{"backup": {"id": "ab5d0c09-bc39-456d-9c5a-0ddb6dcad2f4", "status": "creating", "size": 1, "object_count": 0, "availability_zone": null, "container": null, "created_at": "2020-11-06T18:06:00.000000", "updated_at": "2020-11-06T18:06:00.000000", "name": "tempest-VolumesBackupsV3RbacTest-Backup-2063926050", "description": null, "fail_reason": null, "volume_id": "d5454f08-c508-485b-be85-b2805017b535", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/ab5d0c09-bc39-456d-9c5a-0ddb6dcad2f4"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/backups/ab5d0c09-bc39-456d-9c5a-0ddb6dcad2f4"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-11-06T18:06:00.000000"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:00.398 39 INFO tempest.lib.common.rest_client [req-7835240e-d708-4950-87ae-260af8005deb ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.184s 2020-11-06 18:06:00.398 39 DEBUG tempest.lib.common.rest_client [req-7835240e-d708-4950-87ae-260af8005deb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7835240e-d708-4950-87ae-260af8005deb', 'x-compute-request-id': 'req-7835240e-d708-4950-87ae-260af8005deb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:01.331 37 INFO tempest.lib.common.rest_client [req-9cd9c26a-932b-4bec-b243-116fda54c729 ] Request (VolumesBackupsV3RbacTest:test_create_backup): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/ab5d0c09-bc39-456d-9c5a-0ddb6dcad2f4 0.032s 2020-11-06 18:06:01.332 37 DEBUG tempest.lib.common.rest_client [req-9cd9c26a-932b-4bec-b243-116fda54c729 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-9cd9c26a-932b-4bec-b243-116fda54c729', 'content-length': '816', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9cd9c26a-932b-4bec-b243-116fda54c729', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/ab5d0c09-bc39-456d-9c5a-0ddb6dcad2f4'} Body: b'{"backup": {"id": "ab5d0c09-bc39-456d-9c5a-0ddb6dcad2f4", "status": "creating", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-11-06T18:06:00.000000", "updated_at": "2020-11-06T18:06:01.000000", "name": "tempest-VolumesBackupsV3RbacTest-Backup-2063926050", "description": null, "fail_reason": null, "volume_id": "d5454f08-c508-485b-be85-b2805017b535", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/ab5d0c09-bc39-456d-9c5a-0ddb6dcad2f4"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/backups/ab5d0c09-bc39-456d-9c5a-0ddb6dcad2f4"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-11-06T18:06:00.000000"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:01.605 39 INFO tempest.lib.common.rest_client [req-cb9b918a-bd33-43b3-92f7-b612fb9a754b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.188s 2020-11-06 18:06:01.606 39 DEBUG tempest.lib.common.rest_client [req-cb9b918a-bd33-43b3-92f7-b612fb9a754b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cb9b918a-bd33-43b3-92f7-b612fb9a754b', 'x-compute-request-id': 'req-cb9b918a-bd33-43b3-92f7-b612fb9a754b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:02.371 37 INFO tempest.lib.common.rest_client [req-2be54278-d280-4bf8-bbd1-25b6e781bb2f ] Request (VolumesBackupsV3RbacTest:test_create_backup): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/ab5d0c09-bc39-456d-9c5a-0ddb6dcad2f4 0.030s 2020-11-06 18:06:02.372 37 DEBUG tempest.lib.common.rest_client [req-2be54278-d280-4bf8-bbd1-25b6e781bb2f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-2be54278-d280-4bf8-bbd1-25b6e781bb2f', 'content-length': '817', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2be54278-d280-4bf8-bbd1-25b6e781bb2f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/ab5d0c09-bc39-456d-9c5a-0ddb6dcad2f4'} Body: b'{"backup": {"id": "ab5d0c09-bc39-456d-9c5a-0ddb6dcad2f4", "status": "available", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-11-06T18:06:00.000000", "updated_at": "2020-11-06T18:06:02.000000", "name": "tempest-VolumesBackupsV3RbacTest-Backup-2063926050", "description": null, "fail_reason": null, "volume_id": "d5454f08-c508-485b-be85-b2805017b535", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/ab5d0c09-bc39-456d-9c5a-0ddb6dcad2f4"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/backups/ab5d0c09-bc39-456d-9c5a-0ddb6dcad2f4"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-11-06T18:06:00.000000"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:02.381 37 INFO tempest.common.waiters [-] backup ab5d0c09-bc39-456d-9c5a-0ddb6dcad2f4 reached available after waiting for 2.381203 seconds 2020-11-06 18:06:02.462 37 INFO tempest.lib.common.rest_client [req-f66c5404-c127-4db9-8bf1-fd7b14f471ba ] Request (VolumesBackupsV3RbacTest:test_create_backup): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535 0.080s 2020-11-06 18:06:02.462 37 DEBUG tempest.lib.common.rest_client [req-f66c5404-c127-4db9-8bf1-fd7b14f471ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-f66c5404-c127-4db9-8bf1-fd7b14f471ba', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f66c5404-c127-4db9-8bf1-fd7b14f471ba', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535'} Body: b'{"volume": {"id": "d5454f08-c508-485b-be85-b2805017b535", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:05:55.000000", "updated_at": "2020-11-06T18:06:02.000000", "name": "tempest-VolumesBackupsV3RbacTest-Volume-978432898", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535"}], "user_id": "9bdff6dfab034591b5acf2726711414b", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "08ca8e8d43a54acea340e660c49fdd02"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:02.477 37 INFO tempest.common.waiters [-] volume d5454f08-c508-485b-be85-b2805017b535 reached available after waiting for 0.477539 seconds 2020-11-06 18:06:02.524 37 INFO tempest.lib.common.rest_client [req-b0e7aa03-5165-4c60-a91f-e891be748e31 ] Request (VolumesBackupsV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/ab5d0c09-bc39-456d-9c5a-0ddb6dcad2f4 0.046s 2020-11-06 18:06:02.524 37 DEBUG tempest.lib.common.rest_client [req-b0e7aa03-5165-4c60-a91f-e891be748e31 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-b0e7aa03-5165-4c60-a91f-e891be748e31', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b0e7aa03-5165-4c60-a91f-e891be748e31', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/ab5d0c09-bc39-456d-9c5a-0ddb6dcad2f4'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:02.526 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:06:02.528 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: backup:delete, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:06:02.662 37 INFO tempest.lib.common.rest_client [req-6ea77e2d-1e6f-4d45-95cd-5a1f8ae5d74e ] Request (VolumesBackupsV3RbacTest:test_delete_backup): 202 POST http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups 0.134s 2020-11-06 18:06:02.663 37 DEBUG tempest.lib.common.rest_client [req-6ea77e2d-1e6f-4d45-95cd-5a1f8ae5d74e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"backup": {"volume_id": "d5454f08-c508-485b-be85-b2805017b535"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6ea77e2d-1e6f-4d45-95cd-5a1f8ae5d74e', 'content-length': '356', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6ea77e2d-1e6f-4d45-95cd-5a1f8ae5d74e', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups'} Body: b'{"backup": {"id": "4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a", "name": null, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/backups/4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:02.693 37 INFO tempest.lib.common.rest_client [req-c46b327d-5dd2-41a7-80a2-5d9e70cda261 ] Request (VolumesBackupsV3RbacTest:test_delete_backup): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a 0.026s 2020-11-06 18:06:02.694 37 DEBUG tempest.lib.common.rest_client [req-c46b327d-5dd2-41a7-80a2-5d9e70cda261 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c46b327d-5dd2-41a7-80a2-5d9e70cda261', 'content-length': '763', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c46b327d-5dd2-41a7-80a2-5d9e70cda261', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a'} Body: b'{"backup": {"id": "4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a", "status": "creating", "size": 1, "object_count": 0, "availability_zone": null, "container": null, "created_at": "2020-11-06T18:06:03.000000", "updated_at": "2020-11-06T18:06:03.000000", "name": null, "description": null, "fail_reason": null, "volume_id": "d5454f08-c508-485b-be85-b2805017b535", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/backups/4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-11-06T18:06:03.000000"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:02.805 39 INFO tempest.lib.common.rest_client [req-21422992-89f4-4791-85b3-14e09bf49dc9 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.185s 2020-11-06 18:06:02.806 39 DEBUG tempest.lib.common.rest_client [req-21422992-89f4-4791-85b3-14e09bf49dc9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-21422992-89f4-4791-85b3-14e09bf49dc9', 'x-compute-request-id': 'req-21422992-89f4-4791-85b3-14e09bf49dc9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:03.735 37 INFO tempest.lib.common.rest_client [req-aca10663-751a-4353-b71d-84f992996cb6 ] Request (VolumesBackupsV3RbacTest:test_delete_backup): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a 0.031s 2020-11-06 18:06:03.735 37 DEBUG tempest.lib.common.rest_client [req-aca10663-751a-4353-b71d-84f992996cb6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-aca10663-751a-4353-b71d-84f992996cb6', 'content-length': '768', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-aca10663-751a-4353-b71d-84f992996cb6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a'} Body: b'{"backup": {"id": "4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a", "status": "creating", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-11-06T18:06:03.000000", "updated_at": "2020-11-06T18:06:03.000000", "name": null, "description": null, "fail_reason": null, "volume_id": "d5454f08-c508-485b-be85-b2805017b535", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/backups/4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-11-06T18:06:03.000000"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:03.976 39 INFO tempest.lib.common.rest_client [req-a2d41060-85ff-4969-ab22-a7ad918e09b9 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.154s 2020-11-06 18:06:03.977 39 DEBUG tempest.lib.common.rest_client [req-a2d41060-85ff-4969-ab22-a7ad918e09b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a2d41060-85ff-4969-ab22-a7ad918e09b9', 'x-compute-request-id': 'req-a2d41060-85ff-4969-ab22-a7ad918e09b9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:04.774 37 INFO tempest.lib.common.rest_client [req-30385f14-9e52-4e3f-b404-16c45feb405d ] Request (VolumesBackupsV3RbacTest:test_delete_backup): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a 0.031s 2020-11-06 18:06:04.775 37 DEBUG tempest.lib.common.rest_client [req-30385f14-9e52-4e3f-b404-16c45feb405d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-30385f14-9e52-4e3f-b404-16c45feb405d', 'content-length': '768', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-30385f14-9e52-4e3f-b404-16c45feb405d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a'} Body: b'{"backup": {"id": "4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a", "status": "creating", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-11-06T18:06:03.000000", "updated_at": "2020-11-06T18:06:03.000000", "name": null, "description": null, "fail_reason": null, "volume_id": "d5454f08-c508-485b-be85-b2805017b535", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/backups/4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-11-06T18:06:03.000000"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:05.174 39 INFO tempest.lib.common.rest_client [req-13796840-5803-45d6-b96b-4acdef7d8412 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.181s 2020-11-06 18:06:05.175 39 DEBUG tempest.lib.common.rest_client [req-13796840-5803-45d6-b96b-4acdef7d8412 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-13796840-5803-45d6-b96b-4acdef7d8412', 'x-compute-request-id': 'req-13796840-5803-45d6-b96b-4acdef7d8412', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:05.816 37 INFO tempest.lib.common.rest_client [req-5871ac57-d757-4254-9f9e-bf20880a45b3 ] Request (VolumesBackupsV3RbacTest:test_delete_backup): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a 0.032s 2020-11-06 18:06:05.817 37 DEBUG tempest.lib.common.rest_client [req-5871ac57-d757-4254-9f9e-bf20880a45b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-5871ac57-d757-4254-9f9e-bf20880a45b3', 'content-length': '769', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5871ac57-d757-4254-9f9e-bf20880a45b3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a'} Body: b'{"backup": {"id": "4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a", "status": "available", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-11-06T18:06:03.000000", "updated_at": "2020-11-06T18:06:05.000000", "name": null, "description": null, "fail_reason": null, "volume_id": "d5454f08-c508-485b-be85-b2805017b535", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/backups/4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-11-06T18:06:03.000000"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:05.825 37 INFO tempest.common.waiters [-] backup 4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a reached available after waiting for 3.825813 seconds 2020-11-06 18:06:05.915 37 INFO tempest.lib.common.rest_client [req-c4cc25b4-c745-437a-b8e2-6d2fe1b63c45 ] Request (VolumesBackupsV3RbacTest:test_delete_backup): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535 0.089s 2020-11-06 18:06:05.915 37 DEBUG tempest.lib.common.rest_client [req-c4cc25b4-c745-437a-b8e2-6d2fe1b63c45 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c4cc25b4-c745-437a-b8e2-6d2fe1b63c45', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c4cc25b4-c745-437a-b8e2-6d2fe1b63c45', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535'} Body: b'{"volume": {"id": "d5454f08-c508-485b-be85-b2805017b535", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:05:55.000000", "updated_at": "2020-11-06T18:06:05.000000", "name": "tempest-VolumesBackupsV3RbacTest-Volume-978432898", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535"}], "user_id": "9bdff6dfab034591b5acf2726711414b", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "08ca8e8d43a54acea340e660c49fdd02"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:05.925 37 INFO tempest.common.waiters [-] volume d5454f08-c508-485b-be85-b2805017b535 reached available after waiting for 0.925349 seconds 2020-11-06 18:06:05.925 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:06:05.982 37 INFO tempest.lib.common.rest_client [req-c6eab9bf-3cf8-41fc-b69e-877d9947e434 ] Request (VolumesBackupsV3RbacTest:test_delete_backup): 200 GET http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles 0.056s 2020-11-06 18:06:05.982 37 DEBUG tempest.lib.common.rest_client [req-c6eab9bf-3cf8-41fc-b69e-877d9947e434 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c6eab9bf-3cf8-41fc-b69e-877d9947e434', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:06.024 37 INFO tempest.lib.common.rest_client [req-44b328b8-875d-4a1b-bcd1-9a58549cae6a ] Request (VolumesBackupsV3RbacTest:test_delete_backup): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-11-06 18:06:06.025 37 DEBUG tempest.lib.common.rest_client [req-44b328b8-875d-4a1b-bcd1-9a58549cae6a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-44b328b8-875d-4a1b-bcd1-9a58549cae6a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9bdff6dfab034591b5acf2726711414b", "name": "tempest-VolumesBackupsV3RbacTest-960704696", "password_expires_at": null}, "audit_ids": ["vxbPqZ9YRi2THGJaeWFP7g"], "expires_at": "2020-11-06T19:06:06.000000Z", "issued_at": "2020-11-06T18:06:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "08ca8e8d43a54acea340e660c49fdd02", "name": "tempest-VolumesBackupsV3RbacTest-960704696"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:06.157 37 INFO tempest.lib.common.rest_client [req-78f198d7-0633-45c3-a9c1-cb7c07652f8a ] Request (VolumesBackupsV3RbacTest:test_delete_backup): 202 DELETE http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a 0.130s 2020-11-06 18:06:06.158 37 DEBUG tempest.lib.common.rest_client [req-78f198d7-0633-45c3-a9c1-cb7c07652f8a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-78f198d7-0633-45c3-a9c1-cb7c07652f8a', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-78f198d7-0633-45c3-a9c1-cb7c07652f8a', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:06.158 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:06:06.216 37 INFO tempest.lib.common.rest_client [req-84381543-5917-4bbf-a5f8-cf643b0d3619 ] Request (VolumesBackupsV3RbacTest:test_delete_backup): 200 GET http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles 0.056s 2020-11-06 18:06:06.216 37 DEBUG tempest.lib.common.rest_client [req-84381543-5917-4bbf-a5f8-cf643b0d3619 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-84381543-5917-4bbf-a5f8-cf643b0d3619', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:06.255 37 INFO tempest.lib.common.rest_client [req-c57d5987-499f-4c5e-a202-5305154b932a ] Request (VolumesBackupsV3RbacTest:test_delete_backup): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:06:06.256 37 DEBUG tempest.lib.common.rest_client [req-c57d5987-499f-4c5e-a202-5305154b932a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c57d5987-499f-4c5e-a202-5305154b932a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9bdff6dfab034591b5acf2726711414b", "name": "tempest-VolumesBackupsV3RbacTest-960704696", "password_expires_at": null}, "audit_ids": ["zmTDQ9ckTIC0EnLdBziZiw"], "expires_at": "2020-11-06T19:06:06.000000Z", "issued_at": "2020-11-06T18:06:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "08ca8e8d43a54acea340e660c49fdd02", "name": "tempest-VolumesBackupsV3RbacTest-960704696"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:06.345 37 INFO tempest.lib.common.rest_client [req-d9c51009-7278-4941-ab88-ef185173b051 ] Request (VolumesBackupsV3RbacTest:test_delete_backup): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a 0.088s 2020-11-06 18:06:06.346 37 DEBUG tempest.lib.common.rest_client [req-d9c51009-7278-4941-ab88-ef185173b051 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d9c51009-7278-4941-ab88-ef185173b051', 'content-length': '768', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d9c51009-7278-4941-ab88-ef185173b051', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a'} Body: b'{"backup": {"id": "4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a", "status": "deleting", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-11-06T18:06:03.000000", "updated_at": "2020-11-06T18:06:06.000000", "name": null, "description": null, "fail_reason": null, "volume_id": "d5454f08-c508-485b-be85-b2805017b535", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/backups/4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-11-06T18:06:03.000000"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:06.441 39 INFO tempest.lib.common.rest_client [req-3d181c8d-b060-4372-a0ad-e1cdeeac4579 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.249s 2020-11-06 18:06:06.442 39 DEBUG tempest.lib.common.rest_client [req-3d181c8d-b060-4372-a0ad-e1cdeeac4579 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3d181c8d-b060-4372-a0ad-e1cdeeac4579', 'x-compute-request-id': 'req-3d181c8d-b060-4372-a0ad-e1cdeeac4579', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:07.390 37 INFO tempest.lib.common.rest_client [req-9b883e54-a507-4123-903f-06d4b8ce8796 ] Request (VolumesBackupsV3RbacTest:test_delete_backup): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a 0.034s 2020-11-06 18:06:07.390 37 DEBUG tempest.lib.common.rest_client [req-9b883e54-a507-4123-903f-06d4b8ce8796 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-9b883e54-a507-4123-903f-06d4b8ce8796', 'content-length': '768', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9b883e54-a507-4123-903f-06d4b8ce8796', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a'} Body: b'{"backup": {"id": "4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a", "status": "deleting", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-11-06T18:06:03.000000", "updated_at": "2020-11-06T18:06:06.000000", "name": null, "description": null, "fail_reason": null, "volume_id": "d5454f08-c508-485b-be85-b2805017b535", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/backups/4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-11-06T18:06:03.000000"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:07.668 39 INFO tempest.lib.common.rest_client [req-bed83698-d22e-4b57-a312-94c3fd219887 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.209s 2020-11-06 18:06:07.668 39 DEBUG tempest.lib.common.rest_client [req-bed83698-d22e-4b57-a312-94c3fd219887 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bed83698-d22e-4b57-a312-94c3fd219887', 'x-compute-request-id': 'req-bed83698-d22e-4b57-a312-94c3fd219887', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:08.432 37 INFO tempest.lib.common.rest_client [req-822b9ec3-e3a2-4483-a3e9-dc1d66cbfcd7 ] Request (VolumesBackupsV3RbacTest:test_delete_backup): 404 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a 0.033s 2020-11-06 18:06:08.433 37 DEBUG tempest.lib.common.rest_client [req-822b9ec3-e3a2-4483-a3e9-dc1d66cbfcd7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-822b9ec3-e3a2-4483-a3e9-dc1d66cbfcd7', 'x-openstack-request-id': 'req-822b9ec3-e3a2-4483-a3e9-dc1d66cbfcd7', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a'} Body: b'{"itemNotFound": {"code": 404, "message": "Backup 4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:08.469 37 INFO tempest.lib.common.rest_client [req-1ae6aeb7-2eb9-4b11-a857-16017abb90ac ] Request (VolumesBackupsV3RbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a 0.034s 2020-11-06 18:06:08.469 37 DEBUG tempest.lib.common.rest_client [req-1ae6aeb7-2eb9-4b11-a857-16017abb90ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-1ae6aeb7-2eb9-4b11-a857-16017abb90ac', 'x-openstack-request-id': 'req-1ae6aeb7-2eb9-4b11-a857-16017abb90ac', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a'} Body: b'{"itemNotFound": {"code": 404, "message": "Backup 4c0f0b55-e0bc-4ba5-8106-9d4d01c95c4a could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:08.471 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:06:08.474 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: backup:export-import, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:06:08.474 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:06:08.534 37 INFO tempest.lib.common.rest_client [req-5e4bb909-5584-41a0-9288-0a35fe99d0dd ] Request (VolumesBackupsV3RbacTest:test_export_backup): 200 GET http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles 0.059s 2020-11-06 18:06:08.534 37 DEBUG tempest.lib.common.rest_client [req-5e4bb909-5584-41a0-9288-0a35fe99d0dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5e4bb909-5584-41a0-9288-0a35fe99d0dd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:08.574 37 INFO tempest.lib.common.rest_client [req-3c0b2c02-83a9-406a-b533-0fd54944aa95 ] Request (VolumesBackupsV3RbacTest:test_export_backup): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:06:08.575 37 DEBUG tempest.lib.common.rest_client [req-3c0b2c02-83a9-406a-b533-0fd54944aa95 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3c0b2c02-83a9-406a-b533-0fd54944aa95', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9bdff6dfab034591b5acf2726711414b", "name": "tempest-VolumesBackupsV3RbacTest-960704696", "password_expires_at": null}, "audit_ids": ["Oj0xVyzVTAqVzz_etlK8Fw"], "expires_at": "2020-11-06T19:06:08.000000Z", "issued_at": "2020-11-06T18:06:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "08ca8e8d43a54acea340e660c49fdd02", "name": "tempest-VolumesBackupsV3RbacTest-960704696"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:08.705 37 INFO tempest.lib.common.rest_client [req-7869b412-08b8-4734-9291-6c12b514c874 ] Request (VolumesBackupsV3RbacTest:test_export_backup): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480/export_record 0.129s 2020-11-06 18:06:08.706 37 DEBUG tempest.lib.common.rest_client [req-7869b412-08b8-4734-9291-6c12b514c874 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-7869b412-08b8-4734-9291-6c12b514c874', 'content-length': '1422', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7869b412-08b8-4734-9291-6c12b514c874', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480/export_record'} Body: b'{"backup-record": {"backup_service": "cinder.backup.drivers.ceph.CephBackupDriver", "backup_url": "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"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:08.709 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:06:08.769 37 INFO tempest.lib.common.rest_client [req-289dceeb-2f99-4327-9902-74d329b15751 ] Request (VolumesBackupsV3RbacTest:test_export_backup): 200 GET http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles 0.059s 2020-11-06 18:06:08.769 37 DEBUG tempest.lib.common.rest_client [req-289dceeb-2f99-4327-9902-74d329b15751 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-289dceeb-2f99-4327-9902-74d329b15751', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:08.802 37 INFO tempest.lib.common.rest_client [req-4c2f9c59-22f4-4729-a8d0-673c2ab48fd5 ] Request (VolumesBackupsV3RbacTest:test_export_backup): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:06:08.802 37 DEBUG tempest.lib.common.rest_client [req-4c2f9c59-22f4-4729-a8d0-673c2ab48fd5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4c2f9c59-22f4-4729-a8d0-673c2ab48fd5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9bdff6dfab034591b5acf2726711414b", "name": "tempest-VolumesBackupsV3RbacTest-960704696", "password_expires_at": null}, "audit_ids": ["69Ocfv1hQ7uZM3w12AXgtg"], "expires_at": "2020-11-06T19:06:08.000000Z", "issued_at": "2020-11-06T18:06:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "08ca8e8d43a54acea340e660c49fdd02", "name": "tempest-VolumesBackupsV3RbacTest-960704696"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:08.805 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:06:08.808 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: backup:backup-import, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:06:08.906 37 INFO tempest.lib.common.rest_client [req-276c8d49-d3bd-4add-9d18-ef2905035c20 ] Request (VolumesBackupsV3RbacTest:test_import_backup): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480/export_record 0.097s 2020-11-06 18:06:08.907 37 DEBUG tempest.lib.common.rest_client [req-276c8d49-d3bd-4add-9d18-ef2905035c20 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-276c8d49-d3bd-4add-9d18-ef2905035c20', 'content-length': '1422', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-276c8d49-d3bd-4add-9d18-ef2905035c20', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480/export_record'} Body: b'{"backup-record": {"backup_service": "cinder.backup.drivers.ceph.CephBackupDriver", "backup_url": "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"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:08.910 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:06:08.954 37 INFO tempest.lib.common.rest_client [req-61389bfc-a01d-45ac-8828-2f8547f49d86 ] Request (VolumesBackupsV3RbacTest:test_import_backup): 200 GET http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles 0.043s 2020-11-06 18:06:08.955 37 DEBUG tempest.lib.common.rest_client [req-61389bfc-a01d-45ac-8828-2f8547f49d86 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-61389bfc-a01d-45ac-8828-2f8547f49d86', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:08.993 37 INFO tempest.lib.common.rest_client [req-11254d6b-37b7-4f74-a4ac-97c4554b28bc ] Request (VolumesBackupsV3RbacTest:test_import_backup): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:06:08.993 37 DEBUG tempest.lib.common.rest_client [req-11254d6b-37b7-4f74-a4ac-97c4554b28bc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-11254d6b-37b7-4f74-a4ac-97c4554b28bc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9bdff6dfab034591b5acf2726711414b", "name": "tempest-VolumesBackupsV3RbacTest-960704696", "password_expires_at": null}, "audit_ids": ["l1bLFdtdTqq_6B6yTuly3A"], "expires_at": "2020-11-06T19:06:08.000000Z", "issued_at": "2020-11-06T18:06:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "08ca8e8d43a54acea340e660c49fdd02", "name": "tempest-VolumesBackupsV3RbacTest-960704696"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:09.000 39 INFO tempest.lib.common.rest_client [req-132f385e-cf88-4568-9449-2dde85e27014 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.318s 2020-11-06 18:06:09.001 39 DEBUG tempest.lib.common.rest_client [req-132f385e-cf88-4568-9449-2dde85e27014 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-132f385e-cf88-4568-9449-2dde85e27014', 'x-compute-request-id': 'req-132f385e-cf88-4568-9449-2dde85e27014', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:01:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:09.150 37 INFO tempest.lib.common.rest_client [req-2319ef49-7eec-43c4-b405-bb02f5d95099 ] Request (VolumesBackupsV3RbacTest:test_import_backup): 201 POST http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/import_record 0.155s 2020-11-06 18:06:09.150 37 DEBUG tempest.lib.common.rest_client [req-2319ef49-7eec-43c4-b405-bb02f5d95099 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"backup-record": {"backup_service": "cinder.backup.drivers.ceph.CephBackupDriver", "backup_url": "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"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-2319ef49-7eec-43c4-b405-bb02f5d95099', 'content-length': '356', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2319ef49-7eec-43c4-b405-bb02f5d95099', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/import_record'} Body: b'{"backup": {"id": "02535ccc-9317-4456-a8aa-56e3154b8d3c", "name": null, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/02535ccc-9317-4456-a8aa-56e3154b8d3c"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/backups/02535ccc-9317-4456-a8aa-56e3154b8d3c"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:09.155 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:06:09.202 37 INFO tempest.lib.common.rest_client [req-cf234253-364d-434f-86a2-f9174c8a5bb7 ] Request (VolumesBackupsV3RbacTest:test_import_backup): 200 GET http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles 0.046s 2020-11-06 18:06:09.203 37 DEBUG tempest.lib.common.rest_client [req-cf234253-364d-434f-86a2-f9174c8a5bb7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cf234253-364d-434f-86a2-f9174c8a5bb7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:09.237 37 INFO tempest.lib.common.rest_client [req-c2840365-a28f-4917-a947-8918c780132a ] Request (VolumesBackupsV3RbacTest:test_import_backup): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:06:09.237 37 DEBUG tempest.lib.common.rest_client [req-c2840365-a28f-4917-a947-8918c780132a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c2840365-a28f-4917-a947-8918c780132a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9bdff6dfab034591b5acf2726711414b", "name": "tempest-VolumesBackupsV3RbacTest-960704696", "password_expires_at": null}, "audit_ids": ["EqV3ht68RgGjMj6ydjKP4w"], "expires_at": "2020-11-06T19:06:09.000000Z", "issued_at": "2020-11-06T18:06:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "08ca8e8d43a54acea340e660c49fdd02", "name": "tempest-VolumesBackupsV3RbacTest-960704696"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:09.322 37 INFO tempest.lib.common.rest_client [req-bf5fe20a-634a-4e02-b83d-cbc221886015 ] Request (VolumesBackupsV3RbacTest:test_import_backup): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/02535ccc-9317-4456-a8aa-56e3154b8d3c 0.084s 2020-11-06 18:06:09.323 37 DEBUG tempest.lib.common.rest_client [req-bf5fe20a-634a-4e02-b83d-cbc221886015 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-bf5fe20a-634a-4e02-b83d-cbc221886015', 'content-length': '818', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-bf5fe20a-634a-4e02-b83d-cbc221886015', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/02535ccc-9317-4456-a8aa-56e3154b8d3c'} Body: b'{"backup": {"id": "02535ccc-9317-4456-a8aa-56e3154b8d3c", "status": "available", "size": 1, "object_count": 0, "availability_zone": "nova", "container": "backups", "created_at": "2020-11-06T18:05:56.000000", "updated_at": "2020-11-06T18:06:09.000000", "name": "tempest-VolumesBackupsV3RbacTest-Backup-912808735", "description": null, "fail_reason": null, "volume_id": "d5454f08-c508-485b-be85-b2805017b535", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/02535ccc-9317-4456-a8aa-56e3154b8d3c"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/backups/02535ccc-9317-4456-a8aa-56e3154b8d3c"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-11-06T18:05:56.000000"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:09.334 37 INFO tempest.common.waiters [-] backup 02535ccc-9317-4456-a8aa-56e3154b8d3c reached available after waiting for 0.334347 seconds 2020-11-06 18:06:09.385 37 INFO tempest.lib.common.rest_client [req-58b93347-2479-4e77-b4e9-979e6d133f69 ] Request (VolumesBackupsV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/02535ccc-9317-4456-a8aa-56e3154b8d3c 0.050s 2020-11-06 18:06:09.386 37 DEBUG tempest.lib.common.rest_client [req-58b93347-2479-4e77-b4e9-979e6d133f69 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-58b93347-2479-4e77-b4e9-979e6d133f69', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-58b93347-2479-4e77-b4e9-979e6d133f69', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/02535ccc-9317-4456-a8aa-56e3154b8d3c'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:09.389 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:06:09.393 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: backup:get_all, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:06:09.394 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:06:09.450 37 INFO tempest.lib.common.rest_client [req-8df4e285-6361-402f-aa4c-e34bb4ecdaf3 ] Request (VolumesBackupsV3RbacTest:test_list_backups): 200 GET http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles 0.055s 2020-11-06 18:06:09.450 37 DEBUG tempest.lib.common.rest_client [req-8df4e285-6361-402f-aa4c-e34bb4ecdaf3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8df4e285-6361-402f-aa4c-e34bb4ecdaf3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:09.489 37 INFO tempest.lib.common.rest_client [req-29624f4b-1c81-45dc-bf20-319bab21c2b8 ] Request (VolumesBackupsV3RbacTest:test_list_backups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:06:09.490 37 DEBUG tempest.lib.common.rest_client [req-29624f4b-1c81-45dc-bf20-319bab21c2b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-29624f4b-1c81-45dc-bf20-319bab21c2b8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9bdff6dfab034591b5acf2726711414b", "name": "tempest-VolumesBackupsV3RbacTest-960704696", "password_expires_at": null}, "audit_ids": ["k3mWD--MTkGzYrOyUrzReQ"], "expires_at": "2020-11-06T19:06:09.000000Z", "issued_at": "2020-11-06T18:06:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "08ca8e8d43a54acea340e660c49fdd02", "name": "tempest-VolumesBackupsV3RbacTest-960704696"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:09.580 37 INFO tempest.lib.common.rest_client [req-2b9ff33e-25e9-4961-9022-4577c43ae1ae ] Request (VolumesBackupsV3RbacTest:test_list_backups): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups 0.089s 2020-11-06 18:06:09.581 37 DEBUG tempest.lib.common.rest_client [req-2b9ff33e-25e9-4961-9022-4577c43ae1ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-2b9ff33e-25e9-4961-9022-4577c43ae1ae', 'content-length': '406', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2b9ff33e-25e9-4961-9022-4577c43ae1ae', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups'} Body: b'{"backups": [{"id": "67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480", "name": "tempest-VolumesBackupsV3RbacTest-Backup-912808735", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480"}]}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:09.586 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:06:09.646 37 INFO tempest.lib.common.rest_client [req-f4c29c6d-2d04-4a56-9ddc-eafa4fc94e3f ] Request (VolumesBackupsV3RbacTest:test_list_backups): 200 GET http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles 0.058s 2020-11-06 18:06:09.646 37 DEBUG tempest.lib.common.rest_client [req-f4c29c6d-2d04-4a56-9ddc-eafa4fc94e3f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f4c29c6d-2d04-4a56-9ddc-eafa4fc94e3f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:09.679 37 INFO tempest.lib.common.rest_client [req-2fd537f1-79cc-49ae-b814-afb4444334c8 ] Request (VolumesBackupsV3RbacTest:test_list_backups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:06:09.679 37 DEBUG tempest.lib.common.rest_client [req-2fd537f1-79cc-49ae-b814-afb4444334c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2fd537f1-79cc-49ae-b814-afb4444334c8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9bdff6dfab034591b5acf2726711414b", "name": "tempest-VolumesBackupsV3RbacTest-960704696", "password_expires_at": null}, "audit_ids": ["OcaHbJK_QKy5Lz57hjfrZg"], "expires_at": "2020-11-06T19:06:09.000000Z", "issued_at": "2020-11-06T18:06:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "08ca8e8d43a54acea340e660c49fdd02", "name": "tempest-VolumesBackupsV3RbacTest-960704696"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:09.682 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:06:09.685 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: backup:get_all, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:06:09.685 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:06:09.740 37 INFO tempest.lib.common.rest_client [req-237aa480-737a-4aee-80e2-e5b1cf2ea1e1 ] Request (VolumesBackupsV3RbacTest:test_list_backups_with_details): 200 GET http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles 0.055s 2020-11-06 18:06:09.741 37 DEBUG tempest.lib.common.rest_client [req-237aa480-737a-4aee-80e2-e5b1cf2ea1e1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-237aa480-737a-4aee-80e2-e5b1cf2ea1e1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:09.781 37 INFO tempest.lib.common.rest_client [req-1869a5f7-e7cc-4a5a-89dc-539bc8234029 ] Request (VolumesBackupsV3RbacTest:test_list_backups_with_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:06:09.782 37 DEBUG tempest.lib.common.rest_client [req-1869a5f7-e7cc-4a5a-89dc-539bc8234029 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1869a5f7-e7cc-4a5a-89dc-539bc8234029', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9bdff6dfab034591b5acf2726711414b", "name": "tempest-VolumesBackupsV3RbacTest-960704696", "password_expires_at": null}, "audit_ids": ["u8_LopU-RLmguR2toeuvYA"], "expires_at": "2020-11-06T19:06:09.000000Z", "issued_at": "2020-11-06T18:06:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "08ca8e8d43a54acea340e660c49fdd02", "name": "tempest-VolumesBackupsV3RbacTest-960704696"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:09.873 37 INFO tempest.lib.common.rest_client [req-9e728dd4-40b2-4cf2-961a-24195afeca30 ] Request (VolumesBackupsV3RbacTest:test_list_backups_with_details): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/detail 0.090s 2020-11-06 18:06:09.874 37 DEBUG tempest.lib.common.rest_client [req-9e728dd4-40b2-4cf2-961a-24195afeca30 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-9e728dd4-40b2-4cf2-961a-24195afeca30', 'content-length': '819', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9e728dd4-40b2-4cf2-961a-24195afeca30', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/detail'} Body: b'{"backups": [{"id": "67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480", "status": "available", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-11-06T18:05:56.000000", "updated_at": "2020-11-06T18:06:09.000000", "name": "tempest-VolumesBackupsV3RbacTest-Backup-912808735", "description": null, "fail_reason": null, "volume_id": "d5454f08-c508-485b-be85-b2805017b535", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-11-06T18:05:56.000000"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:09.883 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:06:09.931 37 INFO tempest.lib.common.rest_client [req-053138cf-c78b-48c4-afc2-8e850ce774df ] Request (VolumesBackupsV3RbacTest:test_list_backups_with_details): 200 GET http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles 0.047s 2020-11-06 18:06:09.932 37 DEBUG tempest.lib.common.rest_client [req-053138cf-c78b-48c4-afc2-8e850ce774df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-053138cf-c78b-48c4-afc2-8e850ce774df', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:09.974 37 INFO tempest.lib.common.rest_client [req-0ddc4054-dc12-4db5-a2c7-fb7369d9be0a ] Request (VolumesBackupsV3RbacTest:test_list_backups_with_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-11-06 18:06:09.975 37 DEBUG tempest.lib.common.rest_client [req-0ddc4054-dc12-4db5-a2c7-fb7369d9be0a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0ddc4054-dc12-4db5-a2c7-fb7369d9be0a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9bdff6dfab034591b5acf2726711414b", "name": "tempest-VolumesBackupsV3RbacTest-960704696", "password_expires_at": null}, "audit_ids": ["iJOK5QP3TUO1PVcZCQJ7xg"], "expires_at": "2020-11-06T19:06:09.000000Z", "issued_at": "2020-11-06T18:06:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "08ca8e8d43a54acea340e660c49fdd02", "name": "tempest-VolumesBackupsV3RbacTest-960704696"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:09.977 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:06:09.981 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:backup_admin_actions:reset_status, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:06:10.161 37 INFO tempest.lib.common.rest_client [req-170681c2-5233-4c3d-9d43-adbe53cb3f2a ] Request (VolumesBackupsV3RbacTest:test_reset_backup_status): 202 POST http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups 0.179s 2020-11-06 18:06:10.162 37 DEBUG tempest.lib.common.rest_client [req-170681c2-5233-4c3d-9d43-adbe53cb3f2a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"backup": {"volume_id": "d5454f08-c508-485b-be85-b2805017b535", "name": "tempest-VolumesBackupsV3RbacTest-Backup-1640099203"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-170681c2-5233-4c3d-9d43-adbe53cb3f2a', 'content-length': '404', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-170681c2-5233-4c3d-9d43-adbe53cb3f2a', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups'} Body: b'{"backup": {"id": "f5abedf0-98fe-4615-b54e-3b06a988096b", "name": "tempest-VolumesBackupsV3RbacTest-Backup-1640099203", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/f5abedf0-98fe-4615-b54e-3b06a988096b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/backups/f5abedf0-98fe-4615-b54e-3b06a988096b"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:10.197 37 INFO tempest.lib.common.rest_client [req-4e559f12-f6e5-463a-8e47-d96f23dbfaa0 ] Request (VolumesBackupsV3RbacTest:test_reset_backup_status): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/f5abedf0-98fe-4615-b54e-3b06a988096b 0.030s 2020-11-06 18:06:10.198 37 DEBUG tempest.lib.common.rest_client [req-4e559f12-f6e5-463a-8e47-d96f23dbfaa0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4e559f12-f6e5-463a-8e47-d96f23dbfaa0', 'content-length': '811', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4e559f12-f6e5-463a-8e47-d96f23dbfaa0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/f5abedf0-98fe-4615-b54e-3b06a988096b'} Body: b'{"backup": {"id": "f5abedf0-98fe-4615-b54e-3b06a988096b", "status": "creating", "size": 1, "object_count": 0, "availability_zone": null, "container": null, "created_at": "2020-11-06T18:06:10.000000", "updated_at": "2020-11-06T18:06:10.000000", "name": "tempest-VolumesBackupsV3RbacTest-Backup-1640099203", "description": null, "fail_reason": null, "volume_id": "d5454f08-c508-485b-be85-b2805017b535", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/f5abedf0-98fe-4615-b54e-3b06a988096b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/backups/f5abedf0-98fe-4615-b54e-3b06a988096b"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-11-06T18:06:10.000000"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:11.236 37 INFO tempest.lib.common.rest_client [req-c61f5bcf-11ef-4885-b73f-484fb9d752e4 ] Request (VolumesBackupsV3RbacTest:test_reset_backup_status): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/f5abedf0-98fe-4615-b54e-3b06a988096b 0.029s 2020-11-06 18:06:11.237 37 DEBUG tempest.lib.common.rest_client [req-c61f5bcf-11ef-4885-b73f-484fb9d752e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c61f5bcf-11ef-4885-b73f-484fb9d752e4', 'content-length': '816', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c61f5bcf-11ef-4885-b73f-484fb9d752e4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/f5abedf0-98fe-4615-b54e-3b06a988096b'} Body: b'{"backup": {"id": "f5abedf0-98fe-4615-b54e-3b06a988096b", "status": "creating", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-11-06T18:06:10.000000", "updated_at": "2020-11-06T18:06:11.000000", "name": "tempest-VolumesBackupsV3RbacTest-Backup-1640099203", "description": null, "fail_reason": null, "volume_id": "d5454f08-c508-485b-be85-b2805017b535", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/f5abedf0-98fe-4615-b54e-3b06a988096b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/backups/f5abedf0-98fe-4615-b54e-3b06a988096b"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-11-06T18:06:10.000000"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:11.977 39 INFO tempest.lib.common.rest_client [req-f2cace87-d964-422e-9534-a20769ab7bd5 ] Request (ServerActionsRbacTest:setUp): 204 DELETE http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 2.964s 2020-11-06 18:06:11.978 39 DEBUG tempest.lib.common.rest_client [req-f2cace87-d964-422e-9534-a20769ab7bd5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f2cace87-d964-422e-9534-a20769ab7bd5', 'x-compute-request-id': 'req-f2cace87-d964-422e-9534-a20769ab7bd5', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:12.161 39 INFO tempest.lib.common.rest_client [req-6e6b5560-5fa3-4b12-a539-e406a6d09446 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.182s 2020-11-06 18:06:12.161 39 DEBUG tempest.lib.common.rest_client [req-6e6b5560-5fa3-4b12-a539-e406a6d09446 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6e6b5560-5fa3-4b12-a539-e406a6d09446', 'x-compute-request-id': 'req-6e6b5560-5fa3-4b12-a539-e406a6d09446', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:06:12Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:12.275 37 INFO tempest.lib.common.rest_client [req-53a1e447-469b-45e8-929c-66ebf0321d8e ] Request (VolumesBackupsV3RbacTest:test_reset_backup_status): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/f5abedf0-98fe-4615-b54e-3b06a988096b 0.027s 2020-11-06 18:06:12.275 37 DEBUG tempest.lib.common.rest_client [req-53a1e447-469b-45e8-929c-66ebf0321d8e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-53a1e447-469b-45e8-929c-66ebf0321d8e', 'content-length': '817', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-53a1e447-469b-45e8-929c-66ebf0321d8e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/f5abedf0-98fe-4615-b54e-3b06a988096b'} Body: b'{"backup": {"id": "f5abedf0-98fe-4615-b54e-3b06a988096b", "status": "available", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-11-06T18:06:10.000000", "updated_at": "2020-11-06T18:06:12.000000", "name": "tempest-VolumesBackupsV3RbacTest-Backup-1640099203", "description": null, "fail_reason": null, "volume_id": "d5454f08-c508-485b-be85-b2805017b535", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/f5abedf0-98fe-4615-b54e-3b06a988096b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/backups/f5abedf0-98fe-4615-b54e-3b06a988096b"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-11-06T18:06:10.000000"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:12.283 37 INFO tempest.common.waiters [-] backup f5abedf0-98fe-4615-b54e-3b06a988096b reached available after waiting for 2.283645 seconds 2020-11-06 18:06:12.384 37 INFO tempest.lib.common.rest_client [req-a2a83229-0616-4f0e-80d5-058912a81a9c ] Request (VolumesBackupsV3RbacTest:test_reset_backup_status): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535 0.100s 2020-11-06 18:06:12.385 37 DEBUG tempest.lib.common.rest_client [req-a2a83229-0616-4f0e-80d5-058912a81a9c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a2a83229-0616-4f0e-80d5-058912a81a9c', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a2a83229-0616-4f0e-80d5-058912a81a9c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535'} Body: b'{"volume": {"id": "d5454f08-c508-485b-be85-b2805017b535", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:05:55.000000", "updated_at": "2020-11-06T18:06:12.000000", "name": "tempest-VolumesBackupsV3RbacTest-Volume-978432898", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535"}], "user_id": "9bdff6dfab034591b5acf2726711414b", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "08ca8e8d43a54acea340e660c49fdd02"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:12.398 37 INFO tempest.common.waiters [-] volume d5454f08-c508-485b-be85-b2805017b535 reached available after waiting for 0.398160 seconds 2020-11-06 18:06:12.398 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:06:12.496 37 INFO tempest.lib.common.rest_client [req-e25895e0-6fce-447e-8115-f319f3500bcb ] Request (VolumesBackupsV3RbacTest:test_reset_backup_status): 200 GET http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles 0.097s 2020-11-06 18:06:12.497 37 DEBUG tempest.lib.common.rest_client [req-e25895e0-6fce-447e-8115-f319f3500bcb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e25895e0-6fce-447e-8115-f319f3500bcb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:12.585 37 INFO tempest.lib.common.rest_client [req-142b0eed-9a80-481b-8926-acfb81bf8803 ] Request (VolumesBackupsV3RbacTest:test_reset_backup_status): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-11-06 18:06:12.586 37 DEBUG tempest.lib.common.rest_client [req-142b0eed-9a80-481b-8926-acfb81bf8803 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-142b0eed-9a80-481b-8926-acfb81bf8803', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9bdff6dfab034591b5acf2726711414b", "name": "tempest-VolumesBackupsV3RbacTest-960704696", "password_expires_at": null}, "audit_ids": ["sd313pAXSiupFkdVVg9rbQ"], "expires_at": "2020-11-06T19:06:12.000000Z", "issued_at": "2020-11-06T18:06:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "08ca8e8d43a54acea340e660c49fdd02", "name": "tempest-VolumesBackupsV3RbacTest-960704696"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:12.746 37 INFO tempest.lib.common.rest_client [req-2fd710f3-ce1f-4eb6-bcc9-b69210855077 ] Request (VolumesBackupsV3RbacTest:test_reset_backup_status): 202 POST http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/f5abedf0-98fe-4615-b54e-3b06a988096b/action 0.159s 2020-11-06 18:06:12.747 37 DEBUG tempest.lib.common.rest_client [req-2fd710f3-ce1f-4eb6-bcc9-b69210855077 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-reset_status": {"status": "error"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-2fd710f3-ce1f-4eb6-bcc9-b69210855077', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2fd710f3-ce1f-4eb6-bcc9-b69210855077', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/f5abedf0-98fe-4615-b54e-3b06a988096b/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:12.747 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:06:12.853 37 INFO tempest.lib.common.rest_client [req-41747b5c-53b6-46aa-bcd4-5160813fe7ee ] Request (VolumesBackupsV3RbacTest:test_reset_backup_status): 200 GET http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles 0.105s 2020-11-06 18:06:12.854 37 DEBUG tempest.lib.common.rest_client [req-41747b5c-53b6-46aa-bcd4-5160813fe7ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-41747b5c-53b6-46aa-bcd4-5160813fe7ee', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:12.933 37 INFO tempest.lib.common.rest_client [req-a82e37fe-eb2b-4dfb-87f7-a2eda2101009 ] Request (VolumesBackupsV3RbacTest:test_reset_backup_status): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-11-06 18:06:12.933 37 DEBUG tempest.lib.common.rest_client [req-a82e37fe-eb2b-4dfb-87f7-a2eda2101009 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a82e37fe-eb2b-4dfb-87f7-a2eda2101009', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9bdff6dfab034591b5acf2726711414b", "name": "tempest-VolumesBackupsV3RbacTest-960704696", "password_expires_at": null}, "audit_ids": ["XPXrKsYKS0OV7MSOYuXjrg"], "expires_at": "2020-11-06T19:06:12.000000Z", "issued_at": "2020-11-06T18:06:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "08ca8e8d43a54acea340e660c49fdd02", "name": "tempest-VolumesBackupsV3RbacTest-960704696"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:13.161 37 INFO tempest.lib.common.rest_client [req-c55f21af-32b9-4f10-8ff9-26523a303aa8 ] Request (VolumesBackupsV3RbacTest:test_reset_backup_status): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/f5abedf0-98fe-4615-b54e-3b06a988096b 0.226s 2020-11-06 18:06:13.162 37 DEBUG tempest.lib.common.rest_client [req-c55f21af-32b9-4f10-8ff9-26523a303aa8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c55f21af-32b9-4f10-8ff9-26523a303aa8', 'content-length': '813', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c55f21af-32b9-4f10-8ff9-26523a303aa8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/f5abedf0-98fe-4615-b54e-3b06a988096b'} Body: b'{"backup": {"id": "f5abedf0-98fe-4615-b54e-3b06a988096b", "status": "error", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-11-06T18:06:10.000000", "updated_at": "2020-11-06T18:06:13.000000", "name": "tempest-VolumesBackupsV3RbacTest-Backup-1640099203", "description": null, "fail_reason": null, "volume_id": "d5454f08-c508-485b-be85-b2805017b535", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/f5abedf0-98fe-4615-b54e-3b06a988096b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/backups/f5abedf0-98fe-4615-b54e-3b06a988096b"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-11-06T18:06:10.000000"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:13.171 37 INFO tempest.common.waiters [-] backup f5abedf0-98fe-4615-b54e-3b06a988096b reached error after waiting for 0.171061 seconds 2020-11-06 18:06:13.223 37 INFO tempest.lib.common.rest_client [req-8b0da840-3f9f-4f92-a42a-8923fe271a49 ] Request (VolumesBackupsV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/f5abedf0-98fe-4615-b54e-3b06a988096b 0.051s 2020-11-06 18:06:13.223 37 DEBUG tempest.lib.common.rest_client [req-8b0da840-3f9f-4f92-a42a-8923fe271a49 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-8b0da840-3f9f-4f92-a42a-8923fe271a49', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8b0da840-3f9f-4f92-a42a-8923fe271a49', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/f5abedf0-98fe-4615-b54e-3b06a988096b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:13.226 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:06:13.229 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: backup:restore, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:06:13.230 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:06:13.368 39 INFO tempest.lib.common.rest_client [req-7de2629d-9e61-459b-8302-4a28b17f608a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.192s 2020-11-06 18:06:13.369 39 DEBUG tempest.lib.common.rest_client [req-7de2629d-9e61-459b-8302-4a28b17f608a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7de2629d-9e61-459b-8302-4a28b17f608a', 'x-compute-request-id': 'req-7de2629d-9e61-459b-8302-4a28b17f608a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:06:13Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5b:34:70"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:13.395 37 INFO tempest.lib.common.rest_client [req-53309865-3299-4db2-bcec-bdd2d9e7d375 ] Request (VolumesBackupsV3RbacTest:test_restore_backup): 200 GET http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles 0.164s 2020-11-06 18:06:13.396 37 DEBUG tempest.lib.common.rest_client [req-53309865-3299-4db2-bcec-bdd2d9e7d375 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-53309865-3299-4db2-bcec-bdd2d9e7d375', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:13.491 37 INFO tempest.lib.common.rest_client [req-74b6bc2c-716d-474f-ac18-98159e65537b ] Request (VolumesBackupsV3RbacTest:test_restore_backup): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-11-06 18:06:13.492 37 DEBUG tempest.lib.common.rest_client [req-74b6bc2c-716d-474f-ac18-98159e65537b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-74b6bc2c-716d-474f-ac18-98159e65537b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9bdff6dfab034591b5acf2726711414b", "name": "tempest-VolumesBackupsV3RbacTest-960704696", "password_expires_at": null}, "audit_ids": ["2c1o-RQ_TKitZUIOLhE1Yw"], "expires_at": "2020-11-06T19:06:13.000000Z", "issued_at": "2020-11-06T18:06:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "08ca8e8d43a54acea340e660c49fdd02", "name": "tempest-VolumesBackupsV3RbacTest-960704696"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:14.531 39 INFO tempest.lib.common.rest_client [req-e7f9b114-9658-4bfc-ab50-2efd93b7edf0 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.148s 2020-11-06 18:06:14.531 39 DEBUG tempest.lib.common.rest_client [req-e7f9b114-9658-4bfc-ab50-2efd93b7edf0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1518', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e7f9b114-9658-4bfc-ab50-2efd93b7edf0', 'x-compute-request-id': 'req-e7f9b114-9658-4bfc-ab50-2efd93b7edf0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"server": {"id": "d6904dd4-113b-430f-b8b1-4d5fd06f8ccf", "name": "tempest-ServerActionsRbacTest-server-1406125582", "status": "DELETED", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T17:59:20Z", "updated": "2020-11-06T18:06:14Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:01:07.000000", "OS-SRV-USG:terminated_at": "2020-11-06T18:06:14.000000", "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033bf", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "deleted", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:14.545 39 INFO tempest.common.waiters [-] State transition "ACTIVE/None" ==> "DELETED/None" after 2 second wait 2020-11-06 18:06:14.934 37 INFO tempest.lib.common.rest_client [req-e2a32a3c-230c-4e6b-8f55-22816dc2a087 ] Request (VolumesBackupsV3RbacTest:test_restore_backup): 202 POST http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480/restore 1.440s 2020-11-06 18:06:14.934 37 DEBUG tempest.lib.common.rest_client [req-e2a32a3c-230c-4e6b-8f55-22816dc2a087 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"restore": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e2a32a3c-230c-4e6b-8f55-22816dc2a087', 'content-length': '189', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e2a32a3c-230c-4e6b-8f55-22816dc2a087', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480/restore'} Body: b'{"restore": {"backup_id": "67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480", "volume_id": "2917bfbb-c54d-4f1c-8568-2a281d5bf631", "volume_name": "restore_backup_67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:14.938 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:06:15.033 37 INFO tempest.lib.common.rest_client [req-f02b2d1c-ea28-48a6-8727-a18581de5f80 ] Request (VolumesBackupsV3RbacTest:test_restore_backup): 200 GET http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles 0.094s 2020-11-06 18:06:15.033 37 DEBUG tempest.lib.common.rest_client [req-f02b2d1c-ea28-48a6-8727-a18581de5f80 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f02b2d1c-ea28-48a6-8727-a18581de5f80', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:15.111 37 INFO tempest.lib.common.rest_client [req-05c846ca-e44a-4afa-8e67-71521a1c9d2a ] Request (VolumesBackupsV3RbacTest:test_restore_backup): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.077s 2020-11-06 18:06:15.112 37 DEBUG tempest.lib.common.rest_client [req-05c846ca-e44a-4afa-8e67-71521a1c9d2a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-05c846ca-e44a-4afa-8e67-71521a1c9d2a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9bdff6dfab034591b5acf2726711414b", "name": "tempest-VolumesBackupsV3RbacTest-960704696", "password_expires_at": null}, "audit_ids": ["vH2XIgo3Tgmuv0Jvm8TNEQ"], "expires_at": "2020-11-06T19:06:15.000000Z", "issued_at": "2020-11-06T18:06:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "08ca8e8d43a54acea340e660c49fdd02", "name": "tempest-VolumesBackupsV3RbacTest-960704696"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:15.259 37 INFO tempest.lib.common.rest_client [req-13e1b595-1747-470a-8a48-869317821a61 ] Request (VolumesBackupsV3RbacTest:test_restore_backup): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480 0.146s 2020-11-06 18:06:15.260 37 DEBUG tempest.lib.common.rest_client [req-13e1b595-1747-470a-8a48-869317821a61 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-13e1b595-1747-470a-8a48-869317821a61', 'content-length': '816', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-13e1b595-1747-470a-8a48-869317821a61', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480'} Body: b'{"backup": {"id": "67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480", "status": "restoring", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-11-06T18:05:56.000000", "updated_at": "2020-11-06T18:06:15.000000", "name": "tempest-VolumesBackupsV3RbacTest-Backup-912808735", "description": null, "fail_reason": null, "volume_id": "d5454f08-c508-485b-be85-b2805017b535", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-11-06T18:05:56.000000"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:15.616 39 INFO tempest.lib.common.rest_client [req-c612f07b-7cff-44a6-8ffd-8a961995742a ] Request (ServerActionsRbacTest:setUp): 404 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.069s 2020-11-06 18:06:15.617 39 DEBUG tempest.lib.common.rest_client [req-c612f07b-7cff-44a6-8ffd-8a961995742a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-c612f07b-7cff-44a6-8ffd-8a961995742a', 'x-compute-request-id': 'req-c612f07b-7cff-44a6-8ffd-8a961995742a', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance d6904dd4-113b-430f-b8b1-4d5fd06f8ccf could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:15.619 39 DEBUG tempest.lib.common.validation_resources [-] Requested validation resources keypair True, floating IP True, security group True create_validation_resources /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/validation_resources.py:186 2020-11-06 18:06:15.774 39 INFO tempest.lib.common.rest_client [req-b03240d7-e96c-46c7-a2d2-26c12f4dcded ] Request (ServerActionsRbacTest:setUp): 200 POST http://172.30.13.94/compute/v2.1/os-keypairs 0.153s 2020-11-06 18:06:15.774 39 DEBUG tempest.lib.common.rest_client [req-b03240d7-e96c-46c7-a2d2-26c12f4dcded ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"keypair": {"name": "tempest-keypair-90357195"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2299', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b03240d7-e96c-46c7-a2d2-26c12f4dcded', 'x-compute-request-id': 'req-b03240d7-e96c-46c7-a2d2-26c12f4dcded', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-keypairs'} Body: b'{"keypair": {"private_key": "-----BEGIN RSA PRIVATE KEY-----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\\nCcD3PKJ8tUVFhczwa5RarK3cs89G+dy77q/NUGfHZyo4bAW6st9u\\n-----END RSA PRIVATE KEY-----\\n", "name": "tempest-keypair-90357195", "public_key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDASlg4h/ubKrqr3vi4HE6mbTC5HGngT1FTL20HII3UZ7NYj1mwpw7/QHH1+k9LA1Zx//76VHKzAoz852hzx7YV0s/OSJZL6dqBYJm6l2pE2Y3KScROY1ps8dQpA7+Oz/ddOxH8K85oAaYW3zimE3mcAIV3Yyrkt5K5Lp4CO5nqXXetfzSpZalWU6KAt2Hrs8j/DNi8VX+5b7k2Bvs0G9G7cZJX4Z1V5ko2shUMJlB+oYnlYmJLrwR7kM+cyJfc9mmcpZVitAiMvWhM6RbuinRnwi7cCf2dpPhCXwJjy4apvTpzWL89F2YSoxtgTe3g9fw6rxRLaFhhrB1AWNg23htx Generated-by-Nova", "fingerprint": "19:8d:a1:09:d8:91:16:4b:c5:e6:81:06:62:fb:f3:2a", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:15.778 39 DEBUG tempest.lib.common.validation_resources [-] Validation resource key tempest-keypair-90357195 created create_validation_resources /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/validation_resources.py:194 2020-11-06 18:06:15.966 39 INFO tempest.lib.common.rest_client [req-7b1ce8c5-1368-4200-a6fc-9a84c45b808c ] Request (ServerActionsRbacTest:setUp): 201 POST http://172.30.13.94:9696/v2.0/security-groups 0.186s 2020-11-06 18:06:15.967 39 DEBUG tempest.lib.common.rest_client [req-7b1ce8c5-1368-4200-a6fc-9a84c45b808c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group": {"name": "tempest-securitygroup--1841341289", "description": "tempest-description--1064463622"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1414', 'x-openstack-request-id': 'req-7b1ce8c5-1368-4200-a6fc-9a84c45b808c', 'date': 'Fri, 06 Nov 2020 18:06:15 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups'} Body: b'{"security_group": {"id": "04dd1681-e813-4cef-95d4-a0c09e99fd3d", "name": "tempest-securitygroup--1841341289", "stateful": true, "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "description": "tempest-description--1064463622", "security_group_rules": [{"id": "11409361-895d-4853-9b63-710028d687b0", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "security_group_id": "04dd1681-e813-4cef-95d4-a0c09e99fd3d", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:06:15Z", "updated_at": "2020-11-06T18:06:15Z", "revision_number": 0, "project_id": "21ea54a8c99a458890dbfde9b6dc3e3b"}, {"id": "586a8bed-0e1d-405c-9318-932ba47bb3e4", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "security_group_id": "04dd1681-e813-4cef-95d4-a0c09e99fd3d", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:06:15Z", "updated_at": "2020-11-06T18:06:15Z", "revision_number": 0, "project_id": "21ea54a8c99a458890dbfde9b6dc3e3b"}], "tags": [], "created_at": "2020-11-06T18:06:15Z", "updated_at": "2020-11-06T18:06:15Z", "revision_number": 1, "project_id": "21ea54a8c99a458890dbfde9b6dc3e3b"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:16.121 39 INFO tempest.lib.common.rest_client [req-abbab8e8-bfd2-464c-993a-5cf12536964b ] Request (ServerActionsRbacTest:setUp): 201 POST http://172.30.13.94:9696/v2.0/security-group-rules 0.153s 2020-11-06 18:06:16.122 39 DEBUG tempest.lib.common.rest_client [req-abbab8e8-bfd2-464c-993a-5cf12536964b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group_rule": {"security_group_id": "04dd1681-e813-4cef-95d4-a0c09e99fd3d", "protocol": "tcp", "ethertype": "IPv4", "port_range_min": 22, "port_range_max": 22, "direction": "ingress"}} Response - Headers: {'content-type': 'application/json', 'content-length': '507', 'x-openstack-request-id': 'req-abbab8e8-bfd2-464c-993a-5cf12536964b', 'date': 'Fri, 06 Nov 2020 18:06:16 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/security-group-rules'} Body: b'{"security_group_rule": {"id": "87fc91ea-29be-479c-888e-329d6d0b0c2b", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "security_group_id": "04dd1681-e813-4cef-95d4-a0c09e99fd3d", "ethertype": "IPv4", "direction": "ingress", "protocol": "tcp", "port_range_min": 22, "port_range_max": 22, "remote_ip_prefix": null, "remote_group_id": null, "description": "", "created_at": "2020-11-06T18:06:16Z", "updated_at": "2020-11-06T18:06:16Z", "revision_number": 0, "project_id": "21ea54a8c99a458890dbfde9b6dc3e3b"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:16.253 39 INFO tempest.lib.common.rest_client [req-73203db6-08cb-4693-8b40-4ad2db6ccae2 ] Request (ServerActionsRbacTest:setUp): 201 POST http://172.30.13.94:9696/v2.0/security-group-rules 0.130s 2020-11-06 18:06:16.254 39 DEBUG tempest.lib.common.rest_client [req-73203db6-08cb-4693-8b40-4ad2db6ccae2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group_rule": {"security_group_id": "04dd1681-e813-4cef-95d4-a0c09e99fd3d", "protocol": "icmp", "ethertype": "IPv4", "direction": "ingress"}} Response - Headers: {'content-type': 'application/json', 'content-length': '512', 'x-openstack-request-id': 'req-73203db6-08cb-4693-8b40-4ad2db6ccae2', 'date': 'Fri, 06 Nov 2020 18:06:16 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/security-group-rules'} Body: b'{"security_group_rule": {"id": "3a8c51fe-0df6-48d1-a1e0-140e7ac82772", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "security_group_id": "04dd1681-e813-4cef-95d4-a0c09e99fd3d", "ethertype": "IPv4", "direction": "ingress", "protocol": "icmp", "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": "", "created_at": "2020-11-06T18:06:16Z", "updated_at": "2020-11-06T18:06:16Z", "revision_number": 0, "project_id": "21ea54a8c99a458890dbfde9b6dc3e3b"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:16.254 39 DEBUG tempest.lib.common.validation_resources [-] SSH Validation resource security group with tcp and icmp rules tempest-securitygroup--1841341289 created create_ssh_security_group /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/validation_resources.py:120 2020-11-06 18:06:16.302 37 INFO tempest.lib.common.rest_client [req-1a1589c5-2f36-468a-9db6-1c787eb00405 ] Request (VolumesBackupsV3RbacTest:test_restore_backup): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480 0.034s 2020-11-06 18:06:16.303 37 DEBUG tempest.lib.common.rest_client [req-1a1589c5-2f36-468a-9db6-1c787eb00405 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-1a1589c5-2f36-468a-9db6-1c787eb00405', 'content-length': '816', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1a1589c5-2f36-468a-9db6-1c787eb00405', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480'} Body: b'{"backup": {"id": "67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480", "status": "restoring", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-11-06T18:05:56.000000", "updated_at": "2020-11-06T18:06:15.000000", "name": "tempest-VolumesBackupsV3RbacTest-Backup-912808735", "description": null, "fail_reason": null, "volume_id": "d5454f08-c508-485b-be85-b2805017b535", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-11-06T18:05:56.000000"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:17.342 37 INFO tempest.lib.common.rest_client [req-ff9dcf8f-f0fe-46f1-b189-43c0a3051bf9 ] Request (VolumesBackupsV3RbacTest:test_restore_backup): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480 0.031s 2020-11-06 18:06:17.342 37 DEBUG tempest.lib.common.rest_client [req-ff9dcf8f-f0fe-46f1-b189-43c0a3051bf9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ff9dcf8f-f0fe-46f1-b189-43c0a3051bf9', 'content-length': '816', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ff9dcf8f-f0fe-46f1-b189-43c0a3051bf9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480'} Body: b'{"backup": {"id": "67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480", "status": "available", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-11-06T18:05:56.000000", "updated_at": "2020-11-06T18:06:16.000000", "name": "tempest-VolumesBackupsV3RbacTest-Backup-912808735", "description": null, "fail_reason": null, "volume_id": "d5454f08-c508-485b-be85-b2805017b535", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-11-06T18:05:56.000000"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:17.350 37 INFO tempest.common.waiters [-] backup 67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480 reached available after waiting for 2.349988 seconds 2020-11-06 18:06:17.424 37 INFO tempest.lib.common.rest_client [req-0388b8db-9686-481a-b10c-f8127221b940 ] Request (VolumesBackupsV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/2917bfbb-c54d-4f1c-8568-2a281d5bf631 0.073s 2020-11-06 18:06:17.425 37 DEBUG tempest.lib.common.rest_client [req-0388b8db-9686-481a-b10c-f8127221b940 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0388b8db-9686-481a-b10c-f8127221b940', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/2917bfbb-c54d-4f1c-8568-2a281d5bf631'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:17.427 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:06:17.430 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: backup:get, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:06:17.430 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:06:17.484 37 INFO tempest.lib.common.rest_client [req-cb5c4c16-42f4-4582-aaeb-eeb4ed9390e0 ] Request (VolumesBackupsV3RbacTest:test_show_backup): 200 GET http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles 0.053s 2020-11-06 18:06:17.485 37 DEBUG tempest.lib.common.rest_client [req-cb5c4c16-42f4-4582-aaeb-eeb4ed9390e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cb5c4c16-42f4-4582-aaeb-eeb4ed9390e0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:17.521 37 INFO tempest.lib.common.rest_client [req-278765d0-b1a5-4c0d-93af-9274e774d5f8 ] Request (VolumesBackupsV3RbacTest:test_show_backup): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:06:17.522 37 DEBUG tempest.lib.common.rest_client [req-278765d0-b1a5-4c0d-93af-9274e774d5f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-278765d0-b1a5-4c0d-93af-9274e774d5f8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9bdff6dfab034591b5acf2726711414b", "name": "tempest-VolumesBackupsV3RbacTest-960704696", "password_expires_at": null}, "audit_ids": ["igYaN7NZTniMkKPz8ZR43Q"], "expires_at": "2020-11-06T19:06:17.000000Z", "issued_at": "2020-11-06T18:06:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "08ca8e8d43a54acea340e660c49fdd02", "name": "tempest-VolumesBackupsV3RbacTest-960704696"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:17.530 39 INFO tempest.lib.common.rest_client [req-d36fb140-4124-4282-ad33-4d46fb8a0dc9 ] Request (ServerActionsRbacTest:setUp): 201 POST http://172.30.13.94:9696/v2.0/floatingips 1.274s 2020-11-06 18:06:17.530 39 DEBUG tempest.lib.common.rest_client [req-d36fb140-4124-4282-ad33-4d46fb8a0dc9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"floatingip": {"floating_network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea"}} Response - Headers: {'content-type': 'application/json', 'content-length': '575', 'x-openstack-request-id': 'req-d36fb140-4124-4282-ad33-4d46fb8a0dc9', 'date': 'Fri, 06 Nov 2020 18:06:17 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/floatingips'} Body: b'{"floatingip": {"id": "2a0b89b7-d480-4d15-8afb-93c1b82e1bd3", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "floating_ip_address": "172.24.4.131", "floating_network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "router_id": null, "port_id": null, "fixed_ip_address": null, "status": "DOWN", "project_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "description": "", "qos_policy_id": null, "port_details": null, "dns_domain": "", "dns_name": "", "port_forwardings": [], "tags": [], "created_at": "2020-11-06T18:06:17Z", "updated_at": "2020-11-06T18:06:17Z", "revision_number": 0}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:17.531 39 DEBUG tempest.lib.common.validation_resources [-] Validation resource floating IP {'id': '2a0b89b7-d480-4d15-8afb-93c1b82e1bd3', 'tenant_id': '21ea54a8c99a458890dbfde9b6dc3e3b', 'floating_ip_address': '172.24.4.131', 'floating_network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'router_id': None, 'port_id': None, 'fixed_ip_address': None, 'status': 'DOWN', 'project_id': '21ea54a8c99a458890dbfde9b6dc3e3b', 'description': '', 'qos_policy_id': None, 'port_details': None, 'dns_domain': '', 'dns_name': '', 'port_forwardings': [], 'tags': [], 'created_at': '2020-11-06T18:06:17Z', 'updated_at': '2020-11-06T18:06:17Z', 'revision_number': 0, 'ip': '172.24.4.131'} created create_validation_resources /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/validation_resources.py:218 2020-11-06 18:06:17.624 37 INFO tempest.lib.common.rest_client [req-78df27db-1eae-4a7e-ae0a-d4be775465ea ] Request (VolumesBackupsV3RbacTest:test_show_backup): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480 0.100s 2020-11-06 18:06:17.624 39 INFO tempest.lib.common.rest_client [req-f13edc71-30a9-40c0-ad3f-35351effb16c ] Request (ServerActionsRbacTest:setUp): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 18:06:17.625 39 DEBUG tempest.lib.common.rest_client [req-f13edc71-30a9-40c0-ad3f-35351effb16c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f13edc71-30a9-40c0-ad3f-35351effb16c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["RGuJCmyfRJa0vysqp4iN3w"], "expires_at": "2020-11-06T19:06:17.000000Z", "issued_at": "2020-11-06T18:06:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:17.625 37 DEBUG tempest.lib.common.rest_client [req-78df27db-1eae-4a7e-ae0a-d4be775465ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-78df27db-1eae-4a7e-ae0a-d4be775465ea', 'content-length': '816', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-78df27db-1eae-4a7e-ae0a-d4be775465ea', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480'} Body: b'{"backup": {"id": "67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480", "status": "available", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-11-06T18:05:56.000000", "updated_at": "2020-11-06T18:06:16.000000", "name": "tempest-VolumesBackupsV3RbacTest-Backup-912808735", "description": null, "fail_reason": null, "volume_id": "d5454f08-c508-485b-be85-b2805017b535", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-11-06T18:05:56.000000"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:17.625 39 INFO tempest.lib.common.fixed_network [-] (ServerActionsRbacTest:setUp) Found network {'id': '795afc26-787e-4d38-9bc1-bc29e5b00fbc', 'name': 'tempest-ServerActionsRbacTest-1359272422-network', 'tenant_id': '21ea54a8c99a458890dbfde9b6dc3e3b', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '21ea54a8c99a458890dbfde9b6dc3e3b', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 55, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T17:59:07Z', 'updated_at': '2020-11-06T17:59:07Z', 'revision_number': 1} available for tenant 2020-11-06 18:06:17.634 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:06:17.683 37 INFO tempest.lib.common.rest_client [req-ded8577e-7062-45dd-b67d-042a06859536 ] Request (VolumesBackupsV3RbacTest:test_show_backup): 200 GET http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles 0.048s 2020-11-06 18:06:17.683 37 DEBUG tempest.lib.common.rest_client [req-ded8577e-7062-45dd-b67d-042a06859536 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ded8577e-7062-45dd-b67d-042a06859536', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02/users/9bdff6dfab034591b5acf2726711414b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:17.715 37 INFO tempest.lib.common.rest_client [req-48abae86-dc20-431b-87ce-8f8773db3692 ] Request (VolumesBackupsV3RbacTest:test_show_backup): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:06:17.716 37 DEBUG tempest.lib.common.rest_client [req-48abae86-dc20-431b-87ce-8f8773db3692 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-48abae86-dc20-431b-87ce-8f8773db3692', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9bdff6dfab034591b5acf2726711414b", "name": "tempest-VolumesBackupsV3RbacTest-960704696", "password_expires_at": null}, "audit_ids": ["0Iprc7xCQlqaDRQ2EqY_Aw"], "expires_at": "2020-11-06T19:06:17.000000Z", "issued_at": "2020-11-06T18:06:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "08ca8e8d43a54acea340e660c49fdd02", "name": "tempest-VolumesBackupsV3RbacTest-960704696"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_08ca8e8d43a54acea340e660c49fdd02", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:17.843 37 INFO tempest.lib.common.rest_client [req-7d1b6ecd-fcfa-4f9e-94cd-433089690fdb ] Request (VolumesBackupsV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480 0.125s 2020-11-06 18:06:17.843 37 DEBUG tempest.lib.common.rest_client [req-7d1b6ecd-fcfa-4f9e-94cd-433089690fdb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-7d1b6ecd-fcfa-4f9e-94cd-433089690fdb', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7d1b6ecd-fcfa-4f9e-94cd-433089690fdb', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/backups/67ddd8bd-07b5-4e7f-85f9-83ce7ba8b480'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:17.923 37 INFO tempest.lib.common.rest_client [req-3a8d2deb-5b6b-4366-b203-218c8a6197bb ] Request (VolumesBackupsV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535 0.079s 2020-11-06 18:06:17.924 37 DEBUG tempest.lib.common.rest_client [req-3a8d2deb-5b6b-4366-b203-218c8a6197bb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3a8d2deb-5b6b-4366-b203-218c8a6197bb', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:18.011 37 INFO tempest.lib.common.rest_client [req-55b72c0e-d093-46c9-8952-ebb6e455e783 ] Request (VolumesBackupsV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535 0.087s 2020-11-06 18:06:18.012 37 DEBUG tempest.lib.common.rest_client [req-55b72c0e-d093-46c9-8952-ebb6e455e783 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-55b72c0e-d093-46c9-8952-ebb6e455e783', 'content-length': '1066', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-55b72c0e-d093-46c9-8952-ebb6e455e783', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535'} Body: b'{"volume": {"id": "d5454f08-c508-485b-be85-b2805017b535", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:05:55.000000", "updated_at": "2020-11-06T18:06:18.000000", "name": "tempest-VolumesBackupsV3RbacTest-Volume-978432898", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535"}], "user_id": "9bdff6dfab034591b5acf2726711414b", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "08ca8e8d43a54acea340e660c49fdd02"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:18.974 39 INFO tempest.lib.common.rest_client [req-458ea9d6-5b64-40f3-88c4-6d357b73450a ] Request (ServerActionsRbacTest:setUp): 202 POST http://172.30.13.94/compute/v2.1/servers 1.348s 2020-11-06 18:06:18.975 39 DEBUG tempest.lib.common.rest_client [req-458ea9d6-5b64-40f3-88c4-6d357b73450a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-ServerActionsRbacTest-server-1778191607", "imageRef": "56b368f6-9136-40ec-a04c-564d02c95e42", "flavorRef": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "adminPass": "F9+rBc7S&lyp_Zp", "networks": [{"uuid": "795afc26-787e-4d38-9bc1-bc29e5b00fbc"}]}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '385', 'location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-458ea9d6-5b64-40f3-88c4-6d357b73450a', 'x-compute-request-id': 'req-458ea9d6-5b64-40f3-88c4-6d357b73450a', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "F9+rBc7S&lyp_Zp"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:19.088 39 INFO tempest.lib.common.rest_client [req-2c8c96b3-7c75-4868-b607-b8e1f5bd7177 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.110s 2020-11-06 18:06:19.089 39 DEBUG tempest.lib.common.rest_client [req-2c8c96b3-7c75-4868-b607-b8e1f5bd7177 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1397', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2c8c96b3-7c75-4868-b607-b8e1f5bd7177', 'x-compute-request-id': 'req-2c8c96b3-7c75-4868-b607-b8e1f5bd7177', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "BUILD", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:19Z", "updated": "2020-11-06T18:06:19Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:19.104 37 INFO tempest.lib.common.rest_client [req-fd18b4c2-e1d5-496e-98b2-3e01b18d86be ] Request (VolumesBackupsV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535 0.074s 2020-11-06 18:06:19.104 37 DEBUG tempest.lib.common.rest_client [req-fd18b4c2-e1d5-496e-98b2-3e01b18d86be ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-fd18b4c2-e1d5-496e-98b2-3e01b18d86be', 'content-length': '1066', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-fd18b4c2-e1d5-496e-98b2-3e01b18d86be', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535'} Body: b'{"volume": {"id": "d5454f08-c508-485b-be85-b2805017b535", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:05:55.000000", "updated_at": "2020-11-06T18:06:18.000000", "name": "tempest-VolumesBackupsV3RbacTest-Volume-978432898", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535"}], "user_id": "9bdff6dfab034591b5acf2726711414b", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "08ca8e8d43a54acea340e660c49fdd02"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:20.179 37 INFO tempest.lib.common.rest_client [req-82abdcca-2616-4079-850c-a60dd745ba2d ] Request (VolumesBackupsV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535 0.058s 2020-11-06 18:06:20.180 37 DEBUG tempest.lib.common.rest_client [req-82abdcca-2616-4079-850c-a60dd745ba2d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-82abdcca-2616-4079-850c-a60dd745ba2d', 'content-length': '1066', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-82abdcca-2616-4079-850c-a60dd745ba2d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535'} Body: b'{"volume": {"id": "d5454f08-c508-485b-be85-b2805017b535", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:05:55.000000", "updated_at": "2020-11-06T18:06:18.000000", "name": "tempest-VolumesBackupsV3RbacTest-Volume-978432898", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535"}], "user_id": "9bdff6dfab034591b5acf2726711414b", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "08ca8e8d43a54acea340e660c49fdd02"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:20.259 39 INFO tempest.lib.common.rest_client [req-b6705e71-ac56-43d4-b6bc-38e955dabef0 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.154s 2020-11-06 18:06:20.260 39 DEBUG tempest.lib.common.rest_client [req-b6705e71-ac56-43d4-b6bc-38e955dabef0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1492', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b6705e71-ac56-43d4-b6bc-38e955dabef0', 'x-compute-request-id': 'req-b6705e71-ac56-43d4-b6bc-38e955dabef0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "BUILD", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:20Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "networking", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:20.274 39 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/networking" after 1 second wait 2020-11-06 18:06:21.252 37 INFO tempest.lib.common.rest_client [req-cdddfcc8-8384-410e-81f4-35f34f0eee34 ] Request (VolumesBackupsV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535 0.059s 2020-11-06 18:06:21.253 37 DEBUG tempest.lib.common.rest_client [req-cdddfcc8-8384-410e-81f4-35f34f0eee34 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-cdddfcc8-8384-410e-81f4-35f34f0eee34', 'content-length': '1066', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-cdddfcc8-8384-410e-81f4-35f34f0eee34', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535'} Body: b'{"volume": {"id": "d5454f08-c508-485b-be85-b2805017b535", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:05:55.000000", "updated_at": "2020-11-06T18:06:18.000000", "name": "tempest-VolumesBackupsV3RbacTest-Volume-978432898", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535"}], "user_id": "9bdff6dfab034591b5acf2726711414b", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "08ca8e8d43a54acea340e660c49fdd02"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:21.477 39 INFO tempest.lib.common.rest_client [req-0f3a8b8a-b531-4ab0-b4aa-b05dcbf749cf ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.200s 2020-11-06 18:06:21.477 39 DEBUG tempest.lib.common.rest_client [req-0f3a8b8a-b531-4ab0-b4aa-b05dcbf749cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0f3a8b8a-b531-4ab0-b4aa-b05dcbf749cf', 'x-compute-request-id': 'req-0f3a8b8a-b531-4ab0-b4aa-b05dcbf749cf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "BUILD", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:20Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:21.489 39 INFO tempest.common.waiters [-] State transition "BUILD/networking" ==> "BUILD/spawning" after 2 second wait 2020-11-06 18:06:22.343 37 INFO tempest.lib.common.rest_client [req-c1e09c4e-2f19-491e-9ac1-477ff378c8e4 ] Request (VolumesBackupsV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535 0.078s 2020-11-06 18:06:22.344 37 DEBUG tempest.lib.common.rest_client [req-c1e09c4e-2f19-491e-9ac1-477ff378c8e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c1e09c4e-2f19-491e-9ac1-477ff378c8e4', 'content-length': '1066', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c1e09c4e-2f19-491e-9ac1-477ff378c8e4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535'} Body: b'{"volume": {"id": "d5454f08-c508-485b-be85-b2805017b535", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:05:55.000000", "updated_at": "2020-11-06T18:06:18.000000", "name": "tempest-VolumesBackupsV3RbacTest-Volume-978432898", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535"}], "user_id": "9bdff6dfab034591b5acf2726711414b", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "08ca8e8d43a54acea340e660c49fdd02"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:22.805 39 INFO tempest.lib.common.rest_client [req-e69bb51f-c04f-4712-a1ad-0c892911c612 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.313s 2020-11-06 18:06:22.806 39 DEBUG tempest.lib.common.rest_client [req-e69bb51f-c04f-4712-a1ad-0c892911c612 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e69bb51f-c04f-4712-a1ad-0c892911c612', 'x-compute-request-id': 'req-e69bb51f-c04f-4712-a1ad-0c892911c612', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "BUILD", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:20Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:23.409 37 INFO tempest.lib.common.rest_client [req-d7484a59-7811-4e8b-8fa3-f567ac5d55aa ] Request (VolumesBackupsV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535 0.050s 2020-11-06 18:06:23.409 37 DEBUG tempest.lib.common.rest_client [req-d7484a59-7811-4e8b-8fa3-f567ac5d55aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-d7484a59-7811-4e8b-8fa3-f567ac5d55aa', 'x-openstack-request-id': 'req-d7484a59-7811-4e8b-8fa3-f567ac5d55aa', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/08ca8e8d43a54acea340e660c49fdd02/volumes/d5454f08-c508-485b-be85-b2805017b535'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume d5454f08-c508-485b-be85-b2805017b535 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:23.529 37 INFO tempest.lib.common.rest_client [req-d2f96074-8e1b-4a9f-ac9e-fd6ebc06af52 ] Request (VolumesBackupsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/9bdff6dfab034591b5acf2726711414b 0.118s 2020-11-06 18:06:23.529 37 DEBUG tempest.lib.common.rest_client [req-d2f96074-8e1b-4a9f-ac9e-fd6ebc06af52 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d2f96074-8e1b-4a9f-ac9e-fd6ebc06af52', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/9bdff6dfab034591b5acf2726711414b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:23.608 37 INFO tempest.lib.common.rest_client [req-8cb68f71-25b7-4609-874a-11c0f21070b3 ] Request (VolumesBackupsV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.077s 2020-11-06 18:06:23.608 37 DEBUG tempest.lib.common.rest_client [req-8cb68f71-25b7-4609-874a-11c0f21070b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8cb68f71-25b7-4609-874a-11c0f21070b3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["HbjhSty8RiKHm3zslTQiLg"], "expires_at": "2020-11-06T19:06:23.000000Z", "issued_at": "2020-11-06T18:06:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:23.896 37 INFO tempest.lib.common.rest_client [req-eb6a67a3-4000-4436-9908-b979164c3306 ] Request (VolumesBackupsV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=08ca8e8d43a54acea340e660c49fdd02&name=default 0.286s 2020-11-06 18:06:23.896 37 DEBUG tempest.lib.common.rest_client [req-eb6a67a3-4000-4436-9908-b979164c3306 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-eb6a67a3-4000-4436-9908-b979164c3306', 'date': 'Fri, 06 Nov 2020 18:06:23 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=08ca8e8d43a54acea340e660c49fdd02&name=default'} Body: b'{"security_groups": [{"id": "5839fa46-43c2-4bd2-8a41-0cb3f9fee793", "name": "default", "stateful": true, "tenant_id": "08ca8e8d43a54acea340e660c49fdd02", "description": "Default security group", "security_group_rules": [{"id": "3c703bb0-da51-4b22-b185-7b4eef57dfe1", "tenant_id": "08ca8e8d43a54acea340e660c49fdd02", "security_group_id": "5839fa46-43c2-4bd2-8a41-0cb3f9fee793", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "5839fa46-43c2-4bd2-8a41-0cb3f9fee793", "description": null, "tags": [], "created_at": "2020-11-06T18:06:23Z", "updated_at": "2020-11-06T18:06:23Z", "revision_number": 0, "project_id": "08ca8e8d43a54acea340e660c49fdd02"}, {"id": "4a1012fd-2be1-4669-81c5-b9e09b90a88b", "tenant_id": "08ca8e8d43a54acea340e660c49fdd02", "security_group_id": "5839fa46-43c2-4bd2-8a41-0cb3f9fee793", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:06:23Z", "updated_at": "2020-11-06T18:06:23Z", "revision_number": 0, "project_id": "08ca8e8d43a54acea340e660c49fdd02"}, {"id": "9a71fd6e-4acf-4f0c-8053-bb5fe9b8a61e", "tenant_id": "08ca8e8d43a54acea340e660c49fdd02", "security_group_id": "5839fa46-43c2-4bd2-8a41-0cb3f9fee793", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "5839fa46-43c2-4bd2-8a41-0cb3f9fee793", "description": null, "tags": [], "created_at": "2020-11-06T18:06:23Z", "updated_at": "2020-11-06T18:06:23Z", "revision_number": 0, "project_id": "08ca8e8d43a54acea340e660c49fdd02"}, {"id": "ab924630-24f2-45b3-830c-f22596f399b5", "tenant_id": "08ca8e8d43a54acea340e660c49fdd02", "security_group_id": "5839fa46-43c2-4bd2-8a41-0cb3f9fee793", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:06:23Z", "updated_at": "2020-11-06T18:06:23Z", "revision_number": 0, "project_id": "08ca8e8d43a54acea340e660c49fdd02"}], "tags": [], "created_at": "2020-11-06T18:06:23Z", "updated_at": "2020-11-06T18:06:23Z", "revision_number": 1, "project_id": "08ca8e8d43a54acea340e660c49fdd02"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:24.019 39 INFO tempest.lib.common.rest_client [req-5741ff99-cb30-4f98-8bd0-8dcd954a1671 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.199s 2020-11-06 18:06:24.019 39 DEBUG tempest.lib.common.rest_client [req-5741ff99-cb30-4f98-8bd0-8dcd954a1671 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5741ff99-cb30-4f98-8bd0-8dcd954a1671', 'x-compute-request-id': 'req-5741ff99-cb30-4f98-8bd0-8dcd954a1671', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "BUILD", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:20Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:24.036 37 INFO tempest.lib.common.rest_client [req-b57687dc-80ad-42d2-9df4-41bf26d053de ] Request (VolumesBackupsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/5839fa46-43c2-4bd2-8a41-0cb3f9fee793 0.139s 2020-11-06 18:06:24.036 37 DEBUG tempest.lib.common.rest_client [req-b57687dc-80ad-42d2-9df4-41bf26d053de ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-b57687dc-80ad-42d2-9df4-41bf26d053de', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:06:24 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/5839fa46-43c2-4bd2-8a41-0cb3f9fee793'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:24.160 37 INFO tempest.lib.common.rest_client [req-51b95e75-f430-4ab6-a11f-ff2adde60cb6 ] Request (VolumesBackupsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02 0.122s 2020-11-06 18:06:24.160 37 DEBUG tempest.lib.common.rest_client [req-51b95e75-f430-4ab6-a11f-ff2adde60cb6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-51b95e75-f430-4ab6-a11f-ff2adde60cb6', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/08ca8e8d43a54acea340e660c49fdd02'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:24.256 37 INFO tempest.lib.common.rest_client [req-e316ab13-6b09-4d65-a899-04bc1c6595ef ] Request (VolumesExtendV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-11-06 18:06:24.256 37 DEBUG tempest.lib.common.rest_client [req-e316ab13-6b09-4d65-a899-04bc1c6595ef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e316ab13-6b09-4d65-a899-04bc1c6595ef', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["djd0pDuSQYSpoJX-k2117Q"], "expires_at": "2020-11-06T19:06:24.000000Z", "issued_at": "2020-11-06T18:06:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:24.299 37 INFO tempest.lib.common.rest_client [req-ae6b9928-d20e-42a8-bfef-0c25fb6c9338 ] Request (VolumesExtendV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:06:24.299 37 DEBUG tempest.lib.common.rest_client [req-ae6b9928-d20e-42a8-bfef-0c25fb6c9338 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ae6b9928-d20e-42a8-bfef-0c25fb6c9338', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["uWluUSZiROa4mOmDOK9Zrg"], "expires_at": "2020-11-06T19:06:24.000000Z", "issued_at": "2020-11-06T18:06:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:24.357 37 INFO tempest.lib.common.rest_client [req-721690d2-a4c1-491e-afc4-7a9810e05c10 ] Request (VolumesExtendV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.057s 2020-11-06 18:06:24.358 37 DEBUG tempest.lib.common.rest_client [req-721690d2-a4c1-491e-afc4-7a9810e05c10 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-721690d2-a4c1-491e-afc4-7a9810e05c10', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:24.419 37 INFO tempest.lib.common.rest_client [req-cfa948cc-8a2e-4981-b2ca-6c574681168f ] Request (VolumesExtendV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.059s 2020-11-06 18:06:24.419 37 DEBUG tempest.lib.common.rest_client [req-cfa948cc-8a2e-4981-b2ca-6c574681168f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumesExtendV3RbacTest-560095120-desc", "domain_id": "default", "name": "tempest-VolumesExtendV3RbacTest-560095120"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '382', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cfa948cc-8a2e-4981-b2ca-6c574681168f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "7920e56a09b74d638e83e25844288952", "name": "tempest-VolumesExtendV3RbacTest-560095120", "domain_id": "default", "description": "tempest-VolumesExtendV3RbacTest-560095120-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/7920e56a09b74d638e83e25844288952"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:24.526 37 INFO tempest.lib.common.rest_client [req-954521eb-c315-465c-abf4-5e0db17b0757 ] Request (VolumesExtendV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.105s 2020-11-06 18:06:24.526 37 DEBUG tempest.lib.common.rest_client [req-954521eb-c315-465c-abf4-5e0db17b0757 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumesExtendV3RbacTest-560095120", "password": "F9*cU1~2E@A7pvr", "project_id": "7920e56a09b74d638e83e25844288952", "email": "tempest-VolumesExtendV3RbacTest-1806846663@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '401', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-954521eb-c315-465c-abf4-5e0db17b0757', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "7920e56a09b74d638e83e25844288952", "email": "tempest-VolumesExtendV3RbacTest-1806846663@example.com", "id": "0bea20945262491cb06998f2f388a0d7", "name": "tempest-VolumesExtendV3RbacTest-560095120", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/0bea20945262491cb06998f2f388a0d7"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:24.574 37 INFO tempest.lib.common.rest_client [req-ab26addd-c620-4f86-af61-7e5bf57a592e ] Request (VolumesExtendV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.046s 2020-11-06 18:06:24.574 37 DEBUG tempest.lib.common.rest_client [req-ab26addd-c620-4f86-af61-7e5bf57a592e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ab26addd-c620-4f86-af61-7e5bf57a592e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:24.622 37 INFO tempest.lib.common.rest_client [req-500e8df6-3289-4c64-9790-264c8f7c370b ] Request (VolumesExtendV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.046s 2020-11-06 18:06:24.622 37 DEBUG tempest.lib.common.rest_client [req-500e8df6-3289-4c64-9790-264c8f7c370b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-500e8df6-3289-4c64-9790-264c8f7c370b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:24.682 37 INFO tempest.lib.common.rest_client [req-2cc891ab-f49d-493a-a9de-adbae540ae8a ] Request (VolumesExtendV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/7920e56a09b74d638e83e25844288952/users/0bea20945262491cb06998f2f388a0d7/roles/72a4576c553448cd941b052c1ca0cf2d 0.059s 2020-11-06 18:06:24.683 37 DEBUG tempest.lib.common.rest_client [req-2cc891ab-f49d-493a-a9de-adbae540ae8a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2cc891ab-f49d-493a-a9de-adbae540ae8a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/7920e56a09b74d638e83e25844288952/users/0bea20945262491cb06998f2f388a0d7/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:24.683 37 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesExtendV3RbacTest-560095120', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '7920e56a09b74d638e83e25844288952', 'project_name': 'tempest-VolumesExtendV3RbacTest-560095120', 'tenant_id': '7920e56a09b74d638e83e25844288952', 'tenant_name': 'tempest-VolumesExtendV3RbacTest-560095120', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '0bea20945262491cb06998f2f388a0d7'}, Network: None, Subnet: None, Router: None 2020-11-06 18:06:24.684 37 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesExtendV3RbacTest-560095120', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '7920e56a09b74d638e83e25844288952', 'project_name': 'tempest-VolumesExtendV3RbacTest-560095120', 'tenant_id': '7920e56a09b74d638e83e25844288952', 'tenant_name': 'tempest-VolumesExtendV3RbacTest-560095120', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '0bea20945262491cb06998f2f388a0d7'}, Network: None, Subnet: None, Router: None 2020-11-06 18:06:24.806 37 INFO tempest.lib.common.rest_client [req-c4be225d-4282-4875-b890-aa34a1c18d0d ] Request (VolumesExtendV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.112s 2020-11-06 18:06:24.807 37 DEBUG tempest.lib.common.rest_client [req-c4be225d-4282-4875-b890-aa34a1c18d0d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6575', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c4be225d-4282-4875-b890-aa34a1c18d0d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0bea20945262491cb06998f2f388a0d7", "name": "tempest-VolumesExtendV3RbacTest-560095120", "password_expires_at": null}, "audit_ids": ["A9qndfDDSaa75obOVjXs6g"], "expires_at": "2020-11-06T19:06:24.000000Z", "issued_at": "2020-11-06T18:06:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7920e56a09b74d638e83e25844288952", "name": "tempest-VolumesExtendV3RbacTest-560095120"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7920e56a09b74d638e83e25844288952", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7920e56a09b74d638e83e25844288952", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7920e56a09b74d638e83e25844288952", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7920e56a09b74d638e83e25844288952", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7920e56a09b74d638e83e25844288952", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7920e56a09b74d638e83e25844288952", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http:/ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:24.894 37 INFO tempest.lib.common.rest_client [req-3cc7eb06-094c-4d4d-8a60-816ae5c9364c ] Request (VolumesExtendV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:06:24.895 37 DEBUG tempest.lib.common.rest_client [req-3cc7eb06-094c-4d4d-8a60-816ae5c9364c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3cc7eb06-094c-4d4d-8a60-816ae5c9364c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["W--nMVGbRiqxUafgEnNrsw"], "expires_at": "2020-11-06T19:06:24.000000Z", "issued_at": "2020-11-06T18:06:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:24.941 37 INFO tempest.lib.common.rest_client [req-c01bc2bc-1035-4f03-a2be-703a0cc6e2ca ] Request (VolumesExtendV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:06:24.942 37 DEBUG tempest.lib.common.rest_client [req-c01bc2bc-1035-4f03-a2be-703a0cc6e2ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c01bc2bc-1035-4f03-a2be-703a0cc6e2ca', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["VsqjMiJjSTiPM4sxFzWG7g"], "expires_at": "2020-11-06T19:06:24.000000Z", "issued_at": "2020-11-06T18:06:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:24.991 37 INFO tempest.lib.common.rest_client [req-4b1c32c9-25c7-46c0-8566-00ce89f0d0ee ] Request (VolumesExtendV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.047s 2020-11-06 18:06:24.991 37 DEBUG tempest.lib.common.rest_client [req-4b1c32c9-25c7-46c0-8566-00ce89f0d0ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4b1c32c9-25c7-46c0-8566-00ce89f0d0ee', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:25.044 37 INFO tempest.lib.common.rest_client [req-8fd1b9a3-c844-4239-a2ff-af3c51a5cbd0 ] Request (VolumesExtendV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.052s 2020-11-06 18:06:25.045 37 DEBUG tempest.lib.common.rest_client [req-8fd1b9a3-c844-4239-a2ff-af3c51a5cbd0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8fd1b9a3-c844-4239-a2ff-af3c51a5cbd0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:25.046 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:06:25.046 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:06:25.092 37 INFO tempest.lib.common.rest_client [req-b3060a96-b1ae-464e-8520-196e2f79b2b8 ] Request (VolumesExtendV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/7920e56a09b74d638e83e25844288952/users/0bea20945262491cb06998f2f388a0d7/roles 0.045s 2020-11-06 18:06:25.092 37 DEBUG tempest.lib.common.rest_client [req-b3060a96-b1ae-464e-8520-196e2f79b2b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b3060a96-b1ae-464e-8520-196e2f79b2b8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7920e56a09b74d638e83e25844288952/users/0bea20945262491cb06998f2f388a0d7/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7920e56a09b74d638e83e25844288952/users/0bea20945262491cb06998f2f388a0d7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:25.163 37 INFO tempest.lib.common.rest_client [req-a5c5772d-884e-47d3-b962-bdb59a7dc1ac ] Request (VolumesExtendV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/7920e56a09b74d638e83e25844288952/users/0bea20945262491cb06998f2f388a0d7/roles/72a4576c553448cd941b052c1ca0cf2d 0.070s 2020-11-06 18:06:25.163 37 DEBUG tempest.lib.common.rest_client [req-a5c5772d-884e-47d3-b962-bdb59a7dc1ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a5c5772d-884e-47d3-b962-bdb59a7dc1ac', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/7920e56a09b74d638e83e25844288952/users/0bea20945262491cb06998f2f388a0d7/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:25.247 39 INFO tempest.lib.common.rest_client [req-f2f44e9d-bd85-4c6c-bef7-b6939ad0b5f1 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.214s 2020-11-06 18:06:25.248 39 DEBUG tempest.lib.common.rest_client [req-f2f44e9d-bd85-4c6c-bef7-b6939ad0b5f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f2f44e9d-bd85-4c6c-bef7-b6939ad0b5f1', 'x-compute-request-id': 'req-f2f44e9d-bd85-4c6c-bef7-b6939ad0b5f1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "BUILD", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:20Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:25.276 37 INFO tempest.lib.common.rest_client [req-4256b4ff-d3cc-46a9-bf70-db51920189a6 ] Request (VolumesExtendV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/7920e56a09b74d638e83e25844288952/users/0bea20945262491cb06998f2f388a0d7/roles/a629c95d64b3416fb80ae90af4f69c05 0.112s 2020-11-06 18:06:25.276 37 DEBUG tempest.lib.common.rest_client [req-4256b4ff-d3cc-46a9-bf70-db51920189a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4256b4ff-d3cc-46a9-bf70-db51920189a6', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/7920e56a09b74d638e83e25844288952/users/0bea20945262491cb06998f2f388a0d7/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:26.358 37 INFO tempest.lib.common.rest_client [req-6583638c-af25-49af-8878-101bcaf5cef4 ] Request (VolumesExtendV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.079s 2020-11-06 18:06:26.358 37 DEBUG tempest.lib.common.rest_client [req-6583638c-af25-49af-8878-101bcaf5cef4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6583638c-af25-49af-8878-101bcaf5cef4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0bea20945262491cb06998f2f388a0d7", "name": "tempest-VolumesExtendV3RbacTest-560095120", "password_expires_at": null}, "audit_ids": ["ozIlXbtdSzuKmUaXvoNSGg"], "expires_at": "2020-11-06T19:06:26.000000Z", "issued_at": "2020-11-06T18:06:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7920e56a09b74d638e83e25844288952", "name": "tempest-VolumesExtendV3RbacTest-560095120"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7920e56a09b74d638e83e25844288952", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7920e56a09b74d638e83e25844288952", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7920e56a09b74d638e83e25844288952", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7920e56a09b74d638e83e25844288952", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7920e56a09b74d638e83e25844288952", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7920e56a09b74d638e83e25844288952", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:26.789 37 INFO tempest.lib.common.rest_client [req-7fa12666-ed49-4cc6-bf45-76fe80a3c309 ] Request (VolumesExtendV3RbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/7920e56a09b74d638e83e25844288952/volumes 0.429s 2020-11-06 18:06:26.789 37 DEBUG tempest.lib.common.rest_client [req-7fa12666-ed49-4cc6-bf45-76fe80a3c309 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-VolumesExtendV3RbacTest-Volume-553941770"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-7fa12666-ed49-4cc6-bf45-76fe80a3c309', 'content-length': '843', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7fa12666-ed49-4cc6-bf45-76fe80a3c309', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/7920e56a09b74d638e83e25844288952/volumes'} Body: b'{"volume": {"id": "a78b027b-06ba-4a28-ad8a-dedb28cd8821", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:06:27.000000", "updated_at": null, "name": "tempest-VolumesExtendV3RbacTest-Volume-553941770", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/7920e56a09b74d638e83e25844288952/volumes/a78b027b-06ba-4a28-ad8a-dedb28cd8821"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/7920e56a09b74d638e83e25844288952/volumes/a78b027b-06ba-4a28-ad8a-dedb28cd8821"}], "user_id": "0bea20945262491cb06998f2f388a0d7", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:26.890 37 INFO tempest.lib.common.rest_client [req-970dfb63-f54d-4577-a1ec-c84cdc817a1b ] Request (VolumesExtendV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/7920e56a09b74d638e83e25844288952/volumes/a78b027b-06ba-4a28-ad8a-dedb28cd8821 0.089s 2020-11-06 18:06:26.890 37 DEBUG tempest.lib.common.rest_client [req-970dfb63-f54d-4577-a1ec-c84cdc817a1b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-970dfb63-f54d-4577-a1ec-c84cdc817a1b', 'content-length': '1065', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-970dfb63-f54d-4577-a1ec-c84cdc817a1b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/7920e56a09b74d638e83e25844288952/volumes/a78b027b-06ba-4a28-ad8a-dedb28cd8821'} Body: b'{"volume": {"id": "a78b027b-06ba-4a28-ad8a-dedb28cd8821", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:06:27.000000", "updated_at": "2020-11-06T18:06:27.000000", "name": "tempest-VolumesExtendV3RbacTest-Volume-553941770", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/7920e56a09b74d638e83e25844288952/volumes/a78b027b-06ba-4a28-ad8a-dedb28cd8821"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/7920e56a09b74d638e83e25844288952/volumes/a78b027b-06ba-4a28-ad8a-dedb28cd8821"}], "user_id": "0bea20945262491cb06998f2f388a0d7", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "7920e56a09b74d638e83e25844288952"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:27.828 39 INFO tempest.lib.common.rest_client [req-2e031206-062b-4e2e-b74e-58b3fae7d222 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 1.562s 2020-11-06 18:06:27.829 39 DEBUG tempest.lib.common.rest_client [req-2e031206-062b-4e2e-b74e-58b3fae7d222 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1719', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2e031206-062b-4e2e-b74e-58b3fae7d222', 'x-compute-request-id': 'req-2e031206-062b-4e2e-b74e-58b3fae7d222', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:26Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:26.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:27.844 39 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 8 second wait 2020-11-06 18:06:27.845 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:06:27.846 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.846 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.846 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.847 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.847 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.848 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.848 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.848 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.849 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.849 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.849 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.850 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.850 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.850 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.850 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.851 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.851 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.851 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.852 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.852 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.852 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.852 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.853 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.853 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.853 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.854 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.854 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.854 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.854 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.855 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.855 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.855 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.856 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.856 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.856 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.856 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.857 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.857 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.857 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.857 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.858 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.858 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.858 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.859 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.859 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.859 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.859 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.860 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.860 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.860 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.861 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.861 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.861 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.861 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.862 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.862 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.862 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.863 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.863 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.863 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.864 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.864 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.864 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.865 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.865 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.865 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.866 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.866 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.866 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.866 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.867 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.867 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.867 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.867 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.868 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:27.869 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:revert_resize, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:06:27.962 37 INFO tempest.lib.common.rest_client [req-a71d0521-dd4a-43f6-a89e-7bd3b8a63231 ] Request (VolumesExtendV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/7920e56a09b74d638e83e25844288952/volumes/a78b027b-06ba-4a28-ad8a-dedb28cd8821 0.059s 2020-11-06 18:06:27.963 37 DEBUG tempest.lib.common.rest_client [req-a71d0521-dd4a-43f6-a89e-7bd3b8a63231 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a71d0521-dd4a-43f6-a89e-7bd3b8a63231', 'content-length': '1066', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a71d0521-dd4a-43f6-a89e-7bd3b8a63231', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/7920e56a09b74d638e83e25844288952/volumes/a78b027b-06ba-4a28-ad8a-dedb28cd8821'} Body: b'{"volume": {"id": "a78b027b-06ba-4a28-ad8a-dedb28cd8821", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:06:27.000000", "updated_at": "2020-11-06T18:06:27.000000", "name": "tempest-VolumesExtendV3RbacTest-Volume-553941770", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/7920e56a09b74d638e83e25844288952/volumes/a78b027b-06ba-4a28-ad8a-dedb28cd8821"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/7920e56a09b74d638e83e25844288952/volumes/a78b027b-06ba-4a28-ad8a-dedb28cd8821"}], "user_id": "0bea20945262491cb06998f2f388a0d7", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "7920e56a09b74d638e83e25844288952"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:27.976 37 INFO tempest.common.waiters [-] volume a78b027b-06ba-4a28-ad8a-dedb28cd8821 reached available after waiting for 1.976396 seconds 2020-11-06 18:06:27.977 37 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:06:27.979 37 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:extend, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:06:27.979 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:06:28.081 37 INFO tempest.lib.common.rest_client [req-5c1f2ed2-0937-4d8d-a864-b58279f98bf7 ] Request (VolumesExtendV3RbacTest:test_volume_extend): 200 GET http://172.30.13.94/identity/v3/projects/7920e56a09b74d638e83e25844288952/users/0bea20945262491cb06998f2f388a0d7/roles 0.101s 2020-11-06 18:06:28.082 37 DEBUG tempest.lib.common.rest_client [req-5c1f2ed2-0937-4d8d-a864-b58279f98bf7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5c1f2ed2-0937-4d8d-a864-b58279f98bf7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7920e56a09b74d638e83e25844288952/users/0bea20945262491cb06998f2f388a0d7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7920e56a09b74d638e83e25844288952/users/0bea20945262491cb06998f2f388a0d7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:28.117 37 INFO tempest.lib.common.rest_client [req-aed128bd-799a-47e9-8cd5-af86830af039 ] Request (VolumesExtendV3RbacTest:test_volume_extend): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:06:28.118 37 DEBUG tempest.lib.common.rest_client [req-aed128bd-799a-47e9-8cd5-af86830af039 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aed128bd-799a-47e9-8cd5-af86830af039', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0bea20945262491cb06998f2f388a0d7", "name": "tempest-VolumesExtendV3RbacTest-560095120", "password_expires_at": null}, "audit_ids": ["RQScrI8TSTiFE1kStxnkBg"], "expires_at": "2020-11-06T19:06:28.000000Z", "issued_at": "2020-11-06T18:06:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7920e56a09b74d638e83e25844288952", "name": "tempest-VolumesExtendV3RbacTest-560095120"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7920e56a09b74d638e83e25844288952", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7920e56a09b74d638e83e25844288952", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7920e56a09b74d638e83e25844288952", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7920e56a09b74d638e83e25844288952", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7920e56a09b74d638e83e25844288952", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7920e56a09b74d638e83e25844288952", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:28.183 39 INFO tempest.lib.common.rest_client [req-b6f3b099-5806-4d51-8127-bbdd29083903 ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.313s 2020-11-06 18:06:28.184 39 DEBUG tempest.lib.common.rest_client [req-b6f3b099-5806-4d51-8127-bbdd29083903 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1719', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b6f3b099-5806-4d51-8127-bbdd29083903', 'x-compute-request-id': 'req-b6f3b099-5806-4d51-8127-bbdd29083903', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:26Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:26.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:28.313 37 INFO tempest.lib.common.rest_client [req-46cfd3e8-7150-45cb-b904-48170d2212ab ] Request (VolumesExtendV3RbacTest:test_volume_extend): 202 POST http://172.30.13.94/volume/v3/7920e56a09b74d638e83e25844288952/volumes/a78b027b-06ba-4a28-ad8a-dedb28cd8821/action 0.194s 2020-11-06 18:06:28.314 37 DEBUG tempest.lib.common.rest_client [req-46cfd3e8-7150-45cb-b904-48170d2212ab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-extend": {"new_size": 2}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-46cfd3e8-7150-45cb-b904-48170d2212ab', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-46cfd3e8-7150-45cb-b904-48170d2212ab', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/7920e56a09b74d638e83e25844288952/volumes/a78b027b-06ba-4a28-ad8a-dedb28cd8821/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:28.314 37 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:06:28.374 37 INFO tempest.lib.common.rest_client [req-aca214a0-9db4-486a-ac1a-504645231479 ] Request (VolumesExtendV3RbacTest:test_volume_extend): 200 GET http://172.30.13.94/identity/v3/projects/7920e56a09b74d638e83e25844288952/users/0bea20945262491cb06998f2f388a0d7/roles 0.058s 2020-11-06 18:06:28.374 37 DEBUG tempest.lib.common.rest_client [req-aca214a0-9db4-486a-ac1a-504645231479 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aca214a0-9db4-486a-ac1a-504645231479', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7920e56a09b74d638e83e25844288952/users/0bea20945262491cb06998f2f388a0d7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7920e56a09b74d638e83e25844288952/users/0bea20945262491cb06998f2f388a0d7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:28.416 37 INFO tempest.lib.common.rest_client [req-6481c31c-4a32-4ca6-b5cf-612832198964 ] Request (VolumesExtendV3RbacTest:test_volume_extend): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-11-06 18:06:28.417 37 DEBUG tempest.lib.common.rest_client [req-6481c31c-4a32-4ca6-b5cf-612832198964 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6481c31c-4a32-4ca6-b5cf-612832198964', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0bea20945262491cb06998f2f388a0d7", "name": "tempest-VolumesExtendV3RbacTest-560095120", "password_expires_at": null}, "audit_ids": ["n4Wk3WmRRreRubHrypRCVA"], "expires_at": "2020-11-06T19:06:28.000000Z", "issued_at": "2020-11-06T18:06:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7920e56a09b74d638e83e25844288952", "name": "tempest-VolumesExtendV3RbacTest-560095120"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7920e56a09b74d638e83e25844288952", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7920e56a09b74d638e83e25844288952", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7920e56a09b74d638e83e25844288952", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7920e56a09b74d638e83e25844288952", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7920e56a09b74d638e83e25844288952", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7920e56a09b74d638e83e25844288952", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:28.492 39 INFO tempest.lib.common.rest_client [req-8685d25e-57ba-48b7-a036-1f6fa8f8823b ] Request (ServerActionsRbacTest:test_revert_resize_server): 202 POST http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b/action 0.292s 2020-11-06 18:06:28.493 39 DEBUG tempest.lib.common.rest_client [req-8685d25e-57ba-48b7-a036-1f6fa8f8823b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"resize": {"flavorRef": "a93eb10f-c417-43d8-812c-06039356e038"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8685d25e-57ba-48b7-a036-1f6fa8f8823b', 'x-compute-request-id': 'req-8685d25e-57ba-48b7-a036-1f6fa8f8823b', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:28.550 37 INFO tempest.lib.common.rest_client [req-53f6a675-da96-4c70-be23-8a4304078973 ] Request (VolumesExtendV3RbacTest:test_volume_extend): 200 GET http://172.30.13.94/volume/v3/7920e56a09b74d638e83e25844288952/volumes/a78b027b-06ba-4a28-ad8a-dedb28cd8821 0.132s 2020-11-06 18:06:28.550 37 DEBUG tempest.lib.common.rest_client [req-53f6a675-da96-4c70-be23-8a4304078973 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-53f6a675-da96-4c70-be23-8a4304078973', 'content-length': '1066', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-53f6a675-da96-4c70-be23-8a4304078973', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/7920e56a09b74d638e83e25844288952/volumes/a78b027b-06ba-4a28-ad8a-dedb28cd8821'} Body: b'{"volume": {"id": "a78b027b-06ba-4a28-ad8a-dedb28cd8821", "status": "available", "size": 2, "availability_zone": "nova", "created_at": "2020-11-06T18:06:27.000000", "updated_at": "2020-11-06T18:06:28.000000", "name": "tempest-VolumesExtendV3RbacTest-Volume-553941770", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/7920e56a09b74d638e83e25844288952/volumes/a78b027b-06ba-4a28-ad8a-dedb28cd8821"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/7920e56a09b74d638e83e25844288952/volumes/a78b027b-06ba-4a28-ad8a-dedb28cd8821"}], "user_id": "0bea20945262491cb06998f2f388a0d7", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "7920e56a09b74d638e83e25844288952"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:28.560 37 INFO tempest.common.waiters [-] volume a78b027b-06ba-4a28-ad8a-dedb28cd8821 reached available after waiting for 0.560018 seconds 2020-11-06 18:06:28.640 37 INFO tempest.lib.common.rest_client [req-7b298d22-5432-48da-97ce-86c600d9e7ad ] Request (VolumesExtendV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/7920e56a09b74d638e83e25844288952/volumes/a78b027b-06ba-4a28-ad8a-dedb28cd8821 0.071s 2020-11-06 18:06:28.640 37 DEBUG tempest.lib.common.rest_client [req-7b298d22-5432-48da-97ce-86c600d9e7ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7b298d22-5432-48da-97ce-86c600d9e7ad', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/7920e56a09b74d638e83e25844288952/volumes/a78b027b-06ba-4a28-ad8a-dedb28cd8821'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:28.709 37 INFO tempest.lib.common.rest_client [req-f5fadabc-4a7f-46ef-8664-0888e1aa077a ] Request (VolumesExtendV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/7920e56a09b74d638e83e25844288952/volumes/a78b027b-06ba-4a28-ad8a-dedb28cd8821 0.067s 2020-11-06 18:06:28.709 37 DEBUG tempest.lib.common.rest_client [req-f5fadabc-4a7f-46ef-8664-0888e1aa077a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-f5fadabc-4a7f-46ef-8664-0888e1aa077a', 'content-length': '1065', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f5fadabc-4a7f-46ef-8664-0888e1aa077a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/7920e56a09b74d638e83e25844288952/volumes/a78b027b-06ba-4a28-ad8a-dedb28cd8821'} Body: b'{"volume": {"id": "a78b027b-06ba-4a28-ad8a-dedb28cd8821", "status": "deleting", "size": 2, "availability_zone": "nova", "created_at": "2020-11-06T18:06:27.000000", "updated_at": "2020-11-06T18:06:29.000000", "name": "tempest-VolumesExtendV3RbacTest-Volume-553941770", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/7920e56a09b74d638e83e25844288952/volumes/a78b027b-06ba-4a28-ad8a-dedb28cd8821"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/7920e56a09b74d638e83e25844288952/volumes/a78b027b-06ba-4a28-ad8a-dedb28cd8821"}], "user_id": "0bea20945262491cb06998f2f388a0d7", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "7920e56a09b74d638e83e25844288952"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:28.952 39 INFO tempest.lib.common.rest_client [req-888305cf-7441-4ec8-91ed-94f135b1c51f ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.458s 2020-11-06 18:06:28.952 39 DEBUG tempest.lib.common.rest_client [req-888305cf-7441-4ec8-91ed-94f135b1c51f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1728', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-888305cf-7441-4ec8-91ed-94f135b1c51f', 'x-compute-request-id': 'req-888305cf-7441-4ec8-91ed-94f135b1c51f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:28Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:26.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_prep", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:29.767 37 INFO tempest.lib.common.rest_client [req-35dcbc32-e83d-4cec-aef5-c91ce97b6c1a ] Request (VolumesExtendV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/7920e56a09b74d638e83e25844288952/volumes/a78b027b-06ba-4a28-ad8a-dedb28cd8821 0.045s 2020-11-06 18:06:29.767 37 DEBUG tempest.lib.common.rest_client [req-35dcbc32-e83d-4cec-aef5-c91ce97b6c1a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-35dcbc32-e83d-4cec-aef5-c91ce97b6c1a', 'x-openstack-request-id': 'req-35dcbc32-e83d-4cec-aef5-c91ce97b6c1a', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/7920e56a09b74d638e83e25844288952/volumes/a78b027b-06ba-4a28-ad8a-dedb28cd8821'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume a78b027b-06ba-4a28-ad8a-dedb28cd8821 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:29.905 37 INFO tempest.lib.common.rest_client [req-574069a7-5466-432f-9c34-3e13b5bd2202 ] Request (VolumesExtendV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/0bea20945262491cb06998f2f388a0d7 0.136s 2020-11-06 18:06:29.905 37 DEBUG tempest.lib.common.rest_client [req-574069a7-5466-432f-9c34-3e13b5bd2202 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-574069a7-5466-432f-9c34-3e13b5bd2202', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/0bea20945262491cb06998f2f388a0d7'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:29.989 37 INFO tempest.lib.common.rest_client [req-37d79470-ad49-46d6-a02f-ccfb0bc9c2af ] Request (VolumesExtendV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 18:06:29.989 37 DEBUG tempest.lib.common.rest_client [req-37d79470-ad49-46d6-a02f-ccfb0bc9c2af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-37d79470-ad49-46d6-a02f-ccfb0bc9c2af', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["qAtRBtlXTMOQF2zEExxVxw"], "expires_at": "2020-11-06T19:06:29.000000Z", "issued_at": "2020-11-06T18:06:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:30.213 39 INFO tempest.lib.common.rest_client [req-c28a733e-1a2e-48ef-89fe-3bf05a1689ad ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.245s 2020-11-06 18:06:30.214 39 DEBUG tempest.lib.common.rest_client [req-c28a733e-1a2e-48ef-89fe-3bf05a1689ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1728', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c28a733e-1a2e-48ef-89fe-3bf05a1689ad', 'x-compute-request-id': 'req-c28a733e-1a2e-48ef-89fe-3bf05a1689ad', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:30Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:26.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_prep", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:30.287 37 INFO tempest.lib.common.rest_client [req-6f7823f3-998f-496a-b25a-e469f93d6036 ] Request (VolumesExtendV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=7920e56a09b74d638e83e25844288952&name=default 0.297s 2020-11-06 18:06:30.288 37 DEBUG tempest.lib.common.rest_client [req-6f7823f3-998f-496a-b25a-e469f93d6036 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-6f7823f3-998f-496a-b25a-e469f93d6036', 'date': 'Fri, 06 Nov 2020 18:06:30 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=7920e56a09b74d638e83e25844288952&name=default'} Body: b'{"security_groups": [{"id": "2affd7e2-f0e6-486b-921b-ff6f7e703e42", "name": "default", "stateful": true, "tenant_id": "7920e56a09b74d638e83e25844288952", "description": "Default security group", "security_group_rules": [{"id": "1bc19fbf-5e20-4cad-809e-bf5783553aaf", "tenant_id": "7920e56a09b74d638e83e25844288952", "security_group_id": "2affd7e2-f0e6-486b-921b-ff6f7e703e42", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:06:30Z", "updated_at": "2020-11-06T18:06:30Z", "revision_number": 0, "project_id": "7920e56a09b74d638e83e25844288952"}, {"id": "85096f6f-8025-42cb-bd2b-9cb7d3b1ab42", "tenant_id": "7920e56a09b74d638e83e25844288952", "security_group_id": "2affd7e2-f0e6-486b-921b-ff6f7e703e42", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "2affd7e2-f0e6-486b-921b-ff6f7e703e42", "description": null, "tags": [], "created_at": "2020-11-06T18:06:30Z", "updated_at": "2020-11-06T18:06:30Z", "revision_number": 0, "project_id": "7920e56a09b74d638e83e25844288952"}, {"id": "b41addf1-4446-4c1d-a665-abdd68cdacae", "tenant_id": "7920e56a09b74d638e83e25844288952", "security_group_id": "2affd7e2-f0e6-486b-921b-ff6f7e703e42", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "2affd7e2-f0e6-486b-921b-ff6f7e703e42", "description": null, "tags": [], "created_at": "2020-11-06T18:06:30Z", "updated_at": "2020-11-06T18:06:30Z", "revision_number": 0, "project_id": "7920e56a09b74d638e83e25844288952"}, {"id": "fba60581-423f-43ae-be21-8d6419bc6ef1", "tenant_id": "7920e56a09b74d638e83e25844288952", "security_group_id": "2affd7e2-f0e6-486b-921b-ff6f7e703e42", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:06:30Z", "updated_at": "2020-11-06T18:06:30Z", "revision_number": 0, "project_id": "7920e56a09b74d638e83e25844288952"}], "tags": [], "created_at": "2020-11-06T18:06:30Z", "updated_at": "2020-11-06T18:06:30Z", "revision_number": 1, "project_id": "7920e56a09b74d638e83e25844288952"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:30.415 37 INFO tempest.lib.common.rest_client [req-eed4846f-ecc8-4b1a-a1fd-5a376801a313 ] Request (VolumesExtendV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/2affd7e2-f0e6-486b-921b-ff6f7e703e42 0.126s 2020-11-06 18:06:30.416 37 DEBUG tempest.lib.common.rest_client [req-eed4846f-ecc8-4b1a-a1fd-5a376801a313 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-eed4846f-ecc8-4b1a-a1fd-5a376801a313', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:06:30 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/2affd7e2-f0e6-486b-921b-ff6f7e703e42'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:30.539 37 INFO tempest.lib.common.rest_client [req-de1c0df1-78ca-49f5-bff4-a710c3240cac ] Request (VolumesExtendV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/7920e56a09b74d638e83e25844288952 0.123s 2020-11-06 18:06:30.540 37 DEBUG tempest.lib.common.rest_client [req-de1c0df1-78ca-49f5-bff4-a710c3240cac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-de1c0df1-78ca-49f5-bff4-a710c3240cac', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/7920e56a09b74d638e83e25844288952'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:31.443 39 INFO tempest.lib.common.rest_client [req-a989175f-9853-4503-ab54-be45bc4251a7 ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.212s 2020-11-06 18:06:31.443 39 DEBUG tempest.lib.common.rest_client [req-a989175f-9853-4503-ab54-be45bc4251a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1728', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a989175f-9853-4503-ab54-be45bc4251a7', 'x-compute-request-id': 'req-a989175f-9853-4503-ab54-be45bc4251a7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:30Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:26.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_prep", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:32.633 39 INFO tempest.lib.common.rest_client [req-5ba5193a-6846-4630-aa87-2d64e7fc3e86 ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.174s 2020-11-06 18:06:32.633 39 DEBUG tempest.lib.common.rest_client [req-5ba5193a-6846-4630-aa87-2d64e7fc3e86 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1733', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5ba5193a-6846-4630-aa87-2d64e7fc3e86', 'x-compute-request-id': 'req-5ba5193a-6846-4630-aa87-2d64e7fc3e86', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:31Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:26.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:32.648 39 INFO tempest.common.waiters [-] State transition "RESIZE/resize_prep" ==> "RESIZE/resize_migrating" after 4 second wait 2020-11-06 18:06:33.845 39 INFO tempest.lib.common.rest_client [req-c507243b-6844-4c5b-a2eb-97d4e5f0d025 ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.195s 2020-11-06 18:06:33.845 39 DEBUG tempest.lib.common.rest_client [req-c507243b-6844-4c5b-a2eb-97d4e5f0d025 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1733', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c507243b-6844-4c5b-a2eb-97d4e5f0d025', 'x-compute-request-id': 'req-c507243b-6844-4c5b-a2eb-97d4e5f0d025', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:31Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:26.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:35.100 39 INFO tempest.lib.common.rest_client [req-f5b037b6-64e7-4876-8657-f71d98cab2f4 ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.240s 2020-11-06 18:06:35.101 39 DEBUG tempest.lib.common.rest_client [req-f5b037b6-64e7-4876-8657-f71d98cab2f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1733', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f5b037b6-64e7-4876-8657-f71d98cab2f4', 'x-compute-request-id': 'req-f5b037b6-64e7-4876-8657-f71d98cab2f4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:31Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:26.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:36.543 39 INFO tempest.lib.common.rest_client [req-c7f630cc-ef91-40c4-896e-9d728f49e79a ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.423s 2020-11-06 18:06:36.544 39 DEBUG tempest.lib.common.rest_client [req-c7f630cc-ef91-40c4-896e-9d728f49e79a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c7f630cc-ef91-40c4-896e-9d728f49e79a', 'x-compute-request-id': 'req-c7f630cc-ef91-40c4-896e-9d728f49e79a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:26.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_migrated", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:36.556 39 INFO tempest.common.waiters [-] State transition "RESIZE/resize_migrating" ==> "RESIZE/resize_migrated" after 8 second wait 2020-11-06 18:06:37.778 39 INFO tempest.lib.common.rest_client [req-f03c2ce0-8517-46ef-a6bb-623a2fc81446 ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.220s 2020-11-06 18:06:37.779 39 DEBUG tempest.lib.common.rest_client [req-f03c2ce0-8517-46ef-a6bb-623a2fc81446 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f03c2ce0-8517-46ef-a6bb-623a2fc81446', 'x-compute-request-id': 'req-f03c2ce0-8517-46ef-a6bb-623a2fc81446', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:26.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_migrated", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:39.035 39 INFO tempest.lib.common.rest_client [req-8634c3aa-cdb7-41c5-ad82-8a67edb30b15 ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.241s 2020-11-06 18:06:39.035 39 DEBUG tempest.lib.common.rest_client [req-8634c3aa-cdb7-41c5-ad82-8a67edb30b15 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1730', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8634c3aa-cdb7-41c5-ad82-8a67edb30b15', 'x-compute-request-id': 'req-8634c3aa-cdb7-41c5-ad82-8a67edb30b15', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:38Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:26.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_finish", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:39.048 39 INFO tempest.common.waiters [-] State transition "RESIZE/resize_migrated" ==> "RESIZE/resize_finish" after 11 second wait 2020-11-06 18:06:40.259 39 INFO tempest.lib.common.rest_client [req-a1fae90d-de7c-4a2a-ac3b-09d2290e04a6 ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.209s 2020-11-06 18:06:40.259 39 DEBUG tempest.lib.common.rest_client [req-a1fae90d-de7c-4a2a-ac3b-09d2290e04a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1730', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a1fae90d-de7c-4a2a-ac3b-09d2290e04a6', 'x-compute-request-id': 'req-a1fae90d-de7c-4a2a-ac3b-09d2290e04a6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:38Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:26.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_finish", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:41.491 39 INFO tempest.lib.common.rest_client [req-e0cfa023-3ec6-4031-8fba-9bd140a48159 ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.218s 2020-11-06 18:06:41.491 39 DEBUG tempest.lib.common.rest_client [req-e0cfa023-3ec6-4031-8fba-9bd140a48159 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1727', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e0cfa023-3ec6-4031-8fba-9bd140a48159', 'x-compute-request-id': 'req-e0cfa023-3ec6-4031-8fba-9bd140a48159', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "VERIFY_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:41Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:40.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:41.505 39 INFO tempest.common.waiters [-] State transition "RESIZE/resize_finish" ==> "VERIFY_RESIZE/None" after 13 second wait 2020-11-06 18:06:41.506 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:06:41.656 39 INFO tempest.lib.common.rest_client [req-244cd1cb-6fe4-4fbc-b632-034213a129a3 ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.150s 2020-11-06 18:06:41.657 39 DEBUG tempest.lib.common.rest_client [req-244cd1cb-6fe4-4fbc-b632-034213a129a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-244cd1cb-6fe4-4fbc-b632-034213a129a3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:41.733 39 INFO tempest.lib.common.rest_client [req-0e30feb4-851e-447e-b48d-c4bc584f43b8 ] Request (ServerActionsRbacTest:test_revert_resize_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.075s 2020-11-06 18:06:41.734 39 DEBUG tempest.lib.common.rest_client [req-0e30feb4-851e-447e-b48d-c4bc584f43b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0e30feb4-851e-447e-b48d-c4bc584f43b8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["YEz6g-RVSR6ry1WqddQ2rw"], "expires_at": "2020-11-06T19:06:41.000000Z", "issued_at": "2020-11-06T18:06:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:42.093 39 INFO tempest.lib.common.rest_client [req-6a80165f-d9ef-49cf-989f-7880d6a578c6 ] Request (ServerActionsRbacTest:test_revert_resize_server): 202 POST http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b/action 0.357s 2020-11-06 18:06:42.093 39 DEBUG tempest.lib.common.rest_client [req-6a80165f-d9ef-49cf-989f-7880d6a578c6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"revertResize": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6a80165f-d9ef-49cf-989f-7880d6a578c6', 'x-compute-request-id': 'req-6a80165f-d9ef-49cf-989f-7880d6a578c6', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:42.094 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:06:42.154 39 INFO tempest.lib.common.rest_client [req-14c8eecc-9a04-4de2-b157-d28f8694fe79 ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.059s 2020-11-06 18:06:42.154 39 DEBUG tempest.lib.common.rest_client [req-14c8eecc-9a04-4de2-b157-d28f8694fe79 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-14c8eecc-9a04-4de2-b157-d28f8694fe79', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:42.186 39 INFO tempest.lib.common.rest_client [req-ac46e616-c6d5-444e-8ac7-74ec4b889dbd ] Request (ServerActionsRbacTest:test_revert_resize_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.030s 2020-11-06 18:06:42.187 39 DEBUG tempest.lib.common.rest_client [req-ac46e616-c6d5-444e-8ac7-74ec4b889dbd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ac46e616-c6d5-444e-8ac7-74ec4b889dbd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["2v8O7iWMTOqlDEU78jKEkA"], "expires_at": "2020-11-06T19:06:42.000000Z", "issued_at": "2020-11-06T18:06:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:42.691 39 INFO tempest.lib.common.rest_client [req-c3cb5867-8406-4fce-a886-ed3b9cd5fd4b ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.503s 2020-11-06 18:06:42.692 39 DEBUG tempest.lib.common.rest_client [req-c3cb5867-8406-4fce-a886-ed3b9cd5fd4b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c3cb5867-8406-4fce-a886-ed3b9cd5fd4b', 'x-compute-request-id': 'req-c3cb5867-8406-4fce-a886-ed3b9cd5fd4b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "REVERT_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:42Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:40.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_reverting", "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:43.913 39 INFO tempest.lib.common.rest_client [req-6bf92ac4-c780-4439-804b-9e2c96b29a43 ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.204s 2020-11-06 18:06:43.914 39 DEBUG tempest.lib.common.rest_client [req-6bf92ac4-c780-4439-804b-9e2c96b29a43 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6bf92ac4-c780-4439-804b-9e2c96b29a43', 'x-compute-request-id': 'req-6bf92ac4-c780-4439-804b-9e2c96b29a43', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "REVERT_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "a93eb10f-c417-43d8-812c-06039356e038", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a93eb10f-c417-43d8-812c-06039356e038"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:42Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:40.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_reverting", "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:45.164 39 INFO tempest.lib.common.rest_client [req-edca054f-3185-479b-9865-9de08e969df2 ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.234s 2020-11-06 18:06:45.165 39 DEBUG tempest.lib.common.rest_client [req-edca054f-3185-479b-9865-9de08e969df2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-edca054f-3185-479b-9865-9de08e969df2', 'x-compute-request-id': 'req-edca054f-3185-479b-9865-9de08e969df2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "REVERT_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:44Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:40.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_reverting", "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:46.396 39 INFO tempest.lib.common.rest_client [req-f31f672a-3e37-4996-aed0-d35f2f124342 ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.215s 2020-11-06 18:06:46.397 39 DEBUG tempest.lib.common.rest_client [req-f31f672a-3e37-4996-aed0-d35f2f124342 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f31f672a-3e37-4996-aed0-d35f2f124342', 'x-compute-request-id': 'req-f31f672a-3e37-4996-aed0-d35f2f124342', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "REVERT_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:44Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:40.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_reverting", "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:47.640 39 INFO tempest.lib.common.rest_client [req-c35c9f4b-cfb8-4dca-9ec9-dfdd2441c6b6 ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.227s 2020-11-06 18:06:47.641 39 DEBUG tempest.lib.common.rest_client [req-c35c9f4b-cfb8-4dca-9ec9-dfdd2441c6b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c35c9f4b-cfb8-4dca-9ec9-dfdd2441c6b6', 'x-compute-request-id': 'req-c35c9f4b-cfb8-4dca-9ec9-dfdd2441c6b6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "REVERT_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:44Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:40.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_reverting", "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:48.834 39 INFO tempest.lib.common.rest_client [req-c0dc9932-7083-4d84-99af-a6e93dc9db96 ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.176s 2020-11-06 18:06:48.834 39 DEBUG tempest.lib.common.rest_client [req-c0dc9932-7083-4d84-99af-a6e93dc9db96 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c0dc9932-7083-4d84-99af-a6e93dc9db96', 'x-compute-request-id': 'req-c0dc9932-7083-4d84-99af-a6e93dc9db96', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "REVERT_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:44Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:40.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_reverting", "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:50.085 39 INFO tempest.lib.common.rest_client [req-964db7f3-9801-4220-9c15-fb2e2806507a ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.236s 2020-11-06 18:06:50.086 39 DEBUG tempest.lib.common.rest_client [req-964db7f3-9801-4220-9c15-fb2e2806507a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-964db7f3-9801-4220-9c15-fb2e2806507a', 'x-compute-request-id': 'req-964db7f3-9801-4220-9c15-fb2e2806507a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "REVERT_RESIZE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:44Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:40.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_reverting", "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:51.271 39 INFO tempest.lib.common.rest_client [req-b3bcec84-bae4-48f5-be23-0ff30f50d901 ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.168s 2020-11-06 18:06:51.271 39 DEBUG tempest.lib.common.rest_client [req-b3bcec84-bae4-48f5-be23-0ff30f50d901 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1719', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b3bcec84-bae4-48f5-be23-0ff30f50d901', 'x-compute-request-id': 'req-b3bcec84-bae4-48f5-be23-0ff30f50d901', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:50Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:51.285 39 INFO tempest.common.waiters [-] State transition "REVERT_RESIZE/resize_reverting" ==> "ACTIVE/None" after 9 second wait 2020-11-06 18:06:52.724 39 INFO tempest.lib.common.rest_client [req-59c55350-8001-4f87-8151-5cd95f4c89ab ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 1.364s 2020-11-06 18:06:52.724 39 DEBUG tempest.lib.common.rest_client [req-59c55350-8001-4f87-8151-5cd95f4c89ab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1719', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-59c55350-8001-4f87-8151-5cd95f4c89ab', 'x-compute-request-id': 'req-59c55350-8001-4f87-8151-5cd95f4c89ab', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:50Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:52.740 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:06:52.740 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.741 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.741 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.742 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.742 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.742 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.743 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.743 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.743 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.744 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.744 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.744 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.744 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.745 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.745 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.745 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.746 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.746 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.746 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.747 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.747 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.747 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.747 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.748 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.748 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.748 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.749 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.749 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.749 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.749 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.750 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.750 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.750 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.750 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.751 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.751 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.751 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.752 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.752 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.752 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.752 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.753 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.753 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.753 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.754 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.754 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.754 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.755 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.755 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.755 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.755 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.756 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.756 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.756 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.756 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.757 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.757 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.757 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.758 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.758 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.758 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.759 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.759 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.759 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.760 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.760 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.760 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.760 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.761 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.761 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.761 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.762 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.762 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.762 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.762 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:52.764 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:detail, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:06:52.764 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:06:52.928 39 INFO tempest.lib.common.rest_client [req-4502f773-43eb-41c9-9b7d-96ca63f6e808 ] Request (ServerActionsRbacTest:test_server_detail): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.163s 2020-11-06 18:06:52.928 39 DEBUG tempest.lib.common.rest_client [req-4502f773-43eb-41c9-9b7d-96ca63f6e808 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4502f773-43eb-41c9-9b7d-96ca63f6e808', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:53.007 39 INFO tempest.lib.common.rest_client [req-ff44fe9c-a534-4b84-818f-de9010688580 ] Request (ServerActionsRbacTest:test_server_detail): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-11-06 18:06:53.008 39 DEBUG tempest.lib.common.rest_client [req-ff44fe9c-a534-4b84-818f-de9010688580 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ff44fe9c-a534-4b84-818f-de9010688580', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["hXLj6fXDQe-USDhSQskffA"], "expires_at": "2020-11-06T19:06:52.000000Z", "issued_at": "2020-11-06T18:06:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:53.499 39 INFO tempest.lib.common.rest_client [req-0ea448a7-c8bd-4cbb-824d-bd9d76a06d55 ] Request (ServerActionsRbacTest:test_server_detail): 200 GET http://172.30.13.94/compute/v2.1/servers/detail 0.490s 2020-11-06 18:06:53.500 39 DEBUG tempest.lib.common.rest_client [req-0ea448a7-c8bd-4cbb-824d-bd9d76a06d55 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1722', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0ea448a7-c8bd-4cbb-824d-bd9d76a06d55', 'x-compute-request-id': 'req-0ea448a7-c8bd-4cbb-824d-bd9d76a06d55', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/detail'} Body: b'{"servers": [{"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:50Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:50.000000", "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "security_groups": [{"name": "default"}]}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:53.514 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:06:53.572 39 INFO tempest.lib.common.rest_client [req-67d0ef71-16d8-47d2-86a3-0807a13ef267 ] Request (ServerActionsRbacTest:test_server_detail): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.058s 2020-11-06 18:06:53.573 39 DEBUG tempest.lib.common.rest_client [req-67d0ef71-16d8-47d2-86a3-0807a13ef267 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-67d0ef71-16d8-47d2-86a3-0807a13ef267', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:53.607 39 INFO tempest.lib.common.rest_client [req-7ffc3fbb-8c78-422c-b8bf-0c7c4b02fcea ] Request (ServerActionsRbacTest:test_server_detail): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:06:53.608 39 DEBUG tempest.lib.common.rest_client [req-7ffc3fbb-8c78-422c-b8bf-0c7c4b02fcea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7ffc3fbb-8c78-422c-b8bf-0c7c4b02fcea', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["63E6fHeARmisiJ9k47PKrg"], "expires_at": "2020-11-06T19:06:53.000000Z", "issued_at": "2020-11-06T18:06:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:53.864 39 INFO tempest.lib.common.rest_client [req-18286633-c21e-457e-bbfc-679662b1ce56 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.251s 2020-11-06 18:06:53.864 39 DEBUG tempest.lib.common.rest_client [req-18286633-c21e-457e-bbfc-679662b1ce56 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1719', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-18286633-c21e-457e-bbfc-679662b1ce56', 'x-compute-request-id': 'req-18286633-c21e-457e-bbfc-679662b1ce56', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:50Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:53.880 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:06:53.880 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.881 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.881 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.882 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.882 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.882 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.883 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.883 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.883 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.884 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.884 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.885 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.885 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.886 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.886 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.886 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.887 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.887 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.887 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.888 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.888 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.888 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.888 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.889 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.889 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.889 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.890 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.890 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.890 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.890 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.891 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.891 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.891 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.892 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.892 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.892 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.892 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.893 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.893 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.893 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.894 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.894 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.894 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.895 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.895 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.895 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.895 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.896 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.896 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.896 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.897 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.897 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.897 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.897 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.898 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.898 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.898 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.899 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.899 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.899 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.900 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.900 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.900 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.901 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.901 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.901 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.902 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.902 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.902 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.902 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.903 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.903 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.903 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.904 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.904 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:53.905 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:detail:get_all_tenants, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:06:53.905 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:06:53.959 39 INFO tempest.lib.common.rest_client [req-fa8a06c0-2288-40ea-a49b-e9033fdbcb87 ] Request (ServerActionsRbacTest:test_server_detail_all_tenants): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.053s 2020-11-06 18:06:53.960 39 DEBUG tempest.lib.common.rest_client [req-fa8a06c0-2288-40ea-a49b-e9033fdbcb87 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fa8a06c0-2288-40ea-a49b-e9033fdbcb87', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:53.997 39 INFO tempest.lib.common.rest_client [req-d1801d8b-4bea-4c80-8c46-38676f8e6c71 ] Request (ServerActionsRbacTest:test_server_detail_all_tenants): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:06:53.997 39 DEBUG tempest.lib.common.rest_client [req-d1801d8b-4bea-4c80-8c46-38676f8e6c71 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d1801d8b-4bea-4c80-8c46-38676f8e6c71', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["rwPGXFmVS1SPRkFSqNxhcg"], "expires_at": "2020-11-06T19:06:53.000000Z", "issued_at": "2020-11-06T18:06:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:54.421 39 INFO tempest.lib.common.rest_client [req-01df7de4-caad-4135-b89c-0a536d766468 ] Request (ServerActionsRbacTest:test_server_detail_all_tenants): 200 GET http://172.30.13.94/compute/v2.1/servers/detail?all_tenants=1 0.422s 2020-11-06 18:06:54.422 39 DEBUG tempest.lib.common.rest_client [req-01df7de4-caad-4135-b89c-0a536d766468 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '5434', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-01df7de4-caad-4135-b89c-0a536d766468', 'x-compute-request-id': 'req-01df7de4-caad-4135-b89c-0a536d766468', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/detail?all_tenants=1'} Body: b'{"servers": [{"id": "7ad836de-0883-4025-a68b-4db280af83b3", "name": "tempest-TestGettingAddress-server-1777001751", "status": "BUILD", "tenant_id": "cefed34708384eee90ecbbf903367a6e", "user_id": "65b7830ffd174d7cb6240502e2895869", "metadata": {}, "hostId": "e69664ed340114c869b82a90c982327d5ed792b564bd7cce3214e7c9", "image": {"id": "886d8440-9368-43b3-b3f7-a358cd9db453", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/886d8440-9368-43b3-b3f7-a358cd9db453"}]}, "flavor": {"id": "8739f86e-cb7c-4301-a319-8b261e804322", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8739f86e-cb7c-4301-a319-8b261e804322"}]}, "created": "2020-11-06T18:06:45Z", "updated": "2020-11-06T18:06:48Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/7ad836de-0883-4025-a68b-4db280af83b3"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/7ad836de-0883-4025-a68b-4db280af83b3"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": "tempest-TestGettingAddress-1079659041", "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033df", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [], "security_groups": [{"name": "tempest-secgroup-smoke-2094904668"}, {"name": "tempest-secgroup-smoke-2094904668"}]}, {"id": "07e67dfd-8bd2-4c6c-966a-7bd6914f1add", "name": "tempest-TestGettingAddress-server-1551452917", "status": "ACTIVE", "tenant_id": "cefed34708384eee90ecbbf903367a6e", "user_id": "65b7830ffd174d7cb6240502e2895869", "metadata": {}, "hostId": "e69664ed340114c869b82a90c982327d5ed792b564bd7cce3214e7c9", "image": {"id": "886d8440-9368-43b3-b3f7-a358cd9db453", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/886d8440-9368-43b3-b3f7-a358cd9db453"}]}, "flavor": {"id": "8739f86e-cb7c-4301-a319-8b261e804322", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8739f86e-cb7c-4301-a319-8b261e804322"}]}, "created": "2020-11-06T18:06:24Z", "updated": "2020-11-06T18:06:38Z", "addresses": {"tempest-network-smoke--743368505": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:3b:b8:66"}, {"version": 4, "addr": "172.24.4.45", "OS-EXT-IPS:type": "floating", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:3b:b8:66"}], "tempest-network-smoke--483523410": [{"version": 6, "addr": "2001:db8::f816:3eff:fef4:c91", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:f4:0c:91"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/07e67dfd-8bd2-4c6c-966a-7bd6914f1add"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/07e67dfd-8bd2-4c6c-966a-7bd6914f1add"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": "tempest-TestGettingAddress-1079659041", "OS-SRV-USG:launched_at": "2020-11-06T18:06:38.000000", "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033de", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "security_groups": [{"name": "tempest-secgroup-smoke-2094904668"}, {"name": "tempest-secgroup-smoke-2094904668"}]}, {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "link _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:54.440 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:06:54.493 39 INFO tempest.lib.common.rest_client [req-2a93f1be-8329-4ead-95fd-414de8766d0a ] Request (ServerActionsRbacTest:test_server_detail_all_tenants): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.051s 2020-11-06 18:06:54.493 39 DEBUG tempest.lib.common.rest_client [req-2a93f1be-8329-4ead-95fd-414de8766d0a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2a93f1be-8329-4ead-95fd-414de8766d0a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:54.540 39 INFO tempest.lib.common.rest_client [req-bac6ceaa-4e54-49ea-87d0-93aa05b5752c ] Request (ServerActionsRbacTest:test_server_detail_all_tenants): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-11-06 18:06:54.541 39 DEBUG tempest.lib.common.rest_client [req-bac6ceaa-4e54-49ea-87d0-93aa05b5752c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bac6ceaa-4e54-49ea-87d0-93aa05b5752c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["QCAOg_eLTjKUVQUPo3JmkQ"], "expires_at": "2020-11-06T19:06:54.000000Z", "issued_at": "2020-11-06T18:06:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:54.836 39 INFO tempest.lib.common.rest_client [req-686e0e19-cb5b-4597-af89-65de4320f60b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.288s 2020-11-06 18:06:54.837 39 DEBUG tempest.lib.common.rest_client [req-686e0e19-cb5b-4597-af89-65de4320f60b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1719', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-686e0e19-cb5b-4597-af89-65de4320f60b', 'x-compute-request-id': 'req-686e0e19-cb5b-4597-af89-65de4320f60b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:50Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:54.852 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:06:54.853 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.853 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.854 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.854 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.854 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.855 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.855 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.856 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.856 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.856 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.857 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.857 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.857 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.858 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.858 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.858 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.859 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.859 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.859 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.860 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.860 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.860 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.860 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.861 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.861 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.861 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.862 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.862 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.862 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.863 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.863 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.863 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.864 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.864 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.864 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.864 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.865 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.865 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.865 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.866 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.866 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.866 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.867 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.867 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.867 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.868 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.868 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.868 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.869 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.869 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.869 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.870 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.870 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.870 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.870 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.871 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.871 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.871 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.872 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.872 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.873 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.873 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.873 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.874 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.874 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.874 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.874 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.875 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.875 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.875 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.876 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.876 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.876 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.877 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.877 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:54.878 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:index, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:06:54.878 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:06:55.000 39 INFO tempest.lib.common.rest_client [req-0c09eb66-5be2-420d-b5a4-50abd8017ee1 ] Request (ServerActionsRbacTest:test_server_index): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.121s 2020-11-06 18:06:55.001 39 DEBUG tempest.lib.common.rest_client [req-0c09eb66-5be2-420d-b5a4-50abd8017ee1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0c09eb66-5be2-420d-b5a4-50abd8017ee1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:55.087 39 INFO tempest.lib.common.rest_client [req-53b10d65-385f-4ae0-9262-837b8baa214a ] Request (ServerActionsRbacTest:test_server_index): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:06:55.088 39 DEBUG tempest.lib.common.rest_client [req-53b10d65-385f-4ae0-9262-837b8baa214a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-53b10d65-385f-4ae0-9262-837b8baa214a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["WLdDXGJ1S-y5awA1buqLPw"], "expires_at": "2020-11-06T19:06:55.000000Z", "issued_at": "2020-11-06T18:06:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:55.378 39 INFO tempest.lib.common.rest_client [req-15bdfc77-92e3-4584-be23-9b5594b3e60c ] Request (ServerActionsRbacTest:test_server_index): 200 GET http://172.30.13.94/compute/v2.1/servers?minimal=True 0.288s 2020-11-06 18:06:55.378 39 DEBUG tempest.lib.common.rest_client [req-15bdfc77-92e3-4584-be23-9b5594b3e60c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '342', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-15bdfc77-92e3-4584-be23-9b5594b3e60c', 'x-compute-request-id': 'req-15bdfc77-92e3-4584-be23-9b5594b3e60c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers?minimal=True'} Body: b'{"servers": [{"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}]}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:55.384 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:06:55.495 39 INFO tempest.lib.common.rest_client [req-80dd5071-cc60-40a5-98a6-1bc33a84ec9d ] Request (ServerActionsRbacTest:test_server_index): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.110s 2020-11-06 18:06:55.495 39 DEBUG tempest.lib.common.rest_client [req-80dd5071-cc60-40a5-98a6-1bc33a84ec9d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-80dd5071-cc60-40a5-98a6-1bc33a84ec9d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:55.591 39 INFO tempest.lib.common.rest_client [req-01149e5d-5b82-4569-93fe-3f553cbc1313 ] Request (ServerActionsRbacTest:test_server_index): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-11-06 18:06:55.591 39 DEBUG tempest.lib.common.rest_client [req-01149e5d-5b82-4569-93fe-3f553cbc1313 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-01149e5d-5b82-4569-93fe-3f553cbc1313', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["hFgSopG2Rx2Et_xDUTF5gg"], "expires_at": "2020-11-06T19:06:55.000000Z", "issued_at": "2020-11-06T18:06:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:55.900 39 INFO tempest.lib.common.rest_client [req-43c10227-8f15-454b-a6f2-95c2b788852f ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.303s 2020-11-06 18:06:55.901 39 DEBUG tempest.lib.common.rest_client [req-43c10227-8f15-454b-a6f2-95c2b788852f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1719', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-43c10227-8f15-454b-a6f2-95c2b788852f', 'x-compute-request-id': 'req-43c10227-8f15-454b-a6f2-95c2b788852f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:50Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:55.914 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:06:55.915 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.915 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.916 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.916 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.916 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.917 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.917 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.918 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.918 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.918 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.918 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.919 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.919 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.919 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.920 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.920 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.920 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.920 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.921 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.921 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.921 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.922 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.922 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.922 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.922 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.923 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.923 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.923 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.923 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.924 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.924 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.924 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.925 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.925 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.925 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.925 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.926 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.926 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.926 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.926 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.927 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.927 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.927 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.928 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.928 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.928 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.928 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.929 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.929 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.929 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.930 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.930 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.930 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.930 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.931 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.931 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.931 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.932 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.932 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.932 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.933 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.933 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.933 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.934 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.934 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.934 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.934 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.935 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.935 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.935 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.936 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.936 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.936 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.936 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.937 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:55.938 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:index:get_all_tenants, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:06:55.939 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:06:56.098 39 INFO tempest.lib.common.rest_client [req-ce4199e3-7940-4138-aa21-b495123b0e52 ] Request (ServerActionsRbacTest:test_server_index_all_tenants): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.158s 2020-11-06 18:06:56.098 39 DEBUG tempest.lib.common.rest_client [req-ce4199e3-7940-4138-aa21-b495123b0e52 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ce4199e3-7940-4138-aa21-b495123b0e52', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:56.190 39 INFO tempest.lib.common.rest_client [req-4fcc1ca0-1f30-4cf0-a891-e0a3ac61ad69 ] Request (ServerActionsRbacTest:test_server_index_all_tenants): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-11-06 18:06:56.191 39 DEBUG tempest.lib.common.rest_client [req-4fcc1ca0-1f30-4cf0-a891-e0a3ac61ad69 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4fcc1ca0-1f30-4cf0-a891-e0a3ac61ad69', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["VUzDP-GAQXu9F2-KDDuFIw"], "expires_at": "2020-11-06T19:06:56.000000Z", "issued_at": "2020-11-06T18:06:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:56.528 39 INFO tempest.lib.common.rest_client [req-8783c5d9-786a-43b1-9c6c-cbe8cd92023b ] Request (ServerActionsRbacTest:test_server_index_all_tenants): 200 GET http://172.30.13.94/compute/v2.1/servers?minimal=True&all_tenants=1 0.336s 2020-11-06 18:06:56.529 39 DEBUG tempest.lib.common.rest_client [req-8783c5d9-786a-43b1-9c6c-cbe8cd92023b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '994', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8783c5d9-786a-43b1-9c6c-cbe8cd92023b', 'x-compute-request-id': 'req-8783c5d9-786a-43b1-9c6c-cbe8cd92023b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers?minimal=True&all_tenants=1'} Body: b'{"servers": [{"id": "7ad836de-0883-4025-a68b-4db280af83b3", "name": "tempest-TestGettingAddress-server-1777001751", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/7ad836de-0883-4025-a68b-4db280af83b3"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/7ad836de-0883-4025-a68b-4db280af83b3"}]}, {"id": "07e67dfd-8bd2-4c6c-966a-7bd6914f1add", "name": "tempest-TestGettingAddress-server-1551452917", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/07e67dfd-8bd2-4c6c-966a-7bd6914f1add"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/07e67dfd-8bd2-4c6c-966a-7bd6914f1add"}]}, {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}]}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:56.535 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:06:56.641 39 INFO tempest.lib.common.rest_client [req-a2a42833-13e2-4df0-b8ff-36985e96d19b ] Request (ServerActionsRbacTest:test_server_index_all_tenants): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.105s 2020-11-06 18:06:56.642 39 DEBUG tempest.lib.common.rest_client [req-a2a42833-13e2-4df0-b8ff-36985e96d19b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a2a42833-13e2-4df0-b8ff-36985e96d19b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:56.751 39 INFO tempest.lib.common.rest_client [req-9919b619-6a76-4634-a341-9df3ce5c5fb1 ] Request (ServerActionsRbacTest:test_server_index_all_tenants): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.108s 2020-11-06 18:06:56.752 39 DEBUG tempest.lib.common.rest_client [req-9919b619-6a76-4634-a341-9df3ce5c5fb1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9919b619-6a76-4634-a341-9df3ce5c5fb1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["Nn_3zgG6TvWn7lXAa1rVUg"], "expires_at": "2020-11-06T19:06:56.000000Z", "issued_at": "2020-11-06T18:06:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:57.084 39 INFO tempest.lib.common.rest_client [req-1473bfcc-51f2-44f2-81da-fc60ae87cf2b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.327s 2020-11-06 18:06:57.084 39 DEBUG tempest.lib.common.rest_client [req-1473bfcc-51f2-44f2-81da-fc60ae87cf2b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1719', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1473bfcc-51f2-44f2-81da-fc60ae87cf2b', 'x-compute-request-id': 'req-1473bfcc-51f2-44f2-81da-fc60ae87cf2b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:50Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:57.100 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:06:57.101 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.101 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.101 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.102 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.102 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.102 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.103 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.103 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.103 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.104 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.104 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.104 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.105 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.105 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.105 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.105 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.106 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.106 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.106 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.107 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.107 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.107 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.108 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.108 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.108 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.108 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.109 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.109 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.109 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.110 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.110 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.110 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.110 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.111 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.111 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.111 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.111 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.112 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.112 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.112 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.113 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.113 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.113 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.114 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.114 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.114 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.114 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.115 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.115 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.115 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.116 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.116 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.116 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.116 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.117 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.117 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.117 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.118 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.118 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.118 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.119 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.119 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.119 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.120 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.120 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.120 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.120 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.121 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.121 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.122 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.122 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.122 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.123 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.123 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.124 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:06:57.125 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-shelve:shelve, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:06:57.125 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:06:57.176 39 INFO tempest.lib.common.rest_client [req-0b69fb41-2f75-4d09-8f67-340b1d76e0cd ] Request (ServerActionsRbacTest:test_shelve_server): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.050s 2020-11-06 18:06:57.176 39 DEBUG tempest.lib.common.rest_client [req-0b69fb41-2f75-4d09-8f67-340b1d76e0cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0b69fb41-2f75-4d09-8f67-340b1d76e0cd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:57.210 39 INFO tempest.lib.common.rest_client [req-c1b17cb6-c261-4ead-80b4-a2a6abea1d71 ] Request (ServerActionsRbacTest:test_shelve_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:06:57.211 39 DEBUG tempest.lib.common.rest_client [req-c1b17cb6-c261-4ead-80b4-a2a6abea1d71 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c1b17cb6-c261-4ead-80b4-a2a6abea1d71', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["kaB_1LJ6RWm-ORoxXeZMcg"], "expires_at": "2020-11-06T19:06:57.000000Z", "issued_at": "2020-11-06T18:06:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:57.586 39 INFO tempest.lib.common.rest_client [req-ed9b8da9-d0c2-4b2e-a25d-91873932aa48 ] Request (ServerActionsRbacTest:test_shelve_server): 202 POST http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b/action 0.373s 2020-11-06 18:06:57.586 39 DEBUG tempest.lib.common.rest_client [req-ed9b8da9-d0c2-4b2e-a25d-91873932aa48 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"shelve": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ed9b8da9-d0c2-4b2e-a25d-91873932aa48', 'x-compute-request-id': 'req-ed9b8da9-d0c2-4b2e-a25d-91873932aa48', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:57.785 39 INFO tempest.lib.common.rest_client [req-93c0c569-5f28-4955-9ff4-099a7c70759a ] Request (ServerActionsRbacTest:test_shelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.197s 2020-11-06 18:06:57.786 39 DEBUG tempest.lib.common.rest_client [req-93c0c569-5f28-4955-9ff4-099a7c70759a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1725', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-93c0c569-5f28-4955-9ff4-099a7c70759a', 'x-compute-request-id': 'req-93c0c569-5f28-4955-9ff4-099a7c70759a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:57Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "shelving", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:59.033 39 INFO tempest.lib.common.rest_client [req-f65a2f58-dc7f-4c5f-a8c8-d1ace95ba719 ] Request (ServerActionsRbacTest:test_shelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.230s 2020-11-06 18:06:59.034 39 DEBUG tempest.lib.common.rest_client [req-f65a2f58-dc7f-4c5f-a8c8-d1ace95ba719 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:06:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1746', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f65a2f58-dc7f-4c5f-a8c8-d1ace95ba719', 'x-compute-request-id': 'req-f65a2f58-dc7f-4c5f-a8c8-d1ace95ba719', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:58Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "shelving_image_pending_upload", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:06:59.044 39 INFO tempest.common.waiters [-] State transition "ACTIVE/shelving" ==> "ACTIVE/shelving_image_pending_upload" after 2 second wait 2020-11-06 18:07:00.254 39 INFO tempest.lib.common.rest_client [req-cd7856b7-e4da-4967-a8ab-54a40fe519c1 ] Request (ServerActionsRbacTest:test_shelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.209s 2020-11-06 18:07:00.255 39 DEBUG tempest.lib.common.rest_client [req-cd7856b7-e4da-4967-a8ab-54a40fe519c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1741', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cd7856b7-e4da-4967-a8ab-54a40fe519c1', 'x-compute-request-id': 'req-cd7856b7-e4da-4967-a8ab-54a40fe519c1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:59Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "shelving_image_uploading", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:00.267 39 INFO tempest.common.waiters [-] State transition "ACTIVE/shelving_image_pending_upload" ==> "ACTIVE/shelving_image_uploading" after 3 second wait 2020-11-06 18:07:01.761 39 INFO tempest.lib.common.rest_client [req-4be71de1-3951-402e-b825-f0075662f240 ] Request (ServerActionsRbacTest:test_shelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.492s 2020-11-06 18:07:01.762 39 DEBUG tempest.lib.common.rest_client [req-4be71de1-3951-402e-b825-f0075662f240 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1741', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4be71de1-3951-402e-b825-f0075662f240', 'x-compute-request-id': 'req-4be71de1-3951-402e-b825-f0075662f240', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:59Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "shelving_image_uploading", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:03.032 39 INFO tempest.lib.common.rest_client [req-a5a4730d-ef48-4089-830d-1dd1ae3e1564 ] Request (ServerActionsRbacTest:test_shelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.254s 2020-11-06 18:07:03.032 39 DEBUG tempest.lib.common.rest_client [req-a5a4730d-ef48-4089-830d-1dd1ae3e1564 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1741', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a5a4730d-ef48-4089-830d-1dd1ae3e1564', 'x-compute-request-id': 'req-a5a4730d-ef48-4089-830d-1dd1ae3e1564', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:59Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "shelving_image_uploading", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:04.268 39 INFO tempest.lib.common.rest_client [req-4d8ed02f-b1cd-4f1e-8ba4-9b7f6ed45d3e ] Request (ServerActionsRbacTest:test_shelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.224s 2020-11-06 18:07:04.269 39 DEBUG tempest.lib.common.rest_client [req-4d8ed02f-b1cd-4f1e-8ba4-9b7f6ed45d3e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1741', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4d8ed02f-b1cd-4f1e-8ba4-9b7f6ed45d3e', 'x-compute-request-id': 'req-4d8ed02f-b1cd-4f1e-8ba4-9b7f6ed45d3e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:59Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "shelving_image_uploading", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:05.536 39 INFO tempest.lib.common.rest_client [req-eba71975-cee2-4a5d-b77c-de13e3d33215 ] Request (ServerActionsRbacTest:test_shelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.251s 2020-11-06 18:07:05.537 39 DEBUG tempest.lib.common.rest_client [req-eba71975-cee2-4a5d-b77c-de13e3d33215 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1741', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-eba71975-cee2-4a5d-b77c-de13e3d33215', 'x-compute-request-id': 'req-eba71975-cee2-4a5d-b77c-de13e3d33215', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:06:59Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "shelving_image_uploading", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:06.816 39 INFO tempest.lib.common.rest_client [req-964592e9-390a-416a-9cf1-a0f159ff3825 ] Request (ServerActionsRbacTest:test_shelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.262s 2020-11-06 18:07:06.816 39 DEBUG tempest.lib.common.rest_client [req-964592e9-390a-416a-9cf1-a0f159ff3825 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1723', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-964592e9-390a-416a-9cf1-a0f159ff3825', 'x-compute-request-id': 'req-964592e9-390a-416a-9cf1-a0f159ff3825', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHELVED", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:06Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "shelving_offloading", "OS-EXT-STS:vm_state": "shelved", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:06.832 39 INFO tempest.common.waiters [-] State transition "ACTIVE/shelving_image_uploading" ==> "SHELVED/shelving_offloading" after 9 second wait 2020-11-06 18:07:08.042 39 INFO tempest.lib.common.rest_client [req-c7a11dc3-e5de-4363-b995-7f23660ac54a ] Request (ServerActionsRbacTest:test_shelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.209s 2020-11-06 18:07:08.043 39 DEBUG tempest.lib.common.rest_client [req-c7a11dc3-e5de-4363-b995-7f23660ac54a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1648', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c7a11dc3-e5de-4363-b995-7f23660ac54a', 'x-compute-request-id': 'req-c7a11dc3-e5de-4363-b995-7f23660ac54a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHELVED_OFFLOADED", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:08.055 39 INFO tempest.common.waiters [-] State transition "SHELVED/shelving_offloading" ==> "SHELVED_OFFLOADED/None" after 11 second wait 2020-11-06 18:07:08.056 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:07:08.239 39 INFO tempest.lib.common.rest_client [req-d3c2d98f-ea41-4315-9447-b5d02642af5c ] Request (ServerActionsRbacTest:test_shelve_server): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.183s 2020-11-06 18:07:08.240 39 DEBUG tempest.lib.common.rest_client [req-d3c2d98f-ea41-4315-9447-b5d02642af5c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d3c2d98f-ea41-4315-9447-b5d02642af5c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:08.326 39 INFO tempest.lib.common.rest_client [req-a0c4a583-ff25-4f90-9732-6f6ba652333c ] Request (ServerActionsRbacTest:test_shelve_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:07:08.327 39 DEBUG tempest.lib.common.rest_client [req-a0c4a583-ff25-4f90-9732-6f6ba652333c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a0c4a583-ff25-4f90-9732-6f6ba652333c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["f9aJy4EHTQquy1MCrrcLJw"], "expires_at": "2020-11-06T19:07:08.000000Z", "issued_at": "2020-11-06T18:07:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:08.779 39 INFO tempest.lib.common.rest_client [req-8767158e-135a-4d86-9762-cea98779681f ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.450s 2020-11-06 18:07:08.780 39 DEBUG tempest.lib.common.rest_client [req-8767158e-135a-4d86-9762-cea98779681f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1648', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8767158e-135a-4d86-9762-cea98779681f', 'x-compute-request-id': 'req-8767158e-135a-4d86-9762-cea98779681f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHELVED_OFFLOADED", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:07Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:09.245 39 INFO tempest.lib.common.rest_client [req-d0a32e00-826e-46b8-8729-900a23fea7cb ] Request (ServerActionsRbacTest:_run_cleanups): 202 POST http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b/action 0.449s 2020-11-06 18:07:09.245 39 DEBUG tempest.lib.common.rest_client [req-d0a32e00-826e-46b8-8729-900a23fea7cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"unshelve": null} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d0a32e00-826e-46b8-8729-900a23fea7cb', 'x-compute-request-id': 'req-d0a32e00-826e-46b8-8729-900a23fea7cb', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:09.512 39 INFO tempest.lib.common.rest_client [req-43d8977d-4130-4933-b956-7c15b59afffb ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.256s 2020-11-06 18:07:09.513 39 DEBUG tempest.lib.common.rest_client [req-43d8977d-4130-4933-b956-7c15b59afffb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1656', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-43d8977d-4130-4933-b956-7c15b59afffb', 'x-compute-request-id': 'req-43d8977d-4130-4933-b956-7c15b59afffb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHELVED_OFFLOADED", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:09Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "unshelving", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:10.772 39 INFO tempest.lib.common.rest_client [req-e53d3804-5fa5-4bf5-ab4e-0a2619acfb2f ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.243s 2020-11-06 18:07:10.773 39 DEBUG tempest.lib.common.rest_client [req-e53d3804-5fa5-4bf5-ab4e-0a2619acfb2f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1658', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e53d3804-5fa5-4bf5-ab4e-0a2619acfb2f', 'x-compute-request-id': 'req-e53d3804-5fa5-4bf5-ab4e-0a2619acfb2f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHELVED_OFFLOADED", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:10Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:10.788 39 INFO tempest.common.waiters [-] State transition "SHELVED_OFFLOADED/unshelving" ==> "SHELVED_OFFLOADED/spawning" after 1 second wait 2020-11-06 18:07:12.003 39 INFO tempest.lib.common.rest_client [req-9bfda257-79dd-4c05-b2ec-9ffce076499a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.212s 2020-11-06 18:07:12.003 39 DEBUG tempest.lib.common.rest_client [req-9bfda257-79dd-4c05-b2ec-9ffce076499a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9bfda257-79dd-4c05-b2ec-9ffce076499a', 'x-compute-request-id': 'req-9bfda257-79dd-4c05-b2ec-9ffce076499a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHELVED_OFFLOADED", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "8eca6a79-7829-4175-9fd1-29f6c1fe864a", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/8eca6a79-7829-4175-9fd1-29f6c1fe864a"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:11Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:13.245 39 INFO tempest.lib.common.rest_client [req-3a6d9829-f368-402f-9d80-c4213a1e821e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.225s 2020-11-06 18:07:13.246 39 DEBUG tempest.lib.common.rest_client [req-3a6d9829-f368-402f-9d80-c4213a1e821e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3a6d9829-f368-402f-9d80-c4213a1e821e', 'x-compute-request-id': 'req-3a6d9829-f368-402f-9d80-c4213a1e821e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHELVED_OFFLOADED", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "8eca6a79-7829-4175-9fd1-29f6c1fe864a", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/8eca6a79-7829-4175-9fd1-29f6c1fe864a"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:11Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:14.978 39 INFO tempest.lib.common.rest_client [req-eeca3d5b-f437-4051-af99-dcbabb92fdd2 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.716s 2020-11-06 18:07:14.979 39 DEBUG tempest.lib.common.rest_client [req-eeca3d5b-f437-4051-af99-dcbabb92fdd2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-eeca3d5b-f437-4051-af99-dcbabb92fdd2', 'x-compute-request-id': 'req-eeca3d5b-f437-4051-af99-dcbabb92fdd2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHELVED_OFFLOADED", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "8eca6a79-7829-4175-9fd1-29f6c1fe864a", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/8eca6a79-7829-4175-9fd1-29f6c1fe864a"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:11Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:17.460 39 INFO tempest.lib.common.rest_client [req-730aa17c-871f-42f1-b588-c31b568c6510 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 1.466s 2020-11-06 18:07:17.461 39 DEBUG tempest.lib.common.rest_client [req-730aa17c-871f-42f1-b588-c31b568c6510 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-730aa17c-871f-42f1-b588-c31b568c6510', 'x-compute-request-id': 'req-730aa17c-871f-42f1-b588-c31b568c6510', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHELVED_OFFLOADED", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "8eca6a79-7829-4175-9fd1-29f6c1fe864a", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/8eca6a79-7829-4175-9fd1-29f6c1fe864a"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:11Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:18.706 39 INFO tempest.lib.common.rest_client [req-1d06cf28-f1a0-4d30-93ba-cca6fcc9811a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.229s 2020-11-06 18:07:18.707 39 DEBUG tempest.lib.common.rest_client [req-1d06cf28-f1a0-4d30-93ba-cca6fcc9811a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1d06cf28-f1a0-4d30-93ba-cca6fcc9811a', 'x-compute-request-id': 'req-1d06cf28-f1a0-4d30-93ba-cca6fcc9811a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHELVED_OFFLOADED", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "8eca6a79-7829-4175-9fd1-29f6c1fe864a", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/8eca6a79-7829-4175-9fd1-29f6c1fe864a"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:11Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:19.948 39 INFO tempest.lib.common.rest_client [req-db00fa19-050c-4d5b-a37b-5df8296bb1a4 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.225s 2020-11-06 18:07:19.949 39 DEBUG tempest.lib.common.rest_client [req-db00fa19-050c-4d5b-a37b-5df8296bb1a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-db00fa19-050c-4d5b-a37b-5df8296bb1a4', 'x-compute-request-id': 'req-db00fa19-050c-4d5b-a37b-5df8296bb1a4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHELVED_OFFLOADED", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "8eca6a79-7829-4175-9fd1-29f6c1fe864a", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/8eca6a79-7829-4175-9fd1-29f6c1fe864a"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:11Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:21.170 39 INFO tempest.lib.common.rest_client [req-ed6138b8-d25b-47d9-b889-f25942b54510 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.206s 2020-11-06 18:07:21.171 39 DEBUG tempest.lib.common.rest_client [req-ed6138b8-d25b-47d9-b889-f25942b54510 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ed6138b8-d25b-47d9-b889-f25942b54510', 'x-compute-request-id': 'req-ed6138b8-d25b-47d9-b889-f25942b54510', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHELVED_OFFLOADED", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "8eca6a79-7829-4175-9fd1-29f6c1fe864a", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/8eca6a79-7829-4175-9fd1-29f6c1fe864a"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:11Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:22.393 39 INFO tempest.lib.common.rest_client [req-6a4cf8a2-3d04-48b1-9e5f-a84e58d96173 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.205s 2020-11-06 18:07:22.393 39 DEBUG tempest.lib.common.rest_client [req-6a4cf8a2-3d04-48b1-9e5f-a84e58d96173 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6a4cf8a2-3d04-48b1-9e5f-a84e58d96173', 'x-compute-request-id': 'req-6a4cf8a2-3d04-48b1-9e5f-a84e58d96173', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHELVED_OFFLOADED", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "8eca6a79-7829-4175-9fd1-29f6c1fe864a", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/8eca6a79-7829-4175-9fd1-29f6c1fe864a"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:11Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:23.622 39 INFO tempest.lib.common.rest_client [req-02e28843-2ee9-4247-8c7b-8e039997d336 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.212s 2020-11-06 18:07:23.623 39 DEBUG tempest.lib.common.rest_client [req-02e28843-2ee9-4247-8c7b-8e039997d336 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-02e28843-2ee9-4247-8c7b-8e039997d336', 'x-compute-request-id': 'req-02e28843-2ee9-4247-8c7b-8e039997d336', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHELVED_OFFLOADED", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "8eca6a79-7829-4175-9fd1-29f6c1fe864a", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/8eca6a79-7829-4175-9fd1-29f6c1fe864a"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:11Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:24.850 39 INFO tempest.lib.common.rest_client [req-f680818f-6eb2-4a71-b044-4767be99c121 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.211s 2020-11-06 18:07:24.851 39 DEBUG tempest.lib.common.rest_client [req-f680818f-6eb2-4a71-b044-4767be99c121 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f680818f-6eb2-4a71-b044-4767be99c121', 'x-compute-request-id': 'req-f680818f-6eb2-4a71-b044-4767be99c121', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHELVED_OFFLOADED", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "8eca6a79-7829-4175-9fd1-29f6c1fe864a", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/8eca6a79-7829-4175-9fd1-29f6c1fe864a"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:11Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:06:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:26.066 39 INFO tempest.lib.common.rest_client [req-e6c1a37c-75b9-49c7-8152-39c78d6a5b0c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.201s 2020-11-06 18:07:26.067 39 DEBUG tempest.lib.common.rest_client [req-e6c1a37c-75b9-49c7-8152-39c78d6a5b0c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1719', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e6c1a37c-75b9-49c7-8152-39c78d6a5b0c', 'x-compute-request-id': 'req-e6c1a37c-75b9-49c7-8152-39c78d6a5b0c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:25Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:26.077 39 INFO tempest.common.waiters [-] State transition "SHELVED_OFFLOADED/spawning" ==> "ACTIVE/None" after 17 second wait 2020-11-06 18:07:26.077 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:07:26.078 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.079 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.079 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.080 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.081 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.081 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.081 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.082 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.082 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.082 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.083 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.083 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.083 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.084 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.084 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.084 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.085 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.085 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.085 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.086 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.086 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.086 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.087 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.087 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.087 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.087 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.088 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.088 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.088 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.089 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.089 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.089 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.090 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.090 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.090 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.091 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.091 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.091 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.091 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.092 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.092 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.092 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.093 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.093 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.093 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.094 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.094 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.094 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.095 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.095 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.095 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.096 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.096 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.096 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.096 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.097 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.097 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.097 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.098 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.098 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.099 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.099 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.099 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.099 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.100 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.100 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.100 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.101 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.101 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.101 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.102 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.102 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.102 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.102 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.103 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:26.104 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:show, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:07:26.104 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:07:26.275 39 INFO tempest.lib.common.rest_client [req-63889d44-d4c1-48b9-976a-86e7b1186cda ] Request (ServerActionsRbacTest:test_show_server): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.170s 2020-11-06 18:07:26.276 39 DEBUG tempest.lib.common.rest_client [req-63889d44-d4c1-48b9-976a-86e7b1186cda ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-63889d44-d4c1-48b9-976a-86e7b1186cda', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:26.361 39 INFO tempest.lib.common.rest_client [req-d9861cd2-0670-46ff-bd8b-89c9e18a524e ] Request (ServerActionsRbacTest:test_show_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-11-06 18:07:26.362 39 DEBUG tempest.lib.common.rest_client [req-d9861cd2-0670-46ff-bd8b-89c9e18a524e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d9861cd2-0670-46ff-bd8b-89c9e18a524e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["1vqdvX7WR4icap75lu4idQ"], "expires_at": "2020-11-06T19:07:26.000000Z", "issued_at": "2020-11-06T18:07:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:26.698 39 INFO tempest.lib.common.rest_client [req-b7465aea-fe02-4fc7-b3ec-d5baf24b891f ] Request (ServerActionsRbacTest:test_show_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.335s 2020-11-06 18:07:26.699 39 DEBUG tempest.lib.common.rest_client [req-b7465aea-fe02-4fc7-b3ec-d5baf24b891f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1719', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b7465aea-fe02-4fc7-b3ec-d5baf24b891f', 'x-compute-request-id': 'req-b7465aea-fe02-4fc7-b3ec-d5baf24b891f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:25Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:26.715 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:07:26.781 39 INFO tempest.lib.common.rest_client [req-5d02ec5e-5f0a-4d75-87a6-3680d673bc7f ] Request (ServerActionsRbacTest:test_show_server): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.065s 2020-11-06 18:07:26.782 39 DEBUG tempest.lib.common.rest_client [req-5d02ec5e-5f0a-4d75-87a6-3680d673bc7f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5d02ec5e-5f0a-4d75-87a6-3680d673bc7f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:26.826 39 INFO tempest.lib.common.rest_client [req-0888808b-e060-47de-a2f1-efff741da8b7 ] Request (ServerActionsRbacTest:test_show_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-11-06 18:07:26.827 39 DEBUG tempest.lib.common.rest_client [req-0888808b-e060-47de-a2f1-efff741da8b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0888808b-e060-47de-a2f1-efff741da8b7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["tAjEEY9vTsC-v4-yucXcPQ"], "expires_at": "2020-11-06T19:07:26.000000Z", "issued_at": "2020-11-06T18:07:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:27.173 39 INFO tempest.lib.common.rest_client [req-d8f0e9f7-b216-4bd9-9524-2690b73cc0da ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.334s 2020-11-06 18:07:27.174 39 DEBUG tempest.lib.common.rest_client [req-d8f0e9f7-b216-4bd9-9524-2690b73cc0da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1719', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d8f0e9f7-b216-4bd9-9524-2690b73cc0da', 'x-compute-request-id': 'req-d8f0e9f7-b216-4bd9-9524-2690b73cc0da', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:25Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:27.186 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:07:27.187 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.187 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.188 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.188 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.188 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.189 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.189 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.190 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.190 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.190 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.191 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.191 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.191 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.192 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.192 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.192 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.193 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.193 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.193 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.194 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.194 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.194 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.195 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.195 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.195 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.196 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.196 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.196 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.197 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.197 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.197 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.198 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.198 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.198 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.199 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.199 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.199 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.199 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.200 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.200 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.200 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.201 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.201 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.201 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.202 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.202 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.202 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.203 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.203 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.203 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.204 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.204 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.204 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.205 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.205 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.205 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.206 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.206 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.206 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.207 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.207 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.208 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.208 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.208 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.209 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.209 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.209 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.210 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.210 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.210 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.210 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.211 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.211 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.211 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.212 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:27.213 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:start, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:07:27.401 39 INFO tempest.lib.common.rest_client [req-8926cead-d398-41a5-80f5-bba3801b5236 ] Request (ServerActionsRbacTest:test_start_server): 202 POST http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b/action 0.187s 2020-11-06 18:07:27.402 39 DEBUG tempest.lib.common.rest_client [req-8926cead-d398-41a5-80f5-bba3801b5236 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-stop": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8926cead-d398-41a5-80f5-bba3801b5236', 'x-compute-request-id': 'req-8926cead-d398-41a5-80f5-bba3801b5236', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:27.590 39 INFO tempest.lib.common.rest_client [req-70922e24-9e48-4812-a7a8-80ec3c0ec91d ] Request (ServerActionsRbacTest:test_start_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.187s 2020-11-06 18:07:27.590 39 DEBUG tempest.lib.common.rest_client [req-70922e24-9e48-4812-a7a8-80ec3c0ec91d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1729', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-70922e24-9e48-4812-a7a8-80ec3c0ec91d', 'x-compute-request-id': 'req-70922e24-9e48-4812-a7a8-80ec3c0ec91d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:27Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "powering-off", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:28.842 39 INFO tempest.lib.common.rest_client [req-917ae98a-d0d4-4a84-8390-7d33e9e8e159 ] Request (ServerActionsRbacTest:test_start_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.235s 2020-11-06 18:07:28.843 39 DEBUG tempest.lib.common.rest_client [req-917ae98a-d0d4-4a84-8390-7d33e9e8e159 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-917ae98a-d0d4-4a84-8390-7d33e9e8e159', 'x-compute-request-id': 'req-917ae98a-d0d4-4a84-8390-7d33e9e8e159', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:28Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:28.857 39 INFO tempest.common.waiters [-] State transition "ACTIVE/powering-off" ==> "SHUTOFF/None" after 1 second wait 2020-11-06 18:07:28.858 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:07:28.911 39 INFO tempest.lib.common.rest_client [req-3e91d152-3502-4511-8bfc-1b6e9ef10169 ] Request (ServerActionsRbacTest:test_start_server): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.053s 2020-11-06 18:07:28.912 39 DEBUG tempest.lib.common.rest_client [req-3e91d152-3502-4511-8bfc-1b6e9ef10169 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3e91d152-3502-4511-8bfc-1b6e9ef10169', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:28.948 39 INFO tempest.lib.common.rest_client [req-db070d84-000a-4366-99f7-1660746e29ea ] Request (ServerActionsRbacTest:test_start_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:07:28.949 39 DEBUG tempest.lib.common.rest_client [req-db070d84-000a-4366-99f7-1660746e29ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-db070d84-000a-4366-99f7-1660746e29ea', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["FJOnMzoeR-SzfAVJVJx3Nw"], "expires_at": "2020-11-06T19:07:28.000000Z", "issued_at": "2020-11-06T18:07:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:29.198 39 INFO tempest.lib.common.rest_client [req-66c9927b-9314-4dc0-b772-81577134f314 ] Request (ServerActionsRbacTest:test_start_server): 202 POST http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b/action 0.248s 2020-11-06 18:07:29.199 39 DEBUG tempest.lib.common.rest_client [req-66c9927b-9314-4dc0-b772-81577134f314 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-start": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-66c9927b-9314-4dc0-b772-81577134f314', 'x-compute-request-id': 'req-66c9927b-9314-4dc0-b772-81577134f314', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:29.199 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:07:29.257 39 INFO tempest.lib.common.rest_client [req-e9f73d8c-e11d-4de9-b968-ae7f6052579a ] Request (ServerActionsRbacTest:test_start_server): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.056s 2020-11-06 18:07:29.258 39 DEBUG tempest.lib.common.rest_client [req-e9f73d8c-e11d-4de9-b968-ae7f6052579a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e9f73d8c-e11d-4de9-b968-ae7f6052579a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:29.298 39 INFO tempest.lib.common.rest_client [req-308b842a-4591-434b-938e-fcb9e9d2a531 ] Request (ServerActionsRbacTest:test_start_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:07:29.299 39 DEBUG tempest.lib.common.rest_client [req-308b842a-4591-434b-938e-fcb9e9d2a531 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-308b842a-4591-434b-938e-fcb9e9d2a531', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["QHcSy2vjTRCPQgLhGH1AIQ"], "expires_at": "2020-11-06T19:07:29.000000Z", "issued_at": "2020-11-06T18:07:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:29.567 39 INFO tempest.lib.common.rest_client [req-b07b9110-7ecb-4ec2-b5fb-3f376967ecb1 ] Request (ServerActionsRbacTest:test_start_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.267s 2020-11-06 18:07:29.568 39 DEBUG tempest.lib.common.rest_client [req-b07b9110-7ecb-4ec2-b5fb-3f376967ecb1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1715', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b07b9110-7ecb-4ec2-b5fb-3f376967ecb1', 'x-compute-request-id': 'req-b07b9110-7ecb-4ec2-b5fb-3f376967ecb1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:29Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "powering-on", "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:30.802 39 INFO tempest.lib.common.rest_client [req-a9267ee2-182b-4497-aff8-a4651a59c7f2 ] Request (ServerActionsRbacTest:test_start_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.217s 2020-11-06 18:07:30.803 39 DEBUG tempest.lib.common.rest_client [req-a9267ee2-182b-4497-aff8-a4651a59c7f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1715', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a9267ee2-182b-4497-aff8-a4651a59c7f2', 'x-compute-request-id': 'req-a9267ee2-182b-4497-aff8-a4651a59c7f2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:29Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "powering-on", "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:32.027 39 INFO tempest.lib.common.rest_client [req-58ce8716-6f46-4fba-8999-dd6e07870284 ] Request (ServerActionsRbacTest:test_start_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.207s 2020-11-06 18:07:32.028 39 DEBUG tempest.lib.common.rest_client [req-58ce8716-6f46-4fba-8999-dd6e07870284 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1715', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-58ce8716-6f46-4fba-8999-dd6e07870284', 'x-compute-request-id': 'req-58ce8716-6f46-4fba-8999-dd6e07870284', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:29Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "powering-on", "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:33.259 39 INFO tempest.lib.common.rest_client [req-191e1019-3a37-4a48-9777-22fbb5ad2583 ] Request (ServerActionsRbacTest:test_start_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.213s 2020-11-06 18:07:33.259 39 DEBUG tempest.lib.common.rest_client [req-191e1019-3a37-4a48-9777-22fbb5ad2583 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1719', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-191e1019-3a37-4a48-9777-22fbb5ad2583', 'x-compute-request-id': 'req-191e1019-3a37-4a48-9777-22fbb5ad2583', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:32Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:33.274 39 INFO tempest.common.waiters [-] State transition "SHUTOFF/powering-on" ==> "ACTIVE/None" after 4 second wait 2020-11-06 18:07:33.704 39 INFO tempest.lib.common.rest_client [req-64811fd9-7072-4dc7-bfe0-7a302fcd2468 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.422s 2020-11-06 18:07:33.704 39 DEBUG tempest.lib.common.rest_client [req-64811fd9-7072-4dc7-bfe0-7a302fcd2468 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1719', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-64811fd9-7072-4dc7-bfe0-7a302fcd2468', 'x-compute-request-id': 'req-64811fd9-7072-4dc7-bfe0-7a302fcd2468', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:32Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:33.720 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:07:33.721 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.721 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.722 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.722 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.722 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.723 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.723 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.724 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.724 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.724 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.725 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.725 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.725 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.726 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.726 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.726 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.727 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.727 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.727 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.728 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.728 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.728 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.729 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.729 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.729 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.729 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.730 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.730 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.730 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.731 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.731 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.731 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.732 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.732 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.732 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.733 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.733 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.733 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.733 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.734 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.734 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.734 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.735 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.735 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.735 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.736 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.736 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.736 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.737 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.737 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.737 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.738 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.738 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.738 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.738 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.739 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.739 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.739 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.740 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.740 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.741 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.741 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.741 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.742 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.742 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.742 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.742 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.743 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.743 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.743 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.744 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.744 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.744 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.745 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.745 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:07:33.746 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:stop, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:07:33.746 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:07:33.802 39 INFO tempest.lib.common.rest_client [req-86c6a160-48b6-4d4a-ab96-ab184d9db660 ] Request (ServerActionsRbacTest:test_stop_server): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.055s 2020-11-06 18:07:33.802 39 DEBUG tempest.lib.common.rest_client [req-86c6a160-48b6-4d4a-ab96-ab184d9db660 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-86c6a160-48b6-4d4a-ab96-ab184d9db660', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:33.839 39 INFO tempest.lib.common.rest_client [req-95e22ff3-51c1-49ee-a828-6569319d1820 ] Request (ServerActionsRbacTest:test_stop_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:07:33.839 39 DEBUG tempest.lib.common.rest_client [req-95e22ff3-51c1-49ee-a828-6569319d1820 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-95e22ff3-51c1-49ee-a828-6569319d1820', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["XTT0GEFuRwOvyeuBVf1AuQ"], "expires_at": "2020-11-06T19:07:33.000000Z", "issued_at": "2020-11-06T18:07:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:34.322 39 INFO tempest.lib.common.rest_client [req-5a61287e-59eb-418c-abf1-1f339b79b055 ] Request (ServerActionsRbacTest:test_stop_server): 202 POST http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b/action 0.481s 2020-11-06 18:07:34.323 39 DEBUG tempest.lib.common.rest_client [req-5a61287e-59eb-418c-abf1-1f339b79b055 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-stop": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5a61287e-59eb-418c-abf1-1f339b79b055', 'x-compute-request-id': 'req-5a61287e-59eb-418c-abf1-1f339b79b055', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:35.692 39 INFO tempest.lib.common.rest_client [req-9000540a-a11e-4df7-9b35-293c4b6474a5 ] Request (ServerActionsRbacTest:test_stop_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 1.368s 2020-11-06 18:07:35.692 39 DEBUG tempest.lib.common.rest_client [req-9000540a-a11e-4df7-9b35-293c4b6474a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1729', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9000540a-a11e-4df7-9b35-293c4b6474a5', 'x-compute-request-id': 'req-9000540a-a11e-4df7-9b35-293c4b6474a5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:34Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "powering-off", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:36.958 39 INFO tempest.lib.common.rest_client [req-f56781b6-348d-4ec8-bd7b-080f6d2004dc ] Request (ServerActionsRbacTest:test_stop_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.248s 2020-11-06 18:07:36.958 39 DEBUG tempest.lib.common.rest_client [req-f56781b6-348d-4ec8-bd7b-080f6d2004dc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f56781b6-348d-4ec8-bd7b-080f6d2004dc', 'x-compute-request-id': 'req-f56781b6-348d-4ec8-bd7b-080f6d2004dc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:36.972 39 INFO tempest.common.waiters [-] State transition "ACTIVE/powering-off" ==> "SHUTOFF/None" after 1 second wait 2020-11-06 18:07:36.972 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:07:37.042 39 INFO tempest.lib.common.rest_client [req-1e51a3ec-467b-4103-b59e-74eb82f05d2c ] Request (ServerActionsRbacTest:test_stop_server): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.069s 2020-11-06 18:07:37.042 39 DEBUG tempest.lib.common.rest_client [req-1e51a3ec-467b-4103-b59e-74eb82f05d2c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1e51a3ec-467b-4103-b59e-74eb82f05d2c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:37.081 39 INFO tempest.lib.common.rest_client [req-3ebc6618-b692-4307-8938-f003dc17b362 ] Request (ServerActionsRbacTest:test_stop_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:07:37.081 39 DEBUG tempest.lib.common.rest_client [req-3ebc6618-b692-4307-8938-f003dc17b362 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3ebc6618-b692-4307-8938-f003dc17b362', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["3j9Kym0JRBiKpw6csi7I7A"], "expires_at": "2020-11-06T19:07:37.000000Z", "issued_at": "2020-11-06T18:07:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:37.481 39 INFO tempest.lib.common.rest_client [req-fe5a6c74-9aa3-429d-a8d4-25f34e6308b4 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.395s 2020-11-06 18:07:37.482 39 DEBUG tempest.lib.common.rest_client [req-fe5a6c74-9aa3-429d-a8d4-25f34e6308b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fe5a6c74-9aa3-429d-a8d4-25f34e6308b4', 'x-compute-request-id': 'req-fe5a6c74-9aa3-429d-a8d4-25f34e6308b4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:38.714 39 INFO tempest.lib.common.rest_client [req-9caf337d-3086-4954-93a5-c417e8a37490 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.216s 2020-11-06 18:07:38.714 39 DEBUG tempest.lib.common.rest_client [req-9caf337d-3086-4954-93a5-c417e8a37490 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9caf337d-3086-4954-93a5-c417e8a37490', 'x-compute-request-id': 'req-9caf337d-3086-4954-93a5-c417e8a37490', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:40.075 39 INFO tempest.lib.common.rest_client [req-8303c3d4-a9ea-4df7-b27c-1fb95c735461 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.345s 2020-11-06 18:07:40.075 39 DEBUG tempest.lib.common.rest_client [req-8303c3d4-a9ea-4df7-b27c-1fb95c735461 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8303c3d4-a9ea-4df7-b27c-1fb95c735461', 'x-compute-request-id': 'req-8303c3d4-a9ea-4df7-b27c-1fb95c735461', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:41.320 39 INFO tempest.lib.common.rest_client [req-5e661817-ddd9-4d48-b042-3af2a3b75059 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.227s 2020-11-06 18:07:41.321 39 DEBUG tempest.lib.common.rest_client [req-5e661817-ddd9-4d48-b042-3af2a3b75059 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5e661817-ddd9-4d48-b042-3af2a3b75059', 'x-compute-request-id': 'req-5e661817-ddd9-4d48-b042-3af2a3b75059', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:42.579 39 INFO tempest.lib.common.rest_client [req-1a463c77-d2af-43a1-af02-1df7d13e68b7 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.241s 2020-11-06 18:07:42.580 39 DEBUG tempest.lib.common.rest_client [req-1a463c77-d2af-43a1-af02-1df7d13e68b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1a463c77-d2af-43a1-af02-1df7d13e68b7', 'x-compute-request-id': 'req-1a463c77-d2af-43a1-af02-1df7d13e68b7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:43.819 39 INFO tempest.lib.common.rest_client [req-62e3550c-4c0f-4162-8eba-c16c85dcc9aa ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.222s 2020-11-06 18:07:43.820 39 DEBUG tempest.lib.common.rest_client [req-62e3550c-4c0f-4162-8eba-c16c85dcc9aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-62e3550c-4c0f-4162-8eba-c16c85dcc9aa', 'x-compute-request-id': 'req-62e3550c-4c0f-4162-8eba-c16c85dcc9aa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:45.031 39 INFO tempest.lib.common.rest_client [req-3cedc77b-4da8-44ab-b38e-6d8013b6b431 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.197s 2020-11-06 18:07:45.031 39 DEBUG tempest.lib.common.rest_client [req-3cedc77b-4da8-44ab-b38e-6d8013b6b431 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3cedc77b-4da8-44ab-b38e-6d8013b6b431', 'x-compute-request-id': 'req-3cedc77b-4da8-44ab-b38e-6d8013b6b431', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:46.308 39 INFO tempest.lib.common.rest_client [req-cf05d002-a963-49c9-902e-7ae8504d485f ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.261s 2020-11-06 18:07:46.308 39 DEBUG tempest.lib.common.rest_client [req-cf05d002-a963-49c9-902e-7ae8504d485f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cf05d002-a963-49c9-902e-7ae8504d485f', 'x-compute-request-id': 'req-cf05d002-a963-49c9-902e-7ae8504d485f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:47.553 39 INFO tempest.lib.common.rest_client [req-312adb59-c386-402d-a2d6-56906dadf13e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.231s 2020-11-06 18:07:47.554 39 DEBUG tempest.lib.common.rest_client [req-312adb59-c386-402d-a2d6-56906dadf13e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-312adb59-c386-402d-a2d6-56906dadf13e', 'x-compute-request-id': 'req-312adb59-c386-402d-a2d6-56906dadf13e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:48.769 39 INFO tempest.lib.common.rest_client [req-24d9c15a-a4b2-4ab8-a9b6-c54927dbc484 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.197s 2020-11-06 18:07:48.770 39 DEBUG tempest.lib.common.rest_client [req-24d9c15a-a4b2-4ab8-a9b6-c54927dbc484 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-24d9c15a-a4b2-4ab8-a9b6-c54927dbc484', 'x-compute-request-id': 'req-24d9c15a-a4b2-4ab8-a9b6-c54927dbc484', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:49.970 39 INFO tempest.lib.common.rest_client [req-d0eefa43-ce15-4600-8575-f7a72317e58f ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.187s 2020-11-06 18:07:49.970 39 DEBUG tempest.lib.common.rest_client [req-d0eefa43-ce15-4600-8575-f7a72317e58f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d0eefa43-ce15-4600-8575-f7a72317e58f', 'x-compute-request-id': 'req-d0eefa43-ce15-4600-8575-f7a72317e58f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:51.311 39 INFO tempest.lib.common.rest_client [req-7af0e938-387b-45f0-b02a-918ce09ddeb9 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.324s 2020-11-06 18:07:51.312 39 DEBUG tempest.lib.common.rest_client [req-7af0e938-387b-45f0-b02a-918ce09ddeb9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7af0e938-387b-45f0-b02a-918ce09ddeb9', 'x-compute-request-id': 'req-7af0e938-387b-45f0-b02a-918ce09ddeb9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:52.547 39 INFO tempest.lib.common.rest_client [req-953d42c4-90d4-4ce8-ae18-d0ded9741a5b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.222s 2020-11-06 18:07:52.547 39 DEBUG tempest.lib.common.rest_client [req-953d42c4-90d4-4ce8-ae18-d0ded9741a5b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-953d42c4-90d4-4ce8-ae18-d0ded9741a5b', 'x-compute-request-id': 'req-953d42c4-90d4-4ce8-ae18-d0ded9741a5b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:53.785 39 INFO tempest.lib.common.rest_client [req-b71d5cff-14dc-4f6b-8e3a-fa82f1660503 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.225s 2020-11-06 18:07:53.786 39 DEBUG tempest.lib.common.rest_client [req-b71d5cff-14dc-4f6b-8e3a-fa82f1660503 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b71d5cff-14dc-4f6b-8e3a-fa82f1660503', 'x-compute-request-id': 'req-b71d5cff-14dc-4f6b-8e3a-fa82f1660503', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:55.152 39 INFO tempest.lib.common.rest_client [req-aac982d8-ef9d-41fa-81a8-1d94b9739512 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.349s 2020-11-06 18:07:55.152 39 DEBUG tempest.lib.common.rest_client [req-aac982d8-ef9d-41fa-81a8-1d94b9739512 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-aac982d8-ef9d-41fa-81a8-1d94b9739512', 'x-compute-request-id': 'req-aac982d8-ef9d-41fa-81a8-1d94b9739512', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:56.419 39 INFO tempest.lib.common.rest_client [req-998584ed-f33f-4592-ab16-5d527f0ea412 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.250s 2020-11-06 18:07:56.420 39 DEBUG tempest.lib.common.rest_client [req-998584ed-f33f-4592-ab16-5d527f0ea412 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-998584ed-f33f-4592-ab16-5d527f0ea412', 'x-compute-request-id': 'req-998584ed-f33f-4592-ab16-5d527f0ea412', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:57.633 39 INFO tempest.lib.common.rest_client [req-fb65ed9c-c756-49be-8f79-442287a5cdb4 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.195s 2020-11-06 18:07:57.634 39 DEBUG tempest.lib.common.rest_client [req-fb65ed9c-c756-49be-8f79-442287a5cdb4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fb65ed9c-c756-49be-8f79-442287a5cdb4', 'x-compute-request-id': 'req-fb65ed9c-c756-49be-8f79-442287a5cdb4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:07:59.923 39 INFO tempest.lib.common.rest_client [req-dfd300ed-12a3-4b9a-9a63-263b36c9407b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 1.272s 2020-11-06 18:07:59.923 39 DEBUG tempest.lib.common.rest_client [req-dfd300ed-12a3-4b9a-9a63-263b36c9407b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:07:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dfd300ed-12a3-4b9a-9a63-263b36c9407b', 'x-compute-request-id': 'req-dfd300ed-12a3-4b9a-9a63-263b36c9407b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:01.151 39 INFO tempest.lib.common.rest_client [req-25ac3ade-4652-4b0c-bf46-2ce1672059ee ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.214s 2020-11-06 18:08:01.152 39 DEBUG tempest.lib.common.rest_client [req-25ac3ade-4652-4b0c-bf46-2ce1672059ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-25ac3ade-4652-4b0c-bf46-2ce1672059ee', 'x-compute-request-id': 'req-25ac3ade-4652-4b0c-bf46-2ce1672059ee', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:02.379 39 INFO tempest.lib.common.rest_client [req-1b53d458-5216-42d3-b802-e7cbbffee404 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.209s 2020-11-06 18:08:02.379 39 DEBUG tempest.lib.common.rest_client [req-1b53d458-5216-42d3-b802-e7cbbffee404 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1b53d458-5216-42d3-b802-e7cbbffee404', 'x-compute-request-id': 'req-1b53d458-5216-42d3-b802-e7cbbffee404', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:03.586 39 INFO tempest.lib.common.rest_client [req-50a40b12-cb63-4c9e-b3a5-b2321c418cf5 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.192s 2020-11-06 18:08:03.586 39 DEBUG tempest.lib.common.rest_client [req-50a40b12-cb63-4c9e-b3a5-b2321c418cf5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-50a40b12-cb63-4c9e-b3a5-b2321c418cf5', 'x-compute-request-id': 'req-50a40b12-cb63-4c9e-b3a5-b2321c418cf5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:04.812 39 INFO tempest.lib.common.rest_client [req-1afb3df8-6e33-4298-9cd4-725cbfc6d6a3 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.209s 2020-11-06 18:08:04.813 39 DEBUG tempest.lib.common.rest_client [req-1afb3df8-6e33-4298-9cd4-725cbfc6d6a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1afb3df8-6e33-4298-9cd4-725cbfc6d6a3', 'x-compute-request-id': 'req-1afb3df8-6e33-4298-9cd4-725cbfc6d6a3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:06.065 39 INFO tempest.lib.common.rest_client [req-a44b1964-fcf9-436d-bc37-c1d8b88d7b56 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.240s 2020-11-06 18:08:06.066 39 DEBUG tempest.lib.common.rest_client [req-a44b1964-fcf9-436d-bc37-c1d8b88d7b56 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a44b1964-fcf9-436d-bc37-c1d8b88d7b56', 'x-compute-request-id': 'req-a44b1964-fcf9-436d-bc37-c1d8b88d7b56', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:07.287 39 INFO tempest.lib.common.rest_client [req-e6e7f753-80a3-4c5c-855b-93a64e8e0354 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.205s 2020-11-06 18:08:07.288 39 DEBUG tempest.lib.common.rest_client [req-e6e7f753-80a3-4c5c-855b-93a64e8e0354 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e6e7f753-80a3-4c5c-855b-93a64e8e0354', 'x-compute-request-id': 'req-e6e7f753-80a3-4c5c-855b-93a64e8e0354', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:08.517 39 INFO tempest.lib.common.rest_client [req-775627db-ec82-44ad-a4b2-558199014c55 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.217s 2020-11-06 18:08:08.517 39 DEBUG tempest.lib.common.rest_client [req-775627db-ec82-44ad-a4b2-558199014c55 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-775627db-ec82-44ad-a4b2-558199014c55', 'x-compute-request-id': 'req-775627db-ec82-44ad-a4b2-558199014c55', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:09.736 39 INFO tempest.lib.common.rest_client [req-512ccff2-610e-405b-b5da-31572b1579b1 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.203s 2020-11-06 18:08:09.737 39 DEBUG tempest.lib.common.rest_client [req-512ccff2-610e-405b-b5da-31572b1579b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-512ccff2-610e-405b-b5da-31572b1579b1', 'x-compute-request-id': 'req-512ccff2-610e-405b-b5da-31572b1579b1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:10.997 39 INFO tempest.lib.common.rest_client [req-dd0bae0c-8ba6-453a-806b-513b141e16ea ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.247s 2020-11-06 18:08:10.998 39 DEBUG tempest.lib.common.rest_client [req-dd0bae0c-8ba6-453a-806b-513b141e16ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dd0bae0c-8ba6-453a-806b-513b141e16ea', 'x-compute-request-id': 'req-dd0bae0c-8ba6-453a-806b-513b141e16ea', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:12.209 39 INFO tempest.lib.common.rest_client [req-75ea1925-153d-4b48-8981-e8bd7a28896f ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.200s 2020-11-06 18:08:12.209 39 DEBUG tempest.lib.common.rest_client [req-75ea1925-153d-4b48-8981-e8bd7a28896f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-75ea1925-153d-4b48-8981-e8bd7a28896f', 'x-compute-request-id': 'req-75ea1925-153d-4b48-8981-e8bd7a28896f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:13.479 39 INFO tempest.lib.common.rest_client [req-f8b5a4aa-5d1d-4960-8f50-3f76efbf957c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.257s 2020-11-06 18:08:13.479 39 DEBUG tempest.lib.common.rest_client [req-f8b5a4aa-5d1d-4960-8f50-3f76efbf957c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f8b5a4aa-5d1d-4960-8f50-3f76efbf957c', 'x-compute-request-id': 'req-f8b5a4aa-5d1d-4960-8f50-3f76efbf957c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:14.693 39 INFO tempest.lib.common.rest_client [req-c15b6352-8be2-49dc-9c74-96e4efe1c7db ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.198s 2020-11-06 18:08:14.693 39 DEBUG tempest.lib.common.rest_client [req-c15b6352-8be2-49dc-9c74-96e4efe1c7db ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c15b6352-8be2-49dc-9c74-96e4efe1c7db', 'x-compute-request-id': 'req-c15b6352-8be2-49dc-9c74-96e4efe1c7db', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:15.956 39 INFO tempest.lib.common.rest_client [req-fd26e61c-b456-45d1-9d5f-b72418c4b81f ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.246s 2020-11-06 18:08:15.957 39 DEBUG tempest.lib.common.rest_client [req-fd26e61c-b456-45d1-9d5f-b72418c4b81f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fd26e61c-b456-45d1-9d5f-b72418c4b81f', 'x-compute-request-id': 'req-fd26e61c-b456-45d1-9d5f-b72418c4b81f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:17.182 39 INFO tempest.lib.common.rest_client [req-3d55bca3-b81d-4667-937f-36ba8c215076 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.214s 2020-11-06 18:08:17.183 39 DEBUG tempest.lib.common.rest_client [req-3d55bca3-b81d-4667-937f-36ba8c215076 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3d55bca3-b81d-4667-937f-36ba8c215076', 'x-compute-request-id': 'req-3d55bca3-b81d-4667-937f-36ba8c215076', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:19.448 39 INFO tempest.lib.common.rest_client [req-5a6f7548-79ee-42c3-a5fa-9d41d5f70b5e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 1.252s 2020-11-06 18:08:19.449 39 DEBUG tempest.lib.common.rest_client [req-5a6f7548-79ee-42c3-a5fa-9d41d5f70b5e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5a6f7548-79ee-42c3-a5fa-9d41d5f70b5e', 'x-compute-request-id': 'req-5a6f7548-79ee-42c3-a5fa-9d41d5f70b5e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:20.676 39 INFO tempest.lib.common.rest_client [req-e06b1bdd-128a-444f-88b4-46f1c212def4 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.214s 2020-11-06 18:08:20.677 39 DEBUG tempest.lib.common.rest_client [req-e06b1bdd-128a-444f-88b4-46f1c212def4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e06b1bdd-128a-444f-88b4-46f1c212def4', 'x-compute-request-id': 'req-e06b1bdd-128a-444f-88b4-46f1c212def4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:21.915 39 INFO tempest.lib.common.rest_client [req-64ab80f0-6661-43f6-82da-e2ad70d41f17 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.221s 2020-11-06 18:08:21.915 39 DEBUG tempest.lib.common.rest_client [req-64ab80f0-6661-43f6-82da-e2ad70d41f17 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-64ab80f0-6661-43f6-82da-e2ad70d41f17', 'x-compute-request-id': 'req-64ab80f0-6661-43f6-82da-e2ad70d41f17', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:23.129 39 INFO tempest.lib.common.rest_client [req-96fedb90-ff05-4869-8db5-f15fdf6518c3 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.196s 2020-11-06 18:08:23.129 39 DEBUG tempest.lib.common.rest_client [req-96fedb90-ff05-4869-8db5-f15fdf6518c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-96fedb90-ff05-4869-8db5-f15fdf6518c3', 'x-compute-request-id': 'req-96fedb90-ff05-4869-8db5-f15fdf6518c3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:24.340 39 INFO tempest.lib.common.rest_client [req-a7fd3b6e-ad89-409a-ac74-86d3ac969c31 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.199s 2020-11-06 18:08:24.341 39 DEBUG tempest.lib.common.rest_client [req-a7fd3b6e-ad89-409a-ac74-86d3ac969c31 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a7fd3b6e-ad89-409a-ac74-86d3ac969c31', 'x-compute-request-id': 'req-a7fd3b6e-ad89-409a-ac74-86d3ac969c31', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:25.566 39 INFO tempest.lib.common.rest_client [req-2f72ea6f-2d8f-4f14-b878-1e5a70da146c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.208s 2020-11-06 18:08:25.567 39 DEBUG tempest.lib.common.rest_client [req-2f72ea6f-2d8f-4f14-b878-1e5a70da146c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2f72ea6f-2d8f-4f14-b878-1e5a70da146c', 'x-compute-request-id': 'req-2f72ea6f-2d8f-4f14-b878-1e5a70da146c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:26.793 39 INFO tempest.lib.common.rest_client [req-3cc8d17b-ccbf-4546-83e1-d41be3a3ff96 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.212s 2020-11-06 18:08:26.794 39 DEBUG tempest.lib.common.rest_client [req-3cc8d17b-ccbf-4546-83e1-d41be3a3ff96 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3cc8d17b-ccbf-4546-83e1-d41be3a3ff96', 'x-compute-request-id': 'req-3cc8d17b-ccbf-4546-83e1-d41be3a3ff96', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:28.010 39 INFO tempest.lib.common.rest_client [req-b3c1a067-6ae3-4be2-ba0b-ebd21edc9754 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.202s 2020-11-06 18:08:28.010 39 DEBUG tempest.lib.common.rest_client [req-b3c1a067-6ae3-4be2-ba0b-ebd21edc9754 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b3c1a067-6ae3-4be2-ba0b-ebd21edc9754', 'x-compute-request-id': 'req-b3c1a067-6ae3-4be2-ba0b-ebd21edc9754', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:29.232 39 INFO tempest.lib.common.rest_client [req-507f64ab-db89-4df5-ace2-eb3d63135c23 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.210s 2020-11-06 18:08:29.232 39 DEBUG tempest.lib.common.rest_client [req-507f64ab-db89-4df5-ace2-eb3d63135c23 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-507f64ab-db89-4df5-ace2-eb3d63135c23', 'x-compute-request-id': 'req-507f64ab-db89-4df5-ace2-eb3d63135c23', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:30.504 39 INFO tempest.lib.common.rest_client [req-caac7608-e39e-4a68-9c80-7d36e8d31e44 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.257s 2020-11-06 18:08:30.505 39 DEBUG tempest.lib.common.rest_client [req-caac7608-e39e-4a68-9c80-7d36e8d31e44 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-caac7608-e39e-4a68-9c80-7d36e8d31e44', 'x-compute-request-id': 'req-caac7608-e39e-4a68-9c80-7d36e8d31e44', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:31.717 39 INFO tempest.lib.common.rest_client [req-73adbebf-53e8-403e-8751-3ae7a56245fb ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.196s 2020-11-06 18:08:31.717 39 DEBUG tempest.lib.common.rest_client [req-73adbebf-53e8-403e-8751-3ae7a56245fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-73adbebf-53e8-403e-8751-3ae7a56245fb', 'x-compute-request-id': 'req-73adbebf-53e8-403e-8751-3ae7a56245fb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:32.934 39 INFO tempest.lib.common.rest_client [req-d5fcfe30-f019-4057-8644-dafdaaef939a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.200s 2020-11-06 18:08:32.934 39 DEBUG tempest.lib.common.rest_client [req-d5fcfe30-f019-4057-8644-dafdaaef939a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d5fcfe30-f019-4057-8644-dafdaaef939a', 'x-compute-request-id': 'req-d5fcfe30-f019-4057-8644-dafdaaef939a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:34.188 39 INFO tempest.lib.common.rest_client [req-130b1b28-78fc-45a9-87e7-1414f27f657f ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.237s 2020-11-06 18:08:34.189 39 DEBUG tempest.lib.common.rest_client [req-130b1b28-78fc-45a9-87e7-1414f27f657f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-130b1b28-78fc-45a9-87e7-1414f27f657f', 'x-compute-request-id': 'req-130b1b28-78fc-45a9-87e7-1414f27f657f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:35.453 39 INFO tempest.lib.common.rest_client [req-4504a367-5395-47ac-880f-496bced433e8 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.247s 2020-11-06 18:08:35.454 39 DEBUG tempest.lib.common.rest_client [req-4504a367-5395-47ac-880f-496bced433e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4504a367-5395-47ac-880f-496bced433e8', 'x-compute-request-id': 'req-4504a367-5395-47ac-880f-496bced433e8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:37.797 39 INFO tempest.lib.common.rest_client [req-a1dbec77-bfab-4bf1-90dd-89c30c22d9ae ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 1.326s 2020-11-06 18:08:37.798 39 DEBUG tempest.lib.common.rest_client [req-a1dbec77-bfab-4bf1-90dd-89c30c22d9ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a1dbec77-bfab-4bf1-90dd-89c30c22d9ae', 'x-compute-request-id': 'req-a1dbec77-bfab-4bf1-90dd-89c30c22d9ae', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:39.013 39 INFO tempest.lib.common.rest_client [req-df819d4e-3aa0-4db5-b757-61eaf5d263f1 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.198s 2020-11-06 18:08:39.013 39 DEBUG tempest.lib.common.rest_client [req-df819d4e-3aa0-4db5-b757-61eaf5d263f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-df819d4e-3aa0-4db5-b757-61eaf5d263f1', 'x-compute-request-id': 'req-df819d4e-3aa0-4db5-b757-61eaf5d263f1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:40.257 39 INFO tempest.lib.common.rest_client [req-2fdd6c46-42c2-4964-b8a9-6729d5400871 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.226s 2020-11-06 18:08:40.258 39 DEBUG tempest.lib.common.rest_client [req-2fdd6c46-42c2-4964-b8a9-6729d5400871 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2fdd6c46-42c2-4964-b8a9-6729d5400871', 'x-compute-request-id': 'req-2fdd6c46-42c2-4964-b8a9-6729d5400871', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:41.537 39 INFO tempest.lib.common.rest_client [req-38d47f32-7749-45de-9f2f-70224400a287 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.265s 2020-11-06 18:08:41.538 39 DEBUG tempest.lib.common.rest_client [req-38d47f32-7749-45de-9f2f-70224400a287 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-38d47f32-7749-45de-9f2f-70224400a287', 'x-compute-request-id': 'req-38d47f32-7749-45de-9f2f-70224400a287', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:42.827 39 INFO tempest.lib.common.rest_client [req-8b7563a2-d7cc-43c8-8f73-033a05f3bc5e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.276s 2020-11-06 18:08:42.828 39 DEBUG tempest.lib.common.rest_client [req-8b7563a2-d7cc-43c8-8f73-033a05f3bc5e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8b7563a2-d7cc-43c8-8f73-033a05f3bc5e', 'x-compute-request-id': 'req-8b7563a2-d7cc-43c8-8f73-033a05f3bc5e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:44.045 39 INFO tempest.lib.common.rest_client [req-c11b2890-03ac-42e3-a9b8-1991ca132e02 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.201s 2020-11-06 18:08:44.045 39 DEBUG tempest.lib.common.rest_client [req-c11b2890-03ac-42e3-a9b8-1991ca132e02 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c11b2890-03ac-42e3-a9b8-1991ca132e02', 'x-compute-request-id': 'req-c11b2890-03ac-42e3-a9b8-1991ca132e02', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:45.282 39 INFO tempest.lib.common.rest_client [req-8a3bd9f5-44fd-41ad-a771-78d072eef83a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.220s 2020-11-06 18:08:45.283 39 DEBUG tempest.lib.common.rest_client [req-8a3bd9f5-44fd-41ad-a771-78d072eef83a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8a3bd9f5-44fd-41ad-a771-78d072eef83a', 'x-compute-request-id': 'req-8a3bd9f5-44fd-41ad-a771-78d072eef83a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:46.511 39 INFO tempest.lib.common.rest_client [req-d4383775-eb3c-4c2f-9761-e39164095619 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.213s 2020-11-06 18:08:46.512 39 DEBUG tempest.lib.common.rest_client [req-d4383775-eb3c-4c2f-9761-e39164095619 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d4383775-eb3c-4c2f-9761-e39164095619', 'x-compute-request-id': 'req-d4383775-eb3c-4c2f-9761-e39164095619', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:47.770 39 INFO tempest.lib.common.rest_client [req-34b6dfde-38b4-4f33-83ad-89f4bbc1e217 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.245s 2020-11-06 18:08:47.771 39 DEBUG tempest.lib.common.rest_client [req-34b6dfde-38b4-4f33-83ad-89f4bbc1e217 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-34b6dfde-38b4-4f33-83ad-89f4bbc1e217', 'x-compute-request-id': 'req-34b6dfde-38b4-4f33-83ad-89f4bbc1e217', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:49.004 39 INFO tempest.lib.common.rest_client [req-6987a691-73bf-4301-8e2f-9b09e4178b1a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.214s 2020-11-06 18:08:49.005 39 DEBUG tempest.lib.common.rest_client [req-6987a691-73bf-4301-8e2f-9b09e4178b1a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6987a691-73bf-4301-8e2f-9b09e4178b1a', 'x-compute-request-id': 'req-6987a691-73bf-4301-8e2f-9b09e4178b1a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:50.234 39 INFO tempest.lib.common.rest_client [req-d7e4ec96-9656-42b1-9afe-8a6014fc3cad ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.217s 2020-11-06 18:08:50.235 39 DEBUG tempest.lib.common.rest_client [req-d7e4ec96-9656-42b1-9afe-8a6014fc3cad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d7e4ec96-9656-42b1-9afe-8a6014fc3cad', 'x-compute-request-id': 'req-d7e4ec96-9656-42b1-9afe-8a6014fc3cad', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:51.460 39 INFO tempest.lib.common.rest_client [req-5574263c-0e3d-4c49-8a74-2063a2514da0 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.207s 2020-11-06 18:08:51.461 39 DEBUG tempest.lib.common.rest_client [req-5574263c-0e3d-4c49-8a74-2063a2514da0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5574263c-0e3d-4c49-8a74-2063a2514da0', 'x-compute-request-id': 'req-5574263c-0e3d-4c49-8a74-2063a2514da0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:52.695 39 INFO tempest.lib.common.rest_client [req-dbb68a8f-64d9-4542-8caf-448e600daefd ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.222s 2020-11-06 18:08:52.696 39 DEBUG tempest.lib.common.rest_client [req-dbb68a8f-64d9-4542-8caf-448e600daefd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dbb68a8f-64d9-4542-8caf-448e600daefd', 'x-compute-request-id': 'req-dbb68a8f-64d9-4542-8caf-448e600daefd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:53.910 39 INFO tempest.lib.common.rest_client [req-5c07df26-7237-4b1f-8db6-3c2506c4dfdb ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.197s 2020-11-06 18:08:53.911 39 DEBUG tempest.lib.common.rest_client [req-5c07df26-7237-4b1f-8db6-3c2506c4dfdb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5c07df26-7237-4b1f-8db6-3c2506c4dfdb', 'x-compute-request-id': 'req-5c07df26-7237-4b1f-8db6-3c2506c4dfdb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:55.136 39 INFO tempest.lib.common.rest_client [req-1837a344-605e-49dc-876a-7a5aaae07621 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.209s 2020-11-06 18:08:55.137 39 DEBUG tempest.lib.common.rest_client [req-1837a344-605e-49dc-876a-7a5aaae07621 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1837a344-605e-49dc-876a-7a5aaae07621', 'x-compute-request-id': 'req-1837a344-605e-49dc-876a-7a5aaae07621', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:56.362 39 INFO tempest.lib.common.rest_client [req-38859d10-d006-407b-be42-0c023434148e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.208s 2020-11-06 18:08:56.363 39 DEBUG tempest.lib.common.rest_client [req-38859d10-d006-407b-be42-0c023434148e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-38859d10-d006-407b-be42-0c023434148e', 'x-compute-request-id': 'req-38859d10-d006-407b-be42-0c023434148e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:57.581 39 INFO tempest.lib.common.rest_client [req-5e9f9d25-02db-4654-a75a-b25c7c27a5ba ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.202s 2020-11-06 18:08:57.582 39 DEBUG tempest.lib.common.rest_client [req-5e9f9d25-02db-4654-a75a-b25c7c27a5ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5e9f9d25-02db-4654-a75a-b25c7c27a5ba', 'x-compute-request-id': 'req-5e9f9d25-02db-4654-a75a-b25c7c27a5ba', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:08:58.956 39 INFO tempest.lib.common.rest_client [req-d3b588c7-c5b2-4485-b3f2-793d32f5db31 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.357s 2020-11-06 18:08:58.956 39 DEBUG tempest.lib.common.rest_client [req-d3b588c7-c5b2-4485-b3f2-793d32f5db31 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d3b588c7-c5b2-4485-b3f2-793d32f5db31', 'x-compute-request-id': 'req-d3b588c7-c5b2-4485-b3f2-793d32f5db31', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:00.191 39 INFO tempest.lib.common.rest_client [req-c5607611-f97c-4b8b-8abb-d3d1a54a1c3e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.217s 2020-11-06 18:09:00.192 39 DEBUG tempest.lib.common.rest_client [req-c5607611-f97c-4b8b-8abb-d3d1a54a1c3e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:08:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c5607611-f97c-4b8b-8abb-d3d1a54a1c3e', 'x-compute-request-id': 'req-c5607611-f97c-4b8b-8abb-d3d1a54a1c3e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:02.481 39 INFO tempest.lib.common.rest_client [req-22968a6d-1cdc-4768-9e1f-166c6c6d0480 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 1.272s 2020-11-06 18:09:02.482 39 DEBUG tempest.lib.common.rest_client [req-22968a6d-1cdc-4768-9e1f-166c6c6d0480 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-22968a6d-1cdc-4768-9e1f-166c6c6d0480', 'x-compute-request-id': 'req-22968a6d-1cdc-4768-9e1f-166c6c6d0480', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:03.700 39 INFO tempest.lib.common.rest_client [req-5e91e14b-7517-4379-b215-6180a1d2e602 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.203s 2020-11-06 18:09:03.701 39 DEBUG tempest.lib.common.rest_client [req-5e91e14b-7517-4379-b215-6180a1d2e602 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5e91e14b-7517-4379-b215-6180a1d2e602', 'x-compute-request-id': 'req-5e91e14b-7517-4379-b215-6180a1d2e602', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:04.942 39 INFO tempest.lib.common.rest_client [req-878fce7f-528b-4b16-9953-4e77acdc5f61 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.224s 2020-11-06 18:09:04.942 39 DEBUG tempest.lib.common.rest_client [req-878fce7f-528b-4b16-9953-4e77acdc5f61 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-878fce7f-528b-4b16-9953-4e77acdc5f61', 'x-compute-request-id': 'req-878fce7f-528b-4b16-9953-4e77acdc5f61', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:06.154 39 INFO tempest.lib.common.rest_client [req-5aecc1d6-805d-4e04-b4f9-8f129902dc7b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.196s 2020-11-06 18:09:06.154 39 DEBUG tempest.lib.common.rest_client [req-5aecc1d6-805d-4e04-b4f9-8f129902dc7b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5aecc1d6-805d-4e04-b4f9-8f129902dc7b', 'x-compute-request-id': 'req-5aecc1d6-805d-4e04-b4f9-8f129902dc7b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:07.533 39 INFO tempest.lib.common.rest_client [req-1570591b-7f64-4b50-81d3-f25ca6c1285d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.362s 2020-11-06 18:09:07.534 39 DEBUG tempest.lib.common.rest_client [req-1570591b-7f64-4b50-81d3-f25ca6c1285d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1570591b-7f64-4b50-81d3-f25ca6c1285d', 'x-compute-request-id': 'req-1570591b-7f64-4b50-81d3-f25ca6c1285d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:08.814 39 INFO tempest.lib.common.rest_client [req-94dfcdf2-7313-434a-b1bd-d964af7fedcd ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.263s 2020-11-06 18:09:08.814 39 DEBUG tempest.lib.common.rest_client [req-94dfcdf2-7313-434a-b1bd-d964af7fedcd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-94dfcdf2-7313-434a-b1bd-d964af7fedcd', 'x-compute-request-id': 'req-94dfcdf2-7313-434a-b1bd-d964af7fedcd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:10.047 39 INFO tempest.lib.common.rest_client [req-dad300fb-f051-483d-878c-9ca1ee986cc0 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.215s 2020-11-06 18:09:10.048 39 DEBUG tempest.lib.common.rest_client [req-dad300fb-f051-483d-878c-9ca1ee986cc0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dad300fb-f051-483d-878c-9ca1ee986cc0', 'x-compute-request-id': 'req-dad300fb-f051-483d-878c-9ca1ee986cc0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:11.284 39 INFO tempest.lib.common.rest_client [req-e0251554-2b70-43a6-b681-01d06a7e8752 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.219s 2020-11-06 18:09:11.284 39 DEBUG tempest.lib.common.rest_client [req-e0251554-2b70-43a6-b681-01d06a7e8752 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e0251554-2b70-43a6-b681-01d06a7e8752', 'x-compute-request-id': 'req-e0251554-2b70-43a6-b681-01d06a7e8752', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:12.504 39 INFO tempest.lib.common.rest_client [req-3489596c-de02-47e6-adeb-2ded65614e1c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.202s 2020-11-06 18:09:12.504 39 DEBUG tempest.lib.common.rest_client [req-3489596c-de02-47e6-adeb-2ded65614e1c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3489596c-de02-47e6-adeb-2ded65614e1c', 'x-compute-request-id': 'req-3489596c-de02-47e6-adeb-2ded65614e1c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:13.732 39 INFO tempest.lib.common.rest_client [req-b9b6e47c-d5af-41eb-afb7-471fd5e33d1d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.210s 2020-11-06 18:09:13.732 39 DEBUG tempest.lib.common.rest_client [req-b9b6e47c-d5af-41eb-afb7-471fd5e33d1d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b9b6e47c-d5af-41eb-afb7-471fd5e33d1d', 'x-compute-request-id': 'req-b9b6e47c-d5af-41eb-afb7-471fd5e33d1d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:15.094 39 INFO tempest.lib.common.rest_client [req-cd2ae0ed-cc8f-405f-91bb-681186362618 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.345s 2020-11-06 18:09:15.095 39 DEBUG tempest.lib.common.rest_client [req-cd2ae0ed-cc8f-405f-91bb-681186362618 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cd2ae0ed-cc8f-405f-91bb-681186362618', 'x-compute-request-id': 'req-cd2ae0ed-cc8f-405f-91bb-681186362618', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:16.297 39 INFO tempest.lib.common.rest_client [req-8a5a6e87-34ed-4c22-81e6-2fc479c4a7c2 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.186s 2020-11-06 18:09:16.298 39 DEBUG tempest.lib.common.rest_client [req-8a5a6e87-34ed-4c22-81e6-2fc479c4a7c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8a5a6e87-34ed-4c22-81e6-2fc479c4a7c2', 'x-compute-request-id': 'req-8a5a6e87-34ed-4c22-81e6-2fc479c4a7c2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:17.591 39 INFO tempest.lib.common.rest_client [req-ac05dfbe-0efe-4c01-aa96-2d88abf89d0a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.277s 2020-11-06 18:09:17.592 39 DEBUG tempest.lib.common.rest_client [req-ac05dfbe-0efe-4c01-aa96-2d88abf89d0a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ac05dfbe-0efe-4c01-aa96-2d88abf89d0a', 'x-compute-request-id': 'req-ac05dfbe-0efe-4c01-aa96-2d88abf89d0a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:18.851 39 INFO tempest.lib.common.rest_client [req-e9a51796-59e4-4764-bd3f-81138ebc4916 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.242s 2020-11-06 18:09:18.852 39 DEBUG tempest.lib.common.rest_client [req-e9a51796-59e4-4764-bd3f-81138ebc4916 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e9a51796-59e4-4764-bd3f-81138ebc4916', 'x-compute-request-id': 'req-e9a51796-59e4-4764-bd3f-81138ebc4916', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:20.555 39 INFO tempest.lib.common.rest_client [req-cf9d99c6-73d3-4a86-b4a9-0ba918ffd441 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.684s 2020-11-06 18:09:20.555 39 DEBUG tempest.lib.common.rest_client [req-cf9d99c6-73d3-4a86-b4a9-0ba918ffd441 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cf9d99c6-73d3-4a86-b4a9-0ba918ffd441', 'x-compute-request-id': 'req-cf9d99c6-73d3-4a86-b4a9-0ba918ffd441', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:21.884 39 INFO tempest.lib.common.rest_client [req-51e2ae4d-4dc1-4b32-9856-36b39116ede0 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.311s 2020-11-06 18:09:21.885 39 DEBUG tempest.lib.common.rest_client [req-51e2ae4d-4dc1-4b32-9856-36b39116ede0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-51e2ae4d-4dc1-4b32-9856-36b39116ede0', 'x-compute-request-id': 'req-51e2ae4d-4dc1-4b32-9856-36b39116ede0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:23.190 39 INFO tempest.lib.common.rest_client [req-d4ae816d-e881-4734-b1e8-0a18d849f3f1 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.288s 2020-11-06 18:09:23.191 39 DEBUG tempest.lib.common.rest_client [req-d4ae816d-e881-4734-b1e8-0a18d849f3f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d4ae816d-e881-4734-b1e8-0a18d849f3f1', 'x-compute-request-id': 'req-d4ae816d-e881-4734-b1e8-0a18d849f3f1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:24.470 39 INFO tempest.lib.common.rest_client [req-d739266e-4353-409d-a1f9-85f9d8b13bd5 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.261s 2020-11-06 18:09:24.471 39 DEBUG tempest.lib.common.rest_client [req-d739266e-4353-409d-a1f9-85f9d8b13bd5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d739266e-4353-409d-a1f9-85f9d8b13bd5', 'x-compute-request-id': 'req-d739266e-4353-409d-a1f9-85f9d8b13bd5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:25.691 39 INFO tempest.lib.common.rest_client [req-ed723a9d-dad5-4122-ac4a-2e4e259dd8a6 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.202s 2020-11-06 18:09:25.691 39 DEBUG tempest.lib.common.rest_client [req-ed723a9d-dad5-4122-ac4a-2e4e259dd8a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ed723a9d-dad5-4122-ac4a-2e4e259dd8a6', 'x-compute-request-id': 'req-ed723a9d-dad5-4122-ac4a-2e4e259dd8a6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:26.910 39 INFO tempest.lib.common.rest_client [req-6e7491af-8c03-4498-a6e9-ee4722682450 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.201s 2020-11-06 18:09:26.910 39 DEBUG tempest.lib.common.rest_client [req-6e7491af-8c03-4498-a6e9-ee4722682450 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6e7491af-8c03-4498-a6e9-ee4722682450', 'x-compute-request-id': 'req-6e7491af-8c03-4498-a6e9-ee4722682450', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:28.178 39 INFO tempest.lib.common.rest_client [req-937e4b10-497f-4245-9544-fd3a5257a8df ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.256s 2020-11-06 18:09:28.178 39 DEBUG tempest.lib.common.rest_client [req-937e4b10-497f-4245-9544-fd3a5257a8df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-937e4b10-497f-4245-9544-fd3a5257a8df', 'x-compute-request-id': 'req-937e4b10-497f-4245-9544-fd3a5257a8df', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:29.380 39 INFO tempest.lib.common.rest_client [req-03fd5ca3-cb09-4969-8def-eea84978ef11 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.183s 2020-11-06 18:09:29.380 39 DEBUG tempest.lib.common.rest_client [req-03fd5ca3-cb09-4969-8def-eea84978ef11 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-03fd5ca3-cb09-4969-8def-eea84978ef11', 'x-compute-request-id': 'req-03fd5ca3-cb09-4969-8def-eea84978ef11', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:30.651 39 INFO tempest.lib.common.rest_client [req-6adc1f1f-9601-454c-b6bb-fe1259f79d49 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.254s 2020-11-06 18:09:30.652 39 DEBUG tempest.lib.common.rest_client [req-6adc1f1f-9601-454c-b6bb-fe1259f79d49 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6adc1f1f-9601-454c-b6bb-fe1259f79d49', 'x-compute-request-id': 'req-6adc1f1f-9601-454c-b6bb-fe1259f79d49', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:31.883 39 INFO tempest.lib.common.rest_client [req-efbb9aee-81de-42a2-8482-82a8095ca82c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.213s 2020-11-06 18:09:31.884 39 DEBUG tempest.lib.common.rest_client [req-efbb9aee-81de-42a2-8482-82a8095ca82c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-efbb9aee-81de-42a2-8482-82a8095ca82c', 'x-compute-request-id': 'req-efbb9aee-81de-42a2-8482-82a8095ca82c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:33.102 39 INFO tempest.lib.common.rest_client [req-df37c728-adff-4ddc-b2c5-547f193d171a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.203s 2020-11-06 18:09:33.103 39 DEBUG tempest.lib.common.rest_client [req-df37c728-adff-4ddc-b2c5-547f193d171a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-df37c728-adff-4ddc-b2c5-547f193d171a', 'x-compute-request-id': 'req-df37c728-adff-4ddc-b2c5-547f193d171a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:34.313 39 INFO tempest.lib.common.rest_client [req-9f3193bd-f51c-4139-8ab9-4d0271a688b7 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.195s 2020-11-06 18:09:34.314 39 DEBUG tempest.lib.common.rest_client [req-9f3193bd-f51c-4139-8ab9-4d0271a688b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9f3193bd-f51c-4139-8ab9-4d0271a688b7', 'x-compute-request-id': 'req-9f3193bd-f51c-4139-8ab9-4d0271a688b7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:35.539 39 INFO tempest.lib.common.rest_client [req-20702fc9-3bdb-431d-aaea-cd7c54861c5d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.206s 2020-11-06 18:09:35.540 39 DEBUG tempest.lib.common.rest_client [req-20702fc9-3bdb-431d-aaea-cd7c54861c5d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-20702fc9-3bdb-431d-aaea-cd7c54861c5d', 'x-compute-request-id': 'req-20702fc9-3bdb-431d-aaea-cd7c54861c5d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:36.750 39 INFO tempest.lib.common.rest_client [req-9b373482-fce8-4c23-81b9-5c4233af027c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.194s 2020-11-06 18:09:36.751 39 DEBUG tempest.lib.common.rest_client [req-9b373482-fce8-4c23-81b9-5c4233af027c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9b373482-fce8-4c23-81b9-5c4233af027c', 'x-compute-request-id': 'req-9b373482-fce8-4c23-81b9-5c4233af027c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:37.981 39 INFO tempest.lib.common.rest_client [req-d242866a-7590-4ebd-bf34-12e073acf1c8 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.214s 2020-11-06 18:09:37.981 39 DEBUG tempest.lib.common.rest_client [req-d242866a-7590-4ebd-bf34-12e073acf1c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d242866a-7590-4ebd-bf34-12e073acf1c8', 'x-compute-request-id': 'req-d242866a-7590-4ebd-bf34-12e073acf1c8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:39.210 39 INFO tempest.lib.common.rest_client [req-7a1457f2-4d53-4c75-a9d2-c51a91b581ee ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.213s 2020-11-06 18:09:39.211 39 DEBUG tempest.lib.common.rest_client [req-7a1457f2-4d53-4c75-a9d2-c51a91b581ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7a1457f2-4d53-4c75-a9d2-c51a91b581ee', 'x-compute-request-id': 'req-7a1457f2-4d53-4c75-a9d2-c51a91b581ee', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:41.485 39 INFO tempest.lib.common.rest_client [req-b470ec7d-a86c-4cbe-881e-3e847cd461c1 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 1.260s 2020-11-06 18:09:41.486 39 DEBUG tempest.lib.common.rest_client [req-b470ec7d-a86c-4cbe-881e-3e847cd461c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b470ec7d-a86c-4cbe-881e-3e847cd461c1', 'x-compute-request-id': 'req-b470ec7d-a86c-4cbe-881e-3e847cd461c1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:42.683 39 INFO tempest.lib.common.rest_client [req-bb414790-a728-498f-b111-a8c50ab66f8c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.180s 2020-11-06 18:09:42.683 39 DEBUG tempest.lib.common.rest_client [req-bb414790-a728-498f-b111-a8c50ab66f8c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bb414790-a728-498f-b111-a8c50ab66f8c', 'x-compute-request-id': 'req-bb414790-a728-498f-b111-a8c50ab66f8c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:43.946 39 INFO tempest.lib.common.rest_client [req-bae987e6-8a0d-44a4-a24f-d56d176068dd ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.245s 2020-11-06 18:09:43.947 39 DEBUG tempest.lib.common.rest_client [req-bae987e6-8a0d-44a4-a24f-d56d176068dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bae987e6-8a0d-44a4-a24f-d56d176068dd', 'x-compute-request-id': 'req-bae987e6-8a0d-44a4-a24f-d56d176068dd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:45.180 39 INFO tempest.lib.common.rest_client [req-1626cc40-8e48-49de-924e-c58f29939f1e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.215s 2020-11-06 18:09:45.181 39 DEBUG tempest.lib.common.rest_client [req-1626cc40-8e48-49de-924e-c58f29939f1e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1626cc40-8e48-49de-924e-c58f29939f1e', 'x-compute-request-id': 'req-1626cc40-8e48-49de-924e-c58f29939f1e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:46.394 39 INFO tempest.lib.common.rest_client [req-57b22d37-99fc-46a0-9ca9-edbcd9a16a4e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.196s 2020-11-06 18:09:46.394 39 DEBUG tempest.lib.common.rest_client [req-57b22d37-99fc-46a0-9ca9-edbcd9a16a4e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-57b22d37-99fc-46a0-9ca9-edbcd9a16a4e', 'x-compute-request-id': 'req-57b22d37-99fc-46a0-9ca9-edbcd9a16a4e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:47.615 39 INFO tempest.lib.common.rest_client [req-8b3a8fa9-79c2-4666-a489-d79016d07f42 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.206s 2020-11-06 18:09:47.615 39 DEBUG tempest.lib.common.rest_client [req-8b3a8fa9-79c2-4666-a489-d79016d07f42 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8b3a8fa9-79c2-4666-a489-d79016d07f42', 'x-compute-request-id': 'req-8b3a8fa9-79c2-4666-a489-d79016d07f42', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:48.848 39 INFO tempest.lib.common.rest_client [req-12734d49-2d9c-43fb-89ec-1a3d0d47ec3e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.218s 2020-11-06 18:09:48.849 39 DEBUG tempest.lib.common.rest_client [req-12734d49-2d9c-43fb-89ec-1a3d0d47ec3e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-12734d49-2d9c-43fb-89ec-1a3d0d47ec3e', 'x-compute-request-id': 'req-12734d49-2d9c-43fb-89ec-1a3d0d47ec3e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:50.070 39 INFO tempest.lib.common.rest_client [req-4c1d70dd-c911-42a2-97a1-70247544914e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.204s 2020-11-06 18:09:50.071 39 DEBUG tempest.lib.common.rest_client [req-4c1d70dd-c911-42a2-97a1-70247544914e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4c1d70dd-c911-42a2-97a1-70247544914e', 'x-compute-request-id': 'req-4c1d70dd-c911-42a2-97a1-70247544914e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:51.294 39 INFO tempest.lib.common.rest_client [req-70f9e849-9327-4e7e-b17d-6487de4e58c5 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.204s 2020-11-06 18:09:51.295 39 DEBUG tempest.lib.common.rest_client [req-70f9e849-9327-4e7e-b17d-6487de4e58c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-70f9e849-9327-4e7e-b17d-6487de4e58c5', 'x-compute-request-id': 'req-70f9e849-9327-4e7e-b17d-6487de4e58c5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:52.541 39 INFO tempest.lib.common.rest_client [req-a9ed42c7-c9df-4d48-85bc-7ab20e67cf95 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.230s 2020-11-06 18:09:52.542 39 DEBUG tempest.lib.common.rest_client [req-a9ed42c7-c9df-4d48-85bc-7ab20e67cf95 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a9ed42c7-c9df-4d48-85bc-7ab20e67cf95', 'x-compute-request-id': 'req-a9ed42c7-c9df-4d48-85bc-7ab20e67cf95', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:53.779 39 INFO tempest.lib.common.rest_client [req-45ed9438-f631-4716-b29c-0b5fe6f611f3 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.221s 2020-11-06 18:09:53.779 39 DEBUG tempest.lib.common.rest_client [req-45ed9438-f631-4716-b29c-0b5fe6f611f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-45ed9438-f631-4716-b29c-0b5fe6f611f3', 'x-compute-request-id': 'req-45ed9438-f631-4716-b29c-0b5fe6f611f3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:54.992 39 INFO tempest.lib.common.rest_client [req-997db643-77d4-4ea8-b33a-31dc05ffb019 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.201s 2020-11-06 18:09:54.993 39 DEBUG tempest.lib.common.rest_client [req-997db643-77d4-4ea8-b33a-31dc05ffb019 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-997db643-77d4-4ea8-b33a-31dc05ffb019', 'x-compute-request-id': 'req-997db643-77d4-4ea8-b33a-31dc05ffb019', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:56.213 39 INFO tempest.lib.common.rest_client [req-6a8ea422-cdb5-4a05-8c19-f72fc42eed86 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.206s 2020-11-06 18:09:56.213 39 DEBUG tempest.lib.common.rest_client [req-6a8ea422-cdb5-4a05-8c19-f72fc42eed86 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6a8ea422-cdb5-4a05-8c19-f72fc42eed86', 'x-compute-request-id': 'req-6a8ea422-cdb5-4a05-8c19-f72fc42eed86', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:57.479 39 INFO tempest.lib.common.rest_client [req-20be9a6b-e2d5-468e-ac28-6957e569d65d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.252s 2020-11-06 18:09:57.479 39 DEBUG tempest.lib.common.rest_client [req-20be9a6b-e2d5-468e-ac28-6957e569d65d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-20be9a6b-e2d5-468e-ac28-6957e569d65d', 'x-compute-request-id': 'req-20be9a6b-e2d5-468e-ac28-6957e569d65d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:58.665 39 INFO tempest.lib.common.rest_client [req-ecf48700-3f4d-4dc8-969d-881546571602 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.173s 2020-11-06 18:09:58.665 39 DEBUG tempest.lib.common.rest_client [req-ecf48700-3f4d-4dc8-969d-881546571602 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ecf48700-3f4d-4dc8-969d-881546571602', 'x-compute-request-id': 'req-ecf48700-3f4d-4dc8-969d-881546571602', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:09:59.889 39 INFO tempest.lib.common.rest_client [req-71a332de-ef9a-41e3-ab59-055322c06f01 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.207s 2020-11-06 18:09:59.890 39 DEBUG tempest.lib.common.rest_client [req-71a332de-ef9a-41e3-ab59-055322c06f01 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:09:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-71a332de-ef9a-41e3-ab59-055322c06f01', 'x-compute-request-id': 'req-71a332de-ef9a-41e3-ab59-055322c06f01', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:01.113 39 INFO tempest.lib.common.rest_client [req-07db2584-265f-4073-9fe1-63e479b5af77 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.208s 2020-11-06 18:10:01.113 39 DEBUG tempest.lib.common.rest_client [req-07db2584-265f-4073-9fe1-63e479b5af77 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-07db2584-265f-4073-9fe1-63e479b5af77', 'x-compute-request-id': 'req-07db2584-265f-4073-9fe1-63e479b5af77', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:02.329 39 INFO tempest.lib.common.rest_client [req-a4d6009b-b404-49ba-ba29-12c871504624 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.203s 2020-11-06 18:10:02.329 39 DEBUG tempest.lib.common.rest_client [req-a4d6009b-b404-49ba-ba29-12c871504624 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a4d6009b-b404-49ba-ba29-12c871504624', 'x-compute-request-id': 'req-a4d6009b-b404-49ba-ba29-12c871504624', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:03.615 39 INFO tempest.lib.common.rest_client [req-1f29c8c4-6e60-4eb6-a043-426ca2860410 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.269s 2020-11-06 18:10:03.615 39 DEBUG tempest.lib.common.rest_client [req-1f29c8c4-6e60-4eb6-a043-426ca2860410 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1f29c8c4-6e60-4eb6-a043-426ca2860410', 'x-compute-request-id': 'req-1f29c8c4-6e60-4eb6-a043-426ca2860410', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:04.837 39 INFO tempest.lib.common.rest_client [req-5b805e98-aed7-4e9a-989a-fdeea4104ed4 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.208s 2020-11-06 18:10:04.837 39 DEBUG tempest.lib.common.rest_client [req-5b805e98-aed7-4e9a-989a-fdeea4104ed4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5b805e98-aed7-4e9a-989a-fdeea4104ed4', 'x-compute-request-id': 'req-5b805e98-aed7-4e9a-989a-fdeea4104ed4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:06.066 39 INFO tempest.lib.common.rest_client [req-acd0fe69-abbc-4673-9335-0eff811b86ab ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.216s 2020-11-06 18:10:06.067 39 DEBUG tempest.lib.common.rest_client [req-acd0fe69-abbc-4673-9335-0eff811b86ab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-acd0fe69-abbc-4673-9335-0eff811b86ab', 'x-compute-request-id': 'req-acd0fe69-abbc-4673-9335-0eff811b86ab', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:07.291 39 INFO tempest.lib.common.rest_client [req-741062a5-2b09-43fd-8b53-a72729f51e2d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.212s 2020-11-06 18:10:07.291 39 DEBUG tempest.lib.common.rest_client [req-741062a5-2b09-43fd-8b53-a72729f51e2d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-741062a5-2b09-43fd-8b53-a72729f51e2d', 'x-compute-request-id': 'req-741062a5-2b09-43fd-8b53-a72729f51e2d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:08.614 39 INFO tempest.lib.common.rest_client [req-8da5e7c7-59f6-4467-9580-7f053ef6c0f1 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.309s 2020-11-06 18:10:08.615 39 DEBUG tempest.lib.common.rest_client [req-8da5e7c7-59f6-4467-9580-7f053ef6c0f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8da5e7c7-59f6-4467-9580-7f053ef6c0f1', 'x-compute-request-id': 'req-8da5e7c7-59f6-4467-9580-7f053ef6c0f1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:09.867 39 INFO tempest.lib.common.rest_client [req-dcb5abe1-9082-43ad-91de-f0b487936394 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.242s 2020-11-06 18:10:09.867 39 DEBUG tempest.lib.common.rest_client [req-dcb5abe1-9082-43ad-91de-f0b487936394 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dcb5abe1-9082-43ad-91de-f0b487936394', 'x-compute-request-id': 'req-dcb5abe1-9082-43ad-91de-f0b487936394', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:11.061 39 INFO tempest.lib.common.rest_client [req-579fde40-bf64-409f-8e01-e76d07f21999 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.182s 2020-11-06 18:10:11.062 39 DEBUG tempest.lib.common.rest_client [req-579fde40-bf64-409f-8e01-e76d07f21999 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-579fde40-bf64-409f-8e01-e76d07f21999', 'x-compute-request-id': 'req-579fde40-bf64-409f-8e01-e76d07f21999', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:12.285 39 INFO tempest.lib.common.rest_client [req-fa392f06-ea16-4726-856e-eff1e371f5ac ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.207s 2020-11-06 18:10:12.286 39 DEBUG tempest.lib.common.rest_client [req-fa392f06-ea16-4726-856e-eff1e371f5ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fa392f06-ea16-4726-856e-eff1e371f5ac', 'x-compute-request-id': 'req-fa392f06-ea16-4726-856e-eff1e371f5ac', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:13.493 39 INFO tempest.lib.common.rest_client [req-e9baf847-b71a-404f-902a-7f8a58118d8a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.192s 2020-11-06 18:10:13.494 39 DEBUG tempest.lib.common.rest_client [req-e9baf847-b71a-404f-902a-7f8a58118d8a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e9baf847-b71a-404f-902a-7f8a58118d8a', 'x-compute-request-id': 'req-e9baf847-b71a-404f-902a-7f8a58118d8a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:14.789 39 INFO tempest.lib.common.rest_client [req-da3fd9a9-7809-45fd-bcf6-9541857eeb8c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.277s 2020-11-06 18:10:14.789 39 DEBUG tempest.lib.common.rest_client [req-da3fd9a9-7809-45fd-bcf6-9541857eeb8c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-da3fd9a9-7809-45fd-bcf6-9541857eeb8c', 'x-compute-request-id': 'req-da3fd9a9-7809-45fd-bcf6-9541857eeb8c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:16.069 39 INFO tempest.lib.common.rest_client [req-5a3909d0-37be-4b72-b940-9f8736a9ba90 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.265s 2020-11-06 18:10:16.069 39 DEBUG tempest.lib.common.rest_client [req-5a3909d0-37be-4b72-b940-9f8736a9ba90 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5a3909d0-37be-4b72-b940-9f8736a9ba90', 'x-compute-request-id': 'req-5a3909d0-37be-4b72-b940-9f8736a9ba90', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:17.299 39 INFO tempest.lib.common.rest_client [req-befe7e75-8bd2-460d-9c81-2be0dadca668 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.219s 2020-11-06 18:10:17.300 39 DEBUG tempest.lib.common.rest_client [req-befe7e75-8bd2-460d-9c81-2be0dadca668 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-befe7e75-8bd2-460d-9c81-2be0dadca668', 'x-compute-request-id': 'req-befe7e75-8bd2-460d-9c81-2be0dadca668', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:18.589 39 INFO tempest.lib.common.rest_client [req-7b614aa0-1834-44e7-8e8a-304d4bddf811 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.272s 2020-11-06 18:10:18.589 39 DEBUG tempest.lib.common.rest_client [req-7b614aa0-1834-44e7-8e8a-304d4bddf811 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7b614aa0-1834-44e7-8e8a-304d4bddf811', 'x-compute-request-id': 'req-7b614aa0-1834-44e7-8e8a-304d4bddf811', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:19.845 39 INFO tempest.lib.common.rest_client [req-c4f17131-c1b0-4bc4-8f0d-013b4dcb68eb ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.239s 2020-11-06 18:10:19.846 39 DEBUG tempest.lib.common.rest_client [req-c4f17131-c1b0-4bc4-8f0d-013b4dcb68eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c4f17131-c1b0-4bc4-8f0d-013b4dcb68eb', 'x-compute-request-id': 'req-c4f17131-c1b0-4bc4-8f0d-013b4dcb68eb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:21.248 39 INFO tempest.lib.common.rest_client [req-7378f893-5f2d-4127-8f64-3edea8f3a9c9 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.388s 2020-11-06 18:10:21.248 39 DEBUG tempest.lib.common.rest_client [req-7378f893-5f2d-4127-8f64-3edea8f3a9c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7378f893-5f2d-4127-8f64-3edea8f3a9c9', 'x-compute-request-id': 'req-7378f893-5f2d-4127-8f64-3edea8f3a9c9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:22.519 39 INFO tempest.lib.common.rest_client [req-3594c54d-bf26-4a80-bb5d-5dec73e65cb2 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.252s 2020-11-06 18:10:22.519 39 DEBUG tempest.lib.common.rest_client [req-3594c54d-bf26-4a80-bb5d-5dec73e65cb2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3594c54d-bf26-4a80-bb5d-5dec73e65cb2', 'x-compute-request-id': 'req-3594c54d-bf26-4a80-bb5d-5dec73e65cb2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:24.149 39 INFO tempest.lib.common.rest_client [req-fa7ff12a-4ca3-472a-be8c-09bd264bb63b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.615s 2020-11-06 18:10:24.149 39 DEBUG tempest.lib.common.rest_client [req-fa7ff12a-4ca3-472a-be8c-09bd264bb63b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fa7ff12a-4ca3-472a-be8c-09bd264bb63b', 'x-compute-request-id': 'req-fa7ff12a-4ca3-472a-be8c-09bd264bb63b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:25.380 39 INFO tempest.lib.common.rest_client [req-cac47255-852a-4595-94f0-7127fd6fdbd1 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.215s 2020-11-06 18:10:25.380 39 DEBUG tempest.lib.common.rest_client [req-cac47255-852a-4595-94f0-7127fd6fdbd1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cac47255-852a-4595-94f0-7127fd6fdbd1', 'x-compute-request-id': 'req-cac47255-852a-4595-94f0-7127fd6fdbd1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:26.580 39 INFO tempest.lib.common.rest_client [req-0c8c4ee3-2016-407c-9367-7fca1e8911fe ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.186s 2020-11-06 18:10:26.581 39 DEBUG tempest.lib.common.rest_client [req-0c8c4ee3-2016-407c-9367-7fca1e8911fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0c8c4ee3-2016-407c-9367-7fca1e8911fe', 'x-compute-request-id': 'req-0c8c4ee3-2016-407c-9367-7fca1e8911fe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:27.799 39 INFO tempest.lib.common.rest_client [req-7c307e9b-0ef7-44b7-83ce-d5ab198e598e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.205s 2020-11-06 18:10:27.800 39 DEBUG tempest.lib.common.rest_client [req-7c307e9b-0ef7-44b7-83ce-d5ab198e598e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7c307e9b-0ef7-44b7-83ce-d5ab198e598e', 'x-compute-request-id': 'req-7c307e9b-0ef7-44b7-83ce-d5ab198e598e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:29.036 39 INFO tempest.lib.common.rest_client [req-c3407b9c-2cba-4471-a173-4c49fbf03125 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.220s 2020-11-06 18:10:29.037 39 DEBUG tempest.lib.common.rest_client [req-c3407b9c-2cba-4471-a173-4c49fbf03125 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c3407b9c-2cba-4471-a173-4c49fbf03125', 'x-compute-request-id': 'req-c3407b9c-2cba-4471-a173-4c49fbf03125', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:30.353 39 INFO tempest.lib.common.rest_client [req-9484b3ec-859c-4147-98b3-ceb2de70c74f ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.298s 2020-11-06 18:10:30.353 39 DEBUG tempest.lib.common.rest_client [req-9484b3ec-859c-4147-98b3-ceb2de70c74f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9484b3ec-859c-4147-98b3-ceb2de70c74f', 'x-compute-request-id': 'req-9484b3ec-859c-4147-98b3-ceb2de70c74f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:32.823 39 INFO tempest.lib.common.rest_client [req-fc6e4f3d-eda2-489d-a0ec-6d4a9c1f2062 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 1.452s 2020-11-06 18:10:32.823 39 DEBUG tempest.lib.common.rest_client [req-fc6e4f3d-eda2-489d-a0ec-6d4a9c1f2062 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fc6e4f3d-eda2-489d-a0ec-6d4a9c1f2062', 'x-compute-request-id': 'req-fc6e4f3d-eda2-489d-a0ec-6d4a9c1f2062', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:34.070 39 INFO tempest.lib.common.rest_client [req-834e55e8-1d68-47cb-b1e7-a9273080c16b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.231s 2020-11-06 18:10:34.071 39 DEBUG tempest.lib.common.rest_client [req-834e55e8-1d68-47cb-b1e7-a9273080c16b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-834e55e8-1d68-47cb-b1e7-a9273080c16b', 'x-compute-request-id': 'req-834e55e8-1d68-47cb-b1e7-a9273080c16b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:35.380 39 INFO tempest.lib.common.rest_client [req-4ba8c7af-d55c-4838-b278-8e619c42bdc1 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.292s 2020-11-06 18:10:35.381 39 DEBUG tempest.lib.common.rest_client [req-4ba8c7af-d55c-4838-b278-8e619c42bdc1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4ba8c7af-d55c-4838-b278-8e619c42bdc1', 'x-compute-request-id': 'req-4ba8c7af-d55c-4838-b278-8e619c42bdc1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:36.600 39 INFO tempest.lib.common.rest_client [req-fac862a1-4664-4002-b17f-afff63b6ae9e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.206s 2020-11-06 18:10:36.601 39 DEBUG tempest.lib.common.rest_client [req-fac862a1-4664-4002-b17f-afff63b6ae9e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fac862a1-4664-4002-b17f-afff63b6ae9e', 'x-compute-request-id': 'req-fac862a1-4664-4002-b17f-afff63b6ae9e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:37.795 39 INFO tempest.lib.common.rest_client [req-3bfb1b62-80ec-4e4d-928e-e8f5881937ec ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.177s 2020-11-06 18:10:37.795 39 DEBUG tempest.lib.common.rest_client [req-3bfb1b62-80ec-4e4d-928e-e8f5881937ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3bfb1b62-80ec-4e4d-928e-e8f5881937ec', 'x-compute-request-id': 'req-3bfb1b62-80ec-4e4d-928e-e8f5881937ec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:39.001 39 INFO tempest.lib.common.rest_client [req-b3e3e66f-251e-46a4-97d0-e2a80bd71749 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.188s 2020-11-06 18:10:39.001 39 DEBUG tempest.lib.common.rest_client [req-b3e3e66f-251e-46a4-97d0-e2a80bd71749 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b3e3e66f-251e-46a4-97d0-e2a80bd71749', 'x-compute-request-id': 'req-b3e3e66f-251e-46a4-97d0-e2a80bd71749', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:40.383 39 INFO tempest.lib.common.rest_client [req-48e2b528-150e-417c-9edb-6a8bab33735a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.364s 2020-11-06 18:10:40.383 39 DEBUG tempest.lib.common.rest_client [req-48e2b528-150e-417c-9edb-6a8bab33735a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-48e2b528-150e-417c-9edb-6a8bab33735a', 'x-compute-request-id': 'req-48e2b528-150e-417c-9edb-6a8bab33735a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:42.501 39 INFO tempest.lib.common.rest_client [req-1716a64c-045d-4686-8575-e3e0ea4fffe2 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 1.103s 2020-11-06 18:10:42.502 39 DEBUG tempest.lib.common.rest_client [req-1716a64c-045d-4686-8575-e3e0ea4fffe2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1716a64c-045d-4686-8575-e3e0ea4fffe2', 'x-compute-request-id': 'req-1716a64c-045d-4686-8575-e3e0ea4fffe2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:43.865 39 INFO tempest.lib.common.rest_client [req-ab67d16c-70e0-4b05-8f4b-3a41a60808ec ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.347s 2020-11-06 18:10:43.865 39 DEBUG tempest.lib.common.rest_client [req-ab67d16c-70e0-4b05-8f4b-3a41a60808ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ab67d16c-70e0-4b05-8f4b-3a41a60808ec', 'x-compute-request-id': 'req-ab67d16c-70e0-4b05-8f4b-3a41a60808ec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:45.202 39 INFO tempest.lib.common.rest_client [req-e91300ae-ba0c-48e0-a245-707f3c962d64 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.322s 2020-11-06 18:10:45.203 39 DEBUG tempest.lib.common.rest_client [req-e91300ae-ba0c-48e0-a245-707f3c962d64 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e91300ae-ba0c-48e0-a245-707f3c962d64', 'x-compute-request-id': 'req-e91300ae-ba0c-48e0-a245-707f3c962d64', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:46.485 39 INFO tempest.lib.common.rest_client [req-09c1eff3-2a77-49ed-afdb-19aa96f7f11b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.265s 2020-11-06 18:10:46.485 39 DEBUG tempest.lib.common.rest_client [req-09c1eff3-2a77-49ed-afdb-19aa96f7f11b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-09c1eff3-2a77-49ed-afdb-19aa96f7f11b', 'x-compute-request-id': 'req-09c1eff3-2a77-49ed-afdb-19aa96f7f11b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:47.706 39 INFO tempest.lib.common.rest_client [req-6d577838-f26b-41e4-b342-931cdafba89c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.205s 2020-11-06 18:10:47.707 39 DEBUG tempest.lib.common.rest_client [req-6d577838-f26b-41e4-b342-931cdafba89c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6d577838-f26b-41e4-b342-931cdafba89c', 'x-compute-request-id': 'req-6d577838-f26b-41e4-b342-931cdafba89c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:48.941 39 INFO tempest.lib.common.rest_client [req-3f22fe30-3c2e-40c9-ac4e-c861e74266f2 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.217s 2020-11-06 18:10:48.942 39 DEBUG tempest.lib.common.rest_client [req-3f22fe30-3c2e-40c9-ac4e-c861e74266f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3f22fe30-3c2e-40c9-ac4e-c861e74266f2', 'x-compute-request-id': 'req-3f22fe30-3c2e-40c9-ac4e-c861e74266f2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:50.214 39 INFO tempest.lib.common.rest_client [req-bb4e52f5-8fd8-4f2d-a6d2-7b5355774e9f ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.257s 2020-11-06 18:10:50.215 39 DEBUG tempest.lib.common.rest_client [req-bb4e52f5-8fd8-4f2d-a6d2-7b5355774e9f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bb4e52f5-8fd8-4f2d-a6d2-7b5355774e9f', 'x-compute-request-id': 'req-bb4e52f5-8fd8-4f2d-a6d2-7b5355774e9f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:52.622 39 INFO tempest.lib.common.rest_client [req-df3d846d-2722-4862-af49-a7f5fb144869 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 1.391s 2020-11-06 18:10:52.622 39 DEBUG tempest.lib.common.rest_client [req-df3d846d-2722-4862-af49-a7f5fb144869 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-df3d846d-2722-4862-af49-a7f5fb144869', 'x-compute-request-id': 'req-df3d846d-2722-4862-af49-a7f5fb144869', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:54.853 39 INFO tempest.lib.common.rest_client [req-194c5166-7435-447a-9a3f-db00de549730 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 1.215s 2020-11-06 18:10:54.854 39 DEBUG tempest.lib.common.rest_client [req-194c5166-7435-447a-9a3f-db00de549730 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-194c5166-7435-447a-9a3f-db00de549730', 'x-compute-request-id': 'req-194c5166-7435-447a-9a3f-db00de549730', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:56.042 39 INFO tempest.lib.common.rest_client [req-fa3c088a-db5e-4280-a316-95005a92b549 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.172s 2020-11-06 18:10:56.042 39 DEBUG tempest.lib.common.rest_client [req-fa3c088a-db5e-4280-a316-95005a92b549 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fa3c088a-db5e-4280-a316-95005a92b549', 'x-compute-request-id': 'req-fa3c088a-db5e-4280-a316-95005a92b549', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:57.271 39 INFO tempest.lib.common.rest_client [req-367906db-f899-4186-9078-965ac3575976 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.213s 2020-11-06 18:10:57.272 39 DEBUG tempest.lib.common.rest_client [req-367906db-f899-4186-9078-965ac3575976 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-367906db-f899-4186-9078-965ac3575976', 'x-compute-request-id': 'req-367906db-f899-4186-9078-965ac3575976', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:58.476 39 INFO tempest.lib.common.rest_client [req-7ae9919f-7375-4c02-89d8-d8b740fd5f86 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.187s 2020-11-06 18:10:58.477 39 DEBUG tempest.lib.common.rest_client [req-7ae9919f-7375-4c02-89d8-d8b740fd5f86 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7ae9919f-7375-4c02-89d8-d8b740fd5f86', 'x-compute-request-id': 'req-7ae9919f-7375-4c02-89d8-d8b740fd5f86', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:10:59.728 39 INFO tempest.lib.common.rest_client [req-31b26cc2-3861-418e-91f1-105784df0c00 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.234s 2020-11-06 18:10:59.729 39 DEBUG tempest.lib.common.rest_client [req-31b26cc2-3861-418e-91f1-105784df0c00 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:10:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-31b26cc2-3861-418e-91f1-105784df0c00', 'x-compute-request-id': 'req-31b26cc2-3861-418e-91f1-105784df0c00', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:00.949 39 INFO tempest.lib.common.rest_client [req-535e9f0c-8c4a-4cfe-bacb-c1ff02b38490 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.203s 2020-11-06 18:11:00.950 39 DEBUG tempest.lib.common.rest_client [req-535e9f0c-8c4a-4cfe-bacb-c1ff02b38490 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-535e9f0c-8c4a-4cfe-bacb-c1ff02b38490', 'x-compute-request-id': 'req-535e9f0c-8c4a-4cfe-bacb-c1ff02b38490', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:02.246 39 INFO tempest.lib.common.rest_client [req-d6ceb148-d224-4828-9278-031df3404f6b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.280s 2020-11-06 18:11:02.247 39 DEBUG tempest.lib.common.rest_client [req-d6ceb148-d224-4828-9278-031df3404f6b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d6ceb148-d224-4828-9278-031df3404f6b', 'x-compute-request-id': 'req-d6ceb148-d224-4828-9278-031df3404f6b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:03.632 39 INFO tempest.lib.common.rest_client [req-bb4a70e5-e7d0-4733-a445-dc3712449270 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.367s 2020-11-06 18:11:03.633 39 DEBUG tempest.lib.common.rest_client [req-bb4a70e5-e7d0-4733-a445-dc3712449270 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bb4a70e5-e7d0-4733-a445-dc3712449270', 'x-compute-request-id': 'req-bb4a70e5-e7d0-4733-a445-dc3712449270', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:05.465 39 INFO tempest.lib.common.rest_client [req-9a70f4bf-8323-43e5-a30a-08cbfe7f762c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.816s 2020-11-06 18:11:05.466 39 DEBUG tempest.lib.common.rest_client [req-9a70f4bf-8323-43e5-a30a-08cbfe7f762c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9a70f4bf-8323-43e5-a30a-08cbfe7f762c', 'x-compute-request-id': 'req-9a70f4bf-8323-43e5-a30a-08cbfe7f762c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:06.673 39 INFO tempest.lib.common.rest_client [req-ec16b696-4709-4e74-92ed-6b2d873a7d72 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.196s 2020-11-06 18:11:06.674 39 DEBUG tempest.lib.common.rest_client [req-ec16b696-4709-4e74-92ed-6b2d873a7d72 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ec16b696-4709-4e74-92ed-6b2d873a7d72', 'x-compute-request-id': 'req-ec16b696-4709-4e74-92ed-6b2d873a7d72', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:07.889 39 INFO tempest.lib.common.rest_client [req-6ce18963-dcb9-4530-8834-17ee9dba56ae ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.202s 2020-11-06 18:11:07.889 39 DEBUG tempest.lib.common.rest_client [req-6ce18963-dcb9-4530-8834-17ee9dba56ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6ce18963-dcb9-4530-8834-17ee9dba56ae', 'x-compute-request-id': 'req-6ce18963-dcb9-4530-8834-17ee9dba56ae', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:09.130 39 INFO tempest.lib.common.rest_client [req-ec333f7e-e0af-4a49-82e9-0907fbb84e46 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.227s 2020-11-06 18:11:09.130 39 DEBUG tempest.lib.common.rest_client [req-ec333f7e-e0af-4a49-82e9-0907fbb84e46 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ec333f7e-e0af-4a49-82e9-0907fbb84e46', 'x-compute-request-id': 'req-ec333f7e-e0af-4a49-82e9-0907fbb84e46', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:10.363 39 INFO tempest.lib.common.rest_client [req-83e96403-a28c-4934-8b58-12f34d0f57c1 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.216s 2020-11-06 18:11:10.364 39 DEBUG tempest.lib.common.rest_client [req-83e96403-a28c-4934-8b58-12f34d0f57c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-83e96403-a28c-4934-8b58-12f34d0f57c1', 'x-compute-request-id': 'req-83e96403-a28c-4934-8b58-12f34d0f57c1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:11.598 39 INFO tempest.lib.common.rest_client [req-4ee642b4-4650-460b-b6bf-df9d868a3597 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.220s 2020-11-06 18:11:11.599 39 DEBUG tempest.lib.common.rest_client [req-4ee642b4-4650-460b-b6bf-df9d868a3597 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4ee642b4-4650-460b-b6bf-df9d868a3597', 'x-compute-request-id': 'req-4ee642b4-4650-460b-b6bf-df9d868a3597', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:12.811 39 INFO tempest.lib.common.rest_client [req-f49f06ce-e216-4242-af3c-f38eb2a3a016 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.195s 2020-11-06 18:11:12.812 39 DEBUG tempest.lib.common.rest_client [req-f49f06ce-e216-4242-af3c-f38eb2a3a016 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f49f06ce-e216-4242-af3c-f38eb2a3a016', 'x-compute-request-id': 'req-f49f06ce-e216-4242-af3c-f38eb2a3a016', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:14.016 39 INFO tempest.lib.common.rest_client [req-5162d609-45a8-44d2-b86f-d1cd141ce74e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.188s 2020-11-06 18:11:14.016 39 DEBUG tempest.lib.common.rest_client [req-5162d609-45a8-44d2-b86f-d1cd141ce74e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5162d609-45a8-44d2-b86f-d1cd141ce74e', 'x-compute-request-id': 'req-5162d609-45a8-44d2-b86f-d1cd141ce74e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:15.321 39 INFO tempest.lib.common.rest_client [req-4c85e72e-5bb6-4c8b-b05a-d833a26f276c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.288s 2020-11-06 18:11:15.322 39 DEBUG tempest.lib.common.rest_client [req-4c85e72e-5bb6-4c8b-b05a-d833a26f276c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4c85e72e-5bb6-4c8b-b05a-d833a26f276c', 'x-compute-request-id': 'req-4c85e72e-5bb6-4c8b-b05a-d833a26f276c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:16.613 39 INFO tempest.lib.common.rest_client [req-e3a8e44c-4445-4baf-aafd-ed64f2bd24b7 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.274s 2020-11-06 18:11:16.614 39 DEBUG tempest.lib.common.rest_client [req-e3a8e44c-4445-4baf-aafd-ed64f2bd24b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e3a8e44c-4445-4baf-aafd-ed64f2bd24b7', 'x-compute-request-id': 'req-e3a8e44c-4445-4baf-aafd-ed64f2bd24b7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:17.854 39 INFO tempest.lib.common.rest_client [req-5bb1b669-d19b-4619-a667-dada8c95e23a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.224s 2020-11-06 18:11:17.854 39 DEBUG tempest.lib.common.rest_client [req-5bb1b669-d19b-4619-a667-dada8c95e23a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5bb1b669-d19b-4619-a667-dada8c95e23a', 'x-compute-request-id': 'req-5bb1b669-d19b-4619-a667-dada8c95e23a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:19.252 39 INFO tempest.lib.common.rest_client [req-592ff65b-1b0a-4eb1-8edb-30f2e2a056d2 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.382s 2020-11-06 18:11:19.253 39 DEBUG tempest.lib.common.rest_client [req-592ff65b-1b0a-4eb1-8edb-30f2e2a056d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-592ff65b-1b0a-4eb1-8edb-30f2e2a056d2', 'x-compute-request-id': 'req-592ff65b-1b0a-4eb1-8edb-30f2e2a056d2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:20.617 39 INFO tempest.lib.common.rest_client [req-cd2dd907-e821-4fa2-903c-e5795ed28c27 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.347s 2020-11-06 18:11:20.618 39 DEBUG tempest.lib.common.rest_client [req-cd2dd907-e821-4fa2-903c-e5795ed28c27 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cd2dd907-e821-4fa2-903c-e5795ed28c27', 'x-compute-request-id': 'req-cd2dd907-e821-4fa2-903c-e5795ed28c27', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:21.959 39 INFO tempest.lib.common.rest_client [req-ef533716-85b9-423f-a7f0-ed5822dcf887 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.325s 2020-11-06 18:11:21.959 39 DEBUG tempest.lib.common.rest_client [req-ef533716-85b9-423f-a7f0-ed5822dcf887 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ef533716-85b9-423f-a7f0-ed5822dcf887', 'x-compute-request-id': 'req-ef533716-85b9-423f-a7f0-ed5822dcf887', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:23.283 39 INFO tempest.lib.common.rest_client [req-798c3fb5-9764-414a-95de-a33e9b0a576d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.306s 2020-11-06 18:11:23.283 39 DEBUG tempest.lib.common.rest_client [req-798c3fb5-9764-414a-95de-a33e9b0a576d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-798c3fb5-9764-414a-95de-a33e9b0a576d', 'x-compute-request-id': 'req-798c3fb5-9764-414a-95de-a33e9b0a576d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:24.661 39 INFO tempest.lib.common.rest_client [req-2c790757-b82d-4e45-aa8b-9d1441166ba5 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.361s 2020-11-06 18:11:24.662 39 DEBUG tempest.lib.common.rest_client [req-2c790757-b82d-4e45-aa8b-9d1441166ba5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2c790757-b82d-4e45-aa8b-9d1441166ba5', 'x-compute-request-id': 'req-2c790757-b82d-4e45-aa8b-9d1441166ba5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:25.870 39 INFO tempest.lib.common.rest_client [req-e60cdd9b-51d4-419d-9756-e25f57c0b581 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.191s 2020-11-06 18:11:25.870 39 DEBUG tempest.lib.common.rest_client [req-e60cdd9b-51d4-419d-9756-e25f57c0b581 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e60cdd9b-51d4-419d-9756-e25f57c0b581', 'x-compute-request-id': 'req-e60cdd9b-51d4-419d-9756-e25f57c0b581', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:27.060 39 INFO tempest.lib.common.rest_client [req-f988be3c-b62a-41ad-948d-888962a0d69d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.174s 2020-11-06 18:11:27.061 39 DEBUG tempest.lib.common.rest_client [req-f988be3c-b62a-41ad-948d-888962a0d69d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f988be3c-b62a-41ad-948d-888962a0d69d', 'x-compute-request-id': 'req-f988be3c-b62a-41ad-948d-888962a0d69d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:28.276 39 INFO tempest.lib.common.rest_client [req-6997a6fd-4387-4f46-8a16-56121dd549f5 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.203s 2020-11-06 18:11:28.277 39 DEBUG tempest.lib.common.rest_client [req-6997a6fd-4387-4f46-8a16-56121dd549f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6997a6fd-4387-4f46-8a16-56121dd549f5', 'x-compute-request-id': 'req-6997a6fd-4387-4f46-8a16-56121dd549f5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:29.707 39 INFO tempest.lib.common.rest_client [req-b77683ff-4a27-4505-9fe6-198c1febc7c0 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.416s 2020-11-06 18:11:29.708 39 DEBUG tempest.lib.common.rest_client [req-b77683ff-4a27-4505-9fe6-198c1febc7c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b77683ff-4a27-4505-9fe6-198c1febc7c0', 'x-compute-request-id': 'req-b77683ff-4a27-4505-9fe6-198c1febc7c0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:31.099 39 INFO tempest.lib.common.rest_client [req-95835729-dce6-489b-835d-9bd15c5e4700 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.379s 2020-11-06 18:11:31.100 39 DEBUG tempest.lib.common.rest_client [req-95835729-dce6-489b-835d-9bd15c5e4700 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-95835729-dce6-489b-835d-9bd15c5e4700', 'x-compute-request-id': 'req-95835729-dce6-489b-835d-9bd15c5e4700', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:32.524 39 INFO tempest.lib.common.rest_client [req-4113e478-b48d-4097-9874-dac6dd964284 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.407s 2020-11-06 18:11:32.525 39 DEBUG tempest.lib.common.rest_client [req-4113e478-b48d-4097-9874-dac6dd964284 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4113e478-b48d-4097-9874-dac6dd964284', 'x-compute-request-id': 'req-4113e478-b48d-4097-9874-dac6dd964284', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:33.888 39 INFO tempest.lib.common.rest_client [req-f6c01aed-67e3-4b5b-b407-8bb4bc772bd3 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.349s 2020-11-06 18:11:33.889 39 DEBUG tempest.lib.common.rest_client [req-f6c01aed-67e3-4b5b-b407-8bb4bc772bd3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f6c01aed-67e3-4b5b-b407-8bb4bc772bd3', 'x-compute-request-id': 'req-f6c01aed-67e3-4b5b-b407-8bb4bc772bd3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:35.104 39 INFO tempest.lib.common.rest_client [req-69510cb7-1f5b-477d-9a73-79f8a9d09d82 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.197s 2020-11-06 18:11:35.104 39 DEBUG tempest.lib.common.rest_client [req-69510cb7-1f5b-477d-9a73-79f8a9d09d82 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-69510cb7-1f5b-477d-9a73-79f8a9d09d82', 'x-compute-request-id': 'req-69510cb7-1f5b-477d-9a73-79f8a9d09d82', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:36.401 39 INFO tempest.lib.common.rest_client [req-4d8e67ea-8c77-40e0-a85b-b0292b191c67 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.282s 2020-11-06 18:11:36.401 39 DEBUG tempest.lib.common.rest_client [req-4d8e67ea-8c77-40e0-a85b-b0292b191c67 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4d8e67ea-8c77-40e0-a85b-b0292b191c67', 'x-compute-request-id': 'req-4d8e67ea-8c77-40e0-a85b-b0292b191c67', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:37.717 39 INFO tempest.lib.common.rest_client [req-fa282c6b-842f-4e7f-8ab2-a8954c7ea33e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.302s 2020-11-06 18:11:37.717 39 DEBUG tempest.lib.common.rest_client [req-fa282c6b-842f-4e7f-8ab2-a8954c7ea33e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fa282c6b-842f-4e7f-8ab2-a8954c7ea33e', 'x-compute-request-id': 'req-fa282c6b-842f-4e7f-8ab2-a8954c7ea33e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:39.010 39 INFO tempest.lib.common.rest_client [req-46df3db7-8ea5-4ae1-be80-271d3ddac88c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.279s 2020-11-06 18:11:39.011 39 DEBUG tempest.lib.common.rest_client [req-46df3db7-8ea5-4ae1-be80-271d3ddac88c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-46df3db7-8ea5-4ae1-be80-271d3ddac88c', 'x-compute-request-id': 'req-46df3db7-8ea5-4ae1-be80-271d3ddac88c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:40.292 39 INFO tempest.lib.common.rest_client [req-c7da2bd7-7d64-4ebd-8b99-74909607e820 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.267s 2020-11-06 18:11:40.293 39 DEBUG tempest.lib.common.rest_client [req-c7da2bd7-7d64-4ebd-8b99-74909607e820 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c7da2bd7-7d64-4ebd-8b99-74909607e820', 'x-compute-request-id': 'req-c7da2bd7-7d64-4ebd-8b99-74909607e820', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:41.520 39 INFO tempest.lib.common.rest_client [req-072eee88-1856-493c-833d-11ce1088217c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.216s 2020-11-06 18:11:41.521 39 DEBUG tempest.lib.common.rest_client [req-072eee88-1856-493c-833d-11ce1088217c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-072eee88-1856-493c-833d-11ce1088217c', 'x-compute-request-id': 'req-072eee88-1856-493c-833d-11ce1088217c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:43.012 39 INFO tempest.lib.common.rest_client [req-343124c9-e8dd-4e6b-a1fd-65b1d24a1898 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.475s 2020-11-06 18:11:43.013 39 DEBUG tempest.lib.common.rest_client [req-343124c9-e8dd-4e6b-a1fd-65b1d24a1898 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-343124c9-e8dd-4e6b-a1fd-65b1d24a1898', 'x-compute-request-id': 'req-343124c9-e8dd-4e6b-a1fd-65b1d24a1898', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:45.438 39 INFO tempest.lib.common.rest_client [req-ee1b8fb0-70c0-405f-a753-0c15486c71e9 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 1.411s 2020-11-06 18:11:45.439 39 DEBUG tempest.lib.common.rest_client [req-ee1b8fb0-70c0-405f-a753-0c15486c71e9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ee1b8fb0-70c0-405f-a753-0c15486c71e9', 'x-compute-request-id': 'req-ee1b8fb0-70c0-405f-a753-0c15486c71e9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:46.672 39 INFO tempest.lib.common.rest_client [req-348b8b33-d83f-46b8-b876-cdcbde21b03a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.219s 2020-11-06 18:11:46.673 39 DEBUG tempest.lib.common.rest_client [req-348b8b33-d83f-46b8-b876-cdcbde21b03a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-348b8b33-d83f-46b8-b876-cdcbde21b03a', 'x-compute-request-id': 'req-348b8b33-d83f-46b8-b876-cdcbde21b03a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:48.009 39 INFO tempest.lib.common.rest_client [req-e36fcf79-a337-4299-b56a-ad5f9de5ae9b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.321s 2020-11-06 18:11:48.010 39 DEBUG tempest.lib.common.rest_client [req-e36fcf79-a337-4299-b56a-ad5f9de5ae9b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e36fcf79-a337-4299-b56a-ad5f9de5ae9b', 'x-compute-request-id': 'req-e36fcf79-a337-4299-b56a-ad5f9de5ae9b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:49.208 39 INFO tempest.lib.common.rest_client [req-f9d8355f-eec0-435e-9d90-11f1208d880f ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.187s 2020-11-06 18:11:49.209 39 DEBUG tempest.lib.common.rest_client [req-f9d8355f-eec0-435e-9d90-11f1208d880f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f9d8355f-eec0-435e-9d90-11f1208d880f', 'x-compute-request-id': 'req-f9d8355f-eec0-435e-9d90-11f1208d880f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:51.281 39 INFO tempest.lib.common.rest_client [req-635374f2-317c-47de-91b6-cdb17345e3a5 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 1.056s 2020-11-06 18:11:51.282 39 DEBUG tempest.lib.common.rest_client [req-635374f2-317c-47de-91b6-cdb17345e3a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-635374f2-317c-47de-91b6-cdb17345e3a5', 'x-compute-request-id': 'req-635374f2-317c-47de-91b6-cdb17345e3a5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:52.497 39 INFO tempest.lib.common.rest_client [req-d8258446-8c3e-4a81-8990-069a53915183 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.202s 2020-11-06 18:11:52.498 39 DEBUG tempest.lib.common.rest_client [req-d8258446-8c3e-4a81-8990-069a53915183 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d8258446-8c3e-4a81-8990-069a53915183', 'x-compute-request-id': 'req-d8258446-8c3e-4a81-8990-069a53915183', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:53.800 39 INFO tempest.lib.common.rest_client [req-e1087406-e122-4ac4-a0cf-80684788a3a8 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.285s 2020-11-06 18:11:53.801 39 DEBUG tempest.lib.common.rest_client [req-e1087406-e122-4ac4-a0cf-80684788a3a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e1087406-e122-4ac4-a0cf-80684788a3a8', 'x-compute-request-id': 'req-e1087406-e122-4ac4-a0cf-80684788a3a8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:56.274 39 INFO tempest.lib.common.rest_client [req-4aa6c540-521e-474a-a6ef-1a5631ec8e5b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 1.457s 2020-11-06 18:11:56.274 39 DEBUG tempest.lib.common.rest_client [req-4aa6c540-521e-474a-a6ef-1a5631ec8e5b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4aa6c540-521e-474a-a6ef-1a5631ec8e5b', 'x-compute-request-id': 'req-4aa6c540-521e-474a-a6ef-1a5631ec8e5b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:57.475 39 INFO tempest.lib.common.rest_client [req-dc1a2f11-c4c6-4218-80c8-dd9160e9b23f ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.186s 2020-11-06 18:11:57.476 39 DEBUG tempest.lib.common.rest_client [req-dc1a2f11-c4c6-4218-80c8-dd9160e9b23f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dc1a2f11-c4c6-4218-80c8-dd9160e9b23f', 'x-compute-request-id': 'req-dc1a2f11-c4c6-4218-80c8-dd9160e9b23f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:11:58.728 39 INFO tempest.lib.common.rest_client [req-6f54bce7-b4ed-495e-ab18-018f2299d39b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.234s 2020-11-06 18:11:58.729 39 DEBUG tempest.lib.common.rest_client [req-6f54bce7-b4ed-495e-ab18-018f2299d39b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6f54bce7-b4ed-495e-ab18-018f2299d39b', 'x-compute-request-id': 'req-6f54bce7-b4ed-495e-ab18-018f2299d39b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:00.039 39 INFO tempest.lib.common.rest_client [req-258bcf4b-c637-4de4-a4fc-e109c90ce1b7 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.294s 2020-11-06 18:12:00.040 39 DEBUG tempest.lib.common.rest_client [req-258bcf4b-c637-4de4-a4fc-e109c90ce1b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:11:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-258bcf4b-c637-4de4-a4fc-e109c90ce1b7', 'x-compute-request-id': 'req-258bcf4b-c637-4de4-a4fc-e109c90ce1b7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:01.310 39 INFO tempest.lib.common.rest_client [req-f7bdcf20-2fb6-4e5b-b47e-ff265dac9b86 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.253s 2020-11-06 18:12:01.311 39 DEBUG tempest.lib.common.rest_client [req-f7bdcf20-2fb6-4e5b-b47e-ff265dac9b86 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f7bdcf20-2fb6-4e5b-b47e-ff265dac9b86', 'x-compute-request-id': 'req-f7bdcf20-2fb6-4e5b-b47e-ff265dac9b86', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:02.552 39 INFO tempest.lib.common.rest_client [req-f959fe09-cf7f-4552-a743-f8ddfaf0729f ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.227s 2020-11-06 18:12:02.553 39 DEBUG tempest.lib.common.rest_client [req-f959fe09-cf7f-4552-a743-f8ddfaf0729f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f959fe09-cf7f-4552-a743-f8ddfaf0729f', 'x-compute-request-id': 'req-f959fe09-cf7f-4552-a743-f8ddfaf0729f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:03.905 39 INFO tempest.lib.common.rest_client [req-8af4e9f3-fbf8-4cc0-8690-7e9822035675 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.333s 2020-11-06 18:12:03.906 39 DEBUG tempest.lib.common.rest_client [req-8af4e9f3-fbf8-4cc0-8690-7e9822035675 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8af4e9f3-fbf8-4cc0-8690-7e9822035675', 'x-compute-request-id': 'req-8af4e9f3-fbf8-4cc0-8690-7e9822035675', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:05.395 39 INFO tempest.lib.common.rest_client [req-998f678f-9753-4386-b202-cc4cc0866ce5 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.470s 2020-11-06 18:12:05.395 39 DEBUG tempest.lib.common.rest_client [req-998f678f-9753-4386-b202-cc4cc0866ce5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-998f678f-9753-4386-b202-cc4cc0866ce5', 'x-compute-request-id': 'req-998f678f-9753-4386-b202-cc4cc0866ce5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:07.648 39 INFO tempest.lib.common.rest_client [req-e18d3333-aa26-4dc0-98b0-8b4265b7a642 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 1.241s 2020-11-06 18:12:07.649 39 DEBUG tempest.lib.common.rest_client [req-e18d3333-aa26-4dc0-98b0-8b4265b7a642 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e18d3333-aa26-4dc0-98b0-8b4265b7a642', 'x-compute-request-id': 'req-e18d3333-aa26-4dc0-98b0-8b4265b7a642', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:09.439 39 INFO tempest.lib.common.rest_client [req-7e7808e8-6c6c-4b1a-800a-55957cd63ea6 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.774s 2020-11-06 18:12:09.440 39 DEBUG tempest.lib.common.rest_client [req-7e7808e8-6c6c-4b1a-800a-55957cd63ea6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7e7808e8-6c6c-4b1a-800a-55957cd63ea6', 'x-compute-request-id': 'req-7e7808e8-6c6c-4b1a-800a-55957cd63ea6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:10.670 39 INFO tempest.lib.common.rest_client [req-6eb42939-f9d9-4514-a553-1144fe061b35 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.217s 2020-11-06 18:12:10.671 39 DEBUG tempest.lib.common.rest_client [req-6eb42939-f9d9-4514-a553-1144fe061b35 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6eb42939-f9d9-4514-a553-1144fe061b35', 'x-compute-request-id': 'req-6eb42939-f9d9-4514-a553-1144fe061b35', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:11.936 39 INFO tempest.lib.common.rest_client [req-971c6ce8-7dc7-407e-8c0a-b56919ce48ca ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.248s 2020-11-06 18:12:11.936 39 DEBUG tempest.lib.common.rest_client [req-971c6ce8-7dc7-407e-8c0a-b56919ce48ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-971c6ce8-7dc7-407e-8c0a-b56919ce48ca', 'x-compute-request-id': 'req-971c6ce8-7dc7-407e-8c0a-b56919ce48ca', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:13.330 39 INFO tempest.lib.common.rest_client [req-5ffac523-ea8d-4a61-abd6-e88a8df350a1 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.376s 2020-11-06 18:12:13.330 39 DEBUG tempest.lib.common.rest_client [req-5ffac523-ea8d-4a61-abd6-e88a8df350a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5ffac523-ea8d-4a61-abd6-e88a8df350a1', 'x-compute-request-id': 'req-5ffac523-ea8d-4a61-abd6-e88a8df350a1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:14.735 39 INFO tempest.lib.common.rest_client [req-10e72ed5-44b8-4a75-a793-1c39a295c975 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.393s 2020-11-06 18:12:14.736 39 DEBUG tempest.lib.common.rest_client [req-10e72ed5-44b8-4a75-a793-1c39a295c975 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-10e72ed5-44b8-4a75-a793-1c39a295c975', 'x-compute-request-id': 'req-10e72ed5-44b8-4a75-a793-1c39a295c975', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:15.947 39 INFO tempest.lib.common.rest_client [req-6faac858-43ff-4411-90bd-19c9c6c08af0 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.193s 2020-11-06 18:12:15.948 39 DEBUG tempest.lib.common.rest_client [req-6faac858-43ff-4411-90bd-19c9c6c08af0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6faac858-43ff-4411-90bd-19c9c6c08af0', 'x-compute-request-id': 'req-6faac858-43ff-4411-90bd-19c9c6c08af0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:17.280 39 INFO tempest.lib.common.rest_client [req-65780cae-b81a-4f5f-9cb4-9c9a685c5560 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.321s 2020-11-06 18:12:17.281 39 DEBUG tempest.lib.common.rest_client [req-65780cae-b81a-4f5f-9cb4-9c9a685c5560 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-65780cae-b81a-4f5f-9cb4-9c9a685c5560', 'x-compute-request-id': 'req-65780cae-b81a-4f5f-9cb4-9c9a685c5560', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:18.918 39 INFO tempest.lib.common.rest_client [req-d3b0b24f-b74a-4e08-a57a-83ce426f413d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.620s 2020-11-06 18:12:18.919 39 DEBUG tempest.lib.common.rest_client [req-d3b0b24f-b74a-4e08-a57a-83ce426f413d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d3b0b24f-b74a-4e08-a57a-83ce426f413d', 'x-compute-request-id': 'req-d3b0b24f-b74a-4e08-a57a-83ce426f413d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:20.330 39 INFO tempest.lib.common.rest_client [req-6259b255-aae8-40b1-8720-46fbdccd64ca ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.397s 2020-11-06 18:12:20.331 39 DEBUG tempest.lib.common.rest_client [req-6259b255-aae8-40b1-8720-46fbdccd64ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6259b255-aae8-40b1-8720-46fbdccd64ca', 'x-compute-request-id': 'req-6259b255-aae8-40b1-8720-46fbdccd64ca', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:21.735 39 INFO tempest.lib.common.rest_client [req-5a488d91-22a2-4ab4-be91-8b122dcbc274 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.388s 2020-11-06 18:12:21.736 39 DEBUG tempest.lib.common.rest_client [req-5a488d91-22a2-4ab4-be91-8b122dcbc274 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5a488d91-22a2-4ab4-be91-8b122dcbc274', 'x-compute-request-id': 'req-5a488d91-22a2-4ab4-be91-8b122dcbc274', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:22.936 39 INFO tempest.lib.common.rest_client [req-c0b1a97c-a83b-49d6-b746-f31c1589d700 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.187s 2020-11-06 18:12:22.937 39 DEBUG tempest.lib.common.rest_client [req-c0b1a97c-a83b-49d6-b746-f31c1589d700 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c0b1a97c-a83b-49d6-b746-f31c1589d700', 'x-compute-request-id': 'req-c0b1a97c-a83b-49d6-b746-f31c1589d700', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:24.138 39 INFO tempest.lib.common.rest_client [req-8d813aa9-ec41-43db-89d9-b03f4f170356 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.189s 2020-11-06 18:12:24.139 39 DEBUG tempest.lib.common.rest_client [req-8d813aa9-ec41-43db-89d9-b03f4f170356 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8d813aa9-ec41-43db-89d9-b03f4f170356', 'x-compute-request-id': 'req-8d813aa9-ec41-43db-89d9-b03f4f170356', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:25.386 39 INFO tempest.lib.common.rest_client [req-d3a3d365-6d55-4662-9b31-4f50198a1fd4 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.235s 2020-11-06 18:12:25.387 39 DEBUG tempest.lib.common.rest_client [req-d3a3d365-6d55-4662-9b31-4f50198a1fd4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d3a3d365-6d55-4662-9b31-4f50198a1fd4', 'x-compute-request-id': 'req-d3a3d365-6d55-4662-9b31-4f50198a1fd4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:26.716 39 INFO tempest.lib.common.rest_client [req-57cb31dd-c27e-4717-8d63-2f6af0030542 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.311s 2020-11-06 18:12:26.717 39 DEBUG tempest.lib.common.rest_client [req-57cb31dd-c27e-4717-8d63-2f6af0030542 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-57cb31dd-c27e-4717-8d63-2f6af0030542', 'x-compute-request-id': 'req-57cb31dd-c27e-4717-8d63-2f6af0030542', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:27.955 39 INFO tempest.lib.common.rest_client [req-5c2e87fa-83b8-4e21-95f8-dceb24546df1 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.221s 2020-11-06 18:12:28.012 39 DEBUG tempest.lib.common.rest_client [req-5c2e87fa-83b8-4e21-95f8-dceb24546df1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5c2e87fa-83b8-4e21-95f8-dceb24546df1', 'x-compute-request-id': 'req-5c2e87fa-83b8-4e21-95f8-dceb24546df1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:29.232 39 INFO tempest.lib.common.rest_client [req-a9f95638-00fb-4c7b-8801-73427abc86c2 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.203s 2020-11-06 18:12:29.233 39 DEBUG tempest.lib.common.rest_client [req-a9f95638-00fb-4c7b-8801-73427abc86c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a9f95638-00fb-4c7b-8801-73427abc86c2', 'x-compute-request-id': 'req-a9f95638-00fb-4c7b-8801-73427abc86c2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:30.432 39 INFO tempest.lib.common.rest_client [req-f99bb2d7-e50d-4487-a02b-3eb4df169da4 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.184s 2020-11-06 18:12:30.433 39 DEBUG tempest.lib.common.rest_client [req-f99bb2d7-e50d-4487-a02b-3eb4df169da4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f99bb2d7-e50d-4487-a02b-3eb4df169da4', 'x-compute-request-id': 'req-f99bb2d7-e50d-4487-a02b-3eb4df169da4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:31.682 39 INFO tempest.lib.common.rest_client [req-ea7e6c1b-6f9d-4070-b96d-7a6bd92c26b1 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.232s 2020-11-06 18:12:31.683 39 DEBUG tempest.lib.common.rest_client [req-ea7e6c1b-6f9d-4070-b96d-7a6bd92c26b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ea7e6c1b-6f9d-4070-b96d-7a6bd92c26b1', 'x-compute-request-id': 'req-ea7e6c1b-6f9d-4070-b96d-7a6bd92c26b1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:32.891 39 INFO tempest.lib.common.rest_client [req-51117c06-85d8-4249-a415-23be6bbb3445 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.191s 2020-11-06 18:12:32.891 39 DEBUG tempest.lib.common.rest_client [req-51117c06-85d8-4249-a415-23be6bbb3445 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-51117c06-85d8-4249-a415-23be6bbb3445', 'x-compute-request-id': 'req-51117c06-85d8-4249-a415-23be6bbb3445', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:34.225 39 INFO tempest.lib.common.rest_client [req-452fe40c-965f-4985-a20c-0472bcae1c77 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.318s 2020-11-06 18:12:34.226 39 DEBUG tempest.lib.common.rest_client [req-452fe40c-965f-4985-a20c-0472bcae1c77 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-452fe40c-965f-4985-a20c-0472bcae1c77', 'x-compute-request-id': 'req-452fe40c-965f-4985-a20c-0472bcae1c77', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:35.501 39 INFO tempest.lib.common.rest_client [req-1fb1375b-979f-4329-a40b-50c771c93786 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.259s 2020-11-06 18:12:35.502 39 DEBUG tempest.lib.common.rest_client [req-1fb1375b-979f-4329-a40b-50c771c93786 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1fb1375b-979f-4329-a40b-50c771c93786', 'x-compute-request-id': 'req-1fb1375b-979f-4329-a40b-50c771c93786', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:37.086 39 INFO tempest.lib.common.rest_client [req-8c028717-003f-4b8e-a516-38b360e9f2ad ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.567s 2020-11-06 18:12:37.087 39 DEBUG tempest.lib.common.rest_client [req-8c028717-003f-4b8e-a516-38b360e9f2ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1706', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8c028717-003f-4b8e-a516-38b360e9f2ad', 'x-compute-request-id': 'req-8c028717-003f-4b8e-a516-38b360e9f2ad', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:07:35Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:37.261 39 INFO tempest.lib.common.rest_client [req-620847e3-0f0a-4562-b330-032c849e8191 ] Request (ServerActionsRbacTest:setUp): 204 DELETE http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.161s 2020-11-06 18:12:37.262 39 DEBUG tempest.lib.common.rest_client [req-620847e3-0f0a-4562-b330-032c849e8191 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-620847e3-0f0a-4562-b330-032c849e8191', 'x-compute-request-id': 'req-620847e3-0f0a-4562-b330-032c849e8191', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:37.737 39 INFO tempest.lib.common.rest_client [req-29608e7c-8fbc-4a67-b54b-d1c78f2c8882 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.474s 2020-11-06 18:12:37.738 39 DEBUG tempest.lib.common.rest_client [req-29608e7c-8fbc-4a67-b54b-d1c78f2c8882 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-29608e7c-8fbc-4a67-b54b-d1c78f2c8882', 'x-compute-request-id': 'req-29608e7c-8fbc-4a67-b54b-d1c78f2c8882', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:12:37Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:39.005 39 INFO tempest.lib.common.rest_client [req-32fb5148-583e-4402-9fdb-37272495133d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.254s 2020-11-06 18:12:39.006 39 DEBUG tempest.lib.common.rest_client [req-32fb5148-583e-4402-9fdb-37272495133d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-32fb5148-583e-4402-9fdb-37272495133d', 'x-compute-request-id': 'req-32fb5148-583e-4402-9fdb-37272495133d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "SHUTOFF", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:12:38Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:67:c6:d8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:40.192 39 INFO tempest.lib.common.rest_client [req-eacc6228-595e-417e-b355-0ffa12546ba8 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.169s 2020-11-06 18:12:40.193 39 DEBUG tempest.lib.common.rest_client [req-eacc6228-595e-417e-b355-0ffa12546ba8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1518', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-eacc6228-595e-417e-b355-0ffa12546ba8', 'x-compute-request-id': 'req-eacc6228-595e-417e-b355-0ffa12546ba8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"server": {"id": "6a2aa014-4b8d-452d-8d97-80a588f6930b", "name": "tempest-ServerActionsRbacTest-server-1778191607", "status": "DELETED", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "c482c1f544aa06f001c611042366029c1da451b0f11090b1e3e7785b", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:06:18Z", "updated": "2020-11-06T18:12:40Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:07:25.000000", "OS-SRV-USG:terminated_at": "2020-11-06T18:12:39.000000", "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-000033dd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "deleted", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:40.208 39 INFO tempest.common.waiters [-] State transition "SHUTOFF/deleting" ==> "DELETED/None" after 3 second wait 2020-11-06 18:12:41.260 39 INFO tempest.lib.common.rest_client [req-4bef9a08-303e-411d-9a09-a2ca0fb6d26c ] Request (ServerActionsRbacTest:setUp): 404 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.049s 2020-11-06 18:12:41.261 39 DEBUG tempest.lib.common.rest_client [req-4bef9a08-303e-411d-9a09-a2ca0fb6d26c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-4bef9a08-303e-411d-9a09-a2ca0fb6d26c', 'x-compute-request-id': 'req-4bef9a08-303e-411d-9a09-a2ca0fb6d26c', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 6a2aa014-4b8d-452d-8d97-80a588f6930b could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:41.319 39 INFO tempest.lib.common.rest_client [req-6273ebbe-b142-487b-9477-d7c63c5e3bea ] Request (ServerActionsRbacTest:setUp): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-11-06 18:12:41.320 39 DEBUG tempest.lib.common.rest_client [req-6273ebbe-b142-487b-9477-d7c63c5e3bea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6273ebbe-b142-487b-9477-d7c63c5e3bea', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["AWp1UCd_Qou953fTDbtEfg"], "expires_at": "2020-11-06T19:12:41.000000Z", "issued_at": "2020-11-06T18:12:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:41.321 39 INFO tempest.lib.common.fixed_network [-] (ServerActionsRbacTest:setUp) Found network {'id': '795afc26-787e-4d38-9bc1-bc29e5b00fbc', 'name': 'tempest-ServerActionsRbacTest-1359272422-network', 'tenant_id': '21ea54a8c99a458890dbfde9b6dc3e3b', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '21ea54a8c99a458890dbfde9b6dc3e3b', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 55, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T17:59:07Z', 'updated_at': '2020-11-06T17:59:07Z', 'revision_number': 1} available for tenant 2020-11-06 18:12:41.972 39 INFO tempest.lib.common.rest_client [req-3901e494-2af5-490c-9979-f7412549236b ] Request (ServerActionsRbacTest:setUp): 202 POST http://172.30.13.94/compute/v2.1/servers 0.649s 2020-11-06 18:12:41.973 39 DEBUG tempest.lib.common.rest_client [req-3901e494-2af5-490c-9979-f7412549236b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-ServerActionsRbacTest-server-303364778", "imageRef": "56b368f6-9136-40ec-a04c-564d02c95e42", "flavorRef": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "adminPass": "Y1=3miPVkIJQ+7d", "networks": [{"uuid": "795afc26-787e-4d38-9bc1-bc29e5b00fbc"}]}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '385', 'location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3901e494-2af5-490c-9979-f7412549236b', 'x-compute-request-id': 'req-3901e494-2af5-490c-9979-f7412549236b', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "8ef4697f-c0a5-4381-b77a-8469eee0f6f5", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "Y1=3miPVkIJQ+7d"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:42.083 39 INFO tempest.lib.common.rest_client [req-ec27af93-b75e-40d5-8a79-6ed4cb44b2e0 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 0.104s 2020-11-06 18:12:42.083 39 DEBUG tempest.lib.common.rest_client [req-ec27af93-b75e-40d5-8a79-6ed4cb44b2e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1396', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ec27af93-b75e-40d5-8a79-6ed4cb44b2e0', 'x-compute-request-id': 'req-ec27af93-b75e-40d5-8a79-6ed4cb44b2e0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'{"server": {"id": "8ef4697f-c0a5-4381-b77a-8469eee0f6f5", "name": "tempest-ServerActionsRbacTest-server-303364778", "status": "BUILD", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:12:42Z", "updated": "2020-11-06T18:12:42Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:43.265 39 INFO tempest.lib.common.rest_client [req-ab3b73da-354f-463b-a995-fa6e692c7c7b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 0.163s 2020-11-06 18:12:43.265 39 DEBUG tempest.lib.common.rest_client [req-ab3b73da-354f-463b-a995-fa6e692c7c7b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1491', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ab3b73da-354f-463b-a995-fa6e692c7c7b', 'x-compute-request-id': 'req-ab3b73da-354f-463b-a995-fa6e692c7c7b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'{"server": {"id": "8ef4697f-c0a5-4381-b77a-8469eee0f6f5", "name": "tempest-ServerActionsRbacTest-server-303364778", "status": "BUILD", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:12:41Z", "updated": "2020-11-06T18:12:43Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "networking", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:43.275 39 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/networking" after 1 second wait 2020-11-06 18:12:44.514 39 INFO tempest.lib.common.rest_client [req-09a95387-9305-4b16-b2e7-7a904c84b0fb ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 0.236s 2020-11-06 18:12:44.514 39 DEBUG tempest.lib.common.rest_client [req-09a95387-9305-4b16-b2e7-7a904c84b0fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1531', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-09a95387-9305-4b16-b2e7-7a904c84b0fb', 'x-compute-request-id': 'req-09a95387-9305-4b16-b2e7-7a904c84b0fb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'{"server": {"id": "8ef4697f-c0a5-4381-b77a-8469eee0f6f5", "name": "tempest-ServerActionsRbacTest-server-303364778", "status": "BUILD", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:12:41Z", "updated": "2020-11-06T18:12:43Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:44.531 39 INFO tempest.common.waiters [-] State transition "BUILD/networking" ==> "BUILD/spawning" after 2 second wait 2020-11-06 18:12:45.840 39 INFO tempest.lib.common.rest_client [req-ef8c316d-9f9a-4cb7-b3a6-27a0c5b244ef ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 0.307s 2020-11-06 18:12:45.841 39 DEBUG tempest.lib.common.rest_client [req-ef8c316d-9f9a-4cb7-b3a6-27a0c5b244ef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1531', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ef8c316d-9f9a-4cb7-b3a6-27a0c5b244ef', 'x-compute-request-id': 'req-ef8c316d-9f9a-4cb7-b3a6-27a0c5b244ef', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'{"server": {"id": "8ef4697f-c0a5-4381-b77a-8469eee0f6f5", "name": "tempest-ServerActionsRbacTest-server-303364778", "status": "BUILD", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:12:41Z", "updated": "2020-11-06T18:12:43Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:47.058 39 INFO tempest.lib.common.rest_client [req-e6e7d844-feff-474f-b536-4af60ec4f2bf ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 0.202s 2020-11-06 18:12:47.059 39 DEBUG tempest.lib.common.rest_client [req-e6e7d844-feff-474f-b536-4af60ec4f2bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1531', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e6e7d844-feff-474f-b536-4af60ec4f2bf', 'x-compute-request-id': 'req-e6e7d844-feff-474f-b536-4af60ec4f2bf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'{"server": {"id": "8ef4697f-c0a5-4381-b77a-8469eee0f6f5", "name": "tempest-ServerActionsRbacTest-server-303364778", "status": "BUILD", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:12:41Z", "updated": "2020-11-06T18:12:43Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:48.287 39 INFO tempest.lib.common.rest_client [req-d67f2a4f-e458-43a9-9e22-51a81d209978 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 0.214s 2020-11-06 18:12:48.288 39 DEBUG tempest.lib.common.rest_client [req-d67f2a4f-e458-43a9-9e22-51a81d209978 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1531', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d67f2a4f-e458-43a9-9e22-51a81d209978', 'x-compute-request-id': 'req-d67f2a4f-e458-43a9-9e22-51a81d209978', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'{"server": {"id": "8ef4697f-c0a5-4381-b77a-8469eee0f6f5", "name": "tempest-ServerActionsRbacTest-server-303364778", "status": "BUILD", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:12:41Z", "updated": "2020-11-06T18:12:43Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:49.518 39 INFO tempest.lib.common.rest_client [req-e31fd856-b5d9-4eaf-bad1-6ed6f9bf6614 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 0.216s 2020-11-06 18:12:49.519 39 DEBUG tempest.lib.common.rest_client [req-e31fd856-b5d9-4eaf-bad1-6ed6f9bf6614 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e31fd856-b5d9-4eaf-bad1-6ed6f9bf6614', 'x-compute-request-id': 'req-e31fd856-b5d9-4eaf-bad1-6ed6f9bf6614', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'{"server": {"id": "8ef4697f-c0a5-4381-b77a-8469eee0f6f5", "name": "tempest-ServerActionsRbacTest-server-303364778", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:12:41Z", "updated": "2020-11-06T18:12:48Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.14", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:43:ff:19"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:12:48.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:49.530 39 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 7 second wait 2020-11-06 18:12:49.531 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:12:49.531 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.532 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.532 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.532 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.533 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.533 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.534 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.534 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.534 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.535 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.535 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.535 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.535 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.536 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.536 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.536 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.537 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.537 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.537 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.537 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.538 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.538 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.538 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.539 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.539 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.539 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.539 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.540 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.540 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.540 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.541 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.541 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.541 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.542 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.542 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.542 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.542 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.543 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.543 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.543 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.543 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.544 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.544 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.544 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.545 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.545 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.545 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.546 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.546 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.546 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.546 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.547 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.547 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.547 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.547 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.548 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.548 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.548 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.549 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.549 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.549 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.550 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.550 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.550 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.551 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.551 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.551 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.551 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.552 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.552 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.552 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.552 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.553 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.553 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.553 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:49.554 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-pause-server:unpause, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:12:49.706 39 INFO tempest.lib.common.rest_client [req-80cdbb94-a464-4cf4-b0e0-9c9cdd3028c0 ] Request (ServerActionsRbacTest:test_unpause_server): 202 POST http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5/action 0.151s 2020-11-06 18:12:49.706 39 DEBUG tempest.lib.common.rest_client [req-80cdbb94-a464-4cf4-b0e0-9c9cdd3028c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"pause": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-80cdbb94-a464-4cf4-b0e0-9c9cdd3028c0', 'x-compute-request-id': 'req-80cdbb94-a464-4cf4-b0e0-9c9cdd3028c0', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:50.122 39 INFO tempest.lib.common.rest_client [req-dc6323d0-397c-4254-814d-4a3d7fdb8eb1 ] Request (ServerActionsRbacTest:test_unpause_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 0.415s 2020-11-06 18:12:50.123 39 DEBUG tempest.lib.common.rest_client [req-dc6323d0-397c-4254-814d-4a3d7fdb8eb1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1703', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dc6323d0-397c-4254-814d-4a3d7fdb8eb1', 'x-compute-request-id': 'req-dc6323d0-397c-4254-814d-4a3d7fdb8eb1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'{"server": {"id": "8ef4697f-c0a5-4381-b77a-8469eee0f6f5", "name": "tempest-ServerActionsRbacTest-server-303364778", "status": "PAUSED", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:12:41Z", "updated": "2020-11-06T18:12:50Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.14", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:43:ff:19"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:12:48.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "paused", "OS-EXT-STS:power_state": 3, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:50.138 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:12:50.308 39 INFO tempest.lib.common.rest_client [req-697a5187-d08b-4240-bb07-6e20fcb5ca35 ] Request (ServerActionsRbacTest:test_unpause_server): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.170s 2020-11-06 18:12:50.309 39 DEBUG tempest.lib.common.rest_client [req-697a5187-d08b-4240-bb07-6e20fcb5ca35 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-697a5187-d08b-4240-bb07-6e20fcb5ca35', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:50.392 39 INFO tempest.lib.common.rest_client [req-ce723b79-d76a-4c4d-801d-7309b2d3bb98 ] Request (ServerActionsRbacTest:test_unpause_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 18:12:50.393 39 DEBUG tempest.lib.common.rest_client [req-ce723b79-d76a-4c4d-801d-7309b2d3bb98 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ce723b79-d76a-4c4d-801d-7309b2d3bb98', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["hSDzMoyXSvuRCVuU4IplNA"], "expires_at": "2020-11-06T19:12:50.000000Z", "issued_at": "2020-11-06T18:12:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:50.650 39 INFO tempest.lib.common.rest_client [req-7e80c206-8630-4161-8a84-9ae8a2bbce18 ] Request (ServerActionsRbacTest:test_unpause_server): 202 POST http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5/action 0.256s 2020-11-06 18:12:50.651 39 DEBUG tempest.lib.common.rest_client [req-7e80c206-8630-4161-8a84-9ae8a2bbce18 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"unpause": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7e80c206-8630-4161-8a84-9ae8a2bbce18', 'x-compute-request-id': 'req-7e80c206-8630-4161-8a84-9ae8a2bbce18', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:50.651 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:12:50.707 39 INFO tempest.lib.common.rest_client [req-5f3ede2f-172e-4ea5-a968-93c4b15a4398 ] Request (ServerActionsRbacTest:test_unpause_server): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.054s 2020-11-06 18:12:50.707 39 DEBUG tempest.lib.common.rest_client [req-5f3ede2f-172e-4ea5-a968-93c4b15a4398 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5f3ede2f-172e-4ea5-a968-93c4b15a4398', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:50.742 39 INFO tempest.lib.common.rest_client [req-a3360fbe-c882-4102-9259-5047e5554b8a ] Request (ServerActionsRbacTest:test_unpause_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:12:50.742 39 DEBUG tempest.lib.common.rest_client [req-a3360fbe-c882-4102-9259-5047e5554b8a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a3360fbe-c882-4102-9259-5047e5554b8a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["sQIO7ZwRR6e6LETvcLQ-rw"], "expires_at": "2020-11-06T19:12:50.000000Z", "issued_at": "2020-11-06T18:12:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:51.103 39 INFO tempest.lib.common.rest_client [req-746e22eb-d2bb-488f-acfa-5a686a753542 ] Request (ServerActionsRbacTest:test_unpause_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 0.359s 2020-11-06 18:12:51.103 39 DEBUG tempest.lib.common.rest_client [req-746e22eb-d2bb-488f-acfa-5a686a753542 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-746e22eb-d2bb-488f-acfa-5a686a753542', 'x-compute-request-id': 'req-746e22eb-d2bb-488f-acfa-5a686a753542', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'{"server": {"id": "8ef4697f-c0a5-4381-b77a-8469eee0f6f5", "name": "tempest-ServerActionsRbacTest-server-303364778", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:12:41Z", "updated": "2020-11-06T18:12:51Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.14", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:43:ff:19"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:12:48.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:51.354 39 INFO tempest.lib.common.rest_client [req-86508d86-c9d6-4055-b192-fa240bac1a44 ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 0.234s 2020-11-06 18:12:51.354 39 DEBUG tempest.lib.common.rest_client [req-86508d86-c9d6-4055-b192-fa240bac1a44 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-86508d86-c9d6-4055-b192-fa240bac1a44', 'x-compute-request-id': 'req-86508d86-c9d6-4055-b192-fa240bac1a44', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'{"server": {"id": "8ef4697f-c0a5-4381-b77a-8469eee0f6f5", "name": "tempest-ServerActionsRbacTest-server-303364778", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:12:41Z", "updated": "2020-11-06T18:12:51Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.14", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:43:ff:19"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:12:48.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:51.614 39 INFO tempest.lib.common.rest_client [req-312e88f3-04cf-467a-a6b6-df0fca4e22aa ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 0.191s 2020-11-06 18:12:51.615 39 DEBUG tempest.lib.common.rest_client [req-312e88f3-04cf-467a-a6b6-df0fca4e22aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-312e88f3-04cf-467a-a6b6-df0fca4e22aa', 'x-compute-request-id': 'req-312e88f3-04cf-467a-a6b6-df0fca4e22aa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'{"server": {"id": "8ef4697f-c0a5-4381-b77a-8469eee0f6f5", "name": "tempest-ServerActionsRbacTest-server-303364778", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:12:41Z", "updated": "2020-11-06T18:12:51Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.14", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:43:ff:19"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:12:48.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:51.625 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:12:51.626 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.626 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.627 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.627 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.627 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.628 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.628 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.629 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.629 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.629 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.630 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.630 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.630 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.630 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.631 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.631 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.631 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.631 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.632 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.632 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.632 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.633 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.633 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.633 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.634 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.634 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.634 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.634 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.635 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.635 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.635 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.636 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.636 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.636 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.636 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.637 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.637 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.637 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.638 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.638 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.638 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.638 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.639 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.639 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.639 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.640 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.640 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.640 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.640 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.642 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.642 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.643 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.643 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.643 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.643 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.644 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.644 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.644 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.645 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.645 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.645 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.646 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.646 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.646 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.647 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.647 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.647 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.647 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.648 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.648 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.648 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.649 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.649 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.649 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.649 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:12:51.651 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-shelve:unshelve, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:12:51.975 39 INFO tempest.lib.common.rest_client [req-80fc94ea-e66f-46cb-a6af-5bd9b70d1649 ] Request (ServerActionsRbacTest:test_unshelve_server): 202 POST http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5/action 0.324s 2020-11-06 18:12:51.976 39 DEBUG tempest.lib.common.rest_client [req-80fc94ea-e66f-46cb-a6af-5bd9b70d1649 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"shelve": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-80fc94ea-e66f-46cb-a6af-5bd9b70d1649', 'x-compute-request-id': 'req-80fc94ea-e66f-46cb-a6af-5bd9b70d1649', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:52.185 39 INFO tempest.lib.common.rest_client [req-0e96fca6-4ca0-4c6f-ae6f-907a997f628c ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 0.208s 2020-11-06 18:12:52.186 39 DEBUG tempest.lib.common.rest_client [req-0e96fca6-4ca0-4c6f-ae6f-907a997f628c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1724', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0e96fca6-4ca0-4c6f-ae6f-907a997f628c', 'x-compute-request-id': 'req-0e96fca6-4ca0-4c6f-ae6f-907a997f628c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'{"server": {"id": "8ef4697f-c0a5-4381-b77a-8469eee0f6f5", "name": "tempest-ServerActionsRbacTest-server-303364778", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:12:41Z", "updated": "2020-11-06T18:12:52Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.14", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:43:ff:19"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:12:48.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "shelving", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:53.423 39 INFO tempest.lib.common.rest_client [req-15bbb999-a171-4036-8a21-7dce714c0bb6 ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 0.221s 2020-11-06 18:12:53.423 39 DEBUG tempest.lib.common.rest_client [req-15bbb999-a171-4036-8a21-7dce714c0bb6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1745', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-15bbb999-a171-4036-8a21-7dce714c0bb6', 'x-compute-request-id': 'req-15bbb999-a171-4036-8a21-7dce714c0bb6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'{"server": {"id": "8ef4697f-c0a5-4381-b77a-8469eee0f6f5", "name": "tempest-ServerActionsRbacTest-server-303364778", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:12:41Z", "updated": "2020-11-06T18:12:53Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.14", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:43:ff:19"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:12:48.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "shelving_image_pending_upload", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:53.434 39 INFO tempest.common.waiters [-] State transition "ACTIVE/shelving" ==> "ACTIVE/shelving_image_pending_upload" after 1 second wait 2020-11-06 18:12:54.645 39 INFO tempest.lib.common.rest_client [req-4156a0a2-e3f9-4822-80f6-77235bf63ce2 ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 0.208s 2020-11-06 18:12:54.645 39 DEBUG tempest.lib.common.rest_client [req-4156a0a2-e3f9-4822-80f6-77235bf63ce2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1740', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4156a0a2-e3f9-4822-80f6-77235bf63ce2', 'x-compute-request-id': 'req-4156a0a2-e3f9-4822-80f6-77235bf63ce2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'{"server": {"id": "8ef4697f-c0a5-4381-b77a-8469eee0f6f5", "name": "tempest-ServerActionsRbacTest-server-303364778", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:12:41Z", "updated": "2020-11-06T18:12:53Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.14", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:43:ff:19"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:12:48.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "shelving_image_uploading", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:54.660 39 INFO tempest.common.waiters [-] State transition "ACTIVE/shelving_image_pending_upload" ==> "ACTIVE/shelving_image_uploading" after 2 second wait 2020-11-06 18:12:57.221 39 INFO tempest.lib.common.rest_client [req-b86ea0ae-861c-4d31-8b1b-6044c2652ac4 ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 1.560s 2020-11-06 18:12:57.222 39 DEBUG tempest.lib.common.rest_client [req-b86ea0ae-861c-4d31-8b1b-6044c2652ac4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1740', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b86ea0ae-861c-4d31-8b1b-6044c2652ac4', 'x-compute-request-id': 'req-b86ea0ae-861c-4d31-8b1b-6044c2652ac4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'{"server": {"id": "8ef4697f-c0a5-4381-b77a-8469eee0f6f5", "name": "tempest-ServerActionsRbacTest-server-303364778", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:12:41Z", "updated": "2020-11-06T18:12:53Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.14", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:43:ff:19"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:12:48.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "shelving_image_uploading", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:58.426 39 INFO tempest.lib.common.rest_client [req-7020d21d-d587-494c-a1b2-2209859ddcf0 ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 0.192s 2020-11-06 18:12:58.427 39 DEBUG tempest.lib.common.rest_client [req-7020d21d-d587-494c-a1b2-2209859ddcf0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1740', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7020d21d-d587-494c-a1b2-2209859ddcf0', 'x-compute-request-id': 'req-7020d21d-d587-494c-a1b2-2209859ddcf0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'{"server": {"id": "8ef4697f-c0a5-4381-b77a-8469eee0f6f5", "name": "tempest-ServerActionsRbacTest-server-303364778", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:12:41Z", "updated": "2020-11-06T18:12:53Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.14", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:43:ff:19"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:12:48.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "shelving_image_uploading", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:12:59.821 39 INFO tempest.lib.common.rest_client [req-90f31d2f-01a0-4ea1-8cc8-46e098c38323 ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 0.380s 2020-11-06 18:12:59.822 39 DEBUG tempest.lib.common.rest_client [req-90f31d2f-01a0-4ea1-8cc8-46e098c38323 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:12:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1740', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-90f31d2f-01a0-4ea1-8cc8-46e098c38323', 'x-compute-request-id': 'req-90f31d2f-01a0-4ea1-8cc8-46e098c38323', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'{"server": {"id": "8ef4697f-c0a5-4381-b77a-8469eee0f6f5", "name": "tempest-ServerActionsRbacTest-server-303364778", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:12:41Z", "updated": "2020-11-06T18:12:53Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.14", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:43:ff:19"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:12:48.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "shelving_image_uploading", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:01.123 39 INFO tempest.lib.common.rest_client [req-132b7502-2508-45ff-8c87-3e55083b4ed9 ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 0.286s 2020-11-06 18:13:01.124 39 DEBUG tempest.lib.common.rest_client [req-132b7502-2508-45ff-8c87-3e55083b4ed9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1722', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-132b7502-2508-45ff-8c87-3e55083b4ed9', 'x-compute-request-id': 'req-132b7502-2508-45ff-8c87-3e55083b4ed9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'{"server": {"id": "8ef4697f-c0a5-4381-b77a-8469eee0f6f5", "name": "tempest-ServerActionsRbacTest-server-303364778", "status": "SHELVED", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:12:41Z", "updated": "2020-11-06T18:13:01Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.14", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:43:ff:19"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:12:48.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "shelving_offloading", "OS-EXT-STS:vm_state": "shelved", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:01.136 39 INFO tempest.common.waiters [-] State transition "ACTIVE/shelving_image_uploading" ==> "SHELVED/shelving_offloading" after 9 second wait 2020-11-06 18:13:02.375 39 INFO tempest.lib.common.rest_client [req-2c5fca7f-d705-482b-a692-71c80e57612b ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 0.237s 2020-11-06 18:13:02.376 39 DEBUG tempest.lib.common.rest_client [req-2c5fca7f-d705-482b-a692-71c80e57612b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1647', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2c5fca7f-d705-482b-a692-71c80e57612b', 'x-compute-request-id': 'req-2c5fca7f-d705-482b-a692-71c80e57612b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'{"server": {"id": "8ef4697f-c0a5-4381-b77a-8469eee0f6f5", "name": "tempest-ServerActionsRbacTest-server-303364778", "status": "SHELVED_OFFLOADED", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:12:41Z", "updated": "2020-11-06T18:13:02Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.14", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:43:ff:19"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:12:48.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "instance-000033ee", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:02.388 39 INFO tempest.common.waiters [-] State transition "SHELVED/shelving_offloading" ==> "SHELVED_OFFLOADED/None" after 10 second wait 2020-11-06 18:13:02.388 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:13:02.557 39 INFO tempest.lib.common.rest_client [req-88bd9aea-4c4b-4b84-94bb-b982f63facbf ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.168s 2020-11-06 18:13:02.558 39 DEBUG tempest.lib.common.rest_client [req-88bd9aea-4c4b-4b84-94bb-b982f63facbf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-88bd9aea-4c4b-4b84-94bb-b982f63facbf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:02.639 39 INFO tempest.lib.common.rest_client [req-8c6b2355-7289-4667-b029-dcf8d02436fa ] Request (ServerActionsRbacTest:test_unshelve_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.080s 2020-11-06 18:13:02.640 39 DEBUG tempest.lib.common.rest_client [req-8c6b2355-7289-4667-b029-dcf8d02436fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8c6b2355-7289-4667-b029-dcf8d02436fa', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["3gkQ53BERvaH56tD4RbjhQ"], "expires_at": "2020-11-06T19:13:02.000000Z", "issued_at": "2020-11-06T18:13:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:03.024 39 INFO tempest.lib.common.rest_client [req-f3b0f4e2-9d80-4e66-bd1f-12876b208ed8 ] Request (ServerActionsRbacTest:test_unshelve_server): 202 POST http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5/action 0.383s 2020-11-06 18:13:03.025 39 DEBUG tempest.lib.common.rest_client [req-f3b0f4e2-9d80-4e66-bd1f-12876b208ed8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"unshelve": null} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f3b0f4e2-9d80-4e66-bd1f-12876b208ed8', 'x-compute-request-id': 'req-f3b0f4e2-9d80-4e66-bd1f-12876b208ed8', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:03.025 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:13:03.079 39 INFO tempest.lib.common.rest_client [req-f7f4b2a6-1711-4031-8c1d-576b1d404ce7 ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles 0.054s 2020-11-06 18:13:03.080 39 DEBUG tempest.lib.common.rest_client [req-f7f4b2a6-1711-4031-8c1d-576b1d404ce7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f7f4b2a6-1711-4031-8c1d-576b1d404ce7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b/users/13cdadce7fc24a938ce27cd5ee7c066f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:03.118 39 INFO tempest.lib.common.rest_client [req-420a7eff-e48b-452d-9ff4-bf813111595c ] Request (ServerActionsRbacTest:test_unshelve_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:13:03.119 39 DEBUG tempest.lib.common.rest_client [req-420a7eff-e48b-452d-9ff4-bf813111595c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-420a7eff-e48b-452d-9ff4-bf813111595c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "13cdadce7fc24a938ce27cd5ee7c066f", "name": "tempest-ServerActionsRbacTest-1280955528", "password_expires_at": null}, "audit_ids": ["T6oyXI5xRO2ljEfJAovvCg"], "expires_at": "2020-11-06T19:13:03.000000Z", "issued_at": "2020-11-06T18:13:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ea54a8c99a458890dbfde9b6dc3e3b", "name": "tempest-ServerActionsRbacTest-1280955528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ea54a8c99a458890dbfde9b6dc3e3b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:04.359 39 INFO tempest.lib.common.rest_client [req-d04e3196-b5a5-46cc-a9de-5afca707816e ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 1.239s 2020-11-06 18:13:04.359 39 DEBUG tempest.lib.common.rest_client [req-d04e3196-b5a5-46cc-a9de-5afca707816e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1655', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d04e3196-b5a5-46cc-a9de-5afca707816e', 'x-compute-request-id': 'req-d04e3196-b5a5-46cc-a9de-5afca707816e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'{"server": {"id": "8ef4697f-c0a5-4381-b77a-8469eee0f6f5", "name": "tempest-ServerActionsRbacTest-server-303364778", "status": "SHELVED_OFFLOADED", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:12:41Z", "updated": "2020-11-06T18:13:03Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.14", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:43:ff:19"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:12:48.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "instance-000033ee", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "unshelving", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:05.578 39 INFO tempest.lib.common.rest_client [req-73f9dbc6-da18-40c9-975e-02d70ac41967 ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 0.201s 2020-11-06 18:13:05.579 39 DEBUG tempest.lib.common.rest_client [req-73f9dbc6-da18-40c9-975e-02d70ac41967 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-73f9dbc6-da18-40c9-975e-02d70ac41967', 'x-compute-request-id': 'req-73f9dbc6-da18-40c9-975e-02d70ac41967', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'{"server": {"id": "8ef4697f-c0a5-4381-b77a-8469eee0f6f5", "name": "tempest-ServerActionsRbacTest-server-303364778", "status": "SHELVED_OFFLOADED", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "dd8ab244-1acf-4b26-a1af-9ebda344916a", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/dd8ab244-1acf-4b26-a1af-9ebda344916a"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:12:41Z", "updated": "2020-11-06T18:13:04Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.14", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:43:ff:19"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:12:48.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:05.595 39 INFO tempest.common.waiters [-] State transition "SHELVED_OFFLOADED/unshelving" ==> "SHELVED_OFFLOADED/spawning" after 1 second wait 2020-11-06 18:13:06.802 39 INFO tempest.lib.common.rest_client [req-0352b020-abb8-4801-984a-8507d460d089 ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 0.205s 2020-11-06 18:13:06.803 39 DEBUG tempest.lib.common.rest_client [req-0352b020-abb8-4801-984a-8507d460d089 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0352b020-abb8-4801-984a-8507d460d089', 'x-compute-request-id': 'req-0352b020-abb8-4801-984a-8507d460d089', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'{"server": {"id": "8ef4697f-c0a5-4381-b77a-8469eee0f6f5", "name": "tempest-ServerActionsRbacTest-server-303364778", "status": "SHELVED_OFFLOADED", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "dd8ab244-1acf-4b26-a1af-9ebda344916a", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/dd8ab244-1acf-4b26-a1af-9ebda344916a"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:12:41Z", "updated": "2020-11-06T18:13:04Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.14", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:43:ff:19"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:12:48.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:08.024 39 INFO tempest.lib.common.rest_client [req-959f2d62-4e46-4fb7-abce-20291c6ea7a0 ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 0.204s 2020-11-06 18:13:08.025 39 DEBUG tempest.lib.common.rest_client [req-959f2d62-4e46-4fb7-abce-20291c6ea7a0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-959f2d62-4e46-4fb7-abce-20291c6ea7a0', 'x-compute-request-id': 'req-959f2d62-4e46-4fb7-abce-20291c6ea7a0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'{"server": {"id": "8ef4697f-c0a5-4381-b77a-8469eee0f6f5", "name": "tempest-ServerActionsRbacTest-server-303364778", "status": "SHELVED_OFFLOADED", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "dd8ab244-1acf-4b26-a1af-9ebda344916a", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/dd8ab244-1acf-4b26-a1af-9ebda344916a"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:12:41Z", "updated": "2020-11-06T18:13:04Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.14", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:43:ff:19"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:12:48.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:09.237 39 INFO tempest.lib.common.rest_client [req-60ecb466-2cc1-489a-a756-ce00e67a9a3f ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 0.195s 2020-11-06 18:13:09.280 39 DEBUG tempest.lib.common.rest_client [req-60ecb466-2cc1-489a-a756-ce00e67a9a3f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-60ecb466-2cc1-489a-a756-ce00e67a9a3f', 'x-compute-request-id': 'req-60ecb466-2cc1-489a-a756-ce00e67a9a3f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'{"server": {"id": "8ef4697f-c0a5-4381-b77a-8469eee0f6f5", "name": "tempest-ServerActionsRbacTest-server-303364778", "status": "SHELVED_OFFLOADED", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "dd8ab244-1acf-4b26-a1af-9ebda344916a", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/dd8ab244-1acf-4b26-a1af-9ebda344916a"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:12:41Z", "updated": "2020-11-06T18:13:04Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.14", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:43:ff:19"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:12:48.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:10.765 39 INFO tempest.lib.common.rest_client [req-1b3d596a-58e4-4a38-be19-c721b1f242ac ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 0.470s 2020-11-06 18:13:10.765 39 DEBUG tempest.lib.common.rest_client [req-1b3d596a-58e4-4a38-be19-c721b1f242ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1b3d596a-58e4-4a38-be19-c721b1f242ac', 'x-compute-request-id': 'req-1b3d596a-58e4-4a38-be19-c721b1f242ac', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'{"server": {"id": "8ef4697f-c0a5-4381-b77a-8469eee0f6f5", "name": "tempest-ServerActionsRbacTest-server-303364778", "status": "SHELVED_OFFLOADED", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "dd8ab244-1acf-4b26-a1af-9ebda344916a", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/dd8ab244-1acf-4b26-a1af-9ebda344916a"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:12:41Z", "updated": "2020-11-06T18:13:04Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.14", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:43:ff:19"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:12:48.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:12.069 39 INFO tempest.lib.common.rest_client [req-8eb10b5b-a1c6-4a7b-982a-ff903ac154cd ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 0.287s 2020-11-06 18:13:12.069 39 DEBUG tempest.lib.common.rest_client [req-8eb10b5b-a1c6-4a7b-982a-ff903ac154cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8eb10b5b-a1c6-4a7b-982a-ff903ac154cd', 'x-compute-request-id': 'req-8eb10b5b-a1c6-4a7b-982a-ff903ac154cd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'{"server": {"id": "8ef4697f-c0a5-4381-b77a-8469eee0f6f5", "name": "tempest-ServerActionsRbacTest-server-303364778", "status": "SHELVED_OFFLOADED", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "dd8ab244-1acf-4b26-a1af-9ebda344916a", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/dd8ab244-1acf-4b26-a1af-9ebda344916a"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:12:41Z", "updated": "2020-11-06T18:13:04Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.14", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:43:ff:19"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:12:48.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:13.317 39 INFO tempest.lib.common.rest_client [req-68ffd8c9-b9b9-4d74-95c9-93c7b046743a ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 0.230s 2020-11-06 18:13:13.317 39 DEBUG tempest.lib.common.rest_client [req-68ffd8c9-b9b9-4d74-95c9-93c7b046743a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-68ffd8c9-b9b9-4d74-95c9-93c7b046743a', 'x-compute-request-id': 'req-68ffd8c9-b9b9-4d74-95c9-93c7b046743a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'{"server": {"id": "8ef4697f-c0a5-4381-b77a-8469eee0f6f5", "name": "tempest-ServerActionsRbacTest-server-303364778", "status": "SHELVED_OFFLOADED", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "dd8ab244-1acf-4b26-a1af-9ebda344916a", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/dd8ab244-1acf-4b26-a1af-9ebda344916a"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:12:41Z", "updated": "2020-11-06T18:13:04Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.14", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:43:ff:19"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:12:48.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:14.538 39 INFO tempest.lib.common.rest_client [req-bb700613-280c-4cc5-a263-c57751983d79 ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 0.204s 2020-11-06 18:13:14.539 39 DEBUG tempest.lib.common.rest_client [req-bb700613-280c-4cc5-a263-c57751983d79 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bb700613-280c-4cc5-a263-c57751983d79', 'x-compute-request-id': 'req-bb700613-280c-4cc5-a263-c57751983d79', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'{"server": {"id": "8ef4697f-c0a5-4381-b77a-8469eee0f6f5", "name": "tempest-ServerActionsRbacTest-server-303364778", "status": "SHELVED_OFFLOADED", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "dd8ab244-1acf-4b26-a1af-9ebda344916a", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/dd8ab244-1acf-4b26-a1af-9ebda344916a"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:12:41Z", "updated": "2020-11-06T18:13:04Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.14", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:43:ff:19"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:12:48.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:16.888 39 INFO tempest.lib.common.rest_client [req-779cebcb-d2d4-4157-838d-bcf81e9528b4 ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 1.333s 2020-11-06 18:13:16.889 39 DEBUG tempest.lib.common.rest_client [req-779cebcb-d2d4-4157-838d-bcf81e9528b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-779cebcb-d2d4-4157-838d-bcf81e9528b4', 'x-compute-request-id': 'req-779cebcb-d2d4-4157-838d-bcf81e9528b4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'{"server": {"id": "8ef4697f-c0a5-4381-b77a-8469eee0f6f5", "name": "tempest-ServerActionsRbacTest-server-303364778", "status": "SHELVED_OFFLOADED", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "dd8ab244-1acf-4b26-a1af-9ebda344916a", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/dd8ab244-1acf-4b26-a1af-9ebda344916a"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:12:41Z", "updated": "2020-11-06T18:13:04Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.14", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:43:ff:19"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:12:48.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:18.098 39 INFO tempest.lib.common.rest_client [req-db1c89fd-88ee-43a3-a5f1-f2712d5dec32 ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 0.192s 2020-11-06 18:13:18.098 39 DEBUG tempest.lib.common.rest_client [req-db1c89fd-88ee-43a3-a5f1-f2712d5dec32 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-db1c89fd-88ee-43a3-a5f1-f2712d5dec32', 'x-compute-request-id': 'req-db1c89fd-88ee-43a3-a5f1-f2712d5dec32', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'{"server": {"id": "8ef4697f-c0a5-4381-b77a-8469eee0f6f5", "name": "tempest-ServerActionsRbacTest-server-303364778", "status": "SHELVED_OFFLOADED", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "dd8ab244-1acf-4b26-a1af-9ebda344916a", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/dd8ab244-1acf-4b26-a1af-9ebda344916a"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:12:41Z", "updated": "2020-11-06T18:13:04Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.14", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:43:ff:19"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:12:48.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:19.303 39 INFO tempest.lib.common.rest_client [req-ae3f23d8-fc3f-4e57-ac73-2f4303695825 ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 0.190s 2020-11-06 18:13:19.304 39 DEBUG tempest.lib.common.rest_client [req-ae3f23d8-fc3f-4e57-ac73-2f4303695825 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ae3f23d8-fc3f-4e57-ac73-2f4303695825', 'x-compute-request-id': 'req-ae3f23d8-fc3f-4e57-ac73-2f4303695825', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'{"server": {"id": "8ef4697f-c0a5-4381-b77a-8469eee0f6f5", "name": "tempest-ServerActionsRbacTest-server-303364778", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:12:41Z", "updated": "2020-11-06T18:13:19Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.14", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:43:ff:19"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:13:18.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:19.319 39 INFO tempest.common.waiters [-] State transition "SHELVED_OFFLOADED/spawning" ==> "ACTIVE/None" after 15 second wait 2020-11-06 18:13:19.518 39 INFO tempest.lib.common.rest_client [req-13ae81e9-b99a-4463-ab0d-e528fc27364a ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 0.198s 2020-11-06 18:13:19.519 39 DEBUG tempest.lib.common.rest_client [req-13ae81e9-b99a-4463-ab0d-e528fc27364a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-13ae81e9-b99a-4463-ab0d-e528fc27364a', 'x-compute-request-id': 'req-13ae81e9-b99a-4463-ab0d-e528fc27364a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'{"server": {"id": "8ef4697f-c0a5-4381-b77a-8469eee0f6f5", "name": "tempest-ServerActionsRbacTest-server-303364778", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:12:41Z", "updated": "2020-11-06T18:13:19Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.14", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:43:ff:19"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:13:18.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:19.713 39 INFO tempest.lib.common.rest_client [req-1f9fae74-2e21-4ffd-a483-c50f8be4b0dc ] Request (ServerActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 0.164s 2020-11-06 18:13:19.714 39 DEBUG tempest.lib.common.rest_client [req-1f9fae74-2e21-4ffd-a483-c50f8be4b0dc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1f9fae74-2e21-4ffd-a483-c50f8be4b0dc', 'x-compute-request-id': 'req-1f9fae74-2e21-4ffd-a483-c50f8be4b0dc', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:19.956 39 INFO tempest.lib.common.rest_client [req-ee08e8b9-4045-4071-a8f0-17fab1d174ee ] Request (ServerActionsRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 0.241s 2020-11-06 18:13:19.956 39 DEBUG tempest.lib.common.rest_client [req-ee08e8b9-4045-4071-a8f0-17fab1d174ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1724', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ee08e8b9-4045-4071-a8f0-17fab1d174ee', 'x-compute-request-id': 'req-ee08e8b9-4045-4071-a8f0-17fab1d174ee', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'{"server": {"id": "8ef4697f-c0a5-4381-b77a-8469eee0f6f5", "name": "tempest-ServerActionsRbacTest-server-303364778", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:12:41Z", "updated": "2020-11-06T18:13:20Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.14", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:43:ff:19"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:13:18.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:22.113 39 INFO tempest.lib.common.rest_client [req-e9e10d94-116d-4ef0-862c-6d2a020386c2 ] Request (ServerActionsRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 1.142s 2020-11-06 18:13:22.114 39 DEBUG tempest.lib.common.rest_client [req-e9e10d94-116d-4ef0-862c-6d2a020386c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1724', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e9e10d94-116d-4ef0-862c-6d2a020386c2', 'x-compute-request-id': 'req-e9e10d94-116d-4ef0-862c-6d2a020386c2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'{"server": {"id": "8ef4697f-c0a5-4381-b77a-8469eee0f6f5", "name": "tempest-ServerActionsRbacTest-server-303364778", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:12:41Z", "updated": "2020-11-06T18:13:20Z", "addresses": {"tempest-ServerActionsRbacTest-1359272422-network": [{"version": 4, "addr": "192.168.120.14", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:43:ff:19"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:13:18.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:23.268 39 INFO tempest.lib.common.rest_client [req-a8a8d0a2-6a2e-4ee4-82e4-f6a6f20cfbe7 ] Request (ServerActionsRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 0.137s 2020-11-06 18:13:23.269 39 DEBUG tempest.lib.common.rest_client [req-a8a8d0a2-6a2e-4ee4-82e4-f6a6f20cfbe7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1512', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a8a8d0a2-6a2e-4ee4-82e4-f6a6f20cfbe7', 'x-compute-request-id': 'req-a8a8d0a2-6a2e-4ee4-82e4-f6a6f20cfbe7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'{"server": {"id": "8ef4697f-c0a5-4381-b77a-8469eee0f6f5", "name": "tempest-ServerActionsRbacTest-server-303364778", "status": "ACTIVE", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "user_id": "13cdadce7fc24a938ce27cd5ee7c066f", "metadata": {}, "hostId": "e17807ed68e4b913e253dd72920fe8a3acc981f5417d0b0a6562a577", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:12:41Z", "updated": "2020-11-06T18:13:20Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:13:18.000000", "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:24.347 39 INFO tempest.lib.common.rest_client [req-bd04957e-b2eb-4b02-a051-f79a7bfaabe4 ] Request (ServerActionsRbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5 0.062s 2020-11-06 18:13:24.348 39 DEBUG tempest.lib.common.rest_client [req-bd04957e-b2eb-4b02-a051-f79a7bfaabe4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-bd04957e-b2eb-4b02-a051-f79a7bfaabe4', 'x-compute-request-id': 'req-bd04957e-b2eb-4b02-a051-f79a7bfaabe4', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8ef4697f-c0a5-4381-b77a-8469eee0f6f5'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 8ef4697f-c0a5-4381-b77a-8469eee0f6f5 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:24.408 39 INFO tempest.lib.common.rest_client [req-31789b43-7b1f-47eb-9809-bbd03cf74769 ] Request (ServerActionsRbacTest:tearDownClass): 404 DELETE http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.059s 2020-11-06 18:13:24.408 39 DEBUG tempest.lib.common.rest_client [req-31789b43-7b1f-47eb-9809-bbd03cf74769 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-31789b43-7b1f-47eb-9809-bbd03cf74769', 'x-compute-request-id': 'req-31789b43-7b1f-47eb-9809-bbd03cf74769', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 6a2aa014-4b8d-452d-8d97-80a588f6930b could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:24.470 39 INFO tempest.lib.common.rest_client [req-136d6e93-608a-4cce-8fd4-19220e341871 ] Request (ServerActionsRbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b 0.060s 2020-11-06 18:13:24.470 39 DEBUG tempest.lib.common.rest_client [req-136d6e93-608a-4cce-8fd4-19220e341871 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-136d6e93-608a-4cce-8fd4-19220e341871', 'x-compute-request-id': 'req-136d6e93-608a-4cce-8fd4-19220e341871', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6a2aa014-4b8d-452d-8d97-80a588f6930b'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 6a2aa014-4b8d-452d-8d97-80a588f6930b could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:24.506 39 INFO tempest.lib.common.rest_client [req-af17bfd7-e048-4dc3-8dd8-e09fbf24f1e1 ] Request (ServerActionsRbacTest:tearDownClass): 202 DELETE http://172.30.13.94/compute/v2.1/os-keypairs/tempest-keypair-90357195 0.034s 2020-11-06 18:13:24.506 39 DEBUG tempest.lib.common.rest_client [req-af17bfd7-e048-4dc3-8dd8-e09fbf24f1e1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-af17bfd7-e048-4dc3-8dd8-e09fbf24f1e1', 'x-compute-request-id': 'req-af17bfd7-e048-4dc3-8dd8-e09fbf24f1e1', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/os-keypairs/tempest-keypair-90357195'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:24.641 39 INFO tempest.lib.common.rest_client [req-108f8918-3f00-426e-83db-75684a69e142 ] Request (ServerActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/04dd1681-e813-4cef-95d4-a0c09e99fd3d 0.134s 2020-11-06 18:13:24.641 39 DEBUG tempest.lib.common.rest_client [req-108f8918-3f00-426e-83db-75684a69e142 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-108f8918-3f00-426e-83db-75684a69e142', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:13:24 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/04dd1681-e813-4cef-95d4-a0c09e99fd3d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:24.657 39 INFO tempest.lib.common.rest_client [req-a2b58c80-3251-42e2-9553-0537b39e0175 ] Request (ServerActionsRbacTest:tearDownClass): 404 GET http://172.30.13.94:9696/v2.0/security-groups/04dd1681-e813-4cef-95d4-a0c09e99fd3d 0.015s 2020-11-06 18:13:24.657 39 DEBUG tempest.lib.common.rest_client [req-a2b58c80-3251-42e2-9553-0537b39e0175 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '146', 'x-openstack-request-id': 'req-a2b58c80-3251-42e2-9553-0537b39e0175', 'date': 'Fri, 06 Nov 2020 18:13:24 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/04dd1681-e813-4cef-95d4-a0c09e99fd3d'} Body: b'{"NeutronError": {"type": "SecurityGroupNotFound", "message": "Security group 04dd1681-e813-4cef-95d4-a0c09e99fd3d does not exist", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:25.375 39 INFO tempest.lib.common.rest_client [req-577bf8f2-6088-494b-948d-7225172db137 ] Request (ServerActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/floatingips/2a0b89b7-d480-4d15-8afb-93c1b82e1bd3 0.717s 2020-11-06 18:13:25.376 39 DEBUG tempest.lib.common.rest_client [req-577bf8f2-6088-494b-948d-7225172db137 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-577bf8f2-6088-494b-948d-7225172db137', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:13:25 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/floatingips/2a0b89b7-d480-4d15-8afb-93c1b82e1bd3'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:25.844 39 INFO tempest.lib.common.rest_client [req-e971e4b2-e84b-432d-b99b-f73e2cf6e77d ] Request (ServerActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6 0.467s 2020-11-06 18:13:25.845 39 DEBUG tempest.lib.common.rest_client [req-e971e4b2-e84b-432d-b99b-f73e2cf6e77d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e971e4b2-e84b-432d-b99b-f73e2cf6e77d', 'x-compute-request-id': 'req-e971e4b2-e84b-432d-b99b-f73e2cf6e77d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/images/4b82337b-9afd-41e8-a1d3-ce32a594dca6'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:25.908 39 INFO tempest.lib.common.rest_client [req-aab4389f-861e-4dbe-a6c1-32fdb4b22d77 ] Request (ServerActionsRbacTest:tearDownClass): 404 DELETE http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.061s 2020-11-06 18:13:25.908 39 DEBUG tempest.lib.common.rest_client [req-aab4389f-861e-4dbe-a6c1-32fdb4b22d77 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-aab4389f-861e-4dbe-a6c1-32fdb4b22d77', 'x-compute-request-id': 'req-aab4389f-861e-4dbe-a6c1-32fdb4b22d77', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance d6904dd4-113b-430f-b8b1-4d5fd06f8ccf could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:25.969 39 INFO tempest.lib.common.rest_client [req-f743cef9-067a-4405-8df5-d5605ce48b58 ] Request (ServerActionsRbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf 0.061s 2020-11-06 18:13:25.970 39 DEBUG tempest.lib.common.rest_client [req-f743cef9-067a-4405-8df5-d5605ce48b58 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-f743cef9-067a-4405-8df5-d5605ce48b58', 'x-compute-request-id': 'req-f743cef9-067a-4405-8df5-d5605ce48b58', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d6904dd4-113b-430f-b8b1-4d5fd06f8ccf'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance d6904dd4-113b-430f-b8b1-4d5fd06f8ccf could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:25.970 39 DEBUG tempest.lib.common.dynamic_creds [-] Clearing network: {'id': '795afc26-787e-4d38-9bc1-bc29e5b00fbc', 'name': 'tempest-ServerActionsRbacTest-1359272422-network', 'tenant_id': '21ea54a8c99a458890dbfde9b6dc3e3b', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '21ea54a8c99a458890dbfde9b6dc3e3b', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 55, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T17:59:07Z', 'updated_at': '2020-11-06T17:59:07Z', 'revision_number': 1}, subnet: {'id': 'ce5d50db-7303-44dd-a6d4-e1f97375f5b1', 'name': 'tempest-ServerActionsRbacTest-1359272422-subnet', 'tenant_id': '21ea54a8c99a458890dbfde9b6dc3e3b', 'network_id': '795afc26-787e-4d38-9bc1-bc29e5b00fbc', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-11-06T17:59:08Z', 'updated_at': '2020-11-06T17:59:08Z', 'revision_number': 0, 'project_id': '21ea54a8c99a458890dbfde9b6dc3e3b'}, router: {'id': '22e042aa-7bfd-41c7-9427-707624ddf3ce', 'name': 'tempest-ServerActionsRbacTest-1359272422-router', 'tenant_id': '21ea54a8c99a458890dbfde9b6dc3e3b', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.17'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::3bd'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-11-06T17:59:08Z', 'updated_at': '2020-11-06T17:59:09Z', 'revision_number': 3, 'project_id': '21ea54a8c99a458890dbfde9b6dc3e3b'} _clear_isolated_net_resources /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/dynamic_creds.py:418 2020-11-06 18:13:28.371 39 INFO tempest.lib.common.rest_client [req-103a08a7-9663-4b2e-b21f-c8849db2621b ] Request (ServerActionsRbacTest:tearDownClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/22e042aa-7bfd-41c7-9427-707624ddf3ce/remove_router_interface 2.400s 2020-11-06 18:13:28.372 39 DEBUG tempest.lib.common.rest_client [req-103a08a7-9663-4b2e-b21f-c8849db2621b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "ce5d50db-7303-44dd-a6d4-e1f97375f5b1"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-103a08a7-9663-4b2e-b21f-c8849db2621b', 'date': 'Fri, 06 Nov 2020 18:13:28 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/22e042aa-7bfd-41c7-9427-707624ddf3ce/remove_router_interface'} Body: b'{"id": "22e042aa-7bfd-41c7-9427-707624ddf3ce", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "port_id": "53a4337b-bc36-4308-9dd6-73ef91c8bd27", "network_id": "795afc26-787e-4d38-9bc1-bc29e5b00fbc", "subnet_id": "ce5d50db-7303-44dd-a6d4-e1f97375f5b1", "subnet_ids": ["ce5d50db-7303-44dd-a6d4-e1f97375f5b1"]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:29.603 39 INFO tempest.lib.common.rest_client [req-137ce869-fa81-4e1c-852c-85447d9408d1 ] Request (ServerActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/22e042aa-7bfd-41c7-9427-707624ddf3ce 1.230s 2020-11-06 18:13:29.604 39 DEBUG tempest.lib.common.rest_client [req-137ce869-fa81-4e1c-852c-85447d9408d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-137ce869-fa81-4e1c-852c-85447d9408d1', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:13:29 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/22e042aa-7bfd-41c7-9427-707624ddf3ce'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:29.986 39 INFO tempest.lib.common.rest_client [req-45f66849-f1af-4cd6-a52b-d051e61cade6 ] Request (ServerActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/ce5d50db-7303-44dd-a6d4-e1f97375f5b1 0.381s 2020-11-06 18:13:29.987 39 DEBUG tempest.lib.common.rest_client [req-45f66849-f1af-4cd6-a52b-d051e61cade6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-45f66849-f1af-4cd6-a52b-d051e61cade6', 'date': 'Fri, 06 Nov 2020 18:13:29 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/ce5d50db-7303-44dd-a6d4-e1f97375f5b1'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:30.673 39 INFO tempest.lib.common.rest_client [req-09e64e35-e89a-48e9-90a1-10e44535c16f ] Request (ServerActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/795afc26-787e-4d38-9bc1-bc29e5b00fbc 0.685s 2020-11-06 18:13:30.674 39 DEBUG tempest.lib.common.rest_client [req-09e64e35-e89a-48e9-90a1-10e44535c16f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-09e64e35-e89a-48e9-90a1-10e44535c16f', 'date': 'Fri, 06 Nov 2020 18:13:30 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/795afc26-787e-4d38-9bc1-bc29e5b00fbc'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:30.674 39 DEBUG tempest.lib.common.dynamic_creds [-] Clearing network: {'id': '529aec4e-dc4d-461e-835f-1ce0fc52633a', 'name': 'tempest-ServerActionsRbacTest-1107501304-network', 'tenant_id': 'c58012c4ddf74aae9fa1e0ca958b3b2f', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': 'c58012c4ddf74aae9fa1e0ca958b3b2f', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 59, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T17:59:12Z', 'updated_at': '2020-11-06T17:59:12Z', 'revision_number': 1}, subnet: {'id': '3756fe18-1911-45a0-a2ec-1e0376b1efba', 'name': 'tempest-ServerActionsRbacTest-1107501304-subnet', 'tenant_id': 'c58012c4ddf74aae9fa1e0ca958b3b2f', 'network_id': '529aec4e-dc4d-461e-835f-1ce0fc52633a', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-11-06T17:59:13Z', 'updated_at': '2020-11-06T17:59:13Z', 'revision_number': 0, 'project_id': 'c58012c4ddf74aae9fa1e0ca958b3b2f'}, router: {'id': '906603d5-36c3-4c3f-b745-9192f15886cf', 'name': 'tempest-ServerActionsRbacTest-1107501304-router', 'tenant_id': 'c58012c4ddf74aae9fa1e0ca958b3b2f', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.152'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::12b'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-11-06T17:59:13Z', 'updated_at': '2020-11-06T17:59:14Z', 'revision_number': 3, 'project_id': 'c58012c4ddf74aae9fa1e0ca958b3b2f'} _clear_isolated_net_resources /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/dynamic_creds.py:418 2020-11-06 18:13:32.648 39 INFO tempest.lib.common.rest_client [req-aad82062-6591-4982-8a94-4239255b0025 ] Request (ServerActionsRbacTest:tearDownClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/906603d5-36c3-4c3f-b745-9192f15886cf/remove_router_interface 1.972s 2020-11-06 18:13:32.649 39 DEBUG tempest.lib.common.rest_client [req-aad82062-6591-4982-8a94-4239255b0025 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "3756fe18-1911-45a0-a2ec-1e0376b1efba"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-aad82062-6591-4982-8a94-4239255b0025', 'date': 'Fri, 06 Nov 2020 18:13:32 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/906603d5-36c3-4c3f-b745-9192f15886cf/remove_router_interface'} Body: b'{"id": "906603d5-36c3-4c3f-b745-9192f15886cf", "tenant_id": "c58012c4ddf74aae9fa1e0ca958b3b2f", "port_id": "be9e5fbd-4b5d-488b-b829-275013a330aa", "network_id": "529aec4e-dc4d-461e-835f-1ce0fc52633a", "subnet_id": "3756fe18-1911-45a0-a2ec-1e0376b1efba", "subnet_ids": ["3756fe18-1911-45a0-a2ec-1e0376b1efba"]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:33.875 39 INFO tempest.lib.common.rest_client [req-a430a2f6-a57b-4190-ac65-6e18366e2719 ] Request (ServerActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/906603d5-36c3-4c3f-b745-9192f15886cf 1.226s 2020-11-06 18:13:33.876 39 DEBUG tempest.lib.common.rest_client [req-a430a2f6-a57b-4190-ac65-6e18366e2719 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-a430a2f6-a57b-4190-ac65-6e18366e2719', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:13:33 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/906603d5-36c3-4c3f-b745-9192f15886cf'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:34.334 39 INFO tempest.lib.common.rest_client [req-182fcb04-19ef-400c-ba72-581a59e39ed8 ] Request (ServerActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/3756fe18-1911-45a0-a2ec-1e0376b1efba 0.456s 2020-11-06 18:13:34.334 39 DEBUG tempest.lib.common.rest_client [req-182fcb04-19ef-400c-ba72-581a59e39ed8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-182fcb04-19ef-400c-ba72-581a59e39ed8', 'date': 'Fri, 06 Nov 2020 18:13:34 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/3756fe18-1911-45a0-a2ec-1e0376b1efba'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:34.984 39 INFO tempest.lib.common.rest_client [req-82f97c4b-4fa1-45e5-98d3-9377ee4a551c ] Request (ServerActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/529aec4e-dc4d-461e-835f-1ce0fc52633a 0.648s 2020-11-06 18:13:34.985 39 DEBUG tempest.lib.common.rest_client [req-82f97c4b-4fa1-45e5-98d3-9377ee4a551c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-82f97c4b-4fa1-45e5-98d3-9377ee4a551c', 'date': 'Fri, 06 Nov 2020 18:13:34 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/529aec4e-dc4d-461e-835f-1ce0fc52633a'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:35.115 39 INFO tempest.lib.common.rest_client [req-838d79c8-a5aa-48b5-afaf-3bcf3e810bf1 ] Request (ServerActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/13cdadce7fc24a938ce27cd5ee7c066f 0.129s 2020-11-06 18:13:35.115 39 DEBUG tempest.lib.common.rest_client [req-838d79c8-a5aa-48b5-afaf-3bcf3e810bf1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-838d79c8-a5aa-48b5-afaf-3bcf3e810bf1', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/13cdadce7fc24a938ce27cd5ee7c066f'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:35.205 39 INFO tempest.lib.common.rest_client [req-3523d685-5075-40c2-bbca-65167beab4a2 ] Request (ServerActionsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=21ea54a8c99a458890dbfde9b6dc3e3b&name=default 0.089s 2020-11-06 18:13:35.206 39 DEBUG tempest.lib.common.rest_client [req-3523d685-5075-40c2-bbca-65167beab4a2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-3523d685-5075-40c2-bbca-65167beab4a2', 'date': 'Fri, 06 Nov 2020 18:13:35 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=21ea54a8c99a458890dbfde9b6dc3e3b&name=default'} Body: b'{"security_groups": [{"id": "35bcedea-2da6-40a7-bcf6-1c11ac7327bc", "name": "default", "stateful": true, "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "description": "Default security group", "security_group_rules": [{"id": "37d8a58a-21bf-4456-b46a-7f36b12575ec", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "security_group_id": "35bcedea-2da6-40a7-bcf6-1c11ac7327bc", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:59:07Z", "updated_at": "2020-11-06T17:59:07Z", "revision_number": 0, "project_id": "21ea54a8c99a458890dbfde9b6dc3e3b"}, {"id": "37fd5b33-9e38-4012-aab6-25e46184a2d9", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "security_group_id": "35bcedea-2da6-40a7-bcf6-1c11ac7327bc", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:59:07Z", "updated_at": "2020-11-06T17:59:07Z", "revision_number": 0, "project_id": "21ea54a8c99a458890dbfde9b6dc3e3b"}, {"id": "3d6bc60e-7d91-42cc-ac90-9336b680de59", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "security_group_id": "35bcedea-2da6-40a7-bcf6-1c11ac7327bc", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "35bcedea-2da6-40a7-bcf6-1c11ac7327bc", "description": null, "tags": [], "created_at": "2020-11-06T17:59:07Z", "updated_at": "2020-11-06T17:59:07Z", "revision_number": 0, "project_id": "21ea54a8c99a458890dbfde9b6dc3e3b"}, {"id": "5462c0ac-2fdc-4fc4-aa7e-c7a1d65b687d", "tenant_id": "21ea54a8c99a458890dbfde9b6dc3e3b", "security_group_id": "35bcedea-2da6-40a7-bcf6-1c11ac7327bc", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "35bcedea-2da6-40a7-bcf6-1c11ac7327bc", "description": null, "tags": [], "created_at": "2020-11-06T17:59:07Z", "updated_at": "2020-11-06T17:59:07Z", "revision_number": 0, "project_id": "21ea54a8c99a458890dbfde9b6dc3e3b"}], "tags": [], "created_at": "2020-11-06T17:59:07Z", "updated_at": "2020-11-06T17:59:07Z", "revision_number": 1, "project_id": "21ea54a8c99a458890dbfde9b6dc3e3b"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:35.372 39 INFO tempest.lib.common.rest_client [req-52b3a944-cc6e-4f92-b59e-79bb6ac2f29e ] Request (ServerActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/35bcedea-2da6-40a7-bcf6-1c11ac7327bc 0.165s 2020-11-06 18:13:35.372 39 DEBUG tempest.lib.common.rest_client [req-52b3a944-cc6e-4f92-b59e-79bb6ac2f29e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-52b3a944-cc6e-4f92-b59e-79bb6ac2f29e', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:13:35 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/35bcedea-2da6-40a7-bcf6-1c11ac7327bc'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:35.521 39 INFO tempest.lib.common.rest_client [req-648e0308-ad7b-4414-9a4b-ac285ccc07e6 ] Request (ServerActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b 0.147s 2020-11-06 18:13:35.522 39 DEBUG tempest.lib.common.rest_client [req-648e0308-ad7b-4414-9a4b-ac285ccc07e6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-648e0308-ad7b-4414-9a4b-ac285ccc07e6', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ea54a8c99a458890dbfde9b6dc3e3b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:35.715 39 INFO tempest.lib.common.rest_client [req-719df932-fb69-4356-889b-58541c8ee62e ] Request (ServerActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/9f78862a1d93489cb8b26f599b4ca6db 0.192s 2020-11-06 18:13:35.715 39 DEBUG tempest.lib.common.rest_client [req-719df932-fb69-4356-889b-58541c8ee62e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-719df932-fb69-4356-889b-58541c8ee62e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/9f78862a1d93489cb8b26f599b4ca6db'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:35.773 39 INFO tempest.lib.common.rest_client [req-1446ed7c-6c38-48c1-a94b-3d8019ebbf81 ] Request (ServerActionsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=c58012c4ddf74aae9fa1e0ca958b3b2f&name=default 0.056s 2020-11-06 18:13:35.773 39 DEBUG tempest.lib.common.rest_client [req-1446ed7c-6c38-48c1-a94b-3d8019ebbf81 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-1446ed7c-6c38-48c1-a94b-3d8019ebbf81', 'date': 'Fri, 06 Nov 2020 18:13:35 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=c58012c4ddf74aae9fa1e0ca958b3b2f&name=default'} Body: b'{"security_groups": [{"id": "f1fbab99-e8cd-400c-b9de-49fc631c83fb", "name": "default", "stateful": true, "tenant_id": "c58012c4ddf74aae9fa1e0ca958b3b2f", "description": "Default security group", "security_group_rules": [{"id": "265a943e-c860-4bec-b6ee-2ad18bb0e976", "tenant_id": "c58012c4ddf74aae9fa1e0ca958b3b2f", "security_group_id": "f1fbab99-e8cd-400c-b9de-49fc631c83fb", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "f1fbab99-e8cd-400c-b9de-49fc631c83fb", "description": null, "tags": [], "created_at": "2020-11-06T17:59:12Z", "updated_at": "2020-11-06T17:59:12Z", "revision_number": 0, "project_id": "c58012c4ddf74aae9fa1e0ca958b3b2f"}, {"id": "39ce089b-9966-4c33-9a6a-8343adaae5d8", "tenant_id": "c58012c4ddf74aae9fa1e0ca958b3b2f", "security_group_id": "f1fbab99-e8cd-400c-b9de-49fc631c83fb", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:59:12Z", "updated_at": "2020-11-06T17:59:12Z", "revision_number": 0, "project_id": "c58012c4ddf74aae9fa1e0ca958b3b2f"}, {"id": "71ac1371-9ed8-4fc1-b993-3e2fcb809ad5", "tenant_id": "c58012c4ddf74aae9fa1e0ca958b3b2f", "security_group_id": "f1fbab99-e8cd-400c-b9de-49fc631c83fb", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "f1fbab99-e8cd-400c-b9de-49fc631c83fb", "description": null, "tags": [], "created_at": "2020-11-06T17:59:12Z", "updated_at": "2020-11-06T17:59:12Z", "revision_number": 0, "project_id": "c58012c4ddf74aae9fa1e0ca958b3b2f"}, {"id": "dc9c83c1-4af2-458f-ba6f-47a4a973a55b", "tenant_id": "c58012c4ddf74aae9fa1e0ca958b3b2f", "security_group_id": "f1fbab99-e8cd-400c-b9de-49fc631c83fb", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T17:59:12Z", "updated_at": "2020-11-06T17:59:12Z", "revision_number": 0, "project_id": "c58012c4ddf74aae9fa1e0ca958b3b2f"}], "tags": [], "created_at": "2020-11-06T17:59:12Z", "updated_at": "2020-11-06T17:59:12Z", "revision_number": 1, "project_id": "c58012c4ddf74aae9fa1e0ca958b3b2f"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:35.918 39 INFO tempest.lib.common.rest_client [req-1cd42a90-7a09-4a06-9134-cf50e965c8eb ] Request (ServerActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/f1fbab99-e8cd-400c-b9de-49fc631c83fb 0.143s 2020-11-06 18:13:35.919 39 DEBUG tempest.lib.common.rest_client [req-1cd42a90-7a09-4a06-9134-cf50e965c8eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-1cd42a90-7a09-4a06-9134-cf50e965c8eb', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:13:35 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/f1fbab99-e8cd-400c-b9de-49fc631c83fb'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:36.106 39 INFO tempest.lib.common.rest_client [req-e22df4a2-00b7-4371-a4cd-265f8b38dfa2 ] Request (ServerActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/c58012c4ddf74aae9fa1e0ca958b3b2f 0.186s 2020-11-06 18:13:36.106 39 DEBUG tempest.lib.common.rest_client [req-e22df4a2-00b7-4371-a4cd-265f8b38dfa2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e22df4a2-00b7-4371-a4cd-265f8b38dfa2', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c58012c4ddf74aae9fa1e0ca958b3b2f'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:36.230 39 INFO tempest.lib.common.rest_client [req-0ae1a683-3095-4c34-a7c2-b297e1e25ad0 ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.119s 2020-11-06 18:13:36.230 39 DEBUG tempest.lib.common.rest_client [req-0ae1a683-3095-4c34-a7c2-b297e1e25ad0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0ae1a683-3095-4c34-a7c2-b297e1e25ad0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["QIXVoI3CRY60swCuqAVIoA"], "expires_at": "2020-11-06T19:13:36.000000Z", "issued_at": "2020-11-06T18:13:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:36.281 39 INFO tempest.lib.common.rest_client [req-02704075-4a4d-40cd-be67-4f66df7aa494 ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:13:36.282 39 DEBUG tempest.lib.common.rest_client [req-02704075-4a4d-40cd-be67-4f66df7aa494 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-02704075-4a4d-40cd-be67-4f66df7aa494', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["L4raBJKKSjucjgUaUG6GXw"], "expires_at": "2020-11-06T19:13:36.000000Z", "issued_at": "2020-11-06T18:13:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:36.335 39 INFO tempest.lib.common.rest_client [req-cc208cf4-98bf-435b-b23f-65af4eec8da6 ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.052s 2020-11-06 18:13:36.336 39 DEBUG tempest.lib.common.rest_client [req-cc208cf4-98bf-435b-b23f-65af4eec8da6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cc208cf4-98bf-435b-b23f-65af4eec8da6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:36.397 39 INFO tempest.lib.common.rest_client [req-bd6a5c89-df85-4758-999d-3a4b95d9f74c ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.059s 2020-11-06 18:13:36.397 39 DEBUG tempest.lib.common.rest_client [req-bd6a5c89-df85-4758-999d-3a4b95d9f74c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ServerConsolesMaxV25RbacTest-174425752-desc", "domain_id": "default", "name": "tempest-ServerConsolesMaxV25RbacTest-174425752"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '392', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bd6a5c89-df85-4758-999d-3a4b95d9f74c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "e6495a3980684ff7ace3e2d611e6cb99", "name": "tempest-ServerConsolesMaxV25RbacTest-174425752", "domain_id": "default", "description": "tempest-ServerConsolesMaxV25RbacTest-174425752-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/e6495a3980684ff7ace3e2d611e6cb99"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:36.511 39 INFO tempest.lib.common.rest_client [req-f2b10809-e1ff-4470-8b7a-6b8f2048b0cf ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.112s 2020-11-06 18:13:36.511 39 DEBUG tempest.lib.common.rest_client [req-f2b10809-e1ff-4470-8b7a-6b8f2048b0cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ServerConsolesMaxV25RbacTest-174425752", "password": "R1~0nBZ&cZs&p4W", "project_id": "e6495a3980684ff7ace3e2d611e6cb99", "email": "tempest-ServerConsolesMaxV25RbacTest-1265493576@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f2b10809-e1ff-4470-8b7a-6b8f2048b0cf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "e6495a3980684ff7ace3e2d611e6cb99", "email": "tempest-ServerConsolesMaxV25RbacTest-1265493576@example.com", "id": "3ea4b96e1a774a8cb9d0173b6ce4d369", "name": "tempest-ServerConsolesMaxV25RbacTest-174425752", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/3ea4b96e1a774a8cb9d0173b6ce4d369"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:36.568 39 INFO tempest.lib.common.rest_client [req-e87b1b21-b1a7-488b-87f8-ef210b1e6a78 ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-11-06 18:13:36.568 39 DEBUG tempest.lib.common.rest_client [req-e87b1b21-b1a7-488b-87f8-ef210b1e6a78 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e87b1b21-b1a7-488b-87f8-ef210b1e6a78', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:36.623 39 INFO tempest.lib.common.rest_client [req-16cfab41-0f44-4abe-9721-b54ba398ba78 ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.053s 2020-11-06 18:13:36.623 39 DEBUG tempest.lib.common.rest_client [req-16cfab41-0f44-4abe-9721-b54ba398ba78 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-16cfab41-0f44-4abe-9721-b54ba398ba78', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:36.692 39 INFO tempest.lib.common.rest_client [req-55a8404c-ca75-437c-bd33-7e4d45afd4d0 ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/e6495a3980684ff7ace3e2d611e6cb99/users/3ea4b96e1a774a8cb9d0173b6ce4d369/roles/72a4576c553448cd941b052c1ca0cf2d 0.067s 2020-11-06 18:13:36.693 39 DEBUG tempest.lib.common.rest_client [req-55a8404c-ca75-437c-bd33-7e4d45afd4d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-55a8404c-ca75-437c-bd33-7e4d45afd4d0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e6495a3980684ff7ace3e2d611e6cb99/users/3ea4b96e1a774a8cb9d0173b6ce4d369/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:36.693 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerConsolesMaxV25RbacTest-174425752', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'e6495a3980684ff7ace3e2d611e6cb99', 'project_name': 'tempest-ServerConsolesMaxV25RbacTest-174425752', 'tenant_id': 'e6495a3980684ff7ace3e2d611e6cb99', 'tenant_name': 'tempest-ServerConsolesMaxV25RbacTest-174425752', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '3ea4b96e1a774a8cb9d0173b6ce4d369'}, Network: None, Subnet: None, Router: None 2020-11-06 18:13:36.782 39 INFO tempest.lib.common.rest_client [req-36c9a236-4e4f-481b-827b-b13d62bdd6ba ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 18:13:36.782 39 DEBUG tempest.lib.common.rest_client [req-36c9a236-4e4f-481b-827b-b13d62bdd6ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-36c9a236-4e4f-481b-827b-b13d62bdd6ba', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["ye6cPIACSfKv3nAQfpn8Iw"], "expires_at": "2020-11-06T19:13:36.000000Z", "issued_at": "2020-11-06T18:13:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:37.275 39 INFO tempest.lib.common.rest_client [req-eca85e7e-b108-417c-9e3a-73cb963eda2a ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.491s 2020-11-06 18:13:37.275 39 DEBUG tempest.lib.common.rest_client [req-eca85e7e-b108-417c-9e3a-73cb963eda2a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-ServerConsolesMaxV25RbacTest-1636084003-network", "tenant_id": "e6495a3980684ff7ace3e2d611e6cb99"}} Response - Headers: {'content-type': 'application/json', 'content-length': '744', 'x-openstack-request-id': 'req-eca85e7e-b108-417c-9e3a-73cb963eda2a', 'date': 'Fri, 06 Nov 2020 18:13:37 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"87fa4533-c2dc-411d-a33d-316d3a07832f","name":"tempest-ServerConsolesMaxV25RbacTest-1636084003-network","tenant_id":"e6495a3980684ff7ace3e2d611e6cb99","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"e6495a3980684ff7ace3e2d611e6cb99","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":49,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:13:37Z","updated_at":"2020-11-06T18:13:37Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:37.838 39 INFO tempest.lib.common.rest_client [req-30aefb62-f320-4afb-ba4a-cdca1407ff3c ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.561s 2020-11-06 18:13:37.839 39 DEBUG tempest.lib.common.rest_client [req-30aefb62-f320-4afb-ba4a-cdca1407ff3c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "87fa4533-c2dc-411d-a33d-316d3a07832f", "cidr": "192.168.120.0/28", "name": "tempest-ServerConsolesMaxV25RbacTest-1636084003-subnet", "tenant_id": "e6495a3980684ff7ace3e2d611e6cb99", "enable_dhcp": false, "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '716', 'x-openstack-request-id': 'req-30aefb62-f320-4afb-ba4a-cdca1407ff3c', 'date': 'Fri, 06 Nov 2020 18:13:37 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"63336dc1-fd74-40c4-a46f-cba9124fd013","name":"tempest-ServerConsolesMaxV25RbacTest-1636084003-subnet","tenant_id":"e6495a3980684ff7ace3e2d611e6cb99","network_id":"87fa4533-c2dc-411d-a33d-316d3a07832f","ip_version":4,"subnetpool_id":null,"enable_dhcp":false,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-11-06T18:13:37Z","updated_at":"2020-11-06T18:13:37Z","revision_number":0,"project_id":"e6495a3980684ff7ace3e2d611e6cb99"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:39.052 39 INFO tempest.lib.common.rest_client [req-70c72d98-e711-4668-95d2-59f1232ab04a ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/routers 1.211s 2020-11-06 18:13:39.053 39 DEBUG tempest.lib.common.rest_client [req-70c72d98-e711-4668-95d2-59f1232ab04a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-ServerConsolesMaxV25RbacTest-1636084003-router", "tenant_id": "e6495a3980684ff7ace3e2d611e6cb99", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea"}}} Response - Headers: {'content-type': 'application/json', 'content-length': '818', 'x-openstack-request-id': 'req-70c72d98-e711-4668-95d2-59f1232ab04a', 'date': 'Fri, 06 Nov 2020 18:13:39 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "3013653e-cf7c-46a6-a878-c8e221d15791", "name": "tempest-ServerConsolesMaxV25RbacTest-1636084003-router", "tenant_id": "e6495a3980684ff7ace3e2d611e6cb99", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.237"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::257"}], "enable_snat": true}, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T18:13:37Z", "updated_at": "2020-11-06T18:13:38Z", "revision_number": 3, "project_id": "e6495a3980684ff7ace3e2d611e6cb99"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:42.205 39 INFO tempest.lib.common.rest_client [req-92063908-d8e6-44cb-a144-a9a660cfafc3 ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/3013653e-cf7c-46a6-a878-c8e221d15791/add_router_interface 3.151s 2020-11-06 18:13:42.205 39 DEBUG tempest.lib.common.rest_client [req-92063908-d8e6-44cb-a144-a9a660cfafc3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "63336dc1-fd74-40c4-a46f-cba9124fd013"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-92063908-d8e6-44cb-a144-a9a660cfafc3', 'date': 'Fri, 06 Nov 2020 18:13:42 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/3013653e-cf7c-46a6-a878-c8e221d15791/add_router_interface'} Body: b'{"id": "3013653e-cf7c-46a6-a878-c8e221d15791", "tenant_id": "e6495a3980684ff7ace3e2d611e6cb99", "port_id": "f4e1a7de-4263-439b-b498-3260e15464da", "network_id": "87fa4533-c2dc-411d-a33d-316d3a07832f", "subnet_id": "63336dc1-fd74-40c4-a46f-cba9124fd013", "subnet_ids": ["63336dc1-fd74-40c4-a46f-cba9124fd013"]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:42.206 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerConsolesMaxV25RbacTest-174425752', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'e6495a3980684ff7ace3e2d611e6cb99', 'project_name': 'tempest-ServerConsolesMaxV25RbacTest-174425752', 'tenant_id': 'e6495a3980684ff7ace3e2d611e6cb99', 'tenant_name': 'tempest-ServerConsolesMaxV25RbacTest-174425752', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '3ea4b96e1a774a8cb9d0173b6ce4d369'}, Network: {'id': '87fa4533-c2dc-411d-a33d-316d3a07832f', 'name': 'tempest-ServerConsolesMaxV25RbacTest-1636084003-network', 'tenant_id': 'e6495a3980684ff7ace3e2d611e6cb99', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': 'e6495a3980684ff7ace3e2d611e6cb99', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 49, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T18:13:37Z', 'updated_at': '2020-11-06T18:13:37Z', 'revision_number': 1}, Subnet: {'id': '63336dc1-fd74-40c4-a46f-cba9124fd013', 'name': 'tempest-ServerConsolesMaxV25RbacTest-1636084003-subnet', 'tenant_id': 'e6495a3980684ff7ace3e2d611e6cb99', 'network_id': '87fa4533-c2dc-411d-a33d-316d3a07832f', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-11-06T18:13:37Z', 'updated_at': '2020-11-06T18:13:37Z', 'revision_number': 0, 'project_id': 'e6495a3980684ff7ace3e2d611e6cb99'}, Router: {'id': '3013653e-cf7c-46a6-a878-c8e221d15791', 'name': 'tempest-ServerConsolesMaxV25RbacTest-1636084003-router', 'tenant_id': 'e6495a3980684ff7ace3e2d611e6cb99', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.237'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::257'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-11-06T18:13:37Z', 'updated_at': '2020-11-06T18:13:38Z', 'revision_number': 3, 'project_id': 'e6495a3980684ff7ace3e2d611e6cb99'} 2020-11-06 18:13:42.320 39 INFO tempest.lib.common.rest_client [req-2d3776d5-dfec-4552-9d05-fd5ec864cd24 ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.103s 2020-11-06 18:13:42.321 39 DEBUG tempest.lib.common.rest_client [req-2d3776d5-dfec-4552-9d05-fd5ec864cd24 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6585', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2d3776d5-dfec-4552-9d05-fd5ec864cd24', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3ea4b96e1a774a8cb9d0173b6ce4d369", "name": "tempest-ServerConsolesMaxV25RbacTest-174425752", "password_expires_at": null}, "audit_ids": ["J4P-TKldQTShT-XOP_H0RQ"], "expires_at": "2020-11-06T19:13:42.000000Z", "issued_at": "2020-11-06T18:13:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e6495a3980684ff7ace3e2d611e6cb99", "name": "tempest-ServerConsolesMaxV25RbacTest-174425752"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e6495a3980684ff7ace3e2d611e6cb99", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e6495a3980684ff7ace3e2d611e6cb99", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e6495a3980684ff7ace3e2d611e6cb99", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e6495a3980684ff7ace3e2d611e6cb99", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e6495a3980684ff7ace3e2d611e6cb99", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e6495a3980684ff7ace3e2d611e6cb99", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:42.356 39 INFO tempest.lib.common.rest_client [req-e8101ae3-9efd-45c9-a337-e6fa055a6b9f ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:13:42.356 39 DEBUG tempest.lib.common.rest_client [req-e8101ae3-9efd-45c9-a337-e6fa055a6b9f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e8101ae3-9efd-45c9-a337-e6fa055a6b9f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["yc55njJcR7WbKPTD2ZWZMQ"], "expires_at": "2020-11-06T19:13:42.000000Z", "issued_at": "2020-11-06T18:13:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:42.397 39 INFO tempest.lib.common.rest_client [req-1e61ebda-a359-4a9a-be5e-56522e1df9dc ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.030s 2020-11-06 18:13:42.398 39 DEBUG tempest.lib.common.rest_client [req-1e61ebda-a359-4a9a-be5e-56522e1df9dc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1e61ebda-a359-4a9a-be5e-56522e1df9dc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["GxN0G3EsRM-AUCnP5NqbRg"], "expires_at": "2020-11-06T19:13:42.000000Z", "issued_at": "2020-11-06T18:13:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:42.449 39 INFO tempest.lib.common.rest_client [req-279b4830-5382-4b63-82dd-5f753cf937c4 ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.050s 2020-11-06 18:13:42.450 39 DEBUG tempest.lib.common.rest_client [req-279b4830-5382-4b63-82dd-5f753cf937c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-279b4830-5382-4b63-82dd-5f753cf937c4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:42.495 39 INFO tempest.lib.common.rest_client [req-d1556e7b-d43a-4365-bb86-574bd5ccfb6d ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.044s 2020-11-06 18:13:42.496 39 DEBUG tempest.lib.common.rest_client [req-d1556e7b-d43a-4365-bb86-574bd5ccfb6d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d1556e7b-d43a-4365-bb86-574bd5ccfb6d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:42.496 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:13:42.497 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:13:42.548 39 INFO tempest.lib.common.rest_client [req-e3f1a65a-977f-4c8b-82c9-e1f07367e7eb ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/e6495a3980684ff7ace3e2d611e6cb99/users/3ea4b96e1a774a8cb9d0173b6ce4d369/roles 0.050s 2020-11-06 18:13:42.548 39 DEBUG tempest.lib.common.rest_client [req-e3f1a65a-977f-4c8b-82c9-e1f07367e7eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e3f1a65a-977f-4c8b-82c9-e1f07367e7eb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e6495a3980684ff7ace3e2d611e6cb99/users/3ea4b96e1a774a8cb9d0173b6ce4d369/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e6495a3980684ff7ace3e2d611e6cb99/users/3ea4b96e1a774a8cb9d0173b6ce4d369/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:42.599 39 INFO tempest.lib.common.rest_client [req-4dd8b22a-4237-447d-8224-32504ebb58ca ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/e6495a3980684ff7ace3e2d611e6cb99/users/3ea4b96e1a774a8cb9d0173b6ce4d369/roles/72a4576c553448cd941b052c1ca0cf2d 0.050s 2020-11-06 18:13:42.600 39 DEBUG tempest.lib.common.rest_client [req-4dd8b22a-4237-447d-8224-32504ebb58ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4dd8b22a-4237-447d-8224-32504ebb58ca', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e6495a3980684ff7ace3e2d611e6cb99/users/3ea4b96e1a774a8cb9d0173b6ce4d369/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:42.709 39 INFO tempest.lib.common.rest_client [req-f2c32c88-e402-4382-9021-df69702aa2a0 ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/e6495a3980684ff7ace3e2d611e6cb99/users/3ea4b96e1a774a8cb9d0173b6ce4d369/roles/a629c95d64b3416fb80ae90af4f69c05 0.108s 2020-11-06 18:13:42.710 39 DEBUG tempest.lib.common.rest_client [req-f2c32c88-e402-4382-9021-df69702aa2a0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f2c32c88-e402-4382-9021-df69702aa2a0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e6495a3980684ff7ace3e2d611e6cb99/users/3ea4b96e1a774a8cb9d0173b6ce4d369/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:43.803 39 INFO tempest.lib.common.rest_client [req-a2d5d72b-2f6c-4b4d-ac50-6660c881c33a ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-11-06 18:13:43.804 39 DEBUG tempest.lib.common.rest_client [req-a2d5d72b-2f6c-4b4d-ac50-6660c881c33a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6646', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a2d5d72b-2f6c-4b4d-ac50-6660c881c33a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3ea4b96e1a774a8cb9d0173b6ce4d369", "name": "tempest-ServerConsolesMaxV25RbacTest-174425752", "password_expires_at": null}, "audit_ids": ["sxWZGTx6SO2cKfXirQC5Hw"], "expires_at": "2020-11-06T19:13:43.000000Z", "issued_at": "2020-11-06T18:13:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e6495a3980684ff7ace3e2d611e6cb99", "name": "tempest-ServerConsolesMaxV25RbacTest-174425752"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e6495a3980684ff7ace3e2d611e6cb99", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e6495a3980684ff7ace3e2d611e6cb99", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e6495a3980684ff7ace3e2d611e6cb99", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e6495a3980684ff7ace3e2d611e6cb99", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e6495a3980684ff7ace3e2d611e6cb99", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e6495a3980684ff7ace3e2d611e6cb99", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5baf _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:43.849 39 INFO tempest.lib.common.rest_client [req-4b2ee545-d5c9-4897-a925-a7821b00f91b ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:13:43.849 39 DEBUG tempest.lib.common.rest_client [req-4b2ee545-d5c9-4897-a925-a7821b00f91b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6646', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4b2ee545-d5c9-4897-a925-a7821b00f91b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3ea4b96e1a774a8cb9d0173b6ce4d369", "name": "tempest-ServerConsolesMaxV25RbacTest-174425752", "password_expires_at": null}, "audit_ids": ["G6wen1m9SyO2qabMA4y3XA"], "expires_at": "2020-11-06T19:13:43.000000Z", "issued_at": "2020-11-06T18:13:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e6495a3980684ff7ace3e2d611e6cb99", "name": "tempest-ServerConsolesMaxV25RbacTest-174425752"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e6495a3980684ff7ace3e2d611e6cb99", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e6495a3980684ff7ace3e2d611e6cb99", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e6495a3980684ff7ace3e2d611e6cb99", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e6495a3980684ff7ace3e2d611e6cb99", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e6495a3980684ff7ace3e2d611e6cb99", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e6495a3980684ff7ace3e2d611e6cb99", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5baf _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:43.850 39 INFO tempest.lib.common.fixed_network [-] (ServerConsolesMaxV25RbacTest:setUpClass) Found network {'id': '87fa4533-c2dc-411d-a33d-316d3a07832f', 'name': 'tempest-ServerConsolesMaxV25RbacTest-1636084003-network', 'tenant_id': 'e6495a3980684ff7ace3e2d611e6cb99', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': 'e6495a3980684ff7ace3e2d611e6cb99', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 49, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T18:13:37Z', 'updated_at': '2020-11-06T18:13:37Z', 'revision_number': 1} available for tenant 2020-11-06 18:13:44.541 39 INFO tempest.lib.common.rest_client [req-4a207772-543e-4339-9e7c-16dc068f1d97 ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 202 POST http://172.30.13.94/compute/v2.1/servers 0.689s 2020-11-06 18:13:44.541 39 DEBUG tempest.lib.common.rest_client [req-4a207772-543e-4339-9e7c-16dc068f1d97 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-ServerConsolesMaxV25RbacTest-server-538193378", "imageRef": "56b368f6-9136-40ec-a04c-564d02c95e42", "flavorRef": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "networks": [{"uuid": "87fa4533-c2dc-411d-a33d-316d3a07832f"}]}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4a207772-543e-4339-9e7c-16dc068f1d97', 'x-compute-request-id': 'req-4a207772-543e-4339-9e7c-16dc068f1d97', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "kxioeQcn8YhJ"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:44.644 39 INFO tempest.lib.common.rest_client [req-b2e08a4f-b4cb-409b-a11a-7e9eb403c2ff ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7 0.097s 2020-11-06 18:13:44.644 39 DEBUG tempest.lib.common.rest_client [req-b2e08a4f-b4cb-409b-a11a-7e9eb403c2ff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1403', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b2e08a4f-b4cb-409b-a11a-7e9eb403c2ff', 'x-compute-request-id': 'req-b2e08a4f-b4cb-409b-a11a-7e9eb403c2ff', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7'} Body: b'{"server": {"id": "2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7", "name": "tempest-ServerConsolesMaxV25RbacTest-server-538193378", "status": "BUILD", "tenant_id": "e6495a3980684ff7ace3e2d611e6cb99", "user_id": "3ea4b96e1a774a8cb9d0173b6ce4d369", "metadata": {}, "hostId": "", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:13:45Z", "updated": "2020-11-06T18:13:44Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:45.956 39 INFO tempest.lib.common.rest_client [req-3785ca56-fefb-4779-8709-4456d830c5e5 ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7 0.297s 2020-11-06 18:13:45.957 39 DEBUG tempest.lib.common.rest_client [req-3785ca56-fefb-4779-8709-4456d830c5e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1490', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3785ca56-fefb-4779-8709-4456d830c5e5', 'x-compute-request-id': 'req-3785ca56-fefb-4779-8709-4456d830c5e5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7'} Body: b'{"server": {"id": "2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7", "name": "tempest-ServerConsolesMaxV25RbacTest-server-538193378", "status": "BUILD", "tenant_id": "e6495a3980684ff7ace3e2d611e6cb99", "user_id": "3ea4b96e1a774a8cb9d0173b6ce4d369", "metadata": {}, "hostId": "692147eeb6b4bd3f679bec50c1f360131c39179326b0d43881849775", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:13:44Z", "updated": "2020-11-06T18:13:45Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:45.972 39 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/None" after 1 second wait 2020-11-06 18:13:47.211 39 INFO tempest.lib.common.rest_client [req-5033e585-f66d-489e-8795-5d0d686f5ecd ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7 0.237s 2020-11-06 18:13:47.211 39 DEBUG tempest.lib.common.rest_client [req-5033e585-f66d-489e-8795-5d0d686f5ecd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1538', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5033e585-f66d-489e-8795-5d0d686f5ecd', 'x-compute-request-id': 'req-5033e585-f66d-489e-8795-5d0d686f5ecd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7'} Body: b'{"server": {"id": "2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7", "name": "tempest-ServerConsolesMaxV25RbacTest-server-538193378", "status": "BUILD", "tenant_id": "e6495a3980684ff7ace3e2d611e6cb99", "user_id": "3ea4b96e1a774a8cb9d0173b6ce4d369", "metadata": {}, "hostId": "692147eeb6b4bd3f679bec50c1f360131c39179326b0d43881849775", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:13:44Z", "updated": "2020-11-06T18:13:46Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:47.227 39 INFO tempest.common.waiters [-] State transition "BUILD/None" ==> "BUILD/spawning" after 3 second wait 2020-11-06 18:13:48.437 39 INFO tempest.lib.common.rest_client [req-7548e38b-40d6-43b2-908c-6d46530f7f73 ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7 0.208s 2020-11-06 18:13:48.438 39 DEBUG tempest.lib.common.rest_client [req-7548e38b-40d6-43b2-908c-6d46530f7f73 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1538', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7548e38b-40d6-43b2-908c-6d46530f7f73', 'x-compute-request-id': 'req-7548e38b-40d6-43b2-908c-6d46530f7f73', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7'} Body: b'{"server": {"id": "2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7", "name": "tempest-ServerConsolesMaxV25RbacTest-server-538193378", "status": "BUILD", "tenant_id": "e6495a3980684ff7ace3e2d611e6cb99", "user_id": "3ea4b96e1a774a8cb9d0173b6ce4d369", "metadata": {}, "hostId": "692147eeb6b4bd3f679bec50c1f360131c39179326b0d43881849775", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:13:44Z", "updated": "2020-11-06T18:13:46Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:49.664 39 INFO tempest.lib.common.rest_client [req-98a2fe16-bd54-4e12-afed-5bc7044f6780 ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7 0.211s 2020-11-06 18:13:49.665 39 DEBUG tempest.lib.common.rest_client [req-98a2fe16-bd54-4e12-afed-5bc7044f6780 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1538', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-98a2fe16-bd54-4e12-afed-5bc7044f6780', 'x-compute-request-id': 'req-98a2fe16-bd54-4e12-afed-5bc7044f6780', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7'} Body: b'{"server": {"id": "2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7", "name": "tempest-ServerConsolesMaxV25RbacTest-server-538193378", "status": "BUILD", "tenant_id": "e6495a3980684ff7ace3e2d611e6cb99", "user_id": "3ea4b96e1a774a8cb9d0173b6ce4d369", "metadata": {}, "hostId": "692147eeb6b4bd3f679bec50c1f360131c39179326b0d43881849775", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:13:44Z", "updated": "2020-11-06T18:13:46Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:51.505 39 INFO tempest.lib.common.rest_client [req-1261ab76-6f8d-48e3-8a52-240e4a96bc51 ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7 0.826s 2020-11-06 18:13:51.505 39 DEBUG tempest.lib.common.rest_client [req-1261ab76-6f8d-48e3-8a52-240e4a96bc51 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1538', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1261ab76-6f8d-48e3-8a52-240e4a96bc51', 'x-compute-request-id': 'req-1261ab76-6f8d-48e3-8a52-240e4a96bc51', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7'} Body: b'{"server": {"id": "2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7", "name": "tempest-ServerConsolesMaxV25RbacTest-server-538193378", "status": "BUILD", "tenant_id": "e6495a3980684ff7ace3e2d611e6cb99", "user_id": "3ea4b96e1a774a8cb9d0173b6ce4d369", "metadata": {}, "hostId": "692147eeb6b4bd3f679bec50c1f360131c39179326b0d43881849775", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:13:44Z", "updated": "2020-11-06T18:13:46Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:52.748 39 INFO tempest.lib.common.rest_client [req-3de7a81e-da86-4b5f-aa9a-78db7236406c ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7 0.230s 2020-11-06 18:13:52.749 39 DEBUG tempest.lib.common.rest_client [req-3de7a81e-da86-4b5f-aa9a-78db7236406c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3de7a81e-da86-4b5f-aa9a-78db7236406c', 'x-compute-request-id': 'req-3de7a81e-da86-4b5f-aa9a-78db7236406c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7'} Body: b'{"server": {"id": "2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7", "name": "tempest-ServerConsolesMaxV25RbacTest-server-538193378", "status": "ACTIVE", "tenant_id": "e6495a3980684ff7ace3e2d611e6cb99", "user_id": "3ea4b96e1a774a8cb9d0173b6ce4d369", "metadata": {}, "hostId": "692147eeb6b4bd3f679bec50c1f360131c39179326b0d43881849775", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:13:44Z", "updated": "2020-11-06T18:13:52Z", "addresses": {"tempest-ServerConsolesMaxV25RbacTest-1636084003-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:ac:8c:0e"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:13:52.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:52.764 39 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 8 second wait 2020-11-06 18:13:52.765 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:13:52.766 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.766 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.766 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.767 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.767 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.767 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.768 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.768 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.768 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.769 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.769 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.769 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.770 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.770 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.770 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.771 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.771 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.771 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.771 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.772 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.772 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.772 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.773 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.773 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.773 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.773 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.774 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.774 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.774 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.774 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.775 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.775 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.775 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.776 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.776 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.776 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.776 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.777 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.777 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.777 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.777 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.778 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.778 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.778 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.779 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.779 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.779 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.780 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.780 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.780 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.780 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.781 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.781 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.781 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.781 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.782 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.782 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.782 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.783 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.783 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.783 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.784 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.784 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.784 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.784 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.785 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.785 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.785 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.786 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.786 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.786 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.786 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.787 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.787 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.787 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:13:52.788 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-remote-consoles, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:13:52.789 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:13:52.906 39 INFO tempest.lib.common.rest_client [req-981a03d2-7153-4554-93ba-a011b1073ec3 ] Request (ServerConsolesMaxV25RbacTest:test_get_vnc_console_output): 200 GET http://172.30.13.94/identity/v3/projects/e6495a3980684ff7ace3e2d611e6cb99/users/3ea4b96e1a774a8cb9d0173b6ce4d369/roles 0.116s 2020-11-06 18:13:52.906 39 DEBUG tempest.lib.common.rest_client [req-981a03d2-7153-4554-93ba-a011b1073ec3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-981a03d2-7153-4554-93ba-a011b1073ec3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e6495a3980684ff7ace3e2d611e6cb99/users/3ea4b96e1a774a8cb9d0173b6ce4d369/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e6495a3980684ff7ace3e2d611e6cb99/users/3ea4b96e1a774a8cb9d0173b6ce4d369/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:52.989 39 INFO tempest.lib.common.rest_client [req-07a2f352-6992-4bdc-b1d8-42edf2fddaeb ] Request (ServerConsolesMaxV25RbacTest:test_get_vnc_console_output): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 18:13:52.990 39 DEBUG tempest.lib.common.rest_client [req-07a2f352-6992-4bdc-b1d8-42edf2fddaeb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6646', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-07a2f352-6992-4bdc-b1d8-42edf2fddaeb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3ea4b96e1a774a8cb9d0173b6ce4d369", "name": "tempest-ServerConsolesMaxV25RbacTest-174425752", "password_expires_at": null}, "audit_ids": ["1xfP-gsMQCWwH3KkvnGw-g"], "expires_at": "2020-11-06T19:13:52.000000Z", "issued_at": "2020-11-06T18:13:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e6495a3980684ff7ace3e2d611e6cb99", "name": "tempest-ServerConsolesMaxV25RbacTest-174425752"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e6495a3980684ff7ace3e2d611e6cb99", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e6495a3980684ff7ace3e2d611e6cb99", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e6495a3980684ff7ace3e2d611e6cb99", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e6495a3980684ff7ace3e2d611e6cb99", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e6495a3980684ff7ace3e2d611e6cb99", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e6495a3980684ff7ace3e2d611e6cb99", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5baf _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:53.219 39 INFO tempest.lib.common.rest_client [req-cf6b7b21-5492-40f8-b45f-cd1e4e6faf9b ] Request (ServerConsolesMaxV25RbacTest:test_get_vnc_console_output): 200 POST http://172.30.13.94/compute/v2.1/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7/action 0.227s 2020-11-06 18:13:53.219 39 DEBUG tempest.lib.common.rest_client [req-cf6b7b21-5492-40f8-b45f-cd1e4e6faf9b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-getVNCConsole": {"type": "novnc"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '132', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cf6b7b21-5492-40f8-b45f-cd1e4e6faf9b', 'x-compute-request-id': 'req-cf6b7b21-5492-40f8-b45f-cd1e4e6faf9b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7/action'} Body: b'{"console": {"type": "novnc", "url": "http://172.30.13.94:6080/vnc_auto.html?path=%3Ftoken%3D73caa546-721e-40fb-af6a-63ccb0b62237"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:53.222 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:13:53.272 39 INFO tempest.lib.common.rest_client [req-88d6b5bd-08d3-43c9-9054-cb163b03329f ] Request (ServerConsolesMaxV25RbacTest:test_get_vnc_console_output): 200 GET http://172.30.13.94/identity/v3/projects/e6495a3980684ff7ace3e2d611e6cb99/users/3ea4b96e1a774a8cb9d0173b6ce4d369/roles 0.049s 2020-11-06 18:13:53.273 39 DEBUG tempest.lib.common.rest_client [req-88d6b5bd-08d3-43c9-9054-cb163b03329f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-88d6b5bd-08d3-43c9-9054-cb163b03329f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e6495a3980684ff7ace3e2d611e6cb99/users/3ea4b96e1a774a8cb9d0173b6ce4d369/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e6495a3980684ff7ace3e2d611e6cb99/users/3ea4b96e1a774a8cb9d0173b6ce4d369/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:53.309 39 INFO tempest.lib.common.rest_client [req-cf57bdea-0a8c-4ff6-9105-a54149cb39e4 ] Request (ServerConsolesMaxV25RbacTest:test_get_vnc_console_output): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:13:53.310 39 DEBUG tempest.lib.common.rest_client [req-cf57bdea-0a8c-4ff6-9105-a54149cb39e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6646', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cf57bdea-0a8c-4ff6-9105-a54149cb39e4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3ea4b96e1a774a8cb9d0173b6ce4d369", "name": "tempest-ServerConsolesMaxV25RbacTest-174425752", "password_expires_at": null}, "audit_ids": ["RCd0eejjQG-sPEPiomVNaA"], "expires_at": "2020-11-06T19:13:53.000000Z", "issued_at": "2020-11-06T18:13:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e6495a3980684ff7ace3e2d611e6cb99", "name": "tempest-ServerConsolesMaxV25RbacTest-174425752"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e6495a3980684ff7ace3e2d611e6cb99", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e6495a3980684ff7ace3e2d611e6cb99", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e6495a3980684ff7ace3e2d611e6cb99", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e6495a3980684ff7ace3e2d611e6cb99", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e6495a3980684ff7ace3e2d611e6cb99", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e6495a3980684ff7ace3e2d611e6cb99", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5baf _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:53.544 39 INFO tempest.lib.common.rest_client [req-34639aea-5896-474a-8780-575b87c1ece9 ] Request (ServerConsolesMaxV25RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/compute/v2.1/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7 0.229s 2020-11-06 18:13:53.545 39 DEBUG tempest.lib.common.rest_client [req-34639aea-5896-474a-8780-575b87c1ece9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-34639aea-5896-474a-8780-575b87c1ece9', 'x-compute-request-id': 'req-34639aea-5896-474a-8780-575b87c1ece9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:53.734 39 INFO tempest.lib.common.rest_client [req-df91ca4e-d487-4f82-a5fe-2036d59432df ] Request (ServerConsolesMaxV25RbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7 0.188s 2020-11-06 18:13:53.735 39 DEBUG tempest.lib.common.rest_client [req-df91ca4e-d487-4f82-a5fe-2036d59432df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1738', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-df91ca4e-d487-4f82-a5fe-2036d59432df', 'x-compute-request-id': 'req-df91ca4e-d487-4f82-a5fe-2036d59432df', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7'} Body: b'{"server": {"id": "2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7", "name": "tempest-ServerConsolesMaxV25RbacTest-server-538193378", "status": "ACTIVE", "tenant_id": "e6495a3980684ff7ace3e2d611e6cb99", "user_id": "3ea4b96e1a774a8cb9d0173b6ce4d369", "metadata": {}, "hostId": "692147eeb6b4bd3f679bec50c1f360131c39179326b0d43881849775", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:13:44Z", "updated": "2020-11-06T18:13:54Z", "addresses": {"tempest-ServerConsolesMaxV25RbacTest-1636084003-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:ac:8c:0e"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:13:52.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:54.899 39 INFO tempest.lib.common.rest_client [req-2ea02f90-3d7d-44fc-8ee4-4ae9c653909e ] Request (ServerConsolesMaxV25RbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7 0.146s 2020-11-06 18:13:54.899 39 DEBUG tempest.lib.common.rest_client [req-2ea02f90-3d7d-44fc-8ee4-4ae9c653909e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1696', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2ea02f90-3d7d-44fc-8ee4-4ae9c653909e', 'x-compute-request-id': 'req-2ea02f90-3d7d-44fc-8ee4-4ae9c653909e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7'} Body: b'{"server": {"id": "2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7", "name": "tempest-ServerConsolesMaxV25RbacTest-server-538193378", "status": "ACTIVE", "tenant_id": "e6495a3980684ff7ace3e2d611e6cb99", "user_id": "3ea4b96e1a774a8cb9d0173b6ce4d369", "metadata": {}, "hostId": "692147eeb6b4bd3f679bec50c1f360131c39179326b0d43881849775", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:13:44Z", "updated": "2020-11-06T18:13:54Z", "addresses": {"tempest-ServerConsolesMaxV25RbacTest-1636084003-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:ac:8c:0e"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:13:52.000000", "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:55.985 39 INFO tempest.lib.common.rest_client [req-7c8e1dee-11ce-4312-9503-710afc491e03 ] Request (ServerConsolesMaxV25RbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7 0.066s 2020-11-06 18:13:55.985 39 DEBUG tempest.lib.common.rest_client [req-7c8e1dee-11ce-4312-9503-710afc491e03 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:13:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-7c8e1dee-11ce-4312-9503-710afc491e03', 'x-compute-request-id': 'req-7c8e1dee-11ce-4312-9503-710afc491e03', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 2bdc9e69-6388-4dcb-9b20-6a9b8e88f7d7 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:55.986 39 DEBUG tempest.lib.common.dynamic_creds [-] Clearing network: {'id': '87fa4533-c2dc-411d-a33d-316d3a07832f', 'name': 'tempest-ServerConsolesMaxV25RbacTest-1636084003-network', 'tenant_id': 'e6495a3980684ff7ace3e2d611e6cb99', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': 'e6495a3980684ff7ace3e2d611e6cb99', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 49, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T18:13:37Z', 'updated_at': '2020-11-06T18:13:37Z', 'revision_number': 1}, subnet: {'id': '63336dc1-fd74-40c4-a46f-cba9124fd013', 'name': 'tempest-ServerConsolesMaxV25RbacTest-1636084003-subnet', 'tenant_id': 'e6495a3980684ff7ace3e2d611e6cb99', 'network_id': '87fa4533-c2dc-411d-a33d-316d3a07832f', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-11-06T18:13:37Z', 'updated_at': '2020-11-06T18:13:37Z', 'revision_number': 0, 'project_id': 'e6495a3980684ff7ace3e2d611e6cb99'}, router: {'id': '3013653e-cf7c-46a6-a878-c8e221d15791', 'name': 'tempest-ServerConsolesMaxV25RbacTest-1636084003-router', 'tenant_id': 'e6495a3980684ff7ace3e2d611e6cb99', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.237'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::257'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-11-06T18:13:37Z', 'updated_at': '2020-11-06T18:13:38Z', 'revision_number': 3, 'project_id': 'e6495a3980684ff7ace3e2d611e6cb99'} _clear_isolated_net_resources /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/dynamic_creds.py:418 2020-11-06 18:13:57.892 39 INFO tempest.lib.common.rest_client [req-fd1cea76-1e62-4c3c-be20-366ec828b9df ] Request (ServerConsolesMaxV25RbacTest:tearDownClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/3013653e-cf7c-46a6-a878-c8e221d15791/remove_router_interface 1.905s 2020-11-06 18:13:57.892 39 DEBUG tempest.lib.common.rest_client [req-fd1cea76-1e62-4c3c-be20-366ec828b9df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "63336dc1-fd74-40c4-a46f-cba9124fd013"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-fd1cea76-1e62-4c3c-be20-366ec828b9df', 'date': 'Fri, 06 Nov 2020 18:13:57 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/3013653e-cf7c-46a6-a878-c8e221d15791/remove_router_interface'} Body: b'{"id": "3013653e-cf7c-46a6-a878-c8e221d15791", "tenant_id": "e6495a3980684ff7ace3e2d611e6cb99", "port_id": "f4e1a7de-4263-439b-b498-3260e15464da", "network_id": "87fa4533-c2dc-411d-a33d-316d3a07832f", "subnet_id": "63336dc1-fd74-40c4-a46f-cba9124fd013", "subnet_ids": ["63336dc1-fd74-40c4-a46f-cba9124fd013"]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:59.139 39 INFO tempest.lib.common.rest_client [req-230d452e-561b-46ce-9ad9-01df8f0a5a8b ] Request (ServerConsolesMaxV25RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/3013653e-cf7c-46a6-a878-c8e221d15791 1.245s 2020-11-06 18:13:59.140 39 DEBUG tempest.lib.common.rest_client [req-230d452e-561b-46ce-9ad9-01df8f0a5a8b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-230d452e-561b-46ce-9ad9-01df8f0a5a8b', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:13:59 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/3013653e-cf7c-46a6-a878-c8e221d15791'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:13:59.564 39 INFO tempest.lib.common.rest_client [req-94dec263-2cd4-4133-b441-b53166d64a49 ] Request (ServerConsolesMaxV25RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/63336dc1-fd74-40c4-a46f-cba9124fd013 0.423s 2020-11-06 18:13:59.565 39 DEBUG tempest.lib.common.rest_client [req-94dec263-2cd4-4133-b441-b53166d64a49 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-94dec263-2cd4-4133-b441-b53166d64a49', 'date': 'Fri, 06 Nov 2020 18:13:59 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/63336dc1-fd74-40c4-a46f-cba9124fd013'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:01.438 39 INFO tempest.lib.common.rest_client [req-b18f802b-e8f0-4d85-a2bd-b69ccb34e300 ] Request (ServerConsolesMaxV25RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/87fa4533-c2dc-411d-a33d-316d3a07832f 1.873s 2020-11-06 18:14:01.439 39 DEBUG tempest.lib.common.rest_client [req-b18f802b-e8f0-4d85-a2bd-b69ccb34e300 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-b18f802b-e8f0-4d85-a2bd-b69ccb34e300', 'date': 'Fri, 06 Nov 2020 18:14:01 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/87fa4533-c2dc-411d-a33d-316d3a07832f'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:01.569 39 INFO tempest.lib.common.rest_client [req-32a1ce9c-ecb2-474f-bfe0-cc3edc3ef944 ] Request (ServerConsolesMaxV25RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/3ea4b96e1a774a8cb9d0173b6ce4d369 0.129s 2020-11-06 18:14:01.569 39 DEBUG tempest.lib.common.rest_client [req-32a1ce9c-ecb2-474f-bfe0-cc3edc3ef944 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-32a1ce9c-ecb2-474f-bfe0-cc3edc3ef944', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/3ea4b96e1a774a8cb9d0173b6ce4d369'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:01.623 39 INFO tempest.lib.common.rest_client [req-481912fa-3a24-4bef-ae48-c52a88919378 ] Request (ServerConsolesMaxV25RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=e6495a3980684ff7ace3e2d611e6cb99&name=default 0.052s 2020-11-06 18:14:01.623 39 DEBUG tempest.lib.common.rest_client [req-481912fa-3a24-4bef-ae48-c52a88919378 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-481912fa-3a24-4bef-ae48-c52a88919378', 'date': 'Fri, 06 Nov 2020 18:14:01 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=e6495a3980684ff7ace3e2d611e6cb99&name=default'} Body: b'{"security_groups": [{"id": "d2aecfd3-8b31-4b39-b19d-f920d3683dfd", "name": "default", "stateful": true, "tenant_id": "e6495a3980684ff7ace3e2d611e6cb99", "description": "Default security group", "security_group_rules": [{"id": "451671f9-c6c1-429e-9788-ae904509f3d5", "tenant_id": "e6495a3980684ff7ace3e2d611e6cb99", "security_group_id": "d2aecfd3-8b31-4b39-b19d-f920d3683dfd", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "d2aecfd3-8b31-4b39-b19d-f920d3683dfd", "description": null, "tags": [], "created_at": "2020-11-06T18:13:37Z", "updated_at": "2020-11-06T18:13:37Z", "revision_number": 0, "project_id": "e6495a3980684ff7ace3e2d611e6cb99"}, {"id": "4e9f4bd0-a723-45a6-bfe3-ad7a9f08664a", "tenant_id": "e6495a3980684ff7ace3e2d611e6cb99", "security_group_id": "d2aecfd3-8b31-4b39-b19d-f920d3683dfd", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:13:37Z", "updated_at": "2020-11-06T18:13:37Z", "revision_number": 0, "project_id": "e6495a3980684ff7ace3e2d611e6cb99"}, {"id": "76f9cfc3-943d-42dc-bd38-7bfdf9b5fe3e", "tenant_id": "e6495a3980684ff7ace3e2d611e6cb99", "security_group_id": "d2aecfd3-8b31-4b39-b19d-f920d3683dfd", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "d2aecfd3-8b31-4b39-b19d-f920d3683dfd", "description": null, "tags": [], "created_at": "2020-11-06T18:13:37Z", "updated_at": "2020-11-06T18:13:37Z", "revision_number": 0, "project_id": "e6495a3980684ff7ace3e2d611e6cb99"}, {"id": "b4784e00-1beb-40b6-88ed-4447c0c570e1", "tenant_id": "e6495a3980684ff7ace3e2d611e6cb99", "security_group_id": "d2aecfd3-8b31-4b39-b19d-f920d3683dfd", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:13:37Z", "updated_at": "2020-11-06T18:13:37Z", "revision_number": 0, "project_id": "e6495a3980684ff7ace3e2d611e6cb99"}], "tags": [], "created_at": "2020-11-06T18:13:37Z", "updated_at": "2020-11-06T18:13:37Z", "revision_number": 1, "project_id": "e6495a3980684ff7ace3e2d611e6cb99"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:01.763 39 INFO tempest.lib.common.rest_client [req-564bc912-d759-4af8-b590-66415fda04da ] Request (ServerConsolesMaxV25RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/d2aecfd3-8b31-4b39-b19d-f920d3683dfd 0.139s 2020-11-06 18:14:01.764 39 DEBUG tempest.lib.common.rest_client [req-564bc912-d759-4af8-b590-66415fda04da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-564bc912-d759-4af8-b590-66415fda04da', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:14:01 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/d2aecfd3-8b31-4b39-b19d-f920d3683dfd'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:01.928 39 INFO tempest.lib.common.rest_client [req-70f6064a-46a3-415e-abe1-cba90317018b ] Request (ServerConsolesMaxV25RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/e6495a3980684ff7ace3e2d611e6cb99 0.164s 2020-11-06 18:14:01.929 39 DEBUG tempest.lib.common.rest_client [req-70f6064a-46a3-415e-abe1-cba90317018b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-70f6064a-46a3-415e-abe1-cba90317018b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e6495a3980684ff7ace3e2d611e6cb99'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:02.011 39 INFO tempest.lib.common.rest_client [req-c40a1dbe-c40d-457a-96d3-bf5c0d1a36a6 ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.079s 2020-11-06 18:14:02.011 39 DEBUG tempest.lib.common.rest_client [req-c40a1dbe-c40d-457a-96d3-bf5c0d1a36a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c40a1dbe-c40d-457a-96d3-bf5c0d1a36a6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["YcU9ZS7gSJG4h3qavDgA8g"], "expires_at": "2020-11-06T19:14:01.000000Z", "issued_at": "2020-11-06T18:14:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:02.048 39 INFO tempest.lib.common.rest_client [req-7a3ae584-b34b-466b-9ac3-46bebafdff6b ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:14:02.049 39 DEBUG tempest.lib.common.rest_client [req-7a3ae584-b34b-466b-9ac3-46bebafdff6b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7a3ae584-b34b-466b-9ac3-46bebafdff6b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["K8ttddYRRomvXfAzKMfT1g"], "expires_at": "2020-11-06T19:14:02.000000Z", "issued_at": "2020-11-06T18:14:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:02.100 39 INFO tempest.lib.common.rest_client [req-fcb76ae0-d98d-4068-be7c-d15b17feab9c ] Request (MiscPolicyActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.051s 2020-11-06 18:14:02.100 39 DEBUG tempest.lib.common.rest_client [req-fcb76ae0-d98d-4068-be7c-d15b17feab9c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fcb76ae0-d98d-4068-be7c-d15b17feab9c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:02.166 39 INFO tempest.lib.common.rest_client [req-3d05aac9-01b9-4c6c-9ad4-f8898b309272 ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.065s 2020-11-06 18:14:02.166 39 DEBUG tempest.lib.common.rest_client [req-3d05aac9-01b9-4c6c-9ad4-f8898b309272 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-MiscPolicyActionsRbacTest-1125392547-desc", "domain_id": "default", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '388', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3d05aac9-01b9-4c6c-9ad4-f8898b309272', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "domain_id": "default", "description": "tempest-MiscPolicyActionsRbacTest-1125392547-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:02.273 39 INFO tempest.lib.common.rest_client [req-0dfc68fc-e78f-42e2-9279-22000567205d ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.106s 2020-11-06 18:14:02.273 39 DEBUG tempest.lib.common.rest_client [req-0dfc68fc-e78f-42e2-9279-22000567205d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password": "W9%ADQ&BtmR%Ip0", "project_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "email": "tempest-MiscPolicyActionsRbacTest-797910463@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '405', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0dfc68fc-e78f-42e2-9279-22000567205d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "email": "tempest-MiscPolicyActionsRbacTest-797910463@example.com", "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/5a8a3e690bdf4f61b579ba9aef950d54"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:02.330 39 INFO tempest.lib.common.rest_client [req-bbcfd701-bd21-47fa-8500-20a636906719 ] Request (MiscPolicyActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.056s 2020-11-06 18:14:02.331 39 DEBUG tempest.lib.common.rest_client [req-bbcfd701-bd21-47fa-8500-20a636906719 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bbcfd701-bd21-47fa-8500-20a636906719', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:02.424 39 INFO tempest.lib.common.rest_client [req-5ffc2999-c3a4-4e44-a5de-77c616d15807 ] Request (MiscPolicyActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.092s 2020-11-06 18:14:02.425 39 DEBUG tempest.lib.common.rest_client [req-5ffc2999-c3a4-4e44-a5de-77c616d15807 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5ffc2999-c3a4-4e44-a5de-77c616d15807', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:02.496 39 INFO tempest.lib.common.rest_client [req-9b67c441-04bf-40be-ab51-78d261ecfd82 ] Request (MiscPolicyActionsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles/72a4576c553448cd941b052c1ca0cf2d 0.070s 2020-11-06 18:14:02.496 39 DEBUG tempest.lib.common.rest_client [req-9b67c441-04bf-40be-ab51-78d261ecfd82 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9b67c441-04bf-40be-ab51-78d261ecfd82', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:02.497 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-MiscPolicyActionsRbacTest-1125392547', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '84fe7a8341b649fb95fb2fd72ffe24c1', 'project_name': 'tempest-MiscPolicyActionsRbacTest-1125392547', 'tenant_id': '84fe7a8341b649fb95fb2fd72ffe24c1', 'tenant_name': 'tempest-MiscPolicyActionsRbacTest-1125392547', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '5a8a3e690bdf4f61b579ba9aef950d54'}, Network: None, Subnet: None, Router: None 2020-11-06 18:14:02.580 39 INFO tempest.lib.common.rest_client [req-cec0883a-3e47-4a9f-a7ac-fa63b6eb732b ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 18:14:02.581 39 DEBUG tempest.lib.common.rest_client [req-cec0883a-3e47-4a9f-a7ac-fa63b6eb732b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cec0883a-3e47-4a9f-a7ac-fa63b6eb732b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["5gdHAe67Qt69U9Jc74zk4w"], "expires_at": "2020-11-06T19:14:02.000000Z", "issued_at": "2020-11-06T18:14:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:03.134 39 INFO tempest.lib.common.rest_client [req-e2bce49f-8951-4b1c-8efd-890ca05d7486 ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.552s 2020-11-06 18:14:03.135 39 DEBUG tempest.lib.common.rest_client [req-e2bce49f-8951-4b1c-8efd-890ca05d7486 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-MiscPolicyActionsRbacTest-1175378110-network", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1"}} Response - Headers: {'content-type': 'application/json', 'content-length': '741', 'x-openstack-request-id': 'req-e2bce49f-8951-4b1c-8efd-890ca05d7486', 'date': 'Fri, 06 Nov 2020 18:14:03 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"f291e8f0-9113-415f-ade6-f3a87c3b01bd","name":"tempest-MiscPolicyActionsRbacTest-1175378110-network","tenant_id":"84fe7a8341b649fb95fb2fd72ffe24c1","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"84fe7a8341b649fb95fb2fd72ffe24c1","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":45,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:14:02Z","updated_at":"2020-11-06T18:14:03Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:03.663 39 INFO tempest.lib.common.rest_client [req-1a1f1812-f362-4586-80b9-f6d16dc2dc2c ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.526s 2020-11-06 18:14:03.664 39 DEBUG tempest.lib.common.rest_client [req-1a1f1812-f362-4586-80b9-f6d16dc2dc2c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "f291e8f0-9113-415f-ade6-f3a87c3b01bd", "cidr": "192.168.120.0/28", "name": "tempest-MiscPolicyActionsRbacTest-1175378110-subnet", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "enable_dhcp": false, "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '713', 'x-openstack-request-id': 'req-1a1f1812-f362-4586-80b9-f6d16dc2dc2c', 'date': 'Fri, 06 Nov 2020 18:14:03 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"0d54ddde-bfc2-439e-8bb0-2775006ca13f","name":"tempest-MiscPolicyActionsRbacTest-1175378110-subnet","tenant_id":"84fe7a8341b649fb95fb2fd72ffe24c1","network_id":"f291e8f0-9113-415f-ade6-f3a87c3b01bd","ip_version":4,"subnetpool_id":null,"enable_dhcp":false,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-11-06T18:14:03Z","updated_at":"2020-11-06T18:14:03Z","revision_number":0,"project_id":"84fe7a8341b649fb95fb2fd72ffe24c1"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:04.851 39 INFO tempest.lib.common.rest_client [req-ddfc7bd7-e642-423f-983a-906bc577a984 ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/routers 1.186s 2020-11-06 18:14:04.851 39 DEBUG tempest.lib.common.rest_client [req-ddfc7bd7-e642-423f-983a-906bc577a984 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-MiscPolicyActionsRbacTest-1175378110-router", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea"}}} Response - Headers: {'content-type': 'application/json', 'content-length': '815', 'x-openstack-request-id': 'req-ddfc7bd7-e642-423f-983a-906bc577a984', 'date': 'Fri, 06 Nov 2020 18:14:04 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "9fd2a658-6517-4974-8a38-99663bc7a1be", "name": "tempest-MiscPolicyActionsRbacTest-1175378110-router", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.175"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::3cc"}], "enable_snat": true}, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T18:14:03Z", "updated_at": "2020-11-06T18:14:04Z", "revision_number": 3, "project_id": "84fe7a8341b649fb95fb2fd72ffe24c1"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:07.267 39 INFO tempest.lib.common.rest_client [req-f9de8b8e-38c8-4029-87b4-3e3afd8daf48 ] Request (MiscPolicyActionsRbacTest:setUpClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/9fd2a658-6517-4974-8a38-99663bc7a1be/add_router_interface 2.414s 2020-11-06 18:14:07.267 39 DEBUG tempest.lib.common.rest_client [req-f9de8b8e-38c8-4029-87b4-3e3afd8daf48 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "0d54ddde-bfc2-439e-8bb0-2775006ca13f"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-f9de8b8e-38c8-4029-87b4-3e3afd8daf48', 'date': 'Fri, 06 Nov 2020 18:14:07 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/9fd2a658-6517-4974-8a38-99663bc7a1be/add_router_interface'} Body: b'{"id": "9fd2a658-6517-4974-8a38-99663bc7a1be", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "port_id": "a45cf0fa-e605-4c66-a455-c90f623b2e8a", "network_id": "f291e8f0-9113-415f-ade6-f3a87c3b01bd", "subnet_id": "0d54ddde-bfc2-439e-8bb0-2775006ca13f", "subnet_ids": ["0d54ddde-bfc2-439e-8bb0-2775006ca13f"]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:07.268 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-MiscPolicyActionsRbacTest-1125392547', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '84fe7a8341b649fb95fb2fd72ffe24c1', 'project_name': 'tempest-MiscPolicyActionsRbacTest-1125392547', 'tenant_id': '84fe7a8341b649fb95fb2fd72ffe24c1', 'tenant_name': 'tempest-MiscPolicyActionsRbacTest-1125392547', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '5a8a3e690bdf4f61b579ba9aef950d54'}, Network: {'id': 'f291e8f0-9113-415f-ade6-f3a87c3b01bd', 'name': 'tempest-MiscPolicyActionsRbacTest-1175378110-network', 'tenant_id': '84fe7a8341b649fb95fb2fd72ffe24c1', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '84fe7a8341b649fb95fb2fd72ffe24c1', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 45, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T18:14:02Z', 'updated_at': '2020-11-06T18:14:03Z', 'revision_number': 1}, Subnet: {'id': '0d54ddde-bfc2-439e-8bb0-2775006ca13f', 'name': 'tempest-MiscPolicyActionsRbacTest-1175378110-subnet', 'tenant_id': '84fe7a8341b649fb95fb2fd72ffe24c1', 'network_id': 'f291e8f0-9113-415f-ade6-f3a87c3b01bd', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-11-06T18:14:03Z', 'updated_at': '2020-11-06T18:14:03Z', 'revision_number': 0, 'project_id': '84fe7a8341b649fb95fb2fd72ffe24c1'}, Router: {'id': '9fd2a658-6517-4974-8a38-99663bc7a1be', 'name': 'tempest-MiscPolicyActionsRbacTest-1175378110-router', 'tenant_id': '84fe7a8341b649fb95fb2fd72ffe24c1', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.175'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::3cc'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-11-06T18:14:03Z', 'updated_at': '2020-11-06T18:14:04Z', 'revision_number': 3, 'project_id': '84fe7a8341b649fb95fb2fd72ffe24c1'} 2020-11-06 18:14:07.408 39 INFO tempest.lib.common.rest_client [req-029ff5d1-8603-41f8-b1ec-92400b3a15fd ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.132s 2020-11-06 18:14:07.408 39 DEBUG tempest.lib.common.rest_client [req-029ff5d1-8603-41f8-b1ec-92400b3a15fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6581', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-029ff5d1-8603-41f8-b1ec-92400b3a15fd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["-XRjzXOiRlOm8nBDp5JOXQ"], "expires_at": "2020-11-06T19:14:07.000000Z", "issued_at": "2020-11-06T18:14:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:07.545 39 INFO tempest.lib.common.rest_client [req-175d782b-863c-47c4-8d13-ed9fb18fe6f2 ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.135s 2020-11-06 18:14:07.545 39 DEBUG tempest.lib.common.rest_client [req-175d782b-863c-47c4-8d13-ed9fb18fe6f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-MiscPolicyActionsRbacTest-93860552-desc", "domain_id": "default", "name": "tempest-MiscPolicyActionsRbacTest-93860552"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '384', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-175d782b-863c-47c4-8d13-ed9fb18fe6f2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "a3d19c5b75ac4389bcf7e4fede97c4ab", "name": "tempest-MiscPolicyActionsRbacTest-93860552", "domain_id": "default", "description": "tempest-MiscPolicyActionsRbacTest-93860552-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/a3d19c5b75ac4389bcf7e4fede97c4ab"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:07.677 39 INFO tempest.lib.common.rest_client [req-ef2bfe9f-8fe2-4752-9969-178d4aafa660 ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.130s 2020-11-06 18:14:07.677 39 DEBUG tempest.lib.common.rest_client [req-ef2bfe9f-8fe2-4752-9969-178d4aafa660 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-MiscPolicyActionsRbacTest-93860552", "password": "Q0^ios@2azW1p+R", "project_id": "a3d19c5b75ac4389bcf7e4fede97c4ab", "email": "tempest-MiscPolicyActionsRbacTest-132525837@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '403', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ef2bfe9f-8fe2-4752-9969-178d4aafa660', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "a3d19c5b75ac4389bcf7e4fede97c4ab", "email": "tempest-MiscPolicyActionsRbacTest-132525837@example.com", "id": "78dd6249f56e4304ae2b5aee14c2b015", "name": "tempest-MiscPolicyActionsRbacTest-93860552", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/78dd6249f56e4304ae2b5aee14c2b015"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:07.732 39 INFO tempest.lib.common.rest_client [req-c1a7f580-2a11-4e49-97c1-51b6492e451c ] Request (MiscPolicyActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.054s 2020-11-06 18:14:07.733 39 DEBUG tempest.lib.common.rest_client [req-c1a7f580-2a11-4e49-97c1-51b6492e451c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c1a7f580-2a11-4e49-97c1-51b6492e451c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:07.812 39 INFO tempest.lib.common.rest_client [req-48ebd1df-ab38-4b78-ab66-74035f14cffc ] Request (MiscPolicyActionsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/a3d19c5b75ac4389bcf7e4fede97c4ab/users/78dd6249f56e4304ae2b5aee14c2b015/roles/a629c95d64b3416fb80ae90af4f69c05 0.078s 2020-11-06 18:14:07.813 39 DEBUG tempest.lib.common.rest_client [req-48ebd1df-ab38-4b78-ab66-74035f14cffc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-48ebd1df-ab38-4b78-ab66-74035f14cffc', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a3d19c5b75ac4389bcf7e4fede97c4ab/users/78dd6249f56e4304ae2b5aee14c2b015/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:07.813 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-MiscPolicyActionsRbacTest-93860552', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'a3d19c5b75ac4389bcf7e4fede97c4ab', 'project_name': 'tempest-MiscPolicyActionsRbacTest-93860552', 'tenant_id': 'a3d19c5b75ac4389bcf7e4fede97c4ab', 'tenant_name': 'tempest-MiscPolicyActionsRbacTest-93860552', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '78dd6249f56e4304ae2b5aee14c2b015'}, Network: None, Subnet: None, Router: None 2020-11-06 18:14:08.201 39 INFO tempest.lib.common.rest_client [req-2b017c5b-094b-46c3-a11a-d518cfd6dcd8 ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.387s 2020-11-06 18:14:08.202 39 DEBUG tempest.lib.common.rest_client [req-2b017c5b-094b-46c3-a11a-d518cfd6dcd8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-MiscPolicyActionsRbacTest-42776558-network", "tenant_id": "a3d19c5b75ac4389bcf7e4fede97c4ab"}} Response - Headers: {'content-type': 'application/json', 'content-length': '739', 'x-openstack-request-id': 'req-2b017c5b-094b-46c3-a11a-d518cfd6dcd8', 'date': 'Fri, 06 Nov 2020 18:14:08 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"4d16ddb5-d3a3-446f-b983-8567b36e3fd9","name":"tempest-MiscPolicyActionsRbacTest-42776558-network","tenant_id":"a3d19c5b75ac4389bcf7e4fede97c4ab","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"a3d19c5b75ac4389bcf7e4fede97c4ab","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":49,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:14:07Z","updated_at":"2020-11-06T18:14:08Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:08.753 39 INFO tempest.lib.common.rest_client [req-37a88480-2d18-4fa0-bf67-e998611c4781 ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.550s 2020-11-06 18:14:08.754 39 DEBUG tempest.lib.common.rest_client [req-37a88480-2d18-4fa0-bf67-e998611c4781 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "4d16ddb5-d3a3-446f-b983-8567b36e3fd9", "cidr": "192.168.120.0/28", "name": "tempest-MiscPolicyActionsRbacTest-42776558-subnet", "tenant_id": "a3d19c5b75ac4389bcf7e4fede97c4ab", "enable_dhcp": false, "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '711', 'x-openstack-request-id': 'req-37a88480-2d18-4fa0-bf67-e998611c4781', 'date': 'Fri, 06 Nov 2020 18:14:08 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"092ca89b-51bf-4f41-9c91-080051451c86","name":"tempest-MiscPolicyActionsRbacTest-42776558-subnet","tenant_id":"a3d19c5b75ac4389bcf7e4fede97c4ab","network_id":"4d16ddb5-d3a3-446f-b983-8567b36e3fd9","ip_version":4,"subnetpool_id":null,"enable_dhcp":false,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-11-06T18:14:08Z","updated_at":"2020-11-06T18:14:08Z","revision_number":0,"project_id":"a3d19c5b75ac4389bcf7e4fede97c4ab"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:11.180 39 INFO tempest.lib.common.rest_client [req-0966630a-7372-4295-85af-21c4fc4be1e6 ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/routers 2.425s 2020-11-06 18:14:11.181 39 DEBUG tempest.lib.common.rest_client [req-0966630a-7372-4295-85af-21c4fc4be1e6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-MiscPolicyActionsRbacTest-42776558-router", "tenant_id": "a3d19c5b75ac4389bcf7e4fede97c4ab", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea"}}} Response - Headers: {'content-type': 'application/json', 'content-length': '812', 'x-openstack-request-id': 'req-0966630a-7372-4295-85af-21c4fc4be1e6', 'date': 'Fri, 06 Nov 2020 18:14:11 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "27b5137f-8bba-4d80-b8ca-eaa60597259b", "name": "tempest-MiscPolicyActionsRbacTest-42776558-router", "tenant_id": "a3d19c5b75ac4389bcf7e4fede97c4ab", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.13"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::2d7"}], "enable_snat": true}, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T18:14:08Z", "updated_at": "2020-11-06T18:14:10Z", "revision_number": 3, "project_id": "a3d19c5b75ac4389bcf7e4fede97c4ab"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:13.117 39 INFO tempest.lib.common.rest_client [req-9925d795-890d-40cf-bce0-890963964a5a ] Request (MiscPolicyActionsRbacTest:setUpClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/27b5137f-8bba-4d80-b8ca-eaa60597259b/add_router_interface 1.934s 2020-11-06 18:14:13.118 39 DEBUG tempest.lib.common.rest_client [req-9925d795-890d-40cf-bce0-890963964a5a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "092ca89b-51bf-4f41-9c91-080051451c86"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-9925d795-890d-40cf-bce0-890963964a5a', 'date': 'Fri, 06 Nov 2020 18:14:13 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/27b5137f-8bba-4d80-b8ca-eaa60597259b/add_router_interface'} Body: b'{"id": "27b5137f-8bba-4d80-b8ca-eaa60597259b", "tenant_id": "a3d19c5b75ac4389bcf7e4fede97c4ab", "port_id": "ea01712c-f54b-4840-8de0-4e0e2d7bb591", "network_id": "4d16ddb5-d3a3-446f-b983-8567b36e3fd9", "subnet_id": "092ca89b-51bf-4f41-9c91-080051451c86", "subnet_ids": ["092ca89b-51bf-4f41-9c91-080051451c86"]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:13.118 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-MiscPolicyActionsRbacTest-93860552', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'a3d19c5b75ac4389bcf7e4fede97c4ab', 'project_name': 'tempest-MiscPolicyActionsRbacTest-93860552', 'tenant_id': 'a3d19c5b75ac4389bcf7e4fede97c4ab', 'tenant_name': 'tempest-MiscPolicyActionsRbacTest-93860552', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '78dd6249f56e4304ae2b5aee14c2b015'}, Network: {'id': '4d16ddb5-d3a3-446f-b983-8567b36e3fd9', 'name': 'tempest-MiscPolicyActionsRbacTest-42776558-network', 'tenant_id': 'a3d19c5b75ac4389bcf7e4fede97c4ab', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': 'a3d19c5b75ac4389bcf7e4fede97c4ab', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 49, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T18:14:07Z', 'updated_at': '2020-11-06T18:14:08Z', 'revision_number': 1}, Subnet: {'id': '092ca89b-51bf-4f41-9c91-080051451c86', 'name': 'tempest-MiscPolicyActionsRbacTest-42776558-subnet', 'tenant_id': 'a3d19c5b75ac4389bcf7e4fede97c4ab', 'network_id': '4d16ddb5-d3a3-446f-b983-8567b36e3fd9', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-11-06T18:14:08Z', 'updated_at': '2020-11-06T18:14:08Z', 'revision_number': 0, 'project_id': 'a3d19c5b75ac4389bcf7e4fede97c4ab'}, Router: {'id': '27b5137f-8bba-4d80-b8ca-eaa60597259b', 'name': 'tempest-MiscPolicyActionsRbacTest-42776558-router', 'tenant_id': 'a3d19c5b75ac4389bcf7e4fede97c4ab', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.13'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::2d7'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-11-06T18:14:08Z', 'updated_at': '2020-11-06T18:14:10Z', 'revision_number': 3, 'project_id': 'a3d19c5b75ac4389bcf7e4fede97c4ab'} 2020-11-06 18:14:13.258 39 INFO tempest.lib.common.rest_client [req-8143c3c5-29fb-4a24-aa11-476180ab58bb ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.127s 2020-11-06 18:14:13.259 39 DEBUG tempest.lib.common.rest_client [req-8143c3c5-29fb-4a24-aa11-476180ab58bb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8143c3c5-29fb-4a24-aa11-476180ab58bb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "78dd6249f56e4304ae2b5aee14c2b015", "name": "tempest-MiscPolicyActionsRbacTest-93860552", "password_expires_at": null}, "audit_ids": ["_svIehJBRHypa9n-Vt4Fjg"], "expires_at": "2020-11-06T19:14:13.000000Z", "issued_at": "2020-11-06T18:14:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a3d19c5b75ac4389bcf7e4fede97c4ab", "name": "tempest-MiscPolicyActionsRbacTest-93860552"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a3d19c5b75ac4389bcf7e4fede97c4ab", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a3d19c5b75ac4389bcf7e4fede97c4ab", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a3d19c5b75ac4389bcf7e4fede97c4ab", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a3d19c5b75ac4389bcf7e4fede97c4ab", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a3d19c5b75ac4389bcf7e4fede97c4ab", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a3d19c5b75ac4389bcf7e4fede97c4ab", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:13.347 39 INFO tempest.lib.common.rest_client [req-08f49b8e-66e0-4405-800a-ee58b01ad85b ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-11-06 18:14:13.347 39 DEBUG tempest.lib.common.rest_client [req-08f49b8e-66e0-4405-800a-ee58b01ad85b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-08f49b8e-66e0-4405-800a-ee58b01ad85b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["ScGd4JLFR_KCTvJOM7PsgQ"], "expires_at": "2020-11-06T19:14:13.000000Z", "issued_at": "2020-11-06T18:14:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:13.401 39 INFO tempest.lib.common.rest_client [req-e035a016-b263-4b11-bb48-46710f64ebbb ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-11-06 18:14:13.402 39 DEBUG tempest.lib.common.rest_client [req-e035a016-b263-4b11-bb48-46710f64ebbb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e035a016-b263-4b11-bb48-46710f64ebbb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["Aa6VNRrWS1aqfQZnJQHcoA"], "expires_at": "2020-11-06T19:14:13.000000Z", "issued_at": "2020-11-06T18:14:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:13.459 39 INFO tempest.lib.common.rest_client [req-7fe3f565-d345-4f88-9483-9907ab6780de ] Request (MiscPolicyActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.056s 2020-11-06 18:14:13.460 39 DEBUG tempest.lib.common.rest_client [req-7fe3f565-d345-4f88-9483-9907ab6780de ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7fe3f565-d345-4f88-9483-9907ab6780de', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:13.508 39 INFO tempest.lib.common.rest_client [req-29efdcee-1687-4c16-a780-2d5239f84423 ] Request (MiscPolicyActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.047s 2020-11-06 18:14:13.508 39 DEBUG tempest.lib.common.rest_client [req-29efdcee-1687-4c16-a780-2d5239f84423 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-29efdcee-1687-4c16-a780-2d5239f84423', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:13.509 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:14:13.509 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:14:13.567 39 INFO tempest.lib.common.rest_client [req-83356f9b-2ed9-4ea4-ac58-bf1cc113c12d ] Request (MiscPolicyActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.057s 2020-11-06 18:14:13.567 39 DEBUG tempest.lib.common.rest_client [req-83356f9b-2ed9-4ea4-ac58-bf1cc113c12d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-83356f9b-2ed9-4ea4-ac58-bf1cc113c12d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:13.624 39 INFO tempest.lib.common.rest_client [req-ea37e71f-18e6-41c6-ba7d-47d416a65a7f ] Request (MiscPolicyActionsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles/72a4576c553448cd941b052c1ca0cf2d 0.056s 2020-11-06 18:14:13.624 39 DEBUG tempest.lib.common.rest_client [req-ea37e71f-18e6-41c6-ba7d-47d416a65a7f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ea37e71f-18e6-41c6-ba7d-47d416a65a7f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:13.734 39 INFO tempest.lib.common.rest_client [req-84fdfc89-9ef0-44bf-90e4-dd8826da2ec4 ] Request (MiscPolicyActionsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles/a629c95d64b3416fb80ae90af4f69c05 0.109s 2020-11-06 18:14:13.735 39 DEBUG tempest.lib.common.rest_client [req-84fdfc89-9ef0-44bf-90e4-dd8826da2ec4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-84fdfc89-9ef0-44bf-90e4-dd8826da2ec4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:14.821 39 INFO tempest.lib.common.rest_client [req-6a7e7866-a41d-4c57-a4b1-54380959bee1 ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-11-06 18:14:14.822 39 DEBUG tempest.lib.common.rest_client [req-6a7e7866-a41d-4c57-a4b1-54380959bee1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6a7e7866-a41d-4c57-a4b1-54380959bee1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["Jd4OE99rS4ekyUj6N5rJSA"], "expires_at": "2020-11-06T19:14:14.000000Z", "issued_at": "2020-11-06T18:14:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:14.868 39 INFO tempest.lib.common.rest_client [req-cffe451e-d4b2-46f8-b859-5a1457b9f01e ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:14:14.868 39 DEBUG tempest.lib.common.rest_client [req-cffe451e-d4b2-46f8-b859-5a1457b9f01e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cffe451e-d4b2-46f8-b859-5a1457b9f01e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["f3yHruwXRRKEanRSwcWV3w"], "expires_at": "2020-11-06T19:14:14.000000Z", "issued_at": "2020-11-06T18:14:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:14.869 39 INFO tempest.lib.common.fixed_network [-] (MiscPolicyActionsRbacTest:setUpClass) Found network {'id': 'f291e8f0-9113-415f-ade6-f3a87c3b01bd', 'name': 'tempest-MiscPolicyActionsRbacTest-1175378110-network', 'tenant_id': '84fe7a8341b649fb95fb2fd72ffe24c1', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '84fe7a8341b649fb95fb2fd72ffe24c1', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 45, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T18:14:02Z', 'updated_at': '2020-11-06T18:14:03Z', 'revision_number': 1} available for tenant 2020-11-06 18:14:15.587 39 INFO tempest.lib.common.rest_client [req-d50ed635-cd80-435f-94db-681c29d3d9a0 ] Request (MiscPolicyActionsRbacTest:setUpClass): 202 POST http://172.30.13.94/compute/v2.1/servers 0.716s 2020-11-06 18:14:15.587 39 DEBUG tempest.lib.common.rest_client [req-d50ed635-cd80-435f-94db-681c29d3d9a0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-MiscPolicyActionsRbacTest-server-569442862", "imageRef": "56b368f6-9136-40ec-a04c-564d02c95e42", "flavorRef": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "networks": [{"uuid": "f291e8f0-9113-415f-ade6-f3a87c3b01bd"}]}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d50ed635-cd80-435f-94db-681c29d3d9a0', 'x-compute-request-id': 'req-d50ed635-cd80-435f-94db-681c29d3d9a0', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "9f7166ff-0cd0-4173-84b6-b032b85215d1", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "ThXPSJ78cRNG"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:15.701 39 INFO tempest.lib.common.rest_client [req-1d576a93-86d6-4f08-9796-6724dbc7473b ] Request (MiscPolicyActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1 0.109s 2020-11-06 18:14:15.701 39 DEBUG tempest.lib.common.rest_client [req-1d576a93-86d6-4f08-9796-6724dbc7473b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1400', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1d576a93-86d6-4f08-9796-6724dbc7473b', 'x-compute-request-id': 'req-1d576a93-86d6-4f08-9796-6724dbc7473b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1'} Body: b'{"server": {"id": "9f7166ff-0cd0-4173-84b6-b032b85215d1", "name": "tempest-MiscPolicyActionsRbacTest-server-569442862", "status": "BUILD", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:16Z", "updated": "2020-11-06T18:14:15Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:16.866 39 INFO tempest.lib.common.rest_client [req-f9cdc7a9-00cd-4d15-bd86-9c0d3e5ee050 ] Request (MiscPolicyActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1 0.148s 2020-11-06 18:14:16.867 39 DEBUG tempest.lib.common.rest_client [req-f9cdc7a9-00cd-4d15-bd86-9c0d3e5ee050 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1487', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f9cdc7a9-00cd-4d15-bd86-9c0d3e5ee050', 'x-compute-request-id': 'req-f9cdc7a9-00cd-4d15-bd86-9c0d3e5ee050', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1'} Body: b'{"server": {"id": "9f7166ff-0cd0-4173-84b6-b032b85215d1", "name": "tempest-MiscPolicyActionsRbacTest-server-569442862", "status": "BUILD", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:15Z", "updated": "2020-11-06T18:14:16Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:16.880 39 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/None" after 1 second wait 2020-11-06 18:14:18.130 39 INFO tempest.lib.common.rest_client [req-7c431932-458d-4f5d-ac45-549f983f7c06 ] Request (MiscPolicyActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1 0.249s 2020-11-06 18:14:18.131 39 DEBUG tempest.lib.common.rest_client [req-7c431932-458d-4f5d-ac45-549f983f7c06 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1535', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7c431932-458d-4f5d-ac45-549f983f7c06', 'x-compute-request-id': 'req-7c431932-458d-4f5d-ac45-549f983f7c06', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1'} Body: b'{"server": {"id": "9f7166ff-0cd0-4173-84b6-b032b85215d1", "name": "tempest-MiscPolicyActionsRbacTest-server-569442862", "status": "BUILD", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:15Z", "updated": "2020-11-06T18:14:17Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:18.142 39 INFO tempest.common.waiters [-] State transition "BUILD/None" ==> "BUILD/spawning" after 3 second wait 2020-11-06 18:14:19.339 39 INFO tempest.lib.common.rest_client [req-56bf570a-3d3d-4b32-be35-9d7dafcd1020 ] Request (MiscPolicyActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1 0.195s 2020-11-06 18:14:19.340 39 DEBUG tempest.lib.common.rest_client [req-56bf570a-3d3d-4b32-be35-9d7dafcd1020 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1535', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-56bf570a-3d3d-4b32-be35-9d7dafcd1020', 'x-compute-request-id': 'req-56bf570a-3d3d-4b32-be35-9d7dafcd1020', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1'} Body: b'{"server": {"id": "9f7166ff-0cd0-4173-84b6-b032b85215d1", "name": "tempest-MiscPolicyActionsRbacTest-server-569442862", "status": "BUILD", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:15Z", "updated": "2020-11-06T18:14:17Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:20.568 39 INFO tempest.lib.common.rest_client [req-1aa43a28-d00d-4d5d-8630-855b9625ac90 ] Request (MiscPolicyActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1 0.210s 2020-11-06 18:14:20.568 39 DEBUG tempest.lib.common.rest_client [req-1aa43a28-d00d-4d5d-8630-855b9625ac90 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1535', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1aa43a28-d00d-4d5d-8630-855b9625ac90', 'x-compute-request-id': 'req-1aa43a28-d00d-4d5d-8630-855b9625ac90', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1'} Body: b'{"server": {"id": "9f7166ff-0cd0-4173-84b6-b032b85215d1", "name": "tempest-MiscPolicyActionsRbacTest-server-569442862", "status": "BUILD", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:15Z", "updated": "2020-11-06T18:14:17Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:21.763 39 INFO tempest.lib.common.rest_client [req-259f92e8-9185-44bc-9a45-09b52e0d4d47 ] Request (MiscPolicyActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1 0.181s 2020-11-06 18:14:21.763 39 DEBUG tempest.lib.common.rest_client [req-259f92e8-9185-44bc-9a45-09b52e0d4d47 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1535', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-259f92e8-9185-44bc-9a45-09b52e0d4d47', 'x-compute-request-id': 'req-259f92e8-9185-44bc-9a45-09b52e0d4d47', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1'} Body: b'{"server": {"id": "9f7166ff-0cd0-4173-84b6-b032b85215d1", "name": "tempest-MiscPolicyActionsRbacTest-server-569442862", "status": "BUILD", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:15Z", "updated": "2020-11-06T18:14:17Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:22.997 39 INFO tempest.lib.common.rest_client [req-8567a2f0-bb93-4a63-b809-513aec8e86ca ] Request (MiscPolicyActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1 0.216s 2020-11-06 18:14:22.998 39 DEBUG tempest.lib.common.rest_client [req-8567a2f0-bb93-4a63-b809-513aec8e86ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8567a2f0-bb93-4a63-b809-513aec8e86ca', 'x-compute-request-id': 'req-8567a2f0-bb93-4a63-b809-513aec8e86ca', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1'} Body: b'{"server": {"id": "9f7166ff-0cd0-4173-84b6-b032b85215d1", "name": "tempest-MiscPolicyActionsRbacTest-server-569442862", "status": "ACTIVE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:15Z", "updated": "2020-11-06T18:14:22Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.12", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:4a:ff:d1"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:22.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:23.010 39 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 8 second wait 2020-11-06 18:14:23.286 39 INFO tempest.lib.common.rest_client [req-15eaed63-677e-4c28-bbd3-e4c4b0b50759 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1 0.274s 2020-11-06 18:14:23.286 39 DEBUG tempest.lib.common.rest_client [req-15eaed63-677e-4c28-bbd3-e4c4b0b50759 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-15eaed63-677e-4c28-bbd3-e4c4b0b50759', 'x-compute-request-id': 'req-15eaed63-677e-4c28-bbd3-e4c4b0b50759', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1'} Body: b'{"server": {"id": "9f7166ff-0cd0-4173-84b6-b032b85215d1", "name": "tempest-MiscPolicyActionsRbacTest-server-569442862", "status": "ACTIVE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:15Z", "updated": "2020-11-06T18:14:22Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.12", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:4a:ff:d1"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:22.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:23.301 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:14:23.301 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.302 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.302 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.303 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.303 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.304 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.304 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.304 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.305 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.305 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.305 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.305 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.306 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.306 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.306 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.307 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.307 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.307 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.308 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.308 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.308 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.309 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.309 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.309 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.310 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.310 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.310 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.311 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.311 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.311 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.312 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.312 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.312 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.313 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.313 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.313 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.314 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.314 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.314 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.315 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.315 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.315 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.315 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.316 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.316 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.316 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.317 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.317 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.317 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.318 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.318 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.318 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.318 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.319 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.319 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.319 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.319 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.320 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.320 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.321 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.321 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.321 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.322 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.322 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.322 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.323 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.323 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.323 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.324 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.324 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.324 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.325 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.325 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.325 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.326 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:23.327 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-server-password:clear, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:14:23.327 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:14:23.446 39 INFO tempest.lib.common.rest_client [req-041b6c75-5b83-43e5-9a95-40d06546279c ] Request (MiscPolicyActionsRbacTest:test_delete_server_password): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.118s 2020-11-06 18:14:23.447 39 DEBUG tempest.lib.common.rest_client [req-041b6c75-5b83-43e5-9a95-40d06546279c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-041b6c75-5b83-43e5-9a95-40d06546279c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:23.534 39 INFO tempest.lib.common.rest_client [req-4e3a70f2-1600-4da4-9a0d-59101e65e6ce ] Request (MiscPolicyActionsRbacTest:test_delete_server_password): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-11-06 18:14:23.535 39 DEBUG tempest.lib.common.rest_client [req-4e3a70f2-1600-4da4-9a0d-59101e65e6ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4e3a70f2-1600-4da4-9a0d-59101e65e6ce', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["AN78CrkPQy64Qcy586IBDQ"], "expires_at": "2020-11-06T19:14:23.000000Z", "issued_at": "2020-11-06T18:14:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:23.815 39 INFO tempest.lib.common.rest_client [req-d875fa14-006f-4150-889b-88be8faaab12 ] Request (MiscPolicyActionsRbacTest:test_delete_server_password): 204 DELETE http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1/os-server-password 0.279s 2020-11-06 18:14:23.815 39 DEBUG tempest.lib.common.rest_client [req-d875fa14-006f-4150-889b-88be8faaab12 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d875fa14-006f-4150-889b-88be8faaab12', 'x-compute-request-id': 'req-d875fa14-006f-4150-889b-88be8faaab12', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1/os-server-password'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:23.816 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:14:23.861 39 INFO tempest.lib.common.rest_client [req-7cecba4c-1503-413f-818a-805cd2910635 ] Request (MiscPolicyActionsRbacTest:test_delete_server_password): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.044s 2020-11-06 18:14:23.861 39 DEBUG tempest.lib.common.rest_client [req-7cecba4c-1503-413f-818a-805cd2910635 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7cecba4c-1503-413f-818a-805cd2910635', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:23.893 39 INFO tempest.lib.common.rest_client [req-64dee3b7-8f39-4734-8d89-e8bf129bafd8 ] Request (MiscPolicyActionsRbacTest:test_delete_server_password): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:14:23.894 39 DEBUG tempest.lib.common.rest_client [req-64dee3b7-8f39-4734-8d89-e8bf129bafd8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-64dee3b7-8f39-4734-8d89-e8bf129bafd8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["ciXGLHPHTLWtflXM70411g"], "expires_at": "2020-11-06T19:14:23.000000Z", "issued_at": "2020-11-06T18:14:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:24.166 39 INFO tempest.lib.common.rest_client [req-b2fab37f-adac-44e6-ab3b-831cd71e5f45 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1 0.268s 2020-11-06 18:14:24.167 39 DEBUG tempest.lib.common.rest_client [req-b2fab37f-adac-44e6-ab3b-831cd71e5f45 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b2fab37f-adac-44e6-ab3b-831cd71e5f45', 'x-compute-request-id': 'req-b2fab37f-adac-44e6-ab3b-831cd71e5f45', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1'} Body: b'{"server": {"id": "9f7166ff-0cd0-4173-84b6-b032b85215d1", "name": "tempest-MiscPolicyActionsRbacTest-server-569442862", "status": "ACTIVE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:15Z", "updated": "2020-11-06T18:14:24Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.12", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:4a:ff:d1"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:22.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:24.183 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:14:24.184 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.184 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.185 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.185 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.185 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.186 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.186 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.186 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.187 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.187 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.187 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.187 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.188 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.188 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.188 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.189 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.189 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.189 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.190 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.190 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.190 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.190 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.191 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.191 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.191 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.191 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.192 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.192 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.192 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.193 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.193 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.193 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.193 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.194 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.194 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.194 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.194 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.195 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.195 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.195 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.196 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.196 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.196 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.196 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.197 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.197 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.197 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.198 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.198 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.198 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.198 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.199 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.199 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.199 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.199 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.200 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.200 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.200 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.201 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.201 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.201 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.202 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.202 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.202 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.203 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.203 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.203 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.203 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.204 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.204 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.204 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.204 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.205 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.205 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.205 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:24.206 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-deferred-delete:force, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:14:24.207 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:14:24.259 39 INFO tempest.lib.common.rest_client [req-8cac5250-0a90-47a7-93d5-3e4299fd00db ] Request (MiscPolicyActionsRbacTest:test_force_delete_server): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.052s 2020-11-06 18:14:24.260 39 DEBUG tempest.lib.common.rest_client [req-8cac5250-0a90-47a7-93d5-3e4299fd00db ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8cac5250-0a90-47a7-93d5-3e4299fd00db', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:24.297 39 INFO tempest.lib.common.rest_client [req-9e7026be-1a0d-479c-ab5d-873a07d5dfa4 ] Request (MiscPolicyActionsRbacTest:test_force_delete_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:14:24.298 39 DEBUG tempest.lib.common.rest_client [req-9e7026be-1a0d-479c-ab5d-873a07d5dfa4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9e7026be-1a0d-479c-ab5d-873a07d5dfa4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["ACIBYITVT7qJbbsGyZaw5w"], "expires_at": "2020-11-06T19:14:24.000000Z", "issued_at": "2020-11-06T18:14:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:24.566 39 INFO tempest.lib.common.rest_client [req-1dee5e66-5b29-416c-a38c-01e91997a77b ] Request (MiscPolicyActionsRbacTest:test_force_delete_server): 202 POST http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1/action 0.267s 2020-11-06 18:14:24.566 39 DEBUG tempest.lib.common.rest_client [req-1dee5e66-5b29-416c-a38c-01e91997a77b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"forceDelete": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1dee5e66-5b29-416c-a38c-01e91997a77b', 'x-compute-request-id': 'req-1dee5e66-5b29-416c-a38c-01e91997a77b', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:24.567 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:14:24.618 39 INFO tempest.lib.common.rest_client [req-8fd5cca0-0bf0-4a0a-8d7f-fe3f0315f22a ] Request (MiscPolicyActionsRbacTest:test_force_delete_server): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.051s 2020-11-06 18:14:24.619 39 DEBUG tempest.lib.common.rest_client [req-8fd5cca0-0bf0-4a0a-8d7f-fe3f0315f22a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8fd5cca0-0bf0-4a0a-8d7f-fe3f0315f22a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:24.651 39 INFO tempest.lib.common.rest_client [req-f3abbb62-14aa-45f8-abce-1fa521d18a61 ] Request (MiscPolicyActionsRbacTest:test_force_delete_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:14:24.652 39 DEBUG tempest.lib.common.rest_client [req-f3abbb62-14aa-45f8-abce-1fa521d18a61 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f3abbb62-14aa-45f8-abce-1fa521d18a61', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["QtjvOrg5SPatHEMvzAqOhw"], "expires_at": "2020-11-06T19:14:24.000000Z", "issued_at": "2020-11-06T18:14:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:24.921 39 INFO tempest.lib.common.rest_client [req-9ffc761e-fa1a-48c1-ad6d-e7a4fa7e8118 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1 0.264s 2020-11-06 18:14:24.922 39 DEBUG tempest.lib.common.rest_client [req-9ffc761e-fa1a-48c1-ad6d-e7a4fa7e8118 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9ffc761e-fa1a-48c1-ad6d-e7a4fa7e8118', 'x-compute-request-id': 'req-9ffc761e-fa1a-48c1-ad6d-e7a4fa7e8118', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1'} Body: b'{"server": {"id": "9f7166ff-0cd0-4173-84b6-b032b85215d1", "name": "tempest-MiscPolicyActionsRbacTest-server-569442862", "status": "ACTIVE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:15Z", "updated": "2020-11-06T18:14:24Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.12", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:4a:ff:d1"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:22.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:26.139 39 INFO tempest.lib.common.rest_client [req-dcb8c59c-1f9c-46c6-916d-ccbb4ce96501 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1 0.202s 2020-11-06 18:14:26.140 39 DEBUG tempest.lib.common.rest_client [req-dcb8c59c-1f9c-46c6-916d-ccbb4ce96501 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dcb8c59c-1f9c-46c6-916d-ccbb4ce96501', 'x-compute-request-id': 'req-dcb8c59c-1f9c-46c6-916d-ccbb4ce96501', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1'} Body: b'{"server": {"id": "9f7166ff-0cd0-4173-84b6-b032b85215d1", "name": "tempest-MiscPolicyActionsRbacTest-server-569442862", "status": "ACTIVE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:15Z", "updated": "2020-11-06T18:14:25Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.12", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:4a:ff:d1"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:22.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:27.312 39 INFO tempest.lib.common.rest_client [req-4b37e242-849c-4534-90a0-4346d6d94ad2 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1 0.161s 2020-11-06 18:14:27.313 39 DEBUG tempest.lib.common.rest_client [req-4b37e242-849c-4534-90a0-4346d6d94ad2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1521', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4b37e242-849c-4534-90a0-4346d6d94ad2', 'x-compute-request-id': 'req-4b37e242-849c-4534-90a0-4346d6d94ad2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1'} Body: b'{"server": {"id": "9f7166ff-0cd0-4173-84b6-b032b85215d1", "name": "tempest-MiscPolicyActionsRbacTest-server-569442862", "status": "DELETED", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:15Z", "updated": "2020-11-06T18:14:27Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:22.000000", "OS-SRV-USG:terminated_at": "2020-11-06T18:14:27.000000", "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "deleted", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:27.327 39 INFO tempest.common.waiters [-] State transition "ACTIVE/deleting" ==> "DELETED/None" after 3 second wait 2020-11-06 18:14:28.407 39 INFO tempest.lib.common.rest_client [req-8837d90d-1a94-4a80-a4d6-23c31ddf92aa ] Request (MiscPolicyActionsRbacTest:setUp): 404 GET http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1 0.078s 2020-11-06 18:14:28.408 39 DEBUG tempest.lib.common.rest_client [req-8837d90d-1a94-4a80-a4d6-23c31ddf92aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-8837d90d-1a94-4a80-a4d6-23c31ddf92aa', 'x-compute-request-id': 'req-8837d90d-1a94-4a80-a4d6-23c31ddf92aa', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 9f7166ff-0cd0-4173-84b6-b032b85215d1 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:28.456 39 INFO tempest.lib.common.rest_client [req-c9d34fb0-bc0b-41ea-8d5c-3cf73303285f ] Request (MiscPolicyActionsRbacTest:setUp): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:14:28.457 39 DEBUG tempest.lib.common.rest_client [req-c9d34fb0-bc0b-41ea-8d5c-3cf73303285f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c9d34fb0-bc0b-41ea-8d5c-3cf73303285f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["pPDLVu23TeOGFJ1eVWXIxw"], "expires_at": "2020-11-06T19:14:28.000000Z", "issued_at": "2020-11-06T18:14:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:28.458 39 INFO tempest.lib.common.fixed_network [-] (MiscPolicyActionsRbacTest:setUp) Found network {'id': 'f291e8f0-9113-415f-ade6-f3a87c3b01bd', 'name': 'tempest-MiscPolicyActionsRbacTest-1175378110-network', 'tenant_id': '84fe7a8341b649fb95fb2fd72ffe24c1', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '84fe7a8341b649fb95fb2fd72ffe24c1', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 45, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T18:14:02Z', 'updated_at': '2020-11-06T18:14:03Z', 'revision_number': 1} available for tenant 2020-11-06 18:14:29.201 39 INFO tempest.lib.common.rest_client [req-2bd5e694-3d90-4309-adad-219309e0c70d ] Request (MiscPolicyActionsRbacTest:setUp): 202 POST http://172.30.13.94/compute/v2.1/servers 0.742s 2020-11-06 18:14:29.202 39 DEBUG tempest.lib.common.rest_client [req-2bd5e694-3d90-4309-adad-219309e0c70d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "imageRef": "56b368f6-9136-40ec-a04c-564d02c95e42", "flavorRef": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "networks": [{"uuid": "f291e8f0-9113-415f-ade6-f3a87c3b01bd"}]}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2bd5e694-3d90-4309-adad-219309e0c70d', 'x-compute-request-id': 'req-2bd5e694-3d90-4309-adad-219309e0c70d', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "KcCs9EJgfBsy"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:29.301 39 INFO tempest.lib.common.rest_client [req-0f19dfc0-e948-4814-9faa-10f5cf37481d ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.093s 2020-11-06 18:14:29.302 39 DEBUG tempest.lib.common.rest_client [req-0f19dfc0-e948-4814-9faa-10f5cf37481d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1401', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0f19dfc0-e948-4814-9faa-10f5cf37481d', 'x-compute-request-id': 'req-0f19dfc0-e948-4814-9faa-10f5cf37481d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "BUILD", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:29Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:30.452 39 INFO tempest.lib.common.rest_client [req-52b4d093-1c18-4499-bd4b-5151cc1a1cf6 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.134s 2020-11-06 18:14:30.453 39 DEBUG tempest.lib.common.rest_client [req-52b4d093-1c18-4499-bd4b-5151cc1a1cf6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1496', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-52b4d093-1c18-4499-bd4b-5151cc1a1cf6', 'x-compute-request-id': 'req-52b4d093-1c18-4499-bd4b-5151cc1a1cf6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "BUILD", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:30Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "networking", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:30.465 39 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/networking" after 1 second wait 2020-11-06 18:14:31.715 39 INFO tempest.lib.common.rest_client [req-cad476e4-061d-43ac-8ae7-2db25d5abf49 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.248s 2020-11-06 18:14:31.716 39 DEBUG tempest.lib.common.rest_client [req-cad476e4-061d-43ac-8ae7-2db25d5abf49 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cad476e4-061d-43ac-8ae7-2db25d5abf49', 'x-compute-request-id': 'req-cad476e4-061d-43ac-8ae7-2db25d5abf49', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "BUILD", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:30Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:31.732 39 INFO tempest.common.waiters [-] State transition "BUILD/networking" ==> "BUILD/spawning" after 2 second wait 2020-11-06 18:14:32.951 39 INFO tempest.lib.common.rest_client [req-1870c157-4d2a-430c-84f8-c524453eac71 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.217s 2020-11-06 18:14:32.951 39 DEBUG tempest.lib.common.rest_client [req-1870c157-4d2a-430c-84f8-c524453eac71 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1870c157-4d2a-430c-84f8-c524453eac71', 'x-compute-request-id': 'req-1870c157-4d2a-430c-84f8-c524453eac71', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "BUILD", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:30Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:34.166 39 INFO tempest.lib.common.rest_client [req-961bf107-ca40-48b5-9cf3-06afbfe173c9 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.201s 2020-11-06 18:14:34.166 39 DEBUG tempest.lib.common.rest_client [req-961bf107-ca40-48b5-9cf3-06afbfe173c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-961bf107-ca40-48b5-9cf3-06afbfe173c9', 'x-compute-request-id': 'req-961bf107-ca40-48b5-9cf3-06afbfe173c9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "BUILD", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:30Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:35.437 39 INFO tempest.lib.common.rest_client [req-cf2a87ad-c728-4383-9dba-07db64a2f665 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.254s 2020-11-06 18:14:35.438 39 DEBUG tempest.lib.common.rest_client [req-cf2a87ad-c728-4383-9dba-07db64a2f665 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cf2a87ad-c728-4383-9dba-07db64a2f665', 'x-compute-request-id': 'req-cf2a87ad-c728-4383-9dba-07db64a2f665', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "BUILD", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:30Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:36.660 39 INFO tempest.lib.common.rest_client [req-1ab1b92e-24a2-44f3-be04-a45f53636e9d ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.205s 2020-11-06 18:14:36.660 39 DEBUG tempest.lib.common.rest_client [req-1ab1b92e-24a2-44f3-be04-a45f53636e9d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1ab1b92e-24a2-44f3-be04-a45f53636e9d', 'x-compute-request-id': 'req-1ab1b92e-24a2-44f3-be04-a45f53636e9d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "ACTIVE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:36Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:35.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:36.672 39 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 7 second wait 2020-11-06 18:14:36.672 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:14:36.673 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.673 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.674 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.674 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.674 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.675 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.675 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.675 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.675 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.676 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.676 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.676 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.677 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.677 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.677 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.677 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.678 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.678 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.678 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.678 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.679 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.679 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.679 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.679 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.679 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.680 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.680 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.680 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.680 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.681 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.681 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.681 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.681 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.682 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.682 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.682 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.682 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.682 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.683 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.683 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.683 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.683 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.684 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.684 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.684 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.684 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.685 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.685 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.685 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.685 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.686 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.686 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.686 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.686 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.687 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.687 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.687 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.687 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.688 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.688 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.688 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.688 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.689 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.689 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.689 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.689 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.690 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.690 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.690 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.690 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.691 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.691 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.691 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.691 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.692 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:36.693 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-server-password:show, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:14:36.693 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:14:36.742 39 INFO tempest.lib.common.rest_client [req-d0fdb307-fa25-4ee0-af8e-62abef5b2b7b ] Request (MiscPolicyActionsRbacTest:test_get_server_password): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.048s 2020-11-06 18:14:36.743 39 DEBUG tempest.lib.common.rest_client [req-d0fdb307-fa25-4ee0-af8e-62abef5b2b7b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d0fdb307-fa25-4ee0-af8e-62abef5b2b7b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:36.781 39 INFO tempest.lib.common.rest_client [req-e49d7081-c46c-4cee-821d-b0756ab89ff5 ] Request (MiscPolicyActionsRbacTest:test_get_server_password): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:14:36.782 39 DEBUG tempest.lib.common.rest_client [req-e49d7081-c46c-4cee-821d-b0756ab89ff5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e49d7081-c46c-4cee-821d-b0756ab89ff5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["1jt6LukGQRuYCgOftJSFLw"], "expires_at": "2020-11-06T19:14:36.000000Z", "issued_at": "2020-11-06T18:14:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:36.922 39 INFO tempest.lib.common.rest_client [req-3ea5305c-af1b-4b76-8d9a-72392c6739e7 ] Request (MiscPolicyActionsRbacTest:test_get_server_password): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb/os-server-password 0.138s 2020-11-06 18:14:36.922 39 DEBUG tempest.lib.common.rest_client [req-3ea5305c-af1b-4b76-8d9a-72392c6739e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '16', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3ea5305c-af1b-4b76-8d9a-72392c6739e7', 'x-compute-request-id': 'req-3ea5305c-af1b-4b76-8d9a-72392c6739e7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb/os-server-password'} Body: b'{"password": ""}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:36.925 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:14:36.981 39 INFO tempest.lib.common.rest_client [req-c240bcee-3d42-47bc-b4e1-b6cc8def0255 ] Request (MiscPolicyActionsRbacTest:test_get_server_password): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.055s 2020-11-06 18:14:36.981 39 DEBUG tempest.lib.common.rest_client [req-c240bcee-3d42-47bc-b4e1-b6cc8def0255 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c240bcee-3d42-47bc-b4e1-b6cc8def0255', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:37.017 39 INFO tempest.lib.common.rest_client [req-9b11744f-667f-42fe-b00b-b9c06c764749 ] Request (MiscPolicyActionsRbacTest:test_get_server_password): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:14:37.017 39 DEBUG tempest.lib.common.rest_client [req-9b11744f-667f-42fe-b00b-b9c06c764749 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9b11744f-667f-42fe-b00b-b9c06c764749', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["qB8vv6ceSySbvat932MPzg"], "expires_at": "2020-11-06T19:14:37.000000Z", "issued_at": "2020-11-06T18:14:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:37.266 39 INFO tempest.lib.common.rest_client [req-f3f82a13-cf9a-436c-b19f-c2e259d9afbd ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.239s 2020-11-06 18:14:37.266 39 DEBUG tempest.lib.common.rest_client [req-f3f82a13-cf9a-436c-b19f-c2e259d9afbd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f3f82a13-cf9a-436c-b19f-c2e259d9afbd', 'x-compute-request-id': 'req-f3f82a13-cf9a-436c-b19f-c2e259d9afbd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "ACTIVE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:36Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:35.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:37.279 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:14:37.280 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.280 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.280 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.281 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.281 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.281 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.282 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.282 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.282 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.283 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.283 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.283 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.283 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.284 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.284 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.284 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.285 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.285 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.285 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.285 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.286 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.286 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.286 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.287 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.287 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.287 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.287 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.288 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.288 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.288 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.288 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.289 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.289 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.289 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.289 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.290 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.290 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.290 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.291 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.291 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.291 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.291 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.292 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.292 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.292 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.292 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.293 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.293 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.293 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.294 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.294 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.294 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.294 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.295 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.295 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.295 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.295 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.296 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.296 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.296 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.297 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.297 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.297 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.298 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.298 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.298 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.299 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.299 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.299 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.299 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.300 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.300 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.300 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.300 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.301 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.302 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-admin-actions:inject_network_info, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:14:37.302 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:14:37.352 39 INFO tempest.lib.common.rest_client [req-7ca7a3db-9779-45f6-914b-41b6810453a2 ] Request (MiscPolicyActionsRbacTest:test_inject_network_info): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.050s 2020-11-06 18:14:37.353 39 DEBUG tempest.lib.common.rest_client [req-7ca7a3db-9779-45f6-914b-41b6810453a2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7ca7a3db-9779-45f6-914b-41b6810453a2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:37.389 39 INFO tempest.lib.common.rest_client [req-e47f2935-93a1-4f38-944e-44c26c23f7ce ] Request (MiscPolicyActionsRbacTest:test_inject_network_info): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:14:37.390 39 DEBUG tempest.lib.common.rest_client [req-e47f2935-93a1-4f38-944e-44c26c23f7ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e47f2935-93a1-4f38-944e-44c26c23f7ce', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["evVHSjLwRuaTVAZblGo58Q"], "expires_at": "2020-11-06T19:14:37.000000Z", "issued_at": "2020-11-06T18:14:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:37.542 39 INFO tempest.lib.common.rest_client [req-6b7d2235-52f8-4519-bc5f-5c4453e7ef2b ] Request (MiscPolicyActionsRbacTest:test_inject_network_info): 202 POST http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb/action 0.151s 2020-11-06 18:14:37.543 39 DEBUG tempest.lib.common.rest_client [req-6b7d2235-52f8-4519-bc5f-5c4453e7ef2b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"injectNetworkInfo": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6b7d2235-52f8-4519-bc5f-5c4453e7ef2b', 'x-compute-request-id': 'req-6b7d2235-52f8-4519-bc5f-5c4453e7ef2b', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:37.544 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:14:37.591 39 INFO tempest.lib.common.rest_client [req-d24b35a2-2ae3-4f4b-a449-0f6c7e08f3c4 ] Request (MiscPolicyActionsRbacTest:test_inject_network_info): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.047s 2020-11-06 18:14:37.592 39 DEBUG tempest.lib.common.rest_client [req-d24b35a2-2ae3-4f4b-a449-0f6c7e08f3c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d24b35a2-2ae3-4f4b-a449-0f6c7e08f3c4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:37.625 39 INFO tempest.lib.common.rest_client [req-cea5fae4-6408-48a3-919e-5ac96ab711e3 ] Request (MiscPolicyActionsRbacTest:test_inject_network_info): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:14:37.625 39 DEBUG tempest.lib.common.rest_client [req-cea5fae4-6408-48a3-919e-5ac96ab711e3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cea5fae4-6408-48a3-919e-5ac96ab711e3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["cD8gmbJnT3qFNjdKBRKHZg"], "expires_at": "2020-11-06T19:14:37.000000Z", "issued_at": "2020-11-06T18:14:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:37.889 39 INFO tempest.lib.common.rest_client [req-ea2fa746-37a3-43b6-93b1-ba1b00748ed5 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.260s 2020-11-06 18:14:37.890 39 DEBUG tempest.lib.common.rest_client [req-ea2fa746-37a3-43b6-93b1-ba1b00748ed5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ea2fa746-37a3-43b6-93b1-ba1b00748ed5', 'x-compute-request-id': 'req-ea2fa746-37a3-43b6-93b1-ba1b00748ed5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "ACTIVE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:36Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:35.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:37.904 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:14:37.905 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.905 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.905 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.906 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.906 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.907 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.907 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.907 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.908 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.908 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.908 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.908 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.909 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.909 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.909 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.910 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.910 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.910 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.910 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.911 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.911 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.911 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.912 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.912 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.912 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.912 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.913 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.913 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.913 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.914 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.914 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.914 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.914 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.915 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.915 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.915 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.915 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.916 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.916 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.916 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.917 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.917 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.917 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.917 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.918 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.918 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.918 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.919 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.919 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.919 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.919 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.920 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.920 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.920 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.921 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.921 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.921 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.921 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.922 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.922 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.923 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.923 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.923 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.923 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.924 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.924 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.924 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.925 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.925 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.925 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.925 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.926 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.926 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.926 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.927 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:37.928 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-instance-actions:list, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:14:37.928 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:14:37.970 39 INFO tempest.lib.common.rest_client [req-b32bf778-a760-44d9-bf83-a75430297831 ] Request (MiscPolicyActionsRbacTest:test_list_instance_actions): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.041s 2020-11-06 18:14:37.970 39 DEBUG tempest.lib.common.rest_client [req-b32bf778-a760-44d9-bf83-a75430297831 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b32bf778-a760-44d9-bf83-a75430297831', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:37.999 39 INFO tempest.lib.common.rest_client [req-9c5e47b8-d6f6-4083-9e79-dfaa149b38f0 ] Request (MiscPolicyActionsRbacTest:test_list_instance_actions): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.028s 2020-11-06 18:14:37.999 39 DEBUG tempest.lib.common.rest_client [req-9c5e47b8-d6f6-4083-9e79-dfaa149b38f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9c5e47b8-d6f6-4083-9e79-dfaa149b38f0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["Qp8E6gt_Sr-9qCXARRjrlA"], "expires_at": "2020-11-06T19:14:37.000000Z", "issued_at": "2020-11-06T18:14:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:38.131 39 INFO tempest.lib.common.rest_client [req-042e10c0-8951-431b-ac4b-43539a62b710 ] Request (MiscPolicyActionsRbacTest:test_list_instance_actions): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb/os-instance-actions 0.131s 2020-11-06 18:14:38.132 39 DEBUG tempest.lib.common.rest_client [req-042e10c0-8951-431b-ac4b-43539a62b710 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '316', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-042e10c0-8951-431b-ac4b-43539a62b710', 'x-compute-request-id': 'req-042e10c0-8951-431b-ac4b-43539a62b710', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb/os-instance-actions'} Body: b'{"instanceActions": [{"action": "create", "instance_uuid": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "request_id": "req-2bd5e694-3d90-4309-adad-219309e0c70d", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "project_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "start_time": "2020-11-06T18:14:28.000000", "message": null}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:38.135 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:14:38.178 39 INFO tempest.lib.common.rest_client [req-4e1e6ce8-6668-4665-9de6-81d71f28ebec ] Request (MiscPolicyActionsRbacTest:test_list_instance_actions): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.041s 2020-11-06 18:14:38.178 39 DEBUG tempest.lib.common.rest_client [req-4e1e6ce8-6668-4665-9de6-81d71f28ebec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4e1e6ce8-6668-4665-9de6-81d71f28ebec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:38.213 39 INFO tempest.lib.common.rest_client [req-79e636f8-8401-492b-86cd-32f86a1e7b3f ] Request (MiscPolicyActionsRbacTest:test_list_instance_actions): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:14:38.213 39 DEBUG tempest.lib.common.rest_client [req-79e636f8-8401-492b-86cd-32f86a1e7b3f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-79e636f8-8401-492b-86cd-32f86a1e7b3f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["AOwdvABUSL24keCgoWZwKA"], "expires_at": "2020-11-06T19:14:38.000000Z", "issued_at": "2020-11-06T18:14:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:38.472 39 INFO tempest.lib.common.rest_client [req-17ab8d82-d059-4e46-91c0-545c1e153811 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.250s 2020-11-06 18:14:38.472 39 DEBUG tempest.lib.common.rest_client [req-17ab8d82-d059-4e46-91c0-545c1e153811 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-17ab8d82-d059-4e46-91c0-545c1e153811', 'x-compute-request-id': 'req-17ab8d82-d059-4e46-91c0-545c1e153811', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "ACTIVE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:36Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:35.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:38.489 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:14:38.490 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.490 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.491 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.491 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.491 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.492 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.492 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.493 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.493 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.493 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.494 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.494 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.494 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.494 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.495 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.495 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.495 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.496 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.496 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.496 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.497 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.497 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.497 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.498 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.498 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.498 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.498 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.499 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.499 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.499 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.500 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.500 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.500 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.500 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.501 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.501 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.501 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.502 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.502 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.502 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.502 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.503 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.503 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.503 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.504 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.504 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.504 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.505 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.505 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.505 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.505 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.506 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.506 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.506 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.507 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.507 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.507 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.507 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.508 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.508 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.509 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.509 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.509 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.510 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.510 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.510 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.510 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.511 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.511 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.511 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.512 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.512 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.512 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.513 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.513 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:38.514 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-simple-tenant-usage:list, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:14:38.514 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:14:38.568 39 INFO tempest.lib.common.rest_client [req-126fa6c7-8de9-420b-8894-d1f2fe6773b8 ] Request (MiscPolicyActionsRbacTest:test_list_simple_tenant_usages): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.053s 2020-11-06 18:14:38.569 39 DEBUG tempest.lib.common.rest_client [req-126fa6c7-8de9-420b-8894-d1f2fe6773b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-126fa6c7-8de9-420b-8894-d1f2fe6773b8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:38.603 39 INFO tempest.lib.common.rest_client [req-6b2eeb39-c0c0-4d81-b767-d85c488daeca ] Request (MiscPolicyActionsRbacTest:test_list_simple_tenant_usages): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:14:38.604 39 DEBUG tempest.lib.common.rest_client [req-6b2eeb39-c0c0-4d81-b767-d85c488daeca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6b2eeb39-c0c0-4d81-b767-d85c488daeca', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["oJ8HyGeyRRKHUFQAjZL_Cg"], "expires_at": "2020-11-06T19:14:38.000000Z", "issued_at": "2020-11-06T18:14:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:38.713 39 INFO tempest.lib.common.rest_client [req-08715a9b-1a30-4cfc-b5d6-65308f0da622 ] Request (MiscPolicyActionsRbacTest:test_list_simple_tenant_usages): 200 GET http://172.30.13.94/compute/v2.1/os-simple-tenant-usage 0.108s 2020-11-06 18:14:38.713 39 DEBUG tempest.lib.common.rest_client [req-08715a9b-1a30-4cfc-b5d6-65308f0da622 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '637', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-08715a9b-1a30-4cfc-b5d6-65308f0da622', 'x-compute-request-id': 'req-08715a9b-1a30-4cfc-b5d6-65308f0da622', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-simple-tenant-usage'} Body: b'{"tenant_usages": [{"tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "total_local_gb_usage": 3.0555555555555555e-09, "total_vcpus_usage": 3.0555555555555555e-09, "total_memory_mb_usage": 1.5644444444444444e-06, "total_hours": 3.0555555555555555e-09, "start": "2020-11-06T18:14:38.684082", "stop": "2020-11-06T18:14:38.684093"}, {"tenant_id": "cefed34708384eee90ecbbf903367a6e", "total_local_gb_usage": 3.0555555555555555e-09, "total_vcpus_usage": 3.0555555555555555e-09, "total_memory_mb_usage": 1.5644444444444444e-06, "total_hours": 3.0555555555555555e-09, "start": "2020-11-06T18:14:38.684082", "stop": "2020-11-06T18:14:38.684093"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:38.721 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:14:38.770 39 INFO tempest.lib.common.rest_client [req-27fe734f-2f5f-4b68-95a7-c324788a05f0 ] Request (MiscPolicyActionsRbacTest:test_list_simple_tenant_usages): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.048s 2020-11-06 18:14:38.770 39 DEBUG tempest.lib.common.rest_client [req-27fe734f-2f5f-4b68-95a7-c324788a05f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-27fe734f-2f5f-4b68-95a7-c324788a05f0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:38.806 39 INFO tempest.lib.common.rest_client [req-cdb861de-7824-45b5-9b70-f4a0868df858 ] Request (MiscPolicyActionsRbacTest:test_list_simple_tenant_usages): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:14:38.807 39 DEBUG tempest.lib.common.rest_client [req-cdb861de-7824-45b5-9b70-f4a0868df858 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cdb861de-7824-45b5-9b70-f4a0868df858', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["g4ZrVE1cTk-LmOQ9pWgelw"], "expires_at": "2020-11-06T19:14:38.000000Z", "issued_at": "2020-11-06T18:14:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:39.119 39 INFO tempest.lib.common.rest_client [req-118cf7a1-3e98-4bcc-9e78-ff456ceac62e ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.307s 2020-11-06 18:14:39.119 39 DEBUG tempest.lib.common.rest_client [req-118cf7a1-3e98-4bcc-9e78-ff456ceac62e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-118cf7a1-3e98-4bcc-9e78-ff456ceac62e', 'x-compute-request-id': 'req-118cf7a1-3e98-4bcc-9e78-ff456ceac62e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "ACTIVE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:36Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:35.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:39.135 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:14:39.135 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.136 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.136 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.138 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.139 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.139 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.140 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.140 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.140 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.141 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.141 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.142 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.142 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.142 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.142 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.143 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.143 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.143 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.144 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.144 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.144 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.145 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.145 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.145 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.146 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.146 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.146 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.147 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.147 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.147 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.148 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.148 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.148 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.148 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.149 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.149 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.149 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.150 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.150 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.150 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.151 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.151 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.151 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.152 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.152 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.152 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.153 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.153 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.153 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.154 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.154 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.154 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.155 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.155 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.155 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.155 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.156 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.156 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.156 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.157 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.157 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.158 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.158 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.158 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.159 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.159 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.159 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.160 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.160 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.160 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.161 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.161 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.161 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.162 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.162 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:39.163 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-lock-server:lock, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:14:39.163 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:14:39.221 39 INFO tempest.lib.common.rest_client [req-374c550e-55c6-4f2d-bea7-c6d743cdc58d ] Request (MiscPolicyActionsRbacTest:test_lock_server): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.056s 2020-11-06 18:14:39.221 39 DEBUG tempest.lib.common.rest_client [req-374c550e-55c6-4f2d-bea7-c6d743cdc58d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-374c550e-55c6-4f2d-bea7-c6d743cdc58d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:39.261 39 INFO tempest.lib.common.rest_client [req-cbd79400-747a-4e5a-a56f-603e0171d1d0 ] Request (MiscPolicyActionsRbacTest:test_lock_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:14:39.262 39 DEBUG tempest.lib.common.rest_client [req-cbd79400-747a-4e5a-a56f-603e0171d1d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cbd79400-747a-4e5a-a56f-603e0171d1d0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["Svi9GbHXRbaawLVsD64GMg"], "expires_at": "2020-11-06T19:14:39.000000Z", "issued_at": "2020-11-06T18:14:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:39.511 39 INFO tempest.lib.common.rest_client [req-8d18da32-d3c5-4514-8929-f1254be9d289 ] Request (MiscPolicyActionsRbacTest:test_lock_server): 202 POST http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb/action 0.248s 2020-11-06 18:14:39.511 39 DEBUG tempest.lib.common.rest_client [req-8d18da32-d3c5-4514-8929-f1254be9d289 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"lock": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8d18da32-d3c5-4514-8929-f1254be9d289', 'x-compute-request-id': 'req-8d18da32-d3c5-4514-8929-f1254be9d289', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:39.512 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:14:39.562 39 INFO tempest.lib.common.rest_client [req-0eada46e-b4a4-4553-8bdc-80e96fd86b9a ] Request (MiscPolicyActionsRbacTest:test_lock_server): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.050s 2020-11-06 18:14:39.563 39 DEBUG tempest.lib.common.rest_client [req-0eada46e-b4a4-4553-8bdc-80e96fd86b9a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0eada46e-b4a4-4553-8bdc-80e96fd86b9a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:39.592 39 INFO tempest.lib.common.rest_client [req-10830d9b-5a95-4fce-8d15-baaab5654121 ] Request (MiscPolicyActionsRbacTest:test_lock_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.028s 2020-11-06 18:14:39.592 39 DEBUG tempest.lib.common.rest_client [req-10830d9b-5a95-4fce-8d15-baaab5654121 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-10830d9b-5a95-4fce-8d15-baaab5654121', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["Gt-kL7sUTCu4w7cvTZkUNQ"], "expires_at": "2020-11-06T19:14:39.000000Z", "issued_at": "2020-11-06T18:14:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:39.886 39 INFO tempest.lib.common.rest_client [req-a4198f79-9063-4e76-a60a-b3490ed5d5ed ] Request (MiscPolicyActionsRbacTest:_run_cleanups): 202 POST http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb/action 0.292s 2020-11-06 18:14:39.886 39 DEBUG tempest.lib.common.rest_client [req-a4198f79-9063-4e76-a60a-b3490ed5d5ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"unlock": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a4198f79-9063-4e76-a60a-b3490ed5d5ed', 'x-compute-request-id': 'req-a4198f79-9063-4e76-a60a-b3490ed5d5ed', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:40.101 39 INFO tempest.lib.common.rest_client [req-c639ea8c-a0a6-4995-afc5-03529cf33910 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.209s 2020-11-06 18:14:40.101 39 DEBUG tempest.lib.common.rest_client [req-c639ea8c-a0a6-4995-afc5-03529cf33910 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c639ea8c-a0a6-4995-afc5-03529cf33910', 'x-compute-request-id': 'req-c639ea8c-a0a6-4995-afc5-03529cf33910', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "ACTIVE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:40Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:35.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:40.111 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:14:40.112 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.113 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.113 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.113 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.114 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.114 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.115 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.115 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.115 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.116 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.116 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.116 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.117 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.117 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.118 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.118 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.118 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.119 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.119 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.119 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.120 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.120 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.120 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.121 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.121 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.121 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.122 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.122 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.123 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.123 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.124 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.124 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.125 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.125 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.125 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.126 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.126 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.126 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.126 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.127 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.127 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.127 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.128 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.128 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.128 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.129 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.129 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.129 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.130 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.130 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.130 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.131 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.131 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.131 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.132 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.132 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.132 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.133 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.133 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.134 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.134 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.134 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.135 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.135 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.135 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.136 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.136 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.136 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.137 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.137 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.138 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.138 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.138 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.138 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.139 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:14:40.140 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-rescue, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:14:40.140 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:14:40.189 39 INFO tempest.lib.common.rest_client [req-6d9e257f-e253-4fe5-bea5-83651d76cb33 ] Request (MiscPolicyActionsRbacTest:test_rescue_server): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.048s 2020-11-06 18:14:40.189 39 DEBUG tempest.lib.common.rest_client [req-6d9e257f-e253-4fe5-bea5-83651d76cb33 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6d9e257f-e253-4fe5-bea5-83651d76cb33', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:40.220 39 INFO tempest.lib.common.rest_client [req-2247e887-a820-4356-bf9a-47f757be5d4c ] Request (MiscPolicyActionsRbacTest:test_rescue_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.030s 2020-11-06 18:14:40.221 39 DEBUG tempest.lib.common.rest_client [req-2247e887-a820-4356-bf9a-47f757be5d4c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2247e887-a820-4356-bf9a-47f757be5d4c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["ig1qc5xFQ4eM5xyNyvjWaQ"], "expires_at": "2020-11-06T19:14:40.000000Z", "issued_at": "2020-11-06T18:14:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:40.464 39 INFO tempest.lib.common.rest_client [req-4975c21a-65f0-40a6-81fa-51976c753940 ] Request (MiscPolicyActionsRbacTest:test_rescue_server): 200 POST http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb/action 0.241s 2020-11-06 18:14:40.464 39 DEBUG tempest.lib.common.rest_client [req-4975c21a-65f0-40a6-81fa-51976c753940 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"rescue": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '29', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4975c21a-65f0-40a6-81fa-51976c753940', 'x-compute-request-id': 'req-4975c21a-65f0-40a6-81fa-51976c753940', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb/action'} Body: b'{"adminPass": "ifB9WJnG8baJ"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:40.467 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:14:40.520 39 INFO tempest.lib.common.rest_client [req-42e74412-5ce3-40a9-ac80-280ca49d5c65 ] Request (MiscPolicyActionsRbacTest:test_rescue_server): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.052s 2020-11-06 18:14:40.520 39 DEBUG tempest.lib.common.rest_client [req-42e74412-5ce3-40a9-ac80-280ca49d5c65 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-42e74412-5ce3-40a9-ac80-280ca49d5c65', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:40.558 39 INFO tempest.lib.common.rest_client [req-7e888b25-49c6-4ae0-9ba6-94a95b85ddc2 ] Request (MiscPolicyActionsRbacTest:test_rescue_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:14:40.558 39 DEBUG tempest.lib.common.rest_client [req-7e888b25-49c6-4ae0-9ba6-94a95b85ddc2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7e888b25-49c6-4ae0-9ba6-94a95b85ddc2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["_Z-h0xhKSk6d_l01ugzs1g"], "expires_at": "2020-11-06T19:14:40.000000Z", "issued_at": "2020-11-06T18:14:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:42.169 39 INFO tempest.lib.common.rest_client [req-f88d6463-44d1-4ad4-8043-d097cdd0e29a ] Request (MiscPolicyActionsRbacTest:test_rescue_server): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 1.609s 2020-11-06 18:14:42.169 39 DEBUG tempest.lib.common.rest_client [req-f88d6463-44d1-4ad4-8043-d097cdd0e29a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f88d6463-44d1-4ad4-8043-d097cdd0e29a', 'x-compute-request-id': 'req-f88d6463-44d1-4ad4-8043-d097cdd0e29a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "ACTIVE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:40Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:35.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "rescuing", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:43.866 39 INFO tempest.lib.common.rest_client [req-8ac5aae5-9426-4832-98ad-27be1f216dd9 ] Request (MiscPolicyActionsRbacTest:test_rescue_server): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.686s 2020-11-06 18:14:43.867 39 DEBUG tempest.lib.common.rest_client [req-8ac5aae5-9426-4832-98ad-27be1f216dd9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8ac5aae5-9426-4832-98ad-27be1f216dd9', 'x-compute-request-id': 'req-8ac5aae5-9426-4832-98ad-27be1f216dd9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "ACTIVE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:40Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:35.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "rescuing", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:45.238 39 INFO tempest.lib.common.rest_client [req-87bf8d67-a596-40d0-bf96-6c0535a35399 ] Request (MiscPolicyActionsRbacTest:test_rescue_server): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.352s 2020-11-06 18:14:45.238 39 DEBUG tempest.lib.common.rest_client [req-87bf8d67-a596-40d0-bf96-6c0535a35399 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-87bf8d67-a596-40d0-bf96-6c0535a35399', 'x-compute-request-id': 'req-87bf8d67-a596-40d0-bf96-6c0535a35399', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "ACTIVE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:40Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:35.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "rescuing", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:46.444 39 INFO tempest.lib.common.rest_client [req-0538e73c-ab09-4fae-bd16-a831349ae5c4 ] Request (MiscPolicyActionsRbacTest:test_rescue_server): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.190s 2020-11-06 18:14:46.445 39 DEBUG tempest.lib.common.rest_client [req-0538e73c-ab09-4fae-bd16-a831349ae5c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0538e73c-ab09-4fae-bd16-a831349ae5c4', 'x-compute-request-id': 'req-0538e73c-ab09-4fae-bd16-a831349ae5c4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:46.460 39 INFO tempest.common.waiters [-] State transition "ACTIVE/rescuing" ==> "RESCUE/None" after 4 second wait 2020-11-06 18:14:46.693 39 INFO tempest.lib.common.rest_client [req-a05b5825-b1a3-42ce-84dc-36336226c24a ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.225s 2020-11-06 18:14:46.693 39 DEBUG tempest.lib.common.rest_client [req-a05b5825-b1a3-42ce-84dc-36336226c24a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a05b5825-b1a3-42ce-84dc-36336226c24a', 'x-compute-request-id': 'req-a05b5825-b1a3-42ce-84dc-36336226c24a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:47.972 39 INFO tempest.lib.common.rest_client [req-34a33d84-9e06-4078-837c-b3ab965650e6 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.267s 2020-11-06 18:14:47.972 39 DEBUG tempest.lib.common.rest_client [req-34a33d84-9e06-4078-837c-b3ab965650e6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-34a33d84-9e06-4078-837c-b3ab965650e6', 'x-compute-request-id': 'req-34a33d84-9e06-4078-837c-b3ab965650e6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:49.202 39 INFO tempest.lib.common.rest_client [req-946181dc-4321-48b0-aabf-f80124f0c472 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.211s 2020-11-06 18:14:49.203 39 DEBUG tempest.lib.common.rest_client [req-946181dc-4321-48b0-aabf-f80124f0c472 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-946181dc-4321-48b0-aabf-f80124f0c472', 'x-compute-request-id': 'req-946181dc-4321-48b0-aabf-f80124f0c472', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:50.430 39 INFO tempest.lib.common.rest_client [req-ac7b8282-dca2-44f4-bd2d-ac2aace4d1c7 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.213s 2020-11-06 18:14:50.431 39 DEBUG tempest.lib.common.rest_client [req-ac7b8282-dca2-44f4-bd2d-ac2aace4d1c7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ac7b8282-dca2-44f4-bd2d-ac2aace4d1c7', 'x-compute-request-id': 'req-ac7b8282-dca2-44f4-bd2d-ac2aace4d1c7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:51.679 39 INFO tempest.lib.common.rest_client [req-e0150714-cf7c-4ae4-8b6b-75c2408115fe ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.231s 2020-11-06 18:14:51.679 39 DEBUG tempest.lib.common.rest_client [req-e0150714-cf7c-4ae4-8b6b-75c2408115fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e0150714-cf7c-4ae4-8b6b-75c2408115fe', 'x-compute-request-id': 'req-e0150714-cf7c-4ae4-8b6b-75c2408115fe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:52.903 39 INFO tempest.lib.common.rest_client [req-46578b34-2f73-405e-8fde-82bf604f0041 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.206s 2020-11-06 18:14:52.903 39 DEBUG tempest.lib.common.rest_client [req-46578b34-2f73-405e-8fde-82bf604f0041 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-46578b34-2f73-405e-8fde-82bf604f0041', 'x-compute-request-id': 'req-46578b34-2f73-405e-8fde-82bf604f0041', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:54.110 39 INFO tempest.lib.common.rest_client [req-8103612b-8d20-4055-ab76-0c96191c4c5e ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.195s 2020-11-06 18:14:54.111 39 DEBUG tempest.lib.common.rest_client [req-8103612b-8d20-4055-ab76-0c96191c4c5e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8103612b-8d20-4055-ab76-0c96191c4c5e', 'x-compute-request-id': 'req-8103612b-8d20-4055-ab76-0c96191c4c5e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:55.352 39 INFO tempest.lib.common.rest_client [req-33dfcd65-0845-4ae4-bbee-b03a3129ee46 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.223s 2020-11-06 18:14:55.353 39 DEBUG tempest.lib.common.rest_client [req-33dfcd65-0845-4ae4-bbee-b03a3129ee46 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-33dfcd65-0845-4ae4-bbee-b03a3129ee46', 'x-compute-request-id': 'req-33dfcd65-0845-4ae4-bbee-b03a3129ee46', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:56.576 39 INFO tempest.lib.common.rest_client [req-f729cd12-b45a-4c85-8a0e-987589cb5020 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.207s 2020-11-06 18:14:56.577 39 DEBUG tempest.lib.common.rest_client [req-f729cd12-b45a-4c85-8a0e-987589cb5020 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f729cd12-b45a-4c85-8a0e-987589cb5020', 'x-compute-request-id': 'req-f729cd12-b45a-4c85-8a0e-987589cb5020', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:57.785 39 INFO tempest.lib.common.rest_client [req-7c9e5cf3-b87d-4285-bdfb-23fedd9c1a9e ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.197s 2020-11-06 18:14:57.786 39 DEBUG tempest.lib.common.rest_client [req-7c9e5cf3-b87d-4285-bdfb-23fedd9c1a9e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7c9e5cf3-b87d-4285-bdfb-23fedd9c1a9e', 'x-compute-request-id': 'req-7c9e5cf3-b87d-4285-bdfb-23fedd9c1a9e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:14:59.035 39 INFO tempest.lib.common.rest_client [req-53e7b642-8b6d-43e9-8175-17ba732d94e4 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.232s 2020-11-06 18:14:59.035 39 DEBUG tempest.lib.common.rest_client [req-53e7b642-8b6d-43e9-8175-17ba732d94e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:14:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-53e7b642-8b6d-43e9-8175-17ba732d94e4', 'x-compute-request-id': 'req-53e7b642-8b6d-43e9-8175-17ba732d94e4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:00.236 39 INFO tempest.lib.common.rest_client [req-bfc1f6e3-6673-4e9b-838d-1c8e5d5bdfa5 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.183s 2020-11-06 18:15:00.236 39 DEBUG tempest.lib.common.rest_client [req-bfc1f6e3-6673-4e9b-838d-1c8e5d5bdfa5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bfc1f6e3-6673-4e9b-838d-1c8e5d5bdfa5', 'x-compute-request-id': 'req-bfc1f6e3-6673-4e9b-838d-1c8e5d5bdfa5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:01.455 39 INFO tempest.lib.common.rest_client [req-d171ba2e-9b99-400c-ad6b-112e17b27d54 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.201s 2020-11-06 18:15:01.456 39 DEBUG tempest.lib.common.rest_client [req-d171ba2e-9b99-400c-ad6b-112e17b27d54 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d171ba2e-9b99-400c-ad6b-112e17b27d54', 'x-compute-request-id': 'req-d171ba2e-9b99-400c-ad6b-112e17b27d54', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:02.747 39 INFO tempest.lib.common.rest_client [req-f296ccd7-9ee6-475e-934b-d2227523622f ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.273s 2020-11-06 18:15:02.747 39 DEBUG tempest.lib.common.rest_client [req-f296ccd7-9ee6-475e-934b-d2227523622f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f296ccd7-9ee6-475e-934b-d2227523622f', 'x-compute-request-id': 'req-f296ccd7-9ee6-475e-934b-d2227523622f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:03.977 39 INFO tempest.lib.common.rest_client [req-f21d0c81-a68c-4d62-9ad0-5688d7af4f04 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.213s 2020-11-06 18:15:03.977 39 DEBUG tempest.lib.common.rest_client [req-f21d0c81-a68c-4d62-9ad0-5688d7af4f04 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f21d0c81-a68c-4d62-9ad0-5688d7af4f04', 'x-compute-request-id': 'req-f21d0c81-a68c-4d62-9ad0-5688d7af4f04', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:05.194 39 INFO tempest.lib.common.rest_client [req-de0c3ef4-f019-4376-8f59-7b886f5d1651 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.205s 2020-11-06 18:15:05.195 39 DEBUG tempest.lib.common.rest_client [req-de0c3ef4-f019-4376-8f59-7b886f5d1651 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-de0c3ef4-f019-4376-8f59-7b886f5d1651', 'x-compute-request-id': 'req-de0c3ef4-f019-4376-8f59-7b886f5d1651', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:06.415 39 INFO tempest.lib.common.rest_client [req-65d9644a-f1ba-4e26-b0ca-1db8389bf3f0 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.202s 2020-11-06 18:15:06.416 39 DEBUG tempest.lib.common.rest_client [req-65d9644a-f1ba-4e26-b0ca-1db8389bf3f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-65d9644a-f1ba-4e26-b0ca-1db8389bf3f0', 'x-compute-request-id': 'req-65d9644a-f1ba-4e26-b0ca-1db8389bf3f0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:07.647 39 INFO tempest.lib.common.rest_client [req-afb501a3-eb1d-4062-b612-1b74a0f9b89f ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.213s 2020-11-06 18:15:07.648 39 DEBUG tempest.lib.common.rest_client [req-afb501a3-eb1d-4062-b612-1b74a0f9b89f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-afb501a3-eb1d-4062-b612-1b74a0f9b89f', 'x-compute-request-id': 'req-afb501a3-eb1d-4062-b612-1b74a0f9b89f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:08.853 39 INFO tempest.lib.common.rest_client [req-f2cc9d3d-46a1-4c9c-9498-5ae20a7d297b ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.192s 2020-11-06 18:15:08.854 39 DEBUG tempest.lib.common.rest_client [req-f2cc9d3d-46a1-4c9c-9498-5ae20a7d297b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f2cc9d3d-46a1-4c9c-9498-5ae20a7d297b', 'x-compute-request-id': 'req-f2cc9d3d-46a1-4c9c-9498-5ae20a7d297b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:10.116 39 INFO tempest.lib.common.rest_client [req-064144fd-99d5-425b-8b1f-02b4868b4be9 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.246s 2020-11-06 18:15:10.117 39 DEBUG tempest.lib.common.rest_client [req-064144fd-99d5-425b-8b1f-02b4868b4be9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-064144fd-99d5-425b-8b1f-02b4868b4be9', 'x-compute-request-id': 'req-064144fd-99d5-425b-8b1f-02b4868b4be9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:11.379 39 INFO tempest.lib.common.rest_client [req-4cbdf2ab-43e9-47ea-872f-a654247dfe9f ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.244s 2020-11-06 18:15:11.379 39 DEBUG tempest.lib.common.rest_client [req-4cbdf2ab-43e9-47ea-872f-a654247dfe9f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4cbdf2ab-43e9-47ea-872f-a654247dfe9f', 'x-compute-request-id': 'req-4cbdf2ab-43e9-47ea-872f-a654247dfe9f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:12.607 39 INFO tempest.lib.common.rest_client [req-17cbb4cf-5a0d-43e9-85bb-b89a951eb980 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.210s 2020-11-06 18:15:12.608 39 DEBUG tempest.lib.common.rest_client [req-17cbb4cf-5a0d-43e9-85bb-b89a951eb980 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-17cbb4cf-5a0d-43e9-85bb-b89a951eb980', 'x-compute-request-id': 'req-17cbb4cf-5a0d-43e9-85bb-b89a951eb980', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:13.811 39 INFO tempest.lib.common.rest_client [req-65809c29-8a6d-4ca6-b65a-c820c2c0954f ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.187s 2020-11-06 18:15:13.812 39 DEBUG tempest.lib.common.rest_client [req-65809c29-8a6d-4ca6-b65a-c820c2c0954f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-65809c29-8a6d-4ca6-b65a-c820c2c0954f', 'x-compute-request-id': 'req-65809c29-8a6d-4ca6-b65a-c820c2c0954f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:15.042 39 INFO tempest.lib.common.rest_client [req-28a45124-2451-4b46-8af2-00fbd22022bf ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.212s 2020-11-06 18:15:15.042 39 DEBUG tempest.lib.common.rest_client [req-28a45124-2451-4b46-8af2-00fbd22022bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-28a45124-2451-4b46-8af2-00fbd22022bf', 'x-compute-request-id': 'req-28a45124-2451-4b46-8af2-00fbd22022bf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:16.280 39 INFO tempest.lib.common.rest_client [req-e9cbb6eb-064d-4a8e-aeb3-23ce649e8fd8 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.222s 2020-11-06 18:15:16.281 39 DEBUG tempest.lib.common.rest_client [req-e9cbb6eb-064d-4a8e-aeb3-23ce649e8fd8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e9cbb6eb-064d-4a8e-aeb3-23ce649e8fd8', 'x-compute-request-id': 'req-e9cbb6eb-064d-4a8e-aeb3-23ce649e8fd8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:17.496 39 INFO tempest.lib.common.rest_client [req-71894ced-17d7-45b7-9d2e-c115bc371f9b ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.200s 2020-11-06 18:15:17.496 39 DEBUG tempest.lib.common.rest_client [req-71894ced-17d7-45b7-9d2e-c115bc371f9b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-71894ced-17d7-45b7-9d2e-c115bc371f9b', 'x-compute-request-id': 'req-71894ced-17d7-45b7-9d2e-c115bc371f9b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:18.713 39 INFO tempest.lib.common.rest_client [req-4894c911-52a1-49e5-bf58-b4ecdb7b131e ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.205s 2020-11-06 18:15:18.714 39 DEBUG tempest.lib.common.rest_client [req-4894c911-52a1-49e5-bf58-b4ecdb7b131e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4894c911-52a1-49e5-bf58-b4ecdb7b131e', 'x-compute-request-id': 'req-4894c911-52a1-49e5-bf58-b4ecdb7b131e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:19.956 39 INFO tempest.lib.common.rest_client [req-3b960cc9-e49c-495e-994f-59f891a28303 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.226s 2020-11-06 18:15:19.957 39 DEBUG tempest.lib.common.rest_client [req-3b960cc9-e49c-495e-994f-59f891a28303 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3b960cc9-e49c-495e-994f-59f891a28303', 'x-compute-request-id': 'req-3b960cc9-e49c-495e-994f-59f891a28303', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:21.279 39 INFO tempest.lib.common.rest_client [req-076b23a3-3a91-48b1-a6ce-28ccc2d31f94 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.305s 2020-11-06 18:15:21.279 39 DEBUG tempest.lib.common.rest_client [req-076b23a3-3a91-48b1-a6ce-28ccc2d31f94 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-076b23a3-3a91-48b1-a6ce-28ccc2d31f94', 'x-compute-request-id': 'req-076b23a3-3a91-48b1-a6ce-28ccc2d31f94', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:22.489 39 INFO tempest.lib.common.rest_client [req-6227c07d-5059-42ee-b652-d18f561674d5 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.195s 2020-11-06 18:15:22.490 39 DEBUG tempest.lib.common.rest_client [req-6227c07d-5059-42ee-b652-d18f561674d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6227c07d-5059-42ee-b652-d18f561674d5', 'x-compute-request-id': 'req-6227c07d-5059-42ee-b652-d18f561674d5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:23.713 39 INFO tempest.lib.common.rest_client [req-bca2cf3c-57d2-4005-ac3f-f3fefd4b19ce ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.208s 2020-11-06 18:15:23.714 39 DEBUG tempest.lib.common.rest_client [req-bca2cf3c-57d2-4005-ac3f-f3fefd4b19ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bca2cf3c-57d2-4005-ac3f-f3fefd4b19ce', 'x-compute-request-id': 'req-bca2cf3c-57d2-4005-ac3f-f3fefd4b19ce', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:25.995 39 INFO tempest.lib.common.rest_client [req-8651e236-30d5-4f66-bac0-159409a9bc8a ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 1.266s 2020-11-06 18:15:25.996 39 DEBUG tempest.lib.common.rest_client [req-8651e236-30d5-4f66-bac0-159409a9bc8a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8651e236-30d5-4f66-bac0-159409a9bc8a', 'x-compute-request-id': 'req-8651e236-30d5-4f66-bac0-159409a9bc8a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:27.236 39 INFO tempest.lib.common.rest_client [req-c6ef7a52-a725-4e41-ae23-0c16a2ad0fe2 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.222s 2020-11-06 18:15:27.236 39 DEBUG tempest.lib.common.rest_client [req-c6ef7a52-a725-4e41-ae23-0c16a2ad0fe2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c6ef7a52-a725-4e41-ae23-0c16a2ad0fe2', 'x-compute-request-id': 'req-c6ef7a52-a725-4e41-ae23-0c16a2ad0fe2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:28.538 39 INFO tempest.lib.common.rest_client [req-94fd9e92-4d14-4865-b971-6ccac12fb453 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.288s 2020-11-06 18:15:28.539 39 DEBUG tempest.lib.common.rest_client [req-94fd9e92-4d14-4865-b971-6ccac12fb453 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-94fd9e92-4d14-4865-b971-6ccac12fb453', 'x-compute-request-id': 'req-94fd9e92-4d14-4865-b971-6ccac12fb453', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:29.755 39 INFO tempest.lib.common.rest_client [req-012bd159-5a4c-4d33-a114-eee7ff489d0f ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.198s 2020-11-06 18:15:29.755 39 DEBUG tempest.lib.common.rest_client [req-012bd159-5a4c-4d33-a114-eee7ff489d0f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-012bd159-5a4c-4d33-a114-eee7ff489d0f', 'x-compute-request-id': 'req-012bd159-5a4c-4d33-a114-eee7ff489d0f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:31.390 39 INFO tempest.lib.common.rest_client [req-de23b714-be3e-405a-bee0-c8a275741f4a ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.623s 2020-11-06 18:15:31.390 39 DEBUG tempest.lib.common.rest_client [req-de23b714-be3e-405a-bee0-c8a275741f4a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-de23b714-be3e-405a-bee0-c8a275741f4a', 'x-compute-request-id': 'req-de23b714-be3e-405a-bee0-c8a275741f4a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:32.618 39 INFO tempest.lib.common.rest_client [req-913ee41d-6d0e-42a0-a6da-12704fe938dc ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.214s 2020-11-06 18:15:32.619 39 DEBUG tempest.lib.common.rest_client [req-913ee41d-6d0e-42a0-a6da-12704fe938dc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-913ee41d-6d0e-42a0-a6da-12704fe938dc', 'x-compute-request-id': 'req-913ee41d-6d0e-42a0-a6da-12704fe938dc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:33.858 39 INFO tempest.lib.common.rest_client [req-b9cbe9e1-dfc8-4789-aa95-b8bd0f23e338 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.224s 2020-11-06 18:15:33.858 39 DEBUG tempest.lib.common.rest_client [req-b9cbe9e1-dfc8-4789-aa95-b8bd0f23e338 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b9cbe9e1-dfc8-4789-aa95-b8bd0f23e338', 'x-compute-request-id': 'req-b9cbe9e1-dfc8-4789-aa95-b8bd0f23e338', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:35.118 39 INFO tempest.lib.common.rest_client [req-6e9c4e6e-9807-48dd-ba38-871958780d8f ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.247s 2020-11-06 18:15:35.119 39 DEBUG tempest.lib.common.rest_client [req-6e9c4e6e-9807-48dd-ba38-871958780d8f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6e9c4e6e-9807-48dd-ba38-871958780d8f', 'x-compute-request-id': 'req-6e9c4e6e-9807-48dd-ba38-871958780d8f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:36.332 39 INFO tempest.lib.common.rest_client [req-7f55dc48-a711-4e64-803b-e50f57d878fe ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.195s 2020-11-06 18:15:36.333 39 DEBUG tempest.lib.common.rest_client [req-7f55dc48-a711-4e64-803b-e50f57d878fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7f55dc48-a711-4e64-803b-e50f57d878fe', 'x-compute-request-id': 'req-7f55dc48-a711-4e64-803b-e50f57d878fe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:37.532 39 INFO tempest.lib.common.rest_client [req-ef4f01ee-cb11-405f-aff6-8e74139a03b3 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.186s 2020-11-06 18:15:37.533 39 DEBUG tempest.lib.common.rest_client [req-ef4f01ee-cb11-405f-aff6-8e74139a03b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ef4f01ee-cb11-405f-aff6-8e74139a03b3', 'x-compute-request-id': 'req-ef4f01ee-cb11-405f-aff6-8e74139a03b3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:38.713 39 INFO tempest.lib.common.rest_client [req-dac6fd07-a55e-4b13-b925-fed299ccd4db ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.165s 2020-11-06 18:15:38.714 39 DEBUG tempest.lib.common.rest_client [req-dac6fd07-a55e-4b13-b925-fed299ccd4db ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dac6fd07-a55e-4b13-b925-fed299ccd4db', 'x-compute-request-id': 'req-dac6fd07-a55e-4b13-b925-fed299ccd4db', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:39.985 39 INFO tempest.lib.common.rest_client [req-909ffadd-b50f-4134-9fd5-0dfa44b0bc53 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.256s 2020-11-06 18:15:39.985 39 DEBUG tempest.lib.common.rest_client [req-909ffadd-b50f-4134-9fd5-0dfa44b0bc53 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-909ffadd-b50f-4134-9fd5-0dfa44b0bc53', 'x-compute-request-id': 'req-909ffadd-b50f-4134-9fd5-0dfa44b0bc53', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:41.216 39 INFO tempest.lib.common.rest_client [req-57af42fa-01a4-43a3-b20e-bfea5792f448 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.214s 2020-11-06 18:15:41.216 39 DEBUG tempest.lib.common.rest_client [req-57af42fa-01a4-43a3-b20e-bfea5792f448 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-57af42fa-01a4-43a3-b20e-bfea5792f448', 'x-compute-request-id': 'req-57af42fa-01a4-43a3-b20e-bfea5792f448', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:42.527 39 INFO tempest.lib.common.rest_client [req-cc1991c2-c7a0-43c2-a28f-14283e24180f ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.297s 2020-11-06 18:15:42.528 39 DEBUG tempest.lib.common.rest_client [req-cc1991c2-c7a0-43c2-a28f-14283e24180f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cc1991c2-c7a0-43c2-a28f-14283e24180f', 'x-compute-request-id': 'req-cc1991c2-c7a0-43c2-a28f-14283e24180f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:43.737 39 INFO tempest.lib.common.rest_client [req-dbe8390e-ba41-4c1a-a8de-c5948da18e97 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.193s 2020-11-06 18:15:43.738 39 DEBUG tempest.lib.common.rest_client [req-dbe8390e-ba41-4c1a-a8de-c5948da18e97 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dbe8390e-ba41-4c1a-a8de-c5948da18e97', 'x-compute-request-id': 'req-dbe8390e-ba41-4c1a-a8de-c5948da18e97', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:44.984 39 INFO tempest.lib.common.rest_client [req-f5fbfc8b-4e3c-44be-91d6-6a287ec9a221 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.231s 2020-11-06 18:15:44.985 39 DEBUG tempest.lib.common.rest_client [req-f5fbfc8b-4e3c-44be-91d6-6a287ec9a221 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f5fbfc8b-4e3c-44be-91d6-6a287ec9a221', 'x-compute-request-id': 'req-f5fbfc8b-4e3c-44be-91d6-6a287ec9a221', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:46.193 39 INFO tempest.lib.common.rest_client [req-6e9b47e3-baae-4e93-8007-4631c9f5fdcc ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.191s 2020-11-06 18:15:46.194 39 DEBUG tempest.lib.common.rest_client [req-6e9b47e3-baae-4e93-8007-4631c9f5fdcc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6e9b47e3-baae-4e93-8007-4631c9f5fdcc', 'x-compute-request-id': 'req-6e9b47e3-baae-4e93-8007-4631c9f5fdcc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:47.379 39 INFO tempest.lib.common.rest_client [req-e13cae3f-a971-4924-a2d2-9dbd679b2e83 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.170s 2020-11-06 18:15:47.380 39 DEBUG tempest.lib.common.rest_client [req-e13cae3f-a971-4924-a2d2-9dbd679b2e83 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e13cae3f-a971-4924-a2d2-9dbd679b2e83', 'x-compute-request-id': 'req-e13cae3f-a971-4924-a2d2-9dbd679b2e83', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:48.820 39 INFO tempest.lib.common.rest_client [req-dd96919f-3a68-4c02-b0db-4663d0a71908 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.423s 2020-11-06 18:15:48.821 39 DEBUG tempest.lib.common.rest_client [req-dd96919f-3a68-4c02-b0db-4663d0a71908 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dd96919f-3a68-4c02-b0db-4663d0a71908', 'x-compute-request-id': 'req-dd96919f-3a68-4c02-b0db-4663d0a71908', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:50.075 39 INFO tempest.lib.common.rest_client [req-7b2f56b0-9e96-4738-86fc-a3dae89303d8 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.239s 2020-11-06 18:15:50.076 39 DEBUG tempest.lib.common.rest_client [req-7b2f56b0-9e96-4738-86fc-a3dae89303d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7b2f56b0-9e96-4738-86fc-a3dae89303d8', 'x-compute-request-id': 'req-7b2f56b0-9e96-4738-86fc-a3dae89303d8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:51.294 39 INFO tempest.lib.common.rest_client [req-f458f3cd-f9a0-4b54-88a6-f059bbc1077d ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.200s 2020-11-06 18:15:51.295 39 DEBUG tempest.lib.common.rest_client [req-f458f3cd-f9a0-4b54-88a6-f059bbc1077d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f458f3cd-f9a0-4b54-88a6-f059bbc1077d', 'x-compute-request-id': 'req-f458f3cd-f9a0-4b54-88a6-f059bbc1077d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:53.603 39 INFO tempest.lib.common.rest_client [req-f0d302ed-46b4-499b-91f0-fb77684925dd ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 1.291s 2020-11-06 18:15:53.604 39 DEBUG tempest.lib.common.rest_client [req-f0d302ed-46b4-499b-91f0-fb77684925dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f0d302ed-46b4-499b-91f0-fb77684925dd', 'x-compute-request-id': 'req-f0d302ed-46b4-499b-91f0-fb77684925dd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:54.838 39 INFO tempest.lib.common.rest_client [req-d6997444-bf20-4560-b63a-811361074b73 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.216s 2020-11-06 18:15:54.838 39 DEBUG tempest.lib.common.rest_client [req-d6997444-bf20-4560-b63a-811361074b73 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d6997444-bf20-4560-b63a-811361074b73', 'x-compute-request-id': 'req-d6997444-bf20-4560-b63a-811361074b73', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:56.083 39 INFO tempest.lib.common.rest_client [req-40acd3b3-f1df-4d23-b846-54dc7d1209c1 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.228s 2020-11-06 18:15:56.084 39 DEBUG tempest.lib.common.rest_client [req-40acd3b3-f1df-4d23-b846-54dc7d1209c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-40acd3b3-f1df-4d23-b846-54dc7d1209c1', 'x-compute-request-id': 'req-40acd3b3-f1df-4d23-b846-54dc7d1209c1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:57.326 39 INFO tempest.lib.common.rest_client [req-7062b8bb-001d-4be1-95d2-651009b31503 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.224s 2020-11-06 18:15:57.327 39 DEBUG tempest.lib.common.rest_client [req-7062b8bb-001d-4be1-95d2-651009b31503 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7062b8bb-001d-4be1-95d2-651009b31503', 'x-compute-request-id': 'req-7062b8bb-001d-4be1-95d2-651009b31503', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:58.596 39 INFO tempest.lib.common.rest_client [req-497efb28-9df2-4ce3-a7cf-70a5d86fe559 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.253s 2020-11-06 18:15:58.596 39 DEBUG tempest.lib.common.rest_client [req-497efb28-9df2-4ce3-a7cf-70a5d86fe559 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-497efb28-9df2-4ce3-a7cf-70a5d86fe559', 'x-compute-request-id': 'req-497efb28-9df2-4ce3-a7cf-70a5d86fe559', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:15:59.818 39 INFO tempest.lib.common.rest_client [req-52e32f50-b399-4a91-ba48-8b254ab45fe3 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.206s 2020-11-06 18:15:59.818 39 DEBUG tempest.lib.common.rest_client [req-52e32f50-b399-4a91-ba48-8b254ab45fe3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:15:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-52e32f50-b399-4a91-ba48-8b254ab45fe3', 'x-compute-request-id': 'req-52e32f50-b399-4a91-ba48-8b254ab45fe3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:01.045 39 INFO tempest.lib.common.rest_client [req-37eed6d1-5776-4205-9512-fe637f0955fe ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.209s 2020-11-06 18:16:01.046 39 DEBUG tempest.lib.common.rest_client [req-37eed6d1-5776-4205-9512-fe637f0955fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-37eed6d1-5776-4205-9512-fe637f0955fe', 'x-compute-request-id': 'req-37eed6d1-5776-4205-9512-fe637f0955fe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:02.265 39 INFO tempest.lib.common.rest_client [req-e24dd9b0-85b0-4b3b-ab9e-76d5fa8b6af9 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.204s 2020-11-06 18:16:02.265 39 DEBUG tempest.lib.common.rest_client [req-e24dd9b0-85b0-4b3b-ab9e-76d5fa8b6af9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e24dd9b0-85b0-4b3b-ab9e-76d5fa8b6af9', 'x-compute-request-id': 'req-e24dd9b0-85b0-4b3b-ab9e-76d5fa8b6af9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:03.484 39 INFO tempest.lib.common.rest_client [req-e9608a82-0492-4fb3-87e9-8c62c79a89dc ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.206s 2020-11-06 18:16:03.484 39 DEBUG tempest.lib.common.rest_client [req-e9608a82-0492-4fb3-87e9-8c62c79a89dc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e9608a82-0492-4fb3-87e9-8c62c79a89dc', 'x-compute-request-id': 'req-e9608a82-0492-4fb3-87e9-8c62c79a89dc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:04.720 39 INFO tempest.lib.common.rest_client [req-ed9205f5-24fd-4ab6-8e60-47efa74d41c9 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.221s 2020-11-06 18:16:04.721 39 DEBUG tempest.lib.common.rest_client [req-ed9205f5-24fd-4ab6-8e60-47efa74d41c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ed9205f5-24fd-4ab6-8e60-47efa74d41c9', 'x-compute-request-id': 'req-ed9205f5-24fd-4ab6-8e60-47efa74d41c9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:06.088 39 INFO tempest.lib.common.rest_client [req-15b73f2e-1825-4dba-977e-67d84c513a3b ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.350s 2020-11-06 18:16:06.088 39 DEBUG tempest.lib.common.rest_client [req-15b73f2e-1825-4dba-977e-67d84c513a3b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-15b73f2e-1825-4dba-977e-67d84c513a3b', 'x-compute-request-id': 'req-15b73f2e-1825-4dba-977e-67d84c513a3b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:07.301 39 INFO tempest.lib.common.rest_client [req-3abbe624-c1a5-4b9f-9a15-1b82d44adf1d ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.195s 2020-11-06 18:16:07.302 39 DEBUG tempest.lib.common.rest_client [req-3abbe624-c1a5-4b9f-9a15-1b82d44adf1d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3abbe624-c1a5-4b9f-9a15-1b82d44adf1d', 'x-compute-request-id': 'req-3abbe624-c1a5-4b9f-9a15-1b82d44adf1d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:08.531 39 INFO tempest.lib.common.rest_client [req-02e99f7b-e92e-40b2-b227-c6c833db012f ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.213s 2020-11-06 18:16:08.532 39 DEBUG tempest.lib.common.rest_client [req-02e99f7b-e92e-40b2-b227-c6c833db012f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-02e99f7b-e92e-40b2-b227-c6c833db012f', 'x-compute-request-id': 'req-02e99f7b-e92e-40b2-b227-c6c833db012f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:09.744 39 INFO tempest.lib.common.rest_client [req-3c209acb-cc6d-4735-a521-0823b65cf714 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.194s 2020-11-06 18:16:09.744 39 DEBUG tempest.lib.common.rest_client [req-3c209acb-cc6d-4735-a521-0823b65cf714 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3c209acb-cc6d-4735-a521-0823b65cf714', 'x-compute-request-id': 'req-3c209acb-cc6d-4735-a521-0823b65cf714', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:10.971 39 INFO tempest.lib.common.rest_client [req-a8613e39-e9e6-49a7-b36d-c0b629d343b2 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.209s 2020-11-06 18:16:10.972 39 DEBUG tempest.lib.common.rest_client [req-a8613e39-e9e6-49a7-b36d-c0b629d343b2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a8613e39-e9e6-49a7-b36d-c0b629d343b2', 'x-compute-request-id': 'req-a8613e39-e9e6-49a7-b36d-c0b629d343b2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:12.297 39 INFO tempest.lib.common.rest_client [req-e9851c22-faf3-4c88-b4a6-f351f2eb5784 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.308s 2020-11-06 18:16:12.298 39 DEBUG tempest.lib.common.rest_client [req-e9851c22-faf3-4c88-b4a6-f351f2eb5784 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e9851c22-faf3-4c88-b4a6-f351f2eb5784', 'x-compute-request-id': 'req-e9851c22-faf3-4c88-b4a6-f351f2eb5784', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:13.508 39 INFO tempest.lib.common.rest_client [req-ebd9c148-8a55-4b06-a22c-7bedfd95eb31 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.195s 2020-11-06 18:16:13.508 39 DEBUG tempest.lib.common.rest_client [req-ebd9c148-8a55-4b06-a22c-7bedfd95eb31 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ebd9c148-8a55-4b06-a22c-7bedfd95eb31', 'x-compute-request-id': 'req-ebd9c148-8a55-4b06-a22c-7bedfd95eb31', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:15.857 39 INFO tempest.lib.common.rest_client [req-17d1b697-fa44-42de-804d-b43ac47d10c1 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 1.331s 2020-11-06 18:16:15.858 39 DEBUG tempest.lib.common.rest_client [req-17d1b697-fa44-42de-804d-b43ac47d10c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-17d1b697-fa44-42de-804d-b43ac47d10c1', 'x-compute-request-id': 'req-17d1b697-fa44-42de-804d-b43ac47d10c1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:17.127 39 INFO tempest.lib.common.rest_client [req-e8e49048-7221-4737-8632-38ce57234ad5 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.253s 2020-11-06 18:16:17.128 39 DEBUG tempest.lib.common.rest_client [req-e8e49048-7221-4737-8632-38ce57234ad5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e8e49048-7221-4737-8632-38ce57234ad5', 'x-compute-request-id': 'req-e8e49048-7221-4737-8632-38ce57234ad5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:18.373 39 INFO tempest.lib.common.rest_client [req-0db60971-fb5a-489e-a091-1d39f5154e47 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.229s 2020-11-06 18:16:18.373 39 DEBUG tempest.lib.common.rest_client [req-0db60971-fb5a-489e-a091-1d39f5154e47 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0db60971-fb5a-489e-a091-1d39f5154e47', 'x-compute-request-id': 'req-0db60971-fb5a-489e-a091-1d39f5154e47', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:19.645 39 INFO tempest.lib.common.rest_client [req-6e181758-dd84-452a-ba33-912b1a4c69ee ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.260s 2020-11-06 18:16:19.646 39 DEBUG tempest.lib.common.rest_client [req-6e181758-dd84-452a-ba33-912b1a4c69ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6e181758-dd84-452a-ba33-912b1a4c69ee', 'x-compute-request-id': 'req-6e181758-dd84-452a-ba33-912b1a4c69ee', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:20.866 39 INFO tempest.lib.common.rest_client [req-cc591b25-2a4f-4880-9b83-c3fa6301a383 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.207s 2020-11-06 18:16:20.867 39 DEBUG tempest.lib.common.rest_client [req-cc591b25-2a4f-4880-9b83-c3fa6301a383 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cc591b25-2a4f-4880-9b83-c3fa6301a383', 'x-compute-request-id': 'req-cc591b25-2a4f-4880-9b83-c3fa6301a383', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:22.158 39 INFO tempest.lib.common.rest_client [req-5a76ab13-d8bc-4da1-a66b-0b32f21a1002 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.277s 2020-11-06 18:16:22.158 39 DEBUG tempest.lib.common.rest_client [req-5a76ab13-d8bc-4da1-a66b-0b32f21a1002 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5a76ab13-d8bc-4da1-a66b-0b32f21a1002', 'x-compute-request-id': 'req-5a76ab13-d8bc-4da1-a66b-0b32f21a1002', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:23.393 39 INFO tempest.lib.common.rest_client [req-9b6fae26-00db-4149-ac36-1a2ca949f08e ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.220s 2020-11-06 18:16:23.394 39 DEBUG tempest.lib.common.rest_client [req-9b6fae26-00db-4149-ac36-1a2ca949f08e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9b6fae26-00db-4149-ac36-1a2ca949f08e', 'x-compute-request-id': 'req-9b6fae26-00db-4149-ac36-1a2ca949f08e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:24.827 39 INFO tempest.lib.common.rest_client [req-ebf4bd40-8d87-4274-8039-09c96ff06bf8 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.417s 2020-11-06 18:16:24.828 39 DEBUG tempest.lib.common.rest_client [req-ebf4bd40-8d87-4274-8039-09c96ff06bf8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ebf4bd40-8d87-4274-8039-09c96ff06bf8', 'x-compute-request-id': 'req-ebf4bd40-8d87-4274-8039-09c96ff06bf8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:26.055 39 INFO tempest.lib.common.rest_client [req-5e2be067-e2d6-4029-9e9a-a8d5f6abf740 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.209s 2020-11-06 18:16:26.055 39 DEBUG tempest.lib.common.rest_client [req-5e2be067-e2d6-4029-9e9a-a8d5f6abf740 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5e2be067-e2d6-4029-9e9a-a8d5f6abf740', 'x-compute-request-id': 'req-5e2be067-e2d6-4029-9e9a-a8d5f6abf740', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:27.279 39 INFO tempest.lib.common.rest_client [req-5c113093-1e71-40bf-be0d-9a3af01d6fdb ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.210s 2020-11-06 18:16:27.280 39 DEBUG tempest.lib.common.rest_client [req-5c113093-1e71-40bf-be0d-9a3af01d6fdb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5c113093-1e71-40bf-be0d-9a3af01d6fdb', 'x-compute-request-id': 'req-5c113093-1e71-40bf-be0d-9a3af01d6fdb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:28.510 39 INFO tempest.lib.common.rest_client [req-970661f7-e7e8-4532-aad8-5d9d6e0dc712 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.216s 2020-11-06 18:16:28.510 39 DEBUG tempest.lib.common.rest_client [req-970661f7-e7e8-4532-aad8-5d9d6e0dc712 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-970661f7-e7e8-4532-aad8-5d9d6e0dc712', 'x-compute-request-id': 'req-970661f7-e7e8-4532-aad8-5d9d6e0dc712', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:29.766 39 INFO tempest.lib.common.rest_client [req-ad66e64a-c89e-4923-b681-b65bc72809eb ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.240s 2020-11-06 18:16:29.767 39 DEBUG tempest.lib.common.rest_client [req-ad66e64a-c89e-4923-b681-b65bc72809eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ad66e64a-c89e-4923-b681-b65bc72809eb', 'x-compute-request-id': 'req-ad66e64a-c89e-4923-b681-b65bc72809eb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:30.988 39 INFO tempest.lib.common.rest_client [req-d0748a34-7244-4b6a-80e3-60bc0a6f3faf ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.206s 2020-11-06 18:16:30.988 39 DEBUG tempest.lib.common.rest_client [req-d0748a34-7244-4b6a-80e3-60bc0a6f3faf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d0748a34-7244-4b6a-80e3-60bc0a6f3faf', 'x-compute-request-id': 'req-d0748a34-7244-4b6a-80e3-60bc0a6f3faf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:32.238 39 INFO tempest.lib.common.rest_client [req-a8fd53d9-25dc-4bea-8ad0-d3d23668f13c ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.232s 2020-11-06 18:16:32.238 39 DEBUG tempest.lib.common.rest_client [req-a8fd53d9-25dc-4bea-8ad0-d3d23668f13c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a8fd53d9-25dc-4bea-8ad0-d3d23668f13c', 'x-compute-request-id': 'req-a8fd53d9-25dc-4bea-8ad0-d3d23668f13c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:33.480 39 INFO tempest.lib.common.rest_client [req-e997041a-b49a-4ada-bcc8-e03b714479ac ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.230s 2020-11-06 18:16:33.481 39 DEBUG tempest.lib.common.rest_client [req-e997041a-b49a-4ada-bcc8-e03b714479ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e997041a-b49a-4ada-bcc8-e03b714479ac', 'x-compute-request-id': 'req-e997041a-b49a-4ada-bcc8-e03b714479ac', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:34.747 39 INFO tempest.lib.common.rest_client [req-6b996de7-fe39-4edd-828a-fe112c29714c ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.251s 2020-11-06 18:16:34.748 39 DEBUG tempest.lib.common.rest_client [req-6b996de7-fe39-4edd-828a-fe112c29714c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6b996de7-fe39-4edd-828a-fe112c29714c', 'x-compute-request-id': 'req-6b996de7-fe39-4edd-828a-fe112c29714c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:35.993 39 INFO tempest.lib.common.rest_client [req-142fbdc2-0de4-4e52-aaee-a43bbd69d551 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.229s 2020-11-06 18:16:35.993 39 DEBUG tempest.lib.common.rest_client [req-142fbdc2-0de4-4e52-aaee-a43bbd69d551 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-142fbdc2-0de4-4e52-aaee-a43bbd69d551', 'x-compute-request-id': 'req-142fbdc2-0de4-4e52-aaee-a43bbd69d551', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:37.219 39 INFO tempest.lib.common.rest_client [req-db6e45cb-0177-49df-9144-7e15a6fc0e57 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.211s 2020-11-06 18:16:37.220 39 DEBUG tempest.lib.common.rest_client [req-db6e45cb-0177-49df-9144-7e15a6fc0e57 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-db6e45cb-0177-49df-9144-7e15a6fc0e57', 'x-compute-request-id': 'req-db6e45cb-0177-49df-9144-7e15a6fc0e57', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:38.451 39 INFO tempest.lib.common.rest_client [req-c794e346-c71e-4964-b4f5-83c513455925 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.219s 2020-11-06 18:16:38.452 39 DEBUG tempest.lib.common.rest_client [req-c794e346-c71e-4964-b4f5-83c513455925 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c794e346-c71e-4964-b4f5-83c513455925', 'x-compute-request-id': 'req-c794e346-c71e-4964-b4f5-83c513455925', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:39.672 39 INFO tempest.lib.common.rest_client [req-18e4f1c9-0dc1-4fc3-bccd-a25bd0f7428c ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.206s 2020-11-06 18:16:39.673 39 DEBUG tempest.lib.common.rest_client [req-18e4f1c9-0dc1-4fc3-bccd-a25bd0f7428c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-18e4f1c9-0dc1-4fc3-bccd-a25bd0f7428c', 'x-compute-request-id': 'req-18e4f1c9-0dc1-4fc3-bccd-a25bd0f7428c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:40.937 39 INFO tempest.lib.common.rest_client [req-553886de-66b1-425d-b3f2-1ad969ffe890 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.247s 2020-11-06 18:16:40.938 39 DEBUG tempest.lib.common.rest_client [req-553886de-66b1-425d-b3f2-1ad969ffe890 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-553886de-66b1-425d-b3f2-1ad969ffe890', 'x-compute-request-id': 'req-553886de-66b1-425d-b3f2-1ad969ffe890', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:43.221 39 INFO tempest.lib.common.rest_client [req-868ee389-fe84-4d83-97a7-b58e49825122 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 1.267s 2020-11-06 18:16:43.222 39 DEBUG tempest.lib.common.rest_client [req-868ee389-fe84-4d83-97a7-b58e49825122 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-868ee389-fe84-4d83-97a7-b58e49825122', 'x-compute-request-id': 'req-868ee389-fe84-4d83-97a7-b58e49825122', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:44.464 39 INFO tempest.lib.common.rest_client [req-4f3f8a2d-ddc5-4211-ab01-3b1c3e9d7eeb ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.228s 2020-11-06 18:16:44.465 39 DEBUG tempest.lib.common.rest_client [req-4f3f8a2d-ddc5-4211-ab01-3b1c3e9d7eeb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4f3f8a2d-ddc5-4211-ab01-3b1c3e9d7eeb', 'x-compute-request-id': 'req-4f3f8a2d-ddc5-4211-ab01-3b1c3e9d7eeb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:45.697 39 INFO tempest.lib.common.rest_client [req-dd7714a4-ed5e-457e-97e6-ed6de04a5379 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.215s 2020-11-06 18:16:45.697 39 DEBUG tempest.lib.common.rest_client [req-dd7714a4-ed5e-457e-97e6-ed6de04a5379 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dd7714a4-ed5e-457e-97e6-ed6de04a5379', 'x-compute-request-id': 'req-dd7714a4-ed5e-457e-97e6-ed6de04a5379', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:47.062 39 INFO tempest.lib.common.rest_client [req-d5074d9a-2cd8-41db-8033-eff732854c28 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.351s 2020-11-06 18:16:47.063 39 DEBUG tempest.lib.common.rest_client [req-d5074d9a-2cd8-41db-8033-eff732854c28 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d5074d9a-2cd8-41db-8033-eff732854c28', 'x-compute-request-id': 'req-d5074d9a-2cd8-41db-8033-eff732854c28', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:48.311 39 INFO tempest.lib.common.rest_client [req-0151c7cc-bf15-4449-8f22-b62565dc3a56 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.230s 2020-11-06 18:16:48.312 39 DEBUG tempest.lib.common.rest_client [req-0151c7cc-bf15-4449-8f22-b62565dc3a56 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0151c7cc-bf15-4449-8f22-b62565dc3a56', 'x-compute-request-id': 'req-0151c7cc-bf15-4449-8f22-b62565dc3a56', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:49.523 39 INFO tempest.lib.common.rest_client [req-3b7543e2-8c7c-4f2d-be60-e0915d911f8c ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.193s 2020-11-06 18:16:49.523 39 DEBUG tempest.lib.common.rest_client [req-3b7543e2-8c7c-4f2d-be60-e0915d911f8c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3b7543e2-8c7c-4f2d-be60-e0915d911f8c', 'x-compute-request-id': 'req-3b7543e2-8c7c-4f2d-be60-e0915d911f8c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:50.735 39 INFO tempest.lib.common.rest_client [req-d62d8b0a-5ef4-43c5-8ad2-9d5723c14e52 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.194s 2020-11-06 18:16:50.736 39 DEBUG tempest.lib.common.rest_client [req-d62d8b0a-5ef4-43c5-8ad2-9d5723c14e52 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d62d8b0a-5ef4-43c5-8ad2-9d5723c14e52', 'x-compute-request-id': 'req-d62d8b0a-5ef4-43c5-8ad2-9d5723c14e52', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:51.951 39 INFO tempest.lib.common.rest_client [req-db45b9e0-a947-4b37-9da5-6cd880a71f85 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.199s 2020-11-06 18:16:51.952 39 DEBUG tempest.lib.common.rest_client [req-db45b9e0-a947-4b37-9da5-6cd880a71f85 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-db45b9e0-a947-4b37-9da5-6cd880a71f85', 'x-compute-request-id': 'req-db45b9e0-a947-4b37-9da5-6cd880a71f85', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:53.181 39 INFO tempest.lib.common.rest_client [req-ff947254-f3f2-4b25-bd66-b5ebb5a9bb73 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.211s 2020-11-06 18:16:53.182 39 DEBUG tempest.lib.common.rest_client [req-ff947254-f3f2-4b25-bd66-b5ebb5a9bb73 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ff947254-f3f2-4b25-bd66-b5ebb5a9bb73', 'x-compute-request-id': 'req-ff947254-f3f2-4b25-bd66-b5ebb5a9bb73', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:54.403 39 INFO tempest.lib.common.rest_client [req-d47161a9-9d9c-48f0-ab46-7b0e35b143ae ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.208s 2020-11-06 18:16:54.404 39 DEBUG tempest.lib.common.rest_client [req-d47161a9-9d9c-48f0-ab46-7b0e35b143ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d47161a9-9d9c-48f0-ab46-7b0e35b143ae', 'x-compute-request-id': 'req-d47161a9-9d9c-48f0-ab46-7b0e35b143ae', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:55.641 39 INFO tempest.lib.common.rest_client [req-01fa9a4e-26a1-4979-8d1d-879d4c27f90b ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.220s 2020-11-06 18:16:55.642 39 DEBUG tempest.lib.common.rest_client [req-01fa9a4e-26a1-4979-8d1d-879d4c27f90b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-01fa9a4e-26a1-4979-8d1d-879d4c27f90b', 'x-compute-request-id': 'req-01fa9a4e-26a1-4979-8d1d-879d4c27f90b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:56.866 39 INFO tempest.lib.common.rest_client [req-6d766d3d-bb41-4781-928c-fb96a5b70cc3 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.209s 2020-11-06 18:16:56.866 39 DEBUG tempest.lib.common.rest_client [req-6d766d3d-bb41-4781-928c-fb96a5b70cc3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6d766d3d-bb41-4781-928c-fb96a5b70cc3', 'x-compute-request-id': 'req-6d766d3d-bb41-4781-928c-fb96a5b70cc3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:16:59.217 39 INFO tempest.lib.common.rest_client [req-1ca0ba7b-e263-4908-855c-7d3e2c971f7a ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 1.334s 2020-11-06 18:16:59.218 39 DEBUG tempest.lib.common.rest_client [req-1ca0ba7b-e263-4908-855c-7d3e2c971f7a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:16:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1ca0ba7b-e263-4908-855c-7d3e2c971f7a', 'x-compute-request-id': 'req-1ca0ba7b-e263-4908-855c-7d3e2c971f7a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:00.490 39 INFO tempest.lib.common.rest_client [req-d81a6b86-8d09-4162-ab64-51388f07e35b ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.256s 2020-11-06 18:17:00.491 39 DEBUG tempest.lib.common.rest_client [req-d81a6b86-8d09-4162-ab64-51388f07e35b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d81a6b86-8d09-4162-ab64-51388f07e35b', 'x-compute-request-id': 'req-d81a6b86-8d09-4162-ab64-51388f07e35b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:01.716 39 INFO tempest.lib.common.rest_client [req-beba1d6a-788b-4ca3-9a4e-c8bd9e45d71a ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.210s 2020-11-06 18:17:01.717 39 DEBUG tempest.lib.common.rest_client [req-beba1d6a-788b-4ca3-9a4e-c8bd9e45d71a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-beba1d6a-788b-4ca3-9a4e-c8bd9e45d71a', 'x-compute-request-id': 'req-beba1d6a-788b-4ca3-9a4e-c8bd9e45d71a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:02.945 39 INFO tempest.lib.common.rest_client [req-4b7f7bc2-53a6-4451-a90e-1091da2b0300 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.214s 2020-11-06 18:17:02.946 39 DEBUG tempest.lib.common.rest_client [req-4b7f7bc2-53a6-4451-a90e-1091da2b0300 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4b7f7bc2-53a6-4451-a90e-1091da2b0300', 'x-compute-request-id': 'req-4b7f7bc2-53a6-4451-a90e-1091da2b0300', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:04.195 39 INFO tempest.lib.common.rest_client [req-043c634f-5dab-4ec1-ba63-ca1095b66276 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.232s 2020-11-06 18:17:04.196 39 DEBUG tempest.lib.common.rest_client [req-043c634f-5dab-4ec1-ba63-ca1095b66276 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-043c634f-5dab-4ec1-ba63-ca1095b66276', 'x-compute-request-id': 'req-043c634f-5dab-4ec1-ba63-ca1095b66276', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:05.407 39 INFO tempest.lib.common.rest_client [req-f269a107-a21e-4500-86a9-41f7e7418b45 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.197s 2020-11-06 18:17:05.408 39 DEBUG tempest.lib.common.rest_client [req-f269a107-a21e-4500-86a9-41f7e7418b45 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f269a107-a21e-4500-86a9-41f7e7418b45', 'x-compute-request-id': 'req-f269a107-a21e-4500-86a9-41f7e7418b45', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:06.630 39 INFO tempest.lib.common.rest_client [req-5e013495-ac52-4181-bfda-04c51ac85c68 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.209s 2020-11-06 18:17:06.630 39 DEBUG tempest.lib.common.rest_client [req-5e013495-ac52-4181-bfda-04c51ac85c68 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5e013495-ac52-4181-bfda-04c51ac85c68', 'x-compute-request-id': 'req-5e013495-ac52-4181-bfda-04c51ac85c68', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:07.854 39 INFO tempest.lib.common.rest_client [req-1fad8f58-6489-436d-a86e-2d21095c50d3 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.212s 2020-11-06 18:17:07.855 39 DEBUG tempest.lib.common.rest_client [req-1fad8f58-6489-436d-a86e-2d21095c50d3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1fad8f58-6489-436d-a86e-2d21095c50d3', 'x-compute-request-id': 'req-1fad8f58-6489-436d-a86e-2d21095c50d3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:09.517 39 INFO tempest.lib.common.rest_client [req-01ca1984-a98a-4ee6-9429-9ecef50cfd01 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.644s 2020-11-06 18:17:09.518 39 DEBUG tempest.lib.common.rest_client [req-01ca1984-a98a-4ee6-9429-9ecef50cfd01 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-01ca1984-a98a-4ee6-9429-9ecef50cfd01', 'x-compute-request-id': 'req-01ca1984-a98a-4ee6-9429-9ecef50cfd01', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:10.740 39 INFO tempest.lib.common.rest_client [req-786745a5-48df-4c6a-bb3f-ae71164ac8a5 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.206s 2020-11-06 18:17:10.741 39 DEBUG tempest.lib.common.rest_client [req-786745a5-48df-4c6a-bb3f-ae71164ac8a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-786745a5-48df-4c6a-bb3f-ae71164ac8a5', 'x-compute-request-id': 'req-786745a5-48df-4c6a-bb3f-ae71164ac8a5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:11.951 39 INFO tempest.lib.common.rest_client [req-ce09c745-9727-4ab6-8df4-0f62539678db ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.195s 2020-11-06 18:17:11.952 39 DEBUG tempest.lib.common.rest_client [req-ce09c745-9727-4ab6-8df4-0f62539678db ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ce09c745-9727-4ab6-8df4-0f62539678db', 'x-compute-request-id': 'req-ce09c745-9727-4ab6-8df4-0f62539678db', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:13.144 39 INFO tempest.lib.common.rest_client [req-f7fde3e3-b098-4fe1-b115-1c00d43cdf54 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.173s 2020-11-06 18:17:13.144 39 DEBUG tempest.lib.common.rest_client [req-f7fde3e3-b098-4fe1-b115-1c00d43cdf54 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f7fde3e3-b098-4fe1-b115-1c00d43cdf54', 'x-compute-request-id': 'req-f7fde3e3-b098-4fe1-b115-1c00d43cdf54', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:14.374 39 INFO tempest.lib.common.rest_client [req-7bb3d2a8-d877-421b-8df6-d3df9b5efee5 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.213s 2020-11-06 18:17:14.375 39 DEBUG tempest.lib.common.rest_client [req-7bb3d2a8-d877-421b-8df6-d3df9b5efee5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7bb3d2a8-d877-421b-8df6-d3df9b5efee5', 'x-compute-request-id': 'req-7bb3d2a8-d877-421b-8df6-d3df9b5efee5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:15.597 39 INFO tempest.lib.common.rest_client [req-34f8ebe2-76c9-45af-a222-62fe46733ec1 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.205s 2020-11-06 18:17:15.598 39 DEBUG tempest.lib.common.rest_client [req-34f8ebe2-76c9-45af-a222-62fe46733ec1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-34f8ebe2-76c9-45af-a222-62fe46733ec1', 'x-compute-request-id': 'req-34f8ebe2-76c9-45af-a222-62fe46733ec1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:16.906 39 INFO tempest.lib.common.rest_client [req-24ab5182-9476-4bf9-ba3f-2329bfc3f489 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.294s 2020-11-06 18:17:16.907 39 DEBUG tempest.lib.common.rest_client [req-24ab5182-9476-4bf9-ba3f-2329bfc3f489 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-24ab5182-9476-4bf9-ba3f-2329bfc3f489', 'x-compute-request-id': 'req-24ab5182-9476-4bf9-ba3f-2329bfc3f489', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:19.142 39 INFO tempest.lib.common.rest_client [req-aaf8c506-1b5e-4c93-9f61-cfd5035f5d8b ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 1.219s 2020-11-06 18:17:19.143 39 DEBUG tempest.lib.common.rest_client [req-aaf8c506-1b5e-4c93-9f61-cfd5035f5d8b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-aaf8c506-1b5e-4c93-9f61-cfd5035f5d8b', 'x-compute-request-id': 'req-aaf8c506-1b5e-4c93-9f61-cfd5035f5d8b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:20.353 39 INFO tempest.lib.common.rest_client [req-a69cdf8c-2540-4195-a28b-8edbb94695d4 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.192s 2020-11-06 18:17:20.353 39 DEBUG tempest.lib.common.rest_client [req-a69cdf8c-2540-4195-a28b-8edbb94695d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a69cdf8c-2540-4195-a28b-8edbb94695d4', 'x-compute-request-id': 'req-a69cdf8c-2540-4195-a28b-8edbb94695d4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:21.573 39 INFO tempest.lib.common.rest_client [req-0200ad6d-58a0-46f5-a927-7967499b2ebf ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.203s 2020-11-06 18:17:21.574 39 DEBUG tempest.lib.common.rest_client [req-0200ad6d-58a0-46f5-a927-7967499b2ebf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0200ad6d-58a0-46f5-a927-7967499b2ebf', 'x-compute-request-id': 'req-0200ad6d-58a0-46f5-a927-7967499b2ebf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:22.794 39 INFO tempest.lib.common.rest_client [req-d5fbc802-8236-468b-ac9b-26dd980ddff7 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.204s 2020-11-06 18:17:22.795 39 DEBUG tempest.lib.common.rest_client [req-d5fbc802-8236-468b-ac9b-26dd980ddff7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d5fbc802-8236-468b-ac9b-26dd980ddff7', 'x-compute-request-id': 'req-d5fbc802-8236-468b-ac9b-26dd980ddff7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:24.071 39 INFO tempest.lib.common.rest_client [req-b8758192-93a3-4b58-be46-2a8b637ca2de ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.258s 2020-11-06 18:17:24.072 39 DEBUG tempest.lib.common.rest_client [req-b8758192-93a3-4b58-be46-2a8b637ca2de ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b8758192-93a3-4b58-be46-2a8b637ca2de', 'x-compute-request-id': 'req-b8758192-93a3-4b58-be46-2a8b637ca2de', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:25.303 39 INFO tempest.lib.common.rest_client [req-e54702aa-cd04-4b9c-9b08-9b157c35f3ec ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.213s 2020-11-06 18:17:25.303 39 DEBUG tempest.lib.common.rest_client [req-e54702aa-cd04-4b9c-9b08-9b157c35f3ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e54702aa-cd04-4b9c-9b08-9b157c35f3ec', 'x-compute-request-id': 'req-e54702aa-cd04-4b9c-9b08-9b157c35f3ec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:26.549 39 INFO tempest.lib.common.rest_client [req-cf78420c-ffce-469d-987d-73ffcf6f9486 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.228s 2020-11-06 18:17:26.549 39 DEBUG tempest.lib.common.rest_client [req-cf78420c-ffce-469d-987d-73ffcf6f9486 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cf78420c-ffce-469d-987d-73ffcf6f9486', 'x-compute-request-id': 'req-cf78420c-ffce-469d-987d-73ffcf6f9486', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:27.775 39 INFO tempest.lib.common.rest_client [req-9357abf8-e134-4a91-b239-118ce2d362fa ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.213s 2020-11-06 18:17:27.776 39 DEBUG tempest.lib.common.rest_client [req-9357abf8-e134-4a91-b239-118ce2d362fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9357abf8-e134-4a91-b239-118ce2d362fa', 'x-compute-request-id': 'req-9357abf8-e134-4a91-b239-118ce2d362fa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:29.036 39 INFO tempest.lib.common.rest_client [req-c83f858f-3d45-40e9-bbb8-951778563c0c ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.243s 2020-11-06 18:17:29.037 39 DEBUG tempest.lib.common.rest_client [req-c83f858f-3d45-40e9-bbb8-951778563c0c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c83f858f-3d45-40e9-bbb8-951778563c0c', 'x-compute-request-id': 'req-c83f858f-3d45-40e9-bbb8-951778563c0c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:30.268 39 INFO tempest.lib.common.rest_client [req-4142d9dc-5080-47b3-98eb-3c1d4c180a49 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.218s 2020-11-06 18:17:30.269 39 DEBUG tempest.lib.common.rest_client [req-4142d9dc-5080-47b3-98eb-3c1d4c180a49 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4142d9dc-5080-47b3-98eb-3c1d4c180a49', 'x-compute-request-id': 'req-4142d9dc-5080-47b3-98eb-3c1d4c180a49', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:31.534 39 INFO tempest.lib.common.rest_client [req-bd50c361-ded6-481a-b30f-652b5044ebec ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.249s 2020-11-06 18:17:31.534 39 DEBUG tempest.lib.common.rest_client [req-bd50c361-ded6-481a-b30f-652b5044ebec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bd50c361-ded6-481a-b30f-652b5044ebec', 'x-compute-request-id': 'req-bd50c361-ded6-481a-b30f-652b5044ebec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:32.732 39 INFO tempest.lib.common.rest_client [req-63089dd0-700c-4c0a-852f-ef476c2576ae ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.185s 2020-11-06 18:17:32.733 39 DEBUG tempest.lib.common.rest_client [req-63089dd0-700c-4c0a-852f-ef476c2576ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-63089dd0-700c-4c0a-852f-ef476c2576ae', 'x-compute-request-id': 'req-63089dd0-700c-4c0a-852f-ef476c2576ae', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:33.937 39 INFO tempest.lib.common.rest_client [req-9658ea49-7b2e-47d1-a6f4-5ba7f992a41f ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.190s 2020-11-06 18:17:33.938 39 DEBUG tempest.lib.common.rest_client [req-9658ea49-7b2e-47d1-a6f4-5ba7f992a41f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9658ea49-7b2e-47d1-a6f4-5ba7f992a41f', 'x-compute-request-id': 'req-9658ea49-7b2e-47d1-a6f4-5ba7f992a41f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:36.296 39 INFO tempest.lib.common.rest_client [req-30bfab4f-4219-4b6c-bf49-0e917720c2e2 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 1.347s 2020-11-06 18:17:36.297 39 DEBUG tempest.lib.common.rest_client [req-30bfab4f-4219-4b6c-bf49-0e917720c2e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-30bfab4f-4219-4b6c-bf49-0e917720c2e2', 'x-compute-request-id': 'req-30bfab4f-4219-4b6c-bf49-0e917720c2e2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:37.560 39 INFO tempest.lib.common.rest_client [req-60c7e1c9-6d11-4062-84a5-74c0d2e1eec1 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.248s 2020-11-06 18:17:37.561 39 DEBUG tempest.lib.common.rest_client [req-60c7e1c9-6d11-4062-84a5-74c0d2e1eec1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-60c7e1c9-6d11-4062-84a5-74c0d2e1eec1', 'x-compute-request-id': 'req-60c7e1c9-6d11-4062-84a5-74c0d2e1eec1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:38.790 39 INFO tempest.lib.common.rest_client [req-43ba02ab-f555-482e-b9fe-6db8aaaca005 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.215s 2020-11-06 18:17:38.791 39 DEBUG tempest.lib.common.rest_client [req-43ba02ab-f555-482e-b9fe-6db8aaaca005 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-43ba02ab-f555-482e-b9fe-6db8aaaca005', 'x-compute-request-id': 'req-43ba02ab-f555-482e-b9fe-6db8aaaca005', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:39.984 39 INFO tempest.lib.common.rest_client [req-724b76b4-6322-46b8-b9da-0a17dddd07da ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.177s 2020-11-06 18:17:39.985 39 DEBUG tempest.lib.common.rest_client [req-724b76b4-6322-46b8-b9da-0a17dddd07da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-724b76b4-6322-46b8-b9da-0a17dddd07da', 'x-compute-request-id': 'req-724b76b4-6322-46b8-b9da-0a17dddd07da', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:41.240 39 INFO tempest.lib.common.rest_client [req-61d57b96-3c31-4eee-bffe-358d2f62c8d2 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.238s 2020-11-06 18:17:41.241 39 DEBUG tempest.lib.common.rest_client [req-61d57b96-3c31-4eee-bffe-358d2f62c8d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-61d57b96-3c31-4eee-bffe-358d2f62c8d2', 'x-compute-request-id': 'req-61d57b96-3c31-4eee-bffe-358d2f62c8d2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:42.541 39 INFO tempest.lib.common.rest_client [req-b1e14fea-acf2-40f8-b163-b9208feae3ed ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.287s 2020-11-06 18:17:42.542 39 DEBUG tempest.lib.common.rest_client [req-b1e14fea-acf2-40f8-b163-b9208feae3ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b1e14fea-acf2-40f8-b163-b9208feae3ed', 'x-compute-request-id': 'req-b1e14fea-acf2-40f8-b163-b9208feae3ed', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:43.781 39 INFO tempest.lib.common.rest_client [req-f1406f9f-7530-4ca3-8553-83faed718963 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.224s 2020-11-06 18:17:43.782 39 DEBUG tempest.lib.common.rest_client [req-f1406f9f-7530-4ca3-8553-83faed718963 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f1406f9f-7530-4ca3-8553-83faed718963', 'x-compute-request-id': 'req-f1406f9f-7530-4ca3-8553-83faed718963', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:45.005 39 INFO tempest.lib.common.rest_client [req-a2db4c6f-317a-45b2-86f7-c7759c7eaf5b ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.207s 2020-11-06 18:17:45.006 39 DEBUG tempest.lib.common.rest_client [req-a2db4c6f-317a-45b2-86f7-c7759c7eaf5b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a2db4c6f-317a-45b2-86f7-c7759c7eaf5b', 'x-compute-request-id': 'req-a2db4c6f-317a-45b2-86f7-c7759c7eaf5b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:46.221 39 INFO tempest.lib.common.rest_client [req-522a6ef4-2e44-4eb8-98d3-37401de7845a ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.198s 2020-11-06 18:17:46.222 39 DEBUG tempest.lib.common.rest_client [req-522a6ef4-2e44-4eb8-98d3-37401de7845a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-522a6ef4-2e44-4eb8-98d3-37401de7845a', 'x-compute-request-id': 'req-522a6ef4-2e44-4eb8-98d3-37401de7845a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:47.447 39 INFO tempest.lib.common.rest_client [req-b40bd8bf-4b83-47ac-8e35-09987e700845 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.208s 2020-11-06 18:17:47.447 39 DEBUG tempest.lib.common.rest_client [req-b40bd8bf-4b83-47ac-8e35-09987e700845 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b40bd8bf-4b83-47ac-8e35-09987e700845', 'x-compute-request-id': 'req-b40bd8bf-4b83-47ac-8e35-09987e700845', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:48.660 39 INFO tempest.lib.common.rest_client [req-9b1943ee-afb1-4499-9672-e6744df8c8fb ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.196s 2020-11-06 18:17:48.660 39 DEBUG tempest.lib.common.rest_client [req-9b1943ee-afb1-4499-9672-e6744df8c8fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9b1943ee-afb1-4499-9672-e6744df8c8fb', 'x-compute-request-id': 'req-9b1943ee-afb1-4499-9672-e6744df8c8fb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:49.869 39 INFO tempest.lib.common.rest_client [req-46341cca-151e-42d1-b350-e261a722aaf1 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.197s 2020-11-06 18:17:49.869 39 DEBUG tempest.lib.common.rest_client [req-46341cca-151e-42d1-b350-e261a722aaf1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-46341cca-151e-42d1-b350-e261a722aaf1', 'x-compute-request-id': 'req-46341cca-151e-42d1-b350-e261a722aaf1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:51.663 39 INFO tempest.lib.common.rest_client [req-270a5ae0-388c-4d8a-8f00-6982de43f3be ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.775s 2020-11-06 18:17:51.663 39 DEBUG tempest.lib.common.rest_client [req-270a5ae0-388c-4d8a-8f00-6982de43f3be ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-270a5ae0-388c-4d8a-8f00-6982de43f3be', 'x-compute-request-id': 'req-270a5ae0-388c-4d8a-8f00-6982de43f3be', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:52.875 39 INFO tempest.lib.common.rest_client [req-0185f235-4d78-44e6-a526-cdb8c15e9cb2 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.194s 2020-11-06 18:17:52.875 39 DEBUG tempest.lib.common.rest_client [req-0185f235-4d78-44e6-a526-cdb8c15e9cb2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0185f235-4d78-44e6-a526-cdb8c15e9cb2', 'x-compute-request-id': 'req-0185f235-4d78-44e6-a526-cdb8c15e9cb2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:54.076 39 INFO tempest.lib.common.rest_client [req-7b779a16-dea5-406f-a8a8-b21253cfc89f ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.185s 2020-11-06 18:17:54.077 39 DEBUG tempest.lib.common.rest_client [req-7b779a16-dea5-406f-a8a8-b21253cfc89f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7b779a16-dea5-406f-a8a8-b21253cfc89f', 'x-compute-request-id': 'req-7b779a16-dea5-406f-a8a8-b21253cfc89f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:55.317 39 INFO tempest.lib.common.rest_client [req-200c6836-dbb1-449a-91d3-8405a6f9fe10 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.223s 2020-11-06 18:17:55.318 39 DEBUG tempest.lib.common.rest_client [req-200c6836-dbb1-449a-91d3-8405a6f9fe10 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-200c6836-dbb1-449a-91d3-8405a6f9fe10', 'x-compute-request-id': 'req-200c6836-dbb1-449a-91d3-8405a6f9fe10', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:56.623 39 INFO tempest.lib.common.rest_client [req-8f4a7b18-a21b-4ab6-8de8-1501d1db3cc6 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.289s 2020-11-06 18:17:56.624 39 DEBUG tempest.lib.common.rest_client [req-8f4a7b18-a21b-4ab6-8de8-1501d1db3cc6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8f4a7b18-a21b-4ab6-8de8-1501d1db3cc6', 'x-compute-request-id': 'req-8f4a7b18-a21b-4ab6-8de8-1501d1db3cc6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:57.821 39 INFO tempest.lib.common.rest_client [req-6bdfeafc-5a73-456c-9919-40eeb5388659 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.183s 2020-11-06 18:17:57.821 39 DEBUG tempest.lib.common.rest_client [req-6bdfeafc-5a73-456c-9919-40eeb5388659 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6bdfeafc-5a73-456c-9919-40eeb5388659', 'x-compute-request-id': 'req-6bdfeafc-5a73-456c-9919-40eeb5388659', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:17:59.038 39 INFO tempest.lib.common.rest_client [req-3bde573a-8bb5-4986-a035-1a83f7db31a2 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.200s 2020-11-06 18:17:59.039 39 DEBUG tempest.lib.common.rest_client [req-3bde573a-8bb5-4986-a035-1a83f7db31a2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:17:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3bde573a-8bb5-4986-a035-1a83f7db31a2', 'x-compute-request-id': 'req-3bde573a-8bb5-4986-a035-1a83f7db31a2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:00.366 39 INFO tempest.lib.common.rest_client [req-9749119c-98ad-4890-b2e4-06a118023854 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.309s 2020-11-06 18:18:00.367 39 DEBUG tempest.lib.common.rest_client [req-9749119c-98ad-4890-b2e4-06a118023854 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9749119c-98ad-4890-b2e4-06a118023854', 'x-compute-request-id': 'req-9749119c-98ad-4890-b2e4-06a118023854', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:01.749 39 INFO tempest.lib.common.rest_client [req-6429be69-c0a1-437e-89da-d306c5ff23d8 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.366s 2020-11-06 18:18:01.750 39 DEBUG tempest.lib.common.rest_client [req-6429be69-c0a1-437e-89da-d306c5ff23d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6429be69-c0a1-437e-89da-d306c5ff23d8', 'x-compute-request-id': 'req-6429be69-c0a1-437e-89da-d306c5ff23d8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:02.970 39 INFO tempest.lib.common.rest_client [req-466aa3c3-b763-437c-a38a-faf7ce1b6696 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.202s 2020-11-06 18:18:02.971 39 DEBUG tempest.lib.common.rest_client [req-466aa3c3-b763-437c-a38a-faf7ce1b6696 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-466aa3c3-b763-437c-a38a-faf7ce1b6696', 'x-compute-request-id': 'req-466aa3c3-b763-437c-a38a-faf7ce1b6696', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:04.203 39 INFO tempest.lib.common.rest_client [req-63922bb6-3e78-4d59-a046-a8398c959dce ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.214s 2020-11-06 18:18:04.204 39 DEBUG tempest.lib.common.rest_client [req-63922bb6-3e78-4d59-a046-a8398c959dce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-63922bb6-3e78-4d59-a046-a8398c959dce', 'x-compute-request-id': 'req-63922bb6-3e78-4d59-a046-a8398c959dce', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:05.408 39 INFO tempest.lib.common.rest_client [req-f8d94abd-b520-4f54-b681-8d50c04eedae ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.191s 2020-11-06 18:18:05.409 39 DEBUG tempest.lib.common.rest_client [req-f8d94abd-b520-4f54-b681-8d50c04eedae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f8d94abd-b520-4f54-b681-8d50c04eedae', 'x-compute-request-id': 'req-f8d94abd-b520-4f54-b681-8d50c04eedae', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:06.684 39 INFO tempest.lib.common.rest_client [req-d7a27b8b-1bb4-4390-9c3c-a1e8bbf0a74a ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.258s 2020-11-06 18:18:06.685 39 DEBUG tempest.lib.common.rest_client [req-d7a27b8b-1bb4-4390-9c3c-a1e8bbf0a74a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d7a27b8b-1bb4-4390-9c3c-a1e8bbf0a74a', 'x-compute-request-id': 'req-d7a27b8b-1bb4-4390-9c3c-a1e8bbf0a74a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:07.921 39 INFO tempest.lib.common.rest_client [req-dbe75086-89cf-4760-944b-5f5d3d6a69b7 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.223s 2020-11-06 18:18:07.921 39 DEBUG tempest.lib.common.rest_client [req-dbe75086-89cf-4760-944b-5f5d3d6a69b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dbe75086-89cf-4760-944b-5f5d3d6a69b7', 'x-compute-request-id': 'req-dbe75086-89cf-4760-944b-5f5d3d6a69b7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:09.141 39 INFO tempest.lib.common.rest_client [req-929745cf-a08d-4d11-92c6-bace2307e143 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.204s 2020-11-06 18:18:09.142 39 DEBUG tempest.lib.common.rest_client [req-929745cf-a08d-4d11-92c6-bace2307e143 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-929745cf-a08d-4d11-92c6-bace2307e143', 'x-compute-request-id': 'req-929745cf-a08d-4d11-92c6-bace2307e143', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:10.372 39 INFO tempest.lib.common.rest_client [req-7ec93a7e-1fa9-4b23-a1de-0196c45484e6 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.219s 2020-11-06 18:18:10.373 39 DEBUG tempest.lib.common.rest_client [req-7ec93a7e-1fa9-4b23-a1de-0196c45484e6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7ec93a7e-1fa9-4b23-a1de-0196c45484e6', 'x-compute-request-id': 'req-7ec93a7e-1fa9-4b23-a1de-0196c45484e6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:11.592 39 INFO tempest.lib.common.rest_client [req-fd8f6a80-7c16-4b57-a304-d97f7c8b6a49 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.202s 2020-11-06 18:18:11.593 39 DEBUG tempest.lib.common.rest_client [req-fd8f6a80-7c16-4b57-a304-d97f7c8b6a49 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fd8f6a80-7c16-4b57-a304-d97f7c8b6a49', 'x-compute-request-id': 'req-fd8f6a80-7c16-4b57-a304-d97f7c8b6a49', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:12.819 39 INFO tempest.lib.common.rest_client [req-6e794f20-0cb2-4d85-92ed-7453e9ff1779 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.209s 2020-11-06 18:18:12.820 39 DEBUG tempest.lib.common.rest_client [req-6e794f20-0cb2-4d85-92ed-7453e9ff1779 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6e794f20-0cb2-4d85-92ed-7453e9ff1779', 'x-compute-request-id': 'req-6e794f20-0cb2-4d85-92ed-7453e9ff1779', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:14.077 39 INFO tempest.lib.common.rest_client [req-b1dc2985-c3ff-4939-8a2b-9f8e4651b554 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.240s 2020-11-06 18:18:14.078 39 DEBUG tempest.lib.common.rest_client [req-b1dc2985-c3ff-4939-8a2b-9f8e4651b554 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b1dc2985-c3ff-4939-8a2b-9f8e4651b554', 'x-compute-request-id': 'req-b1dc2985-c3ff-4939-8a2b-9f8e4651b554', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:15.308 39 INFO tempest.lib.common.rest_client [req-6bbabea4-8e8a-4e80-a671-6851a56c0ddc ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.213s 2020-11-06 18:18:15.308 39 DEBUG tempest.lib.common.rest_client [req-6bbabea4-8e8a-4e80-a671-6851a56c0ddc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6bbabea4-8e8a-4e80-a671-6851a56c0ddc', 'x-compute-request-id': 'req-6bbabea4-8e8a-4e80-a671-6851a56c0ddc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:16.544 39 INFO tempest.lib.common.rest_client [req-347ce065-f7e5-4721-9560-bd9191c12761 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.218s 2020-11-06 18:18:16.544 39 DEBUG tempest.lib.common.rest_client [req-347ce065-f7e5-4721-9560-bd9191c12761 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-347ce065-f7e5-4721-9560-bd9191c12761', 'x-compute-request-id': 'req-347ce065-f7e5-4721-9560-bd9191c12761', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:17.820 39 INFO tempest.lib.common.rest_client [req-4dcec52f-fef0-48c0-b962-48b2b26a021d ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.258s 2020-11-06 18:18:17.821 39 DEBUG tempest.lib.common.rest_client [req-4dcec52f-fef0-48c0-b962-48b2b26a021d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4dcec52f-fef0-48c0-b962-48b2b26a021d', 'x-compute-request-id': 'req-4dcec52f-fef0-48c0-b962-48b2b26a021d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:19.037 39 INFO tempest.lib.common.rest_client [req-ea22612a-cd1a-4847-9949-48898cc7d838 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.199s 2020-11-06 18:18:19.038 39 DEBUG tempest.lib.common.rest_client [req-ea22612a-cd1a-4847-9949-48898cc7d838 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ea22612a-cd1a-4847-9949-48898cc7d838', 'x-compute-request-id': 'req-ea22612a-cd1a-4847-9949-48898cc7d838', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:20.273 39 INFO tempest.lib.common.rest_client [req-4a4c6838-9ec3-4b5e-a55f-bd99033ce5eb ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.219s 2020-11-06 18:18:20.274 39 DEBUG tempest.lib.common.rest_client [req-4a4c6838-9ec3-4b5e-a55f-bd99033ce5eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4a4c6838-9ec3-4b5e-a55f-bd99033ce5eb', 'x-compute-request-id': 'req-4a4c6838-9ec3-4b5e-a55f-bd99033ce5eb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:21.499 39 INFO tempest.lib.common.rest_client [req-49ead41b-0a7c-47d3-a426-7e228cbacaa4 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.209s 2020-11-06 18:18:21.500 39 DEBUG tempest.lib.common.rest_client [req-49ead41b-0a7c-47d3-a426-7e228cbacaa4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-49ead41b-0a7c-47d3-a426-7e228cbacaa4', 'x-compute-request-id': 'req-49ead41b-0a7c-47d3-a426-7e228cbacaa4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:22.738 39 INFO tempest.lib.common.rest_client [req-aeafcb6a-3fdd-4c2a-a337-0fcbd319fb65 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.222s 2020-11-06 18:18:22.738 39 DEBUG tempest.lib.common.rest_client [req-aeafcb6a-3fdd-4c2a-a337-0fcbd319fb65 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-aeafcb6a-3fdd-4c2a-a337-0fcbd319fb65', 'x-compute-request-id': 'req-aeafcb6a-3fdd-4c2a-a337-0fcbd319fb65', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:25.049 39 INFO tempest.lib.common.rest_client [req-6c33a638-10a5-4dc8-b07a-4520f9d8ce73 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 1.294s 2020-11-06 18:18:25.050 39 DEBUG tempest.lib.common.rest_client [req-6c33a638-10a5-4dc8-b07a-4520f9d8ce73 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6c33a638-10a5-4dc8-b07a-4520f9d8ce73', 'x-compute-request-id': 'req-6c33a638-10a5-4dc8-b07a-4520f9d8ce73', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:26.273 39 INFO tempest.lib.common.rest_client [req-5a61b54d-5c08-4ae5-bd3f-50809aeb15e0 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.207s 2020-11-06 18:18:26.274 39 DEBUG tempest.lib.common.rest_client [req-5a61b54d-5c08-4ae5-bd3f-50809aeb15e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5a61b54d-5c08-4ae5-bd3f-50809aeb15e0', 'x-compute-request-id': 'req-5a61b54d-5c08-4ae5-bd3f-50809aeb15e0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:27.498 39 INFO tempest.lib.common.rest_client [req-c2f06c83-e23c-4ff8-ac1f-f2ca772a6e5e ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.210s 2020-11-06 18:18:27.499 39 DEBUG tempest.lib.common.rest_client [req-c2f06c83-e23c-4ff8-ac1f-f2ca772a6e5e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c2f06c83-e23c-4ff8-ac1f-f2ca772a6e5e', 'x-compute-request-id': 'req-c2f06c83-e23c-4ff8-ac1f-f2ca772a6e5e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:29.869 39 INFO tempest.lib.common.rest_client [req-68b608ae-e714-4388-8b3b-760f3c2e9eb3 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 1.356s 2020-11-06 18:18:29.870 39 DEBUG tempest.lib.common.rest_client [req-68b608ae-e714-4388-8b3b-760f3c2e9eb3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-68b608ae-e714-4388-8b3b-760f3c2e9eb3', 'x-compute-request-id': 'req-68b608ae-e714-4388-8b3b-760f3c2e9eb3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:31.097 39 INFO tempest.lib.common.rest_client [req-f894f653-10a9-4d4e-87b9-90ea714542d0 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.212s 2020-11-06 18:18:31.098 39 DEBUG tempest.lib.common.rest_client [req-f894f653-10a9-4d4e-87b9-90ea714542d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f894f653-10a9-4d4e-87b9-90ea714542d0', 'x-compute-request-id': 'req-f894f653-10a9-4d4e-87b9-90ea714542d0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:32.410 39 INFO tempest.lib.common.rest_client [req-8555a0dc-a853-4546-897b-ba1c8ef9ca3b ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.298s 2020-11-06 18:18:32.410 39 DEBUG tempest.lib.common.rest_client [req-8555a0dc-a853-4546-897b-ba1c8ef9ca3b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8555a0dc-a853-4546-897b-ba1c8ef9ca3b', 'x-compute-request-id': 'req-8555a0dc-a853-4546-897b-ba1c8ef9ca3b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:33.611 39 INFO tempest.lib.common.rest_client [req-0bcb33f6-8f14-48a5-8dce-8fa91e4fecc0 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.186s 2020-11-06 18:18:33.612 39 DEBUG tempest.lib.common.rest_client [req-0bcb33f6-8f14-48a5-8dce-8fa91e4fecc0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0bcb33f6-8f14-48a5-8dce-8fa91e4fecc0', 'x-compute-request-id': 'req-0bcb33f6-8f14-48a5-8dce-8fa91e4fecc0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:34.834 39 INFO tempest.lib.common.rest_client [req-d6580ae8-44ce-4845-b9bd-05630b277922 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.206s 2020-11-06 18:18:34.834 39 DEBUG tempest.lib.common.rest_client [req-d6580ae8-44ce-4845-b9bd-05630b277922 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d6580ae8-44ce-4845-b9bd-05630b277922', 'x-compute-request-id': 'req-d6580ae8-44ce-4845-b9bd-05630b277922', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:36.079 39 INFO tempest.lib.common.rest_client [req-01564315-cf15-49bc-8da9-e22d607699d4 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.230s 2020-11-06 18:18:36.080 39 DEBUG tempest.lib.common.rest_client [req-01564315-cf15-49bc-8da9-e22d607699d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-01564315-cf15-49bc-8da9-e22d607699d4', 'x-compute-request-id': 'req-01564315-cf15-49bc-8da9-e22d607699d4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:37.473 39 INFO tempest.lib.common.rest_client [req-d07cfd83-ef2e-48c8-8cf4-25060a3e66c1 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.378s 2020-11-06 18:18:37.474 39 DEBUG tempest.lib.common.rest_client [req-d07cfd83-ef2e-48c8-8cf4-25060a3e66c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d07cfd83-ef2e-48c8-8cf4-25060a3e66c1', 'x-compute-request-id': 'req-d07cfd83-ef2e-48c8-8cf4-25060a3e66c1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:38.714 39 INFO tempest.lib.common.rest_client [req-99720f51-e0f0-4643-b670-bbc070cefdab ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.226s 2020-11-06 18:18:38.715 39 DEBUG tempest.lib.common.rest_client [req-99720f51-e0f0-4643-b670-bbc070cefdab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-99720f51-e0f0-4643-b670-bbc070cefdab', 'x-compute-request-id': 'req-99720f51-e0f0-4643-b670-bbc070cefdab', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:39.956 39 INFO tempest.lib.common.rest_client [req-a1afc75a-e941-4219-8e09-58d7d6616c14 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.225s 2020-11-06 18:18:39.957 39 DEBUG tempest.lib.common.rest_client [req-a1afc75a-e941-4219-8e09-58d7d6616c14 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a1afc75a-e941-4219-8e09-58d7d6616c14', 'x-compute-request-id': 'req-a1afc75a-e941-4219-8e09-58d7d6616c14', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:41.187 39 INFO tempest.lib.common.rest_client [req-25ac3274-ae76-4815-ac83-2e3cac9fc83e ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.213s 2020-11-06 18:18:41.187 39 DEBUG tempest.lib.common.rest_client [req-25ac3274-ae76-4815-ac83-2e3cac9fc83e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-25ac3274-ae76-4815-ac83-2e3cac9fc83e', 'x-compute-request-id': 'req-25ac3274-ae76-4815-ac83-2e3cac9fc83e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:42.477 39 INFO tempest.lib.common.rest_client [req-a0c4ea3a-577c-4eb9-b486-62963033dc61 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.273s 2020-11-06 18:18:42.478 39 DEBUG tempest.lib.common.rest_client [req-a0c4ea3a-577c-4eb9-b486-62963033dc61 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a0c4ea3a-577c-4eb9-b486-62963033dc61', 'x-compute-request-id': 'req-a0c4ea3a-577c-4eb9-b486-62963033dc61', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:43.717 39 INFO tempest.lib.common.rest_client [req-7a56c562-ed1c-47f5-a1b4-0496e4eba949 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.222s 2020-11-06 18:18:43.717 39 DEBUG tempest.lib.common.rest_client [req-7a56c562-ed1c-47f5-a1b4-0496e4eba949 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7a56c562-ed1c-47f5-a1b4-0496e4eba949', 'x-compute-request-id': 'req-7a56c562-ed1c-47f5-a1b4-0496e4eba949', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:44.942 39 INFO tempest.lib.common.rest_client [req-c8720635-11b1-4e2b-8697-018f9e104792 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.208s 2020-11-06 18:18:44.943 39 DEBUG tempest.lib.common.rest_client [req-c8720635-11b1-4e2b-8697-018f9e104792 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c8720635-11b1-4e2b-8697-018f9e104792', 'x-compute-request-id': 'req-c8720635-11b1-4e2b-8697-018f9e104792', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:46.180 39 INFO tempest.lib.common.rest_client [req-e17cfd19-2ff7-4055-b671-e042ebb974a9 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.218s 2020-11-06 18:18:46.180 39 DEBUG tempest.lib.common.rest_client [req-e17cfd19-2ff7-4055-b671-e042ebb974a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e17cfd19-2ff7-4055-b671-e042ebb974a9', 'x-compute-request-id': 'req-e17cfd19-2ff7-4055-b671-e042ebb974a9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:47.409 39 INFO tempest.lib.common.rest_client [req-27cf3bd8-7ff3-4dcf-87b8-258706f4d1a8 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.215s 2020-11-06 18:18:47.410 39 DEBUG tempest.lib.common.rest_client [req-27cf3bd8-7ff3-4dcf-87b8-258706f4d1a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-27cf3bd8-7ff3-4dcf-87b8-258706f4d1a8', 'x-compute-request-id': 'req-27cf3bd8-7ff3-4dcf-87b8-258706f4d1a8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:48.652 39 INFO tempest.lib.common.rest_client [req-85ff4d69-4414-4a58-bd91-dfe5fe506ed0 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.227s 2020-11-06 18:18:48.653 39 DEBUG tempest.lib.common.rest_client [req-85ff4d69-4414-4a58-bd91-dfe5fe506ed0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-85ff4d69-4414-4a58-bd91-dfe5fe506ed0', 'x-compute-request-id': 'req-85ff4d69-4414-4a58-bd91-dfe5fe506ed0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:49.905 39 INFO tempest.lib.common.rest_client [req-89554cae-7b4e-4bad-85e2-c0a96132c4f5 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.235s 2020-11-06 18:18:49.905 39 DEBUG tempest.lib.common.rest_client [req-89554cae-7b4e-4bad-85e2-c0a96132c4f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-89554cae-7b4e-4bad-85e2-c0a96132c4f5', 'x-compute-request-id': 'req-89554cae-7b4e-4bad-85e2-c0a96132c4f5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:51.126 39 INFO tempest.lib.common.rest_client [req-d3821d90-c178-4743-ac8c-4949626a1ac6 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.203s 2020-11-06 18:18:51.126 39 DEBUG tempest.lib.common.rest_client [req-d3821d90-c178-4743-ac8c-4949626a1ac6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d3821d90-c178-4743-ac8c-4949626a1ac6', 'x-compute-request-id': 'req-d3821d90-c178-4743-ac8c-4949626a1ac6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:52.368 39 INFO tempest.lib.common.rest_client [req-a270443b-3a99-44f5-a051-36999dd90025 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.227s 2020-11-06 18:18:52.369 39 DEBUG tempest.lib.common.rest_client [req-a270443b-3a99-44f5-a051-36999dd90025 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a270443b-3a99-44f5-a051-36999dd90025', 'x-compute-request-id': 'req-a270443b-3a99-44f5-a051-36999dd90025', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:53.718 39 INFO tempest.lib.common.rest_client [req-27b0c214-994c-45ca-b715-95ea1c269cc4 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.332s 2020-11-06 18:18:53.719 39 DEBUG tempest.lib.common.rest_client [req-27b0c214-994c-45ca-b715-95ea1c269cc4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-27b0c214-994c-45ca-b715-95ea1c269cc4', 'x-compute-request-id': 'req-27b0c214-994c-45ca-b715-95ea1c269cc4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:56.022 39 INFO tempest.lib.common.rest_client [req-04a53123-c0ce-4136-8699-6b01b5fa3115 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 1.288s 2020-11-06 18:18:56.023 39 DEBUG tempest.lib.common.rest_client [req-04a53123-c0ce-4136-8699-6b01b5fa3115 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-04a53123-c0ce-4136-8699-6b01b5fa3115', 'x-compute-request-id': 'req-04a53123-c0ce-4136-8699-6b01b5fa3115', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:57.272 39 INFO tempest.lib.common.rest_client [req-2c1ecf87-6760-47a1-8d5e-214718c7fca6 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.231s 2020-11-06 18:18:57.272 39 DEBUG tempest.lib.common.rest_client [req-2c1ecf87-6760-47a1-8d5e-214718c7fca6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2c1ecf87-6760-47a1-8d5e-214718c7fca6', 'x-compute-request-id': 'req-2c1ecf87-6760-47a1-8d5e-214718c7fca6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:58.585 39 INFO tempest.lib.common.rest_client [req-d6bfff9b-a5fd-483d-935f-4e13bd6ed767 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.295s 2020-11-06 18:18:58.586 39 DEBUG tempest.lib.common.rest_client [req-d6bfff9b-a5fd-483d-935f-4e13bd6ed767 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d6bfff9b-a5fd-483d-935f-4e13bd6ed767', 'x-compute-request-id': 'req-d6bfff9b-a5fd-483d-935f-4e13bd6ed767', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:18:59.806 39 INFO tempest.lib.common.rest_client [req-8bfb7b82-26ea-43fe-bbf8-a314895a0cf2 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.204s 2020-11-06 18:18:59.807 39 DEBUG tempest.lib.common.rest_client [req-8bfb7b82-26ea-43fe-bbf8-a314895a0cf2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:18:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8bfb7b82-26ea-43fe-bbf8-a314895a0cf2', 'x-compute-request-id': 'req-8bfb7b82-26ea-43fe-bbf8-a314895a0cf2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:01.141 39 INFO tempest.lib.common.rest_client [req-32b195f8-99c8-41d9-aa59-14fa698efc86 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.322s 2020-11-06 18:19:01.142 39 DEBUG tempest.lib.common.rest_client [req-32b195f8-99c8-41d9-aa59-14fa698efc86 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-32b195f8-99c8-41d9-aa59-14fa698efc86', 'x-compute-request-id': 'req-32b195f8-99c8-41d9-aa59-14fa698efc86', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:02.349 39 INFO tempest.lib.common.rest_client [req-5a7b21fb-e6bd-4ad2-bcb6-90c8aac5f69b ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.191s 2020-11-06 18:19:02.350 39 DEBUG tempest.lib.common.rest_client [req-5a7b21fb-e6bd-4ad2-bcb6-90c8aac5f69b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5a7b21fb-e6bd-4ad2-bcb6-90c8aac5f69b', 'x-compute-request-id': 'req-5a7b21fb-e6bd-4ad2-bcb6-90c8aac5f69b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:04.698 39 INFO tempest.lib.common.rest_client [req-309d0bc5-0b57-4b11-ac34-288b3e365b98 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 1.335s 2020-11-06 18:19:04.699 39 DEBUG tempest.lib.common.rest_client [req-309d0bc5-0b57-4b11-ac34-288b3e365b98 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-309d0bc5-0b57-4b11-ac34-288b3e365b98', 'x-compute-request-id': 'req-309d0bc5-0b57-4b11-ac34-288b3e365b98', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:05.926 39 INFO tempest.lib.common.rest_client [req-a457209c-5546-4887-bdd2-c5bfa2d73472 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.216s 2020-11-06 18:19:05.926 39 DEBUG tempest.lib.common.rest_client [req-a457209c-5546-4887-bdd2-c5bfa2d73472 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a457209c-5546-4887-bdd2-c5bfa2d73472', 'x-compute-request-id': 'req-a457209c-5546-4887-bdd2-c5bfa2d73472', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:07.150 39 INFO tempest.lib.common.rest_client [req-be110470-ab7d-4e30-bc13-385dda85b1f4 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.210s 2020-11-06 18:19:07.151 39 DEBUG tempest.lib.common.rest_client [req-be110470-ab7d-4e30-bc13-385dda85b1f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-be110470-ab7d-4e30-bc13-385dda85b1f4', 'x-compute-request-id': 'req-be110470-ab7d-4e30-bc13-385dda85b1f4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:08.345 39 INFO tempest.lib.common.rest_client [req-22beb631-f927-4abe-9024-f7fce3b1c1cb ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.179s 2020-11-06 18:19:08.346 39 DEBUG tempest.lib.common.rest_client [req-22beb631-f927-4abe-9024-f7fce3b1c1cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-22beb631-f927-4abe-9024-f7fce3b1c1cb', 'x-compute-request-id': 'req-22beb631-f927-4abe-9024-f7fce3b1c1cb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:09.576 39 INFO tempest.lib.common.rest_client [req-fdd37c3d-7872-42d7-836d-1387b8140f14 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.213s 2020-11-06 18:19:09.576 39 DEBUG tempest.lib.common.rest_client [req-fdd37c3d-7872-42d7-836d-1387b8140f14 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fdd37c3d-7872-42d7-836d-1387b8140f14', 'x-compute-request-id': 'req-fdd37c3d-7872-42d7-836d-1387b8140f14', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:10.812 39 INFO tempest.lib.common.rest_client [req-4bf5497d-a557-4c4c-a1cd-0011b678b7d0 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.218s 2020-11-06 18:19:10.813 39 DEBUG tempest.lib.common.rest_client [req-4bf5497d-a557-4c4c-a1cd-0011b678b7d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4bf5497d-a557-4c4c-a1cd-0011b678b7d0', 'x-compute-request-id': 'req-4bf5497d-a557-4c4c-a1cd-0011b678b7d0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:12.029 39 INFO tempest.lib.common.rest_client [req-4dd45f1c-64f9-4d0f-99d5-aeb35bc17afe ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.199s 2020-11-06 18:19:12.029 39 DEBUG tempest.lib.common.rest_client [req-4dd45f1c-64f9-4d0f-99d5-aeb35bc17afe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4dd45f1c-64f9-4d0f-99d5-aeb35bc17afe', 'x-compute-request-id': 'req-4dd45f1c-64f9-4d0f-99d5-aeb35bc17afe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:13.331 39 INFO tempest.lib.common.rest_client [req-906eb0d7-99bb-4ae8-bc1d-a720a6d13829 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.285s 2020-11-06 18:19:13.331 39 DEBUG tempest.lib.common.rest_client [req-906eb0d7-99bb-4ae8-bc1d-a720a6d13829 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-906eb0d7-99bb-4ae8-bc1d-a720a6d13829', 'x-compute-request-id': 'req-906eb0d7-99bb-4ae8-bc1d-a720a6d13829', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:14.615 39 INFO tempest.lib.common.rest_client [req-4942321f-1f63-44d8-8549-690673d08b1e ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.265s 2020-11-06 18:19:14.615 39 DEBUG tempest.lib.common.rest_client [req-4942321f-1f63-44d8-8549-690673d08b1e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4942321f-1f63-44d8-8549-690673d08b1e', 'x-compute-request-id': 'req-4942321f-1f63-44d8-8549-690673d08b1e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:15.826 39 INFO tempest.lib.common.rest_client [req-34f7bc77-034f-4ca3-86c2-5aba9717b9a0 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.199s 2020-11-06 18:19:15.826 39 DEBUG tempest.lib.common.rest_client [req-34f7bc77-034f-4ca3-86c2-5aba9717b9a0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-34f7bc77-034f-4ca3-86c2-5aba9717b9a0', 'x-compute-request-id': 'req-34f7bc77-034f-4ca3-86c2-5aba9717b9a0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:17.028 39 INFO tempest.lib.common.rest_client [req-105307b8-d6cf-450e-b89f-1d049fd454e5 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.185s 2020-11-06 18:19:17.029 39 DEBUG tempest.lib.common.rest_client [req-105307b8-d6cf-450e-b89f-1d049fd454e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-105307b8-d6cf-450e-b89f-1d049fd454e5', 'x-compute-request-id': 'req-105307b8-d6cf-450e-b89f-1d049fd454e5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:18.309 39 INFO tempest.lib.common.rest_client [req-5628cfd3-6afc-4bc0-9e27-67fdb314fdf3 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.264s 2020-11-06 18:19:18.310 39 DEBUG tempest.lib.common.rest_client [req-5628cfd3-6afc-4bc0-9e27-67fdb314fdf3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5628cfd3-6afc-4bc0-9e27-67fdb314fdf3', 'x-compute-request-id': 'req-5628cfd3-6afc-4bc0-9e27-67fdb314fdf3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:19.654 39 INFO tempest.lib.common.rest_client [req-f6ac0299-330f-4780-b0e4-86eb2c272531 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.329s 2020-11-06 18:19:19.655 39 DEBUG tempest.lib.common.rest_client [req-f6ac0299-330f-4780-b0e4-86eb2c272531 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f6ac0299-330f-4780-b0e4-86eb2c272531', 'x-compute-request-id': 'req-f6ac0299-330f-4780-b0e4-86eb2c272531', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:20.880 39 INFO tempest.lib.common.rest_client [req-8c782f1c-8d87-434a-b703-65f72d972f13 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.210s 2020-11-06 18:19:20.881 39 DEBUG tempest.lib.common.rest_client [req-8c782f1c-8d87-434a-b703-65f72d972f13 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8c782f1c-8d87-434a-b703-65f72d972f13', 'x-compute-request-id': 'req-8c782f1c-8d87-434a-b703-65f72d972f13', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:22.101 39 INFO tempest.lib.common.rest_client [req-a2c0c284-321e-4e47-a8e9-a1c3256a2f31 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.208s 2020-11-06 18:19:22.102 39 DEBUG tempest.lib.common.rest_client [req-a2c0c284-321e-4e47-a8e9-a1c3256a2f31 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a2c0c284-321e-4e47-a8e9-a1c3256a2f31', 'x-compute-request-id': 'req-a2c0c284-321e-4e47-a8e9-a1c3256a2f31', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:23.337 39 INFO tempest.lib.common.rest_client [req-07c56d83-0306-4e64-9f4f-ba6f465fcd84 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.220s 2020-11-06 18:19:23.338 39 DEBUG tempest.lib.common.rest_client [req-07c56d83-0306-4e64-9f4f-ba6f465fcd84 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-07c56d83-0306-4e64-9f4f-ba6f465fcd84', 'x-compute-request-id': 'req-07c56d83-0306-4e64-9f4f-ba6f465fcd84', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:25.649 39 INFO tempest.lib.common.rest_client [req-fbdfa5a0-12bd-4392-a109-1a602d44cb42 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 1.295s 2020-11-06 18:19:25.650 39 DEBUG tempest.lib.common.rest_client [req-fbdfa5a0-12bd-4392-a109-1a602d44cb42 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fbdfa5a0-12bd-4392-a109-1a602d44cb42', 'x-compute-request-id': 'req-fbdfa5a0-12bd-4392-a109-1a602d44cb42', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:26.949 39 INFO tempest.lib.common.rest_client [req-06896183-06eb-4870-be91-0f3989f00de3 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.282s 2020-11-06 18:19:26.950 39 DEBUG tempest.lib.common.rest_client [req-06896183-06eb-4870-be91-0f3989f00de3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-06896183-06eb-4870-be91-0f3989f00de3', 'x-compute-request-id': 'req-06896183-06eb-4870-be91-0f3989f00de3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:28.201 39 INFO tempest.lib.common.rest_client [req-b5e5db1f-56be-4fe5-9b76-39de0f7aa49d ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.236s 2020-11-06 18:19:28.201 39 DEBUG tempest.lib.common.rest_client [req-b5e5db1f-56be-4fe5-9b76-39de0f7aa49d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b5e5db1f-56be-4fe5-9b76-39de0f7aa49d', 'x-compute-request-id': 'req-b5e5db1f-56be-4fe5-9b76-39de0f7aa49d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:29.422 39 INFO tempest.lib.common.rest_client [req-7d46b1aa-08a0-4790-903f-0f3b9205fa0d ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.209s 2020-11-06 18:19:29.423 39 DEBUG tempest.lib.common.rest_client [req-7d46b1aa-08a0-4790-903f-0f3b9205fa0d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7d46b1aa-08a0-4790-903f-0f3b9205fa0d', 'x-compute-request-id': 'req-7d46b1aa-08a0-4790-903f-0f3b9205fa0d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:30.661 39 INFO tempest.lib.common.rest_client [req-ad4cbcee-d5b1-4c7c-a1a1-9cc888a68daf ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.220s 2020-11-06 18:19:30.662 39 DEBUG tempest.lib.common.rest_client [req-ad4cbcee-d5b1-4c7c-a1a1-9cc888a68daf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ad4cbcee-d5b1-4c7c-a1a1-9cc888a68daf', 'x-compute-request-id': 'req-ad4cbcee-d5b1-4c7c-a1a1-9cc888a68daf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:31.863 39 INFO tempest.lib.common.rest_client [req-38766ce8-4ea8-4757-a0d8-fb7054f101b7 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.184s 2020-11-06 18:19:31.863 39 DEBUG tempest.lib.common.rest_client [req-38766ce8-4ea8-4757-a0d8-fb7054f101b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-38766ce8-4ea8-4757-a0d8-fb7054f101b7', 'x-compute-request-id': 'req-38766ce8-4ea8-4757-a0d8-fb7054f101b7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:33.061 39 INFO tempest.lib.common.rest_client [req-e97ada1b-a103-4cc9-ad39-aa02ce7e1431 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.186s 2020-11-06 18:19:33.062 39 DEBUG tempest.lib.common.rest_client [req-e97ada1b-a103-4cc9-ad39-aa02ce7e1431 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e97ada1b-a103-4cc9-ad39-aa02ce7e1431', 'x-compute-request-id': 'req-e97ada1b-a103-4cc9-ad39-aa02ce7e1431', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:34.337 39 INFO tempest.lib.common.rest_client [req-755d6032-5308-479f-82f8-276f8dd11ada ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.259s 2020-11-06 18:19:34.337 39 DEBUG tempest.lib.common.rest_client [req-755d6032-5308-479f-82f8-276f8dd11ada ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-755d6032-5308-479f-82f8-276f8dd11ada', 'x-compute-request-id': 'req-755d6032-5308-479f-82f8-276f8dd11ada', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:35.664 39 INFO tempest.lib.common.rest_client [req-c34412a5-5cd3-4b0a-8946-c9da0e75b576 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.311s 2020-11-06 18:19:35.665 39 DEBUG tempest.lib.common.rest_client [req-c34412a5-5cd3-4b0a-8946-c9da0e75b576 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c34412a5-5cd3-4b0a-8946-c9da0e75b576', 'x-compute-request-id': 'req-c34412a5-5cd3-4b0a-8946-c9da0e75b576', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:36.907 39 INFO tempest.lib.common.rest_client [req-5be71ffe-f9e3-4101-8e28-0b6445af9aca ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.226s 2020-11-06 18:19:36.908 39 DEBUG tempest.lib.common.rest_client [req-5be71ffe-f9e3-4101-8e28-0b6445af9aca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5be71ffe-f9e3-4101-8e28-0b6445af9aca', 'x-compute-request-id': 'req-5be71ffe-f9e3-4101-8e28-0b6445af9aca', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:38.162 39 INFO tempest.lib.common.rest_client [req-44f36645-bf95-4cbe-957f-35de911a88fd ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.236s 2020-11-06 18:19:38.163 39 DEBUG tempest.lib.common.rest_client [req-44f36645-bf95-4cbe-957f-35de911a88fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-44f36645-bf95-4cbe-957f-35de911a88fd', 'x-compute-request-id': 'req-44f36645-bf95-4cbe-957f-35de911a88fd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:39.400 39 INFO tempest.lib.common.rest_client [req-7afa485f-3773-484f-845a-ce6e4b7d60e8 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.221s 2020-11-06 18:19:39.401 39 DEBUG tempest.lib.common.rest_client [req-7afa485f-3773-484f-845a-ce6e4b7d60e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7afa485f-3773-484f-845a-ce6e4b7d60e8', 'x-compute-request-id': 'req-7afa485f-3773-484f-845a-ce6e4b7d60e8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:40.733 39 INFO tempest.lib.common.rest_client [req-c05c0323-e89f-48bc-b826-614ff086abb0 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.314s 2020-11-06 18:19:40.734 39 DEBUG tempest.lib.common.rest_client [req-c05c0323-e89f-48bc-b826-614ff086abb0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c05c0323-e89f-48bc-b826-614ff086abb0', 'x-compute-request-id': 'req-c05c0323-e89f-48bc-b826-614ff086abb0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:41.948 39 INFO tempest.lib.common.rest_client [req-ed6df187-7d90-42b8-9abb-234ac5852448 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.201s 2020-11-06 18:19:41.949 39 DEBUG tempest.lib.common.rest_client [req-ed6df187-7d90-42b8-9abb-234ac5852448 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ed6df187-7d90-42b8-9abb-234ac5852448', 'x-compute-request-id': 'req-ed6df187-7d90-42b8-9abb-234ac5852448', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:44.472 39 INFO tempest.lib.common.rest_client [req-e47aa3b6-f9e1-4b9b-9742-bf3b89861207 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 1.507s 2020-11-06 18:19:44.473 39 DEBUG tempest.lib.common.rest_client [req-e47aa3b6-f9e1-4b9b-9742-bf3b89861207 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e47aa3b6-f9e1-4b9b-9742-bf3b89861207', 'x-compute-request-id': 'req-e47aa3b6-f9e1-4b9b-9742-bf3b89861207', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:45.696 39 INFO tempest.lib.common.rest_client [req-30e52f8f-c5e0-44d6-8ae3-0d919145f9f7 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.206s 2020-11-06 18:19:45.697 39 DEBUG tempest.lib.common.rest_client [req-30e52f8f-c5e0-44d6-8ae3-0d919145f9f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-30e52f8f-c5e0-44d6-8ae3-0d919145f9f7', 'x-compute-request-id': 'req-30e52f8f-c5e0-44d6-8ae3-0d919145f9f7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:46.921 39 INFO tempest.lib.common.rest_client [req-9100cd02-caf3-4f03-b23e-d5779466c2dc ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.209s 2020-11-06 18:19:46.922 39 DEBUG tempest.lib.common.rest_client [req-9100cd02-caf3-4f03-b23e-d5779466c2dc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9100cd02-caf3-4f03-b23e-d5779466c2dc', 'x-compute-request-id': 'req-9100cd02-caf3-4f03-b23e-d5779466c2dc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:14:46Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:47.089 39 INFO tempest.lib.common.rest_client [req-1aa61aec-3960-42f9-b650-0aca2c40395b ] Request (MiscPolicyActionsRbacTest:setUp): 204 DELETE http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.154s 2020-11-06 18:19:47.090 39 DEBUG tempest.lib.common.rest_client [req-1aa61aec-3960-42f9-b650-0aca2c40395b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1aa61aec-3960-42f9-b650-0aca2c40395b', 'x-compute-request-id': 'req-1aa61aec-3960-42f9-b650-0aca2c40395b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:47.288 39 INFO tempest.lib.common.rest_client [req-0edaa02f-5455-4978-8bd4-cc2b91a2e5de ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.198s 2020-11-06 18:19:47.289 39 DEBUG tempest.lib.common.rest_client [req-0edaa02f-5455-4978-8bd4-cc2b91a2e5de ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0edaa02f-5455-4978-8bd4-cc2b91a2e5de', 'x-compute-request-id': 'req-0edaa02f-5455-4978-8bd4-cc2b91a2e5de', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:19:47Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:48.732 39 INFO tempest.lib.common.rest_client [req-4903ee45-662f-45dd-a9d5-2b74d48743de ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.425s 2020-11-06 18:19:48.732 39 DEBUG tempest.lib.common.rest_client [req-4903ee45-662f-45dd-a9d5-2b74d48743de ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4903ee45-662f-45dd-a9d5-2b74d48743de', 'x-compute-request-id': 'req-4903ee45-662f-45dd-a9d5-2b74d48743de', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"server": {"id": "b6c318f8-9f56-44d7-b88d-e3d75a84eaeb", "name": "tempest-MiscPolicyActionsRbacTest-server-1966917030", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:14:29Z", "updated": "2020-11-06T18:19:48Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.3", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:85:89:1f"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:14:45.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033f4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:49.803 39 INFO tempest.lib.common.rest_client [req-5fecdb0d-5e8e-4a35-9cc1-94e579c5fca5 ] Request (MiscPolicyActionsRbacTest:setUp): 404 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.052s 2020-11-06 18:19:49.804 39 DEBUG tempest.lib.common.rest_client [req-5fecdb0d-5e8e-4a35-9cc1-94e579c5fca5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-5fecdb0d-5e8e-4a35-9cc1-94e579c5fca5', 'x-compute-request-id': 'req-5fecdb0d-5e8e-4a35-9cc1-94e579c5fca5', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance b6c318f8-9f56-44d7-b88d-e3d75a84eaeb could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:49.898 39 INFO tempest.lib.common.rest_client [req-1a37ead3-bef8-4b09-abd5-6f9f30a31fd7 ] Request (MiscPolicyActionsRbacTest:setUp): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 18:19:49.898 39 DEBUG tempest.lib.common.rest_client [req-1a37ead3-bef8-4b09-abd5-6f9f30a31fd7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1a37ead3-bef8-4b09-abd5-6f9f30a31fd7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["zfzrQV3XQ_aSH9ayXvzTfQ"], "expires_at": "2020-11-06T19:19:49.000000Z", "issued_at": "2020-11-06T18:19:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:49.899 39 INFO tempest.lib.common.fixed_network [-] (MiscPolicyActionsRbacTest:setUp) Found network {'id': 'f291e8f0-9113-415f-ade6-f3a87c3b01bd', 'name': 'tempest-MiscPolicyActionsRbacTest-1175378110-network', 'tenant_id': '84fe7a8341b649fb95fb2fd72ffe24c1', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '84fe7a8341b649fb95fb2fd72ffe24c1', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 45, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T18:14:02Z', 'updated_at': '2020-11-06T18:14:03Z', 'revision_number': 1} available for tenant 2020-11-06 18:19:50.593 39 INFO tempest.lib.common.rest_client [req-7bf722b0-0ff0-4e4c-b004-5be8a7a4a889 ] Request (MiscPolicyActionsRbacTest:setUp): 202 POST http://172.30.13.94/compute/v2.1/servers 0.692s 2020-11-06 18:19:50.594 39 DEBUG tempest.lib.common.rest_client [req-7bf722b0-0ff0-4e4c-b004-5be8a7a4a889 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "imageRef": "56b368f6-9136-40ec-a04c-564d02c95e42", "flavorRef": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "adminPass": "E4^NbLx_&OZ^~!1", "networks": [{"uuid": "f291e8f0-9113-415f-ade6-f3a87c3b01bd"}]}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '385', 'location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7bf722b0-0ff0-4e4c-b004-5be8a7a4a889', 'x-compute-request-id': 'req-7bf722b0-0ff0-4e4c-b004-5be8a7a4a889', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "E4^NbLx_&OZ^~!1"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:50.696 39 INFO tempest.lib.common.rest_client [req-6a078e58-d6b8-4e6b-b258-b98bbb674361 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.099s 2020-11-06 18:19:50.697 39 DEBUG tempest.lib.common.rest_client [req-6a078e58-d6b8-4e6b-b258-b98bbb674361 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1401', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6a078e58-d6b8-4e6b-b258-b98bbb674361', 'x-compute-request-id': 'req-6a078e58-d6b8-4e6b-b258-b98bbb674361', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "BUILD", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:51Z", "updated": "2020-11-06T18:19:50Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:52.972 39 INFO tempest.lib.common.rest_client [req-264dbe2e-c2cc-4445-ae77-f85c71ab9ec8 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 1.258s 2020-11-06 18:19:52.973 39 DEBUG tempest.lib.common.rest_client [req-264dbe2e-c2cc-4445-ae77-f85c71ab9ec8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1496', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-264dbe2e-c2cc-4445-ae77-f85c71ab9ec8', 'x-compute-request-id': 'req-264dbe2e-c2cc-4445-ae77-f85c71ab9ec8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "BUILD", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:19:52Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "networking", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:52.988 39 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/networking" after 2 second wait 2020-11-06 18:19:54.319 39 INFO tempest.lib.common.rest_client [req-e25dd48f-d817-409d-82eb-57eb6e6ebaf2 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.328s 2020-11-06 18:19:54.319 39 DEBUG tempest.lib.common.rest_client [req-e25dd48f-d817-409d-82eb-57eb6e6ebaf2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e25dd48f-d817-409d-82eb-57eb6e6ebaf2', 'x-compute-request-id': 'req-e25dd48f-d817-409d-82eb-57eb6e6ebaf2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "BUILD", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:19:52Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:54.330 39 INFO tempest.common.waiters [-] State transition "BUILD/networking" ==> "BUILD/spawning" after 4 second wait 2020-11-06 18:19:55.574 39 INFO tempest.lib.common.rest_client [req-219b37f0-f02a-42cc-871d-16cec04f94c5 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.242s 2020-11-06 18:19:55.574 39 DEBUG tempest.lib.common.rest_client [req-219b37f0-f02a-42cc-871d-16cec04f94c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-219b37f0-f02a-42cc-871d-16cec04f94c5', 'x-compute-request-id': 'req-219b37f0-f02a-42cc-871d-16cec04f94c5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "BUILD", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:19:52Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:56.800 39 INFO tempest.lib.common.rest_client [req-ae0ad4a4-41c2-4a30-9a33-20a3f05e935e ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.209s 2020-11-06 18:19:56.801 39 DEBUG tempest.lib.common.rest_client [req-ae0ad4a4-41c2-4a30-9a33-20a3f05e935e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ae0ad4a4-41c2-4a30-9a33-20a3f05e935e', 'x-compute-request-id': 'req-ae0ad4a4-41c2-4a30-9a33-20a3f05e935e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "BUILD", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:19:52Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:58.025 39 INFO tempest.lib.common.rest_client [req-204785ab-bd10-491d-98b7-5722a96e6482 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.207s 2020-11-06 18:19:58.026 39 DEBUG tempest.lib.common.rest_client [req-204785ab-bd10-491d-98b7-5722a96e6482 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-204785ab-bd10-491d-98b7-5722a96e6482', 'x-compute-request-id': 'req-204785ab-bd10-491d-98b7-5722a96e6482', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "BUILD", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:19:52Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:59.264 39 INFO tempest.lib.common.rest_client [req-9853a92f-7704-474b-bc83-b64ca347dc08 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.222s 2020-11-06 18:19:59.265 39 DEBUG tempest.lib.common.rest_client [req-9853a92f-7704-474b-bc83-b64ca347dc08 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9853a92f-7704-474b-bc83-b64ca347dc08', 'x-compute-request-id': 'req-9853a92f-7704-474b-bc83-b64ca347dc08', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "ACTIVE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:19:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:2e:7d:15"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:19:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:59.280 39 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 9 second wait 2020-11-06 18:19:59.281 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:19:59.282 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.282 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.282 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.283 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.283 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.283 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.284 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.284 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.284 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.285 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.285 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.285 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.286 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.286 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.286 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.286 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.287 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.287 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.287 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.288 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.288 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.288 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.288 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.289 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.289 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.289 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.289 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.290 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.290 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.290 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.290 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.291 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.291 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.291 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.292 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.292 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.292 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.292 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.293 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.293 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.293 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.294 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.294 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.294 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.294 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.295 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.295 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.295 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.296 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.296 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.296 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.296 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.297 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.297 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.297 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.297 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.298 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.298 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.298 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.299 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.299 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.299 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.300 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.300 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.300 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.301 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.301 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.301 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.301 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.302 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.302 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.302 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.302 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.303 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.303 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:19:59.304 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-admin-actions:reset_network, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:19:59.304 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:19:59.438 39 INFO tempest.lib.common.rest_client [req-d82c7116-3b49-49ef-ad48-ff7e3ea9971a ] Request (MiscPolicyActionsRbacTest:test_reset_network): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.133s 2020-11-06 18:19:59.438 39 DEBUG tempest.lib.common.rest_client [req-d82c7116-3b49-49ef-ad48-ff7e3ea9971a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d82c7116-3b49-49ef-ad48-ff7e3ea9971a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:59.475 39 INFO tempest.lib.common.rest_client [req-a898ad9d-7467-4768-9035-121ac0b50087 ] Request (MiscPolicyActionsRbacTest:test_reset_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:19:59.475 39 DEBUG tempest.lib.common.rest_client [req-a898ad9d-7467-4768-9035-121ac0b50087 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a898ad9d-7467-4768-9035-121ac0b50087', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["vsoxUk0XRBiF0TyMih19-Q"], "expires_at": "2020-11-06T19:19:59.000000Z", "issued_at": "2020-11-06T18:19:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:59.624 39 INFO tempest.lib.common.rest_client [req-cc25460f-7ecf-4310-8229-10a512f88771 ] Request (MiscPolicyActionsRbacTest:test_reset_network): 202 POST http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed/action 0.147s 2020-11-06 18:19:59.624 39 DEBUG tempest.lib.common.rest_client [req-cc25460f-7ecf-4310-8229-10a512f88771 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"resetNetwork": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cc25460f-7ecf-4310-8229-10a512f88771', 'x-compute-request-id': 'req-cc25460f-7ecf-4310-8229-10a512f88771', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:59.625 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:19:59.679 39 INFO tempest.lib.common.rest_client [req-94832a26-e8c5-4556-b5cd-eb21b3cedd60 ] Request (MiscPolicyActionsRbacTest:test_reset_network): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.053s 2020-11-06 18:19:59.679 39 DEBUG tempest.lib.common.rest_client [req-94832a26-e8c5-4556-b5cd-eb21b3cedd60 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-94832a26-e8c5-4556-b5cd-eb21b3cedd60', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:19:59.716 39 INFO tempest.lib.common.rest_client [req-30bb8703-e17c-4add-92fe-8650bb986906 ] Request (MiscPolicyActionsRbacTest:test_reset_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:19:59.716 39 DEBUG tempest.lib.common.rest_client [req-30bb8703-e17c-4add-92fe-8650bb986906 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-30bb8703-e17c-4add-92fe-8650bb986906', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["sZ8w2XH-RYCSaqGtRCcsxA"], "expires_at": "2020-11-06T19:19:59.000000Z", "issued_at": "2020-11-06T18:19:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:00.041 39 INFO tempest.lib.common.rest_client [req-a55d3ac0-6836-4097-ab2c-3c71509a4d2d ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.259s 2020-11-06 18:20:00.042 39 DEBUG tempest.lib.common.rest_client [req-a55d3ac0-6836-4097-ab2c-3c71509a4d2d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:19:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a55d3ac0-6836-4097-ab2c-3c71509a4d2d', 'x-compute-request-id': 'req-a55d3ac0-6836-4097-ab2c-3c71509a4d2d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "ACTIVE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:19:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:2e:7d:15"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:19:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:00.056 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:20:00.057 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.057 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.057 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.058 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.058 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.058 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.059 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.059 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.059 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.060 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.060 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.060 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.060 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.061 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.061 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.061 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.062 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.062 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.062 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.062 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.063 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.063 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.063 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.064 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.064 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.064 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.064 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.065 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.065 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.065 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.065 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.066 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.066 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.066 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.067 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.067 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.067 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.067 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.068 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.068 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.068 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.068 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.069 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.069 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.069 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.070 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.070 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.070 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.071 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.071 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.071 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.071 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.072 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.072 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.072 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.072 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.073 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.073 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.073 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.074 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.074 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.074 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.075 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.075 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.075 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.076 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.076 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.076 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.076 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.077 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.077 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.077 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.077 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.078 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.078 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:00.079 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-admin-actions:reset_state, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:20:00.079 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:20:00.126 39 INFO tempest.lib.common.rest_client [req-d28ee3f7-d905-4312-bfcd-315a01cb7f48 ] Request (MiscPolicyActionsRbacTest:test_reset_server_state): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.046s 2020-11-06 18:20:00.127 39 DEBUG tempest.lib.common.rest_client [req-d28ee3f7-d905-4312-bfcd-315a01cb7f48 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d28ee3f7-d905-4312-bfcd-315a01cb7f48', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:00.157 39 INFO tempest.lib.common.rest_client [req-7d4a6e04-3a69-4293-892f-231777d1584b ] Request (MiscPolicyActionsRbacTest:test_reset_server_state): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.029s 2020-11-06 18:20:00.158 39 DEBUG tempest.lib.common.rest_client [req-7d4a6e04-3a69-4293-892f-231777d1584b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7d4a6e04-3a69-4293-892f-231777d1584b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["dwtFb2v3Tpq7fx60-bNtXQ"], "expires_at": "2020-11-06T19:20:00.000000Z", "issued_at": "2020-11-06T18:20:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:00.354 39 INFO tempest.lib.common.rest_client [req-8b185513-9a5e-4978-9228-17668007457e ] Request (MiscPolicyActionsRbacTest:test_reset_server_state): 202 POST http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed/action 0.195s 2020-11-06 18:20:00.354 39 DEBUG tempest.lib.common.rest_client [req-8b185513-9a5e-4978-9228-17668007457e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-resetState": {"state": "error"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8b185513-9a5e-4978-9228-17668007457e', 'x-compute-request-id': 'req-8b185513-9a5e-4978-9228-17668007457e', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:00.355 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:20:00.403 39 INFO tempest.lib.common.rest_client [req-d7fc5739-b37d-48c0-b681-fe8d7bd2ecfb ] Request (MiscPolicyActionsRbacTest:test_reset_server_state): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.047s 2020-11-06 18:20:00.403 39 DEBUG tempest.lib.common.rest_client [req-d7fc5739-b37d-48c0-b681-fe8d7bd2ecfb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d7fc5739-b37d-48c0-b681-fe8d7bd2ecfb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:00.434 39 INFO tempest.lib.common.rest_client [req-3dd2d5ef-201a-47e7-89c2-30187e8604ab ] Request (MiscPolicyActionsRbacTest:test_reset_server_state): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.030s 2020-11-06 18:20:00.434 39 DEBUG tempest.lib.common.rest_client [req-3dd2d5ef-201a-47e7-89c2-30187e8604ab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3dd2d5ef-201a-47e7-89c2-30187e8604ab', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["Bn7m4B_gSpKjdMOHBRkqhg"], "expires_at": "2020-11-06T19:20:00.000000Z", "issued_at": "2020-11-06T18:20:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:00.809 39 INFO tempest.lib.common.rest_client [req-d4d2cc34-11ab-4397-9616-c777ec97e394 ] Request (MiscPolicyActionsRbacTest:_run_cleanups): 202 POST http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed/action 0.373s 2020-11-06 18:20:00.809 39 DEBUG tempest.lib.common.rest_client [req-d4d2cc34-11ab-4397-9616-c777ec97e394 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-resetState": {"state": "active"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d4d2cc34-11ab-4397-9616-c777ec97e394', 'x-compute-request-id': 'req-d4d2cc34-11ab-4397-9616-c777ec97e394', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:01.006 39 INFO tempest.lib.common.rest_client [req-1e8bc82e-8794-4d6a-8cb4-98b571183c4b ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.192s 2020-11-06 18:20:01.007 39 DEBUG tempest.lib.common.rest_client [req-1e8bc82e-8794-4d6a-8cb4-98b571183c4b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1e8bc82e-8794-4d6a-8cb4-98b571183c4b', 'x-compute-request-id': 'req-1e8bc82e-8794-4d6a-8cb4-98b571183c4b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "ACTIVE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:20:01Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:2e:7d:15"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:19:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:01.023 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:20:01.024 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.024 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.024 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.025 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.025 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.026 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.026 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.026 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.027 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.027 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.027 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.027 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.028 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.028 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.028 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.029 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.029 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.029 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.029 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.030 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.030 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.030 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.031 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.031 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.031 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.031 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.032 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.032 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.032 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.033 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.033 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.033 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.033 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.034 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.034 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.034 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.035 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.035 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.035 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.035 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.036 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.036 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.036 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.037 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.037 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.037 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.037 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.038 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.038 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.038 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.039 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.039 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.039 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.039 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.040 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.040 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.040 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.040 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.041 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.041 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.042 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.042 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.042 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.043 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.043 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.043 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.043 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.044 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.044 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.044 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.044 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.045 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.045 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.045 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.046 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:01.047 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-suspend-server:resume, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:20:01.211 39 INFO tempest.lib.common.rest_client [req-b8a22915-f09e-4b30-a095-0208e26cddc3 ] Request (MiscPolicyActionsRbacTest:test_resume_server): 202 POST http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed/action 0.164s 2020-11-06 18:20:01.212 39 DEBUG tempest.lib.common.rest_client [req-b8a22915-f09e-4b30-a095-0208e26cddc3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"suspend": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b8a22915-f09e-4b30-a095-0208e26cddc3', 'x-compute-request-id': 'req-b8a22915-f09e-4b30-a095-0208e26cddc3', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:01.399 39 INFO tempest.lib.common.rest_client [req-93c7b03b-c38a-4a23-81cc-99b859723b3c ] Request (MiscPolicyActionsRbacTest:test_resume_server): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.186s 2020-11-06 18:20:01.400 39 DEBUG tempest.lib.common.rest_client [req-93c7b03b-c38a-4a23-81cc-99b859723b3c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1734', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-93c7b03b-c38a-4a23-81cc-99b859723b3c', 'x-compute-request-id': 'req-93c7b03b-c38a-4a23-81cc-99b859723b3c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "ACTIVE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:20:01Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:2e:7d:15"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:19:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "suspending", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:02.675 39 INFO tempest.lib.common.rest_client [req-aaf1a978-f083-4226-9ec4-39f893039bc8 ] Request (MiscPolicyActionsRbacTest:test_resume_server): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.257s 2020-11-06 18:20:02.675 39 DEBUG tempest.lib.common.rest_client [req-aaf1a978-f083-4226-9ec4-39f893039bc8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1717', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-aaf1a978-f083-4226-9ec4-39f893039bc8', 'x-compute-request-id': 'req-aaf1a978-f083-4226-9ec4-39f893039bc8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "SUSPENDED", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:20:02Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:2e:7d:15"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:19:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "suspended", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:02.691 39 INFO tempest.common.waiters [-] State transition "ACTIVE/suspending" ==> "SUSPENDED/None" after 1 second wait 2020-11-06 18:20:02.691 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:20:02.747 39 INFO tempest.lib.common.rest_client [req-f723591d-0c74-4ba6-b96f-6c00c21bc52d ] Request (MiscPolicyActionsRbacTest:test_resume_server): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.055s 2020-11-06 18:20:02.747 39 DEBUG tempest.lib.common.rest_client [req-f723591d-0c74-4ba6-b96f-6c00c21bc52d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f723591d-0c74-4ba6-b96f-6c00c21bc52d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:02.787 39 INFO tempest.lib.common.rest_client [req-0274cbe5-1a6a-4bd4-a8a8-b7a3c297c861 ] Request (MiscPolicyActionsRbacTest:test_resume_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:20:02.788 39 DEBUG tempest.lib.common.rest_client [req-0274cbe5-1a6a-4bd4-a8a8-b7a3c297c861 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0274cbe5-1a6a-4bd4-a8a8-b7a3c297c861', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["tlbrmzdlSK6gVpYciN6amg"], "expires_at": "2020-11-06T19:20:02.000000Z", "issued_at": "2020-11-06T18:20:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:03.005 39 INFO tempest.lib.common.rest_client [req-ab567d2a-8042-4cae-a072-8c7fe83728ef ] Request (MiscPolicyActionsRbacTest:test_resume_server): 202 POST http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed/action 0.215s 2020-11-06 18:20:03.005 39 DEBUG tempest.lib.common.rest_client [req-ab567d2a-8042-4cae-a072-8c7fe83728ef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"resume": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ab567d2a-8042-4cae-a072-8c7fe83728ef', 'x-compute-request-id': 'req-ab567d2a-8042-4cae-a072-8c7fe83728ef', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:03.006 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:20:03.065 39 INFO tempest.lib.common.rest_client [req-271b106c-ea01-4048-96f3-9f412368459f ] Request (MiscPolicyActionsRbacTest:test_resume_server): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.058s 2020-11-06 18:20:03.065 39 DEBUG tempest.lib.common.rest_client [req-271b106c-ea01-4048-96f3-9f412368459f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-271b106c-ea01-4048-96f3-9f412368459f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:03.101 39 INFO tempest.lib.common.rest_client [req-c7d5b4b7-d46b-4d2c-bdd8-abbb0497470a ] Request (MiscPolicyActionsRbacTest:test_resume_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:20:03.101 39 DEBUG tempest.lib.common.rest_client [req-c7d5b4b7-d46b-4d2c-bdd8-abbb0497470a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c7d5b4b7-d46b-4d2c-bdd8-abbb0497470a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["6euP1ExFSbqmlfZS3deFEg"], "expires_at": "2020-11-06T19:20:03.000000Z", "issued_at": "2020-11-06T18:20:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:03.395 39 INFO tempest.lib.common.rest_client [req-5b1b1f61-f849-48f9-b894-9e14bb0fdf1b ] Request (MiscPolicyActionsRbacTest:test_resume_server): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.293s 2020-11-06 18:20:03.396 39 DEBUG tempest.lib.common.rest_client [req-5b1b1f61-f849-48f9-b894-9e14bb0fdf1b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1723', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5b1b1f61-f849-48f9-b894-9e14bb0fdf1b', 'x-compute-request-id': 'req-5b1b1f61-f849-48f9-b894-9e14bb0fdf1b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "SUSPENDED", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:20:03Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:2e:7d:15"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:19:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resuming", "OS-EXT-STS:vm_state": "suspended", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:04.602 39 INFO tempest.lib.common.rest_client [req-cac36e76-7c37-4146-bfcf-353f2aa138dc ] Request (MiscPolicyActionsRbacTest:test_resume_server): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.191s 2020-11-06 18:20:04.602 39 DEBUG tempest.lib.common.rest_client [req-cac36e76-7c37-4146-bfcf-353f2aa138dc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1723', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cac36e76-7c37-4146-bfcf-353f2aa138dc', 'x-compute-request-id': 'req-cac36e76-7c37-4146-bfcf-353f2aa138dc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "SUSPENDED", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:20:03Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:2e:7d:15"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:19:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resuming", "OS-EXT-STS:vm_state": "suspended", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:05.819 39 INFO tempest.lib.common.rest_client [req-bc036277-db6f-4781-9fe7-4f6a8aeb5f1d ] Request (MiscPolicyActionsRbacTest:test_resume_server): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.199s 2020-11-06 18:20:05.820 39 DEBUG tempest.lib.common.rest_client [req-bc036277-db6f-4781-9fe7-4f6a8aeb5f1d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1723', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bc036277-db6f-4781-9fe7-4f6a8aeb5f1d', 'x-compute-request-id': 'req-bc036277-db6f-4781-9fe7-4f6a8aeb5f1d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "SUSPENDED", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:20:03Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:2e:7d:15"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:19:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resuming", "OS-EXT-STS:vm_state": "suspended", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:08.137 39 INFO tempest.lib.common.rest_client [req-0d00dbca-905e-43d2-a82c-1459b0eaf580 ] Request (MiscPolicyActionsRbacTest:test_resume_server): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 1.306s 2020-11-06 18:20:08.138 39 DEBUG tempest.lib.common.rest_client [req-0d00dbca-905e-43d2-a82c-1459b0eaf580 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0d00dbca-905e-43d2-a82c-1459b0eaf580', 'x-compute-request-id': 'req-0d00dbca-905e-43d2-a82c-1459b0eaf580', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "ACTIVE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:20:06Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:2e:7d:15"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:19:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:08.153 39 INFO tempest.common.waiters [-] State transition "SUSPENDED/resuming" ==> "ACTIVE/None" after 5 second wait 2020-11-06 18:20:08.371 39 INFO tempest.lib.common.rest_client [req-258527c8-c1d4-43d4-a9d9-db32f83381af ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.213s 2020-11-06 18:20:08.372 39 DEBUG tempest.lib.common.rest_client [req-258527c8-c1d4-43d4-a9d9-db32f83381af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-258527c8-c1d4-43d4-a9d9-db32f83381af', 'x-compute-request-id': 'req-258527c8-c1d4-43d4-a9d9-db32f83381af', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "ACTIVE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:20:06Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:2e:7d:15"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:19:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:08.389 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:20:08.390 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.390 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.390 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.391 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.391 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.392 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.392 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.392 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.393 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.393 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.393 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.394 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.394 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.395 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.395 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.395 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.396 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.396 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.396 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.397 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.397 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.397 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.398 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.398 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.398 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.399 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.399 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.399 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.400 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.400 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.400 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.401 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.401 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.402 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.402 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.402 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.403 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.403 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.403 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.403 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.404 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.404 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.405 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.405 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.405 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.406 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.406 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.406 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.407 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.407 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.407 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.408 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.408 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.408 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.409 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.409 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.410 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.410 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.410 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.411 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.411 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.412 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.412 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.412 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.413 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.413 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.414 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.414 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.414 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.415 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.415 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.415 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.416 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.416 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.416 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:08.417 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-instance-actions:events, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:20:08.417 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:20:08.477 39 INFO tempest.lib.common.rest_client [req-07e7f868-dbbd-4f88-b4dc-d22d4869c552 ] Request (MiscPolicyActionsRbacTest:test_show_instance_action): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.059s 2020-11-06 18:20:08.478 39 DEBUG tempest.lib.common.rest_client [req-07e7f868-dbbd-4f88-b4dc-d22d4869c552 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-07e7f868-dbbd-4f88-b4dc-d22d4869c552', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:08.517 39 INFO tempest.lib.common.rest_client [req-19851509-50d6-46e6-9e72-1be0baa2e71d ] Request (MiscPolicyActionsRbacTest:test_show_instance_action): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:20:08.518 39 DEBUG tempest.lib.common.rest_client [req-19851509-50d6-46e6-9e72-1be0baa2e71d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-19851509-50d6-46e6-9e72-1be0baa2e71d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["ZB7sP5eJT8GS5JQrG7sdlw"], "expires_at": "2020-11-06T19:20:08.000000Z", "issued_at": "2020-11-06T18:20:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:08.655 39 INFO tempest.lib.common.rest_client [req-6684af9b-be78-48a1-8c19-982d3163c8ea ] Request (MiscPolicyActionsRbacTest:test_show_instance_action): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed/os-instance-actions/req-7bf722b0-0ff0-4e4c-b004-5be8a7a4a889 0.135s 2020-11-06 18:20:08.655 39 DEBUG tempest.lib.common.rest_client [req-6684af9b-be78-48a1-8c19-982d3163c8ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '503', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6684af9b-be78-48a1-8c19-982d3163c8ea', 'x-compute-request-id': 'req-6684af9b-be78-48a1-8c19-982d3163c8ea', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed/os-instance-actions/req-7bf722b0-0ff0-4e4c-b004-5be8a7a4a889'} Body: b'{"instanceAction": {"action": "create", "instance_uuid": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "request_id": "req-7bf722b0-0ff0-4e4c-b004-5be8a7a4a889", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "project_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "start_time": "2020-11-06T18:19:50.000000", "message": null, "events": [{"event": "compute__do_build_and_run_instance", "start_time": "2020-11-06T18:19:51.000000", "finish_time": "2020-11-06T18:19:59.000000", "result": "Success", "traceback": null}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:08.662 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:20:08.714 39 INFO tempest.lib.common.rest_client [req-9dd1cb8a-3077-40be-9b82-d59dea0ae5fc ] Request (MiscPolicyActionsRbacTest:test_show_instance_action): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.051s 2020-11-06 18:20:08.715 39 DEBUG tempest.lib.common.rest_client [req-9dd1cb8a-3077-40be-9b82-d59dea0ae5fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9dd1cb8a-3077-40be-9b82-d59dea0ae5fc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:08.752 39 INFO tempest.lib.common.rest_client [req-f3cb91d1-2c81-4bd8-9bed-bb6e7de3761a ] Request (MiscPolicyActionsRbacTest:test_show_instance_action): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:20:08.752 39 DEBUG tempest.lib.common.rest_client [req-f3cb91d1-2c81-4bd8-9bed-bb6e7de3761a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f3cb91d1-2c81-4bd8-9bed-bb6e7de3761a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["bty9wfMLTNOwGrSS-y2Eew"], "expires_at": "2020-11-06T19:20:08.000000Z", "issued_at": "2020-11-06T18:20:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:09.019 39 INFO tempest.lib.common.rest_client [req-65ca759f-1870-435c-8e69-e74efbc2ee9a ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.261s 2020-11-06 18:20:09.020 39 DEBUG tempest.lib.common.rest_client [req-65ca759f-1870-435c-8e69-e74efbc2ee9a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-65ca759f-1870-435c-8e69-e74efbc2ee9a', 'x-compute-request-id': 'req-65ca759f-1870-435c-8e69-e74efbc2ee9a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "ACTIVE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:20:06Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:2e:7d:15"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:19:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:09.036 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:20:09.036 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.037 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.037 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.037 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.038 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.038 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.038 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.039 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.039 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.039 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.040 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.040 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.040 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.040 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.041 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.041 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.041 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.042 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.042 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.042 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.043 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.043 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.043 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.043 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.044 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.044 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.044 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.044 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.045 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.045 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.045 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.045 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.046 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.046 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.046 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.047 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.047 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.048 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.048 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.048 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.048 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.049 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.049 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.049 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.050 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.050 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.050 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.051 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.051 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.051 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.052 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.052 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.052 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.052 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.053 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.053 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.053 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.053 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.054 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.054 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.055 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.055 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.055 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.056 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.056 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.056 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.057 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.057 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.057 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.057 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.058 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.058 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.058 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.059 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.059 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.060 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-server-diagnostics, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:20:09.060 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:20:09.114 39 INFO tempest.lib.common.rest_client [req-b9ac41c0-6864-45a6-b5b3-0da5dd8387d0 ] Request (MiscPolicyActionsRbacTest:test_show_server_diagnostics): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.053s 2020-11-06 18:20:09.114 39 DEBUG tempest.lib.common.rest_client [req-b9ac41c0-6864-45a6-b5b3-0da5dd8387d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b9ac41c0-6864-45a6-b5b3-0da5dd8387d0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:09.150 39 INFO tempest.lib.common.rest_client [req-45b9fc3a-ffbf-4198-8d9a-d39215fe1369 ] Request (MiscPolicyActionsRbacTest:test_show_server_diagnostics): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:20:09.151 39 DEBUG tempest.lib.common.rest_client [req-45b9fc3a-ffbf-4198-8d9a-d39215fe1369 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-45b9fc3a-ffbf-4198-8d9a-d39215fe1369', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["vz79nZ0RSeud0XtAWyw-aQ"], "expires_at": "2020-11-06T19:20:09.000000Z", "issued_at": "2020-11-06T18:20:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:09.308 39 INFO tempest.lib.common.rest_client [req-cf64b6ce-081e-4021-956a-b7820f38074f ] Request (MiscPolicyActionsRbacTest:test_show_server_diagnostics): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed/diagnostics 0.156s 2020-11-06 18:20:09.309 39 DEBUG tempest.lib.common.rest_client [req-cf64b6ce-081e-4021-956a-b7820f38074f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '464', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cf64b6ce-081e-4021-956a-b7820f38074f', 'x-compute-request-id': 'req-cf64b6ce-081e-4021-956a-b7820f38074f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed/diagnostics'} Body: b'{"cpu0_time": 0, "sda_read_req": 0, "sda_read": 0, "sda_write_req": 0, "sda_write": 0, "sda_errors": -1, "tap4672cd78-05_rx": 1568, "tap4672cd78-05_rx_packets": 11, "tap4672cd78-05_rx_errors": 0, "tap4672cd78-05_rx_drop": 0, "tap4672cd78-05_tx": 1088, "tap4672cd78-05_tx_packets": 14, "tap4672cd78-05_tx_errors": 0, "tap4672cd78-05_tx_drop": 0, "memory": 524288, "memory-actual": 524288, "memory-swap_in": 0, "memory-last_update": 1604686805, "memory-rss": 143252}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:09.310 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:20:09.364 39 INFO tempest.lib.common.rest_client [req-15754d14-38b4-4ef8-8dd5-795dd2ad89ec ] Request (MiscPolicyActionsRbacTest:test_show_server_diagnostics): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.053s 2020-11-06 18:20:09.365 39 DEBUG tempest.lib.common.rest_client [req-15754d14-38b4-4ef8-8dd5-795dd2ad89ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-15754d14-38b4-4ef8-8dd5-795dd2ad89ec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:09.398 39 INFO tempest.lib.common.rest_client [req-df7a68dd-251c-48fa-a641-286589808f9d ] Request (MiscPolicyActionsRbacTest:test_show_server_diagnostics): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:20:09.399 39 DEBUG tempest.lib.common.rest_client [req-df7a68dd-251c-48fa-a641-286589808f9d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-df7a68dd-251c-48fa-a641-286589808f9d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["eMAlv4gDTuyw7qHADLCM0g"], "expires_at": "2020-11-06T19:20:09.000000Z", "issued_at": "2020-11-06T18:20:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:09.664 39 INFO tempest.lib.common.rest_client [req-e72a6283-beb2-43f4-b857-60c4ace92951 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.257s 2020-11-06 18:20:09.664 39 DEBUG tempest.lib.common.rest_client [req-e72a6283-beb2-43f4-b857-60c4ace92951 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e72a6283-beb2-43f4-b857-60c4ace92951', 'x-compute-request-id': 'req-e72a6283-beb2-43f4-b857-60c4ace92951', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "ACTIVE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:20:06Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:2e:7d:15"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:19:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:09.680 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:20:09.681 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.681 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.682 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.682 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.682 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.683 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.683 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.683 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.684 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.684 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.684 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.685 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.685 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.685 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.685 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.686 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.686 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.686 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.687 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.687 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.687 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.687 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.688 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.688 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.688 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.688 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.689 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.689 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.689 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.690 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.690 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.690 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.690 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.691 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.691 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.691 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.691 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.692 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.692 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.692 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.692 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.693 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.693 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.693 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.694 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.694 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.694 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.695 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.695 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.695 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.695 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.696 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.696 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.696 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.696 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.697 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.697 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.697 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.698 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.698 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.698 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.699 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.699 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.699 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.700 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.700 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.700 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.700 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.701 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.701 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.701 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.701 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.702 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.702 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.702 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:09.703 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-simple-tenant-usage:show, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:20:09.704 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:20:09.758 39 INFO tempest.lib.common.rest_client [req-56162e54-e447-4a00-939d-9909e9185de3 ] Request (MiscPolicyActionsRbacTest:test_show_simple_tenant_usage): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.054s 2020-11-06 18:20:09.759 39 DEBUG tempest.lib.common.rest_client [req-56162e54-e447-4a00-939d-9909e9185de3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-56162e54-e447-4a00-939d-9909e9185de3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:09.802 39 INFO tempest.lib.common.rest_client [req-ac591805-770e-4dec-a693-4a5dd25236f7 ] Request (MiscPolicyActionsRbacTest:test_show_simple_tenant_usage): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-11-06 18:20:09.803 39 DEBUG tempest.lib.common.rest_client [req-ac591805-770e-4dec-a693-4a5dd25236f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ac591805-770e-4dec-a693-4a5dd25236f7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["shbEb6HhQbumPHdgQ5Uwcg"], "expires_at": "2020-11-06T19:20:09.000000Z", "issued_at": "2020-11-06T18:20:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:09.910 39 INFO tempest.lib.common.rest_client [req-c5f2deef-e712-42a4-90a5-6421b5828107 ] Request (MiscPolicyActionsRbacTest:test_show_simple_tenant_usage): 200 GET http://172.30.13.94/compute/v2.1/os-simple-tenant-usage/84fe7a8341b649fb95fb2fd72ffe24c1 0.106s 2020-11-06 18:20:09.911 39 DEBUG tempest.lib.common.rest_client [req-c5f2deef-e712-42a4-90a5-6421b5828107 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '758', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c5f2deef-e712-42a4-90a5-6421b5828107', 'x-compute-request-id': 'req-c5f2deef-e712-42a4-90a5-6421b5828107', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-simple-tenant-usage/84fe7a8341b649fb95fb2fd72ffe24c1'} Body: b'{"tenant_usage": {"tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "server_usages": [{"hours": 3.3333333333333334e-09, "flavor": "patrole_reader-flavor_30048f18-b96b-4343-a720-1173982b59b8", "instance_id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "memory_mb": 512, "local_gb": 1, "vcpus": 1, "started_at": "2020-11-06T18:19:58.000000", "ended_at": null, "state": "active", "uptime": 11}], "total_local_gb_usage": 3.3333333333333334e-09, "total_vcpus_usage": 3.3333333333333334e-09, "total_memory_mb_usage": 1.7066666666666667e-06, "total_hours": 3.3333333333333334e-09, "start": "2020-11-06T18:20:09.883094", "stop": "2020-11-06T18:20:09.883106"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:09.918 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:20:09.979 39 INFO tempest.lib.common.rest_client [req-aba26612-fb8b-4668-9d9f-0df87efe47e2 ] Request (MiscPolicyActionsRbacTest:test_show_simple_tenant_usage): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.059s 2020-11-06 18:20:09.979 39 DEBUG tempest.lib.common.rest_client [req-aba26612-fb8b-4668-9d9f-0df87efe47e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aba26612-fb8b-4668-9d9f-0df87efe47e2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:10.010 39 INFO tempest.lib.common.rest_client [req-f6aa02e5-492c-4b36-bddf-dfa9766fbc5b ] Request (MiscPolicyActionsRbacTest:test_show_simple_tenant_usage): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.030s 2020-11-06 18:20:10.011 39 DEBUG tempest.lib.common.rest_client [req-f6aa02e5-492c-4b36-bddf-dfa9766fbc5b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f6aa02e5-492c-4b36-bddf-dfa9766fbc5b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["vMnr7ioHRUyZNReds3q0tQ"], "expires_at": "2020-11-06T19:20:10.000000Z", "issued_at": "2020-11-06T18:20:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:11.379 39 INFO tempest.lib.common.rest_client [req-e0ecde15-ea21-414e-ad4e-c99e2aca767e ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 1.364s 2020-11-06 18:20:11.380 39 DEBUG tempest.lib.common.rest_client [req-e0ecde15-ea21-414e-ad4e-c99e2aca767e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e0ecde15-ea21-414e-ad4e-c99e2aca767e', 'x-compute-request-id': 'req-e0ecde15-ea21-414e-ad4e-c99e2aca767e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "ACTIVE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:20:06Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:2e:7d:15"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:19:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:11.396 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:20:11.396 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.397 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.397 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.397 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.398 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.398 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.399 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.399 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.399 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.400 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.400 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.400 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.401 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.401 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.401 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.401 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.402 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.402 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.402 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.403 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.403 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.403 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.404 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.404 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.404 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.404 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.405 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.405 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.405 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.406 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.406 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.406 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.406 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.407 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.407 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.407 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.407 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.408 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.408 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.408 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.409 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.409 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.409 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.410 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.410 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.410 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.410 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.411 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.411 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.411 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.411 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.412 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.412 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.412 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.413 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.413 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.413 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.413 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.414 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.414 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.415 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.415 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.416 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.416 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.417 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.417 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.418 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.418 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.418 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.419 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.419 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.419 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.420 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.420 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.420 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:11.422 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-suspend-server:suspend, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:20:11.422 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:20:11.477 39 INFO tempest.lib.common.rest_client [req-1ffe12ea-87e4-4d15-b526-fcc9ad291d7e ] Request (MiscPolicyActionsRbacTest:test_suspend_server): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.054s 2020-11-06 18:20:11.477 39 DEBUG tempest.lib.common.rest_client [req-1ffe12ea-87e4-4d15-b526-fcc9ad291d7e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1ffe12ea-87e4-4d15-b526-fcc9ad291d7e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:11.514 39 INFO tempest.lib.common.rest_client [req-42e18695-faeb-4ba4-9a18-a4a0bfacf0f5 ] Request (MiscPolicyActionsRbacTest:test_suspend_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:20:11.515 39 DEBUG tempest.lib.common.rest_client [req-42e18695-faeb-4ba4-9a18-a4a0bfacf0f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-42e18695-faeb-4ba4-9a18-a4a0bfacf0f5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["p2ined71TJycwsNAtK_Stg"], "expires_at": "2020-11-06T19:20:11.000000Z", "issued_at": "2020-11-06T18:20:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:11.778 39 INFO tempest.lib.common.rest_client [req-d61fb0c1-6a6a-4fc0-bdfc-ee3ff1c87c7a ] Request (MiscPolicyActionsRbacTest:test_suspend_server): 202 POST http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed/action 0.262s 2020-11-06 18:20:11.778 39 DEBUG tempest.lib.common.rest_client [req-d61fb0c1-6a6a-4fc0-bdfc-ee3ff1c87c7a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"suspend": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d61fb0c1-6a6a-4fc0-bdfc-ee3ff1c87c7a', 'x-compute-request-id': 'req-d61fb0c1-6a6a-4fc0-bdfc-ee3ff1c87c7a', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:11.778 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:20:11.840 39 INFO tempest.lib.common.rest_client [req-8478ea06-f5fb-42a9-b601-fa1468e540a9 ] Request (MiscPolicyActionsRbacTest:test_suspend_server): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.061s 2020-11-06 18:20:11.841 39 DEBUG tempest.lib.common.rest_client [req-8478ea06-f5fb-42a9-b601-fa1468e540a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8478ea06-f5fb-42a9-b601-fa1468e540a9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:11.879 39 INFO tempest.lib.common.rest_client [req-e3ab9d89-d149-4694-b261-51ef8d862366 ] Request (MiscPolicyActionsRbacTest:test_suspend_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:20:11.880 39 DEBUG tempest.lib.common.rest_client [req-e3ab9d89-d149-4694-b261-51ef8d862366 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e3ab9d89-d149-4694-b261-51ef8d862366', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["OBKpjsUMTDWZLw2zConA4Q"], "expires_at": "2020-11-06T19:20:11.000000Z", "issued_at": "2020-11-06T18:20:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:12.171 39 INFO tempest.lib.common.rest_client [req-75363e2a-4717-4ce8-bfe2-d34016a7d9ce ] Request (MiscPolicyActionsRbacTest:test_suspend_server): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.289s 2020-11-06 18:20:12.172 39 DEBUG tempest.lib.common.rest_client [req-75363e2a-4717-4ce8-bfe2-d34016a7d9ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1734', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-75363e2a-4717-4ce8-bfe2-d34016a7d9ce', 'x-compute-request-id': 'req-75363e2a-4717-4ce8-bfe2-d34016a7d9ce', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "ACTIVE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:20:12Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:2e:7d:15"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:19:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "suspending", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:13.402 39 INFO tempest.lib.common.rest_client [req-f68ae009-64fb-4f51-9daa-22ed642f5d24 ] Request (MiscPolicyActionsRbacTest:test_suspend_server): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.215s 2020-11-06 18:20:13.402 39 DEBUG tempest.lib.common.rest_client [req-f68ae009-64fb-4f51-9daa-22ed642f5d24 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1717', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f68ae009-64fb-4f51-9daa-22ed642f5d24', 'x-compute-request-id': 'req-f68ae009-64fb-4f51-9daa-22ed642f5d24', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "SUSPENDED", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:20:13Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:2e:7d:15"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:19:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "suspended", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:13.416 39 INFO tempest.common.waiters [-] State transition "ACTIVE/suspending" ==> "SUSPENDED/None" after 1 second wait 2020-11-06 18:20:13.577 39 INFO tempest.lib.common.rest_client [req-06380743-a056-4342-a570-137bbed5f107 ] Request (MiscPolicyActionsRbacTest:_run_cleanups): 202 POST http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed/action 0.160s 2020-11-06 18:20:13.577 39 DEBUG tempest.lib.common.rest_client [req-06380743-a056-4342-a570-137bbed5f107 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"resume": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-06380743-a056-4342-a570-137bbed5f107', 'x-compute-request-id': 'req-06380743-a056-4342-a570-137bbed5f107', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:13.860 39 INFO tempest.lib.common.rest_client [req-6079b83d-71b8-47a7-a55f-e4628be4f470 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.276s 2020-11-06 18:20:13.861 39 DEBUG tempest.lib.common.rest_client [req-6079b83d-71b8-47a7-a55f-e4628be4f470 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1723', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6079b83d-71b8-47a7-a55f-e4628be4f470', 'x-compute-request-id': 'req-6079b83d-71b8-47a7-a55f-e4628be4f470', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "SUSPENDED", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:20:14Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:2e:7d:15"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:19:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resuming", "OS-EXT-STS:vm_state": "suspended", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:15.112 39 INFO tempest.lib.common.rest_client [req-2eda367e-9c29-4737-b7f9-84a46b42e04a ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.234s 2020-11-06 18:20:15.112 39 DEBUG tempest.lib.common.rest_client [req-2eda367e-9c29-4737-b7f9-84a46b42e04a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1723', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2eda367e-9c29-4737-b7f9-84a46b42e04a', 'x-compute-request-id': 'req-2eda367e-9c29-4737-b7f9-84a46b42e04a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "SUSPENDED", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:20:14Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:2e:7d:15"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:19:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resuming", "OS-EXT-STS:vm_state": "suspended", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:16.371 39 INFO tempest.lib.common.rest_client [req-4700de79-d55f-4880-9449-003f8312955a ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.241s 2020-11-06 18:20:16.371 39 DEBUG tempest.lib.common.rest_client [req-4700de79-d55f-4880-9449-003f8312955a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1723', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4700de79-d55f-4880-9449-003f8312955a', 'x-compute-request-id': 'req-4700de79-d55f-4880-9449-003f8312955a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "SUSPENDED", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:20:14Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:2e:7d:15"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:19:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resuming", "OS-EXT-STS:vm_state": "suspended", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:17.595 39 INFO tempest.lib.common.rest_client [req-9990289d-93f4-4b59-b268-e9c927a71558 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.212s 2020-11-06 18:20:17.596 39 DEBUG tempest.lib.common.rest_client [req-9990289d-93f4-4b59-b268-e9c927a71558 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9990289d-93f4-4b59-b268-e9c927a71558', 'x-compute-request-id': 'req-9990289d-93f4-4b59-b268-e9c927a71558', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "ACTIVE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:20:16Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:2e:7d:15"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:19:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:17.608 39 INFO tempest.common.waiters [-] State transition "SUSPENDED/resuming" ==> "ACTIVE/None" after 4 second wait 2020-11-06 18:20:17.608 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:20:17.609 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.609 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.610 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.610 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.610 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.611 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.611 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.611 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.612 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.612 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.612 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.613 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.613 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.613 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.614 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.614 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.614 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.614 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.615 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.615 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.615 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.616 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.616 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.616 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.616 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.617 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.617 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.617 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.618 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.618 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.618 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.618 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.619 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.619 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.619 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.620 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.620 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.620 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.620 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.621 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.621 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.621 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.622 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.622 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.622 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.622 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.623 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.623 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.623 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.624 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.624 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.624 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.624 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.625 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.625 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.625 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.626 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.626 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.626 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.626 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.627 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.627 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.628 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.628 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.628 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.628 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.629 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.629 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.629 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.630 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.630 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.630 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.630 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.631 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.631 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:17.632 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-lock-server:unlock, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:20:17.802 39 INFO tempest.lib.common.rest_client [req-8c20a573-7781-44da-b73a-7356187bb8d0 ] Request (MiscPolicyActionsRbacTest:test_unlock_server): 202 POST http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed/action 0.169s 2020-11-06 18:20:17.803 39 DEBUG tempest.lib.common.rest_client [req-8c20a573-7781-44da-b73a-7356187bb8d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"lock": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8c20a573-7781-44da-b73a-7356187bb8d0', 'x-compute-request-id': 'req-8c20a573-7781-44da-b73a-7356187bb8d0', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:17.803 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:20:17.852 39 INFO tempest.lib.common.rest_client [req-0c5356a2-8a94-4b0f-a946-c1931daf076b ] Request (MiscPolicyActionsRbacTest:test_unlock_server): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.048s 2020-11-06 18:20:17.853 39 DEBUG tempest.lib.common.rest_client [req-0c5356a2-8a94-4b0f-a946-c1931daf076b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0c5356a2-8a94-4b0f-a946-c1931daf076b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:17.888 39 INFO tempest.lib.common.rest_client [req-7825977b-b568-4397-9109-6d679da9e74f ] Request (MiscPolicyActionsRbacTest:test_unlock_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:20:17.889 39 DEBUG tempest.lib.common.rest_client [req-7825977b-b568-4397-9109-6d679da9e74f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7825977b-b568-4397-9109-6d679da9e74f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["z_zePf_iRiCMh3jiYakfUg"], "expires_at": "2020-11-06T19:20:17.000000Z", "issued_at": "2020-11-06T18:20:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:18.098 39 INFO tempest.lib.common.rest_client [req-f8c5ab18-274d-4841-a088-d67e44475be6 ] Request (MiscPolicyActionsRbacTest:test_unlock_server): 202 POST http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed/action 0.208s 2020-11-06 18:20:18.099 39 DEBUG tempest.lib.common.rest_client [req-f8c5ab18-274d-4841-a088-d67e44475be6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"unlock": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f8c5ab18-274d-4841-a088-d67e44475be6', 'x-compute-request-id': 'req-f8c5ab18-274d-4841-a088-d67e44475be6', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:18.099 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:20:18.152 39 INFO tempest.lib.common.rest_client [req-922f932c-b816-4ae9-b346-7f73339d5e95 ] Request (MiscPolicyActionsRbacTest:test_unlock_server): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.052s 2020-11-06 18:20:18.152 39 DEBUG tempest.lib.common.rest_client [req-922f932c-b816-4ae9-b346-7f73339d5e95 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-922f932c-b816-4ae9-b346-7f73339d5e95', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:18.191 39 INFO tempest.lib.common.rest_client [req-8836aa63-39dd-41ff-b1b4-e1e5f2165265 ] Request (MiscPolicyActionsRbacTest:test_unlock_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:20:18.192 39 DEBUG tempest.lib.common.rest_client [req-8836aa63-39dd-41ff-b1b4-e1e5f2165265 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8836aa63-39dd-41ff-b1b4-e1e5f2165265', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["FjkHlobkTse3v7hpLdjiMQ"], "expires_at": "2020-11-06T19:20:18.000000Z", "issued_at": "2020-11-06T18:20:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:18.468 39 INFO tempest.lib.common.rest_client [req-6635df6f-e3bd-4aec-8463-caedf2133a54 ] Request (MiscPolicyActionsRbacTest:_run_cleanups): 202 POST http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed/action 0.275s 2020-11-06 18:20:18.469 39 DEBUG tempest.lib.common.rest_client [req-6635df6f-e3bd-4aec-8463-caedf2133a54 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"unlock": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6635df6f-e3bd-4aec-8463-caedf2133a54', 'x-compute-request-id': 'req-6635df6f-e3bd-4aec-8463-caedf2133a54', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:18.688 39 INFO tempest.lib.common.rest_client [req-9a562590-5ff5-4182-847f-fd511226b81c ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.213s 2020-11-06 18:20:18.688 39 DEBUG tempest.lib.common.rest_client [req-9a562590-5ff5-4182-847f-fd511226b81c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9a562590-5ff5-4182-847f-fd511226b81c', 'x-compute-request-id': 'req-9a562590-5ff5-4182-847f-fd511226b81c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "ACTIVE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:20:18Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:2e:7d:15"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:19:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:18.698 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:20:18.699 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.699 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.699 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.700 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.700 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.701 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.701 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.701 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.702 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.702 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.702 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.702 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.703 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.703 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.703 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.704 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.704 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.704 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.704 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.705 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.705 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.705 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.706 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.706 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.706 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.706 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.707 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.707 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.707 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.708 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.708 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.708 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.708 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.709 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.709 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.709 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.709 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.710 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.710 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.710 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.711 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.711 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.711 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.711 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.712 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.712 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.712 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.713 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.713 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.713 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.714 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.714 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.714 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.714 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.715 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.715 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.715 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.716 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.716 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.716 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.717 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.717 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.717 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.718 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.718 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.718 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.718 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.719 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.719 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.719 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.720 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.720 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.720 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.720 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.721 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.722 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-lock-server:unlock, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:20:18.722 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:20:18.722 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.723 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.723 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.723 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.724 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.724 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.725 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.725 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.725 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.725 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.726 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.726 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.726 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.727 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.727 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.727 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.727 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.728 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.728 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.728 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.728 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.729 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.729 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.729 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.729 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.730 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.730 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.730 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.730 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.731 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.731 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.731 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.731 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.732 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.732 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.732 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.732 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.733 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.733 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.733 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.734 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.734 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.734 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.734 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.735 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.735 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.735 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.736 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.736 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.736 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.736 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.737 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.737 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.737 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.738 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.738 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.738 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.738 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.739 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.739 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.740 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.740 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.740 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.740 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.741 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.741 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.741 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.742 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.742 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.742 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.742 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.743 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.743 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.743 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.743 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:18.744 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-lock-server:unlock:unlock_override, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:20:19.083 39 INFO tempest.lib.common.rest_client [req-82911b19-e390-4f68-b59a-3c01c1743c22 ] Request (MiscPolicyActionsRbacTest:test_unlock_server_override): 202 POST http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed/action 0.339s 2020-11-06 18:20:19.084 39 DEBUG tempest.lib.common.rest_client [req-82911b19-e390-4f68-b59a-3c01c1743c22 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"lock": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-82911b19-e390-4f68-b59a-3c01c1743c22', 'x-compute-request-id': 'req-82911b19-e390-4f68-b59a-3c01c1743c22', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:19.085 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:20:19.133 39 INFO tempest.lib.common.rest_client [req-26ce9bb4-92c4-4a0a-b93f-150172c867fb ] Request (MiscPolicyActionsRbacTest:test_unlock_server_override): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.047s 2020-11-06 18:20:19.134 39 DEBUG tempest.lib.common.rest_client [req-26ce9bb4-92c4-4a0a-b93f-150172c867fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-26ce9bb4-92c4-4a0a-b93f-150172c867fb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:19.163 39 INFO tempest.lib.common.rest_client [req-6d9676a0-d143-478a-b11a-8c3c1f2ef5d7 ] Request (MiscPolicyActionsRbacTest:test_unlock_server_override): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.028s 2020-11-06 18:20:19.164 39 DEBUG tempest.lib.common.rest_client [req-6d9676a0-d143-478a-b11a-8c3c1f2ef5d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6d9676a0-d143-478a-b11a-8c3c1f2ef5d7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["8YLFeC3ESAClTcx_qEMHRA"], "expires_at": "2020-11-06T19:20:19.000000Z", "issued_at": "2020-11-06T18:20:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:19.411 39 INFO tempest.lib.common.rest_client [req-292da6f7-853a-4aac-9f27-d3db24f882f4 ] Request (MiscPolicyActionsRbacTest:test_unlock_server_override): 202 POST http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed/action 0.246s 2020-11-06 18:20:19.411 39 DEBUG tempest.lib.common.rest_client [req-292da6f7-853a-4aac-9f27-d3db24f882f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"unlock": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-292da6f7-853a-4aac-9f27-d3db24f882f4', 'x-compute-request-id': 'req-292da6f7-853a-4aac-9f27-d3db24f882f4', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:19.412 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:20:19.458 39 INFO tempest.lib.common.rest_client [req-d8ecce1a-185f-469d-a231-d504d240ac10 ] Request (MiscPolicyActionsRbacTest:test_unlock_server_override): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.045s 2020-11-06 18:20:19.459 39 DEBUG tempest.lib.common.rest_client [req-d8ecce1a-185f-469d-a231-d504d240ac10 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d8ecce1a-185f-469d-a231-d504d240ac10', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:19.500 39 INFO tempest.lib.common.rest_client [req-16b4a2fb-d5bb-45e0-a31a-64e255229f33 ] Request (MiscPolicyActionsRbacTest:test_unlock_server_override): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:20:19.501 39 DEBUG tempest.lib.common.rest_client [req-16b4a2fb-d5bb-45e0-a31a-64e255229f33 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-16b4a2fb-d5bb-45e0-a31a-64e255229f33', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["bJ1C9LRATIODwun1iifEIA"], "expires_at": "2020-11-06T19:20:19.000000Z", "issued_at": "2020-11-06T18:20:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:19.818 39 INFO tempest.lib.common.rest_client [req-ba2a85bd-8922-48d9-bbad-595f86c5c9c9 ] Request (MiscPolicyActionsRbacTest:_run_cleanups): 202 POST http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed/action 0.315s 2020-11-06 18:20:19.818 39 DEBUG tempest.lib.common.rest_client [req-ba2a85bd-8922-48d9-bbad-595f86c5c9c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"unlock": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ba2a85bd-8922-48d9-bbad-595f86c5c9c9', 'x-compute-request-id': 'req-ba2a85bd-8922-48d9-bbad-595f86c5c9c9', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:20.077 39 INFO tempest.lib.common.rest_client [req-74310727-501b-4027-9eca-31da11c9fa2c ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.247s 2020-11-06 18:20:20.077 39 DEBUG tempest.lib.common.rest_client [req-74310727-501b-4027-9eca-31da11c9fa2c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-74310727-501b-4027-9eca-31da11c9fa2c', 'x-compute-request-id': 'req-74310727-501b-4027-9eca-31da11c9fa2c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "ACTIVE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:20:20Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:2e:7d:15"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:19:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:20.086 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:20:20.086 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.087 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.087 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.088 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.088 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.088 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.089 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.089 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.089 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.090 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.090 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.090 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.091 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.091 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.091 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.092 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.092 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.092 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.092 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.093 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.093 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.094 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.094 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.094 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.094 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.095 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.095 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.095 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.095 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.096 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.096 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.096 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.097 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.097 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.097 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.097 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.098 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.098 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.098 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.099 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.099 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.099 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.099 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.100 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.100 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.100 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.101 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.101 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.101 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.101 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.102 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.102 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.102 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.103 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.103 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.103 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.103 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.104 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.104 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.104 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.105 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.105 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.105 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.106 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.106 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.106 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.107 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.107 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.107 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.107 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.108 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.108 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.108 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.109 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.109 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:20.110 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-rescue, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:20:20.292 39 INFO tempest.lib.common.rest_client [req-b4a1c7c4-39e8-42d7-8474-5c326b81c6ff ] Request (MiscPolicyActionsRbacTest:test_unrescue_server): 200 POST http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed/action 0.181s 2020-11-06 18:20:20.293 39 DEBUG tempest.lib.common.rest_client [req-b4a1c7c4-39e8-42d7-8474-5c326b81c6ff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"rescue": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '29', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b4a1c7c4-39e8-42d7-8474-5c326b81c6ff', 'x-compute-request-id': 'req-b4a1c7c4-39e8-42d7-8474-5c326b81c6ff', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed/action'} Body: b'{"adminPass": "L96AiFRgMUUD"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:20.587 39 INFO tempest.lib.common.rest_client [req-54cd0033-ce33-4a92-9cc2-e85e25efa7ca ] Request (MiscPolicyActionsRbacTest:test_unrescue_server): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.292s 2020-11-06 18:20:20.588 39 DEBUG tempest.lib.common.rest_client [req-54cd0033-ce33-4a92-9cc2-e85e25efa7ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-54cd0033-ce33-4a92-9cc2-e85e25efa7ca', 'x-compute-request-id': 'req-54cd0033-ce33-4a92-9cc2-e85e25efa7ca', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "ACTIVE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:20:20Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:2e:7d:15"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:19:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "rescuing", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:21.815 39 INFO tempest.lib.common.rest_client [req-24325625-78f4-44e6-ad5b-41322d71f103 ] Request (MiscPolicyActionsRbacTest:test_unrescue_server): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.210s 2020-11-06 18:20:21.815 39 DEBUG tempest.lib.common.rest_client [req-24325625-78f4-44e6-ad5b-41322d71f103 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-24325625-78f4-44e6-ad5b-41322d71f103', 'x-compute-request-id': 'req-24325625-78f4-44e6-ad5b-41322d71f103', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "ACTIVE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:20:20Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:2e:7d:15"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:19:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "rescuing", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:23.104 39 INFO tempest.lib.common.rest_client [req-37423869-b8be-479f-a5b8-9cffab5aea4d ] Request (MiscPolicyActionsRbacTest:test_unrescue_server): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.271s 2020-11-06 18:20:23.104 39 DEBUG tempest.lib.common.rest_client [req-37423869-b8be-479f-a5b8-9cffab5aea4d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-37423869-b8be-479f-a5b8-9cffab5aea4d', 'x-compute-request-id': 'req-37423869-b8be-479f-a5b8-9cffab5aea4d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "ACTIVE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:20:20Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:2e:7d:15"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:19:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "rescuing", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:24.387 39 INFO tempest.lib.common.rest_client [req-3a0c9cea-74a1-4f19-8818-43551f9a71f8 ] Request (MiscPolicyActionsRbacTest:test_unrescue_server): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.266s 2020-11-06 18:20:24.388 39 DEBUG tempest.lib.common.rest_client [req-3a0c9cea-74a1-4f19-8818-43551f9a71f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3a0c9cea-74a1-4f19-8818-43551f9a71f8', 'x-compute-request-id': 'req-3a0c9cea-74a1-4f19-8818-43551f9a71f8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "ACTIVE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:20:20Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:2e:7d:15"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:19:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "rescuing", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:25.619 39 INFO tempest.lib.common.rest_client [req-c19c89f0-cacc-4cb0-b88b-701a73af3069 ] Request (MiscPolicyActionsRbacTest:test_unrescue_server): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.214s 2020-11-06 18:20:25.619 39 DEBUG tempest.lib.common.rest_client [req-c19c89f0-cacc-4cb0-b88b-701a73af3069 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c19c89f0-cacc-4cb0-b88b-701a73af3069', 'x-compute-request-id': 'req-c19c89f0-cacc-4cb0-b88b-701a73af3069', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:20:24Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:2e:7d:15"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:20:24.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:25.629 39 INFO tempest.common.waiters [-] State transition "ACTIVE/rescuing" ==> "RESCUE/None" after 5 second wait 2020-11-06 18:20:25.629 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:20:25.679 39 INFO tempest.lib.common.rest_client [req-9f683d17-5fcd-4a0a-9f26-2151410f46e9 ] Request (MiscPolicyActionsRbacTest:test_unrescue_server): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.049s 2020-11-06 18:20:25.680 39 DEBUG tempest.lib.common.rest_client [req-9f683d17-5fcd-4a0a-9f26-2151410f46e9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9f683d17-5fcd-4a0a-9f26-2151410f46e9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:25.716 39 INFO tempest.lib.common.rest_client [req-c454b98d-f426-44f8-b374-ed09e89d7f5c ] Request (MiscPolicyActionsRbacTest:test_unrescue_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:20:25.717 39 DEBUG tempest.lib.common.rest_client [req-c454b98d-f426-44f8-b374-ed09e89d7f5c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c454b98d-f426-44f8-b374-ed09e89d7f5c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["qfDUYwZvSJ6SR4uxpqHbSQ"], "expires_at": "2020-11-06T19:20:25.000000Z", "issued_at": "2020-11-06T18:20:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:25.939 39 INFO tempest.lib.common.rest_client [req-e35fc0b7-f764-45b7-b919-fa2bcce95275 ] Request (MiscPolicyActionsRbacTest:test_unrescue_server): 202 POST http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed/action 0.220s 2020-11-06 18:20:25.939 39 DEBUG tempest.lib.common.rest_client [req-e35fc0b7-f764-45b7-b919-fa2bcce95275 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"unrescue": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e35fc0b7-f764-45b7-b919-fa2bcce95275', 'x-compute-request-id': 'req-e35fc0b7-f764-45b7-b919-fa2bcce95275', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:25.940 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:20:25.998 39 INFO tempest.lib.common.rest_client [req-bd8be300-5b07-4628-8798-88543ef35564 ] Request (MiscPolicyActionsRbacTest:test_unrescue_server): 200 GET http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles 0.057s 2020-11-06 18:20:25.999 39 DEBUG tempest.lib.common.rest_client [req-bd8be300-5b07-4628-8798-88543ef35564 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bd8be300-5b07-4628-8798-88543ef35564', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1/users/5a8a3e690bdf4f61b579ba9aef950d54/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:26.032 39 INFO tempest.lib.common.rest_client [req-968fab76-3240-42cd-889b-6fa3a431d6fe ] Request (MiscPolicyActionsRbacTest:test_unrescue_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:20:26.032 39 DEBUG tempest.lib.common.rest_client [req-968fab76-3240-42cd-889b-6fa3a431d6fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-968fab76-3240-42cd-889b-6fa3a431d6fe', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5a8a3e690bdf4f61b579ba9aef950d54", "name": "tempest-MiscPolicyActionsRbacTest-1125392547", "password_expires_at": null}, "audit_ids": ["oSHKHhFJTTCvhQkz_eRijw"], "expires_at": "2020-11-06T19:20:26.000000Z", "issued_at": "2020-11-06T18:20:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84fe7a8341b649fb95fb2fd72ffe24c1", "name": "tempest-MiscPolicyActionsRbacTest-1125392547"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_84fe7a8341b649fb95fb2fd72ffe24c1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:26.292 39 INFO tempest.lib.common.rest_client [req-e4d8d854-6f35-4221-8753-a184f339e231 ] Request (MiscPolicyActionsRbacTest:test_unrescue_server): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.258s 2020-11-06 18:20:26.292 39 DEBUG tempest.lib.common.rest_client [req-e4d8d854-6f35-4221-8753-a184f339e231 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1720', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e4d8d854-6f35-4221-8753-a184f339e231', 'x-compute-request-id': 'req-e4d8d854-6f35-4221-8753-a184f339e231', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:20:26Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:2e:7d:15"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:20:24.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "unrescuing", "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:27.503 39 INFO tempest.lib.common.rest_client [req-3b1eca66-636e-42ba-beb4-a11cbd114192 ] Request (MiscPolicyActionsRbacTest:test_unrescue_server): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.194s 2020-11-06 18:20:27.504 39 DEBUG tempest.lib.common.rest_client [req-3b1eca66-636e-42ba-beb4-a11cbd114192 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1720', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3b1eca66-636e-42ba-beb4-a11cbd114192', 'x-compute-request-id': 'req-3b1eca66-636e-42ba-beb4-a11cbd114192', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:20:26Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:2e:7d:15"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:20:24.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "unrescuing", "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:28.744 39 INFO tempest.lib.common.rest_client [req-40dc9f12-ac9e-468d-850b-47bbcfa18c4e ] Request (MiscPolicyActionsRbacTest:test_unrescue_server): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.223s 2020-11-06 18:20:28.744 39 DEBUG tempest.lib.common.rest_client [req-40dc9f12-ac9e-468d-850b-47bbcfa18c4e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1720', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-40dc9f12-ac9e-468d-850b-47bbcfa18c4e', 'x-compute-request-id': 'req-40dc9f12-ac9e-468d-850b-47bbcfa18c4e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "RESCUE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:20:26Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:2e:7d:15"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:20:24.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "unrescuing", "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:29.971 39 INFO tempest.lib.common.rest_client [req-ba47b1f2-15ab-4e26-906a-d39fba9ea44b ] Request (MiscPolicyActionsRbacTest:test_unrescue_server): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.210s 2020-11-06 18:20:29.972 39 DEBUG tempest.lib.common.rest_client [req-ba47b1f2-15ab-4e26-906a-d39fba9ea44b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ba47b1f2-15ab-4e26-906a-d39fba9ea44b', 'x-compute-request-id': 'req-ba47b1f2-15ab-4e26-906a-d39fba9ea44b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "ACTIVE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:20:29Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:2e:7d:15"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:20:24.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:29.983 39 INFO tempest.common.waiters [-] State transition "RESCUE/unrescuing" ==> "ACTIVE/None" after 3 second wait 2020-11-06 18:20:30.160 39 INFO tempest.lib.common.rest_client [req-e9cfb1e9-a975-438c-b41e-d2b860b21337 ] Request (MiscPolicyActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.170s 2020-11-06 18:20:30.160 39 DEBUG tempest.lib.common.rest_client [req-e9cfb1e9-a975-438c-b41e-d2b860b21337 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e9cfb1e9-a975-438c-b41e-d2b860b21337', 'x-compute-request-id': 'req-e9cfb1e9-a975-438c-b41e-d2b860b21337', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:30.373 39 INFO tempest.lib.common.rest_client [req-3a6fdd9a-d966-43a4-814d-1f1ab4d579ec ] Request (MiscPolicyActionsRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.212s 2020-11-06 18:20:30.374 39 DEBUG tempest.lib.common.rest_client [req-3a6fdd9a-d966-43a4-814d-1f1ab4d579ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3a6fdd9a-d966-43a4-814d-1f1ab4d579ec', 'x-compute-request-id': 'req-3a6fdd9a-d966-43a4-814d-1f1ab4d579ec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "ACTIVE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:20:30Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:2e:7d:15"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:20:24.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:31.613 39 INFO tempest.lib.common.rest_client [req-b324d2c6-4516-4116-b3c6-9a240484c022 ] Request (MiscPolicyActionsRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.223s 2020-11-06 18:20:31.614 39 DEBUG tempest.lib.common.rest_client [req-b324d2c6-4516-4116-b3c6-9a240484c022 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b324d2c6-4516-4116-b3c6-9a240484c022', 'x-compute-request-id': 'req-b324d2c6-4516-4116-b3c6-9a240484c022', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "ACTIVE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:20:31Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:2e:7d:15"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:20:24.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:32.966 39 INFO tempest.lib.common.rest_client [req-7c01b969-4f1d-4ac9-9ce4-ff7034a5c4f2 ] Request (MiscPolicyActionsRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.333s 2020-11-06 18:20:32.966 39 DEBUG tempest.lib.common.rest_client [req-7c01b969-4f1d-4ac9-9ce4-ff7034a5c4f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7c01b969-4f1d-4ac9-9ce4-ff7034a5c4f2', 'x-compute-request-id': 'req-7c01b969-4f1d-4ac9-9ce4-ff7034a5c4f2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"server": {"id": "c5822aa4-1ba4-45eb-820f-ebf42ee600ed", "name": "tempest-MiscPolicyActionsRbacTest-server-1548141301", "status": "ACTIVE", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "user_id": "5a8a3e690bdf4f61b579ba9aef950d54", "metadata": {}, "hostId": "70580e2641bf1e738f81143d5b12622346bfd002e9926409205486d4", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:19:50Z", "updated": "2020-11-06T18:20:31Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-1175378110-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:2e:7d:15"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:20:24.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-000033ff", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:34.046 39 INFO tempest.lib.common.rest_client [req-3d92bffb-1ede-4812-a7a9-0a24d7dcef29 ] Request (MiscPolicyActionsRbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed 0.063s 2020-11-06 18:20:34.046 39 DEBUG tempest.lib.common.rest_client [req-3d92bffb-1ede-4812-a7a9-0a24d7dcef29 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-3d92bffb-1ede-4812-a7a9-0a24d7dcef29', 'x-compute-request-id': 'req-3d92bffb-1ede-4812-a7a9-0a24d7dcef29', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c5822aa4-1ba4-45eb-820f-ebf42ee600ed'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance c5822aa4-1ba4-45eb-820f-ebf42ee600ed could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:34.108 39 INFO tempest.lib.common.rest_client [req-42da9afb-539c-4e2f-a225-43cbe3b39009 ] Request (MiscPolicyActionsRbacTest:tearDownClass): 404 DELETE http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.060s 2020-11-06 18:20:34.108 39 DEBUG tempest.lib.common.rest_client [req-42da9afb-539c-4e2f-a225-43cbe3b39009 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-42da9afb-539c-4e2f-a225-43cbe3b39009', 'x-compute-request-id': 'req-42da9afb-539c-4e2f-a225-43cbe3b39009', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance b6c318f8-9f56-44d7-b88d-e3d75a84eaeb could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:34.172 39 INFO tempest.lib.common.rest_client [req-9686fa40-00e7-4df1-af9b-3d979e45f25e ] Request (MiscPolicyActionsRbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb 0.063s 2020-11-06 18:20:34.173 39 DEBUG tempest.lib.common.rest_client [req-9686fa40-00e7-4df1-af9b-3d979e45f25e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-9686fa40-00e7-4df1-af9b-3d979e45f25e', 'x-compute-request-id': 'req-9686fa40-00e7-4df1-af9b-3d979e45f25e', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b6c318f8-9f56-44d7-b88d-e3d75a84eaeb'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance b6c318f8-9f56-44d7-b88d-e3d75a84eaeb could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:34.240 39 INFO tempest.lib.common.rest_client [req-71bf4d7c-08ef-4557-bbf1-c95accb9a58b ] Request (MiscPolicyActionsRbacTest:tearDownClass): 404 DELETE http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1 0.066s 2020-11-06 18:20:34.240 39 DEBUG tempest.lib.common.rest_client [req-71bf4d7c-08ef-4557-bbf1-c95accb9a58b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-71bf4d7c-08ef-4557-bbf1-c95accb9a58b', 'x-compute-request-id': 'req-71bf4d7c-08ef-4557-bbf1-c95accb9a58b', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 9f7166ff-0cd0-4173-84b6-b032b85215d1 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:34.298 39 INFO tempest.lib.common.rest_client [req-eae88678-42d3-4b96-ac5c-1fc838682fd7 ] Request (MiscPolicyActionsRbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1 0.057s 2020-11-06 18:20:34.298 39 DEBUG tempest.lib.common.rest_client [req-eae88678-42d3-4b96-ac5c-1fc838682fd7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-eae88678-42d3-4b96-ac5c-1fc838682fd7', 'x-compute-request-id': 'req-eae88678-42d3-4b96-ac5c-1fc838682fd7', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/9f7166ff-0cd0-4173-84b6-b032b85215d1'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 9f7166ff-0cd0-4173-84b6-b032b85215d1 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:34.299 39 DEBUG tempest.lib.common.dynamic_creds [-] Clearing network: {'id': 'f291e8f0-9113-415f-ade6-f3a87c3b01bd', 'name': 'tempest-MiscPolicyActionsRbacTest-1175378110-network', 'tenant_id': '84fe7a8341b649fb95fb2fd72ffe24c1', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '84fe7a8341b649fb95fb2fd72ffe24c1', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 45, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T18:14:02Z', 'updated_at': '2020-11-06T18:14:03Z', 'revision_number': 1}, subnet: {'id': '0d54ddde-bfc2-439e-8bb0-2775006ca13f', 'name': 'tempest-MiscPolicyActionsRbacTest-1175378110-subnet', 'tenant_id': '84fe7a8341b649fb95fb2fd72ffe24c1', 'network_id': 'f291e8f0-9113-415f-ade6-f3a87c3b01bd', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-11-06T18:14:03Z', 'updated_at': '2020-11-06T18:14:03Z', 'revision_number': 0, 'project_id': '84fe7a8341b649fb95fb2fd72ffe24c1'}, router: {'id': '9fd2a658-6517-4974-8a38-99663bc7a1be', 'name': 'tempest-MiscPolicyActionsRbacTest-1175378110-router', 'tenant_id': '84fe7a8341b649fb95fb2fd72ffe24c1', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.175'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::3cc'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-11-06T18:14:03Z', 'updated_at': '2020-11-06T18:14:04Z', 'revision_number': 3, 'project_id': '84fe7a8341b649fb95fb2fd72ffe24c1'} _clear_isolated_net_resources /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/dynamic_creds.py:418 2020-11-06 18:20:36.376 39 INFO tempest.lib.common.rest_client [req-a6de69c4-2813-4050-9340-1f24d4a07bff ] Request (MiscPolicyActionsRbacTest:tearDownClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/9fd2a658-6517-4974-8a38-99663bc7a1be/remove_router_interface 2.076s 2020-11-06 18:20:36.377 39 DEBUG tempest.lib.common.rest_client [req-a6de69c4-2813-4050-9340-1f24d4a07bff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "0d54ddde-bfc2-439e-8bb0-2775006ca13f"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-a6de69c4-2813-4050-9340-1f24d4a07bff', 'date': 'Fri, 06 Nov 2020 18:20:36 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/9fd2a658-6517-4974-8a38-99663bc7a1be/remove_router_interface'} Body: b'{"id": "9fd2a658-6517-4974-8a38-99663bc7a1be", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "port_id": "a45cf0fa-e605-4c66-a455-c90f623b2e8a", "network_id": "f291e8f0-9113-415f-ade6-f3a87c3b01bd", "subnet_id": "0d54ddde-bfc2-439e-8bb0-2775006ca13f", "subnet_ids": ["0d54ddde-bfc2-439e-8bb0-2775006ca13f"]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:38.640 39 INFO tempest.lib.common.rest_client [req-90816fae-0868-4dda-ae96-7a3d849d7c95 ] Request (MiscPolicyActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/9fd2a658-6517-4974-8a38-99663bc7a1be 2.261s 2020-11-06 18:20:38.640 39 DEBUG tempest.lib.common.rest_client [req-90816fae-0868-4dda-ae96-7a3d849d7c95 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-90816fae-0868-4dda-ae96-7a3d849d7c95', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:20:38 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/9fd2a658-6517-4974-8a38-99663bc7a1be'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:39.065 39 INFO tempest.lib.common.rest_client [req-75d3747b-80ea-46b8-8bf1-ce84bc038091 ] Request (MiscPolicyActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/0d54ddde-bfc2-439e-8bb0-2775006ca13f 0.421s 2020-11-06 18:20:39.065 39 DEBUG tempest.lib.common.rest_client [req-75d3747b-80ea-46b8-8bf1-ce84bc038091 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-75d3747b-80ea-46b8-8bf1-ce84bc038091', 'date': 'Fri, 06 Nov 2020 18:20:39 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/0d54ddde-bfc2-439e-8bb0-2775006ca13f'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:39.621 39 INFO tempest.lib.common.rest_client [req-511cfdcf-93ee-4f48-8c79-4ea849090fa8 ] Request (MiscPolicyActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/f291e8f0-9113-415f-ade6-f3a87c3b01bd 0.555s 2020-11-06 18:20:39.622 39 DEBUG tempest.lib.common.rest_client [req-511cfdcf-93ee-4f48-8c79-4ea849090fa8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-511cfdcf-93ee-4f48-8c79-4ea849090fa8', 'date': 'Fri, 06 Nov 2020 18:20:39 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/f291e8f0-9113-415f-ade6-f3a87c3b01bd'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:39.622 39 DEBUG tempest.lib.common.dynamic_creds [-] Clearing network: {'id': '4d16ddb5-d3a3-446f-b983-8567b36e3fd9', 'name': 'tempest-MiscPolicyActionsRbacTest-42776558-network', 'tenant_id': 'a3d19c5b75ac4389bcf7e4fede97c4ab', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': 'a3d19c5b75ac4389bcf7e4fede97c4ab', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 49, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T18:14:07Z', 'updated_at': '2020-11-06T18:14:08Z', 'revision_number': 1}, subnet: {'id': '092ca89b-51bf-4f41-9c91-080051451c86', 'name': 'tempest-MiscPolicyActionsRbacTest-42776558-subnet', 'tenant_id': 'a3d19c5b75ac4389bcf7e4fede97c4ab', 'network_id': '4d16ddb5-d3a3-446f-b983-8567b36e3fd9', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-11-06T18:14:08Z', 'updated_at': '2020-11-06T18:14:08Z', 'revision_number': 0, 'project_id': 'a3d19c5b75ac4389bcf7e4fede97c4ab'}, router: {'id': '27b5137f-8bba-4d80-b8ca-eaa60597259b', 'name': 'tempest-MiscPolicyActionsRbacTest-42776558-router', 'tenant_id': 'a3d19c5b75ac4389bcf7e4fede97c4ab', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.13'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::2d7'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-11-06T18:14:08Z', 'updated_at': '2020-11-06T18:14:10Z', 'revision_number': 3, 'project_id': 'a3d19c5b75ac4389bcf7e4fede97c4ab'} _clear_isolated_net_resources /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/dynamic_creds.py:418 2020-11-06 18:20:41.416 39 INFO tempest.lib.common.rest_client [req-b2990256-9f6d-4011-8f51-fc518724018f ] Request (MiscPolicyActionsRbacTest:tearDownClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/27b5137f-8bba-4d80-b8ca-eaa60597259b/remove_router_interface 1.793s 2020-11-06 18:20:41.417 39 DEBUG tempest.lib.common.rest_client [req-b2990256-9f6d-4011-8f51-fc518724018f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "092ca89b-51bf-4f41-9c91-080051451c86"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-b2990256-9f6d-4011-8f51-fc518724018f', 'date': 'Fri, 06 Nov 2020 18:20:41 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/27b5137f-8bba-4d80-b8ca-eaa60597259b/remove_router_interface'} Body: b'{"id": "27b5137f-8bba-4d80-b8ca-eaa60597259b", "tenant_id": "a3d19c5b75ac4389bcf7e4fede97c4ab", "port_id": "ea01712c-f54b-4840-8de0-4e0e2d7bb591", "network_id": "4d16ddb5-d3a3-446f-b983-8567b36e3fd9", "subnet_id": "092ca89b-51bf-4f41-9c91-080051451c86", "subnet_ids": ["092ca89b-51bf-4f41-9c91-080051451c86"]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:42.607 39 INFO tempest.lib.common.rest_client [req-59530b74-bcbc-42a3-96c4-76af36a044b4 ] Request (MiscPolicyActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/27b5137f-8bba-4d80-b8ca-eaa60597259b 1.188s 2020-11-06 18:20:42.607 39 DEBUG tempest.lib.common.rest_client [req-59530b74-bcbc-42a3-96c4-76af36a044b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-59530b74-bcbc-42a3-96c4-76af36a044b4', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:20:42 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/27b5137f-8bba-4d80-b8ca-eaa60597259b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:43.017 39 INFO tempest.lib.common.rest_client [req-c90bc06b-f406-4c55-9c22-cd9efc89028a ] Request (MiscPolicyActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/092ca89b-51bf-4f41-9c91-080051451c86 0.409s 2020-11-06 18:20:43.018 39 DEBUG tempest.lib.common.rest_client [req-c90bc06b-f406-4c55-9c22-cd9efc89028a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-c90bc06b-f406-4c55-9c22-cd9efc89028a', 'date': 'Fri, 06 Nov 2020 18:20:43 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/092ca89b-51bf-4f41-9c91-080051451c86'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:43.677 39 INFO tempest.lib.common.rest_client [req-0e9af2fb-b4c1-475a-a9c6-a593f3a63678 ] Request (MiscPolicyActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/4d16ddb5-d3a3-446f-b983-8567b36e3fd9 0.658s 2020-11-06 18:20:43.677 39 DEBUG tempest.lib.common.rest_client [req-0e9af2fb-b4c1-475a-a9c6-a593f3a63678 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-0e9af2fb-b4c1-475a-a9c6-a593f3a63678', 'date': 'Fri, 06 Nov 2020 18:20:43 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/4d16ddb5-d3a3-446f-b983-8567b36e3fd9'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:43.806 39 INFO tempest.lib.common.rest_client [req-3c07ef64-45bf-4c3b-98d8-2a52f17fa79c ] Request (MiscPolicyActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/5a8a3e690bdf4f61b579ba9aef950d54 0.127s 2020-11-06 18:20:43.806 39 DEBUG tempest.lib.common.rest_client [req-3c07ef64-45bf-4c3b-98d8-2a52f17fa79c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3c07ef64-45bf-4c3b-98d8-2a52f17fa79c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/5a8a3e690bdf4f61b579ba9aef950d54'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:43.863 39 INFO tempest.lib.common.rest_client [req-18888590-911b-49d5-896e-09b7045003ab ] Request (MiscPolicyActionsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=84fe7a8341b649fb95fb2fd72ffe24c1&name=default 0.056s 2020-11-06 18:20:43.864 39 DEBUG tempest.lib.common.rest_client [req-18888590-911b-49d5-896e-09b7045003ab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-18888590-911b-49d5-896e-09b7045003ab', 'date': 'Fri, 06 Nov 2020 18:20:43 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=84fe7a8341b649fb95fb2fd72ffe24c1&name=default'} Body: b'{"security_groups": [{"id": "ac8e541b-5f53-4dc8-bd9c-819bb3517bb2", "name": "default", "stateful": true, "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "description": "Default security group", "security_group_rules": [{"id": "4c8c0d67-683c-4a12-8f8e-f1881eb2cd6b", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "security_group_id": "ac8e541b-5f53-4dc8-bd9c-819bb3517bb2", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "ac8e541b-5f53-4dc8-bd9c-819bb3517bb2", "description": null, "tags": [], "created_at": "2020-11-06T18:14:02Z", "updated_at": "2020-11-06T18:14:02Z", "revision_number": 0, "project_id": "84fe7a8341b649fb95fb2fd72ffe24c1"}, {"id": "552d2c5d-3e1b-4c5b-a7ce-cb589754e988", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "security_group_id": "ac8e541b-5f53-4dc8-bd9c-819bb3517bb2", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:14:02Z", "updated_at": "2020-11-06T18:14:02Z", "revision_number": 0, "project_id": "84fe7a8341b649fb95fb2fd72ffe24c1"}, {"id": "67e98996-4cb2-4842-8713-1fd64076ee60", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "security_group_id": "ac8e541b-5f53-4dc8-bd9c-819bb3517bb2", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:14:02Z", "updated_at": "2020-11-06T18:14:02Z", "revision_number": 0, "project_id": "84fe7a8341b649fb95fb2fd72ffe24c1"}, {"id": "ef678995-14c3-4641-9a58-aa1e276e5a85", "tenant_id": "84fe7a8341b649fb95fb2fd72ffe24c1", "security_group_id": "ac8e541b-5f53-4dc8-bd9c-819bb3517bb2", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "ac8e541b-5f53-4dc8-bd9c-819bb3517bb2", "description": null, "tags": [], "created_at": "2020-11-06T18:14:02Z", "updated_at": "2020-11-06T18:14:02Z", "revision_number": 0, "project_id": "84fe7a8341b649fb95fb2fd72ffe24c1"}], "tags": [], "created_at": "2020-11-06T18:14:02Z", "updated_at": "2020-11-06T18:14:02Z", "revision_number": 1, "project_id": "84fe7a8341b649fb95fb2fd72ffe24c1"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:44.003 39 INFO tempest.lib.common.rest_client [req-53d1a539-254d-42ae-90e6-a7267c971216 ] Request (MiscPolicyActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/ac8e541b-5f53-4dc8-bd9c-819bb3517bb2 0.138s 2020-11-06 18:20:44.004 39 DEBUG tempest.lib.common.rest_client [req-53d1a539-254d-42ae-90e6-a7267c971216 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-53d1a539-254d-42ae-90e6-a7267c971216', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:20:44 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/ac8e541b-5f53-4dc8-bd9c-819bb3517bb2'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:44.191 39 INFO tempest.lib.common.rest_client [req-f82ad88e-0902-462a-8686-2737cff0fe78 ] Request (MiscPolicyActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1 0.186s 2020-11-06 18:20:44.192 39 DEBUG tempest.lib.common.rest_client [req-f82ad88e-0902-462a-8686-2737cff0fe78 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f82ad88e-0902-462a-8686-2737cff0fe78', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/84fe7a8341b649fb95fb2fd72ffe24c1'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:44.388 39 INFO tempest.lib.common.rest_client [req-33efb6be-811e-4ae4-933c-5e20febd9867 ] Request (MiscPolicyActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/78dd6249f56e4304ae2b5aee14c2b015 0.195s 2020-11-06 18:20:44.389 39 DEBUG tempest.lib.common.rest_client [req-33efb6be-811e-4ae4-933c-5e20febd9867 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-33efb6be-811e-4ae4-933c-5e20febd9867', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/78dd6249f56e4304ae2b5aee14c2b015'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:44.431 39 INFO tempest.lib.common.rest_client [req-a373a4f1-c999-4099-b78b-d1131adbadc7 ] Request (MiscPolicyActionsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=a3d19c5b75ac4389bcf7e4fede97c4ab&name=default 0.041s 2020-11-06 18:20:44.431 39 DEBUG tempest.lib.common.rest_client [req-a373a4f1-c999-4099-b78b-d1131adbadc7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-a373a4f1-c999-4099-b78b-d1131adbadc7', 'date': 'Fri, 06 Nov 2020 18:20:44 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=a3d19c5b75ac4389bcf7e4fede97c4ab&name=default'} Body: b'{"security_groups": [{"id": "75ca9cbf-a036-4a16-8979-e45b6d00563b", "name": "default", "stateful": true, "tenant_id": "a3d19c5b75ac4389bcf7e4fede97c4ab", "description": "Default security group", "security_group_rules": [{"id": "0a3c8120-c018-4687-a71b-c1ab1be1bd8a", "tenant_id": "a3d19c5b75ac4389bcf7e4fede97c4ab", "security_group_id": "75ca9cbf-a036-4a16-8979-e45b6d00563b", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:14:07Z", "updated_at": "2020-11-06T18:14:07Z", "revision_number": 0, "project_id": "a3d19c5b75ac4389bcf7e4fede97c4ab"}, {"id": "2de38ab1-57d8-40bf-803f-0221508847be", "tenant_id": "a3d19c5b75ac4389bcf7e4fede97c4ab", "security_group_id": "75ca9cbf-a036-4a16-8979-e45b6d00563b", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "75ca9cbf-a036-4a16-8979-e45b6d00563b", "description": null, "tags": [], "created_at": "2020-11-06T18:14:07Z", "updated_at": "2020-11-06T18:14:07Z", "revision_number": 0, "project_id": "a3d19c5b75ac4389bcf7e4fede97c4ab"}, {"id": "53e3b7df-fcb1-4809-b031-9c6bb4d2c212", "tenant_id": "a3d19c5b75ac4389bcf7e4fede97c4ab", "security_group_id": "75ca9cbf-a036-4a16-8979-e45b6d00563b", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "75ca9cbf-a036-4a16-8979-e45b6d00563b", "description": null, "tags": [], "created_at": "2020-11-06T18:14:07Z", "updated_at": "2020-11-06T18:14:07Z", "revision_number": 0, "project_id": "a3d19c5b75ac4389bcf7e4fede97c4ab"}, {"id": "d3915b24-b9ef-471c-9783-3473cfc6cb00", "tenant_id": "a3d19c5b75ac4389bcf7e4fede97c4ab", "security_group_id": "75ca9cbf-a036-4a16-8979-e45b6d00563b", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:14:07Z", "updated_at": "2020-11-06T18:14:07Z", "revision_number": 0, "project_id": "a3d19c5b75ac4389bcf7e4fede97c4ab"}], "tags": [], "created_at": "2020-11-06T18:14:07Z", "updated_at": "2020-11-06T18:14:07Z", "revision_number": 1, "project_id": "a3d19c5b75ac4389bcf7e4fede97c4ab"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:44.559 39 INFO tempest.lib.common.rest_client [req-9b552e57-2bee-4cf1-97e8-a19b7d80f686 ] Request (MiscPolicyActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/75ca9cbf-a036-4a16-8979-e45b6d00563b 0.126s 2020-11-06 18:20:44.560 39 DEBUG tempest.lib.common.rest_client [req-9b552e57-2bee-4cf1-97e8-a19b7d80f686 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-9b552e57-2bee-4cf1-97e8-a19b7d80f686', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:20:44 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/75ca9cbf-a036-4a16-8979-e45b6d00563b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:44.756 39 INFO tempest.lib.common.rest_client [req-dab47df9-70d6-4b81-8345-62165af36975 ] Request (MiscPolicyActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/a3d19c5b75ac4389bcf7e4fede97c4ab 0.194s 2020-11-06 18:20:44.756 39 DEBUG tempest.lib.common.rest_client [req-dab47df9-70d6-4b81-8345-62165af36975 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dab47df9-70d6-4b81-8345-62165af36975', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a3d19c5b75ac4389bcf7e4fede97c4ab'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:44.857 39 INFO tempest.lib.common.rest_client [req-c88fac29-5e10-4ca7-ae5f-871b007ce97b ] Request (ServicesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-11-06 18:20:44.858 39 DEBUG tempest.lib.common.rest_client [req-c88fac29-5e10-4ca7-ae5f-871b007ce97b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c88fac29-5e10-4ca7-ae5f-871b007ce97b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["XrCwzpI4Q0uflBmYBQOwIw"], "expires_at": "2020-11-06T19:20:44.000000Z", "issued_at": "2020-11-06T18:20:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:44.912 39 INFO tempest.lib.common.rest_client [req-271e7c21-df4e-436b-8c4f-e431dad7d824 ] Request (ServicesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-11-06 18:20:44.913 39 DEBUG tempest.lib.common.rest_client [req-271e7c21-df4e-436b-8c4f-e431dad7d824 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-271e7c21-df4e-436b-8c4f-e431dad7d824', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["9KRNO_q-TcigW603aP6TrQ"], "expires_at": "2020-11-06T19:20:44.000000Z", "issued_at": "2020-11-06T18:20:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:44.975 39 INFO tempest.lib.common.rest_client [req-a2f31fa5-ef80-419b-a672-a9b4a3e453f9 ] Request (ServicesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.060s 2020-11-06 18:20:44.975 39 DEBUG tempest.lib.common.rest_client [req-a2f31fa5-ef80-419b-a672-a9b4a3e453f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a2f31fa5-ef80-419b-a672-a9b4a3e453f9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:45.039 39 INFO tempest.lib.common.rest_client [req-0f52f4b1-81eb-4a3b-91fa-728388d9ebda ] Request (ServicesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.063s 2020-11-06 18:20:45.040 39 DEBUG tempest.lib.common.rest_client [req-0f52f4b1-81eb-4a3b-91fa-728388d9ebda ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ServicesRbacTest-539884070-desc", "domain_id": "default", "name": "tempest-ServicesRbacTest-539884070"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '368', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0f52f4b1-81eb-4a3b-91fa-728388d9ebda', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "3df4aa180caa4d30839745dfa8273c8f", "name": "tempest-ServicesRbacTest-539884070", "domain_id": "default", "description": "tempest-ServicesRbacTest-539884070-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/3df4aa180caa4d30839745dfa8273c8f"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:45.159 39 INFO tempest.lib.common.rest_client [req-20b13729-0cb9-4414-8285-70e18c8056c0 ] Request (ServicesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.118s 2020-11-06 18:20:45.160 39 DEBUG tempest.lib.common.rest_client [req-20b13729-0cb9-4414-8285-70e18c8056c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ServicesRbacTest-539884070", "password": "P1+H_cAKigzu!Do", "project_id": "3df4aa180caa4d30839745dfa8273c8f", "email": "tempest-ServicesRbacTest-599364709@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '386', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-20b13729-0cb9-4414-8285-70e18c8056c0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "3df4aa180caa4d30839745dfa8273c8f", "email": "tempest-ServicesRbacTest-599364709@example.com", "id": "47050dee17a24b3baa507801812b4ebd", "name": "tempest-ServicesRbacTest-539884070", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/47050dee17a24b3baa507801812b4ebd"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:45.211 39 INFO tempest.lib.common.rest_client [req-752bdd9b-7e5a-4712-870b-d523dbfa629e ] Request (ServicesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.049s 2020-11-06 18:20:45.211 39 DEBUG tempest.lib.common.rest_client [req-752bdd9b-7e5a-4712-870b-d523dbfa629e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-752bdd9b-7e5a-4712-870b-d523dbfa629e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:45.258 39 INFO tempest.lib.common.rest_client [req-04c9d5d0-410a-4fd4-9fae-a6efb3e1d65b ] Request (ServicesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.046s 2020-11-06 18:20:45.258 39 DEBUG tempest.lib.common.rest_client [req-04c9d5d0-410a-4fd4-9fae-a6efb3e1d65b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-04c9d5d0-410a-4fd4-9fae-a6efb3e1d65b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:45.321 39 INFO tempest.lib.common.rest_client [req-de9d14c3-c65f-4893-b7b1-9d16458cbd18 ] Request (ServicesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/3df4aa180caa4d30839745dfa8273c8f/users/47050dee17a24b3baa507801812b4ebd/roles/72a4576c553448cd941b052c1ca0cf2d 0.061s 2020-11-06 18:20:45.321 39 DEBUG tempest.lib.common.rest_client [req-de9d14c3-c65f-4893-b7b1-9d16458cbd18 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-de9d14c3-c65f-4893-b7b1-9d16458cbd18', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3df4aa180caa4d30839745dfa8273c8f/users/47050dee17a24b3baa507801812b4ebd/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:45.322 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServicesRbacTest-539884070', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '3df4aa180caa4d30839745dfa8273c8f', 'project_name': 'tempest-ServicesRbacTest-539884070', 'tenant_id': '3df4aa180caa4d30839745dfa8273c8f', 'tenant_name': 'tempest-ServicesRbacTest-539884070', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '47050dee17a24b3baa507801812b4ebd'}, Network: None, Subnet: None, Router: None 2020-11-06 18:20:45.322 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServicesRbacTest-539884070', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '3df4aa180caa4d30839745dfa8273c8f', 'project_name': 'tempest-ServicesRbacTest-539884070', 'tenant_id': '3df4aa180caa4d30839745dfa8273c8f', 'tenant_name': 'tempest-ServicesRbacTest-539884070', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '47050dee17a24b3baa507801812b4ebd'}, Network: None, Subnet: None, Router: None 2020-11-06 18:20:45.433 39 INFO tempest.lib.common.rest_client [req-892eb7a1-b151-495d-9516-a3fa395e3732 ] Request (ServicesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.101s 2020-11-06 18:20:45.433 39 DEBUG tempest.lib.common.rest_client [req-892eb7a1-b151-495d-9516-a3fa395e3732 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6561', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-892eb7a1-b151-495d-9516-a3fa395e3732', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "47050dee17a24b3baa507801812b4ebd", "name": "tempest-ServicesRbacTest-539884070", "password_expires_at": null}, "audit_ids": ["cTCDcqDkRo6WFkpYuUDFyg"], "expires_at": "2020-11-06T19:20:45.000000Z", "issued_at": "2020-11-06T18:20:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3df4aa180caa4d30839745dfa8273c8f", "name": "tempest-ServicesRbacTest-539884070"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3df4aa180caa4d30839745dfa8273c8f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3df4aa180caa4d30839745dfa8273c8f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3df4aa180caa4d30839745dfa8273c8f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3df4aa180caa4d30839745dfa8273c8f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3df4aa180caa4d30839745dfa8273c8f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3df4aa180caa4d30839745dfa8273c8f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:45.517 39 INFO tempest.lib.common.rest_client [req-72bdc85e-9885-4ae0-80a2-b1282930b1a6 ] Request (ServicesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 18:20:45.518 39 DEBUG tempest.lib.common.rest_client [req-72bdc85e-9885-4ae0-80a2-b1282930b1a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-72bdc85e-9885-4ae0-80a2-b1282930b1a6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["_I5ydpA2TsKR0vO9OlwXZA"], "expires_at": "2020-11-06T19:20:45.000000Z", "issued_at": "2020-11-06T18:20:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:45.561 39 INFO tempest.lib.common.rest_client [req-0ad8ad93-7669-4ea3-b6cd-2500c046fd28 ] Request (ServicesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:20:45.562 39 DEBUG tempest.lib.common.rest_client [req-0ad8ad93-7669-4ea3-b6cd-2500c046fd28 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0ad8ad93-7669-4ea3-b6cd-2500c046fd28', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["xo05nThxS7GBMW9NFNvXvA"], "expires_at": "2020-11-06T19:20:45.000000Z", "issued_at": "2020-11-06T18:20:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:45.611 39 INFO tempest.lib.common.rest_client [req-7d18d678-c869-41ba-91a6-887958a7338e ] Request (ServicesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.048s 2020-11-06 18:20:45.611 39 DEBUG tempest.lib.common.rest_client [req-7d18d678-c869-41ba-91a6-887958a7338e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7d18d678-c869-41ba-91a6-887958a7338e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:45.657 39 INFO tempest.lib.common.rest_client [req-cee45008-bf89-4670-b8a8-8d3f39a17988 ] Request (ServicesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.045s 2020-11-06 18:20:45.657 39 DEBUG tempest.lib.common.rest_client [req-cee45008-bf89-4670-b8a8-8d3f39a17988 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cee45008-bf89-4670-b8a8-8d3f39a17988', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:45.658 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:20:45.658 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:20:45.700 39 INFO tempest.lib.common.rest_client [req-6ff0ec79-7663-4ac3-8f15-adfa9a625f50 ] Request (ServicesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/3df4aa180caa4d30839745dfa8273c8f/users/47050dee17a24b3baa507801812b4ebd/roles 0.042s 2020-11-06 18:20:45.701 39 DEBUG tempest.lib.common.rest_client [req-6ff0ec79-7663-4ac3-8f15-adfa9a625f50 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6ff0ec79-7663-4ac3-8f15-adfa9a625f50', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3df4aa180caa4d30839745dfa8273c8f/users/47050dee17a24b3baa507801812b4ebd/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3df4aa180caa4d30839745dfa8273c8f/users/47050dee17a24b3baa507801812b4ebd/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:45.754 39 INFO tempest.lib.common.rest_client [req-c1b6cb13-a198-41e4-b78f-37f741c62aff ] Request (ServicesRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/3df4aa180caa4d30839745dfa8273c8f/users/47050dee17a24b3baa507801812b4ebd/roles/72a4576c553448cd941b052c1ca0cf2d 0.052s 2020-11-06 18:20:45.754 39 DEBUG tempest.lib.common.rest_client [req-c1b6cb13-a198-41e4-b78f-37f741c62aff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c1b6cb13-a198-41e4-b78f-37f741c62aff', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3df4aa180caa4d30839745dfa8273c8f/users/47050dee17a24b3baa507801812b4ebd/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:45.863 39 INFO tempest.lib.common.rest_client [req-e25e1409-b925-4fb2-b654-e26427f809c5 ] Request (ServicesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/3df4aa180caa4d30839745dfa8273c8f/users/47050dee17a24b3baa507801812b4ebd/roles/a629c95d64b3416fb80ae90af4f69c05 0.108s 2020-11-06 18:20:45.864 39 DEBUG tempest.lib.common.rest_client [req-e25e1409-b925-4fb2-b654-e26427f809c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e25e1409-b925-4fb2-b654-e26427f809c5', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3df4aa180caa4d30839745dfa8273c8f/users/47050dee17a24b3baa507801812b4ebd/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:46.945 39 INFO tempest.lib.common.rest_client [req-43debd24-3e96-4d4c-9701-405cb79c07dd ] Request (ServicesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.079s 2020-11-06 18:20:46.945 39 DEBUG tempest.lib.common.rest_client [req-43debd24-3e96-4d4c-9701-405cb79c07dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-43debd24-3e96-4d4c-9701-405cb79c07dd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "47050dee17a24b3baa507801812b4ebd", "name": "tempest-ServicesRbacTest-539884070", "password_expires_at": null}, "audit_ids": ["V0aUrLyZTVmcdaPwVg4G5A"], "expires_at": "2020-11-06T19:20:46.000000Z", "issued_at": "2020-11-06T18:20:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3df4aa180caa4d30839745dfa8273c8f", "name": "tempest-ServicesRbacTest-539884070"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3df4aa180caa4d30839745dfa8273c8f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3df4aa180caa4d30839745dfa8273c8f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3df4aa180caa4d30839745dfa8273c8f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3df4aa180caa4d30839745dfa8273c8f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3df4aa180caa4d30839745dfa8273c8f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3df4aa180caa4d30839745dfa8273c8f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:46.948 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:20:46.949 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.950 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.950 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.951 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.951 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.952 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.953 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.953 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.954 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.954 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.955 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.955 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.956 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.956 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.957 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.957 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.957 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.958 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.958 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.958 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.959 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.959 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.959 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.959 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.960 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.960 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.960 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.961 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.961 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.961 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.961 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.962 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.962 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.962 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.963 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.963 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.963 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.963 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.964 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.964 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.964 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.964 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.965 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.965 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.965 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.966 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.966 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.966 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.967 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.967 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.967 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.967 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.968 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.968 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.968 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.969 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.969 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.969 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.969 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.970 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.970 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.971 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.971 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.971 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.971 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.972 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.972 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.972 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.973 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.973 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.973 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.973 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.974 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.974 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.974 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:46.975 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-services:list, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:20:46.976 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:20:47.080 39 INFO tempest.lib.common.rest_client [req-fcee7ab7-994c-4447-8fcb-62c8e76086a5 ] Request (ServicesRbacTest:test_list_services): 200 GET http://172.30.13.94/identity/v3/projects/3df4aa180caa4d30839745dfa8273c8f/users/47050dee17a24b3baa507801812b4ebd/roles 0.103s 2020-11-06 18:20:47.080 39 DEBUG tempest.lib.common.rest_client [req-fcee7ab7-994c-4447-8fcb-62c8e76086a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fcee7ab7-994c-4447-8fcb-62c8e76086a5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3df4aa180caa4d30839745dfa8273c8f/users/47050dee17a24b3baa507801812b4ebd/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3df4aa180caa4d30839745dfa8273c8f/users/47050dee17a24b3baa507801812b4ebd/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:47.120 39 INFO tempest.lib.common.rest_client [req-a62734a8-05dc-4054-ad8e-1bf9ad6c23d1 ] Request (ServicesRbacTest:test_list_services): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:20:47.121 39 DEBUG tempest.lib.common.rest_client [req-a62734a8-05dc-4054-ad8e-1bf9ad6c23d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a62734a8-05dc-4054-ad8e-1bf9ad6c23d1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "47050dee17a24b3baa507801812b4ebd", "name": "tempest-ServicesRbacTest-539884070", "password_expires_at": null}, "audit_ids": ["0q06FgtLR923rXHiFpqxYw"], "expires_at": "2020-11-06T19:20:47.000000Z", "issued_at": "2020-11-06T18:20:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3df4aa180caa4d30839745dfa8273c8f", "name": "tempest-ServicesRbacTest-539884070"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3df4aa180caa4d30839745dfa8273c8f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3df4aa180caa4d30839745dfa8273c8f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3df4aa180caa4d30839745dfa8273c8f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3df4aa180caa4d30839745dfa8273c8f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3df4aa180caa4d30839745dfa8273c8f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3df4aa180caa4d30839745dfa8273c8f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:47.348 39 INFO tempest.lib.common.rest_client [req-eb65f9a1-3565-4ba2-a400-6135b664f765 ] Request (ServicesRbacTest:test_list_services): 200 GET http://172.30.13.94/compute/v2.1/os-services 0.226s 2020-11-06 18:20:47.349 39 DEBUG tempest.lib.common.rest_client [req-eb65f9a1-3565-4ba2-a400-6135b664f765 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '937', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-eb65f9a1-3565-4ba2-a400-6135b664f765', 'x-compute-request-id': 'req-eb65f9a1-3565-4ba2-a400-6135b664f765', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-services'} Body: b'{"services": [{"binary": "nova-scheduler", "host": "lf-virtual9", "id": 2, "zone": "internal", "status": "enabled", "state": "up", "updated_at": "2020-11-06T18:20:40.000000", "disabled_reason": null}, {"binary": "nova-conductor", "host": "lf-virtual9", "id": 9, "zone": "internal", "status": "enabled", "state": "up", "updated_at": "2020-11-06T18:20:44.000000", "disabled_reason": null}, {"binary": "nova-conductor", "host": "lf-virtual9", "id": 1, "zone": "internal", "status": "enabled", "state": "up", "updated_at": "2020-11-06T18:20:46.000000", "disabled_reason": null}, {"binary": "nova-compute", "host": "lf-virtual9", "id": 2, "zone": "nova", "status": "enabled", "state": "up", "updated_at": "2020-11-06T18:20:44.000000", "disabled_reason": null}, {"binary": "nova-compute", "host": "lf-virtual8", "id": 3, "zone": "nova", "status": "enabled", "state": "up", "updated_at": "2020-11-06T18:20:42.000000", "disabled_reason": null}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:47.356 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:20:47.411 39 INFO tempest.lib.common.rest_client [req-464ab245-51d8-4021-b836-181ff45984fe ] Request (ServicesRbacTest:test_list_services): 200 GET http://172.30.13.94/identity/v3/projects/3df4aa180caa4d30839745dfa8273c8f/users/47050dee17a24b3baa507801812b4ebd/roles 0.055s 2020-11-06 18:20:47.412 39 DEBUG tempest.lib.common.rest_client [req-464ab245-51d8-4021-b836-181ff45984fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-464ab245-51d8-4021-b836-181ff45984fe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3df4aa180caa4d30839745dfa8273c8f/users/47050dee17a24b3baa507801812b4ebd/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3df4aa180caa4d30839745dfa8273c8f/users/47050dee17a24b3baa507801812b4ebd/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:47.451 39 INFO tempest.lib.common.rest_client [req-0b4b5892-40f3-424b-bbeb-1763e33d4263 ] Request (ServicesRbacTest:test_list_services): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:20:47.451 39 DEBUG tempest.lib.common.rest_client [req-0b4b5892-40f3-424b-bbeb-1763e33d4263 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0b4b5892-40f3-424b-bbeb-1763e33d4263', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "47050dee17a24b3baa507801812b4ebd", "name": "tempest-ServicesRbacTest-539884070", "password_expires_at": null}, "audit_ids": ["CfThB38CSK6mhYKljSrAZg"], "expires_at": "2020-11-06T19:20:47.000000Z", "issued_at": "2020-11-06T18:20:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3df4aa180caa4d30839745dfa8273c8f", "name": "tempest-ServicesRbacTest-539884070"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3df4aa180caa4d30839745dfa8273c8f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3df4aa180caa4d30839745dfa8273c8f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3df4aa180caa4d30839745dfa8273c8f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3df4aa180caa4d30839745dfa8273c8f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3df4aa180caa4d30839745dfa8273c8f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3df4aa180caa4d30839745dfa8273c8f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:47.583 39 INFO tempest.lib.common.rest_client [req-a9ab136c-2a2b-4799-8a9b-85e9264cc44f ] Request (ServicesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/47050dee17a24b3baa507801812b4ebd 0.127s 2020-11-06 18:20:47.583 39 DEBUG tempest.lib.common.rest_client [req-a9ab136c-2a2b-4799-8a9b-85e9264cc44f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a9ab136c-2a2b-4799-8a9b-85e9264cc44f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/47050dee17a24b3baa507801812b4ebd'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:47.677 39 INFO tempest.lib.common.rest_client [req-8c159ad9-603e-4fd2-bd52-3ee48b9e344f ] Request (ServicesRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-11-06 18:20:47.678 39 DEBUG tempest.lib.common.rest_client [req-8c159ad9-603e-4fd2-bd52-3ee48b9e344f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8c159ad9-603e-4fd2-bd52-3ee48b9e344f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["loPtnm5QTw6h4vOFaP31Hw"], "expires_at": "2020-11-06T19:20:47.000000Z", "issued_at": "2020-11-06T18:20:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:47.993 39 INFO tempest.lib.common.rest_client [req-e9ff508e-d3c0-48e9-8f8f-920d63692ca0 ] Request (ServicesRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=3df4aa180caa4d30839745dfa8273c8f&name=default 0.314s 2020-11-06 18:20:47.993 39 DEBUG tempest.lib.common.rest_client [req-e9ff508e-d3c0-48e9-8f8f-920d63692ca0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-e9ff508e-d3c0-48e9-8f8f-920d63692ca0', 'date': 'Fri, 06 Nov 2020 18:20:47 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=3df4aa180caa4d30839745dfa8273c8f&name=default'} Body: b'{"security_groups": [{"id": "7c8a5441-9517-4a81-b95a-6c8fa4a829a4", "name": "default", "stateful": true, "tenant_id": "3df4aa180caa4d30839745dfa8273c8f", "description": "Default security group", "security_group_rules": [{"id": "0ce4c80d-878b-4b5e-ae54-c316502804ca", "tenant_id": "3df4aa180caa4d30839745dfa8273c8f", "security_group_id": "7c8a5441-9517-4a81-b95a-6c8fa4a829a4", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:20:47Z", "updated_at": "2020-11-06T18:20:47Z", "revision_number": 0, "project_id": "3df4aa180caa4d30839745dfa8273c8f"}, {"id": "38d60dd7-46a3-4b93-a04b-2581a43dff05", "tenant_id": "3df4aa180caa4d30839745dfa8273c8f", "security_group_id": "7c8a5441-9517-4a81-b95a-6c8fa4a829a4", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "7c8a5441-9517-4a81-b95a-6c8fa4a829a4", "description": null, "tags": [], "created_at": "2020-11-06T18:20:47Z", "updated_at": "2020-11-06T18:20:47Z", "revision_number": 0, "project_id": "3df4aa180caa4d30839745dfa8273c8f"}, {"id": "62208db4-ff85-401f-85b1-04ee332c763b", "tenant_id": "3df4aa180caa4d30839745dfa8273c8f", "security_group_id": "7c8a5441-9517-4a81-b95a-6c8fa4a829a4", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:20:47Z", "updated_at": "2020-11-06T18:20:47Z", "revision_number": 0, "project_id": "3df4aa180caa4d30839745dfa8273c8f"}, {"id": "c71f61e4-8535-43be-9886-1905a70ad1ae", "tenant_id": "3df4aa180caa4d30839745dfa8273c8f", "security_group_id": "7c8a5441-9517-4a81-b95a-6c8fa4a829a4", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "7c8a5441-9517-4a81-b95a-6c8fa4a829a4", "description": null, "tags": [], "created_at": "2020-11-06T18:20:47Z", "updated_at": "2020-11-06T18:20:47Z", "revision_number": 0, "project_id": "3df4aa180caa4d30839745dfa8273c8f"}], "tags": [], "created_at": "2020-11-06T18:20:47Z", "updated_at": "2020-11-06T18:20:47Z", "revision_number": 1, "project_id": "3df4aa180caa4d30839745dfa8273c8f"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:48.110 39 INFO tempest.lib.common.rest_client [req-e4da8d67-cbec-45a0-8ef9-6709bd904531 ] Request (ServicesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/7c8a5441-9517-4a81-b95a-6c8fa4a829a4 0.116s 2020-11-06 18:20:48.111 39 DEBUG tempest.lib.common.rest_client [req-e4da8d67-cbec-45a0-8ef9-6709bd904531 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-e4da8d67-cbec-45a0-8ef9-6709bd904531', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:20:48 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/7c8a5441-9517-4a81-b95a-6c8fa4a829a4'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:48.234 39 INFO tempest.lib.common.rest_client [req-0a9a0e6f-2e1a-4334-a8f7-afc306fec4cd ] Request (ServicesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/3df4aa180caa4d30839745dfa8273c8f 0.122s 2020-11-06 18:20:48.234 39 DEBUG tempest.lib.common.rest_client [req-0a9a0e6f-2e1a-4334-a8f7-afc306fec4cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0a9a0e6f-2e1a-4334-a8f7-afc306fec4cd', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3df4aa180caa4d30839745dfa8273c8f'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:48.329 39 INFO tempest.lib.common.rest_client [req-5c1f1942-1562-45c8-bbdf-664d859c6901 ] Request (VirtualInterfacesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-11-06 18:20:48.330 39 DEBUG tempest.lib.common.rest_client [req-5c1f1942-1562-45c8-bbdf-664d859c6901 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5c1f1942-1562-45c8-bbdf-664d859c6901', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["YGbOUospTJyLydQsC21G8g"], "expires_at": "2020-11-06T19:20:48.000000Z", "issued_at": "2020-11-06T18:20:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:48.374 39 INFO tempest.lib.common.rest_client [req-b973322f-8da8-4618-a0c8-0754cf00239f ] Request (VirtualInterfacesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:20:48.374 39 DEBUG tempest.lib.common.rest_client [req-b973322f-8da8-4618-a0c8-0754cf00239f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b973322f-8da8-4618-a0c8-0754cf00239f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["ZYVhDpj2Q5uIyCL-DfWQWQ"], "expires_at": "2020-11-06T19:20:48.000000Z", "issued_at": "2020-11-06T18:20:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:48.427 39 INFO tempest.lib.common.rest_client [req-3c811949-7811-4c0c-8d08-6440f94f38d6 ] Request (VirtualInterfacesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.052s 2020-11-06 18:20:48.428 39 DEBUG tempest.lib.common.rest_client [req-3c811949-7811-4c0c-8d08-6440f94f38d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3c811949-7811-4c0c-8d08-6440f94f38d6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:48.487 39 INFO tempest.lib.common.rest_client [req-4d2ed95f-155b-43e3-97a6-4ad17555b243 ] Request (VirtualInterfacesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.058s 2020-11-06 18:20:48.488 39 DEBUG tempest.lib.common.rest_client [req-4d2ed95f-155b-43e3-97a6-4ad17555b243 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VirtualInterfacesRbacTest-1088288882-desc", "domain_id": "default", "name": "tempest-VirtualInterfacesRbacTest-1088288882"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '388', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4d2ed95f-155b-43e3-97a6-4ad17555b243', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "441ca023ad5748c9bfd95deded9ed194", "name": "tempest-VirtualInterfacesRbacTest-1088288882", "domain_id": "default", "description": "tempest-VirtualInterfacesRbacTest-1088288882-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/441ca023ad5748c9bfd95deded9ed194"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:48.596 39 INFO tempest.lib.common.rest_client [req-eb180118-3207-4f4d-92d5-9865bb5b8b19 ] Request (VirtualInterfacesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.107s 2020-11-06 18:20:48.596 39 DEBUG tempest.lib.common.rest_client [req-eb180118-3207-4f4d-92d5-9865bb5b8b19 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VirtualInterfacesRbacTest-1088288882", "password": "M8&dW1%MqFfnNJE", "project_id": "441ca023ad5748c9bfd95deded9ed194", "email": "tempest-VirtualInterfacesRbacTest-398383146@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '405', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eb180118-3207-4f4d-92d5-9865bb5b8b19', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "441ca023ad5748c9bfd95deded9ed194", "email": "tempest-VirtualInterfacesRbacTest-398383146@example.com", "id": "3966148b4c9e4e5d90e23b04a1027147", "name": "tempest-VirtualInterfacesRbacTest-1088288882", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/3966148b4c9e4e5d90e23b04a1027147"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:48.643 39 INFO tempest.lib.common.rest_client [req-7aea4094-b297-4fa5-b5f6-6b50929113a4 ] Request (VirtualInterfacesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.046s 2020-11-06 18:20:48.643 39 DEBUG tempest.lib.common.rest_client [req-7aea4094-b297-4fa5-b5f6-6b50929113a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7aea4094-b297-4fa5-b5f6-6b50929113a4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:48.689 39 INFO tempest.lib.common.rest_client [req-0073a8dc-bb51-40c6-9252-406ccb179e42 ] Request (VirtualInterfacesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.045s 2020-11-06 18:20:48.690 39 DEBUG tempest.lib.common.rest_client [req-0073a8dc-bb51-40c6-9252-406ccb179e42 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0073a8dc-bb51-40c6-9252-406ccb179e42', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:48.750 39 INFO tempest.lib.common.rest_client [req-4b398eb3-32bc-47ec-a8c5-5541f3d1a2c6 ] Request (VirtualInterfacesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/441ca023ad5748c9bfd95deded9ed194/users/3966148b4c9e4e5d90e23b04a1027147/roles/72a4576c553448cd941b052c1ca0cf2d 0.059s 2020-11-06 18:20:48.751 39 DEBUG tempest.lib.common.rest_client [req-4b398eb3-32bc-47ec-a8c5-5541f3d1a2c6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4b398eb3-32bc-47ec-a8c5-5541f3d1a2c6', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/441ca023ad5748c9bfd95deded9ed194/users/3966148b4c9e4e5d90e23b04a1027147/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:48.751 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VirtualInterfacesRbacTest-1088288882', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '441ca023ad5748c9bfd95deded9ed194', 'project_name': 'tempest-VirtualInterfacesRbacTest-1088288882', 'tenant_id': '441ca023ad5748c9bfd95deded9ed194', 'tenant_name': 'tempest-VirtualInterfacesRbacTest-1088288882', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '3966148b4c9e4e5d90e23b04a1027147'}, Network: None, Subnet: None, Router: None 2020-11-06 18:20:48.830 39 INFO tempest.lib.common.rest_client [req-65c79c40-8238-4292-ba7e-c655ca4b4536 ] Request (VirtualInterfacesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.077s 2020-11-06 18:20:48.830 39 DEBUG tempest.lib.common.rest_client [req-65c79c40-8238-4292-ba7e-c655ca4b4536 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-65c79c40-8238-4292-ba7e-c655ca4b4536', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["vV75QC_ISeKO3exNzEM1jg"], "expires_at": "2020-11-06T19:20:48.000000Z", "issued_at": "2020-11-06T18:20:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:49.304 39 INFO tempest.lib.common.rest_client [req-b1208dc7-a067-4c4d-9993-673ea99024ef ] Request (VirtualInterfacesRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.473s 2020-11-06 18:20:49.305 39 DEBUG tempest.lib.common.rest_client [req-b1208dc7-a067-4c4d-9993-673ea99024ef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-VirtualInterfacesRbacTest-1780161419-network", "tenant_id": "441ca023ad5748c9bfd95deded9ed194"}} Response - Headers: {'content-type': 'application/json', 'content-length': '741', 'x-openstack-request-id': 'req-b1208dc7-a067-4c4d-9993-673ea99024ef', 'date': 'Fri, 06 Nov 2020 18:20:49 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"6404d620-7901-4e5f-969d-74a87f3be950","name":"tempest-VirtualInterfacesRbacTest-1780161419-network","tenant_id":"441ca023ad5748c9bfd95deded9ed194","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"441ca023ad5748c9bfd95deded9ed194","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":45,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:20:49Z","updated_at":"2020-11-06T18:20:49Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:49.800 39 INFO tempest.lib.common.rest_client [req-e0dd5728-657a-4ad8-afab-8bf072f3f7e8 ] Request (VirtualInterfacesRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.493s 2020-11-06 18:20:49.800 39 DEBUG tempest.lib.common.rest_client [req-e0dd5728-657a-4ad8-afab-8bf072f3f7e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "6404d620-7901-4e5f-969d-74a87f3be950", "cidr": "192.168.120.0/28", "name": "tempest-VirtualInterfacesRbacTest-1780161419-subnet", "tenant_id": "441ca023ad5748c9bfd95deded9ed194", "enable_dhcp": false, "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '713', 'x-openstack-request-id': 'req-e0dd5728-657a-4ad8-afab-8bf072f3f7e8', 'date': 'Fri, 06 Nov 2020 18:20:49 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"d58810ec-b397-4b8f-a9a2-8d5d7cfefa0b","name":"tempest-VirtualInterfacesRbacTest-1780161419-subnet","tenant_id":"441ca023ad5748c9bfd95deded9ed194","network_id":"6404d620-7901-4e5f-969d-74a87f3be950","ip_version":4,"subnetpool_id":null,"enable_dhcp":false,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-11-06T18:20:49Z","updated_at":"2020-11-06T18:20:49Z","revision_number":0,"project_id":"441ca023ad5748c9bfd95deded9ed194"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:49.801 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VirtualInterfacesRbacTest-1088288882', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '441ca023ad5748c9bfd95deded9ed194', 'project_name': 'tempest-VirtualInterfacesRbacTest-1088288882', 'tenant_id': '441ca023ad5748c9bfd95deded9ed194', 'tenant_name': 'tempest-VirtualInterfacesRbacTest-1088288882', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '3966148b4c9e4e5d90e23b04a1027147'}, Network: {'id': '6404d620-7901-4e5f-969d-74a87f3be950', 'name': 'tempest-VirtualInterfacesRbacTest-1780161419-network', 'tenant_id': '441ca023ad5748c9bfd95deded9ed194', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '441ca023ad5748c9bfd95deded9ed194', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 45, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T18:20:49Z', 'updated_at': '2020-11-06T18:20:49Z', 'revision_number': 1}, Subnet: {'id': 'd58810ec-b397-4b8f-a9a2-8d5d7cfefa0b', 'name': 'tempest-VirtualInterfacesRbacTest-1780161419-subnet', 'tenant_id': '441ca023ad5748c9bfd95deded9ed194', 'network_id': '6404d620-7901-4e5f-969d-74a87f3be950', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-11-06T18:20:49Z', 'updated_at': '2020-11-06T18:20:49Z', 'revision_number': 0, 'project_id': '441ca023ad5748c9bfd95deded9ed194'}, Router: None 2020-11-06 18:20:50.059 39 INFO tempest.lib.common.rest_client [req-aef116db-6268-4e03-ae13-dfcfc9b8c665 ] Request (VirtualInterfacesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.109s 2020-11-06 18:20:50.059 39 DEBUG tempest.lib.common.rest_client [req-aef116db-6268-4e03-ae13-dfcfc9b8c665 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6581', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aef116db-6268-4e03-ae13-dfcfc9b8c665', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3966148b4c9e4e5d90e23b04a1027147", "name": "tempest-VirtualInterfacesRbacTest-1088288882", "password_expires_at": null}, "audit_ids": ["K0q0fbrcRn2TB1V2hBMCkg"], "expires_at": "2020-11-06T19:20:49.000000Z", "issued_at": "2020-11-06T18:20:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "441ca023ad5748c9bfd95deded9ed194", "name": "tempest-VirtualInterfacesRbacTest-1088288882"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/441ca023ad5748c9bfd95deded9ed194", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/441ca023ad5748c9bfd95deded9ed194", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/441ca023ad5748c9bfd95deded9ed194", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_441ca023ad5748c9bfd95deded9ed194", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_441ca023ad5748c9bfd95deded9ed194", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_441ca023ad5748c9bfd95deded9ed194", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:50.093 39 INFO tempest.lib.common.rest_client [req-c4ec7d36-2d45-4d15-94a2-9bb5b0fab725 ] Request (VirtualInterfacesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:20:50.094 39 DEBUG tempest.lib.common.rest_client [req-c4ec7d36-2d45-4d15-94a2-9bb5b0fab725 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c4ec7d36-2d45-4d15-94a2-9bb5b0fab725', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["5M8EBwnQQpqQdPXnwca9Dw"], "expires_at": "2020-11-06T19:20:50.000000Z", "issued_at": "2020-11-06T18:20:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:50.140 39 INFO tempest.lib.common.rest_client [req-eb6c3e86-70e3-460c-b816-16c1c04ded9f ] Request (VirtualInterfacesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:20:50.141 39 DEBUG tempest.lib.common.rest_client [req-eb6c3e86-70e3-460c-b816-16c1c04ded9f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eb6c3e86-70e3-460c-b816-16c1c04ded9f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["P8jGtxK4RkWyPBLGE-UC6w"], "expires_at": "2020-11-06T19:20:50.000000Z", "issued_at": "2020-11-06T18:20:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:50.193 39 INFO tempest.lib.common.rest_client [req-1eede660-459a-461a-b3b1-44d80608e04e ] Request (VirtualInterfacesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.051s 2020-11-06 18:20:50.194 39 DEBUG tempest.lib.common.rest_client [req-1eede660-459a-461a-b3b1-44d80608e04e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1eede660-459a-461a-b3b1-44d80608e04e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:50.259 39 INFO tempest.lib.common.rest_client [req-e41ab892-6f8c-4176-ba3b-394ed39ccd72 ] Request (VirtualInterfacesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.064s 2020-11-06 18:20:50.259 39 DEBUG tempest.lib.common.rest_client [req-e41ab892-6f8c-4176-ba3b-394ed39ccd72 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e41ab892-6f8c-4176-ba3b-394ed39ccd72', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:50.259 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:20:50.260 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:20:50.314 39 INFO tempest.lib.common.rest_client [req-5ba3b9bf-408a-4262-ad61-8852c3e8a3ae ] Request (VirtualInterfacesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/441ca023ad5748c9bfd95deded9ed194/users/3966148b4c9e4e5d90e23b04a1027147/roles 0.053s 2020-11-06 18:20:50.314 39 DEBUG tempest.lib.common.rest_client [req-5ba3b9bf-408a-4262-ad61-8852c3e8a3ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5ba3b9bf-408a-4262-ad61-8852c3e8a3ae', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/441ca023ad5748c9bfd95deded9ed194/users/3966148b4c9e4e5d90e23b04a1027147/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/441ca023ad5748c9bfd95deded9ed194/users/3966148b4c9e4e5d90e23b04a1027147/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:50.377 39 INFO tempest.lib.common.rest_client [req-ada8f026-8e4f-4fdb-b973-cf24b4d70c44 ] Request (VirtualInterfacesRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/441ca023ad5748c9bfd95deded9ed194/users/3966148b4c9e4e5d90e23b04a1027147/roles/72a4576c553448cd941b052c1ca0cf2d 0.062s 2020-11-06 18:20:50.378 39 DEBUG tempest.lib.common.rest_client [req-ada8f026-8e4f-4fdb-b973-cf24b4d70c44 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ada8f026-8e4f-4fdb-b973-cf24b4d70c44', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/441ca023ad5748c9bfd95deded9ed194/users/3966148b4c9e4e5d90e23b04a1027147/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:50.489 39 INFO tempest.lib.common.rest_client [req-f79b350d-0ebd-4495-861f-cb8f362e5943 ] Request (VirtualInterfacesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/441ca023ad5748c9bfd95deded9ed194/users/3966148b4c9e4e5d90e23b04a1027147/roles/a629c95d64b3416fb80ae90af4f69c05 0.110s 2020-11-06 18:20:50.489 39 DEBUG tempest.lib.common.rest_client [req-f79b350d-0ebd-4495-861f-cb8f362e5943 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f79b350d-0ebd-4495-861f-cb8f362e5943', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/441ca023ad5748c9bfd95deded9ed194/users/3966148b4c9e4e5d90e23b04a1027147/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:51.573 39 INFO tempest.lib.common.rest_client [req-3d450f6e-ad45-4fe0-8ae3-7bc1ade14d3d ] Request (VirtualInterfacesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-11-06 18:20:51.574 39 DEBUG tempest.lib.common.rest_client [req-3d450f6e-ad45-4fe0-8ae3-7bc1ade14d3d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3d450f6e-ad45-4fe0-8ae3-7bc1ade14d3d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3966148b4c9e4e5d90e23b04a1027147", "name": "tempest-VirtualInterfacesRbacTest-1088288882", "password_expires_at": null}, "audit_ids": ["rcEV4ZQmT1mp0ykWQ4R5gA"], "expires_at": "2020-11-06T19:20:51.000000Z", "issued_at": "2020-11-06T18:20:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "441ca023ad5748c9bfd95deded9ed194", "name": "tempest-VirtualInterfacesRbacTest-1088288882"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/441ca023ad5748c9bfd95deded9ed194", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/441ca023ad5748c9bfd95deded9ed194", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/441ca023ad5748c9bfd95deded9ed194", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_441ca023ad5748c9bfd95deded9ed194", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_441ca023ad5748c9bfd95deded9ed194", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_441ca023ad5748c9bfd95deded9ed194", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:51.581 39 INFO tempest.lib.common.rest_client [-] Request (VirtualInterfacesRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/ 0.005s 2020-11-06 18:20:51.582 39 DEBUG tempest.lib.common.rest_client [-] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '379', 'content-type': 'application/json', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/'} Body: b'{"versions": [{"id": "v2.0", "status": "SUPPORTED", "version": "", "min_version": "", "updated": "2011-01-21T11:33:21Z", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2/"}]}, {"id": "v2.1", "status": "CURRENT", "version": "2.87", "min_version": "2.1", "updated": "2013-07-23T11:33:21Z", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/"}]}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:51.588 39 INFO tempest.test [-] raised in VirtualInterfacesRbacTest.setUpClass. Invoking tearDownClass. 2020-11-06 18:20:51.588 39 DEBUG tempest.lib.common.dynamic_creds [-] Clearing network: {'id': '6404d620-7901-4e5f-969d-74a87f3be950', 'name': 'tempest-VirtualInterfacesRbacTest-1780161419-network', 'tenant_id': '441ca023ad5748c9bfd95deded9ed194', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '441ca023ad5748c9bfd95deded9ed194', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 45, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T18:20:49Z', 'updated_at': '2020-11-06T18:20:49Z', 'revision_number': 1}, subnet: {'id': 'd58810ec-b397-4b8f-a9a2-8d5d7cfefa0b', 'name': 'tempest-VirtualInterfacesRbacTest-1780161419-subnet', 'tenant_id': '441ca023ad5748c9bfd95deded9ed194', 'network_id': '6404d620-7901-4e5f-969d-74a87f3be950', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-11-06T18:20:49Z', 'updated_at': '2020-11-06T18:20:49Z', 'revision_number': 0, 'project_id': '441ca023ad5748c9bfd95deded9ed194'}, router: None _clear_isolated_net_resources /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/dynamic_creds.py:418 2020-11-06 18:20:52.015 39 INFO tempest.lib.common.rest_client [req-68491031-f849-4b77-be8f-78b7ee314c6e ] Request (VirtualInterfacesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/d58810ec-b397-4b8f-a9a2-8d5d7cfefa0b 0.425s 2020-11-06 18:20:52.015 39 DEBUG tempest.lib.common.rest_client [req-68491031-f849-4b77-be8f-78b7ee314c6e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-68491031-f849-4b77-be8f-78b7ee314c6e', 'date': 'Fri, 06 Nov 2020 18:20:52 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/d58810ec-b397-4b8f-a9a2-8d5d7cfefa0b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:52.662 39 INFO tempest.lib.common.rest_client [req-173377b2-2d9b-478f-89d2-7b6a46c71b8d ] Request (VirtualInterfacesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/6404d620-7901-4e5f-969d-74a87f3be950 0.645s 2020-11-06 18:20:52.663 39 DEBUG tempest.lib.common.rest_client [req-173377b2-2d9b-478f-89d2-7b6a46c71b8d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-173377b2-2d9b-478f-89d2-7b6a46c71b8d', 'date': 'Fri, 06 Nov 2020 18:20:52 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/6404d620-7901-4e5f-969d-74a87f3be950'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:52.826 39 INFO tempest.lib.common.rest_client [req-764ee546-a2de-4dac-94d5-a9eda4f27556 ] Request (VirtualInterfacesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/3966148b4c9e4e5d90e23b04a1027147 0.162s 2020-11-06 18:20:52.826 39 DEBUG tempest.lib.common.rest_client [req-764ee546-a2de-4dac-94d5-a9eda4f27556 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-764ee546-a2de-4dac-94d5-a9eda4f27556', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/3966148b4c9e4e5d90e23b04a1027147'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:52.888 39 INFO tempest.lib.common.rest_client [req-26eca11e-bd7c-439d-9a8b-f484e8ca446d ] Request (VirtualInterfacesRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=441ca023ad5748c9bfd95deded9ed194&name=default 0.060s 2020-11-06 18:20:52.888 39 DEBUG tempest.lib.common.rest_client [req-26eca11e-bd7c-439d-9a8b-f484e8ca446d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-26eca11e-bd7c-439d-9a8b-f484e8ca446d', 'date': 'Fri, 06 Nov 2020 18:20:52 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=441ca023ad5748c9bfd95deded9ed194&name=default'} Body: b'{"security_groups": [{"id": "f06d4927-eb5d-4eaa-a909-c17a8da6b325", "name": "default", "stateful": true, "tenant_id": "441ca023ad5748c9bfd95deded9ed194", "description": "Default security group", "security_group_rules": [{"id": "0377a364-635c-41cc-a764-e33191436613", "tenant_id": "441ca023ad5748c9bfd95deded9ed194", "security_group_id": "f06d4927-eb5d-4eaa-a909-c17a8da6b325", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "f06d4927-eb5d-4eaa-a909-c17a8da6b325", "description": null, "tags": [], "created_at": "2020-11-06T18:20:49Z", "updated_at": "2020-11-06T18:20:49Z", "revision_number": 0, "project_id": "441ca023ad5748c9bfd95deded9ed194"}, {"id": "39fe5ef8-f83a-473c-a3e0-1f3a04a24aa5", "tenant_id": "441ca023ad5748c9bfd95deded9ed194", "security_group_id": "f06d4927-eb5d-4eaa-a909-c17a8da6b325", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:20:49Z", "updated_at": "2020-11-06T18:20:49Z", "revision_number": 0, "project_id": "441ca023ad5748c9bfd95deded9ed194"}, {"id": "3f47eaa6-e339-4526-9df4-56b7ba1afade", "tenant_id": "441ca023ad5748c9bfd95deded9ed194", "security_group_id": "f06d4927-eb5d-4eaa-a909-c17a8da6b325", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:20:49Z", "updated_at": "2020-11-06T18:20:49Z", "revision_number": 0, "project_id": "441ca023ad5748c9bfd95deded9ed194"}, {"id": "7e0f8e69-9cb4-4eeb-b044-80ae28ab9c7f", "tenant_id": "441ca023ad5748c9bfd95deded9ed194", "security_group_id": "f06d4927-eb5d-4eaa-a909-c17a8da6b325", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "f06d4927-eb5d-4eaa-a909-c17a8da6b325", "description": null, "tags": [], "created_at": "2020-11-06T18:20:49Z", "updated_at": "2020-11-06T18:20:49Z", "revision_number": 0, "project_id": "441ca023ad5748c9bfd95deded9ed194"}], "tags": [], "created_at": "2020-11-06T18:20:49Z", "updated_at": "2020-11-06T18:20:49Z", "revision_number": 1, "project_id": "441ca023ad5748c9bfd95deded9ed194"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:53.025 39 INFO tempest.lib.common.rest_client [req-77e60d24-833e-4c1d-b942-7874345a2cf3 ] Request (VirtualInterfacesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/f06d4927-eb5d-4eaa-a909-c17a8da6b325 0.135s 2020-11-06 18:20:53.025 39 DEBUG tempest.lib.common.rest_client [req-77e60d24-833e-4c1d-b942-7874345a2cf3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-77e60d24-833e-4c1d-b942-7874345a2cf3', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:20:53 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/f06d4927-eb5d-4eaa-a909-c17a8da6b325'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:53.274 39 INFO tempest.lib.common.rest_client [req-958a5795-b452-486d-9df0-ff3d5b9d61df ] Request (VirtualInterfacesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/441ca023ad5748c9bfd95deded9ed194 0.247s 2020-11-06 18:20:53.274 39 DEBUG tempest.lib.common.rest_client [req-958a5795-b452-486d-9df0-ff3d5b9d61df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-958a5795-b452-486d-9df0-ff3d5b9d61df', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/441ca023ad5748c9bfd95deded9ed194'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:53.366 39 INFO tempest.lib.common.rest_client [req-5a332429-92d9-4261-ad25-ef5b592db1a8 ] Request (NamespacesPropertyRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:20:53.366 39 DEBUG tempest.lib.common.rest_client [req-5a332429-92d9-4261-ad25-ef5b592db1a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5a332429-92d9-4261-ad25-ef5b592db1a8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["FmMtYDfZQbq3QoNXcOriLQ"], "expires_at": "2020-11-06T19:20:53.000000Z", "issued_at": "2020-11-06T18:20:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:53.415 39 INFO tempest.lib.common.rest_client [req-ec34518f-9910-4077-be8b-9ecbcbe8d7db ] Request (NamespacesPropertyRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:20:53.416 39 DEBUG tempest.lib.common.rest_client [req-ec34518f-9910-4077-be8b-9ecbcbe8d7db ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ec34518f-9910-4077-be8b-9ecbcbe8d7db', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["7BNzjHwhTKOPhvRWDp3MCA"], "expires_at": "2020-11-06T19:20:53.000000Z", "issued_at": "2020-11-06T18:20:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:53.471 39 INFO tempest.lib.common.rest_client [req-001887d8-7f44-4d53-8e5d-8303750fdf3c ] Request (NamespacesPropertyRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.054s 2020-11-06 18:20:53.471 39 DEBUG tempest.lib.common.rest_client [req-001887d8-7f44-4d53-8e5d-8303750fdf3c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-001887d8-7f44-4d53-8e5d-8303750fdf3c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:53.538 39 INFO tempest.lib.common.rest_client [req-74d4d352-d325-42a6-90e3-40574a31550a ] Request (NamespacesPropertyRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.065s 2020-11-06 18:20:53.538 39 DEBUG tempest.lib.common.rest_client [req-74d4d352-d325-42a6-90e3-40574a31550a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-NamespacesPropertyRbacTest-812130814-desc", "domain_id": "default", "name": "tempest-NamespacesPropertyRbacTest-812130814"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '388', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-74d4d352-d325-42a6-90e3-40574a31550a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "d8115de3bd4745ac8ff3cc198d2a717f", "name": "tempest-NamespacesPropertyRbacTest-812130814", "domain_id": "default", "description": "tempest-NamespacesPropertyRbacTest-812130814-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/d8115de3bd4745ac8ff3cc198d2a717f"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:53.636 39 INFO tempest.lib.common.rest_client [req-63f6d6a4-2f67-46e4-aa0c-bebbe07e709e ] Request (NamespacesPropertyRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.096s 2020-11-06 18:20:53.637 39 DEBUG tempest.lib.common.rest_client [req-63f6d6a4-2f67-46e4-aa0c-bebbe07e709e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-NamespacesPropertyRbacTest-812130814", "password": "C6+*gY*=RNt=^B%", "project_id": "d8115de3bd4745ac8ff3cc198d2a717f", "email": "tempest-NamespacesPropertyRbacTest-1610846088@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '407', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-63f6d6a4-2f67-46e4-aa0c-bebbe07e709e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "d8115de3bd4745ac8ff3cc198d2a717f", "email": "tempest-NamespacesPropertyRbacTest-1610846088@example.com", "id": "6632f4eedae44a0cb26add8af7c38039", "name": "tempest-NamespacesPropertyRbacTest-812130814", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/6632f4eedae44a0cb26add8af7c38039"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:53.693 39 INFO tempest.lib.common.rest_client [req-a93a70e6-763a-44e6-9c0c-4a01735d84a6 ] Request (NamespacesPropertyRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-11-06 18:20:53.694 39 DEBUG tempest.lib.common.rest_client [req-a93a70e6-763a-44e6-9c0c-4a01735d84a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a93a70e6-763a-44e6-9c0c-4a01735d84a6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:53.747 39 INFO tempest.lib.common.rest_client [req-92f26160-fcfe-44df-89e7-d62d527ac838 ] Request (NamespacesPropertyRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.052s 2020-11-06 18:20:53.747 39 DEBUG tempest.lib.common.rest_client [req-92f26160-fcfe-44df-89e7-d62d527ac838 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-92f26160-fcfe-44df-89e7-d62d527ac838', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:53.812 39 INFO tempest.lib.common.rest_client [req-a3c3fe61-c47b-4b1d-bc32-b92ecdd2c8b0 ] Request (NamespacesPropertyRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/d8115de3bd4745ac8ff3cc198d2a717f/users/6632f4eedae44a0cb26add8af7c38039/roles/72a4576c553448cd941b052c1ca0cf2d 0.063s 2020-11-06 18:20:53.812 39 DEBUG tempest.lib.common.rest_client [req-a3c3fe61-c47b-4b1d-bc32-b92ecdd2c8b0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a3c3fe61-c47b-4b1d-bc32-b92ecdd2c8b0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d8115de3bd4745ac8ff3cc198d2a717f/users/6632f4eedae44a0cb26add8af7c38039/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:53.813 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-NamespacesPropertyRbacTest-812130814', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'd8115de3bd4745ac8ff3cc198d2a717f', 'project_name': 'tempest-NamespacesPropertyRbacTest-812130814', 'tenant_id': 'd8115de3bd4745ac8ff3cc198d2a717f', 'tenant_name': 'tempest-NamespacesPropertyRbacTest-812130814', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '6632f4eedae44a0cb26add8af7c38039'}, Network: None, Subnet: None, Router: None 2020-11-06 18:20:53.813 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-NamespacesPropertyRbacTest-812130814', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'd8115de3bd4745ac8ff3cc198d2a717f', 'project_name': 'tempest-NamespacesPropertyRbacTest-812130814', 'tenant_id': 'd8115de3bd4745ac8ff3cc198d2a717f', 'tenant_name': 'tempest-NamespacesPropertyRbacTest-812130814', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '6632f4eedae44a0cb26add8af7c38039'}, Network: None, Subnet: None, Router: None 2020-11-06 18:20:53.945 39 INFO tempest.lib.common.rest_client [req-7064ee1a-eb78-45a5-95e9-c5d0f016234c ] Request (NamespacesPropertyRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.119s 2020-11-06 18:20:53.945 39 DEBUG tempest.lib.common.rest_client [req-7064ee1a-eb78-45a5-95e9-c5d0f016234c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6581', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7064ee1a-eb78-45a5-95e9-c5d0f016234c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6632f4eedae44a0cb26add8af7c38039", "name": "tempest-NamespacesPropertyRbacTest-812130814", "password_expires_at": null}, "audit_ids": ["Mx94l_O4SBKJOHLQ4o_KNQ"], "expires_at": "2020-11-06T19:20:53.000000Z", "issued_at": "2020-11-06T18:20:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d8115de3bd4745ac8ff3cc198d2a717f", "name": "tempest-NamespacesPropertyRbacTest-812130814"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:54.036 39 INFO tempest.lib.common.rest_client [req-89c595f2-f278-4656-b3fb-5046563ea9a5 ] Request (NamespacesPropertyRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-11-06 18:20:54.036 39 DEBUG tempest.lib.common.rest_client [req-89c595f2-f278-4656-b3fb-5046563ea9a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-89c595f2-f278-4656-b3fb-5046563ea9a5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["nXEvEO7uQXqF3zSBRVs9cw"], "expires_at": "2020-11-06T19:20:53.000000Z", "issued_at": "2020-11-06T18:20:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:54.086 39 INFO tempest.lib.common.rest_client [req-40b5fd81-6282-4836-a875-6e7a298ff090 ] Request (NamespacesPropertyRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:20:54.087 39 DEBUG tempest.lib.common.rest_client [req-40b5fd81-6282-4836-a875-6e7a298ff090 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-40b5fd81-6282-4836-a875-6e7a298ff090', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["iyYuD3HxTlyrpIQBLDnwOg"], "expires_at": "2020-11-06T19:20:54.000000Z", "issued_at": "2020-11-06T18:20:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:54.147 39 INFO tempest.lib.common.rest_client [req-5ae3aaf1-8c3f-4813-b343-eb7b555d6853 ] Request (NamespacesPropertyRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.059s 2020-11-06 18:20:54.147 39 DEBUG tempest.lib.common.rest_client [req-5ae3aaf1-8c3f-4813-b343-eb7b555d6853 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5ae3aaf1-8c3f-4813-b343-eb7b555d6853', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:54.204 39 INFO tempest.lib.common.rest_client [req-b8f85078-fa4c-4a45-852d-d8545b19c171 ] Request (NamespacesPropertyRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-11-06 18:20:54.204 39 DEBUG tempest.lib.common.rest_client [req-b8f85078-fa4c-4a45-852d-d8545b19c171 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b8f85078-fa4c-4a45-852d-d8545b19c171', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:54.205 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:20:54.205 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:20:54.265 39 INFO tempest.lib.common.rest_client [req-c48afc33-35d2-4675-88a2-b7a375d22e86 ] Request (NamespacesPropertyRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/d8115de3bd4745ac8ff3cc198d2a717f/users/6632f4eedae44a0cb26add8af7c38039/roles 0.059s 2020-11-06 18:20:54.265 39 DEBUG tempest.lib.common.rest_client [req-c48afc33-35d2-4675-88a2-b7a375d22e86 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c48afc33-35d2-4675-88a2-b7a375d22e86', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d8115de3bd4745ac8ff3cc198d2a717f/users/6632f4eedae44a0cb26add8af7c38039/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d8115de3bd4745ac8ff3cc198d2a717f/users/6632f4eedae44a0cb26add8af7c38039/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:54.329 39 INFO tempest.lib.common.rest_client [req-03cb9b0e-6a32-417b-9f81-16e29553de90 ] Request (NamespacesPropertyRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/d8115de3bd4745ac8ff3cc198d2a717f/users/6632f4eedae44a0cb26add8af7c38039/roles/72a4576c553448cd941b052c1ca0cf2d 0.062s 2020-11-06 18:20:54.329 39 DEBUG tempest.lib.common.rest_client [req-03cb9b0e-6a32-417b-9f81-16e29553de90 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-03cb9b0e-6a32-417b-9f81-16e29553de90', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d8115de3bd4745ac8ff3cc198d2a717f/users/6632f4eedae44a0cb26add8af7c38039/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:54.439 39 INFO tempest.lib.common.rest_client [req-7305ce60-80bd-4ad6-b8b8-4b688c5df374 ] Request (NamespacesPropertyRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/d8115de3bd4745ac8ff3cc198d2a717f/users/6632f4eedae44a0cb26add8af7c38039/roles/a629c95d64b3416fb80ae90af4f69c05 0.108s 2020-11-06 18:20:54.439 39 DEBUG tempest.lib.common.rest_client [req-7305ce60-80bd-4ad6-b8b8-4b688c5df374 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7305ce60-80bd-4ad6-b8b8-4b688c5df374', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d8115de3bd4745ac8ff3cc198d2a717f/users/6632f4eedae44a0cb26add8af7c38039/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:55.538 39 INFO tempest.lib.common.rest_client [req-5dc99510-82b7-4941-98c2-172fd7e521c7 ] Request (NamespacesPropertyRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-11-06 18:20:55.539 39 DEBUG tempest.lib.common.rest_client [req-5dc99510-82b7-4941-98c2-172fd7e521c7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5dc99510-82b7-4941-98c2-172fd7e521c7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6632f4eedae44a0cb26add8af7c38039", "name": "tempest-NamespacesPropertyRbacTest-812130814", "password_expires_at": null}, "audit_ids": ["L0kBcxzmQ8yYGlUnKH54HQ"], "expires_at": "2020-11-06T19:20:55.000000Z", "issued_at": "2020-11-06T18:20:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d8115de3bd4745ac8ff3cc198d2a717f", "name": "tempest-NamespacesPropertyRbacTest-812130814"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:55.741 39 INFO tempest.lib.common.rest_client [req-9021a3fa-83ad-481c-b259-1164af210853 ] Request (NamespacesPropertyRbacTest:setUpClass): 200 GET http://172.30.13.94/image/v2/metadefs/resource_types 0.200s 2020-11-06 18:20:55.742 39 DEBUG tempest.lib.common.rest_client [req-9021a3fa-83ad-481c-b259-1164af210853 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '8061', 'content-type': 'application/json', 'x-openstack-request-id': 'req-9021a3fa-83ad-481c-b259-1164af210853', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/metadefs/resource_types'} Body: b'{"resource_types": [{"name": "OS::Glance::Image", "created_at": "2020-10-07T11:57:58Z"}, {"name": "OS::Cinder::Volume", "created_at": "2020-10-07T11:57:58Z"}, {"name": "OS::Nova::Flavor", "created_at": "2020-10-07T11:57:58Z"}, {"name": "OS::Nova::Aggregate", "created_at": "2020-10-07T11:57:58Z"}, {"name": "OS::Nova::Server", "created_at": "2020-10-07T11:57:58Z"}, {"name": "OS::Trove::Instance", "created_at": "2020-10-07T11:57:59Z"}, {"name": "tempest-353086331", "created_at": "2020-10-07T14:14:37Z", "updated_at": "2020-10-07T14:14:37Z"}, {"name": "tempest-1984004422", "created_at": "2020-10-07T14:30:19Z", "updated_at": "2020-10-07T14:30:19Z"}, {"name": "tempest-372173246", "created_at": "2020-10-07T14:49:22Z", "updated_at": "2020-10-07T14:49:22Z"}, {"name": "tempest-1164139581", "created_at": "2020-10-07T18:47:05Z", "updated_at": "2020-10-07T18:47:05Z"}, {"name": "tempest-993868956", "created_at": "2020-10-07T19:08:26Z", "updated_at": "2020-10-07T19:08:26Z"}, {"name": "tempest-272848155", "created_at": "2020-10-07T19:09:07Z", "updated_at": "2020-10-07T19:09:07Z"}, {"name": "tempest-1639040349", "created_at": "2020-10-08T06:37:04Z", "updated_at": "2020-10-08T06:37:04Z"}, {"name": "tempest-2908543", "created_at": "2020-10-08T07:02:30Z", "updated_at": "2020-10-08T07:02:30Z"}, {"name": "tempest-1856760566", "created_at": "2020-10-08T07:03:05Z", "updated_at": "2020-10-08T07:03:05Z"}, {"name": "tempest-1004252970", "created_at": "2020-10-08T08:19:46Z", "updated_at": "2020-10-08T08:19:46Z"}, {"name": "tempest-407059419", "created_at": "2020-10-08T08:33:34Z", "updated_at": "2020-10-08T08:33:34Z"}, {"name": "tempest-189587598", "created_at": "2020-10-08T08:35:59Z", "updated_at": "2020-10-08T08:35:59Z"}, {"name": "tempest-1704015896", "created_at": "2020-10-09T18:06:13Z", "updated_at": "2020-10-09T18:06:13Z"}, {"name": "tempest-1953541337", "created_at": "2020-10-09T18:17:00Z", "updated_at": "2020-10-09T18:17:00Z"}, {"name": "tempest-173577", "created_at": "2020-10-09T18:22:23Z", "updated_at": "2020-10-09T18:22:23Z"}, {"name": "tempest-333147695", "created_at": "2020-10-10T09:00:37Z", "updated_at": "2020-10-10T09:00:37Z"}, {"name": "tempest-1397311640", "created_at": "2020-10-10T09:36:16Z", "updated_at": "2020-10-10T09:36:16Z"}, {"name": "tempest-1935990982", "created_at": "2020-10-10T09:45:43Z", "updated_at": "2020-10-10T09:45:43Z"}, {"name": "tempest-455257376", "created_at": "2020-10-10T11:37:35Z", "updated_at": "2020-10-10T11:37:35Z"}, {"name": "tempest-304188733", "created_at": "2020-10-10T12:00:21Z", "updated_at": "2020-10-10T12:00:21Z"}, {"name": "tempest-2047170226", "created_at": "2020-10-10T12:04:22Z", "updated_at": "2020-10-10T12:04:22Z"}, {"name": "tempest-988388815", "created_at": "2020-10-10T13:30:05Z", "updated_at": "2020-10-10T13:30:05Z"}, {"name": "tempest-453722785", "created_at": "2020-10-10T13:54:03Z", "updated_at": "2020-10-10T13:54:03Z"}, {"name": "tempest-2101685032", "created_at": "2020-10-10T14:07:17Z", "updated_at": "2020-10-10T14:07:17Z"}, {"name": "tempest-487587532", "created_at": "2020-10-11T12:03:41Z", "updated_at": "2020-10-11T12:03:41Z"}, {"name": "tempest-92343007", "created_at": "2020-10-11T12:20:17Z", "updated_at": "2020-10-11T12:20:17Z"}, {"name": "tempest-1873204973", "created_at": "2020-10-11T12:37:23Z", "updated_at": "2020-10-11T12:37:23Z"}, {"name": "tempest-976247736", "created_at": "2020-10-12T14:24:39Z", "updated_at": "2020-10-12T14:24:39Z"}, {"name": "tempest-723114723", "created_at": "2020-10-12T14:30:01Z", "updated_at": "2020-10-12T14:30:01Z"}, {"name": "tempest-1242055933", "created_at": "2020-10-12T14:31:50Z", "updated_at": "2020-10-12T14:31:50Z"}, {"name": "tempest-1267333658", "created_at": "2020-10-16T17:36:11Z", "updated_at": "2020-10-16T17:36:11Z"}, {"name": "tempest-776499970", "created_at": "2020-10-16T17:54:29Z", "updated_at": "2020-10-16T17:54:29Z"}, {"name": "tempest-799976223", "created_at": "2020-10-16T17:59:18Z", "updated_at": "2020-10-16T17:59:18Z"}, {"name": "tempest-1471385054", "created_at": "2020-10-17T13:13:43Z", "updated_at": "2020-10-17T13:13:43Z"}, {"name": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:55.743 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:20:55.751 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:55.752 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: add_metadef_property, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:20:55.780 39 INFO tempest.lib.common.rest_client [req-ed76366e-5e56-4224-84bb-df21ca75d554 ] Request (NamespacesPropertyRbacTest:test_add_md_properties): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces 0.027s 2020-11-06 18:20:55.781 39 DEBUG tempest.lib.common.rest_client [req-ed76366e-5e56-4224-84bb-df21ca75d554 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"namespace": "tempest-test-ns-924355630", "visibility": "public", "description": "Tempest", "protected": false, "display_name": "tempest-test-ns-924355630"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '383', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/metadefs/namespaces/tempest-test-ns-924355630', 'x-openstack-request-id': 'req-ed76366e-5e56-4224-84bb-df21ca75d554', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces'} Body: b'{"namespace": "tempest-test-ns-924355630", "display_name": "tempest-test-ns-924355630", "description": "Tempest", "visibility": "public", "protected": false, "owner": "d8115de3bd4745ac8ff3cc198d2a717f", "created_at": "2020-11-06T18:20:55Z", "updated_at": "2020-11-06T18:20:55Z", "self": "/v2/metadefs/namespaces/tempest-test-ns-924355630", "schema": "/v2/schemas/metadefs/namespace"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:55.781 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:20:55.900 39 INFO tempest.lib.common.rest_client [req-77162b69-39f9-43f1-9666-27e65c78acbe ] Request (NamespacesPropertyRbacTest:test_add_md_properties): 200 GET http://172.30.13.94/identity/v3/projects/d8115de3bd4745ac8ff3cc198d2a717f/users/6632f4eedae44a0cb26add8af7c38039/roles 0.118s 2020-11-06 18:20:55.901 39 DEBUG tempest.lib.common.rest_client [req-77162b69-39f9-43f1-9666-27e65c78acbe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-77162b69-39f9-43f1-9666-27e65c78acbe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d8115de3bd4745ac8ff3cc198d2a717f/users/6632f4eedae44a0cb26add8af7c38039/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d8115de3bd4745ac8ff3cc198d2a717f/users/6632f4eedae44a0cb26add8af7c38039/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:55.938 39 INFO tempest.lib.common.rest_client [req-1f255aee-6146-4c08-a9ed-2b7c14b174e2 ] Request (NamespacesPropertyRbacTest:test_add_md_properties): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:20:55.939 39 DEBUG tempest.lib.common.rest_client [req-1f255aee-6146-4c08-a9ed-2b7c14b174e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1f255aee-6146-4c08-a9ed-2b7c14b174e2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6632f4eedae44a0cb26add8af7c38039", "name": "tempest-NamespacesPropertyRbacTest-812130814", "password_expires_at": null}, "audit_ids": ["BvUS1kEIRlO7d05rnU2ByA"], "expires_at": "2020-11-06T19:20:55.000000Z", "issued_at": "2020-11-06T18:20:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d8115de3bd4745ac8ff3cc198d2a717f", "name": "tempest-NamespacesPropertyRbacTest-812130814"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:56.045 39 INFO tempest.lib.common.rest_client [req-aad8623a-a84c-42c7-958a-f82034ceee11 ] Request (NamespacesPropertyRbacTest:test_add_md_properties): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-924355630/properties 0.105s 2020-11-06 18:20:56.046 39 DEBUG tempest.lib.common.rest_client [req-aad8623a-a84c-42c7-958a-f82034ceee11 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"type": "string", "title": "tempest-NamespacesPropertyRbacTest-test-ns-property-1280737572", "name": "OS::Glance::Image"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '122', 'content-type': 'application/json', 'x-openstack-request-id': 'req-aad8623a-a84c-42c7-958a-f82034ceee11', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-924355630/properties'} Body: b'{"name": "OS::Glance::Image", "type": "string", "title": "tempest-NamespacesPropertyRbacTest-test-ns-property-1280737572"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:56.046 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:20:56.098 39 INFO tempest.lib.common.rest_client [req-6da028cd-f450-49a7-8840-07bc6222b896 ] Request (NamespacesPropertyRbacTest:test_add_md_properties): 200 GET http://172.30.13.94/identity/v3/projects/d8115de3bd4745ac8ff3cc198d2a717f/users/6632f4eedae44a0cb26add8af7c38039/roles 0.051s 2020-11-06 18:20:56.099 39 DEBUG tempest.lib.common.rest_client [req-6da028cd-f450-49a7-8840-07bc6222b896 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6da028cd-f450-49a7-8840-07bc6222b896', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d8115de3bd4745ac8ff3cc198d2a717f/users/6632f4eedae44a0cb26add8af7c38039/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d8115de3bd4745ac8ff3cc198d2a717f/users/6632f4eedae44a0cb26add8af7c38039/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:56.135 39 INFO tempest.lib.common.rest_client [req-2cdec4b4-0417-4b26-848d-2fd338d9e833 ] Request (NamespacesPropertyRbacTest:test_add_md_properties): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:20:56.136 39 DEBUG tempest.lib.common.rest_client [req-2cdec4b4-0417-4b26-848d-2fd338d9e833 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2cdec4b4-0417-4b26-848d-2fd338d9e833', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6632f4eedae44a0cb26add8af7c38039", "name": "tempest-NamespacesPropertyRbacTest-812130814", "password_expires_at": null}, "audit_ids": ["jJfq80MdQaWRDNaMlPy1wA"], "expires_at": "2020-11-06T19:20:56.000000Z", "issued_at": "2020-11-06T18:20:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d8115de3bd4745ac8ff3cc198d2a717f", "name": "tempest-NamespacesPropertyRbacTest-812130814"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:56.223 39 INFO tempest.lib.common.rest_client [req-b97d094f-e3c5-41c0-a26b-504063971232 ] Request (NamespacesPropertyRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-924355630 0.085s 2020-11-06 18:20:56.223 39 DEBUG tempest.lib.common.rest_client [req-b97d094f-e3c5-41c0-a26b-504063971232 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-b97d094f-e3c5-41c0-a26b-504063971232', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-924355630'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:56.226 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:20:56.227 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:56.228 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_metadef_properties, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:20:56.253 39 INFO tempest.lib.common.rest_client [req-0ae57a26-dbb0-4b66-b8db-f7c9f719f986 ] Request (NamespacesPropertyRbacTest:test_get_md_properties): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces 0.023s 2020-11-06 18:20:56.253 39 DEBUG tempest.lib.common.rest_client [req-0ae57a26-dbb0-4b66-b8db-f7c9f719f986 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"namespace": "tempest-test-ns-657959913", "visibility": "public", "description": "Tempest", "protected": false, "display_name": "tempest-test-ns-657959913"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '383', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/metadefs/namespaces/tempest-test-ns-657959913', 'x-openstack-request-id': 'req-0ae57a26-dbb0-4b66-b8db-f7c9f719f986', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces'} Body: b'{"namespace": "tempest-test-ns-657959913", "display_name": "tempest-test-ns-657959913", "description": "Tempest", "visibility": "public", "protected": false, "owner": "d8115de3bd4745ac8ff3cc198d2a717f", "created_at": "2020-11-06T18:20:56Z", "updated_at": "2020-11-06T18:20:56Z", "self": "/v2/metadefs/namespaces/tempest-test-ns-657959913", "schema": "/v2/schemas/metadefs/namespace"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:56.254 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:20:56.306 39 INFO tempest.lib.common.rest_client [req-f61459df-fece-4539-a0ea-ae1d6ec83c8d ] Request (NamespacesPropertyRbacTest:test_get_md_properties): 200 GET http://172.30.13.94/identity/v3/projects/d8115de3bd4745ac8ff3cc198d2a717f/users/6632f4eedae44a0cb26add8af7c38039/roles 0.051s 2020-11-06 18:20:56.306 39 DEBUG tempest.lib.common.rest_client [req-f61459df-fece-4539-a0ea-ae1d6ec83c8d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f61459df-fece-4539-a0ea-ae1d6ec83c8d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d8115de3bd4745ac8ff3cc198d2a717f/users/6632f4eedae44a0cb26add8af7c38039/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d8115de3bd4745ac8ff3cc198d2a717f/users/6632f4eedae44a0cb26add8af7c38039/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:56.346 39 INFO tempest.lib.common.rest_client [req-1604806e-d246-485b-b8da-5e4576e6c57f ] Request (NamespacesPropertyRbacTest:test_get_md_properties): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:20:56.347 39 DEBUG tempest.lib.common.rest_client [req-1604806e-d246-485b-b8da-5e4576e6c57f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1604806e-d246-485b-b8da-5e4576e6c57f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6632f4eedae44a0cb26add8af7c38039", "name": "tempest-NamespacesPropertyRbacTest-812130814", "password_expires_at": null}, "audit_ids": ["IZyQkmiOQhuS255nld4B9Q"], "expires_at": "2020-11-06T19:20:56.000000Z", "issued_at": "2020-11-06T18:20:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d8115de3bd4745ac8ff3cc198d2a717f", "name": "tempest-NamespacesPropertyRbacTest-812130814"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:56.500 39 INFO tempest.lib.common.rest_client [req-1cedca90-a371-4f2c-9c28-230be1d3efe1 ] Request (NamespacesPropertyRbacTest:test_get_md_properties): 200 GET http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-657959913/properties 0.152s 2020-11-06 18:20:56.500 39 DEBUG tempest.lib.common.rest_client [req-1cedca90-a371-4f2c-9c28-230be1d3efe1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '18', 'content-type': 'application/json', 'x-openstack-request-id': 'req-1cedca90-a371-4f2c-9c28-230be1d3efe1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-657959913/properties'} Body: b'{"properties": {}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:56.501 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:20:56.549 39 INFO tempest.lib.common.rest_client [req-225df8be-9794-4b48-a1b6-57261d47504b ] Request (NamespacesPropertyRbacTest:test_get_md_properties): 200 GET http://172.30.13.94/identity/v3/projects/d8115de3bd4745ac8ff3cc198d2a717f/users/6632f4eedae44a0cb26add8af7c38039/roles 0.048s 2020-11-06 18:20:56.550 39 DEBUG tempest.lib.common.rest_client [req-225df8be-9794-4b48-a1b6-57261d47504b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-225df8be-9794-4b48-a1b6-57261d47504b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d8115de3bd4745ac8ff3cc198d2a717f/users/6632f4eedae44a0cb26add8af7c38039/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d8115de3bd4745ac8ff3cc198d2a717f/users/6632f4eedae44a0cb26add8af7c38039/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:56.588 39 INFO tempest.lib.common.rest_client [req-4375b671-feb6-419f-a0ef-8aca80537f50 ] Request (NamespacesPropertyRbacTest:test_get_md_properties): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:20:56.589 39 DEBUG tempest.lib.common.rest_client [req-4375b671-feb6-419f-a0ef-8aca80537f50 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4375b671-feb6-419f-a0ef-8aca80537f50', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6632f4eedae44a0cb26add8af7c38039", "name": "tempest-NamespacesPropertyRbacTest-812130814", "password_expires_at": null}, "audit_ids": ["3E64aR7DT2GGjvNBLcmVIw"], "expires_at": "2020-11-06T19:20:56.000000Z", "issued_at": "2020-11-06T18:20:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d8115de3bd4745ac8ff3cc198d2a717f", "name": "tempest-NamespacesPropertyRbacTest-812130814"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:56.680 39 INFO tempest.lib.common.rest_client [req-91ef1a11-ae1c-4714-8c06-4445cdfbc834 ] Request (NamespacesPropertyRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-657959913 0.089s 2020-11-06 18:20:56.680 39 DEBUG tempest.lib.common.rest_client [req-91ef1a11-ae1c-4714-8c06-4445cdfbc834 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-91ef1a11-ae1c-4714-8c06-4445cdfbc834', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-657959913'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:56.683 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:20:56.683 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:56.685 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_metadef_property, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:20:56.714 39 INFO tempest.lib.common.rest_client [req-0a1f619b-1819-4501-b277-bb7c9e6ce749 ] Request (NamespacesPropertyRbacTest:test_get_md_property): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces 0.028s 2020-11-06 18:20:56.714 39 DEBUG tempest.lib.common.rest_client [req-0a1f619b-1819-4501-b277-bb7c9e6ce749 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"namespace": "tempest-test-ns-80287109", "visibility": "public", "description": "Tempest", "protected": false, "display_name": "tempest-test-ns-80287109"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '380', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/metadefs/namespaces/tempest-test-ns-80287109', 'x-openstack-request-id': 'req-0a1f619b-1819-4501-b277-bb7c9e6ce749', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces'} Body: b'{"namespace": "tempest-test-ns-80287109", "display_name": "tempest-test-ns-80287109", "description": "Tempest", "visibility": "public", "protected": false, "owner": "d8115de3bd4745ac8ff3cc198d2a717f", "created_at": "2020-11-06T18:20:56Z", "updated_at": "2020-11-06T18:20:56Z", "self": "/v2/metadefs/namespaces/tempest-test-ns-80287109", "schema": "/v2/schemas/metadefs/namespace"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:56.738 39 INFO tempest.lib.common.rest_client [req-c4334847-f5cf-4a7f-8051-eed38c7ab2cd ] Request (NamespacesPropertyRbacTest:test_get_md_property): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-80287109/properties 0.023s 2020-11-06 18:20:56.738 39 DEBUG tempest.lib.common.rest_client [req-c4334847-f5cf-4a7f-8051-eed38c7ab2cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"type": "string", "title": "tempest-NamespacesPropertyRbacTest-test-ns-property-2037714853", "name": "OS::Glance::Image"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '122', 'content-type': 'application/json', 'x-openstack-request-id': 'req-c4334847-f5cf-4a7f-8051-eed38c7ab2cd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-80287109/properties'} Body: b'{"name": "OS::Glance::Image", "type": "string", "title": "tempest-NamespacesPropertyRbacTest-test-ns-property-2037714853"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:56.738 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:20:56.784 39 INFO tempest.lib.common.rest_client [req-4bc29fd5-fac0-4d04-8cac-1bde7040409f ] Request (NamespacesPropertyRbacTest:test_get_md_property): 200 GET http://172.30.13.94/identity/v3/projects/d8115de3bd4745ac8ff3cc198d2a717f/users/6632f4eedae44a0cb26add8af7c38039/roles 0.045s 2020-11-06 18:20:56.785 39 DEBUG tempest.lib.common.rest_client [req-4bc29fd5-fac0-4d04-8cac-1bde7040409f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4bc29fd5-fac0-4d04-8cac-1bde7040409f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d8115de3bd4745ac8ff3cc198d2a717f/users/6632f4eedae44a0cb26add8af7c38039/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d8115de3bd4745ac8ff3cc198d2a717f/users/6632f4eedae44a0cb26add8af7c38039/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:56.819 39 INFO tempest.lib.common.rest_client [req-1f3a0366-48ab-4589-b043-3f9532c046e0 ] Request (NamespacesPropertyRbacTest:test_get_md_property): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:20:56.819 39 DEBUG tempest.lib.common.rest_client [req-1f3a0366-48ab-4589-b043-3f9532c046e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1f3a0366-48ab-4589-b043-3f9532c046e0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6632f4eedae44a0cb26add8af7c38039", "name": "tempest-NamespacesPropertyRbacTest-812130814", "password_expires_at": null}, "audit_ids": ["ORhSXr06T7WweeAveQWh_w"], "expires_at": "2020-11-06T19:20:56.000000Z", "issued_at": "2020-11-06T18:20:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d8115de3bd4745ac8ff3cc198d2a717f", "name": "tempest-NamespacesPropertyRbacTest-812130814"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:56.903 39 INFO tempest.lib.common.rest_client [req-5141adb8-a912-4107-85fe-f3029e753caa ] Request (NamespacesPropertyRbacTest:test_get_md_property): 200 GET http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-80287109/properties/OS::Glance::Image 0.083s 2020-11-06 18:20:56.904 39 DEBUG tempest.lib.common.rest_client [req-5141adb8-a912-4107-85fe-f3029e753caa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '122', 'content-type': 'application/json', 'x-openstack-request-id': 'req-5141adb8-a912-4107-85fe-f3029e753caa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-80287109/properties/OS::Glance::Image'} Body: b'{"name": "OS::Glance::Image", "type": "string", "title": "tempest-NamespacesPropertyRbacTest-test-ns-property-2037714853"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:56.904 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:20:56.950 39 INFO tempest.lib.common.rest_client [req-3ff48283-ee54-4ba1-9730-d666ad4ae1db ] Request (NamespacesPropertyRbacTest:test_get_md_property): 200 GET http://172.30.13.94/identity/v3/projects/d8115de3bd4745ac8ff3cc198d2a717f/users/6632f4eedae44a0cb26add8af7c38039/roles 0.045s 2020-11-06 18:20:56.951 39 DEBUG tempest.lib.common.rest_client [req-3ff48283-ee54-4ba1-9730-d666ad4ae1db ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3ff48283-ee54-4ba1-9730-d666ad4ae1db', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d8115de3bd4745ac8ff3cc198d2a717f/users/6632f4eedae44a0cb26add8af7c38039/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d8115de3bd4745ac8ff3cc198d2a717f/users/6632f4eedae44a0cb26add8af7c38039/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:56.983 39 INFO tempest.lib.common.rest_client [req-9c239a74-b3b8-458b-9122-ce57f7254597 ] Request (NamespacesPropertyRbacTest:test_get_md_property): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:20:56.984 39 DEBUG tempest.lib.common.rest_client [req-9c239a74-b3b8-458b-9122-ce57f7254597 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9c239a74-b3b8-458b-9122-ce57f7254597', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6632f4eedae44a0cb26add8af7c38039", "name": "tempest-NamespacesPropertyRbacTest-812130814", "password_expires_at": null}, "audit_ids": ["3Ye_DLVySFGkGrwHTkgh4w"], "expires_at": "2020-11-06T19:20:56.000000Z", "issued_at": "2020-11-06T18:20:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d8115de3bd4745ac8ff3cc198d2a717f", "name": "tempest-NamespacesPropertyRbacTest-812130814"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:57.076 39 INFO tempest.lib.common.rest_client [req-336c5a07-efc5-464c-99cc-09966959e2ae ] Request (NamespacesPropertyRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-80287109 0.091s 2020-11-06 18:20:57.076 39 DEBUG tempest.lib.common.rest_client [req-336c5a07-efc5-464c-99cc-09966959e2ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-336c5a07-efc5-464c-99cc-09966959e2ae', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-80287109'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:57.079 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:20:57.079 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:20:57.081 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: modify_metadef_property, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:20:57.105 39 INFO tempest.lib.common.rest_client [req-af88bd28-7a5a-4ecb-a36a-1ddba962c8f6 ] Request (NamespacesPropertyRbacTest:test_modify_md_properties): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces 0.023s 2020-11-06 18:20:57.105 39 DEBUG tempest.lib.common.rest_client [req-af88bd28-7a5a-4ecb-a36a-1ddba962c8f6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"namespace": "tempest-test-ns-1721858006", "visibility": "public", "description": "Tempest", "protected": false, "display_name": "tempest-test-ns-1721858006"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '386', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/metadefs/namespaces/tempest-test-ns-1721858006', 'x-openstack-request-id': 'req-af88bd28-7a5a-4ecb-a36a-1ddba962c8f6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces'} Body: b'{"namespace": "tempest-test-ns-1721858006", "display_name": "tempest-test-ns-1721858006", "description": "Tempest", "visibility": "public", "protected": false, "owner": "d8115de3bd4745ac8ff3cc198d2a717f", "created_at": "2020-11-06T18:20:57Z", "updated_at": "2020-11-06T18:20:57Z", "self": "/v2/metadefs/namespaces/tempest-test-ns-1721858006", "schema": "/v2/schemas/metadefs/namespace"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:57.132 39 INFO tempest.lib.common.rest_client [req-f242115b-e1b6-4ca8-996e-ecdc27af8613 ] Request (NamespacesPropertyRbacTest:test_modify_md_properties): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1721858006/properties 0.026s 2020-11-06 18:20:57.133 39 DEBUG tempest.lib.common.rest_client [req-f242115b-e1b6-4ca8-996e-ecdc27af8613 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"type": "string", "title": "tempest-NamespacesPropertyRbacTest-test-ns-property-1839146099", "name": "OS::Glance::Image"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '122', 'content-type': 'application/json', 'x-openstack-request-id': 'req-f242115b-e1b6-4ca8-996e-ecdc27af8613', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1721858006/properties'} Body: b'{"name": "OS::Glance::Image", "type": "string", "title": "tempest-NamespacesPropertyRbacTest-test-ns-property-1839146099"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:57.133 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:20:57.179 39 INFO tempest.lib.common.rest_client [req-b1ff3f75-4f35-43da-929f-125ee14b4fce ] Request (NamespacesPropertyRbacTest:test_modify_md_properties): 200 GET http://172.30.13.94/identity/v3/projects/d8115de3bd4745ac8ff3cc198d2a717f/users/6632f4eedae44a0cb26add8af7c38039/roles 0.045s 2020-11-06 18:20:57.180 39 DEBUG tempest.lib.common.rest_client [req-b1ff3f75-4f35-43da-929f-125ee14b4fce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b1ff3f75-4f35-43da-929f-125ee14b4fce', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d8115de3bd4745ac8ff3cc198d2a717f/users/6632f4eedae44a0cb26add8af7c38039/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d8115de3bd4745ac8ff3cc198d2a717f/users/6632f4eedae44a0cb26add8af7c38039/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:57.212 39 INFO tempest.lib.common.rest_client [req-10d07113-e793-4553-9df5-9860ae87b5c7 ] Request (NamespacesPropertyRbacTest:test_modify_md_properties): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:20:57.213 39 DEBUG tempest.lib.common.rest_client [req-10d07113-e793-4553-9df5-9860ae87b5c7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-10d07113-e793-4553-9df5-9860ae87b5c7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6632f4eedae44a0cb26add8af7c38039", "name": "tempest-NamespacesPropertyRbacTest-812130814", "password_expires_at": null}, "audit_ids": ["Oz6biVFQT-yLIH5QEP6rDw"], "expires_at": "2020-11-06T19:20:57.000000Z", "issued_at": "2020-11-06T18:20:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d8115de3bd4745ac8ff3cc198d2a717f", "name": "tempest-NamespacesPropertyRbacTest-812130814"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:57.305 39 INFO tempest.lib.common.rest_client [req-55d01e34-b5d0-4d6e-93c6-800f4b290ec5 ] Request (NamespacesPropertyRbacTest:test_modify_md_properties): 200 PUT http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1721858006/properties/OS::Glance::Image 0.091s 2020-11-06 18:20:57.305 39 DEBUG tempest.lib.common.rest_client [req-55d01e34-b5d0-4d6e-93c6-800f4b290ec5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"type": "string", "title": "tempest-NamespacesPropertyRbacTest-test-ns-property-1839146099", "name": "OS::Glance::Image"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '122', 'content-type': 'application/json', 'x-openstack-request-id': 'req-55d01e34-b5d0-4d6e-93c6-800f4b290ec5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1721858006/properties/OS::Glance::Image'} Body: b'{"name": "OS::Glance::Image", "type": "string", "title": "tempest-NamespacesPropertyRbacTest-test-ns-property-1839146099"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:57.306 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:20:57.353 39 INFO tempest.lib.common.rest_client [req-01036f52-dca2-42d9-935e-cf0be07e28d2 ] Request (NamespacesPropertyRbacTest:test_modify_md_properties): 200 GET http://172.30.13.94/identity/v3/projects/d8115de3bd4745ac8ff3cc198d2a717f/users/6632f4eedae44a0cb26add8af7c38039/roles 0.046s 2020-11-06 18:20:57.353 39 DEBUG tempest.lib.common.rest_client [req-01036f52-dca2-42d9-935e-cf0be07e28d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-01036f52-dca2-42d9-935e-cf0be07e28d2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d8115de3bd4745ac8ff3cc198d2a717f/users/6632f4eedae44a0cb26add8af7c38039/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d8115de3bd4745ac8ff3cc198d2a717f/users/6632f4eedae44a0cb26add8af7c38039/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:57.385 39 INFO tempest.lib.common.rest_client [req-d2898e03-01c2-41dd-be2e-5f6f10272060 ] Request (NamespacesPropertyRbacTest:test_modify_md_properties): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:20:57.386 39 DEBUG tempest.lib.common.rest_client [req-d2898e03-01c2-41dd-be2e-5f6f10272060 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d2898e03-01c2-41dd-be2e-5f6f10272060', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6632f4eedae44a0cb26add8af7c38039", "name": "tempest-NamespacesPropertyRbacTest-812130814", "password_expires_at": null}, "audit_ids": ["r6fT7O6iTq6qoHbR9fu24A"], "expires_at": "2020-11-06T19:20:57.000000Z", "issued_at": "2020-11-06T18:20:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d8115de3bd4745ac8ff3cc198d2a717f", "name": "tempest-NamespacesPropertyRbacTest-812130814"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8115de3bd4745ac8ff3cc198d2a717f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:57.464 39 INFO tempest.lib.common.rest_client [req-6526fe7c-8420-42fa-a477-5fd6ecbf9e4c ] Request (NamespacesPropertyRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1721858006 0.077s 2020-11-06 18:20:57.464 39 DEBUG tempest.lib.common.rest_client [req-6526fe7c-8420-42fa-a477-5fd6ecbf9e4c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-6526fe7c-8420-42fa-a477-5fd6ecbf9e4c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1721858006'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:57.576 39 INFO tempest.lib.common.rest_client [req-860e53e3-f38b-46e8-9bc9-5ed6d755df00 ] Request (NamespacesPropertyRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/6632f4eedae44a0cb26add8af7c38039 0.110s 2020-11-06 18:20:57.576 39 DEBUG tempest.lib.common.rest_client [req-860e53e3-f38b-46e8-9bc9-5ed6d755df00 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-860e53e3-f38b-46e8-9bc9-5ed6d755df00', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/6632f4eedae44a0cb26add8af7c38039'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:57.658 39 INFO tempest.lib.common.rest_client [req-554eb367-0831-4b5a-9e97-0081587d52e8 ] Request (NamespacesPropertyRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-11-06 18:20:57.658 39 DEBUG tempest.lib.common.rest_client [req-554eb367-0831-4b5a-9e97-0081587d52e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-554eb367-0831-4b5a-9e97-0081587d52e8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["OyRTi01qTnmyt9advBhhag"], "expires_at": "2020-11-06T19:20:57.000000Z", "issued_at": "2020-11-06T18:20:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:58.001 39 INFO tempest.lib.common.rest_client [req-370a30db-88b0-46ae-af05-b7a16c67c436 ] Request (NamespacesPropertyRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=d8115de3bd4745ac8ff3cc198d2a717f&name=default 0.341s 2020-11-06 18:20:58.002 39 DEBUG tempest.lib.common.rest_client [req-370a30db-88b0-46ae-af05-b7a16c67c436 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-370a30db-88b0-46ae-af05-b7a16c67c436', 'date': 'Fri, 06 Nov 2020 18:20:57 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=d8115de3bd4745ac8ff3cc198d2a717f&name=default'} Body: b'{"security_groups": [{"id": "fc04e5c8-6c8a-4348-b9b9-cf4898e9936c", "name": "default", "stateful": true, "tenant_id": "d8115de3bd4745ac8ff3cc198d2a717f", "description": "Default security group", "security_group_rules": [{"id": "036f46fd-0165-470f-80f2-0744e8254f8b", "tenant_id": "d8115de3bd4745ac8ff3cc198d2a717f", "security_group_id": "fc04e5c8-6c8a-4348-b9b9-cf4898e9936c", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "fc04e5c8-6c8a-4348-b9b9-cf4898e9936c", "description": null, "tags": [], "created_at": "2020-11-06T18:20:57Z", "updated_at": "2020-11-06T18:20:57Z", "revision_number": 0, "project_id": "d8115de3bd4745ac8ff3cc198d2a717f"}, {"id": "7ddeb434-cd9d-40de-8746-ce1432565a7d", "tenant_id": "d8115de3bd4745ac8ff3cc198d2a717f", "security_group_id": "fc04e5c8-6c8a-4348-b9b9-cf4898e9936c", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:20:57Z", "updated_at": "2020-11-06T18:20:57Z", "revision_number": 0, "project_id": "d8115de3bd4745ac8ff3cc198d2a717f"}, {"id": "ae2e731b-5072-463c-988a-8eacfe8b754b", "tenant_id": "d8115de3bd4745ac8ff3cc198d2a717f", "security_group_id": "fc04e5c8-6c8a-4348-b9b9-cf4898e9936c", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "fc04e5c8-6c8a-4348-b9b9-cf4898e9936c", "description": null, "tags": [], "created_at": "2020-11-06T18:20:57Z", "updated_at": "2020-11-06T18:20:57Z", "revision_number": 0, "project_id": "d8115de3bd4745ac8ff3cc198d2a717f"}, {"id": "b27d44df-b073-4513-93e5-998fb30d1860", "tenant_id": "d8115de3bd4745ac8ff3cc198d2a717f", "security_group_id": "fc04e5c8-6c8a-4348-b9b9-cf4898e9936c", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:20:57Z", "updated_at": "2020-11-06T18:20:57Z", "revision_number": 0, "project_id": "d8115de3bd4745ac8ff3cc198d2a717f"}], "tags": [], "created_at": "2020-11-06T18:20:57Z", "updated_at": "2020-11-06T18:20:57Z", "revision_number": 1, "project_id": "d8115de3bd4745ac8ff3cc198d2a717f"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:58.121 39 INFO tempest.lib.common.rest_client [req-00f2c25b-a123-46f6-8da0-072f2153d169 ] Request (NamespacesPropertyRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/fc04e5c8-6c8a-4348-b9b9-cf4898e9936c 0.118s 2020-11-06 18:20:58.122 39 DEBUG tempest.lib.common.rest_client [req-00f2c25b-a123-46f6-8da0-072f2153d169 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-00f2c25b-a123-46f6-8da0-072f2153d169', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:20:58 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/fc04e5c8-6c8a-4348-b9b9-cf4898e9936c'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:58.244 39 INFO tempest.lib.common.rest_client [req-77a289f4-972b-41bd-a7e0-a4cdd134161e ] Request (NamespacesPropertyRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/d8115de3bd4745ac8ff3cc198d2a717f 0.121s 2020-11-06 18:20:58.244 39 DEBUG tempest.lib.common.rest_client [req-77a289f4-972b-41bd-a7e0-a4cdd134161e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-77a289f4-972b-41bd-a7e0-a4cdd134161e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d8115de3bd4745ac8ff3cc198d2a717f'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:58.340 39 INFO tempest.lib.common.rest_client [req-94814af1-71eb-4a10-9132-ef3c64289fc0 ] Request (ImageResourceTypesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-11-06 18:20:58.341 39 DEBUG tempest.lib.common.rest_client [req-94814af1-71eb-4a10-9132-ef3c64289fc0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-94814af1-71eb-4a10-9132-ef3c64289fc0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["vXE2KqlQSAm-x-8DZiqheQ"], "expires_at": "2020-11-06T19:20:58.000000Z", "issued_at": "2020-11-06T18:20:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:58.392 39 INFO tempest.lib.common.rest_client [req-cb9a3fb6-60fd-4b29-a056-5a32945c2c6e ] Request (ImageResourceTypesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-11-06 18:20:58.393 39 DEBUG tempest.lib.common.rest_client [req-cb9a3fb6-60fd-4b29-a056-5a32945c2c6e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cb9a3fb6-60fd-4b29-a056-5a32945c2c6e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["qgCM30PfQfOhv5tAWAI-ww"], "expires_at": "2020-11-06T19:20:58.000000Z", "issued_at": "2020-11-06T18:20:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:58.441 39 INFO tempest.lib.common.rest_client [req-cd4bfc2c-df61-45ec-8a4c-f4c56a627c2b ] Request (ImageResourceTypesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.047s 2020-11-06 18:20:58.441 39 DEBUG tempest.lib.common.rest_client [req-cd4bfc2c-df61-45ec-8a4c-f4c56a627c2b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cd4bfc2c-df61-45ec-8a4c-f4c56a627c2b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:58.497 39 INFO tempest.lib.common.rest_client [req-0457748f-4f7d-4196-a868-a7aa399b509e ] Request (ImageResourceTypesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.054s 2020-11-06 18:20:58.497 39 DEBUG tempest.lib.common.rest_client [req-0457748f-4f7d-4196-a868-a7aa399b509e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ImageResourceTypesRbacTest-212696706-desc", "domain_id": "default", "name": "tempest-ImageResourceTypesRbacTest-212696706"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '388', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0457748f-4f7d-4196-a868-a7aa399b509e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "e645e270517e4fe197c3eae68812589e", "name": "tempest-ImageResourceTypesRbacTest-212696706", "domain_id": "default", "description": "tempest-ImageResourceTypesRbacTest-212696706-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/e645e270517e4fe197c3eae68812589e"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:58.611 39 INFO tempest.lib.common.rest_client [req-d6868783-0e81-4520-a8db-1a21160b24b5 ] Request (ImageResourceTypesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.113s 2020-11-06 18:20:58.612 39 DEBUG tempest.lib.common.rest_client [req-d6868783-0e81-4520-a8db-1a21160b24b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ImageResourceTypesRbacTest-212696706", "password": "C5=FcQQEYdyjQOg", "project_id": "e645e270517e4fe197c3eae68812589e", "email": "tempest-ImageResourceTypesRbacTest-128397051@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '406', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d6868783-0e81-4520-a8db-1a21160b24b5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "e645e270517e4fe197c3eae68812589e", "email": "tempest-ImageResourceTypesRbacTest-128397051@example.com", "id": "60966a8f23cc4da892115d2c5f0a9774", "name": "tempest-ImageResourceTypesRbacTest-212696706", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/60966a8f23cc4da892115d2c5f0a9774"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:58.661 39 INFO tempest.lib.common.rest_client [req-b338b653-38b7-4713-a27e-d7b801999948 ] Request (ImageResourceTypesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.048s 2020-11-06 18:20:58.661 39 DEBUG tempest.lib.common.rest_client [req-b338b653-38b7-4713-a27e-d7b801999948 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b338b653-38b7-4713-a27e-d7b801999948', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:58.718 39 INFO tempest.lib.common.rest_client [req-98537ce3-dc50-497b-b3bd-1841487ddcab ] Request (ImageResourceTypesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-11-06 18:20:58.719 39 DEBUG tempest.lib.common.rest_client [req-98537ce3-dc50-497b-b3bd-1841487ddcab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-98537ce3-dc50-497b-b3bd-1841487ddcab', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:58.788 39 INFO tempest.lib.common.rest_client [req-adecb9f6-d734-4310-8fcf-9bdba28a59f4 ] Request (ImageResourceTypesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/e645e270517e4fe197c3eae68812589e/users/60966a8f23cc4da892115d2c5f0a9774/roles/72a4576c553448cd941b052c1ca0cf2d 0.068s 2020-11-06 18:20:58.789 39 DEBUG tempest.lib.common.rest_client [req-adecb9f6-d734-4310-8fcf-9bdba28a59f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-adecb9f6-d734-4310-8fcf-9bdba28a59f4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e645e270517e4fe197c3eae68812589e/users/60966a8f23cc4da892115d2c5f0a9774/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:58.789 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImageResourceTypesRbacTest-212696706', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'e645e270517e4fe197c3eae68812589e', 'project_name': 'tempest-ImageResourceTypesRbacTest-212696706', 'tenant_id': 'e645e270517e4fe197c3eae68812589e', 'tenant_name': 'tempest-ImageResourceTypesRbacTest-212696706', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '60966a8f23cc4da892115d2c5f0a9774'}, Network: None, Subnet: None, Router: None 2020-11-06 18:20:58.790 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImageResourceTypesRbacTest-212696706', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'e645e270517e4fe197c3eae68812589e', 'project_name': 'tempest-ImageResourceTypesRbacTest-212696706', 'tenant_id': 'e645e270517e4fe197c3eae68812589e', 'tenant_name': 'tempest-ImageResourceTypesRbacTest-212696706', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '60966a8f23cc4da892115d2c5f0a9774'}, Network: None, Subnet: None, Router: None 2020-11-06 18:20:58.895 39 INFO tempest.lib.common.rest_client [req-a68038f6-9d36-4712-a9ab-57e1909e11eb ] Request (ImageResourceTypesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-11-06 18:20:58.895 39 DEBUG tempest.lib.common.rest_client [req-a68038f6-9d36-4712-a9ab-57e1909e11eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6581', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a68038f6-9d36-4712-a9ab-57e1909e11eb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "60966a8f23cc4da892115d2c5f0a9774", "name": "tempest-ImageResourceTypesRbacTest-212696706", "password_expires_at": null}, "audit_ids": ["p2g80RGRQj6ilCHTcSC7eQ"], "expires_at": "2020-11-06T19:20:58.000000Z", "issued_at": "2020-11-06T18:20:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e645e270517e4fe197c3eae68812589e", "name": "tempest-ImageResourceTypesRbacTest-212696706"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:58.981 39 INFO tempest.lib.common.rest_client [req-aa65d113-5f48-4dda-b280-5c9680273d24 ] Request (ImageResourceTypesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-11-06 18:20:58.982 39 DEBUG tempest.lib.common.rest_client [req-aa65d113-5f48-4dda-b280-5c9680273d24 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aa65d113-5f48-4dda-b280-5c9680273d24', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["ZTXpIE_zR0Ceyzfy32xmgA"], "expires_at": "2020-11-06T19:20:58.000000Z", "issued_at": "2020-11-06T18:20:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:59.025 39 INFO tempest.lib.common.rest_client [req-8060d000-bbfc-4de8-aaca-f69ffe7f9149 ] Request (ImageResourceTypesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:20:59.026 39 DEBUG tempest.lib.common.rest_client [req-8060d000-bbfc-4de8-aaca-f69ffe7f9149 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8060d000-bbfc-4de8-aaca-f69ffe7f9149', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["JCptCaAFTymIvmDRGzxjug"], "expires_at": "2020-11-06T19:20:59.000000Z", "issued_at": "2020-11-06T18:20:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:59.086 39 INFO tempest.lib.common.rest_client [req-2211669e-3a3d-4176-9b56-4fd010c50405 ] Request (ImageResourceTypesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.059s 2020-11-06 18:20:59.086 39 DEBUG tempest.lib.common.rest_client [req-2211669e-3a3d-4176-9b56-4fd010c50405 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2211669e-3a3d-4176-9b56-4fd010c50405', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:59.140 39 INFO tempest.lib.common.rest_client [req-fbac525f-6d38-48d1-b303-f29203fc9ad9 ] Request (ImageResourceTypesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.053s 2020-11-06 18:20:59.140 39 DEBUG tempest.lib.common.rest_client [req-fbac525f-6d38-48d1-b303-f29203fc9ad9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fbac525f-6d38-48d1-b303-f29203fc9ad9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:59.141 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:20:59.141 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:20:59.198 39 INFO tempest.lib.common.rest_client [req-59250b79-1f93-499e-893a-cc3984a0a7e8 ] Request (ImageResourceTypesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/e645e270517e4fe197c3eae68812589e/users/60966a8f23cc4da892115d2c5f0a9774/roles 0.055s 2020-11-06 18:20:59.198 39 DEBUG tempest.lib.common.rest_client [req-59250b79-1f93-499e-893a-cc3984a0a7e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-59250b79-1f93-499e-893a-cc3984a0a7e8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e645e270517e4fe197c3eae68812589e/users/60966a8f23cc4da892115d2c5f0a9774/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e645e270517e4fe197c3eae68812589e/users/60966a8f23cc4da892115d2c5f0a9774/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:59.261 39 INFO tempest.lib.common.rest_client [req-6d604d6f-125e-49a2-8880-28f6bd416fda ] Request (ImageResourceTypesRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/e645e270517e4fe197c3eae68812589e/users/60966a8f23cc4da892115d2c5f0a9774/roles/72a4576c553448cd941b052c1ca0cf2d 0.062s 2020-11-06 18:20:59.262 39 DEBUG tempest.lib.common.rest_client [req-6d604d6f-125e-49a2-8880-28f6bd416fda ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6d604d6f-125e-49a2-8880-28f6bd416fda', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e645e270517e4fe197c3eae68812589e/users/60966a8f23cc4da892115d2c5f0a9774/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:20:59.356 39 INFO tempest.lib.common.rest_client [req-b9048a22-b1df-4ecc-8340-7255a02a9d4a ] Request (ImageResourceTypesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/e645e270517e4fe197c3eae68812589e/users/60966a8f23cc4da892115d2c5f0a9774/roles/a629c95d64b3416fb80ae90af4f69c05 0.094s 2020-11-06 18:20:59.357 39 DEBUG tempest.lib.common.rest_client [req-b9048a22-b1df-4ecc-8340-7255a02a9d4a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:20:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b9048a22-b1df-4ecc-8340-7255a02a9d4a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e645e270517e4fe197c3eae68812589e/users/60966a8f23cc4da892115d2c5f0a9774/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:00.444 39 INFO tempest.lib.common.rest_client [req-bf2a3c2a-9a1b-4f0a-9bed-2f3b8ea2d158 ] Request (ImageResourceTypesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:21:00.444 39 DEBUG tempest.lib.common.rest_client [req-bf2a3c2a-9a1b-4f0a-9bed-2f3b8ea2d158 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bf2a3c2a-9a1b-4f0a-9bed-2f3b8ea2d158', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "60966a8f23cc4da892115d2c5f0a9774", "name": "tempest-ImageResourceTypesRbacTest-212696706", "password_expires_at": null}, "audit_ids": ["3YLeYNbAQkyJT6iSCzcmdg"], "expires_at": "2020-11-06T19:21:00.000000Z", "issued_at": "2020-11-06T18:21:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e645e270517e4fe197c3eae68812589e", "name": "tempest-ImageResourceTypesRbacTest-212696706"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:00.624 39 INFO tempest.lib.common.rest_client [req-90f0fcef-5081-4138-8a61-e29adb78dbc5 ] Request (ImageResourceTypesRbacTest:setUpClass): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces 0.179s 2020-11-06 18:21:00.625 39 DEBUG tempest.lib.common.rest_client [req-90f0fcef-5081-4138-8a61-e29adb78dbc5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"namespace": "tempest-ImageResourceTypesRbacTest-test-ns-1111243958", "protected": false} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '369', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/metadefs/namespaces/tempest-ImageResourceTypesRbacTest-test-ns-1111243958', 'x-openstack-request-id': 'req-90f0fcef-5081-4138-8a61-e29adb78dbc5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces'} Body: b'{"namespace": "tempest-ImageResourceTypesRbacTest-test-ns-1111243958", "visibility": "private", "protected": false, "owner": "e645e270517e4fe197c3eae68812589e", "created_at": "2020-11-06T18:21:00Z", "updated_at": "2020-11-06T18:21:00Z", "self": "/v2/metadefs/namespaces/tempest-ImageResourceTypesRbacTest-test-ns-1111243958", "schema": "/v2/schemas/metadefs/namespace"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:00.626 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:00.626 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:21:00.627 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: add_metadef_resource_type_association, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:00.627 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:00.756 39 INFO tempest.lib.common.rest_client [req-cff099a0-c0d8-4419-a342-aaf5dc0ac29d ] Request (ImageResourceTypesRbacTest:test_add_metadef_resource_type): 200 GET http://172.30.13.94/identity/v3/projects/e645e270517e4fe197c3eae68812589e/users/60966a8f23cc4da892115d2c5f0a9774/roles 0.128s 2020-11-06 18:21:00.757 39 DEBUG tempest.lib.common.rest_client [req-cff099a0-c0d8-4419-a342-aaf5dc0ac29d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cff099a0-c0d8-4419-a342-aaf5dc0ac29d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e645e270517e4fe197c3eae68812589e/users/60966a8f23cc4da892115d2c5f0a9774/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e645e270517e4fe197c3eae68812589e/users/60966a8f23cc4da892115d2c5f0a9774/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:00.796 39 INFO tempest.lib.common.rest_client [req-2b3907fe-8bcc-4165-8ced-69066a0237b3 ] Request (ImageResourceTypesRbacTest:test_add_metadef_resource_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:21:00.796 39 DEBUG tempest.lib.common.rest_client [req-2b3907fe-8bcc-4165-8ced-69066a0237b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2b3907fe-8bcc-4165-8ced-69066a0237b3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "60966a8f23cc4da892115d2c5f0a9774", "name": "tempest-ImageResourceTypesRbacTest-212696706", "password_expires_at": null}, "audit_ids": ["XKmH43H4RweNfPcOGaEh8Q"], "expires_at": "2020-11-06T19:21:00.000000Z", "issued_at": "2020-11-06T18:21:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e645e270517e4fe197c3eae68812589e", "name": "tempest-ImageResourceTypesRbacTest-212696706"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:00.900 39 INFO tempest.lib.common.rest_client [req-f6c61715-46f8-4d21-ba88-f0578a9cfac9 ] Request (ImageResourceTypesRbacTest:test_add_metadef_resource_type): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces/tempest-ImageResourceTypesRbacTest-test-ns-1111243958/resource_types 0.102s 2020-11-06 18:21:00.900 39 DEBUG tempest.lib.common.rest_client [req-f6c61715-46f8-4d21-ba88-f0578a9cfac9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-1955886937"} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '106', 'content-type': 'application/json', 'x-openstack-request-id': 'req-f6c61715-46f8-4d21-ba88-f0578a9cfac9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-ImageResourceTypesRbacTest-test-ns-1111243958/resource_types'} Body: b'{"name": "tempest-1955886937", "created_at": "2020-11-06T18:21:00Z", "updated_at": "2020-11-06T18:21:00Z"}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:00.901 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:00.958 39 INFO tempest.lib.common.rest_client [req-db972df5-d443-4059-b626-8265416ac03d ] Request (ImageResourceTypesRbacTest:test_add_metadef_resource_type): 200 GET http://172.30.13.94/identity/v3/projects/e645e270517e4fe197c3eae68812589e/users/60966a8f23cc4da892115d2c5f0a9774/roles 0.056s 2020-11-06 18:21:00.958 39 DEBUG tempest.lib.common.rest_client [req-db972df5-d443-4059-b626-8265416ac03d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-db972df5-d443-4059-b626-8265416ac03d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e645e270517e4fe197c3eae68812589e/users/60966a8f23cc4da892115d2c5f0a9774/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e645e270517e4fe197c3eae68812589e/users/60966a8f23cc4da892115d2c5f0a9774/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:00.999 39 INFO tempest.lib.common.rest_client [req-12628aa1-c1b0-4e21-b3d8-1ca3abd4a2b4 ] Request (ImageResourceTypesRbacTest:test_add_metadef_resource_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:21:01.000 39 DEBUG tempest.lib.common.rest_client [req-12628aa1-c1b0-4e21-b3d8-1ca3abd4a2b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-12628aa1-c1b0-4e21-b3d8-1ca3abd4a2b4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "60966a8f23cc4da892115d2c5f0a9774", "name": "tempest-ImageResourceTypesRbacTest-212696706", "password_expires_at": null}, "audit_ids": ["JiXz8zF1S02hj9eekeOQQw"], "expires_at": "2020-11-06T19:21:00.000000Z", "issued_at": "2020-11-06T18:21:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e645e270517e4fe197c3eae68812589e", "name": "tempest-ImageResourceTypesRbacTest-212696706"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:01.002 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:01.003 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:21:01.005 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_metadef_resource_type, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:01.005 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:01.064 39 INFO tempest.lib.common.rest_client [req-65a427b6-86a3-42cc-9c67-353b0e8685bb ] Request (ImageResourceTypesRbacTest:test_get_metadef_resource_type): 200 GET http://172.30.13.94/identity/v3/projects/e645e270517e4fe197c3eae68812589e/users/60966a8f23cc4da892115d2c5f0a9774/roles 0.057s 2020-11-06 18:21:01.064 39 DEBUG tempest.lib.common.rest_client [req-65a427b6-86a3-42cc-9c67-353b0e8685bb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-65a427b6-86a3-42cc-9c67-353b0e8685bb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e645e270517e4fe197c3eae68812589e/users/60966a8f23cc4da892115d2c5f0a9774/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e645e270517e4fe197c3eae68812589e/users/60966a8f23cc4da892115d2c5f0a9774/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:01.102 39 INFO tempest.lib.common.rest_client [req-aad280c8-f151-42a2-ad4d-d7cf78c02557 ] Request (ImageResourceTypesRbacTest:test_get_metadef_resource_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:21:01.103 39 DEBUG tempest.lib.common.rest_client [req-aad280c8-f151-42a2-ad4d-d7cf78c02557 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aad280c8-f151-42a2-ad4d-d7cf78c02557', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "60966a8f23cc4da892115d2c5f0a9774", "name": "tempest-ImageResourceTypesRbacTest-212696706", "password_expires_at": null}, "audit_ids": ["tpU-u1iJTJuG53CyM7WToA"], "expires_at": "2020-11-06T19:21:01.000000Z", "issued_at": "2020-11-06T18:21:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e645e270517e4fe197c3eae68812589e", "name": "tempest-ImageResourceTypesRbacTest-212696706"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:01.193 39 INFO tempest.lib.common.rest_client [req-855a9c60-ed14-4254-baa1-383a40ddcf5e ] Request (ImageResourceTypesRbacTest:test_get_metadef_resource_type): 200 GET http://172.30.13.94/image/v2/metadefs/namespaces/tempest-ImageResourceTypesRbacTest-test-ns-1111243958/resource_types 0.089s 2020-11-06 18:21:01.193 39 DEBUG tempest.lib.common.rest_client [req-855a9c60-ed14-4254-baa1-383a40ddcf5e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '140', 'content-type': 'application/json', 'x-openstack-request-id': 'req-855a9c60-ed14-4254-baa1-383a40ddcf5e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-ImageResourceTypesRbacTest-test-ns-1111243958/resource_types'} Body: b'{"resource_type_associations": [{"name": "tempest-1955886937", "created_at": "2020-11-06T18:21:01Z", "updated_at": "2020-11-06T18:21:01Z"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:01.194 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:01.252 39 INFO tempest.lib.common.rest_client [req-5882b056-d5d4-40b9-9954-1c19703afea5 ] Request (ImageResourceTypesRbacTest:test_get_metadef_resource_type): 200 GET http://172.30.13.94/identity/v3/projects/e645e270517e4fe197c3eae68812589e/users/60966a8f23cc4da892115d2c5f0a9774/roles 0.057s 2020-11-06 18:21:01.253 39 DEBUG tempest.lib.common.rest_client [req-5882b056-d5d4-40b9-9954-1c19703afea5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5882b056-d5d4-40b9-9954-1c19703afea5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e645e270517e4fe197c3eae68812589e/users/60966a8f23cc4da892115d2c5f0a9774/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e645e270517e4fe197c3eae68812589e/users/60966a8f23cc4da892115d2c5f0a9774/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:01.304 39 INFO tempest.lib.common.rest_client [req-05fb3c3f-64f2-44c7-b15e-ca5e44d2a510 ] Request (ImageResourceTypesRbacTest:test_get_metadef_resource_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-11-06 18:21:01.305 39 DEBUG tempest.lib.common.rest_client [req-05fb3c3f-64f2-44c7-b15e-ca5e44d2a510 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-05fb3c3f-64f2-44c7-b15e-ca5e44d2a510', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "60966a8f23cc4da892115d2c5f0a9774", "name": "tempest-ImageResourceTypesRbacTest-212696706", "password_expires_at": null}, "audit_ids": ["66YtUtExS6KCSOImiewunw"], "expires_at": "2020-11-06T19:21:01.000000Z", "issued_at": "2020-11-06T18:21:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e645e270517e4fe197c3eae68812589e", "name": "tempest-ImageResourceTypesRbacTest-212696706"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:01.308 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:01.309 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-11-06 18:21:01.310 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: list_metadef_resource_types, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:01.311 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:01.369 39 INFO tempest.lib.common.rest_client [req-59824b20-4e0b-4715-bc81-60c5282be866 ] Request (ImageResourceTypesRbacTest:test_list_metadef_resource_types): 200 GET http://172.30.13.94/identity/v3/projects/e645e270517e4fe197c3eae68812589e/users/60966a8f23cc4da892115d2c5f0a9774/roles 0.057s 2020-11-06 18:21:01.370 39 DEBUG tempest.lib.common.rest_client [req-59824b20-4e0b-4715-bc81-60c5282be866 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-59824b20-4e0b-4715-bc81-60c5282be866', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e645e270517e4fe197c3eae68812589e/users/60966a8f23cc4da892115d2c5f0a9774/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e645e270517e4fe197c3eae68812589e/users/60966a8f23cc4da892115d2c5f0a9774/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:01.413 39 INFO tempest.lib.common.rest_client [req-fa5ac287-802a-4332-9439-e361aa839c70 ] Request (ImageResourceTypesRbacTest:test_list_metadef_resource_types): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-11-06 18:21:01.414 39 DEBUG tempest.lib.common.rest_client [req-fa5ac287-802a-4332-9439-e361aa839c70 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fa5ac287-802a-4332-9439-e361aa839c70', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "60966a8f23cc4da892115d2c5f0a9774", "name": "tempest-ImageResourceTypesRbacTest-212696706", "password_expires_at": null}, "audit_ids": ["vdFC9TgmQOeLdD-5dlsaKg"], "expires_at": "2020-11-06T19:21:01.000000Z", "issued_at": "2020-11-06T18:21:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e645e270517e4fe197c3eae68812589e", "name": "tempest-ImageResourceTypesRbacTest-212696706"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:01.509 39 INFO tempest.lib.common.rest_client [req-fb2a1d50-a345-4bb6-aa0d-2fc16d90ddd2 ] Request (ImageResourceTypesRbacTest:test_list_metadef_resource_types): 200 GET http://172.30.13.94/image/v2/metadefs/resource_types 0.094s 2020-11-06 18:21:01.510 39 DEBUG tempest.lib.common.rest_client [req-fb2a1d50-a345-4bb6-aa0d-2fc16d90ddd2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '8169', 'content-type': 'application/json', 'x-openstack-request-id': 'req-fb2a1d50-a345-4bb6-aa0d-2fc16d90ddd2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/metadefs/resource_types'} Body: b'{"resource_types": [{"name": "OS::Glance::Image", "created_at": "2020-10-07T11:57:58Z"}, {"name": "OS::Cinder::Volume", "created_at": "2020-10-07T11:57:58Z"}, {"name": "OS::Nova::Flavor", "created_at": "2020-10-07T11:57:58Z"}, {"name": "OS::Nova::Aggregate", "created_at": "2020-10-07T11:57:58Z"}, {"name": "OS::Nova::Server", "created_at": "2020-10-07T11:57:58Z"}, {"name": "OS::Trove::Instance", "created_at": "2020-10-07T11:57:59Z"}, {"name": "tempest-353086331", "created_at": "2020-10-07T14:14:37Z", "updated_at": "2020-10-07T14:14:37Z"}, {"name": "tempest-1984004422", "created_at": "2020-10-07T14:30:19Z", "updated_at": "2020-10-07T14:30:19Z"}, {"name": "tempest-372173246", "created_at": "2020-10-07T14:49:22Z", "updated_at": "2020-10-07T14:49:22Z"}, {"name": "tempest-1164139581", "created_at": "2020-10-07T18:47:05Z", "updated_at": "2020-10-07T18:47:05Z"}, {"name": "tempest-993868956", "created_at": "2020-10-07T19:08:26Z", "updated_at": "2020-10-07T19:08:26Z"}, {"name": "tempest-272848155", "created_at": "2020-10-07T19:09:07Z", "updated_at": "2020-10-07T19:09:07Z"}, {"name": "tempest-1639040349", "created_at": "2020-10-08T06:37:04Z", "updated_at": "2020-10-08T06:37:04Z"}, {"name": "tempest-2908543", "created_at": "2020-10-08T07:02:30Z", "updated_at": "2020-10-08T07:02:30Z"}, {"name": "tempest-1856760566", "created_at": "2020-10-08T07:03:05Z", "updated_at": "2020-10-08T07:03:05Z"}, {"name": "tempest-1004252970", "created_at": "2020-10-08T08:19:46Z", "updated_at": "2020-10-08T08:19:46Z"}, {"name": "tempest-407059419", "created_at": "2020-10-08T08:33:34Z", "updated_at": "2020-10-08T08:33:34Z"}, {"name": "tempest-189587598", "created_at": "2020-10-08T08:35:59Z", "updated_at": "2020-10-08T08:35:59Z"}, {"name": "tempest-1704015896", "created_at": "2020-10-09T18:06:13Z", "updated_at": "2020-10-09T18:06:13Z"}, {"name": "tempest-1953541337", "created_at": "2020-10-09T18:17:00Z", "updated_at": "2020-10-09T18:17:00Z"}, {"name": "tempest-173577", "created_at": "2020-10-09T18:22:23Z", "updated_at": "2020-10-09T18:22:23Z"}, {"name": "tempest-333147695", "created_at": "2020-10-10T09:00:37Z", "updated_at": "2020-10-10T09:00:37Z"}, {"name": "tempest-1397311640", "created_at": "2020-10-10T09:36:16Z", "updated_at": "2020-10-10T09:36:16Z"}, {"name": "tempest-1935990982", "created_at": "2020-10-10T09:45:43Z", "updated_at": "2020-10-10T09:45:43Z"}, {"name": "tempest-455257376", "created_at": "2020-10-10T11:37:35Z", "updated_at": "2020-10-10T11:37:35Z"}, {"name": "tempest-304188733", "created_at": "2020-10-10T12:00:21Z", "updated_at": "2020-10-10T12:00:21Z"}, {"name": "tempest-2047170226", "created_at": "2020-10-10T12:04:22Z", "updated_at": "2020-10-10T12:04:22Z"}, {"name": "tempest-988388815", "created_at": "2020-10-10T13:30:05Z", "updated_at": "2020-10-10T13:30:05Z"}, {"name": "tempest-453722785", "created_at": "2020-10-10T13:54:03Z", "updated_at": "2020-10-10T13:54:03Z"}, {"name": "tempest-2101685032", "created_at": "2020-10-10T14:07:17Z", "updated_at": "2020-10-10T14:07:17Z"}, {"name": "tempest-487587532", "created_at": "2020-10-11T12:03:41Z", "updated_at": "2020-10-11T12:03:41Z"}, {"name": "tempest-92343007", "created_at": "2020-10-11T12:20:17Z", "updated_at": "2020-10-11T12:20:17Z"}, {"name": "tempest-1873204973", "created_at": "2020-10-11T12:37:23Z", "updated_at": "2020-10-11T12:37:23Z"}, {"name": "tempest-976247736", "created_at": "2020-10-12T14:24:39Z", "updated_at": "2020-10-12T14:24:39Z"}, {"name": "tempest-723114723", "created_at": "2020-10-12T14:30:01Z", "updated_at": "2020-10-12T14:30:01Z"}, {"name": "tempest-1242055933", "created_at": "2020-10-12T14:31:50Z", "updated_at": "2020-10-12T14:31:50Z"}, {"name": "tempest-1267333658", "created_at": "2020-10-16T17:36:11Z", "updated_at": "2020-10-16T17:36:11Z"}, {"name": "tempest-776499970", "created_at": "2020-10-16T17:54:29Z", "updated_at": "2020-10-16T17:54:29Z"}, {"name": "tempest-799976223", "created_at": "2020-10-16T17:59:18Z", "updated_at": "2020-10-16T17:59:18Z"}, {"name": "tempest-1471385054", "created_at": "2020-10-17T13:13:43Z", "updated_at": "2020-10-17T13:13:43Z"}, {"name": " _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:01.511 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:01.564 39 INFO tempest.lib.common.rest_client [req-fb60c715-a14d-47ce-9ab5-f47f0ade22f9 ] Request (ImageResourceTypesRbacTest:test_list_metadef_resource_types): 200 GET http://172.30.13.94/identity/v3/projects/e645e270517e4fe197c3eae68812589e/users/60966a8f23cc4da892115d2c5f0a9774/roles 0.052s 2020-11-06 18:21:01.565 39 DEBUG tempest.lib.common.rest_client [req-fb60c715-a14d-47ce-9ab5-f47f0ade22f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fb60c715-a14d-47ce-9ab5-f47f0ade22f9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e645e270517e4fe197c3eae68812589e/users/60966a8f23cc4da892115d2c5f0a9774/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e645e270517e4fe197c3eae68812589e/users/60966a8f23cc4da892115d2c5f0a9774/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:01.604 39 INFO tempest.lib.common.rest_client [req-95fc4b03-84af-41be-9273-2e47359f28d8 ] Request (ImageResourceTypesRbacTest:test_list_metadef_resource_types): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:21:01.604 39 DEBUG tempest.lib.common.rest_client [req-95fc4b03-84af-41be-9273-2e47359f28d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-95fc4b03-84af-41be-9273-2e47359f28d8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "60966a8f23cc4da892115d2c5f0a9774", "name": "tempest-ImageResourceTypesRbacTest-212696706", "password_expires_at": null}, "audit_ids": ["7r8Qqw5SRtGLSW02nJ_ivQ"], "expires_at": "2020-11-06T19:21:01.000000Z", "issued_at": "2020-11-06T18:21:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e645e270517e4fe197c3eae68812589e", "name": "tempest-ImageResourceTypesRbacTest-212696706"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e645e270517e4fe197c3eae68812589e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:01.724 39 INFO tempest.lib.common.rest_client [req-35119b75-ef9f-4fca-b3be-9a8f59ada60e ] Request (ImageResourceTypesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-ImageResourceTypesRbacTest-test-ns-1111243958 0.116s 2020-11-06 18:21:01.724 39 DEBUG tempest.lib.common.rest_client [req-35119b75-ef9f-4fca-b3be-9a8f59ada60e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-35119b75-ef9f-4fca-b3be-9a8f59ada60e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-ImageResourceTypesRbacTest-test-ns-1111243958'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:01.866 39 INFO tempest.lib.common.rest_client [req-f63d0f9b-bade-4451-954b-fdc88f75bca0 ] Request (ImageResourceTypesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/60966a8f23cc4da892115d2c5f0a9774 0.141s 2020-11-06 18:21:01.867 39 DEBUG tempest.lib.common.rest_client [req-f63d0f9b-bade-4451-954b-fdc88f75bca0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f63d0f9b-bade-4451-954b-fdc88f75bca0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/60966a8f23cc4da892115d2c5f0a9774'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:01.965 39 INFO tempest.lib.common.rest_client [req-ac73cb5e-5cfd-45b5-bbac-75575f3cdfaa ] Request (ImageResourceTypesRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-11-06 18:21:01.966 39 DEBUG tempest.lib.common.rest_client [req-ac73cb5e-5cfd-45b5-bbac-75575f3cdfaa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ac73cb5e-5cfd-45b5-bbac-75575f3cdfaa', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["0g9T2ljWSgylYqsbd67QTA"], "expires_at": "2020-11-06T19:21:01.000000Z", "issued_at": "2020-11-06T18:21:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:02.310 39 INFO tempest.lib.common.rest_client [req-d4163a8e-c09e-43d4-86ac-f37dbaef82e5 ] Request (ImageResourceTypesRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=e645e270517e4fe197c3eae68812589e&name=default 0.343s 2020-11-06 18:21:02.311 39 DEBUG tempest.lib.common.rest_client [req-d4163a8e-c09e-43d4-86ac-f37dbaef82e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-d4163a8e-c09e-43d4-86ac-f37dbaef82e5', 'date': 'Fri, 06 Nov 2020 18:21:02 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=e645e270517e4fe197c3eae68812589e&name=default'} Body: b'{"security_groups": [{"id": "3d2cd14a-ce6e-447e-b0fb-f175922c7cf3", "name": "default", "stateful": true, "tenant_id": "e645e270517e4fe197c3eae68812589e", "description": "Default security group", "security_group_rules": [{"id": "4a4c55e0-eb42-467f-ba93-f26d4579b18d", "tenant_id": "e645e270517e4fe197c3eae68812589e", "security_group_id": "3d2cd14a-ce6e-447e-b0fb-f175922c7cf3", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:21:02Z", "updated_at": "2020-11-06T18:21:02Z", "revision_number": 0, "project_id": "e645e270517e4fe197c3eae68812589e"}, {"id": "71882801-a545-491d-b057-4691158cc27c", "tenant_id": "e645e270517e4fe197c3eae68812589e", "security_group_id": "3d2cd14a-ce6e-447e-b0fb-f175922c7cf3", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "3d2cd14a-ce6e-447e-b0fb-f175922c7cf3", "description": null, "tags": [], "created_at": "2020-11-06T18:21:02Z", "updated_at": "2020-11-06T18:21:02Z", "revision_number": 0, "project_id": "e645e270517e4fe197c3eae68812589e"}, {"id": "e1663f70-9af8-4675-8516-220fe30c0c23", "tenant_id": "e645e270517e4fe197c3eae68812589e", "security_group_id": "3d2cd14a-ce6e-447e-b0fb-f175922c7cf3", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "3d2cd14a-ce6e-447e-b0fb-f175922c7cf3", "description": null, "tags": [], "created_at": "2020-11-06T18:21:02Z", "updated_at": "2020-11-06T18:21:02Z", "revision_number": 0, "project_id": "e645e270517e4fe197c3eae68812589e"}, {"id": "eb70b584-9d55-46c2-a8da-a82b9f6b19d0", "tenant_id": "e645e270517e4fe197c3eae68812589e", "security_group_id": "3d2cd14a-ce6e-447e-b0fb-f175922c7cf3", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:21:02Z", "updated_at": "2020-11-06T18:21:02Z", "revision_number": 0, "project_id": "e645e270517e4fe197c3eae68812589e"}], "tags": [], "created_at": "2020-11-06T18:21:02Z", "updated_at": "2020-11-06T18:21:02Z", "revision_number": 1, "project_id": "e645e270517e4fe197c3eae68812589e"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:02.414 39 INFO tempest.lib.common.rest_client [req-db518f2f-0564-45d7-8773-78979a2ed0f2 ] Request (ImageResourceTypesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/3d2cd14a-ce6e-447e-b0fb-f175922c7cf3 0.101s 2020-11-06 18:21:02.414 39 DEBUG tempest.lib.common.rest_client [req-db518f2f-0564-45d7-8773-78979a2ed0f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-db518f2f-0564-45d7-8773-78979a2ed0f2', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:21:02 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/3d2cd14a-ce6e-447e-b0fb-f175922c7cf3'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:02.543 39 INFO tempest.lib.common.rest_client [req-4ae2cc5e-6104-4c9d-ab0d-956e04aa89ce ] Request (ImageResourceTypesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/e645e270517e4fe197c3eae68812589e 0.128s 2020-11-06 18:21:02.544 39 DEBUG tempest.lib.common.rest_client [req-4ae2cc5e-6104-4c9d-ab0d-956e04aa89ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4ae2cc5e-6104-4c9d-ab0d-956e04aa89ce', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e645e270517e4fe197c3eae68812589e'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:02.725 39 INFO tempest.lib.common.rest_client [req-1c8e22e0-d7d2-4c96-ad4d-428d94944903 ] Request (AddressScopeExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.177s 2020-11-06 18:21:02.725 39 DEBUG tempest.lib.common.rest_client [req-1c8e22e0-d7d2-4c96-ad4d-428d94944903 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1c8e22e0-d7d2-4c96-ad4d-428d94944903', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["q-Ystmn0SVGcf-AO0EaK9w"], "expires_at": "2020-11-06T19:21:02.000000Z", "issued_at": "2020-11-06T18:21:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:02.776 39 INFO tempest.lib.common.rest_client [req-118c3457-dbd4-45ff-bd9e-633a9b64e4fe ] Request (AddressScopeExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-11-06 18:21:02.776 39 DEBUG tempest.lib.common.rest_client [req-118c3457-dbd4-45ff-bd9e-633a9b64e4fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-118c3457-dbd4-45ff-bd9e-633a9b64e4fe', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["x8bPtSZXQCaS3YOHutZQFA"], "expires_at": "2020-11-06T19:21:02.000000Z", "issued_at": "2020-11-06T18:21:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:02.838 39 INFO tempest.lib.common.rest_client [req-2436286f-babd-4aeb-8883-757f5573cb0e ] Request (AddressScopeExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.060s 2020-11-06 18:21:02.839 39 DEBUG tempest.lib.common.rest_client [req-2436286f-babd-4aeb-8883-757f5573cb0e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2436286f-babd-4aeb-8883-757f5573cb0e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:02.913 39 INFO tempest.lib.common.rest_client [req-7de5b64d-dddc-4097-9fdf-275c9e0901d9 ] Request (AddressScopeExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.073s 2020-11-06 18:21:02.914 39 DEBUG tempest.lib.common.rest_client [req-7de5b64d-dddc-4097-9fdf-275c9e0901d9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-AddressScopeExtRbacTest-1141845618-desc", "domain_id": "default", "name": "tempest-AddressScopeExtRbacTest-1141845618"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '384', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7de5b64d-dddc-4097-9fdf-275c9e0901d9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1141845618", "domain_id": "default", "description": "tempest-AddressScopeExtRbacTest-1141845618-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:03.032 39 INFO tempest.lib.common.rest_client [req-63176813-d798-4536-b4e3-940a216b3e36 ] Request (AddressScopeExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.117s 2020-11-06 18:21:03.032 39 DEBUG tempest.lib.common.rest_client [req-63176813-d798-4536-b4e3-940a216b3e36 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-AddressScopeExtRbacTest-1141845618", "password": "L0+4yzpYmAy6oar", "project_id": "f4ea133d43404c52a949672b601d642e", "email": "tempest-AddressScopeExtRbacTest-2025964849@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '402', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-63176813-d798-4536-b4e3-940a216b3e36', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "f4ea133d43404c52a949672b601d642e", "email": "tempest-AddressScopeExtRbacTest-2025964849@example.com", "id": "7136de0df69f4f019f207cefdcff3a0a", "name": "tempest-AddressScopeExtRbacTest-1141845618", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/7136de0df69f4f019f207cefdcff3a0a"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:03.086 39 INFO tempest.lib.common.rest_client [req-5248c4fc-b430-495b-b2a4-1e0042706a5a ] Request (AddressScopeExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.053s 2020-11-06 18:21:03.087 39 DEBUG tempest.lib.common.rest_client [req-5248c4fc-b430-495b-b2a4-1e0042706a5a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5248c4fc-b430-495b-b2a4-1e0042706a5a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:03.147 39 INFO tempest.lib.common.rest_client [req-890c071b-b3cb-4c01-95c7-93106eda919f ] Request (AddressScopeExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.059s 2020-11-06 18:21:03.147 39 DEBUG tempest.lib.common.rest_client [req-890c071b-b3cb-4c01-95c7-93106eda919f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-890c071b-b3cb-4c01-95c7-93106eda919f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:03.227 39 INFO tempest.lib.common.rest_client [req-54f23690-fb8e-41bc-bff6-f2a865d50097 ] Request (AddressScopeExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles/72a4576c553448cd941b052c1ca0cf2d 0.079s 2020-11-06 18:21:03.228 39 DEBUG tempest.lib.common.rest_client [req-54f23690-fb8e-41bc-bff6-f2a865d50097 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-54f23690-fb8e-41bc-bff6-f2a865d50097', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:03.228 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-AddressScopeExtRbacTest-1141845618', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'f4ea133d43404c52a949672b601d642e', 'project_name': 'tempest-AddressScopeExtRbacTest-1141845618', 'tenant_id': 'f4ea133d43404c52a949672b601d642e', 'tenant_name': 'tempest-AddressScopeExtRbacTest-1141845618', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '7136de0df69f4f019f207cefdcff3a0a'}, Network: None, Subnet: None, Router: None 2020-11-06 18:21:03.229 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-AddressScopeExtRbacTest-1141845618', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'f4ea133d43404c52a949672b601d642e', 'project_name': 'tempest-AddressScopeExtRbacTest-1141845618', 'tenant_id': 'f4ea133d43404c52a949672b601d642e', 'tenant_name': 'tempest-AddressScopeExtRbacTest-1141845618', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '7136de0df69f4f019f207cefdcff3a0a'}, Network: None, Subnet: None, Router: None 2020-11-06 18:21:03.363 39 INFO tempest.lib.common.rest_client [req-6f031b8f-5e51-4da9-98dd-7731cab6550a ] Request (AddressScopeExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.124s 2020-11-06 18:21:03.364 39 DEBUG tempest.lib.common.rest_client [req-6f031b8f-5e51-4da9-98dd-7731cab6550a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6577', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6f031b8f-5e51-4da9-98dd-7731cab6550a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7136de0df69f4f019f207cefdcff3a0a", "name": "tempest-AddressScopeExtRbacTest-1141845618", "password_expires_at": null}, "audit_ids": ["HNY5BsKtRK63Cttj38yk6Q"], "expires_at": "2020-11-06T19:21:03.000000Z", "issued_at": "2020-11-06T18:21:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1141845618"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:03.364 39 WARNING tempest.manager [-] tempest.manager.Manager is not a stable interface and as such it should not be imported directly. It will be removed as soon as the client manager becomes available in tempest.lib. 2020-11-06 18:21:03.462 39 INFO tempest.lib.common.rest_client [req-79db12c8-0229-47a2-bd98-17416aecc141 ] Request (AddressScopeExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-11-06 18:21:03.462 39 DEBUG tempest.lib.common.rest_client [req-79db12c8-0229-47a2-bd98-17416aecc141 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-79db12c8-0229-47a2-bd98-17416aecc141', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["EpHVt6IvT3ab4FmEiQkxAA"], "expires_at": "2020-11-06T19:21:03.000000Z", "issued_at": "2020-11-06T18:21:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:03.505 39 INFO tempest.lib.common.rest_client [req-cde9cce6-5eb4-4a6b-8880-7f31fb781422 ] Request (AddressScopeExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:21:03.506 39 DEBUG tempest.lib.common.rest_client [req-cde9cce6-5eb4-4a6b-8880-7f31fb781422 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cde9cce6-5eb4-4a6b-8880-7f31fb781422', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["rt7qdn1KTDOpAlg2n69EwA"], "expires_at": "2020-11-06T19:21:03.000000Z", "issued_at": "2020-11-06T18:21:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:03.555 39 INFO tempest.lib.common.rest_client [req-a11415a8-3829-42f9-b5fc-888da6b25f1b ] Request (AddressScopeExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.048s 2020-11-06 18:21:03.556 39 DEBUG tempest.lib.common.rest_client [req-a11415a8-3829-42f9-b5fc-888da6b25f1b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a11415a8-3829-42f9-b5fc-888da6b25f1b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:03.602 39 INFO tempest.lib.common.rest_client [req-664fd16d-7a14-424d-b1e3-e7f67106bf0a ] Request (AddressScopeExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.044s 2020-11-06 18:21:03.602 39 DEBUG tempest.lib.common.rest_client [req-664fd16d-7a14-424d-b1e3-e7f67106bf0a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-664fd16d-7a14-424d-b1e3-e7f67106bf0a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:03.603 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:21:03.603 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:03.652 39 INFO tempest.lib.common.rest_client [req-53705981-e086-43cd-a9de-048da6b01181 ] Request (AddressScopeExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles 0.048s 2020-11-06 18:21:03.653 39 DEBUG tempest.lib.common.rest_client [req-53705981-e086-43cd-a9de-048da6b01181 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-53705981-e086-43cd-a9de-048da6b01181', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:03.714 39 INFO tempest.lib.common.rest_client [req-bd1c66e6-52f2-40cb-8183-b48a7b11a379 ] Request (AddressScopeExtRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles/72a4576c553448cd941b052c1ca0cf2d 0.060s 2020-11-06 18:21:03.714 39 DEBUG tempest.lib.common.rest_client [req-bd1c66e6-52f2-40cb-8183-b48a7b11a379 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bd1c66e6-52f2-40cb-8183-b48a7b11a379', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:03.810 39 INFO tempest.lib.common.rest_client [req-b6ebd2d8-d5ce-4fe4-9207-64e93d964498 ] Request (AddressScopeExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles/a629c95d64b3416fb80ae90af4f69c05 0.095s 2020-11-06 18:21:03.810 39 DEBUG tempest.lib.common.rest_client [req-b6ebd2d8-d5ce-4fe4-9207-64e93d964498 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b6ebd2d8-d5ce-4fe4-9207-64e93d964498', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:04.891 39 INFO tempest.lib.common.rest_client [req-8c3e777a-48f3-423f-9202-61d63e07276d ] Request (AddressScopeExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.079s 2020-11-06 18:21:04.892 39 DEBUG tempest.lib.common.rest_client [req-8c3e777a-48f3-423f-9202-61d63e07276d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8c3e777a-48f3-423f-9202-61d63e07276d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7136de0df69f4f019f207cefdcff3a0a", "name": "tempest-AddressScopeExtRbacTest-1141845618", "password_expires_at": null}, "audit_ids": ["--cQCunHQgGzK73UTtIuuQ"], "expires_at": "2020-11-06T19:21:04.000000Z", "issued_at": "2020-11-06T18:21:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1141845618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:04.924 39 INFO tempest.lib.common.rest_client [req-3f46baed-5135-4b51-b471-f53341dd77dc ] Request (AddressScopeExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:21:04.925 39 DEBUG tempest.lib.common.rest_client [req-3f46baed-5135-4b51-b471-f53341dd77dc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3f46baed-5135-4b51-b471-f53341dd77dc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7136de0df69f4f019f207cefdcff3a0a", "name": "tempest-AddressScopeExtRbacTest-1141845618", "password_expires_at": null}, "audit_ids": ["32KRArOHTXitXIsQdUhkZg"], "expires_at": "2020-11-06T19:21:04.000000Z", "issued_at": "2020-11-06T18:21:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1141845618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:05.495 39 INFO tempest.lib.common.rest_client [req-9ce1244f-32b4-4acf-ac10-6e885dd88a98 ] Request (AddressScopeExtRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.568s 2020-11-06 18:21:05.495 39 DEBUG tempest.lib.common.rest_client [req-9ce1244f-32b4-4acf-ac10-6e885dd88a98 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-AddressScopeExtRbacTest-test-network-1237382333"}} Response - Headers: {'content-type': 'application/json', 'content-length': '744', 'x-openstack-request-id': 'req-9ce1244f-32b4-4acf-ac10-6e885dd88a98', 'date': 'Fri, 06 Nov 2020 18:21:05 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"581c0db7-91db-41d8-8794-761accd13727","name":"tempest-AddressScopeExtRbacTest-test-network-1237382333","tenant_id":"f4ea133d43404c52a949672b601d642e","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"f4ea133d43404c52a949672b601d642e","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":45,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:21:05Z","updated_at":"2020-11-06T18:21:05Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:05.497 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:05.527 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_address_scope, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:05.528 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:05.630 39 INFO tempest.lib.common.rest_client [req-4699dee9-29d6-4a69-8934-2d575c149598 ] Request (AddressScopeExtRbacTest:test_create_address_scope): 200 GET http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles 0.102s 2020-11-06 18:21:05.631 39 DEBUG tempest.lib.common.rest_client [req-4699dee9-29d6-4a69-8934-2d575c149598 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4699dee9-29d6-4a69-8934-2d575c149598', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:05.666 39 INFO tempest.lib.common.rest_client [req-797d7d13-fd6a-4f4f-86aa-52daceb7f192 ] Request (AddressScopeExtRbacTest:test_create_address_scope): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:21:05.666 39 DEBUG tempest.lib.common.rest_client [req-797d7d13-fd6a-4f4f-86aa-52daceb7f192 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-797d7d13-fd6a-4f4f-86aa-52daceb7f192', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7136de0df69f4f019f207cefdcff3a0a", "name": "tempest-AddressScopeExtRbacTest-1141845618", "password_expires_at": null}, "audit_ids": ["uKSyFnRfR4SaapgaHZsKXQ"], "expires_at": "2020-11-06T19:21:05.000000Z", "issued_at": "2020-11-06T18:21:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1141845618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:05.698 39 INFO tempest.lib.common.rest_client [req-3e749e98-1b46-475f-b5ed-f0849d5d5002 ] Request (AddressScopeExtRbacTest:test_create_address_scope): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:21:05.699 39 DEBUG tempest.lib.common.rest_client [req-3e749e98-1b46-475f-b5ed-f0849d5d5002 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3e749e98-1b46-475f-b5ed-f0849d5d5002', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7136de0df69f4f019f207cefdcff3a0a", "name": "tempest-AddressScopeExtRbacTest-1141845618", "password_expires_at": null}, "audit_ids": ["u0Z9ShN7RqmlrciTnoRA6Q"], "expires_at": "2020-11-06T19:21:05.000000Z", "issued_at": "2020-11-06T18:21:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1141845618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:05.792 39 INFO tempest.lib.common.rest_client [req-aa135791-d1dc-4e17-b288-4b1d872aa729 ] Request (AddressScopeExtRbacTest:test_create_address_scope): 201 POST http://172.30.13.94:9696/v2.0/address-scopes 0.092s 2020-11-06 18:21:05.792 39 DEBUG tempest.lib.common.rest_client [req-aa135791-d1dc-4e17-b288-4b1d872aa729 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"address_scope": {"name": "tempest-AddressScopeExtRbacTest-567062742", "ip_version": 6}} Response - Headers: {'content-type': 'application/json', 'content-length': '251', 'x-openstack-request-id': 'req-aa135791-d1dc-4e17-b288-4b1d872aa729', 'date': 'Fri, 06 Nov 2020 18:21:05 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes'} Body: b'{"address_scope": {"id": "40c6d323-39c9-43de-8948-9d5a954a48f1", "project_id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-567062742", "shared": false, "ip_version": 6, "tenant_id": "f4ea133d43404c52a949672b601d642e"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:05.793 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:05.845 39 INFO tempest.lib.common.rest_client [req-24c2c297-29fb-4697-b9fc-083878a59bd9 ] Request (AddressScopeExtRbacTest:test_create_address_scope): 200 GET http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles 0.051s 2020-11-06 18:21:05.845 39 DEBUG tempest.lib.common.rest_client [req-24c2c297-29fb-4697-b9fc-083878a59bd9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-24c2c297-29fb-4697-b9fc-083878a59bd9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:05.879 39 INFO tempest.lib.common.rest_client [req-edceea67-0102-464d-8fc4-3d94a12f6058 ] Request (AddressScopeExtRbacTest:test_create_address_scope): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:21:05.880 39 DEBUG tempest.lib.common.rest_client [req-edceea67-0102-464d-8fc4-3d94a12f6058 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-edceea67-0102-464d-8fc4-3d94a12f6058', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7136de0df69f4f019f207cefdcff3a0a", "name": "tempest-AddressScopeExtRbacTest-1141845618", "password_expires_at": null}, "audit_ids": ["J4bSMgX0Ray5zgk28wFS-A"], "expires_at": "2020-11-06T19:21:05.000000Z", "issued_at": "2020-11-06T18:21:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1141845618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:05.920 39 INFO tempest.lib.common.rest_client [req-97488c0b-7635-42d2-8c3a-0a6dcc6593fa ] Request (AddressScopeExtRbacTest:test_create_address_scope): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:21:05.921 39 DEBUG tempest.lib.common.rest_client [req-97488c0b-7635-42d2-8c3a-0a6dcc6593fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-97488c0b-7635-42d2-8c3a-0a6dcc6593fa', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7136de0df69f4f019f207cefdcff3a0a", "name": "tempest-AddressScopeExtRbacTest-1141845618", "password_expires_at": null}, "audit_ids": ["3YZRcbv2Q12cQN1kQTIpGg"], "expires_at": "2020-11-06T19:21:05.000000Z", "issued_at": "2020-11-06T18:21:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1141845618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:06.067 39 INFO tempest.lib.common.rest_client [req-e80640e7-9458-482d-8253-d6f33d747bbe ] Request (AddressScopeExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/address-scopes/40c6d323-39c9-43de-8948-9d5a954a48f1 0.144s 2020-11-06 18:21:06.068 39 DEBUG tempest.lib.common.rest_client [req-e80640e7-9458-482d-8253-d6f33d747bbe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-e80640e7-9458-482d-8253-d6f33d747bbe', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:21:06 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes/40c6d323-39c9-43de-8948-9d5a954a48f1'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:06.070 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:06.074 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_address_scope, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:06.074 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:06.076 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_address_scope:shared, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:06.076 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:06.134 39 INFO tempest.lib.common.rest_client [req-3f4f4153-fee1-4e88-ad4a-af1ee2217193 ] Request (AddressScopeExtRbacTest:test_create_address_scope_shared): 200 GET http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles 0.057s 2020-11-06 18:21:06.135 39 DEBUG tempest.lib.common.rest_client [req-3f4f4153-fee1-4e88-ad4a-af1ee2217193 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3f4f4153-fee1-4e88-ad4a-af1ee2217193', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:06.171 39 INFO tempest.lib.common.rest_client [req-6a532449-5fc8-443f-b153-a23e7cda316b ] Request (AddressScopeExtRbacTest:test_create_address_scope_shared): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:21:06.172 39 DEBUG tempest.lib.common.rest_client [req-6a532449-5fc8-443f-b153-a23e7cda316b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6a532449-5fc8-443f-b153-a23e7cda316b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7136de0df69f4f019f207cefdcff3a0a", "name": "tempest-AddressScopeExtRbacTest-1141845618", "password_expires_at": null}, "audit_ids": ["8BZtpejnQJSik8hr141VKg"], "expires_at": "2020-11-06T19:21:06.000000Z", "issued_at": "2020-11-06T18:21:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1141845618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:06.215 39 INFO tempest.lib.common.rest_client [req-f8adb8e6-9f6e-4996-a4ab-529fe7f3d30c ] Request (AddressScopeExtRbacTest:test_create_address_scope_shared): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-11-06 18:21:06.215 39 DEBUG tempest.lib.common.rest_client [req-f8adb8e6-9f6e-4996-a4ab-529fe7f3d30c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f8adb8e6-9f6e-4996-a4ab-529fe7f3d30c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7136de0df69f4f019f207cefdcff3a0a", "name": "tempest-AddressScopeExtRbacTest-1141845618", "password_expires_at": null}, "audit_ids": ["FMI7g5umTwCviTNSDRr_EA"], "expires_at": "2020-11-06T19:21:06.000000Z", "issued_at": "2020-11-06T18:21:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1141845618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:06.323 39 INFO tempest.lib.common.rest_client [req-3504d848-80b3-46cc-b30a-c874d86481a6 ] Request (AddressScopeExtRbacTest:test_create_address_scope_shared): 201 POST http://172.30.13.94:9696/v2.0/address-scopes 0.106s 2020-11-06 18:21:06.324 39 DEBUG tempest.lib.common.rest_client [req-3504d848-80b3-46cc-b30a-c874d86481a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"address_scope": {"name": "tempest-AddressScopeExtRbacTest-1472349213", "ip_version": 6, "shared": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '251', 'x-openstack-request-id': 'req-3504d848-80b3-46cc-b30a-c874d86481a6', 'date': 'Fri, 06 Nov 2020 18:21:06 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes'} Body: b'{"address_scope": {"id": "1a17f4f2-47e4-4cda-ab6f-54fe88c5394e", "project_id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1472349213", "shared": true, "ip_version": 6, "tenant_id": "f4ea133d43404c52a949672b601d642e"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:06.324 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:06.379 39 INFO tempest.lib.common.rest_client [req-d8ff07d3-443e-4ca8-a880-b7a06971b7ec ] Request (AddressScopeExtRbacTest:test_create_address_scope_shared): 200 GET http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles 0.054s 2020-11-06 18:21:06.379 39 DEBUG tempest.lib.common.rest_client [req-d8ff07d3-443e-4ca8-a880-b7a06971b7ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d8ff07d3-443e-4ca8-a880-b7a06971b7ec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:06.414 39 INFO tempest.lib.common.rest_client [req-865da5de-f092-4e00-9402-cbfbd1458639 ] Request (AddressScopeExtRbacTest:test_create_address_scope_shared): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:21:06.415 39 DEBUG tempest.lib.common.rest_client [req-865da5de-f092-4e00-9402-cbfbd1458639 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-865da5de-f092-4e00-9402-cbfbd1458639', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7136de0df69f4f019f207cefdcff3a0a", "name": "tempest-AddressScopeExtRbacTest-1141845618", "password_expires_at": null}, "audit_ids": ["-AsU4vUKRESFysoy2QDN3w"], "expires_at": "2020-11-06T19:21:06.000000Z", "issued_at": "2020-11-06T18:21:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1141845618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:06.455 39 INFO tempest.lib.common.rest_client [req-2cfa750b-e62c-47ed-9025-05963ba5aff6 ] Request (AddressScopeExtRbacTest:test_create_address_scope_shared): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:21:06.455 39 DEBUG tempest.lib.common.rest_client [req-2cfa750b-e62c-47ed-9025-05963ba5aff6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2cfa750b-e62c-47ed-9025-05963ba5aff6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7136de0df69f4f019f207cefdcff3a0a", "name": "tempest-AddressScopeExtRbacTest-1141845618", "password_expires_at": null}, "audit_ids": ["eZpb7k8AR--Y6AIRJZKGNg"], "expires_at": "2020-11-06T19:21:06.000000Z", "issued_at": "2020-11-06T18:21:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1141845618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:06.573 39 INFO tempest.lib.common.rest_client [req-0d6926e5-45ef-4cf5-b23e-6ec013e156f8 ] Request (AddressScopeExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/address-scopes/1a17f4f2-47e4-4cda-ab6f-54fe88c5394e 0.115s 2020-11-06 18:21:06.573 39 DEBUG tempest.lib.common.rest_client [req-0d6926e5-45ef-4cf5-b23e-6ec013e156f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-0d6926e5-45ef-4cf5-b23e-6ec013e156f8', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:21:06 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes/1a17f4f2-47e4-4cda-ab6f-54fe88c5394e'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:06.575 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:06.577 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_address_scope, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:06.578 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:06.580 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_address_scope, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:06.627 39 INFO tempest.lib.common.rest_client [req-0528d9fc-e7a0-495b-a644-e245bf1a0f3a ] Request (AddressScopeExtRbacTest:test_delete_address_scope): 201 POST http://172.30.13.94:9696/v2.0/address-scopes 0.046s 2020-11-06 18:21:06.627 39 DEBUG tempest.lib.common.rest_client [req-0528d9fc-e7a0-495b-a644-e245bf1a0f3a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"address_scope": {"name": "tempest-AddressScopeExtRbacTest-1172694890", "ip_version": 6}} Response - Headers: {'content-type': 'application/json', 'content-length': '252', 'x-openstack-request-id': 'req-0528d9fc-e7a0-495b-a644-e245bf1a0f3a', 'date': 'Fri, 06 Nov 2020 18:21:06 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes'} Body: b'{"address_scope": {"id": "25f99d51-19aa-4abf-b8bb-af9919b862f0", "project_id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1172694890", "shared": false, "ip_version": 6, "tenant_id": "f4ea133d43404c52a949672b601d642e"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:06.628 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:06.682 39 INFO tempest.lib.common.rest_client [req-958eca74-09cd-40d4-9174-31466eeb378d ] Request (AddressScopeExtRbacTest:test_delete_address_scope): 200 GET http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles 0.053s 2020-11-06 18:21:06.682 39 DEBUG tempest.lib.common.rest_client [req-958eca74-09cd-40d4-9174-31466eeb378d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-958eca74-09cd-40d4-9174-31466eeb378d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:06.718 39 INFO tempest.lib.common.rest_client [req-58290862-7bf1-4fc9-b0de-6a83aaab8ec5 ] Request (AddressScopeExtRbacTest:test_delete_address_scope): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:21:06.719 39 DEBUG tempest.lib.common.rest_client [req-58290862-7bf1-4fc9-b0de-6a83aaab8ec5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-58290862-7bf1-4fc9-b0de-6a83aaab8ec5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7136de0df69f4f019f207cefdcff3a0a", "name": "tempest-AddressScopeExtRbacTest-1141845618", "password_expires_at": null}, "audit_ids": ["TYp2rpCyQYmg8NgYKOgFZg"], "expires_at": "2020-11-06T19:21:06.000000Z", "issued_at": "2020-11-06T18:21:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1141845618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:06.756 39 INFO tempest.lib.common.rest_client [req-18635f03-afde-41ba-a0c6-2faac5cf6625 ] Request (AddressScopeExtRbacTest:test_delete_address_scope): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:21:06.757 39 DEBUG tempest.lib.common.rest_client [req-18635f03-afde-41ba-a0c6-2faac5cf6625 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-18635f03-afde-41ba-a0c6-2faac5cf6625', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7136de0df69f4f019f207cefdcff3a0a", "name": "tempest-AddressScopeExtRbacTest-1141845618", "password_expires_at": null}, "audit_ids": ["121Yr2chS7SP7iqqywamfQ"], "expires_at": "2020-11-06T19:21:06.000000Z", "issued_at": "2020-11-06T18:21:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1141845618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:06.885 39 INFO tempest.lib.common.rest_client [req-d839142d-f6d7-4162-9bdd-e8c10d626f4e ] Request (AddressScopeExtRbacTest:test_delete_address_scope): 204 DELETE http://172.30.13.94:9696/v2.0/address-scopes/25f99d51-19aa-4abf-b8bb-af9919b862f0 0.126s 2020-11-06 18:21:06.886 39 DEBUG tempest.lib.common.rest_client [req-d839142d-f6d7-4162-9bdd-e8c10d626f4e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-d839142d-f6d7-4162-9bdd-e8c10d626f4e', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:21:06 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes/25f99d51-19aa-4abf-b8bb-af9919b862f0'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:06.886 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:06.943 39 INFO tempest.lib.common.rest_client [req-fa4ece28-d33f-40ea-8e7a-97cb1453220e ] Request (AddressScopeExtRbacTest:test_delete_address_scope): 200 GET http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles 0.056s 2020-11-06 18:21:06.943 39 DEBUG tempest.lib.common.rest_client [req-fa4ece28-d33f-40ea-8e7a-97cb1453220e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fa4ece28-d33f-40ea-8e7a-97cb1453220e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:06.981 39 INFO tempest.lib.common.rest_client [req-9e914b41-e810-465b-9ae8-cc13b8b44551 ] Request (AddressScopeExtRbacTest:test_delete_address_scope): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:21:06.982 39 DEBUG tempest.lib.common.rest_client [req-9e914b41-e810-465b-9ae8-cc13b8b44551 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9e914b41-e810-465b-9ae8-cc13b8b44551', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7136de0df69f4f019f207cefdcff3a0a", "name": "tempest-AddressScopeExtRbacTest-1141845618", "password_expires_at": null}, "audit_ids": ["OX8fmb5cSZar-L3ikZ_MVQ"], "expires_at": "2020-11-06T19:21:06.000000Z", "issued_at": "2020-11-06T18:21:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1141845618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:07.016 39 INFO tempest.lib.common.rest_client [req-a4d58a65-1b10-4fbf-992a-4808db0a919a ] Request (AddressScopeExtRbacTest:test_delete_address_scope): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:21:07.017 39 DEBUG tempest.lib.common.rest_client [req-a4d58a65-1b10-4fbf-992a-4808db0a919a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a4d58a65-1b10-4fbf-992a-4808db0a919a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7136de0df69f4f019f207cefdcff3a0a", "name": "tempest-AddressScopeExtRbacTest-1141845618", "password_expires_at": null}, "audit_ids": ["qkJqRvHkQaaIH-CWJhd5Yw"], "expires_at": "2020-11-06T19:21:07.000000Z", "issued_at": "2020-11-06T18:21:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1141845618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:07.116 39 INFO tempest.lib.common.rest_client [req-2ab36bd8-323f-453b-b77f-2d4b6d17ca58 ] Request (AddressScopeExtRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94:9696/v2.0/address-scopes/25f99d51-19aa-4abf-b8bb-af9919b862f0 0.097s 2020-11-06 18:21:07.116 39 DEBUG tempest.lib.common.rest_client [req-2ab36bd8-323f-453b-b77f-2d4b6d17ca58 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '149', 'x-openstack-request-id': 'req-2ab36bd8-323f-453b-b77f-2d4b6d17ca58', 'date': 'Fri, 06 Nov 2020 18:21:07 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes/25f99d51-19aa-4abf-b8bb-af9919b862f0'} Body: b'{"NeutronError": {"type": "AddressScopeNotFound", "message": "Address scope 25f99d51-19aa-4abf-b8bb-af9919b862f0 could not be found.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:07.119 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:07.124 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_address_scope, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:07.151 39 INFO tempest.lib.common.rest_client [req-63647ed0-9e8a-403a-8958-58194b31ea99 ] Request (AddressScopeExtRbacTest:test_get_address_scope): 201 POST http://172.30.13.94:9696/v2.0/address-scopes 0.025s 2020-11-06 18:21:07.151 39 DEBUG tempest.lib.common.rest_client [req-63647ed0-9e8a-403a-8958-58194b31ea99 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"address_scope": {"name": "tempest-AddressScopeExtRbacTest-745357992", "ip_version": 6}} Response - Headers: {'content-type': 'application/json', 'content-length': '251', 'x-openstack-request-id': 'req-63647ed0-9e8a-403a-8958-58194b31ea99', 'date': 'Fri, 06 Nov 2020 18:21:07 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes'} Body: b'{"address_scope": {"id": "b2b64bc6-45d5-4fd2-b52b-c82dd7e5baf2", "project_id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-745357992", "shared": false, "ip_version": 6, "tenant_id": "f4ea133d43404c52a949672b601d642e"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:07.152 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:07.208 39 INFO tempest.lib.common.rest_client [req-e417ecd4-34a1-410c-9e82-aab47d9e8adf ] Request (AddressScopeExtRbacTest:test_get_address_scope): 200 GET http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles 0.054s 2020-11-06 18:21:07.208 39 DEBUG tempest.lib.common.rest_client [req-e417ecd4-34a1-410c-9e82-aab47d9e8adf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e417ecd4-34a1-410c-9e82-aab47d9e8adf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:07.246 39 INFO tempest.lib.common.rest_client [req-f1b2c4bd-3403-429f-93ae-3106b144ba0b ] Request (AddressScopeExtRbacTest:test_get_address_scope): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:21:07.247 39 DEBUG tempest.lib.common.rest_client [req-f1b2c4bd-3403-429f-93ae-3106b144ba0b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f1b2c4bd-3403-429f-93ae-3106b144ba0b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7136de0df69f4f019f207cefdcff3a0a", "name": "tempest-AddressScopeExtRbacTest-1141845618", "password_expires_at": null}, "audit_ids": ["Ey3scQAYQomo-G_7d8fg6w"], "expires_at": "2020-11-06T19:21:07.000000Z", "issued_at": "2020-11-06T18:21:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1141845618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:07.286 39 INFO tempest.lib.common.rest_client [req-7e6ad3e3-f188-490e-aed6-035169ca2fd0 ] Request (AddressScopeExtRbacTest:test_get_address_scope): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:21:07.286 39 DEBUG tempest.lib.common.rest_client [req-7e6ad3e3-f188-490e-aed6-035169ca2fd0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7e6ad3e3-f188-490e-aed6-035169ca2fd0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7136de0df69f4f019f207cefdcff3a0a", "name": "tempest-AddressScopeExtRbacTest-1141845618", "password_expires_at": null}, "audit_ids": ["e8s7wejySRyDAPyXZSsH0A"], "expires_at": "2020-11-06T19:21:07.000000Z", "issued_at": "2020-11-06T18:21:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1141845618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:07.392 39 INFO tempest.lib.common.rest_client [req-d96a567e-1b37-486c-9668-0ab041c11301 ] Request (AddressScopeExtRbacTest:test_get_address_scope): 200 GET http://172.30.13.94:9696/v2.0/address-scopes/b2b64bc6-45d5-4fd2-b52b-c82dd7e5baf2 0.104s 2020-11-06 18:21:07.392 39 DEBUG tempest.lib.common.rest_client [req-d96a567e-1b37-486c-9668-0ab041c11301 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '251', 'x-openstack-request-id': 'req-d96a567e-1b37-486c-9668-0ab041c11301', 'date': 'Fri, 06 Nov 2020 18:21:07 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes/b2b64bc6-45d5-4fd2-b52b-c82dd7e5baf2'} Body: b'{"address_scope": {"id": "b2b64bc6-45d5-4fd2-b52b-c82dd7e5baf2", "project_id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-745357992", "shared": false, "ip_version": 6, "tenant_id": "f4ea133d43404c52a949672b601d642e"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:07.393 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:07.447 39 INFO tempest.lib.common.rest_client [req-ee3a857e-aec3-4374-a778-f4d6bef9c914 ] Request (AddressScopeExtRbacTest:test_get_address_scope): 200 GET http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles 0.053s 2020-11-06 18:21:07.448 39 DEBUG tempest.lib.common.rest_client [req-ee3a857e-aec3-4374-a778-f4d6bef9c914 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ee3a857e-aec3-4374-a778-f4d6bef9c914', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:07.485 39 INFO tempest.lib.common.rest_client [req-93649496-a8d9-4768-a146-3cb46d4cf621 ] Request (AddressScopeExtRbacTest:test_get_address_scope): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:21:07.486 39 DEBUG tempest.lib.common.rest_client [req-93649496-a8d9-4768-a146-3cb46d4cf621 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-93649496-a8d9-4768-a146-3cb46d4cf621', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7136de0df69f4f019f207cefdcff3a0a", "name": "tempest-AddressScopeExtRbacTest-1141845618", "password_expires_at": null}, "audit_ids": ["UjUWrQXJQbe5nm1huL8gxA"], "expires_at": "2020-11-06T19:21:07.000000Z", "issued_at": "2020-11-06T18:21:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1141845618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:07.522 39 INFO tempest.lib.common.rest_client [req-6f1a33f1-a1d2-474a-88ed-6cb0bef7bc7a ] Request (AddressScopeExtRbacTest:test_get_address_scope): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:21:07.523 39 DEBUG tempest.lib.common.rest_client [req-6f1a33f1-a1d2-474a-88ed-6cb0bef7bc7a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6f1a33f1-a1d2-474a-88ed-6cb0bef7bc7a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7136de0df69f4f019f207cefdcff3a0a", "name": "tempest-AddressScopeExtRbacTest-1141845618", "password_expires_at": null}, "audit_ids": ["NMm9sop-TFW1a1OoIM64Ig"], "expires_at": "2020-11-06T19:21:07.000000Z", "issued_at": "2020-11-06T18:21:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1141845618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:07.650 39 INFO tempest.lib.common.rest_client [req-bf553ce8-5160-46b4-ad28-5b91a29700c5 ] Request (AddressScopeExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/address-scopes/b2b64bc6-45d5-4fd2-b52b-c82dd7e5baf2 0.126s 2020-11-06 18:21:07.651 39 DEBUG tempest.lib.common.rest_client [req-bf553ce8-5160-46b4-ad28-5b91a29700c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-bf553ce8-5160-46b4-ad28-5b91a29700c5', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:21:07 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes/b2b64bc6-45d5-4fd2-b52b-c82dd7e5baf2'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:07.653 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:07.656 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_address_scope, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:07.685 39 INFO tempest.lib.common.rest_client [req-6c234040-0945-4775-ab33-e7969bf6f78a ] Request (AddressScopeExtRbacTest:test_list_address_scopes): 201 POST http://172.30.13.94:9696/v2.0/address-scopes 0.028s 2020-11-06 18:21:07.685 39 DEBUG tempest.lib.common.rest_client [req-6c234040-0945-4775-ab33-e7969bf6f78a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"address_scope": {"name": "tempest-AddressScopeExtRbacTest-1599143049", "ip_version": 6}} Response - Headers: {'content-type': 'application/json', 'content-length': '252', 'x-openstack-request-id': 'req-6c234040-0945-4775-ab33-e7969bf6f78a', 'date': 'Fri, 06 Nov 2020 18:21:07 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes'} Body: b'{"address_scope": {"id": "f8f466a5-e2d3-45db-8341-014630de2778", "project_id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1599143049", "shared": false, "ip_version": 6, "tenant_id": "f4ea133d43404c52a949672b601d642e"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:07.686 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:07.741 39 INFO tempest.lib.common.rest_client [req-6d801e2d-8507-464b-b350-c53784925cde ] Request (AddressScopeExtRbacTest:test_list_address_scopes): 200 GET http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles 0.055s 2020-11-06 18:21:07.742 39 DEBUG tempest.lib.common.rest_client [req-6d801e2d-8507-464b-b350-c53784925cde ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6d801e2d-8507-464b-b350-c53784925cde', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:07.776 39 INFO tempest.lib.common.rest_client [req-f224389d-cfae-401d-b0a7-205ca6de9a6d ] Request (AddressScopeExtRbacTest:test_list_address_scopes): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:21:07.777 39 DEBUG tempest.lib.common.rest_client [req-f224389d-cfae-401d-b0a7-205ca6de9a6d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f224389d-cfae-401d-b0a7-205ca6de9a6d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7136de0df69f4f019f207cefdcff3a0a", "name": "tempest-AddressScopeExtRbacTest-1141845618", "password_expires_at": null}, "audit_ids": ["H1YzL1gGQQylqPv1pRUkMg"], "expires_at": "2020-11-06T19:21:07.000000Z", "issued_at": "2020-11-06T18:21:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1141845618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:07.810 39 INFO tempest.lib.common.rest_client [req-01a4e73d-008e-47fe-a70c-beb548547b7f ] Request (AddressScopeExtRbacTest:test_list_address_scopes): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:21:07.811 39 DEBUG tempest.lib.common.rest_client [req-01a4e73d-008e-47fe-a70c-beb548547b7f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-01a4e73d-008e-47fe-a70c-beb548547b7f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7136de0df69f4f019f207cefdcff3a0a", "name": "tempest-AddressScopeExtRbacTest-1141845618", "password_expires_at": null}, "audit_ids": ["u5YiCR7sSIGAb8hBZ0z2ag"], "expires_at": "2020-11-06T19:21:07.000000Z", "issued_at": "2020-11-06T18:21:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1141845618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:07.893 39 INFO tempest.lib.common.rest_client [req-445c3e10-83fa-4bbb-ad67-e73a8069d508 ] Request (AddressScopeExtRbacTest:test_list_address_scopes): 200 GET http://172.30.13.94:9696/v2.0/address-scopes?id=f8f466a5-e2d3-45db-8341-014630de2778 0.080s 2020-11-06 18:21:07.894 39 DEBUG tempest.lib.common.rest_client [req-445c3e10-83fa-4bbb-ad67-e73a8069d508 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '255', 'x-openstack-request-id': 'req-445c3e10-83fa-4bbb-ad67-e73a8069d508', 'date': 'Fri, 06 Nov 2020 18:21:07 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes?id=f8f466a5-e2d3-45db-8341-014630de2778'} Body: b'{"address_scopes": [{"id": "f8f466a5-e2d3-45db-8341-014630de2778", "project_id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1599143049", "shared": false, "ip_version": 6, "tenant_id": "f4ea133d43404c52a949672b601d642e"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:07.894 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:07.945 39 INFO tempest.lib.common.rest_client [req-e8d05132-92fa-41ef-a0f7-5ea9728864ec ] Request (AddressScopeExtRbacTest:test_list_address_scopes): 200 GET http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles 0.050s 2020-11-06 18:21:07.946 39 DEBUG tempest.lib.common.rest_client [req-e8d05132-92fa-41ef-a0f7-5ea9728864ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e8d05132-92fa-41ef-a0f7-5ea9728864ec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:07.983 39 INFO tempest.lib.common.rest_client [req-36f8f079-e7c4-4326-8f80-578d8d07ff81 ] Request (AddressScopeExtRbacTest:test_list_address_scopes): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:21:07.983 39 DEBUG tempest.lib.common.rest_client [req-36f8f079-e7c4-4326-8f80-578d8d07ff81 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-36f8f079-e7c4-4326-8f80-578d8d07ff81', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7136de0df69f4f019f207cefdcff3a0a", "name": "tempest-AddressScopeExtRbacTest-1141845618", "password_expires_at": null}, "audit_ids": ["vxqNLG6-RASfz4vtbOoYWA"], "expires_at": "2020-11-06T19:21:07.000000Z", "issued_at": "2020-11-06T18:21:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1141845618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:08.012 39 INFO tempest.lib.common.rest_client [req-b3c5c0f6-60cc-4c56-ae4f-19df7128d5bd ] Request (AddressScopeExtRbacTest:test_list_address_scopes): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.028s 2020-11-06 18:21:08.013 39 DEBUG tempest.lib.common.rest_client [req-b3c5c0f6-60cc-4c56-ae4f-19df7128d5bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b3c5c0f6-60cc-4c56-ae4f-19df7128d5bd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7136de0df69f4f019f207cefdcff3a0a", "name": "tempest-AddressScopeExtRbacTest-1141845618", "password_expires_at": null}, "audit_ids": ["lPYuVm6FRyKOQGJL_vfBLA"], "expires_at": "2020-11-06T19:21:08.000000Z", "issued_at": "2020-11-06T18:21:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1141845618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:08.129 39 INFO tempest.lib.common.rest_client [req-6cf7e179-293e-4248-8bfb-ab91140a9ecb ] Request (AddressScopeExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/address-scopes/f8f466a5-e2d3-45db-8341-014630de2778 0.115s 2020-11-06 18:21:08.130 39 DEBUG tempest.lib.common.rest_client [req-6cf7e179-293e-4248-8bfb-ab91140a9ecb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-6cf7e179-293e-4248-8bfb-ab91140a9ecb', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:21:08 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes/f8f466a5-e2d3-45db-8341-014630de2778'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:08.133 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:08.136 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_address_scope, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:08.136 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:08.138 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_address_scope, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:08.160 39 INFO tempest.lib.common.rest_client [req-cf16aea6-aa04-4888-936e-366f81f5d233 ] Request (AddressScopeExtRbacTest:test_update_address_scope): 201 POST http://172.30.13.94:9696/v2.0/address-scopes 0.021s 2020-11-06 18:21:08.161 39 DEBUG tempest.lib.common.rest_client [req-cf16aea6-aa04-4888-936e-366f81f5d233 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"address_scope": {"name": "tempest-AddressScopeExtRbacTest-1309197673", "ip_version": 6}} Response - Headers: {'content-type': 'application/json', 'content-length': '252', 'x-openstack-request-id': 'req-cf16aea6-aa04-4888-936e-366f81f5d233', 'date': 'Fri, 06 Nov 2020 18:21:08 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes'} Body: b'{"address_scope": {"id": "aa7607cb-dd0e-452f-af15-f896496dca68", "project_id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1309197673", "shared": false, "ip_version": 6, "tenant_id": "f4ea133d43404c52a949672b601d642e"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:08.161 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:08.213 39 INFO tempest.lib.common.rest_client [req-7fa068af-29c6-40a6-bbec-5305d1d79578 ] Request (AddressScopeExtRbacTest:test_update_address_scope): 200 GET http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles 0.051s 2020-11-06 18:21:08.214 39 DEBUG tempest.lib.common.rest_client [req-7fa068af-29c6-40a6-bbec-5305d1d79578 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7fa068af-29c6-40a6-bbec-5305d1d79578', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:08.251 39 INFO tempest.lib.common.rest_client [req-20959dd4-bc46-4dae-98f7-ae78785225eb ] Request (AddressScopeExtRbacTest:test_update_address_scope): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:21:08.252 39 DEBUG tempest.lib.common.rest_client [req-20959dd4-bc46-4dae-98f7-ae78785225eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-20959dd4-bc46-4dae-98f7-ae78785225eb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7136de0df69f4f019f207cefdcff3a0a", "name": "tempest-AddressScopeExtRbacTest-1141845618", "password_expires_at": null}, "audit_ids": ["dmvXb9SlRp-mlS-99TkZHQ"], "expires_at": "2020-11-06T19:21:08.000000Z", "issued_at": "2020-11-06T18:21:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1141845618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:08.288 39 INFO tempest.lib.common.rest_client [req-1b8feec3-ef50-4e64-913a-33a5cca73dee ] Request (AddressScopeExtRbacTest:test_update_address_scope): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:21:08.289 39 DEBUG tempest.lib.common.rest_client [req-1b8feec3-ef50-4e64-913a-33a5cca73dee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1b8feec3-ef50-4e64-913a-33a5cca73dee', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7136de0df69f4f019f207cefdcff3a0a", "name": "tempest-AddressScopeExtRbacTest-1141845618", "password_expires_at": null}, "audit_ids": ["MgBYh5wjQwSjR8nJV5OJ6A"], "expires_at": "2020-11-06T19:21:08.000000Z", "issued_at": "2020-11-06T18:21:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1141845618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:09.548 39 INFO tempest.lib.common.rest_client [req-f2203c76-b57c-4fb9-a5d1-e10355cc3a9d ] Request (AddressScopeExtRbacTest:test_update_address_scope): 200 PUT http://172.30.13.94:9696/v2.0/address-scopes/aa7607cb-dd0e-452f-af15-f896496dca68 1.258s 2020-11-06 18:21:09.549 39 DEBUG tempest.lib.common.rest_client [req-f2203c76-b57c-4fb9-a5d1-e10355cc3a9d ] Request - Headers: {'X-Auth-Token': ''} Body: {"address_scope": {"name": "tempest-AddressScopeExtRbacTest-1159060717"}} Response - Headers: {'content-type': 'application/json', 'content-length': '252', 'x-openstack-request-id': 'req-f2203c76-b57c-4fb9-a5d1-e10355cc3a9d', 'date': 'Fri, 06 Nov 2020 18:21:09 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes/aa7607cb-dd0e-452f-af15-f896496dca68'} Body: b'{"address_scope": {"id": "aa7607cb-dd0e-452f-af15-f896496dca68", "project_id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1159060717", "shared": false, "ip_version": 6, "tenant_id": "f4ea133d43404c52a949672b601d642e"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:09.550 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:09.602 39 INFO tempest.lib.common.rest_client [req-89317123-6868-4660-8e62-17efaacee9d9 ] Request (AddressScopeExtRbacTest:test_update_address_scope): 200 GET http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles 0.051s 2020-11-06 18:21:09.603 39 DEBUG tempest.lib.common.rest_client [req-89317123-6868-4660-8e62-17efaacee9d9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-89317123-6868-4660-8e62-17efaacee9d9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:09.639 39 INFO tempest.lib.common.rest_client [req-941be9e4-273b-4603-a24f-e62e40be5d3a ] Request (AddressScopeExtRbacTest:test_update_address_scope): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:21:09.639 39 DEBUG tempest.lib.common.rest_client [req-941be9e4-273b-4603-a24f-e62e40be5d3a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-941be9e4-273b-4603-a24f-e62e40be5d3a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7136de0df69f4f019f207cefdcff3a0a", "name": "tempest-AddressScopeExtRbacTest-1141845618", "password_expires_at": null}, "audit_ids": ["LTN37WCwQsWiY_G8vriG7A"], "expires_at": "2020-11-06T19:21:09.000000Z", "issued_at": "2020-11-06T18:21:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1141845618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:09.675 39 INFO tempest.lib.common.rest_client [req-206cc917-547b-4258-9662-14803fdcb062 ] Request (AddressScopeExtRbacTest:test_update_address_scope): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:21:09.675 39 DEBUG tempest.lib.common.rest_client [req-206cc917-547b-4258-9662-14803fdcb062 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-206cc917-547b-4258-9662-14803fdcb062', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7136de0df69f4f019f207cefdcff3a0a", "name": "tempest-AddressScopeExtRbacTest-1141845618", "password_expires_at": null}, "audit_ids": ["fd47kMClSMSQOSvX5v9EPQ"], "expires_at": "2020-11-06T19:21:09.000000Z", "issued_at": "2020-11-06T18:21:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1141845618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:09.790 39 INFO tempest.lib.common.rest_client [req-cc42d993-d1df-4953-8ab4-5edfe81eff83 ] Request (AddressScopeExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/address-scopes/aa7607cb-dd0e-452f-af15-f896496dca68 0.113s 2020-11-06 18:21:09.790 39 DEBUG tempest.lib.common.rest_client [req-cc42d993-d1df-4953-8ab4-5edfe81eff83 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-cc42d993-d1df-4953-8ab4-5edfe81eff83', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:21:09 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes/aa7607cb-dd0e-452f-af15-f896496dca68'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:09.793 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:09.797 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_address_scope, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:09.797 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:09.799 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_address_scope, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:09.799 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:09.801 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_address_scope:shared, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:09.855 39 INFO tempest.lib.common.rest_client [req-d58f430d-9de6-429d-a9a2-d90ea4dec015 ] Request (AddressScopeExtRbacTest:test_update_address_scope_shared): 201 POST http://172.30.13.94:9696/v2.0/address-scopes 0.052s 2020-11-06 18:21:09.855 39 DEBUG tempest.lib.common.rest_client [req-d58f430d-9de6-429d-a9a2-d90ea4dec015 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"address_scope": {"name": "tempest-AddressScopeExtRbacTest-2033229539", "ip_version": 6, "shared": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '251', 'x-openstack-request-id': 'req-d58f430d-9de6-429d-a9a2-d90ea4dec015', 'date': 'Fri, 06 Nov 2020 18:21:09 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes'} Body: b'{"address_scope": {"id": "54155f97-ef35-4359-af12-93d661c37cf0", "project_id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-2033229539", "shared": true, "ip_version": 6, "tenant_id": "f4ea133d43404c52a949672b601d642e"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:09.855 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:09.909 39 INFO tempest.lib.common.rest_client [req-f8604e88-ae3e-40ed-acfd-bfe7de2a50c5 ] Request (AddressScopeExtRbacTest:test_update_address_scope_shared): 200 GET http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles 0.053s 2020-11-06 18:21:09.909 39 DEBUG tempest.lib.common.rest_client [req-f8604e88-ae3e-40ed-acfd-bfe7de2a50c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f8604e88-ae3e-40ed-acfd-bfe7de2a50c5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:09.941 39 INFO tempest.lib.common.rest_client [req-cad62c5a-ad7a-4d83-ab17-51e22a67677a ] Request (AddressScopeExtRbacTest:test_update_address_scope_shared): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:21:09.942 39 DEBUG tempest.lib.common.rest_client [req-cad62c5a-ad7a-4d83-ab17-51e22a67677a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cad62c5a-ad7a-4d83-ab17-51e22a67677a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7136de0df69f4f019f207cefdcff3a0a", "name": "tempest-AddressScopeExtRbacTest-1141845618", "password_expires_at": null}, "audit_ids": ["513sUDoKT_iw8ruvd9jVHA"], "expires_at": "2020-11-06T19:21:09.000000Z", "issued_at": "2020-11-06T18:21:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1141845618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:09.975 39 INFO tempest.lib.common.rest_client [req-59d114f4-4ff1-452b-acaa-983ae91b49e2 ] Request (AddressScopeExtRbacTest:test_update_address_scope_shared): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:21:09.976 39 DEBUG tempest.lib.common.rest_client [req-59d114f4-4ff1-452b-acaa-983ae91b49e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-59d114f4-4ff1-452b-acaa-983ae91b49e2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7136de0df69f4f019f207cefdcff3a0a", "name": "tempest-AddressScopeExtRbacTest-1141845618", "password_expires_at": null}, "audit_ids": ["cx-OVwSLSmqjSaV6360xxA"], "expires_at": "2020-11-06T19:21:09.000000Z", "issued_at": "2020-11-06T18:21:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1141845618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:10.086 39 INFO tempest.lib.common.rest_client [req-c40a762c-f0dc-4b31-9522-0a00379bab44 ] Request (AddressScopeExtRbacTest:test_update_address_scope_shared): 200 PUT http://172.30.13.94:9696/v2.0/address-scopes/54155f97-ef35-4359-af12-93d661c37cf0 0.108s 2020-11-06 18:21:10.086 39 DEBUG tempest.lib.common.rest_client [req-c40a762c-f0dc-4b31-9522-0a00379bab44 ] Request - Headers: {'X-Auth-Token': ''} Body: {"address_scope": {"shared": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '251', 'x-openstack-request-id': 'req-c40a762c-f0dc-4b31-9522-0a00379bab44', 'date': 'Fri, 06 Nov 2020 18:21:10 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes/54155f97-ef35-4359-af12-93d661c37cf0'} Body: b'{"address_scope": {"id": "54155f97-ef35-4359-af12-93d661c37cf0", "project_id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-2033229539", "shared": true, "ip_version": 6, "tenant_id": "f4ea133d43404c52a949672b601d642e"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:10.087 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:10.143 39 INFO tempest.lib.common.rest_client [req-970e17d9-e48a-43a1-9092-5b15072c6c55 ] Request (AddressScopeExtRbacTest:test_update_address_scope_shared): 200 GET http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles 0.055s 2020-11-06 18:21:10.143 39 DEBUG tempest.lib.common.rest_client [req-970e17d9-e48a-43a1-9092-5b15072c6c55 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-970e17d9-e48a-43a1-9092-5b15072c6c55', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e/users/7136de0df69f4f019f207cefdcff3a0a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:10.208 39 INFO tempest.lib.common.rest_client [req-1c3d87c7-1247-4f25-9066-dc1b38b2f5a1 ] Request (AddressScopeExtRbacTest:test_update_address_scope_shared): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.064s 2020-11-06 18:21:10.209 39 DEBUG tempest.lib.common.rest_client [req-1c3d87c7-1247-4f25-9066-dc1b38b2f5a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1c3d87c7-1247-4f25-9066-dc1b38b2f5a1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7136de0df69f4f019f207cefdcff3a0a", "name": "tempest-AddressScopeExtRbacTest-1141845618", "password_expires_at": null}, "audit_ids": ["3NhD6PYgSDON_MzpZiKLBw"], "expires_at": "2020-11-06T19:21:10.000000Z", "issued_at": "2020-11-06T18:21:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1141845618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:10.247 39 INFO tempest.lib.common.rest_client [req-e693a81d-7ece-4ccb-aeac-6185bd222866 ] Request (AddressScopeExtRbacTest:test_update_address_scope_shared): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:21:10.248 39 DEBUG tempest.lib.common.rest_client [req-e693a81d-7ece-4ccb-aeac-6185bd222866 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e693a81d-7ece-4ccb-aeac-6185bd222866', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7136de0df69f4f019f207cefdcff3a0a", "name": "tempest-AddressScopeExtRbacTest-1141845618", "password_expires_at": null}, "audit_ids": ["LSrgz4_LQriLYLWwuHFAgA"], "expires_at": "2020-11-06T19:21:10.000000Z", "issued_at": "2020-11-06T18:21:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f4ea133d43404c52a949672b601d642e", "name": "tempest-AddressScopeExtRbacTest-1141845618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f4ea133d43404c52a949672b601d642e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:10.377 39 INFO tempest.lib.common.rest_client [req-5c1dc805-de67-4b1a-a1fe-1c2791776283 ] Request (AddressScopeExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/address-scopes/54155f97-ef35-4359-af12-93d661c37cf0 0.127s 2020-11-06 18:21:10.378 39 DEBUG tempest.lib.common.rest_client [req-5c1dc805-de67-4b1a-a1fe-1c2791776283 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-5c1dc805-de67-4b1a-a1fe-1c2791776283', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:21:10 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes/54155f97-ef35-4359-af12-93d661c37cf0'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:12.190 39 INFO tempest.lib.common.rest_client [req-918d36df-6097-4c22-965e-0d9793d1450c ] Request (AddressScopeExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/581c0db7-91db-41d8-8794-761accd13727 1.809s 2020-11-06 18:21:12.191 39 DEBUG tempest.lib.common.rest_client [req-918d36df-6097-4c22-965e-0d9793d1450c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-918d36df-6097-4c22-965e-0d9793d1450c', 'date': 'Fri, 06 Nov 2020 18:21:12 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/581c0db7-91db-41d8-8794-761accd13727'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:12.329 39 INFO tempest.lib.common.rest_client [req-26de724f-c41a-413b-9486-fceed8f72d56 ] Request (AddressScopeExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/7136de0df69f4f019f207cefdcff3a0a 0.136s 2020-11-06 18:21:12.329 39 DEBUG tempest.lib.common.rest_client [req-26de724f-c41a-413b-9486-fceed8f72d56 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-26de724f-c41a-413b-9486-fceed8f72d56', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/7136de0df69f4f019f207cefdcff3a0a'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:12.413 39 INFO tempest.lib.common.rest_client [req-cad2099c-2272-4697-8a41-3ac274807c29 ] Request (AddressScopeExtRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 18:21:12.414 39 DEBUG tempest.lib.common.rest_client [req-cad2099c-2272-4697-8a41-3ac274807c29 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cad2099c-2272-4697-8a41-3ac274807c29', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["1pkvuxJJQGugEtxXFpo31g"], "expires_at": "2020-11-06T19:21:12.000000Z", "issued_at": "2020-11-06T18:21:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:12.579 39 INFO tempest.lib.common.rest_client [req-7dc9011f-55f2-4cb7-a91b-c694d2199f28 ] Request (AddressScopeExtRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=f4ea133d43404c52a949672b601d642e&name=default 0.164s 2020-11-06 18:21:12.580 39 DEBUG tempest.lib.common.rest_client [req-7dc9011f-55f2-4cb7-a91b-c694d2199f28 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-7dc9011f-55f2-4cb7-a91b-c694d2199f28', 'date': 'Fri, 06 Nov 2020 18:21:12 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=f4ea133d43404c52a949672b601d642e&name=default'} Body: b'{"security_groups": [{"id": "c5f3e147-6ae3-4074-b7d4-ecd0021db69c", "name": "default", "stateful": true, "tenant_id": "f4ea133d43404c52a949672b601d642e", "description": "Default security group", "security_group_rules": [{"id": "0c62ec23-b7e0-429a-94fe-8e6ff1cf61b1", "tenant_id": "f4ea133d43404c52a949672b601d642e", "security_group_id": "c5f3e147-6ae3-4074-b7d4-ecd0021db69c", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "c5f3e147-6ae3-4074-b7d4-ecd0021db69c", "description": null, "tags": [], "created_at": "2020-11-06T18:21:05Z", "updated_at": "2020-11-06T18:21:05Z", "revision_number": 0, "project_id": "f4ea133d43404c52a949672b601d642e"}, {"id": "38df01d7-70a0-4413-a497-aacae41f1de4", "tenant_id": "f4ea133d43404c52a949672b601d642e", "security_group_id": "c5f3e147-6ae3-4074-b7d4-ecd0021db69c", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:21:05Z", "updated_at": "2020-11-06T18:21:05Z", "revision_number": 0, "project_id": "f4ea133d43404c52a949672b601d642e"}, {"id": "69ed28e3-8f0b-4dc7-ab66-efdfe5f2253d", "tenant_id": "f4ea133d43404c52a949672b601d642e", "security_group_id": "c5f3e147-6ae3-4074-b7d4-ecd0021db69c", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:21:05Z", "updated_at": "2020-11-06T18:21:05Z", "revision_number": 0, "project_id": "f4ea133d43404c52a949672b601d642e"}, {"id": "87075414-1d98-45a2-9b5d-734dfaf07570", "tenant_id": "f4ea133d43404c52a949672b601d642e", "security_group_id": "c5f3e147-6ae3-4074-b7d4-ecd0021db69c", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "c5f3e147-6ae3-4074-b7d4-ecd0021db69c", "description": null, "tags": [], "created_at": "2020-11-06T18:21:05Z", "updated_at": "2020-11-06T18:21:05Z", "revision_number": 0, "project_id": "f4ea133d43404c52a949672b601d642e"}], "tags": [], "created_at": "2020-11-06T18:21:05Z", "updated_at": "2020-11-06T18:21:05Z", "revision_number": 1, "project_id": "f4ea133d43404c52a949672b601d642e"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:12.733 39 INFO tempest.lib.common.rest_client [req-983d9705-d57c-432b-86f7-8e565dd5f4db ] Request (AddressScopeExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/c5f3e147-6ae3-4074-b7d4-ecd0021db69c 0.152s 2020-11-06 18:21:12.733 39 DEBUG tempest.lib.common.rest_client [req-983d9705-d57c-432b-86f7-8e565dd5f4db ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-983d9705-d57c-432b-86f7-8e565dd5f4db', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:21:12 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/c5f3e147-6ae3-4074-b7d4-ecd0021db69c'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:12.845 39 INFO tempest.lib.common.rest_client [req-ca2f3702-7cea-4e9f-a7c5-7dfa6803f563 ] Request (AddressScopeExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e 0.111s 2020-11-06 18:21:12.846 39 DEBUG tempest.lib.common.rest_client [req-ca2f3702-7cea-4e9f-a7c5-7dfa6803f563 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ca2f3702-7cea-4e9f-a7c5-7dfa6803f563', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/f4ea133d43404c52a949672b601d642e'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:12.941 39 INFO tempest.lib.common.rest_client [req-794551cb-4a0e-4f58-9290-5942f76e7fdb ] Request (L3AgentSchedulerRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-11-06 18:21:12.941 39 DEBUG tempest.lib.common.rest_client [req-794551cb-4a0e-4f58-9290-5942f76e7fdb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-794551cb-4a0e-4f58-9290-5942f76e7fdb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["h4yC4c41QqaV3Jx3zSTAAA"], "expires_at": "2020-11-06T19:21:12.000000Z", "issued_at": "2020-11-06T18:21:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:12.988 39 INFO tempest.lib.common.rest_client [req-c173e76b-6f66-4811-a5f4-4b0b09150710 ] Request (L3AgentSchedulerRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:21:12.988 39 DEBUG tempest.lib.common.rest_client [req-c173e76b-6f66-4811-a5f4-4b0b09150710 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c173e76b-6f66-4811-a5f4-4b0b09150710', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["Lv91qwAcQ1-A8_hr8mdyPg"], "expires_at": "2020-11-06T19:21:12.000000Z", "issued_at": "2020-11-06T18:21:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:13.045 39 INFO tempest.lib.common.rest_client [req-ebdc4dbe-92ed-46f6-a912-0c2ec06627c6 ] Request (L3AgentSchedulerRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.056s 2020-11-06 18:21:13.046 39 DEBUG tempest.lib.common.rest_client [req-ebdc4dbe-92ed-46f6-a912-0c2ec06627c6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ebdc4dbe-92ed-46f6-a912-0c2ec06627c6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:13.116 39 INFO tempest.lib.common.rest_client [req-7b99cd3b-b7cb-42f2-9cc3-214a1734f71f ] Request (L3AgentSchedulerRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.070s 2020-11-06 18:21:13.117 39 DEBUG tempest.lib.common.rest_client [req-7b99cd3b-b7cb-42f2-9cc3-214a1734f71f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-L3AgentSchedulerRbacTest-1481464910-desc", "domain_id": "default", "name": "tempest-L3AgentSchedulerRbacTest-1481464910"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '386', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7b99cd3b-b7cb-42f2-9cc3-214a1734f71f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "e1f85f88dd2e4484a865a3934154ea21", "name": "tempest-L3AgentSchedulerRbacTest-1481464910", "domain_id": "default", "description": "tempest-L3AgentSchedulerRbacTest-1481464910-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/e1f85f88dd2e4484a865a3934154ea21"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:13.232 39 INFO tempest.lib.common.rest_client [req-89a00c75-541f-491c-b55c-1fc9b81581bf ] Request (L3AgentSchedulerRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.113s 2020-11-06 18:21:13.232 39 DEBUG tempest.lib.common.rest_client [req-89a00c75-541f-491c-b55c-1fc9b81581bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-L3AgentSchedulerRbacTest-1481464910", "password": "M3^R!+jfvKGVSgF", "project_id": "e1f85f88dd2e4484a865a3934154ea21", "email": "tempest-L3AgentSchedulerRbacTest-1201107953@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '404', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-89a00c75-541f-491c-b55c-1fc9b81581bf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "e1f85f88dd2e4484a865a3934154ea21", "email": "tempest-L3AgentSchedulerRbacTest-1201107953@example.com", "id": "01a44e1952b64299aec77e9ac92ca25c", "name": "tempest-L3AgentSchedulerRbacTest-1481464910", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/01a44e1952b64299aec77e9ac92ca25c"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:13.285 39 INFO tempest.lib.common.rest_client [req-f60d2460-fdeb-49d9-b6be-5b1b46f9f4dd ] Request (L3AgentSchedulerRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.052s 2020-11-06 18:21:13.285 39 DEBUG tempest.lib.common.rest_client [req-f60d2460-fdeb-49d9-b6be-5b1b46f9f4dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f60d2460-fdeb-49d9-b6be-5b1b46f9f4dd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:13.338 39 INFO tempest.lib.common.rest_client [req-b2b9ca2b-6bf6-447a-85ee-3af8dbb14af9 ] Request (L3AgentSchedulerRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.052s 2020-11-06 18:21:13.339 39 DEBUG tempest.lib.common.rest_client [req-b2b9ca2b-6bf6-447a-85ee-3af8dbb14af9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b2b9ca2b-6bf6-447a-85ee-3af8dbb14af9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:13.401 39 INFO tempest.lib.common.rest_client [req-104e0628-19a6-4246-9d7e-ecac54728fa9 ] Request (L3AgentSchedulerRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/e1f85f88dd2e4484a865a3934154ea21/users/01a44e1952b64299aec77e9ac92ca25c/roles/72a4576c553448cd941b052c1ca0cf2d 0.061s 2020-11-06 18:21:13.401 39 DEBUG tempest.lib.common.rest_client [req-104e0628-19a6-4246-9d7e-ecac54728fa9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-104e0628-19a6-4246-9d7e-ecac54728fa9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e1f85f88dd2e4484a865a3934154ea21/users/01a44e1952b64299aec77e9ac92ca25c/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:13.402 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-L3AgentSchedulerRbacTest-1481464910', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'e1f85f88dd2e4484a865a3934154ea21', 'project_name': 'tempest-L3AgentSchedulerRbacTest-1481464910', 'tenant_id': 'e1f85f88dd2e4484a865a3934154ea21', 'tenant_name': 'tempest-L3AgentSchedulerRbacTest-1481464910', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '01a44e1952b64299aec77e9ac92ca25c'}, Network: None, Subnet: None, Router: None 2020-11-06 18:21:13.402 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-L3AgentSchedulerRbacTest-1481464910', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'e1f85f88dd2e4484a865a3934154ea21', 'project_name': 'tempest-L3AgentSchedulerRbacTest-1481464910', 'tenant_id': 'e1f85f88dd2e4484a865a3934154ea21', 'tenant_name': 'tempest-L3AgentSchedulerRbacTest-1481464910', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '01a44e1952b64299aec77e9ac92ca25c'}, Network: None, Subnet: None, Router: None 2020-11-06 18:21:13.522 39 INFO tempest.lib.common.rest_client [req-4c5a804c-f7d9-4bd3-904a-014bfc790812 ] Request (L3AgentSchedulerRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.107s 2020-11-06 18:21:13.522 39 DEBUG tempest.lib.common.rest_client [req-4c5a804c-f7d9-4bd3-904a-014bfc790812 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6579', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4c5a804c-f7d9-4bd3-904a-014bfc790812', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "01a44e1952b64299aec77e9ac92ca25c", "name": "tempest-L3AgentSchedulerRbacTest-1481464910", "password_expires_at": null}, "audit_ids": ["TaEGWflGRkCeWWSKUsjOAQ"], "expires_at": "2020-11-06T19:21:13.000000Z", "issued_at": "2020-11-06T18:21:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e1f85f88dd2e4484a865a3934154ea21", "name": "tempest-L3AgentSchedulerRbacTest-1481464910"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "ht _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:13.617 39 INFO tempest.lib.common.rest_client [req-dc3b678e-072c-4e15-b912-d7e390ae2b5c ] Request (L3AgentSchedulerRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-11-06 18:21:13.617 39 DEBUG tempest.lib.common.rest_client [req-dc3b678e-072c-4e15-b912-d7e390ae2b5c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dc3b678e-072c-4e15-b912-d7e390ae2b5c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["RuQcot63R6WaohcxYBE1Qw"], "expires_at": "2020-11-06T19:21:13.000000Z", "issued_at": "2020-11-06T18:21:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:13.665 39 INFO tempest.lib.common.rest_client [req-ab683cb5-67bc-4d00-85f9-22e9036734b4 ] Request (L3AgentSchedulerRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:21:13.666 39 DEBUG tempest.lib.common.rest_client [req-ab683cb5-67bc-4d00-85f9-22e9036734b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ab683cb5-67bc-4d00-85f9-22e9036734b4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["bd1s5hY0ST6ezovLSV767w"], "expires_at": "2020-11-06T19:21:13.000000Z", "issued_at": "2020-11-06T18:21:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:13.725 39 INFO tempest.lib.common.rest_client [req-62f03d43-4dbe-4ed3-a5af-d57d4fc196fa ] Request (L3AgentSchedulerRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.058s 2020-11-06 18:21:13.726 39 DEBUG tempest.lib.common.rest_client [req-62f03d43-4dbe-4ed3-a5af-d57d4fc196fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-62f03d43-4dbe-4ed3-a5af-d57d4fc196fa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:13.778 39 INFO tempest.lib.common.rest_client [req-55353021-4f79-4fc7-8e3d-cd0818d6d3ca ] Request (L3AgentSchedulerRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.051s 2020-11-06 18:21:13.778 39 DEBUG tempest.lib.common.rest_client [req-55353021-4f79-4fc7-8e3d-cd0818d6d3ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-55353021-4f79-4fc7-8e3d-cd0818d6d3ca', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:13.779 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:21:13.779 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:13.829 39 INFO tempest.lib.common.rest_client [req-7aead8a4-d093-4d53-870d-8987a6c75709 ] Request (L3AgentSchedulerRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/e1f85f88dd2e4484a865a3934154ea21/users/01a44e1952b64299aec77e9ac92ca25c/roles 0.049s 2020-11-06 18:21:13.829 39 DEBUG tempest.lib.common.rest_client [req-7aead8a4-d093-4d53-870d-8987a6c75709 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7aead8a4-d093-4d53-870d-8987a6c75709', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e1f85f88dd2e4484a865a3934154ea21/users/01a44e1952b64299aec77e9ac92ca25c/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e1f85f88dd2e4484a865a3934154ea21/users/01a44e1952b64299aec77e9ac92ca25c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:13.899 39 INFO tempest.lib.common.rest_client [req-7293871c-5184-4b96-8618-992ba72ef22f ] Request (L3AgentSchedulerRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/e1f85f88dd2e4484a865a3934154ea21/users/01a44e1952b64299aec77e9ac92ca25c/roles/72a4576c553448cd941b052c1ca0cf2d 0.068s 2020-11-06 18:21:13.899 39 DEBUG tempest.lib.common.rest_client [req-7293871c-5184-4b96-8618-992ba72ef22f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7293871c-5184-4b96-8618-992ba72ef22f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e1f85f88dd2e4484a865a3934154ea21/users/01a44e1952b64299aec77e9ac92ca25c/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:14.004 39 INFO tempest.lib.common.rest_client [req-07e770b1-ce4c-4425-b6c1-a09d1d1a8d98 ] Request (L3AgentSchedulerRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/e1f85f88dd2e4484a865a3934154ea21/users/01a44e1952b64299aec77e9ac92ca25c/roles/a629c95d64b3416fb80ae90af4f69c05 0.103s 2020-11-06 18:21:14.004 39 DEBUG tempest.lib.common.rest_client [req-07e770b1-ce4c-4425-b6c1-a09d1d1a8d98 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-07e770b1-ce4c-4425-b6c1-a09d1d1a8d98', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e1f85f88dd2e4484a865a3934154ea21/users/01a44e1952b64299aec77e9ac92ca25c/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:15.096 39 INFO tempest.lib.common.rest_client [req-7d385b4a-f6ec-45e8-b586-0e0765e393fc ] Request (L3AgentSchedulerRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-11-06 18:21:15.096 39 DEBUG tempest.lib.common.rest_client [req-7d385b4a-f6ec-45e8-b586-0e0765e393fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7d385b4a-f6ec-45e8-b586-0e0765e393fc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "01a44e1952b64299aec77e9ac92ca25c", "name": "tempest-L3AgentSchedulerRbacTest-1481464910", "password_expires_at": null}, "audit_ids": ["_peBP_qqRDqm2QDBtpINXA"], "expires_at": "2020-11-06T19:21:15.000000Z", "issued_at": "2020-11-06T18:21:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e1f85f88dd2e4484a865a3934154ea21", "name": "tempest-L3AgentSchedulerRbacTest-1481464910"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:15.388 39 INFO tempest.lib.common.rest_client [req-18c637f1-c427-4085-a105-81204309ce98 ] Request (L3AgentSchedulerRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/routers 0.291s 2020-11-06 18:21:15.389 39 DEBUG tempest.lib.common.rest_client [req-18c637f1-c427-4085-a105-81204309ce98 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-L3AgentSchedulerRbacTest-router-35922513", "external_gateway_info": {}, "admin_state_up": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '547', 'x-openstack-request-id': 'req-18c637f1-c427-4085-a105-81204309ce98', 'date': 'Fri, 06 Nov 2020 18:21:15 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "8b06e95c-4bb1-4a27-ba44-f40ee5b2b8b1", "name": "tempest-L3AgentSchedulerRbacTest-router-35922513", "tenant_id": "e1f85f88dd2e4484a865a3934154ea21", "admin_state_up": false, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T18:21:15Z", "updated_at": "2020-11-06T18:21:15Z", "revision_number": 1, "project_id": "e1f85f88dd2e4484a865a3934154ea21"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:15.402 39 INFO tempest.lib.common.rest_client [req-ce0b43dd-c8c4-45b4-8244-7b6b09c73951 ] Request (L3AgentSchedulerRbacTest:setUp): 200 GET http://172.30.13.94:9696/v2.0/agents 0.012s 2020-11-06 18:21:15.403 39 DEBUG tempest.lib.common.rest_client [req-ce0b43dd-c8c4-45b4-8244-7b6b09c73951 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '4325', 'x-openstack-request-id': 'req-ce0b43dd-c8c4-45b4-8244-7b6b09c73951', 'date': 'Fri, 06 Nov 2020 18:21:15 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/agents'} Body: b'{"agents": [{"id": "0efbff63-9926-4774-9bea-b5e130b9492e", "agent_type": "L3 agent", "binary": "neutron-l3-agent", "topic": "l3_agent", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:04", "started_at": "2020-10-07 12:07:05", "heartbeat_timestamp": "2020-11-06 18:21:03", "description": null, "resources_synced": null, "availability_zone": "nova", "alive": true, "configurations": {"agent_mode": "legacy", "ex_gw_ports": 4, "extensions": ["fip_qos", "gateway_ip_qos", "port_forwarding"], "floating_ips": 0, "handle_internal_only_routers": true, "interface_driver": "openvswitch", "interfaces": 6, "log_agent_heartbeats": false, "routers": 4}}, {"id": "538ccf2a-fb61-47ed-a10a-785f64cdbb63", "agent_type": "Open vSwitch agent", "binary": "neutron-openvswitch-agent", "topic": "N/A", "host": "lf-virtual8", "admin_state_up": true, "created_at": "2020-10-07 13:02:58", "started_at": "2020-10-07 13:03:28", "heartbeat_timestamp": "2020-11-06 18:20:57", "description": null, "resources_synced": null, "availability_zone": null, "alive": true, "configurations": {"arp_responder_enabled": false, "baremetal_smartnic": false, "bridge_mappings": {}, "datapath_type": "system", "devices": 0, "enable_distributed_routing": false, "extensions": ["qos", "log"], "in_distributed_mode": false, "integration_bridge": "br-int", "l2_population": false, "log_agent_heartbeats": false, "ovs_capabilities": {"datapath_types": ["netdev", "system"], "iface_types": ["erspan", "geneve", "gre", "internal", "ip6erspan", "ip6gre", "lisp", "patch", "stt", "system", "tap", "vxlan"]}, "ovs_hybrid_plug": false, "resource_provider_bandwidths": {}, "resource_provider_hypervisors": {}, "resource_provider_inventory_defaults": {"allocation_ratio": 1.0, "min_unit": 1, "step_size": 1, "reserved": 0}, "tunnel_types": ["vxlan"], "tunneling_ip": "172.30.13.93", "vhostuser_socket_dir": "/var/run/openvswitch"}}, {"id": "9d48116b-94de-4990-baef-e3b6765751fc", "agent_type": "Open vSwitch agent", "binary": "neutron-openvswitch-agent", "topic": "N/A", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:05", "started_at": "2020-10-07 12:07:35", "heartbeat_timestamp": "2020-11-06 18:21:02", "description": null, "resources_synced": null, "availability_zone": null, "alive": true, "configurations": {"arp_responder_enabled": false, "baremetal_smartnic": false, "bridge_mappings": {"public": "br-ex"}, "datapath_type": "system", "devices": 21, "enable_distributed_routing": false, "extensions": ["qos", "log"], "in_distributed_mode": false, "integration_bridge": "br-int", "l2_population": false, "log_agent_heartbeats": false, "ovs_capabilities": {"datapath_types": ["netdev", "system"], "iface_types": ["erspan", "geneve", "gre", "internal", "ip6erspan", "ip6gre", "lisp", "patch", "stt", "system", "tap", "vxlan"]}, "ovs_hybrid_plug": false, "resource_provider_bandwidths": {}, "resource_provider_hypervisors": {"br-ex": "lf-virtual9"}, "resource_provider_inventory_defaults": {"allocation_ratio": 1.0, "min_unit": 1, "step_size": 1, "reserved": 0}, "tunnel_types": ["gre", "vxlan"], "tunneling_ip": "172.30.13.94", "vhostuser_socket_dir": "/var/run/openvswitch"}}, {"id": "bc496462-aac8-4795-a8f9-6f5600fa0870", "agent_type": "DHCP agent", "binary": "neutron-dhcp-agent", "topic": "dhcp_agent", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:02", "started_at": "2020-10-07 12:07:02", "heartbeat_timestamp": "2020-11-06 18:20:47", "description": null, "resources_synced": null, "availability_zone": "nova", "alive": true, "configurations": {"dhcp_driver": "neutron.agent.linux.dhcp.Dnsmasq", "dhcp_lease_duration": 86400, "log_agent_heartbeats": false, "networks": 6, "ports": 12, "subnets": 7}}, {"id": "faf7e63c-a878-4cb5-b625-f96907b00d51", "agent_type": "Metadata agent", "binary": "neutron-metadata-agent", "topic": "N/A", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:06", "started_at": "2020-10-07 12:07:06", "heartbeat_timestamp": "2020-11-06 18:20:48", "description": null, "resources_synced": nu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:15.404 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:15.406 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_l3-router, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:15.407 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:15.509 39 INFO tempest.lib.common.rest_client [req-a29b124f-d3e3-43e4-87b3-a38a16116d71 ] Request (L3AgentSchedulerRbacTest:test_create_router_on_l3_agent): 200 GET http://172.30.13.94/identity/v3/projects/e1f85f88dd2e4484a865a3934154ea21/users/01a44e1952b64299aec77e9ac92ca25c/roles 0.101s 2020-11-06 18:21:15.510 39 DEBUG tempest.lib.common.rest_client [req-a29b124f-d3e3-43e4-87b3-a38a16116d71 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a29b124f-d3e3-43e4-87b3-a38a16116d71', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e1f85f88dd2e4484a865a3934154ea21/users/01a44e1952b64299aec77e9ac92ca25c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e1f85f88dd2e4484a865a3934154ea21/users/01a44e1952b64299aec77e9ac92ca25c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:15.544 39 INFO tempest.lib.common.rest_client [req-ce27fad3-ccf5-42af-a014-b91c76bca36c ] Request (L3AgentSchedulerRbacTest:test_create_router_on_l3_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:21:15.545 39 DEBUG tempest.lib.common.rest_client [req-ce27fad3-ccf5-42af-a014-b91c76bca36c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ce27fad3-ccf5-42af-a014-b91c76bca36c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "01a44e1952b64299aec77e9ac92ca25c", "name": "tempest-L3AgentSchedulerRbacTest-1481464910", "password_expires_at": null}, "audit_ids": ["t_6x9d6PQRqmtivgYs4-_g"], "expires_at": "2020-11-06T19:21:15.000000Z", "issued_at": "2020-11-06T18:21:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e1f85f88dd2e4484a865a3934154ea21", "name": "tempest-L3AgentSchedulerRbacTest-1481464910"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:15.806 39 INFO tempest.lib.common.rest_client [req-a7e3add9-c193-4f34-9ea6-90bf7785d9c4 ] Request (L3AgentSchedulerRbacTest:test_create_router_on_l3_agent): 201 POST http://172.30.13.94:9696/v2.0/agents/0efbff63-9926-4774-9bea-b5e130b9492e/l3-routers 0.260s 2020-11-06 18:21:15.806 39 DEBUG tempest.lib.common.rest_client [req-a7e3add9-c193-4f34-9ea6-90bf7785d9c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router_id": "8b06e95c-4bb1-4a27-ba44-f40ee5b2b8b1"} Response - Headers: {'content-type': 'application/json', 'content-length': '4', 'x-openstack-request-id': 'req-a7e3add9-c193-4f34-9ea6-90bf7785d9c4', 'date': 'Fri, 06 Nov 2020 18:21:15 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/agents/0efbff63-9926-4774-9bea-b5e130b9492e/l3-routers'} Body: b'null' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:15.806 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:15.853 39 INFO tempest.lib.common.rest_client [req-db43dd43-2dda-46dc-bfab-4f1ded7e3066 ] Request (L3AgentSchedulerRbacTest:test_create_router_on_l3_agent): 200 GET http://172.30.13.94/identity/v3/projects/e1f85f88dd2e4484a865a3934154ea21/users/01a44e1952b64299aec77e9ac92ca25c/roles 0.045s 2020-11-06 18:21:15.853 39 DEBUG tempest.lib.common.rest_client [req-db43dd43-2dda-46dc-bfab-4f1ded7e3066 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-db43dd43-2dda-46dc-bfab-4f1ded7e3066', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e1f85f88dd2e4484a865a3934154ea21/users/01a44e1952b64299aec77e9ac92ca25c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e1f85f88dd2e4484a865a3934154ea21/users/01a44e1952b64299aec77e9ac92ca25c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:15.893 39 INFO tempest.lib.common.rest_client [req-8c14b836-f4dc-419e-be70-3f06d7a6fa14 ] Request (L3AgentSchedulerRbacTest:test_create_router_on_l3_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:21:15.894 39 DEBUG tempest.lib.common.rest_client [req-8c14b836-f4dc-419e-be70-3f06d7a6fa14 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8c14b836-f4dc-419e-be70-3f06d7a6fa14', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "01a44e1952b64299aec77e9ac92ca25c", "name": "tempest-L3AgentSchedulerRbacTest-1481464910", "password_expires_at": null}, "audit_ids": ["TLiY7LLHT8OQJLm1B5J5dQ"], "expires_at": "2020-11-06T19:21:15.000000Z", "issued_at": "2020-11-06T18:21:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e1f85f88dd2e4484a865a3934154ea21", "name": "tempest-L3AgentSchedulerRbacTest-1481464910"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:17.226 39 INFO tempest.lib.common.rest_client [req-c8ea8d0a-bbdb-49a9-bd2e-493f7932e5e1 ] Request (L3AgentSchedulerRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/agents/0efbff63-9926-4774-9bea-b5e130b9492e/l3-routers/8b06e95c-4bb1-4a27-ba44-f40ee5b2b8b1 1.330s 2020-11-06 18:21:17.226 39 DEBUG tempest.lib.common.rest_client [req-c8ea8d0a-bbdb-49a9-bd2e-493f7932e5e1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-c8ea8d0a-bbdb-49a9-bd2e-493f7932e5e1', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:21:17 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/agents/0efbff63-9926-4774-9bea-b5e130b9492e/l3-routers/8b06e95c-4bb1-4a27-ba44-f40ee5b2b8b1'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:17.239 39 INFO tempest.lib.common.rest_client [req-70084253-4091-4aa3-93de-e3a4b3d4e452 ] Request (L3AgentSchedulerRbacTest:setUp): 200 GET http://172.30.13.94:9696/v2.0/agents 0.010s 2020-11-06 18:21:17.240 39 DEBUG tempest.lib.common.rest_client [req-70084253-4091-4aa3-93de-e3a4b3d4e452 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '4325', 'x-openstack-request-id': 'req-70084253-4091-4aa3-93de-e3a4b3d4e452', 'date': 'Fri, 06 Nov 2020 18:21:17 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/agents'} Body: b'{"agents": [{"id": "0efbff63-9926-4774-9bea-b5e130b9492e", "agent_type": "L3 agent", "binary": "neutron-l3-agent", "topic": "l3_agent", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:04", "started_at": "2020-10-07 12:07:05", "heartbeat_timestamp": "2020-11-06 18:21:03", "description": null, "resources_synced": null, "availability_zone": "nova", "alive": true, "configurations": {"agent_mode": "legacy", "ex_gw_ports": 4, "extensions": ["fip_qos", "gateway_ip_qos", "port_forwarding"], "floating_ips": 0, "handle_internal_only_routers": true, "interface_driver": "openvswitch", "interfaces": 6, "log_agent_heartbeats": false, "routers": 4}}, {"id": "538ccf2a-fb61-47ed-a10a-785f64cdbb63", "agent_type": "Open vSwitch agent", "binary": "neutron-openvswitch-agent", "topic": "N/A", "host": "lf-virtual8", "admin_state_up": true, "created_at": "2020-10-07 13:02:58", "started_at": "2020-10-07 13:03:28", "heartbeat_timestamp": "2020-11-06 18:20:57", "description": null, "resources_synced": null, "availability_zone": null, "alive": true, "configurations": {"arp_responder_enabled": false, "baremetal_smartnic": false, "bridge_mappings": {}, "datapath_type": "system", "devices": 0, "enable_distributed_routing": false, "extensions": ["qos", "log"], "in_distributed_mode": false, "integration_bridge": "br-int", "l2_population": false, "log_agent_heartbeats": false, "ovs_capabilities": {"datapath_types": ["netdev", "system"], "iface_types": ["erspan", "geneve", "gre", "internal", "ip6erspan", "ip6gre", "lisp", "patch", "stt", "system", "tap", "vxlan"]}, "ovs_hybrid_plug": false, "resource_provider_bandwidths": {}, "resource_provider_hypervisors": {}, "resource_provider_inventory_defaults": {"allocation_ratio": 1.0, "min_unit": 1, "step_size": 1, "reserved": 0}, "tunnel_types": ["vxlan"], "tunneling_ip": "172.30.13.93", "vhostuser_socket_dir": "/var/run/openvswitch"}}, {"id": "9d48116b-94de-4990-baef-e3b6765751fc", "agent_type": "Open vSwitch agent", "binary": "neutron-openvswitch-agent", "topic": "N/A", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:05", "started_at": "2020-10-07 12:07:35", "heartbeat_timestamp": "2020-11-06 18:21:02", "description": null, "resources_synced": null, "availability_zone": null, "alive": true, "configurations": {"arp_responder_enabled": false, "baremetal_smartnic": false, "bridge_mappings": {"public": "br-ex"}, "datapath_type": "system", "devices": 21, "enable_distributed_routing": false, "extensions": ["qos", "log"], "in_distributed_mode": false, "integration_bridge": "br-int", "l2_population": false, "log_agent_heartbeats": false, "ovs_capabilities": {"datapath_types": ["netdev", "system"], "iface_types": ["erspan", "geneve", "gre", "internal", "ip6erspan", "ip6gre", "lisp", "patch", "stt", "system", "tap", "vxlan"]}, "ovs_hybrid_plug": false, "resource_provider_bandwidths": {}, "resource_provider_hypervisors": {"br-ex": "lf-virtual9"}, "resource_provider_inventory_defaults": {"allocation_ratio": 1.0, "min_unit": 1, "step_size": 1, "reserved": 0}, "tunnel_types": ["gre", "vxlan"], "tunneling_ip": "172.30.13.94", "vhostuser_socket_dir": "/var/run/openvswitch"}}, {"id": "bc496462-aac8-4795-a8f9-6f5600fa0870", "agent_type": "DHCP agent", "binary": "neutron-dhcp-agent", "topic": "dhcp_agent", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:02", "started_at": "2020-10-07 12:07:02", "heartbeat_timestamp": "2020-11-06 18:20:47", "description": null, "resources_synced": null, "availability_zone": "nova", "alive": true, "configurations": {"dhcp_driver": "neutron.agent.linux.dhcp.Dnsmasq", "dhcp_lease_duration": 86400, "log_agent_heartbeats": false, "networks": 6, "ports": 12, "subnets": 7}}, {"id": "faf7e63c-a878-4cb5-b625-f96907b00d51", "agent_type": "Metadata agent", "binary": "neutron-metadata-agent", "topic": "N/A", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:06", "started_at": "2020-10-07 12:07:06", "heartbeat_timestamp": "2020-11-06 18:20:48", "description": null, "resources_synced": nu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:17.240 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:17.243 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_l3-router, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:17.376 39 INFO tempest.lib.common.rest_client [req-dfbcd8d4-8343-46bc-ac0d-93ef729e9cb4 ] Request (L3AgentSchedulerRbacTest:test_delete_router_from_l3_agent): 201 POST http://172.30.13.94:9696/v2.0/agents/0efbff63-9926-4774-9bea-b5e130b9492e/l3-routers 0.133s 2020-11-06 18:21:17.377 39 DEBUG tempest.lib.common.rest_client [req-dfbcd8d4-8343-46bc-ac0d-93ef729e9cb4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router_id": "8b06e95c-4bb1-4a27-ba44-f40ee5b2b8b1"} Response - Headers: {'content-type': 'application/json', 'content-length': '4', 'x-openstack-request-id': 'req-dfbcd8d4-8343-46bc-ac0d-93ef729e9cb4', 'date': 'Fri, 06 Nov 2020 18:21:17 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/agents/0efbff63-9926-4774-9bea-b5e130b9492e/l3-routers'} Body: b'null' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:17.377 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:17.428 39 INFO tempest.lib.common.rest_client [req-4c0dc61c-affa-45ab-8c09-be77b369a870 ] Request (L3AgentSchedulerRbacTest:test_delete_router_from_l3_agent): 200 GET http://172.30.13.94/identity/v3/projects/e1f85f88dd2e4484a865a3934154ea21/users/01a44e1952b64299aec77e9ac92ca25c/roles 0.050s 2020-11-06 18:21:17.429 39 DEBUG tempest.lib.common.rest_client [req-4c0dc61c-affa-45ab-8c09-be77b369a870 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4c0dc61c-affa-45ab-8c09-be77b369a870', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e1f85f88dd2e4484a865a3934154ea21/users/01a44e1952b64299aec77e9ac92ca25c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e1f85f88dd2e4484a865a3934154ea21/users/01a44e1952b64299aec77e9ac92ca25c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:17.464 39 INFO tempest.lib.common.rest_client [req-f95bac4a-63ce-48f1-a101-5dd16841e449 ] Request (L3AgentSchedulerRbacTest:test_delete_router_from_l3_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:21:17.464 39 DEBUG tempest.lib.common.rest_client [req-f95bac4a-63ce-48f1-a101-5dd16841e449 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f95bac4a-63ce-48f1-a101-5dd16841e449', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "01a44e1952b64299aec77e9ac92ca25c", "name": "tempest-L3AgentSchedulerRbacTest-1481464910", "password_expires_at": null}, "audit_ids": ["WyI343eoSSe2zafmrR7_QA"], "expires_at": "2020-11-06T19:21:17.000000Z", "issued_at": "2020-11-06T18:21:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e1f85f88dd2e4484a865a3934154ea21", "name": "tempest-L3AgentSchedulerRbacTest-1481464910"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:17.658 39 INFO tempest.lib.common.rest_client [req-d191104b-551b-4974-8ab4-0e4117a33b20 ] Request (L3AgentSchedulerRbacTest:test_delete_router_from_l3_agent): 204 DELETE http://172.30.13.94:9696/v2.0/agents/0efbff63-9926-4774-9bea-b5e130b9492e/l3-routers/8b06e95c-4bb1-4a27-ba44-f40ee5b2b8b1 0.193s 2020-11-06 18:21:17.659 39 DEBUG tempest.lib.common.rest_client [req-d191104b-551b-4974-8ab4-0e4117a33b20 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-d191104b-551b-4974-8ab4-0e4117a33b20', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:21:17 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/agents/0efbff63-9926-4774-9bea-b5e130b9492e/l3-routers/8b06e95c-4bb1-4a27-ba44-f40ee5b2b8b1'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:17.660 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:17.712 39 INFO tempest.lib.common.rest_client [req-8a4409b4-d7f2-4eed-a6ed-04dc869ba075 ] Request (L3AgentSchedulerRbacTest:test_delete_router_from_l3_agent): 200 GET http://172.30.13.94/identity/v3/projects/e1f85f88dd2e4484a865a3934154ea21/users/01a44e1952b64299aec77e9ac92ca25c/roles 0.051s 2020-11-06 18:21:17.712 39 DEBUG tempest.lib.common.rest_client [req-8a4409b4-d7f2-4eed-a6ed-04dc869ba075 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8a4409b4-d7f2-4eed-a6ed-04dc869ba075', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e1f85f88dd2e4484a865a3934154ea21/users/01a44e1952b64299aec77e9ac92ca25c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e1f85f88dd2e4484a865a3934154ea21/users/01a44e1952b64299aec77e9ac92ca25c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:17.746 39 INFO tempest.lib.common.rest_client [req-ba36c9aa-7c57-4a4a-a9c7-0fdd2d9c4cfc ] Request (L3AgentSchedulerRbacTest:test_delete_router_from_l3_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:21:17.746 39 DEBUG tempest.lib.common.rest_client [req-ba36c9aa-7c57-4a4a-a9c7-0fdd2d9c4cfc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ba36c9aa-7c57-4a4a-a9c7-0fdd2d9c4cfc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "01a44e1952b64299aec77e9ac92ca25c", "name": "tempest-L3AgentSchedulerRbacTest-1481464910", "password_expires_at": null}, "audit_ids": ["75fa3chLQf6bbbIrGH8ysA"], "expires_at": "2020-11-06T19:21:17.000000Z", "issued_at": "2020-11-06T18:21:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e1f85f88dd2e4484a865a3934154ea21", "name": "tempest-L3AgentSchedulerRbacTest-1481464910"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:17.951 39 INFO tempest.lib.common.rest_client [req-f8c00f0a-a590-4282-a09a-c6b092be8758 ] Request (L3AgentSchedulerRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/agents/0efbff63-9926-4774-9bea-b5e130b9492e/l3-routers/8b06e95c-4bb1-4a27-ba44-f40ee5b2b8b1 0.203s 2020-11-06 18:21:17.952 39 DEBUG tempest.lib.common.rest_client [req-f8c00f0a-a590-4282-a09a-c6b092be8758 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-f8c00f0a-a590-4282-a09a-c6b092be8758', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:21:17 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/agents/0efbff63-9926-4774-9bea-b5e130b9492e/l3-routers/8b06e95c-4bb1-4a27-ba44-f40ee5b2b8b1'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:17.968 39 INFO tempest.lib.common.rest_client [req-3a10e8e9-9332-4a53-938d-318c98b2370c ] Request (L3AgentSchedulerRbacTest:setUp): 200 GET http://172.30.13.94:9696/v2.0/agents 0.013s 2020-11-06 18:21:17.968 39 DEBUG tempest.lib.common.rest_client [req-3a10e8e9-9332-4a53-938d-318c98b2370c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '4325', 'x-openstack-request-id': 'req-3a10e8e9-9332-4a53-938d-318c98b2370c', 'date': 'Fri, 06 Nov 2020 18:21:17 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/agents'} Body: b'{"agents": [{"id": "0efbff63-9926-4774-9bea-b5e130b9492e", "agent_type": "L3 agent", "binary": "neutron-l3-agent", "topic": "l3_agent", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:04", "started_at": "2020-10-07 12:07:05", "heartbeat_timestamp": "2020-11-06 18:21:03", "description": null, "resources_synced": null, "availability_zone": "nova", "alive": true, "configurations": {"agent_mode": "legacy", "ex_gw_ports": 4, "extensions": ["fip_qos", "gateway_ip_qos", "port_forwarding"], "floating_ips": 0, "handle_internal_only_routers": true, "interface_driver": "openvswitch", "interfaces": 6, "log_agent_heartbeats": false, "routers": 4}}, {"id": "538ccf2a-fb61-47ed-a10a-785f64cdbb63", "agent_type": "Open vSwitch agent", "binary": "neutron-openvswitch-agent", "topic": "N/A", "host": "lf-virtual8", "admin_state_up": true, "created_at": "2020-10-07 13:02:58", "started_at": "2020-10-07 13:03:28", "heartbeat_timestamp": "2020-11-06 18:20:57", "description": null, "resources_synced": null, "availability_zone": null, "alive": true, "configurations": {"arp_responder_enabled": false, "baremetal_smartnic": false, "bridge_mappings": {}, "datapath_type": "system", "devices": 0, "enable_distributed_routing": false, "extensions": ["qos", "log"], "in_distributed_mode": false, "integration_bridge": "br-int", "l2_population": false, "log_agent_heartbeats": false, "ovs_capabilities": {"datapath_types": ["netdev", "system"], "iface_types": ["erspan", "geneve", "gre", "internal", "ip6erspan", "ip6gre", "lisp", "patch", "stt", "system", "tap", "vxlan"]}, "ovs_hybrid_plug": false, "resource_provider_bandwidths": {}, "resource_provider_hypervisors": {}, "resource_provider_inventory_defaults": {"allocation_ratio": 1.0, "min_unit": 1, "step_size": 1, "reserved": 0}, "tunnel_types": ["vxlan"], "tunneling_ip": "172.30.13.93", "vhostuser_socket_dir": "/var/run/openvswitch"}}, {"id": "9d48116b-94de-4990-baef-e3b6765751fc", "agent_type": "Open vSwitch agent", "binary": "neutron-openvswitch-agent", "topic": "N/A", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:05", "started_at": "2020-10-07 12:07:35", "heartbeat_timestamp": "2020-11-06 18:21:02", "description": null, "resources_synced": null, "availability_zone": null, "alive": true, "configurations": {"arp_responder_enabled": false, "baremetal_smartnic": false, "bridge_mappings": {"public": "br-ex"}, "datapath_type": "system", "devices": 21, "enable_distributed_routing": false, "extensions": ["qos", "log"], "in_distributed_mode": false, "integration_bridge": "br-int", "l2_population": false, "log_agent_heartbeats": false, "ovs_capabilities": {"datapath_types": ["netdev", "system"], "iface_types": ["erspan", "geneve", "gre", "internal", "ip6erspan", "ip6gre", "lisp", "patch", "stt", "system", "tap", "vxlan"]}, "ovs_hybrid_plug": false, "resource_provider_bandwidths": {}, "resource_provider_hypervisors": {"br-ex": "lf-virtual9"}, "resource_provider_inventory_defaults": {"allocation_ratio": 1.0, "min_unit": 1, "step_size": 1, "reserved": 0}, "tunnel_types": ["gre", "vxlan"], "tunneling_ip": "172.30.13.94", "vhostuser_socket_dir": "/var/run/openvswitch"}}, {"id": "bc496462-aac8-4795-a8f9-6f5600fa0870", "agent_type": "DHCP agent", "binary": "neutron-dhcp-agent", "topic": "dhcp_agent", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:02", "started_at": "2020-10-07 12:07:02", "heartbeat_timestamp": "2020-11-06 18:21:17", "description": null, "resources_synced": null, "availability_zone": "nova", "alive": true, "configurations": {"dhcp_driver": "neutron.agent.linux.dhcp.Dnsmasq", "dhcp_lease_duration": 86400, "log_agent_heartbeats": false, "networks": 6, "ports": 13, "subnets": 7}}, {"id": "faf7e63c-a878-4cb5-b625-f96907b00d51", "agent_type": "Metadata agent", "binary": "neutron-metadata-agent", "topic": "N/A", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:06", "started_at": "2020-10-07 12:07:06", "heartbeat_timestamp": "2020-11-06 18:21:18", "description": null, "resources_synced": nu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:17.969 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:17.973 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_l3-routers, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:17.973 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:18.024 39 INFO tempest.lib.common.rest_client [req-62554dce-a840-4481-aef3-c91b3f2d8643 ] Request (L3AgentSchedulerRbacTest:test_list_routers_on_l3_agent): 200 GET http://172.30.13.94/identity/v3/projects/e1f85f88dd2e4484a865a3934154ea21/users/01a44e1952b64299aec77e9ac92ca25c/roles 0.050s 2020-11-06 18:21:18.025 39 DEBUG tempest.lib.common.rest_client [req-62554dce-a840-4481-aef3-c91b3f2d8643 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-62554dce-a840-4481-aef3-c91b3f2d8643', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e1f85f88dd2e4484a865a3934154ea21/users/01a44e1952b64299aec77e9ac92ca25c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e1f85f88dd2e4484a865a3934154ea21/users/01a44e1952b64299aec77e9ac92ca25c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:18.060 39 INFO tempest.lib.common.rest_client [req-38244948-979a-4503-937a-a252fe83ee8b ] Request (L3AgentSchedulerRbacTest:test_list_routers_on_l3_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:21:18.061 39 DEBUG tempest.lib.common.rest_client [req-38244948-979a-4503-937a-a252fe83ee8b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-38244948-979a-4503-937a-a252fe83ee8b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "01a44e1952b64299aec77e9ac92ca25c", "name": "tempest-L3AgentSchedulerRbacTest-1481464910", "password_expires_at": null}, "audit_ids": ["zDJ99gCSSSSlGzZqbmkwGA"], "expires_at": "2020-11-06T19:21:18.000000Z", "issued_at": "2020-11-06T18:21:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e1f85f88dd2e4484a865a3934154ea21", "name": "tempest-L3AgentSchedulerRbacTest-1481464910"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:18.299 39 INFO tempest.lib.common.rest_client [req-af660f72-bc4c-436f-84a4-08c809235293 ] Request (L3AgentSchedulerRbacTest:test_list_routers_on_l3_agent): 200 GET http://172.30.13.94:9696/v2.0/agents/0efbff63-9926-4774-9bea-b5e130b9492e/l3-routers 0.237s 2020-11-06 18:21:18.300 39 DEBUG tempest.lib.common.rest_client [req-af660f72-bc4c-436f-84a4-08c809235293 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '3488', 'x-openstack-request-id': 'req-af660f72-bc4c-436f-84a4-08c809235293', 'date': 'Fri, 06 Nov 2020 18:21:18 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/agents/0efbff63-9926-4774-9bea-b5e130b9492e/l3-routers'} Body: b'{"routers": [{"id": "249a58c3-34da-4bea-9a26-3b0c27dcf452", "name": "patrole_reader-router_30048f18-b96b-4343-a720-1173982b59b8", "tenant_id": "d3e694f4541e406a85c66c35fb3f05ea", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.194"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::e3"}], "enable_snat": true}, "gw_port_id": "3edaef5c-e419-447e-88bb-172bcfd11d63", "description": "", "availability_zones": ["nova"], "distributed": false, "ha": false, "ha_vr_id": 0, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T17:57:37Z", "updated_at": "2020-11-06T17:57:43Z", "revision_number": 4, "project_id": "d3e694f4541e406a85c66c35fb3f05ea"}, {"id": "2f841dac-31c5-401e-88b6-041a9288b137", "name": "tempest-TestShelveInstance-1611038722-router", "tenant_id": "0208940a7af24b58b1e7a268234a7929", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.103"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::41"}], "enable_snat": true}, "gw_port_id": "126e8640-6d3d-4e4b-98b8-21deb5d2151d", "description": "", "availability_zones": ["nova"], "distributed": false, "ha": false, "ha_vr_id": 0, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T18:19:48Z", "updated_at": "2020-11-06T18:19:50Z", "revision_number": 4, "project_id": "0208940a7af24b58b1e7a268234a7929"}, {"id": "e3a02d84-f3d9-469d-add3-0a9477fc5c05", "name": "router1", "tenant_id": "76550dbb2e094ea8b53f0ef35fc93342", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.11"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::1"}], "enable_snat": true}, "gw_port_id": "ce7ec8e4-1edb-423b-9a3f-c65f1f77c32f", "description": "", "availability_zones": ["nova"], "distributed": false, "ha": false, "ha_vr_id": 0, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-10-07T12:07:32Z", "updated_at": "2020-10-07T12:14:51Z", "revision_number": 7, "project_id": "76550dbb2e094ea8b53f0ef35fc93342"}, {"id": "f02a728f-d7e0-45f4-9440-f0f5f0980cf4", "name": "tempest_slow-router_75eb3fa1-c659-4fc1-9b83-f5e47a8278c9", "tenant_id": "e7088ec73f6b4578b95bcadd160c0995", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.147"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::ce"}], "enable_snat": true}, "gw_port_id": "b3628a9f-8c7f-46e4-92b8-42a3c932d106", "description": "", "availability_zones": ["nova"], "distributed": false, "ha": false, "ha_vr_id": 0, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T17:28:50Z", "updated_at": "2020-11-06T17:28:52Z", "revision_number": 4, "project_id": "e7088ec73f6b4578b95bcadd160c0995"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:18.301 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:18.355 39 INFO tempest.lib.common.rest_client [req-b9d83dc7-0a8b-402b-b118-3d212bc94d60 ] Request (L3AgentSchedulerRbacTest:test_list_routers_on_l3_agent): 200 GET http://172.30.13.94/identity/v3/projects/e1f85f88dd2e4484a865a3934154ea21/users/01a44e1952b64299aec77e9ac92ca25c/roles 0.054s 2020-11-06 18:21:18.356 39 DEBUG tempest.lib.common.rest_client [req-b9d83dc7-0a8b-402b-b118-3d212bc94d60 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b9d83dc7-0a8b-402b-b118-3d212bc94d60', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e1f85f88dd2e4484a865a3934154ea21/users/01a44e1952b64299aec77e9ac92ca25c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e1f85f88dd2e4484a865a3934154ea21/users/01a44e1952b64299aec77e9ac92ca25c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:18.395 39 INFO tempest.lib.common.rest_client [req-92fda787-5f86-4e00-a107-65283b2614ac ] Request (L3AgentSchedulerRbacTest:test_list_routers_on_l3_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:21:18.396 39 DEBUG tempest.lib.common.rest_client [req-92fda787-5f86-4e00-a107-65283b2614ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-92fda787-5f86-4e00-a107-65283b2614ac', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "01a44e1952b64299aec77e9ac92ca25c", "name": "tempest-L3AgentSchedulerRbacTest-1481464910", "password_expires_at": null}, "audit_ids": ["aa287E1YRA6CFW9REVQbLg"], "expires_at": "2020-11-06T19:21:18.000000Z", "issued_at": "2020-11-06T18:21:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e1f85f88dd2e4484a865a3934154ea21", "name": "tempest-L3AgentSchedulerRbacTest-1481464910"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e1f85f88dd2e4484a865a3934154ea21", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:18.525 39 INFO tempest.lib.common.rest_client [req-62ac1664-b223-47aa-984f-001d2c7e0f04 ] Request (L3AgentSchedulerRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/ports?device_id=8b06e95c-4bb1-4a27-ba44-f40ee5b2b8b1 0.125s 2020-11-06 18:21:18.526 39 DEBUG tempest.lib.common.rest_client [req-62ac1664-b223-47aa-984f-001d2c7e0f04 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '12', 'x-openstack-request-id': 'req-62ac1664-b223-47aa-984f-001d2c7e0f04', 'date': 'Fri, 06 Nov 2020 18:21:18 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports?device_id=8b06e95c-4bb1-4a27-ba44-f40ee5b2b8b1'} Body: b'{"ports":[]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:18.968 39 INFO tempest.lib.common.rest_client [req-dda27082-0c08-4a10-ba74-99ab35e0dd4c ] Request (L3AgentSchedulerRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/8b06e95c-4bb1-4a27-ba44-f40ee5b2b8b1 0.441s 2020-11-06 18:21:18.968 39 DEBUG tempest.lib.common.rest_client [req-dda27082-0c08-4a10-ba74-99ab35e0dd4c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-dda27082-0c08-4a10-ba74-99ab35e0dd4c', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:21:18 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/8b06e95c-4bb1-4a27-ba44-f40ee5b2b8b1'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:19.086 39 INFO tempest.lib.common.rest_client [req-a9f7e57f-3a1c-4675-b84e-b6ae53d3a2e4 ] Request (L3AgentSchedulerRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/01a44e1952b64299aec77e9ac92ca25c 0.116s 2020-11-06 18:21:19.086 39 DEBUG tempest.lib.common.rest_client [req-a9f7e57f-3a1c-4675-b84e-b6ae53d3a2e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a9f7e57f-3a1c-4675-b84e-b6ae53d3a2e4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/01a44e1952b64299aec77e9ac92ca25c'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:19.189 39 INFO tempest.lib.common.rest_client [req-d0f13aee-f378-4c81-805c-30f8403dbfbe ] Request (L3AgentSchedulerRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.101s 2020-11-06 18:21:19.189 39 DEBUG tempest.lib.common.rest_client [req-d0f13aee-f378-4c81-805c-30f8403dbfbe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d0f13aee-f378-4c81-805c-30f8403dbfbe', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["zWyC3pqoS8CLtg_sfEpvIA"], "expires_at": "2020-11-06T19:21:19.000000Z", "issued_at": "2020-11-06T18:21:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:19.439 39 INFO tempest.lib.common.rest_client [req-ca709649-4142-483b-ada4-c89072f2a961 ] Request (L3AgentSchedulerRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=e1f85f88dd2e4484a865a3934154ea21&name=default 0.249s 2020-11-06 18:21:19.440 39 DEBUG tempest.lib.common.rest_client [req-ca709649-4142-483b-ada4-c89072f2a961 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-ca709649-4142-483b-ada4-c89072f2a961', 'date': 'Fri, 06 Nov 2020 18:21:19 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=e1f85f88dd2e4484a865a3934154ea21&name=default'} Body: b'{"security_groups": [{"id": "67fcd40c-8194-494f-a7f0-6dca1ffdfd76", "name": "default", "stateful": true, "tenant_id": "e1f85f88dd2e4484a865a3934154ea21", "description": "Default security group", "security_group_rules": [{"id": "053f194c-6ddc-476d-bd5d-03da321ea200", "tenant_id": "e1f85f88dd2e4484a865a3934154ea21", "security_group_id": "67fcd40c-8194-494f-a7f0-6dca1ffdfd76", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:21:19Z", "updated_at": "2020-11-06T18:21:19Z", "revision_number": 0, "project_id": "e1f85f88dd2e4484a865a3934154ea21"}, {"id": "09280552-34e5-43bb-8c65-154cf9827f7c", "tenant_id": "e1f85f88dd2e4484a865a3934154ea21", "security_group_id": "67fcd40c-8194-494f-a7f0-6dca1ffdfd76", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "67fcd40c-8194-494f-a7f0-6dca1ffdfd76", "description": null, "tags": [], "created_at": "2020-11-06T18:21:19Z", "updated_at": "2020-11-06T18:21:19Z", "revision_number": 0, "project_id": "e1f85f88dd2e4484a865a3934154ea21"}, {"id": "9ddf3e0b-fd5e-43c1-bfc8-b0078a65a4c4", "tenant_id": "e1f85f88dd2e4484a865a3934154ea21", "security_group_id": "67fcd40c-8194-494f-a7f0-6dca1ffdfd76", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "67fcd40c-8194-494f-a7f0-6dca1ffdfd76", "description": null, "tags": [], "created_at": "2020-11-06T18:21:19Z", "updated_at": "2020-11-06T18:21:19Z", "revision_number": 0, "project_id": "e1f85f88dd2e4484a865a3934154ea21"}, {"id": "c83934b0-b474-4aac-9045-7db928b5860c", "tenant_id": "e1f85f88dd2e4484a865a3934154ea21", "security_group_id": "67fcd40c-8194-494f-a7f0-6dca1ffdfd76", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:21:19Z", "updated_at": "2020-11-06T18:21:19Z", "revision_number": 0, "project_id": "e1f85f88dd2e4484a865a3934154ea21"}], "tags": [], "created_at": "2020-11-06T18:21:19Z", "updated_at": "2020-11-06T18:21:19Z", "revision_number": 1, "project_id": "e1f85f88dd2e4484a865a3934154ea21"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:19.544 39 INFO tempest.lib.common.rest_client [req-8cde03ef-6f1c-4b26-b9f2-8acb20610acb ] Request (L3AgentSchedulerRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/67fcd40c-8194-494f-a7f0-6dca1ffdfd76 0.103s 2020-11-06 18:21:19.544 39 DEBUG tempest.lib.common.rest_client [req-8cde03ef-6f1c-4b26-b9f2-8acb20610acb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-8cde03ef-6f1c-4b26-b9f2-8acb20610acb', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:21:19 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/67fcd40c-8194-494f-a7f0-6dca1ffdfd76'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:19.673 39 INFO tempest.lib.common.rest_client [req-238adf16-346a-4d70-96c8-564eb4291f67 ] Request (L3AgentSchedulerRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/e1f85f88dd2e4484a865a3934154ea21 0.127s 2020-11-06 18:21:19.673 39 DEBUG tempest.lib.common.rest_client [req-238adf16-346a-4d70-96c8-564eb4291f67 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-238adf16-346a-4d70-96c8-564eb4291f67', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e1f85f88dd2e4484a865a3934154ea21'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:19.766 39 INFO tempest.lib.common.rest_client [req-dd45741a-c14e-4b69-871f-69c25acc32de ] Request (NetworkIpAvailabilityExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-11-06 18:21:19.766 39 DEBUG tempest.lib.common.rest_client [req-dd45741a-c14e-4b69-871f-69c25acc32de ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dd45741a-c14e-4b69-871f-69c25acc32de', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["AKJVvDwGTySYeMtMI3LuRQ"], "expires_at": "2020-11-06T19:21:19.000000Z", "issued_at": "2020-11-06T18:21:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:19.806 39 INFO tempest.lib.common.rest_client [req-5c5ebb61-5ee3-4b07-ae7b-d5db6f24fa43 ] Request (NetworkIpAvailabilityExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:21:19.807 39 DEBUG tempest.lib.common.rest_client [req-5c5ebb61-5ee3-4b07-ae7b-d5db6f24fa43 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5c5ebb61-5ee3-4b07-ae7b-d5db6f24fa43', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["Vm0dZDgdSTuEhmfeiT3Nvg"], "expires_at": "2020-11-06T19:21:19.000000Z", "issued_at": "2020-11-06T18:21:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:19.866 39 INFO tempest.lib.common.rest_client [req-d3126a02-0303-441a-b102-c3510d8c0ce3 ] Request (NetworkIpAvailabilityExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.058s 2020-11-06 18:21:19.866 39 DEBUG tempest.lib.common.rest_client [req-d3126a02-0303-441a-b102-c3510d8c0ce3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d3126a02-0303-441a-b102-c3510d8c0ce3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:19.964 39 INFO tempest.lib.common.rest_client [req-3cc25ff6-6a95-4b0a-b35c-ed46498b8aa6 ] Request (NetworkIpAvailabilityExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.097s 2020-11-06 18:21:19.965 39 DEBUG tempest.lib.common.rest_client [req-3cc25ff6-6a95-4b0a-b35c-ed46498b8aa6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-NetworkIpAvailabilityExtRbacTest-1439261179-desc", "domain_id": "default", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1439261179"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '402', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3cc25ff6-6a95-4b0a-b35c-ed46498b8aa6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "d478cea84cb6433cba51cdcea5ec91bb", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1439261179", "domain_id": "default", "description": "tempest-NetworkIpAvailabilityExtRbacTest-1439261179-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/d478cea84cb6433cba51cdcea5ec91bb"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:20.077 39 INFO tempest.lib.common.rest_client [req-a3251ca5-44ae-47b5-b864-cc1e7af43d66 ] Request (NetworkIpAvailabilityExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.111s 2020-11-06 18:21:20.078 39 DEBUG tempest.lib.common.rest_client [req-a3251ca5-44ae-47b5-b864-cc1e7af43d66 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-NetworkIpAvailabilityExtRbacTest-1439261179", "password": "E8@%6t2YA!bVTy=", "project_id": "d478cea84cb6433cba51cdcea5ec91bb", "email": "tempest-NetworkIpAvailabilityExtRbacTest-867121868@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '419', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a3251ca5-44ae-47b5-b864-cc1e7af43d66', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "d478cea84cb6433cba51cdcea5ec91bb", "email": "tempest-NetworkIpAvailabilityExtRbacTest-867121868@example.com", "id": "8c014738de024bdca2639fdee4da0d07", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1439261179", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/8c014738de024bdca2639fdee4da0d07"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:20.137 39 INFO tempest.lib.common.rest_client [req-43fa0f52-02cd-4b30-b33f-72b1d26b0710 ] Request (NetworkIpAvailabilityExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.058s 2020-11-06 18:21:20.137 39 DEBUG tempest.lib.common.rest_client [req-43fa0f52-02cd-4b30-b33f-72b1d26b0710 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-43fa0f52-02cd-4b30-b33f-72b1d26b0710', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:20.191 39 INFO tempest.lib.common.rest_client [req-7fed200e-c4b1-46bc-b147-f3b5e8bfa54f ] Request (NetworkIpAvailabilityExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.052s 2020-11-06 18:21:20.192 39 DEBUG tempest.lib.common.rest_client [req-7fed200e-c4b1-46bc-b147-f3b5e8bfa54f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7fed200e-c4b1-46bc-b147-f3b5e8bfa54f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:20.257 39 INFO tempest.lib.common.rest_client [req-adf0f8d5-3d19-42f2-ba95-0886f133c782 ] Request (NetworkIpAvailabilityExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/d478cea84cb6433cba51cdcea5ec91bb/users/8c014738de024bdca2639fdee4da0d07/roles/72a4576c553448cd941b052c1ca0cf2d 0.064s 2020-11-06 18:21:20.257 39 DEBUG tempest.lib.common.rest_client [req-adf0f8d5-3d19-42f2-ba95-0886f133c782 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-adf0f8d5-3d19-42f2-ba95-0886f133c782', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d478cea84cb6433cba51cdcea5ec91bb/users/8c014738de024bdca2639fdee4da0d07/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:20.258 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-NetworkIpAvailabilityExtRbacTest-1439261179', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'd478cea84cb6433cba51cdcea5ec91bb', 'project_name': 'tempest-NetworkIpAvailabilityExtRbacTest-1439261179', 'tenant_id': 'd478cea84cb6433cba51cdcea5ec91bb', 'tenant_name': 'tempest-NetworkIpAvailabilityExtRbacTest-1439261179', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '8c014738de024bdca2639fdee4da0d07'}, Network: None, Subnet: None, Router: None 2020-11-06 18:21:20.258 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-NetworkIpAvailabilityExtRbacTest-1439261179', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'd478cea84cb6433cba51cdcea5ec91bb', 'project_name': 'tempest-NetworkIpAvailabilityExtRbacTest-1439261179', 'tenant_id': 'd478cea84cb6433cba51cdcea5ec91bb', 'tenant_name': 'tempest-NetworkIpAvailabilityExtRbacTest-1439261179', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '8c014738de024bdca2639fdee4da0d07'}, Network: None, Subnet: None, Router: None 2020-11-06 18:21:20.375 39 INFO tempest.lib.common.rest_client [req-479be0e7-b901-4850-a6d0-cbab9c996c4c ] Request (NetworkIpAvailabilityExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.106s 2020-11-06 18:21:20.375 39 DEBUG tempest.lib.common.rest_client [req-479be0e7-b901-4850-a6d0-cbab9c996c4c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6595', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-479be0e7-b901-4850-a6d0-cbab9c996c4c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8c014738de024bdca2639fdee4da0d07", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1439261179", "password_expires_at": null}, "audit_ids": ["Z_7bGMd6SaGaYw7Ox0mfgw"], "expires_at": "2020-11-06T19:21:20.000000Z", "issued_at": "2020-11-06T18:21:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d478cea84cb6433cba51cdcea5ec91bb", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1439261179"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "Region _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:20.376 39 WARNING tempest.manager [-] tempest.manager.Manager is not a stable interface and as such it should not be imported directly. It will be removed as soon as the client manager becomes available in tempest.lib. 2020-11-06 18:21:20.474 39 INFO tempest.lib.common.rest_client [req-8a2ca8d3-b0dd-4ec3-8e7f-b735e4a20e17 ] Request (NetworkIpAvailabilityExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-11-06 18:21:20.475 39 DEBUG tempest.lib.common.rest_client [req-8a2ca8d3-b0dd-4ec3-8e7f-b735e4a20e17 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8a2ca8d3-b0dd-4ec3-8e7f-b735e4a20e17', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["VXNxh5YLQliDGdXrKJegTw"], "expires_at": "2020-11-06T19:21:20.000000Z", "issued_at": "2020-11-06T18:21:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:20.521 39 INFO tempest.lib.common.rest_client [req-c22059f8-beae-46ac-996f-a01b21ba087f ] Request (NetworkIpAvailabilityExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:21:20.521 39 DEBUG tempest.lib.common.rest_client [req-c22059f8-beae-46ac-996f-a01b21ba087f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c22059f8-beae-46ac-996f-a01b21ba087f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["IMPXBRbPTrupoBjnVJ--jA"], "expires_at": "2020-11-06T19:21:20.000000Z", "issued_at": "2020-11-06T18:21:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:20.573 39 INFO tempest.lib.common.rest_client [req-ceb8cd62-fbad-4561-9a0b-d66860800c14 ] Request (NetworkIpAvailabilityExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.051s 2020-11-06 18:21:20.574 39 DEBUG tempest.lib.common.rest_client [req-ceb8cd62-fbad-4561-9a0b-d66860800c14 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ceb8cd62-fbad-4561-9a0b-d66860800c14', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:20.626 39 INFO tempest.lib.common.rest_client [req-3be2e8f4-bbe2-4754-9bcb-d521d29c66ac ] Request (NetworkIpAvailabilityExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.051s 2020-11-06 18:21:20.626 39 DEBUG tempest.lib.common.rest_client [req-3be2e8f4-bbe2-4754-9bcb-d521d29c66ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3be2e8f4-bbe2-4754-9bcb-d521d29c66ac', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:20.626 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:21:20.627 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:20.673 39 INFO tempest.lib.common.rest_client [req-b00c7dc1-c789-4f59-8b37-55f463dabdc4 ] Request (NetworkIpAvailabilityExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/d478cea84cb6433cba51cdcea5ec91bb/users/8c014738de024bdca2639fdee4da0d07/roles 0.045s 2020-11-06 18:21:20.673 39 DEBUG tempest.lib.common.rest_client [req-b00c7dc1-c789-4f59-8b37-55f463dabdc4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b00c7dc1-c789-4f59-8b37-55f463dabdc4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d478cea84cb6433cba51cdcea5ec91bb/users/8c014738de024bdca2639fdee4da0d07/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d478cea84cb6433cba51cdcea5ec91bb/users/8c014738de024bdca2639fdee4da0d07/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:20.723 39 INFO tempest.lib.common.rest_client [req-ec5557fc-e0d2-48ed-9e04-fb18fb5bc53a ] Request (NetworkIpAvailabilityExtRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/d478cea84cb6433cba51cdcea5ec91bb/users/8c014738de024bdca2639fdee4da0d07/roles/72a4576c553448cd941b052c1ca0cf2d 0.049s 2020-11-06 18:21:20.723 39 DEBUG tempest.lib.common.rest_client [req-ec5557fc-e0d2-48ed-9e04-fb18fb5bc53a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ec5557fc-e0d2-48ed-9e04-fb18fb5bc53a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d478cea84cb6433cba51cdcea5ec91bb/users/8c014738de024bdca2639fdee4da0d07/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:20.824 39 INFO tempest.lib.common.rest_client [req-ffab9994-188b-462e-9f1b-138f09a1a4e5 ] Request (NetworkIpAvailabilityExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/d478cea84cb6433cba51cdcea5ec91bb/users/8c014738de024bdca2639fdee4da0d07/roles/a629c95d64b3416fb80ae90af4f69c05 0.100s 2020-11-06 18:21:20.825 39 DEBUG tempest.lib.common.rest_client [req-ffab9994-188b-462e-9f1b-138f09a1a4e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ffab9994-188b-462e-9f1b-138f09a1a4e5', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d478cea84cb6433cba51cdcea5ec91bb/users/8c014738de024bdca2639fdee4da0d07/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:21.928 39 INFO tempest.lib.common.rest_client [req-dc88c82b-8459-4825-ba52-1b09af0e36b4 ] Request (NetworkIpAvailabilityExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.101s 2020-11-06 18:21:21.929 39 DEBUG tempest.lib.common.rest_client [req-dc88c82b-8459-4825-ba52-1b09af0e36b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dc88c82b-8459-4825-ba52-1b09af0e36b4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8c014738de024bdca2639fdee4da0d07", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1439261179", "password_expires_at": null}, "audit_ids": ["4HgOYKEVQpmC7TCmKjA4ng"], "expires_at": "2020-11-06T19:21:21.000000Z", "issued_at": "2020-11-06T18:21:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d478cea84cb6433cba51cdcea5ec91bb", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1439261179"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:21.966 39 INFO tempest.lib.common.rest_client [req-4f0997b3-cbec-4437-9eca-589cd577f147 ] Request (NetworkIpAvailabilityExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:21:21.967 39 DEBUG tempest.lib.common.rest_client [req-4f0997b3-cbec-4437-9eca-589cd577f147 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4f0997b3-cbec-4437-9eca-589cd577f147', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8c014738de024bdca2639fdee4da0d07", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1439261179", "password_expires_at": null}, "audit_ids": ["oqZLuX8OSr6MZgOAOy2sYA"], "expires_at": "2020-11-06T19:21:21.000000Z", "issued_at": "2020-11-06T18:21:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d478cea84cb6433cba51cdcea5ec91bb", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1439261179"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:21.968 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:21.971 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network_ip_availability, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:22.172 39 INFO tempest.lib.common.rest_client [req-abe29b6c-b709-4f67-b09c-ff082a273b60 ] Request (NetworkIpAvailabilityExtRbacTest:test_get_network_ip_availabilities): 200 GET http://172.30.13.94:9696/v2.0/network-ip-availabilities 0.201s 2020-11-06 18:21:22.173 39 DEBUG tempest.lib.common.rest_client [req-abe29b6c-b709-4f67-b09c-ff082a273b60 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '26178', 'x-openstack-request-id': 'req-abe29b6c-b709-4f67-b09c-ff082a273b60', 'date': 'Fri, 06 Nov 2020 18:21:22 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/network-ip-availabilities'} Body: b'{"network_ip_availabilities": [{"network_id": "075e5ee8-b0b4-4574-81a3-c3210ea79d71", "network_name": "tempest-MultipleCreateTestJSON-683767456-network", "tenant_id": "e8d23ff83aff43a6830320c63bdbdbd8", "project_id": "e8d23ff83aff43a6830320c63bdbdbd8", "subnet_ip_availability": [{"subnet_id": "066b37a3-1660-4b06-bef8-73963e0a421c", "ip_version": 4, "cidr": "192.168.120.0/28", "subnet_name": "tempest-MultipleCreateTestJSON-683767456-subnet", "used_ips": 0, "total_ips": 13}], "used_ips": 0, "total_ips": 13}, {"network_id": "13682051-c16d-4418-88ee-1a180a4cfc15", "network_name": "tempest-MultipleCreateTestJSON-1346316559-network", "tenant_id": "70c2f48fcaf343ceb2657220e064d31c", "project_id": "70c2f48fcaf343ceb2657220e064d31c", "subnet_ip_availability": [{"subnet_id": "d9e144c5-9735-4711-b3a1-0d367753c7f6", "ip_version": 4, "cidr": "192.168.120.0/28", "subnet_name": "tempest-MultipleCreateTestJSON-1346316559-subnet", "used_ips": 0, "total_ips": 13}], "used_ips": 0, "total_ips": 13}, {"network_id": "13969b3e-1458-4017-97b3-6dc65a2e1f8c", "network_name": "tempest-MultipleCreateTestJSON-80353040-network", "tenant_id": "143eaf18da0d441fb68df29b15aea9c4", "project_id": "143eaf18da0d441fb68df29b15aea9c4", "subnet_ip_availability": [{"subnet_id": "68cade25-ac24-411c-bbea-7ccfd23b16b3", "ip_version": 4, "cidr": "192.168.120.0/28", "subnet_name": "tempest-MultipleCreateTestJSON-80353040-subnet", "used_ips": 0, "total_ips": 13}], "used_ips": 0, "total_ips": 13}, {"network_id": "17d7963c-2bb9-4b6c-aa1a-40527525c1b8", "network_name": "tempest-MultipleCreateTestJSON-1331327385-network", "tenant_id": "5062fdae248541b4b2745b81a243b3ac", "project_id": "5062fdae248541b4b2745b81a243b3ac", "subnet_ip_availability": [{"subnet_id": "dd45b7d9-27bb-43cd-94c7-f0d86d72311d", "ip_version": 4, "cidr": "192.168.120.0/28", "subnet_name": "tempest-MultipleCreateTestJSON-1331327385-subnet", "used_ips": 0, "total_ips": 13}], "used_ips": 0, "total_ips": 13}, {"network_id": "18dbc555-0e96-45ce-8987-97b5369034e0", "network_name": "tempest-TestShelveInstance-1611038722-network", "tenant_id": "0208940a7af24b58b1e7a268234a7929", "project_id": "0208940a7af24b58b1e7a268234a7929", "subnet_ip_availability": [{"subnet_id": "088c116b-d304-46a4-b863-ec56344d4582", "ip_version": 4, "cidr": "192.168.120.0/28", "subnet_name": "tempest-TestShelveInstance-1611038722-subnet", "used_ips": 3, "total_ips": 13}], "used_ips": 3, "total_ips": 13}, {"network_id": "1c02029e-3385-4b0f-8ea8-64f5a5e9c878", "network_name": "private", "tenant_id": "76550dbb2e094ea8b53f0ef35fc93342", "project_id": "76550dbb2e094ea8b53f0ef35fc93342", "subnet_ip_availability": [{"subnet_id": "026ed5dd-3740-4409-bbff-427502b63344", "ip_version": 4, "cidr": "10.0.0.0/26", "subnet_name": "private-subnet", "used_ips": 2, "total_ips": 61}, {"subnet_id": "91f28f82-50f3-4858-baa0-c00af5a09fba", "ip_version": 6, "cidr": "fd45:7793:ed2b::/64", "subnet_name": "ipv6-private-subnet", "used_ips": 2, "total_ips": 18446744073709551614}], "used_ips": 4, "total_ips": 18446744073709551675}, {"network_id": "222829bb-98bb-422e-b261-d0093bb5b311", "network_name": "tempest-MultipleCreateTestJSON-123723835-network", "tenant_id": "aead565dbd2742e89c574d7414f7fdb9", "project_id": "aead565dbd2742e89c574d7414f7fdb9", "subnet_ip_availability": [{"subnet_id": "a059b135-3ec8-44e4-939f-20e49a8757f1", "ip_version": 4, "cidr": "192.168.120.0/28", "subnet_name": "tempest-MultipleCreateTestJSON-123723835-subnet", "used_ips": 0, "total_ips": 13}], "used_ips": 0, "total_ips": 13}, {"network_id": "301fd395-f2ad-446c-989a-a47eb4819d56", "network_name": "tempest-MultipleCreateTestJSON-1770149323-network", "tenant_id": "35a7a01cc29046a8a9a3737b0562ad90", "project_id": "35a7a01cc29046a8a9a3737b0562ad90", "subnet_ip_availability": [{"subnet_id": "f0c947e3-b377-40e4-b2c9-105ec74c006d", "ip_version": 4, "cidr": "192.168.120.0/28", "subnet_name": "tempest-MultipleCreateTestJSON-1770149323-subnet", "used_ips": 0, "total_ips": 13}], "used_ips": 0, "total_ips": 13}, {"network_id": "31821d36-8870-4e30-ba78-9e7355084c74", "network_name": "tempest-Multipl _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:22.175 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:22.287 39 INFO tempest.lib.common.rest_client [req-dc3dc33a-2212-45f5-bcd3-16b1df79c1cf ] Request (NetworkIpAvailabilityExtRbacTest:test_get_network_ip_availabilities): 200 GET http://172.30.13.94/identity/v3/projects/d478cea84cb6433cba51cdcea5ec91bb/users/8c014738de024bdca2639fdee4da0d07/roles 0.111s 2020-11-06 18:21:22.288 39 DEBUG tempest.lib.common.rest_client [req-dc3dc33a-2212-45f5-bcd3-16b1df79c1cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dc3dc33a-2212-45f5-bcd3-16b1df79c1cf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d478cea84cb6433cba51cdcea5ec91bb/users/8c014738de024bdca2639fdee4da0d07/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d478cea84cb6433cba51cdcea5ec91bb/users/8c014738de024bdca2639fdee4da0d07/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:22.326 39 INFO tempest.lib.common.rest_client [req-83464910-5209-444f-a59e-271f06d1b7a7 ] Request (NetworkIpAvailabilityExtRbacTest:test_get_network_ip_availabilities): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:21:22.326 39 DEBUG tempest.lib.common.rest_client [req-83464910-5209-444f-a59e-271f06d1b7a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-83464910-5209-444f-a59e-271f06d1b7a7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8c014738de024bdca2639fdee4da0d07", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1439261179", "password_expires_at": null}, "audit_ids": ["l_5x7NwaR4irU0ymG6bMuw"], "expires_at": "2020-11-06T19:21:22.000000Z", "issued_at": "2020-11-06T18:21:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d478cea84cb6433cba51cdcea5ec91bb", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1439261179"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:22.365 39 INFO tempest.lib.common.rest_client [req-4b16b37a-7644-4e21-a73a-46fc20b7e3dd ] Request (NetworkIpAvailabilityExtRbacTest:test_get_network_ip_availabilities): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:21:22.365 39 DEBUG tempest.lib.common.rest_client [req-4b16b37a-7644-4e21-a73a-46fc20b7e3dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4b16b37a-7644-4e21-a73a-46fc20b7e3dd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8c014738de024bdca2639fdee4da0d07", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1439261179", "password_expires_at": null}, "audit_ids": ["DYgsPPk4QZautMHYYJciCg"], "expires_at": "2020-11-06T19:21:22.000000Z", "issued_at": "2020-11-06T18:21:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d478cea84cb6433cba51cdcea5ec91bb", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1439261179"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:22.467 39 INFO tempest.lib.common.rest_client [req-02950de2-c37c-4c4d-b3fb-32b151db047b ] Request (NetworkIpAvailabilityExtRbacTest:test_get_network_ip_availabilities): 200 GET http://172.30.13.94:9696/v2.0/network-ip-availabilities 0.100s 2020-11-06 18:21:22.468 39 DEBUG tempest.lib.common.rest_client [req-02950de2-c37c-4c4d-b3fb-32b151db047b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '26178', 'x-openstack-request-id': 'req-02950de2-c37c-4c4d-b3fb-32b151db047b', 'date': 'Fri, 06 Nov 2020 18:21:22 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/network-ip-availabilities'} Body: b'{"network_ip_availabilities": [{"network_id": "075e5ee8-b0b4-4574-81a3-c3210ea79d71", "network_name": "tempest-MultipleCreateTestJSON-683767456-network", "tenant_id": "e8d23ff83aff43a6830320c63bdbdbd8", "project_id": "e8d23ff83aff43a6830320c63bdbdbd8", "subnet_ip_availability": [{"subnet_id": "066b37a3-1660-4b06-bef8-73963e0a421c", "ip_version": 4, "cidr": "192.168.120.0/28", "subnet_name": "tempest-MultipleCreateTestJSON-683767456-subnet", "used_ips": 0, "total_ips": 13}], "used_ips": 0, "total_ips": 13}, {"network_id": "13682051-c16d-4418-88ee-1a180a4cfc15", "network_name": "tempest-MultipleCreateTestJSON-1346316559-network", "tenant_id": "70c2f48fcaf343ceb2657220e064d31c", "project_id": "70c2f48fcaf343ceb2657220e064d31c", "subnet_ip_availability": [{"subnet_id": "d9e144c5-9735-4711-b3a1-0d367753c7f6", "ip_version": 4, "cidr": "192.168.120.0/28", "subnet_name": "tempest-MultipleCreateTestJSON-1346316559-subnet", "used_ips": 0, "total_ips": 13}], "used_ips": 0, "total_ips": 13}, {"network_id": "13969b3e-1458-4017-97b3-6dc65a2e1f8c", "network_name": "tempest-MultipleCreateTestJSON-80353040-network", "tenant_id": "143eaf18da0d441fb68df29b15aea9c4", "project_id": "143eaf18da0d441fb68df29b15aea9c4", "subnet_ip_availability": [{"subnet_id": "68cade25-ac24-411c-bbea-7ccfd23b16b3", "ip_version": 4, "cidr": "192.168.120.0/28", "subnet_name": "tempest-MultipleCreateTestJSON-80353040-subnet", "used_ips": 0, "total_ips": 13}], "used_ips": 0, "total_ips": 13}, {"network_id": "17d7963c-2bb9-4b6c-aa1a-40527525c1b8", "network_name": "tempest-MultipleCreateTestJSON-1331327385-network", "tenant_id": "5062fdae248541b4b2745b81a243b3ac", "project_id": "5062fdae248541b4b2745b81a243b3ac", "subnet_ip_availability": [{"subnet_id": "dd45b7d9-27bb-43cd-94c7-f0d86d72311d", "ip_version": 4, "cidr": "192.168.120.0/28", "subnet_name": "tempest-MultipleCreateTestJSON-1331327385-subnet", "used_ips": 0, "total_ips": 13}], "used_ips": 0, "total_ips": 13}, {"network_id": "18dbc555-0e96-45ce-8987-97b5369034e0", "network_name": "tempest-TestShelveInstance-1611038722-network", "tenant_id": "0208940a7af24b58b1e7a268234a7929", "project_id": "0208940a7af24b58b1e7a268234a7929", "subnet_ip_availability": [{"subnet_id": "088c116b-d304-46a4-b863-ec56344d4582", "ip_version": 4, "cidr": "192.168.120.0/28", "subnet_name": "tempest-TestShelveInstance-1611038722-subnet", "used_ips": 3, "total_ips": 13}], "used_ips": 3, "total_ips": 13}, {"network_id": "1c02029e-3385-4b0f-8ea8-64f5a5e9c878", "network_name": "private", "tenant_id": "76550dbb2e094ea8b53f0ef35fc93342", "project_id": "76550dbb2e094ea8b53f0ef35fc93342", "subnet_ip_availability": [{"subnet_id": "026ed5dd-3740-4409-bbff-427502b63344", "ip_version": 4, "cidr": "10.0.0.0/26", "subnet_name": "private-subnet", "used_ips": 2, "total_ips": 61}, {"subnet_id": "91f28f82-50f3-4858-baa0-c00af5a09fba", "ip_version": 6, "cidr": "fd45:7793:ed2b::/64", "subnet_name": "ipv6-private-subnet", "used_ips": 2, "total_ips": 18446744073709551614}], "used_ips": 4, "total_ips": 18446744073709551675}, {"network_id": "222829bb-98bb-422e-b261-d0093bb5b311", "network_name": "tempest-MultipleCreateTestJSON-123723835-network", "tenant_id": "aead565dbd2742e89c574d7414f7fdb9", "project_id": "aead565dbd2742e89c574d7414f7fdb9", "subnet_ip_availability": [{"subnet_id": "a059b135-3ec8-44e4-939f-20e49a8757f1", "ip_version": 4, "cidr": "192.168.120.0/28", "subnet_name": "tempest-MultipleCreateTestJSON-123723835-subnet", "used_ips": 0, "total_ips": 13}], "used_ips": 0, "total_ips": 13}, {"network_id": "301fd395-f2ad-446c-989a-a47eb4819d56", "network_name": "tempest-MultipleCreateTestJSON-1770149323-network", "tenant_id": "35a7a01cc29046a8a9a3737b0562ad90", "project_id": "35a7a01cc29046a8a9a3737b0562ad90", "subnet_ip_availability": [{"subnet_id": "f0c947e3-b377-40e4-b2c9-105ec74c006d", "ip_version": 4, "cidr": "192.168.120.0/28", "subnet_name": "tempest-MultipleCreateTestJSON-1770149323-subnet", "used_ips": 0, "total_ips": 13}], "used_ips": 0, "total_ips": 13}, {"network_id": "31821d36-8870-4e30-ba78-9e7355084c74", "network_name": "tempest-Multipl _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:22.470 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:22.548 39 INFO tempest.lib.common.rest_client [req-3be0a848-4348-4764-b394-cc8097802cdc ] Request (NetworkIpAvailabilityExtRbacTest:test_get_network_ip_availabilities): 200 GET http://172.30.13.94/identity/v3/projects/d478cea84cb6433cba51cdcea5ec91bb/users/8c014738de024bdca2639fdee4da0d07/roles 0.077s 2020-11-06 18:21:22.548 39 DEBUG tempest.lib.common.rest_client [req-3be0a848-4348-4764-b394-cc8097802cdc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3be0a848-4348-4764-b394-cc8097802cdc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d478cea84cb6433cba51cdcea5ec91bb/users/8c014738de024bdca2639fdee4da0d07/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d478cea84cb6433cba51cdcea5ec91bb/users/8c014738de024bdca2639fdee4da0d07/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:22.586 39 INFO tempest.lib.common.rest_client [req-f26c0a74-6350-45b9-a04a-3baf0f965332 ] Request (NetworkIpAvailabilityExtRbacTest:test_get_network_ip_availabilities): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:21:22.586 39 DEBUG tempest.lib.common.rest_client [req-f26c0a74-6350-45b9-a04a-3baf0f965332 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f26c0a74-6350-45b9-a04a-3baf0f965332', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8c014738de024bdca2639fdee4da0d07", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1439261179", "password_expires_at": null}, "audit_ids": ["lbQOmZdhTuiakQk99fCRxQ"], "expires_at": "2020-11-06T19:21:22.000000Z", "issued_at": "2020-11-06T18:21:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d478cea84cb6433cba51cdcea5ec91bb", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1439261179"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:22.619 39 INFO tempest.lib.common.rest_client [req-74bfe267-c9c6-4668-bcf5-3a75681c0c97 ] Request (NetworkIpAvailabilityExtRbacTest:test_get_network_ip_availabilities): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:21:22.619 39 DEBUG tempest.lib.common.rest_client [req-74bfe267-c9c6-4668-bcf5-3a75681c0c97 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-74bfe267-c9c6-4668-bcf5-3a75681c0c97', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8c014738de024bdca2639fdee4da0d07", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1439261179", "password_expires_at": null}, "audit_ids": ["rtuBuuNSQgaTBLWUotYZ-g"], "expires_at": "2020-11-06T19:21:22.000000Z", "issued_at": "2020-11-06T18:21:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d478cea84cb6433cba51cdcea5ec91bb", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1439261179"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:22.623 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:22.626 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network_ip_availability, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:23.241 39 INFO tempest.lib.common.rest_client [req-0ca249d7-b450-4709-8953-102bbd79f0cf ] Request (NetworkIpAvailabilityExtRbacTest:test_get_network_ip_availability): 201 POST http://172.30.13.94:9696/v2.0/networks 0.615s 2020-11-06 18:21:23.242 39 DEBUG tempest.lib.common.rest_client [req-0ca249d7-b450-4709-8953-102bbd79f0cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-NetworkIpAvailabilityExtRbacTest-Network-1593004778"}} Response - Headers: {'content-type': 'application/json', 'content-length': '748', 'x-openstack-request-id': 'req-0ca249d7-b450-4709-8953-102bbd79f0cf', 'date': 'Fri, 06 Nov 2020 18:21:23 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"80d5cc38-ac1c-446e-892b-b7c34535098c","name":"tempest-NetworkIpAvailabilityExtRbacTest-Network-1593004778","tenant_id":"d478cea84cb6433cba51cdcea5ec91bb","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"d478cea84cb6433cba51cdcea5ec91bb","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":45,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:21:23Z","updated_at":"2020-11-06T18:21:23Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:23.242 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:23.303 39 INFO tempest.lib.common.rest_client [req-e3439c8e-eaff-4d83-9388-0136748351da ] Request (NetworkIpAvailabilityExtRbacTest:test_get_network_ip_availability): 200 GET http://172.30.13.94/identity/v3/projects/d478cea84cb6433cba51cdcea5ec91bb/users/8c014738de024bdca2639fdee4da0d07/roles 0.060s 2020-11-06 18:21:23.304 39 DEBUG tempest.lib.common.rest_client [req-e3439c8e-eaff-4d83-9388-0136748351da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e3439c8e-eaff-4d83-9388-0136748351da', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d478cea84cb6433cba51cdcea5ec91bb/users/8c014738de024bdca2639fdee4da0d07/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d478cea84cb6433cba51cdcea5ec91bb/users/8c014738de024bdca2639fdee4da0d07/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:23.340 39 INFO tempest.lib.common.rest_client [req-5cba127f-6684-4019-ad9e-032797d2cc34 ] Request (NetworkIpAvailabilityExtRbacTest:test_get_network_ip_availability): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:21:23.340 39 DEBUG tempest.lib.common.rest_client [req-5cba127f-6684-4019-ad9e-032797d2cc34 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5cba127f-6684-4019-ad9e-032797d2cc34', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8c014738de024bdca2639fdee4da0d07", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1439261179", "password_expires_at": null}, "audit_ids": ["lny0xbjQSy-SIewhWqMHEQ"], "expires_at": "2020-11-06T19:21:23.000000Z", "issued_at": "2020-11-06T18:21:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d478cea84cb6433cba51cdcea5ec91bb", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1439261179"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:23.398 39 INFO tempest.lib.common.rest_client [req-452ce3f5-3660-4f3b-9cfe-66b075f95cac ] Request (NetworkIpAvailabilityExtRbacTest:test_get_network_ip_availability): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.057s 2020-11-06 18:21:23.399 39 DEBUG tempest.lib.common.rest_client [req-452ce3f5-3660-4f3b-9cfe-66b075f95cac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-452ce3f5-3660-4f3b-9cfe-66b075f95cac', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8c014738de024bdca2639fdee4da0d07", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1439261179", "password_expires_at": null}, "audit_ids": ["JandM9NMR2Kjr31XpbHIeg"], "expires_at": "2020-11-06T19:21:23.000000Z", "issued_at": "2020-11-06T18:21:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d478cea84cb6433cba51cdcea5ec91bb", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1439261179"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:23.476 39 INFO tempest.lib.common.rest_client [req-46c0830f-421f-441c-9557-2542ce15e921 ] Request (NetworkIpAvailabilityExtRbacTest:test_get_network_ip_availability): 200 GET http://172.30.13.94:9696/v2.0/network-ip-availabilities/80d5cc38-ac1c-446e-892b-b7c34535098c 0.076s 2020-11-06 18:21:23.477 39 DEBUG tempest.lib.common.rest_client [req-46c0830f-421f-441c-9557-2542ce15e921 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '322', 'x-openstack-request-id': 'req-46c0830f-421f-441c-9557-2542ce15e921', 'date': 'Fri, 06 Nov 2020 18:21:23 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/network-ip-availabilities/80d5cc38-ac1c-446e-892b-b7c34535098c'} Body: b'{"network_ip_availability": {"network_id": "80d5cc38-ac1c-446e-892b-b7c34535098c", "network_name": "tempest-NetworkIpAvailabilityExtRbacTest-Network-1593004778", "tenant_id": "d478cea84cb6433cba51cdcea5ec91bb", "project_id": "d478cea84cb6433cba51cdcea5ec91bb", "subnet_ip_availability": [], "used_ips": 0, "total_ips": 0}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:23.477 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:23.529 39 INFO tempest.lib.common.rest_client [req-59c5c963-8834-4d41-a7e8-8bac1adb3859 ] Request (NetworkIpAvailabilityExtRbacTest:test_get_network_ip_availability): 200 GET http://172.30.13.94/identity/v3/projects/d478cea84cb6433cba51cdcea5ec91bb/users/8c014738de024bdca2639fdee4da0d07/roles 0.050s 2020-11-06 18:21:23.529 39 DEBUG tempest.lib.common.rest_client [req-59c5c963-8834-4d41-a7e8-8bac1adb3859 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-59c5c963-8834-4d41-a7e8-8bac1adb3859', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d478cea84cb6433cba51cdcea5ec91bb/users/8c014738de024bdca2639fdee4da0d07/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d478cea84cb6433cba51cdcea5ec91bb/users/8c014738de024bdca2639fdee4da0d07/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:23.562 39 INFO tempest.lib.common.rest_client [req-65ad39a7-b2df-4b49-8ae1-c66adcc85eae ] Request (NetworkIpAvailabilityExtRbacTest:test_get_network_ip_availability): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:21:23.562 39 DEBUG tempest.lib.common.rest_client [req-65ad39a7-b2df-4b49-8ae1-c66adcc85eae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-65ad39a7-b2df-4b49-8ae1-c66adcc85eae', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8c014738de024bdca2639fdee4da0d07", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1439261179", "password_expires_at": null}, "audit_ids": ["jy0It9kDRZmNNPiNgjWc_w"], "expires_at": "2020-11-06T19:21:23.000000Z", "issued_at": "2020-11-06T18:21:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d478cea84cb6433cba51cdcea5ec91bb", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1439261179"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:23.613 39 INFO tempest.lib.common.rest_client [req-eecdd153-5a9d-4b0d-a11a-8fc817eff8de ] Request (NetworkIpAvailabilityExtRbacTest:test_get_network_ip_availability): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-11-06 18:21:23.614 39 DEBUG tempest.lib.common.rest_client [req-eecdd153-5a9d-4b0d-a11a-8fc817eff8de ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eecdd153-5a9d-4b0d-a11a-8fc817eff8de', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8c014738de024bdca2639fdee4da0d07", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1439261179", "password_expires_at": null}, "audit_ids": ["nQrC3ClaRPS8iYqy6i-ORQ"], "expires_at": "2020-11-06T19:21:23.000000Z", "issued_at": "2020-11-06T18:21:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d478cea84cb6433cba51cdcea5ec91bb", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1439261179"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d478cea84cb6433cba51cdcea5ec91bb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:24.293 39 INFO tempest.lib.common.rest_client [req-c8213ac4-c608-4158-b55c-c5e66be7f1a3 ] Request (NetworkIpAvailabilityExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/80d5cc38-ac1c-446e-892b-b7c34535098c 0.676s 2020-11-06 18:21:24.294 39 DEBUG tempest.lib.common.rest_client [req-c8213ac4-c608-4158-b55c-c5e66be7f1a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-c8213ac4-c608-4158-b55c-c5e66be7f1a3', 'date': 'Fri, 06 Nov 2020 18:21:24 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/80d5cc38-ac1c-446e-892b-b7c34535098c'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:24.423 39 INFO tempest.lib.common.rest_client [req-571bd55f-5005-4509-8e70-ce6f9e02392c ] Request (NetworkIpAvailabilityExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/8c014738de024bdca2639fdee4da0d07 0.127s 2020-11-06 18:21:24.423 39 DEBUG tempest.lib.common.rest_client [req-571bd55f-5005-4509-8e70-ce6f9e02392c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-571bd55f-5005-4509-8e70-ce6f9e02392c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/8c014738de024bdca2639fdee4da0d07'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:24.506 39 INFO tempest.lib.common.rest_client [req-7973644c-4b73-4337-935c-d23734ee2aba ] Request (NetworkIpAvailabilityExtRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 18:21:24.507 39 DEBUG tempest.lib.common.rest_client [req-7973644c-4b73-4337-935c-d23734ee2aba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7973644c-4b73-4337-935c-d23734ee2aba', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["z-MTXQkpSOGLT52urIz8Lw"], "expires_at": "2020-11-06T19:21:24.000000Z", "issued_at": "2020-11-06T18:21:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:24.657 39 INFO tempest.lib.common.rest_client [req-7cfdcd5d-02c6-4e6e-9635-fc5a9f60cd06 ] Request (NetworkIpAvailabilityExtRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=d478cea84cb6433cba51cdcea5ec91bb&name=default 0.149s 2020-11-06 18:21:24.658 39 DEBUG tempest.lib.common.rest_client [req-7cfdcd5d-02c6-4e6e-9635-fc5a9f60cd06 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-7cfdcd5d-02c6-4e6e-9635-fc5a9f60cd06', 'date': 'Fri, 06 Nov 2020 18:21:24 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=d478cea84cb6433cba51cdcea5ec91bb&name=default'} Body: b'{"security_groups": [{"id": "b8082771-ec0f-429d-bc19-2a9eb0e64455", "name": "default", "stateful": true, "tenant_id": "d478cea84cb6433cba51cdcea5ec91bb", "description": "Default security group", "security_group_rules": [{"id": "28c15475-dfe2-4397-b942-7e915f7d546d", "tenant_id": "d478cea84cb6433cba51cdcea5ec91bb", "security_group_id": "b8082771-ec0f-429d-bc19-2a9eb0e64455", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "b8082771-ec0f-429d-bc19-2a9eb0e64455", "description": null, "tags": [], "created_at": "2020-11-06T18:21:22Z", "updated_at": "2020-11-06T18:21:22Z", "revision_number": 0, "project_id": "d478cea84cb6433cba51cdcea5ec91bb"}, {"id": "330f7069-e93e-4ad0-9eaa-9d917e765c61", "tenant_id": "d478cea84cb6433cba51cdcea5ec91bb", "security_group_id": "b8082771-ec0f-429d-bc19-2a9eb0e64455", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:21:22Z", "updated_at": "2020-11-06T18:21:22Z", "revision_number": 0, "project_id": "d478cea84cb6433cba51cdcea5ec91bb"}, {"id": "dc1a948a-c18a-4ff4-b8fd-622fabccfa90", "tenant_id": "d478cea84cb6433cba51cdcea5ec91bb", "security_group_id": "b8082771-ec0f-429d-bc19-2a9eb0e64455", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "b8082771-ec0f-429d-bc19-2a9eb0e64455", "description": null, "tags": [], "created_at": "2020-11-06T18:21:22Z", "updated_at": "2020-11-06T18:21:22Z", "revision_number": 0, "project_id": "d478cea84cb6433cba51cdcea5ec91bb"}, {"id": "e41a838f-e918-4f65-b59f-169c4996548c", "tenant_id": "d478cea84cb6433cba51cdcea5ec91bb", "security_group_id": "b8082771-ec0f-429d-bc19-2a9eb0e64455", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:21:23Z", "updated_at": "2020-11-06T18:21:23Z", "revision_number": 0, "project_id": "d478cea84cb6433cba51cdcea5ec91bb"}], "tags": [], "created_at": "2020-11-06T18:21:22Z", "updated_at": "2020-11-06T18:21:22Z", "revision_number": 1, "project_id": "d478cea84cb6433cba51cdcea5ec91bb"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:24.775 39 INFO tempest.lib.common.rest_client [req-5f262038-eb02-46ed-9018-f1ccd03d78a1 ] Request (NetworkIpAvailabilityExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/b8082771-ec0f-429d-bc19-2a9eb0e64455 0.116s 2020-11-06 18:21:24.775 39 DEBUG tempest.lib.common.rest_client [req-5f262038-eb02-46ed-9018-f1ccd03d78a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-5f262038-eb02-46ed-9018-f1ccd03d78a1', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:21:24 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/b8082771-ec0f-429d-bc19-2a9eb0e64455'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:24.893 39 INFO tempest.lib.common.rest_client [req-312252eb-6490-4baa-b7f3-3dd1a32404d5 ] Request (NetworkIpAvailabilityExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/d478cea84cb6433cba51cdcea5ec91bb 0.116s 2020-11-06 18:21:24.893 39 DEBUG tempest.lib.common.rest_client [req-312252eb-6490-4baa-b7f3-3dd1a32404d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-312252eb-6490-4baa-b7f3-3dd1a32404d5', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d478cea84cb6433cba51cdcea5ec91bb'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:24.979 39 INFO tempest.lib.common.rest_client [req-15d6edd6-8f27-415c-9d70-29ec02cc999c ] Request (NetworkSegmentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 18:21:24.979 39 DEBUG tempest.lib.common.rest_client [req-15d6edd6-8f27-415c-9d70-29ec02cc999c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-15d6edd6-8f27-415c-9d70-29ec02cc999c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["jx5xgS0CTemTRrc3oQSJvQ"], "expires_at": "2020-11-06T19:21:24.000000Z", "issued_at": "2020-11-06T18:21:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:25.024 39 INFO tempest.lib.common.rest_client [req-fbbcc018-6d1d-49ff-9e02-a98f16d4c608 ] Request (NetworkSegmentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:21:25.025 39 DEBUG tempest.lib.common.rest_client [req-fbbcc018-6d1d-49ff-9e02-a98f16d4c608 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fbbcc018-6d1d-49ff-9e02-a98f16d4c608', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["foSWI4-YTregCqCnwdA-fA"], "expires_at": "2020-11-06T19:21:25.000000Z", "issued_at": "2020-11-06T18:21:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:25.079 39 INFO tempest.lib.common.rest_client [req-0e641879-9489-410b-9e85-db4135b3c366 ] Request (NetworkSegmentsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.053s 2020-11-06 18:21:25.080 39 DEBUG tempest.lib.common.rest_client [req-0e641879-9489-410b-9e85-db4135b3c366 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0e641879-9489-410b-9e85-db4135b3c366', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:25.147 39 INFO tempest.lib.common.rest_client [req-24c4eb9e-1d99-456f-977d-0d94cf861fde ] Request (NetworkSegmentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.066s 2020-11-06 18:21:25.147 39 DEBUG tempest.lib.common.rest_client [req-24c4eb9e-1d99-456f-977d-0d94cf861fde ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-NetworkSegmentsRbacTest-1064648177-desc", "domain_id": "default", "name": "tempest-NetworkSegmentsRbacTest-1064648177"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '384', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-24c4eb9e-1d99-456f-977d-0d94cf861fde', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "7482f1b67d46468f802e0d60d1319b73", "name": "tempest-NetworkSegmentsRbacTest-1064648177", "domain_id": "default", "description": "tempest-NetworkSegmentsRbacTest-1064648177-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/7482f1b67d46468f802e0d60d1319b73"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:25.287 39 INFO tempest.lib.common.rest_client [req-f55062ed-ca54-4380-ab3a-95a280d31a71 ] Request (NetworkSegmentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.138s 2020-11-06 18:21:25.287 39 DEBUG tempest.lib.common.rest_client [req-f55062ed-ca54-4380-ab3a-95a280d31a71 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-NetworkSegmentsRbacTest-1064648177", "password": "X4_FnLd@O0@8lIk", "project_id": "7482f1b67d46468f802e0d60d1319b73", "email": "tempest-NetworkSegmentsRbacTest-947747606@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '401', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f55062ed-ca54-4380-ab3a-95a280d31a71', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "7482f1b67d46468f802e0d60d1319b73", "email": "tempest-NetworkSegmentsRbacTest-947747606@example.com", "id": "f33a60dea3a3444abf3955faf0dea169", "name": "tempest-NetworkSegmentsRbacTest-1064648177", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/f33a60dea3a3444abf3955faf0dea169"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:25.333 39 INFO tempest.lib.common.rest_client [req-5de9036f-d8bd-4902-9bdd-e66694b5a99b ] Request (NetworkSegmentsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.045s 2020-11-06 18:21:25.333 39 DEBUG tempest.lib.common.rest_client [req-5de9036f-d8bd-4902-9bdd-e66694b5a99b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5de9036f-d8bd-4902-9bdd-e66694b5a99b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:25.385 39 INFO tempest.lib.common.rest_client [req-dceb8e34-2be0-4805-a773-1b12d9179e62 ] Request (NetworkSegmentsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.050s 2020-11-06 18:21:25.385 39 DEBUG tempest.lib.common.rest_client [req-dceb8e34-2be0-4805-a773-1b12d9179e62 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dceb8e34-2be0-4805-a773-1b12d9179e62', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:25.455 39 INFO tempest.lib.common.rest_client [req-e2b79841-9eb8-4c30-bf1a-4106da6f58ff ] Request (NetworkSegmentsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/7482f1b67d46468f802e0d60d1319b73/users/f33a60dea3a3444abf3955faf0dea169/roles/72a4576c553448cd941b052c1ca0cf2d 0.069s 2020-11-06 18:21:25.456 39 DEBUG tempest.lib.common.rest_client [req-e2b79841-9eb8-4c30-bf1a-4106da6f58ff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e2b79841-9eb8-4c30-bf1a-4106da6f58ff', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/7482f1b67d46468f802e0d60d1319b73/users/f33a60dea3a3444abf3955faf0dea169/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:25.456 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-NetworkSegmentsRbacTest-1064648177', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '7482f1b67d46468f802e0d60d1319b73', 'project_name': 'tempest-NetworkSegmentsRbacTest-1064648177', 'tenant_id': '7482f1b67d46468f802e0d60d1319b73', 'tenant_name': 'tempest-NetworkSegmentsRbacTest-1064648177', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'f33a60dea3a3444abf3955faf0dea169'}, Network: None, Subnet: None, Router: None 2020-11-06 18:21:25.457 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-NetworkSegmentsRbacTest-1064648177', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '7482f1b67d46468f802e0d60d1319b73', 'project_name': 'tempest-NetworkSegmentsRbacTest-1064648177', 'tenant_id': '7482f1b67d46468f802e0d60d1319b73', 'tenant_name': 'tempest-NetworkSegmentsRbacTest-1064648177', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'f33a60dea3a3444abf3955faf0dea169'}, Network: None, Subnet: None, Router: None 2020-11-06 18:21:25.578 39 INFO tempest.lib.common.rest_client [req-8c87a6ea-a7d4-430f-984b-66dcccc254ab ] Request (NetworkSegmentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.111s 2020-11-06 18:21:25.579 39 DEBUG tempest.lib.common.rest_client [req-8c87a6ea-a7d4-430f-984b-66dcccc254ab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6577', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8c87a6ea-a7d4-430f-984b-66dcccc254ab', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f33a60dea3a3444abf3955faf0dea169", "name": "tempest-NetworkSegmentsRbacTest-1064648177", "password_expires_at": null}, "audit_ids": ["F-uTf6_VQCmhMShfaQOU1w"], "expires_at": "2020-11-06T19:21:25.000000Z", "issued_at": "2020-11-06T18:21:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7482f1b67d46468f802e0d60d1319b73", "name": "tempest-NetworkSegmentsRbacTest-1064648177"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:25.744 39 INFO tempest.lib.common.rest_client [req-106f061f-f600-4f59-a039-9dfe39e41084 ] Request (NetworkSegmentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.164s 2020-11-06 18:21:25.745 39 DEBUG tempest.lib.common.rest_client [req-106f061f-f600-4f59-a039-9dfe39e41084 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-106f061f-f600-4f59-a039-9dfe39e41084', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["5Uy85aFUS26YOCPxnk2NmQ"], "expires_at": "2020-11-06T19:21:25.000000Z", "issued_at": "2020-11-06T18:21:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:25.795 39 INFO tempest.lib.common.rest_client [req-f8173cb9-5e20-4c55-8f1d-c7d7e02ea2a4 ] Request (NetworkSegmentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:21:25.796 39 DEBUG tempest.lib.common.rest_client [req-f8173cb9-5e20-4c55-8f1d-c7d7e02ea2a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f8173cb9-5e20-4c55-8f1d-c7d7e02ea2a4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["_PC5IK_ERBOfs-5HD3Fz0Q"], "expires_at": "2020-11-06T19:21:25.000000Z", "issued_at": "2020-11-06T18:21:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:25.844 39 INFO tempest.lib.common.rest_client [req-21114190-463d-4b00-b651-56a6cc1dbadd ] Request (NetworkSegmentsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.047s 2020-11-06 18:21:25.845 39 DEBUG tempest.lib.common.rest_client [req-21114190-463d-4b00-b651-56a6cc1dbadd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-21114190-463d-4b00-b651-56a6cc1dbadd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:25.898 39 INFO tempest.lib.common.rest_client [req-1ac78664-7c64-48dd-bcc7-1fa870885133 ] Request (NetworkSegmentsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.051s 2020-11-06 18:21:25.898 39 DEBUG tempest.lib.common.rest_client [req-1ac78664-7c64-48dd-bcc7-1fa870885133 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1ac78664-7c64-48dd-bcc7-1fa870885133', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:25.899 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:21:25.899 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:25.948 39 INFO tempest.lib.common.rest_client [req-1bece836-e242-4baa-9036-e95d4c5aa6e0 ] Request (NetworkSegmentsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/7482f1b67d46468f802e0d60d1319b73/users/f33a60dea3a3444abf3955faf0dea169/roles 0.048s 2020-11-06 18:21:25.948 39 DEBUG tempest.lib.common.rest_client [req-1bece836-e242-4baa-9036-e95d4c5aa6e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1bece836-e242-4baa-9036-e95d4c5aa6e0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7482f1b67d46468f802e0d60d1319b73/users/f33a60dea3a3444abf3955faf0dea169/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7482f1b67d46468f802e0d60d1319b73/users/f33a60dea3a3444abf3955faf0dea169/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:26.001 39 INFO tempest.lib.common.rest_client [req-4af16846-fe16-42d2-8110-48a34a987c80 ] Request (NetworkSegmentsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/7482f1b67d46468f802e0d60d1319b73/users/f33a60dea3a3444abf3955faf0dea169/roles/72a4576c553448cd941b052c1ca0cf2d 0.052s 2020-11-06 18:21:26.002 39 DEBUG tempest.lib.common.rest_client [req-4af16846-fe16-42d2-8110-48a34a987c80 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4af16846-fe16-42d2-8110-48a34a987c80', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/7482f1b67d46468f802e0d60d1319b73/users/f33a60dea3a3444abf3955faf0dea169/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:26.106 39 INFO tempest.lib.common.rest_client [req-92e2a16a-976b-4ce1-acb4-93f1cb1bbfb4 ] Request (NetworkSegmentsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/7482f1b67d46468f802e0d60d1319b73/users/f33a60dea3a3444abf3955faf0dea169/roles/a629c95d64b3416fb80ae90af4f69c05 0.103s 2020-11-06 18:21:26.107 39 DEBUG tempest.lib.common.rest_client [req-92e2a16a-976b-4ce1-acb4-93f1cb1bbfb4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-92e2a16a-976b-4ce1-acb4-93f1cb1bbfb4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/7482f1b67d46468f802e0d60d1319b73/users/f33a60dea3a3444abf3955faf0dea169/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:27.210 39 INFO tempest.lib.common.rest_client [req-7e9857a5-1078-4a10-a6d3-aa6ebf195193 ] Request (NetworkSegmentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.101s 2020-11-06 18:21:27.211 39 DEBUG tempest.lib.common.rest_client [req-7e9857a5-1078-4a10-a6d3-aa6ebf195193 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7e9857a5-1078-4a10-a6d3-aa6ebf195193', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f33a60dea3a3444abf3955faf0dea169", "name": "tempest-NetworkSegmentsRbacTest-1064648177", "password_expires_at": null}, "audit_ids": ["mjmQQBYWQu6p-vNPU0iolQ"], "expires_at": "2020-11-06T19:21:27.000000Z", "issued_at": "2020-11-06T18:21:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7482f1b67d46468f802e0d60d1319b73", "name": "tempest-NetworkSegmentsRbacTest-1064648177"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:27.535 39 INFO tempest.lib.common.rest_client [req-d742bb43-96d2-4551-8c86-8b13b69417cc ] Request (NetworkSegmentsRbacTest:setUpClass): 200 GET http://172.30.13.94:9696/v2.0/networks 0.322s 2020-11-06 18:21:27.537 39 DEBUG tempest.lib.common.rest_client [req-d742bb43-96d2-4551-8c86-8b13b69417cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '40525', 'x-openstack-request-id': 'req-d742bb43-96d2-4551-8c86-8b13b69417cc', 'date': 'Fri, 06 Nov 2020 18:21:27 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"networks":[{"id":"075e5ee8-b0b4-4574-81a3-c3210ea79d71","name":"tempest-MultipleCreateTestJSON-683767456-network","tenant_id":"e8d23ff83aff43a6830320c63bdbdbd8","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["066b37a3-1660-4b06-bef8-73963e0a421c"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-10-23T17:10:54Z","updated_at":"2020-10-23T17:10:54Z","revision_number":2,"project_id":"e8d23ff83aff43a6830320c63bdbdbd8","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":32},{"id":"13682051-c16d-4418-88ee-1a180a4cfc15","name":"tempest-MultipleCreateTestJSON-1346316559-network","tenant_id":"70c2f48fcaf343ceb2657220e064d31c","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["d9e144c5-9735-4711-b3a1-0d367753c7f6"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-03T09:04:32Z","updated_at":"2020-11-03T09:04:33Z","revision_number":2,"project_id":"70c2f48fcaf343ceb2657220e064d31c","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":12},{"id":"13969b3e-1458-4017-97b3-6dc65a2e1f8c","name":"tempest-MultipleCreateTestJSON-80353040-network","tenant_id":"143eaf18da0d441fb68df29b15aea9c4","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["68cade25-ac24-411c-bbea-7ccfd23b16b3"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-03T08:54:27Z","updated_at":"2020-11-03T08:54:28Z","revision_number":2,"project_id":"143eaf18da0d441fb68df29b15aea9c4","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":54},{"id":"17d7963c-2bb9-4b6c-aa1a-40527525c1b8","name":"tempest-MultipleCreateTestJSON-1331327385-network","tenant_id":"5062fdae248541b4b2745b81a243b3ac","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["dd45b7d9-27bb-43cd-94c7-f0d86d72311d"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-10-17T12:35:00Z","updated_at":"2020-10-17T12:35:00Z","revision_number":2,"project_id":"5062fdae248541b4b2745b81a243b3ac","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":42},{"id":"18dbc555-0e96-45ce-8987-97b5369034e0","name":"tempest-TestShelveInstance-1611038722-network","tenant_id":"0208940a7af24b58b1e7a268234a7929","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["088c116b-d304-46a4-b863-ec56344d4582"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:19:47Z","updated_at":"2020-11-06T18:19:47Z","revision_number":2,"project_id":"0208940a7af24b58b1e7a268234a7929","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":40},{"id":"1c02029e-3385-4b0f-8ea8-64f5a5e9c878","name":"private","tenant_id":"76550dbb2e094ea8b53f0ef35fc93342","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["026ed5dd-3740-4409-bbff-427502b63344","91f28f82-50f3-4858-baa0-c00af5a09fba"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:27.540 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:27.544 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_network, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:27.544 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:27.548 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_network:segments, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:27.549 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:27.669 39 INFO tempest.lib.common.rest_client [req-e61970fd-36a3-4045-93e7-d1d8c00d96f8 ] Request (NetworkSegmentsRbacTest:test_create_network_segments): 200 GET http://172.30.13.94/identity/v3/projects/7482f1b67d46468f802e0d60d1319b73/users/f33a60dea3a3444abf3955faf0dea169/roles 0.120s 2020-11-06 18:21:27.670 39 DEBUG tempest.lib.common.rest_client [req-e61970fd-36a3-4045-93e7-d1d8c00d96f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e61970fd-36a3-4045-93e7-d1d8c00d96f8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7482f1b67d46468f802e0d60d1319b73/users/f33a60dea3a3444abf3955faf0dea169/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7482f1b67d46468f802e0d60d1319b73/users/f33a60dea3a3444abf3955faf0dea169/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:27.708 39 INFO tempest.lib.common.rest_client [req-f9f74ed4-a820-467d-a9f1-039ca9dbbcb7 ] Request (NetworkSegmentsRbacTest:test_create_network_segments): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:21:27.708 39 DEBUG tempest.lib.common.rest_client [req-f9f74ed4-a820-467d-a9f1-039ca9dbbcb7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f9f74ed4-a820-467d-a9f1-039ca9dbbcb7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f33a60dea3a3444abf3955faf0dea169", "name": "tempest-NetworkSegmentsRbacTest-1064648177", "password_expires_at": null}, "audit_ids": ["M5e1BVdBT7OlQE4M0J5m1Q"], "expires_at": "2020-11-06T19:21:27.000000Z", "issued_at": "2020-11-06T18:21:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7482f1b67d46468f802e0d60d1319b73", "name": "tempest-NetworkSegmentsRbacTest-1064648177"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:28.181 39 INFO tempest.lib.common.rest_client [req-c666ba65-69b0-4fc9-bf00-0317e4108396 ] Request (NetworkSegmentsRbacTest:test_create_network_segments): 201 POST http://172.30.13.94:9696/v2.0/networks 0.472s 2020-11-06 18:21:28.182 39 DEBUG tempest.lib.common.rest_client [req-c666ba65-69b0-4fc9-bf00-0317e4108396 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-NetworkSegmentsRbacTest-2066254619", "segments": [{"provider:network_type": "vxlan"}, {"provider:network_type": "vxlan"}]}} Response - Headers: {'content-type': 'application/json', 'content-length': '843', 'x-openstack-request-id': 'req-c666ba65-69b0-4fc9-bf00-0317e4108396', 'date': 'Fri, 06 Nov 2020 18:21:28 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"05c468a1-8d5f-4c5b-9e1c-60f8da06f138","name":"tempest-NetworkSegmentsRbacTest-2066254619","tenant_id":"7482f1b67d46468f802e0d60d1319b73","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"7482f1b67d46468f802e0d60d1319b73","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"segments":[{"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":45},{"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":49}],"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:21:28Z","updated_at":"2020-11-06T18:21:28Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:28.182 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:28.236 39 INFO tempest.lib.common.rest_client [req-6f9459a5-adeb-4584-ad74-fac88dd29320 ] Request (NetworkSegmentsRbacTest:test_create_network_segments): 200 GET http://172.30.13.94/identity/v3/projects/7482f1b67d46468f802e0d60d1319b73/users/f33a60dea3a3444abf3955faf0dea169/roles 0.052s 2020-11-06 18:21:28.236 39 DEBUG tempest.lib.common.rest_client [req-6f9459a5-adeb-4584-ad74-fac88dd29320 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6f9459a5-adeb-4584-ad74-fac88dd29320', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7482f1b67d46468f802e0d60d1319b73/users/f33a60dea3a3444abf3955faf0dea169/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7482f1b67d46468f802e0d60d1319b73/users/f33a60dea3a3444abf3955faf0dea169/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:28.273 39 INFO tempest.lib.common.rest_client [req-746776c9-ede6-46ab-a328-0de940c244d0 ] Request (NetworkSegmentsRbacTest:test_create_network_segments): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:21:28.274 39 DEBUG tempest.lib.common.rest_client [req-746776c9-ede6-46ab-a328-0de940c244d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-746776c9-ede6-46ab-a328-0de940c244d0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f33a60dea3a3444abf3955faf0dea169", "name": "tempest-NetworkSegmentsRbacTest-1064648177", "password_expires_at": null}, "audit_ids": ["zUYrVmMNT8-EXN_1WZRtbg"], "expires_at": "2020-11-06T19:21:28.000000Z", "issued_at": "2020-11-06T18:21:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7482f1b67d46468f802e0d60d1319b73", "name": "tempest-NetworkSegmentsRbacTest-1064648177"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:29.190 39 INFO tempest.lib.common.rest_client [req-2614365c-e58a-496e-a551-34d9b65458c9 ] Request (NetworkSegmentsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/networks/05c468a1-8d5f-4c5b-9e1c-60f8da06f138 0.914s 2020-11-06 18:21:29.191 39 DEBUG tempest.lib.common.rest_client [req-2614365c-e58a-496e-a551-34d9b65458c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-2614365c-e58a-496e-a551-34d9b65458c9', 'date': 'Fri, 06 Nov 2020 18:21:29 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/05c468a1-8d5f-4c5b-9e1c-60f8da06f138'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:29.193 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:29.197 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:29.198 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:29.201 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network:segments, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:30.518 39 INFO tempest.lib.common.rest_client [req-4694d7aa-191e-43cc-8a1e-45fb216272d8 ] Request (NetworkSegmentsRbacTest:test_show_network_segments): 201 POST http://172.30.13.94:9696/v2.0/networks 1.316s 2020-11-06 18:21:30.519 39 DEBUG tempest.lib.common.rest_client [req-4694d7aa-191e-43cc-8a1e-45fb216272d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-NetworkSegmentsRbacTest-542228487", "segments": [{"provider:network_type": "vxlan"}, {"provider:network_type": "vxlan"}]}} Response - Headers: {'content-type': 'application/json', 'content-length': '842', 'x-openstack-request-id': 'req-4694d7aa-191e-43cc-8a1e-45fb216272d8', 'date': 'Fri, 06 Nov 2020 18:21:30 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"3f923d02-b931-49c3-ab2c-a08a5ac3dfe9","name":"tempest-NetworkSegmentsRbacTest-542228487","tenant_id":"7482f1b67d46468f802e0d60d1319b73","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"7482f1b67d46468f802e0d60d1319b73","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"segments":[{"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":45},{"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":49}],"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:21:30Z","updated_at":"2020-11-06T18:21:30Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:30.519 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:30.569 39 INFO tempest.lib.common.rest_client [req-bd4d4742-7c85-499a-a693-fee98e7f9b20 ] Request (NetworkSegmentsRbacTest:test_show_network_segments): 200 GET http://172.30.13.94/identity/v3/projects/7482f1b67d46468f802e0d60d1319b73/users/f33a60dea3a3444abf3955faf0dea169/roles 0.048s 2020-11-06 18:21:30.569 39 DEBUG tempest.lib.common.rest_client [req-bd4d4742-7c85-499a-a693-fee98e7f9b20 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bd4d4742-7c85-499a-a693-fee98e7f9b20', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7482f1b67d46468f802e0d60d1319b73/users/f33a60dea3a3444abf3955faf0dea169/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7482f1b67d46468f802e0d60d1319b73/users/f33a60dea3a3444abf3955faf0dea169/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:30.603 39 INFO tempest.lib.common.rest_client [req-eb6f9406-17d1-4acb-a058-9bdf8937a3a4 ] Request (NetworkSegmentsRbacTest:test_show_network_segments): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:21:30.604 39 DEBUG tempest.lib.common.rest_client [req-eb6f9406-17d1-4acb-a058-9bdf8937a3a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eb6f9406-17d1-4acb-a058-9bdf8937a3a4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f33a60dea3a3444abf3955faf0dea169", "name": "tempest-NetworkSegmentsRbacTest-1064648177", "password_expires_at": null}, "audit_ids": ["qaW_gmopQ9GgFJz9kZyT2g"], "expires_at": "2020-11-06T19:21:30.000000Z", "issued_at": "2020-11-06T18:21:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7482f1b67d46468f802e0d60d1319b73", "name": "tempest-NetworkSegmentsRbacTest-1064648177"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:30.775 39 INFO tempest.lib.common.rest_client [req-f4cfe2c7-d5cd-4ddf-8363-fef983366f1b ] Request (NetworkSegmentsRbacTest:test_show_network_segments): 200 GET http://172.30.13.94:9696/v2.0/networks/3f923d02-b931-49c3-ab2c-a08a5ac3dfe9?fields=segments 0.170s 2020-11-06 18:21:30.776 39 DEBUG tempest.lib.common.rest_client [req-f4cfe2c7-d5cd-4ddf-8363-fef983366f1b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '220', 'x-openstack-request-id': 'req-f4cfe2c7-d5cd-4ddf-8363-fef983366f1b', 'date': 'Fri, 06 Nov 2020 18:21:30 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/3f923d02-b931-49c3-ab2c-a08a5ac3dfe9?fields=segments'} Body: b'{"network":{"segments":[{"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":45},{"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":49}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:30.777 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:30.828 39 INFO tempest.lib.common.rest_client [req-460fff09-d293-495c-bd32-8dfe68c5ee1c ] Request (NetworkSegmentsRbacTest:test_show_network_segments): 200 GET http://172.30.13.94/identity/v3/projects/7482f1b67d46468f802e0d60d1319b73/users/f33a60dea3a3444abf3955faf0dea169/roles 0.050s 2020-11-06 18:21:30.828 39 DEBUG tempest.lib.common.rest_client [req-460fff09-d293-495c-bd32-8dfe68c5ee1c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-460fff09-d293-495c-bd32-8dfe68c5ee1c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7482f1b67d46468f802e0d60d1319b73/users/f33a60dea3a3444abf3955faf0dea169/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7482f1b67d46468f802e0d60d1319b73/users/f33a60dea3a3444abf3955faf0dea169/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:30.860 39 INFO tempest.lib.common.rest_client [req-07a8b86d-c3eb-4eb0-a5f7-f7b28ef07e3f ] Request (NetworkSegmentsRbacTest:test_show_network_segments): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:21:30.861 39 DEBUG tempest.lib.common.rest_client [req-07a8b86d-c3eb-4eb0-a5f7-f7b28ef07e3f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-07a8b86d-c3eb-4eb0-a5f7-f7b28ef07e3f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f33a60dea3a3444abf3955faf0dea169", "name": "tempest-NetworkSegmentsRbacTest-1064648177", "password_expires_at": null}, "audit_ids": ["ajkUSqTcTqOQLrxk3qCr2Q"], "expires_at": "2020-11-06T19:21:30.000000Z", "issued_at": "2020-11-06T18:21:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7482f1b67d46468f802e0d60d1319b73", "name": "tempest-NetworkSegmentsRbacTest-1064648177"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:31.840 39 INFO tempest.lib.common.rest_client [req-35ed9e86-a221-456e-9705-19c6d88e41f8 ] Request (NetworkSegmentsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/networks/3f923d02-b931-49c3-ab2c-a08a5ac3dfe9 0.977s 2020-11-06 18:21:31.840 39 DEBUG tempest.lib.common.rest_client [req-35ed9e86-a221-456e-9705-19c6d88e41f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-35ed9e86-a221-456e-9705-19c6d88e41f8', 'date': 'Fri, 06 Nov 2020 18:21:31 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/3f923d02-b931-49c3-ab2c-a08a5ac3dfe9'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:31.843 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:31.846 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:31.846 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:31.849 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_network, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:31.850 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:31.852 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_network:segments, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:32.229 39 INFO tempest.lib.common.rest_client [req-d9821e50-50ab-4c5a-bf72-fa24ac235a1f ] Request (NetworkSegmentsRbacTest:test_update_network_segments): 201 POST http://172.30.13.94:9696/v2.0/networks 0.376s 2020-11-06 18:21:32.230 39 DEBUG tempest.lib.common.rest_client [req-d9821e50-50ab-4c5a-bf72-fa24ac235a1f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-NetworkSegmentsRbacTest-1219304307", "segments": [{"provider:network_type": "vxlan"}, {"provider:network_type": "vxlan"}]}} Response - Headers: {'content-type': 'application/json', 'content-length': '843', 'x-openstack-request-id': 'req-d9821e50-50ab-4c5a-bf72-fa24ac235a1f', 'date': 'Fri, 06 Nov 2020 18:21:32 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"d75a7ce3-12f7-4b97-a72f-b422e0c50a05","name":"tempest-NetworkSegmentsRbacTest-1219304307","tenant_id":"7482f1b67d46468f802e0d60d1319b73","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"7482f1b67d46468f802e0d60d1319b73","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"segments":[{"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":45},{"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":49}],"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:21:31Z","updated_at":"2020-11-06T18:21:32Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:32.230 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:32.306 39 INFO tempest.lib.common.rest_client [req-efa5620e-7d58-420d-9de8-f4fe48bda3f1 ] Request (NetworkSegmentsRbacTest:test_update_network_segments): 200 GET http://172.30.13.94/identity/v3/projects/7482f1b67d46468f802e0d60d1319b73/users/f33a60dea3a3444abf3955faf0dea169/roles 0.074s 2020-11-06 18:21:32.306 39 DEBUG tempest.lib.common.rest_client [req-efa5620e-7d58-420d-9de8-f4fe48bda3f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-efa5620e-7d58-420d-9de8-f4fe48bda3f1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7482f1b67d46468f802e0d60d1319b73/users/f33a60dea3a3444abf3955faf0dea169/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7482f1b67d46468f802e0d60d1319b73/users/f33a60dea3a3444abf3955faf0dea169/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:32.343 39 INFO tempest.lib.common.rest_client [req-03309580-118f-4616-ab2c-8a5bc710c044 ] Request (NetworkSegmentsRbacTest:test_update_network_segments): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:21:32.344 39 DEBUG tempest.lib.common.rest_client [req-03309580-118f-4616-ab2c-8a5bc710c044 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-03309580-118f-4616-ab2c-8a5bc710c044', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f33a60dea3a3444abf3955faf0dea169", "name": "tempest-NetworkSegmentsRbacTest-1064648177", "password_expires_at": null}, "audit_ids": ["gsmJJZrfQhC_HuUBXYv4JQ"], "expires_at": "2020-11-06T19:21:32.000000Z", "issued_at": "2020-11-06T18:21:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7482f1b67d46468f802e0d60d1319b73", "name": "tempest-NetworkSegmentsRbacTest-1064648177"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:32.786 39 INFO tempest.lib.common.rest_client [req-58d0e5af-1885-4818-bc40-c16f69a68daa ] Request (NetworkSegmentsRbacTest:test_update_network_segments): 200 PUT http://172.30.13.94:9696/v2.0/networks/d75a7ce3-12f7-4b97-a72f-b422e0c50a05 0.440s 2020-11-06 18:21:32.787 39 DEBUG tempest.lib.common.rest_client [req-58d0e5af-1885-4818-bc40-c16f69a68daa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"segments": [{"provider:network_type": "vxlan"}]}} Response - Headers: {'content-type': 'application/json', 'content-length': '824', 'x-openstack-request-id': 'req-58d0e5af-1885-4818-bc40-c16f69a68daa', 'date': 'Fri, 06 Nov 2020 18:21:32 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/d75a7ce3-12f7-4b97-a72f-b422e0c50a05'} Body: b'{"network":{"id":"d75a7ce3-12f7-4b97-a72f-b422e0c50a05","name":"tempest-NetworkSegmentsRbacTest-1219304307","tenant_id":"7482f1b67d46468f802e0d60d1319b73","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"availability_zone_hints":[],"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:21:31Z","updated_at":"2020-11-06T18:21:32Z","revision_number":1,"project_id":"7482f1b67d46468f802e0d60d1319b73","segments":[{"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":45},{"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":49}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:32.787 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:32.840 39 INFO tempest.lib.common.rest_client [req-1cbfa1d0-5ac8-46be-99e0-062a243e4ddb ] Request (NetworkSegmentsRbacTest:test_update_network_segments): 200 GET http://172.30.13.94/identity/v3/projects/7482f1b67d46468f802e0d60d1319b73/users/f33a60dea3a3444abf3955faf0dea169/roles 0.051s 2020-11-06 18:21:32.840 39 DEBUG tempest.lib.common.rest_client [req-1cbfa1d0-5ac8-46be-99e0-062a243e4ddb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1cbfa1d0-5ac8-46be-99e0-062a243e4ddb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7482f1b67d46468f802e0d60d1319b73/users/f33a60dea3a3444abf3955faf0dea169/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7482f1b67d46468f802e0d60d1319b73/users/f33a60dea3a3444abf3955faf0dea169/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:32.881 39 INFO tempest.lib.common.rest_client [req-3d6118d3-1ca7-4e06-a824-1433d730366f ] Request (NetworkSegmentsRbacTest:test_update_network_segments): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:21:32.882 39 DEBUG tempest.lib.common.rest_client [req-3d6118d3-1ca7-4e06-a824-1433d730366f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3d6118d3-1ca7-4e06-a824-1433d730366f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f33a60dea3a3444abf3955faf0dea169", "name": "tempest-NetworkSegmentsRbacTest-1064648177", "password_expires_at": null}, "audit_ids": ["ITXa6mbOTiSFCyEUPpAd-w"], "expires_at": "2020-11-06T19:21:32.000000Z", "issued_at": "2020-11-06T18:21:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7482f1b67d46468f802e0d60d1319b73", "name": "tempest-NetworkSegmentsRbacTest-1064648177"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7482f1b67d46468f802e0d60d1319b73", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:35.028 39 INFO tempest.lib.common.rest_client [req-0e650529-a6ad-4c0f-a26c-e9f5e6c06acc ] Request (NetworkSegmentsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/networks/d75a7ce3-12f7-4b97-a72f-b422e0c50a05 2.144s 2020-11-06 18:21:35.028 39 DEBUG tempest.lib.common.rest_client [req-0e650529-a6ad-4c0f-a26c-e9f5e6c06acc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-0e650529-a6ad-4c0f-a26c-e9f5e6c06acc', 'date': 'Fri, 06 Nov 2020 18:21:35 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/d75a7ce3-12f7-4b97-a72f-b422e0c50a05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:35.262 39 INFO tempest.lib.common.rest_client [req-2fe81649-e002-46e2-abc9-85d45201ed6a ] Request (NetworkSegmentsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/f33a60dea3a3444abf3955faf0dea169 0.231s 2020-11-06 18:21:35.262 39 DEBUG tempest.lib.common.rest_client [req-2fe81649-e002-46e2-abc9-85d45201ed6a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2fe81649-e002-46e2-abc9-85d45201ed6a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/f33a60dea3a3444abf3955faf0dea169'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:35.340 39 INFO tempest.lib.common.rest_client [req-99b36cd4-2124-45a6-9d43-48756fb7f21a ] Request (NetworkSegmentsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.076s 2020-11-06 18:21:35.340 39 DEBUG tempest.lib.common.rest_client [req-99b36cd4-2124-45a6-9d43-48756fb7f21a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-99b36cd4-2124-45a6-9d43-48756fb7f21a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["umCxHhOBRTGn2SaTwgT57A"], "expires_at": "2020-11-06T19:21:35.000000Z", "issued_at": "2020-11-06T18:21:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:35.523 39 INFO tempest.lib.common.rest_client [req-da1cb5a9-0f25-4547-baeb-75ae82c3db39 ] Request (NetworkSegmentsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=7482f1b67d46468f802e0d60d1319b73&name=default 0.181s 2020-11-06 18:21:35.523 39 DEBUG tempest.lib.common.rest_client [req-da1cb5a9-0f25-4547-baeb-75ae82c3db39 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-da1cb5a9-0f25-4547-baeb-75ae82c3db39', 'date': 'Fri, 06 Nov 2020 18:21:35 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=7482f1b67d46468f802e0d60d1319b73&name=default'} Body: b'{"security_groups": [{"id": "c5ff63ca-923a-4aba-bcdc-16c7d838ea1e", "name": "default", "stateful": true, "tenant_id": "7482f1b67d46468f802e0d60d1319b73", "description": "Default security group", "security_group_rules": [{"id": "120e81fc-e4c5-4bc9-a06f-f6cd6251bfc0", "tenant_id": "7482f1b67d46468f802e0d60d1319b73", "security_group_id": "c5ff63ca-923a-4aba-bcdc-16c7d838ea1e", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "c5ff63ca-923a-4aba-bcdc-16c7d838ea1e", "description": null, "tags": [], "created_at": "2020-11-06T18:21:27Z", "updated_at": "2020-11-06T18:21:27Z", "revision_number": 0, "project_id": "7482f1b67d46468f802e0d60d1319b73"}, {"id": "30aae9bc-8681-4791-aea1-8dd6ea077533", "tenant_id": "7482f1b67d46468f802e0d60d1319b73", "security_group_id": "c5ff63ca-923a-4aba-bcdc-16c7d838ea1e", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:21:28Z", "updated_at": "2020-11-06T18:21:28Z", "revision_number": 0, "project_id": "7482f1b67d46468f802e0d60d1319b73"}, {"id": "6e750572-cdeb-4b9f-9d45-b4374f0d5568", "tenant_id": "7482f1b67d46468f802e0d60d1319b73", "security_group_id": "c5ff63ca-923a-4aba-bcdc-16c7d838ea1e", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:21:27Z", "updated_at": "2020-11-06T18:21:27Z", "revision_number": 0, "project_id": "7482f1b67d46468f802e0d60d1319b73"}, {"id": "d3bb3d54-5cf8-489a-a3d4-bfd212665faf", "tenant_id": "7482f1b67d46468f802e0d60d1319b73", "security_group_id": "c5ff63ca-923a-4aba-bcdc-16c7d838ea1e", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "c5ff63ca-923a-4aba-bcdc-16c7d838ea1e", "description": null, "tags": [], "created_at": "2020-11-06T18:21:27Z", "updated_at": "2020-11-06T18:21:27Z", "revision_number": 0, "project_id": "7482f1b67d46468f802e0d60d1319b73"}], "tags": [], "created_at": "2020-11-06T18:21:27Z", "updated_at": "2020-11-06T18:21:27Z", "revision_number": 1, "project_id": "7482f1b67d46468f802e0d60d1319b73"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:35.680 39 INFO tempest.lib.common.rest_client [req-0863ff9d-f139-4b26-a0ea-707bae866d30 ] Request (NetworkSegmentsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/c5ff63ca-923a-4aba-bcdc-16c7d838ea1e 0.155s 2020-11-06 18:21:35.681 39 DEBUG tempest.lib.common.rest_client [req-0863ff9d-f139-4b26-a0ea-707bae866d30 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-0863ff9d-f139-4b26-a0ea-707bae866d30', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:21:35 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/c5ff63ca-923a-4aba-bcdc-16c7d838ea1e'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:35.802 39 INFO tempest.lib.common.rest_client [req-e5dc9a3e-237c-4a42-b56d-7c4d8133fc78 ] Request (NetworkSegmentsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/7482f1b67d46468f802e0d60d1319b73 0.120s 2020-11-06 18:21:35.802 39 DEBUG tempest.lib.common.rest_client [req-e5dc9a3e-237c-4a42-b56d-7c4d8133fc78 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e5dc9a3e-237c-4a42-b56d-7c4d8133fc78', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/7482f1b67d46468f802e0d60d1319b73'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:35.893 39 INFO tempest.lib.common.rest_client [req-747ef4e6-b1f1-4597-bd0f-8cbae2391414 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-11-06 18:21:35.894 39 DEBUG tempest.lib.common.rest_client [req-747ef4e6-b1f1-4597-bd0f-8cbae2391414 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-747ef4e6-b1f1-4597-bd0f-8cbae2391414', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["FMYw6Z5OSPisZR0Xno1lFQ"], "expires_at": "2020-11-06T19:21:35.000000Z", "issued_at": "2020-11-06T18:21:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:35.944 39 INFO tempest.lib.common.rest_client [req-969e0ddf-5690-4ff2-8d78-caa14acd8309 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:21:35.945 39 DEBUG tempest.lib.common.rest_client [req-969e0ddf-5690-4ff2-8d78-caa14acd8309 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-969e0ddf-5690-4ff2-8d78-caa14acd8309', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["QIXsZKqAQwWRjR_45XW8Pg"], "expires_at": "2020-11-06T19:21:35.000000Z", "issued_at": "2020-11-06T18:21:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:36.004 39 INFO tempest.lib.common.rest_client [req-4b4b2194-c06c-46e0-b879-820f33ad2406 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.057s 2020-11-06 18:21:36.005 39 DEBUG tempest.lib.common.rest_client [req-4b4b2194-c06c-46e0-b879-820f33ad2406 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4b4b2194-c06c-46e0-b879-820f33ad2406', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:36.079 39 INFO tempest.lib.common.rest_client [req-619e52ca-b86b-4825-a613-b46afed70e6e ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.072s 2020-11-06 18:21:36.079 39 DEBUG tempest.lib.common.rest_client [req-619e52ca-b86b-4825-a613-b46afed70e6e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933-desc", "domain_id": "default", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-619e52ca-b86b-4825-a613-b46afed70e6e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "6e04b324d2894105adf7d905e417a9e9", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933", "domain_id": "default", "description": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/6e04b324d2894105adf7d905e417a9e9"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:36.210 39 INFO tempest.lib.common.rest_client [req-24ce122b-d7ee-48e2-9c28-473a9a195601 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.130s 2020-11-06 18:21:36.211 39 DEBUG tempest.lib.common.rest_client [req-24ce122b-d7ee-48e2-9c28-473a9a195601 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933", "password": "Z8*H@61dsh+p&4+", "project_id": "6e04b324d2894105adf7d905e417a9e9", "email": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-622662503@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '429', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-24ce122b-d7ee-48e2-9c28-473a9a195601', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "6e04b324d2894105adf7d905e417a9e9", "email": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-622662503@example.com", "id": "c2c3a3e0290f4203b01a3a9ce382a940", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/c2c3a3e0290f4203b01a3a9ce382a940"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:36.266 39 INFO tempest.lib.common.rest_client [req-aa4104c4-ec75-4707-81d4-32907c76af6a ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.054s 2020-11-06 18:21:36.266 39 DEBUG tempest.lib.common.rest_client [req-aa4104c4-ec75-4707-81d4-32907c76af6a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aa4104c4-ec75-4707-81d4-32907c76af6a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:36.321 39 INFO tempest.lib.common.rest_client [req-ff65d3c0-1043-464c-a17b-b95d213c3af5 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.053s 2020-11-06 18:21:36.321 39 DEBUG tempest.lib.common.rest_client [req-ff65d3c0-1043-464c-a17b-b95d213c3af5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ff65d3c0-1043-464c-a17b-b95d213c3af5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:36.402 39 INFO tempest.lib.common.rest_client [req-2ad53e27-9529-471d-b45c-70a07879410e ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/6e04b324d2894105adf7d905e417a9e9/users/c2c3a3e0290f4203b01a3a9ce382a940/roles/72a4576c553448cd941b052c1ca0cf2d 0.079s 2020-11-06 18:21:36.402 39 DEBUG tempest.lib.common.rest_client [req-2ad53e27-9529-471d-b45c-70a07879410e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2ad53e27-9529-471d-b45c-70a07879410e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6e04b324d2894105adf7d905e417a9e9/users/c2c3a3e0290f4203b01a3a9ce382a940/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:36.403 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '6e04b324d2894105adf7d905e417a9e9', 'project_name': 'tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933', 'tenant_id': '6e04b324d2894105adf7d905e417a9e9', 'tenant_name': 'tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'c2c3a3e0290f4203b01a3a9ce382a940'}, Network: None, Subnet: None, Router: None 2020-11-06 18:21:36.403 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '6e04b324d2894105adf7d905e417a9e9', 'project_name': 'tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933', 'tenant_id': '6e04b324d2894105adf7d905e417a9e9', 'tenant_name': 'tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'c2c3a3e0290f4203b01a3a9ce382a940'}, Network: None, Subnet: None, Router: None 2020-11-06 18:21:36.524 39 INFO tempest.lib.common.rest_client [req-fd74ae26-6ca7-4fce-a505-e4576e06b2c8 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.110s 2020-11-06 18:21:36.525 39 DEBUG tempest.lib.common.rest_client [req-fd74ae26-6ca7-4fce-a505-e4576e06b2c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6605', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fd74ae26-6ca7-4fce-a505-e4576e06b2c8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c2c3a3e0290f4203b01a3a9ce382a940", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933", "password_expires_at": null}, "audit_ids": ["grFpJ9XdRoaDpTr1YeoTqg"], "expires_at": "2020-11-06T19:21:36.000000Z", "issued_at": "2020-11-06T18:21:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6e04b324d2894105adf7d905e417a9e9", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:36.526 39 WARNING tempest.manager [-] tempest.manager.Manager is not a stable interface and as such it should not be imported directly. It will be removed as soon as the client manager becomes available in tempest.lib. 2020-11-06 18:21:36.624 39 INFO tempest.lib.common.rest_client [req-13f8f179-11dc-4d1b-8b76-3cfd62aa1b36 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-11-06 18:21:36.624 39 DEBUG tempest.lib.common.rest_client [req-13f8f179-11dc-4d1b-8b76-3cfd62aa1b36 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-13f8f179-11dc-4d1b-8b76-3cfd62aa1b36', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["MUJYhM2YTgmKxGO36E8MBw"], "expires_at": "2020-11-06T19:21:36.000000Z", "issued_at": "2020-11-06T18:21:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:36.675 39 INFO tempest.lib.common.rest_client [req-3ea81064-1283-45e6-aa9d-ebd8652bf231 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:21:36.675 39 DEBUG tempest.lib.common.rest_client [req-3ea81064-1283-45e6-aa9d-ebd8652bf231 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3ea81064-1283-45e6-aa9d-ebd8652bf231', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["sfzyt0ufSrGR90c4ONgkYg"], "expires_at": "2020-11-06T19:21:36.000000Z", "issued_at": "2020-11-06T18:21:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:36.726 39 INFO tempest.lib.common.rest_client [req-43bdbcf1-2143-429f-90ee-41f4a09ed09e ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.049s 2020-11-06 18:21:36.726 39 DEBUG tempest.lib.common.rest_client [req-43bdbcf1-2143-429f-90ee-41f4a09ed09e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-43bdbcf1-2143-429f-90ee-41f4a09ed09e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:36.777 39 INFO tempest.lib.common.rest_client [req-86738577-909e-41e5-a776-15d9a2eb9090 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.049s 2020-11-06 18:21:36.777 39 DEBUG tempest.lib.common.rest_client [req-86738577-909e-41e5-a776-15d9a2eb9090 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-86738577-909e-41e5-a776-15d9a2eb9090', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:36.778 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:21:36.778 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:36.836 39 INFO tempest.lib.common.rest_client [req-d41d2f99-9613-44af-9dbd-7455f44b95e9 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/6e04b324d2894105adf7d905e417a9e9/users/c2c3a3e0290f4203b01a3a9ce382a940/roles 0.057s 2020-11-06 18:21:36.837 39 DEBUG tempest.lib.common.rest_client [req-d41d2f99-9613-44af-9dbd-7455f44b95e9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d41d2f99-9613-44af-9dbd-7455f44b95e9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6e04b324d2894105adf7d905e417a9e9/users/c2c3a3e0290f4203b01a3a9ce382a940/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6e04b324d2894105adf7d905e417a9e9/users/c2c3a3e0290f4203b01a3a9ce382a940/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:36.905 39 INFO tempest.lib.common.rest_client [req-ccffee4c-8751-4c06-93cd-803363779d73 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/6e04b324d2894105adf7d905e417a9e9/users/c2c3a3e0290f4203b01a3a9ce382a940/roles/72a4576c553448cd941b052c1ca0cf2d 0.067s 2020-11-06 18:21:36.905 39 DEBUG tempest.lib.common.rest_client [req-ccffee4c-8751-4c06-93cd-803363779d73 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ccffee4c-8751-4c06-93cd-803363779d73', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6e04b324d2894105adf7d905e417a9e9/users/c2c3a3e0290f4203b01a3a9ce382a940/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:37.016 39 INFO tempest.lib.common.rest_client [req-f0d4202b-fa60-47a8-9697-d908c5fbfce9 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/6e04b324d2894105adf7d905e417a9e9/users/c2c3a3e0290f4203b01a3a9ce382a940/roles/a629c95d64b3416fb80ae90af4f69c05 0.110s 2020-11-06 18:21:37.017 39 DEBUG tempest.lib.common.rest_client [req-f0d4202b-fa60-47a8-9697-d908c5fbfce9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f0d4202b-fa60-47a8-9697-d908c5fbfce9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6e04b324d2894105adf7d905e417a9e9/users/c2c3a3e0290f4203b01a3a9ce382a940/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:38.110 39 INFO tempest.lib.common.rest_client [req-2f24f3c9-1b41-445d-9d43-28c05f133976 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-11-06 18:21:38.110 39 DEBUG tempest.lib.common.rest_client [req-2f24f3c9-1b41-445d-9d43-28c05f133976 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6666', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2f24f3c9-1b41-445d-9d43-28c05f133976', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c2c3a3e0290f4203b01a3a9ce382a940", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933", "password_expires_at": null}, "audit_ids": ["N1auLH4oR-uOrAd0qUjORQ"], "expires_at": "2020-11-06T19:21:38.000000Z", "issued_at": "2020-11-06T18:21:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6e04b324d2894105adf7d905e417a9e9", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c043 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:38.151 39 INFO tempest.lib.common.rest_client [req-ecabb371-b779-4414-9ce9-e95308bc30ed ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:21:38.151 39 DEBUG tempest.lib.common.rest_client [req-ecabb371-b779-4414-9ce9-e95308bc30ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6666', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ecabb371-b779-4414-9ce9-e95308bc30ed', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c2c3a3e0290f4203b01a3a9ce382a940", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933", "password_expires_at": null}, "audit_ids": ["suQkj-gmQ6SgrlxOo4AHcw"], "expires_at": "2020-11-06T19:21:38.000000Z", "issued_at": "2020-11-06T18:21:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6e04b324d2894105adf7d905e417a9e9", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c043 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:38.352 39 INFO tempest.lib.common.rest_client [req-c06d7643-2e50-4008-9882-6cf302da8a0b ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/qos/policies 0.200s 2020-11-06 18:21:38.353 39 DEBUG tempest.lib.common.rest_client [req-c06d7643-2e50-4008-9882-6cf302da8a0b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"policy": {"name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-qos-2089704271", "shared": false, "is_default": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '409', 'x-openstack-request-id': 'req-c06d7643-2e50-4008-9882-6cf302da8a0b', 'date': 'Fri, 06 Nov 2020 18:21:38 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies'} Body: b'{"policy": {"id": "fdcd6584-1d5e-4bfb-a83c-e0fe309ec524", "project_id": "6e04b324d2894105adf7d905e417a9e9", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-qos-2089704271", "shared": false, "rules": [], "is_default": false, "revision_number": 0, "description": "", "created_at": "2020-11-06T18:21:38Z", "updated_at": "2020-11-06T18:21:38Z", "tenant_id": "6e04b324d2894105adf7d905e417a9e9", "tags": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:38.354 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:38.358 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_policy_minimum_bandwidth_rule, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:38.358 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:38.469 39 INFO tempest.lib.common.rest_client [req-bf156d02-2513-4406-81f4-1d8a93bfbcd7 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_create_policy_minimum_bandwidth_rule): 200 GET http://172.30.13.94/identity/v3/projects/6e04b324d2894105adf7d905e417a9e9/users/c2c3a3e0290f4203b01a3a9ce382a940/roles 0.110s 2020-11-06 18:21:38.470 39 DEBUG tempest.lib.common.rest_client [req-bf156d02-2513-4406-81f4-1d8a93bfbcd7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bf156d02-2513-4406-81f4-1d8a93bfbcd7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6e04b324d2894105adf7d905e417a9e9/users/c2c3a3e0290f4203b01a3a9ce382a940/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6e04b324d2894105adf7d905e417a9e9/users/c2c3a3e0290f4203b01a3a9ce382a940/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:38.509 39 INFO tempest.lib.common.rest_client [req-671ba9a7-b2c8-4d6b-afd5-2a312d60c3c8 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_create_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:21:38.510 39 DEBUG tempest.lib.common.rest_client [req-671ba9a7-b2c8-4d6b-afd5-2a312d60c3c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6666', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-671ba9a7-b2c8-4d6b-afd5-2a312d60c3c8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c2c3a3e0290f4203b01a3a9ce382a940", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933", "password_expires_at": null}, "audit_ids": ["gC7_fxPFRaSCzHIKbJgL3g"], "expires_at": "2020-11-06T19:21:38.000000Z", "issued_at": "2020-11-06T18:21:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6e04b324d2894105adf7d905e417a9e9", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c043 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:38.546 39 INFO tempest.lib.common.rest_client [req-cd381075-6abb-47b0-a2a8-098dad8f97a5 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_create_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:21:38.547 39 DEBUG tempest.lib.common.rest_client [req-cd381075-6abb-47b0-a2a8-098dad8f97a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6666', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cd381075-6abb-47b0-a2a8-098dad8f97a5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c2c3a3e0290f4203b01a3a9ce382a940", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933", "password_expires_at": null}, "audit_ids": ["y-_ELWNwQ0mJ80461CR20g"], "expires_at": "2020-11-06T19:21:38.000000Z", "issued_at": "2020-11-06T18:21:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6e04b324d2894105adf7d905e417a9e9", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c043 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:38.779 39 INFO tempest.lib.common.rest_client [req-e6deb3b7-e176-4119-9471-290cdfc927b3 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_create_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94:9696/v2.0/qos/policies/fdcd6584-1d5e-4bfb-a83c-e0fe309ec524/minimum_bandwidth_rules 0.231s 2020-11-06 18:21:38.780 39 DEBUG tempest.lib.common.rest_client [req-e6deb3b7-e176-4119-9471-290cdfc927b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"minimum_bandwidth_rule": {"direction": "egress", "min_kbps": 1000}} Response - Headers: {'content-type': 'application/json', 'content-length': '115', 'x-openstack-request-id': 'req-e6deb3b7-e176-4119-9471-290cdfc927b3', 'date': 'Fri, 06 Nov 2020 18:21:38 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/fdcd6584-1d5e-4bfb-a83c-e0fe309ec524/minimum_bandwidth_rules'} Body: b'{"minimum_bandwidth_rule": {"min_kbps": 1000, "direction": "egress", "id": "2217f12f-130c-4b95-8dfb-e3b0eb3d1a26"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:38.780 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:38.833 39 INFO tempest.lib.common.rest_client [req-8b16888d-7f7a-4b11-a8fb-cb138596f058 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_create_policy_minimum_bandwidth_rule): 200 GET http://172.30.13.94/identity/v3/projects/6e04b324d2894105adf7d905e417a9e9/users/c2c3a3e0290f4203b01a3a9ce382a940/roles 0.051s 2020-11-06 18:21:38.833 39 DEBUG tempest.lib.common.rest_client [req-8b16888d-7f7a-4b11-a8fb-cb138596f058 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8b16888d-7f7a-4b11-a8fb-cb138596f058', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6e04b324d2894105adf7d905e417a9e9/users/c2c3a3e0290f4203b01a3a9ce382a940/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6e04b324d2894105adf7d905e417a9e9/users/c2c3a3e0290f4203b01a3a9ce382a940/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:38.870 39 INFO tempest.lib.common.rest_client [req-b79ca5a2-7af0-4150-9b3c-a8c4cd1e12c1 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_create_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:21:38.871 39 DEBUG tempest.lib.common.rest_client [req-b79ca5a2-7af0-4150-9b3c-a8c4cd1e12c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6666', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b79ca5a2-7af0-4150-9b3c-a8c4cd1e12c1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c2c3a3e0290f4203b01a3a9ce382a940", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933", "password_expires_at": null}, "audit_ids": ["8yGsI_qqTOagjk-cVm6jLA"], "expires_at": "2020-11-06T19:21:38.000000Z", "issued_at": "2020-11-06T18:21:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6e04b324d2894105adf7d905e417a9e9", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c043 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:38.908 39 INFO tempest.lib.common.rest_client [req-fbdbbc94-60dc-466f-b36d-d2bc88c2242a ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_create_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:21:38.909 39 DEBUG tempest.lib.common.rest_client [req-fbdbbc94-60dc-466f-b36d-d2bc88c2242a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6666', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fbdbbc94-60dc-466f-b36d-d2bc88c2242a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c2c3a3e0290f4203b01a3a9ce382a940", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933", "password_expires_at": null}, "audit_ids": ["FXH81iXfTUma_FpC3Fn6QQ"], "expires_at": "2020-11-06T19:21:38.000000Z", "issued_at": "2020-11-06T18:21:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6e04b324d2894105adf7d905e417a9e9", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c043 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:39.132 39 INFO tempest.lib.common.rest_client [req-00fe5810-8079-4564-9a9b-a8271c0f0ba3 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/fdcd6584-1d5e-4bfb-a83c-e0fe309ec524/minimum_bandwidth_rules/2217f12f-130c-4b95-8dfb-e3b0eb3d1a26 0.221s 2020-11-06 18:21:39.133 39 DEBUG tempest.lib.common.rest_client [req-00fe5810-8079-4564-9a9b-a8271c0f0ba3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-00fe5810-8079-4564-9a9b-a8271c0f0ba3', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:21:39 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/fdcd6584-1d5e-4bfb-a83c-e0fe309ec524/minimum_bandwidth_rules/2217f12f-130c-4b95-8dfb-e3b0eb3d1a26'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:39.135 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:39.137 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_policy_minimum_bandwidth_rule, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:39.137 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:39.139 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_policy_minimum_bandwidth_rule, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:39.271 39 INFO tempest.lib.common.rest_client [req-0bd163f6-4bde-45e7-8c3b-e7f8ecd361a3 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_delete_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94:9696/v2.0/qos/policies/fdcd6584-1d5e-4bfb-a83c-e0fe309ec524/minimum_bandwidth_rules 0.130s 2020-11-06 18:21:39.271 39 DEBUG tempest.lib.common.rest_client [req-0bd163f6-4bde-45e7-8c3b-e7f8ecd361a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"minimum_bandwidth_rule": {"direction": "egress", "min_kbps": 1000}} Response - Headers: {'content-type': 'application/json', 'content-length': '115', 'x-openstack-request-id': 'req-0bd163f6-4bde-45e7-8c3b-e7f8ecd361a3', 'date': 'Fri, 06 Nov 2020 18:21:39 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/fdcd6584-1d5e-4bfb-a83c-e0fe309ec524/minimum_bandwidth_rules'} Body: b'{"minimum_bandwidth_rule": {"min_kbps": 1000, "direction": "egress", "id": "ea4f0271-8fb8-495c-887f-b2ee087d3788"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:39.271 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:39.322 39 INFO tempest.lib.common.rest_client [req-7dd10909-edb3-4c33-b408-7bc14e31ea2c ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_delete_policy_minimum_bandwidth_rule): 200 GET http://172.30.13.94/identity/v3/projects/6e04b324d2894105adf7d905e417a9e9/users/c2c3a3e0290f4203b01a3a9ce382a940/roles 0.050s 2020-11-06 18:21:39.323 39 DEBUG tempest.lib.common.rest_client [req-7dd10909-edb3-4c33-b408-7bc14e31ea2c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7dd10909-edb3-4c33-b408-7bc14e31ea2c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6e04b324d2894105adf7d905e417a9e9/users/c2c3a3e0290f4203b01a3a9ce382a940/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6e04b324d2894105adf7d905e417a9e9/users/c2c3a3e0290f4203b01a3a9ce382a940/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:39.356 39 INFO tempest.lib.common.rest_client [req-4275a127-b0f5-49d2-bfac-9c0773f58719 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_delete_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:21:39.357 39 DEBUG tempest.lib.common.rest_client [req-4275a127-b0f5-49d2-bfac-9c0773f58719 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6666', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4275a127-b0f5-49d2-bfac-9c0773f58719', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c2c3a3e0290f4203b01a3a9ce382a940", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933", "password_expires_at": null}, "audit_ids": ["TyYw7urhQvSGJAt6dadJ2g"], "expires_at": "2020-11-06T19:21:39.000000Z", "issued_at": "2020-11-06T18:21:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6e04b324d2894105adf7d905e417a9e9", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c043 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:39.390 39 INFO tempest.lib.common.rest_client [req-5c4780d0-cb56-401f-80e3-99162f0bc475 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_delete_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:21:39.391 39 DEBUG tempest.lib.common.rest_client [req-5c4780d0-cb56-401f-80e3-99162f0bc475 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6666', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5c4780d0-cb56-401f-80e3-99162f0bc475', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c2c3a3e0290f4203b01a3a9ce382a940", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933", "password_expires_at": null}, "audit_ids": ["GCwVXvH9SACkFG2FgykcVQ"], "expires_at": "2020-11-06T19:21:39.000000Z", "issued_at": "2020-11-06T18:21:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6e04b324d2894105adf7d905e417a9e9", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c043 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:39.566 39 INFO tempest.lib.common.rest_client [req-da674c12-5270-4d38-a25f-f4d3603beedb ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_delete_policy_minimum_bandwidth_rule): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/fdcd6584-1d5e-4bfb-a83c-e0fe309ec524/minimum_bandwidth_rules/ea4f0271-8fb8-495c-887f-b2ee087d3788 0.174s 2020-11-06 18:21:39.567 39 DEBUG tempest.lib.common.rest_client [req-da674c12-5270-4d38-a25f-f4d3603beedb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-da674c12-5270-4d38-a25f-f4d3603beedb', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:21:39 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/fdcd6584-1d5e-4bfb-a83c-e0fe309ec524/minimum_bandwidth_rules/ea4f0271-8fb8-495c-887f-b2ee087d3788'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:39.567 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:39.621 39 INFO tempest.lib.common.rest_client [req-5346c797-662f-4c68-96db-b526324594c5 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_delete_policy_minimum_bandwidth_rule): 200 GET http://172.30.13.94/identity/v3/projects/6e04b324d2894105adf7d905e417a9e9/users/c2c3a3e0290f4203b01a3a9ce382a940/roles 0.052s 2020-11-06 18:21:39.621 39 DEBUG tempest.lib.common.rest_client [req-5346c797-662f-4c68-96db-b526324594c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5346c797-662f-4c68-96db-b526324594c5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6e04b324d2894105adf7d905e417a9e9/users/c2c3a3e0290f4203b01a3a9ce382a940/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6e04b324d2894105adf7d905e417a9e9/users/c2c3a3e0290f4203b01a3a9ce382a940/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:39.660 39 INFO tempest.lib.common.rest_client [req-10444dfc-871b-489d-af52-0257e503edf3 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_delete_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:21:39.660 39 DEBUG tempest.lib.common.rest_client [req-10444dfc-871b-489d-af52-0257e503edf3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6666', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-10444dfc-871b-489d-af52-0257e503edf3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c2c3a3e0290f4203b01a3a9ce382a940", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933", "password_expires_at": null}, "audit_ids": ["2NgdZDxzTQeR2uC-SApKTg"], "expires_at": "2020-11-06T19:21:39.000000Z", "issued_at": "2020-11-06T18:21:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6e04b324d2894105adf7d905e417a9e9", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c043 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:39.698 39 INFO tempest.lib.common.rest_client [req-9c1ab775-77ed-491b-8dc7-b243cd6295f1 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_delete_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:21:39.698 39 DEBUG tempest.lib.common.rest_client [req-9c1ab775-77ed-491b-8dc7-b243cd6295f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6666', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9c1ab775-77ed-491b-8dc7-b243cd6295f1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c2c3a3e0290f4203b01a3a9ce382a940", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933", "password_expires_at": null}, "audit_ids": ["Dl17sHm1T9uizlfkYFxrfA"], "expires_at": "2020-11-06T19:21:39.000000Z", "issued_at": "2020-11-06T18:21:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6e04b324d2894105adf7d905e417a9e9", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c043 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:39.793 39 INFO tempest.lib.common.rest_client [req-151b2664-294e-4f91-8814-156dfbf0569a ] Request (PolicyMinimumBandwidthRuleExtRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94:9696/v2.0/qos/policies/fdcd6584-1d5e-4bfb-a83c-e0fe309ec524/minimum_bandwidth_rules/ea4f0271-8fb8-495c-887f-b2ee087d3788 0.093s 2020-11-06 18:21:39.793 39 DEBUG tempest.lib.common.rest_client [req-151b2664-294e-4f91-8814-156dfbf0569a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '187', 'x-openstack-request-id': 'req-151b2664-294e-4f91-8814-156dfbf0569a', 'date': 'Fri, 06 Nov 2020 18:21:39 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/fdcd6584-1d5e-4bfb-a83c-e0fe309ec524/minimum_bandwidth_rules/ea4f0271-8fb8-495c-887f-b2ee087d3788'} Body: b'{"NeutronError": {"type": "QosRuleNotFound", "message": "QoS rule ea4f0271-8fb8-495c-887f-b2ee087d3788 for policy fdcd6584-1d5e-4bfb-a83c-e0fe309ec524 could not be found.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:39.797 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:39.802 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_policy_minimum_bandwidth_rule, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:40.036 39 INFO tempest.lib.common.rest_client [req-84a9423d-47db-43c4-a8a6-00326386ed3d ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_show_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94:9696/v2.0/qos/policies/fdcd6584-1d5e-4bfb-a83c-e0fe309ec524/minimum_bandwidth_rules 0.233s 2020-11-06 18:21:40.036 39 DEBUG tempest.lib.common.rest_client [req-84a9423d-47db-43c4-a8a6-00326386ed3d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"minimum_bandwidth_rule": {"direction": "egress", "min_kbps": 1000}} Response - Headers: {'content-type': 'application/json', 'content-length': '115', 'x-openstack-request-id': 'req-84a9423d-47db-43c4-a8a6-00326386ed3d', 'date': 'Fri, 06 Nov 2020 18:21:40 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/fdcd6584-1d5e-4bfb-a83c-e0fe309ec524/minimum_bandwidth_rules'} Body: b'{"minimum_bandwidth_rule": {"min_kbps": 1000, "direction": "egress", "id": "de0f2714-68ea-43b2-b652-4e1e11a021d7"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:40.037 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:40.097 39 INFO tempest.lib.common.rest_client [req-53a89c56-2052-47af-83c0-18de92256e72 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_show_policy_minimum_bandwidth_rule): 200 GET http://172.30.13.94/identity/v3/projects/6e04b324d2894105adf7d905e417a9e9/users/c2c3a3e0290f4203b01a3a9ce382a940/roles 0.059s 2020-11-06 18:21:40.097 39 DEBUG tempest.lib.common.rest_client [req-53a89c56-2052-47af-83c0-18de92256e72 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-53a89c56-2052-47af-83c0-18de92256e72', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6e04b324d2894105adf7d905e417a9e9/users/c2c3a3e0290f4203b01a3a9ce382a940/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6e04b324d2894105adf7d905e417a9e9/users/c2c3a3e0290f4203b01a3a9ce382a940/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:40.142 39 INFO tempest.lib.common.rest_client [req-5b5da593-01c7-4eb7-a657-c2d122c3598d ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_show_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-11-06 18:21:40.143 39 DEBUG tempest.lib.common.rest_client [req-5b5da593-01c7-4eb7-a657-c2d122c3598d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6666', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5b5da593-01c7-4eb7-a657-c2d122c3598d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c2c3a3e0290f4203b01a3a9ce382a940", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933", "password_expires_at": null}, "audit_ids": ["m7B1Wm5TQOyXNGQEstgjbQ"], "expires_at": "2020-11-06T19:21:40.000000Z", "issued_at": "2020-11-06T18:21:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6e04b324d2894105adf7d905e417a9e9", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c043 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:40.179 39 INFO tempest.lib.common.rest_client [req-a5c92e3c-827c-449b-a367-fa942da53cff ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_show_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:21:40.180 39 DEBUG tempest.lib.common.rest_client [req-a5c92e3c-827c-449b-a367-fa942da53cff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6666', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a5c92e3c-827c-449b-a367-fa942da53cff', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c2c3a3e0290f4203b01a3a9ce382a940", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933", "password_expires_at": null}, "audit_ids": ["iRMtgSINRGqmvc657nY4CQ"], "expires_at": "2020-11-06T19:21:40.000000Z", "issued_at": "2020-11-06T18:21:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6e04b324d2894105adf7d905e417a9e9", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c043 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:40.277 39 INFO tempest.lib.common.rest_client [req-73a0924a-289a-4b63-b0ed-8cf8dc05628a ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_show_policy_minimum_bandwidth_rule): 200 GET http://172.30.13.94:9696/v2.0/qos/policies/fdcd6584-1d5e-4bfb-a83c-e0fe309ec524/minimum_bandwidth_rules/de0f2714-68ea-43b2-b652-4e1e11a021d7 0.095s 2020-11-06 18:21:40.278 39 DEBUG tempest.lib.common.rest_client [req-73a0924a-289a-4b63-b0ed-8cf8dc05628a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '115', 'x-openstack-request-id': 'req-73a0924a-289a-4b63-b0ed-8cf8dc05628a', 'date': 'Fri, 06 Nov 2020 18:21:40 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/fdcd6584-1d5e-4bfb-a83c-e0fe309ec524/minimum_bandwidth_rules/de0f2714-68ea-43b2-b652-4e1e11a021d7'} Body: b'{"minimum_bandwidth_rule": {"min_kbps": 1000, "direction": "egress", "id": "de0f2714-68ea-43b2-b652-4e1e11a021d7"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:40.278 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:40.338 39 INFO tempest.lib.common.rest_client [req-bfb3492b-bf7b-4e56-9290-620e8539da66 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_show_policy_minimum_bandwidth_rule): 200 GET http://172.30.13.94/identity/v3/projects/6e04b324d2894105adf7d905e417a9e9/users/c2c3a3e0290f4203b01a3a9ce382a940/roles 0.058s 2020-11-06 18:21:40.338 39 DEBUG tempest.lib.common.rest_client [req-bfb3492b-bf7b-4e56-9290-620e8539da66 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bfb3492b-bf7b-4e56-9290-620e8539da66', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6e04b324d2894105adf7d905e417a9e9/users/c2c3a3e0290f4203b01a3a9ce382a940/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6e04b324d2894105adf7d905e417a9e9/users/c2c3a3e0290f4203b01a3a9ce382a940/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:40.377 39 INFO tempest.lib.common.rest_client [req-467dc141-8d97-42b0-bab7-6d1ffd903ace ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_show_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:21:40.377 39 DEBUG tempest.lib.common.rest_client [req-467dc141-8d97-42b0-bab7-6d1ffd903ace ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6666', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-467dc141-8d97-42b0-bab7-6d1ffd903ace', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c2c3a3e0290f4203b01a3a9ce382a940", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933", "password_expires_at": null}, "audit_ids": ["eCFc6sEpSNycjTT8is-7eA"], "expires_at": "2020-11-06T19:21:40.000000Z", "issued_at": "2020-11-06T18:21:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6e04b324d2894105adf7d905e417a9e9", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c043 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:40.415 39 INFO tempest.lib.common.rest_client [req-04ba8a02-3816-4499-90cc-1050cd6d34e0 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_show_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:21:40.415 39 DEBUG tempest.lib.common.rest_client [req-04ba8a02-3816-4499-90cc-1050cd6d34e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6666', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-04ba8a02-3816-4499-90cc-1050cd6d34e0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c2c3a3e0290f4203b01a3a9ce382a940", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933", "password_expires_at": null}, "audit_ids": ["JQNYK4RVROSCB8GRFHWn3Q"], "expires_at": "2020-11-06T19:21:40.000000Z", "issued_at": "2020-11-06T18:21:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6e04b324d2894105adf7d905e417a9e9", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c043 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:40.606 39 INFO tempest.lib.common.rest_client [req-645e5307-3422-48cf-a32a-e824b2d6ed70 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/fdcd6584-1d5e-4bfb-a83c-e0fe309ec524/minimum_bandwidth_rules/de0f2714-68ea-43b2-b652-4e1e11a021d7 0.189s 2020-11-06 18:21:40.607 39 DEBUG tempest.lib.common.rest_client [req-645e5307-3422-48cf-a32a-e824b2d6ed70 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-645e5307-3422-48cf-a32a-e824b2d6ed70', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:21:40 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/fdcd6584-1d5e-4bfb-a83c-e0fe309ec524/minimum_bandwidth_rules/de0f2714-68ea-43b2-b652-4e1e11a021d7'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:40.610 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:40.614 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_policy_minimum_bandwidth_rule, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:40.614 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:40.618 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_policy_minimum_bandwidth_rule, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:40.767 39 INFO tempest.lib.common.rest_client [req-723e0de3-893b-4d06-b3d8-6a64171ffae3 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_update_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94:9696/v2.0/qos/policies/fdcd6584-1d5e-4bfb-a83c-e0fe309ec524/minimum_bandwidth_rules 0.148s 2020-11-06 18:21:40.767 39 DEBUG tempest.lib.common.rest_client [req-723e0de3-893b-4d06-b3d8-6a64171ffae3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"minimum_bandwidth_rule": {"direction": "egress", "min_kbps": 1000}} Response - Headers: {'content-type': 'application/json', 'content-length': '115', 'x-openstack-request-id': 'req-723e0de3-893b-4d06-b3d8-6a64171ffae3', 'date': 'Fri, 06 Nov 2020 18:21:40 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/fdcd6584-1d5e-4bfb-a83c-e0fe309ec524/minimum_bandwidth_rules'} Body: b'{"minimum_bandwidth_rule": {"min_kbps": 1000, "direction": "egress", "id": "c16b8f4a-0a4e-4b82-b529-0b1945a43440"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:40.768 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:40.824 39 INFO tempest.lib.common.rest_client [req-9a84b02d-8eb4-4293-b438-2cbda4afed51 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_update_policy_minimum_bandwidth_rule): 200 GET http://172.30.13.94/identity/v3/projects/6e04b324d2894105adf7d905e417a9e9/users/c2c3a3e0290f4203b01a3a9ce382a940/roles 0.055s 2020-11-06 18:21:40.825 39 DEBUG tempest.lib.common.rest_client [req-9a84b02d-8eb4-4293-b438-2cbda4afed51 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9a84b02d-8eb4-4293-b438-2cbda4afed51', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6e04b324d2894105adf7d905e417a9e9/users/c2c3a3e0290f4203b01a3a9ce382a940/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6e04b324d2894105adf7d905e417a9e9/users/c2c3a3e0290f4203b01a3a9ce382a940/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:40.860 39 INFO tempest.lib.common.rest_client [req-249b06a6-a507-44a1-abdd-7c0caf8d6e03 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_update_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:21:40.860 39 DEBUG tempest.lib.common.rest_client [req-249b06a6-a507-44a1-abdd-7c0caf8d6e03 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6666', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-249b06a6-a507-44a1-abdd-7c0caf8d6e03', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c2c3a3e0290f4203b01a3a9ce382a940", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933", "password_expires_at": null}, "audit_ids": ["T8BkqCgcToqbaHHCMs6SCg"], "expires_at": "2020-11-06T19:21:40.000000Z", "issued_at": "2020-11-06T18:21:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6e04b324d2894105adf7d905e417a9e9", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c043 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:40.899 39 INFO tempest.lib.common.rest_client [req-8beb71ce-5c4e-42e1-9709-720b66b44e73 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_update_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:21:40.900 39 DEBUG tempest.lib.common.rest_client [req-8beb71ce-5c4e-42e1-9709-720b66b44e73 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6666', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8beb71ce-5c4e-42e1-9709-720b66b44e73', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c2c3a3e0290f4203b01a3a9ce382a940", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933", "password_expires_at": null}, "audit_ids": ["ZN2_kHDKQYiPN86tirQTmw"], "expires_at": "2020-11-06T19:21:40.000000Z", "issued_at": "2020-11-06T18:21:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6e04b324d2894105adf7d905e417a9e9", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c043 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:42.319 39 INFO tempest.lib.common.rest_client [req-8e8eb6f4-f12a-44b6-b4eb-ea78e438193e ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_update_policy_minimum_bandwidth_rule): 200 PUT http://172.30.13.94:9696/v2.0/qos/policies/fdcd6584-1d5e-4bfb-a83c-e0fe309ec524/minimum_bandwidth_rules/c16b8f4a-0a4e-4b82-b529-0b1945a43440 1.418s 2020-11-06 18:21:42.319 39 DEBUG tempest.lib.common.rest_client [req-8e8eb6f4-f12a-44b6-b4eb-ea78e438193e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"minimum_bandwidth_rule": {"min_kbps": 2000}} Response - Headers: {'content-type': 'application/json', 'content-length': '115', 'x-openstack-request-id': 'req-8e8eb6f4-f12a-44b6-b4eb-ea78e438193e', 'date': 'Fri, 06 Nov 2020 18:21:42 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/fdcd6584-1d5e-4bfb-a83c-e0fe309ec524/minimum_bandwidth_rules/c16b8f4a-0a4e-4b82-b529-0b1945a43440'} Body: b'{"minimum_bandwidth_rule": {"min_kbps": 2000, "direction": "egress", "id": "c16b8f4a-0a4e-4b82-b529-0b1945a43440"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:42.320 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:42.375 39 INFO tempest.lib.common.rest_client [req-bb77b36d-1bf3-4494-b9ea-918e9bb2b7a7 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_update_policy_minimum_bandwidth_rule): 200 GET http://172.30.13.94/identity/v3/projects/6e04b324d2894105adf7d905e417a9e9/users/c2c3a3e0290f4203b01a3a9ce382a940/roles 0.054s 2020-11-06 18:21:42.375 39 DEBUG tempest.lib.common.rest_client [req-bb77b36d-1bf3-4494-b9ea-918e9bb2b7a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bb77b36d-1bf3-4494-b9ea-918e9bb2b7a7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6e04b324d2894105adf7d905e417a9e9/users/c2c3a3e0290f4203b01a3a9ce382a940/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6e04b324d2894105adf7d905e417a9e9/users/c2c3a3e0290f4203b01a3a9ce382a940/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:42.415 39 INFO tempest.lib.common.rest_client [req-e84834bd-287a-4887-9ba4-7b3a37aebd08 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_update_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:21:42.415 39 DEBUG tempest.lib.common.rest_client [req-e84834bd-287a-4887-9ba4-7b3a37aebd08 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6666', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e84834bd-287a-4887-9ba4-7b3a37aebd08', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c2c3a3e0290f4203b01a3a9ce382a940", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933", "password_expires_at": null}, "audit_ids": ["DF4ZuOp0RxSiR_XJRks0EQ"], "expires_at": "2020-11-06T19:21:42.000000Z", "issued_at": "2020-11-06T18:21:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6e04b324d2894105adf7d905e417a9e9", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c043 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:42.446 39 INFO tempest.lib.common.rest_client [req-c6545f3b-4b37-472e-9b54-0eb18f5ef652 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_update_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.030s 2020-11-06 18:21:42.447 39 DEBUG tempest.lib.common.rest_client [req-c6545f3b-4b37-472e-9b54-0eb18f5ef652 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6666', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c6545f3b-4b37-472e-9b54-0eb18f5ef652', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c2c3a3e0290f4203b01a3a9ce382a940", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933", "password_expires_at": null}, "audit_ids": ["QyZS7jOnSxqyl8nxGxK8ZA"], "expires_at": "2020-11-06T19:21:42.000000Z", "issued_at": "2020-11-06T18:21:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6e04b324d2894105adf7d905e417a9e9", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2089452933"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6e04b324d2894105adf7d905e417a9e9", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c043 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:42.631 39 INFO tempest.lib.common.rest_client [req-1b1459bd-d427-4e3f-bac6-61d2bbb7a906 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/fdcd6584-1d5e-4bfb-a83c-e0fe309ec524/minimum_bandwidth_rules/c16b8f4a-0a4e-4b82-b529-0b1945a43440 0.182s 2020-11-06 18:21:42.632 39 DEBUG tempest.lib.common.rest_client [req-1b1459bd-d427-4e3f-bac6-61d2bbb7a906 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-1b1459bd-d427-4e3f-bac6-61d2bbb7a906', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:21:42 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/fdcd6584-1d5e-4bfb-a83c-e0fe309ec524/minimum_bandwidth_rules/c16b8f4a-0a4e-4b82-b529-0b1945a43440'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:42.703 39 INFO tempest.lib.common.rest_client [req-ff398f30-d380-4145-b9ff-d369a54aa515 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/fdcd6584-1d5e-4bfb-a83c-e0fe309ec524 0.068s 2020-11-06 18:21:42.703 39 DEBUG tempest.lib.common.rest_client [req-ff398f30-d380-4145-b9ff-d369a54aa515 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-ff398f30-d380-4145-b9ff-d369a54aa515', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:21:42 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/fdcd6584-1d5e-4bfb-a83c-e0fe309ec524'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:42.832 39 INFO tempest.lib.common.rest_client [req-7347cb69-1ea7-4ec4-93d1-b7fcf3f121f3 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/c2c3a3e0290f4203b01a3a9ce382a940 0.129s 2020-11-06 18:21:42.833 39 DEBUG tempest.lib.common.rest_client [req-7347cb69-1ea7-4ec4-93d1-b7fcf3f121f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7347cb69-1ea7-4ec4-93d1-b7fcf3f121f3', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/c2c3a3e0290f4203b01a3a9ce382a940'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:42.900 39 INFO tempest.lib.common.rest_client [req-aabd6b58-bf45-4ae1-8a92-51766c1e255e ] Request (PolicyMinimumBandwidthRuleExtRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.066s 2020-11-06 18:21:42.901 39 DEBUG tempest.lib.common.rest_client [req-aabd6b58-bf45-4ae1-8a92-51766c1e255e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aabd6b58-bf45-4ae1-8a92-51766c1e255e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["mcBaxSWSS8-OxzCfHZNRiA"], "expires_at": "2020-11-06T19:21:42.000000Z", "issued_at": "2020-11-06T18:21:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:43.152 39 INFO tempest.lib.common.rest_client [req-493a8584-4d46-4519-9924-5dbfd3e679c4 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=6e04b324d2894105adf7d905e417a9e9&name=default 0.250s 2020-11-06 18:21:43.153 39 DEBUG tempest.lib.common.rest_client [req-493a8584-4d46-4519-9924-5dbfd3e679c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-493a8584-4d46-4519-9924-5dbfd3e679c4', 'date': 'Fri, 06 Nov 2020 18:21:43 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=6e04b324d2894105adf7d905e417a9e9&name=default'} Body: b'{"security_groups": [{"id": "f20d2071-15c9-4715-b0b7-8eb4dc2d71c5", "name": "default", "stateful": true, "tenant_id": "6e04b324d2894105adf7d905e417a9e9", "description": "Default security group", "security_group_rules": [{"id": "1b16fbc7-6240-4832-b01d-fbbdfdfa058d", "tenant_id": "6e04b324d2894105adf7d905e417a9e9", "security_group_id": "f20d2071-15c9-4715-b0b7-8eb4dc2d71c5", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "f20d2071-15c9-4715-b0b7-8eb4dc2d71c5", "description": null, "tags": [], "created_at": "2020-11-06T18:21:43Z", "updated_at": "2020-11-06T18:21:43Z", "revision_number": 0, "project_id": "6e04b324d2894105adf7d905e417a9e9"}, {"id": "4e9ff961-0bae-4300-95d5-89e9e5d4c468", "tenant_id": "6e04b324d2894105adf7d905e417a9e9", "security_group_id": "f20d2071-15c9-4715-b0b7-8eb4dc2d71c5", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:21:43Z", "updated_at": "2020-11-06T18:21:43Z", "revision_number": 0, "project_id": "6e04b324d2894105adf7d905e417a9e9"}, {"id": "a660cc5f-4160-4fba-8d7e-7b50b1c23d65", "tenant_id": "6e04b324d2894105adf7d905e417a9e9", "security_group_id": "f20d2071-15c9-4715-b0b7-8eb4dc2d71c5", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:21:43Z", "updated_at": "2020-11-06T18:21:43Z", "revision_number": 0, "project_id": "6e04b324d2894105adf7d905e417a9e9"}, {"id": "fedd6b07-ed05-48ee-8b75-e89aa88eb1ce", "tenant_id": "6e04b324d2894105adf7d905e417a9e9", "security_group_id": "f20d2071-15c9-4715-b0b7-8eb4dc2d71c5", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "f20d2071-15c9-4715-b0b7-8eb4dc2d71c5", "description": null, "tags": [], "created_at": "2020-11-06T18:21:43Z", "updated_at": "2020-11-06T18:21:43Z", "revision_number": 0, "project_id": "6e04b324d2894105adf7d905e417a9e9"}], "tags": [], "created_at": "2020-11-06T18:21:43Z", "updated_at": "2020-11-06T18:21:43Z", "revision_number": 1, "project_id": "6e04b324d2894105adf7d905e417a9e9"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:43.285 39 INFO tempest.lib.common.rest_client [req-22a03c77-7449-44e5-89a7-27f0f3c25003 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/f20d2071-15c9-4715-b0b7-8eb4dc2d71c5 0.131s 2020-11-06 18:21:43.286 39 DEBUG tempest.lib.common.rest_client [req-22a03c77-7449-44e5-89a7-27f0f3c25003 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-22a03c77-7449-44e5-89a7-27f0f3c25003', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:21:43 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/f20d2071-15c9-4715-b0b7-8eb4dc2d71c5'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:43.409 39 INFO tempest.lib.common.rest_client [req-6109db19-eb18-4e26-8131-fd0ffb45abcc ] Request (PolicyMinimumBandwidthRuleExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/6e04b324d2894105adf7d905e417a9e9 0.121s 2020-11-06 18:21:43.409 39 DEBUG tempest.lib.common.rest_client [req-6109db19-eb18-4e26-8131-fd0ffb45abcc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6109db19-eb18-4e26-8131-fd0ffb45abcc', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6e04b324d2894105adf7d905e417a9e9'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:43.507 39 INFO tempest.lib.common.rest_client [req-7ed7ae56-fba9-4ac4-b1b7-067e2d7835ce ] Request (QosExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-11-06 18:21:43.508 39 DEBUG tempest.lib.common.rest_client [req-7ed7ae56-fba9-4ac4-b1b7-067e2d7835ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7ed7ae56-fba9-4ac4-b1b7-067e2d7835ce', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["vS7y9lyVQWWsuZNlLRZZwA"], "expires_at": "2020-11-06T19:21:43.000000Z", "issued_at": "2020-11-06T18:21:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:43.551 39 INFO tempest.lib.common.rest_client [req-aa1c693d-63d7-4db2-9466-e38776451599 ] Request (QosExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:21:43.552 39 DEBUG tempest.lib.common.rest_client [req-aa1c693d-63d7-4db2-9466-e38776451599 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aa1c693d-63d7-4db2-9466-e38776451599', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["cxdpwvnWQMu3eJIcid4o8w"], "expires_at": "2020-11-06T19:21:43.000000Z", "issued_at": "2020-11-06T18:21:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:43.603 39 INFO tempest.lib.common.rest_client [req-f52dcae8-b619-4f0f-a675-a9ccd5bd4046 ] Request (QosExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.050s 2020-11-06 18:21:43.604 39 DEBUG tempest.lib.common.rest_client [req-f52dcae8-b619-4f0f-a675-a9ccd5bd4046 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f52dcae8-b619-4f0f-a675-a9ccd5bd4046', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:43.668 39 INFO tempest.lib.common.rest_client [req-82cb5f32-a3b4-4af3-a3a8-330113974609 ] Request (QosExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.063s 2020-11-06 18:21:43.668 39 DEBUG tempest.lib.common.rest_client [req-82cb5f32-a3b4-4af3-a3a8-330113974609 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-QosExtRbacTest-1849928337-desc", "domain_id": "default", "name": "tempest-QosExtRbacTest-1849928337"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '366', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-82cb5f32-a3b4-4af3-a3a8-330113974609', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "0269a670b0d44e2eb30f5d1c3176448f", "name": "tempest-QosExtRbacTest-1849928337", "domain_id": "default", "description": "tempest-QosExtRbacTest-1849928337-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:43.780 39 INFO tempest.lib.common.rest_client [req-bebdf7fd-1d60-476d-8ac6-741fccd040fd ] Request (QosExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.111s 2020-11-06 18:21:43.781 39 DEBUG tempest.lib.common.rest_client [req-bebdf7fd-1d60-476d-8ac6-741fccd040fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-QosExtRbacTest-1849928337", "password": "N8@ZirFn*mT7*aG", "project_id": "0269a670b0d44e2eb30f5d1c3176448f", "email": "tempest-QosExtRbacTest-252578548@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '383', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bebdf7fd-1d60-476d-8ac6-741fccd040fd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "0269a670b0d44e2eb30f5d1c3176448f", "email": "tempest-QosExtRbacTest-252578548@example.com", "id": "02aa495a76054e0cb86bfac9f0d039e1", "name": "tempest-QosExtRbacTest-1849928337", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/02aa495a76054e0cb86bfac9f0d039e1"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:43.840 39 INFO tempest.lib.common.rest_client [req-32138ffa-daae-43f6-bc1b-7482a9580f2a ] Request (QosExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.058s 2020-11-06 18:21:43.841 39 DEBUG tempest.lib.common.rest_client [req-32138ffa-daae-43f6-bc1b-7482a9580f2a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-32138ffa-daae-43f6-bc1b-7482a9580f2a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:43.895 39 INFO tempest.lib.common.rest_client [req-cced0d63-1f1d-4bd5-be59-508a2346fdcb ] Request (QosExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.052s 2020-11-06 18:21:43.896 39 DEBUG tempest.lib.common.rest_client [req-cced0d63-1f1d-4bd5-be59-508a2346fdcb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cced0d63-1f1d-4bd5-be59-508a2346fdcb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:43.963 39 INFO tempest.lib.common.rest_client [req-5560b89e-2623-4435-9a86-be2b827eb27c ] Request (QosExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles/72a4576c553448cd941b052c1ca0cf2d 0.066s 2020-11-06 18:21:43.964 39 DEBUG tempest.lib.common.rest_client [req-5560b89e-2623-4435-9a86-be2b827eb27c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5560b89e-2623-4435-9a86-be2b827eb27c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:43.964 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-QosExtRbacTest-1849928337', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '0269a670b0d44e2eb30f5d1c3176448f', 'project_name': 'tempest-QosExtRbacTest-1849928337', 'tenant_id': '0269a670b0d44e2eb30f5d1c3176448f', 'tenant_name': 'tempest-QosExtRbacTest-1849928337', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '02aa495a76054e0cb86bfac9f0d039e1'}, Network: None, Subnet: None, Router: None 2020-11-06 18:21:43.965 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-QosExtRbacTest-1849928337', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '0269a670b0d44e2eb30f5d1c3176448f', 'project_name': 'tempest-QosExtRbacTest-1849928337', 'tenant_id': '0269a670b0d44e2eb30f5d1c3176448f', 'tenant_name': 'tempest-QosExtRbacTest-1849928337', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '02aa495a76054e0cb86bfac9f0d039e1'}, Network: None, Subnet: None, Router: None 2020-11-06 18:21:44.090 39 INFO tempest.lib.common.rest_client [req-5b38a924-d8e5-4d1b-af11-459094495f3d ] Request (QosExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.113s 2020-11-06 18:21:44.090 39 DEBUG tempest.lib.common.rest_client [req-5b38a924-d8e5-4d1b-af11-459094495f3d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6559', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5b38a924-d8e5-4d1b-af11-459094495f3d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "02aa495a76054e0cb86bfac9f0d039e1", "name": "tempest-QosExtRbacTest-1849928337", "password_expires_at": null}, "audit_ids": ["wENwYJ_LTDKuSrDd_1ySrQ"], "expires_at": "2020-11-06T19:21:44.000000Z", "issued_at": "2020-11-06T18:21:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0269a670b0d44e2eb30f5d1c3176448f", "name": "tempest-QosExtRbacTest-1849928337"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/im _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:44.091 39 WARNING tempest.manager [-] tempest.manager.Manager is not a stable interface and as such it should not be imported directly. It will be removed as soon as the client manager becomes available in tempest.lib. 2020-11-06 18:21:44.190 39 INFO tempest.lib.common.rest_client [req-bfe81ab0-1931-4fe4-9695-490bfe514e95 ] Request (QosExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-11-06 18:21:44.191 39 DEBUG tempest.lib.common.rest_client [req-bfe81ab0-1931-4fe4-9695-490bfe514e95 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bfe81ab0-1931-4fe4-9695-490bfe514e95', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["MOergm7lQWecSH9JoTZiaw"], "expires_at": "2020-11-06T19:21:44.000000Z", "issued_at": "2020-11-06T18:21:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:44.241 39 INFO tempest.lib.common.rest_client [req-eea18f4d-a5a5-475a-9dde-1225be496f99 ] Request (QosExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:21:44.241 39 DEBUG tempest.lib.common.rest_client [req-eea18f4d-a5a5-475a-9dde-1225be496f99 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eea18f4d-a5a5-475a-9dde-1225be496f99', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["pErfVS-NSrOH-W9zY9Q_wQ"], "expires_at": "2020-11-06T19:21:44.000000Z", "issued_at": "2020-11-06T18:21:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:44.304 39 INFO tempest.lib.common.rest_client [req-dd03ee1b-f169-4595-83bb-d8ee606b6ed1 ] Request (QosExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.062s 2020-11-06 18:21:44.305 39 DEBUG tempest.lib.common.rest_client [req-dd03ee1b-f169-4595-83bb-d8ee606b6ed1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dd03ee1b-f169-4595-83bb-d8ee606b6ed1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:44.364 39 INFO tempest.lib.common.rest_client [req-f55a9044-90b9-4583-b823-2fe49b503233 ] Request (QosExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.058s 2020-11-06 18:21:44.365 39 DEBUG tempest.lib.common.rest_client [req-f55a9044-90b9-4583-b823-2fe49b503233 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f55a9044-90b9-4583-b823-2fe49b503233', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:44.365 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:21:44.366 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:44.418 39 INFO tempest.lib.common.rest_client [req-6c2ec685-f54e-4fe7-9776-a3915704f73c ] Request (QosExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles 0.051s 2020-11-06 18:21:44.419 39 DEBUG tempest.lib.common.rest_client [req-6c2ec685-f54e-4fe7-9776-a3915704f73c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6c2ec685-f54e-4fe7-9776-a3915704f73c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:44.479 39 INFO tempest.lib.common.rest_client [req-7466993a-1157-49e9-bc2c-6529d1d6a77f ] Request (QosExtRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles/72a4576c553448cd941b052c1ca0cf2d 0.059s 2020-11-06 18:21:44.480 39 DEBUG tempest.lib.common.rest_client [req-7466993a-1157-49e9-bc2c-6529d1d6a77f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7466993a-1157-49e9-bc2c-6529d1d6a77f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:44.584 39 INFO tempest.lib.common.rest_client [req-8274aaec-85df-425c-be26-d9cd2a5e2314 ] Request (QosExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles/a629c95d64b3416fb80ae90af4f69c05 0.103s 2020-11-06 18:21:44.585 39 DEBUG tempest.lib.common.rest_client [req-8274aaec-85df-425c-be26-d9cd2a5e2314 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8274aaec-85df-425c-be26-d9cd2a5e2314', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:45.699 39 INFO tempest.lib.common.rest_client [req-4d273f98-e6ca-424d-9730-3aa1968e6df6 ] Request (QosExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.112s 2020-11-06 18:21:45.699 39 DEBUG tempest.lib.common.rest_client [req-4d273f98-e6ca-424d-9730-3aa1968e6df6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4d273f98-e6ca-424d-9730-3aa1968e6df6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "02aa495a76054e0cb86bfac9f0d039e1", "name": "tempest-QosExtRbacTest-1849928337", "password_expires_at": null}, "audit_ids": ["J3NvAmOWTuGumyb48V9vCA"], "expires_at": "2020-11-06T19:21:45.000000Z", "issued_at": "2020-11-06T18:21:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0269a670b0d44e2eb30f5d1c3176448f", "name": "tempest-QosExtRbacTest-1849928337"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:45.738 39 INFO tempest.lib.common.rest_client [req-ac1c59e1-1db4-4c2c-b327-6b7cc1dd0ab0 ] Request (QosExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:21:45.738 39 DEBUG tempest.lib.common.rest_client [req-ac1c59e1-1db4-4c2c-b327-6b7cc1dd0ab0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ac1c59e1-1db4-4c2c-b327-6b7cc1dd0ab0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "02aa495a76054e0cb86bfac9f0d039e1", "name": "tempest-QosExtRbacTest-1849928337", "password_expires_at": null}, "audit_ids": ["VV9QUtlvRo-2xnKViPUNvw"], "expires_at": "2020-11-06T19:21:45.000000Z", "issued_at": "2020-11-06T18:21:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0269a670b0d44e2eb30f5d1c3176448f", "name": "tempest-QosExtRbacTest-1849928337"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:46.242 39 INFO tempest.lib.common.rest_client [req-826dc928-f188-45f7-9956-38f82aba4b49 ] Request (QosExtRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.502s 2020-11-06 18:21:46.243 39 DEBUG tempest.lib.common.rest_client [req-826dc928-f188-45f7-9956-38f82aba4b49 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-QosExtRbacTest-test-network-436998245"}} Response - Headers: {'content-type': 'application/json', 'content-length': '734', 'x-openstack-request-id': 'req-826dc928-f188-45f7-9956-38f82aba4b49', 'date': 'Fri, 06 Nov 2020 18:21:46 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"518ec38a-8612-41b3-b7b8-c3ac2c9ea43b","name":"tempest-QosExtRbacTest-test-network-436998245","tenant_id":"0269a670b0d44e2eb30f5d1c3176448f","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"0269a670b0d44e2eb30f5d1c3176448f","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":45,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:21:46Z","updated_at":"2020-11-06T18:21:46Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:46.244 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:46.247 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_policy, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:46.248 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:46.357 39 INFO tempest.lib.common.rest_client [req-a0bcba38-9d1d-4927-8049-61411132d363 ] Request (QosExtRbacTest:test_create_policy): 200 GET http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles 0.108s 2020-11-06 18:21:46.357 39 DEBUG tempest.lib.common.rest_client [req-a0bcba38-9d1d-4927-8049-61411132d363 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a0bcba38-9d1d-4927-8049-61411132d363', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:46.393 39 INFO tempest.lib.common.rest_client [req-644a83b6-f916-49e7-8279-ffd1ee539333 ] Request (QosExtRbacTest:test_create_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:21:46.394 39 DEBUG tempest.lib.common.rest_client [req-644a83b6-f916-49e7-8279-ffd1ee539333 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-644a83b6-f916-49e7-8279-ffd1ee539333', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "02aa495a76054e0cb86bfac9f0d039e1", "name": "tempest-QosExtRbacTest-1849928337", "password_expires_at": null}, "audit_ids": ["NNbk95xhSXaaKAR57aqT4w"], "expires_at": "2020-11-06T19:21:46.000000Z", "issued_at": "2020-11-06T18:21:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0269a670b0d44e2eb30f5d1c3176448f", "name": "tempest-QosExtRbacTest-1849928337"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:46.429 39 INFO tempest.lib.common.rest_client [req-8015f3c1-d172-4c7f-ab01-7310ab20a23c ] Request (QosExtRbacTest:test_create_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:21:46.429 39 DEBUG tempest.lib.common.rest_client [req-8015f3c1-d172-4c7f-ab01-7310ab20a23c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8015f3c1-d172-4c7f-ab01-7310ab20a23c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "02aa495a76054e0cb86bfac9f0d039e1", "name": "tempest-QosExtRbacTest-1849928337", "password_expires_at": null}, "audit_ids": ["khYARqHrSs-vqI3jWFtwuQ"], "expires_at": "2020-11-06T19:21:46.000000Z", "issued_at": "2020-11-06T18:21:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0269a670b0d44e2eb30f5d1c3176448f", "name": "tempest-QosExtRbacTest-1849928337"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:46.532 39 INFO tempest.lib.common.rest_client [req-033a89ef-1d48-4b8b-af93-68139108debc ] Request (QosExtRbacTest:test_create_policy): 201 POST http://172.30.13.94:9696/v2.0/qos/policies 0.101s 2020-11-06 18:21:46.533 39 DEBUG tempest.lib.common.rest_client [req-033a89ef-1d48-4b8b-af93-68139108debc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"policy": {"name": "tempest-QosExtRbacTest-43531867", "shared": false, "is_default": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '380', 'x-openstack-request-id': 'req-033a89ef-1d48-4b8b-af93-68139108debc', 'date': 'Fri, 06 Nov 2020 18:21:46 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies'} Body: b'{"policy": {"id": "a2a3ce75-a825-48f5-8577-3d08e755362f", "project_id": "0269a670b0d44e2eb30f5d1c3176448f", "name": "tempest-QosExtRbacTest-43531867", "shared": false, "rules": [], "is_default": false, "revision_number": 0, "description": "", "created_at": "2020-11-06T18:21:46Z", "updated_at": "2020-11-06T18:21:46Z", "tenant_id": "0269a670b0d44e2eb30f5d1c3176448f", "tags": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:46.533 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:46.584 39 INFO tempest.lib.common.rest_client [req-6b518333-cc79-4d20-930f-bd178f990f7c ] Request (QosExtRbacTest:test_create_policy): 200 GET http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles 0.050s 2020-11-06 18:21:46.585 39 DEBUG tempest.lib.common.rest_client [req-6b518333-cc79-4d20-930f-bd178f990f7c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6b518333-cc79-4d20-930f-bd178f990f7c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:46.622 39 INFO tempest.lib.common.rest_client [req-61d5d307-471a-4614-bb42-aa6115d019e5 ] Request (QosExtRbacTest:test_create_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:21:46.623 39 DEBUG tempest.lib.common.rest_client [req-61d5d307-471a-4614-bb42-aa6115d019e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-61d5d307-471a-4614-bb42-aa6115d019e5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "02aa495a76054e0cb86bfac9f0d039e1", "name": "tempest-QosExtRbacTest-1849928337", "password_expires_at": null}, "audit_ids": ["h06Uo0xvSLmV50osP0zBsA"], "expires_at": "2020-11-06T19:21:46.000000Z", "issued_at": "2020-11-06T18:21:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0269a670b0d44e2eb30f5d1c3176448f", "name": "tempest-QosExtRbacTest-1849928337"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:46.661 39 INFO tempest.lib.common.rest_client [req-2f3e93e2-3862-4a64-8c59-665114a04d1e ] Request (QosExtRbacTest:test_create_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:21:46.662 39 DEBUG tempest.lib.common.rest_client [req-2f3e93e2-3862-4a64-8c59-665114a04d1e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2f3e93e2-3862-4a64-8c59-665114a04d1e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "02aa495a76054e0cb86bfac9f0d039e1", "name": "tempest-QosExtRbacTest-1849928337", "password_expires_at": null}, "audit_ids": ["e7RvUWhqRCGd6NSU5aRHAA"], "expires_at": "2020-11-06T19:21:46.000000Z", "issued_at": "2020-11-06T18:21:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0269a670b0d44e2eb30f5d1c3176448f", "name": "tempest-QosExtRbacTest-1849928337"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:46.794 39 INFO tempest.lib.common.rest_client [req-f303db6b-bf35-487c-8959-34bc143bf627 ] Request (QosExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/a2a3ce75-a825-48f5-8577-3d08e755362f 0.130s 2020-11-06 18:21:46.794 39 DEBUG tempest.lib.common.rest_client [req-f303db6b-bf35-487c-8959-34bc143bf627 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-f303db6b-bf35-487c-8959-34bc143bf627', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:21:46 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/a2a3ce75-a825-48f5-8577-3d08e755362f'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:46.796 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:46.798 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_policy, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:46.799 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:46.801 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_policy, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:46.833 39 INFO tempest.lib.common.rest_client [req-f5c1df79-a209-4a81-af2d-5fb74e0b03e4 ] Request (QosExtRbacTest:test_delete_policy): 201 POST http://172.30.13.94:9696/v2.0/qos/policies 0.031s 2020-11-06 18:21:46.833 39 DEBUG tempest.lib.common.rest_client [req-f5c1df79-a209-4a81-af2d-5fb74e0b03e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"policy": {"name": "tempest-QosExtRbacTest-180719632", "shared": false, "is_default": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '381', 'x-openstack-request-id': 'req-f5c1df79-a209-4a81-af2d-5fb74e0b03e4', 'date': 'Fri, 06 Nov 2020 18:21:46 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies'} Body: b'{"policy": {"id": "8525b9bc-c4fc-45a0-afc4-c04c9cbd020b", "project_id": "0269a670b0d44e2eb30f5d1c3176448f", "name": "tempest-QosExtRbacTest-180719632", "shared": false, "rules": [], "is_default": false, "revision_number": 0, "description": "", "created_at": "2020-11-06T18:21:46Z", "updated_at": "2020-11-06T18:21:46Z", "tenant_id": "0269a670b0d44e2eb30f5d1c3176448f", "tags": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:46.834 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:46.889 39 INFO tempest.lib.common.rest_client [req-52356b06-b8c2-4fd0-82c4-734c3ac4d498 ] Request (QosExtRbacTest:test_delete_policy): 200 GET http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles 0.054s 2020-11-06 18:21:46.890 39 DEBUG tempest.lib.common.rest_client [req-52356b06-b8c2-4fd0-82c4-734c3ac4d498 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-52356b06-b8c2-4fd0-82c4-734c3ac4d498', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:46.924 39 INFO tempest.lib.common.rest_client [req-dc57f89c-6853-4b62-a445-53ae9be04bf1 ] Request (QosExtRbacTest:test_delete_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:21:46.925 39 DEBUG tempest.lib.common.rest_client [req-dc57f89c-6853-4b62-a445-53ae9be04bf1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dc57f89c-6853-4b62-a445-53ae9be04bf1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "02aa495a76054e0cb86bfac9f0d039e1", "name": "tempest-QosExtRbacTest-1849928337", "password_expires_at": null}, "audit_ids": ["a38OgraFSlKILKij_2kiQg"], "expires_at": "2020-11-06T19:21:46.000000Z", "issued_at": "2020-11-06T18:21:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0269a670b0d44e2eb30f5d1c3176448f", "name": "tempest-QosExtRbacTest-1849928337"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:46.957 39 INFO tempest.lib.common.rest_client [req-b6035c37-aa5e-4e27-8081-4136dfbdf93d ] Request (QosExtRbacTest:test_delete_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:21:46.958 39 DEBUG tempest.lib.common.rest_client [req-b6035c37-aa5e-4e27-8081-4136dfbdf93d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b6035c37-aa5e-4e27-8081-4136dfbdf93d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "02aa495a76054e0cb86bfac9f0d039e1", "name": "tempest-QosExtRbacTest-1849928337", "password_expires_at": null}, "audit_ids": ["yE9NiwrESNm_Mlmw6v91wA"], "expires_at": "2020-11-06T19:21:46.000000Z", "issued_at": "2020-11-06T18:21:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0269a670b0d44e2eb30f5d1c3176448f", "name": "tempest-QosExtRbacTest-1849928337"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:47.104 39 INFO tempest.lib.common.rest_client [req-c1749cc3-67f1-479a-a719-a10d89443d25 ] Request (QosExtRbacTest:test_delete_policy): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/8525b9bc-c4fc-45a0-afc4-c04c9cbd020b 0.145s 2020-11-06 18:21:47.105 39 DEBUG tempest.lib.common.rest_client [req-c1749cc3-67f1-479a-a719-a10d89443d25 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-c1749cc3-67f1-479a-a719-a10d89443d25', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:21:47 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/8525b9bc-c4fc-45a0-afc4-c04c9cbd020b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:47.105 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:47.157 39 INFO tempest.lib.common.rest_client [req-c463a28c-4205-4e18-b5bf-26b3fd140feb ] Request (QosExtRbacTest:test_delete_policy): 200 GET http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles 0.051s 2020-11-06 18:21:47.157 39 DEBUG tempest.lib.common.rest_client [req-c463a28c-4205-4e18-b5bf-26b3fd140feb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c463a28c-4205-4e18-b5bf-26b3fd140feb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:47.193 39 INFO tempest.lib.common.rest_client [req-3255f1dd-d663-4d76-9bab-c5bf82a5c303 ] Request (QosExtRbacTest:test_delete_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:21:47.194 39 DEBUG tempest.lib.common.rest_client [req-3255f1dd-d663-4d76-9bab-c5bf82a5c303 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3255f1dd-d663-4d76-9bab-c5bf82a5c303', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "02aa495a76054e0cb86bfac9f0d039e1", "name": "tempest-QosExtRbacTest-1849928337", "password_expires_at": null}, "audit_ids": ["m4-kf5tmRc2xRtAaV1hgtg"], "expires_at": "2020-11-06T19:21:47.000000Z", "issued_at": "2020-11-06T18:21:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0269a670b0d44e2eb30f5d1c3176448f", "name": "tempest-QosExtRbacTest-1849928337"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:47.229 39 INFO tempest.lib.common.rest_client [req-d24bfe9f-929a-4301-ac05-8772716fd6dc ] Request (QosExtRbacTest:test_delete_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:21:47.229 39 DEBUG tempest.lib.common.rest_client [req-d24bfe9f-929a-4301-ac05-8772716fd6dc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d24bfe9f-929a-4301-ac05-8772716fd6dc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "02aa495a76054e0cb86bfac9f0d039e1", "name": "tempest-QosExtRbacTest-1849928337", "password_expires_at": null}, "audit_ids": ["oP5_Cua7SgeORklMTQvwSw"], "expires_at": "2020-11-06T19:21:47.000000Z", "issued_at": "2020-11-06T18:21:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0269a670b0d44e2eb30f5d1c3176448f", "name": "tempest-QosExtRbacTest-1849928337"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:47.353 39 INFO tempest.lib.common.rest_client [req-8a2e498b-983a-47bf-a4be-218aeaec1aa2 ] Request (QosExtRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94:9696/v2.0/qos/policies/8525b9bc-c4fc-45a0-afc4-c04c9cbd020b 0.122s 2020-11-06 18:21:47.353 39 DEBUG tempest.lib.common.rest_client [req-8a2e498b-983a-47bf-a4be-218aeaec1aa2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '143', 'x-openstack-request-id': 'req-8a2e498b-983a-47bf-a4be-218aeaec1aa2', 'date': 'Fri, 06 Nov 2020 18:21:47 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/8525b9bc-c4fc-45a0-afc4-c04c9cbd020b'} Body: b'{"NeutronError": {"type": "QosPolicyNotFound", "message": "QoS policy 8525b9bc-c4fc-45a0-afc4-c04c9cbd020b could not be found.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:47.355 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:47.358 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_policy, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:47.393 39 INFO tempest.lib.common.rest_client [req-9cb868e4-29a6-414b-8600-b589c8bf1b08 ] Request (QosExtRbacTest:test_get_policy): 201 POST http://172.30.13.94:9696/v2.0/qos/policies 0.035s 2020-11-06 18:21:47.394 39 DEBUG tempest.lib.common.rest_client [req-9cb868e4-29a6-414b-8600-b589c8bf1b08 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"policy": {"name": "tempest-QosExtRbacTest-1747645018", "shared": false, "is_default": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '382', 'x-openstack-request-id': 'req-9cb868e4-29a6-414b-8600-b589c8bf1b08', 'date': 'Fri, 06 Nov 2020 18:21:47 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies'} Body: b'{"policy": {"id": "d5e9b32e-2092-4106-b02e-3abce228fb9b", "project_id": "0269a670b0d44e2eb30f5d1c3176448f", "name": "tempest-QosExtRbacTest-1747645018", "shared": false, "rules": [], "is_default": false, "revision_number": 0, "description": "", "created_at": "2020-11-06T18:21:47Z", "updated_at": "2020-11-06T18:21:47Z", "tenant_id": "0269a670b0d44e2eb30f5d1c3176448f", "tags": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:47.394 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:47.450 39 INFO tempest.lib.common.rest_client [req-7d8e7237-4562-47f4-ad6e-27d3552c7b95 ] Request (QosExtRbacTest:test_get_policy): 200 GET http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles 0.055s 2020-11-06 18:21:47.450 39 DEBUG tempest.lib.common.rest_client [req-7d8e7237-4562-47f4-ad6e-27d3552c7b95 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7d8e7237-4562-47f4-ad6e-27d3552c7b95', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:47.486 39 INFO tempest.lib.common.rest_client [req-c2a8cc42-80d7-48e8-9834-38e09143650a ] Request (QosExtRbacTest:test_get_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:21:47.486 39 DEBUG tempest.lib.common.rest_client [req-c2a8cc42-80d7-48e8-9834-38e09143650a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c2a8cc42-80d7-48e8-9834-38e09143650a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "02aa495a76054e0cb86bfac9f0d039e1", "name": "tempest-QosExtRbacTest-1849928337", "password_expires_at": null}, "audit_ids": ["QWPypEOLTTKY67mBE936gw"], "expires_at": "2020-11-06T19:21:47.000000Z", "issued_at": "2020-11-06T18:21:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0269a670b0d44e2eb30f5d1c3176448f", "name": "tempest-QosExtRbacTest-1849928337"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:47.519 39 INFO tempest.lib.common.rest_client [req-04dffdac-5520-4c01-896a-3db527783cc6 ] Request (QosExtRbacTest:test_get_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:21:47.519 39 DEBUG tempest.lib.common.rest_client [req-04dffdac-5520-4c01-896a-3db527783cc6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-04dffdac-5520-4c01-896a-3db527783cc6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "02aa495a76054e0cb86bfac9f0d039e1", "name": "tempest-QosExtRbacTest-1849928337", "password_expires_at": null}, "audit_ids": ["9aJv69XPTqyPh3xWV4ozeA"], "expires_at": "2020-11-06T19:21:47.000000Z", "issued_at": "2020-11-06T18:21:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0269a670b0d44e2eb30f5d1c3176448f", "name": "tempest-QosExtRbacTest-1849928337"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:47.649 39 INFO tempest.lib.common.rest_client [req-3eb7b13b-4458-4f01-ae16-823363961106 ] Request (QosExtRbacTest:test_get_policy): 200 GET http://172.30.13.94:9696/v2.0/qos/policies/d5e9b32e-2092-4106-b02e-3abce228fb9b 0.128s 2020-11-06 18:21:47.650 39 DEBUG tempest.lib.common.rest_client [req-3eb7b13b-4458-4f01-ae16-823363961106 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '382', 'x-openstack-request-id': 'req-3eb7b13b-4458-4f01-ae16-823363961106', 'date': 'Fri, 06 Nov 2020 18:21:47 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/d5e9b32e-2092-4106-b02e-3abce228fb9b'} Body: b'{"policy": {"id": "d5e9b32e-2092-4106-b02e-3abce228fb9b", "project_id": "0269a670b0d44e2eb30f5d1c3176448f", "name": "tempest-QosExtRbacTest-1747645018", "shared": false, "rules": [], "is_default": false, "revision_number": 0, "description": "", "created_at": "2020-11-06T18:21:47Z", "updated_at": "2020-11-06T18:21:47Z", "tenant_id": "0269a670b0d44e2eb30f5d1c3176448f", "tags": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:47.650 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:47.704 39 INFO tempest.lib.common.rest_client [req-982c9569-9db1-42e8-837e-63b21ba7bbdd ] Request (QosExtRbacTest:test_get_policy): 200 GET http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles 0.053s 2020-11-06 18:21:47.705 39 DEBUG tempest.lib.common.rest_client [req-982c9569-9db1-42e8-837e-63b21ba7bbdd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-982c9569-9db1-42e8-837e-63b21ba7bbdd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:47.747 39 INFO tempest.lib.common.rest_client [req-e6ffc0bc-82d6-4646-bf93-bd7793004c18 ] Request (QosExtRbacTest:test_get_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-11-06 18:21:47.748 39 DEBUG tempest.lib.common.rest_client [req-e6ffc0bc-82d6-4646-bf93-bd7793004c18 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e6ffc0bc-82d6-4646-bf93-bd7793004c18', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "02aa495a76054e0cb86bfac9f0d039e1", "name": "tempest-QosExtRbacTest-1849928337", "password_expires_at": null}, "audit_ids": ["He8r4Cl6TF2cyJK1VbiNAQ"], "expires_at": "2020-11-06T19:21:47.000000Z", "issued_at": "2020-11-06T18:21:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0269a670b0d44e2eb30f5d1c3176448f", "name": "tempest-QosExtRbacTest-1849928337"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:47.785 39 INFO tempest.lib.common.rest_client [req-88369360-b6a8-46fa-9822-446366771318 ] Request (QosExtRbacTest:test_get_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:21:47.785 39 DEBUG tempest.lib.common.rest_client [req-88369360-b6a8-46fa-9822-446366771318 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-88369360-b6a8-46fa-9822-446366771318', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "02aa495a76054e0cb86bfac9f0d039e1", "name": "tempest-QosExtRbacTest-1849928337", "password_expires_at": null}, "audit_ids": ["0Peb6w21TKCL3H8Op1NCcg"], "expires_at": "2020-11-06T19:21:47.000000Z", "issued_at": "2020-11-06T18:21:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0269a670b0d44e2eb30f5d1c3176448f", "name": "tempest-QosExtRbacTest-1849928337"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:47.914 39 INFO tempest.lib.common.rest_client [req-dbf9fb34-6164-4c6b-97f3-b8b36e767396 ] Request (QosExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/d5e9b32e-2092-4106-b02e-3abce228fb9b 0.127s 2020-11-06 18:21:47.915 39 DEBUG tempest.lib.common.rest_client [req-dbf9fb34-6164-4c6b-97f3-b8b36e767396 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-dbf9fb34-6164-4c6b-97f3-b8b36e767396', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:21:47 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/d5e9b32e-2092-4106-b02e-3abce228fb9b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:47.918 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:47.923 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_policy, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:47.956 39 INFO tempest.lib.common.rest_client [req-f2982de3-68ad-4347-b8f0-6a8e585af09f ] Request (QosExtRbacTest:test_list_policies): 201 POST http://172.30.13.94:9696/v2.0/qos/policies 0.032s 2020-11-06 18:21:47.956 39 DEBUG tempest.lib.common.rest_client [req-f2982de3-68ad-4347-b8f0-6a8e585af09f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"policy": {"name": "tempest-QosExtRbacTest-262060581", "shared": false, "is_default": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '381', 'x-openstack-request-id': 'req-f2982de3-68ad-4347-b8f0-6a8e585af09f', 'date': 'Fri, 06 Nov 2020 18:21:47 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies'} Body: b'{"policy": {"id": "b6457e73-510b-4884-8de0-bff5f6916401", "project_id": "0269a670b0d44e2eb30f5d1c3176448f", "name": "tempest-QosExtRbacTest-262060581", "shared": false, "rules": [], "is_default": false, "revision_number": 0, "description": "", "created_at": "2020-11-06T18:21:47Z", "updated_at": "2020-11-06T18:21:47Z", "tenant_id": "0269a670b0d44e2eb30f5d1c3176448f", "tags": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:47.957 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:48.011 39 INFO tempest.lib.common.rest_client [req-d49eb10b-8ade-42cb-8359-4aceaa42b1ee ] Request (QosExtRbacTest:test_list_policies): 200 GET http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles 0.053s 2020-11-06 18:21:48.012 39 DEBUG tempest.lib.common.rest_client [req-d49eb10b-8ade-42cb-8359-4aceaa42b1ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d49eb10b-8ade-42cb-8359-4aceaa42b1ee', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:48.046 39 INFO tempest.lib.common.rest_client [req-57d74bd6-b8bd-4b55-a568-2dbef9359852 ] Request (QosExtRbacTest:test_list_policies): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:21:48.047 39 DEBUG tempest.lib.common.rest_client [req-57d74bd6-b8bd-4b55-a568-2dbef9359852 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-57d74bd6-b8bd-4b55-a568-2dbef9359852', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "02aa495a76054e0cb86bfac9f0d039e1", "name": "tempest-QosExtRbacTest-1849928337", "password_expires_at": null}, "audit_ids": ["sLNTEwb5TTCXiuSAzktmjg"], "expires_at": "2020-11-06T19:21:48.000000Z", "issued_at": "2020-11-06T18:21:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0269a670b0d44e2eb30f5d1c3176448f", "name": "tempest-QosExtRbacTest-1849928337"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:48.082 39 INFO tempest.lib.common.rest_client [req-98e582f8-1569-4212-9f52-479104a55d4f ] Request (QosExtRbacTest:test_list_policies): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:21:48.083 39 DEBUG tempest.lib.common.rest_client [req-98e582f8-1569-4212-9f52-479104a55d4f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-98e582f8-1569-4212-9f52-479104a55d4f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "02aa495a76054e0cb86bfac9f0d039e1", "name": "tempest-QosExtRbacTest-1849928337", "password_expires_at": null}, "audit_ids": ["NE_9QKKBQNiYWRq4w-exbQ"], "expires_at": "2020-11-06T19:21:48.000000Z", "issued_at": "2020-11-06T18:21:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0269a670b0d44e2eb30f5d1c3176448f", "name": "tempest-QosExtRbacTest-1849928337"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:48.191 39 INFO tempest.lib.common.rest_client [req-7313db13-9274-4025-a9fa-6779e8967280 ] Request (QosExtRbacTest:test_list_policies): 200 GET http://172.30.13.94:9696/v2.0/qos/policies?id=b6457e73-510b-4884-8de0-bff5f6916401 0.107s 2020-11-06 18:21:48.192 39 DEBUG tempest.lib.common.rest_client [req-7313db13-9274-4025-a9fa-6779e8967280 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '385', 'x-openstack-request-id': 'req-7313db13-9274-4025-a9fa-6779e8967280', 'date': 'Fri, 06 Nov 2020 18:21:48 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies?id=b6457e73-510b-4884-8de0-bff5f6916401'} Body: b'{"policies": [{"id": "b6457e73-510b-4884-8de0-bff5f6916401", "project_id": "0269a670b0d44e2eb30f5d1c3176448f", "name": "tempest-QosExtRbacTest-262060581", "shared": false, "rules": [], "is_default": false, "revision_number": 0, "description": "", "created_at": "2020-11-06T18:21:47Z", "updated_at": "2020-11-06T18:21:47Z", "tenant_id": "0269a670b0d44e2eb30f5d1c3176448f", "tags": []}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:48.193 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:48.247 39 INFO tempest.lib.common.rest_client [req-5e681dc4-75f8-49fd-b541-d030b26e3b31 ] Request (QosExtRbacTest:test_list_policies): 200 GET http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles 0.053s 2020-11-06 18:21:48.247 39 DEBUG tempest.lib.common.rest_client [req-5e681dc4-75f8-49fd-b541-d030b26e3b31 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5e681dc4-75f8-49fd-b541-d030b26e3b31', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:48.287 39 INFO tempest.lib.common.rest_client [req-c701efbe-8821-427e-bfb1-aca68877819a ] Request (QosExtRbacTest:test_list_policies): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:21:48.287 39 DEBUG tempest.lib.common.rest_client [req-c701efbe-8821-427e-bfb1-aca68877819a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c701efbe-8821-427e-bfb1-aca68877819a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "02aa495a76054e0cb86bfac9f0d039e1", "name": "tempest-QosExtRbacTest-1849928337", "password_expires_at": null}, "audit_ids": ["UmV5i467Rh6alb0UdMSj5Q"], "expires_at": "2020-11-06T19:21:48.000000Z", "issued_at": "2020-11-06T18:21:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0269a670b0d44e2eb30f5d1c3176448f", "name": "tempest-QosExtRbacTest-1849928337"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:48.323 39 INFO tempest.lib.common.rest_client [req-7c420703-bf0f-4b2d-af23-5d3f9c85f24e ] Request (QosExtRbacTest:test_list_policies): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:21:48.324 39 DEBUG tempest.lib.common.rest_client [req-7c420703-bf0f-4b2d-af23-5d3f9c85f24e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7c420703-bf0f-4b2d-af23-5d3f9c85f24e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "02aa495a76054e0cb86bfac9f0d039e1", "name": "tempest-QosExtRbacTest-1849928337", "password_expires_at": null}, "audit_ids": ["Lxe3yWolTaGpCC6dr_C13g"], "expires_at": "2020-11-06T19:21:48.000000Z", "issued_at": "2020-11-06T18:21:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0269a670b0d44e2eb30f5d1c3176448f", "name": "tempest-QosExtRbacTest-1849928337"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:48.462 39 INFO tempest.lib.common.rest_client [req-6fe6f8d6-ded5-4f8b-94ad-7a0123cd9c6d ] Request (QosExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/b6457e73-510b-4884-8de0-bff5f6916401 0.136s 2020-11-06 18:21:48.462 39 DEBUG tempest.lib.common.rest_client [req-6fe6f8d6-ded5-4f8b-94ad-7a0123cd9c6d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-6fe6f8d6-ded5-4f8b-94ad-7a0123cd9c6d', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:21:48 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/b6457e73-510b-4884-8de0-bff5f6916401'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:48.464 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:48.467 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_policy, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:48.468 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:48.470 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_policy, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:48.512 39 INFO tempest.lib.common.rest_client [req-6de8531a-ca58-42cb-b30f-fdf6abf628c5 ] Request (QosExtRbacTest:test_update_policy): 201 POST http://172.30.13.94:9696/v2.0/qos/policies 0.041s 2020-11-06 18:21:48.513 39 DEBUG tempest.lib.common.rest_client [req-6de8531a-ca58-42cb-b30f-fdf6abf628c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"policy": {"name": "tempest-QosExtRbacTest-1984219570", "shared": false, "is_default": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '382', 'x-openstack-request-id': 'req-6de8531a-ca58-42cb-b30f-fdf6abf628c5', 'date': 'Fri, 06 Nov 2020 18:21:48 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies'} Body: b'{"policy": {"id": "f217d04d-183a-4d33-adb5-2d97aeb133a0", "project_id": "0269a670b0d44e2eb30f5d1c3176448f", "name": "tempest-QosExtRbacTest-1984219570", "shared": false, "rules": [], "is_default": false, "revision_number": 0, "description": "", "created_at": "2020-11-06T18:21:48Z", "updated_at": "2020-11-06T18:21:48Z", "tenant_id": "0269a670b0d44e2eb30f5d1c3176448f", "tags": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:48.513 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:48.563 39 INFO tempest.lib.common.rest_client [req-5915aabd-ac69-4013-9113-6d8631edb2c4 ] Request (QosExtRbacTest:test_update_policy): 200 GET http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles 0.049s 2020-11-06 18:21:48.564 39 DEBUG tempest.lib.common.rest_client [req-5915aabd-ac69-4013-9113-6d8631edb2c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5915aabd-ac69-4013-9113-6d8631edb2c4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:48.598 39 INFO tempest.lib.common.rest_client [req-2756bccb-bf33-455b-acb6-e788b34bf5b1 ] Request (QosExtRbacTest:test_update_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:21:48.598 39 DEBUG tempest.lib.common.rest_client [req-2756bccb-bf33-455b-acb6-e788b34bf5b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2756bccb-bf33-455b-acb6-e788b34bf5b1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "02aa495a76054e0cb86bfac9f0d039e1", "name": "tempest-QosExtRbacTest-1849928337", "password_expires_at": null}, "audit_ids": ["ptkmdfBkRwCzZOPI8XdnIQ"], "expires_at": "2020-11-06T19:21:48.000000Z", "issued_at": "2020-11-06T18:21:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0269a670b0d44e2eb30f5d1c3176448f", "name": "tempest-QosExtRbacTest-1849928337"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:48.636 39 INFO tempest.lib.common.rest_client [req-1150d1ae-2aa6-48ce-88be-a7e599553376 ] Request (QosExtRbacTest:test_update_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:21:48.637 39 DEBUG tempest.lib.common.rest_client [req-1150d1ae-2aa6-48ce-88be-a7e599553376 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1150d1ae-2aa6-48ce-88be-a7e599553376', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "02aa495a76054e0cb86bfac9f0d039e1", "name": "tempest-QosExtRbacTest-1849928337", "password_expires_at": null}, "audit_ids": ["6Dx8ysdaTSKgW23Robj_Gg"], "expires_at": "2020-11-06T19:21:48.000000Z", "issued_at": "2020-11-06T18:21:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0269a670b0d44e2eb30f5d1c3176448f", "name": "tempest-QosExtRbacTest-1849928337"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:48.790 39 INFO tempest.lib.common.rest_client [req-8f6b4396-fce8-44c4-a581-039a56bf0a04 ] Request (QosExtRbacTest:test_update_policy): 200 PUT http://172.30.13.94:9696/v2.0/qos/policies/f217d04d-183a-4d33-adb5-2d97aeb133a0 0.152s 2020-11-06 18:21:48.791 39 DEBUG tempest.lib.common.rest_client [req-8f6b4396-fce8-44c4-a581-039a56bf0a04 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"policy": {"description": "updated"}} Response - Headers: {'content-type': 'application/json', 'content-length': '389', 'x-openstack-request-id': 'req-8f6b4396-fce8-44c4-a581-039a56bf0a04', 'date': 'Fri, 06 Nov 2020 18:21:48 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/f217d04d-183a-4d33-adb5-2d97aeb133a0'} Body: b'{"policy": {"id": "f217d04d-183a-4d33-adb5-2d97aeb133a0", "project_id": "0269a670b0d44e2eb30f5d1c3176448f", "name": "tempest-QosExtRbacTest-1984219570", "shared": false, "rules": [], "is_default": false, "revision_number": 0, "description": "updated", "created_at": "2020-11-06T18:21:48Z", "updated_at": "2020-11-06T18:21:48Z", "tenant_id": "0269a670b0d44e2eb30f5d1c3176448f", "tags": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:48.791 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:48.848 39 INFO tempest.lib.common.rest_client [req-3c737a49-4256-462d-9432-2d8d91c4f41c ] Request (QosExtRbacTest:test_update_policy): 200 GET http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles 0.055s 2020-11-06 18:21:48.848 39 DEBUG tempest.lib.common.rest_client [req-3c737a49-4256-462d-9432-2d8d91c4f41c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3c737a49-4256-462d-9432-2d8d91c4f41c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f/users/02aa495a76054e0cb86bfac9f0d039e1/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:48.886 39 INFO tempest.lib.common.rest_client [req-abf7e4ba-9e36-42ad-94ca-e62dac924efb ] Request (QosExtRbacTest:test_update_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:21:48.887 39 DEBUG tempest.lib.common.rest_client [req-abf7e4ba-9e36-42ad-94ca-e62dac924efb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-abf7e4ba-9e36-42ad-94ca-e62dac924efb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "02aa495a76054e0cb86bfac9f0d039e1", "name": "tempest-QosExtRbacTest-1849928337", "password_expires_at": null}, "audit_ids": ["_QKHNnFZSGigh3drYQCiZA"], "expires_at": "2020-11-06T19:21:48.000000Z", "issued_at": "2020-11-06T18:21:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0269a670b0d44e2eb30f5d1c3176448f", "name": "tempest-QosExtRbacTest-1849928337"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:48.922 39 INFO tempest.lib.common.rest_client [req-25c6d0d9-4a58-4b78-b47c-b9ff0bdbd915 ] Request (QosExtRbacTest:test_update_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:21:48.923 39 DEBUG tempest.lib.common.rest_client [req-25c6d0d9-4a58-4b78-b47c-b9ff0bdbd915 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-25c6d0d9-4a58-4b78-b47c-b9ff0bdbd915', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "02aa495a76054e0cb86bfac9f0d039e1", "name": "tempest-QosExtRbacTest-1849928337", "password_expires_at": null}, "audit_ids": ["zE-0UyvNTC-oKO1UvDGN0g"], "expires_at": "2020-11-06T19:21:48.000000Z", "issued_at": "2020-11-06T18:21:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0269a670b0d44e2eb30f5d1c3176448f", "name": "tempest-QosExtRbacTest-1849928337"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0269a670b0d44e2eb30f5d1c3176448f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:49.052 39 INFO tempest.lib.common.rest_client [req-f5bff2e2-7fd6-42fa-a997-4ae8dc33d43f ] Request (QosExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/f217d04d-183a-4d33-adb5-2d97aeb133a0 0.128s 2020-11-06 18:21:49.053 39 DEBUG tempest.lib.common.rest_client [req-f5bff2e2-7fd6-42fa-a997-4ae8dc33d43f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-f5bff2e2-7fd6-42fa-a997-4ae8dc33d43f', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:21:49 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/f217d04d-183a-4d33-adb5-2d97aeb133a0'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:51.089 39 INFO tempest.lib.common.rest_client [req-ed7ce851-6e69-409e-8b55-e36f1c8df27c ] Request (QosExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/518ec38a-8612-41b3-b7b8-c3ac2c9ea43b 2.034s 2020-11-06 18:21:51.090 39 DEBUG tempest.lib.common.rest_client [req-ed7ce851-6e69-409e-8b55-e36f1c8df27c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-ed7ce851-6e69-409e-8b55-e36f1c8df27c', 'date': 'Fri, 06 Nov 2020 18:21:51 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/518ec38a-8612-41b3-b7b8-c3ac2c9ea43b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:51.214 39 INFO tempest.lib.common.rest_client [req-4f0d2f1f-c0c3-4cd9-a683-24cd2f109918 ] Request (QosExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/02aa495a76054e0cb86bfac9f0d039e1 0.123s 2020-11-06 18:21:51.215 39 DEBUG tempest.lib.common.rest_client [req-4f0d2f1f-c0c3-4cd9-a683-24cd2f109918 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4f0d2f1f-c0c3-4cd9-a683-24cd2f109918', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/02aa495a76054e0cb86bfac9f0d039e1'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:51.299 39 INFO tempest.lib.common.rest_client [req-06166c11-f5dd-4fb3-a3aa-34fcaa741e4c ] Request (QosExtRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 18:21:51.299 39 DEBUG tempest.lib.common.rest_client [req-06166c11-f5dd-4fb3-a3aa-34fcaa741e4c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-06166c11-f5dd-4fb3-a3aa-34fcaa741e4c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["QV0XFAd8RnSHZNNYxUtYRg"], "expires_at": "2020-11-06T19:21:51.000000Z", "issued_at": "2020-11-06T18:21:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:51.467 39 INFO tempest.lib.common.rest_client [req-2882fda8-dd94-4a26-9585-7e93ac7b903d ] Request (QosExtRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=0269a670b0d44e2eb30f5d1c3176448f&name=default 0.167s 2020-11-06 18:21:51.468 39 DEBUG tempest.lib.common.rest_client [req-2882fda8-dd94-4a26-9585-7e93ac7b903d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-2882fda8-dd94-4a26-9585-7e93ac7b903d', 'date': 'Fri, 06 Nov 2020 18:21:51 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=0269a670b0d44e2eb30f5d1c3176448f&name=default'} Body: b'{"security_groups": [{"id": "57cf4c2b-f410-481e-a63b-c3868ba29160", "name": "default", "stateful": true, "tenant_id": "0269a670b0d44e2eb30f5d1c3176448f", "description": "Default security group", "security_group_rules": [{"id": "08207dd0-6eb5-4777-a3f2-cacda8562f37", "tenant_id": "0269a670b0d44e2eb30f5d1c3176448f", "security_group_id": "57cf4c2b-f410-481e-a63b-c3868ba29160", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:21:46Z", "updated_at": "2020-11-06T18:21:46Z", "revision_number": 0, "project_id": "0269a670b0d44e2eb30f5d1c3176448f"}, {"id": "8365744a-7e95-4504-9fb4-eba160658d38", "tenant_id": "0269a670b0d44e2eb30f5d1c3176448f", "security_group_id": "57cf4c2b-f410-481e-a63b-c3868ba29160", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "57cf4c2b-f410-481e-a63b-c3868ba29160", "description": null, "tags": [], "created_at": "2020-11-06T18:21:46Z", "updated_at": "2020-11-06T18:21:46Z", "revision_number": 0, "project_id": "0269a670b0d44e2eb30f5d1c3176448f"}, {"id": "a56e3296-9933-44d5-af43-3d9802ba0ade", "tenant_id": "0269a670b0d44e2eb30f5d1c3176448f", "security_group_id": "57cf4c2b-f410-481e-a63b-c3868ba29160", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "57cf4c2b-f410-481e-a63b-c3868ba29160", "description": null, "tags": [], "created_at": "2020-11-06T18:21:46Z", "updated_at": "2020-11-06T18:21:46Z", "revision_number": 0, "project_id": "0269a670b0d44e2eb30f5d1c3176448f"}, {"id": "b5fb21db-6c96-412c-a9cc-04a27e836b4d", "tenant_id": "0269a670b0d44e2eb30f5d1c3176448f", "security_group_id": "57cf4c2b-f410-481e-a63b-c3868ba29160", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:21:46Z", "updated_at": "2020-11-06T18:21:46Z", "revision_number": 0, "project_id": "0269a670b0d44e2eb30f5d1c3176448f"}], "tags": [], "created_at": "2020-11-06T18:21:46Z", "updated_at": "2020-11-06T18:21:46Z", "revision_number": 1, "project_id": "0269a670b0d44e2eb30f5d1c3176448f"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:51.603 39 INFO tempest.lib.common.rest_client [req-8b9678f7-6fe3-49e7-b47e-6296363ffe92 ] Request (QosExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/57cf4c2b-f410-481e-a63b-c3868ba29160 0.133s 2020-11-06 18:21:51.603 39 DEBUG tempest.lib.common.rest_client [req-8b9678f7-6fe3-49e7-b47e-6296363ffe92 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-8b9678f7-6fe3-49e7-b47e-6296363ffe92', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:21:51 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/57cf4c2b-f410-481e-a63b-c3868ba29160'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:51.728 39 INFO tempest.lib.common.rest_client [req-bbe1a412-9667-4266-a524-dbe9fc3c5dbb ] Request (QosExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f 0.124s 2020-11-06 18:21:51.728 39 DEBUG tempest.lib.common.rest_client [req-bbe1a412-9667-4266-a524-dbe9fc3c5dbb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bbe1a412-9667-4266-a524-dbe9fc3c5dbb', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/0269a670b0d44e2eb30f5d1c3176448f'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:51.817 39 INFO tempest.lib.common.rest_client [req-8ea9ac86-dd2b-43bd-9e70-775ae3899604 ] Request (RouterRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:21:51.818 39 DEBUG tempest.lib.common.rest_client [req-8ea9ac86-dd2b-43bd-9e70-775ae3899604 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8ea9ac86-dd2b-43bd-9e70-775ae3899604', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["8JgU-0HqSfGGB6KtitDA1Q"], "expires_at": "2020-11-06T19:21:51.000000Z", "issued_at": "2020-11-06T18:21:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:51.861 39 INFO tempest.lib.common.rest_client [req-0ef89497-763b-4ced-b073-3787255f46de ] Request (RouterRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:21:51.861 39 DEBUG tempest.lib.common.rest_client [req-0ef89497-763b-4ced-b073-3787255f46de ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0ef89497-763b-4ced-b073-3787255f46de', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["L9uNi0p7SfOJbLCqurifEg"], "expires_at": "2020-11-06T19:21:51.000000Z", "issued_at": "2020-11-06T18:21:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:51.914 39 INFO tempest.lib.common.rest_client [req-bbfaa749-272a-4c4f-9b52-9b49fc390dcf ] Request (RouterRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.052s 2020-11-06 18:21:51.915 39 DEBUG tempest.lib.common.rest_client [req-bbfaa749-272a-4c4f-9b52-9b49fc390dcf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bbfaa749-272a-4c4f-9b52-9b49fc390dcf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:51.978 39 INFO tempest.lib.common.rest_client [req-ce243ed0-1f6e-4543-be83-264b5ad47871 ] Request (RouterRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.062s 2020-11-06 18:21:51.978 39 DEBUG tempest.lib.common.rest_client [req-ce243ed0-1f6e-4543-be83-264b5ad47871 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-RouterRbacTest-1182584811-desc", "domain_id": "default", "name": "tempest-RouterRbacTest-1182584811"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '366', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ce243ed0-1f6e-4543-be83-264b5ad47871', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811", "domain_id": "default", "description": "tempest-RouterRbacTest-1182584811-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:52.087 39 INFO tempest.lib.common.rest_client [req-98700bd5-bdfc-4378-813a-188667198820 ] Request (RouterRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.107s 2020-11-06 18:21:52.088 39 DEBUG tempest.lib.common.rest_client [req-98700bd5-bdfc-4378-813a-188667198820 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-RouterRbacTest-1182584811", "password": "V9@kF%L9+f_2dMG", "project_id": "c56c216173514cd49deee606c5a2800f", "email": "tempest-RouterRbacTest-1726200562@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '384', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-98700bd5-bdfc-4378-813a-188667198820', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "c56c216173514cd49deee606c5a2800f", "email": "tempest-RouterRbacTest-1726200562@example.com", "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/bbaf3d08297440f99dc8cf0ecbd46a91"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:52.135 39 INFO tempest.lib.common.rest_client [req-40eb0af8-a83d-4672-9a85-de756427e64b ] Request (RouterRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.046s 2020-11-06 18:21:52.135 39 DEBUG tempest.lib.common.rest_client [req-40eb0af8-a83d-4672-9a85-de756427e64b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-40eb0af8-a83d-4672-9a85-de756427e64b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:52.183 39 INFO tempest.lib.common.rest_client [req-c5315432-dddc-4009-90db-e562b15e6efb ] Request (RouterRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.046s 2020-11-06 18:21:52.183 39 DEBUG tempest.lib.common.rest_client [req-c5315432-dddc-4009-90db-e562b15e6efb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c5315432-dddc-4009-90db-e562b15e6efb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:52.244 39 INFO tempest.lib.common.rest_client [req-ab23163a-0806-4039-bf9e-99e3af8d64a8 ] Request (RouterRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles/72a4576c553448cd941b052c1ca0cf2d 0.060s 2020-11-06 18:21:52.245 39 DEBUG tempest.lib.common.rest_client [req-ab23163a-0806-4039-bf9e-99e3af8d64a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ab23163a-0806-4039-bf9e-99e3af8d64a8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:52.245 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-RouterRbacTest-1182584811', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'c56c216173514cd49deee606c5a2800f', 'project_name': 'tempest-RouterRbacTest-1182584811', 'tenant_id': 'c56c216173514cd49deee606c5a2800f', 'tenant_name': 'tempest-RouterRbacTest-1182584811', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'bbaf3d08297440f99dc8cf0ecbd46a91'}, Network: None, Subnet: None, Router: None 2020-11-06 18:21:52.246 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-RouterRbacTest-1182584811', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'c56c216173514cd49deee606c5a2800f', 'project_name': 'tempest-RouterRbacTest-1182584811', 'tenant_id': 'c56c216173514cd49deee606c5a2800f', 'tenant_name': 'tempest-RouterRbacTest-1182584811', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'bbaf3d08297440f99dc8cf0ecbd46a91'}, Network: None, Subnet: None, Router: None 2020-11-06 18:21:52.359 39 INFO tempest.lib.common.rest_client [req-0def496e-37cd-432f-8e49-61c504cfd601 ] Request (RouterRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.102s 2020-11-06 18:21:52.359 39 DEBUG tempest.lib.common.rest_client [req-0def496e-37cd-432f-8e49-61c504cfd601 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6559', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0def496e-37cd-432f-8e49-61c504cfd601', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["Sz6UZ9qMSsuP4MzQ8fq5Cg"], "expires_at": "2020-11-06T19:21:52.000000Z", "issued_at": "2020-11-06T18:21:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/im _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:52.446 39 INFO tempest.lib.common.rest_client [req-25e32dc9-52e1-4269-9fcb-53d96196656d ] Request (RouterRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:21:52.446 39 DEBUG tempest.lib.common.rest_client [req-25e32dc9-52e1-4269-9fcb-53d96196656d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-25e32dc9-52e1-4269-9fcb-53d96196656d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["1Oh5xpo5ReGsBn7Fa488bg"], "expires_at": "2020-11-06T19:21:52.000000Z", "issued_at": "2020-11-06T18:21:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:52.492 39 INFO tempest.lib.common.rest_client [req-9b0b1e12-1dda-4025-9296-6ea5c80161b8 ] Request (RouterRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:21:52.492 39 DEBUG tempest.lib.common.rest_client [req-9b0b1e12-1dda-4025-9296-6ea5c80161b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9b0b1e12-1dda-4025-9296-6ea5c80161b8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["cvt61poIQX-Laa7fNjzUtA"], "expires_at": "2020-11-06T19:21:52.000000Z", "issued_at": "2020-11-06T18:21:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:52.539 39 INFO tempest.lib.common.rest_client [req-9ae8b70a-45f9-4b10-9d87-adad7511505a ] Request (RouterRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.045s 2020-11-06 18:21:52.539 39 DEBUG tempest.lib.common.rest_client [req-9ae8b70a-45f9-4b10-9d87-adad7511505a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9ae8b70a-45f9-4b10-9d87-adad7511505a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:52.607 39 INFO tempest.lib.common.rest_client [req-e807ee74-a767-4945-8011-bf7fd281e76b ] Request (RouterRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.067s 2020-11-06 18:21:52.608 39 DEBUG tempest.lib.common.rest_client [req-e807ee74-a767-4945-8011-bf7fd281e76b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e807ee74-a767-4945-8011-bf7fd281e76b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:52.608 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:21:52.609 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:52.657 39 INFO tempest.lib.common.rest_client [req-88c9ef43-e747-43d1-96d3-805fa31eb313 ] Request (RouterRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.047s 2020-11-06 18:21:52.657 39 DEBUG tempest.lib.common.rest_client [req-88c9ef43-e747-43d1-96d3-805fa31eb313 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-88c9ef43-e747-43d1-96d3-805fa31eb313', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:52.711 39 INFO tempest.lib.common.rest_client [req-e6c84df5-b3e9-4d81-a484-5f737f2d713e ] Request (RouterRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles/72a4576c553448cd941b052c1ca0cf2d 0.052s 2020-11-06 18:21:52.711 39 DEBUG tempest.lib.common.rest_client [req-e6c84df5-b3e9-4d81-a484-5f737f2d713e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e6c84df5-b3e9-4d81-a484-5f737f2d713e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:52.809 39 INFO tempest.lib.common.rest_client [req-d8495e9d-9399-4f0e-b4a7-f8395394f833 ] Request (RouterRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles/a629c95d64b3416fb80ae90af4f69c05 0.097s 2020-11-06 18:21:52.810 39 DEBUG tempest.lib.common.rest_client [req-d8495e9d-9399-4f0e-b4a7-f8395394f833 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d8495e9d-9399-4f0e-b4a7-f8395394f833', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:53.894 39 INFO tempest.lib.common.rest_client [req-62b0abbd-5c76-451b-af29-5351b630d916 ] Request (RouterRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-11-06 18:21:53.895 39 DEBUG tempest.lib.common.rest_client [req-62b0abbd-5c76-451b-af29-5351b630d916 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-62b0abbd-5c76-451b-af29-5351b630d916', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["fId_ht_vQb2SCOqnlc-T6g"], "expires_at": "2020-11-06T19:21:53.000000Z", "issued_at": "2020-11-06T18:21:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:54.429 39 INFO tempest.lib.common.rest_client [req-5c3184e9-f5e6-499a-a308-d7b4c5ef912d ] Request (RouterRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.532s 2020-11-06 18:21:54.430 39 DEBUG tempest.lib.common.rest_client [req-5c3184e9-f5e6-499a-a308-d7b4c5ef912d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-RouterRbacTest-test-network-1977104148", "router:external": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '734', 'x-openstack-request-id': 'req-5c3184e9-f5e6-499a-a308-d7b4c5ef912d', 'date': 'Fri, 06 Nov 2020 18:21:54 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"c0683248-2cc2-4ea5-a866-63d525ef4f98","name":"tempest-RouterRbacTest-test-network-1977104148","tenant_id":"c56c216173514cd49deee606c5a2800f","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"c56c216173514cd49deee606c5a2800f","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":true,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":45,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:21:54Z","updated_at":"2020-11-06T18:21:54Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:55.130 39 INFO tempest.lib.common.rest_client [req-ad5a989e-84e4-4346-a13a-8773449b08ec ] Request (RouterRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.698s 2020-11-06 18:21:55.130 39 DEBUG tempest.lib.common.rest_client [req-ad5a989e-84e4-4346-a13a-8773449b08ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "c0683248-2cc2-4ea5-a866-63d525ef4f98", "cidr": "192.168.120.0/28", "ip_version": 4, "gateway_ip": "192.168.120.1"}} Response - Headers: {'content-type': 'application/json', 'content-length': '661', 'x-openstack-request-id': 'req-ad5a989e-84e4-4346-a13a-8773449b08ec', 'date': 'Fri, 06 Nov 2020 18:21:55 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"c872f016-acca-4991-a42b-adcc9a317583","name":"","tenant_id":"c56c216173514cd49deee606c5a2800f","network_id":"c0683248-2cc2-4ea5-a866-63d525ef4f98","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-11-06T18:21:54Z","updated_at":"2020-11-06T18:21:54Z","revision_number":0,"project_id":"c56c216173514cd49deee606c5a2800f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:55.231 39 INFO tempest.lib.common.rest_client [req-cc67c0f8-42f0-4e81-a306-efaa83aecfd5 ] Request (RouterRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/routers 0.099s 2020-11-06 18:21:55.232 39 DEBUG tempest.lib.common.rest_client [req-cc67c0f8-42f0-4e81-a306-efaa83aecfd5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-RouterRbacTest-router-1880946517", "external_gateway_info": {}, "admin_state_up": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '539', 'x-openstack-request-id': 'req-cc67c0f8-42f0-4e81-a306-efaa83aecfd5', 'date': 'Fri, 06 Nov 2020 18:21:55 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "d739609f-3a9e-40df-be53-1aa5ccc6ec7a", "name": "tempest-RouterRbacTest-router-1880946517", "tenant_id": "c56c216173514cd49deee606c5a2800f", "admin_state_up": false, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T18:21:55Z", "updated_at": "2020-11-06T18:21:55Z", "revision_number": 1, "project_id": "c56c216173514cd49deee606c5a2800f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:55.233 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:55.237 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_router, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:55.238 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:55.240 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: add_router_interface, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:55.497 39 INFO tempest.lib.common.rest_client [req-f34bae92-1547-409e-8788-7fa2307a0bdc ] Request (RouterRbacTest:test_add_router_interface): 201 POST http://172.30.13.94:9696/v2.0/networks 0.256s 2020-11-06 18:21:55.498 39 DEBUG tempest.lib.common.rest_client [req-f34bae92-1547-409e-8788-7fa2307a0bdc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-RouterRbacTest-test-network-2119725151"}} Response - Headers: {'content-type': 'application/json', 'content-length': '735', 'x-openstack-request-id': 'req-f34bae92-1547-409e-8788-7fa2307a0bdc', 'date': 'Fri, 06 Nov 2020 18:21:55 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"af7b7606-43b8-4f37-bc43-0b614cf1cd03","name":"tempest-RouterRbacTest-test-network-2119725151","tenant_id":"c56c216173514cd49deee606c5a2800f","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"c56c216173514cd49deee606c5a2800f","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":49,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:21:55Z","updated_at":"2020-11-06T18:21:55Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:56.051 39 INFO tempest.lib.common.rest_client [req-29324a4f-ab1c-4b7c-b466-fd6c5696e11c ] Request (RouterRbacTest:test_add_router_interface): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.551s 2020-11-06 18:21:56.051 39 DEBUG tempest.lib.common.rest_client [req-29324a4f-ab1c-4b7c-b466-fd6c5696e11c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "af7b7606-43b8-4f37-bc43-0b614cf1cd03", "cidr": "192.168.120.0/28", "ip_version": 4, "gateway_ip": "192.168.120.1"}} Response - Headers: {'content-type': 'application/json', 'content-length': '661', 'x-openstack-request-id': 'req-29324a4f-ab1c-4b7c-b466-fd6c5696e11c', 'date': 'Fri, 06 Nov 2020 18:21:56 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"409b3f99-fa2a-4e0c-a77b-664829098e12","name":"","tenant_id":"c56c216173514cd49deee606c5a2800f","network_id":"af7b7606-43b8-4f37-bc43-0b614cf1cd03","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-11-06T18:21:55Z","updated_at":"2020-11-06T18:21:55Z","revision_number":0,"project_id":"c56c216173514cd49deee606c5a2800f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:56.189 39 INFO tempest.lib.common.rest_client [req-0e30f1ad-0097-495d-97b1-740ddece868b ] Request (RouterRbacTest:test_add_router_interface): 201 POST http://172.30.13.94:9696/v2.0/routers 0.136s 2020-11-06 18:21:56.190 39 DEBUG tempest.lib.common.rest_client [req-0e30f1ad-0097-495d-97b1-740ddece868b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-RouterRbacTest-router-92223166", "external_gateway_info": {}, "admin_state_up": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '537', 'x-openstack-request-id': 'req-0e30f1ad-0097-495d-97b1-740ddece868b', 'date': 'Fri, 06 Nov 2020 18:21:56 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "1273c262-6f9b-4f2a-b949-c6d287c09165", "name": "tempest-RouterRbacTest-router-92223166", "tenant_id": "c56c216173514cd49deee606c5a2800f", "admin_state_up": false, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T18:21:56Z", "updated_at": "2020-11-06T18:21:56Z", "revision_number": 1, "project_id": "c56c216173514cd49deee606c5a2800f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:56.190 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:56.303 39 INFO tempest.lib.common.rest_client [req-f75d86d1-7dd5-4957-8b03-0542c828d6c3 ] Request (RouterRbacTest:test_add_router_interface): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.111s 2020-11-06 18:21:56.303 39 DEBUG tempest.lib.common.rest_client [req-f75d86d1-7dd5-4957-8b03-0542c828d6c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f75d86d1-7dd5-4957-8b03-0542c828d6c3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:56.339 39 INFO tempest.lib.common.rest_client [req-44b39d20-e4de-4d7b-a2b5-0deb7fc87fc7 ] Request (RouterRbacTest:test_add_router_interface): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:21:56.340 39 DEBUG tempest.lib.common.rest_client [req-44b39d20-e4de-4d7b-a2b5-0deb7fc87fc7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-44b39d20-e4de-4d7b-a2b5-0deb7fc87fc7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["wix2F-hoRjC2v4ruXhtvSg"], "expires_at": "2020-11-06T19:21:56.000000Z", "issued_at": "2020-11-06T18:21:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:58.192 39 INFO tempest.lib.common.rest_client [req-935ee99d-ea0d-4323-8b0a-ff8df709aece ] Request (RouterRbacTest:test_add_router_interface): 200 PUT http://172.30.13.94:9696/v2.0/routers/1273c262-6f9b-4f2a-b949-c6d287c09165/add_router_interface 1.850s 2020-11-06 18:21:58.192 39 DEBUG tempest.lib.common.rest_client [req-935ee99d-ea0d-4323-8b0a-ff8df709aece ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "409b3f99-fa2a-4e0c-a77b-664829098e12"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-935ee99d-ea0d-4323-8b0a-ff8df709aece', 'date': 'Fri, 06 Nov 2020 18:21:58 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/1273c262-6f9b-4f2a-b949-c6d287c09165/add_router_interface'} Body: b'{"id": "1273c262-6f9b-4f2a-b949-c6d287c09165", "tenant_id": "c56c216173514cd49deee606c5a2800f", "port_id": "94bd80dd-0869-4ba1-8c34-ef09627cc81f", "network_id": "af7b7606-43b8-4f37-bc43-0b614cf1cd03", "subnet_id": "409b3f99-fa2a-4e0c-a77b-664829098e12", "subnet_ids": ["409b3f99-fa2a-4e0c-a77b-664829098e12"]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:58.192 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:21:58.243 39 INFO tempest.lib.common.rest_client [req-0db0a82e-1447-4655-9155-47b42a528921 ] Request (RouterRbacTest:test_add_router_interface): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.050s 2020-11-06 18:21:58.244 39 DEBUG tempest.lib.common.rest_client [req-0db0a82e-1447-4655-9155-47b42a528921 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0db0a82e-1447-4655-9155-47b42a528921', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:58.287 39 INFO tempest.lib.common.rest_client [req-9da323da-1fea-4f01-957b-fbe5be6cc407 ] Request (RouterRbacTest:test_add_router_interface): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-11-06 18:21:58.287 39 DEBUG tempest.lib.common.rest_client [req-9da323da-1fea-4f01-957b-fbe5be6cc407 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9da323da-1fea-4f01-957b-fbe5be6cc407', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["0SjY2zm-Tm22omQ2Mt75yw"], "expires_at": "2020-11-06T19:21:58.000000Z", "issued_at": "2020-11-06T18:21:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:59.945 39 INFO tempest.lib.common.rest_client [req-616775b1-e964-4caf-b5e9-f9b8be03b545 ] Request (RouterRbacTest:_run_cleanups): 200 PUT http://172.30.13.94:9696/v2.0/routers/1273c262-6f9b-4f2a-b949-c6d287c09165/remove_router_interface 1.656s 2020-11-06 18:21:59.946 39 DEBUG tempest.lib.common.rest_client [req-616775b1-e964-4caf-b5e9-f9b8be03b545 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "409b3f99-fa2a-4e0c-a77b-664829098e12"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-616775b1-e964-4caf-b5e9-f9b8be03b545', 'date': 'Fri, 06 Nov 2020 18:21:59 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/1273c262-6f9b-4f2a-b949-c6d287c09165/remove_router_interface'} Body: b'{"id": "1273c262-6f9b-4f2a-b949-c6d287c09165", "tenant_id": "c56c216173514cd49deee606c5a2800f", "port_id": "94bd80dd-0869-4ba1-8c34-ef09627cc81f", "network_id": "af7b7606-43b8-4f37-bc43-0b614cf1cd03", "subnet_id": "409b3f99-fa2a-4e0c-a77b-664829098e12", "subnet_ids": ["409b3f99-fa2a-4e0c-a77b-664829098e12"]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:21:59.948 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:59.951 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_router, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:59.951 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:21:59.954 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_router:distributed, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:21:59.954 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:22:00.006 39 INFO tempest.lib.common.rest_client [req-8cfaf820-a033-4380-ab39-3c5b7e42dde9 ] Request (RouterRbacTest:test_create_distributed_router): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.051s 2020-11-06 18:22:00.006 39 DEBUG tempest.lib.common.rest_client [req-8cfaf820-a033-4380-ab39-3c5b7e42dde9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:21:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8cfaf820-a033-4380-ab39-3c5b7e42dde9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:00.042 39 INFO tempest.lib.common.rest_client [req-806b2b33-e2b3-42f8-9d1f-01112cb6450b ] Request (RouterRbacTest:test_create_distributed_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:22:00.043 39 DEBUG tempest.lib.common.rest_client [req-806b2b33-e2b3-42f8-9d1f-01112cb6450b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-806b2b33-e2b3-42f8-9d1f-01112cb6450b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["BUEx1MopTLqu9Jahvkzzlw"], "expires_at": "2020-11-06T19:22:00.000000Z", "issued_at": "2020-11-06T18:22:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:00.245 39 INFO tempest.lib.common.rest_client [req-9def0206-899b-4dda-b235-19eb69dbb9e7 ] Request (RouterRbacTest:test_create_distributed_router): 201 POST http://172.30.13.94:9696/v2.0/routers 0.201s 2020-11-06 18:22:00.246 39 DEBUG tempest.lib.common.rest_client [req-9def0206-899b-4dda-b235-19eb69dbb9e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"distributed": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '497', 'x-openstack-request-id': 'req-9def0206-899b-4dda-b235-19eb69dbb9e7', 'date': 'Fri, 06 Nov 2020 18:22:00 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "3ac892f1-d28e-448a-824d-aca3a04c6b48", "name": "", "tenant_id": "c56c216173514cd49deee606c5a2800f", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": [], "distributed": true, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T18:22:00Z", "updated_at": "2020-11-06T18:22:00Z", "revision_number": 1, "project_id": "c56c216173514cd49deee606c5a2800f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:00.246 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:22:00.302 39 INFO tempest.lib.common.rest_client [req-780fc0af-18a3-4fc9-8aec-f0154ef80f69 ] Request (RouterRbacTest:test_create_distributed_router): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.054s 2020-11-06 18:22:00.302 39 DEBUG tempest.lib.common.rest_client [req-780fc0af-18a3-4fc9-8aec-f0154ef80f69 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-780fc0af-18a3-4fc9-8aec-f0154ef80f69', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:00.340 39 INFO tempest.lib.common.rest_client [req-b82c427c-a3bf-49da-a7bc-ca3728d7d89d ] Request (RouterRbacTest:test_create_distributed_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:22:00.341 39 DEBUG tempest.lib.common.rest_client [req-b82c427c-a3bf-49da-a7bc-ca3728d7d89d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b82c427c-a3bf-49da-a7bc-ca3728d7d89d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["6qqhj3YFRGaMiylluwWq6g"], "expires_at": "2020-11-06T19:22:00.000000Z", "issued_at": "2020-11-06T18:22:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:00.825 39 INFO tempest.lib.common.rest_client [req-e092bc12-3573-468f-9e42-15e6c378c1fa ] Request (RouterRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/routers/3ac892f1-d28e-448a-824d-aca3a04c6b48 0.483s 2020-11-06 18:22:00.826 39 DEBUG tempest.lib.common.rest_client [req-e092bc12-3573-468f-9e42-15e6c378c1fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-e092bc12-3573-468f-9e42-15e6c378c1fa', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:22:00 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/3ac892f1-d28e-448a-824d-aca3a04c6b48'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:00.829 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:00.832 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_router, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:00.833 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:00.836 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_router:ha, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:00.837 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:22:00.891 39 INFO tempest.lib.common.rest_client [req-bdf35782-f291-42de-ba14-d956d6fba944 ] Request (RouterRbacTest:test_create_high_availability_router): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.053s 2020-11-06 18:22:00.892 39 DEBUG tempest.lib.common.rest_client [req-bdf35782-f291-42de-ba14-d956d6fba944 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bdf35782-f291-42de-ba14-d956d6fba944', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:00.927 39 INFO tempest.lib.common.rest_client [req-438d14a1-4d62-4dd2-ac32-f9f5a9e6a02e ] Request (RouterRbacTest:test_create_high_availability_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:22:00.927 39 DEBUG tempest.lib.common.rest_client [req-438d14a1-4d62-4dd2-ac32-f9f5a9e6a02e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-438d14a1-4d62-4dd2-ac32-f9f5a9e6a02e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["Pp36ALM4R0CBWlJusDmHVg"], "expires_at": "2020-11-06T19:22:00.000000Z", "issued_at": "2020-11-06T18:22:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:03.068 39 INFO tempest.lib.common.rest_client [req-9b1f3ce5-c3ec-4d63-8b6e-ef5270414350 ] Request (RouterRbacTest:test_create_high_availability_router): 201 POST http://172.30.13.94:9696/v2.0/routers 2.139s 2020-11-06 18:22:03.068 39 DEBUG tempest.lib.common.rest_client [req-9b1f3ce5-c3ec-4d63-8b6e-ef5270414350 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"ha": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '497', 'x-openstack-request-id': 'req-9b1f3ce5-c3ec-4d63-8b6e-ef5270414350', 'date': 'Fri, 06 Nov 2020 18:22:03 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "8289c66d-8c0c-4355-895c-776146c1907b", "name": "", "tenant_id": "c56c216173514cd49deee606c5a2800f", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": [], "distributed": false, "ha": true, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T18:22:01Z", "updated_at": "2020-11-06T18:22:01Z", "revision_number": 2, "project_id": "c56c216173514cd49deee606c5a2800f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:03.069 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:22:03.119 39 INFO tempest.lib.common.rest_client [req-5af59d54-77f3-4361-a0f2-1ca74909d349 ] Request (RouterRbacTest:test_create_high_availability_router): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.049s 2020-11-06 18:22:03.120 39 DEBUG tempest.lib.common.rest_client [req-5af59d54-77f3-4361-a0f2-1ca74909d349 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5af59d54-77f3-4361-a0f2-1ca74909d349', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:03.156 39 INFO tempest.lib.common.rest_client [req-feb58dcb-0dbf-49dd-b689-72637b74a1b1 ] Request (RouterRbacTest:test_create_high_availability_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:22:03.157 39 DEBUG tempest.lib.common.rest_client [req-feb58dcb-0dbf-49dd-b689-72637b74a1b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-feb58dcb-0dbf-49dd-b689-72637b74a1b1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["oGZqVt90R3qBNUgw-BrvHA"], "expires_at": "2020-11-06T19:22:03.000000Z", "issued_at": "2020-11-06T18:22:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:07.051 39 INFO tempest.lib.common.rest_client [req-24c58a2f-0782-45c7-a3a6-cfcdf2028a81 ] Request (RouterRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/routers/8289c66d-8c0c-4355-895c-776146c1907b 3.892s 2020-11-06 18:22:07.051 39 DEBUG tempest.lib.common.rest_client [req-24c58a2f-0782-45c7-a3a6-cfcdf2028a81 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-24c58a2f-0782-45c7-a3a6-cfcdf2028a81', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:22:07 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/8289c66d-8c0c-4355-895c-776146c1907b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:07.054 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:07.058 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_router, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:07.058 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:22:07.111 39 INFO tempest.lib.common.rest_client [req-7e90d4cf-0e06-4c72-b1b1-29ac0597690d ] Request (RouterRbacTest:test_create_router): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.052s 2020-11-06 18:22:07.112 39 DEBUG tempest.lib.common.rest_client [req-7e90d4cf-0e06-4c72-b1b1-29ac0597690d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7e90d4cf-0e06-4c72-b1b1-29ac0597690d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:07.152 39 INFO tempest.lib.common.rest_client [req-ce69498f-9061-483d-8263-c491fa14a0f2 ] Request (RouterRbacTest:test_create_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:22:07.153 39 DEBUG tempest.lib.common.rest_client [req-ce69498f-9061-483d-8263-c491fa14a0f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ce69498f-9061-483d-8263-c491fa14a0f2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["w_l80L4qRjeZ43434vqFAg"], "expires_at": "2020-11-06T19:22:07.000000Z", "issued_at": "2020-11-06T18:22:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:07.372 39 INFO tempest.lib.common.rest_client [req-801f0cc2-3739-4fa1-a5d4-a11a0a34160d ] Request (RouterRbacTest:test_create_router): 201 POST http://172.30.13.94:9696/v2.0/routers 0.218s 2020-11-06 18:22:07.373 39 DEBUG tempest.lib.common.rest_client [req-801f0cc2-3739-4fa1-a5d4-a11a0a34160d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {}} Response - Headers: {'content-type': 'application/json', 'content-length': '498', 'x-openstack-request-id': 'req-801f0cc2-3739-4fa1-a5d4-a11a0a34160d', 'date': 'Fri, 06 Nov 2020 18:22:07 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "1d161015-cedb-4fb6-b2b2-09ef14036e29", "name": "", "tenant_id": "c56c216173514cd49deee606c5a2800f", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T18:22:07Z", "updated_at": "2020-11-06T18:22:07Z", "revision_number": 1, "project_id": "c56c216173514cd49deee606c5a2800f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:07.373 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:22:07.421 39 INFO tempest.lib.common.rest_client [req-3d0ccf3b-b309-45fa-8bd7-5c470b845e11 ] Request (RouterRbacTest:test_create_router): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.046s 2020-11-06 18:22:07.421 39 DEBUG tempest.lib.common.rest_client [req-3d0ccf3b-b309-45fa-8bd7-5c470b845e11 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3d0ccf3b-b309-45fa-8bd7-5c470b845e11', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:07.459 39 INFO tempest.lib.common.rest_client [req-0db04cbb-7128-49b6-8bb8-12d9c2dfc75c ] Request (RouterRbacTest:test_create_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:22:07.460 39 DEBUG tempest.lib.common.rest_client [req-0db04cbb-7128-49b6-8bb8-12d9c2dfc75c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0db04cbb-7128-49b6-8bb8-12d9c2dfc75c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["IJ50IWP_TzCPluOwQ5gzJA"], "expires_at": "2020-11-06T19:22:07.000000Z", "issued_at": "2020-11-06T18:22:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:07.938 39 INFO tempest.lib.common.rest_client [req-fef2cf7b-efd3-410b-9ec3-b7eefc0f9f35 ] Request (RouterRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/routers/1d161015-cedb-4fb6-b2b2-09ef14036e29 0.477s 2020-11-06 18:22:07.939 39 DEBUG tempest.lib.common.rest_client [req-fef2cf7b-efd3-410b-9ec3-b7eefc0f9f35 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-fef2cf7b-efd3-410b-9ec3-b7eefc0f9f35', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:22:07 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/1d161015-cedb-4fb6-b2b2-09ef14036e29'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:07.942 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:07.945 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_router, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:07.946 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:07.948 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_router:external_gateway_info:enable_snat, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:07.948 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:22:08.001 39 INFO tempest.lib.common.rest_client [req-e4ed10e0-2abf-4d52-86b7-1524dc58764f ] Request (RouterRbacTest:test_create_router_enable_snat): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.052s 2020-11-06 18:22:08.001 39 DEBUG tempest.lib.common.rest_client [req-e4ed10e0-2abf-4d52-86b7-1524dc58764f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e4ed10e0-2abf-4d52-86b7-1524dc58764f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:08.044 39 INFO tempest.lib.common.rest_client [req-e038e05e-6345-4e8e-81e7-8124e9d48f6a ] Request (RouterRbacTest:test_create_router_enable_snat): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-11-06 18:22:08.045 39 DEBUG tempest.lib.common.rest_client [req-e038e05e-6345-4e8e-81e7-8124e9d48f6a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e038e05e-6345-4e8e-81e7-8124e9d48f6a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["BJIpW0VLTTu5ZISN3ROyPg"], "expires_at": "2020-11-06T19:22:08.000000Z", "issued_at": "2020-11-06T18:22:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:10.526 39 INFO tempest.lib.common.rest_client [req-d787bf37-4bd5-4405-af99-ade3d4ca6b56 ] Request (RouterRbacTest:test_create_router_enable_snat): 201 POST http://172.30.13.94:9696/v2.0/routers 2.479s 2020-11-06 18:22:10.526 39 DEBUG tempest.lib.common.rest_client [req-d787bf37-4bd5-4405-af99-ade3d4ca6b56 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-RouterRbacTest-snat-router-1599935146", "external_gateway_info": {"network_id": "c0683248-2cc2-4ea5-a866-63d525ef4f98", "enable_snat": true}}} Response - Headers: {'content-type': 'application/json', 'content-length': '725', 'x-openstack-request-id': 'req-d787bf37-4bd5-4405-af99-ade3d4ca6b56', 'date': 'Fri, 06 Nov 2020 18:22:10 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "265df0bb-9630-4ca0-ae27-cbdf55ff5e34", "name": "tempest-RouterRbacTest-snat-router-1599935146", "tenant_id": "c56c216173514cd49deee606c5a2800f", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "c0683248-2cc2-4ea5-a866-63d525ef4f98", "external_fixed_ips": [{"subnet_id": "c872f016-acca-4991-a42b-adcc9a317583", "ip_address": "192.168.120.11"}], "enable_snat": true}, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T18:22:08Z", "updated_at": "2020-11-06T18:22:09Z", "revision_number": 3, "project_id": "c56c216173514cd49deee606c5a2800f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:10.527 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:22:10.583 39 INFO tempest.lib.common.rest_client [req-f5f7b004-f06c-46d8-b825-f165fd8c152e ] Request (RouterRbacTest:test_create_router_enable_snat): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.055s 2020-11-06 18:22:10.583 39 DEBUG tempest.lib.common.rest_client [req-f5f7b004-f06c-46d8-b825-f165fd8c152e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f5f7b004-f06c-46d8-b825-f165fd8c152e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:10.617 39 INFO tempest.lib.common.rest_client [req-1817e22a-ed31-4b71-94de-65a911ee50a7 ] Request (RouterRbacTest:test_create_router_enable_snat): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:22:10.617 39 DEBUG tempest.lib.common.rest_client [req-1817e22a-ed31-4b71-94de-65a911ee50a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1817e22a-ed31-4b71-94de-65a911ee50a7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["7uInqtQsToK1LhLg8U8jVg"], "expires_at": "2020-11-06T19:22:10.000000Z", "issued_at": "2020-11-06T18:22:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:11.814 39 INFO tempest.lib.common.rest_client [req-5f41f398-bcdd-42e3-ac79-248704e0854e ] Request (RouterRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/routers/265df0bb-9630-4ca0-ae27-cbdf55ff5e34 1.196s 2020-11-06 18:22:11.815 39 DEBUG tempest.lib.common.rest_client [req-5f41f398-bcdd-42e3-ac79-248704e0854e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-5f41f398-bcdd-42e3-ac79-248704e0854e', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:22:11 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/265df0bb-9630-4ca0-ae27-cbdf55ff5e34'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:11.816 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:11.819 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_router, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:11.820 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:11.822 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_router:external_gateway_info:external_fixed_ips, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:11.875 39 INFO tempest.lib.common.rest_client [req-ac1538d3-91fe-4bb6-8bf7-638ecd3dc3cd ] Request (RouterRbacTest:test_create_router_external_fixed_ips): 200 GET http://172.30.13.94:9696/v2.0/ports?network_id=c0683248-2cc2-4ea5-a866-63d525ef4f98 0.052s 2020-11-06 18:22:11.876 39 DEBUG tempest.lib.common.rest_client [req-ac1538d3-91fe-4bb6-8bf7-638ecd3dc3cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '1229', 'x-openstack-request-id': 'req-ac1538d3-91fe-4bb6-8bf7-638ecd3dc3cd', 'date': 'Fri, 06 Nov 2020 18:22:11 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports?network_id=c0683248-2cc2-4ea5-a866-63d525ef4f98'} Body: b'{"ports":[{"id":"cc576d61-b03a-4cce-8850-599e7f7ea67f","name":"","network_id":"c0683248-2cc2-4ea5-a866-63d525ef4f98","tenant_id":"c56c216173514cd49deee606c5a2800f","mac_address":"fa:16:3e:6d:53:da","admin_state_up":true,"status":"ACTIVE","device_id":"dhcpcf0aa1ad-fc1e-58c4-863b-aba14f17f098-c0683248-2cc2-4ea5-a866-63d525ef4f98","device_owner":"network:dhcp","fixed_ips":[{"subnet_id":"c872f016-acca-4991-a42b-adcc9a317583","ip_address":"192.168.120.2"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":[],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"lf-virtual9","binding:vif_type":"ovs","binding:vif_details":{"connectivity":"l2","port_filter":true,"ovs_hybrid_plug":false,"datapath_type":"system","bridge_name":"br-int"},"port_security_enabled":false,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.2","hostname":"host-192-168-120-2","fqdn":"host-192-168-120-2.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:21:55Z","updated_at":"2020-11-06T18:21:59Z","revision_number":3,"project_id":"c56c216173514cd49deee606c5a2800f"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:11.945 39 INFO tempest.lib.common.rest_client [req-c237a91b-b853-40ce-b1e8-e74bc55d3c21 ] Request (RouterRbacTest:test_create_router_external_fixed_ips): 200 GET http://172.30.13.94:9696/v2.0/subnets/c872f016-acca-4991-a42b-adcc9a317583 0.068s 2020-11-06 18:22:11.946 39 DEBUG tempest.lib.common.rest_client [req-c237a91b-b853-40ce-b1e8-e74bc55d3c21 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '661', 'x-openstack-request-id': 'req-c237a91b-b853-40ce-b1e8-e74bc55d3c21', 'date': 'Fri, 06 Nov 2020 18:22:11 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/c872f016-acca-4991-a42b-adcc9a317583'} Body: b'{"subnet":{"id":"c872f016-acca-4991-a42b-adcc9a317583","name":"","tenant_id":"c56c216173514cd49deee606c5a2800f","network_id":"c0683248-2cc2-4ea5-a866-63d525ef4f98","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-11-06T18:21:54Z","updated_at":"2020-11-06T18:21:54Z","revision_number":0,"project_id":"c56c216173514cd49deee606c5a2800f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:11.949 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:22:12.005 39 INFO tempest.lib.common.rest_client [req-3d37dccf-e025-4fc6-ae13-4ea3a4cacfc3 ] Request (RouterRbacTest:test_create_router_external_fixed_ips): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.055s 2020-11-06 18:22:12.005 39 DEBUG tempest.lib.common.rest_client [req-3d37dccf-e025-4fc6-ae13-4ea3a4cacfc3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3d37dccf-e025-4fc6-ae13-4ea3a4cacfc3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:12.045 39 INFO tempest.lib.common.rest_client [req-5855c319-45f2-4c28-acc6-b6c218e2a99e ] Request (RouterRbacTest:test_create_router_external_fixed_ips): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:22:12.046 39 DEBUG tempest.lib.common.rest_client [req-5855c319-45f2-4c28-acc6-b6c218e2a99e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5855c319-45f2-4c28-acc6-b6c218e2a99e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["9qkC-o1BTgKpu8oCDtwoww"], "expires_at": "2020-11-06T19:22:12.000000Z", "issued_at": "2020-11-06T18:22:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:14.886 39 INFO tempest.lib.common.rest_client [req-1be97914-ff38-4988-9352-8d0c9cedccec ] Request (RouterRbacTest:test_create_router_external_fixed_ips): 201 POST http://172.30.13.94:9696/v2.0/routers 2.839s 2020-11-06 18:22:14.887 39 DEBUG tempest.lib.common.rest_client [req-1be97914-ff38-4988-9352-8d0c9cedccec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-RouterRbacTest-snat-router-786143130", "external_gateway_info": {"network_id": "c0683248-2cc2-4ea5-a866-63d525ef4f98", "enable_snat": false, "external_fixed_ips": [{"subnet_id": "c872f016-acca-4991-a42b-adcc9a317583", "ip_address": "192.168.120.14"}]}}} Response - Headers: {'content-type': 'application/json', 'content-length': '725', 'x-openstack-request-id': 'req-1be97914-ff38-4988-9352-8d0c9cedccec', 'date': 'Fri, 06 Nov 2020 18:22:14 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "0859abdb-9e45-4486-a8d6-1b6578ff32f9", "name": "tempest-RouterRbacTest-snat-router-786143130", "tenant_id": "c56c216173514cd49deee606c5a2800f", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "c0683248-2cc2-4ea5-a866-63d525ef4f98", "external_fixed_ips": [{"subnet_id": "c872f016-acca-4991-a42b-adcc9a317583", "ip_address": "192.168.120.14"}], "enable_snat": false}, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T18:22:12Z", "updated_at": "2020-11-06T18:22:14Z", "revision_number": 3, "project_id": "c56c216173514cd49deee606c5a2800f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:14.888 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:22:14.943 39 INFO tempest.lib.common.rest_client [req-c9cb2fc5-7ae0-4b3a-bd30-618b096dfc67 ] Request (RouterRbacTest:test_create_router_external_fixed_ips): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.055s 2020-11-06 18:22:14.944 39 DEBUG tempest.lib.common.rest_client [req-c9cb2fc5-7ae0-4b3a-bd30-618b096dfc67 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c9cb2fc5-7ae0-4b3a-bd30-618b096dfc67', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:14.983 39 INFO tempest.lib.common.rest_client [req-6617cd79-ae3d-458b-96e8-74f5f35222c8 ] Request (RouterRbacTest:test_create_router_external_fixed_ips): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:22:14.984 39 DEBUG tempest.lib.common.rest_client [req-6617cd79-ae3d-458b-96e8-74f5f35222c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6617cd79-ae3d-458b-96e8-74f5f35222c8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["8coH7PlARxeuVsGsJq38Lg"], "expires_at": "2020-11-06T19:22:14.000000Z", "issued_at": "2020-11-06T18:22:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:16.169 39 INFO tempest.lib.common.rest_client [req-ec87d25b-580c-441f-b829-82d3d78ffedb ] Request (RouterRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/routers/0859abdb-9e45-4486-a8d6-1b6578ff32f9 1.183s 2020-11-06 18:22:16.169 39 DEBUG tempest.lib.common.rest_client [req-ec87d25b-580c-441f-b829-82d3d78ffedb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-ec87d25b-580c-441f-b829-82d3d78ffedb', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:22:16 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/0859abdb-9e45-4486-a8d6-1b6578ff32f9'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:16.172 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:16.176 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_router, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:16.177 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:16.180 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_router, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:16.276 39 INFO tempest.lib.common.rest_client [req-252bc0ec-d4f5-4a10-b1e0-fdc098464f20 ] Request (RouterRbacTest:test_delete_router): 201 POST http://172.30.13.94:9696/v2.0/routers 0.094s 2020-11-06 18:22:16.276 39 DEBUG tempest.lib.common.rest_client [req-252bc0ec-d4f5-4a10-b1e0-fdc098464f20 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-RouterRbacTest-router-2129162361", "external_gateway_info": {}, "admin_state_up": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '539', 'x-openstack-request-id': 'req-252bc0ec-d4f5-4a10-b1e0-fdc098464f20', 'date': 'Fri, 06 Nov 2020 18:22:16 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "4ce1f1eb-0a73-4ede-bf69-8cb569f51b67", "name": "tempest-RouterRbacTest-router-2129162361", "tenant_id": "c56c216173514cd49deee606c5a2800f", "admin_state_up": false, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T18:22:16Z", "updated_at": "2020-11-06T18:22:16Z", "revision_number": 1, "project_id": "c56c216173514cd49deee606c5a2800f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:16.277 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:22:16.326 39 INFO tempest.lib.common.rest_client [req-618c323c-e613-4c86-a393-422c37a83840 ] Request (RouterRbacTest:test_delete_router): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.047s 2020-11-06 18:22:16.326 39 DEBUG tempest.lib.common.rest_client [req-618c323c-e613-4c86-a393-422c37a83840 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-618c323c-e613-4c86-a393-422c37a83840', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:16.364 39 INFO tempest.lib.common.rest_client [req-fc768d6c-1c91-4ca2-98cb-23cef04fc119 ] Request (RouterRbacTest:test_delete_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:22:16.364 39 DEBUG tempest.lib.common.rest_client [req-fc768d6c-1c91-4ca2-98cb-23cef04fc119 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fc768d6c-1c91-4ca2-98cb-23cef04fc119', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["zvUjsNggQGStu-piaiUWpA"], "expires_at": "2020-11-06T19:22:16.000000Z", "issued_at": "2020-11-06T18:22:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:17.851 39 INFO tempest.lib.common.rest_client [req-204afa60-a92f-41ba-9281-8f864ae1a70e ] Request (RouterRbacTest:test_delete_router): 204 DELETE http://172.30.13.94:9696/v2.0/routers/4ce1f1eb-0a73-4ede-bf69-8cb569f51b67 1.486s 2020-11-06 18:22:17.852 39 DEBUG tempest.lib.common.rest_client [req-204afa60-a92f-41ba-9281-8f864ae1a70e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-204afa60-a92f-41ba-9281-8f864ae1a70e', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:22:17 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/4ce1f1eb-0a73-4ede-bf69-8cb569f51b67'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:17.852 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:22:17.910 39 INFO tempest.lib.common.rest_client [req-1278c4ad-2aea-44ec-87cb-83a8e116f906 ] Request (RouterRbacTest:test_delete_router): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.057s 2020-11-06 18:22:17.911 39 DEBUG tempest.lib.common.rest_client [req-1278c4ad-2aea-44ec-87cb-83a8e116f906 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1278c4ad-2aea-44ec-87cb-83a8e116f906', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:17.948 39 INFO tempest.lib.common.rest_client [req-29665d22-91d7-450b-9caf-ee3f15cc77ac ] Request (RouterRbacTest:test_delete_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:22:17.948 39 DEBUG tempest.lib.common.rest_client [req-29665d22-91d7-450b-9caf-ee3f15cc77ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-29665d22-91d7-450b-9caf-ee3f15cc77ac', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["ofs9upcZRc-qhgZlNuKY8Q"], "expires_at": "2020-11-06T19:22:17.000000Z", "issued_at": "2020-11-06T18:22:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:17.951 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:17.955 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_router, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:17.956 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:22:18.013 39 INFO tempest.lib.common.rest_client [req-103abb6e-cc50-439d-bc6e-79fbac2d4c11 ] Request (RouterRbacTest:test_list_routers): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.057s 2020-11-06 18:22:18.014 39 DEBUG tempest.lib.common.rest_client [req-103abb6e-cc50-439d-bc6e-79fbac2d4c11 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-103abb6e-cc50-439d-bc6e-79fbac2d4c11', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:18.054 39 INFO tempest.lib.common.rest_client [req-c8c6f01b-9572-4451-9ac6-b9bd9f4568f4 ] Request (RouterRbacTest:test_list_routers): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:22:18.054 39 DEBUG tempest.lib.common.rest_client [req-c8c6f01b-9572-4451-9ac6-b9bd9f4568f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c8c6f01b-9572-4451-9ac6-b9bd9f4568f4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["GULWxgPPRguodw_J1IaiTw"], "expires_at": "2020-11-06T19:22:18.000000Z", "issued_at": "2020-11-06T18:22:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:18.224 39 INFO tempest.lib.common.rest_client [req-81895cff-a24e-47cb-b865-780340e53e91 ] Request (RouterRbacTest:test_list_routers): 200 GET http://172.30.13.94:9696/v2.0/routers?id=d739609f-3a9e-40df-be53-1aa5ccc6ec7a 0.168s 2020-11-06 18:22:18.224 39 DEBUG tempest.lib.common.rest_client [req-81895cff-a24e-47cb-b865-780340e53e91 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '542', 'x-openstack-request-id': 'req-81895cff-a24e-47cb-b865-780340e53e91', 'date': 'Fri, 06 Nov 2020 18:22:18 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers?id=d739609f-3a9e-40df-be53-1aa5ccc6ec7a'} Body: b'{"routers": [{"id": "d739609f-3a9e-40df-be53-1aa5ccc6ec7a", "name": "tempest-RouterRbacTest-router-1880946517", "tenant_id": "c56c216173514cd49deee606c5a2800f", "admin_state_up": false, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T18:21:55Z", "updated_at": "2020-11-06T18:21:55Z", "revision_number": 1, "project_id": "c56c216173514cd49deee606c5a2800f"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:18.225 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:22:18.304 39 INFO tempest.lib.common.rest_client [req-f31aaed0-00b4-4475-8a9a-5668d0b29ccf ] Request (RouterRbacTest:test_list_routers): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.077s 2020-11-06 18:22:18.304 39 DEBUG tempest.lib.common.rest_client [req-f31aaed0-00b4-4475-8a9a-5668d0b29ccf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f31aaed0-00b4-4475-8a9a-5668d0b29ccf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:18.344 39 INFO tempest.lib.common.rest_client [req-711e505a-ff29-4bba-8030-b0692ebb9ee9 ] Request (RouterRbacTest:test_list_routers): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:22:18.345 39 DEBUG tempest.lib.common.rest_client [req-711e505a-ff29-4bba-8030-b0692ebb9ee9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-711e505a-ff29-4bba-8030-b0692ebb9ee9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["BbX8AOMVSxCYYtGW8HcCQg"], "expires_at": "2020-11-06T19:22:18.000000Z", "issued_at": "2020-11-06T18:22:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:18.348 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:18.352 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_router, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:18.352 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:18.354 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: remove_router_interface, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:18.764 39 INFO tempest.lib.common.rest_client [req-bae2ca95-2138-4fa0-9bbf-5d3fb17eba84 ] Request (RouterRbacTest:test_remove_router_interface): 201 POST http://172.30.13.94:9696/v2.0/networks 0.408s 2020-11-06 18:22:18.765 39 DEBUG tempest.lib.common.rest_client [req-bae2ca95-2138-4fa0-9bbf-5d3fb17eba84 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-RouterRbacTest-test-network-154760251"}} Response - Headers: {'content-type': 'application/json', 'content-length': '734', 'x-openstack-request-id': 'req-bae2ca95-2138-4fa0-9bbf-5d3fb17eba84', 'date': 'Fri, 06 Nov 2020 18:22:18 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"58a3f897-b4f9-4825-9050-805055976391","name":"tempest-RouterRbacTest-test-network-154760251","tenant_id":"c56c216173514cd49deee606c5a2800f","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"c56c216173514cd49deee606c5a2800f","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":53,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:22:18Z","updated_at":"2020-11-06T18:22:18Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:19.309 39 INFO tempest.lib.common.rest_client [req-729c4dec-8268-490e-8c16-cc75eb7b2aca ] Request (RouterRbacTest:test_remove_router_interface): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.542s 2020-11-06 18:22:19.310 39 DEBUG tempest.lib.common.rest_client [req-729c4dec-8268-490e-8c16-cc75eb7b2aca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "58a3f897-b4f9-4825-9050-805055976391", "cidr": "192.168.120.0/28", "ip_version": 4, "gateway_ip": "192.168.120.1"}} Response - Headers: {'content-type': 'application/json', 'content-length': '661', 'x-openstack-request-id': 'req-729c4dec-8268-490e-8c16-cc75eb7b2aca', 'date': 'Fri, 06 Nov 2020 18:22:19 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"cd9352ee-decd-4931-bd2e-7f7b5d0b60f6","name":"","tenant_id":"c56c216173514cd49deee606c5a2800f","network_id":"58a3f897-b4f9-4825-9050-805055976391","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-11-06T18:22:18Z","updated_at":"2020-11-06T18:22:18Z","revision_number":0,"project_id":"c56c216173514cd49deee606c5a2800f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:19.396 39 INFO tempest.lib.common.rest_client [req-7c0a16c4-4a71-424f-89b5-1a184390f5b0 ] Request (RouterRbacTest:test_remove_router_interface): 201 POST http://172.30.13.94:9696/v2.0/routers 0.085s 2020-11-06 18:22:19.397 39 DEBUG tempest.lib.common.rest_client [req-7c0a16c4-4a71-424f-89b5-1a184390f5b0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-RouterRbacTest-router-1375677866", "external_gateway_info": {}, "admin_state_up": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '539', 'x-openstack-request-id': 'req-7c0a16c4-4a71-424f-89b5-1a184390f5b0', 'date': 'Fri, 06 Nov 2020 18:22:19 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "2d8fbf4c-58a9-41f1-8187-c9e84e6fac51", "name": "tempest-RouterRbacTest-router-1375677866", "tenant_id": "c56c216173514cd49deee606c5a2800f", "admin_state_up": false, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T18:22:19Z", "updated_at": "2020-11-06T18:22:19Z", "revision_number": 1, "project_id": "c56c216173514cd49deee606c5a2800f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:22.667 39 INFO tempest.lib.common.rest_client [req-b5cc91d9-0904-4500-bfb7-bc877b3d35ec ] Request (RouterRbacTest:test_remove_router_interface): 200 PUT http://172.30.13.94:9696/v2.0/routers/2d8fbf4c-58a9-41f1-8187-c9e84e6fac51/add_router_interface 3.269s 2020-11-06 18:22:22.668 39 DEBUG tempest.lib.common.rest_client [req-b5cc91d9-0904-4500-bfb7-bc877b3d35ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "cd9352ee-decd-4931-bd2e-7f7b5d0b60f6"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-b5cc91d9-0904-4500-bfb7-bc877b3d35ec', 'date': 'Fri, 06 Nov 2020 18:22:22 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/2d8fbf4c-58a9-41f1-8187-c9e84e6fac51/add_router_interface'} Body: b'{"id": "2d8fbf4c-58a9-41f1-8187-c9e84e6fac51", "tenant_id": "c56c216173514cd49deee606c5a2800f", "port_id": "1da6eb04-611f-44ce-981c-ba7b8dcfb1ab", "network_id": "58a3f897-b4f9-4825-9050-805055976391", "subnet_id": "cd9352ee-decd-4931-bd2e-7f7b5d0b60f6", "subnet_ids": ["cd9352ee-decd-4931-bd2e-7f7b5d0b60f6"]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:22.668 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:22:22.725 39 INFO tempest.lib.common.rest_client [req-8f1cd1cd-d9dd-4c36-afe0-a95d07a2e9a6 ] Request (RouterRbacTest:test_remove_router_interface): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.055s 2020-11-06 18:22:22.725 39 DEBUG tempest.lib.common.rest_client [req-8f1cd1cd-d9dd-4c36-afe0-a95d07a2e9a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8f1cd1cd-d9dd-4c36-afe0-a95d07a2e9a6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:22.766 39 INFO tempest.lib.common.rest_client [req-5f2053c4-7e7d-40d5-8e6c-16cda14f0777 ] Request (RouterRbacTest:test_remove_router_interface): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:22:22.767 39 DEBUG tempest.lib.common.rest_client [req-5f2053c4-7e7d-40d5-8e6c-16cda14f0777 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5f2053c4-7e7d-40d5-8e6c-16cda14f0777', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["iKrrUanfRYqKzD7-8J4eyQ"], "expires_at": "2020-11-06T19:22:22.000000Z", "issued_at": "2020-11-06T18:22:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:24.406 39 INFO tempest.lib.common.rest_client [req-6509e366-023f-4ebd-8b11-b56343b6c3ff ] Request (RouterRbacTest:test_remove_router_interface): 200 PUT http://172.30.13.94:9696/v2.0/routers/2d8fbf4c-58a9-41f1-8187-c9e84e6fac51/remove_router_interface 1.638s 2020-11-06 18:22:24.407 39 DEBUG tempest.lib.common.rest_client [req-6509e366-023f-4ebd-8b11-b56343b6c3ff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "cd9352ee-decd-4931-bd2e-7f7b5d0b60f6"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-6509e366-023f-4ebd-8b11-b56343b6c3ff', 'date': 'Fri, 06 Nov 2020 18:22:24 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/2d8fbf4c-58a9-41f1-8187-c9e84e6fac51/remove_router_interface'} Body: b'{"id": "2d8fbf4c-58a9-41f1-8187-c9e84e6fac51", "tenant_id": "c56c216173514cd49deee606c5a2800f", "port_id": "1da6eb04-611f-44ce-981c-ba7b8dcfb1ab", "network_id": "58a3f897-b4f9-4825-9050-805055976391", "subnet_id": "cd9352ee-decd-4931-bd2e-7f7b5d0b60f6", "subnet_ids": ["cd9352ee-decd-4931-bd2e-7f7b5d0b60f6"]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:24.407 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:22:24.460 39 INFO tempest.lib.common.rest_client [req-3b4da31c-f335-40c7-bbbb-397f9ba63008 ] Request (RouterRbacTest:test_remove_router_interface): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.052s 2020-11-06 18:22:24.461 39 DEBUG tempest.lib.common.rest_client [req-3b4da31c-f335-40c7-bbbb-397f9ba63008 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3b4da31c-f335-40c7-bbbb-397f9ba63008', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:24.497 39 INFO tempest.lib.common.rest_client [req-f6b8ec18-6761-4577-8263-25178c5556cb ] Request (RouterRbacTest:test_remove_router_interface): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:22:24.497 39 DEBUG tempest.lib.common.rest_client [req-f6b8ec18-6761-4577-8263-25178c5556cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f6b8ec18-6761-4577-8263-25178c5556cb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["R7fQtDUtTHS1fQktNBzvZw"], "expires_at": "2020-11-06T19:22:24.000000Z", "issued_at": "2020-11-06T18:22:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:25.036 39 INFO tempest.lib.common.rest_client [req-b5bb0ed9-3332-48ed-b88f-03bee2fe4f7c ] Request (RouterRbacTest:_run_cleanups): 404 PUT http://172.30.13.94:9696/v2.0/routers/2d8fbf4c-58a9-41f1-8187-c9e84e6fac51/remove_router_interface 0.537s 2020-11-06 18:22:25.036 39 DEBUG tempest.lib.common.rest_client [req-b5bb0ed9-3332-48ed-b88f-03bee2fe4f7c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "cd9352ee-decd-4931-bd2e-7f7b5d0b60f6"} Response - Headers: {'content-type': 'application/json', 'content-length': '198', 'x-openstack-request-id': 'req-b5bb0ed9-3332-48ed-b88f-03bee2fe4f7c', 'date': 'Fri, 06 Nov 2020 18:22:25 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/2d8fbf4c-58a9-41f1-8187-c9e84e6fac51/remove_router_interface'} Body: b'{"NeutronError": {"type": "RouterInterfaceNotFoundForSubnet", "message": "Router 2d8fbf4c-58a9-41f1-8187-c9e84e6fac51 has no interface on subnet cd9352ee-decd-4931-bd2e-7f7b5d0b60f6", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:25.039 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:25.042 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_router, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:25.043 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:25.045 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_router:distributed, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:25.161 39 INFO tempest.lib.common.rest_client [req-c36be42f-3d59-457a-b896-4e5bd2d984e7 ] Request (RouterRbacTest:test_show_distributed_router): 201 POST http://172.30.13.94:9696/v2.0/routers 0.115s 2020-11-06 18:22:25.161 39 DEBUG tempest.lib.common.rest_client [req-c36be42f-3d59-457a-b896-4e5bd2d984e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"distributed": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '497', 'x-openstack-request-id': 'req-c36be42f-3d59-457a-b896-4e5bd2d984e7', 'date': 'Fri, 06 Nov 2020 18:22:25 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "2608c681-c937-4312-b7e6-8b74fa02c2e5", "name": "", "tenant_id": "c56c216173514cd49deee606c5a2800f", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": [], "distributed": true, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T18:22:25Z", "updated_at": "2020-11-06T18:22:25Z", "revision_number": 1, "project_id": "c56c216173514cd49deee606c5a2800f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:25.162 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:22:25.216 39 INFO tempest.lib.common.rest_client [req-5cb2b574-84f1-4059-8a4e-b0693c984ddf ] Request (RouterRbacTest:test_show_distributed_router): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.053s 2020-11-06 18:22:25.217 39 DEBUG tempest.lib.common.rest_client [req-5cb2b574-84f1-4059-8a4e-b0693c984ddf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5cb2b574-84f1-4059-8a4e-b0693c984ddf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:25.255 39 INFO tempest.lib.common.rest_client [req-8d45d559-da28-4c5b-b883-96d3f2af7bcb ] Request (RouterRbacTest:test_show_distributed_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:22:25.256 39 DEBUG tempest.lib.common.rest_client [req-8d45d559-da28-4c5b-b883-96d3f2af7bcb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8d45d559-da28-4c5b-b883-96d3f2af7bcb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["MWMSHPfaQpSU-ixoQlHLmA"], "expires_at": "2020-11-06T19:22:25.000000Z", "issued_at": "2020-11-06T18:22:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:25.454 39 INFO tempest.lib.common.rest_client [req-af6629a1-34e9-495d-a2c8-9765df3ad9fe ] Request (RouterRbacTest:test_show_distributed_router): 200 GET http://172.30.13.94:9696/v2.0/routers/2608c681-c937-4312-b7e6-8b74fa02c2e5?fields=distributed 0.197s 2020-11-06 18:22:25.455 39 DEBUG tempest.lib.common.rest_client [req-af6629a1-34e9-495d-a2c8-9765df3ad9fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '33', 'x-openstack-request-id': 'req-af6629a1-34e9-495d-a2c8-9765df3ad9fe', 'date': 'Fri, 06 Nov 2020 18:22:25 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/2608c681-c937-4312-b7e6-8b74fa02c2e5?fields=distributed'} Body: b'{"router": {"distributed": true}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:25.455 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:22:25.514 39 INFO tempest.lib.common.rest_client [req-60291d71-f62f-4cc5-ac63-95d7800515cc ] Request (RouterRbacTest:test_show_distributed_router): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.058s 2020-11-06 18:22:25.515 39 DEBUG tempest.lib.common.rest_client [req-60291d71-f62f-4cc5-ac63-95d7800515cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-60291d71-f62f-4cc5-ac63-95d7800515cc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:25.550 39 INFO tempest.lib.common.rest_client [req-61155244-c156-49ac-bf4a-d06a718f8d48 ] Request (RouterRbacTest:test_show_distributed_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:22:25.551 39 DEBUG tempest.lib.common.rest_client [req-61155244-c156-49ac-bf4a-d06a718f8d48 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-61155244-c156-49ac-bf4a-d06a718f8d48', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["EuhjXHiLRpm4jXRLxe9SjA"], "expires_at": "2020-11-06T19:22:25.000000Z", "issued_at": "2020-11-06T18:22:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:26.054 39 INFO tempest.lib.common.rest_client [req-5c1ef56e-9cd6-4096-8ce5-aed38595bed6 ] Request (RouterRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/routers/2608c681-c937-4312-b7e6-8b74fa02c2e5 0.502s 2020-11-06 18:22:26.055 39 DEBUG tempest.lib.common.rest_client [req-5c1ef56e-9cd6-4096-8ce5-aed38595bed6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-5c1ef56e-9cd6-4096-8ce5-aed38595bed6', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:22:26 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/2608c681-c937-4312-b7e6-8b74fa02c2e5'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:26.058 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:26.061 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_router, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:26.062 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:26.064 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_router:ha, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:27.936 39 INFO tempest.lib.common.rest_client [req-400921dc-495e-4f45-a90f-30cb3db18fb2 ] Request (RouterRbacTest:test_show_high_availability_router): 201 POST http://172.30.13.94:9696/v2.0/routers 1.872s 2020-11-06 18:22:27.937 39 DEBUG tempest.lib.common.rest_client [req-400921dc-495e-4f45-a90f-30cb3db18fb2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"ha": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '497', 'x-openstack-request-id': 'req-400921dc-495e-4f45-a90f-30cb3db18fb2', 'date': 'Fri, 06 Nov 2020 18:22:27 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "0eebfc1e-7021-468a-bd6e-9082a630cff5", "name": "", "tenant_id": "c56c216173514cd49deee606c5a2800f", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": [], "distributed": false, "ha": true, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T18:22:26Z", "updated_at": "2020-11-06T18:22:26Z", "revision_number": 2, "project_id": "c56c216173514cd49deee606c5a2800f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:27.938 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:22:27.999 39 INFO tempest.lib.common.rest_client [req-60485498-5b49-4055-aa08-91540c94feaf ] Request (RouterRbacTest:test_show_high_availability_router): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.060s 2020-11-06 18:22:27.999 39 DEBUG tempest.lib.common.rest_client [req-60485498-5b49-4055-aa08-91540c94feaf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-60485498-5b49-4055-aa08-91540c94feaf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:28.043 39 INFO tempest.lib.common.rest_client [req-c1dabde6-8bba-4ee5-a314-1865b08146a3 ] Request (RouterRbacTest:test_show_high_availability_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-11-06 18:22:28.044 39 DEBUG tempest.lib.common.rest_client [req-c1dabde6-8bba-4ee5-a314-1865b08146a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c1dabde6-8bba-4ee5-a314-1865b08146a3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["dRL01fjLRU-NAZtyKLHdbA"], "expires_at": "2020-11-06T19:22:28.000000Z", "issued_at": "2020-11-06T18:22:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:28.278 39 INFO tempest.lib.common.rest_client [req-e898f03a-0474-41b4-8d39-cbc9dc6baaff ] Request (RouterRbacTest:test_show_high_availability_router): 200 GET http://172.30.13.94:9696/v2.0/routers/0eebfc1e-7021-468a-bd6e-9082a630cff5?fields=ha 0.233s 2020-11-06 18:22:28.279 39 DEBUG tempest.lib.common.rest_client [req-e898f03a-0474-41b4-8d39-cbc9dc6baaff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '24', 'x-openstack-request-id': 'req-e898f03a-0474-41b4-8d39-cbc9dc6baaff', 'date': 'Fri, 06 Nov 2020 18:22:28 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/0eebfc1e-7021-468a-bd6e-9082a630cff5?fields=ha'} Body: b'{"router": {"ha": true}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:28.280 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:22:28.341 39 INFO tempest.lib.common.rest_client [req-17912684-4960-4d5f-b156-370b4e93f269 ] Request (RouterRbacTest:test_show_high_availability_router): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.060s 2020-11-06 18:22:28.342 39 DEBUG tempest.lib.common.rest_client [req-17912684-4960-4d5f-b156-370b4e93f269 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-17912684-4960-4d5f-b156-370b4e93f269', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:28.379 39 INFO tempest.lib.common.rest_client [req-4b13ddb9-a3b1-467c-a09c-b9ae58c119f1 ] Request (RouterRbacTest:test_show_high_availability_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:22:28.379 39 DEBUG tempest.lib.common.rest_client [req-4b13ddb9-a3b1-467c-a09c-b9ae58c119f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4b13ddb9-a3b1-467c-a09c-b9ae58c119f1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["h6E6IAvzQ1aSopMfu0JAYA"], "expires_at": "2020-11-06T19:22:28.000000Z", "issued_at": "2020-11-06T18:22:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:32.233 39 INFO tempest.lib.common.rest_client [req-41064515-0bd2-4b9e-b218-81bb7a27ed66 ] Request (RouterRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/routers/0eebfc1e-7021-468a-bd6e-9082a630cff5 3.852s 2020-11-06 18:22:32.234 39 DEBUG tempest.lib.common.rest_client [req-41064515-0bd2-4b9e-b218-81bb7a27ed66 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-41064515-0bd2-4b9e-b218-81bb7a27ed66', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:22:32 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/0eebfc1e-7021-468a-bd6e-9082a630cff5'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:32.236 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:32.239 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_router, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:32.240 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:22:32.290 39 INFO tempest.lib.common.rest_client [req-5e4aca6a-2d24-4f1c-bac6-b0fd11864b90 ] Request (RouterRbacTest:test_show_router): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.050s 2020-11-06 18:22:32.291 39 DEBUG tempest.lib.common.rest_client [req-5e4aca6a-2d24-4f1c-bac6-b0fd11864b90 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5e4aca6a-2d24-4f1c-bac6-b0fd11864b90', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:32.325 39 INFO tempest.lib.common.rest_client [req-cbd0f73e-472c-48b7-8d21-274fe0077abd ] Request (RouterRbacTest:test_show_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:22:32.326 39 DEBUG tempest.lib.common.rest_client [req-cbd0f73e-472c-48b7-8d21-274fe0077abd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cbd0f73e-472c-48b7-8d21-274fe0077abd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["mbVXil-zTe6E940KXzpAFw"], "expires_at": "2020-11-06T19:22:32.000000Z", "issued_at": "2020-11-06T18:22:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:32.459 39 INFO tempest.lib.common.rest_client [req-1cd6129c-c407-41a9-bff0-5028bf87df18 ] Request (RouterRbacTest:test_show_router): 200 GET http://172.30.13.94:9696/v2.0/routers/d739609f-3a9e-40df-be53-1aa5ccc6ec7a?fields=id 0.132s 2020-11-06 18:22:32.460 39 DEBUG tempest.lib.common.rest_client [req-1cd6129c-c407-41a9-bff0-5028bf87df18 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '58', 'x-openstack-request-id': 'req-1cd6129c-c407-41a9-bff0-5028bf87df18', 'date': 'Fri, 06 Nov 2020 18:22:32 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/d739609f-3a9e-40df-be53-1aa5ccc6ec7a?fields=id'} Body: b'{"router": {"id": "d739609f-3a9e-40df-be53-1aa5ccc6ec7a"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:32.461 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:22:32.508 39 INFO tempest.lib.common.rest_client [req-0f4736b8-1410-4c0e-830e-fed27a448d5a ] Request (RouterRbacTest:test_show_router): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.046s 2020-11-06 18:22:32.508 39 DEBUG tempest.lib.common.rest_client [req-0f4736b8-1410-4c0e-830e-fed27a448d5a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0f4736b8-1410-4c0e-830e-fed27a448d5a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:32.543 39 INFO tempest.lib.common.rest_client [req-2007cc12-53f4-4a5e-9c85-092cc0994d2f ] Request (RouterRbacTest:test_show_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:22:32.543 39 DEBUG tempest.lib.common.rest_client [req-2007cc12-53f4-4a5e-9c85-092cc0994d2f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2007cc12-53f4-4a5e-9c85-092cc0994d2f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["eW7CywctROKG3OXs-ihnGg"], "expires_at": "2020-11-06T19:22:32.000000Z", "issued_at": "2020-11-06T18:22:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:32.546 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:32.550 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_router, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:32.550 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:32.554 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_router, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:32.554 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:32.558 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_router:distributed, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:32.558 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:22:32.611 39 INFO tempest.lib.common.rest_client [req-cdbe9f08-7bca-4683-90dd-a0dc34943f3e ] Request (RouterRbacTest:test_update_distributed_router): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.052s 2020-11-06 18:22:32.611 39 DEBUG tempest.lib.common.rest_client [req-cdbe9f08-7bca-4683-90dd-a0dc34943f3e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cdbe9f08-7bca-4683-90dd-a0dc34943f3e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:32.657 39 INFO tempest.lib.common.rest_client [req-07c41162-b700-4306-8c1e-fb5ea19c93a6 ] Request (RouterRbacTest:test_update_distributed_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-11-06 18:22:32.658 39 DEBUG tempest.lib.common.rest_client [req-07c41162-b700-4306-8c1e-fb5ea19c93a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-07c41162-b700-4306-8c1e-fb5ea19c93a6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["SJfhSxg8SeuMZ-Qtlb8LVQ"], "expires_at": "2020-11-06T19:22:32.000000Z", "issued_at": "2020-11-06T18:22:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:33.328 39 INFO tempest.lib.common.rest_client [req-4b32a411-ce0e-4cd7-a15c-7f07cd83320c ] Request (RouterRbacTest:test_update_distributed_router): 200 PUT http://172.30.13.94:9696/v2.0/routers/d739609f-3a9e-40df-be53-1aa5ccc6ec7a 0.669s 2020-11-06 18:22:33.329 39 DEBUG tempest.lib.common.rest_client [req-4b32a411-ce0e-4cd7-a15c-7f07cd83320c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"distributed": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '538', 'x-openstack-request-id': 'req-4b32a411-ce0e-4cd7-a15c-7f07cd83320c', 'date': 'Fri, 06 Nov 2020 18:22:33 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/d739609f-3a9e-40df-be53-1aa5ccc6ec7a'} Body: b'{"router": {"id": "d739609f-3a9e-40df-be53-1aa5ccc6ec7a", "name": "tempest-RouterRbacTest-router-1880946517", "tenant_id": "c56c216173514cd49deee606c5a2800f", "admin_state_up": false, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": [], "distributed": true, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T18:21:55Z", "updated_at": "2020-11-06T18:22:33Z", "revision_number": 2, "project_id": "c56c216173514cd49deee606c5a2800f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:33.329 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:22:33.389 39 INFO tempest.lib.common.rest_client [req-47ffdf26-8a7f-4f35-a84b-76640628f893 ] Request (RouterRbacTest:test_update_distributed_router): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.058s 2020-11-06 18:22:33.390 39 DEBUG tempest.lib.common.rest_client [req-47ffdf26-8a7f-4f35-a84b-76640628f893 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-47ffdf26-8a7f-4f35-a84b-76640628f893', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:33.430 39 INFO tempest.lib.common.rest_client [req-24548d5b-172f-4030-9447-05f9ba307363 ] Request (RouterRbacTest:test_update_distributed_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:22:33.430 39 DEBUG tempest.lib.common.rest_client [req-24548d5b-172f-4030-9447-05f9ba307363 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-24548d5b-172f-4030-9447-05f9ba307363', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["vdpa-YQUSKGV1duFJlMGqw"], "expires_at": "2020-11-06T19:22:33.000000Z", "issued_at": "2020-11-06T18:22:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:34.008 39 INFO tempest.lib.common.rest_client [req-b5f6049b-b37d-40c8-a1ac-1ca7ebac6d9a ] Request (RouterRbacTest:_run_cleanups): 200 PUT http://172.30.13.94:9696/v2.0/routers/d739609f-3a9e-40df-be53-1aa5ccc6ec7a 0.576s 2020-11-06 18:22:34.008 39 DEBUG tempest.lib.common.rest_client [req-b5f6049b-b37d-40c8-a1ac-1ca7ebac6d9a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"distributed": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '539', 'x-openstack-request-id': 'req-b5f6049b-b37d-40c8-a1ac-1ca7ebac6d9a', 'date': 'Fri, 06 Nov 2020 18:22:34 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/d739609f-3a9e-40df-be53-1aa5ccc6ec7a'} Body: b'{"router": {"id": "d739609f-3a9e-40df-be53-1aa5ccc6ec7a", "name": "tempest-RouterRbacTest-router-1880946517", "tenant_id": "c56c216173514cd49deee606c5a2800f", "admin_state_up": false, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T18:21:55Z", "updated_at": "2020-11-06T18:22:33Z", "revision_number": 3, "project_id": "c56c216173514cd49deee606c5a2800f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:34.011 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:34.015 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_router, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:34.015 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:34.019 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_router, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:34.019 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:34.022 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_router:ha, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:34.022 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:22:34.076 39 INFO tempest.lib.common.rest_client [req-05a30afa-909d-407c-94c5-2b1845a0529f ] Request (RouterRbacTest:test_update_high_availability_router): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.053s 2020-11-06 18:22:34.076 39 DEBUG tempest.lib.common.rest_client [req-05a30afa-909d-407c-94c5-2b1845a0529f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-05a30afa-909d-407c-94c5-2b1845a0529f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:34.115 39 INFO tempest.lib.common.rest_client [req-4b782790-9b54-44e6-86b3-02b19be1b996 ] Request (RouterRbacTest:test_update_high_availability_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:22:34.116 39 DEBUG tempest.lib.common.rest_client [req-4b782790-9b54-44e6-86b3-02b19be1b996 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4b782790-9b54-44e6-86b3-02b19be1b996', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["tdO0ilyCTnu1Ss5ldWU2TA"], "expires_at": "2020-11-06T19:22:34.000000Z", "issued_at": "2020-11-06T18:22:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:37.751 39 INFO tempest.lib.common.rest_client [req-c591e29b-38f9-4083-802b-3f4d00822e92 ] Request (RouterRbacTest:test_update_high_availability_router): 200 PUT http://172.30.13.94:9696/v2.0/routers/d739609f-3a9e-40df-be53-1aa5ccc6ec7a 3.634s 2020-11-06 18:22:37.752 39 DEBUG tempest.lib.common.rest_client [req-c591e29b-38f9-4083-802b-3f4d00822e92 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"ha": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '544', 'x-openstack-request-id': 'req-c591e29b-38f9-4083-802b-3f4d00822e92', 'date': 'Fri, 06 Nov 2020 18:22:37 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/d739609f-3a9e-40df-be53-1aa5ccc6ec7a'} Body: b'{"router": {"id": "d739609f-3a9e-40df-be53-1aa5ccc6ec7a", "name": "tempest-RouterRbacTest-router-1880946517", "tenant_id": "c56c216173514cd49deee606c5a2800f", "admin_state_up": false, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": ["nova"], "distributed": false, "ha": true, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T18:21:55Z", "updated_at": "2020-11-06T18:22:35Z", "revision_number": 4, "project_id": "c56c216173514cd49deee606c5a2800f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:37.752 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:22:37.802 39 INFO tempest.lib.common.rest_client [req-5bb7cec7-941b-41c6-b4b2-a0ba23aa6b82 ] Request (RouterRbacTest:test_update_high_availability_router): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.049s 2020-11-06 18:22:37.803 39 DEBUG tempest.lib.common.rest_client [req-5bb7cec7-941b-41c6-b4b2-a0ba23aa6b82 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5bb7cec7-941b-41c6-b4b2-a0ba23aa6b82', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:37.833 39 INFO tempest.lib.common.rest_client [req-408f239d-792f-4ecc-a277-8151bf1a4e8e ] Request (RouterRbacTest:test_update_high_availability_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.030s 2020-11-06 18:22:37.834 39 DEBUG tempest.lib.common.rest_client [req-408f239d-792f-4ecc-a277-8151bf1a4e8e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-408f239d-792f-4ecc-a277-8151bf1a4e8e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["X5TKeJ6MRM6rdIolc3vApA"], "expires_at": "2020-11-06T19:22:37.000000Z", "issued_at": "2020-11-06T18:22:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:41.437 39 INFO tempest.lib.common.rest_client [req-ffa90b97-4859-41b9-a8de-aa8173e66f14 ] Request (RouterRbacTest:_run_cleanups): 200 PUT http://172.30.13.94:9696/v2.0/routers/d739609f-3a9e-40df-be53-1aa5ccc6ec7a 3.602s 2020-11-06 18:22:41.438 39 DEBUG tempest.lib.common.rest_client [req-ffa90b97-4859-41b9-a8de-aa8173e66f14 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"ha": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '545', 'x-openstack-request-id': 'req-ffa90b97-4859-41b9-a8de-aa8173e66f14', 'date': 'Fri, 06 Nov 2020 18:22:41 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/d739609f-3a9e-40df-be53-1aa5ccc6ec7a'} Body: b'{"router": {"id": "d739609f-3a9e-40df-be53-1aa5ccc6ec7a", "name": "tempest-RouterRbacTest-router-1880946517", "tenant_id": "c56c216173514cd49deee606c5a2800f", "admin_state_up": false, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": ["nova"], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T18:21:55Z", "updated_at": "2020-11-06T18:22:38Z", "revision_number": 7, "project_id": "c56c216173514cd49deee606c5a2800f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:41.440 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:41.444 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_router, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:41.445 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:41.448 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_router, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:41.449 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:22:41.494 39 INFO tempest.lib.common.rest_client [req-1ab746ec-9f69-4991-a64e-7c87b06fa171 ] Request (RouterRbacTest:test_update_router): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.044s 2020-11-06 18:22:41.495 39 DEBUG tempest.lib.common.rest_client [req-1ab746ec-9f69-4991-a64e-7c87b06fa171 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1ab746ec-9f69-4991-a64e-7c87b06fa171', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:41.524 39 INFO tempest.lib.common.rest_client [req-3d5bd46d-4c44-456c-b774-75c8e345b531 ] Request (RouterRbacTest:test_update_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.028s 2020-11-06 18:22:41.525 39 DEBUG tempest.lib.common.rest_client [req-3d5bd46d-4c44-456c-b774-75c8e345b531 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3d5bd46d-4c44-456c-b774-75c8e345b531', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["LEqteV8hQTqKZgeVBFWzRQ"], "expires_at": "2020-11-06T19:22:41.000000Z", "issued_at": "2020-11-06T18:22:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:43.189 39 INFO tempest.lib.common.rest_client [req-680839db-d45f-4e83-981c-5f386c5a0b66 ] Request (RouterRbacTest:test_update_router): 200 PUT http://172.30.13.94:9696/v2.0/routers/d739609f-3a9e-40df-be53-1aa5ccc6ec7a 1.663s 2020-11-06 18:22:43.190 39 DEBUG tempest.lib.common.rest_client [req-680839db-d45f-4e83-981c-5f386c5a0b66 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-RouterRbacTest-new-router-name-1636504274"}} Response - Headers: {'content-type': 'application/json', 'content-length': '554', 'x-openstack-request-id': 'req-680839db-d45f-4e83-981c-5f386c5a0b66', 'date': 'Fri, 06 Nov 2020 18:22:43 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/d739609f-3a9e-40df-be53-1aa5ccc6ec7a'} Body: b'{"router": {"id": "d739609f-3a9e-40df-be53-1aa5ccc6ec7a", "name": "tempest-RouterRbacTest-new-router-name-1636504274", "tenant_id": "c56c216173514cd49deee606c5a2800f", "admin_state_up": false, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": ["nova"], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T18:21:55Z", "updated_at": "2020-11-06T18:22:43Z", "revision_number": 9, "project_id": "c56c216173514cd49deee606c5a2800f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:43.190 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:22:43.258 39 INFO tempest.lib.common.rest_client [req-bbb597fa-a0fd-49ec-91b7-7cab53f6391f ] Request (RouterRbacTest:test_update_router): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.066s 2020-11-06 18:22:43.259 39 DEBUG tempest.lib.common.rest_client [req-bbb597fa-a0fd-49ec-91b7-7cab53f6391f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bbb597fa-a0fd-49ec-91b7-7cab53f6391f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:43.294 39 INFO tempest.lib.common.rest_client [req-d9a03aa5-63ed-4917-afd1-ed4a1d1c10e4 ] Request (RouterRbacTest:test_update_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:22:43.294 39 DEBUG tempest.lib.common.rest_client [req-d9a03aa5-63ed-4917-afd1-ed4a1d1c10e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d9a03aa5-63ed-4917-afd1-ed4a1d1c10e4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["oMw9tWKTSj6k4R2G3p1qhQ"], "expires_at": "2020-11-06T19:22:43.000000Z", "issued_at": "2020-11-06T18:22:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:43.296 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:43.299 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_router, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:43.299 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:43.302 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_router, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:43.302 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:43.304 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_router:external_gateway_info, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:43.304 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:43.307 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_router:external_gateway_info:enable_snat, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:43.307 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:22:43.359 39 INFO tempest.lib.common.rest_client [req-854c55ee-4a7e-4cc4-98aa-283ebb0965be ] Request (RouterRbacTest:test_update_router_enable_snat): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.052s 2020-11-06 18:22:43.360 39 DEBUG tempest.lib.common.rest_client [req-854c55ee-4a7e-4cc4-98aa-283ebb0965be ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-854c55ee-4a7e-4cc4-98aa-283ebb0965be', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:43.396 39 INFO tempest.lib.common.rest_client [req-3fa1bcd5-6ee9-40a2-b185-6834cb52cf8c ] Request (RouterRbacTest:test_update_router_enable_snat): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:22:43.397 39 DEBUG tempest.lib.common.rest_client [req-3fa1bcd5-6ee9-40a2-b185-6834cb52cf8c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3fa1bcd5-6ee9-40a2-b185-6834cb52cf8c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["4B-O2so1QpmntY7Mpi_gNQ"], "expires_at": "2020-11-06T19:22:43.000000Z", "issued_at": "2020-11-06T18:22:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:44.764 39 INFO tempest.lib.common.rest_client [req-2e69f1ec-ec25-489c-9446-69bf5b3cfdc9 ] Request (RouterRbacTest:test_update_router_enable_snat): 200 PUT http://172.30.13.94:9696/v2.0/routers/d739609f-3a9e-40df-be53-1aa5ccc6ec7a 1.366s 2020-11-06 18:22:44.765 39 DEBUG tempest.lib.common.rest_client [req-2e69f1ec-ec25-489c-9446-69bf5b3cfdc9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"external_gateway_info": {"network_id": "c0683248-2cc2-4ea5-a866-63d525ef4f98", "enable_snat": true}}} Response - Headers: {'content-type': 'application/json', 'content-length': '736', 'x-openstack-request-id': 'req-2e69f1ec-ec25-489c-9446-69bf5b3cfdc9', 'date': 'Fri, 06 Nov 2020 18:22:44 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/d739609f-3a9e-40df-be53-1aa5ccc6ec7a'} Body: b'{"router": {"id": "d739609f-3a9e-40df-be53-1aa5ccc6ec7a", "name": "tempest-RouterRbacTest-new-router-name-1636504274", "tenant_id": "c56c216173514cd49deee606c5a2800f", "admin_state_up": false, "status": "ACTIVE", "external_gateway_info": {"network_id": "c0683248-2cc2-4ea5-a866-63d525ef4f98", "external_fixed_ips": [{"subnet_id": "c872f016-acca-4991-a42b-adcc9a317583", "ip_address": "192.168.120.6"}], "enable_snat": true}, "description": "", "availability_zones": ["nova"], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T18:21:55Z", "updated_at": "2020-11-06T18:22:44Z", "revision_number": 11, "project_id": "c56c216173514cd49deee606c5a2800f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:44.765 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:22:44.824 39 INFO tempest.lib.common.rest_client [req-46deb5dc-4101-4a1f-8a15-9e219c16582b ] Request (RouterRbacTest:test_update_router_enable_snat): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.058s 2020-11-06 18:22:44.825 39 DEBUG tempest.lib.common.rest_client [req-46deb5dc-4101-4a1f-8a15-9e219c16582b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-46deb5dc-4101-4a1f-8a15-9e219c16582b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:44.862 39 INFO tempest.lib.common.rest_client [req-4c2cc13d-2e49-42c6-a6cd-0f5e96a27ab3 ] Request (RouterRbacTest:test_update_router_enable_snat): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:22:44.862 39 DEBUG tempest.lib.common.rest_client [req-4c2cc13d-2e49-42c6-a6cd-0f5e96a27ab3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4c2cc13d-2e49-42c6-a6cd-0f5e96a27ab3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["nAcAIdFeTayeVfKWBvdzEA"], "expires_at": "2020-11-06T19:22:44.000000Z", "issued_at": "2020-11-06T18:22:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:46.271 39 INFO tempest.lib.common.rest_client [req-9a0014a8-d911-4e07-af41-c8dbe2adfda2 ] Request (RouterRbacTest:_run_cleanups): 200 PUT http://172.30.13.94:9696/v2.0/routers/d739609f-3a9e-40df-be53-1aa5ccc6ec7a 1.407s 2020-11-06 18:22:46.272 39 DEBUG tempest.lib.common.rest_client [req-9a0014a8-d911-4e07-af41-c8dbe2adfda2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"external_gateway_info": null}} Response - Headers: {'content-type': 'application/json', 'content-length': '555', 'x-openstack-request-id': 'req-9a0014a8-d911-4e07-af41-c8dbe2adfda2', 'date': 'Fri, 06 Nov 2020 18:22:46 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/d739609f-3a9e-40df-be53-1aa5ccc6ec7a'} Body: b'{"router": {"id": "d739609f-3a9e-40df-be53-1aa5ccc6ec7a", "name": "tempest-RouterRbacTest-new-router-name-1636504274", "tenant_id": "c56c216173514cd49deee606c5a2800f", "admin_state_up": false, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": ["nova"], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T18:21:55Z", "updated_at": "2020-11-06T18:22:45Z", "revision_number": 14, "project_id": "c56c216173514cd49deee606c5a2800f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:46.275 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:46.279 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_router, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:46.280 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:46.282 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_router, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:46.283 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:46.285 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_router:external_gateway_info, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:46.285 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:46.287 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_router:external_gateway_info:external_fixed_ips, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:46.350 39 INFO tempest.lib.common.rest_client [req-9124b34d-695a-4d32-824d-81f2316cca8a ] Request (RouterRbacTest:test_update_router_external_fixed_ips): 200 GET http://172.30.13.94:9696/v2.0/ports?network_id=c0683248-2cc2-4ea5-a866-63d525ef4f98 0.061s 2020-11-06 18:22:46.350 39 DEBUG tempest.lib.common.rest_client [req-9124b34d-695a-4d32-824d-81f2316cca8a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '1229', 'x-openstack-request-id': 'req-9124b34d-695a-4d32-824d-81f2316cca8a', 'date': 'Fri, 06 Nov 2020 18:22:46 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports?network_id=c0683248-2cc2-4ea5-a866-63d525ef4f98'} Body: b'{"ports":[{"id":"cc576d61-b03a-4cce-8850-599e7f7ea67f","name":"","network_id":"c0683248-2cc2-4ea5-a866-63d525ef4f98","tenant_id":"c56c216173514cd49deee606c5a2800f","mac_address":"fa:16:3e:6d:53:da","admin_state_up":true,"status":"ACTIVE","device_id":"dhcpcf0aa1ad-fc1e-58c4-863b-aba14f17f098-c0683248-2cc2-4ea5-a866-63d525ef4f98","device_owner":"network:dhcp","fixed_ips":[{"subnet_id":"c872f016-acca-4991-a42b-adcc9a317583","ip_address":"192.168.120.2"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":[],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"lf-virtual9","binding:vif_type":"ovs","binding:vif_details":{"connectivity":"l2","port_filter":true,"ovs_hybrid_plug":false,"datapath_type":"system","bridge_name":"br-int"},"port_security_enabled":false,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.2","hostname":"host-192-168-120-2","fqdn":"host-192-168-120-2.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:21:55Z","updated_at":"2020-11-06T18:21:59Z","revision_number":3,"project_id":"c56c216173514cd49deee606c5a2800f"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:46.405 39 INFO tempest.lib.common.rest_client [req-bc257db1-e4bd-439c-a720-45c48030efc9 ] Request (RouterRbacTest:test_update_router_external_fixed_ips): 200 GET http://172.30.13.94:9696/v2.0/subnets/c872f016-acca-4991-a42b-adcc9a317583 0.054s 2020-11-06 18:22:46.405 39 DEBUG tempest.lib.common.rest_client [req-bc257db1-e4bd-439c-a720-45c48030efc9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '661', 'x-openstack-request-id': 'req-bc257db1-e4bd-439c-a720-45c48030efc9', 'date': 'Fri, 06 Nov 2020 18:22:46 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/c872f016-acca-4991-a42b-adcc9a317583'} Body: b'{"subnet":{"id":"c872f016-acca-4991-a42b-adcc9a317583","name":"","tenant_id":"c56c216173514cd49deee606c5a2800f","network_id":"c0683248-2cc2-4ea5-a866-63d525ef4f98","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-11-06T18:21:54Z","updated_at":"2020-11-06T18:21:54Z","revision_number":0,"project_id":"c56c216173514cd49deee606c5a2800f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:46.407 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:22:46.466 39 INFO tempest.lib.common.rest_client [req-90a9bd45-4af1-4f18-a7e4-2cf2a1847c7f ] Request (RouterRbacTest:test_update_router_external_fixed_ips): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.058s 2020-11-06 18:22:46.467 39 DEBUG tempest.lib.common.rest_client [req-90a9bd45-4af1-4f18-a7e4-2cf2a1847c7f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-90a9bd45-4af1-4f18-a7e4-2cf2a1847c7f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:46.504 39 INFO tempest.lib.common.rest_client [req-d0091fd7-fa17-4f02-8c3b-c141378eb6fd ] Request (RouterRbacTest:test_update_router_external_fixed_ips): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:22:46.505 39 DEBUG tempest.lib.common.rest_client [req-d0091fd7-fa17-4f02-8c3b-c141378eb6fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d0091fd7-fa17-4f02-8c3b-c141378eb6fd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["n0iJV-cYRIWOCClPYYhiww"], "expires_at": "2020-11-06T19:22:46.000000Z", "issued_at": "2020-11-06T18:22:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:48.413 39 INFO tempest.lib.common.rest_client [req-38148bc8-5042-4cdb-bebb-a2ef28f27982 ] Request (RouterRbacTest:test_update_router_external_fixed_ips): 200 PUT http://172.30.13.94:9696/v2.0/routers/d739609f-3a9e-40df-be53-1aa5ccc6ec7a 1.907s 2020-11-06 18:22:48.414 39 DEBUG tempest.lib.common.rest_client [req-38148bc8-5042-4cdb-bebb-a2ef28f27982 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"external_gateway_info": {"network_id": "c0683248-2cc2-4ea5-a866-63d525ef4f98", "external_fixed_ips": [{"subnet_id": "c872f016-acca-4991-a42b-adcc9a317583", "ip_address": "192.168.120.14"}]}}} Response - Headers: {'content-type': 'application/json', 'content-length': '737', 'x-openstack-request-id': 'req-38148bc8-5042-4cdb-bebb-a2ef28f27982', 'date': 'Fri, 06 Nov 2020 18:22:48 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/d739609f-3a9e-40df-be53-1aa5ccc6ec7a'} Body: b'{"router": {"id": "d739609f-3a9e-40df-be53-1aa5ccc6ec7a", "name": "tempest-RouterRbacTest-new-router-name-1636504274", "tenant_id": "c56c216173514cd49deee606c5a2800f", "admin_state_up": false, "status": "ACTIVE", "external_gateway_info": {"network_id": "c0683248-2cc2-4ea5-a866-63d525ef4f98", "external_fixed_ips": [{"subnet_id": "c872f016-acca-4991-a42b-adcc9a317583", "ip_address": "192.168.120.14"}], "enable_snat": true}, "description": "", "availability_zones": ["nova"], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T18:21:55Z", "updated_at": "2020-11-06T18:22:47Z", "revision_number": 16, "project_id": "c56c216173514cd49deee606c5a2800f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:48.415 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:22:48.470 39 INFO tempest.lib.common.rest_client [req-3e12008b-36c0-47ad-982a-458e785b145a ] Request (RouterRbacTest:test_update_router_external_fixed_ips): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.054s 2020-11-06 18:22:48.470 39 DEBUG tempest.lib.common.rest_client [req-3e12008b-36c0-47ad-982a-458e785b145a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3e12008b-36c0-47ad-982a-458e785b145a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:48.509 39 INFO tempest.lib.common.rest_client [req-3a8b5f6c-3b63-4526-8793-4850cd2aeb32 ] Request (RouterRbacTest:test_update_router_external_fixed_ips): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:22:48.509 39 DEBUG tempest.lib.common.rest_client [req-3a8b5f6c-3b63-4526-8793-4850cd2aeb32 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3a8b5f6c-3b63-4526-8793-4850cd2aeb32', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["H5m5Sqo9SHivFQ46DMEPhg"], "expires_at": "2020-11-06T19:22:48.000000Z", "issued_at": "2020-11-06T18:22:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:49.895 39 INFO tempest.lib.common.rest_client [req-17f42f1d-4b9a-4150-ad1e-61e22c70bab1 ] Request (RouterRbacTest:_run_cleanups): 200 PUT http://172.30.13.94:9696/v2.0/routers/d739609f-3a9e-40df-be53-1aa5ccc6ec7a 1.384s 2020-11-06 18:22:49.896 39 DEBUG tempest.lib.common.rest_client [req-17f42f1d-4b9a-4150-ad1e-61e22c70bab1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"external_gateway_info": null}} Response - Headers: {'content-type': 'application/json', 'content-length': '555', 'x-openstack-request-id': 'req-17f42f1d-4b9a-4150-ad1e-61e22c70bab1', 'date': 'Fri, 06 Nov 2020 18:22:49 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/d739609f-3a9e-40df-be53-1aa5ccc6ec7a'} Body: b'{"router": {"id": "d739609f-3a9e-40df-be53-1aa5ccc6ec7a", "name": "tempest-RouterRbacTest-new-router-name-1636504274", "tenant_id": "c56c216173514cd49deee606c5a2800f", "admin_state_up": false, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": ["nova"], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T18:21:55Z", "updated_at": "2020-11-06T18:22:49Z", "revision_number": 19, "project_id": "c56c216173514cd49deee606c5a2800f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:49.898 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:49.902 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_router, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:49.903 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:49.906 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_router, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:49.906 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:49.908 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_router:external_gateway_info, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:49.908 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:22:49.963 39 INFO tempest.lib.common.rest_client [req-1d31581e-3341-4f50-a03b-c34d315e2576 ] Request (RouterRbacTest:test_update_router_external_gateway_info): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.053s 2020-11-06 18:22:49.963 39 DEBUG tempest.lib.common.rest_client [req-1d31581e-3341-4f50-a03b-c34d315e2576 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1d31581e-3341-4f50-a03b-c34d315e2576', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:50.005 39 INFO tempest.lib.common.rest_client [req-39989f0f-835e-43b6-81ed-3256759d2890 ] Request (RouterRbacTest:test_update_router_external_gateway_info): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-11-06 18:22:50.006 39 DEBUG tempest.lib.common.rest_client [req-39989f0f-835e-43b6-81ed-3256759d2890 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-39989f0f-835e-43b6-81ed-3256759d2890', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["ujNsBYGfTxaxtC5wjh3qlg"], "expires_at": "2020-11-06T19:22:49.000000Z", "issued_at": "2020-11-06T18:22:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:50.536 39 INFO tempest.lib.common.rest_client [req-440df858-aca1-417d-a8d3-27dd5796278c ] Request (RouterRbacTest:test_update_router_external_gateway_info): 200 PUT http://172.30.13.94:9696/v2.0/routers/d739609f-3a9e-40df-be53-1aa5ccc6ec7a 0.529s 2020-11-06 18:22:50.537 39 DEBUG tempest.lib.common.rest_client [req-440df858-aca1-417d-a8d3-27dd5796278c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"external_gateway_info": {}}} Response - Headers: {'content-type': 'application/json', 'content-length': '555', 'x-openstack-request-id': 'req-440df858-aca1-417d-a8d3-27dd5796278c', 'date': 'Fri, 06 Nov 2020 18:22:50 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/d739609f-3a9e-40df-be53-1aa5ccc6ec7a'} Body: b'{"router": {"id": "d739609f-3a9e-40df-be53-1aa5ccc6ec7a", "name": "tempest-RouterRbacTest-new-router-name-1636504274", "tenant_id": "c56c216173514cd49deee606c5a2800f", "admin_state_up": false, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": ["nova"], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T18:21:55Z", "updated_at": "2020-11-06T18:22:50Z", "revision_number": 20, "project_id": "c56c216173514cd49deee606c5a2800f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:50.538 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:22:50.589 39 INFO tempest.lib.common.rest_client [req-55a83c94-88c6-42bd-bdb2-aa7f62fdc171 ] Request (RouterRbacTest:test_update_router_external_gateway_info): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.050s 2020-11-06 18:22:50.589 39 DEBUG tempest.lib.common.rest_client [req-55a83c94-88c6-42bd-bdb2-aa7f62fdc171 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-55a83c94-88c6-42bd-bdb2-aa7f62fdc171', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:50.630 39 INFO tempest.lib.common.rest_client [req-459f3abd-bd9c-4b76-a2c0-e656c4a4e11f ] Request (RouterRbacTest:test_update_router_external_gateway_info): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:22:50.631 39 DEBUG tempest.lib.common.rest_client [req-459f3abd-bd9c-4b76-a2c0-e656c4a4e11f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-459f3abd-bd9c-4b76-a2c0-e656c4a4e11f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["6epQkj_-T_egX3zdOLpmaw"], "expires_at": "2020-11-06T19:22:50.000000Z", "issued_at": "2020-11-06T18:22:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:50.633 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:50.637 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_router, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:50.637 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:50.639 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_router, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:50.640 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:50.642 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_router:external_gateway_info, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:50.642 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:22:50.644 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_router:external_gateway_info:network_id, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:22:50.644 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:22:50.695 39 INFO tempest.lib.common.rest_client [req-147d41fd-ac2c-4a4b-8d9c-aeea643ddfeb ] Request (RouterRbacTest:test_update_router_external_gateway_info_network_id): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.050s 2020-11-06 18:22:50.696 39 DEBUG tempest.lib.common.rest_client [req-147d41fd-ac2c-4a4b-8d9c-aeea643ddfeb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-147d41fd-ac2c-4a4b-8d9c-aeea643ddfeb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:50.732 39 INFO tempest.lib.common.rest_client [req-169769a2-2c73-446f-9aea-a51e9e6c262d ] Request (RouterRbacTest:test_update_router_external_gateway_info_network_id): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:22:50.733 39 DEBUG tempest.lib.common.rest_client [req-169769a2-2c73-446f-9aea-a51e9e6c262d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-169769a2-2c73-446f-9aea-a51e9e6c262d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["kVNHOTdNS5GLZupVWp5SgA"], "expires_at": "2020-11-06T19:22:50.000000Z", "issued_at": "2020-11-06T18:22:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:53.284 39 INFO tempest.lib.common.rest_client [req-5ca6f463-ab08-4492-8f56-62c17c909daf ] Request (RouterRbacTest:test_update_router_external_gateway_info_network_id): 200 PUT http://172.30.13.94:9696/v2.0/routers/d739609f-3a9e-40df-be53-1aa5ccc6ec7a 2.550s 2020-11-06 18:22:53.285 39 DEBUG tempest.lib.common.rest_client [req-5ca6f463-ab08-4492-8f56-62c17c909daf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"external_gateway_info": {"network_id": "c0683248-2cc2-4ea5-a866-63d525ef4f98"}}} Response - Headers: {'content-type': 'application/json', 'content-length': '736', 'x-openstack-request-id': 'req-5ca6f463-ab08-4492-8f56-62c17c909daf', 'date': 'Fri, 06 Nov 2020 18:22:53 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/d739609f-3a9e-40df-be53-1aa5ccc6ec7a'} Body: b'{"router": {"id": "d739609f-3a9e-40df-be53-1aa5ccc6ec7a", "name": "tempest-RouterRbacTest-new-router-name-1636504274", "tenant_id": "c56c216173514cd49deee606c5a2800f", "admin_state_up": false, "status": "ACTIVE", "external_gateway_info": {"network_id": "c0683248-2cc2-4ea5-a866-63d525ef4f98", "external_fixed_ips": [{"subnet_id": "c872f016-acca-4991-a42b-adcc9a317583", "ip_address": "192.168.120.5"}], "enable_snat": true}, "description": "", "availability_zones": ["nova"], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T18:21:55Z", "updated_at": "2020-11-06T18:22:52Z", "revision_number": 22, "project_id": "c56c216173514cd49deee606c5a2800f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:53.285 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:22:53.336 39 INFO tempest.lib.common.rest_client [req-ca8f4e62-c187-4c13-bb25-34ced419814a ] Request (RouterRbacTest:test_update_router_external_gateway_info_network_id): 200 GET http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles 0.050s 2020-11-06 18:22:53.337 39 DEBUG tempest.lib.common.rest_client [req-ca8f4e62-c187-4c13-bb25-34ced419814a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ca8f4e62-c187-4c13-bb25-34ced419814a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f/users/bbaf3d08297440f99dc8cf0ecbd46a91/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:53.374 39 INFO tempest.lib.common.rest_client [req-b8b9c7c2-6171-4a1e-ad7c-224770a18b57 ] Request (RouterRbacTest:test_update_router_external_gateway_info_network_id): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:22:53.375 39 DEBUG tempest.lib.common.rest_client [req-b8b9c7c2-6171-4a1e-ad7c-224770a18b57 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:22:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b8b9c7c2-6171-4a1e-ad7c-224770a18b57', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbaf3d08297440f99dc8cf0ecbd46a91", "name": "tempest-RouterRbacTest-1182584811", "password_expires_at": null}, "audit_ids": ["6VWLn6xGQDKjkJ17r8lbHQ"], "expires_at": "2020-11-06T19:22:53.000000Z", "issued_at": "2020-11-06T18:22:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c56c216173514cd49deee606c5a2800f", "name": "tempest-RouterRbacTest-1182584811"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c56c216173514cd49deee606c5a2800f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:55.818 39 INFO tempest.lib.common.rest_client [req-b5eb106f-392a-4d44-9aee-3c0749974417 ] Request (RouterRbacTest:_run_cleanups): 200 PUT http://172.30.13.94:9696/v2.0/routers/d739609f-3a9e-40df-be53-1aa5ccc6ec7a 2.441s 2020-11-06 18:22:55.818 39 DEBUG tempest.lib.common.rest_client [req-b5eb106f-392a-4d44-9aee-3c0749974417 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"external_gateway_info": null}} Response - Headers: {'content-type': 'application/json', 'content-length': '555', 'x-openstack-request-id': 'req-b5eb106f-392a-4d44-9aee-3c0749974417', 'date': 'Fri, 06 Nov 2020 18:22:55 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/d739609f-3a9e-40df-be53-1aa5ccc6ec7a'} Body: b'{"router": {"id": "d739609f-3a9e-40df-be53-1aa5ccc6ec7a", "name": "tempest-RouterRbacTest-new-router-name-1636504274", "tenant_id": "c56c216173514cd49deee606c5a2800f", "admin_state_up": false, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": ["nova"], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T18:21:55Z", "updated_at": "2020-11-06T18:22:55Z", "revision_number": 25, "project_id": "c56c216173514cd49deee606c5a2800f"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:55.851 39 INFO tempest.lib.common.rest_client [req-f8da9b8d-e5f9-4172-bd92-cd72bcae6c3a ] Request (RouterRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/ports?device_id=2d8fbf4c-58a9-41f1-8187-c9e84e6fac51 0.029s 2020-11-06 18:22:55.851 39 DEBUG tempest.lib.common.rest_client [req-f8da9b8d-e5f9-4172-bd92-cd72bcae6c3a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '12', 'x-openstack-request-id': 'req-f8da9b8d-e5f9-4172-bd92-cd72bcae6c3a', 'date': 'Fri, 06 Nov 2020 18:22:55 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports?device_id=2d8fbf4c-58a9-41f1-8187-c9e84e6fac51'} Body: b'{"ports":[]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:56.217 39 INFO tempest.lib.common.rest_client [req-c2abc59d-5c63-47a6-bd1e-894308f2c44f ] Request (RouterRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/2d8fbf4c-58a9-41f1-8187-c9e84e6fac51 0.365s 2020-11-06 18:22:56.217 39 DEBUG tempest.lib.common.rest_client [req-c2abc59d-5c63-47a6-bd1e-894308f2c44f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-c2abc59d-5c63-47a6-bd1e-894308f2c44f', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:22:56 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/2d8fbf4c-58a9-41f1-8187-c9e84e6fac51'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:56.642 39 INFO tempest.lib.common.rest_client [req-4e7e90b9-de5c-4014-9e94-96e6fbf86254 ] Request (RouterRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/cd9352ee-decd-4931-bd2e-7f7b5d0b60f6 0.424s 2020-11-06 18:22:56.643 39 DEBUG tempest.lib.common.rest_client [req-4e7e90b9-de5c-4014-9e94-96e6fbf86254 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-4e7e90b9-de5c-4014-9e94-96e6fbf86254', 'date': 'Fri, 06 Nov 2020 18:22:56 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/cd9352ee-decd-4931-bd2e-7f7b5d0b60f6'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:57.682 39 INFO tempest.lib.common.rest_client [req-9175058a-2e5d-42af-9ce8-df0d95b4d6ad ] Request (RouterRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/58a3f897-b4f9-4825-9050-805055976391 1.038s 2020-11-06 18:22:57.683 39 DEBUG tempest.lib.common.rest_client [req-9175058a-2e5d-42af-9ce8-df0d95b4d6ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-9175058a-2e5d-42af-9ce8-df0d95b4d6ad', 'date': 'Fri, 06 Nov 2020 18:22:57 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/58a3f897-b4f9-4825-9050-805055976391'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:57.742 39 INFO tempest.lib.common.rest_client [req-60b75e99-e816-4d7e-967a-482059a35098 ] Request (RouterRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/ports?device_id=4ce1f1eb-0a73-4ede-bf69-8cb569f51b67 0.057s 2020-11-06 18:22:57.742 39 DEBUG tempest.lib.common.rest_client [req-60b75e99-e816-4d7e-967a-482059a35098 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '12', 'x-openstack-request-id': 'req-60b75e99-e816-4d7e-967a-482059a35098', 'date': 'Fri, 06 Nov 2020 18:22:57 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports?device_id=4ce1f1eb-0a73-4ede-bf69-8cb569f51b67'} Body: b'{"ports":[]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:57.804 39 INFO tempest.lib.common.rest_client [req-ef57aeb6-163d-4a7c-bbe8-4b0d65ebd534 ] Request (RouterRbacTest:tearDownClass): 404 DELETE http://172.30.13.94:9696/v2.0/routers/4ce1f1eb-0a73-4ede-bf69-8cb569f51b67 0.061s 2020-11-06 18:22:57.805 39 DEBUG tempest.lib.common.rest_client [req-ef57aeb6-163d-4a7c-bbe8-4b0d65ebd534 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '135', 'x-openstack-request-id': 'req-ef57aeb6-163d-4a7c-bbe8-4b0d65ebd534', 'date': 'Fri, 06 Nov 2020 18:22:57 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/4ce1f1eb-0a73-4ede-bf69-8cb569f51b67'} Body: b'{"NeutronError": {"type": "RouterNotFound", "message": "Router 4ce1f1eb-0a73-4ede-bf69-8cb569f51b67 could not be found", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:57.838 39 INFO tempest.lib.common.rest_client [req-dcef0c1b-0237-4d42-99fe-88186f9ae1b3 ] Request (RouterRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/ports?device_id=1273c262-6f9b-4f2a-b949-c6d287c09165 0.033s 2020-11-06 18:22:57.838 39 DEBUG tempest.lib.common.rest_client [req-dcef0c1b-0237-4d42-99fe-88186f9ae1b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '12', 'x-openstack-request-id': 'req-dcef0c1b-0237-4d42-99fe-88186f9ae1b3', 'date': 'Fri, 06 Nov 2020 18:22:57 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports?device_id=1273c262-6f9b-4f2a-b949-c6d287c09165'} Body: b'{"ports":[]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:58.187 39 INFO tempest.lib.common.rest_client [req-25084c39-359e-4d74-a178-73e0facfb956 ] Request (RouterRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/1273c262-6f9b-4f2a-b949-c6d287c09165 0.347s 2020-11-06 18:22:58.187 39 DEBUG tempest.lib.common.rest_client [req-25084c39-359e-4d74-a178-73e0facfb956 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-25084c39-359e-4d74-a178-73e0facfb956', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:22:58 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/1273c262-6f9b-4f2a-b949-c6d287c09165'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:22:58.616 39 INFO tempest.lib.common.rest_client [req-8f1ad670-c4a9-4c35-8031-f438c583b271 ] Request (RouterRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/409b3f99-fa2a-4e0c-a77b-664829098e12 0.428s 2020-11-06 18:22:58.617 39 DEBUG tempest.lib.common.rest_client [req-8f1ad670-c4a9-4c35-8031-f438c583b271 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-8f1ad670-c4a9-4c35-8031-f438c583b271', 'date': 'Fri, 06 Nov 2020 18:22:58 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/409b3f99-fa2a-4e0c-a77b-664829098e12'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:00.824 39 INFO tempest.lib.common.rest_client [req-08df0d2f-4cdf-4e90-821e-b0c9a427da68 ] Request (RouterRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/af7b7606-43b8-4f37-bc43-0b614cf1cd03 2.206s 2020-11-06 18:23:00.824 39 DEBUG tempest.lib.common.rest_client [req-08df0d2f-4cdf-4e90-821e-b0c9a427da68 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-08df0d2f-4cdf-4e90-821e-b0c9a427da68', 'date': 'Fri, 06 Nov 2020 18:23:00 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/af7b7606-43b8-4f37-bc43-0b614cf1cd03'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:00.863 39 INFO tempest.lib.common.rest_client [req-5ab985f4-b5da-4203-a4ec-b23a9da3823c ] Request (RouterRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/ports?device_id=d739609f-3a9e-40df-be53-1aa5ccc6ec7a 0.037s 2020-11-06 18:23:00.863 39 DEBUG tempest.lib.common.rest_client [req-5ab985f4-b5da-4203-a4ec-b23a9da3823c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '12', 'x-openstack-request-id': 'req-5ab985f4-b5da-4203-a4ec-b23a9da3823c', 'date': 'Fri, 06 Nov 2020 18:23:00 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports?device_id=d739609f-3a9e-40df-be53-1aa5ccc6ec7a'} Body: b'{"ports":[]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:01.299 39 INFO tempest.lib.common.rest_client [req-ecf9819c-0b3f-4a2f-8cce-2dcf6e4060e2 ] Request (RouterRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/d739609f-3a9e-40df-be53-1aa5ccc6ec7a 0.435s 2020-11-06 18:23:01.299 39 DEBUG tempest.lib.common.rest_client [req-ecf9819c-0b3f-4a2f-8cce-2dcf6e4060e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-ecf9819c-0b3f-4a2f-8cce-2dcf6e4060e2', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:23:01 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/d739609f-3a9e-40df-be53-1aa5ccc6ec7a'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:02.148 39 INFO tempest.lib.common.rest_client [req-aa232508-be33-4777-8acf-d4ac55c76eb5 ] Request (RouterRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/c872f016-acca-4991-a42b-adcc9a317583 0.848s 2020-11-06 18:23:02.149 39 DEBUG tempest.lib.common.rest_client [req-aa232508-be33-4777-8acf-d4ac55c76eb5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-aa232508-be33-4777-8acf-d4ac55c76eb5', 'date': 'Fri, 06 Nov 2020 18:23:02 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/c872f016-acca-4991-a42b-adcc9a317583'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:03.098 39 INFO tempest.lib.common.rest_client [req-80484afb-41c0-44cb-9468-2f032403ebea ] Request (RouterRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/c0683248-2cc2-4ea5-a866-63d525ef4f98 0.948s 2020-11-06 18:23:03.099 39 DEBUG tempest.lib.common.rest_client [req-80484afb-41c0-44cb-9468-2f032403ebea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-80484afb-41c0-44cb-9468-2f032403ebea', 'date': 'Fri, 06 Nov 2020 18:23:03 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/c0683248-2cc2-4ea5-a866-63d525ef4f98'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:03.352 39 INFO tempest.lib.common.rest_client [req-e52c3c97-db06-42b1-be69-dbd48242c8fa ] Request (RouterRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/bbaf3d08297440f99dc8cf0ecbd46a91 0.252s 2020-11-06 18:23:03.353 39 DEBUG tempest.lib.common.rest_client [req-e52c3c97-db06-42b1-be69-dbd48242c8fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e52c3c97-db06-42b1-be69-dbd48242c8fa', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/bbaf3d08297440f99dc8cf0ecbd46a91'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:03.434 39 INFO tempest.lib.common.rest_client [req-df0731c2-8a32-499e-8a5b-5b361396c1a3 ] Request (RouterRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.080s 2020-11-06 18:23:03.435 39 DEBUG tempest.lib.common.rest_client [req-df0731c2-8a32-499e-8a5b-5b361396c1a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-df0731c2-8a32-499e-8a5b-5b361396c1a3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["veQfY7LUSg6d_UyEbmoDwg"], "expires_at": "2020-11-06T19:23:03.000000Z", "issued_at": "2020-11-06T18:23:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:03.694 39 INFO tempest.lib.common.rest_client [req-c9001a86-8ee8-4d3c-b52b-682d9a950ee0 ] Request (RouterRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=c56c216173514cd49deee606c5a2800f&name=default 0.258s 2020-11-06 18:23:03.694 39 DEBUG tempest.lib.common.rest_client [req-c9001a86-8ee8-4d3c-b52b-682d9a950ee0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-c9001a86-8ee8-4d3c-b52b-682d9a950ee0', 'date': 'Fri, 06 Nov 2020 18:23:03 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=c56c216173514cd49deee606c5a2800f&name=default'} Body: b'{"security_groups": [{"id": "c0aa8fbd-ff26-463b-88dc-99022aa84911", "name": "default", "stateful": true, "tenant_id": "c56c216173514cd49deee606c5a2800f", "description": "Default security group", "security_group_rules": [{"id": "14aa05f7-7a96-4a2f-a0c3-9fd415074fdf", "tenant_id": "c56c216173514cd49deee606c5a2800f", "security_group_id": "c0aa8fbd-ff26-463b-88dc-99022aa84911", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:21:54Z", "updated_at": "2020-11-06T18:21:54Z", "revision_number": 0, "project_id": "c56c216173514cd49deee606c5a2800f"}, {"id": "53109d31-e7f7-4fab-b530-31b20584ec19", "tenant_id": "c56c216173514cd49deee606c5a2800f", "security_group_id": "c0aa8fbd-ff26-463b-88dc-99022aa84911", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "c0aa8fbd-ff26-463b-88dc-99022aa84911", "description": null, "tags": [], "created_at": "2020-11-06T18:21:54Z", "updated_at": "2020-11-06T18:21:54Z", "revision_number": 0, "project_id": "c56c216173514cd49deee606c5a2800f"}, {"id": "87c2ac66-8266-4492-9dcf-3554a86e457f", "tenant_id": "c56c216173514cd49deee606c5a2800f", "security_group_id": "c0aa8fbd-ff26-463b-88dc-99022aa84911", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:21:54Z", "updated_at": "2020-11-06T18:21:54Z", "revision_number": 0, "project_id": "c56c216173514cd49deee606c5a2800f"}, {"id": "a6a2b79a-da28-4742-abd3-166b03ed3d78", "tenant_id": "c56c216173514cd49deee606c5a2800f", "security_group_id": "c0aa8fbd-ff26-463b-88dc-99022aa84911", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "c0aa8fbd-ff26-463b-88dc-99022aa84911", "description": null, "tags": [], "created_at": "2020-11-06T18:21:54Z", "updated_at": "2020-11-06T18:21:54Z", "revision_number": 0, "project_id": "c56c216173514cd49deee606c5a2800f"}], "tags": [], "created_at": "2020-11-06T18:21:54Z", "updated_at": "2020-11-06T18:21:54Z", "revision_number": 1, "project_id": "c56c216173514cd49deee606c5a2800f"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:03.834 39 INFO tempest.lib.common.rest_client [req-28db18af-dbb6-4f28-a355-bb4eb003bd90 ] Request (RouterRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/c0aa8fbd-ff26-463b-88dc-99022aa84911 0.139s 2020-11-06 18:23:03.835 39 DEBUG tempest.lib.common.rest_client [req-28db18af-dbb6-4f28-a355-bb4eb003bd90 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-28db18af-dbb6-4f28-a355-bb4eb003bd90', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:23:03 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/c0aa8fbd-ff26-463b-88dc-99022aa84911'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:04.013 39 INFO tempest.lib.common.rest_client [req-ce6f4d89-a729-4004-8448-f071952bdcfe ] Request (RouterRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f 0.177s 2020-11-06 18:23:04.013 39 DEBUG tempest.lib.common.rest_client [req-ce6f4d89-a729-4004-8448-f071952bdcfe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ce6f4d89-a729-4004-8448-f071952bdcfe', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c56c216173514cd49deee606c5a2800f'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:04.110 39 INFO tempest.lib.common.rest_client [req-95693a1a-9d8a-43af-843e-b90f69b8d274 ] Request (SubnetPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-11-06 18:23:04.111 39 DEBUG tempest.lib.common.rest_client [req-95693a1a-9d8a-43af-843e-b90f69b8d274 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-95693a1a-9d8a-43af-843e-b90f69b8d274', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["q0FB_qXgSgO2qVp9OznS6w"], "expires_at": "2020-11-06T19:23:04.000000Z", "issued_at": "2020-11-06T18:23:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:04.157 39 INFO tempest.lib.common.rest_client [req-b4ee214f-feff-4e97-8efe-f1c5fbfcb780 ] Request (SubnetPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:23:04.158 39 DEBUG tempest.lib.common.rest_client [req-b4ee214f-feff-4e97-8efe-f1c5fbfcb780 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b4ee214f-feff-4e97-8efe-f1c5fbfcb780', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["TAAFVSE8TnO2UaLbQ0LAxw"], "expires_at": "2020-11-06T19:23:04.000000Z", "issued_at": "2020-11-06T18:23:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:04.221 39 INFO tempest.lib.common.rest_client [req-ded4ba4e-fc1e-4bca-86f3-9968657cf5e3 ] Request (SubnetPoolsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.062s 2020-11-06 18:23:04.222 39 DEBUG tempest.lib.common.rest_client [req-ded4ba4e-fc1e-4bca-86f3-9968657cf5e3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ded4ba4e-fc1e-4bca-86f3-9968657cf5e3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:04.296 39 INFO tempest.lib.common.rest_client [req-bb6a0a67-514c-4956-9748-59ab54dd6b4a ] Request (SubnetPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.073s 2020-11-06 18:23:04.297 39 DEBUG tempest.lib.common.rest_client [req-bb6a0a67-514c-4956-9748-59ab54dd6b4a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-SubnetPoolsRbacTest-2066803525-desc", "domain_id": "default", "name": "tempest-SubnetPoolsRbacTest-2066803525"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '376', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bb6a0a67-514c-4956-9748-59ab54dd6b4a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "de31e047b6f44ea79d0466bb217cb420", "name": "tempest-SubnetPoolsRbacTest-2066803525", "domain_id": "default", "description": "tempest-SubnetPoolsRbacTest-2066803525-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:04.421 39 INFO tempest.lib.common.rest_client [req-7139f417-7d0f-4a38-b499-12a68ce4de96 ] Request (SubnetPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.123s 2020-11-06 18:23:04.422 39 DEBUG tempest.lib.common.rest_client [req-7139f417-7d0f-4a38-b499-12a68ce4de96 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-SubnetPoolsRbacTest-2066803525", "password": "A5*WsOicHT96!AD", "project_id": "de31e047b6f44ea79d0466bb217cb420", "email": "tempest-SubnetPoolsRbacTest-1787394845@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '394', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7139f417-7d0f-4a38-b499-12a68ce4de96', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "de31e047b6f44ea79d0466bb217cb420", "email": "tempest-SubnetPoolsRbacTest-1787394845@example.com", "id": "8965229bdd4c432996390156fda37c80", "name": "tempest-SubnetPoolsRbacTest-2066803525", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/8965229bdd4c432996390156fda37c80"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:04.470 39 INFO tempest.lib.common.rest_client [req-8ff40e65-9a06-4f2f-870a-4a0d2b435942 ] Request (SubnetPoolsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.048s 2020-11-06 18:23:04.471 39 DEBUG tempest.lib.common.rest_client [req-8ff40e65-9a06-4f2f-870a-4a0d2b435942 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8ff40e65-9a06-4f2f-870a-4a0d2b435942', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:04.523 39 INFO tempest.lib.common.rest_client [req-6c587f7f-4c46-42ef-b2b4-a0ba94ea594e ] Request (SubnetPoolsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.051s 2020-11-06 18:23:04.523 39 DEBUG tempest.lib.common.rest_client [req-6c587f7f-4c46-42ef-b2b4-a0ba94ea594e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6c587f7f-4c46-42ef-b2b4-a0ba94ea594e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:04.587 39 INFO tempest.lib.common.rest_client [req-3be33cc5-7296-487f-aeb4-8cffa0f0e81a ] Request (SubnetPoolsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles/72a4576c553448cd941b052c1ca0cf2d 0.063s 2020-11-06 18:23:04.588 39 DEBUG tempest.lib.common.rest_client [req-3be33cc5-7296-487f-aeb4-8cffa0f0e81a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3be33cc5-7296-487f-aeb4-8cffa0f0e81a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:04.588 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SubnetPoolsRbacTest-2066803525', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'de31e047b6f44ea79d0466bb217cb420', 'project_name': 'tempest-SubnetPoolsRbacTest-2066803525', 'tenant_id': 'de31e047b6f44ea79d0466bb217cb420', 'tenant_name': 'tempest-SubnetPoolsRbacTest-2066803525', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '8965229bdd4c432996390156fda37c80'}, Network: None, Subnet: None, Router: None 2020-11-06 18:23:04.589 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SubnetPoolsRbacTest-2066803525', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'de31e047b6f44ea79d0466bb217cb420', 'project_name': 'tempest-SubnetPoolsRbacTest-2066803525', 'tenant_id': 'de31e047b6f44ea79d0466bb217cb420', 'tenant_name': 'tempest-SubnetPoolsRbacTest-2066803525', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '8965229bdd4c432996390156fda37c80'}, Network: None, Subnet: None, Router: None 2020-11-06 18:23:04.715 39 INFO tempest.lib.common.rest_client [req-c79b063b-0015-45ef-99f3-038ba11bfdd5 ] Request (SubnetPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.117s 2020-11-06 18:23:04.716 39 DEBUG tempest.lib.common.rest_client [req-c79b063b-0015-45ef-99f3-038ba11bfdd5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6569', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c79b063b-0015-45ef-99f3-038ba11bfdd5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8965229bdd4c432996390156fda37c80", "name": "tempest-SubnetPoolsRbacTest-2066803525", "password_expires_at": null}, "audit_ids": ["9HtfXKLYSHS9Qh8KobkKvA"], "expires_at": "2020-11-06T19:23:04.000000Z", "issued_at": "2020-11-06T18:23:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "de31e047b6f44ea79d0466bb217cb420", "name": "tempest-SubnetPoolsRbacTest-2066803525"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.3 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:04.812 39 INFO tempest.lib.common.rest_client [req-81985159-1190-4988-aaa2-0603a3ef62da ] Request (SubnetPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-11-06 18:23:04.813 39 DEBUG tempest.lib.common.rest_client [req-81985159-1190-4988-aaa2-0603a3ef62da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-81985159-1190-4988-aaa2-0603a3ef62da', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["-2UwV7mURLuqbLm9DZUc2w"], "expires_at": "2020-11-06T19:23:04.000000Z", "issued_at": "2020-11-06T18:23:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:04.858 39 INFO tempest.lib.common.rest_client [req-16c3b9b2-c388-465f-9783-05071970f5b6 ] Request (SubnetPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:23:04.859 39 DEBUG tempest.lib.common.rest_client [req-16c3b9b2-c388-465f-9783-05071970f5b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-16c3b9b2-c388-465f-9783-05071970f5b6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["ODUqREIHSXu7vnv5UDQAMQ"], "expires_at": "2020-11-06T19:23:04.000000Z", "issued_at": "2020-11-06T18:23:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:04.916 39 INFO tempest.lib.common.rest_client [req-4bab39f5-1d9b-4904-a6f9-2478b6e84a7e ] Request (SubnetPoolsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.056s 2020-11-06 18:23:04.916 39 DEBUG tempest.lib.common.rest_client [req-4bab39f5-1d9b-4904-a6f9-2478b6e84a7e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4bab39f5-1d9b-4904-a6f9-2478b6e84a7e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:04.974 39 INFO tempest.lib.common.rest_client [req-61c8dc63-d7bd-47bd-8a0a-a3ede363833c ] Request (SubnetPoolsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.057s 2020-11-06 18:23:04.975 39 DEBUG tempest.lib.common.rest_client [req-61c8dc63-d7bd-47bd-8a0a-a3ede363833c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-61c8dc63-d7bd-47bd-8a0a-a3ede363833c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:04.976 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:23:04.976 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:05.026 39 INFO tempest.lib.common.rest_client [req-60656efa-69d5-4a9a-a053-a6823312a6cf ] Request (SubnetPoolsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles 0.049s 2020-11-06 18:23:05.026 39 DEBUG tempest.lib.common.rest_client [req-60656efa-69d5-4a9a-a053-a6823312a6cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-60656efa-69d5-4a9a-a053-a6823312a6cf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:05.087 39 INFO tempest.lib.common.rest_client [req-3a055cb2-8926-4ce6-91b2-974d10510c97 ] Request (SubnetPoolsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles/72a4576c553448cd941b052c1ca0cf2d 0.060s 2020-11-06 18:23:05.088 39 DEBUG tempest.lib.common.rest_client [req-3a055cb2-8926-4ce6-91b2-974d10510c97 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3a055cb2-8926-4ce6-91b2-974d10510c97', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:05.187 39 INFO tempest.lib.common.rest_client [req-43fff9ba-dd04-4bec-9c5b-6f3e73b4151d ] Request (SubnetPoolsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles/a629c95d64b3416fb80ae90af4f69c05 0.099s 2020-11-06 18:23:05.188 39 DEBUG tempest.lib.common.rest_client [req-43fff9ba-dd04-4bec-9c5b-6f3e73b4151d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-43fff9ba-dd04-4bec-9c5b-6f3e73b4151d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:06.287 39 INFO tempest.lib.common.rest_client [req-61873285-b05d-4932-988b-ebfc2e04c17b ] Request (SubnetPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-11-06 18:23:06.287 39 DEBUG tempest.lib.common.rest_client [req-61873285-b05d-4932-988b-ebfc2e04c17b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-61873285-b05d-4932-988b-ebfc2e04c17b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8965229bdd4c432996390156fda37c80", "name": "tempest-SubnetPoolsRbacTest-2066803525", "password_expires_at": null}, "audit_ids": ["4zJPlpmoSPq0YUAdEOWiGg"], "expires_at": "2020-11-06T19:23:06.000000Z", "issued_at": "2020-11-06T18:23:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "de31e047b6f44ea79d0466bb217cb420", "name": "tempest-SubnetPoolsRbacTest-2066803525"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:06.291 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:23:06.295 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_subnetpool, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:23:06.296 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:06.394 39 INFO tempest.lib.common.rest_client [req-5e071350-cde9-4bf8-be2a-e5bae2e3e662 ] Request (SubnetPoolsRbacTest:test_create_subnetpool): 200 GET http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles 0.097s 2020-11-06 18:23:06.395 39 DEBUG tempest.lib.common.rest_client [req-5e071350-cde9-4bf8-be2a-e5bae2e3e662 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5e071350-cde9-4bf8-be2a-e5bae2e3e662', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:06.423 39 INFO tempest.lib.common.rest_client [req-618cc70e-23cf-4de7-8fa9-2962e72c684e ] Request (SubnetPoolsRbacTest:test_create_subnetpool): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.027s 2020-11-06 18:23:06.424 39 DEBUG tempest.lib.common.rest_client [req-618cc70e-23cf-4de7-8fa9-2962e72c684e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-618cc70e-23cf-4de7-8fa9-2962e72c684e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8965229bdd4c432996390156fda37c80", "name": "tempest-SubnetPoolsRbacTest-2066803525", "password_expires_at": null}, "audit_ids": ["hE2zye4bSWGHLLvbZv1P7g"], "expires_at": "2020-11-06T19:23:06.000000Z", "issued_at": "2020-11-06T18:23:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "de31e047b6f44ea79d0466bb217cb420", "name": "tempest-SubnetPoolsRbacTest-2066803525"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:06.585 39 INFO tempest.lib.common.rest_client [req-4dc75a5c-1183-4622-afff-09e424fe5059 ] Request (SubnetPoolsRbacTest:test_create_subnetpool): 201 POST http://172.30.13.94:9696/v2.0/subnetpools 0.160s 2020-11-06 18:23:06.586 39 DEBUG tempest.lib.common.rest_client [req-4dc75a5c-1183-4622-afff-09e424fe5059 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnetpool": {"name": "tempest-SubnetPoolsRbacTest-729553620", "min_prefixlen": 24, "max_prefixlen": 32, "prefixes": ["192.168.120.0/24"]}} Response - Headers: {'content-type': 'application/json', 'content-length': '550', 'x-openstack-request-id': 'req-4dc75a5c-1183-4622-afff-09e424fe5059', 'date': 'Fri, 06 Nov 2020 18:23:06 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools'} Body: b'{"subnetpool": {"id": "94887d82-ebfc-42b5-8a2b-587a0bc4bc70", "name": "tempest-SubnetPoolsRbacTest-729553620", "tenant_id": "de31e047b6f44ea79d0466bb217cb420", "default_prefixlen": "24", "min_prefixlen": "24", "max_prefixlen": "32", "is_default": false, "shared": false, "prefixes": ["192.168.120.0/24"], "ip_version": 4, "default_quota": null, "address_scope_id": null, "description": "", "tags": [], "created_at": "2020-11-06T18:23:06Z", "updated_at": "2020-11-06T18:23:06Z", "revision_number": 0, "project_id": "de31e047b6f44ea79d0466bb217cb420"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:06.586 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:06.645 39 INFO tempest.lib.common.rest_client [req-770a719b-f3d2-4c06-abde-bd3b385f89a2 ] Request (SubnetPoolsRbacTest:test_create_subnetpool): 200 GET http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles 0.058s 2020-11-06 18:23:06.646 39 DEBUG tempest.lib.common.rest_client [req-770a719b-f3d2-4c06-abde-bd3b385f89a2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-770a719b-f3d2-4c06-abde-bd3b385f89a2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:06.685 39 INFO tempest.lib.common.rest_client [req-ea2ad732-1efa-492c-a834-2d3a8efb52f4 ] Request (SubnetPoolsRbacTest:test_create_subnetpool): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:23:06.685 39 DEBUG tempest.lib.common.rest_client [req-ea2ad732-1efa-492c-a834-2d3a8efb52f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ea2ad732-1efa-492c-a834-2d3a8efb52f4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8965229bdd4c432996390156fda37c80", "name": "tempest-SubnetPoolsRbacTest-2066803525", "password_expires_at": null}, "audit_ids": ["66O6s101TDGr2DxLh28zBw"], "expires_at": "2020-11-06T19:23:06.000000Z", "issued_at": "2020-11-06T18:23:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "de31e047b6f44ea79d0466bb217cb420", "name": "tempest-SubnetPoolsRbacTest-2066803525"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:06.997 39 INFO tempest.lib.common.rest_client [req-671a3e22-27ca-4e5e-827c-88d8ea43ec30 ] Request (SubnetPoolsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/subnetpools/94887d82-ebfc-42b5-8a2b-587a0bc4bc70 0.310s 2020-11-06 18:23:06.997 39 DEBUG tempest.lib.common.rest_client [req-671a3e22-27ca-4e5e-827c-88d8ea43ec30 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-671a3e22-27ca-4e5e-827c-88d8ea43ec30', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:23:06 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools/94887d82-ebfc-42b5-8a2b-587a0bc4bc70'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:06.999 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:23:07.002 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_subnetpool, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:23:07.002 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:23:07.004 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_subnetpool:is_default, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:23:07.105 39 INFO tempest.lib.common.rest_client [req-0be45b24-ad25-4f1f-9fd8-a5c51076b756 ] Request (SubnetPoolsRbacTest:test_create_subnetpool_default): 200 GET http://172.30.13.94:9696/v2.0/subnetpools?is_default=True 0.099s 2020-11-06 18:23:07.106 39 DEBUG tempest.lib.common.rest_client [req-0be45b24-ad25-4f1f-9fd8-a5c51076b756 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '1069', 'x-openstack-request-id': 'req-0be45b24-ad25-4f1f-9fd8-a5c51076b756', 'date': 'Fri, 06 Nov 2020 18:23:07 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools?is_default=True'} Body: b'{"subnetpools": [{"id": "b48d0a6f-e3a5-4e4a-9774-40dfdcf8b21e", "name": "shared-default-subnetpool-v4", "tenant_id": "5990258dee3b412286ccca75bcab995c", "default_prefixlen": "26", "min_prefixlen": "8", "max_prefixlen": "32", "is_default": true, "shared": true, "prefixes": ["10.0.0.0/22"], "ip_version": 4, "default_quota": null, "address_scope_id": null, "description": "", "tags": [], "created_at": "2020-10-07T12:07:11Z", "updated_at": "2020-11-06T17:52:11Z", "revision_number": 213, "project_id": "5990258dee3b412286ccca75bcab995c"}, {"id": "f32bc1c4-caf2-4148-92ce-ea35dab4345c", "name": "shared-default-subnetpool-v6", "tenant_id": "5990258dee3b412286ccca75bcab995c", "default_prefixlen": "64", "min_prefixlen": "64", "max_prefixlen": "128", "is_default": true, "shared": true, "prefixes": ["fd45:7793:ed2b::/56"], "ip_version": 6, "default_quota": null, "address_scope_id": null, "description": "", "tags": [], "created_at": "2020-10-07T12:07:14Z", "updated_at": "2020-11-06T17:52:07Z", "revision_number": 142, "project_id": "5990258dee3b412286ccca75bcab995c"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:07.207 39 INFO tempest.lib.common.rest_client [req-9c9a6c1e-1498-4669-b999-0426596dc7e9 ] Request (SubnetPoolsRbacTest:test_create_subnetpool_default): 200 PUT http://172.30.13.94:9696/v2.0/subnetpools/b48d0a6f-e3a5-4e4a-9774-40dfdcf8b21e 0.099s 2020-11-06 18:23:07.207 39 DEBUG tempest.lib.common.rest_client [req-9c9a6c1e-1498-4669-b999-0426596dc7e9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnetpool": {"is_default": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '481', 'x-openstack-request-id': 'req-9c9a6c1e-1498-4669-b999-0426596dc7e9', 'date': 'Fri, 06 Nov 2020 18:23:07 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools/b48d0a6f-e3a5-4e4a-9774-40dfdcf8b21e'} Body: b'{"subnetpool": {"id": "b48d0a6f-e3a5-4e4a-9774-40dfdcf8b21e", "project_id": "5990258dee3b412286ccca75bcab995c", "name": "shared-default-subnetpool-v4", "ip_version": 4, "default_prefixlen": 26, "min_prefixlen": 8, "max_prefixlen": 32, "shared": true, "is_default": false, "revision_number": 214, "description": "", "created_at": "2020-10-07T12:07:11Z", "updated_at": "2020-11-06T18:23:07Z", "tenant_id": "5990258dee3b412286ccca75bcab995c", "prefixes": ["10.0.0.0/22"], "tags": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:07.279 39 INFO tempest.lib.common.rest_client [req-b3d1877f-50e1-4d61-9555-69bf265091f0 ] Request (SubnetPoolsRbacTest:test_create_subnetpool_default): 200 PUT http://172.30.13.94:9696/v2.0/subnetpools/f32bc1c4-caf2-4148-92ce-ea35dab4345c 0.070s 2020-11-06 18:23:07.279 39 DEBUG tempest.lib.common.rest_client [req-b3d1877f-50e1-4d61-9555-69bf265091f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnetpool": {"is_default": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '491', 'x-openstack-request-id': 'req-b3d1877f-50e1-4d61-9555-69bf265091f0', 'date': 'Fri, 06 Nov 2020 18:23:07 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools/f32bc1c4-caf2-4148-92ce-ea35dab4345c'} Body: b'{"subnetpool": {"id": "f32bc1c4-caf2-4148-92ce-ea35dab4345c", "project_id": "5990258dee3b412286ccca75bcab995c", "name": "shared-default-subnetpool-v6", "ip_version": 6, "default_prefixlen": 64, "min_prefixlen": 64, "max_prefixlen": 128, "shared": true, "is_default": false, "revision_number": 143, "description": "", "created_at": "2020-10-07T12:07:14Z", "updated_at": "2020-11-06T18:23:07Z", "tenant_id": "5990258dee3b412286ccca75bcab995c", "prefixes": ["fd45:7793:ed2b::/56"], "tags": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:07.280 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:07.333 39 INFO tempest.lib.common.rest_client [req-39180382-4bce-4e15-8124-058bb1d35c00 ] Request (SubnetPoolsRbacTest:test_create_subnetpool_default): 200 GET http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles 0.051s 2020-11-06 18:23:07.333 39 DEBUG tempest.lib.common.rest_client [req-39180382-4bce-4e15-8124-058bb1d35c00 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-39180382-4bce-4e15-8124-058bb1d35c00', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:07.368 39 INFO tempest.lib.common.rest_client [req-41c0503f-23b0-433a-ba69-429b1c495d0a ] Request (SubnetPoolsRbacTest:test_create_subnetpool_default): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:23:07.369 39 DEBUG tempest.lib.common.rest_client [req-41c0503f-23b0-433a-ba69-429b1c495d0a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-41c0503f-23b0-433a-ba69-429b1c495d0a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8965229bdd4c432996390156fda37c80", "name": "tempest-SubnetPoolsRbacTest-2066803525", "password_expires_at": null}, "audit_ids": ["IeUFlqE8SQ6ex78wAGQ5ug"], "expires_at": "2020-11-06T19:23:07.000000Z", "issued_at": "2020-11-06T18:23:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "de31e047b6f44ea79d0466bb217cb420", "name": "tempest-SubnetPoolsRbacTest-2066803525"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:07.548 39 INFO tempest.lib.common.rest_client [req-1bd1cc27-e89c-46ce-873d-845b21bcef3f ] Request (SubnetPoolsRbacTest:test_create_subnetpool_default): 201 POST http://172.30.13.94:9696/v2.0/subnetpools 0.178s 2020-11-06 18:23:07.549 39 DEBUG tempest.lib.common.rest_client [req-1bd1cc27-e89c-46ce-873d-845b21bcef3f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnetpool": {"name": "tempest-SubnetPoolsRbacTest-610184125", "min_prefixlen": 24, "max_prefixlen": 32, "prefixes": ["192.168.120.0/24"], "is_default": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '549', 'x-openstack-request-id': 'req-1bd1cc27-e89c-46ce-873d-845b21bcef3f', 'date': 'Fri, 06 Nov 2020 18:23:07 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools'} Body: b'{"subnetpool": {"id": "6a04796d-ee3d-479d-a01a-907058311018", "name": "tempest-SubnetPoolsRbacTest-610184125", "tenant_id": "de31e047b6f44ea79d0466bb217cb420", "default_prefixlen": "24", "min_prefixlen": "24", "max_prefixlen": "32", "is_default": true, "shared": false, "prefixes": ["192.168.120.0/24"], "ip_version": 4, "default_quota": null, "address_scope_id": null, "description": "", "tags": [], "created_at": "2020-11-06T18:23:07Z", "updated_at": "2020-11-06T18:23:07Z", "revision_number": 0, "project_id": "de31e047b6f44ea79d0466bb217cb420"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:07.549 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:07.600 39 INFO tempest.lib.common.rest_client [req-773dae92-6c70-4f5a-9825-0fba3ad8d4d7 ] Request (SubnetPoolsRbacTest:test_create_subnetpool_default): 200 GET http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles 0.050s 2020-11-06 18:23:07.600 39 DEBUG tempest.lib.common.rest_client [req-773dae92-6c70-4f5a-9825-0fba3ad8d4d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-773dae92-6c70-4f5a-9825-0fba3ad8d4d7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:07.636 39 INFO tempest.lib.common.rest_client [req-ee5f8b2f-6afb-47f7-84c0-1e234e8730f4 ] Request (SubnetPoolsRbacTest:test_create_subnetpool_default): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:23:07.637 39 DEBUG tempest.lib.common.rest_client [req-ee5f8b2f-6afb-47f7-84c0-1e234e8730f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ee5f8b2f-6afb-47f7-84c0-1e234e8730f4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8965229bdd4c432996390156fda37c80", "name": "tempest-SubnetPoolsRbacTest-2066803525", "password_expires_at": null}, "audit_ids": ["6RZZC9YATaWrSRKemrKtjg"], "expires_at": "2020-11-06T19:23:07.000000Z", "issued_at": "2020-11-06T18:23:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "de31e047b6f44ea79d0466bb217cb420", "name": "tempest-SubnetPoolsRbacTest-2066803525"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:07.762 39 INFO tempest.lib.common.rest_client [req-fa6f89b0-971b-48a2-831e-017777305378 ] Request (SubnetPoolsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/subnetpools/6a04796d-ee3d-479d-a01a-907058311018 0.123s 2020-11-06 18:23:07.762 39 DEBUG tempest.lib.common.rest_client [req-fa6f89b0-971b-48a2-831e-017777305378 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-fa6f89b0-971b-48a2-831e-017777305378', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:23:07 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools/6a04796d-ee3d-479d-a01a-907058311018'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:07.850 39 INFO tempest.lib.common.rest_client [req-9c46efbf-6c57-4c84-8fd0-f9a72982e117 ] Request (SubnetPoolsRbacTest:_run_cleanups): 200 PUT http://172.30.13.94:9696/v2.0/subnetpools/f32bc1c4-caf2-4148-92ce-ea35dab4345c 0.087s 2020-11-06 18:23:07.850 39 DEBUG tempest.lib.common.rest_client [req-9c46efbf-6c57-4c84-8fd0-f9a72982e117 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnetpool": {"is_default": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '490', 'x-openstack-request-id': 'req-9c46efbf-6c57-4c84-8fd0-f9a72982e117', 'date': 'Fri, 06 Nov 2020 18:23:07 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools/f32bc1c4-caf2-4148-92ce-ea35dab4345c'} Body: b'{"subnetpool": {"id": "f32bc1c4-caf2-4148-92ce-ea35dab4345c", "project_id": "5990258dee3b412286ccca75bcab995c", "name": "shared-default-subnetpool-v6", "ip_version": 6, "default_prefixlen": 64, "min_prefixlen": 64, "max_prefixlen": 128, "shared": true, "is_default": true, "revision_number": 144, "description": "", "created_at": "2020-10-07T12:07:14Z", "updated_at": "2020-11-06T18:23:07Z", "tenant_id": "5990258dee3b412286ccca75bcab995c", "prefixes": ["fd45:7793:ed2b::/56"], "tags": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:07.920 39 INFO tempest.lib.common.rest_client [req-6e5e94fa-d54e-4d55-8a4d-dc9fc0bb392f ] Request (SubnetPoolsRbacTest:_run_cleanups): 200 PUT http://172.30.13.94:9696/v2.0/subnetpools/b48d0a6f-e3a5-4e4a-9774-40dfdcf8b21e 0.069s 2020-11-06 18:23:07.921 39 DEBUG tempest.lib.common.rest_client [req-6e5e94fa-d54e-4d55-8a4d-dc9fc0bb392f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnetpool": {"is_default": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '480', 'x-openstack-request-id': 'req-6e5e94fa-d54e-4d55-8a4d-dc9fc0bb392f', 'date': 'Fri, 06 Nov 2020 18:23:07 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools/b48d0a6f-e3a5-4e4a-9774-40dfdcf8b21e'} Body: b'{"subnetpool": {"id": "b48d0a6f-e3a5-4e4a-9774-40dfdcf8b21e", "project_id": "5990258dee3b412286ccca75bcab995c", "name": "shared-default-subnetpool-v4", "ip_version": 4, "default_prefixlen": 26, "min_prefixlen": 8, "max_prefixlen": 32, "shared": true, "is_default": true, "revision_number": 215, "description": "", "created_at": "2020-10-07T12:07:11Z", "updated_at": "2020-11-06T18:23:07Z", "tenant_id": "5990258dee3b412286ccca75bcab995c", "prefixes": ["10.0.0.0/22"], "tags": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:07.923 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:23:07.927 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_subnetpool, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:23:07.928 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:23:07.932 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_subnetpool:shared, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:23:07.932 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:07.981 39 INFO tempest.lib.common.rest_client [req-02a6b922-1c07-4a8e-8b6d-e533208d00fa ] Request (SubnetPoolsRbacTest:test_create_subnetpool_shared): 200 GET http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles 0.048s 2020-11-06 18:23:07.982 39 DEBUG tempest.lib.common.rest_client [req-02a6b922-1c07-4a8e-8b6d-e533208d00fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-02a6b922-1c07-4a8e-8b6d-e533208d00fa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:08.015 39 INFO tempest.lib.common.rest_client [req-31ce78dd-b50f-4de4-b857-a3828eb37a26 ] Request (SubnetPoolsRbacTest:test_create_subnetpool_shared): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:23:08.015 39 DEBUG tempest.lib.common.rest_client [req-31ce78dd-b50f-4de4-b857-a3828eb37a26 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-31ce78dd-b50f-4de4-b857-a3828eb37a26', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8965229bdd4c432996390156fda37c80", "name": "tempest-SubnetPoolsRbacTest-2066803525", "password_expires_at": null}, "audit_ids": ["xrLhaS8QQWSmMo5Hh9uRQg"], "expires_at": "2020-11-06T19:23:08.000000Z", "issued_at": "2020-11-06T18:23:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "de31e047b6f44ea79d0466bb217cb420", "name": "tempest-SubnetPoolsRbacTest-2066803525"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:08.247 39 INFO tempest.lib.common.rest_client [req-68bcb20b-6bde-4824-a4b5-6fa21b57178a ] Request (SubnetPoolsRbacTest:test_create_subnetpool_shared): 201 POST http://172.30.13.94:9696/v2.0/subnetpools 0.230s 2020-11-06 18:23:08.247 39 DEBUG tempest.lib.common.rest_client [req-68bcb20b-6bde-4824-a4b5-6fa21b57178a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnetpool": {"name": "tempest-SubnetPoolsRbacTest-1612298506", "min_prefixlen": 24, "max_prefixlen": 32, "prefixes": ["192.168.120.0/24"], "shared": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '550', 'x-openstack-request-id': 'req-68bcb20b-6bde-4824-a4b5-6fa21b57178a', 'date': 'Fri, 06 Nov 2020 18:23:08 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools'} Body: b'{"subnetpool": {"id": "529bdd43-9b64-4849-94ef-dbfee3ab82c7", "name": "tempest-SubnetPoolsRbacTest-1612298506", "tenant_id": "de31e047b6f44ea79d0466bb217cb420", "default_prefixlen": "24", "min_prefixlen": "24", "max_prefixlen": "32", "is_default": false, "shared": true, "prefixes": ["192.168.120.0/24"], "ip_version": 4, "default_quota": null, "address_scope_id": null, "description": "", "tags": [], "created_at": "2020-11-06T18:23:08Z", "updated_at": "2020-11-06T18:23:08Z", "revision_number": 0, "project_id": "de31e047b6f44ea79d0466bb217cb420"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:08.248 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:08.297 39 INFO tempest.lib.common.rest_client [req-0411fed8-c667-44da-b327-751bcfde8852 ] Request (SubnetPoolsRbacTest:test_create_subnetpool_shared): 200 GET http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles 0.048s 2020-11-06 18:23:08.297 39 DEBUG tempest.lib.common.rest_client [req-0411fed8-c667-44da-b327-751bcfde8852 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0411fed8-c667-44da-b327-751bcfde8852', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:08.333 39 INFO tempest.lib.common.rest_client [req-e608e7c9-b689-4cfd-b526-69e75157627f ] Request (SubnetPoolsRbacTest:test_create_subnetpool_shared): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:23:08.333 39 DEBUG tempest.lib.common.rest_client [req-e608e7c9-b689-4cfd-b526-69e75157627f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e608e7c9-b689-4cfd-b526-69e75157627f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8965229bdd4c432996390156fda37c80", "name": "tempest-SubnetPoolsRbacTest-2066803525", "password_expires_at": null}, "audit_ids": ["wFr3nJx7QGG08n5bc-rtzA"], "expires_at": "2020-11-06T19:23:08.000000Z", "issued_at": "2020-11-06T18:23:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "de31e047b6f44ea79d0466bb217cb420", "name": "tempest-SubnetPoolsRbacTest-2066803525"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:08.501 39 INFO tempest.lib.common.rest_client [req-8fb6541b-fe64-4bee-965a-c23bc585ff55 ] Request (SubnetPoolsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/subnetpools/529bdd43-9b64-4849-94ef-dbfee3ab82c7 0.166s 2020-11-06 18:23:08.501 39 DEBUG tempest.lib.common.rest_client [req-8fb6541b-fe64-4bee-965a-c23bc585ff55 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-8fb6541b-fe64-4bee-965a-c23bc585ff55', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:23:08 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools/529bdd43-9b64-4849-94ef-dbfee3ab82c7'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:08.503 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:23:08.506 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_subnetpool, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:23:08.507 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:23:08.509 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_subnetpool, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:23:08.610 39 INFO tempest.lib.common.rest_client [req-f3a0ef71-73df-418f-9f54-92cc6fb73e39 ] Request (SubnetPoolsRbacTest:test_delete_subnetpool): 201 POST http://172.30.13.94:9696/v2.0/subnetpools 0.100s 2020-11-06 18:23:08.611 39 DEBUG tempest.lib.common.rest_client [req-f3a0ef71-73df-418f-9f54-92cc6fb73e39 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnetpool": {"name": "tempest-SubnetPoolsRbacTest-812301358", "min_prefixlen": 24, "max_prefixlen": 32, "prefixes": ["192.168.120.0/24"]}} Response - Headers: {'content-type': 'application/json', 'content-length': '550', 'x-openstack-request-id': 'req-f3a0ef71-73df-418f-9f54-92cc6fb73e39', 'date': 'Fri, 06 Nov 2020 18:23:08 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools'} Body: b'{"subnetpool": {"id": "337d871a-0027-4073-9662-f93e413c3075", "name": "tempest-SubnetPoolsRbacTest-812301358", "tenant_id": "de31e047b6f44ea79d0466bb217cb420", "default_prefixlen": "24", "min_prefixlen": "24", "max_prefixlen": "32", "is_default": false, "shared": false, "prefixes": ["192.168.120.0/24"], "ip_version": 4, "default_quota": null, "address_scope_id": null, "description": "", "tags": [], "created_at": "2020-11-06T18:23:08Z", "updated_at": "2020-11-06T18:23:08Z", "revision_number": 0, "project_id": "de31e047b6f44ea79d0466bb217cb420"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:08.611 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:08.668 39 INFO tempest.lib.common.rest_client [req-b7237568-0c10-40a2-b857-0013b0ff5ec7 ] Request (SubnetPoolsRbacTest:test_delete_subnetpool): 200 GET http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles 0.056s 2020-11-06 18:23:08.668 39 DEBUG tempest.lib.common.rest_client [req-b7237568-0c10-40a2-b857-0013b0ff5ec7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b7237568-0c10-40a2-b857-0013b0ff5ec7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:08.711 39 INFO tempest.lib.common.rest_client [req-82e7bad3-076d-41e6-9e49-c8453af1417a ] Request (SubnetPoolsRbacTest:test_delete_subnetpool): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-11-06 18:23:08.712 39 DEBUG tempest.lib.common.rest_client [req-82e7bad3-076d-41e6-9e49-c8453af1417a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-82e7bad3-076d-41e6-9e49-c8453af1417a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8965229bdd4c432996390156fda37c80", "name": "tempest-SubnetPoolsRbacTest-2066803525", "password_expires_at": null}, "audit_ids": ["7hQ5toT8TqiyLVjfsDU_nA"], "expires_at": "2020-11-06T19:23:08.000000Z", "issued_at": "2020-11-06T18:23:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "de31e047b6f44ea79d0466bb217cb420", "name": "tempest-SubnetPoolsRbacTest-2066803525"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:08.867 39 INFO tempest.lib.common.rest_client [req-cce3402b-eda9-4ded-a24d-02eea5004f0d ] Request (SubnetPoolsRbacTest:test_delete_subnetpool): 204 DELETE http://172.30.13.94:9696/v2.0/subnetpools/337d871a-0027-4073-9662-f93e413c3075 0.154s 2020-11-06 18:23:08.868 39 DEBUG tempest.lib.common.rest_client [req-cce3402b-eda9-4ded-a24d-02eea5004f0d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-cce3402b-eda9-4ded-a24d-02eea5004f0d', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:23:08 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools/337d871a-0027-4073-9662-f93e413c3075'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:08.869 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:08.924 39 INFO tempest.lib.common.rest_client [req-c121ba4f-3783-457e-834f-1adb5acc18a2 ] Request (SubnetPoolsRbacTest:test_delete_subnetpool): 200 GET http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles 0.054s 2020-11-06 18:23:08.924 39 DEBUG tempest.lib.common.rest_client [req-c121ba4f-3783-457e-834f-1adb5acc18a2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c121ba4f-3783-457e-834f-1adb5acc18a2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:08.958 39 INFO tempest.lib.common.rest_client [req-0c044857-5795-489b-a7d1-931bc269d0f2 ] Request (SubnetPoolsRbacTest:test_delete_subnetpool): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:23:08.958 39 DEBUG tempest.lib.common.rest_client [req-0c044857-5795-489b-a7d1-931bc269d0f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0c044857-5795-489b-a7d1-931bc269d0f2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8965229bdd4c432996390156fda37c80", "name": "tempest-SubnetPoolsRbacTest-2066803525", "password_expires_at": null}, "audit_ids": ["bC98Np5XShGmm5woLvPvIg"], "expires_at": "2020-11-06T19:23:08.000000Z", "issued_at": "2020-11-06T18:23:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "de31e047b6f44ea79d0466bb217cb420", "name": "tempest-SubnetPoolsRbacTest-2066803525"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:09.042 39 INFO tempest.lib.common.rest_client [req-d42315b0-d6d0-43ea-8ff6-9f84ae734143 ] Request (SubnetPoolsRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94:9696/v2.0/subnetpools/337d871a-0027-4073-9662-f93e413c3075 0.082s 2020-11-06 18:23:09.042 39 DEBUG tempest.lib.common.rest_client [req-d42315b0-d6d0-43ea-8ff6-9f84ae734143 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '145', 'x-openstack-request-id': 'req-d42315b0-d6d0-43ea-8ff6-9f84ae734143', 'date': 'Fri, 06 Nov 2020 18:23:09 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools/337d871a-0027-4073-9662-f93e413c3075'} Body: b'{"NeutronError": {"type": "SubnetPoolNotFound", "message": "Subnet pool 337d871a-0027-4073-9662-f93e413c3075 could not be found.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:09.044 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:23:09.048 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_subnetpool, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:23:09.133 39 INFO tempest.lib.common.rest_client [req-aab8a6b3-a475-4a2a-8f08-719e0989df3d ] Request (SubnetPoolsRbacTest:test_list_subnetpools): 201 POST http://172.30.13.94:9696/v2.0/subnetpools 0.084s 2020-11-06 18:23:09.133 39 DEBUG tempest.lib.common.rest_client [req-aab8a6b3-a475-4a2a-8f08-719e0989df3d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnetpool": {"name": "tempest-SubnetPoolsRbacTest-1158368022", "min_prefixlen": 24, "max_prefixlen": 32, "prefixes": ["192.168.120.0/24"]}} Response - Headers: {'content-type': 'application/json', 'content-length': '551', 'x-openstack-request-id': 'req-aab8a6b3-a475-4a2a-8f08-719e0989df3d', 'date': 'Fri, 06 Nov 2020 18:23:09 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools'} Body: b'{"subnetpool": {"id": "4422f3a5-339c-44b2-8697-86256b8048ab", "name": "tempest-SubnetPoolsRbacTest-1158368022", "tenant_id": "de31e047b6f44ea79d0466bb217cb420", "default_prefixlen": "24", "min_prefixlen": "24", "max_prefixlen": "32", "is_default": false, "shared": false, "prefixes": ["192.168.120.0/24"], "ip_version": 4, "default_quota": null, "address_scope_id": null, "description": "", "tags": [], "created_at": "2020-11-06T18:23:09Z", "updated_at": "2020-11-06T18:23:09Z", "revision_number": 0, "project_id": "de31e047b6f44ea79d0466bb217cb420"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:09.134 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:09.187 39 INFO tempest.lib.common.rest_client [req-9664c758-ddbf-4c01-8aa2-925851f63469 ] Request (SubnetPoolsRbacTest:test_list_subnetpools): 200 GET http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles 0.052s 2020-11-06 18:23:09.187 39 DEBUG tempest.lib.common.rest_client [req-9664c758-ddbf-4c01-8aa2-925851f63469 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9664c758-ddbf-4c01-8aa2-925851f63469', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:09.221 39 INFO tempest.lib.common.rest_client [req-5a726afc-913a-47f4-a31b-0807a7179723 ] Request (SubnetPoolsRbacTest:test_list_subnetpools): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:23:09.221 39 DEBUG tempest.lib.common.rest_client [req-5a726afc-913a-47f4-a31b-0807a7179723 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5a726afc-913a-47f4-a31b-0807a7179723', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8965229bdd4c432996390156fda37c80", "name": "tempest-SubnetPoolsRbacTest-2066803525", "password_expires_at": null}, "audit_ids": ["5lXrKgTXQ46ok6FtKtXbJw"], "expires_at": "2020-11-06T19:23:09.000000Z", "issued_at": "2020-11-06T18:23:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "de31e047b6f44ea79d0466bb217cb420", "name": "tempest-SubnetPoolsRbacTest-2066803525"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:09.322 39 INFO tempest.lib.common.rest_client [req-f2b427d9-0007-4b4e-8dc8-ee0daa557046 ] Request (SubnetPoolsRbacTest:test_list_subnetpools): 200 GET http://172.30.13.94:9696/v2.0/subnetpools?id=4422f3a5-339c-44b2-8697-86256b8048ab 0.099s 2020-11-06 18:23:09.323 39 DEBUG tempest.lib.common.rest_client [req-f2b427d9-0007-4b4e-8dc8-ee0daa557046 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '554', 'x-openstack-request-id': 'req-f2b427d9-0007-4b4e-8dc8-ee0daa557046', 'date': 'Fri, 06 Nov 2020 18:23:09 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools?id=4422f3a5-339c-44b2-8697-86256b8048ab'} Body: b'{"subnetpools": [{"id": "4422f3a5-339c-44b2-8697-86256b8048ab", "name": "tempest-SubnetPoolsRbacTest-1158368022", "tenant_id": "de31e047b6f44ea79d0466bb217cb420", "default_prefixlen": "24", "min_prefixlen": "24", "max_prefixlen": "32", "is_default": false, "shared": false, "prefixes": ["192.168.120.0/24"], "ip_version": 4, "default_quota": null, "address_scope_id": null, "description": "", "tags": [], "created_at": "2020-11-06T18:23:09Z", "updated_at": "2020-11-06T18:23:09Z", "revision_number": 0, "project_id": "de31e047b6f44ea79d0466bb217cb420"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:09.323 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:09.379 39 INFO tempest.lib.common.rest_client [req-9ced4965-c065-4a7f-a18a-36b6e704bbf5 ] Request (SubnetPoolsRbacTest:test_list_subnetpools): 200 GET http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles 0.054s 2020-11-06 18:23:09.379 39 DEBUG tempest.lib.common.rest_client [req-9ced4965-c065-4a7f-a18a-36b6e704bbf5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9ced4965-c065-4a7f-a18a-36b6e704bbf5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:09.415 39 INFO tempest.lib.common.rest_client [req-ba2e7703-e4a3-4e40-8ac9-93fabc402c5c ] Request (SubnetPoolsRbacTest:test_list_subnetpools): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:23:09.416 39 DEBUG tempest.lib.common.rest_client [req-ba2e7703-e4a3-4e40-8ac9-93fabc402c5c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ba2e7703-e4a3-4e40-8ac9-93fabc402c5c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8965229bdd4c432996390156fda37c80", "name": "tempest-SubnetPoolsRbacTest-2066803525", "password_expires_at": null}, "audit_ids": ["FbrRhOSDR2eo6uqsDNU_3g"], "expires_at": "2020-11-06T19:23:09.000000Z", "issued_at": "2020-11-06T18:23:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "de31e047b6f44ea79d0466bb217cb420", "name": "tempest-SubnetPoolsRbacTest-2066803525"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:09.551 39 INFO tempest.lib.common.rest_client [req-e198e796-0f9c-4cf4-86ba-48211ca3d18e ] Request (SubnetPoolsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/subnetpools/4422f3a5-339c-44b2-8697-86256b8048ab 0.134s 2020-11-06 18:23:09.552 39 DEBUG tempest.lib.common.rest_client [req-e198e796-0f9c-4cf4-86ba-48211ca3d18e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-e198e796-0f9c-4cf4-86ba-48211ca3d18e', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:23:09 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools/4422f3a5-339c-44b2-8697-86256b8048ab'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:09.553 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:23:09.556 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_subnetpool, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:23:09.651 39 INFO tempest.lib.common.rest_client [req-0d797e67-7b7c-4513-a8f1-0198239d0b73 ] Request (SubnetPoolsRbacTest:test_show_subnetpool): 201 POST http://172.30.13.94:9696/v2.0/subnetpools 0.095s 2020-11-06 18:23:09.652 39 DEBUG tempest.lib.common.rest_client [req-0d797e67-7b7c-4513-a8f1-0198239d0b73 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnetpool": {"name": "tempest-SubnetPoolsRbacTest-329173624", "min_prefixlen": 24, "max_prefixlen": 32, "prefixes": ["192.168.120.0/24"]}} Response - Headers: {'content-type': 'application/json', 'content-length': '550', 'x-openstack-request-id': 'req-0d797e67-7b7c-4513-a8f1-0198239d0b73', 'date': 'Fri, 06 Nov 2020 18:23:09 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools'} Body: b'{"subnetpool": {"id": "56de7a23-2b1a-42f0-8261-e31978063032", "name": "tempest-SubnetPoolsRbacTest-329173624", "tenant_id": "de31e047b6f44ea79d0466bb217cb420", "default_prefixlen": "24", "min_prefixlen": "24", "max_prefixlen": "32", "is_default": false, "shared": false, "prefixes": ["192.168.120.0/24"], "ip_version": 4, "default_quota": null, "address_scope_id": null, "description": "", "tags": [], "created_at": "2020-11-06T18:23:09Z", "updated_at": "2020-11-06T18:23:09Z", "revision_number": 0, "project_id": "de31e047b6f44ea79d0466bb217cb420"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:09.653 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:09.710 39 INFO tempest.lib.common.rest_client [req-573647e0-1d5f-4e14-85e6-f9481fe62cf7 ] Request (SubnetPoolsRbacTest:test_show_subnetpool): 200 GET http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles 0.056s 2020-11-06 18:23:09.710 39 DEBUG tempest.lib.common.rest_client [req-573647e0-1d5f-4e14-85e6-f9481fe62cf7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-573647e0-1d5f-4e14-85e6-f9481fe62cf7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:09.747 39 INFO tempest.lib.common.rest_client [req-500f58b4-3b83-43b3-9717-305e412b2edb ] Request (SubnetPoolsRbacTest:test_show_subnetpool): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:23:09.748 39 DEBUG tempest.lib.common.rest_client [req-500f58b4-3b83-43b3-9717-305e412b2edb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-500f58b4-3b83-43b3-9717-305e412b2edb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8965229bdd4c432996390156fda37c80", "name": "tempest-SubnetPoolsRbacTest-2066803525", "password_expires_at": null}, "audit_ids": ["xSPg9cKrRsSXjR0_YVoqOg"], "expires_at": "2020-11-06T19:23:09.000000Z", "issued_at": "2020-11-06T18:23:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "de31e047b6f44ea79d0466bb217cb420", "name": "tempest-SubnetPoolsRbacTest-2066803525"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:09.856 39 INFO tempest.lib.common.rest_client [req-7bc40c16-8877-45df-ba58-9e40ae6da3dd ] Request (SubnetPoolsRbacTest:test_show_subnetpool): 200 GET http://172.30.13.94:9696/v2.0/subnetpools/56de7a23-2b1a-42f0-8261-e31978063032 0.107s 2020-11-06 18:23:09.856 39 DEBUG tempest.lib.common.rest_client [req-7bc40c16-8877-45df-ba58-9e40ae6da3dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '550', 'x-openstack-request-id': 'req-7bc40c16-8877-45df-ba58-9e40ae6da3dd', 'date': 'Fri, 06 Nov 2020 18:23:09 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools/56de7a23-2b1a-42f0-8261-e31978063032'} Body: b'{"subnetpool": {"id": "56de7a23-2b1a-42f0-8261-e31978063032", "name": "tempest-SubnetPoolsRbacTest-329173624", "tenant_id": "de31e047b6f44ea79d0466bb217cb420", "default_prefixlen": "24", "min_prefixlen": "24", "max_prefixlen": "32", "is_default": false, "shared": false, "prefixes": ["192.168.120.0/24"], "ip_version": 4, "default_quota": null, "address_scope_id": null, "description": "", "tags": [], "created_at": "2020-11-06T18:23:09Z", "updated_at": "2020-11-06T18:23:09Z", "revision_number": 0, "project_id": "de31e047b6f44ea79d0466bb217cb420"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:09.857 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:09.913 39 INFO tempest.lib.common.rest_client [req-67c966cb-6343-456b-ac47-e1833ac23cde ] Request (SubnetPoolsRbacTest:test_show_subnetpool): 200 GET http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles 0.055s 2020-11-06 18:23:09.914 39 DEBUG tempest.lib.common.rest_client [req-67c966cb-6343-456b-ac47-e1833ac23cde ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-67c966cb-6343-456b-ac47-e1833ac23cde', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:09.952 39 INFO tempest.lib.common.rest_client [req-7a75d2fa-89a6-4f7d-9f87-f037e1a4a8f0 ] Request (SubnetPoolsRbacTest:test_show_subnetpool): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:23:09.953 39 DEBUG tempest.lib.common.rest_client [req-7a75d2fa-89a6-4f7d-9f87-f037e1a4a8f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7a75d2fa-89a6-4f7d-9f87-f037e1a4a8f0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8965229bdd4c432996390156fda37c80", "name": "tempest-SubnetPoolsRbacTest-2066803525", "password_expires_at": null}, "audit_ids": ["ebvMQjRcQ8ygzKVu297bhA"], "expires_at": "2020-11-06T19:23:09.000000Z", "issued_at": "2020-11-06T18:23:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "de31e047b6f44ea79d0466bb217cb420", "name": "tempest-SubnetPoolsRbacTest-2066803525"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:10.105 39 INFO tempest.lib.common.rest_client [req-79577f0a-d94a-4a9f-a9dc-7bf7c0646f6a ] Request (SubnetPoolsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/subnetpools/56de7a23-2b1a-42f0-8261-e31978063032 0.151s 2020-11-06 18:23:10.106 39 DEBUG tempest.lib.common.rest_client [req-79577f0a-d94a-4a9f-a9dc-7bf7c0646f6a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-79577f0a-d94a-4a9f-a9dc-7bf7c0646f6a', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:23:10 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools/56de7a23-2b1a-42f0-8261-e31978063032'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:10.108 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:23:10.113 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_subnetpool, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:23:10.113 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:23:10.115 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_subnetpool, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:23:10.215 39 INFO tempest.lib.common.rest_client [req-e44d7ce0-63bf-49e1-8422-4cd8df2b53b9 ] Request (SubnetPoolsRbacTest:test_update_subnetpool): 201 POST http://172.30.13.94:9696/v2.0/subnetpools 0.099s 2020-11-06 18:23:10.216 39 DEBUG tempest.lib.common.rest_client [req-e44d7ce0-63bf-49e1-8422-4cd8df2b53b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnetpool": {"name": "tempest-SubnetPoolsRbacTest-842943119", "min_prefixlen": 24, "max_prefixlen": 32, "prefixes": ["192.168.120.0/24"]}} Response - Headers: {'content-type': 'application/json', 'content-length': '550', 'x-openstack-request-id': 'req-e44d7ce0-63bf-49e1-8422-4cd8df2b53b9', 'date': 'Fri, 06 Nov 2020 18:23:10 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools'} Body: b'{"subnetpool": {"id": "b1cbeb77-6ed1-4259-a114-39aa6ad375e7", "name": "tempest-SubnetPoolsRbacTest-842943119", "tenant_id": "de31e047b6f44ea79d0466bb217cb420", "default_prefixlen": "24", "min_prefixlen": "24", "max_prefixlen": "32", "is_default": false, "shared": false, "prefixes": ["192.168.120.0/24"], "ip_version": 4, "default_quota": null, "address_scope_id": null, "description": "", "tags": [], "created_at": "2020-11-06T18:23:10Z", "updated_at": "2020-11-06T18:23:10Z", "revision_number": 0, "project_id": "de31e047b6f44ea79d0466bb217cb420"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:10.216 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:10.275 39 INFO tempest.lib.common.rest_client [req-90ef1c37-8736-4da4-8a40-d08e3ad566d5 ] Request (SubnetPoolsRbacTest:test_update_subnetpool): 200 GET http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles 0.057s 2020-11-06 18:23:10.275 39 DEBUG tempest.lib.common.rest_client [req-90ef1c37-8736-4da4-8a40-d08e3ad566d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-90ef1c37-8736-4da4-8a40-d08e3ad566d5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:10.316 39 INFO tempest.lib.common.rest_client [req-1b9fad9c-a7ea-4a88-9787-6d1a7e34c9fe ] Request (SubnetPoolsRbacTest:test_update_subnetpool): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:23:10.317 39 DEBUG tempest.lib.common.rest_client [req-1b9fad9c-a7ea-4a88-9787-6d1a7e34c9fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1b9fad9c-a7ea-4a88-9787-6d1a7e34c9fe', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8965229bdd4c432996390156fda37c80", "name": "tempest-SubnetPoolsRbacTest-2066803525", "password_expires_at": null}, "audit_ids": ["pT1kRb4HRpqul-YJEhFI4g"], "expires_at": "2020-11-06T19:23:10.000000Z", "issued_at": "2020-11-06T18:23:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "de31e047b6f44ea79d0466bb217cb420", "name": "tempest-SubnetPoolsRbacTest-2066803525"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:10.453 39 INFO tempest.lib.common.rest_client [req-e98bf6e5-1a4f-4729-9c34-5e0962c8cef5 ] Request (SubnetPoolsRbacTest:test_update_subnetpool): 200 PUT http://172.30.13.94:9696/v2.0/subnetpools/b1cbeb77-6ed1-4259-a114-39aa6ad375e7 0.134s 2020-11-06 18:23:10.453 39 DEBUG tempest.lib.common.rest_client [req-e98bf6e5-1a4f-4729-9c34-5e0962c8cef5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnetpool": {"min_prefixlen": 24}} Response - Headers: {'content-type': 'application/json', 'content-length': '495', 'x-openstack-request-id': 'req-e98bf6e5-1a4f-4729-9c34-5e0962c8cef5', 'date': 'Fri, 06 Nov 2020 18:23:10 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools/b1cbeb77-6ed1-4259-a114-39aa6ad375e7'} Body: b'{"subnetpool": {"id": "b1cbeb77-6ed1-4259-a114-39aa6ad375e7", "project_id": "de31e047b6f44ea79d0466bb217cb420", "name": "tempest-SubnetPoolsRbacTest-842943119", "ip_version": 4, "default_prefixlen": 24, "min_prefixlen": 24, "max_prefixlen": 32, "shared": false, "is_default": false, "revision_number": 1, "description": "", "created_at": "2020-11-06T18:23:10Z", "updated_at": "2020-11-06T18:23:10Z", "tenant_id": "de31e047b6f44ea79d0466bb217cb420", "prefixes": ["192.168.120.0/24"], "tags": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:10.454 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:10.511 39 INFO tempest.lib.common.rest_client [req-dcf6d60a-66c1-43fc-b0f1-c7295f55a91b ] Request (SubnetPoolsRbacTest:test_update_subnetpool): 200 GET http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles 0.056s 2020-11-06 18:23:10.512 39 DEBUG tempest.lib.common.rest_client [req-dcf6d60a-66c1-43fc-b0f1-c7295f55a91b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dcf6d60a-66c1-43fc-b0f1-c7295f55a91b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:10.545 39 INFO tempest.lib.common.rest_client [req-74c26bd9-def7-4fc9-88a2-007b93087048 ] Request (SubnetPoolsRbacTest:test_update_subnetpool): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:23:10.545 39 DEBUG tempest.lib.common.rest_client [req-74c26bd9-def7-4fc9-88a2-007b93087048 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-74c26bd9-def7-4fc9-88a2-007b93087048', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8965229bdd4c432996390156fda37c80", "name": "tempest-SubnetPoolsRbacTest-2066803525", "password_expires_at": null}, "audit_ids": ["qcLv5uMYQNu17lVywJV3Uw"], "expires_at": "2020-11-06T19:23:10.000000Z", "issued_at": "2020-11-06T18:23:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "de31e047b6f44ea79d0466bb217cb420", "name": "tempest-SubnetPoolsRbacTest-2066803525"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:10.697 39 INFO tempest.lib.common.rest_client [req-8f403c22-b0a3-48e0-8e44-2f0b4b743bad ] Request (SubnetPoolsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/subnetpools/b1cbeb77-6ed1-4259-a114-39aa6ad375e7 0.150s 2020-11-06 18:23:10.698 39 DEBUG tempest.lib.common.rest_client [req-8f403c22-b0a3-48e0-8e44-2f0b4b743bad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-8f403c22-b0a3-48e0-8e44-2f0b4b743bad', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:23:10 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools/b1cbeb77-6ed1-4259-a114-39aa6ad375e7'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:10.700 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:23:10.704 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_subnetpool, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:23:10.705 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:23:10.707 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_subnetpool:is_default, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:23:10.743 39 INFO tempest.lib.common.rest_client [req-ddbcf24c-4e0d-47a2-91e7-1d08551081a0 ] Request (SubnetPoolsRbacTest:test_update_subnetpool_is_default): 200 GET http://172.30.13.94:9696/v2.0/subnetpools 0.035s 2020-11-06 18:23:10.743 39 DEBUG tempest.lib.common.rest_client [req-ddbcf24c-4e0d-47a2-91e7-1d08551081a0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '1069', 'x-openstack-request-id': 'req-ddbcf24c-4e0d-47a2-91e7-1d08551081a0', 'date': 'Fri, 06 Nov 2020 18:23:10 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools'} Body: b'{"subnetpools": [{"id": "b48d0a6f-e3a5-4e4a-9774-40dfdcf8b21e", "name": "shared-default-subnetpool-v4", "tenant_id": "5990258dee3b412286ccca75bcab995c", "default_prefixlen": "26", "min_prefixlen": "8", "max_prefixlen": "32", "is_default": true, "shared": true, "prefixes": ["10.0.0.0/22"], "ip_version": 4, "default_quota": null, "address_scope_id": null, "description": "", "tags": [], "created_at": "2020-10-07T12:07:11Z", "updated_at": "2020-11-06T18:23:07Z", "revision_number": 215, "project_id": "5990258dee3b412286ccca75bcab995c"}, {"id": "f32bc1c4-caf2-4148-92ce-ea35dab4345c", "name": "shared-default-subnetpool-v6", "tenant_id": "5990258dee3b412286ccca75bcab995c", "default_prefixlen": "64", "min_prefixlen": "64", "max_prefixlen": "128", "is_default": true, "shared": true, "prefixes": ["fd45:7793:ed2b::/56"], "ip_version": 6, "default_quota": null, "address_scope_id": null, "description": "", "tags": [], "created_at": "2020-10-07T12:07:14Z", "updated_at": "2020-11-06T18:23:07Z", "revision_number": 144, "project_id": "5990258dee3b412286ccca75bcab995c"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:10.744 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:10.802 39 INFO tempest.lib.common.rest_client [req-7a72d67a-f127-4806-85ee-9697c4a3797e ] Request (SubnetPoolsRbacTest:test_update_subnetpool_is_default): 200 GET http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles 0.057s 2020-11-06 18:23:10.802 39 DEBUG tempest.lib.common.rest_client [req-7a72d67a-f127-4806-85ee-9697c4a3797e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7a72d67a-f127-4806-85ee-9697c4a3797e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:10.843 39 INFO tempest.lib.common.rest_client [req-2013d290-709d-408d-9f03-1dd4ae8b1042 ] Request (SubnetPoolsRbacTest:test_update_subnetpool_is_default): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:23:10.843 39 DEBUG tempest.lib.common.rest_client [req-2013d290-709d-408d-9f03-1dd4ae8b1042 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2013d290-709d-408d-9f03-1dd4ae8b1042', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8965229bdd4c432996390156fda37c80", "name": "tempest-SubnetPoolsRbacTest-2066803525", "password_expires_at": null}, "audit_ids": ["iiujIej0RkGsFOS4DNz3-A"], "expires_at": "2020-11-06T19:23:10.000000Z", "issued_at": "2020-11-06T18:23:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "de31e047b6f44ea79d0466bb217cb420", "name": "tempest-SubnetPoolsRbacTest-2066803525"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:11.023 39 INFO tempest.lib.common.rest_client [req-c9c66e76-6d45-4952-b480-1afbe37ef097 ] Request (SubnetPoolsRbacTest:test_update_subnetpool_is_default): 200 PUT http://172.30.13.94:9696/v2.0/subnetpools/b48d0a6f-e3a5-4e4a-9774-40dfdcf8b21e 0.179s 2020-11-06 18:23:11.024 39 DEBUG tempest.lib.common.rest_client [req-c9c66e76-6d45-4952-b480-1afbe37ef097 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnetpool": {"description": "", "is_default": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '480', 'x-openstack-request-id': 'req-c9c66e76-6d45-4952-b480-1afbe37ef097', 'date': 'Fri, 06 Nov 2020 18:23:11 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools/b48d0a6f-e3a5-4e4a-9774-40dfdcf8b21e'} Body: b'{"subnetpool": {"id": "b48d0a6f-e3a5-4e4a-9774-40dfdcf8b21e", "project_id": "5990258dee3b412286ccca75bcab995c", "name": "shared-default-subnetpool-v4", "ip_version": 4, "default_prefixlen": 26, "min_prefixlen": 8, "max_prefixlen": 32, "shared": true, "is_default": true, "revision_number": 216, "description": "", "created_at": "2020-10-07T12:07:11Z", "updated_at": "2020-11-06T18:23:10Z", "tenant_id": "5990258dee3b412286ccca75bcab995c", "prefixes": ["10.0.0.0/22"], "tags": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:11.025 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:11.083 39 INFO tempest.lib.common.rest_client [req-8e3414c5-321f-44d2-9819-caa3a346016b ] Request (SubnetPoolsRbacTest:test_update_subnetpool_is_default): 200 GET http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles 0.057s 2020-11-06 18:23:11.083 39 DEBUG tempest.lib.common.rest_client [req-8e3414c5-321f-44d2-9819-caa3a346016b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8e3414c5-321f-44d2-9819-caa3a346016b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420/users/8965229bdd4c432996390156fda37c80/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:11.126 39 INFO tempest.lib.common.rest_client [req-9fe4d7fe-35ae-4518-b235-2bf061ed8689 ] Request (SubnetPoolsRbacTest:test_update_subnetpool_is_default): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-11-06 18:23:11.126 39 DEBUG tempest.lib.common.rest_client [req-9fe4d7fe-35ae-4518-b235-2bf061ed8689 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9fe4d7fe-35ae-4518-b235-2bf061ed8689', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8965229bdd4c432996390156fda37c80", "name": "tempest-SubnetPoolsRbacTest-2066803525", "password_expires_at": null}, "audit_ids": ["WAT_GHDdSVGI27wNQ2K5jw"], "expires_at": "2020-11-06T19:23:11.000000Z", "issued_at": "2020-11-06T18:23:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "de31e047b6f44ea79d0466bb217cb420", "name": "tempest-SubnetPoolsRbacTest-2066803525"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_de31e047b6f44ea79d0466bb217cb420", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:11.243 39 INFO tempest.lib.common.rest_client [req-50acebf7-f10f-4256-9f4f-b3c99fc644f0 ] Request (SubnetPoolsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/8965229bdd4c432996390156fda37c80 0.113s 2020-11-06 18:23:11.243 39 DEBUG tempest.lib.common.rest_client [req-50acebf7-f10f-4256-9f4f-b3c99fc644f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-50acebf7-f10f-4256-9f4f-b3c99fc644f0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/8965229bdd4c432996390156fda37c80'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:11.334 39 INFO tempest.lib.common.rest_client [req-92c2f1fd-3a5a-4fc2-8398-612fd14e7418 ] Request (SubnetPoolsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-11-06 18:23:11.335 39 DEBUG tempest.lib.common.rest_client [req-92c2f1fd-3a5a-4fc2-8398-612fd14e7418 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-92c2f1fd-3a5a-4fc2-8398-612fd14e7418', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["3AeSfvOtTiiukw313pmAJw"], "expires_at": "2020-11-06T19:23:11.000000Z", "issued_at": "2020-11-06T18:23:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:12.705 39 INFO tempest.lib.common.rest_client [req-f045379e-d1ba-4410-b3e1-26f215c719b6 ] Request (SubnetPoolsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=de31e047b6f44ea79d0466bb217cb420&name=default 1.369s 2020-11-06 18:23:12.705 39 DEBUG tempest.lib.common.rest_client [req-f045379e-d1ba-4410-b3e1-26f215c719b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-f045379e-d1ba-4410-b3e1-26f215c719b6', 'date': 'Fri, 06 Nov 2020 18:23:12 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=de31e047b6f44ea79d0466bb217cb420&name=default'} Body: b'{"security_groups": [{"id": "04e21cb5-3668-426d-a8cf-49ee3ae2cf2c", "name": "default", "stateful": true, "tenant_id": "de31e047b6f44ea79d0466bb217cb420", "description": "Default security group", "security_group_rules": [{"id": "14c449d0-3d06-4d41-b92f-f8bad5ef2dd3", "tenant_id": "de31e047b6f44ea79d0466bb217cb420", "security_group_id": "04e21cb5-3668-426d-a8cf-49ee3ae2cf2c", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:23:11Z", "updated_at": "2020-11-06T18:23:11Z", "revision_number": 0, "project_id": "de31e047b6f44ea79d0466bb217cb420"}, {"id": "6e13bd72-aa6d-4b83-9e91-5ece4fac3ab9", "tenant_id": "de31e047b6f44ea79d0466bb217cb420", "security_group_id": "04e21cb5-3668-426d-a8cf-49ee3ae2cf2c", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "04e21cb5-3668-426d-a8cf-49ee3ae2cf2c", "description": null, "tags": [], "created_at": "2020-11-06T18:23:11Z", "updated_at": "2020-11-06T18:23:11Z", "revision_number": 0, "project_id": "de31e047b6f44ea79d0466bb217cb420"}, {"id": "74813116-cc19-43a7-a31c-43cbb98e9589", "tenant_id": "de31e047b6f44ea79d0466bb217cb420", "security_group_id": "04e21cb5-3668-426d-a8cf-49ee3ae2cf2c", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:23:11Z", "updated_at": "2020-11-06T18:23:11Z", "revision_number": 0, "project_id": "de31e047b6f44ea79d0466bb217cb420"}, {"id": "a713992a-3f83-453b-8687-af91da279ebf", "tenant_id": "de31e047b6f44ea79d0466bb217cb420", "security_group_id": "04e21cb5-3668-426d-a8cf-49ee3ae2cf2c", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "04e21cb5-3668-426d-a8cf-49ee3ae2cf2c", "description": null, "tags": [], "created_at": "2020-11-06T18:23:11Z", "updated_at": "2020-11-06T18:23:11Z", "revision_number": 0, "project_id": "de31e047b6f44ea79d0466bb217cb420"}], "tags": [], "created_at": "2020-11-06T18:23:11Z", "updated_at": "2020-11-06T18:23:11Z", "revision_number": 1, "project_id": "de31e047b6f44ea79d0466bb217cb420"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:12.802 39 INFO tempest.lib.common.rest_client [req-5836a56c-234d-449c-9198-05b39f93d66b ] Request (SubnetPoolsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/04e21cb5-3668-426d-a8cf-49ee3ae2cf2c 0.095s 2020-11-06 18:23:12.803 39 DEBUG tempest.lib.common.rest_client [req-5836a56c-234d-449c-9198-05b39f93d66b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-5836a56c-234d-449c-9198-05b39f93d66b', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:23:12 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/04e21cb5-3668-426d-a8cf-49ee3ae2cf2c'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:12.919 39 INFO tempest.lib.common.rest_client [req-7d0dd416-70d5-4cd7-af7a-6929495c3277 ] Request (SubnetPoolsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420 0.116s 2020-11-06 18:23:12.920 39 DEBUG tempest.lib.common.rest_client [req-7d0dd416-70d5-4cd7-af7a-6929495c3277 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7d0dd416-70d5-4cd7-af7a-6929495c3277', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/de31e047b6f44ea79d0466bb217cb420'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:13.014 39 INFO tempest.lib.common.rest_client [req-d72b4465-d85f-46db-a769-7364fef623f8 ] Request (SubnetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-11-06 18:23:13.014 39 DEBUG tempest.lib.common.rest_client [req-d72b4465-d85f-46db-a769-7364fef623f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d72b4465-d85f-46db-a769-7364fef623f8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["Iqj5fSagREaaW-_r7UuDEg"], "expires_at": "2020-11-06T19:23:12.000000Z", "issued_at": "2020-11-06T18:23:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:13.056 39 INFO tempest.lib.common.rest_client [req-249b4cba-599d-4a80-9fdc-a7070def5ecd ] Request (SubnetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:23:13.057 39 DEBUG tempest.lib.common.rest_client [req-249b4cba-599d-4a80-9fdc-a7070def5ecd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-249b4cba-599d-4a80-9fdc-a7070def5ecd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["6rP5Ah0vSLqJ0t39OCpQpg"], "expires_at": "2020-11-06T19:23:13.000000Z", "issued_at": "2020-11-06T18:23:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:13.114 39 INFO tempest.lib.common.rest_client [req-be0b4217-fe8e-4b7e-953b-de2950ffe094 ] Request (SubnetsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.056s 2020-11-06 18:23:13.115 39 DEBUG tempest.lib.common.rest_client [req-be0b4217-fe8e-4b7e-953b-de2950ffe094 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-be0b4217-fe8e-4b7e-953b-de2950ffe094', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:13.187 39 INFO tempest.lib.common.rest_client [req-317a410b-5bf3-48c9-83f1-8501565c73ea ] Request (SubnetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.071s 2020-11-06 18:23:13.187 39 DEBUG tempest.lib.common.rest_client [req-317a410b-5bf3-48c9-83f1-8501565c73ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-SubnetsRbacTest-2011136642-desc", "domain_id": "default", "name": "tempest-SubnetsRbacTest-2011136642"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '368', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-317a410b-5bf3-48c9-83f1-8501565c73ea', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "9184cb29007a49f4b7592b7477f25de6", "name": "tempest-SubnetsRbacTest-2011136642", "domain_id": "default", "description": "tempest-SubnetsRbacTest-2011136642-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:13.304 39 INFO tempest.lib.common.rest_client [req-0205a1fb-b7e1-4fdd-a21f-c6c4c0bc385e ] Request (SubnetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.115s 2020-11-06 18:23:13.304 39 DEBUG tempest.lib.common.rest_client [req-0205a1fb-b7e1-4fdd-a21f-c6c4c0bc385e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-SubnetsRbacTest-2011136642", "password": "V1&geO_YVlq_2UV", "project_id": "9184cb29007a49f4b7592b7477f25de6", "email": "tempest-SubnetsRbacTest-1093728719@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '386', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0205a1fb-b7e1-4fdd-a21f-c6c4c0bc385e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "9184cb29007a49f4b7592b7477f25de6", "email": "tempest-SubnetsRbacTest-1093728719@example.com", "id": "745fa48514a742e1aaafd82e1ec42c6d", "name": "tempest-SubnetsRbacTest-2011136642", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/745fa48514a742e1aaafd82e1ec42c6d"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:13.360 39 INFO tempest.lib.common.rest_client [req-4ee258b7-f67b-449c-a1d2-57abf4fac1d6 ] Request (SubnetsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-11-06 18:23:13.361 39 DEBUG tempest.lib.common.rest_client [req-4ee258b7-f67b-449c-a1d2-57abf4fac1d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4ee258b7-f67b-449c-a1d2-57abf4fac1d6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:13.415 39 INFO tempest.lib.common.rest_client [req-bf178035-392e-438b-9db4-5e5cafd7982b ] Request (SubnetsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.053s 2020-11-06 18:23:13.415 39 DEBUG tempest.lib.common.rest_client [req-bf178035-392e-438b-9db4-5e5cafd7982b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bf178035-392e-438b-9db4-5e5cafd7982b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:13.484 39 INFO tempest.lib.common.rest_client [req-80ff47b0-3488-435d-8917-8c3d99a9fc76 ] Request (SubnetsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles/72a4576c553448cd941b052c1ca0cf2d 0.067s 2020-11-06 18:23:13.484 39 DEBUG tempest.lib.common.rest_client [req-80ff47b0-3488-435d-8917-8c3d99a9fc76 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-80ff47b0-3488-435d-8917-8c3d99a9fc76', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:13.485 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SubnetsRbacTest-2011136642', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '9184cb29007a49f4b7592b7477f25de6', 'project_name': 'tempest-SubnetsRbacTest-2011136642', 'tenant_id': '9184cb29007a49f4b7592b7477f25de6', 'tenant_name': 'tempest-SubnetsRbacTest-2011136642', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '745fa48514a742e1aaafd82e1ec42c6d'}, Network: None, Subnet: None, Router: None 2020-11-06 18:23:13.486 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SubnetsRbacTest-2011136642', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '9184cb29007a49f4b7592b7477f25de6', 'project_name': 'tempest-SubnetsRbacTest-2011136642', 'tenant_id': '9184cb29007a49f4b7592b7477f25de6', 'tenant_name': 'tempest-SubnetsRbacTest-2011136642', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '745fa48514a742e1aaafd82e1ec42c6d'}, Network: None, Subnet: None, Router: None 2020-11-06 18:23:13.613 39 INFO tempest.lib.common.rest_client [req-825518c4-1c54-418f-9f40-5723d015796d ] Request (SubnetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.114s 2020-11-06 18:23:13.613 39 DEBUG tempest.lib.common.rest_client [req-825518c4-1c54-418f-9f40-5723d015796d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6561', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-825518c4-1c54-418f-9f40-5723d015796d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "745fa48514a742e1aaafd82e1ec42c6d", "name": "tempest-SubnetsRbacTest-2011136642", "password_expires_at": null}, "audit_ids": ["MgMx134qQZqkL_LVS3k09g"], "expires_at": "2020-11-06T19:23:13.000000Z", "issued_at": "2020-11-06T18:23:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9184cb29007a49f4b7592b7477f25de6", "name": "tempest-SubnetsRbacTest-2011136642"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/ _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:13.708 39 INFO tempest.lib.common.rest_client [req-61babebb-c9e3-4709-9ca7-4707796e3a7f ] Request (SubnetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-11-06 18:23:13.709 39 DEBUG tempest.lib.common.rest_client [req-61babebb-c9e3-4709-9ca7-4707796e3a7f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-61babebb-c9e3-4709-9ca7-4707796e3a7f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["lHmSXIMBS0qJCQQPDRyESA"], "expires_at": "2020-11-06T19:23:13.000000Z", "issued_at": "2020-11-06T18:23:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:13.757 39 INFO tempest.lib.common.rest_client [req-c844cb74-dd45-40b9-b2c6-2a195e703cfb ] Request (SubnetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:23:13.758 39 DEBUG tempest.lib.common.rest_client [req-c844cb74-dd45-40b9-b2c6-2a195e703cfb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c844cb74-dd45-40b9-b2c6-2a195e703cfb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["MX9vLmEwR9a-dcPeLfmwKQ"], "expires_at": "2020-11-06T19:23:13.000000Z", "issued_at": "2020-11-06T18:23:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:13.816 39 INFO tempest.lib.common.rest_client [req-f213093f-6999-421b-9539-1f17921203b1 ] Request (SubnetsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.057s 2020-11-06 18:23:13.817 39 DEBUG tempest.lib.common.rest_client [req-f213093f-6999-421b-9539-1f17921203b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f213093f-6999-421b-9539-1f17921203b1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:13.870 39 INFO tempest.lib.common.rest_client [req-cd152523-f9fc-4484-a937-29ae056b8730 ] Request (SubnetsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.052s 2020-11-06 18:23:13.870 39 DEBUG tempest.lib.common.rest_client [req-cd152523-f9fc-4484-a937-29ae056b8730 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cd152523-f9fc-4484-a937-29ae056b8730', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:13.871 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:23:13.871 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:13.929 39 INFO tempest.lib.common.rest_client [req-1ca15c75-fda1-4da4-97f0-b5ced3763945 ] Request (SubnetsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles 0.057s 2020-11-06 18:23:13.930 39 DEBUG tempest.lib.common.rest_client [req-1ca15c75-fda1-4da4-97f0-b5ced3763945 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1ca15c75-fda1-4da4-97f0-b5ced3763945', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:13.988 39 INFO tempest.lib.common.rest_client [req-0215a824-d4ee-47b3-bfe8-51a3b61c6029 ] Request (SubnetsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles/72a4576c553448cd941b052c1ca0cf2d 0.057s 2020-11-06 18:23:13.988 39 DEBUG tempest.lib.common.rest_client [req-0215a824-d4ee-47b3-bfe8-51a3b61c6029 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0215a824-d4ee-47b3-bfe8-51a3b61c6029', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:14.087 39 INFO tempest.lib.common.rest_client [req-92a1b830-d7c3-4548-b58e-9a12dab810b8 ] Request (SubnetsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles/a629c95d64b3416fb80ae90af4f69c05 0.097s 2020-11-06 18:23:14.087 39 DEBUG tempest.lib.common.rest_client [req-92a1b830-d7c3-4548-b58e-9a12dab810b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-92a1b830-d7c3-4548-b58e-9a12dab810b8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:15.177 39 INFO tempest.lib.common.rest_client [req-ac3db311-803b-4a50-b6a7-5a2b81dd3693 ] Request (SubnetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 18:23:15.178 39 DEBUG tempest.lib.common.rest_client [req-ac3db311-803b-4a50-b6a7-5a2b81dd3693 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ac3db311-803b-4a50-b6a7-5a2b81dd3693', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "745fa48514a742e1aaafd82e1ec42c6d", "name": "tempest-SubnetsRbacTest-2011136642", "password_expires_at": null}, "audit_ids": ["Y3P2SBNgS6CyMFEE0nix0A"], "expires_at": "2020-11-06T19:23:15.000000Z", "issued_at": "2020-11-06T18:23:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9184cb29007a49f4b7592b7477f25de6", "name": "tempest-SubnetsRbacTest-2011136642"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:15.922 39 INFO tempest.lib.common.rest_client [req-a929934d-be7e-4a8f-9129-776acb9fe85c ] Request (SubnetsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.742s 2020-11-06 18:23:15.923 39 DEBUG tempest.lib.common.rest_client [req-a929934d-be7e-4a8f-9129-776acb9fe85c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-SubnetsRbacTest-test-network-991297517"}} Response - Headers: {'content-type': 'application/json', 'content-length': '735', 'x-openstack-request-id': 'req-a929934d-be7e-4a8f-9129-776acb9fe85c', 'date': 'Fri, 06 Nov 2020 18:23:15 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"8cae6116-a8ce-40ae-9fbf-b231d74adb82","name":"tempest-SubnetsRbacTest-test-network-991297517","tenant_id":"9184cb29007a49f4b7592b7477f25de6","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"9184cb29007a49f4b7592b7477f25de6","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":45,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:23:15Z","updated_at":"2020-11-06T18:23:15Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:16.527 39 INFO tempest.lib.common.rest_client [req-7c3341c1-874e-4531-a046-23ba08ff4447 ] Request (SubnetsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.602s 2020-11-06 18:23:16.527 39 DEBUG tempest.lib.common.rest_client [req-7c3341c1-874e-4531-a046-23ba08ff4447 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "8cae6116-a8ce-40ae-9fbf-b231d74adb82", "cidr": "192.168.120.0/28", "ip_version": 4, "gateway_ip": "192.168.120.1"}} Response - Headers: {'content-type': 'application/json', 'content-length': '661', 'x-openstack-request-id': 'req-7c3341c1-874e-4531-a046-23ba08ff4447', 'date': 'Fri, 06 Nov 2020 18:23:16 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"3fdcfff5-df30-4ebc-bae6-7fcd94bfb432","name":"","tenant_id":"9184cb29007a49f4b7592b7477f25de6","network_id":"8cae6116-a8ce-40ae-9fbf-b231d74adb82","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-11-06T18:23:16Z","updated_at":"2020-11-06T18:23:16Z","revision_number":0,"project_id":"9184cb29007a49f4b7592b7477f25de6"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:16.529 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:23:16.533 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_subnet, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:23:16.533 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:16.642 39 INFO tempest.lib.common.rest_client [req-d47d58f4-75d2-4402-85fb-f3d49b9a9943 ] Request (SubnetsRbacTest:test_create_subnet): 200 GET http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles 0.108s 2020-11-06 18:23:16.643 39 DEBUG tempest.lib.common.rest_client [req-d47d58f4-75d2-4402-85fb-f3d49b9a9943 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d47d58f4-75d2-4402-85fb-f3d49b9a9943', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:16.683 39 INFO tempest.lib.common.rest_client [req-9100d7c3-97a9-446a-a914-d341fe11faed ] Request (SubnetsRbacTest:test_create_subnet): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:23:16.684 39 DEBUG tempest.lib.common.rest_client [req-9100d7c3-97a9-446a-a914-d341fe11faed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9100d7c3-97a9-446a-a914-d341fe11faed', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "745fa48514a742e1aaafd82e1ec42c6d", "name": "tempest-SubnetsRbacTest-2011136642", "password_expires_at": null}, "audit_ids": ["NNwFjhDVSW-UFuXTiFH96A"], "expires_at": "2020-11-06T19:23:16.000000Z", "issued_at": "2020-11-06T18:23:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9184cb29007a49f4b7592b7477f25de6", "name": "tempest-SubnetsRbacTest-2011136642"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:16.955 39 INFO tempest.lib.common.rest_client [req-305063cf-2674-4e41-b738-f0008f065402 ] Request (SubnetsRbacTest:test_create_subnet): 400 POST http://172.30.13.94:9696/v2.0/subnets 0.271s 2020-11-06 18:23:16.956 39 DEBUG tempest.lib.common.rest_client [req-305063cf-2674-4e41-b738-f0008f065402 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "8cae6116-a8ce-40ae-9fbf-b231d74adb82", "cidr": "192.168.120.0/28", "ip_version": 4, "gateway_ip": "192.168.120.1"}} Response - Headers: {'content-type': 'application/json', 'content-length': '224', 'x-openstack-request-id': 'req-305063cf-2674-4e41-b738-f0008f065402', 'date': 'Fri, 06 Nov 2020 18:23:16 GMT', 'connection': 'close', 'status': '400', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"NeutronError": {"type": "InvalidInput", "message": "Invalid input for operation: Requested subnet with cidr: 192.168.120.0/28 for network: 8cae6116-a8ce-40ae-9fbf-b231d74adb82 overlaps with another subnet.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:17.411 39 INFO tempest.lib.common.rest_client [req-eb382c80-3df1-4e75-a81f-1c3f335c4953 ] Request (SubnetsRbacTest:test_create_subnet): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.454s 2020-11-06 18:23:17.412 39 DEBUG tempest.lib.common.rest_client [req-eb382c80-3df1-4e75-a81f-1c3f335c4953 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "8cae6116-a8ce-40ae-9fbf-b231d74adb82", "cidr": "192.168.120.16/28", "ip_version": 4, "gateway_ip": "192.168.120.17"}} Response - Headers: {'content-type': 'application/json', 'content-length': '664', 'x-openstack-request-id': 'req-eb382c80-3df1-4e75-a81f-1c3f335c4953', 'date': 'Fri, 06 Nov 2020 18:23:17 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"3add5dd7-143f-4991-ac16-68ab8fd51b40","name":"","tenant_id":"9184cb29007a49f4b7592b7477f25de6","network_id":"8cae6116-a8ce-40ae-9fbf-b231d74adb82","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.17","cidr":"192.168.120.16/28","allocation_pools":[{"start":"192.168.120.18","end":"192.168.120.30"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-11-06T18:23:17Z","updated_at":"2020-11-06T18:23:17Z","revision_number":0,"project_id":"9184cb29007a49f4b7592b7477f25de6"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:17.413 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:17.465 39 INFO tempest.lib.common.rest_client [req-0e8c5fbc-1bf9-484b-835c-0058892a4d32 ] Request (SubnetsRbacTest:test_create_subnet): 200 GET http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles 0.051s 2020-11-06 18:23:17.465 39 DEBUG tempest.lib.common.rest_client [req-0e8c5fbc-1bf9-484b-835c-0058892a4d32 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0e8c5fbc-1bf9-484b-835c-0058892a4d32', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:17.501 39 INFO tempest.lib.common.rest_client [req-63cf66e6-ebcf-4c22-b0e0-f54b697a708a ] Request (SubnetsRbacTest:test_create_subnet): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:23:17.501 39 DEBUG tempest.lib.common.rest_client [req-63cf66e6-ebcf-4c22-b0e0-f54b697a708a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-63cf66e6-ebcf-4c22-b0e0-f54b697a708a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "745fa48514a742e1aaafd82e1ec42c6d", "name": "tempest-SubnetsRbacTest-2011136642", "password_expires_at": null}, "audit_ids": ["1J9oHs6JSsmBqOrhC33y3Q"], "expires_at": "2020-11-06T19:23:17.000000Z", "issued_at": "2020-11-06T18:23:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9184cb29007a49f4b7592b7477f25de6", "name": "tempest-SubnetsRbacTest-2011136642"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:17.504 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:23:17.508 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_subnet, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:23:17.509 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:23:17.513 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_subnet, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:23:17.753 39 INFO tempest.lib.common.rest_client [req-e4e95e8f-7c9f-4975-9d2b-346d5f74b6c7 ] Request (SubnetsRbacTest:test_delete_subnet): 400 POST http://172.30.13.94:9696/v2.0/subnets 0.239s 2020-11-06 18:23:17.754 39 DEBUG tempest.lib.common.rest_client [req-e4e95e8f-7c9f-4975-9d2b-346d5f74b6c7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "8cae6116-a8ce-40ae-9fbf-b231d74adb82", "cidr": "192.168.120.0/28", "ip_version": 4, "gateway_ip": "192.168.120.1"}} Response - Headers: {'content-type': 'application/json', 'content-length': '224', 'x-openstack-request-id': 'req-e4e95e8f-7c9f-4975-9d2b-346d5f74b6c7', 'date': 'Fri, 06 Nov 2020 18:23:17 GMT', 'connection': 'close', 'status': '400', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"NeutronError": {"type": "InvalidInput", "message": "Invalid input for operation: Requested subnet with cidr: 192.168.120.0/28 for network: 8cae6116-a8ce-40ae-9fbf-b231d74adb82 overlaps with another subnet.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:17.987 39 INFO tempest.lib.common.rest_client [req-88c41912-8edb-4147-a78e-a2c5f3b62460 ] Request (SubnetsRbacTest:test_delete_subnet): 400 POST http://172.30.13.94:9696/v2.0/subnets 0.232s 2020-11-06 18:23:17.988 39 DEBUG tempest.lib.common.rest_client [req-88c41912-8edb-4147-a78e-a2c5f3b62460 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "8cae6116-a8ce-40ae-9fbf-b231d74adb82", "cidr": "192.168.120.16/28", "ip_version": 4, "gateway_ip": "192.168.120.17"}} Response - Headers: {'content-type': 'application/json', 'content-length': '225', 'x-openstack-request-id': 'req-88c41912-8edb-4147-a78e-a2c5f3b62460', 'date': 'Fri, 06 Nov 2020 18:23:17 GMT', 'connection': 'close', 'status': '400', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"NeutronError": {"type": "InvalidInput", "message": "Invalid input for operation: Requested subnet with cidr: 192.168.120.16/28 for network: 8cae6116-a8ce-40ae-9fbf-b231d74adb82 overlaps with another subnet.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:18.617 39 INFO tempest.lib.common.rest_client [req-e78ad5f6-5930-4df1-b60e-61b95cc40af6 ] Request (SubnetsRbacTest:test_delete_subnet): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.628s 2020-11-06 18:23:18.618 39 DEBUG tempest.lib.common.rest_client [req-e78ad5f6-5930-4df1-b60e-61b95cc40af6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "8cae6116-a8ce-40ae-9fbf-b231d74adb82", "cidr": "192.168.120.32/28", "ip_version": 4, "gateway_ip": "192.168.120.33"}} Response - Headers: {'content-type': 'application/json', 'content-length': '664', 'x-openstack-request-id': 'req-e78ad5f6-5930-4df1-b60e-61b95cc40af6', 'date': 'Fri, 06 Nov 2020 18:23:18 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"2c35cb6e-a196-423d-abba-db7d344ce39e","name":"","tenant_id":"9184cb29007a49f4b7592b7477f25de6","network_id":"8cae6116-a8ce-40ae-9fbf-b231d74adb82","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.33","cidr":"192.168.120.32/28","allocation_pools":[{"start":"192.168.120.34","end":"192.168.120.46"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-11-06T18:23:18Z","updated_at":"2020-11-06T18:23:18Z","revision_number":0,"project_id":"9184cb29007a49f4b7592b7477f25de6"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:18.618 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:18.694 39 INFO tempest.lib.common.rest_client [req-aad83b35-d59f-4847-9631-b10de6ff273e ] Request (SubnetsRbacTest:test_delete_subnet): 200 GET http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles 0.074s 2020-11-06 18:23:18.694 39 DEBUG tempest.lib.common.rest_client [req-aad83b35-d59f-4847-9631-b10de6ff273e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aad83b35-d59f-4847-9631-b10de6ff273e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:18.734 39 INFO tempest.lib.common.rest_client [req-32878c55-4f49-43ab-980d-fc73d7f822f7 ] Request (SubnetsRbacTest:test_delete_subnet): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:23:18.734 39 DEBUG tempest.lib.common.rest_client [req-32878c55-4f49-43ab-980d-fc73d7f822f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-32878c55-4f49-43ab-980d-fc73d7f822f7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "745fa48514a742e1aaafd82e1ec42c6d", "name": "tempest-SubnetsRbacTest-2011136642", "password_expires_at": null}, "audit_ids": ["dHnKgP5CRAmyKfUDs1u9Mg"], "expires_at": "2020-11-06T19:23:18.000000Z", "issued_at": "2020-11-06T18:23:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9184cb29007a49f4b7592b7477f25de6", "name": "tempest-SubnetsRbacTest-2011136642"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:19.226 39 INFO tempest.lib.common.rest_client [req-8ab43dce-1b46-4bbd-a22d-cb3968668633 ] Request (SubnetsRbacTest:test_delete_subnet): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/2c35cb6e-a196-423d-abba-db7d344ce39e 0.490s 2020-11-06 18:23:19.227 39 DEBUG tempest.lib.common.rest_client [req-8ab43dce-1b46-4bbd-a22d-cb3968668633 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-8ab43dce-1b46-4bbd-a22d-cb3968668633', 'date': 'Fri, 06 Nov 2020 18:23:19 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/2c35cb6e-a196-423d-abba-db7d344ce39e'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:19.227 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:19.279 39 INFO tempest.lib.common.rest_client [req-92c2bca6-7d64-4497-86da-ca1f8973ca18 ] Request (SubnetsRbacTest:test_delete_subnet): 200 GET http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles 0.051s 2020-11-06 18:23:19.280 39 DEBUG tempest.lib.common.rest_client [req-92c2bca6-7d64-4497-86da-ca1f8973ca18 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-92c2bca6-7d64-4497-86da-ca1f8973ca18', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:19.317 39 INFO tempest.lib.common.rest_client [req-058f6179-9ea4-46b1-bd23-3a3fb2b4af45 ] Request (SubnetsRbacTest:test_delete_subnet): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:23:19.318 39 DEBUG tempest.lib.common.rest_client [req-058f6179-9ea4-46b1-bd23-3a3fb2b4af45 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-058f6179-9ea4-46b1-bd23-3a3fb2b4af45', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "745fa48514a742e1aaafd82e1ec42c6d", "name": "tempest-SubnetsRbacTest-2011136642", "password_expires_at": null}, "audit_ids": ["rtgR8ATYT1ChEE-HMPXGtA"], "expires_at": "2020-11-06T19:23:19.000000Z", "issued_at": "2020-11-06T18:23:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9184cb29007a49f4b7592b7477f25de6", "name": "tempest-SubnetsRbacTest-2011136642"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:19.321 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:23:19.326 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_subnet, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:23:19.327 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:19.382 39 INFO tempest.lib.common.rest_client [req-2eedf477-b8f1-4ed8-af7c-945615675347 ] Request (SubnetsRbacTest:test_list_subnets): 200 GET http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles 0.055s 2020-11-06 18:23:19.383 39 DEBUG tempest.lib.common.rest_client [req-2eedf477-b8f1-4ed8-af7c-945615675347 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2eedf477-b8f1-4ed8-af7c-945615675347', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:19.422 39 INFO tempest.lib.common.rest_client [req-f973edf6-8911-4ed9-96c7-053948831dae ] Request (SubnetsRbacTest:test_list_subnets): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:23:19.422 39 DEBUG tempest.lib.common.rest_client [req-f973edf6-8911-4ed9-96c7-053948831dae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f973edf6-8911-4ed9-96c7-053948831dae', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "745fa48514a742e1aaafd82e1ec42c6d", "name": "tempest-SubnetsRbacTest-2011136642", "password_expires_at": null}, "audit_ids": ["KPizrB2ESq-0XwKv2gcUuw"], "expires_at": "2020-11-06T19:23:19.000000Z", "issued_at": "2020-11-06T18:23:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9184cb29007a49f4b7592b7477f25de6", "name": "tempest-SubnetsRbacTest-2011136642"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:19.544 39 INFO tempest.lib.common.rest_client [req-5667ae7b-38df-43ea-be43-c1725cf440be ] Request (SubnetsRbacTest:test_list_subnets): 200 GET http://172.30.13.94:9696/v2.0/subnets?id=3fdcfff5-df30-4ebc-bae6-7fcd94bfb432 0.120s 2020-11-06 18:23:19.545 39 DEBUG tempest.lib.common.rest_client [req-5667ae7b-38df-43ea-be43-c1725cf440be ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '664', 'x-openstack-request-id': 'req-5667ae7b-38df-43ea-be43-c1725cf440be', 'date': 'Fri, 06 Nov 2020 18:23:19 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets?id=3fdcfff5-df30-4ebc-bae6-7fcd94bfb432'} Body: b'{"subnets":[{"id":"3fdcfff5-df30-4ebc-bae6-7fcd94bfb432","name":"","tenant_id":"9184cb29007a49f4b7592b7477f25de6","network_id":"8cae6116-a8ce-40ae-9fbf-b231d74adb82","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-11-06T18:23:16Z","updated_at":"2020-11-06T18:23:16Z","revision_number":0,"project_id":"9184cb29007a49f4b7592b7477f25de6"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:19.545 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:19.601 39 INFO tempest.lib.common.rest_client [req-c8c46251-503f-49b3-a942-932815bafbd3 ] Request (SubnetsRbacTest:test_list_subnets): 200 GET http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles 0.055s 2020-11-06 18:23:19.602 39 DEBUG tempest.lib.common.rest_client [req-c8c46251-503f-49b3-a942-932815bafbd3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c8c46251-503f-49b3-a942-932815bafbd3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:19.639 39 INFO tempest.lib.common.rest_client [req-43cc3a80-63f6-48bd-849e-2c1702bc5b05 ] Request (SubnetsRbacTest:test_list_subnets): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:23:19.640 39 DEBUG tempest.lib.common.rest_client [req-43cc3a80-63f6-48bd-849e-2c1702bc5b05 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-43cc3a80-63f6-48bd-849e-2c1702bc5b05', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "745fa48514a742e1aaafd82e1ec42c6d", "name": "tempest-SubnetsRbacTest-2011136642", "password_expires_at": null}, "audit_ids": ["dbDb-S62QBGzoHEDRXL5jA"], "expires_at": "2020-11-06T19:23:19.000000Z", "issued_at": "2020-11-06T18:23:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9184cb29007a49f4b7592b7477f25de6", "name": "tempest-SubnetsRbacTest-2011136642"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:19.642 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:23:19.644 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_subnet, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:23:19.644 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:19.696 39 INFO tempest.lib.common.rest_client [req-97ce1dd1-21b1-4dbb-a4b0-b1d1b9f5b61b ] Request (SubnetsRbacTest:test_show_subnet): 200 GET http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles 0.051s 2020-11-06 18:23:19.697 39 DEBUG tempest.lib.common.rest_client [req-97ce1dd1-21b1-4dbb-a4b0-b1d1b9f5b61b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-97ce1dd1-21b1-4dbb-a4b0-b1d1b9f5b61b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:19.733 39 INFO tempest.lib.common.rest_client [req-615eab2e-ee7e-4f2e-be37-bf3bbfcd9276 ] Request (SubnetsRbacTest:test_show_subnet): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:23:19.733 39 DEBUG tempest.lib.common.rest_client [req-615eab2e-ee7e-4f2e-be37-bf3bbfcd9276 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-615eab2e-ee7e-4f2e-be37-bf3bbfcd9276', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "745fa48514a742e1aaafd82e1ec42c6d", "name": "tempest-SubnetsRbacTest-2011136642", "password_expires_at": null}, "audit_ids": ["GRiRkIbJRgC7PcPQUvXsSA"], "expires_at": "2020-11-06T19:23:19.000000Z", "issued_at": "2020-11-06T18:23:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9184cb29007a49f4b7592b7477f25de6", "name": "tempest-SubnetsRbacTest-2011136642"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:19.854 39 INFO tempest.lib.common.rest_client [req-2f29e6ba-75c2-478a-adde-e3406ff87199 ] Request (SubnetsRbacTest:test_show_subnet): 200 GET http://172.30.13.94:9696/v2.0/subnets/3fdcfff5-df30-4ebc-bae6-7fcd94bfb432 0.119s 2020-11-06 18:23:19.854 39 DEBUG tempest.lib.common.rest_client [req-2f29e6ba-75c2-478a-adde-e3406ff87199 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '661', 'x-openstack-request-id': 'req-2f29e6ba-75c2-478a-adde-e3406ff87199', 'date': 'Fri, 06 Nov 2020 18:23:19 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/3fdcfff5-df30-4ebc-bae6-7fcd94bfb432'} Body: b'{"subnet":{"id":"3fdcfff5-df30-4ebc-bae6-7fcd94bfb432","name":"","tenant_id":"9184cb29007a49f4b7592b7477f25de6","network_id":"8cae6116-a8ce-40ae-9fbf-b231d74adb82","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-11-06T18:23:16Z","updated_at":"2020-11-06T18:23:16Z","revision_number":0,"project_id":"9184cb29007a49f4b7592b7477f25de6"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:19.855 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:19.910 39 INFO tempest.lib.common.rest_client [req-19cc7477-6b00-4961-9a47-3884247a496c ] Request (SubnetsRbacTest:test_show_subnet): 200 GET http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles 0.054s 2020-11-06 18:23:19.910 39 DEBUG tempest.lib.common.rest_client [req-19cc7477-6b00-4961-9a47-3884247a496c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-19cc7477-6b00-4961-9a47-3884247a496c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:19.950 39 INFO tempest.lib.common.rest_client [req-c44441f0-bd3e-46ef-99f7-9a9c16b31524 ] Request (SubnetsRbacTest:test_show_subnet): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:23:19.952 39 DEBUG tempest.lib.common.rest_client [req-c44441f0-bd3e-46ef-99f7-9a9c16b31524 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c44441f0-bd3e-46ef-99f7-9a9c16b31524', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "745fa48514a742e1aaafd82e1ec42c6d", "name": "tempest-SubnetsRbacTest-2011136642", "password_expires_at": null}, "audit_ids": ["tNHss0NpRlud_JqACepopg"], "expires_at": "2020-11-06T19:23:19.000000Z", "issued_at": "2020-11-06T18:23:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9184cb29007a49f4b7592b7477f25de6", "name": "tempest-SubnetsRbacTest-2011136642"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:19.955 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:23:19.958 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_subnet, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:23:19.959 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:23:19.961 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_subnet, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:23:19.961 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:20.013 39 INFO tempest.lib.common.rest_client [req-a0cbdac2-8507-48e8-8d86-de92b761cc94 ] Request (SubnetsRbacTest:test_update_subnet): 200 GET http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles 0.052s 2020-11-06 18:23:20.014 39 DEBUG tempest.lib.common.rest_client [req-a0cbdac2-8507-48e8-8d86-de92b761cc94 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a0cbdac2-8507-48e8-8d86-de92b761cc94', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:20.047 39 INFO tempest.lib.common.rest_client [req-89317157-0af6-4345-8918-bdf14d92068b ] Request (SubnetsRbacTest:test_update_subnet): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:23:20.048 39 DEBUG tempest.lib.common.rest_client [req-89317157-0af6-4345-8918-bdf14d92068b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-89317157-0af6-4345-8918-bdf14d92068b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "745fa48514a742e1aaafd82e1ec42c6d", "name": "tempest-SubnetsRbacTest-2011136642", "password_expires_at": null}, "audit_ids": ["gfBKiQFbR-Wqxw5i7zHZRQ"], "expires_at": "2020-11-06T19:23:20.000000Z", "issued_at": "2020-11-06T18:23:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9184cb29007a49f4b7592b7477f25de6", "name": "tempest-SubnetsRbacTest-2011136642"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:20.533 39 INFO tempest.lib.common.rest_client [req-30bc7f50-f7b8-4232-9c77-fbbaf29f6b3a ] Request (SubnetsRbacTest:test_update_subnet): 200 PUT http://172.30.13.94:9696/v2.0/subnets/3fdcfff5-df30-4ebc-bae6-7fcd94bfb432 0.484s 2020-11-06 18:23:20.534 39 DEBUG tempest.lib.common.rest_client [req-30bc7f50-f7b8-4232-9c77-fbbaf29f6b3a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"name": "tempest-SubnetsRbacTest-Subnet-1181779681"}} Response - Headers: {'content-type': 'application/json', 'content-length': '702', 'x-openstack-request-id': 'req-30bc7f50-f7b8-4232-9c77-fbbaf29f6b3a', 'date': 'Fri, 06 Nov 2020 18:23:20 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/3fdcfff5-df30-4ebc-bae6-7fcd94bfb432'} Body: b'{"subnet":{"id":"3fdcfff5-df30-4ebc-bae6-7fcd94bfb432","name":"tempest-SubnetsRbacTest-Subnet-1181779681","tenant_id":"9184cb29007a49f4b7592b7477f25de6","network_id":"8cae6116-a8ce-40ae-9fbf-b231d74adb82","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-11-06T18:23:16Z","updated_at":"2020-11-06T18:23:20Z","revision_number":1,"project_id":"9184cb29007a49f4b7592b7477f25de6"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:20.534 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:20.593 39 INFO tempest.lib.common.rest_client [req-0c1592c7-2972-4164-9590-7758812bc986 ] Request (SubnetsRbacTest:test_update_subnet): 200 GET http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles 0.058s 2020-11-06 18:23:20.594 39 DEBUG tempest.lib.common.rest_client [req-0c1592c7-2972-4164-9590-7758812bc986 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0c1592c7-2972-4164-9590-7758812bc986', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6/users/745fa48514a742e1aaafd82e1ec42c6d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:20.632 39 INFO tempest.lib.common.rest_client [req-70c8adb4-36ec-46b0-93c7-c23dd531a5bc ] Request (SubnetsRbacTest:test_update_subnet): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:23:20.632 39 DEBUG tempest.lib.common.rest_client [req-70c8adb4-36ec-46b0-93c7-c23dd531a5bc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-70c8adb4-36ec-46b0-93c7-c23dd531a5bc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "745fa48514a742e1aaafd82e1ec42c6d", "name": "tempest-SubnetsRbacTest-2011136642", "password_expires_at": null}, "audit_ids": ["HKTOPxbdSSe5FchDpspBrA"], "expires_at": "2020-11-06T19:23:20.000000Z", "issued_at": "2020-11-06T18:23:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9184cb29007a49f4b7592b7477f25de6", "name": "tempest-SubnetsRbacTest-2011136642"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9184cb29007a49f4b7592b7477f25de6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:20.740 39 INFO tempest.lib.common.rest_client [req-2a536834-8690-453d-a5da-2ca3b36c0e6a ] Request (SubnetsRbacTest:tearDownClass): 404 DELETE http://172.30.13.94:9696/v2.0/subnets/2c35cb6e-a196-423d-abba-db7d344ce39e 0.105s 2020-11-06 18:23:20.741 39 DEBUG tempest.lib.common.rest_client [req-2a536834-8690-453d-a5da-2ca3b36c0e6a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '136', 'x-openstack-request-id': 'req-2a536834-8690-453d-a5da-2ca3b36c0e6a', 'date': 'Fri, 06 Nov 2020 18:23:20 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/2c35cb6e-a196-423d-abba-db7d344ce39e'} Body: b'{"NeutronError": {"type": "SubnetNotFound", "message": "Subnet 2c35cb6e-a196-423d-abba-db7d344ce39e could not be found.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:22.463 39 INFO tempest.lib.common.rest_client [req-ebcb796a-d870-458f-8d1b-15dc6f560c16 ] Request (SubnetsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/3add5dd7-143f-4991-ac16-68ab8fd51b40 1.721s 2020-11-06 18:23:22.463 39 DEBUG tempest.lib.common.rest_client [req-ebcb796a-d870-458f-8d1b-15dc6f560c16 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-ebcb796a-d870-458f-8d1b-15dc6f560c16', 'date': 'Fri, 06 Nov 2020 18:23:22 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/3add5dd7-143f-4991-ac16-68ab8fd51b40'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:22.916 39 INFO tempest.lib.common.rest_client [req-4f3b08f7-ff97-4816-b99b-add99112514c ] Request (SubnetsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/3fdcfff5-df30-4ebc-bae6-7fcd94bfb432 0.452s 2020-11-06 18:23:22.917 39 DEBUG tempest.lib.common.rest_client [req-4f3b08f7-ff97-4816-b99b-add99112514c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-4f3b08f7-ff97-4816-b99b-add99112514c', 'date': 'Fri, 06 Nov 2020 18:23:22 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/3fdcfff5-df30-4ebc-bae6-7fcd94bfb432'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:24.080 39 INFO tempest.lib.common.rest_client [req-50ae1071-e29f-49c8-9168-6d3f0f7ecbcb ] Request (SubnetsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/8cae6116-a8ce-40ae-9fbf-b231d74adb82 1.162s 2020-11-06 18:23:24.081 39 DEBUG tempest.lib.common.rest_client [req-50ae1071-e29f-49c8-9168-6d3f0f7ecbcb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-50ae1071-e29f-49c8-9168-6d3f0f7ecbcb', 'date': 'Fri, 06 Nov 2020 18:23:24 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/8cae6116-a8ce-40ae-9fbf-b231d74adb82'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:24.265 39 INFO tempest.lib.common.rest_client [req-88f3ee6e-f85c-4cf9-bc6e-12d636361156 ] Request (SubnetsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/745fa48514a742e1aaafd82e1ec42c6d 0.183s 2020-11-06 18:23:24.266 39 DEBUG tempest.lib.common.rest_client [req-88f3ee6e-f85c-4cf9-bc6e-12d636361156 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-88f3ee6e-f85c-4cf9-bc6e-12d636361156', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/745fa48514a742e1aaafd82e1ec42c6d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:24.342 39 INFO tempest.lib.common.rest_client [req-15fd3ce6-f3b6-46de-8727-77787c3e3622 ] Request (SubnetsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.075s 2020-11-06 18:23:24.343 39 DEBUG tempest.lib.common.rest_client [req-15fd3ce6-f3b6-46de-8727-77787c3e3622 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-15fd3ce6-f3b6-46de-8727-77787c3e3622', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["9okxTciWTAOcEkrPtXeXCQ"], "expires_at": "2020-11-06T19:23:24.000000Z", "issued_at": "2020-11-06T18:23:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:24.488 39 INFO tempest.lib.common.rest_client [req-dd535d6d-322b-44a3-919a-6404691eb2f9 ] Request (SubnetsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=9184cb29007a49f4b7592b7477f25de6&name=default 0.144s 2020-11-06 18:23:24.488 39 DEBUG tempest.lib.common.rest_client [req-dd535d6d-322b-44a3-919a-6404691eb2f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-dd535d6d-322b-44a3-919a-6404691eb2f9', 'date': 'Fri, 06 Nov 2020 18:23:24 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=9184cb29007a49f4b7592b7477f25de6&name=default'} Body: b'{"security_groups": [{"id": "dc09c0db-bae9-4dc2-b4ff-67656ac7b6c1", "name": "default", "stateful": true, "tenant_id": "9184cb29007a49f4b7592b7477f25de6", "description": "Default security group", "security_group_rules": [{"id": "26e6ee83-1b06-4d8a-973c-24327df37f0f", "tenant_id": "9184cb29007a49f4b7592b7477f25de6", "security_group_id": "dc09c0db-bae9-4dc2-b4ff-67656ac7b6c1", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "dc09c0db-bae9-4dc2-b4ff-67656ac7b6c1", "description": null, "tags": [], "created_at": "2020-11-06T18:23:15Z", "updated_at": "2020-11-06T18:23:15Z", "revision_number": 0, "project_id": "9184cb29007a49f4b7592b7477f25de6"}, {"id": "ddbbd869-52cb-4020-83be-b5fcb7af03d7", "tenant_id": "9184cb29007a49f4b7592b7477f25de6", "security_group_id": "dc09c0db-bae9-4dc2-b4ff-67656ac7b6c1", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:23:15Z", "updated_at": "2020-11-06T18:23:15Z", "revision_number": 0, "project_id": "9184cb29007a49f4b7592b7477f25de6"}, {"id": "e8826aa7-6c2a-4351-a1a9-25d159a43ccf", "tenant_id": "9184cb29007a49f4b7592b7477f25de6", "security_group_id": "dc09c0db-bae9-4dc2-b4ff-67656ac7b6c1", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "dc09c0db-bae9-4dc2-b4ff-67656ac7b6c1", "description": null, "tags": [], "created_at": "2020-11-06T18:23:15Z", "updated_at": "2020-11-06T18:23:15Z", "revision_number": 0, "project_id": "9184cb29007a49f4b7592b7477f25de6"}, {"id": "f3f45e5b-6a74-4742-8501-b22e8a666db4", "tenant_id": "9184cb29007a49f4b7592b7477f25de6", "security_group_id": "dc09c0db-bae9-4dc2-b4ff-67656ac7b6c1", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:23:15Z", "updated_at": "2020-11-06T18:23:15Z", "revision_number": 0, "project_id": "9184cb29007a49f4b7592b7477f25de6"}], "tags": [], "created_at": "2020-11-06T18:23:15Z", "updated_at": "2020-11-06T18:23:15Z", "revision_number": 1, "project_id": "9184cb29007a49f4b7592b7477f25de6"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:24.665 39 INFO tempest.lib.common.rest_client [req-5942e972-7af6-4c80-beb6-e19b344a8213 ] Request (SubnetsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/dc09c0db-bae9-4dc2-b4ff-67656ac7b6c1 0.176s 2020-11-06 18:23:24.666 39 DEBUG tempest.lib.common.rest_client [req-5942e972-7af6-4c80-beb6-e19b344a8213 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-5942e972-7af6-4c80-beb6-e19b344a8213', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:23:24 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/dc09c0db-bae9-4dc2-b4ff-67656ac7b6c1'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:24.818 39 INFO tempest.lib.common.rest_client [req-ccd9dedd-2214-4300-9346-4388d1a3b044 ] Request (SubnetsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6 0.151s 2020-11-06 18:23:24.818 39 DEBUG tempest.lib.common.rest_client [req-ccd9dedd-2214-4300-9346-4388d1a3b044 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ccd9dedd-2214-4300-9346-4388d1a3b044', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/9184cb29007a49f4b7592b7477f25de6'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:24.909 39 INFO tempest.lib.common.rest_client [req-070b2b11-7ea8-44e0-ad35-0da5c9d96b9e ] Request (TrunksExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-11-06 18:23:24.910 39 DEBUG tempest.lib.common.rest_client [req-070b2b11-7ea8-44e0-ad35-0da5c9d96b9e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-070b2b11-7ea8-44e0-ad35-0da5c9d96b9e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["nz_HbTM5Sj-l4d4AIJaytQ"], "expires_at": "2020-11-06T19:23:24.000000Z", "issued_at": "2020-11-06T18:23:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:24.953 39 INFO tempest.lib.common.rest_client [req-5a7ec6b1-029c-4aa0-a8a5-712a19c87308 ] Request (TrunksExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:23:24.954 39 DEBUG tempest.lib.common.rest_client [req-5a7ec6b1-029c-4aa0-a8a5-712a19c87308 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5a7ec6b1-029c-4aa0-a8a5-712a19c87308', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["S0TKhhauRdSvjjhc6Cvihg"], "expires_at": "2020-11-06T19:23:24.000000Z", "issued_at": "2020-11-06T18:23:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:25.008 39 INFO tempest.lib.common.rest_client [req-4361344f-40f8-4a70-a4d3-431b84d96634 ] Request (TrunksExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.053s 2020-11-06 18:23:25.009 39 DEBUG tempest.lib.common.rest_client [req-4361344f-40f8-4a70-a4d3-431b84d96634 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4361344f-40f8-4a70-a4d3-431b84d96634', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:25.067 39 INFO tempest.lib.common.rest_client [req-e430fe26-5aa1-49e8-ab18-b18d63572694 ] Request (TrunksExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.057s 2020-11-06 18:23:25.067 39 DEBUG tempest.lib.common.rest_client [req-e430fe26-5aa1-49e8-ab18-b18d63572694 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-TrunksExtRbacTest-1221222514-desc", "domain_id": "default", "name": "tempest-TrunksExtRbacTest-1221222514"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '372', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e430fe26-5aa1-49e8-ab18-b18d63572694', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "d7b4ac8c071b41b5bf8bcac014cdd714", "name": "tempest-TrunksExtRbacTest-1221222514", "domain_id": "default", "description": "tempest-TrunksExtRbacTest-1221222514-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/d7b4ac8c071b41b5bf8bcac014cdd714"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:25.188 39 INFO tempest.lib.common.rest_client [req-556c82bf-4ba4-4845-b601-352c1480f315 ] Request (TrunksExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.120s 2020-11-06 18:23:25.188 39 DEBUG tempest.lib.common.rest_client [req-556c82bf-4ba4-4845-b601-352c1480f315 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-TrunksExtRbacTest-1221222514", "password": "R3~tVzgdA9DFErZ", "project_id": "d7b4ac8c071b41b5bf8bcac014cdd714", "email": "tempest-TrunksExtRbacTest-1356601684@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '390', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-556c82bf-4ba4-4845-b601-352c1480f315', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "d7b4ac8c071b41b5bf8bcac014cdd714", "email": "tempest-TrunksExtRbacTest-1356601684@example.com", "id": "2cf087b076364f0982dbd344a3ad75e6", "name": "tempest-TrunksExtRbacTest-1221222514", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/2cf087b076364f0982dbd344a3ad75e6"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:25.237 39 INFO tempest.lib.common.rest_client [req-1dd3eab9-4997-46da-9273-0bda8122f2d0 ] Request (TrunksExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.047s 2020-11-06 18:23:25.237 39 DEBUG tempest.lib.common.rest_client [req-1dd3eab9-4997-46da-9273-0bda8122f2d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1dd3eab9-4997-46da-9273-0bda8122f2d0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:25.285 39 INFO tempest.lib.common.rest_client [req-9f8fc5a6-cc78-45d0-98ab-79aa7c843751 ] Request (TrunksExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.047s 2020-11-06 18:23:25.286 39 DEBUG tempest.lib.common.rest_client [req-9f8fc5a6-cc78-45d0-98ab-79aa7c843751 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9f8fc5a6-cc78-45d0-98ab-79aa7c843751', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:25.357 39 INFO tempest.lib.common.rest_client [req-2e9ab9d6-ff64-42e6-9b3e-cdd6b48f972a ] Request (TrunksExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/d7b4ac8c071b41b5bf8bcac014cdd714/users/2cf087b076364f0982dbd344a3ad75e6/roles/72a4576c553448cd941b052c1ca0cf2d 0.070s 2020-11-06 18:23:25.357 39 DEBUG tempest.lib.common.rest_client [req-2e9ab9d6-ff64-42e6-9b3e-cdd6b48f972a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2e9ab9d6-ff64-42e6-9b3e-cdd6b48f972a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d7b4ac8c071b41b5bf8bcac014cdd714/users/2cf087b076364f0982dbd344a3ad75e6/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:25.358 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-TrunksExtRbacTest-1221222514', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'd7b4ac8c071b41b5bf8bcac014cdd714', 'project_name': 'tempest-TrunksExtRbacTest-1221222514', 'tenant_id': 'd7b4ac8c071b41b5bf8bcac014cdd714', 'tenant_name': 'tempest-TrunksExtRbacTest-1221222514', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '2cf087b076364f0982dbd344a3ad75e6'}, Network: None, Subnet: None, Router: None 2020-11-06 18:23:25.358 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-TrunksExtRbacTest-1221222514', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'd7b4ac8c071b41b5bf8bcac014cdd714', 'project_name': 'tempest-TrunksExtRbacTest-1221222514', 'tenant_id': 'd7b4ac8c071b41b5bf8bcac014cdd714', 'tenant_name': 'tempest-TrunksExtRbacTest-1221222514', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '2cf087b076364f0982dbd344a3ad75e6'}, Network: None, Subnet: None, Router: None 2020-11-06 18:23:25.460 39 INFO tempest.lib.common.rest_client [req-85ae6b0f-7d70-4f6a-a0b9-357e1b92d5f9 ] Request (TrunksExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-11-06 18:23:25.461 39 DEBUG tempest.lib.common.rest_client [req-85ae6b0f-7d70-4f6a-a0b9-357e1b92d5f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6565', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-85ae6b0f-7d70-4f6a-a0b9-357e1b92d5f9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2cf087b076364f0982dbd344a3ad75e6", "name": "tempest-TrunksExtRbacTest-1221222514", "password_expires_at": null}, "audit_ids": ["B5KhIGqjS-C92iH7pPXddw"], "expires_at": "2020-11-06T19:23:25.000000Z", "issued_at": "2020-11-06T18:23:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d7b4ac8c071b41b5bf8bcac014cdd714", "name": "tempest-TrunksExtRbacTest-1221222514"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:25.461 39 WARNING tempest.manager [-] tempest.manager.Manager is not a stable interface and as such it should not be imported directly. It will be removed as soon as the client manager becomes available in tempest.lib. 2020-11-06 18:23:25.550 39 INFO tempest.lib.common.rest_client [req-704ef2d0-b361-4844-8c5a-e96473628f4e ] Request (TrunksExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 18:23:25.550 39 DEBUG tempest.lib.common.rest_client [req-704ef2d0-b361-4844-8c5a-e96473628f4e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-704ef2d0-b361-4844-8c5a-e96473628f4e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["W8866tGMQpOOjWq7_LcNGg"], "expires_at": "2020-11-06T19:23:25.000000Z", "issued_at": "2020-11-06T18:23:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:25.594 39 INFO tempest.lib.common.rest_client [req-e5294a03-5233-4688-8ae8-9bbbae0fdfed ] Request (TrunksExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:23:25.594 39 DEBUG tempest.lib.common.rest_client [req-e5294a03-5233-4688-8ae8-9bbbae0fdfed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e5294a03-5233-4688-8ae8-9bbbae0fdfed', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["fe89GOM_Snuva2yhn8cmsA"], "expires_at": "2020-11-06T19:23:25.000000Z", "issued_at": "2020-11-06T18:23:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:25.641 39 INFO tempest.lib.common.rest_client [req-ca7b80ac-8d80-4142-aa1d-8868eadb8e6f ] Request (TrunksExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.046s 2020-11-06 18:23:25.642 39 DEBUG tempest.lib.common.rest_client [req-ca7b80ac-8d80-4142-aa1d-8868eadb8e6f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ca7b80ac-8d80-4142-aa1d-8868eadb8e6f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:25.689 39 INFO tempest.lib.common.rest_client [req-02b442c4-1d8d-4a68-95b9-2537db7b7652 ] Request (TrunksExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.047s 2020-11-06 18:23:25.690 39 DEBUG tempest.lib.common.rest_client [req-02b442c4-1d8d-4a68-95b9-2537db7b7652 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-02b442c4-1d8d-4a68-95b9-2537db7b7652', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:25.690 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:23:25.690 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:25.738 39 INFO tempest.lib.common.rest_client [req-60e10ddd-8ae7-4f11-81c2-d3ac007f7fc9 ] Request (TrunksExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/d7b4ac8c071b41b5bf8bcac014cdd714/users/2cf087b076364f0982dbd344a3ad75e6/roles 0.047s 2020-11-06 18:23:25.738 39 DEBUG tempest.lib.common.rest_client [req-60e10ddd-8ae7-4f11-81c2-d3ac007f7fc9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-60e10ddd-8ae7-4f11-81c2-d3ac007f7fc9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d7b4ac8c071b41b5bf8bcac014cdd714/users/2cf087b076364f0982dbd344a3ad75e6/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d7b4ac8c071b41b5bf8bcac014cdd714/users/2cf087b076364f0982dbd344a3ad75e6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:25.790 39 INFO tempest.lib.common.rest_client [req-c8fe8caa-f5ef-4a0c-957d-311451f59d03 ] Request (TrunksExtRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/d7b4ac8c071b41b5bf8bcac014cdd714/users/2cf087b076364f0982dbd344a3ad75e6/roles/72a4576c553448cd941b052c1ca0cf2d 0.051s 2020-11-06 18:23:25.790 39 DEBUG tempest.lib.common.rest_client [req-c8fe8caa-f5ef-4a0c-957d-311451f59d03 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c8fe8caa-f5ef-4a0c-957d-311451f59d03', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d7b4ac8c071b41b5bf8bcac014cdd714/users/2cf087b076364f0982dbd344a3ad75e6/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:25.891 39 INFO tempest.lib.common.rest_client [req-c90fbeef-fb63-4d15-9459-042827157843 ] Request (TrunksExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/d7b4ac8c071b41b5bf8bcac014cdd714/users/2cf087b076364f0982dbd344a3ad75e6/roles/a629c95d64b3416fb80ae90af4f69c05 0.100s 2020-11-06 18:23:25.891 39 DEBUG tempest.lib.common.rest_client [req-c90fbeef-fb63-4d15-9459-042827157843 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c90fbeef-fb63-4d15-9459-042827157843', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d7b4ac8c071b41b5bf8bcac014cdd714/users/2cf087b076364f0982dbd344a3ad75e6/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:26.988 39 INFO tempest.lib.common.rest_client [req-74254feb-ee17-4cf3-915e-ee2a34e0ff25 ] Request (TrunksExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-11-06 18:23:26.988 39 DEBUG tempest.lib.common.rest_client [req-74254feb-ee17-4cf3-915e-ee2a34e0ff25 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-74254feb-ee17-4cf3-915e-ee2a34e0ff25', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2cf087b076364f0982dbd344a3ad75e6", "name": "tempest-TrunksExtRbacTest-1221222514", "password_expires_at": null}, "audit_ids": ["VVi88MYvQ-eOAUJ80uBCgA"], "expires_at": "2020-11-06T19:23:26.000000Z", "issued_at": "2020-11-06T18:23:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d7b4ac8c071b41b5bf8bcac014cdd714", "name": "tempest-TrunksExtRbacTest-1221222514"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:27.030 39 INFO tempest.lib.common.rest_client [req-1284ad8f-a455-44a4-a89f-9b20a367ff5a ] Request (TrunksExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-11-06 18:23:27.031 39 DEBUG tempest.lib.common.rest_client [req-1284ad8f-a455-44a4-a89f-9b20a367ff5a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1284ad8f-a455-44a4-a89f-9b20a367ff5a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2cf087b076364f0982dbd344a3ad75e6", "name": "tempest-TrunksExtRbacTest-1221222514", "password_expires_at": null}, "audit_ids": ["tzgbRvy5QBqlYVHb8vbqhw"], "expires_at": "2020-11-06T19:23:27.000000Z", "issued_at": "2020-11-06T18:23:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d7b4ac8c071b41b5bf8bcac014cdd714", "name": "tempest-TrunksExtRbacTest-1221222514"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:27.483 39 INFO tempest.lib.common.rest_client [req-264f330a-f0c6-4217-82b9-5320bf1c8f71 ] Request (TrunksExtRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.450s 2020-11-06 18:23:27.483 39 DEBUG tempest.lib.common.rest_client [req-264f330a-f0c6-4217-82b9-5320bf1c8f71 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-TrunksExtRbacTest-test-network-1479417384"}} Response - Headers: {'content-type': 'application/json', 'content-length': '738', 'x-openstack-request-id': 'req-264f330a-f0c6-4217-82b9-5320bf1c8f71', 'date': 'Fri, 06 Nov 2020 18:23:27 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"207ac30c-bdae-44bc-9c97-d2bd13e320ca","name":"tempest-TrunksExtRbacTest-test-network-1479417384","tenant_id":"d7b4ac8c071b41b5bf8bcac014cdd714","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"d7b4ac8c071b41b5bf8bcac014cdd714","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":45,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:23:27Z","updated_at":"2020-11-06T18:23:27Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:27.957 39 INFO tempest.lib.common.rest_client [req-7608fdfb-1b41-4b24-b6a2-d49872151837 ] Request (TrunksExtRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/ports 0.472s 2020-11-06 18:23:27.958 39 DEBUG tempest.lib.common.rest_client [req-7608fdfb-1b41-4b24-b6a2-d49872151837 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "207ac30c-bdae-44bc-9c97-d2bd13e320ca", "name": "tempest-TrunksExtRbacTest-1987526805"}} Response - Headers: {'content-type': 'application/json', 'content-length': '899', 'x-openstack-request-id': 'req-7608fdfb-1b41-4b24-b6a2-d49872151837', 'date': 'Fri, 06 Nov 2020 18:23:27 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"4813949a-fb73-4537-beb3-67d74a57af8e","name":"tempest-TrunksExtRbacTest-1987526805","network_id":"207ac30c-bdae-44bc-9c97-d2bd13e320ca","tenant_id":"d7b4ac8c071b41b5bf8bcac014cdd714","mac_address":"fa:16:3e:34:ab:76","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[],"project_id":"d7b4ac8c071b41b5bf8bcac014cdd714","port_security_enabled":true,"qos_policy_id":null,"security_groups":["6c3e3df7-1bc7-4248-9365-3250464087d5"],"binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"allowed_address_pairs":[],"extra_dhcp_opts":[],"description":"","qos_network_policy_id":null,"dns_name":"","dns_assignment":[],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-11-06T18:23:27Z","updated_at":"2020-11-06T18:23:27Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:27.959 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:23:27.963 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_trunk, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:23:27.964 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:28.069 39 INFO tempest.lib.common.rest_client [req-fa822b7e-8089-4831-893f-7b633e4f05a0 ] Request (TrunksExtRbacTest:test_create_trunk): 200 GET http://172.30.13.94/identity/v3/projects/d7b4ac8c071b41b5bf8bcac014cdd714/users/2cf087b076364f0982dbd344a3ad75e6/roles 0.105s 2020-11-06 18:23:28.070 39 DEBUG tempest.lib.common.rest_client [req-fa822b7e-8089-4831-893f-7b633e4f05a0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fa822b7e-8089-4831-893f-7b633e4f05a0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d7b4ac8c071b41b5bf8bcac014cdd714/users/2cf087b076364f0982dbd344a3ad75e6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d7b4ac8c071b41b5bf8bcac014cdd714/users/2cf087b076364f0982dbd344a3ad75e6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:28.109 39 INFO tempest.lib.common.rest_client [req-e993f636-77c6-4653-bf6d-75582984629e ] Request (TrunksExtRbacTest:test_create_trunk): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:23:28.110 39 DEBUG tempest.lib.common.rest_client [req-e993f636-77c6-4653-bf6d-75582984629e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e993f636-77c6-4653-bf6d-75582984629e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2cf087b076364f0982dbd344a3ad75e6", "name": "tempest-TrunksExtRbacTest-1221222514", "password_expires_at": null}, "audit_ids": ["K384WiuAQGWxn3wTj259eA"], "expires_at": "2020-11-06T19:23:28.000000Z", "issued_at": "2020-11-06T18:23:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d7b4ac8c071b41b5bf8bcac014cdd714", "name": "tempest-TrunksExtRbacTest-1221222514"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:28.151 39 INFO tempest.lib.common.rest_client [req-7ae410d4-95ae-4fbb-9683-6d3fe44b3fca ] Request (TrunksExtRbacTest:test_create_trunk): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:23:28.152 39 DEBUG tempest.lib.common.rest_client [req-7ae410d4-95ae-4fbb-9683-6d3fe44b3fca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7ae410d4-95ae-4fbb-9683-6d3fe44b3fca', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2cf087b076364f0982dbd344a3ad75e6", "name": "tempest-TrunksExtRbacTest-1221222514", "password_expires_at": null}, "audit_ids": ["BVpfCoFYTcqszfx4zOUUcg"], "expires_at": "2020-11-06T19:23:28.000000Z", "issued_at": "2020-11-06T18:23:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d7b4ac8c071b41b5bf8bcac014cdd714", "name": "tempest-TrunksExtRbacTest-1221222514"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:28.527 39 INFO tempest.lib.common.rest_client [req-0e62a779-766a-4bfb-8bac-22d4d127042f ] Request (TrunksExtRbacTest:test_create_trunk): 201 POST http://172.30.13.94:9696/v2.0/trunks 0.374s 2020-11-06 18:23:28.528 39 DEBUG tempest.lib.common.rest_client [req-0e62a779-766a-4bfb-8bac-22d4d127042f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"trunk": {"port_id": "4813949a-fb73-4537-beb3-67d74a57af8e", "sub_ports": []}} Response - Headers: {'content-type': 'application/json', 'content-length': '407', 'x-openstack-request-id': 'req-0e62a779-766a-4bfb-8bac-22d4d127042f', 'date': 'Fri, 06 Nov 2020 18:23:28 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks'} Body: b'{"trunk": {"admin_state_up": true, "id": "06651454-ecfc-4397-a174-9a7fc4d51140", "project_id": "d7b4ac8c071b41b5bf8bcac014cdd714", "name": "", "port_id": "4813949a-fb73-4537-beb3-67d74a57af8e", "status": "DOWN", "sub_ports": [], "revision_number": 0, "description": "", "created_at": "2020-11-06T18:23:28Z", "updated_at": "2020-11-06T18:23:28Z", "tenant_id": "d7b4ac8c071b41b5bf8bcac014cdd714", "tags": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:28.528 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:28.586 39 INFO tempest.lib.common.rest_client [req-6ef0322e-2dbe-49fe-9e04-54b24f4b7c5f ] Request (TrunksExtRbacTest:test_create_trunk): 200 GET http://172.30.13.94/identity/v3/projects/d7b4ac8c071b41b5bf8bcac014cdd714/users/2cf087b076364f0982dbd344a3ad75e6/roles 0.057s 2020-11-06 18:23:28.586 39 DEBUG tempest.lib.common.rest_client [req-6ef0322e-2dbe-49fe-9e04-54b24f4b7c5f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6ef0322e-2dbe-49fe-9e04-54b24f4b7c5f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d7b4ac8c071b41b5bf8bcac014cdd714/users/2cf087b076364f0982dbd344a3ad75e6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d7b4ac8c071b41b5bf8bcac014cdd714/users/2cf087b076364f0982dbd344a3ad75e6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:28.626 39 INFO tempest.lib.common.rest_client [req-b86e8415-8bda-416d-934a-63712186071c ] Request (TrunksExtRbacTest:test_create_trunk): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:23:28.627 39 DEBUG tempest.lib.common.rest_client [req-b86e8415-8bda-416d-934a-63712186071c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b86e8415-8bda-416d-934a-63712186071c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2cf087b076364f0982dbd344a3ad75e6", "name": "tempest-TrunksExtRbacTest-1221222514", "password_expires_at": null}, "audit_ids": ["j5Fr5gBjQqaaxZ5uXuMD2Q"], "expires_at": "2020-11-06T19:23:28.000000Z", "issued_at": "2020-11-06T18:23:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d7b4ac8c071b41b5bf8bcac014cdd714", "name": "tempest-TrunksExtRbacTest-1221222514"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:28.668 39 INFO tempest.lib.common.rest_client [req-07aabbcb-32a2-4106-b1a7-fd90f431e042 ] Request (TrunksExtRbacTest:test_create_trunk): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:23:28.668 39 DEBUG tempest.lib.common.rest_client [req-07aabbcb-32a2-4106-b1a7-fd90f431e042 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-07aabbcb-32a2-4106-b1a7-fd90f431e042', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2cf087b076364f0982dbd344a3ad75e6", "name": "tempest-TrunksExtRbacTest-1221222514", "password_expires_at": null}, "audit_ids": ["EsnqZ3LHSzy9Fi510hQxAQ"], "expires_at": "2020-11-06T19:23:28.000000Z", "issued_at": "2020-11-06T18:23:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d7b4ac8c071b41b5bf8bcac014cdd714", "name": "tempest-TrunksExtRbacTest-1221222514"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:28.894 39 INFO tempest.lib.common.rest_client [req-7e139dfd-7ad2-4bde-995f-ade74de6ac9d ] Request (TrunksExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/trunks/06651454-ecfc-4397-a174-9a7fc4d51140 0.224s 2020-11-06 18:23:28.895 39 DEBUG tempest.lib.common.rest_client [req-7e139dfd-7ad2-4bde-995f-ade74de6ac9d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-7e139dfd-7ad2-4bde-995f-ade74de6ac9d', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:23:28 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks/06651454-ecfc-4397-a174-9a7fc4d51140'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:28.897 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:23:28.902 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_trunk, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:23:28.903 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:23:28.906 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_trunk, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:23:29.163 39 INFO tempest.lib.common.rest_client [req-a656fcb7-e145-4e75-b6e8-57f9c7f6d323 ] Request (TrunksExtRbacTest:test_delete_trunk): 201 POST http://172.30.13.94:9696/v2.0/trunks 0.256s 2020-11-06 18:23:29.164 39 DEBUG tempest.lib.common.rest_client [req-a656fcb7-e145-4e75-b6e8-57f9c7f6d323 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"trunk": {"port_id": "4813949a-fb73-4537-beb3-67d74a57af8e", "sub_ports": []}} Response - Headers: {'content-type': 'application/json', 'content-length': '407', 'x-openstack-request-id': 'req-a656fcb7-e145-4e75-b6e8-57f9c7f6d323', 'date': 'Fri, 06 Nov 2020 18:23:29 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks'} Body: b'{"trunk": {"admin_state_up": true, "id": "ac86e545-411e-46b6-bdfc-7e527715d2e9", "project_id": "d7b4ac8c071b41b5bf8bcac014cdd714", "name": "", "port_id": "4813949a-fb73-4537-beb3-67d74a57af8e", "status": "DOWN", "sub_ports": [], "revision_number": 0, "description": "", "created_at": "2020-11-06T18:23:29Z", "updated_at": "2020-11-06T18:23:29Z", "tenant_id": "d7b4ac8c071b41b5bf8bcac014cdd714", "tags": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:29.164 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:29.222 39 INFO tempest.lib.common.rest_client [req-cfb6cb40-2f5c-4239-8274-e1ac7643fa66 ] Request (TrunksExtRbacTest:test_delete_trunk): 200 GET http://172.30.13.94/identity/v3/projects/d7b4ac8c071b41b5bf8bcac014cdd714/users/2cf087b076364f0982dbd344a3ad75e6/roles 0.057s 2020-11-06 18:23:29.223 39 DEBUG tempest.lib.common.rest_client [req-cfb6cb40-2f5c-4239-8274-e1ac7643fa66 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cfb6cb40-2f5c-4239-8274-e1ac7643fa66', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d7b4ac8c071b41b5bf8bcac014cdd714/users/2cf087b076364f0982dbd344a3ad75e6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d7b4ac8c071b41b5bf8bcac014cdd714/users/2cf087b076364f0982dbd344a3ad75e6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:29.260 39 INFO tempest.lib.common.rest_client [req-4b5abdcf-544c-4023-a645-7916d02a0bae ] Request (TrunksExtRbacTest:test_delete_trunk): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:23:29.261 39 DEBUG tempest.lib.common.rest_client [req-4b5abdcf-544c-4023-a645-7916d02a0bae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4b5abdcf-544c-4023-a645-7916d02a0bae', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2cf087b076364f0982dbd344a3ad75e6", "name": "tempest-TrunksExtRbacTest-1221222514", "password_expires_at": null}, "audit_ids": ["_m7qFqE0R0CVopo4mbXAaQ"], "expires_at": "2020-11-06T19:23:29.000000Z", "issued_at": "2020-11-06T18:23:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d7b4ac8c071b41b5bf8bcac014cdd714", "name": "tempest-TrunksExtRbacTest-1221222514"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:29.297 39 INFO tempest.lib.common.rest_client [req-f9fe26cc-7cd3-4b8c-b8d5-e3a5b63acb0e ] Request (TrunksExtRbacTest:test_delete_trunk): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:23:29.298 39 DEBUG tempest.lib.common.rest_client [req-f9fe26cc-7cd3-4b8c-b8d5-e3a5b63acb0e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f9fe26cc-7cd3-4b8c-b8d5-e3a5b63acb0e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2cf087b076364f0982dbd344a3ad75e6", "name": "tempest-TrunksExtRbacTest-1221222514", "password_expires_at": null}, "audit_ids": ["ajSY7sG9ROSShxV1QYYtQA"], "expires_at": "2020-11-06T19:23:29.000000Z", "issued_at": "2020-11-06T18:23:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d7b4ac8c071b41b5bf8bcac014cdd714", "name": "tempest-TrunksExtRbacTest-1221222514"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:29.488 39 INFO tempest.lib.common.rest_client [req-2742059f-5a23-4844-ade9-55d91bf36dd2 ] Request (TrunksExtRbacTest:test_delete_trunk): 204 DELETE http://172.30.13.94:9696/v2.0/trunks/ac86e545-411e-46b6-bdfc-7e527715d2e9 0.190s 2020-11-06 18:23:29.489 39 DEBUG tempest.lib.common.rest_client [req-2742059f-5a23-4844-ade9-55d91bf36dd2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-2742059f-5a23-4844-ade9-55d91bf36dd2', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:23:29 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks/ac86e545-411e-46b6-bdfc-7e527715d2e9'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:29.490 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:29.548 39 INFO tempest.lib.common.rest_client [req-64f50bcf-1639-4d69-945d-a64560d4ce91 ] Request (TrunksExtRbacTest:test_delete_trunk): 200 GET http://172.30.13.94/identity/v3/projects/d7b4ac8c071b41b5bf8bcac014cdd714/users/2cf087b076364f0982dbd344a3ad75e6/roles 0.057s 2020-11-06 18:23:29.548 39 DEBUG tempest.lib.common.rest_client [req-64f50bcf-1639-4d69-945d-a64560d4ce91 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-64f50bcf-1639-4d69-945d-a64560d4ce91', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d7b4ac8c071b41b5bf8bcac014cdd714/users/2cf087b076364f0982dbd344a3ad75e6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d7b4ac8c071b41b5bf8bcac014cdd714/users/2cf087b076364f0982dbd344a3ad75e6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:29.587 39 INFO tempest.lib.common.rest_client [req-1415d98e-2b9f-42c1-820d-62826736fdbb ] Request (TrunksExtRbacTest:test_delete_trunk): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:23:29.588 39 DEBUG tempest.lib.common.rest_client [req-1415d98e-2b9f-42c1-820d-62826736fdbb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1415d98e-2b9f-42c1-820d-62826736fdbb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2cf087b076364f0982dbd344a3ad75e6", "name": "tempest-TrunksExtRbacTest-1221222514", "password_expires_at": null}, "audit_ids": ["SyeFbcBcTJO5GqDYYfBImQ"], "expires_at": "2020-11-06T19:23:29.000000Z", "issued_at": "2020-11-06T18:23:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d7b4ac8c071b41b5bf8bcac014cdd714", "name": "tempest-TrunksExtRbacTest-1221222514"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:29.622 39 INFO tempest.lib.common.rest_client [req-93331c2a-cc67-4f0e-afa3-2b6e06c82462 ] Request (TrunksExtRbacTest:test_delete_trunk): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:23:29.623 39 DEBUG tempest.lib.common.rest_client [req-93331c2a-cc67-4f0e-afa3-2b6e06c82462 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-93331c2a-cc67-4f0e-afa3-2b6e06c82462', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2cf087b076364f0982dbd344a3ad75e6", "name": "tempest-TrunksExtRbacTest-1221222514", "password_expires_at": null}, "audit_ids": ["YqyE4Y4jSkiNln1Iny4FQw"], "expires_at": "2020-11-06T19:23:29.000000Z", "issued_at": "2020-11-06T18:23:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d7b4ac8c071b41b5bf8bcac014cdd714", "name": "tempest-TrunksExtRbacTest-1221222514"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:29.735 39 INFO tempest.lib.common.rest_client [req-53a0814e-5ec0-425f-a96a-cd21946bdf87 ] Request (TrunksExtRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94:9696/v2.0/trunks/ac86e545-411e-46b6-bdfc-7e527715d2e9 0.110s 2020-11-06 18:23:29.736 39 DEBUG tempest.lib.common.rest_client [req-53a0814e-5ec0-425f-a96a-cd21946bdf87 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '134', 'x-openstack-request-id': 'req-53a0814e-5ec0-425f-a96a-cd21946bdf87', 'date': 'Fri, 06 Nov 2020 18:23:29 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks/ac86e545-411e-46b6-bdfc-7e527715d2e9'} Body: b'{"NeutronError": {"type": "TrunkNotFound", "message": "Trunk ac86e545-411e-46b6-bdfc-7e527715d2e9 could not be found.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:29.738 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:23:29.743 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_trunk, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:23:30.022 39 INFO tempest.lib.common.rest_client [req-45885af8-74a2-4de0-9f42-835d6bc342d7 ] Request (TrunksExtRbacTest:test_list_trunks): 201 POST http://172.30.13.94:9696/v2.0/trunks 0.277s 2020-11-06 18:23:30.023 39 DEBUG tempest.lib.common.rest_client [req-45885af8-74a2-4de0-9f42-835d6bc342d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"trunk": {"port_id": "4813949a-fb73-4537-beb3-67d74a57af8e", "sub_ports": []}} Response - Headers: {'content-type': 'application/json', 'content-length': '407', 'x-openstack-request-id': 'req-45885af8-74a2-4de0-9f42-835d6bc342d7', 'date': 'Fri, 06 Nov 2020 18:23:30 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks'} Body: b'{"trunk": {"admin_state_up": true, "id": "e4c6123f-e8f2-4c51-82ca-6b1384c692a9", "project_id": "d7b4ac8c071b41b5bf8bcac014cdd714", "name": "", "port_id": "4813949a-fb73-4537-beb3-67d74a57af8e", "status": "DOWN", "sub_ports": [], "revision_number": 0, "description": "", "created_at": "2020-11-06T18:23:29Z", "updated_at": "2020-11-06T18:23:29Z", "tenant_id": "d7b4ac8c071b41b5bf8bcac014cdd714", "tags": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:30.024 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:30.080 39 INFO tempest.lib.common.rest_client [req-6c1972b2-681f-47fa-9f2f-c5c4f44d9714 ] Request (TrunksExtRbacTest:test_list_trunks): 200 GET http://172.30.13.94/identity/v3/projects/d7b4ac8c071b41b5bf8bcac014cdd714/users/2cf087b076364f0982dbd344a3ad75e6/roles 0.055s 2020-11-06 18:23:30.081 39 DEBUG tempest.lib.common.rest_client [req-6c1972b2-681f-47fa-9f2f-c5c4f44d9714 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6c1972b2-681f-47fa-9f2f-c5c4f44d9714', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d7b4ac8c071b41b5bf8bcac014cdd714/users/2cf087b076364f0982dbd344a3ad75e6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d7b4ac8c071b41b5bf8bcac014cdd714/users/2cf087b076364f0982dbd344a3ad75e6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:30.117 39 INFO tempest.lib.common.rest_client [req-980b8729-b9f6-4863-9db0-e201ee7692e0 ] Request (TrunksExtRbacTest:test_list_trunks): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:23:30.118 39 DEBUG tempest.lib.common.rest_client [req-980b8729-b9f6-4863-9db0-e201ee7692e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-980b8729-b9f6-4863-9db0-e201ee7692e0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2cf087b076364f0982dbd344a3ad75e6", "name": "tempest-TrunksExtRbacTest-1221222514", "password_expires_at": null}, "audit_ids": ["58KxFxGdQdO6-ZbfzsTPhg"], "expires_at": "2020-11-06T19:23:30.000000Z", "issued_at": "2020-11-06T18:23:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d7b4ac8c071b41b5bf8bcac014cdd714", "name": "tempest-TrunksExtRbacTest-1221222514"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:30.166 39 INFO tempest.lib.common.rest_client [req-338dc17f-4c62-4821-a4d5-40fafa5fcf14 ] Request (TrunksExtRbacTest:test_list_trunks): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-11-06 18:23:30.166 39 DEBUG tempest.lib.common.rest_client [req-338dc17f-4c62-4821-a4d5-40fafa5fcf14 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-338dc17f-4c62-4821-a4d5-40fafa5fcf14', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2cf087b076364f0982dbd344a3ad75e6", "name": "tempest-TrunksExtRbacTest-1221222514", "password_expires_at": null}, "audit_ids": ["U7oszFZ7TY2IrwJZCFahHA"], "expires_at": "2020-11-06T19:23:30.000000Z", "issued_at": "2020-11-06T18:23:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d7b4ac8c071b41b5bf8bcac014cdd714", "name": "tempest-TrunksExtRbacTest-1221222514"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:30.268 39 INFO tempest.lib.common.rest_client [req-4d6c3169-314c-4cbb-98ef-dad7e23b7ac3 ] Request (TrunksExtRbacTest:test_list_trunks): 200 GET http://172.30.13.94:9696/v2.0/trunks?id=e4c6123f-e8f2-4c51-82ca-6b1384c692a9 0.100s 2020-11-06 18:23:30.269 39 DEBUG tempest.lib.common.rest_client [req-4d6c3169-314c-4cbb-98ef-dad7e23b7ac3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '410', 'x-openstack-request-id': 'req-4d6c3169-314c-4cbb-98ef-dad7e23b7ac3', 'date': 'Fri, 06 Nov 2020 18:23:30 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks?id=e4c6123f-e8f2-4c51-82ca-6b1384c692a9'} Body: b'{"trunks": [{"admin_state_up": true, "id": "e4c6123f-e8f2-4c51-82ca-6b1384c692a9", "project_id": "d7b4ac8c071b41b5bf8bcac014cdd714", "name": "", "port_id": "4813949a-fb73-4537-beb3-67d74a57af8e", "status": "DOWN", "sub_ports": [], "revision_number": 0, "description": "", "created_at": "2020-11-06T18:23:29Z", "updated_at": "2020-11-06T18:23:29Z", "tenant_id": "d7b4ac8c071b41b5bf8bcac014cdd714", "tags": []}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:30.269 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:30.325 39 INFO tempest.lib.common.rest_client [req-110386c5-c65c-47f4-9f45-38e4bd768f7f ] Request (TrunksExtRbacTest:test_list_trunks): 200 GET http://172.30.13.94/identity/v3/projects/d7b4ac8c071b41b5bf8bcac014cdd714/users/2cf087b076364f0982dbd344a3ad75e6/roles 0.054s 2020-11-06 18:23:30.326 39 DEBUG tempest.lib.common.rest_client [req-110386c5-c65c-47f4-9f45-38e4bd768f7f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-110386c5-c65c-47f4-9f45-38e4bd768f7f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d7b4ac8c071b41b5bf8bcac014cdd714/users/2cf087b076364f0982dbd344a3ad75e6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d7b4ac8c071b41b5bf8bcac014cdd714/users/2cf087b076364f0982dbd344a3ad75e6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:30.365 39 INFO tempest.lib.common.rest_client [req-1b7874f4-43a5-402f-991e-9caba48ac895 ] Request (TrunksExtRbacTest:test_list_trunks): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:23:30.365 39 DEBUG tempest.lib.common.rest_client [req-1b7874f4-43a5-402f-991e-9caba48ac895 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1b7874f4-43a5-402f-991e-9caba48ac895', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2cf087b076364f0982dbd344a3ad75e6", "name": "tempest-TrunksExtRbacTest-1221222514", "password_expires_at": null}, "audit_ids": ["EemRJhcWTuK8TCdJPEDcGA"], "expires_at": "2020-11-06T19:23:30.000000Z", "issued_at": "2020-11-06T18:23:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d7b4ac8c071b41b5bf8bcac014cdd714", "name": "tempest-TrunksExtRbacTest-1221222514"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:30.404 39 INFO tempest.lib.common.rest_client [req-3602582c-0c70-4f6e-9a55-70dfc765aac6 ] Request (TrunksExtRbacTest:test_list_trunks): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:23:30.404 39 DEBUG tempest.lib.common.rest_client [req-3602582c-0c70-4f6e-9a55-70dfc765aac6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3602582c-0c70-4f6e-9a55-70dfc765aac6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2cf087b076364f0982dbd344a3ad75e6", "name": "tempest-TrunksExtRbacTest-1221222514", "password_expires_at": null}, "audit_ids": ["ZmyXxertSkGZCzM9qFW9KQ"], "expires_at": "2020-11-06T19:23:30.000000Z", "issued_at": "2020-11-06T18:23:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d7b4ac8c071b41b5bf8bcac014cdd714", "name": "tempest-TrunksExtRbacTest-1221222514"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:30.606 39 INFO tempest.lib.common.rest_client [req-c04577b3-71fb-4e43-8073-4afaf7ee3020 ] Request (TrunksExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/trunks/e4c6123f-e8f2-4c51-82ca-6b1384c692a9 0.200s 2020-11-06 18:23:30.607 39 DEBUG tempest.lib.common.rest_client [req-c04577b3-71fb-4e43-8073-4afaf7ee3020 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-c04577b3-71fb-4e43-8073-4afaf7ee3020', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:23:30 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks/e4c6123f-e8f2-4c51-82ca-6b1384c692a9'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:30.610 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:23:30.614 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_trunk, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:23:30.914 39 INFO tempest.lib.common.rest_client [req-a932fced-0e1f-4658-a508-d040f3e37bd6 ] Request (TrunksExtRbacTest:test_show_trunk): 201 POST http://172.30.13.94:9696/v2.0/trunks 0.299s 2020-11-06 18:23:30.914 39 DEBUG tempest.lib.common.rest_client [req-a932fced-0e1f-4658-a508-d040f3e37bd6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"trunk": {"port_id": "4813949a-fb73-4537-beb3-67d74a57af8e", "sub_ports": []}} Response - Headers: {'content-type': 'application/json', 'content-length': '407', 'x-openstack-request-id': 'req-a932fced-0e1f-4658-a508-d040f3e37bd6', 'date': 'Fri, 06 Nov 2020 18:23:30 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks'} Body: b'{"trunk": {"admin_state_up": true, "id": "5d35e309-956c-414c-808c-fc4333476fdc", "project_id": "d7b4ac8c071b41b5bf8bcac014cdd714", "name": "", "port_id": "4813949a-fb73-4537-beb3-67d74a57af8e", "status": "DOWN", "sub_ports": [], "revision_number": 0, "description": "", "created_at": "2020-11-06T18:23:30Z", "updated_at": "2020-11-06T18:23:30Z", "tenant_id": "d7b4ac8c071b41b5bf8bcac014cdd714", "tags": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:30.915 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:30.972 39 INFO tempest.lib.common.rest_client [req-3ba1e4e4-804b-4f85-986a-72efae321a72 ] Request (TrunksExtRbacTest:test_show_trunk): 200 GET http://172.30.13.94/identity/v3/projects/d7b4ac8c071b41b5bf8bcac014cdd714/users/2cf087b076364f0982dbd344a3ad75e6/roles 0.056s 2020-11-06 18:23:30.973 39 DEBUG tempest.lib.common.rest_client [req-3ba1e4e4-804b-4f85-986a-72efae321a72 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3ba1e4e4-804b-4f85-986a-72efae321a72', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d7b4ac8c071b41b5bf8bcac014cdd714/users/2cf087b076364f0982dbd344a3ad75e6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d7b4ac8c071b41b5bf8bcac014cdd714/users/2cf087b076364f0982dbd344a3ad75e6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:31.135 39 INFO tempest.lib.common.rest_client [req-f50a4a94-9072-48dd-bb98-f67e7cbdc506 ] Request (TrunksExtRbacTest:test_show_trunk): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.160s 2020-11-06 18:23:31.136 39 DEBUG tempest.lib.common.rest_client [req-f50a4a94-9072-48dd-bb98-f67e7cbdc506 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f50a4a94-9072-48dd-bb98-f67e7cbdc506', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2cf087b076364f0982dbd344a3ad75e6", "name": "tempest-TrunksExtRbacTest-1221222514", "password_expires_at": null}, "audit_ids": ["4tQN2GRkSaCGkbWvqiAftA"], "expires_at": "2020-11-06T19:23:31.000000Z", "issued_at": "2020-11-06T18:23:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d7b4ac8c071b41b5bf8bcac014cdd714", "name": "tempest-TrunksExtRbacTest-1221222514"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:31.172 39 INFO tempest.lib.common.rest_client [req-513b13cb-5aa6-4f1d-a5aa-7acbb656f471 ] Request (TrunksExtRbacTest:test_show_trunk): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:23:31.172 39 DEBUG tempest.lib.common.rest_client [req-513b13cb-5aa6-4f1d-a5aa-7acbb656f471 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-513b13cb-5aa6-4f1d-a5aa-7acbb656f471', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2cf087b076364f0982dbd344a3ad75e6", "name": "tempest-TrunksExtRbacTest-1221222514", "password_expires_at": null}, "audit_ids": ["2o7jwozyR2mtilsUvNQY0g"], "expires_at": "2020-11-06T19:23:31.000000Z", "issued_at": "2020-11-06T18:23:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d7b4ac8c071b41b5bf8bcac014cdd714", "name": "tempest-TrunksExtRbacTest-1221222514"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:31.270 39 INFO tempest.lib.common.rest_client [req-66fae31e-f4e2-47fa-aef3-c71048d7d41a ] Request (TrunksExtRbacTest:test_show_trunk): 200 GET http://172.30.13.94:9696/v2.0/trunks/5d35e309-956c-414c-808c-fc4333476fdc 0.096s 2020-11-06 18:23:31.271 39 DEBUG tempest.lib.common.rest_client [req-66fae31e-f4e2-47fa-aef3-c71048d7d41a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '407', 'x-openstack-request-id': 'req-66fae31e-f4e2-47fa-aef3-c71048d7d41a', 'date': 'Fri, 06 Nov 2020 18:23:31 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks/5d35e309-956c-414c-808c-fc4333476fdc'} Body: b'{"trunk": {"admin_state_up": true, "id": "5d35e309-956c-414c-808c-fc4333476fdc", "project_id": "d7b4ac8c071b41b5bf8bcac014cdd714", "name": "", "port_id": "4813949a-fb73-4537-beb3-67d74a57af8e", "status": "DOWN", "sub_ports": [], "revision_number": 0, "description": "", "created_at": "2020-11-06T18:23:30Z", "updated_at": "2020-11-06T18:23:30Z", "tenant_id": "d7b4ac8c071b41b5bf8bcac014cdd714", "tags": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:31.271 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:31.327 39 INFO tempest.lib.common.rest_client [req-4a298d8a-770c-4f0f-8d0e-b7ca7ea6c1a0 ] Request (TrunksExtRbacTest:test_show_trunk): 200 GET http://172.30.13.94/identity/v3/projects/d7b4ac8c071b41b5bf8bcac014cdd714/users/2cf087b076364f0982dbd344a3ad75e6/roles 0.055s 2020-11-06 18:23:31.328 39 DEBUG tempest.lib.common.rest_client [req-4a298d8a-770c-4f0f-8d0e-b7ca7ea6c1a0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4a298d8a-770c-4f0f-8d0e-b7ca7ea6c1a0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d7b4ac8c071b41b5bf8bcac014cdd714/users/2cf087b076364f0982dbd344a3ad75e6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d7b4ac8c071b41b5bf8bcac014cdd714/users/2cf087b076364f0982dbd344a3ad75e6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:31.368 39 INFO tempest.lib.common.rest_client [req-435edd11-429b-4efb-b531-a89f1fc900ce ] Request (TrunksExtRbacTest:test_show_trunk): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:23:31.369 39 DEBUG tempest.lib.common.rest_client [req-435edd11-429b-4efb-b531-a89f1fc900ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-435edd11-429b-4efb-b531-a89f1fc900ce', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2cf087b076364f0982dbd344a3ad75e6", "name": "tempest-TrunksExtRbacTest-1221222514", "password_expires_at": null}, "audit_ids": ["d9Kq8xgjTPiGmVZC3XDSwQ"], "expires_at": "2020-11-06T19:23:31.000000Z", "issued_at": "2020-11-06T18:23:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d7b4ac8c071b41b5bf8bcac014cdd714", "name": "tempest-TrunksExtRbacTest-1221222514"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:31.406 39 INFO tempest.lib.common.rest_client [req-ffd850ec-d3ad-4739-80c4-62e5f8b79432 ] Request (TrunksExtRbacTest:test_show_trunk): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:23:31.406 39 DEBUG tempest.lib.common.rest_client [req-ffd850ec-d3ad-4739-80c4-62e5f8b79432 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ffd850ec-d3ad-4739-80c4-62e5f8b79432', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2cf087b076364f0982dbd344a3ad75e6", "name": "tempest-TrunksExtRbacTest-1221222514", "password_expires_at": null}, "audit_ids": ["sCJ0_IhaTpuBI4EOyBCL_w"], "expires_at": "2020-11-06T19:23:31.000000Z", "issued_at": "2020-11-06T18:23:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d7b4ac8c071b41b5bf8bcac014cdd714", "name": "tempest-TrunksExtRbacTest-1221222514"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d7b4ac8c071b41b5bf8bcac014cdd714", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:32.688 39 INFO tempest.lib.common.rest_client [req-76ed317f-c4d6-4ba3-afbc-647af58b58eb ] Request (TrunksExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/trunks/5d35e309-956c-414c-808c-fc4333476fdc 1.280s 2020-11-06 18:23:32.689 39 DEBUG tempest.lib.common.rest_client [req-76ed317f-c4d6-4ba3-afbc-647af58b58eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-76ed317f-c4d6-4ba3-afbc-647af58b58eb', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:23:32 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks/5d35e309-956c-414c-808c-fc4333476fdc'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:33.140 39 INFO tempest.lib.common.rest_client [req-75c2029d-4fa7-464a-9d01-aa1c9b8221b8 ] Request (TrunksExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/4813949a-fb73-4537-beb3-67d74a57af8e 0.449s 2020-11-06 18:23:33.141 39 DEBUG tempest.lib.common.rest_client [req-75c2029d-4fa7-464a-9d01-aa1c9b8221b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-75c2029d-4fa7-464a-9d01-aa1c9b8221b8', 'date': 'Fri, 06 Nov 2020 18:23:33 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/4813949a-fb73-4537-beb3-67d74a57af8e'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:33.881 39 INFO tempest.lib.common.rest_client [req-0a713a0b-e65f-45b9-966a-628d0fd8b65e ] Request (TrunksExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/207ac30c-bdae-44bc-9c97-d2bd13e320ca 0.739s 2020-11-06 18:23:33.881 39 DEBUG tempest.lib.common.rest_client [req-0a713a0b-e65f-45b9-966a-628d0fd8b65e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-0a713a0b-e65f-45b9-966a-628d0fd8b65e', 'date': 'Fri, 06 Nov 2020 18:23:33 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/207ac30c-bdae-44bc-9c97-d2bd13e320ca'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:34.041 39 INFO tempest.lib.common.rest_client [req-14b2d8da-1b54-4602-8be6-5530e1b6147d ] Request (TrunksExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/2cf087b076364f0982dbd344a3ad75e6 0.159s 2020-11-06 18:23:34.042 39 DEBUG tempest.lib.common.rest_client [req-14b2d8da-1b54-4602-8be6-5530e1b6147d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-14b2d8da-1b54-4602-8be6-5530e1b6147d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/2cf087b076364f0982dbd344a3ad75e6'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:34.128 39 INFO tempest.lib.common.rest_client [req-7daba76c-f196-4c7d-af6c-52c0909e7e93 ] Request (TrunksExtRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:23:34.129 39 DEBUG tempest.lib.common.rest_client [req-7daba76c-f196-4c7d-af6c-52c0909e7e93 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7daba76c-f196-4c7d-af6c-52c0909e7e93', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["yMCaCwbKQ3eKwRTSsU8kaw"], "expires_at": "2020-11-06T19:23:34.000000Z", "issued_at": "2020-11-06T18:23:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:34.299 39 INFO tempest.lib.common.rest_client [req-5af3078e-0415-4eba-94bc-8e39fa82c771 ] Request (TrunksExtRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=d7b4ac8c071b41b5bf8bcac014cdd714&name=default 0.169s 2020-11-06 18:23:34.300 39 DEBUG tempest.lib.common.rest_client [req-5af3078e-0415-4eba-94bc-8e39fa82c771 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-5af3078e-0415-4eba-94bc-8e39fa82c771', 'date': 'Fri, 06 Nov 2020 18:23:34 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=d7b4ac8c071b41b5bf8bcac014cdd714&name=default'} Body: b'{"security_groups": [{"id": "6c3e3df7-1bc7-4248-9365-3250464087d5", "name": "default", "stateful": true, "tenant_id": "d7b4ac8c071b41b5bf8bcac014cdd714", "description": "Default security group", "security_group_rules": [{"id": "09e110a3-fea7-4bd1-bd25-a5d444f2b198", "tenant_id": "d7b4ac8c071b41b5bf8bcac014cdd714", "security_group_id": "6c3e3df7-1bc7-4248-9365-3250464087d5", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:23:27Z", "updated_at": "2020-11-06T18:23:27Z", "revision_number": 0, "project_id": "d7b4ac8c071b41b5bf8bcac014cdd714"}, {"id": "4aa1319b-c901-4b90-bc51-c2ae941c50e1", "tenant_id": "d7b4ac8c071b41b5bf8bcac014cdd714", "security_group_id": "6c3e3df7-1bc7-4248-9365-3250464087d5", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "6c3e3df7-1bc7-4248-9365-3250464087d5", "description": null, "tags": [], "created_at": "2020-11-06T18:23:27Z", "updated_at": "2020-11-06T18:23:27Z", "revision_number": 0, "project_id": "d7b4ac8c071b41b5bf8bcac014cdd714"}, {"id": "85d0b08e-b5c8-471b-8ee1-ac286c107c2a", "tenant_id": "d7b4ac8c071b41b5bf8bcac014cdd714", "security_group_id": "6c3e3df7-1bc7-4248-9365-3250464087d5", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "6c3e3df7-1bc7-4248-9365-3250464087d5", "description": null, "tags": [], "created_at": "2020-11-06T18:23:27Z", "updated_at": "2020-11-06T18:23:27Z", "revision_number": 0, "project_id": "d7b4ac8c071b41b5bf8bcac014cdd714"}, {"id": "b194a0a9-5d51-4c7f-a360-11e7ac31f07e", "tenant_id": "d7b4ac8c071b41b5bf8bcac014cdd714", "security_group_id": "6c3e3df7-1bc7-4248-9365-3250464087d5", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:23:27Z", "updated_at": "2020-11-06T18:23:27Z", "revision_number": 0, "project_id": "d7b4ac8c071b41b5bf8bcac014cdd714"}], "tags": [], "created_at": "2020-11-06T18:23:27Z", "updated_at": "2020-11-06T18:23:27Z", "revision_number": 1, "project_id": "d7b4ac8c071b41b5bf8bcac014cdd714"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:34.481 39 INFO tempest.lib.common.rest_client [req-8fb56076-a686-4bee-8e1d-3d8df55e9da4 ] Request (TrunksExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/6c3e3df7-1bc7-4248-9365-3250464087d5 0.180s 2020-11-06 18:23:34.481 39 DEBUG tempest.lib.common.rest_client [req-8fb56076-a686-4bee-8e1d-3d8df55e9da4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-8fb56076-a686-4bee-8e1d-3d8df55e9da4', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:23:34 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/6c3e3df7-1bc7-4248-9365-3250464087d5'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:34.692 39 INFO tempest.lib.common.rest_client [req-47ef6523-63c1-4a9e-92e8-3a2c03c5f034 ] Request (TrunksExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/d7b4ac8c071b41b5bf8bcac014cdd714 0.209s 2020-11-06 18:23:34.692 39 DEBUG tempest.lib.common.rest_client [req-47ef6523-63c1-4a9e-92e8-3a2c03c5f034 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-47ef6523-63c1-4a9e-92e8-3a2c03c5f034', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d7b4ac8c071b41b5bf8bcac014cdd714'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:34.787 39 INFO tempest.lib.common.rest_client [req-cb974c5d-c8e2-41c1-bb3c-05ebfc5df76a ] Request (VolumesActionsV312RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-11-06 18:23:34.788 39 DEBUG tempest.lib.common.rest_client [req-cb974c5d-c8e2-41c1-bb3c-05ebfc5df76a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cb974c5d-c8e2-41c1-bb3c-05ebfc5df76a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["6FV1bAaGSk60IH5DrcxQTg"], "expires_at": "2020-11-06T19:23:34.000000Z", "issued_at": "2020-11-06T18:23:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:34.827 39 INFO tempest.lib.common.rest_client [req-0eb2db30-12de-49eb-ae37-7e786b5b3126 ] Request (VolumesActionsV312RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:23:34.828 39 DEBUG tempest.lib.common.rest_client [req-0eb2db30-12de-49eb-ae37-7e786b5b3126 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0eb2db30-12de-49eb-ae37-7e786b5b3126', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["lPwL4WbPR_Wpt6jda_RcHw"], "expires_at": "2020-11-06T19:23:34.000000Z", "issued_at": "2020-11-06T18:23:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:34.884 39 INFO tempest.lib.common.rest_client [req-81ae330f-f94f-473b-bceb-9f176ce6498f ] Request (VolumesActionsV312RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.055s 2020-11-06 18:23:34.885 39 DEBUG tempest.lib.common.rest_client [req-81ae330f-f94f-473b-bceb-9f176ce6498f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-81ae330f-f94f-473b-bceb-9f176ce6498f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:34.949 39 INFO tempest.lib.common.rest_client [req-89d341f5-6c7b-4860-b11a-804a570dafb3 ] Request (VolumesActionsV312RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.063s 2020-11-06 18:23:34.949 39 DEBUG tempest.lib.common.rest_client [req-89d341f5-6c7b-4860-b11a-804a570dafb3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumesActionsV312RbacTest-1374615042-desc", "domain_id": "default", "name": "tempest-VolumesActionsV312RbacTest-1374615042"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '390', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-89d341f5-6c7b-4860-b11a-804a570dafb3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "c47a72668fc7486ab6c35e91b9a351c8", "name": "tempest-VolumesActionsV312RbacTest-1374615042", "domain_id": "default", "description": "tempest-VolumesActionsV312RbacTest-1374615042-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/c47a72668fc7486ab6c35e91b9a351c8"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:35.060 39 INFO tempest.lib.common.rest_client [req-777f8d9e-d77e-4577-a3d5-f260fe1c0e0b ] Request (VolumesActionsV312RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.110s 2020-11-06 18:23:35.061 39 DEBUG tempest.lib.common.rest_client [req-777f8d9e-d77e-4577-a3d5-f260fe1c0e0b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumesActionsV312RbacTest-1374615042", "password": "Z7#~x2n6uIGn5dK", "project_id": "c47a72668fc7486ab6c35e91b9a351c8", "email": "tempest-VolumesActionsV312RbacTest-1565008620@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '408', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-777f8d9e-d77e-4577-a3d5-f260fe1c0e0b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "c47a72668fc7486ab6c35e91b9a351c8", "email": "tempest-VolumesActionsV312RbacTest-1565008620@example.com", "id": "796e02dedb8e4645935961b265bbe922", "name": "tempest-VolumesActionsV312RbacTest-1374615042", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/796e02dedb8e4645935961b265bbe922"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:35.111 39 INFO tempest.lib.common.rest_client [req-3e82fa02-402a-4b9f-873e-9ea2732d3a59 ] Request (VolumesActionsV312RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.049s 2020-11-06 18:23:35.112 39 DEBUG tempest.lib.common.rest_client [req-3e82fa02-402a-4b9f-873e-9ea2732d3a59 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3e82fa02-402a-4b9f-873e-9ea2732d3a59', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:35.166 39 INFO tempest.lib.common.rest_client [req-1d8647ba-61f0-4eb0-b094-97feb6abf769 ] Request (VolumesActionsV312RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.053s 2020-11-06 18:23:35.166 39 DEBUG tempest.lib.common.rest_client [req-1d8647ba-61f0-4eb0-b094-97feb6abf769 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1d8647ba-61f0-4eb0-b094-97feb6abf769', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:35.237 39 INFO tempest.lib.common.rest_client [req-f6e8b677-058b-4cf1-86db-e79bae85d571 ] Request (VolumesActionsV312RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/c47a72668fc7486ab6c35e91b9a351c8/users/796e02dedb8e4645935961b265bbe922/roles/72a4576c553448cd941b052c1ca0cf2d 0.069s 2020-11-06 18:23:35.237 39 DEBUG tempest.lib.common.rest_client [req-f6e8b677-058b-4cf1-86db-e79bae85d571 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f6e8b677-058b-4cf1-86db-e79bae85d571', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c47a72668fc7486ab6c35e91b9a351c8/users/796e02dedb8e4645935961b265bbe922/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:35.238 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesActionsV312RbacTest-1374615042', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'c47a72668fc7486ab6c35e91b9a351c8', 'project_name': 'tempest-VolumesActionsV312RbacTest-1374615042', 'tenant_id': 'c47a72668fc7486ab6c35e91b9a351c8', 'tenant_name': 'tempest-VolumesActionsV312RbacTest-1374615042', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '796e02dedb8e4645935961b265bbe922'}, Network: None, Subnet: None, Router: None 2020-11-06 18:23:35.238 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesActionsV312RbacTest-1374615042', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'c47a72668fc7486ab6c35e91b9a351c8', 'project_name': 'tempest-VolumesActionsV312RbacTest-1374615042', 'tenant_id': 'c47a72668fc7486ab6c35e91b9a351c8', 'tenant_name': 'tempest-VolumesActionsV312RbacTest-1374615042', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '796e02dedb8e4645935961b265bbe922'}, Network: None, Subnet: None, Router: None 2020-11-06 18:23:35.359 39 INFO tempest.lib.common.rest_client [req-d04708f4-872a-4e18-93d3-bf81f04a7b05 ] Request (VolumesActionsV312RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.110s 2020-11-06 18:23:35.359 39 DEBUG tempest.lib.common.rest_client [req-d04708f4-872a-4e18-93d3-bf81f04a7b05 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6583', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d04708f4-872a-4e18-93d3-bf81f04a7b05', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "796e02dedb8e4645935961b265bbe922", "name": "tempest-VolumesActionsV312RbacTest-1374615042", "password_expires_at": null}, "audit_ids": ["goRlr7ffTvSOuGNVnrs1dg"], "expires_at": "2020-11-06T19:23:35.000000Z", "issued_at": "2020-11-06T18:23:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c47a72668fc7486ab6c35e91b9a351c8", "name": "tempest-VolumesActionsV312RbacTest-1374615042"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c47a72668fc7486ab6c35e91b9a351c8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c47a72668fc7486ab6c35e91b9a351c8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c47a72668fc7486ab6c35e91b9a351c8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c47a72668fc7486ab6c35e91b9a351c8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c47a72668fc7486ab6c35e91b9a351c8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c47a72668fc7486ab6c35e91b9a351c8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:35.446 39 INFO tempest.lib.common.rest_client [req-dbdcc053-2cca-4a53-9191-2506c599cff0 ] Request (VolumesActionsV312RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-11-06 18:23:35.446 39 DEBUG tempest.lib.common.rest_client [req-dbdcc053-2cca-4a53-9191-2506c599cff0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dbdcc053-2cca-4a53-9191-2506c599cff0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["0fF180NiSgmVORz11UxtXA"], "expires_at": "2020-11-06T19:23:35.000000Z", "issued_at": "2020-11-06T18:23:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:35.487 39 INFO tempest.lib.common.rest_client [req-130847a5-f55c-4f42-9ecd-f93221e26c91 ] Request (VolumesActionsV312RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.030s 2020-11-06 18:23:35.487 39 DEBUG tempest.lib.common.rest_client [req-130847a5-f55c-4f42-9ecd-f93221e26c91 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-130847a5-f55c-4f42-9ecd-f93221e26c91', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["FhV8wa8DQlWKAy9qXJjUyA"], "expires_at": "2020-11-06T19:23:35.000000Z", "issued_at": "2020-11-06T18:23:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:35.538 39 INFO tempest.lib.common.rest_client [req-5740c90d-ba26-4068-a2b8-428f662ed0b7 ] Request (VolumesActionsV312RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.049s 2020-11-06 18:23:35.538 39 DEBUG tempest.lib.common.rest_client [req-5740c90d-ba26-4068-a2b8-428f662ed0b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5740c90d-ba26-4068-a2b8-428f662ed0b7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:35.593 39 INFO tempest.lib.common.rest_client [req-3a0ccb45-f2f4-44cc-82b9-cce92649bd47 ] Request (VolumesActionsV312RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.053s 2020-11-06 18:23:35.593 39 DEBUG tempest.lib.common.rest_client [req-3a0ccb45-f2f4-44cc-82b9-cce92649bd47 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3a0ccb45-f2f4-44cc-82b9-cce92649bd47', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:35.594 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:23:35.594 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:35.646 39 INFO tempest.lib.common.rest_client [req-6983caba-d8ed-46e5-a2f3-96fc510c9a4b ] Request (VolumesActionsV312RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/c47a72668fc7486ab6c35e91b9a351c8/users/796e02dedb8e4645935961b265bbe922/roles 0.051s 2020-11-06 18:23:35.647 39 DEBUG tempest.lib.common.rest_client [req-6983caba-d8ed-46e5-a2f3-96fc510c9a4b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6983caba-d8ed-46e5-a2f3-96fc510c9a4b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c47a72668fc7486ab6c35e91b9a351c8/users/796e02dedb8e4645935961b265bbe922/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c47a72668fc7486ab6c35e91b9a351c8/users/796e02dedb8e4645935961b265bbe922/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:35.698 39 INFO tempest.lib.common.rest_client [req-36822147-b64a-4acc-bdda-ec20b8183e93 ] Request (VolumesActionsV312RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/c47a72668fc7486ab6c35e91b9a351c8/users/796e02dedb8e4645935961b265bbe922/roles/72a4576c553448cd941b052c1ca0cf2d 0.050s 2020-11-06 18:23:35.699 39 DEBUG tempest.lib.common.rest_client [req-36822147-b64a-4acc-bdda-ec20b8183e93 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-36822147-b64a-4acc-bdda-ec20b8183e93', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c47a72668fc7486ab6c35e91b9a351c8/users/796e02dedb8e4645935961b265bbe922/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:35.810 39 INFO tempest.lib.common.rest_client [req-e347e867-deed-4b11-9189-e6d044344312 ] Request (VolumesActionsV312RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/c47a72668fc7486ab6c35e91b9a351c8/users/796e02dedb8e4645935961b265bbe922/roles/a629c95d64b3416fb80ae90af4f69c05 0.110s 2020-11-06 18:23:35.810 39 DEBUG tempest.lib.common.rest_client [req-e347e867-deed-4b11-9189-e6d044344312 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e347e867-deed-4b11-9189-e6d044344312', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c47a72668fc7486ab6c35e91b9a351c8/users/796e02dedb8e4645935961b265bbe922/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:36.905 39 INFO tempest.lib.common.rest_client [req-a68eb821-d181-439c-9517-1327272960ba ] Request (VolumesActionsV312RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-11-06 18:23:36.905 39 DEBUG tempest.lib.common.rest_client [req-a68eb821-d181-439c-9517-1327272960ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a68eb821-d181-439c-9517-1327272960ba', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "796e02dedb8e4645935961b265bbe922", "name": "tempest-VolumesActionsV312RbacTest-1374615042", "password_expires_at": null}, "audit_ids": ["3NCT5v5iT5irsYE5Ec04HQ"], "expires_at": "2020-11-06T19:23:36.000000Z", "issued_at": "2020-11-06T18:23:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c47a72668fc7486ab6c35e91b9a351c8", "name": "tempest-VolumesActionsV312RbacTest-1374615042"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c47a72668fc7486ab6c35e91b9a351c8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c47a72668fc7486ab6c35e91b9a351c8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c47a72668fc7486ab6c35e91b9a351c8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c47a72668fc7486ab6c35e91b9a351c8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c47a72668fc7486ab6c35e91b9a351c8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c47a72668fc7486ab6c35e91b9a351c8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:36.908 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:23:36.938 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:get_all, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:23:36.939 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:37.058 39 INFO tempest.lib.common.rest_client [req-02983766-7fa2-44f0-acfc-5a555c24a0d4 ] Request (VolumesActionsV312RbacTest:test_show_volume_summary): 200 GET http://172.30.13.94/identity/v3/projects/c47a72668fc7486ab6c35e91b9a351c8/users/796e02dedb8e4645935961b265bbe922/roles 0.119s 2020-11-06 18:23:37.058 39 DEBUG tempest.lib.common.rest_client [req-02983766-7fa2-44f0-acfc-5a555c24a0d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-02983766-7fa2-44f0-acfc-5a555c24a0d4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c47a72668fc7486ab6c35e91b9a351c8/users/796e02dedb8e4645935961b265bbe922/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c47a72668fc7486ab6c35e91b9a351c8/users/796e02dedb8e4645935961b265bbe922/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:37.103 39 INFO tempest.lib.common.rest_client [req-235ada27-9c5e-4563-a8ef-43eaa6b90115 ] Request (VolumesActionsV312RbacTest:test_show_volume_summary): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-11-06 18:23:37.104 39 DEBUG tempest.lib.common.rest_client [req-235ada27-9c5e-4563-a8ef-43eaa6b90115 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-235ada27-9c5e-4563-a8ef-43eaa6b90115', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "796e02dedb8e4645935961b265bbe922", "name": "tempest-VolumesActionsV312RbacTest-1374615042", "password_expires_at": null}, "audit_ids": ["TyfSzF_TSReU8j8H9ZVaQw"], "expires_at": "2020-11-06T19:23:37.000000Z", "issued_at": "2020-11-06T18:23:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c47a72668fc7486ab6c35e91b9a351c8", "name": "tempest-VolumesActionsV312RbacTest-1374615042"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c47a72668fc7486ab6c35e91b9a351c8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c47a72668fc7486ab6c35e91b9a351c8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c47a72668fc7486ab6c35e91b9a351c8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c47a72668fc7486ab6c35e91b9a351c8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c47a72668fc7486ab6c35e91b9a351c8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c47a72668fc7486ab6c35e91b9a351c8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:37.246 39 INFO tempest.lib.common.rest_client [req-1f875875-9bab-4d2e-a250-5c7ac9cbd3b9 ] Request (VolumesActionsV312RbacTest:test_show_volume_summary): 200 GET http://172.30.13.94/volume/v3/c47a72668fc7486ab6c35e91b9a351c8/volumes/summary 0.141s 2020-11-06 18:23:37.247 39 DEBUG tempest.lib.common.rest_client [req-1f875875-9bab-4d2e-a250-5c7ac9cbd3b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.12', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-1f875875-9bab-4d2e-a250-5c7ac9cbd3b9', 'content-length': '55', 'openstack-api-version': 'volume 3.12', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1f875875-9bab-4d2e-a250-5c7ac9cbd3b9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c47a72668fc7486ab6c35e91b9a351c8/volumes/summary'} Body: b'{"volume-summary": {"total_count": 0, "total_size": 0}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:37.250 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:37.305 39 INFO tempest.lib.common.rest_client [req-d61b1f11-ba68-4a07-8c2a-4f524f2ab6fd ] Request (VolumesActionsV312RbacTest:test_show_volume_summary): 200 GET http://172.30.13.94/identity/v3/projects/c47a72668fc7486ab6c35e91b9a351c8/users/796e02dedb8e4645935961b265bbe922/roles 0.053s 2020-11-06 18:23:37.305 39 DEBUG tempest.lib.common.rest_client [req-d61b1f11-ba68-4a07-8c2a-4f524f2ab6fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d61b1f11-ba68-4a07-8c2a-4f524f2ab6fd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c47a72668fc7486ab6c35e91b9a351c8/users/796e02dedb8e4645935961b265bbe922/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c47a72668fc7486ab6c35e91b9a351c8/users/796e02dedb8e4645935961b265bbe922/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:37.342 39 INFO tempest.lib.common.rest_client [req-d6cff7a4-6bbb-41ee-a4d5-a7b4983ea875 ] Request (VolumesActionsV312RbacTest:test_show_volume_summary): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:23:37.343 39 DEBUG tempest.lib.common.rest_client [req-d6cff7a4-6bbb-41ee-a4d5-a7b4983ea875 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d6cff7a4-6bbb-41ee-a4d5-a7b4983ea875', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "796e02dedb8e4645935961b265bbe922", "name": "tempest-VolumesActionsV312RbacTest-1374615042", "password_expires_at": null}, "audit_ids": ["fMWI2AvcTC20sMTQrpkaeg"], "expires_at": "2020-11-06T19:23:37.000000Z", "issued_at": "2020-11-06T18:23:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c47a72668fc7486ab6c35e91b9a351c8", "name": "tempest-VolumesActionsV312RbacTest-1374615042"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c47a72668fc7486ab6c35e91b9a351c8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c47a72668fc7486ab6c35e91b9a351c8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c47a72668fc7486ab6c35e91b9a351c8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c47a72668fc7486ab6c35e91b9a351c8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c47a72668fc7486ab6c35e91b9a351c8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c47a72668fc7486ab6c35e91b9a351c8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:37.471 39 INFO tempest.lib.common.rest_client [req-b45399ef-5a8a-4b6b-bd10-30c46d5af3d5 ] Request (VolumesActionsV312RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/796e02dedb8e4645935961b265bbe922 0.125s 2020-11-06 18:23:37.471 39 DEBUG tempest.lib.common.rest_client [req-b45399ef-5a8a-4b6b-bd10-30c46d5af3d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b45399ef-5a8a-4b6b-bd10-30c46d5af3d5', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/796e02dedb8e4645935961b265bbe922'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:37.573 39 INFO tempest.lib.common.rest_client [req-9e1fb01c-967c-46eb-b161-ed0422fb7e9e ] Request (VolumesActionsV312RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.101s 2020-11-06 18:23:37.574 39 DEBUG tempest.lib.common.rest_client [req-9e1fb01c-967c-46eb-b161-ed0422fb7e9e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9e1fb01c-967c-46eb-b161-ed0422fb7e9e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["NVQQfCE4SoaqmOpobnlAGw"], "expires_at": "2020-11-06T19:23:37.000000Z", "issued_at": "2020-11-06T18:23:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:37.984 39 INFO tempest.lib.common.rest_client [req-7e733ead-550c-4079-ba8b-c65a087ba140 ] Request (VolumesActionsV312RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=c47a72668fc7486ab6c35e91b9a351c8&name=default 0.409s 2020-11-06 18:23:37.985 39 DEBUG tempest.lib.common.rest_client [req-7e733ead-550c-4079-ba8b-c65a087ba140 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-7e733ead-550c-4079-ba8b-c65a087ba140', 'date': 'Fri, 06 Nov 2020 18:23:37 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=c47a72668fc7486ab6c35e91b9a351c8&name=default'} Body: b'{"security_groups": [{"id": "caf01f07-4b0a-47f1-b1e9-4095203cc0ab", "name": "default", "stateful": true, "tenant_id": "c47a72668fc7486ab6c35e91b9a351c8", "description": "Default security group", "security_group_rules": [{"id": "19a70ef4-4c13-4298-a653-43787d677f58", "tenant_id": "c47a72668fc7486ab6c35e91b9a351c8", "security_group_id": "caf01f07-4b0a-47f1-b1e9-4095203cc0ab", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "caf01f07-4b0a-47f1-b1e9-4095203cc0ab", "description": null, "tags": [], "created_at": "2020-11-06T18:23:37Z", "updated_at": "2020-11-06T18:23:37Z", "revision_number": 0, "project_id": "c47a72668fc7486ab6c35e91b9a351c8"}, {"id": "66daf2d8-c21b-4e93-838e-085e64dbb88e", "tenant_id": "c47a72668fc7486ab6c35e91b9a351c8", "security_group_id": "caf01f07-4b0a-47f1-b1e9-4095203cc0ab", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:23:37Z", "updated_at": "2020-11-06T18:23:37Z", "revision_number": 0, "project_id": "c47a72668fc7486ab6c35e91b9a351c8"}, {"id": "7eb5f5bb-f49f-4407-8d9d-9362fb3d7a73", "tenant_id": "c47a72668fc7486ab6c35e91b9a351c8", "security_group_id": "caf01f07-4b0a-47f1-b1e9-4095203cc0ab", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:23:37Z", "updated_at": "2020-11-06T18:23:37Z", "revision_number": 0, "project_id": "c47a72668fc7486ab6c35e91b9a351c8"}, {"id": "c161e519-ccb2-457b-96ef-df7f42be1709", "tenant_id": "c47a72668fc7486ab6c35e91b9a351c8", "security_group_id": "caf01f07-4b0a-47f1-b1e9-4095203cc0ab", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "caf01f07-4b0a-47f1-b1e9-4095203cc0ab", "description": null, "tags": [], "created_at": "2020-11-06T18:23:37Z", "updated_at": "2020-11-06T18:23:37Z", "revision_number": 0, "project_id": "c47a72668fc7486ab6c35e91b9a351c8"}], "tags": [], "created_at": "2020-11-06T18:23:37Z", "updated_at": "2020-11-06T18:23:37Z", "revision_number": 1, "project_id": "c47a72668fc7486ab6c35e91b9a351c8"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:38.113 39 INFO tempest.lib.common.rest_client [req-15d38c2c-7bc5-4a8c-ac82-a617cfc0afd2 ] Request (VolumesActionsV312RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/caf01f07-4b0a-47f1-b1e9-4095203cc0ab 0.127s 2020-11-06 18:23:38.113 39 DEBUG tempest.lib.common.rest_client [req-15d38c2c-7bc5-4a8c-ac82-a617cfc0afd2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-15d38c2c-7bc5-4a8c-ac82-a617cfc0afd2', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:23:38 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/caf01f07-4b0a-47f1-b1e9-4095203cc0ab'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:38.227 39 INFO tempest.lib.common.rest_client [req-fb2287b2-2b40-4320-a446-2c2895550e5e ] Request (VolumesActionsV312RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/c47a72668fc7486ab6c35e91b9a351c8 0.113s 2020-11-06 18:23:38.228 39 DEBUG tempest.lib.common.rest_client [req-fb2287b2-2b40-4320-a446-2c2895550e5e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fb2287b2-2b40-4320-a446-2c2895550e5e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c47a72668fc7486ab6c35e91b9a351c8'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:38.362 39 INFO tempest.lib.common.rest_client [req-132d9d69-7c2c-48d0-9ae5-af9f58045920 ] Request (VolumesActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.132s 2020-11-06 18:23:38.363 39 DEBUG tempest.lib.common.rest_client [req-132d9d69-7c2c-48d0-9ae5-af9f58045920 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-132d9d69-7c2c-48d0-9ae5-af9f58045920', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["KKEygDPDQaen3mH07QLe4Q"], "expires_at": "2020-11-06T19:23:38.000000Z", "issued_at": "2020-11-06T18:23:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:38.408 39 INFO tempest.lib.common.rest_client [req-eeed058d-86f7-4999-bc1e-e87eff231117 ] Request (VolumesActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:23:38.408 39 DEBUG tempest.lib.common.rest_client [req-eeed058d-86f7-4999-bc1e-e87eff231117 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eeed058d-86f7-4999-bc1e-e87eff231117', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["CaeBD1rjSnqA0u5HNS2IZg"], "expires_at": "2020-11-06T19:23:38.000000Z", "issued_at": "2020-11-06T18:23:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:38.464 39 INFO tempest.lib.common.rest_client [req-819c79e7-db39-4190-bc13-c8844494f2fe ] Request (VolumesActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.054s 2020-11-06 18:23:38.464 39 DEBUG tempest.lib.common.rest_client [req-819c79e7-db39-4190-bc13-c8844494f2fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-819c79e7-db39-4190-bc13-c8844494f2fe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:38.531 39 INFO tempest.lib.common.rest_client [req-c7a1ce53-e730-467b-9e42-26bfc9d8c91f ] Request (VolumesActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.066s 2020-11-06 18:23:38.532 39 DEBUG tempest.lib.common.rest_client [req-c7a1ce53-e730-467b-9e42-26bfc9d8c91f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumesActionsV3RbacTest-1864572528-desc", "domain_id": "default", "name": "tempest-VolumesActionsV3RbacTest-1864572528"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '386', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c7a1ce53-e730-467b-9e42-26bfc9d8c91f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "3c4e83d6ebae4a7c9f819f27a65f6954", "name": "tempest-VolumesActionsV3RbacTest-1864572528", "domain_id": "default", "description": "tempest-VolumesActionsV3RbacTest-1864572528-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:38.644 39 INFO tempest.lib.common.rest_client [req-e8312c04-8800-4b45-adf3-eb9d68082abe ] Request (VolumesActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.110s 2020-11-06 18:23:38.644 39 DEBUG tempest.lib.common.rest_client [req-e8312c04-8800-4b45-adf3-eb9d68082abe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumesActionsV3RbacTest-1864572528", "password": "R5#mJ=vK%rKn2jU", "project_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "email": "tempest-VolumesActionsV3RbacTest-1393499057@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '404', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e8312c04-8800-4b45-adf3-eb9d68082abe', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "email": "tempest-VolumesActionsV3RbacTest-1393499057@example.com", "id": "1834e82c5f964d3fb50c3905a2d6c322", "name": "tempest-VolumesActionsV3RbacTest-1864572528", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/1834e82c5f964d3fb50c3905a2d6c322"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:38.695 39 INFO tempest.lib.common.rest_client [req-3292721b-3244-4545-84c6-d453d171e470 ] Request (VolumesActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.050s 2020-11-06 18:23:38.696 39 DEBUG tempest.lib.common.rest_client [req-3292721b-3244-4545-84c6-d453d171e470 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3292721b-3244-4545-84c6-d453d171e470', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:38.754 39 INFO tempest.lib.common.rest_client [req-3cbdaa8f-09a1-4c3d-aa95-bacef86ed519 ] Request (VolumesActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.056s 2020-11-06 18:23:38.754 39 DEBUG tempest.lib.common.rest_client [req-3cbdaa8f-09a1-4c3d-aa95-bacef86ed519 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3cbdaa8f-09a1-4c3d-aa95-bacef86ed519', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:38.833 39 INFO tempest.lib.common.rest_client [req-0ec6471a-406e-4f9a-9be4-205efc699ba0 ] Request (VolumesActionsV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles/72a4576c553448cd941b052c1ca0cf2d 0.077s 2020-11-06 18:23:38.833 39 DEBUG tempest.lib.common.rest_client [req-0ec6471a-406e-4f9a-9be4-205efc699ba0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0ec6471a-406e-4f9a-9be4-205efc699ba0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:38.834 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesActionsV3RbacTest-1864572528', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '3c4e83d6ebae4a7c9f819f27a65f6954', 'project_name': 'tempest-VolumesActionsV3RbacTest-1864572528', 'tenant_id': '3c4e83d6ebae4a7c9f819f27a65f6954', 'tenant_name': 'tempest-VolumesActionsV3RbacTest-1864572528', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '1834e82c5f964d3fb50c3905a2d6c322'}, Network: None, Subnet: None, Router: None 2020-11-06 18:23:38.926 39 INFO tempest.lib.common.rest_client [req-364da4d0-d095-464e-8160-38deaf090f9e ] Request (VolumesActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-11-06 18:23:38.926 39 DEBUG tempest.lib.common.rest_client [req-364da4d0-d095-464e-8160-38deaf090f9e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-364da4d0-d095-464e-8160-38deaf090f9e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["BEnjG1eYSYGfOEW_cx1LxQ"], "expires_at": "2020-11-06T19:23:38.000000Z", "issued_at": "2020-11-06T18:23:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:39.447 39 INFO tempest.lib.common.rest_client [req-4f25b45d-5e6d-43ff-8be9-9cc1e1485320 ] Request (VolumesActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.519s 2020-11-06 18:23:39.447 39 DEBUG tempest.lib.common.rest_client [req-4f25b45d-5e6d-43ff-8be9-9cc1e1485320 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-VolumesActionsV3RbacTest-38180919-network", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954"}} Response - Headers: {'content-type': 'application/json', 'content-length': '738', 'x-openstack-request-id': 'req-4f25b45d-5e6d-43ff-8be9-9cc1e1485320', 'date': 'Fri, 06 Nov 2020 18:23:39 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"57a4081b-c06b-42fd-8f18-85f12b14ff89","name":"tempest-VolumesActionsV3RbacTest-38180919-network","tenant_id":"3c4e83d6ebae4a7c9f819f27a65f6954","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"3c4e83d6ebae4a7c9f819f27a65f6954","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":45,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-06T18:23:39Z","updated_at":"2020-11-06T18:23:39Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:39.982 39 INFO tempest.lib.common.rest_client [req-eb270ad5-a9fa-4375-9d53-745ce820af97 ] Request (VolumesActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.533s 2020-11-06 18:23:39.982 39 DEBUG tempest.lib.common.rest_client [req-eb270ad5-a9fa-4375-9d53-745ce820af97 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "57a4081b-c06b-42fd-8f18-85f12b14ff89", "cidr": "192.168.120.0/28", "name": "tempest-VolumesActionsV3RbacTest-38180919-subnet", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "enable_dhcp": false, "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '710', 'x-openstack-request-id': 'req-eb270ad5-a9fa-4375-9d53-745ce820af97', 'date': 'Fri, 06 Nov 2020 18:23:39 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"99869e9c-918c-4c1b-9ea9-ae258f284050","name":"tempest-VolumesActionsV3RbacTest-38180919-subnet","tenant_id":"3c4e83d6ebae4a7c9f819f27a65f6954","network_id":"57a4081b-c06b-42fd-8f18-85f12b14ff89","ip_version":4,"subnetpool_id":null,"enable_dhcp":false,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-11-06T18:23:39Z","updated_at":"2020-11-06T18:23:39Z","revision_number":0,"project_id":"3c4e83d6ebae4a7c9f819f27a65f6954"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:41.330 39 INFO tempest.lib.common.rest_client [req-3fe6de28-4555-4287-b7fe-333f282f5d0b ] Request (VolumesActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/routers 1.347s 2020-11-06 18:23:41.331 39 DEBUG tempest.lib.common.rest_client [req-3fe6de28-4555-4287-b7fe-333f282f5d0b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-VolumesActionsV3RbacTest-38180919-router", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea"}}} Response - Headers: {'content-type': 'application/json', 'content-length': '812', 'x-openstack-request-id': 'req-3fe6de28-4555-4287-b7fe-333f282f5d0b', 'date': 'Fri, 06 Nov 2020 18:23:41 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "3aee0767-b72f-4d59-8f70-de4f7cd34fdf", "name": "tempest-VolumesActionsV3RbacTest-38180919-router", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.253"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::189"}], "enable_snat": true}, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-11-06T18:23:40Z", "updated_at": "2020-11-06T18:23:40Z", "revision_number": 3, "project_id": "3c4e83d6ebae4a7c9f819f27a65f6954"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:44.543 39 INFO tempest.lib.common.rest_client [req-3b39265c-4664-47ab-a646-468635c4171d ] Request (VolumesActionsV3RbacTest:setUpClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/3aee0767-b72f-4d59-8f70-de4f7cd34fdf/add_router_interface 3.211s 2020-11-06 18:23:44.544 39 DEBUG tempest.lib.common.rest_client [req-3b39265c-4664-47ab-a646-468635c4171d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "99869e9c-918c-4c1b-9ea9-ae258f284050"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-3b39265c-4664-47ab-a646-468635c4171d', 'date': 'Fri, 06 Nov 2020 18:23:44 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/3aee0767-b72f-4d59-8f70-de4f7cd34fdf/add_router_interface'} Body: b'{"id": "3aee0767-b72f-4d59-8f70-de4f7cd34fdf", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "port_id": "1a24daa5-13e2-4cd6-81e9-60c0acd66bd0", "network_id": "57a4081b-c06b-42fd-8f18-85f12b14ff89", "subnet_id": "99869e9c-918c-4c1b-9ea9-ae258f284050", "subnet_ids": ["99869e9c-918c-4c1b-9ea9-ae258f284050"]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:44.544 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesActionsV3RbacTest-1864572528', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '3c4e83d6ebae4a7c9f819f27a65f6954', 'project_name': 'tempest-VolumesActionsV3RbacTest-1864572528', 'tenant_id': '3c4e83d6ebae4a7c9f819f27a65f6954', 'tenant_name': 'tempest-VolumesActionsV3RbacTest-1864572528', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '1834e82c5f964d3fb50c3905a2d6c322'}, Network: {'id': '57a4081b-c06b-42fd-8f18-85f12b14ff89', 'name': 'tempest-VolumesActionsV3RbacTest-38180919-network', 'tenant_id': '3c4e83d6ebae4a7c9f819f27a65f6954', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '3c4e83d6ebae4a7c9f819f27a65f6954', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 45, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T18:23:39Z', 'updated_at': '2020-11-06T18:23:39Z', 'revision_number': 1}, Subnet: {'id': '99869e9c-918c-4c1b-9ea9-ae258f284050', 'name': 'tempest-VolumesActionsV3RbacTest-38180919-subnet', 'tenant_id': '3c4e83d6ebae4a7c9f819f27a65f6954', 'network_id': '57a4081b-c06b-42fd-8f18-85f12b14ff89', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-11-06T18:23:39Z', 'updated_at': '2020-11-06T18:23:39Z', 'revision_number': 0, 'project_id': '3c4e83d6ebae4a7c9f819f27a65f6954'}, Router: {'id': '3aee0767-b72f-4d59-8f70-de4f7cd34fdf', 'name': 'tempest-VolumesActionsV3RbacTest-38180919-router', 'tenant_id': '3c4e83d6ebae4a7c9f819f27a65f6954', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.253'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::189'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-11-06T18:23:40Z', 'updated_at': '2020-11-06T18:23:40Z', 'revision_number': 3, 'project_id': '3c4e83d6ebae4a7c9f819f27a65f6954'} 2020-11-06 18:23:44.676 39 INFO tempest.lib.common.rest_client [req-aa1fc6b1-f07b-4fe9-be04-577468278d97 ] Request (VolumesActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.120s 2020-11-06 18:23:44.677 39 DEBUG tempest.lib.common.rest_client [req-aa1fc6b1-f07b-4fe9-be04-577468278d97 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6579', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aa1fc6b1-f07b-4fe9-be04-577468278d97', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1834e82c5f964d3fb50c3905a2d6c322", "name": "tempest-VolumesActionsV3RbacTest-1864572528", "password_expires_at": null}, "audit_ids": ["tQsYlYI7Q5Kxy_38Fomv1g"], "expires_at": "2020-11-06T19:23:44.000000Z", "issued_at": "2020-11-06T18:23:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3c4e83d6ebae4a7c9f819f27a65f6954", "name": "tempest-VolumesActionsV3RbacTest-1864572528"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "ht _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:44.714 39 INFO tempest.lib.common.rest_client [req-0aad5de9-7627-4cc0-9db6-d8cd0c6af77f ] Request (VolumesActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:23:44.715 39 DEBUG tempest.lib.common.rest_client [req-0aad5de9-7627-4cc0-9db6-d8cd0c6af77f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0aad5de9-7627-4cc0-9db6-d8cd0c6af77f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["aBN_PQWeQKC72aN7Eml7LA"], "expires_at": "2020-11-06T19:23:44.000000Z", "issued_at": "2020-11-06T18:23:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:44.890 39 INFO tempest.lib.common.rest_client [req-48991c85-0054-4a71-9e98-388795ab82a4 ] Request (VolumesActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-11-06 18:23:44.890 39 DEBUG tempest.lib.common.rest_client [req-48991c85-0054-4a71-9e98-388795ab82a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-48991c85-0054-4a71-9e98-388795ab82a4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["z0PI3UUKTHGU21062rwDCw"], "expires_at": "2020-11-06T19:23:44.000000Z", "issued_at": "2020-11-06T18:23:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:44.948 39 INFO tempest.lib.common.rest_client [req-eb7033e3-7f97-4a8c-8304-1555ddbe4972 ] Request (VolumesActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.057s 2020-11-06 18:23:44.949 39 DEBUG tempest.lib.common.rest_client [req-eb7033e3-7f97-4a8c-8304-1555ddbe4972 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eb7033e3-7f97-4a8c-8304-1555ddbe4972', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:45.002 39 INFO tempest.lib.common.rest_client [req-69444921-d482-41ab-9410-c51b536c9083 ] Request (VolumesActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.053s 2020-11-06 18:23:45.003 39 DEBUG tempest.lib.common.rest_client [req-69444921-d482-41ab-9410-c51b536c9083 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-69444921-d482-41ab-9410-c51b536c9083', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:45.004 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:23:45.004 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:23:45.063 39 INFO tempest.lib.common.rest_client [req-5a8406db-c88f-4345-b258-ff14d17fd15f ] Request (VolumesActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles 0.058s 2020-11-06 18:23:45.064 39 DEBUG tempest.lib.common.rest_client [req-5a8406db-c88f-4345-b258-ff14d17fd15f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5a8406db-c88f-4345-b258-ff14d17fd15f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:45.134 39 INFO tempest.lib.common.rest_client [req-233608e0-ec1a-4b23-bf83-28933398c423 ] Request (VolumesActionsV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles/72a4576c553448cd941b052c1ca0cf2d 0.069s 2020-11-06 18:23:45.135 39 DEBUG tempest.lib.common.rest_client [req-233608e0-ec1a-4b23-bf83-28933398c423 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-233608e0-ec1a-4b23-bf83-28933398c423', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:45.278 39 INFO tempest.lib.common.rest_client [req-af55964b-62a7-46aa-9477-b351e9b83f3d ] Request (VolumesActionsV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles/a629c95d64b3416fb80ae90af4f69c05 0.142s 2020-11-06 18:23:45.279 39 DEBUG tempest.lib.common.rest_client [req-af55964b-62a7-46aa-9477-b351e9b83f3d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-af55964b-62a7-46aa-9477-b351e9b83f3d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:46.488 39 INFO tempest.lib.common.rest_client [req-a634b9a8-ac74-4837-a3a2-4472d2691493 ] Request (VolumesActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.207s 2020-11-06 18:23:46.489 39 DEBUG tempest.lib.common.rest_client [req-a634b9a8-ac74-4837-a3a2-4472d2691493 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a634b9a8-ac74-4837-a3a2-4472d2691493', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1834e82c5f964d3fb50c3905a2d6c322", "name": "tempest-VolumesActionsV3RbacTest-1864572528", "password_expires_at": null}, "audit_ids": ["mbG7GkSgRdKzvrHoeriF7A"], "expires_at": "2020-11-06T19:23:46.000000Z", "issued_at": "2020-11-06T18:23:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3c4e83d6ebae4a7c9f819f27a65f6954", "name": "tempest-VolumesActionsV3RbacTest-1864572528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:47.181 39 INFO tempest.lib.common.rest_client [req-a759cde1-096d-46f2-a879-1fbad7b7f43d ] Request (VolumesActionsV3RbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes 0.690s 2020-11-06 18:23:47.182 39 DEBUG tempest.lib.common.rest_client [req-a759cde1-096d-46f2-a879-1fbad7b7f43d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-VolumesActionsV3RbacTest-Volume-1108946571"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a759cde1-096d-46f2-a879-1fbad7b7f43d', 'content-length': '845', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a759cde1-096d-46f2-a879-1fbad7b7f43d', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes'} Body: b'{"volume": {"id": "6ef5353f-6fbf-4a04-ab7e-258303d53b7b", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:23:47.000000", "updated_at": null, "name": "tempest-VolumesActionsV3RbacTest-Volume-1108946571", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b"}], "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:47.296 39 INFO tempest.lib.common.rest_client [req-261f2ebc-721c-4a4a-97c1-a639dc19d414 ] Request (VolumesActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b 0.100s 2020-11-06 18:23:47.297 39 DEBUG tempest.lib.common.rest_client [req-261f2ebc-721c-4a4a-97c1-a639dc19d414 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-261f2ebc-721c-4a4a-97c1-a639dc19d414', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-261f2ebc-721c-4a4a-97c1-a639dc19d414', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b'} Body: b'{"volume": {"id": "6ef5353f-6fbf-4a04-ab7e-258303d53b7b", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:23:47.000000", "updated_at": "2020-11-06T18:23:47.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-1108946571", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b"}], "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:48.401 39 INFO tempest.lib.common.rest_client [req-c94334b6-b60c-4e1c-affc-5e8160241907 ] Request (VolumesActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b 0.088s 2020-11-06 18:23:48.402 39 DEBUG tempest.lib.common.rest_client [req-c94334b6-b60c-4e1c-affc-5e8160241907 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c94334b6-b60c-4e1c-affc-5e8160241907', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c94334b6-b60c-4e1c-affc-5e8160241907', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b'} Body: b'{"volume": {"id": "6ef5353f-6fbf-4a04-ab7e-258303d53b7b", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:23:47.000000", "updated_at": "2020-11-06T18:23:47.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-1108946571", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b"}], "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:48.413 39 INFO tempest.common.waiters [-] volume 6ef5353f-6fbf-4a04-ab7e-258303d53b7b reached available after waiting for 1.413158 seconds 2020-11-06 18:23:48.414 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:23:48.416 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_actions:attach, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:23:48.458 39 INFO tempest.lib.common.rest_client [req-976f8893-3aae-4c8b-b7fe-c5486a6dd41e ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:23:48.459 39 DEBUG tempest.lib.common.rest_client [req-976f8893-3aae-4c8b-b7fe-c5486a6dd41e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-976f8893-3aae-4c8b-b7fe-c5486a6dd41e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1834e82c5f964d3fb50c3905a2d6c322", "name": "tempest-VolumesActionsV3RbacTest-1864572528", "password_expires_at": null}, "audit_ids": ["exm5p70wQ9mHfHYjIsPgFQ"], "expires_at": "2020-11-06T19:23:48.000000Z", "issued_at": "2020-11-06T18:23:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3c4e83d6ebae4a7c9f819f27a65f6954", "name": "tempest-VolumesActionsV3RbacTest-1864572528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:48.460 39 INFO tempest.lib.common.fixed_network [-] (VolumesActionsV3RbacTest:test_attach_volume_to_instance) Found network {'id': '57a4081b-c06b-42fd-8f18-85f12b14ff89', 'name': 'tempest-VolumesActionsV3RbacTest-38180919-network', 'tenant_id': '3c4e83d6ebae4a7c9f819f27a65f6954', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '3c4e83d6ebae4a7c9f819f27a65f6954', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 45, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T18:23:39Z', 'updated_at': '2020-11-06T18:23:39Z', 'revision_number': 1} available for tenant 2020-11-06 18:23:49.309 39 INFO tempest.lib.common.rest_client [req-0a276a57-235d-41e1-8903-66da5f943987 ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 202 POST http://172.30.13.94/compute/v2.1/servers 0.846s 2020-11-06 18:23:49.309 39 DEBUG tempest.lib.common.rest_client [req-0a276a57-235d-41e1-8903-66da5f943987 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-tempest.common.compute-instance-2113928526", "imageRef": "56b368f6-9136-40ec-a04c-564d02c95e42", "flavorRef": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "networks": [{"uuid": "57a4081b-c06b-42fd-8f18-85f12b14ff89"}]}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0a276a57-235d-41e1-8903-66da5f943987', 'x-compute-request-id': 'req-0a276a57-235d-41e1-8903-66da5f943987', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "3f925202-dde5-4390-b45b-9ce60e8116c4", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/3f925202-dde5-4390-b45b-9ce60e8116c4"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "73XhvbZDjaoA"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:49.404 39 INFO tempest.lib.common.rest_client [req-65819eb3-1f4c-4256-8ecb-216ad2febd07 ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4 0.089s 2020-11-06 18:23:49.404 39 DEBUG tempest.lib.common.rest_client [req-65819eb3-1f4c-4256-8ecb-216ad2febd07 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1400', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-65819eb3-1f4c-4256-8ecb-216ad2febd07', 'x-compute-request-id': 'req-65819eb3-1f4c-4256-8ecb-216ad2febd07', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4'} Body: b'{"server": {"id": "3f925202-dde5-4390-b45b-9ce60e8116c4", "name": "tempest-tempest.common.compute-instance-2113928526", "status": "BUILD", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "metadata": {}, "hostId": "", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:23:49Z", "updated": "2020-11-06T18:23:49Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/3f925202-dde5-4390-b45b-9ce60e8116c4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:50.549 39 INFO tempest.lib.common.rest_client [req-b09377b5-3f71-4a22-a7c4-9f6ab3c7c151 ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4 0.133s 2020-11-06 18:23:50.549 39 DEBUG tempest.lib.common.rest_client [req-b09377b5-3f71-4a22-a7c4-9f6ab3c7c151 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1487', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b09377b5-3f71-4a22-a7c4-9f6ab3c7c151', 'x-compute-request-id': 'req-b09377b5-3f71-4a22-a7c4-9f6ab3c7c151', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4'} Body: b'{"server": {"id": "3f925202-dde5-4390-b45b-9ce60e8116c4", "name": "tempest-tempest.common.compute-instance-2113928526", "status": "BUILD", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "metadata": {}, "hostId": "9d38216a8681ea9f79f9177069aaf0926d8c6ffd4e14e52873b6d0ac", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:23:49Z", "updated": "2020-11-06T18:23:50Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/3f925202-dde5-4390-b45b-9ce60e8116c4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-00003406", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:50.561 39 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/None" after 1 second wait 2020-11-06 18:23:51.722 39 INFO tempest.lib.common.rest_client [req-599d56fa-34fd-4fc6-8364-7ab4aa26d0d3 ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4 0.160s 2020-11-06 18:23:51.723 39 DEBUG tempest.lib.common.rest_client [req-599d56fa-34fd-4fc6-8364-7ab4aa26d0d3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1495', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-599d56fa-34fd-4fc6-8364-7ab4aa26d0d3', 'x-compute-request-id': 'req-599d56fa-34fd-4fc6-8364-7ab4aa26d0d3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4'} Body: b'{"server": {"id": "3f925202-dde5-4390-b45b-9ce60e8116c4", "name": "tempest-tempest.common.compute-instance-2113928526", "status": "BUILD", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "metadata": {}, "hostId": "9d38216a8681ea9f79f9177069aaf0926d8c6ffd4e14e52873b6d0ac", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:23:49Z", "updated": "2020-11-06T18:23:51Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/3f925202-dde5-4390-b45b-9ce60e8116c4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-00003406", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "networking", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:51.734 39 INFO tempest.common.waiters [-] State transition "BUILD/None" ==> "BUILD/networking" after 2 second wait 2020-11-06 18:23:52.879 39 INFO tempest.lib.common.rest_client [req-8ca32400-6b2c-48ae-8771-ea82d7aba1b3 ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4 0.143s 2020-11-06 18:23:52.880 39 DEBUG tempest.lib.common.rest_client [req-8ca32400-6b2c-48ae-8771-ea82d7aba1b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1495', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8ca32400-6b2c-48ae-8771-ea82d7aba1b3', 'x-compute-request-id': 'req-8ca32400-6b2c-48ae-8771-ea82d7aba1b3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4'} Body: b'{"server": {"id": "3f925202-dde5-4390-b45b-9ce60e8116c4", "name": "tempest-tempest.common.compute-instance-2113928526", "status": "BUILD", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "metadata": {}, "hostId": "9d38216a8681ea9f79f9177069aaf0926d8c6ffd4e14e52873b6d0ac", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:23:49Z", "updated": "2020-11-06T18:23:51Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/3f925202-dde5-4390-b45b-9ce60e8116c4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-00003406", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "networking", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:54.035 39 INFO tempest.lib.common.rest_client [req-39fdae55-804a-4a82-8b0b-60a3e6cd8899 ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4 0.138s 2020-11-06 18:23:54.036 39 DEBUG tempest.lib.common.rest_client [req-39fdae55-804a-4a82-8b0b-60a3e6cd8899 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1495', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-39fdae55-804a-4a82-8b0b-60a3e6cd8899', 'x-compute-request-id': 'req-39fdae55-804a-4a82-8b0b-60a3e6cd8899', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4'} Body: b'{"server": {"id": "3f925202-dde5-4390-b45b-9ce60e8116c4", "name": "tempest-tempest.common.compute-instance-2113928526", "status": "BUILD", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "metadata": {}, "hostId": "9d38216a8681ea9f79f9177069aaf0926d8c6ffd4e14e52873b6d0ac", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:23:49Z", "updated": "2020-11-06T18:23:51Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/3f925202-dde5-4390-b45b-9ce60e8116c4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-00003406", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "networking", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:55.233 39 INFO tempest.lib.common.rest_client [req-06262331-eb31-4ac0-b7bd-09f8fcf83836 ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4 0.180s 2020-11-06 18:23:55.234 39 DEBUG tempest.lib.common.rest_client [req-06262331-eb31-4ac0-b7bd-09f8fcf83836 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1495', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-06262331-eb31-4ac0-b7bd-09f8fcf83836', 'x-compute-request-id': 'req-06262331-eb31-4ac0-b7bd-09f8fcf83836', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4'} Body: b'{"server": {"id": "3f925202-dde5-4390-b45b-9ce60e8116c4", "name": "tempest-tempest.common.compute-instance-2113928526", "status": "BUILD", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "metadata": {}, "hostId": "9d38216a8681ea9f79f9177069aaf0926d8c6ffd4e14e52873b6d0ac", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:23:49Z", "updated": "2020-11-06T18:23:51Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/3f925202-dde5-4390-b45b-9ce60e8116c4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-00003406", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "networking", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:56.388 39 INFO tempest.lib.common.rest_client [req-73ae7cf1-7bf3-4857-8046-d9bb40bb2520 ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4 0.138s 2020-11-06 18:23:56.389 39 DEBUG tempest.lib.common.rest_client [req-73ae7cf1-7bf3-4857-8046-d9bb40bb2520 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1495', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-73ae7cf1-7bf3-4857-8046-d9bb40bb2520', 'x-compute-request-id': 'req-73ae7cf1-7bf3-4857-8046-d9bb40bb2520', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4'} Body: b'{"server": {"id": "3f925202-dde5-4390-b45b-9ce60e8116c4", "name": "tempest-tempest.common.compute-instance-2113928526", "status": "BUILD", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "metadata": {}, "hostId": "9d38216a8681ea9f79f9177069aaf0926d8c6ffd4e14e52873b6d0ac", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:23:49Z", "updated": "2020-11-06T18:23:51Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/3f925202-dde5-4390-b45b-9ce60e8116c4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-00003406", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "networking", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:57.537 39 INFO tempest.lib.common.rest_client [req-33a843c1-0472-470a-a834-7a43d17e208a ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4 0.137s 2020-11-06 18:23:57.537 39 DEBUG tempest.lib.common.rest_client [req-33a843c1-0472-470a-a834-7a43d17e208a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1495', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-33a843c1-0472-470a-a834-7a43d17e208a', 'x-compute-request-id': 'req-33a843c1-0472-470a-a834-7a43d17e208a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4'} Body: b'{"server": {"id": "3f925202-dde5-4390-b45b-9ce60e8116c4", "name": "tempest-tempest.common.compute-instance-2113928526", "status": "BUILD", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "metadata": {}, "hostId": "9d38216a8681ea9f79f9177069aaf0926d8c6ffd4e14e52873b6d0ac", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:23:49Z", "updated": "2020-11-06T18:23:51Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/3f925202-dde5-4390-b45b-9ce60e8116c4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-00003406", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "networking", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:58.767 39 INFO tempest.lib.common.rest_client [req-b2576a67-ccda-4784-a055-40bfd3875a6a ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4 0.215s 2020-11-06 18:23:58.768 39 DEBUG tempest.lib.common.rest_client [req-b2576a67-ccda-4784-a055-40bfd3875a6a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1535', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b2576a67-ccda-4784-a055-40bfd3875a6a', 'x-compute-request-id': 'req-b2576a67-ccda-4784-a055-40bfd3875a6a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4'} Body: b'{"server": {"id": "3f925202-dde5-4390-b45b-9ce60e8116c4", "name": "tempest-tempest.common.compute-instance-2113928526", "status": "BUILD", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "metadata": {}, "hostId": "9d38216a8681ea9f79f9177069aaf0926d8c6ffd4e14e52873b6d0ac", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:23:49Z", "updated": "2020-11-06T18:23:58Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/3f925202-dde5-4390-b45b-9ce60e8116c4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-00003406", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:23:58.781 39 INFO tempest.common.waiters [-] State transition "BUILD/networking" ==> "BUILD/spawning" after 9 second wait 2020-11-06 18:24:00.002 39 INFO tempest.lib.common.rest_client [req-845ab637-dd68-488d-a213-64a6a4cf78bd ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4 0.219s 2020-11-06 18:24:00.002 39 DEBUG tempest.lib.common.rest_client [req-845ab637-dd68-488d-a213-64a6a4cf78bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:23:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1535', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-845ab637-dd68-488d-a213-64a6a4cf78bd', 'x-compute-request-id': 'req-845ab637-dd68-488d-a213-64a6a4cf78bd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4'} Body: b'{"server": {"id": "3f925202-dde5-4390-b45b-9ce60e8116c4", "name": "tempest-tempest.common.compute-instance-2113928526", "status": "BUILD", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "metadata": {}, "hostId": "9d38216a8681ea9f79f9177069aaf0926d8c6ffd4e14e52873b6d0ac", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:23:49Z", "updated": "2020-11-06T18:23:58Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/3f925202-dde5-4390-b45b-9ce60e8116c4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-00003406", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:01.262 39 INFO tempest.lib.common.rest_client [req-ab89c122-90ce-400f-8f13-7bce9cc6ba70 ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4 0.242s 2020-11-06 18:24:01.262 39 DEBUG tempest.lib.common.rest_client [req-ab89c122-90ce-400f-8f13-7bce9cc6ba70 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1535', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ab89c122-90ce-400f-8f13-7bce9cc6ba70', 'x-compute-request-id': 'req-ab89c122-90ce-400f-8f13-7bce9cc6ba70', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4'} Body: b'{"server": {"id": "3f925202-dde5-4390-b45b-9ce60e8116c4", "name": "tempest-tempest.common.compute-instance-2113928526", "status": "BUILD", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "metadata": {}, "hostId": "9d38216a8681ea9f79f9177069aaf0926d8c6ffd4e14e52873b6d0ac", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:23:49Z", "updated": "2020-11-06T18:23:58Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/3f925202-dde5-4390-b45b-9ce60e8116c4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-00003406", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:02.489 39 INFO tempest.lib.common.rest_client [req-4bbe9e04-25a3-4ed0-b29b-a8f6f3654ecb ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4 0.211s 2020-11-06 18:24:02.490 39 DEBUG tempest.lib.common.rest_client [req-4bbe9e04-25a3-4ed0-b29b-a8f6f3654ecb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1535', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4bbe9e04-25a3-4ed0-b29b-a8f6f3654ecb', 'x-compute-request-id': 'req-4bbe9e04-25a3-4ed0-b29b-a8f6f3654ecb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4'} Body: b'{"server": {"id": "3f925202-dde5-4390-b45b-9ce60e8116c4", "name": "tempest-tempest.common.compute-instance-2113928526", "status": "BUILD", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "metadata": {}, "hostId": "9d38216a8681ea9f79f9177069aaf0926d8c6ffd4e14e52873b6d0ac", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:23:49Z", "updated": "2020-11-06T18:23:58Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/3f925202-dde5-4390-b45b-9ce60e8116c4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-00003406", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:03.722 39 INFO tempest.lib.common.rest_client [req-8f3089ef-94b6-4cd0-894a-1618bae14eb2 ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4 0.221s 2020-11-06 18:24:03.722 39 DEBUG tempest.lib.common.rest_client [req-8f3089ef-94b6-4cd0-894a-1618bae14eb2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1723', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8f3089ef-94b6-4cd0-894a-1618bae14eb2', 'x-compute-request-id': 'req-8f3089ef-94b6-4cd0-894a-1618bae14eb2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4'} Body: b'{"server": {"id": "3f925202-dde5-4390-b45b-9ce60e8116c4", "name": "tempest-tempest.common.compute-instance-2113928526", "status": "ACTIVE", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "metadata": {}, "hostId": "9d38216a8681ea9f79f9177069aaf0926d8c6ffd4e14e52873b6d0ac", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:23:49Z", "updated": "2020-11-06T18:24:03Z", "addresses": {"tempest-VolumesActionsV3RbacTest-38180919-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:15:4f:b8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/3f925202-dde5-4390-b45b-9ce60e8116c4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:24:03.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-00003406", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:03.737 39 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 14 second wait 2020-11-06 18:24:03.737 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:24:03.850 39 INFO tempest.lib.common.rest_client [req-34e3febe-c53c-4e2f-ad5b-da5a334ec3fa ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 200 GET http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles 0.112s 2020-11-06 18:24:03.850 39 DEBUG tempest.lib.common.rest_client [req-34e3febe-c53c-4e2f-ad5b-da5a334ec3fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-34e3febe-c53c-4e2f-ad5b-da5a334ec3fa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:03.888 39 INFO tempest.lib.common.rest_client [req-afefef11-c747-4cce-a04a-70f780480b2a ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:24:03.889 39 DEBUG tempest.lib.common.rest_client [req-afefef11-c747-4cce-a04a-70f780480b2a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-afefef11-c747-4cce-a04a-70f780480b2a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1834e82c5f964d3fb50c3905a2d6c322", "name": "tempest-VolumesActionsV3RbacTest-1864572528", "password_expires_at": null}, "audit_ids": ["2rC-nhluQWKNT4X-E_vd0A"], "expires_at": "2020-11-06T19:24:03.000000Z", "issued_at": "2020-11-06T18:24:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3c4e83d6ebae4a7c9f819f27a65f6954", "name": "tempest-VolumesActionsV3RbacTest-1864572528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:04.345 39 INFO tempest.lib.common.rest_client [req-6c74727c-094d-467a-815e-e51284fb293f ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 200 POST http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4/os-volume_attachments 0.454s 2020-11-06 18:24:04.345 39 DEBUG tempest.lib.common.rest_client [req-6c74727c-094d-467a-815e-e51284fb293f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volumeAttachment": {"volumeId": "6ef5353f-6fbf-4a04-ab7e-258303d53b7b", "device": "/dev/sdb"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '194', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6c74727c-094d-467a-815e-e51284fb293f', 'x-compute-request-id': 'req-6c74727c-094d-467a-815e-e51284fb293f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4/os-volume_attachments'} Body: b'{"volumeAttachment": {"id": "6ef5353f-6fbf-4a04-ab7e-258303d53b7b", "serverId": "3f925202-dde5-4390-b45b-9ce60e8116c4", "volumeId": "6ef5353f-6fbf-4a04-ab7e-258303d53b7b", "device": "/dev/sdb"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:04.347 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:24:04.406 39 INFO tempest.lib.common.rest_client [req-1a41b51a-c301-4a82-a1aa-71dd5dc13c27 ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 200 GET http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles 0.058s 2020-11-06 18:24:04.407 39 DEBUG tempest.lib.common.rest_client [req-1a41b51a-c301-4a82-a1aa-71dd5dc13c27 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1a41b51a-c301-4a82-a1aa-71dd5dc13c27', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:04.441 39 INFO tempest.lib.common.rest_client [req-0942262c-dc87-4dda-b085-5c9a0cb0382d ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:24:04.441 39 DEBUG tempest.lib.common.rest_client [req-0942262c-dc87-4dda-b085-5c9a0cb0382d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0942262c-dc87-4dda-b085-5c9a0cb0382d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1834e82c5f964d3fb50c3905a2d6c322", "name": "tempest-VolumesActionsV3RbacTest-1864572528", "password_expires_at": null}, "audit_ids": ["LqKAkLcgTbek9Lm_teyilA"], "expires_at": "2020-11-06T19:24:04.000000Z", "issued_at": "2020-11-06T18:24:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3c4e83d6ebae4a7c9f819f27a65f6954", "name": "tempest-VolumesActionsV3RbacTest-1864572528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:04.609 39 INFO tempest.lib.common.rest_client [req-f622863b-ad4a-4688-a874-c11bc22f947a ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 200 GET http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b 0.166s 2020-11-06 18:24:04.609 39 DEBUG tempest.lib.common.rest_client [req-f622863b-ad4a-4688-a874-c11bc22f947a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-f622863b-ad4a-4688-a874-c11bc22f947a', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f622863b-ad4a-4688-a874-c11bc22f947a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b'} Body: b'{"volume": {"id": "6ef5353f-6fbf-4a04-ab7e-258303d53b7b", "status": "reserved", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:23:47.000000", "updated_at": "2020-11-06T18:24:04.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-1108946571", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b"}], "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:05.690 39 INFO tempest.lib.common.rest_client [req-02906709-5b17-4a4e-b20e-2e23843747fd ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 200 GET http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b 0.067s 2020-11-06 18:24:05.690 39 DEBUG tempest.lib.common.rest_client [req-02906709-5b17-4a4e-b20e-2e23843747fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-02906709-5b17-4a4e-b20e-2e23843747fd', 'content-length': '1369', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-02906709-5b17-4a4e-b20e-2e23843747fd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b'} Body: b'{"volume": {"id": "6ef5353f-6fbf-4a04-ab7e-258303d53b7b", "status": "in-use", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:23:47.000000", "updated_at": "2020-11-06T18:24:05.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-1108946571", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b"}], "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [{"id": "6ef5353f-6fbf-4a04-ab7e-258303d53b7b", "attachment_id": "1ec4ed49-1e17-4b0c-a08b-da7b4a85caac", "volume_id": "6ef5353f-6fbf-4a04-ab7e-258303d53b7b", "server_id": "3f925202-dde5-4390-b45b-9ce60e8116c4", "host_name": "lf-virtual8", "device": "/dev/sdb", "attached_at": "2020-11-06T18:24:05.000000"}], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:05.699 39 INFO tempest.common.waiters [-] volume 6ef5353f-6fbf-4a04-ab7e-258303d53b7b reached in-use after waiting for 1.699833 seconds 2020-11-06 18:24:05.860 39 INFO tempest.lib.common.rest_client [req-019cddf6-a631-48cd-85a3-e0efb24f898c ] Request (VolumesActionsV3RbacTest:_run_cleanups): 202 POST http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b/action 0.160s 2020-11-06 18:24:05.861 39 DEBUG tempest.lib.common.rest_client [req-019cddf6-a631-48cd-85a3-e0efb24f898c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-detach": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-019cddf6-a631-48cd-85a3-e0efb24f898c', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-019cddf6-a631-48cd-85a3-e0efb24f898c', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:05.931 39 INFO tempest.lib.common.rest_client [req-e20ba91f-e315-4127-b923-513dbc0365b7 ] Request (VolumesActionsV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b 0.069s 2020-11-06 18:24:05.932 39 DEBUG tempest.lib.common.rest_client [req-e20ba91f-e315-4127-b923-513dbc0365b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e20ba91f-e315-4127-b923-513dbc0365b7', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e20ba91f-e315-4127-b923-513dbc0365b7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b'} Body: b'{"volume": {"id": "6ef5353f-6fbf-4a04-ab7e-258303d53b7b", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:23:47.000000", "updated_at": "2020-11-06T18:24:05.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-1108946571", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b"}], "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:05.944 39 INFO tempest.common.waiters [-] volume 6ef5353f-6fbf-4a04-ab7e-258303d53b7b reached available after waiting for 0.944027 seconds 2020-11-06 18:24:06.119 39 INFO tempest.lib.common.rest_client [req-4e4e4e49-5439-49b3-ae44-8b21819503d0 ] Request (VolumesActionsV3RbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4 0.175s 2020-11-06 18:24:06.120 39 DEBUG tempest.lib.common.rest_client [req-4e4e4e49-5439-49b3-ae44-8b21819503d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4e4e4e49-5439-49b3-ae44-8b21819503d0', 'x-compute-request-id': 'req-4e4e4e49-5439-49b3-ae44-8b21819503d0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:06.352 39 INFO tempest.lib.common.rest_client [req-337edad7-07f9-4556-a996-b1bc7830229d ] Request (VolumesActionsV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4 0.232s 2020-11-06 18:24:06.353 39 DEBUG tempest.lib.common.rest_client [req-337edad7-07f9-4556-a996-b1bc7830229d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1775', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-337edad7-07f9-4556-a996-b1bc7830229d', 'x-compute-request-id': 'req-337edad7-07f9-4556-a996-b1bc7830229d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4'} Body: b'{"server": {"id": "3f925202-dde5-4390-b45b-9ce60e8116c4", "name": "tempest-tempest.common.compute-instance-2113928526", "status": "ACTIVE", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "metadata": {}, "hostId": "9d38216a8681ea9f79f9177069aaf0926d8c6ffd4e14e52873b6d0ac", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:23:49Z", "updated": "2020-11-06T18:24:06Z", "addresses": {"tempest-VolumesActionsV3RbacTest-38180919-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:15:4f:b8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/3f925202-dde5-4390-b45b-9ce60e8116c4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:24:03.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-00003406", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [{"id": "6ef5353f-6fbf-4a04-ab7e-258303d53b7b"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:07.524 39 INFO tempest.lib.common.rest_client [req-c227d3d5-07d2-45e0-989b-7b6a2ed047c7 ] Request (VolumesActionsV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4 0.153s 2020-11-06 18:24:07.525 39 DEBUG tempest.lib.common.rest_client [req-c227d3d5-07d2-45e0-989b-7b6a2ed047c7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1733', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c227d3d5-07d2-45e0-989b-7b6a2ed047c7', 'x-compute-request-id': 'req-c227d3d5-07d2-45e0-989b-7b6a2ed047c7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4'} Body: b'{"server": {"id": "3f925202-dde5-4390-b45b-9ce60e8116c4", "name": "tempest-tempest.common.compute-instance-2113928526", "status": "ACTIVE", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "metadata": {}, "hostId": "9d38216a8681ea9f79f9177069aaf0926d8c6ffd4e14e52873b6d0ac", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:23:49Z", "updated": "2020-11-06T18:24:07Z", "addresses": {"tempest-VolumesActionsV3RbacTest-38180919-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:15:4f:b8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/3f925202-dde5-4390-b45b-9ce60e8116c4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:24:03.000000", "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-00003406", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [{"id": "6ef5353f-6fbf-4a04-ab7e-258303d53b7b"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:08.603 39 INFO tempest.lib.common.rest_client [req-de24c5b0-80ae-438f-8035-63c5bf00a8c5 ] Request (VolumesActionsV3RbacTest:_run_cleanups): 404 GET http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4 0.064s 2020-11-06 18:24:08.603 39 DEBUG tempest.lib.common.rest_client [req-de24c5b0-80ae-438f-8035-63c5bf00a8c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-de24c5b0-80ae-438f-8035-63c5bf00a8c5', 'x-compute-request-id': 'req-de24c5b0-80ae-438f-8035-63c5bf00a8c5', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/3f925202-dde5-4390-b45b-9ce60e8116c4'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 3f925202-dde5-4390-b45b-9ce60e8116c4 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:08.610 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:24:08.612 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_actions:detach, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:24:08.656 39 INFO tempest.lib.common.rest_client [req-8e07588c-9ce4-409a-a5d9-08ebf78f548b ] Request (VolumesActionsV3RbacTest:test_detach_volume_from_instance): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:24:08.657 39 DEBUG tempest.lib.common.rest_client [req-8e07588c-9ce4-409a-a5d9-08ebf78f548b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8e07588c-9ce4-409a-a5d9-08ebf78f548b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1834e82c5f964d3fb50c3905a2d6c322", "name": "tempest-VolumesActionsV3RbacTest-1864572528", "password_expires_at": null}, "audit_ids": ["ZmPHCrZ9QBiC2xKSL-EaCw"], "expires_at": "2020-11-06T19:24:08.000000Z", "issued_at": "2020-11-06T18:24:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3c4e83d6ebae4a7c9f819f27a65f6954", "name": "tempest-VolumesActionsV3RbacTest-1864572528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:08.658 39 INFO tempest.lib.common.fixed_network [-] (VolumesActionsV3RbacTest:test_detach_volume_from_instance) Found network {'id': '57a4081b-c06b-42fd-8f18-85f12b14ff89', 'name': 'tempest-VolumesActionsV3RbacTest-38180919-network', 'tenant_id': '3c4e83d6ebae4a7c9f819f27a65f6954', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '3c4e83d6ebae4a7c9f819f27a65f6954', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 45, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T18:23:39Z', 'updated_at': '2020-11-06T18:23:39Z', 'revision_number': 1} available for tenant 2020-11-06 18:24:09.238 39 INFO tempest.lib.common.rest_client [req-a9852288-ee9f-4ee3-b01b-190afbd7b639 ] Request (VolumesActionsV3RbacTest:test_detach_volume_from_instance): 202 POST http://172.30.13.94/compute/v2.1/servers 0.578s 2020-11-06 18:24:09.239 39 DEBUG tempest.lib.common.rest_client [req-a9852288-ee9f-4ee3-b01b-190afbd7b639 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-tempest.common.compute-instance-830144319", "imageRef": "56b368f6-9136-40ec-a04c-564d02c95e42", "flavorRef": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "networks": [{"uuid": "57a4081b-c06b-42fd-8f18-85f12b14ff89"}]}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a9852288-ee9f-4ee3-b01b-190afbd7b639', 'x-compute-request-id': 'req-a9852288-ee9f-4ee3-b01b-190afbd7b639', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "d969b838-704c-4b69-baca-a8f8590ca69c", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d969b838-704c-4b69-baca-a8f8590ca69c"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "k5sWxkKy8SuY"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:09.336 39 INFO tempest.lib.common.rest_client [req-7570f793-4617-49b7-b73a-92050895a558 ] Request (VolumesActionsV3RbacTest:test_detach_volume_from_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c 0.092s 2020-11-06 18:24:09.337 39 DEBUG tempest.lib.common.rest_client [req-7570f793-4617-49b7-b73a-92050895a558 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1399', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7570f793-4617-49b7-b73a-92050895a558', 'x-compute-request-id': 'req-7570f793-4617-49b7-b73a-92050895a558', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c'} Body: b'{"server": {"id": "d969b838-704c-4b69-baca-a8f8590ca69c", "name": "tempest-tempest.common.compute-instance-830144319", "status": "BUILD", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "metadata": {}, "hostId": "", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:24:09Z", "updated": "2020-11-06T18:24:09Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d969b838-704c-4b69-baca-a8f8590ca69c"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:10.509 39 INFO tempest.lib.common.rest_client [req-89fa2afd-314a-475d-a207-6cb07121c977 ] Request (VolumesActionsV3RbacTest:test_detach_volume_from_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c 0.156s 2020-11-06 18:24:10.510 39 DEBUG tempest.lib.common.rest_client [req-89fa2afd-314a-475d-a207-6cb07121c977 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1412', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-89fa2afd-314a-475d-a207-6cb07121c977', 'x-compute-request-id': 'req-89fa2afd-314a-475d-a207-6cb07121c977', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c'} Body: b'{"server": {"id": "d969b838-704c-4b69-baca-a8f8590ca69c", "name": "tempest-tempest.common.compute-instance-830144319", "status": "BUILD", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "metadata": {}, "hostId": "", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:24:09Z", "updated": "2020-11-06T18:24:10Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d969b838-704c-4b69-baca-a8f8590ca69c"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "instance-00003407", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:10.525 39 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/None" after 1 second wait 2020-11-06 18:24:11.677 39 INFO tempest.lib.common.rest_client [req-df8bef07-5936-4e8e-a456-14b2ae451e6f ] Request (VolumesActionsV3RbacTest:test_detach_volume_from_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c 0.150s 2020-11-06 18:24:11.678 39 DEBUG tempest.lib.common.rest_client [req-df8bef07-5936-4e8e-a456-14b2ae451e6f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1492', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-df8bef07-5936-4e8e-a456-14b2ae451e6f', 'x-compute-request-id': 'req-df8bef07-5936-4e8e-a456-14b2ae451e6f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c'} Body: b'{"server": {"id": "d969b838-704c-4b69-baca-a8f8590ca69c", "name": "tempest-tempest.common.compute-instance-830144319", "status": "BUILD", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "metadata": {}, "hostId": "04f9aef2009550bcd58b3a96ad997d0e108accbaf28876e98fdb9169", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:24:09Z", "updated": "2020-11-06T18:24:11Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d969b838-704c-4b69-baca-a8f8590ca69c"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-00003407", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:11.692 39 INFO tempest.common.waiters [-] State transition "BUILD/None" ==> "BUILD/spawning" after 2 second wait 2020-11-06 18:24:13.622 39 INFO tempest.lib.common.rest_client [req-83ee41fb-1e82-486d-a53d-1cc27cf599ce ] Request (VolumesActionsV3RbacTest:test_detach_volume_from_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c 0.928s 2020-11-06 18:24:13.623 39 DEBUG tempest.lib.common.rest_client [req-83ee41fb-1e82-486d-a53d-1cc27cf599ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1534', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-83ee41fb-1e82-486d-a53d-1cc27cf599ce', 'x-compute-request-id': 'req-83ee41fb-1e82-486d-a53d-1cc27cf599ce', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c'} Body: b'{"server": {"id": "d969b838-704c-4b69-baca-a8f8590ca69c", "name": "tempest-tempest.common.compute-instance-830144319", "status": "BUILD", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "metadata": {}, "hostId": "04f9aef2009550bcd58b3a96ad997d0e108accbaf28876e98fdb9169", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:24:09Z", "updated": "2020-11-06T18:24:11Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d969b838-704c-4b69-baca-a8f8590ca69c"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-00003407", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:14.909 39 INFO tempest.lib.common.rest_client [req-dfe9ea80-a167-413d-b6ee-d8776c669ca2 ] Request (VolumesActionsV3RbacTest:test_detach_volume_from_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c 0.272s 2020-11-06 18:24:14.909 39 DEBUG tempest.lib.common.rest_client [req-dfe9ea80-a167-413d-b6ee-d8776c669ca2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1534', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dfe9ea80-a167-413d-b6ee-d8776c669ca2', 'x-compute-request-id': 'req-dfe9ea80-a167-413d-b6ee-d8776c669ca2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c'} Body: b'{"server": {"id": "d969b838-704c-4b69-baca-a8f8590ca69c", "name": "tempest-tempest.common.compute-instance-830144319", "status": "BUILD", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "metadata": {}, "hostId": "04f9aef2009550bcd58b3a96ad997d0e108accbaf28876e98fdb9169", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:24:09Z", "updated": "2020-11-06T18:24:11Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d969b838-704c-4b69-baca-a8f8590ca69c"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-00003407", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:16.122 39 INFO tempest.lib.common.rest_client [req-00972b5e-84f5-4450-a2ab-d505865d2b76 ] Request (VolumesActionsV3RbacTest:test_detach_volume_from_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c 0.194s 2020-11-06 18:24:16.122 39 DEBUG tempest.lib.common.rest_client [req-00972b5e-84f5-4450-a2ab-d505865d2b76 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1534', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-00972b5e-84f5-4450-a2ab-d505865d2b76', 'x-compute-request-id': 'req-00972b5e-84f5-4450-a2ab-d505865d2b76', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c'} Body: b'{"server": {"id": "d969b838-704c-4b69-baca-a8f8590ca69c", "name": "tempest-tempest.common.compute-instance-830144319", "status": "BUILD", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "metadata": {}, "hostId": "04f9aef2009550bcd58b3a96ad997d0e108accbaf28876e98fdb9169", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:24:09Z", "updated": "2020-11-06T18:24:11Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d969b838-704c-4b69-baca-a8f8590ca69c"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-00003407", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:17.324 39 INFO tempest.lib.common.rest_client [req-62e5f1a4-c6fb-4a9d-8254-2bc942f3873e ] Request (VolumesActionsV3RbacTest:test_detach_volume_from_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c 0.184s 2020-11-06 18:24:17.325 39 DEBUG tempest.lib.common.rest_client [req-62e5f1a4-c6fb-4a9d-8254-2bc942f3873e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1534', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-62e5f1a4-c6fb-4a9d-8254-2bc942f3873e', 'x-compute-request-id': 'req-62e5f1a4-c6fb-4a9d-8254-2bc942f3873e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c'} Body: b'{"server": {"id": "d969b838-704c-4b69-baca-a8f8590ca69c", "name": "tempest-tempest.common.compute-instance-830144319", "status": "BUILD", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "metadata": {}, "hostId": "04f9aef2009550bcd58b3a96ad997d0e108accbaf28876e98fdb9169", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:24:09Z", "updated": "2020-11-06T18:24:11Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d969b838-704c-4b69-baca-a8f8590ca69c"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-00003407", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:18.616 39 INFO tempest.lib.common.rest_client [req-e73e3be1-b84c-4ffc-9870-b42a7a8df652 ] Request (VolumesActionsV3RbacTest:test_detach_volume_from_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c 0.274s 2020-11-06 18:24:18.616 39 DEBUG tempest.lib.common.rest_client [req-e73e3be1-b84c-4ffc-9870-b42a7a8df652 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1534', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e73e3be1-b84c-4ffc-9870-b42a7a8df652', 'x-compute-request-id': 'req-e73e3be1-b84c-4ffc-9870-b42a7a8df652', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c'} Body: b'{"server": {"id": "d969b838-704c-4b69-baca-a8f8590ca69c", "name": "tempest-tempest.common.compute-instance-830144319", "status": "BUILD", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "metadata": {}, "hostId": "04f9aef2009550bcd58b3a96ad997d0e108accbaf28876e98fdb9169", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:24:09Z", "updated": "2020-11-06T18:24:11Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d969b838-704c-4b69-baca-a8f8590ca69c"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-00003407", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:19.881 39 INFO tempest.lib.common.rest_client [req-88fe114f-2495-4cd5-9492-290fb96e9638 ] Request (VolumesActionsV3RbacTest:test_detach_volume_from_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c 0.251s 2020-11-06 18:24:19.882 39 DEBUG tempest.lib.common.rest_client [req-88fe114f-2495-4cd5-9492-290fb96e9638 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1721', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-88fe114f-2495-4cd5-9492-290fb96e9638', 'x-compute-request-id': 'req-88fe114f-2495-4cd5-9492-290fb96e9638', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c'} Body: b'{"server": {"id": "d969b838-704c-4b69-baca-a8f8590ca69c", "name": "tempest-tempest.common.compute-instance-830144319", "status": "ACTIVE", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "metadata": {}, "hostId": "04f9aef2009550bcd58b3a96ad997d0e108accbaf28876e98fdb9169", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:24:09Z", "updated": "2020-11-06T18:24:18Z", "addresses": {"tempest-VolumesActionsV3RbacTest-38180919-network": [{"version": 4, "addr": "192.168.120.4", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:da:59:06"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d969b838-704c-4b69-baca-a8f8590ca69c"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:24:18.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-00003407", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:19.897 39 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 10 second wait 2020-11-06 18:24:20.287 39 INFO tempest.lib.common.rest_client [req-5bc7337a-a520-4de7-80f6-6fd28a367502 ] Request (VolumesActionsV3RbacTest:test_detach_volume_from_instance): 200 POST http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c/os-volume_attachments 0.389s 2020-11-06 18:24:20.288 39 DEBUG tempest.lib.common.rest_client [req-5bc7337a-a520-4de7-80f6-6fd28a367502 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volumeAttachment": {"volumeId": "6ef5353f-6fbf-4a04-ab7e-258303d53b7b", "device": "/dev/sdb"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '194', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5bc7337a-a520-4de7-80f6-6fd28a367502', 'x-compute-request-id': 'req-5bc7337a-a520-4de7-80f6-6fd28a367502', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c/os-volume_attachments'} Body: b'{"volumeAttachment": {"id": "6ef5353f-6fbf-4a04-ab7e-258303d53b7b", "serverId": "d969b838-704c-4b69-baca-a8f8590ca69c", "volumeId": "6ef5353f-6fbf-4a04-ab7e-258303d53b7b", "device": "/dev/sdb"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:20.365 39 INFO tempest.lib.common.rest_client [req-6a1cfe50-b823-423c-98df-3fd8c9721177 ] Request (VolumesActionsV3RbacTest:test_detach_volume_from_instance): 200 GET http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b 0.073s 2020-11-06 18:24:20.366 39 DEBUG tempest.lib.common.rest_client [req-6a1cfe50-b823-423c-98df-3fd8c9721177 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6a1cfe50-b823-423c-98df-3fd8c9721177', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6a1cfe50-b823-423c-98df-3fd8c9721177', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b'} Body: b'{"volume": {"id": "6ef5353f-6fbf-4a04-ab7e-258303d53b7b", "status": "reserved", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:23:47.000000", "updated_at": "2020-11-06T18:24:20.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-1108946571", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b"}], "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:21.462 39 INFO tempest.lib.common.rest_client [req-8259fb1e-f944-4546-8a44-8fd03c1121fa ] Request (VolumesActionsV3RbacTest:test_detach_volume_from_instance): 200 GET http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b 0.080s 2020-11-06 18:24:21.463 39 DEBUG tempest.lib.common.rest_client [req-8259fb1e-f944-4546-8a44-8fd03c1121fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-8259fb1e-f944-4546-8a44-8fd03c1121fa', 'content-length': '1369', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8259fb1e-f944-4546-8a44-8fd03c1121fa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b'} Body: b'{"volume": {"id": "6ef5353f-6fbf-4a04-ab7e-258303d53b7b", "status": "in-use", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:23:47.000000", "updated_at": "2020-11-06T18:24:21.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-1108946571", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b"}], "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [{"id": "6ef5353f-6fbf-4a04-ab7e-258303d53b7b", "attachment_id": "9e3b9d0e-9fb4-46fe-afc0-f9e7b27b396a", "volume_id": "6ef5353f-6fbf-4a04-ab7e-258303d53b7b", "server_id": "d969b838-704c-4b69-baca-a8f8590ca69c", "host_name": "lf-virtual9", "device": "/dev/sdb", "attached_at": "2020-11-06T18:24:21.000000"}], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:21.475 39 INFO tempest.common.waiters [-] volume 6ef5353f-6fbf-4a04-ab7e-258303d53b7b reached in-use after waiting for 1.475442 seconds 2020-11-06 18:24:21.475 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:24:21.533 39 INFO tempest.lib.common.rest_client [req-cd74a736-cb30-424d-9f03-9c3947cb5e2a ] Request (VolumesActionsV3RbacTest:test_detach_volume_from_instance): 200 GET http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles 0.057s 2020-11-06 18:24:21.534 39 DEBUG tempest.lib.common.rest_client [req-cd74a736-cb30-424d-9f03-9c3947cb5e2a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cd74a736-cb30-424d-9f03-9c3947cb5e2a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:21.571 39 INFO tempest.lib.common.rest_client [req-4e672582-6f57-4e49-96f8-049187ea5d98 ] Request (VolumesActionsV3RbacTest:test_detach_volume_from_instance): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:24:21.588 39 DEBUG tempest.lib.common.rest_client [req-4e672582-6f57-4e49-96f8-049187ea5d98 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4e672582-6f57-4e49-96f8-049187ea5d98', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1834e82c5f964d3fb50c3905a2d6c322", "name": "tempest-VolumesActionsV3RbacTest-1864572528", "password_expires_at": null}, "audit_ids": ["BDanyVohSx-CVU75KnW0xw"], "expires_at": "2020-11-06T19:24:21.000000Z", "issued_at": "2020-11-06T18:24:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3c4e83d6ebae4a7c9f819f27a65f6954", "name": "tempest-VolumesActionsV3RbacTest-1864572528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:23.067 39 INFO tempest.lib.common.rest_client [req-f6c3cb57-fc92-4aed-a72e-444f1cd6818c ] Request (VolumesActionsV3RbacTest:test_detach_volume_from_instance): 202 POST http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b/action 1.478s 2020-11-06 18:24:23.067 39 DEBUG tempest.lib.common.rest_client [req-f6c3cb57-fc92-4aed-a72e-444f1cd6818c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-detach": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-f6c3cb57-fc92-4aed-a72e-444f1cd6818c', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f6c3cb57-fc92-4aed-a72e-444f1cd6818c', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:23.068 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:24:23.130 39 INFO tempest.lib.common.rest_client [req-29d0a186-bf7b-4a07-8ecf-6381176b1458 ] Request (VolumesActionsV3RbacTest:test_detach_volume_from_instance): 200 GET http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles 0.060s 2020-11-06 18:24:23.130 39 DEBUG tempest.lib.common.rest_client [req-29d0a186-bf7b-4a07-8ecf-6381176b1458 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-29d0a186-bf7b-4a07-8ecf-6381176b1458', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:23.173 39 INFO tempest.lib.common.rest_client [req-64a77605-8f60-43b5-9d22-5c8696d68f81 ] Request (VolumesActionsV3RbacTest:test_detach_volume_from_instance): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-11-06 18:24:23.203 39 DEBUG tempest.lib.common.rest_client [req-64a77605-8f60-43b5-9d22-5c8696d68f81 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-64a77605-8f60-43b5-9d22-5c8696d68f81', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1834e82c5f964d3fb50c3905a2d6c322", "name": "tempest-VolumesActionsV3RbacTest-1864572528", "password_expires_at": null}, "audit_ids": ["jkdzv_LrQ3y49tRKuUrcpw"], "expires_at": "2020-11-06T19:24:23.000000Z", "issued_at": "2020-11-06T18:24:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3c4e83d6ebae4a7c9f819f27a65f6954", "name": "tempest-VolumesActionsV3RbacTest-1864572528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:23.339 39 INFO tempest.lib.common.rest_client [req-27352c5f-da1d-4a76-9069-8bb5729e55d0 ] Request (VolumesActionsV3RbacTest:test_detach_volume_from_instance): 200 GET http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b 0.135s 2020-11-06 18:24:23.340 39 DEBUG tempest.lib.common.rest_client [req-27352c5f-da1d-4a76-9069-8bb5729e55d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-27352c5f-da1d-4a76-9069-8bb5729e55d0', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-27352c5f-da1d-4a76-9069-8bb5729e55d0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b'} Body: b'{"volume": {"id": "6ef5353f-6fbf-4a04-ab7e-258303d53b7b", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:23:47.000000", "updated_at": "2020-11-06T18:24:21.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-1108946571", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b"}], "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:23.355 39 INFO tempest.common.waiters [-] volume 6ef5353f-6fbf-4a04-ab7e-258303d53b7b reached available after waiting for 0.355024 seconds 2020-11-06 18:24:23.768 39 INFO tempest.lib.common.rest_client [req-cca1befa-b740-46d9-8109-a9fb49ec73af ] Request (VolumesActionsV3RbacTest:_run_cleanups): 202 POST http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b/action 0.412s 2020-11-06 18:24:23.769 39 DEBUG tempest.lib.common.rest_client [req-cca1befa-b740-46d9-8109-a9fb49ec73af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-detach": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-cca1befa-b740-46d9-8109-a9fb49ec73af', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-cca1befa-b740-46d9-8109-a9fb49ec73af', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:23.838 39 INFO tempest.lib.common.rest_client [req-03728ff4-bf55-4376-860e-49cdd0f9a6fa ] Request (VolumesActionsV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b 0.068s 2020-11-06 18:24:23.839 39 DEBUG tempest.lib.common.rest_client [req-03728ff4-bf55-4376-860e-49cdd0f9a6fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-03728ff4-bf55-4376-860e-49cdd0f9a6fa', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-03728ff4-bf55-4376-860e-49cdd0f9a6fa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b'} Body: b'{"volume": {"id": "6ef5353f-6fbf-4a04-ab7e-258303d53b7b", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:23:47.000000", "updated_at": "2020-11-06T18:24:23.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-1108946571", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b"}], "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:23.855 39 INFO tempest.common.waiters [-] volume 6ef5353f-6fbf-4a04-ab7e-258303d53b7b reached available after waiting for 0.855244 seconds 2020-11-06 18:24:24.044 39 INFO tempest.lib.common.rest_client [req-c96662bd-fe96-4d4d-8cc6-146a864dc961 ] Request (VolumesActionsV3RbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c 0.188s 2020-11-06 18:24:24.044 39 DEBUG tempest.lib.common.rest_client [req-c96662bd-fe96-4d4d-8cc6-146a864dc961 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c96662bd-fe96-4d4d-8cc6-146a864dc961', 'x-compute-request-id': 'req-c96662bd-fe96-4d4d-8cc6-146a864dc961', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:24.254 39 INFO tempest.lib.common.rest_client [req-6337af0b-30e6-41d0-ac7c-52df176923f5 ] Request (VolumesActionsV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c 0.209s 2020-11-06 18:24:24.255 39 DEBUG tempest.lib.common.rest_client [req-6337af0b-30e6-41d0-ac7c-52df176923f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1773', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6337af0b-30e6-41d0-ac7c-52df176923f5', 'x-compute-request-id': 'req-6337af0b-30e6-41d0-ac7c-52df176923f5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c'} Body: b'{"server": {"id": "d969b838-704c-4b69-baca-a8f8590ca69c", "name": "tempest-tempest.common.compute-instance-830144319", "status": "ACTIVE", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "metadata": {}, "hostId": "04f9aef2009550bcd58b3a96ad997d0e108accbaf28876e98fdb9169", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:24:09Z", "updated": "2020-11-06T18:24:24Z", "addresses": {"tempest-VolumesActionsV3RbacTest-38180919-network": [{"version": 4, "addr": "192.168.120.4", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:da:59:06"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d969b838-704c-4b69-baca-a8f8590ca69c"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:24:18.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-00003407", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [{"id": "6ef5353f-6fbf-4a04-ab7e-258303d53b7b"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:25.421 39 INFO tempest.lib.common.rest_client [req-c9066b19-00e9-44c8-9eae-5a6dec65fa44 ] Request (VolumesActionsV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c 0.151s 2020-11-06 18:24:25.421 39 DEBUG tempest.lib.common.rest_client [req-c9066b19-00e9-44c8-9eae-5a6dec65fa44 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c9066b19-00e9-44c8-9eae-5a6dec65fa44', 'x-compute-request-id': 'req-c9066b19-00e9-44c8-9eae-5a6dec65fa44', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c'} Body: b'{"server": {"id": "d969b838-704c-4b69-baca-a8f8590ca69c", "name": "tempest-tempest.common.compute-instance-830144319", "status": "ACTIVE", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "metadata": {}, "hostId": "04f9aef2009550bcd58b3a96ad997d0e108accbaf28876e98fdb9169", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:24:09Z", "updated": "2020-11-06T18:24:25Z", "addresses": {"tempest-VolumesActionsV3RbacTest-38180919-network": [{"version": 4, "addr": "192.168.120.4", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:da:59:06"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d969b838-704c-4b69-baca-a8f8590ca69c"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:24:18.000000", "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-00003407", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [{"id": "6ef5353f-6fbf-4a04-ab7e-258303d53b7b"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:26.507 39 INFO tempest.lib.common.rest_client [req-49f8970e-7267-4ed0-989e-daa063665c0a ] Request (VolumesActionsV3RbacTest:_run_cleanups): 404 GET http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c 0.069s 2020-11-06 18:24:26.508 39 DEBUG tempest.lib.common.rest_client [req-49f8970e-7267-4ed0-989e-daa063665c0a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-49f8970e-7267-4ed0-989e-daa063665c0a', 'x-compute-request-id': 'req-49f8970e-7267-4ed0-989e-daa063665c0a', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d969b838-704c-4b69-baca-a8f8590ca69c'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance d969b838-704c-4b69-baca-a8f8590ca69c could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:26.512 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:24:26.515 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_admin_actions:force_detach, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:24:26.826 39 INFO tempest.lib.common.rest_client [req-46edb406-7211-4e84-befb-0d640b2b8aef ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 202 POST http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes 0.309s 2020-11-06 18:24:26.827 39 DEBUG tempest.lib.common.rest_client [req-46edb406-7211-4e84-befb-0d640b2b8aef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-VolumesActionsV3RbacTest-Volume-1212662060"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-46edb406-7211-4e84-befb-0d640b2b8aef', 'content-length': '845', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-46edb406-7211-4e84-befb-0d640b2b8aef', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes'} Body: b'{"volume": {"id": "16c1702b-fea8-45a8-b9b6-f356b6c349db", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:24:27.000000", "updated_at": null, "name": "tempest-VolumesActionsV3RbacTest-Volume-1212662060", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db"}], "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:26.904 39 INFO tempest.lib.common.rest_client [req-8db49c2f-d65d-448b-9daf-5fe7a853cfbd ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 200 GET http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db 0.062s 2020-11-06 18:24:26.904 39 DEBUG tempest.lib.common.rest_client [req-8db49c2f-d65d-448b-9daf-5fe7a853cfbd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-8db49c2f-d65d-448b-9daf-5fe7a853cfbd', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8db49c2f-d65d-448b-9daf-5fe7a853cfbd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db'} Body: b'{"volume": {"id": "16c1702b-fea8-45a8-b9b6-f356b6c349db", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:24:27.000000", "updated_at": "2020-11-06T18:24:27.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-1212662060", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db"}], "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:27.991 39 INFO tempest.lib.common.rest_client [req-79c17485-2498-4611-94d7-3f1cebf2ef36 ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 200 GET http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db 0.071s 2020-11-06 18:24:27.992 39 DEBUG tempest.lib.common.rest_client [req-79c17485-2498-4611-94d7-3f1cebf2ef36 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-79c17485-2498-4611-94d7-3f1cebf2ef36', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-79c17485-2498-4611-94d7-3f1cebf2ef36', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db'} Body: b'{"volume": {"id": "16c1702b-fea8-45a8-b9b6-f356b6c349db", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:24:27.000000", "updated_at": "2020-11-06T18:24:27.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-1212662060", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db"}], "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:28.006 39 INFO tempest.common.waiters [-] volume 16c1702b-fea8-45a8-b9b6-f356b6c349db reached available after waiting for 2.006647 seconds 2020-11-06 18:24:28.057 39 INFO tempest.lib.common.rest_client [req-5409d9fc-b9da-46d6-bfa7-a5e57540f8cd ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-11-06 18:24:28.058 39 DEBUG tempest.lib.common.rest_client [req-5409d9fc-b9da-46d6-bfa7-a5e57540f8cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5409d9fc-b9da-46d6-bfa7-a5e57540f8cd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1834e82c5f964d3fb50c3905a2d6c322", "name": "tempest-VolumesActionsV3RbacTest-1864572528", "password_expires_at": null}, "audit_ids": ["19UkqOhpT2-yX9e-nVnD9g"], "expires_at": "2020-11-06T19:24:28.000000Z", "issued_at": "2020-11-06T18:24:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3c4e83d6ebae4a7c9f819f27a65f6954", "name": "tempest-VolumesActionsV3RbacTest-1864572528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:28.059 39 INFO tempest.lib.common.fixed_network [-] (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance) Found network {'id': '57a4081b-c06b-42fd-8f18-85f12b14ff89', 'name': 'tempest-VolumesActionsV3RbacTest-38180919-network', 'tenant_id': '3c4e83d6ebae4a7c9f819f27a65f6954', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '3c4e83d6ebae4a7c9f819f27a65f6954', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 45, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T18:23:39Z', 'updated_at': '2020-11-06T18:23:39Z', 'revision_number': 1} available for tenant 2020-11-06 18:24:29.867 39 INFO tempest.lib.common.rest_client [req-3f3428a8-a320-4c18-9725-ed1df5e2df15 ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 202 POST http://172.30.13.94/compute/v2.1/servers 1.806s 2020-11-06 18:24:29.867 39 DEBUG tempest.lib.common.rest_client [req-3f3428a8-a320-4c18-9725-ed1df5e2df15 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-tempest.common.compute-instance-1751258777", "imageRef": "56b368f6-9136-40ec-a04c-564d02c95e42", "flavorRef": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "networks": [{"uuid": "57a4081b-c06b-42fd-8f18-85f12b14ff89"}]}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3f3428a8-a320-4c18-9725-ed1df5e2df15', 'x-compute-request-id': 'req-3f3428a8-a320-4c18-9725-ed1df5e2df15', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "ec954dca-1ed5-489c-9d18-eb370b6cde50", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "2wsR8qi6NUZi"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:29.968 39 INFO tempest.lib.common.rest_client [req-a9b92843-c1cb-4255-826e-c9a837868324 ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50 0.095s 2020-11-06 18:24:29.969 39 DEBUG tempest.lib.common.rest_client [req-a9b92843-c1cb-4255-826e-c9a837868324 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1400', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a9b92843-c1cb-4255-826e-c9a837868324', 'x-compute-request-id': 'req-a9b92843-c1cb-4255-826e-c9a837868324', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50'} Body: b'{"server": {"id": "ec954dca-1ed5-489c-9d18-eb370b6cde50", "name": "tempest-tempest.common.compute-instance-1751258777", "status": "BUILD", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "metadata": {}, "hostId": "", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:24:30Z", "updated": "2020-11-06T18:24:29Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:31.112 39 INFO tempest.lib.common.rest_client [req-4b53a495-1223-4fb8-afa5-64d886938587 ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50 0.126s 2020-11-06 18:24:31.112 39 DEBUG tempest.lib.common.rest_client [req-4b53a495-1223-4fb8-afa5-64d886938587 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1487', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4b53a495-1223-4fb8-afa5-64d886938587', 'x-compute-request-id': 'req-4b53a495-1223-4fb8-afa5-64d886938587', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50'} Body: b'{"server": {"id": "ec954dca-1ed5-489c-9d18-eb370b6cde50", "name": "tempest-tempest.common.compute-instance-1751258777", "status": "BUILD", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "metadata": {}, "hostId": "9d38216a8681ea9f79f9177069aaf0926d8c6ffd4e14e52873b6d0ac", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:24:29Z", "updated": "2020-11-06T18:24:30Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-00003408", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:31.127 39 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/None" after 2 second wait 2020-11-06 18:24:32.293 39 INFO tempest.lib.common.rest_client [req-3b071856-af1a-44b5-b2b0-43f36d03f643 ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50 0.164s 2020-11-06 18:24:32.294 39 DEBUG tempest.lib.common.rest_client [req-3b071856-af1a-44b5-b2b0-43f36d03f643 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1535', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3b071856-af1a-44b5-b2b0-43f36d03f643', 'x-compute-request-id': 'req-3b071856-af1a-44b5-b2b0-43f36d03f643', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50'} Body: b'{"server": {"id": "ec954dca-1ed5-489c-9d18-eb370b6cde50", "name": "tempest-tempest.common.compute-instance-1751258777", "status": "BUILD", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "metadata": {}, "hostId": "9d38216a8681ea9f79f9177069aaf0926d8c6ffd4e14e52873b6d0ac", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:24:29Z", "updated": "2020-11-06T18:24:31Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-00003408", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:32.308 39 INFO tempest.common.waiters [-] State transition "BUILD/None" ==> "BUILD/spawning" after 3 second wait 2020-11-06 18:24:33.521 39 INFO tempest.lib.common.rest_client [req-7f52a07f-4259-4d22-8ab9-ea69a0864d10 ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50 0.210s 2020-11-06 18:24:33.521 39 DEBUG tempest.lib.common.rest_client [req-7f52a07f-4259-4d22-8ab9-ea69a0864d10 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1535', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7f52a07f-4259-4d22-8ab9-ea69a0864d10', 'x-compute-request-id': 'req-7f52a07f-4259-4d22-8ab9-ea69a0864d10', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50'} Body: b'{"server": {"id": "ec954dca-1ed5-489c-9d18-eb370b6cde50", "name": "tempest-tempest.common.compute-instance-1751258777", "status": "BUILD", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "metadata": {}, "hostId": "9d38216a8681ea9f79f9177069aaf0926d8c6ffd4e14e52873b6d0ac", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:24:29Z", "updated": "2020-11-06T18:24:31Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-00003408", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:34.774 39 INFO tempest.lib.common.rest_client [req-3d6d3e01-0375-472b-9d13-145a3078e234 ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50 0.241s 2020-11-06 18:24:34.775 39 DEBUG tempest.lib.common.rest_client [req-3d6d3e01-0375-472b-9d13-145a3078e234 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1535', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3d6d3e01-0375-472b-9d13-145a3078e234', 'x-compute-request-id': 'req-3d6d3e01-0375-472b-9d13-145a3078e234', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50'} Body: b'{"server": {"id": "ec954dca-1ed5-489c-9d18-eb370b6cde50", "name": "tempest-tempest.common.compute-instance-1751258777", "status": "BUILD", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "metadata": {}, "hostId": "9d38216a8681ea9f79f9177069aaf0926d8c6ffd4e14e52873b6d0ac", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:24:29Z", "updated": "2020-11-06T18:24:31Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-00003408", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:36.014 39 INFO tempest.lib.common.rest_client [req-79de9ed9-4f60-4233-892e-f152036d6169 ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50 0.223s 2020-11-06 18:24:36.014 39 DEBUG tempest.lib.common.rest_client [req-79de9ed9-4f60-4233-892e-f152036d6169 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1535', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-79de9ed9-4f60-4233-892e-f152036d6169', 'x-compute-request-id': 'req-79de9ed9-4f60-4233-892e-f152036d6169', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50'} Body: b'{"server": {"id": "ec954dca-1ed5-489c-9d18-eb370b6cde50", "name": "tempest-tempest.common.compute-instance-1751258777", "status": "BUILD", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "metadata": {}, "hostId": "9d38216a8681ea9f79f9177069aaf0926d8c6ffd4e14e52873b6d0ac", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:24:29Z", "updated": "2020-11-06T18:24:31Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-00003408", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:37.241 39 INFO tempest.lib.common.rest_client [req-d9908206-7c5f-4091-b0d9-9b297d543408 ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50 0.215s 2020-11-06 18:24:37.242 39 DEBUG tempest.lib.common.rest_client [req-d9908206-7c5f-4091-b0d9-9b297d543408 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1723', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d9908206-7c5f-4091-b0d9-9b297d543408', 'x-compute-request-id': 'req-d9908206-7c5f-4091-b0d9-9b297d543408', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50'} Body: b'{"server": {"id": "ec954dca-1ed5-489c-9d18-eb370b6cde50", "name": "tempest-tempest.common.compute-instance-1751258777", "status": "ACTIVE", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "metadata": {}, "hostId": "9d38216a8681ea9f79f9177069aaf0926d8c6ffd4e14e52873b6d0ac", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:24:29Z", "updated": "2020-11-06T18:24:37Z", "addresses": {"tempest-VolumesActionsV3RbacTest-38180919-network": [{"version": 4, "addr": "192.168.120.14", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:78:5b:33"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:24:36.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-00003408", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:37.256 39 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 8 second wait 2020-11-06 18:24:37.641 39 INFO tempest.lib.common.rest_client [req-e6e28cfc-a5cb-44fc-a8c3-672a26a6d4c7 ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 200 POST http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50/os-volume_attachments 0.383s 2020-11-06 18:24:37.642 39 DEBUG tempest.lib.common.rest_client [req-e6e28cfc-a5cb-44fc-a8c3-672a26a6d4c7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volumeAttachment": {"volumeId": "16c1702b-fea8-45a8-b9b6-f356b6c349db", "device": "/dev/sdb"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '194', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e6e28cfc-a5cb-44fc-a8c3-672a26a6d4c7', 'x-compute-request-id': 'req-e6e28cfc-a5cb-44fc-a8c3-672a26a6d4c7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50/os-volume_attachments'} Body: b'{"volumeAttachment": {"id": "16c1702b-fea8-45a8-b9b6-f356b6c349db", "serverId": "ec954dca-1ed5-489c-9d18-eb370b6cde50", "volumeId": "16c1702b-fea8-45a8-b9b6-f356b6c349db", "device": "/dev/sdb"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:37.725 39 INFO tempest.lib.common.rest_client [req-4aac39a6-34de-4d4e-847f-1485871c4870 ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 200 GET http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db 0.079s 2020-11-06 18:24:37.725 39 DEBUG tempest.lib.common.rest_client [req-4aac39a6-34de-4d4e-847f-1485871c4870 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4aac39a6-34de-4d4e-847f-1485871c4870', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4aac39a6-34de-4d4e-847f-1485871c4870', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db'} Body: b'{"volume": {"id": "16c1702b-fea8-45a8-b9b6-f356b6c349db", "status": "reserved", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:24:27.000000", "updated_at": "2020-11-06T18:24:38.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-1212662060", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db"}], "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:38.820 39 INFO tempest.lib.common.rest_client [req-e4dc3e16-64ba-4ef9-b11f-6ca443d2fca0 ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 200 GET http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db 0.079s 2020-11-06 18:24:38.821 39 DEBUG tempest.lib.common.rest_client [req-e4dc3e16-64ba-4ef9-b11f-6ca443d2fca0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e4dc3e16-64ba-4ef9-b11f-6ca443d2fca0', 'content-length': '1369', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e4dc3e16-64ba-4ef9-b11f-6ca443d2fca0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db'} Body: b'{"volume": {"id": "16c1702b-fea8-45a8-b9b6-f356b6c349db", "status": "in-use", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:24:27.000000", "updated_at": "2020-11-06T18:24:39.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-1212662060", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db"}], "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [{"id": "16c1702b-fea8-45a8-b9b6-f356b6c349db", "attachment_id": "3492d790-8472-43e5-b3c6-934db9884822", "volume_id": "16c1702b-fea8-45a8-b9b6-f356b6c349db", "server_id": "ec954dca-1ed5-489c-9d18-eb370b6cde50", "host_name": "lf-virtual8", "device": "/dev/sdb", "attached_at": "2020-11-06T18:24:38.000000"}], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:38.834 39 INFO tempest.common.waiters [-] volume 16c1702b-fea8-45a8-b9b6-f356b6c349db reached in-use after waiting for 1.833983 seconds 2020-11-06 18:24:38.900 39 INFO tempest.lib.common.rest_client [req-1bd15e92-4e61-4e6e-8f10-07dca57c5a60 ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 200 GET http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db 0.066s 2020-11-06 18:24:38.900 39 DEBUG tempest.lib.common.rest_client [req-1bd15e92-4e61-4e6e-8f10-07dca57c5a60 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-1bd15e92-4e61-4e6e-8f10-07dca57c5a60', 'content-length': '1369', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1bd15e92-4e61-4e6e-8f10-07dca57c5a60', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db'} Body: b'{"volume": {"id": "16c1702b-fea8-45a8-b9b6-f356b6c349db", "status": "in-use", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:24:27.000000", "updated_at": "2020-11-06T18:24:39.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-1212662060", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db"}], "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [{"id": "16c1702b-fea8-45a8-b9b6-f356b6c349db", "attachment_id": "3492d790-8472-43e5-b3c6-934db9884822", "volume_id": "16c1702b-fea8-45a8-b9b6-f356b6c349db", "server_id": "ec954dca-1ed5-489c-9d18-eb370b6cde50", "host_name": "lf-virtual8", "device": "/dev/sdb", "attached_at": "2020-11-06T18:24:38.000000"}], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:39.055 39 INFO tempest.lib.common.rest_client [req-eac3a2e1-f81a-41f9-a89a-b9b78bffa33e ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 202 POST http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db/action 0.145s 2020-11-06 18:24:39.055 39 DEBUG tempest.lib.common.rest_client [req-eac3a2e1-f81a-41f9-a89a-b9b78bffa33e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-reset_status": {"status": "error"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-eac3a2e1-f81a-41f9-a89a-b9b78bffa33e', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-eac3a2e1-f81a-41f9-a89a-b9b78bffa33e', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:39.056 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:24:39.112 39 INFO tempest.lib.common.rest_client [req-3ae1cd2d-6065-4329-ab1c-321833b54280 ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 200 GET http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles 0.055s 2020-11-06 18:24:39.113 39 DEBUG tempest.lib.common.rest_client [req-3ae1cd2d-6065-4329-ab1c-321833b54280 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3ae1cd2d-6065-4329-ab1c-321833b54280', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:39.156 39 INFO tempest.lib.common.rest_client [req-2393e59e-2b66-474c-860e-3b4cadf50f29 ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-11-06 18:24:39.157 39 DEBUG tempest.lib.common.rest_client [req-2393e59e-2b66-474c-860e-3b4cadf50f29 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2393e59e-2b66-474c-860e-3b4cadf50f29', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1834e82c5f964d3fb50c3905a2d6c322", "name": "tempest-VolumesActionsV3RbacTest-1864572528", "password_expires_at": null}, "audit_ids": ["mIZsSzqCSjeEnUcwDQbvQw"], "expires_at": "2020-11-06T19:24:39.000000Z", "issued_at": "2020-11-06T18:24:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3c4e83d6ebae4a7c9f819f27a65f6954", "name": "tempest-VolumesActionsV3RbacTest-1864572528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:39.424 39 INFO tempest.lib.common.rest_client [req-fafdd716-d673-4516-99d6-b0ccb493ce98 ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 202 POST http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db/action 0.266s 2020-11-06 18:24:39.425 39 DEBUG tempest.lib.common.rest_client [req-fafdd716-d673-4516-99d6-b0ccb493ce98 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-force_detach": {"connector": null, "attachment_id": "3492d790-8472-43e5-b3c6-934db9884822"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-fafdd716-d673-4516-99d6-b0ccb493ce98', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-fafdd716-d673-4516-99d6-b0ccb493ce98', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:39.425 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:24:39.487 39 INFO tempest.lib.common.rest_client [req-0f2c5919-3bec-4da2-a7cf-6a66398e1b8f ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 200 GET http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles 0.061s 2020-11-06 18:24:39.488 39 DEBUG tempest.lib.common.rest_client [req-0f2c5919-3bec-4da2-a7cf-6a66398e1b8f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0f2c5919-3bec-4da2-a7cf-6a66398e1b8f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:39.527 39 INFO tempest.lib.common.rest_client [req-aedceb51-a096-4284-8d07-d00660fa277c ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:24:39.527 39 DEBUG tempest.lib.common.rest_client [req-aedceb51-a096-4284-8d07-d00660fa277c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aedceb51-a096-4284-8d07-d00660fa277c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1834e82c5f964d3fb50c3905a2d6c322", "name": "tempest-VolumesActionsV3RbacTest-1864572528", "password_expires_at": null}, "audit_ids": ["FfkdPgEZRuSzLDjcO0f3yQ"], "expires_at": "2020-11-06T19:24:39.000000Z", "issued_at": "2020-11-06T18:24:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3c4e83d6ebae4a7c9f819f27a65f6954", "name": "tempest-VolumesActionsV3RbacTest-1864572528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:39.657 39 INFO tempest.lib.common.rest_client [req-c2708a20-e9c5-4bc5-a66c-5e36dcf79591 ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 200 GET http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db 0.129s 2020-11-06 18:24:39.658 39 DEBUG tempest.lib.common.rest_client [req-c2708a20-e9c5-4bc5-a66c-5e36dcf79591 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c2708a20-e9c5-4bc5-a66c-5e36dcf79591', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c2708a20-e9c5-4bc5-a66c-5e36dcf79591', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db'} Body: b'{"volume": {"id": "16c1702b-fea8-45a8-b9b6-f356b6c349db", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:24:27.000000", "updated_at": "2020-11-06T18:24:39.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-1212662060", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db"}], "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:39.673 39 INFO tempest.common.waiters [-] volume 16c1702b-fea8-45a8-b9b6-f356b6c349db reached available after waiting for 0.673241 seconds 2020-11-06 18:24:39.762 39 INFO tempest.lib.common.rest_client [req-ee62a703-af5f-475d-a797-6944cf5756c4 ] Request (VolumesActionsV3RbacTest:_run_cleanups): 202 POST http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db/action 0.088s 2020-11-06 18:24:39.762 39 DEBUG tempest.lib.common.rest_client [req-ee62a703-af5f-475d-a797-6944cf5756c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-detach": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-ee62a703-af5f-475d-a797-6944cf5756c4', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ee62a703-af5f-475d-a797-6944cf5756c4', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:39.831 39 INFO tempest.lib.common.rest_client [req-3584f748-528e-4718-8fb5-661bd3dc0856 ] Request (VolumesActionsV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db 0.068s 2020-11-06 18:24:39.832 39 DEBUG tempest.lib.common.rest_client [req-3584f748-528e-4718-8fb5-661bd3dc0856 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-3584f748-528e-4718-8fb5-661bd3dc0856', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3584f748-528e-4718-8fb5-661bd3dc0856', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db'} Body: b'{"volume": {"id": "16c1702b-fea8-45a8-b9b6-f356b6c349db", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:24:27.000000", "updated_at": "2020-11-06T18:24:40.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-1212662060", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db"}], "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:39.847 39 INFO tempest.common.waiters [-] volume 16c1702b-fea8-45a8-b9b6-f356b6c349db reached available after waiting for 0.847105 seconds 2020-11-06 18:24:40.032 39 INFO tempest.lib.common.rest_client [req-a25f6f69-0d4c-4f31-a7a4-3fdd58f8ea9c ] Request (VolumesActionsV3RbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50 0.184s 2020-11-06 18:24:40.032 39 DEBUG tempest.lib.common.rest_client [req-a25f6f69-0d4c-4f31-a7a4-3fdd58f8ea9c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a25f6f69-0d4c-4f31-a7a4-3fdd58f8ea9c', 'x-compute-request-id': 'req-a25f6f69-0d4c-4f31-a7a4-3fdd58f8ea9c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:40.233 39 INFO tempest.lib.common.rest_client [req-a0075379-250e-45b0-9520-99cad2c556db ] Request (VolumesActionsV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50 0.199s 2020-11-06 18:24:40.234 39 DEBUG tempest.lib.common.rest_client [req-a0075379-250e-45b0-9520-99cad2c556db ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1775', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a0075379-250e-45b0-9520-99cad2c556db', 'x-compute-request-id': 'req-a0075379-250e-45b0-9520-99cad2c556db', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50'} Body: b'{"server": {"id": "ec954dca-1ed5-489c-9d18-eb370b6cde50", "name": "tempest-tempest.common.compute-instance-1751258777", "status": "ACTIVE", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "metadata": {}, "hostId": "9d38216a8681ea9f79f9177069aaf0926d8c6ffd4e14e52873b6d0ac", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:24:29Z", "updated": "2020-11-06T18:24:40Z", "addresses": {"tempest-VolumesActionsV3RbacTest-38180919-network": [{"version": 4, "addr": "192.168.120.14", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:78:5b:33"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:24:36.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-00003408", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [{"id": "16c1702b-fea8-45a8-b9b6-f356b6c349db"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:41.362 39 INFO tempest.lib.common.rest_client [req-00ac4ba0-615d-40dd-b698-c453318fc3d7 ] Request (VolumesActionsV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50 0.111s 2020-11-06 18:24:41.363 39 DEBUG tempest.lib.common.rest_client [req-00ac4ba0-615d-40dd-b698-c453318fc3d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1733', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-00ac4ba0-615d-40dd-b698-c453318fc3d7', 'x-compute-request-id': 'req-00ac4ba0-615d-40dd-b698-c453318fc3d7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50'} Body: b'{"server": {"id": "ec954dca-1ed5-489c-9d18-eb370b6cde50", "name": "tempest-tempest.common.compute-instance-1751258777", "status": "ACTIVE", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "metadata": {}, "hostId": "9d38216a8681ea9f79f9177069aaf0926d8c6ffd4e14e52873b6d0ac", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:24:29Z", "updated": "2020-11-06T18:24:41Z", "addresses": {"tempest-VolumesActionsV3RbacTest-38180919-network": [{"version": 4, "addr": "192.168.120.14", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:78:5b:33"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:24:36.000000", "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-00003408", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [{"id": "16c1702b-fea8-45a8-b9b6-f356b6c349db"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:42.532 39 INFO tempest.lib.common.rest_client [req-7b29e91f-465f-4d1d-add5-5b1437fe83da ] Request (VolumesActionsV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50 0.157s 2020-11-06 18:24:42.533 39 DEBUG tempest.lib.common.rest_client [req-7b29e91f-465f-4d1d-add5-5b1437fe83da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1733', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7b29e91f-465f-4d1d-add5-5b1437fe83da', 'x-compute-request-id': 'req-7b29e91f-465f-4d1d-add5-5b1437fe83da', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50'} Body: b'{"server": {"id": "ec954dca-1ed5-489c-9d18-eb370b6cde50", "name": "tempest-tempest.common.compute-instance-1751258777", "status": "ACTIVE", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "metadata": {}, "hostId": "9d38216a8681ea9f79f9177069aaf0926d8c6ffd4e14e52873b6d0ac", "image": {"id": "56b368f6-9136-40ec-a04c-564d02c95e42", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/56b368f6-9136-40ec-a04c-564d02c95e42"}]}, "flavor": {"id": "fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/fe87c982-6a4f-4fa8-a9e4-2279ac9acc9e"}]}, "created": "2020-11-06T18:24:29Z", "updated": "2020-11-06T18:24:41Z", "addresses": {"tempest-VolumesActionsV3RbacTest-38180919-network": [{"version": 4, "addr": "192.168.120.14", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:78:5b:33"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-11-06T18:24:36.000000", "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-00003408", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [{"id": "16c1702b-fea8-45a8-b9b6-f356b6c349db"}]}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:43.615 39 INFO tempest.lib.common.rest_client [req-9f913542-595e-4406-8fa9-733d11a77e32 ] Request (VolumesActionsV3RbacTest:_run_cleanups): 404 GET http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50 0.064s 2020-11-06 18:24:43.616 39 DEBUG tempest.lib.common.rest_client [req-9f913542-595e-4406-8fa9-733d11a77e32 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-9f913542-595e-4406-8fa9-733d11a77e32', 'x-compute-request-id': 'req-9f913542-595e-4406-8fa9-733d11a77e32', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ec954dca-1ed5-489c-9d18-eb370b6cde50'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance ec954dca-1ed5-489c-9d18-eb370b6cde50 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:43.622 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:24:43.625 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_admin_actions:force_delete, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:24:43.896 39 INFO tempest.lib.common.rest_client [req-e1c70540-dac9-4895-beca-cd3ae8e85c75 ] Request (VolumesActionsV3RbacTest:test_volume_force_delete): 202 POST http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes 0.269s 2020-11-06 18:24:43.896 39 DEBUG tempest.lib.common.rest_client [req-e1c70540-dac9-4895-beca-cd3ae8e85c75 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-VolumesActionsV3RbacTest-Volume-798570451"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e1c70540-dac9-4895-beca-cd3ae8e85c75', 'content-length': '844', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e1c70540-dac9-4895-beca-cd3ae8e85c75', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes'} Body: b'{"volume": {"id": "264106db-d232-4e01-b165-a4452d06ad0f", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:24:44.000000", "updated_at": null, "name": "tempest-VolumesActionsV3RbacTest-Volume-798570451", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/264106db-d232-4e01-b165-a4452d06ad0f"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/264106db-d232-4e01-b165-a4452d06ad0f"}], "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:43.976 39 INFO tempest.lib.common.rest_client [req-6ac782da-f4fe-4200-b1e4-59a91c106932 ] Request (VolumesActionsV3RbacTest:test_volume_force_delete): 200 GET http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/264106db-d232-4e01-b165-a4452d06ad0f 0.067s 2020-11-06 18:24:43.976 39 DEBUG tempest.lib.common.rest_client [req-6ac782da-f4fe-4200-b1e4-59a91c106932 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6ac782da-f4fe-4200-b1e4-59a91c106932', 'content-length': '1066', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6ac782da-f4fe-4200-b1e4-59a91c106932', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/264106db-d232-4e01-b165-a4452d06ad0f'} Body: b'{"volume": {"id": "264106db-d232-4e01-b165-a4452d06ad0f", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:24:44.000000", "updated_at": "2020-11-06T18:24:44.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-798570451", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/264106db-d232-4e01-b165-a4452d06ad0f"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/264106db-d232-4e01-b165-a4452d06ad0f"}], "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:45.065 39 INFO tempest.lib.common.rest_client [req-0ae8bbaf-431f-44ce-b8d7-642c4d55477b ] Request (VolumesActionsV3RbacTest:test_volume_force_delete): 200 GET http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/264106db-d232-4e01-b165-a4452d06ad0f 0.072s 2020-11-06 18:24:45.065 39 DEBUG tempest.lib.common.rest_client [req-0ae8bbaf-431f-44ce-b8d7-642c4d55477b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-0ae8bbaf-431f-44ce-b8d7-642c4d55477b', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0ae8bbaf-431f-44ce-b8d7-642c4d55477b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/264106db-d232-4e01-b165-a4452d06ad0f'} Body: b'{"volume": {"id": "264106db-d232-4e01-b165-a4452d06ad0f", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:24:44.000000", "updated_at": "2020-11-06T18:24:44.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-798570451", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/264106db-d232-4e01-b165-a4452d06ad0f"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/264106db-d232-4e01-b165-a4452d06ad0f"}], "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:45.076 39 INFO tempest.common.waiters [-] volume 264106db-d232-4e01-b165-a4452d06ad0f reached available after waiting for 2.076813 seconds 2020-11-06 18:24:45.238 39 INFO tempest.lib.common.rest_client [req-64e7f551-6684-42d6-93bd-a38066662075 ] Request (VolumesActionsV3RbacTest:test_volume_force_delete): 202 POST http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/264106db-d232-4e01-b165-a4452d06ad0f/action 0.161s 2020-11-06 18:24:45.239 39 DEBUG tempest.lib.common.rest_client [req-64e7f551-6684-42d6-93bd-a38066662075 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-reset_status": {"status": "error"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-64e7f551-6684-42d6-93bd-a38066662075', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-64e7f551-6684-42d6-93bd-a38066662075', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/264106db-d232-4e01-b165-a4452d06ad0f/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:45.240 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:24:45.404 39 INFO tempest.lib.common.rest_client [req-e4ddc348-fa3f-4086-843c-e3096dca5e8e ] Request (VolumesActionsV3RbacTest:test_volume_force_delete): 200 GET http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles 0.164s 2020-11-06 18:24:45.405 39 DEBUG tempest.lib.common.rest_client [req-e4ddc348-fa3f-4086-843c-e3096dca5e8e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e4ddc348-fa3f-4086-843c-e3096dca5e8e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:45.506 39 INFO tempest.lib.common.rest_client [req-ef3f267a-9cbc-4b9d-9bab-68989ca11a2f ] Request (VolumesActionsV3RbacTest:test_volume_force_delete): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.100s 2020-11-06 18:24:45.507 39 DEBUG tempest.lib.common.rest_client [req-ef3f267a-9cbc-4b9d-9bab-68989ca11a2f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ef3f267a-9cbc-4b9d-9bab-68989ca11a2f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1834e82c5f964d3fb50c3905a2d6c322", "name": "tempest-VolumesActionsV3RbacTest-1864572528", "password_expires_at": null}, "audit_ids": ["MZxY5zc1TFaEWTm4GznWKA"], "expires_at": "2020-11-06T19:24:45.000000Z", "issued_at": "2020-11-06T18:24:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3c4e83d6ebae4a7c9f819f27a65f6954", "name": "tempest-VolumesActionsV3RbacTest-1864572528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:45.749 39 INFO tempest.lib.common.rest_client [req-65a2c481-91f7-4900-a145-49b908974908 ] Request (VolumesActionsV3RbacTest:test_volume_force_delete): 202 POST http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/264106db-d232-4e01-b165-a4452d06ad0f/action 0.241s 2020-11-06 18:24:45.750 39 DEBUG tempest.lib.common.rest_client [req-65a2c481-91f7-4900-a145-49b908974908 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-force_delete": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-65a2c481-91f7-4900-a145-49b908974908', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-65a2c481-91f7-4900-a145-49b908974908', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/264106db-d232-4e01-b165-a4452d06ad0f/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:45.750 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:24:45.801 39 INFO tempest.lib.common.rest_client [req-78a9f2b0-8a6a-46eb-9d6e-1511e134da22 ] Request (VolumesActionsV3RbacTest:test_volume_force_delete): 200 GET http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles 0.050s 2020-11-06 18:24:45.801 39 DEBUG tempest.lib.common.rest_client [req-78a9f2b0-8a6a-46eb-9d6e-1511e134da22 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-78a9f2b0-8a6a-46eb-9d6e-1511e134da22', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:45.842 39 INFO tempest.lib.common.rest_client [req-ab8f39f6-876a-452b-9759-97a92755ad70 ] Request (VolumesActionsV3RbacTest:test_volume_force_delete): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:24:45.843 39 DEBUG tempest.lib.common.rest_client [req-ab8f39f6-876a-452b-9759-97a92755ad70 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ab8f39f6-876a-452b-9759-97a92755ad70', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1834e82c5f964d3fb50c3905a2d6c322", "name": "tempest-VolumesActionsV3RbacTest-1864572528", "password_expires_at": null}, "audit_ids": ["VAUwTel-R7OPtXxrz7NTTg"], "expires_at": "2020-11-06T19:24:45.000000Z", "issued_at": "2020-11-06T18:24:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3c4e83d6ebae4a7c9f819f27a65f6954", "name": "tempest-VolumesActionsV3RbacTest-1864572528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:45.993 39 INFO tempest.lib.common.rest_client [req-3281a68a-7c28-4ba0-8bb8-8dc204d772ca ] Request (VolumesActionsV3RbacTest:test_volume_force_delete): 200 GET http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/264106db-d232-4e01-b165-a4452d06ad0f 0.148s 2020-11-06 18:24:45.993 39 DEBUG tempest.lib.common.rest_client [req-3281a68a-7c28-4ba0-8bb8-8dc204d772ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-3281a68a-7c28-4ba0-8bb8-8dc204d772ca', 'content-length': '1066', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3281a68a-7c28-4ba0-8bb8-8dc204d772ca', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/264106db-d232-4e01-b165-a4452d06ad0f'} Body: b'{"volume": {"id": "264106db-d232-4e01-b165-a4452d06ad0f", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:24:44.000000", "updated_at": "2020-11-06T18:24:46.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-798570451", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/264106db-d232-4e01-b165-a4452d06ad0f"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/264106db-d232-4e01-b165-a4452d06ad0f"}], "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:47.056 39 INFO tempest.lib.common.rest_client [req-f4e796f8-edc5-4c7c-ac91-319f124cdc58 ] Request (VolumesActionsV3RbacTest:test_volume_force_delete): 404 GET http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/264106db-d232-4e01-b165-a4452d06ad0f 0.048s 2020-11-06 18:24:47.056 39 DEBUG tempest.lib.common.rest_client [req-f4e796f8-edc5-4c7c-ac91-319f124cdc58 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-f4e796f8-edc5-4c7c-ac91-319f124cdc58', 'x-openstack-request-id': 'req-f4e796f8-edc5-4c7c-ac91-319f124cdc58', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/264106db-d232-4e01-b165-a4452d06ad0f'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 264106db-d232-4e01-b165-a4452d06ad0f could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:47.059 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:24:47.062 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:update_readonly_flag, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:24:47.062 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:24:47.118 39 INFO tempest.lib.common.rest_client [req-4dd36967-8184-4445-b2ec-b6e1b5dc6d63 ] Request (VolumesActionsV3RbacTest:test_volume_readonly_update): 200 GET http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles 0.055s 2020-11-06 18:24:47.119 39 DEBUG tempest.lib.common.rest_client [req-4dd36967-8184-4445-b2ec-b6e1b5dc6d63 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4dd36967-8184-4445-b2ec-b6e1b5dc6d63', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:47.152 39 INFO tempest.lib.common.rest_client [req-242e7ee8-6175-47e6-af22-558450bd068f ] Request (VolumesActionsV3RbacTest:test_volume_readonly_update): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:24:47.153 39 DEBUG tempest.lib.common.rest_client [req-242e7ee8-6175-47e6-af22-558450bd068f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-242e7ee8-6175-47e6-af22-558450bd068f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1834e82c5f964d3fb50c3905a2d6c322", "name": "tempest-VolumesActionsV3RbacTest-1864572528", "password_expires_at": null}, "audit_ids": ["1AirIIjETe-jEVe7o8VJzg"], "expires_at": "2020-11-06T19:24:47.000000Z", "issued_at": "2020-11-06T18:24:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3c4e83d6ebae4a7c9f819f27a65f6954", "name": "tempest-VolumesActionsV3RbacTest-1864572528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:47.284 39 INFO tempest.lib.common.rest_client [req-8b015f80-e89e-45bc-a1b7-01490140eecf ] Request (VolumesActionsV3RbacTest:test_volume_readonly_update): 202 POST http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b/action 0.129s 2020-11-06 18:24:47.285 39 DEBUG tempest.lib.common.rest_client [req-8b015f80-e89e-45bc-a1b7-01490140eecf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-update_readonly_flag": {"readonly": true}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-8b015f80-e89e-45bc-a1b7-01490140eecf', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8b015f80-e89e-45bc-a1b7-01490140eecf', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:47.285 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:24:47.342 39 INFO tempest.lib.common.rest_client [req-4468ce55-72f5-4889-8590-3d161cc402cd ] Request (VolumesActionsV3RbacTest:test_volume_readonly_update): 200 GET http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles 0.055s 2020-11-06 18:24:47.342 39 DEBUG tempest.lib.common.rest_client [req-4468ce55-72f5-4889-8590-3d161cc402cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4468ce55-72f5-4889-8590-3d161cc402cd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:47.381 39 INFO tempest.lib.common.rest_client [req-7ca55b7f-38d7-4671-9d65-27a476836c99 ] Request (VolumesActionsV3RbacTest:test_volume_readonly_update): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:24:47.382 39 DEBUG tempest.lib.common.rest_client [req-7ca55b7f-38d7-4671-9d65-27a476836c99 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7ca55b7f-38d7-4671-9d65-27a476836c99', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1834e82c5f964d3fb50c3905a2d6c322", "name": "tempest-VolumesActionsV3RbacTest-1864572528", "password_expires_at": null}, "audit_ids": ["erENY1k1QZWvDqgzq_AZBQ"], "expires_at": "2020-11-06T19:24:47.000000Z", "issued_at": "2020-11-06T18:24:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3c4e83d6ebae4a7c9f819f27a65f6954", "name": "tempest-VolumesActionsV3RbacTest-1864572528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:47.525 39 INFO tempest.lib.common.rest_client [req-aa25b7c9-3e39-4ceb-8fe3-7580d2b3bbb2 ] Request (VolumesActionsV3RbacTest:_run_cleanups): 202 POST http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b/action 0.141s 2020-11-06 18:24:47.525 39 DEBUG tempest.lib.common.rest_client [req-aa25b7c9-3e39-4ceb-8fe3-7580d2b3bbb2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-update_readonly_flag": {"readonly": false}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-aa25b7c9-3e39-4ceb-8fe3-7580d2b3bbb2', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-aa25b7c9-3e39-4ceb-8fe3-7580d2b3bbb2', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:47.527 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:24:47.529 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_actions:reserve, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:24:47.529 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:24:47.584 39 INFO tempest.lib.common.rest_client [req-c505daab-a474-4700-8518-2302f728bce9 ] Request (VolumesActionsV3RbacTest:test_volume_reserve): 200 GET http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles 0.053s 2020-11-06 18:24:47.584 39 DEBUG tempest.lib.common.rest_client [req-c505daab-a474-4700-8518-2302f728bce9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c505daab-a474-4700-8518-2302f728bce9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:47.625 39 INFO tempest.lib.common.rest_client [req-7cbed84b-c704-4ce6-8687-a614e2e1e82b ] Request (VolumesActionsV3RbacTest:test_volume_reserve): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:24:47.626 39 DEBUG tempest.lib.common.rest_client [req-7cbed84b-c704-4ce6-8687-a614e2e1e82b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7cbed84b-c704-4ce6-8687-a614e2e1e82b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1834e82c5f964d3fb50c3905a2d6c322", "name": "tempest-VolumesActionsV3RbacTest-1864572528", "password_expires_at": null}, "audit_ids": ["mNhKzj-sRiSuwsvNvrLlAw"], "expires_at": "2020-11-06T19:24:47.000000Z", "issued_at": "2020-11-06T18:24:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3c4e83d6ebae4a7c9f819f27a65f6954", "name": "tempest-VolumesActionsV3RbacTest-1864572528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:47.746 39 INFO tempest.lib.common.rest_client [req-64474dd5-5fb6-4877-ab54-902e75117088 ] Request (VolumesActionsV3RbacTest:test_volume_reserve): 202 POST http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b/action 0.119s 2020-11-06 18:24:47.747 39 DEBUG tempest.lib.common.rest_client [req-64474dd5-5fb6-4877-ab54-902e75117088 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-reserve": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-64474dd5-5fb6-4877-ab54-902e75117088', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-64474dd5-5fb6-4877-ab54-902e75117088', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:47.747 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:24:47.799 39 INFO tempest.lib.common.rest_client [req-4b819a30-d8bf-4f43-9855-0fffd212cf1d ] Request (VolumesActionsV3RbacTest:test_volume_reserve): 200 GET http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles 0.051s 2020-11-06 18:24:47.800 39 DEBUG tempest.lib.common.rest_client [req-4b819a30-d8bf-4f43-9855-0fffd212cf1d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4b819a30-d8bf-4f43-9855-0fffd212cf1d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:47.840 39 INFO tempest.lib.common.rest_client [req-0ab896dc-5fbd-495b-98c7-502377295a4d ] Request (VolumesActionsV3RbacTest:test_volume_reserve): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:24:47.840 39 DEBUG tempest.lib.common.rest_client [req-0ab896dc-5fbd-495b-98c7-502377295a4d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0ab896dc-5fbd-495b-98c7-502377295a4d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1834e82c5f964d3fb50c3905a2d6c322", "name": "tempest-VolumesActionsV3RbacTest-1864572528", "password_expires_at": null}, "audit_ids": ["ZINcNTwoTMi6jwYuyZA1LQ"], "expires_at": "2020-11-06T19:24:47.000000Z", "issued_at": "2020-11-06T18:24:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3c4e83d6ebae4a7c9f819f27a65f6954", "name": "tempest-VolumesActionsV3RbacTest-1864572528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:47.843 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:24:47.846 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_admin_actions:reset_status, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:24:48.207 39 INFO tempest.lib.common.rest_client [req-64c259bf-8204-4d50-bdf9-d9013d9f2aae ] Request (VolumesActionsV3RbacTest:test_volume_reset_status): 202 POST http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes 0.359s 2020-11-06 18:24:48.207 39 DEBUG tempest.lib.common.rest_client [req-64c259bf-8204-4d50-bdf9-d9013d9f2aae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-VolumesActionsV3RbacTest-Volume-828456299"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-64c259bf-8204-4d50-bdf9-d9013d9f2aae', 'content-length': '844', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-64c259bf-8204-4d50-bdf9-d9013d9f2aae', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes'} Body: b'{"volume": {"id": "03749c6c-43f0-428d-815d-113b8c0fb40e", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:24:48.000000", "updated_at": null, "name": "tempest-VolumesActionsV3RbacTest-Volume-828456299", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/03749c6c-43f0-428d-815d-113b8c0fb40e"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/03749c6c-43f0-428d-815d-113b8c0fb40e"}], "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:48.292 39 INFO tempest.lib.common.rest_client [req-252627b4-1917-4336-b402-cacccd79ef28 ] Request (VolumesActionsV3RbacTest:test_volume_reset_status): 200 GET http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/03749c6c-43f0-428d-815d-113b8c0fb40e 0.070s 2020-11-06 18:24:48.292 39 DEBUG tempest.lib.common.rest_client [req-252627b4-1917-4336-b402-cacccd79ef28 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-252627b4-1917-4336-b402-cacccd79ef28', 'content-length': '1066', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-252627b4-1917-4336-b402-cacccd79ef28', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/03749c6c-43f0-428d-815d-113b8c0fb40e'} Body: b'{"volume": {"id": "03749c6c-43f0-428d-815d-113b8c0fb40e", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:24:48.000000", "updated_at": "2020-11-06T18:24:48.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-828456299", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/03749c6c-43f0-428d-815d-113b8c0fb40e"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/03749c6c-43f0-428d-815d-113b8c0fb40e"}], "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:49.375 39 INFO tempest.lib.common.rest_client [req-00b572e5-99eb-4e58-bf81-c27a3650db8a ] Request (VolumesActionsV3RbacTest:test_volume_reset_status): 200 GET http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/03749c6c-43f0-428d-815d-113b8c0fb40e 0.067s 2020-11-06 18:24:49.376 39 DEBUG tempest.lib.common.rest_client [req-00b572e5-99eb-4e58-bf81-c27a3650db8a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-00b572e5-99eb-4e58-bf81-c27a3650db8a', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-00b572e5-99eb-4e58-bf81-c27a3650db8a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/03749c6c-43f0-428d-815d-113b8c0fb40e'} Body: b'{"volume": {"id": "03749c6c-43f0-428d-815d-113b8c0fb40e", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:24:48.000000", "updated_at": "2020-11-06T18:24:49.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-828456299", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/03749c6c-43f0-428d-815d-113b8c0fb40e"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/03749c6c-43f0-428d-815d-113b8c0fb40e"}], "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:49.390 39 INFO tempest.common.waiters [-] volume 03749c6c-43f0-428d-815d-113b8c0fb40e reached available after waiting for 1.390809 seconds 2020-11-06 18:24:49.391 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:24:49.439 39 INFO tempest.lib.common.rest_client [req-fb89ff43-eb07-40c5-85a3-623f7b385e35 ] Request (VolumesActionsV3RbacTest:test_volume_reset_status): 200 GET http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles 0.047s 2020-11-06 18:24:49.439 39 DEBUG tempest.lib.common.rest_client [req-fb89ff43-eb07-40c5-85a3-623f7b385e35 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fb89ff43-eb07-40c5-85a3-623f7b385e35', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:49.477 39 INFO tempest.lib.common.rest_client [req-181f8a7e-d784-41ed-a175-8715d3e469bf ] Request (VolumesActionsV3RbacTest:test_volume_reset_status): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:24:49.477 39 DEBUG tempest.lib.common.rest_client [req-181f8a7e-d784-41ed-a175-8715d3e469bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-181f8a7e-d784-41ed-a175-8715d3e469bf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1834e82c5f964d3fb50c3905a2d6c322", "name": "tempest-VolumesActionsV3RbacTest-1864572528", "password_expires_at": null}, "audit_ids": ["lxG-ZtwOR7Gdj_Qfhl0sOQ"], "expires_at": "2020-11-06T19:24:49.000000Z", "issued_at": "2020-11-06T18:24:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3c4e83d6ebae4a7c9f819f27a65f6954", "name": "tempest-VolumesActionsV3RbacTest-1864572528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:49.650 39 INFO tempest.lib.common.rest_client [req-b13e6dfa-04e3-49b1-8a56-ec27a50d0a85 ] Request (VolumesActionsV3RbacTest:test_volume_reset_status): 202 POST http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/03749c6c-43f0-428d-815d-113b8c0fb40e/action 0.171s 2020-11-06 18:24:49.651 39 DEBUG tempest.lib.common.rest_client [req-b13e6dfa-04e3-49b1-8a56-ec27a50d0a85 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-reset_status": {"status": "error"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-b13e6dfa-04e3-49b1-8a56-ec27a50d0a85', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b13e6dfa-04e3-49b1-8a56-ec27a50d0a85', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/03749c6c-43f0-428d-815d-113b8c0fb40e/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:49.651 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:24:49.699 39 INFO tempest.lib.common.rest_client [req-047bc762-3f4a-4e31-b696-3b6454c4db23 ] Request (VolumesActionsV3RbacTest:test_volume_reset_status): 200 GET http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles 0.047s 2020-11-06 18:24:49.700 39 DEBUG tempest.lib.common.rest_client [req-047bc762-3f4a-4e31-b696-3b6454c4db23 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-047bc762-3f4a-4e31-b696-3b6454c4db23', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:49.732 39 INFO tempest.lib.common.rest_client [req-dc513c42-196e-4722-a425-7bb5fb0d469b ] Request (VolumesActionsV3RbacTest:test_volume_reset_status): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-11-06 18:24:49.732 39 DEBUG tempest.lib.common.rest_client [req-dc513c42-196e-4722-a425-7bb5fb0d469b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dc513c42-196e-4722-a425-7bb5fb0d469b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1834e82c5f964d3fb50c3905a2d6c322", "name": "tempest-VolumesActionsV3RbacTest-1864572528", "password_expires_at": null}, "audit_ids": ["RPvwz3F1TXKSUJxKYcfzRA"], "expires_at": "2020-11-06T19:24:49.000000Z", "issued_at": "2020-11-06T18:24:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3c4e83d6ebae4a7c9f819f27a65f6954", "name": "tempest-VolumesActionsV3RbacTest-1864572528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:49.735 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:24:49.738 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:retype, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:24:49.835 39 INFO tempest.lib.common.rest_client [req-4b81eaf3-577b-41c3-abbc-dc7eeecc8189 ] Request (VolumesActionsV3RbacTest:test_volume_retype): 200 POST http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/types 0.096s 2020-11-06 18:24:49.836 39 DEBUG tempest.lib.common.rest_client [req-4b81eaf3-577b-41c3-abbc-dc7eeecc8189 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-VolumesActionsV3RbacTest-volume-type-1110324391"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4b81eaf3-577b-41c3-abbc-dc7eeecc8189', 'content-length': '230', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4b81eaf3-577b-41c3-abbc-dc7eeecc8189', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/types'} Body: b'{"volume_type": {"id": "0372f102-586e-4c4b-9017-7b3dfed6f52f", "name": "tempest-VolumesActionsV3RbacTest-volume-type-1110324391", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:50.081 39 INFO tempest.lib.common.rest_client [req-aa584a75-f019-453a-bceb-d55eb21f7e34 ] Request (VolumesActionsV3RbacTest:test_volume_retype): 202 POST http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes 0.240s 2020-11-06 18:24:50.082 39 DEBUG tempest.lib.common.rest_client [req-aa584a75-f019-453a-bceb-d55eb21f7e34 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-VolumesActionsV3RbacTest-Volume-598563614"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-aa584a75-f019-453a-bceb-d55eb21f7e34', 'content-length': '844', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-aa584a75-f019-453a-bceb-d55eb21f7e34', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes'} Body: b'{"volume": {"id": "976f2bdc-f0c5-4d4c-8466-d622c679ca89", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:24:50.000000", "updated_at": null, "name": "tempest-VolumesActionsV3RbacTest-Volume-598563614", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/976f2bdc-f0c5-4d4c-8466-d622c679ca89"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/976f2bdc-f0c5-4d4c-8466-d622c679ca89"}], "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:50.165 39 INFO tempest.lib.common.rest_client [req-6104f382-9cd8-481e-8c77-4fa72c6a5500 ] Request (VolumesActionsV3RbacTest:test_volume_retype): 200 GET http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/976f2bdc-f0c5-4d4c-8466-d622c679ca89 0.069s 2020-11-06 18:24:50.165 39 DEBUG tempest.lib.common.rest_client [req-6104f382-9cd8-481e-8c77-4fa72c6a5500 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6104f382-9cd8-481e-8c77-4fa72c6a5500', 'content-length': '1066', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6104f382-9cd8-481e-8c77-4fa72c6a5500', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/976f2bdc-f0c5-4d4c-8466-d622c679ca89'} Body: b'{"volume": {"id": "976f2bdc-f0c5-4d4c-8466-d622c679ca89", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:24:50.000000", "updated_at": "2020-11-06T18:24:50.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-598563614", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/976f2bdc-f0c5-4d4c-8466-d622c679ca89"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/976f2bdc-f0c5-4d4c-8466-d622c679ca89"}], "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:51.253 39 INFO tempest.lib.common.rest_client [req-66c41d55-eeda-4fa1-a075-6a31819ce8df ] Request (VolumesActionsV3RbacTest:test_volume_retype): 200 GET http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/976f2bdc-f0c5-4d4c-8466-d622c679ca89 0.073s 2020-11-06 18:24:51.253 39 DEBUG tempest.lib.common.rest_client [req-66c41d55-eeda-4fa1-a075-6a31819ce8df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-66c41d55-eeda-4fa1-a075-6a31819ce8df', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-66c41d55-eeda-4fa1-a075-6a31819ce8df', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/976f2bdc-f0c5-4d4c-8466-d622c679ca89'} Body: b'{"volume": {"id": "976f2bdc-f0c5-4d4c-8466-d622c679ca89", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:24:50.000000", "updated_at": "2020-11-06T18:24:50.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-598563614", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/976f2bdc-f0c5-4d4c-8466-d622c679ca89"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/976f2bdc-f0c5-4d4c-8466-d622c679ca89"}], "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:51.267 39 INFO tempest.common.waiters [-] volume 976f2bdc-f0c5-4d4c-8466-d622c679ca89 reached available after waiting for 1.267451 seconds 2020-11-06 18:24:51.267 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:24:51.319 39 INFO tempest.lib.common.rest_client [req-3d109dea-41d1-407c-9093-0b56c2946a18 ] Request (VolumesActionsV3RbacTest:test_volume_retype): 200 GET http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles 0.051s 2020-11-06 18:24:51.320 39 DEBUG tempest.lib.common.rest_client [req-3d109dea-41d1-407c-9093-0b56c2946a18 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3d109dea-41d1-407c-9093-0b56c2946a18', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:51.357 39 INFO tempest.lib.common.rest_client [req-201602f3-f296-468d-8f97-715d198ed0c0 ] Request (VolumesActionsV3RbacTest:test_volume_retype): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:24:51.358 39 DEBUG tempest.lib.common.rest_client [req-201602f3-f296-468d-8f97-715d198ed0c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-201602f3-f296-468d-8f97-715d198ed0c0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1834e82c5f964d3fb50c3905a2d6c322", "name": "tempest-VolumesActionsV3RbacTest-1864572528", "password_expires_at": null}, "audit_ids": ["tA6mxdh6SQaT5ZxHMFIR9g"], "expires_at": "2020-11-06T19:24:51.000000Z", "issued_at": "2020-11-06T18:24:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3c4e83d6ebae4a7c9f819f27a65f6954", "name": "tempest-VolumesActionsV3RbacTest-1864572528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:51.615 39 INFO tempest.lib.common.rest_client [req-6a766c19-b1f2-464e-a6ad-f4d62a4a85e5 ] Request (VolumesActionsV3RbacTest:test_volume_retype): 202 POST http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/976f2bdc-f0c5-4d4c-8466-d622c679ca89/action 0.256s 2020-11-06 18:24:51.616 39 DEBUG tempest.lib.common.rest_client [req-6a766c19-b1f2-464e-a6ad-f4d62a4a85e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-retype": {"new_type": "tempest-VolumesActionsV3RbacTest-volume-type-1110324391"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-6a766c19-b1f2-464e-a6ad-f4d62a4a85e5', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6a766c19-b1f2-464e-a6ad-f4d62a4a85e5', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/976f2bdc-f0c5-4d4c-8466-d622c679ca89/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:51.617 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:24:51.667 39 INFO tempest.lib.common.rest_client [req-194767a7-08f9-4f81-9368-b3d37384cb23 ] Request (VolumesActionsV3RbacTest:test_volume_retype): 200 GET http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles 0.049s 2020-11-06 18:24:51.667 39 DEBUG tempest.lib.common.rest_client [req-194767a7-08f9-4f81-9368-b3d37384cb23 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-194767a7-08f9-4f81-9368-b3d37384cb23', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:51.704 39 INFO tempest.lib.common.rest_client [req-b8c49a6a-b8a3-4161-af49-e3e7afe4c583 ] Request (VolumesActionsV3RbacTest:test_volume_retype): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:24:51.704 39 DEBUG tempest.lib.common.rest_client [req-b8c49a6a-b8a3-4161-af49-e3e7afe4c583 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b8c49a6a-b8a3-4161-af49-e3e7afe4c583', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1834e82c5f964d3fb50c3905a2d6c322", "name": "tempest-VolumesActionsV3RbacTest-1864572528", "password_expires_at": null}, "audit_ids": ["1WGu1FafQQO8znoTFqUVOw"], "expires_at": "2020-11-06T19:24:51.000000Z", "issued_at": "2020-11-06T18:24:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3c4e83d6ebae4a7c9f819f27a65f6954", "name": "tempest-VolumesActionsV3RbacTest-1864572528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:51.841 39 INFO tempest.lib.common.rest_client [req-3a49b609-94c2-4763-8daf-6ab9a383375a ] Request (VolumesActionsV3RbacTest:test_volume_retype): 200 GET http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/976f2bdc-f0c5-4d4c-8466-d622c679ca89 0.136s 2020-11-06 18:24:51.842 39 DEBUG tempest.lib.common.rest_client [req-3a49b609-94c2-4763-8daf-6ab9a383375a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-3a49b609-94c2-4763-8daf-6ab9a383375a', 'content-length': '1118', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3a49b609-94c2-4763-8daf-6ab9a383375a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/976f2bdc-f0c5-4d4c-8466-d622c679ca89'} Body: b'{"volume": {"id": "976f2bdc-f0c5-4d4c-8466-d622c679ca89", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:24:50.000000", "updated_at": "2020-11-06T18:24:52.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-598563614", "description": null, "volume_type": "tempest-VolumesActionsV3RbacTest-volume-type-1110324391", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/976f2bdc-f0c5-4d4c-8466-d622c679ca89"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/976f2bdc-f0c5-4d4c-8466-d622c679ca89"}], "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:51.858 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:24:51.859 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:update, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:24:51.860 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:24:51.908 39 INFO tempest.lib.common.rest_client [req-7987e172-0e68-464a-85e5-a0d581c33133 ] Request (VolumesActionsV3RbacTest:test_volume_set_bootable): 200 GET http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles 0.047s 2020-11-06 18:24:51.908 39 DEBUG tempest.lib.common.rest_client [req-7987e172-0e68-464a-85e5-a0d581c33133 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7987e172-0e68-464a-85e5-a0d581c33133', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:51.944 39 INFO tempest.lib.common.rest_client [req-581f6315-ba0e-44e5-b378-2e12e7ec7f1a ] Request (VolumesActionsV3RbacTest:test_volume_set_bootable): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:24:51.944 39 DEBUG tempest.lib.common.rest_client [req-581f6315-ba0e-44e5-b378-2e12e7ec7f1a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-581f6315-ba0e-44e5-b378-2e12e7ec7f1a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1834e82c5f964d3fb50c3905a2d6c322", "name": "tempest-VolumesActionsV3RbacTest-1864572528", "password_expires_at": null}, "audit_ids": ["pFA6HoY2QcyE8tXqOrlm6g"], "expires_at": "2020-11-06T19:24:51.000000Z", "issued_at": "2020-11-06T18:24:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3c4e83d6ebae4a7c9f819f27a65f6954", "name": "tempest-VolumesActionsV3RbacTest-1864572528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:52.064 39 INFO tempest.lib.common.rest_client [req-2325c74f-1370-4257-8954-8e4176a79123 ] Request (VolumesActionsV3RbacTest:test_volume_set_bootable): 200 POST http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b/action 0.119s 2020-11-06 18:24:52.065 39 DEBUG tempest.lib.common.rest_client [req-2325c74f-1370-4257-8954-8e4176a79123 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-set_bootable": {"bootable": true}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-2325c74f-1370-4257-8954-8e4176a79123', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2325c74f-1370-4257-8954-8e4176a79123', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:52.065 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:24:52.121 39 INFO tempest.lib.common.rest_client [req-09e766aa-8610-451c-aa12-9d6b3e469aa9 ] Request (VolumesActionsV3RbacTest:test_volume_set_bootable): 200 GET http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles 0.054s 2020-11-06 18:24:52.121 39 DEBUG tempest.lib.common.rest_client [req-09e766aa-8610-451c-aa12-9d6b3e469aa9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-09e766aa-8610-451c-aa12-9d6b3e469aa9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:52.158 39 INFO tempest.lib.common.rest_client [req-f9d3fc78-bf46-492a-9ebc-0cb091cca61f ] Request (VolumesActionsV3RbacTest:test_volume_set_bootable): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:24:52.158 39 DEBUG tempest.lib.common.rest_client [req-f9d3fc78-bf46-492a-9ebc-0cb091cca61f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f9d3fc78-bf46-492a-9ebc-0cb091cca61f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1834e82c5f964d3fb50c3905a2d6c322", "name": "tempest-VolumesActionsV3RbacTest-1864572528", "password_expires_at": null}, "audit_ids": ["944Yz7jvRdqOCT6AlGfH9w"], "expires_at": "2020-11-06T19:24:52.000000Z", "issued_at": "2020-11-06T18:24:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3c4e83d6ebae4a7c9f819f27a65f6954", "name": "tempest-VolumesActionsV3RbacTest-1864572528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:52.161 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:24:52.164 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_actions:unreserve, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:24:52.164 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:24:52.219 39 INFO tempest.lib.common.rest_client [req-ef820f71-1d88-4d9e-9d6d-49dbe71d691a ] Request (VolumesActionsV3RbacTest:test_volume_unreserve): 200 GET http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles 0.054s 2020-11-06 18:24:52.220 39 DEBUG tempest.lib.common.rest_client [req-ef820f71-1d88-4d9e-9d6d-49dbe71d691a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ef820f71-1d88-4d9e-9d6d-49dbe71d691a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:52.259 39 INFO tempest.lib.common.rest_client [req-a2e47b58-d11a-4106-9946-e964b7a15607 ] Request (VolumesActionsV3RbacTest:test_volume_unreserve): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:24:52.260 39 DEBUG tempest.lib.common.rest_client [req-a2e47b58-d11a-4106-9946-e964b7a15607 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a2e47b58-d11a-4106-9946-e964b7a15607', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1834e82c5f964d3fb50c3905a2d6c322", "name": "tempest-VolumesActionsV3RbacTest-1864572528", "password_expires_at": null}, "audit_ids": ["7zOYdMZBSBOjgmkg-U2m4w"], "expires_at": "2020-11-06T19:24:52.000000Z", "issued_at": "2020-11-06T18:24:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3c4e83d6ebae4a7c9f819f27a65f6954", "name": "tempest-VolumesActionsV3RbacTest-1864572528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:52.419 39 INFO tempest.lib.common.rest_client [req-880b5386-59e0-4169-855e-d9e4fa002823 ] Request (VolumesActionsV3RbacTest:test_volume_unreserve): 202 POST http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b/action 0.158s 2020-11-06 18:24:52.420 39 DEBUG tempest.lib.common.rest_client [req-880b5386-59e0-4169-855e-d9e4fa002823 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-unreserve": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-880b5386-59e0-4169-855e-d9e4fa002823', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-880b5386-59e0-4169-855e-d9e4fa002823', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:52.420 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:24:52.476 39 INFO tempest.lib.common.rest_client [req-58c668b7-0254-4d15-90d6-908762949ec9 ] Request (VolumesActionsV3RbacTest:test_volume_unreserve): 200 GET http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles 0.055s 2020-11-06 18:24:52.476 39 DEBUG tempest.lib.common.rest_client [req-58c668b7-0254-4d15-90d6-908762949ec9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-58c668b7-0254-4d15-90d6-908762949ec9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954/users/1834e82c5f964d3fb50c3905a2d6c322/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:52.511 39 INFO tempest.lib.common.rest_client [req-6202bee5-78a0-4b51-a0cc-452be64e55df ] Request (VolumesActionsV3RbacTest:test_volume_unreserve): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:24:52.512 39 DEBUG tempest.lib.common.rest_client [req-6202bee5-78a0-4b51-a0cc-452be64e55df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6202bee5-78a0-4b51-a0cc-452be64e55df', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1834e82c5f964d3fb50c3905a2d6c322", "name": "tempest-VolumesActionsV3RbacTest-1864572528", "password_expires_at": null}, "audit_ids": ["G0TCVSdBQqqms2UunEhVww"], "expires_at": "2020-11-06T19:24:52.000000Z", "issued_at": "2020-11-06T18:24:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3c4e83d6ebae4a7c9f819f27a65f6954", "name": "tempest-VolumesActionsV3RbacTest-1864572528"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3c4e83d6ebae4a7c9f819f27a65f6954", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:52.657 39 INFO tempest.lib.common.rest_client [req-dcf1d401-cc27-453f-9894-93669d1badd1 ] Request (VolumesActionsV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/976f2bdc-f0c5-4d4c-8466-d622c679ca89 0.142s 2020-11-06 18:24:52.657 39 DEBUG tempest.lib.common.rest_client [req-dcf1d401-cc27-453f-9894-93669d1badd1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-dcf1d401-cc27-453f-9894-93669d1badd1', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/976f2bdc-f0c5-4d4c-8466-d622c679ca89'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:52.724 39 INFO tempest.lib.common.rest_client [req-189a8c7c-89fc-454e-b9fd-3acd48998179 ] Request (VolumesActionsV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/976f2bdc-f0c5-4d4c-8466-d622c679ca89 0.066s 2020-11-06 18:24:52.724 39 DEBUG tempest.lib.common.rest_client [req-189a8c7c-89fc-454e-b9fd-3acd48998179 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-189a8c7c-89fc-454e-b9fd-3acd48998179', 'content-length': '1117', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-189a8c7c-89fc-454e-b9fd-3acd48998179', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/976f2bdc-f0c5-4d4c-8466-d622c679ca89'} Body: b'{"volume": {"id": "976f2bdc-f0c5-4d4c-8466-d622c679ca89", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:24:50.000000", "updated_at": "2020-11-06T18:24:53.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-598563614", "description": null, "volume_type": "tempest-VolumesActionsV3RbacTest-volume-type-1110324391", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/976f2bdc-f0c5-4d4c-8466-d622c679ca89"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/976f2bdc-f0c5-4d4c-8466-d622c679ca89"}], "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:53.783 39 INFO tempest.lib.common.rest_client [req-351f3576-eef6-4c94-9793-a62472189b27 ] Request (VolumesActionsV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/976f2bdc-f0c5-4d4c-8466-d622c679ca89 0.048s 2020-11-06 18:24:53.784 39 DEBUG tempest.lib.common.rest_client [req-351f3576-eef6-4c94-9793-a62472189b27 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-351f3576-eef6-4c94-9793-a62472189b27', 'x-openstack-request-id': 'req-351f3576-eef6-4c94-9793-a62472189b27', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/976f2bdc-f0c5-4d4c-8466-d622c679ca89'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 976f2bdc-f0c5-4d4c-8466-d622c679ca89 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:53.853 39 INFO tempest.lib.common.rest_client [req-c9dc6778-e294-4b0e-9ead-391d82941dc9 ] Request (VolumesActionsV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/types/0372f102-586e-4c4b-9017-7b3dfed6f52f 0.068s 2020-11-06 18:24:53.853 39 DEBUG tempest.lib.common.rest_client [req-c9dc6778-e294-4b0e-9ead-391d82941dc9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c9dc6778-e294-4b0e-9ead-391d82941dc9', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/types/0372f102-586e-4c4b-9017-7b3dfed6f52f'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:53.876 39 INFO tempest.lib.common.rest_client [req-f3d33ea7-7d89-4913-8f7c-2bc8fc22613e ] Request (VolumesActionsV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/types/0372f102-586e-4c4b-9017-7b3dfed6f52f 0.022s 2020-11-06 18:24:53.877 39 DEBUG tempest.lib.common.rest_client [req-f3d33ea7-7d89-4913-8f7c-2bc8fc22613e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-f3d33ea7-7d89-4913-8f7c-2bc8fc22613e', 'x-openstack-request-id': 'req-f3d33ea7-7d89-4913-8f7c-2bc8fc22613e', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/types/0372f102-586e-4c4b-9017-7b3dfed6f52f'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 0372f102-586e-4c4b-9017-7b3dfed6f52f could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:53.955 39 INFO tempest.lib.common.rest_client [req-c06c24c6-d10a-47de-b72d-65ca31da6414 ] Request (VolumesActionsV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/03749c6c-43f0-428d-815d-113b8c0fb40e 0.077s 2020-11-06 18:24:53.956 39 DEBUG tempest.lib.common.rest_client [req-c06c24c6-d10a-47de-b72d-65ca31da6414 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c06c24c6-d10a-47de-b72d-65ca31da6414', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/03749c6c-43f0-428d-815d-113b8c0fb40e'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:54.024 39 INFO tempest.lib.common.rest_client [req-43783cbd-98e8-43a8-8873-cd5407a0cccc ] Request (VolumesActionsV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/03749c6c-43f0-428d-815d-113b8c0fb40e 0.067s 2020-11-06 18:24:54.024 39 DEBUG tempest.lib.common.rest_client [req-43783cbd-98e8-43a8-8873-cd5407a0cccc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-43783cbd-98e8-43a8-8873-cd5407a0cccc', 'content-length': '1066', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-43783cbd-98e8-43a8-8873-cd5407a0cccc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/03749c6c-43f0-428d-815d-113b8c0fb40e'} Body: b'{"volume": {"id": "03749c6c-43f0-428d-815d-113b8c0fb40e", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:24:48.000000", "updated_at": "2020-11-06T18:24:54.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-828456299", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/03749c6c-43f0-428d-815d-113b8c0fb40e"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/03749c6c-43f0-428d-815d-113b8c0fb40e"}], "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:55.080 39 INFO tempest.lib.common.rest_client [req-f0743083-a3ce-4969-9433-8061419e18e1 ] Request (VolumesActionsV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/03749c6c-43f0-428d-815d-113b8c0fb40e 0.045s 2020-11-06 18:24:55.081 39 DEBUG tempest.lib.common.rest_client [req-f0743083-a3ce-4969-9433-8061419e18e1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-f0743083-a3ce-4969-9433-8061419e18e1', 'x-openstack-request-id': 'req-f0743083-a3ce-4969-9433-8061419e18e1', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/03749c6c-43f0-428d-815d-113b8c0fb40e'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 03749c6c-43f0-428d-815d-113b8c0fb40e could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:55.132 39 INFO tempest.lib.common.rest_client [req-67ff0921-b4c6-475a-846a-4dd804dd91fa ] Request (VolumesActionsV3RbacTest:tearDownClass): 404 DELETE http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/264106db-d232-4e01-b165-a4452d06ad0f 0.050s 2020-11-06 18:24:55.133 39 DEBUG tempest.lib.common.rest_client [req-67ff0921-b4c6-475a-846a-4dd804dd91fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-67ff0921-b4c6-475a-846a-4dd804dd91fa', 'x-openstack-request-id': 'req-67ff0921-b4c6-475a-846a-4dd804dd91fa', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/264106db-d232-4e01-b165-a4452d06ad0f'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 264106db-d232-4e01-b165-a4452d06ad0f could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:55.205 39 INFO tempest.lib.common.rest_client [req-1fa865e0-ecee-49ba-87e1-ffdc0c35576b ] Request (VolumesActionsV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db 0.071s 2020-11-06 18:24:55.205 39 DEBUG tempest.lib.common.rest_client [req-1fa865e0-ecee-49ba-87e1-ffdc0c35576b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1fa865e0-ecee-49ba-87e1-ffdc0c35576b', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:55.273 39 INFO tempest.lib.common.rest_client [req-41fc9150-a2ea-4c99-b615-91b2dbd1ff0c ] Request (VolumesActionsV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db 0.067s 2020-11-06 18:24:55.273 39 DEBUG tempest.lib.common.rest_client [req-41fc9150-a2ea-4c99-b615-91b2dbd1ff0c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-41fc9150-a2ea-4c99-b615-91b2dbd1ff0c', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-41fc9150-a2ea-4c99-b615-91b2dbd1ff0c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db'} Body: b'{"volume": {"id": "16c1702b-fea8-45a8-b9b6-f356b6c349db", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:24:27.000000", "updated_at": "2020-11-06T18:24:55.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-1212662060", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db"}], "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:56.338 39 INFO tempest.lib.common.rest_client [req-4c1103f2-12c3-43cd-a432-407324c8beba ] Request (VolumesActionsV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db 0.049s 2020-11-06 18:24:56.339 39 DEBUG tempest.lib.common.rest_client [req-4c1103f2-12c3-43cd-a432-407324c8beba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-4c1103f2-12c3-43cd-a432-407324c8beba', 'x-openstack-request-id': 'req-4c1103f2-12c3-43cd-a432-407324c8beba', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/16c1702b-fea8-45a8-b9b6-f356b6c349db'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 16c1702b-fea8-45a8-b9b6-f356b6c349db could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:56.409 39 INFO tempest.lib.common.rest_client [req-b89e7c9b-931a-4f09-abb8-e497b392ef05 ] Request (VolumesActionsV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b 0.068s 2020-11-06 18:24:56.409 39 DEBUG tempest.lib.common.rest_client [req-b89e7c9b-931a-4f09-abb8-e497b392ef05 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b89e7c9b-931a-4f09-abb8-e497b392ef05', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:56.473 39 INFO tempest.lib.common.rest_client [req-3e188f87-33c6-49ad-95b3-c4d2cd7c6e83 ] Request (VolumesActionsV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b 0.063s 2020-11-06 18:24:56.473 39 DEBUG tempest.lib.common.rest_client [req-3e188f87-33c6-49ad-95b3-c4d2cd7c6e83 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-3e188f87-33c6-49ad-95b3-c4d2cd7c6e83', 'content-length': '1085', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3e188f87-33c6-49ad-95b3-c4d2cd7c6e83', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b'} Body: b'{"volume": {"id": "6ef5353f-6fbf-4a04-ab7e-258303d53b7b", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:23:47.000000", "updated_at": "2020-11-06T18:24:56.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-1108946571", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {"readonly": "False"}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b"}], "user_id": "1834e82c5f964d3fb50c3905a2d6c322", "bootable": "true", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:57.532 39 INFO tempest.lib.common.rest_client [req-c4c995cf-1375-465c-a9c7-30503b0b02ae ] Request (VolumesActionsV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b 0.048s 2020-11-06 18:24:57.533 39 DEBUG tempest.lib.common.rest_client [req-c4c995cf-1375-465c-a9c7-30503b0b02ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:24:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-c4c995cf-1375-465c-a9c7-30503b0b02ae', 'x-openstack-request-id': 'req-c4c995cf-1375-465c-a9c7-30503b0b02ae', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/3c4e83d6ebae4a7c9f819f27a65f6954/volumes/6ef5353f-6fbf-4a04-ab7e-258303d53b7b'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 6ef5353f-6fbf-4a04-ab7e-258303d53b7b could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:24:57.533 39 DEBUG tempest.lib.common.dynamic_creds [-] Clearing network: {'id': '57a4081b-c06b-42fd-8f18-85f12b14ff89', 'name': 'tempest-VolumesActionsV3RbacTest-38180919-network', 'tenant_id': '3c4e83d6ebae4a7c9f819f27a65f6954', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '3c4e83d6ebae4a7c9f819f27a65f6954', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 45, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-11-06T18:23:39Z', 'updated_at': '2020-11-06T18:23:39Z', 'revision_number': 1}, subnet: {'id': '99869e9c-918c-4c1b-9ea9-ae258f284050', 'name': 'tempest-VolumesActionsV3RbacTest-38180919-subnet', 'tenant_id': '3c4e83d6ebae4a7c9f819f27a65f6954', 'network_id': '57a4081b-c06b-42fd-8f18-85f12b14ff89', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-11-06T18:23:39Z', 'updated_at': '2020-11-06T18:23:39Z', 'revision_number': 0, 'project_id': '3c4e83d6ebae4a7c9f819f27a65f6954'}, router: {'id': '3aee0767-b72f-4d59-8f70-de4f7cd34fdf', 'name': 'tempest-VolumesActionsV3RbacTest-38180919-router', 'tenant_id': '3c4e83d6ebae4a7c9f819f27a65f6954', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.253'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::189'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-11-06T18:23:40Z', 'updated_at': '2020-11-06T18:23:40Z', 'revision_number': 3, 'project_id': '3c4e83d6ebae4a7c9f819f27a65f6954'} _clear_isolated_net_resources /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/dynamic_creds.py:418 2020-11-06 18:24:59.574 39 INFO tempest.lib.common.rest_client [req-f274021d-5226-4210-9343-428af42dafda ] Request (VolumesActionsV3RbacTest:tearDownClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/3aee0767-b72f-4d59-8f70-de4f7cd34fdf/remove_router_interface 2.040s 2020-11-06 18:24:59.575 39 DEBUG tempest.lib.common.rest_client [req-f274021d-5226-4210-9343-428af42dafda ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "99869e9c-918c-4c1b-9ea9-ae258f284050"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-f274021d-5226-4210-9343-428af42dafda', 'date': 'Fri, 06 Nov 2020 18:24:59 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/3aee0767-b72f-4d59-8f70-de4f7cd34fdf/remove_router_interface'} Body: b'{"id": "3aee0767-b72f-4d59-8f70-de4f7cd34fdf", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "port_id": "1a24daa5-13e2-4cd6-81e9-60c0acd66bd0", "network_id": "57a4081b-c06b-42fd-8f18-85f12b14ff89", "subnet_id": "99869e9c-918c-4c1b-9ea9-ae258f284050", "subnet_ids": ["99869e9c-918c-4c1b-9ea9-ae258f284050"]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:00.649 39 INFO tempest.lib.common.rest_client [req-416dd2bc-8141-4ab6-8171-1cec8085610e ] Request (VolumesActionsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/3aee0767-b72f-4d59-8f70-de4f7cd34fdf 1.072s 2020-11-06 18:25:00.649 39 DEBUG tempest.lib.common.rest_client [req-416dd2bc-8141-4ab6-8171-1cec8085610e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-416dd2bc-8141-4ab6-8171-1cec8085610e', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:25:00 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/3aee0767-b72f-4d59-8f70-de4f7cd34fdf'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:01.045 39 INFO tempest.lib.common.rest_client [req-3113e3fe-94ce-4fe4-9f63-9fbf3a2b7ad9 ] Request (VolumesActionsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/99869e9c-918c-4c1b-9ea9-ae258f284050 0.394s 2020-11-06 18:25:01.045 39 DEBUG tempest.lib.common.rest_client [req-3113e3fe-94ce-4fe4-9f63-9fbf3a2b7ad9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-3113e3fe-94ce-4fe4-9f63-9fbf3a2b7ad9', 'date': 'Fri, 06 Nov 2020 18:25:01 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/99869e9c-918c-4c1b-9ea9-ae258f284050'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:01.635 39 INFO tempest.lib.common.rest_client [req-a9e353df-952e-4c47-8e21-3ed4f32802b2 ] Request (VolumesActionsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/57a4081b-c06b-42fd-8f18-85f12b14ff89 0.588s 2020-11-06 18:25:01.635 39 DEBUG tempest.lib.common.rest_client [req-a9e353df-952e-4c47-8e21-3ed4f32802b2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-a9e353df-952e-4c47-8e21-3ed4f32802b2', 'date': 'Fri, 06 Nov 2020 18:25:01 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/57a4081b-c06b-42fd-8f18-85f12b14ff89'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:01.759 39 INFO tempest.lib.common.rest_client [req-c9314893-9b4b-4b6b-9992-7533a282bb70 ] Request (VolumesActionsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/1834e82c5f964d3fb50c3905a2d6c322 0.123s 2020-11-06 18:25:01.760 39 DEBUG tempest.lib.common.rest_client [req-c9314893-9b4b-4b6b-9992-7533a282bb70 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c9314893-9b4b-4b6b-9992-7533a282bb70', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/1834e82c5f964d3fb50c3905a2d6c322'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:01.814 39 INFO tempest.lib.common.rest_client [req-38164f4d-f432-48d2-b6cc-e69f2c884690 ] Request (VolumesActionsV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=3c4e83d6ebae4a7c9f819f27a65f6954&name=default 0.053s 2020-11-06 18:25:01.814 39 DEBUG tempest.lib.common.rest_client [req-38164f4d-f432-48d2-b6cc-e69f2c884690 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-38164f4d-f432-48d2-b6cc-e69f2c884690', 'date': 'Fri, 06 Nov 2020 18:25:01 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=3c4e83d6ebae4a7c9f819f27a65f6954&name=default'} Body: b'{"security_groups": [{"id": "552f9543-0b69-4e99-ab78-2656c379ff87", "name": "default", "stateful": true, "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "description": "Default security group", "security_group_rules": [{"id": "2f03a505-95b7-439e-8382-d7a98233e822", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "security_group_id": "552f9543-0b69-4e99-ab78-2656c379ff87", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:23:39Z", "updated_at": "2020-11-06T18:23:39Z", "revision_number": 0, "project_id": "3c4e83d6ebae4a7c9f819f27a65f6954"}, {"id": "4276145d-a336-4338-a0a8-d2a8f94a609f", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "security_group_id": "552f9543-0b69-4e99-ab78-2656c379ff87", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "552f9543-0b69-4e99-ab78-2656c379ff87", "description": null, "tags": [], "created_at": "2020-11-06T18:23:39Z", "updated_at": "2020-11-06T18:23:39Z", "revision_number": 0, "project_id": "3c4e83d6ebae4a7c9f819f27a65f6954"}, {"id": "61d76200-45f0-4b83-a243-4082f7d1d69f", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "security_group_id": "552f9543-0b69-4e99-ab78-2656c379ff87", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:23:39Z", "updated_at": "2020-11-06T18:23:39Z", "revision_number": 0, "project_id": "3c4e83d6ebae4a7c9f819f27a65f6954"}, {"id": "c3dd852f-8bce-45bc-b5da-2f49567ab9ce", "tenant_id": "3c4e83d6ebae4a7c9f819f27a65f6954", "security_group_id": "552f9543-0b69-4e99-ab78-2656c379ff87", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "552f9543-0b69-4e99-ab78-2656c379ff87", "description": null, "tags": [], "created_at": "2020-11-06T18:23:39Z", "updated_at": "2020-11-06T18:23:39Z", "revision_number": 0, "project_id": "3c4e83d6ebae4a7c9f819f27a65f6954"}], "tags": [], "created_at": "2020-11-06T18:23:39Z", "updated_at": "2020-11-06T18:23:39Z", "revision_number": 1, "project_id": "3c4e83d6ebae4a7c9f819f27a65f6954"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:01.928 39 INFO tempest.lib.common.rest_client [req-2d70d45c-2f62-4264-92db-621a25e0a8c5 ] Request (VolumesActionsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/552f9543-0b69-4e99-ab78-2656c379ff87 0.112s 2020-11-06 18:25:01.928 39 DEBUG tempest.lib.common.rest_client [req-2d70d45c-2f62-4264-92db-621a25e0a8c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-2d70d45c-2f62-4264-92db-621a25e0a8c5', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:25:01 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/552f9543-0b69-4e99-ab78-2656c379ff87'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:02.082 39 INFO tempest.lib.common.rest_client [req-adc54d05-c7ec-4650-a626-02fdcdcaec2c ] Request (VolumesActionsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954 0.153s 2020-11-06 18:25:02.083 39 DEBUG tempest.lib.common.rest_client [req-adc54d05-c7ec-4650-a626-02fdcdcaec2c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-adc54d05-c7ec-4650-a626-02fdcdcaec2c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3c4e83d6ebae4a7c9f819f27a65f6954'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:02.169 39 INFO tempest.lib.common.rest_client [req-f3ffa1b8-de3f-4797-9fab-e9acbfd5864b ] Request (VolumeMetadataV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-11-06 18:25:02.169 39 DEBUG tempest.lib.common.rest_client [req-f3ffa1b8-de3f-4797-9fab-e9acbfd5864b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f3ffa1b8-de3f-4797-9fab-e9acbfd5864b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["QYPysMgkQK2Wt2EgBOfliA"], "expires_at": "2020-11-06T19:25:02.000000Z", "issued_at": "2020-11-06T18:25:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:02.217 39 INFO tempest.lib.common.rest_client [req-28679364-45ea-4364-92a0-aecb56aebe33 ] Request (VolumeMetadataV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:25:02.217 39 DEBUG tempest.lib.common.rest_client [req-28679364-45ea-4364-92a0-aecb56aebe33 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-28679364-45ea-4364-92a0-aecb56aebe33', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["u3xA6PgzRjmkPJtLgkt1WA"], "expires_at": "2020-11-06T19:25:02.000000Z", "issued_at": "2020-11-06T18:25:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:02.268 39 INFO tempest.lib.common.rest_client [req-aaba8567-769b-45e5-8dfa-09ad03603654 ] Request (VolumeMetadataV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.050s 2020-11-06 18:25:02.268 39 DEBUG tempest.lib.common.rest_client [req-aaba8567-769b-45e5-8dfa-09ad03603654 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aaba8567-769b-45e5-8dfa-09ad03603654', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:02.334 39 INFO tempest.lib.common.rest_client [req-46d47d30-8e50-4b7b-9ea3-37f697c3791b ] Request (VolumeMetadataV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.065s 2020-11-06 18:25:02.335 39 DEBUG tempest.lib.common.rest_client [req-46d47d30-8e50-4b7b-9ea3-37f697c3791b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumeMetadataV3RbacTest-922365050-desc", "domain_id": "default", "name": "tempest-VolumeMetadataV3RbacTest-922365050"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '384', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-46d47d30-8e50-4b7b-9ea3-37f697c3791b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "fdfe0253aec64702b67433b9b419b001", "name": "tempest-VolumeMetadataV3RbacTest-922365050", "domain_id": "default", "description": "tempest-VolumeMetadataV3RbacTest-922365050-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:02.437 39 INFO tempest.lib.common.rest_client [req-e890bb3d-503c-4e6a-94cd-4f1c7dae3f11 ] Request (VolumeMetadataV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.101s 2020-11-06 18:25:02.438 39 DEBUG tempest.lib.common.rest_client [req-e890bb3d-503c-4e6a-94cd-4f1c7dae3f11 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumeMetadataV3RbacTest-922365050", "password": "U5~5nuVEse*_TsD", "project_id": "fdfe0253aec64702b67433b9b419b001", "email": "tempest-VolumeMetadataV3RbacTest-1751274277@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '403', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e890bb3d-503c-4e6a-94cd-4f1c7dae3f11', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "fdfe0253aec64702b67433b9b419b001", "email": "tempest-VolumeMetadataV3RbacTest-1751274277@example.com", "id": "cc9243891fe74d9db15f3645794e03c5", "name": "tempest-VolumeMetadataV3RbacTest-922365050", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/cc9243891fe74d9db15f3645794e03c5"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:02.483 39 INFO tempest.lib.common.rest_client [req-02c34ca7-ebdf-441e-b5f7-99450e8394aa ] Request (VolumeMetadataV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.044s 2020-11-06 18:25:02.483 39 DEBUG tempest.lib.common.rest_client [req-02c34ca7-ebdf-441e-b5f7-99450e8394aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-02c34ca7-ebdf-441e-b5f7-99450e8394aa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:02.527 39 INFO tempest.lib.common.rest_client [req-7d09d45f-ce73-431e-9833-21873d259584 ] Request (VolumeMetadataV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.042s 2020-11-06 18:25:02.527 39 DEBUG tempest.lib.common.rest_client [req-7d09d45f-ce73-431e-9833-21873d259584 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7d09d45f-ce73-431e-9833-21873d259584', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:02.611 39 INFO tempest.lib.common.rest_client [req-d9c57a5a-432b-4b9b-9535-a2276e683635 ] Request (VolumeMetadataV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles/72a4576c553448cd941b052c1ca0cf2d 0.083s 2020-11-06 18:25:02.612 39 DEBUG tempest.lib.common.rest_client [req-d9c57a5a-432b-4b9b-9535-a2276e683635 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d9c57a5a-432b-4b9b-9535-a2276e683635', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:02.612 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumeMetadataV3RbacTest-922365050', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'fdfe0253aec64702b67433b9b419b001', 'project_name': 'tempest-VolumeMetadataV3RbacTest-922365050', 'tenant_id': 'fdfe0253aec64702b67433b9b419b001', 'tenant_name': 'tempest-VolumeMetadataV3RbacTest-922365050', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'cc9243891fe74d9db15f3645794e03c5'}, Network: None, Subnet: None, Router: None 2020-11-06 18:25:02.612 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumeMetadataV3RbacTest-922365050', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'fdfe0253aec64702b67433b9b419b001', 'project_name': 'tempest-VolumeMetadataV3RbacTest-922365050', 'tenant_id': 'fdfe0253aec64702b67433b9b419b001', 'tenant_name': 'tempest-VolumeMetadataV3RbacTest-922365050', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'cc9243891fe74d9db15f3645794e03c5'}, Network: None, Subnet: None, Router: None 2020-11-06 18:25:02.729 39 INFO tempest.lib.common.rest_client [req-3bb944f0-695b-49fc-9556-fa73153cd5ef ] Request (VolumeMetadataV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.110s 2020-11-06 18:25:02.729 39 DEBUG tempest.lib.common.rest_client [req-3bb944f0-695b-49fc-9556-fa73153cd5ef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6577', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3bb944f0-695b-49fc-9556-fa73153cd5ef', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "cc9243891fe74d9db15f3645794e03c5", "name": "tempest-VolumeMetadataV3RbacTest-922365050", "password_expires_at": null}, "audit_ids": ["Vg_YAUb8TJWGUzP_cC6Iww"], "expires_at": "2020-11-06T19:25:02.000000Z", "issued_at": "2020-11-06T18:25:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fdfe0253aec64702b67433b9b419b001", "name": "tempest-VolumeMetadataV3RbacTest-922365050"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:02.817 39 INFO tempest.lib.common.rest_client [req-9f1fce72-4dfb-42eb-8dbe-e6afe54101c6 ] Request (VolumeMetadataV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-11-06 18:25:02.817 39 DEBUG tempest.lib.common.rest_client [req-9f1fce72-4dfb-42eb-8dbe-e6afe54101c6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9f1fce72-4dfb-42eb-8dbe-e6afe54101c6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["94q02AMmTLaf9Kki-EUyUQ"], "expires_at": "2020-11-06T19:25:02.000000Z", "issued_at": "2020-11-06T18:25:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:02.859 39 INFO tempest.lib.common.rest_client [req-79c00f48-04f2-4af0-9473-e3097f0cd844 ] Request (VolumeMetadataV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:25:02.860 39 DEBUG tempest.lib.common.rest_client [req-79c00f48-04f2-4af0-9473-e3097f0cd844 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-79c00f48-04f2-4af0-9473-e3097f0cd844', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["2k6UT5LcRVub1WIqa9ZOJg"], "expires_at": "2020-11-06T19:25:02.000000Z", "issued_at": "2020-11-06T18:25:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:02.906 39 INFO tempest.lib.common.rest_client [req-cbfddc12-da8a-46cf-8712-9d47f558518d ] Request (VolumeMetadataV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.046s 2020-11-06 18:25:02.907 39 DEBUG tempest.lib.common.rest_client [req-cbfddc12-da8a-46cf-8712-9d47f558518d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cbfddc12-da8a-46cf-8712-9d47f558518d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:02.952 39 INFO tempest.lib.common.rest_client [req-6fcbbf9b-9146-4310-ad35-bb6b46b2b296 ] Request (VolumeMetadataV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.044s 2020-11-06 18:25:02.952 39 DEBUG tempest.lib.common.rest_client [req-6fcbbf9b-9146-4310-ad35-bb6b46b2b296 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6fcbbf9b-9146-4310-ad35-bb6b46b2b296', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:02.953 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:25:02.953 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:25:03.002 39 INFO tempest.lib.common.rest_client [req-29499eba-c222-47b6-97fa-38b458be8211 ] Request (VolumeMetadataV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles 0.048s 2020-11-06 18:25:03.002 39 DEBUG tempest.lib.common.rest_client [req-29499eba-c222-47b6-97fa-38b458be8211 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-29499eba-c222-47b6-97fa-38b458be8211', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:03.053 39 INFO tempest.lib.common.rest_client [req-d6a336de-497b-4f86-a315-0001d0df3246 ] Request (VolumeMetadataV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles/72a4576c553448cd941b052c1ca0cf2d 0.050s 2020-11-06 18:25:03.054 39 DEBUG tempest.lib.common.rest_client [req-d6a336de-497b-4f86-a315-0001d0df3246 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d6a336de-497b-4f86-a315-0001d0df3246', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:03.150 39 INFO tempest.lib.common.rest_client [req-923e261c-6bc5-42f1-a263-af1072c4746f ] Request (VolumeMetadataV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles/a629c95d64b3416fb80ae90af4f69c05 0.095s 2020-11-06 18:25:03.150 39 DEBUG tempest.lib.common.rest_client [req-923e261c-6bc5-42f1-a263-af1072c4746f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-923e261c-6bc5-42f1-a263-af1072c4746f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:04.241 39 INFO tempest.lib.common.rest_client [req-991a03b0-c677-43b6-9b06-8a44219c89e8 ] Request (VolumeMetadataV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-11-06 18:25:04.242 39 DEBUG tempest.lib.common.rest_client [req-991a03b0-c677-43b6-9b06-8a44219c89e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-991a03b0-c677-43b6-9b06-8a44219c89e8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "cc9243891fe74d9db15f3645794e03c5", "name": "tempest-VolumeMetadataV3RbacTest-922365050", "password_expires_at": null}, "audit_ids": ["6uE1Me0mTFSOwPgXdb2S9A"], "expires_at": "2020-11-06T19:25:04.000000Z", "issued_at": "2020-11-06T18:25:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fdfe0253aec64702b67433b9b419b001", "name": "tempest-VolumeMetadataV3RbacTest-922365050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:04.668 39 INFO tempest.lib.common.rest_client [req-06821741-1d53-4615-9a35-e4f98eb8c397 ] Request (VolumeMetadataV3RbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes 0.424s 2020-11-06 18:25:04.668 39 DEBUG tempest.lib.common.rest_client [req-06821741-1d53-4615-9a35-e4f98eb8c397 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-VolumeMetadataV3RbacTest-Volume-1536788870"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-06821741-1d53-4615-9a35-e4f98eb8c397', 'content-length': '845', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-06821741-1d53-4615-9a35-e4f98eb8c397', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes'} Body: b'{"volume": {"id": "971eb02a-52be-4db0-b745-bc723af942b0", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:25:05.000000", "updated_at": null, "name": "tempest-VolumeMetadataV3RbacTest-Volume-1536788870", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0"}], "user_id": "cc9243891fe74d9db15f3645794e03c5", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:04.756 39 INFO tempest.lib.common.rest_client [req-5c45e25c-4334-4037-9e06-a35ba0035a9b ] Request (VolumeMetadataV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0 0.077s 2020-11-06 18:25:04.756 39 DEBUG tempest.lib.common.rest_client [req-5c45e25c-4334-4037-9e06-a35ba0035a9b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-5c45e25c-4334-4037-9e06-a35ba0035a9b', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5c45e25c-4334-4037-9e06-a35ba0035a9b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0'} Body: b'{"volume": {"id": "971eb02a-52be-4db0-b745-bc723af942b0", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:25:05.000000", "updated_at": "2020-11-06T18:25:05.000000", "name": "tempest-VolumeMetadataV3RbacTest-Volume-1536788870", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0"}], "user_id": "cc9243891fe74d9db15f3645794e03c5", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "fdfe0253aec64702b67433b9b419b001"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:05.843 39 INFO tempest.lib.common.rest_client [req-014b0c55-0745-4b2d-bace-7a7ce551bd25 ] Request (VolumeMetadataV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0 0.074s 2020-11-06 18:25:05.844 39 DEBUG tempest.lib.common.rest_client [req-014b0c55-0745-4b2d-bace-7a7ce551bd25 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-014b0c55-0745-4b2d-bace-7a7ce551bd25', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-014b0c55-0745-4b2d-bace-7a7ce551bd25', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0'} Body: b'{"volume": {"id": "971eb02a-52be-4db0-b745-bc723af942b0", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:25:05.000000", "updated_at": "2020-11-06T18:25:05.000000", "name": "tempest-VolumeMetadataV3RbacTest-Volume-1536788870", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0"}], "user_id": "cc9243891fe74d9db15f3645794e03c5", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "fdfe0253aec64702b67433b9b419b001"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:05.858 39 INFO tempest.common.waiters [-] volume 971eb02a-52be-4db0-b745-bc723af942b0 reached available after waiting for 1.858860 seconds 2020-11-06 18:25:05.859 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:25:05.861 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:create_volume_metadata, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:25:05.861 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:25:05.972 39 INFO tempest.lib.common.rest_client [req-2e6f89a1-909d-42b3-b89f-aea17a047e5a ] Request (VolumeMetadataV3RbacTest:test_create_volume_metadata): 200 GET http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles 0.110s 2020-11-06 18:25:05.972 39 DEBUG tempest.lib.common.rest_client [req-2e6f89a1-909d-42b3-b89f-aea17a047e5a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2e6f89a1-909d-42b3-b89f-aea17a047e5a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:06.012 39 INFO tempest.lib.common.rest_client [req-ffea7273-4489-472c-99a7-3c90f7c30a19 ] Request (VolumeMetadataV3RbacTest:test_create_volume_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:25:06.013 39 DEBUG tempest.lib.common.rest_client [req-ffea7273-4489-472c-99a7-3c90f7c30a19 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ffea7273-4489-472c-99a7-3c90f7c30a19', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "cc9243891fe74d9db15f3645794e03c5", "name": "tempest-VolumeMetadataV3RbacTest-922365050", "password_expires_at": null}, "audit_ids": ["ApNyix9HReuyKFnVsshS-Q"], "expires_at": "2020-11-06T19:25:06.000000Z", "issued_at": "2020-11-06T18:25:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fdfe0253aec64702b67433b9b419b001", "name": "tempest-VolumeMetadataV3RbacTest-922365050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:06.160 39 INFO tempest.lib.common.rest_client [req-944e5d6b-b124-4c73-a33a-23970390f06f ] Request (VolumeMetadataV3RbacTest:test_create_volume_metadata): 200 POST http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/metadata 0.146s 2020-11-06 18:25:06.161 39 DEBUG tempest.lib.common.rest_client [req-944e5d6b-b124-4c73-a33a-23970390f06f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"key1": "value1"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-944e5d6b-b124-4c73-a33a-23970390f06f', 'content-length': '32', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-944e5d6b-b124-4c73-a33a-23970390f06f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/metadata'} Body: b'{"metadata": {"key1": "value1"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:06.163 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:25:06.219 39 INFO tempest.lib.common.rest_client [req-17a9bf13-ef9f-4f7e-905a-46659b5e45a0 ] Request (VolumeMetadataV3RbacTest:test_create_volume_metadata): 200 GET http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles 0.054s 2020-11-06 18:25:06.219 39 DEBUG tempest.lib.common.rest_client [req-17a9bf13-ef9f-4f7e-905a-46659b5e45a0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-17a9bf13-ef9f-4f7e-905a-46659b5e45a0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:06.260 39 INFO tempest.lib.common.rest_client [req-79aa8932-3600-4395-8aab-9a5b3f0e21d3 ] Request (VolumeMetadataV3RbacTest:test_create_volume_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:25:06.261 39 DEBUG tempest.lib.common.rest_client [req-79aa8932-3600-4395-8aab-9a5b3f0e21d3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-79aa8932-3600-4395-8aab-9a5b3f0e21d3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "cc9243891fe74d9db15f3645794e03c5", "name": "tempest-VolumeMetadataV3RbacTest-922365050", "password_expires_at": null}, "audit_ids": ["lI_o-cEcQf2lFMoNsSn7Vg"], "expires_at": "2020-11-06T19:25:06.000000Z", "issued_at": "2020-11-06T18:25:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fdfe0253aec64702b67433b9b419b001", "name": "tempest-VolumeMetadataV3RbacTest-922365050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:06.403 39 INFO tempest.lib.common.rest_client [req-cad793e6-4e63-4320-8fce-34805820ab2f ] Request (VolumeMetadataV3RbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/metadata/key1 0.140s 2020-11-06 18:25:06.403 39 DEBUG tempest.lib.common.rest_client [req-cad793e6-4e63-4320-8fce-34805820ab2f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version,Accept-Encoding', 'x-openstack-request-id': 'req-cad793e6-4e63-4320-8fce-34805820ab2f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/metadata/key1'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:06.406 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:25:06.409 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_image_metadata, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:25:06.501 39 INFO tempest.lib.common.rest_client [req-cd3840aa-52db-4c5d-82fa-70460b5e56e0 ] Request (VolumeMetadataV3RbacTest:test_delete_volume_image_metadata): 200 POST http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/action 0.091s 2020-11-06 18:25:06.502 39 DEBUG tempest.lib.common.rest_client [req-cd3840aa-52db-4c5d-82fa-70460b5e56e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-set_image_metadata": {"metadata": {"image_id": "56b368f6-9136-40ec-a04c-564d02c95e42"}}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-cd3840aa-52db-4c5d-82fa-70460b5e56e0', 'content-length': '66', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-cd3840aa-52db-4c5d-82fa-70460b5e56e0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/action'} Body: b'{"metadata": {"image_id": "56b368f6-9136-40ec-a04c-564d02c95e42"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:06.504 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:25:06.558 39 INFO tempest.lib.common.rest_client [req-582fb327-5d3e-4dae-a33d-df3c2f546317 ] Request (VolumeMetadataV3RbacTest:test_delete_volume_image_metadata): 200 GET http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles 0.053s 2020-11-06 18:25:06.559 39 DEBUG tempest.lib.common.rest_client [req-582fb327-5d3e-4dae-a33d-df3c2f546317 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-582fb327-5d3e-4dae-a33d-df3c2f546317', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:06.601 39 INFO tempest.lib.common.rest_client [req-5768d3e7-11fb-4367-9657-a3490ccb23ac ] Request (VolumeMetadataV3RbacTest:test_delete_volume_image_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-11-06 18:25:06.601 39 DEBUG tempest.lib.common.rest_client [req-5768d3e7-11fb-4367-9657-a3490ccb23ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5768d3e7-11fb-4367-9657-a3490ccb23ac', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "cc9243891fe74d9db15f3645794e03c5", "name": "tempest-VolumeMetadataV3RbacTest-922365050", "password_expires_at": null}, "audit_ids": ["ZwKSpZMCS4-KgiG5mNqGPA"], "expires_at": "2020-11-06T19:25:06.000000Z", "issued_at": "2020-11-06T18:25:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fdfe0253aec64702b67433b9b419b001", "name": "tempest-VolumeMetadataV3RbacTest-922365050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:06.760 39 INFO tempest.lib.common.rest_client [req-9e450816-5886-40fb-9f76-6a36b4b1ba22 ] Request (VolumeMetadataV3RbacTest:test_delete_volume_image_metadata): 200 POST http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/action 0.157s 2020-11-06 18:25:06.760 39 DEBUG tempest.lib.common.rest_client [req-9e450816-5886-40fb-9f76-6a36b4b1ba22 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-unset_image_metadata": {"key": "image_id"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version,Accept-Encoding', 'x-openstack-request-id': 'req-9e450816-5886-40fb-9f76-6a36b4b1ba22', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:06.761 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:25:06.815 39 INFO tempest.lib.common.rest_client [req-1a1b991c-0d46-4be8-94b0-d85623ed0a25 ] Request (VolumeMetadataV3RbacTest:test_delete_volume_image_metadata): 200 GET http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles 0.053s 2020-11-06 18:25:06.815 39 DEBUG tempest.lib.common.rest_client [req-1a1b991c-0d46-4be8-94b0-d85623ed0a25 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1a1b991c-0d46-4be8-94b0-d85623ed0a25', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:06.849 39 INFO tempest.lib.common.rest_client [req-eb4c9c7e-d17d-410d-bac8-989113c46f2a ] Request (VolumeMetadataV3RbacTest:test_delete_volume_image_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:25:06.850 39 DEBUG tempest.lib.common.rest_client [req-eb4c9c7e-d17d-410d-bac8-989113c46f2a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eb4c9c7e-d17d-410d-bac8-989113c46f2a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "cc9243891fe74d9db15f3645794e03c5", "name": "tempest-VolumeMetadataV3RbacTest-922365050", "password_expires_at": null}, "audit_ids": ["ATuP5-tfSLGXkRKpk6LBTg"], "expires_at": "2020-11-06T19:25:06.000000Z", "issued_at": "2020-11-06T18:25:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fdfe0253aec64702b67433b9b419b001", "name": "tempest-VolumeMetadataV3RbacTest-922365050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:06.999 39 INFO tempest.lib.common.rest_client [req-94cd11e4-526a-42fb-9ed2-7001621ff12b ] Request (VolumeMetadataV3RbacTest:_run_cleanups): 404 POST http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/action 0.148s 2020-11-06 18:25:07.000 39 DEBUG tempest.lib.common.rest_client [req-94cd11e4-526a-42fb-9ed2-7001621ff12b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-unset_image_metadata": {"key": "image_id"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '135', 'content-type': 'application/json', 'x-compute-request-id': 'req-94cd11e4-526a-42fb-9ed2-7001621ff12b', 'x-openstack-request-id': 'req-94cd11e4-526a-42fb-9ed2-7001621ff12b', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/action'} Body: b'{"itemNotFound": {"code": 404, "message": "Glance metadata for volume/snapshot 971eb02a-52be-4db0-b745-bc723af942b0 cannot be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:07.001 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:25:07.003 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:delete_volume_metadata, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:25:07.085 39 INFO tempest.lib.common.rest_client [req-17e3cd59-9185-413f-8432-d7a82c0b9793 ] Request (VolumeMetadataV3RbacTest:test_delete_volume_metadata_item): 200 POST http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/metadata 0.081s 2020-11-06 18:25:07.085 39 DEBUG tempest.lib.common.rest_client [req-17e3cd59-9185-413f-8432-d7a82c0b9793 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"key1": "value1"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-17e3cd59-9185-413f-8432-d7a82c0b9793', 'content-length': '32', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-17e3cd59-9185-413f-8432-d7a82c0b9793', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/metadata'} Body: b'{"metadata": {"key1": "value1"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:07.087 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:25:07.144 39 INFO tempest.lib.common.rest_client [req-3db1528d-d399-4e59-b59b-3094e2c210a6 ] Request (VolumeMetadataV3RbacTest:test_delete_volume_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles 0.055s 2020-11-06 18:25:07.144 39 DEBUG tempest.lib.common.rest_client [req-3db1528d-d399-4e59-b59b-3094e2c210a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3db1528d-d399-4e59-b59b-3094e2c210a6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:07.182 39 INFO tempest.lib.common.rest_client [req-14b9ca34-4ad7-4596-bbaf-8141cfaae852 ] Request (VolumeMetadataV3RbacTest:test_delete_volume_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:25:07.183 39 DEBUG tempest.lib.common.rest_client [req-14b9ca34-4ad7-4596-bbaf-8141cfaae852 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-14b9ca34-4ad7-4596-bbaf-8141cfaae852', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "cc9243891fe74d9db15f3645794e03c5", "name": "tempest-VolumeMetadataV3RbacTest-922365050", "password_expires_at": null}, "audit_ids": ["RjD4hWxGS0y7iVyEYdd35w"], "expires_at": "2020-11-06T19:25:07.000000Z", "issued_at": "2020-11-06T18:25:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fdfe0253aec64702b67433b9b419b001", "name": "tempest-VolumeMetadataV3RbacTest-922365050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:07.311 39 INFO tempest.lib.common.rest_client [req-6fe1566b-b4c6-4c01-bfa1-c2545c50f5e9 ] Request (VolumeMetadataV3RbacTest:test_delete_volume_metadata_item): 200 DELETE http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/metadata/key1 0.126s 2020-11-06 18:25:07.312 39 DEBUG tempest.lib.common.rest_client [req-6fe1566b-b4c6-4c01-bfa1-c2545c50f5e9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version,Accept-Encoding', 'x-openstack-request-id': 'req-6fe1566b-b4c6-4c01-bfa1-c2545c50f5e9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/metadata/key1'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:07.312 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:25:07.383 39 INFO tempest.lib.common.rest_client [req-1de40f01-c962-4ca0-8a55-f0b1cc9a1717 ] Request (VolumeMetadataV3RbacTest:test_delete_volume_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles 0.070s 2020-11-06 18:25:07.384 39 DEBUG tempest.lib.common.rest_client [req-1de40f01-c962-4ca0-8a55-f0b1cc9a1717 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1de40f01-c962-4ca0-8a55-f0b1cc9a1717', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:07.425 39 INFO tempest.lib.common.rest_client [req-e868999e-9312-4de7-9e39-35047be15ab1 ] Request (VolumeMetadataV3RbacTest:test_delete_volume_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:25:07.426 39 DEBUG tempest.lib.common.rest_client [req-e868999e-9312-4de7-9e39-35047be15ab1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e868999e-9312-4de7-9e39-35047be15ab1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "cc9243891fe74d9db15f3645794e03c5", "name": "tempest-VolumeMetadataV3RbacTest-922365050", "password_expires_at": null}, "audit_ids": ["Op2mGF-wQtytcwZbgEXPdw"], "expires_at": "2020-11-06T19:25:07.000000Z", "issued_at": "2020-11-06T18:25:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fdfe0253aec64702b67433b9b419b001", "name": "tempest-VolumeMetadataV3RbacTest-922365050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:07.551 39 INFO tempest.lib.common.rest_client [req-1a45aaec-fda1-4bcc-be6c-6a0c836bd190 ] Request (VolumeMetadataV3RbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/metadata/key1 0.124s 2020-11-06 18:25:07.552 39 DEBUG tempest.lib.common.rest_client [req-1a45aaec-fda1-4bcc-be6c-6a0c836bd190 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '120', 'content-type': 'application/json', 'x-compute-request-id': 'req-1a45aaec-fda1-4bcc-be6c-6a0c836bd190', 'x-openstack-request-id': 'req-1a45aaec-fda1-4bcc-be6c-6a0c836bd190', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/metadata/key1'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 971eb02a-52be-4db0-b745-bc723af942b0 has no metadata with key key1."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:07.555 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:25:07.558 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_image_metadata, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:25:07.660 39 INFO tempest.lib.common.rest_client [req-e8a48740-2253-4e12-bbc1-1f70c4c05cbc ] Request (VolumeMetadataV3RbacTest:test_list_volumes_details_image_metadata): 200 POST http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/action 0.101s 2020-11-06 18:25:07.660 39 DEBUG tempest.lib.common.rest_client [req-e8a48740-2253-4e12-bbc1-1f70c4c05cbc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-set_image_metadata": {"metadata": {"image_id": "56b368f6-9136-40ec-a04c-564d02c95e42"}}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e8a48740-2253-4e12-bbc1-1f70c4c05cbc', 'content-length': '66', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e8a48740-2253-4e12-bbc1-1f70c4c05cbc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/action'} Body: b'{"metadata": {"image_id": "56b368f6-9136-40ec-a04c-564d02c95e42"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:07.663 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:25:07.739 39 INFO tempest.lib.common.rest_client [req-8052f1bd-8abb-4b15-9c0a-2e45559d84d8 ] Request (VolumeMetadataV3RbacTest:test_list_volumes_details_image_metadata): 200 GET http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles 0.075s 2020-11-06 18:25:07.740 39 DEBUG tempest.lib.common.rest_client [req-8052f1bd-8abb-4b15-9c0a-2e45559d84d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8052f1bd-8abb-4b15-9c0a-2e45559d84d8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:07.781 39 INFO tempest.lib.common.rest_client [req-778faef6-d177-4a69-a5cd-03fa91f422c1 ] Request (VolumeMetadataV3RbacTest:test_list_volumes_details_image_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:25:07.782 39 DEBUG tempest.lib.common.rest_client [req-778faef6-d177-4a69-a5cd-03fa91f422c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-778faef6-d177-4a69-a5cd-03fa91f422c1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "cc9243891fe74d9db15f3645794e03c5", "name": "tempest-VolumeMetadataV3RbacTest-922365050", "password_expires_at": null}, "audit_ids": ["tVTH8YJbTrevdmEB5xXRNA"], "expires_at": "2020-11-06T19:25:07.000000Z", "issued_at": "2020-11-06T18:25:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fdfe0253aec64702b67433b9b419b001", "name": "tempest-VolumeMetadataV3RbacTest-922365050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:07.896 39 INFO tempest.lib.common.rest_client [req-d0192bdd-5ea2-4c37-adae-932ce8713994 ] Request (VolumeMetadataV3RbacTest:test_list_volumes_details_image_metadata): 200 GET http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/detail 0.113s 2020-11-06 18:25:07.897 39 DEBUG tempest.lib.common.rest_client [req-d0192bdd-5ea2-4c37-adae-932ce8713994 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d0192bdd-5ea2-4c37-adae-932ce8713994', 'content-length': '1150', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d0192bdd-5ea2-4c37-adae-932ce8713994', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/detail'} Body: b'{"volumes": [{"id": "971eb02a-52be-4db0-b745-bc723af942b0", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:25:05.000000", "updated_at": "2020-11-06T18:25:05.000000", "name": "tempest-VolumeMetadataV3RbacTest-Volume-1536788870", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0"}], "user_id": "cc9243891fe74d9db15f3645794e03c5", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "volume_image_metadata": {"image_id": "56b368f6-9136-40ec-a04c-564d02c95e42"}, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "fdfe0253aec64702b67433b9b419b001"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:07.912 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:25:07.970 39 INFO tempest.lib.common.rest_client [req-5d97ad9c-b381-4aa6-b380-43fdbddb2797 ] Request (VolumeMetadataV3RbacTest:test_list_volumes_details_image_metadata): 200 GET http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles 0.057s 2020-11-06 18:25:07.971 39 DEBUG tempest.lib.common.rest_client [req-5d97ad9c-b381-4aa6-b380-43fdbddb2797 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5d97ad9c-b381-4aa6-b380-43fdbddb2797', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:08.011 39 INFO tempest.lib.common.rest_client [req-81e30421-679d-4e49-8efa-72c8f136a69a ] Request (VolumeMetadataV3RbacTest:test_list_volumes_details_image_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:25:08.011 39 DEBUG tempest.lib.common.rest_client [req-81e30421-679d-4e49-8efa-72c8f136a69a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-81e30421-679d-4e49-8efa-72c8f136a69a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "cc9243891fe74d9db15f3645794e03c5", "name": "tempest-VolumeMetadataV3RbacTest-922365050", "password_expires_at": null}, "audit_ids": ["lukyu_M1Rm-ZekuP6oRY3A"], "expires_at": "2020-11-06T19:25:08.000000Z", "issued_at": "2020-11-06T18:25:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fdfe0253aec64702b67433b9b419b001", "name": "tempest-VolumeMetadataV3RbacTest-922365050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:08.173 39 INFO tempest.lib.common.rest_client [req-b677e3f5-67a9-4472-8c73-09edb77a56d7 ] Request (VolumeMetadataV3RbacTest:_run_cleanups): 200 POST http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/action 0.160s 2020-11-06 18:25:08.173 39 DEBUG tempest.lib.common.rest_client [req-b677e3f5-67a9-4472-8c73-09edb77a56d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-unset_image_metadata": {"key": "image_id"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version,Accept-Encoding', 'x-openstack-request-id': 'req-b677e3f5-67a9-4472-8c73-09edb77a56d7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:08.176 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:25:08.179 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_image_metadata, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:25:08.275 39 INFO tempest.lib.common.rest_client [req-f9a65d5b-5b51-4a78-b142-874f7616643d ] Request (VolumeMetadataV3RbacTest:test_show_volume_details_image_metadata): 200 POST http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/action 0.095s 2020-11-06 18:25:08.275 39 DEBUG tempest.lib.common.rest_client [req-f9a65d5b-5b51-4a78-b142-874f7616643d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-set_image_metadata": {"metadata": {"image_id": "56b368f6-9136-40ec-a04c-564d02c95e42"}}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-f9a65d5b-5b51-4a78-b142-874f7616643d', 'content-length': '66', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f9a65d5b-5b51-4a78-b142-874f7616643d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/action'} Body: b'{"metadata": {"image_id": "56b368f6-9136-40ec-a04c-564d02c95e42"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:08.277 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:25:08.341 39 INFO tempest.lib.common.rest_client [req-5ce5309e-375f-4620-9405-db3aa120a4ec ] Request (VolumeMetadataV3RbacTest:test_show_volume_details_image_metadata): 200 GET http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles 0.062s 2020-11-06 18:25:08.341 39 DEBUG tempest.lib.common.rest_client [req-5ce5309e-375f-4620-9405-db3aa120a4ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5ce5309e-375f-4620-9405-db3aa120a4ec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:08.381 39 INFO tempest.lib.common.rest_client [req-4c9004bb-10d2-422b-954d-dbc652c572ea ] Request (VolumeMetadataV3RbacTest:test_show_volume_details_image_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-11-06 18:25:08.382 39 DEBUG tempest.lib.common.rest_client [req-4c9004bb-10d2-422b-954d-dbc652c572ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4c9004bb-10d2-422b-954d-dbc652c572ea', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "cc9243891fe74d9db15f3645794e03c5", "name": "tempest-VolumeMetadataV3RbacTest-922365050", "password_expires_at": null}, "audit_ids": ["vnLX87IVSfGdmEKOp3gddg"], "expires_at": "2020-11-06T19:25:08.000000Z", "issued_at": "2020-11-06T18:25:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fdfe0253aec64702b67433b9b419b001", "name": "tempest-VolumeMetadataV3RbacTest-922365050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:08.500 39 INFO tempest.lib.common.rest_client [req-8b886886-df9d-4b30-bcc4-d7a2cd548bb2 ] Request (VolumeMetadataV3RbacTest:test_show_volume_details_image_metadata): 200 GET http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0 0.117s 2020-11-06 18:25:08.501 39 DEBUG tempest.lib.common.rest_client [req-8b886886-df9d-4b30-bcc4-d7a2cd548bb2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-8b886886-df9d-4b30-bcc4-d7a2cd548bb2', 'content-length': '1147', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8b886886-df9d-4b30-bcc4-d7a2cd548bb2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0'} Body: b'{"volume": {"id": "971eb02a-52be-4db0-b745-bc723af942b0", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:25:05.000000", "updated_at": "2020-11-06T18:25:05.000000", "name": "tempest-VolumeMetadataV3RbacTest-Volume-1536788870", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0"}], "user_id": "cc9243891fe74d9db15f3645794e03c5", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "volume_image_metadata": {"image_id": "56b368f6-9136-40ec-a04c-564d02c95e42"}, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "fdfe0253aec64702b67433b9b419b001"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:08.515 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:25:08.570 39 INFO tempest.lib.common.rest_client [req-190fbfaf-a357-4640-8aa7-5d91104b940b ] Request (VolumeMetadataV3RbacTest:test_show_volume_details_image_metadata): 200 GET http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles 0.055s 2020-11-06 18:25:08.571 39 DEBUG tempest.lib.common.rest_client [req-190fbfaf-a357-4640-8aa7-5d91104b940b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-190fbfaf-a357-4640-8aa7-5d91104b940b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:08.610 39 INFO tempest.lib.common.rest_client [req-291b24b9-dca5-43e5-8a32-824468c0a04f ] Request (VolumeMetadataV3RbacTest:test_show_volume_details_image_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:25:08.610 39 DEBUG tempest.lib.common.rest_client [req-291b24b9-dca5-43e5-8a32-824468c0a04f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-291b24b9-dca5-43e5-8a32-824468c0a04f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "cc9243891fe74d9db15f3645794e03c5", "name": "tempest-VolumeMetadataV3RbacTest-922365050", "password_expires_at": null}, "audit_ids": ["EYfdxqt6TYeOpyTEM5du4w"], "expires_at": "2020-11-06T19:25:08.000000Z", "issued_at": "2020-11-06T18:25:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fdfe0253aec64702b67433b9b419b001", "name": "tempest-VolumeMetadataV3RbacTest-922365050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:08.771 39 INFO tempest.lib.common.rest_client [req-f998ea47-946e-48ec-b04e-7f228fca9cb9 ] Request (VolumeMetadataV3RbacTest:_run_cleanups): 200 POST http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/action 0.159s 2020-11-06 18:25:08.772 39 DEBUG tempest.lib.common.rest_client [req-f998ea47-946e-48ec-b04e-7f228fca9cb9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-unset_image_metadata": {"key": "image_id"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version,Accept-Encoding', 'x-openstack-request-id': 'req-f998ea47-946e-48ec-b04e-7f228fca9cb9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:08.774 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:25:08.778 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:get_volume_metadata, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:25:08.779 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:25:08.828 39 INFO tempest.lib.common.rest_client [req-9c6ec0fd-8486-454e-b25d-3a48520dab74 ] Request (VolumeMetadataV3RbacTest:test_show_volume_metadata): 200 GET http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles 0.048s 2020-11-06 18:25:08.828 39 DEBUG tempest.lib.common.rest_client [req-9c6ec0fd-8486-454e-b25d-3a48520dab74 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9c6ec0fd-8486-454e-b25d-3a48520dab74', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:08.863 39 INFO tempest.lib.common.rest_client [req-75f6a386-6528-41f8-bc47-741924fcd7bc ] Request (VolumeMetadataV3RbacTest:test_show_volume_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:25:08.864 39 DEBUG tempest.lib.common.rest_client [req-75f6a386-6528-41f8-bc47-741924fcd7bc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-75f6a386-6528-41f8-bc47-741924fcd7bc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "cc9243891fe74d9db15f3645794e03c5", "name": "tempest-VolumeMetadataV3RbacTest-922365050", "password_expires_at": null}, "audit_ids": ["RX7k1IPoTxym1nvs_6fwCA"], "expires_at": "2020-11-06T19:25:08.000000Z", "issued_at": "2020-11-06T18:25:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fdfe0253aec64702b67433b9b419b001", "name": "tempest-VolumeMetadataV3RbacTest-922365050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:08.974 39 INFO tempest.lib.common.rest_client [req-a18337b3-879a-483e-ab26-b3cded05b7fb ] Request (VolumeMetadataV3RbacTest:test_show_volume_metadata): 200 GET http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/metadata 0.109s 2020-11-06 18:25:08.975 39 DEBUG tempest.lib.common.rest_client [req-a18337b3-879a-483e-ab26-b3cded05b7fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a18337b3-879a-483e-ab26-b3cded05b7fb', 'content-length': '16', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a18337b3-879a-483e-ab26-b3cded05b7fb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/metadata'} Body: b'{"metadata": {}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:08.977 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:25:09.024 39 INFO tempest.lib.common.rest_client [req-9a8a0974-2d6d-4d51-8d21-79005dabefd6 ] Request (VolumeMetadataV3RbacTest:test_show_volume_metadata): 200 GET http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles 0.046s 2020-11-06 18:25:09.025 39 DEBUG tempest.lib.common.rest_client [req-9a8a0974-2d6d-4d51-8d21-79005dabefd6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9a8a0974-2d6d-4d51-8d21-79005dabefd6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:09.056 39 INFO tempest.lib.common.rest_client [req-15da115f-bd20-425a-8e2a-c8cc2b758557 ] Request (VolumeMetadataV3RbacTest:test_show_volume_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.030s 2020-11-06 18:25:09.057 39 DEBUG tempest.lib.common.rest_client [req-15da115f-bd20-425a-8e2a-c8cc2b758557 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-15da115f-bd20-425a-8e2a-c8cc2b758557', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "cc9243891fe74d9db15f3645794e03c5", "name": "tempest-VolumeMetadataV3RbacTest-922365050", "password_expires_at": null}, "audit_ids": ["lZYKdJ7wSHq6ItWogyAMGg"], "expires_at": "2020-11-06T19:25:09.000000Z", "issued_at": "2020-11-06T18:25:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fdfe0253aec64702b67433b9b419b001", "name": "tempest-VolumeMetadataV3RbacTest-922365050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:09.060 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:25:09.063 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:get_volume_metadata, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:25:09.169 39 INFO tempest.lib.common.rest_client [req-a0ad87bd-ee6e-4b61-944f-c292c62ece47 ] Request (VolumeMetadataV3RbacTest:test_show_volume_metadata_item): 200 POST http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/metadata 0.105s 2020-11-06 18:25:09.169 39 DEBUG tempest.lib.common.rest_client [req-a0ad87bd-ee6e-4b61-944f-c292c62ece47 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"key1": "value1"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a0ad87bd-ee6e-4b61-944f-c292c62ece47', 'content-length': '32', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a0ad87bd-ee6e-4b61-944f-c292c62ece47', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/metadata'} Body: b'{"metadata": {"key1": "value1"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:09.172 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:25:09.220 39 INFO tempest.lib.common.rest_client [req-43df687f-109f-4c03-899d-ce439cac34dd ] Request (VolumeMetadataV3RbacTest:test_show_volume_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles 0.048s 2020-11-06 18:25:09.221 39 DEBUG tempest.lib.common.rest_client [req-43df687f-109f-4c03-899d-ce439cac34dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-43df687f-109f-4c03-899d-ce439cac34dd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:09.255 39 INFO tempest.lib.common.rest_client [req-c69c5119-da6b-49bb-ab4d-cccfbd5b947c ] Request (VolumeMetadataV3RbacTest:test_show_volume_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:25:09.256 39 DEBUG tempest.lib.common.rest_client [req-c69c5119-da6b-49bb-ab4d-cccfbd5b947c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c69c5119-da6b-49bb-ab4d-cccfbd5b947c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "cc9243891fe74d9db15f3645794e03c5", "name": "tempest-VolumeMetadataV3RbacTest-922365050", "password_expires_at": null}, "audit_ids": ["4GaovYV8SP2EVcAWpjartQ"], "expires_at": "2020-11-06T19:25:09.000000Z", "issued_at": "2020-11-06T18:25:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fdfe0253aec64702b67433b9b419b001", "name": "tempest-VolumeMetadataV3RbacTest-922365050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:09.383 39 INFO tempest.lib.common.rest_client [req-20570229-d74d-4385-ad56-fc416423df66 ] Request (VolumeMetadataV3RbacTest:test_show_volume_metadata_item): 200 GET http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/metadata/key1 0.125s 2020-11-06 18:25:09.383 39 DEBUG tempest.lib.common.rest_client [req-20570229-d74d-4385-ad56-fc416423df66 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-20570229-d74d-4385-ad56-fc416423df66', 'content-length': '28', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-20570229-d74d-4385-ad56-fc416423df66', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/metadata/key1'} Body: b'{"meta": {"key1": "value1"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:09.386 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:25:09.432 39 INFO tempest.lib.common.rest_client [req-ba80b121-86e0-4284-a43b-c7bd63cef16d ] Request (VolumeMetadataV3RbacTest:test_show_volume_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles 0.045s 2020-11-06 18:25:09.433 39 DEBUG tempest.lib.common.rest_client [req-ba80b121-86e0-4284-a43b-c7bd63cef16d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ba80b121-86e0-4284-a43b-c7bd63cef16d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:09.461 39 INFO tempest.lib.common.rest_client [req-04062b82-37fb-4d1e-bb61-cd3595819b33 ] Request (VolumeMetadataV3RbacTest:test_show_volume_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.028s 2020-11-06 18:25:09.462 39 DEBUG tempest.lib.common.rest_client [req-04062b82-37fb-4d1e-bb61-cd3595819b33 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-04062b82-37fb-4d1e-bb61-cd3595819b33', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "cc9243891fe74d9db15f3645794e03c5", "name": "tempest-VolumeMetadataV3RbacTest-922365050", "password_expires_at": null}, "audit_ids": ["6eTyei-ESaeALrLAjzllMA"], "expires_at": "2020-11-06T19:25:09.000000Z", "issued_at": "2020-11-06T18:25:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fdfe0253aec64702b67433b9b419b001", "name": "tempest-VolumeMetadataV3RbacTest-922365050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:09.582 39 INFO tempest.lib.common.rest_client [req-56041561-2334-46cf-a08a-db937fb5af24 ] Request (VolumeMetadataV3RbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/metadata/key1 0.118s 2020-11-06 18:25:09.582 39 DEBUG tempest.lib.common.rest_client [req-56041561-2334-46cf-a08a-db937fb5af24 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version,Accept-Encoding', 'x-openstack-request-id': 'req-56041561-2334-46cf-a08a-db937fb5af24', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/metadata/key1'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:09.584 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:25:09.589 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_image_metadata, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:25:09.589 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:25:09.648 39 INFO tempest.lib.common.rest_client [req-988e3789-d7bc-4151-bff3-26f1c9ed8f83 ] Request (VolumeMetadataV3RbacTest:test_update_volume_image_metadata): 200 GET http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles 0.057s 2020-11-06 18:25:09.649 39 DEBUG tempest.lib.common.rest_client [req-988e3789-d7bc-4151-bff3-26f1c9ed8f83 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-988e3789-d7bc-4151-bff3-26f1c9ed8f83', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:09.682 39 INFO tempest.lib.common.rest_client [req-2df9badb-5130-48f1-b51a-e0e086ec9c77 ] Request (VolumeMetadataV3RbacTest:test_update_volume_image_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-11-06 18:25:09.683 39 DEBUG tempest.lib.common.rest_client [req-2df9badb-5130-48f1-b51a-e0e086ec9c77 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2df9badb-5130-48f1-b51a-e0e086ec9c77', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "cc9243891fe74d9db15f3645794e03c5", "name": "tempest-VolumeMetadataV3RbacTest-922365050", "password_expires_at": null}, "audit_ids": ["HkyokjfNSESlMVOlPrxR2Q"], "expires_at": "2020-11-06T19:25:09.000000Z", "issued_at": "2020-11-06T18:25:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fdfe0253aec64702b67433b9b419b001", "name": "tempest-VolumeMetadataV3RbacTest-922365050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:09.833 39 INFO tempest.lib.common.rest_client [req-d6d2189d-6ad2-4b2f-83b7-b163224c2b3a ] Request (VolumeMetadataV3RbacTest:test_update_volume_image_metadata): 200 POST http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/action 0.149s 2020-11-06 18:25:09.833 39 DEBUG tempest.lib.common.rest_client [req-d6d2189d-6ad2-4b2f-83b7-b163224c2b3a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-set_image_metadata": {"metadata": {"image_id": "56b368f6-9136-40ec-a04c-564d02c95e42"}}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d6d2189d-6ad2-4b2f-83b7-b163224c2b3a', 'content-length': '66', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d6d2189d-6ad2-4b2f-83b7-b163224c2b3a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/action'} Body: b'{"metadata": {"image_id": "56b368f6-9136-40ec-a04c-564d02c95e42"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:09.836 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:25:09.892 39 INFO tempest.lib.common.rest_client [req-bf99d23a-4a96-46b7-80ab-009985a47c63 ] Request (VolumeMetadataV3RbacTest:test_update_volume_image_metadata): 200 GET http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles 0.055s 2020-11-06 18:25:09.892 39 DEBUG tempest.lib.common.rest_client [req-bf99d23a-4a96-46b7-80ab-009985a47c63 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bf99d23a-4a96-46b7-80ab-009985a47c63', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:09.931 39 INFO tempest.lib.common.rest_client [req-52cda9fb-9f3b-4d31-b7b7-4ec48e5991b1 ] Request (VolumeMetadataV3RbacTest:test_update_volume_image_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:25:09.931 39 DEBUG tempest.lib.common.rest_client [req-52cda9fb-9f3b-4d31-b7b7-4ec48e5991b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-52cda9fb-9f3b-4d31-b7b7-4ec48e5991b1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "cc9243891fe74d9db15f3645794e03c5", "name": "tempest-VolumeMetadataV3RbacTest-922365050", "password_expires_at": null}, "audit_ids": ["72-a4jpHRBaLN1FvtpvNbA"], "expires_at": "2020-11-06T19:25:09.000000Z", "issued_at": "2020-11-06T18:25:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fdfe0253aec64702b67433b9b419b001", "name": "tempest-VolumeMetadataV3RbacTest-922365050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:10.101 39 INFO tempest.lib.common.rest_client [req-43461860-0d9b-4154-9f53-2aa892f0a3c5 ] Request (VolumeMetadataV3RbacTest:_run_cleanups): 200 POST http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/action 0.168s 2020-11-06 18:25:10.101 39 DEBUG tempest.lib.common.rest_client [req-43461860-0d9b-4154-9f53-2aa892f0a3c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-unset_image_metadata": {"key": "image_id"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version,Accept-Encoding', 'x-openstack-request-id': 'req-43461860-0d9b-4154-9f53-2aa892f0a3c5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:10.104 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:25:10.107 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:update_volume_metadata, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:25:10.162 39 INFO tempest.lib.common.rest_client [req-223207ae-f392-4050-9448-d1173f2a91de ] Request (VolumeMetadataV3RbacTest:test_update_volume_metadata): 200 POST http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/metadata 0.054s 2020-11-06 18:25:10.162 39 DEBUG tempest.lib.common.rest_client [req-223207ae-f392-4050-9448-d1173f2a91de ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"key1": "value1"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-223207ae-f392-4050-9448-d1173f2a91de', 'content-length': '32', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-223207ae-f392-4050-9448-d1173f2a91de', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/metadata'} Body: b'{"metadata": {"key1": "value1"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:10.163 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:25:10.214 39 INFO tempest.lib.common.rest_client [req-867e1e7a-fba7-4bd9-8299-ab49ecbb5e8f ] Request (VolumeMetadataV3RbacTest:test_update_volume_metadata): 200 GET http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles 0.050s 2020-11-06 18:25:10.214 39 DEBUG tempest.lib.common.rest_client [req-867e1e7a-fba7-4bd9-8299-ab49ecbb5e8f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-867e1e7a-fba7-4bd9-8299-ab49ecbb5e8f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:10.253 39 INFO tempest.lib.common.rest_client [req-b003e893-0f80-449e-8867-a6185af6b684 ] Request (VolumeMetadataV3RbacTest:test_update_volume_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-11-06 18:25:10.253 39 DEBUG tempest.lib.common.rest_client [req-b003e893-0f80-449e-8867-a6185af6b684 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b003e893-0f80-449e-8867-a6185af6b684', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "cc9243891fe74d9db15f3645794e03c5", "name": "tempest-VolumeMetadataV3RbacTest-922365050", "password_expires_at": null}, "audit_ids": ["wB6Gi_NPRGqEaaiH4woB5w"], "expires_at": "2020-11-06T19:25:10.000000Z", "issued_at": "2020-11-06T18:25:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fdfe0253aec64702b67433b9b419b001", "name": "tempest-VolumeMetadataV3RbacTest-922365050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:10.374 39 INFO tempest.lib.common.rest_client [req-b7f73ba9-39a3-4e8f-bade-68035ebb8b41 ] Request (VolumeMetadataV3RbacTest:test_update_volume_metadata): 200 PUT http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/metadata 0.120s 2020-11-06 18:25:10.374 39 DEBUG tempest.lib.common.rest_client [req-b7f73ba9-39a3-4e8f-bade-68035ebb8b41 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"key1": "value1"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-b7f73ba9-39a3-4e8f-bade-68035ebb8b41', 'content-length': '32', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b7f73ba9-39a3-4e8f-bade-68035ebb8b41', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/metadata'} Body: b'{"metadata": {"key1": "value1"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:10.377 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:25:10.433 39 INFO tempest.lib.common.rest_client [req-9169df17-1573-4472-8c31-e94ba7de6447 ] Request (VolumeMetadataV3RbacTest:test_update_volume_metadata): 200 GET http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles 0.054s 2020-11-06 18:25:10.433 39 DEBUG tempest.lib.common.rest_client [req-9169df17-1573-4472-8c31-e94ba7de6447 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9169df17-1573-4472-8c31-e94ba7de6447', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:10.471 39 INFO tempest.lib.common.rest_client [req-4f5fd70e-99d8-4e24-857f-c858da85d566 ] Request (VolumeMetadataV3RbacTest:test_update_volume_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:25:10.472 39 DEBUG tempest.lib.common.rest_client [req-4f5fd70e-99d8-4e24-857f-c858da85d566 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4f5fd70e-99d8-4e24-857f-c858da85d566', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "cc9243891fe74d9db15f3645794e03c5", "name": "tempest-VolumeMetadataV3RbacTest-922365050", "password_expires_at": null}, "audit_ids": ["62Sz3dzGTS-JdBYiBh1V2g"], "expires_at": "2020-11-06T19:25:10.000000Z", "issued_at": "2020-11-06T18:25:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fdfe0253aec64702b67433b9b419b001", "name": "tempest-VolumeMetadataV3RbacTest-922365050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:10.596 39 INFO tempest.lib.common.rest_client [req-439f5890-5af8-4afc-8bd9-3a072ba56d7d ] Request (VolumeMetadataV3RbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/metadata/key1 0.123s 2020-11-06 18:25:10.597 39 DEBUG tempest.lib.common.rest_client [req-439f5890-5af8-4afc-8bd9-3a072ba56d7d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version,Accept-Encoding', 'x-openstack-request-id': 'req-439f5890-5af8-4afc-8bd9-3a072ba56d7d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/metadata/key1'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:10.599 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:25:10.602 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:update_volume_metadata, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:25:10.663 39 INFO tempest.lib.common.rest_client [req-7c8a5ed7-6656-4ca8-ba5b-01fb032c93bb ] Request (VolumeMetadataV3RbacTest:test_update_volume_metadata_item): 200 POST http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/metadata 0.060s 2020-11-06 18:25:10.663 39 DEBUG tempest.lib.common.rest_client [req-7c8a5ed7-6656-4ca8-ba5b-01fb032c93bb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"key1": "value1"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-7c8a5ed7-6656-4ca8-ba5b-01fb032c93bb', 'content-length': '32', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7c8a5ed7-6656-4ca8-ba5b-01fb032c93bb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/metadata'} Body: b'{"metadata": {"key1": "value1"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:10.666 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:25:10.716 39 INFO tempest.lib.common.rest_client [req-97c8432b-d076-46ca-a3e1-71425da8acce ] Request (VolumeMetadataV3RbacTest:test_update_volume_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles 0.049s 2020-11-06 18:25:10.717 39 DEBUG tempest.lib.common.rest_client [req-97c8432b-d076-46ca-a3e1-71425da8acce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-97c8432b-d076-46ca-a3e1-71425da8acce', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:10.752 39 INFO tempest.lib.common.rest_client [req-d1cac9bb-dd3a-4d5b-95d7-afabbd91a212 ] Request (VolumeMetadataV3RbacTest:test_update_volume_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:25:10.753 39 DEBUG tempest.lib.common.rest_client [req-d1cac9bb-dd3a-4d5b-95d7-afabbd91a212 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d1cac9bb-dd3a-4d5b-95d7-afabbd91a212', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "cc9243891fe74d9db15f3645794e03c5", "name": "tempest-VolumeMetadataV3RbacTest-922365050", "password_expires_at": null}, "audit_ids": ["-ZtOgZ-NSDusJD4hp_BpsA"], "expires_at": "2020-11-06T19:25:10.000000Z", "issued_at": "2020-11-06T18:25:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fdfe0253aec64702b67433b9b419b001", "name": "tempest-VolumeMetadataV3RbacTest-922365050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:10.877 39 INFO tempest.lib.common.rest_client [req-d2b1b829-08e2-491f-b30a-89d7b4a9c282 ] Request (VolumeMetadataV3RbacTest:test_update_volume_metadata_item): 200 PUT http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/metadata/key1 0.123s 2020-11-06 18:25:10.877 39 DEBUG tempest.lib.common.rest_client [req-d2b1b829-08e2-491f-b30a-89d7b4a9c282 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"meta": {"key1": "value1_update"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d2b1b829-08e2-491f-b30a-89d7b4a9c282', 'content-length': '35', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d2b1b829-08e2-491f-b30a-89d7b4a9c282', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/metadata/key1'} Body: b'{"meta": {"key1": "value1_update"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:10.880 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:25:10.937 39 INFO tempest.lib.common.rest_client [req-de461a03-4f2c-4383-ada5-9af233bffc1f ] Request (VolumeMetadataV3RbacTest:test_update_volume_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles 0.056s 2020-11-06 18:25:10.938 39 DEBUG tempest.lib.common.rest_client [req-de461a03-4f2c-4383-ada5-9af233bffc1f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-de461a03-4f2c-4383-ada5-9af233bffc1f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001/users/cc9243891fe74d9db15f3645794e03c5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:10.976 39 INFO tempest.lib.common.rest_client [req-e81a318f-44a8-4141-98c8-f8cc43eef9d5 ] Request (VolumeMetadataV3RbacTest:test_update_volume_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:25:10.976 39 DEBUG tempest.lib.common.rest_client [req-e81a318f-44a8-4141-98c8-f8cc43eef9d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e81a318f-44a8-4141-98c8-f8cc43eef9d5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "cc9243891fe74d9db15f3645794e03c5", "name": "tempest-VolumeMetadataV3RbacTest-922365050", "password_expires_at": null}, "audit_ids": ["cTv8X3zNTzyaAf-lyy5B5w"], "expires_at": "2020-11-06T19:25:10.000000Z", "issued_at": "2020-11-06T18:25:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fdfe0253aec64702b67433b9b419b001", "name": "tempest-VolumeMetadataV3RbacTest-922365050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fdfe0253aec64702b67433b9b419b001", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:11.104 39 INFO tempest.lib.common.rest_client [req-1e9d405a-e1f4-4032-9072-c6364fb20c2a ] Request (VolumeMetadataV3RbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/metadata/key1 0.126s 2020-11-06 18:25:11.105 39 DEBUG tempest.lib.common.rest_client [req-1e9d405a-e1f4-4032-9072-c6364fb20c2a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version,Accept-Encoding', 'x-openstack-request-id': 'req-1e9d405a-e1f4-4032-9072-c6364fb20c2a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0/metadata/key1'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:11.176 39 INFO tempest.lib.common.rest_client [req-65698f1c-317a-47ac-8636-de57357e393d ] Request (VolumeMetadataV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0 0.069s 2020-11-06 18:25:11.176 39 DEBUG tempest.lib.common.rest_client [req-65698f1c-317a-47ac-8636-de57357e393d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-65698f1c-317a-47ac-8636-de57357e393d', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:11.245 39 INFO tempest.lib.common.rest_client [req-78f2824a-acbe-4c43-8507-c80da51c7838 ] Request (VolumeMetadataV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0 0.068s 2020-11-06 18:25:11.246 39 DEBUG tempest.lib.common.rest_client [req-78f2824a-acbe-4c43-8507-c80da51c7838 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-78f2824a-acbe-4c43-8507-c80da51c7838', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-78f2824a-acbe-4c43-8507-c80da51c7838', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0'} Body: b'{"volume": {"id": "971eb02a-52be-4db0-b745-bc723af942b0", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:25:05.000000", "updated_at": "2020-11-06T18:25:11.000000", "name": "tempest-VolumeMetadataV3RbacTest-Volume-1536788870", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0"}], "user_id": "cc9243891fe74d9db15f3645794e03c5", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "fdfe0253aec64702b67433b9b419b001"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:12.306 39 INFO tempest.lib.common.rest_client [req-ee7ea2fe-dfaf-4245-8da4-8c757957be51 ] Request (VolumeMetadataV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0 0.046s 2020-11-06 18:25:12.307 39 DEBUG tempest.lib.common.rest_client [req-ee7ea2fe-dfaf-4245-8da4-8c757957be51 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-ee7ea2fe-dfaf-4245-8da4-8c757957be51', 'x-openstack-request-id': 'req-ee7ea2fe-dfaf-4245-8da4-8c757957be51', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/fdfe0253aec64702b67433b9b419b001/volumes/971eb02a-52be-4db0-b745-bc723af942b0'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 971eb02a-52be-4db0-b745-bc723af942b0 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:12.433 39 INFO tempest.lib.common.rest_client [req-df479d37-dc97-488f-adbb-35f542a17f2c ] Request (VolumeMetadataV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/cc9243891fe74d9db15f3645794e03c5 0.125s 2020-11-06 18:25:12.433 39 DEBUG tempest.lib.common.rest_client [req-df479d37-dc97-488f-adbb-35f542a17f2c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-df479d37-dc97-488f-adbb-35f542a17f2c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/cc9243891fe74d9db15f3645794e03c5'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:12.521 39 INFO tempest.lib.common.rest_client [req-7091c708-92b3-4ad0-8255-943457036074 ] Request (VolumeMetadataV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-11-06 18:25:12.521 39 DEBUG tempest.lib.common.rest_client [req-7091c708-92b3-4ad0-8255-943457036074 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7091c708-92b3-4ad0-8255-943457036074', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["lzWOdSE3R-6LCyolN0g2vA"], "expires_at": "2020-11-06T19:25:12.000000Z", "issued_at": "2020-11-06T18:25:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:12.870 39 INFO tempest.lib.common.rest_client [req-0d000c69-d2d0-4c4f-a706-b0181131fbc7 ] Request (VolumeMetadataV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=fdfe0253aec64702b67433b9b419b001&name=default 0.348s 2020-11-06 18:25:12.871 39 DEBUG tempest.lib.common.rest_client [req-0d000c69-d2d0-4c4f-a706-b0181131fbc7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-0d000c69-d2d0-4c4f-a706-b0181131fbc7', 'date': 'Fri, 06 Nov 2020 18:25:12 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=fdfe0253aec64702b67433b9b419b001&name=default'} Body: b'{"security_groups": [{"id": "4df83d6f-0f7e-46cd-821a-3e9d47694ac0", "name": "default", "stateful": true, "tenant_id": "fdfe0253aec64702b67433b9b419b001", "description": "Default security group", "security_group_rules": [{"id": "16b0ba60-b5b1-4ac2-92c2-5ae0ee6459a7", "tenant_id": "fdfe0253aec64702b67433b9b419b001", "security_group_id": "4df83d6f-0f7e-46cd-821a-3e9d47694ac0", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:25:12Z", "updated_at": "2020-11-06T18:25:12Z", "revision_number": 0, "project_id": "fdfe0253aec64702b67433b9b419b001"}, {"id": "347ce793-0ae7-4dbd-a0dc-a5a03f3cd332", "tenant_id": "fdfe0253aec64702b67433b9b419b001", "security_group_id": "4df83d6f-0f7e-46cd-821a-3e9d47694ac0", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:25:12Z", "updated_at": "2020-11-06T18:25:12Z", "revision_number": 0, "project_id": "fdfe0253aec64702b67433b9b419b001"}, {"id": "7a31e7cf-b3ed-4eeb-9914-74c26f95349d", "tenant_id": "fdfe0253aec64702b67433b9b419b001", "security_group_id": "4df83d6f-0f7e-46cd-821a-3e9d47694ac0", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "4df83d6f-0f7e-46cd-821a-3e9d47694ac0", "description": null, "tags": [], "created_at": "2020-11-06T18:25:12Z", "updated_at": "2020-11-06T18:25:12Z", "revision_number": 0, "project_id": "fdfe0253aec64702b67433b9b419b001"}, {"id": "e8d5007d-5242-4210-8593-b9a4d6d6493e", "tenant_id": "fdfe0253aec64702b67433b9b419b001", "security_group_id": "4df83d6f-0f7e-46cd-821a-3e9d47694ac0", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "4df83d6f-0f7e-46cd-821a-3e9d47694ac0", "description": null, "tags": [], "created_at": "2020-11-06T18:25:12Z", "updated_at": "2020-11-06T18:25:12Z", "revision_number": 0, "project_id": "fdfe0253aec64702b67433b9b419b001"}], "tags": [], "created_at": "2020-11-06T18:25:12Z", "updated_at": "2020-11-06T18:25:12Z", "revision_number": 1, "project_id": "fdfe0253aec64702b67433b9b419b001"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:13.011 39 INFO tempest.lib.common.rest_client [req-d31067f6-dd7a-489b-8e73-8e215f4d27f9 ] Request (VolumeMetadataV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/4df83d6f-0f7e-46cd-821a-3e9d47694ac0 0.139s 2020-11-06 18:25:13.011 39 DEBUG tempest.lib.common.rest_client [req-d31067f6-dd7a-489b-8e73-8e215f4d27f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-d31067f6-dd7a-489b-8e73-8e215f4d27f9', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:25:13 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/4df83d6f-0f7e-46cd-821a-3e9d47694ac0'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:13.161 39 INFO tempest.lib.common.rest_client [req-5219b81f-7a86-4939-9fbf-519556259c0d ] Request (VolumeMetadataV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001 0.148s 2020-11-06 18:25:13.161 39 DEBUG tempest.lib.common.rest_client [req-5219b81f-7a86-4939-9fbf-519556259c0d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5219b81f-7a86-4939-9fbf-519556259c0d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/fdfe0253aec64702b67433b9b419b001'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:13.251 39 INFO tempest.lib.common.rest_client [req-45faebd3-bbbe-4283-b4bf-2f8948a8fc25 ] Request (VolumeServicesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-11-06 18:25:13.252 39 DEBUG tempest.lib.common.rest_client [req-45faebd3-bbbe-4283-b4bf-2f8948a8fc25 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-45faebd3-bbbe-4283-b4bf-2f8948a8fc25', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["EuUbECc0S1adCcvg5CLquw"], "expires_at": "2020-11-06T19:25:13.000000Z", "issued_at": "2020-11-06T18:25:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:13.294 39 INFO tempest.lib.common.rest_client [req-e400e5fc-95c9-4322-b42d-4574da3b46b2 ] Request (VolumeServicesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-11-06 18:25:13.295 39 DEBUG tempest.lib.common.rest_client [req-e400e5fc-95c9-4322-b42d-4574da3b46b2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e400e5fc-95c9-4322-b42d-4574da3b46b2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["OBKuEkonRx-9_ZJvOqVB_A"], "expires_at": "2020-11-06T19:25:13.000000Z", "issued_at": "2020-11-06T18:25:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:13.346 39 INFO tempest.lib.common.rest_client [req-ed522c09-8ac1-444b-918c-97c7d053204a ] Request (VolumeServicesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.049s 2020-11-06 18:25:13.346 39 DEBUG tempest.lib.common.rest_client [req-ed522c09-8ac1-444b-918c-97c7d053204a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ed522c09-8ac1-444b-918c-97c7d053204a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:13.405 39 INFO tempest.lib.common.rest_client [req-0f0366d3-f66f-4976-9694-efc27f4cf81b ] Request (VolumeServicesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.058s 2020-11-06 18:25:13.405 39 DEBUG tempest.lib.common.rest_client [req-0f0366d3-f66f-4976-9694-efc27f4cf81b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumeServicesV3RbacTest-707070568-desc", "domain_id": "default", "name": "tempest-VolumeServicesV3RbacTest-707070568"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '384', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0f0366d3-f66f-4976-9694-efc27f4cf81b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "0a7e90b4f78d498db098bcf0f1a1dd42", "name": "tempest-VolumeServicesV3RbacTest-707070568", "domain_id": "default", "description": "tempest-VolumeServicesV3RbacTest-707070568-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/0a7e90b4f78d498db098bcf0f1a1dd42"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:13.507 39 INFO tempest.lib.common.rest_client [req-6c509cb5-569b-4fa8-b794-461f05debb17 ] Request (VolumeServicesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.101s 2020-11-06 18:25:13.508 39 DEBUG tempest.lib.common.rest_client [req-6c509cb5-569b-4fa8-b794-461f05debb17 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumeServicesV3RbacTest-707070568", "password": "G4=L*FYOIBj+PO^", "project_id": "0a7e90b4f78d498db098bcf0f1a1dd42", "email": "tempest-VolumeServicesV3RbacTest-1280376089@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '403', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6c509cb5-569b-4fa8-b794-461f05debb17', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "0a7e90b4f78d498db098bcf0f1a1dd42", "email": "tempest-VolumeServicesV3RbacTest-1280376089@example.com", "id": "f24c719956ba4d7aa9dc20b1f45f1e47", "name": "tempest-VolumeServicesV3RbacTest-707070568", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/f24c719956ba4d7aa9dc20b1f45f1e47"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:13.554 39 INFO tempest.lib.common.rest_client [req-4c3832ea-290c-41cc-af0d-e4cac8b4a205 ] Request (VolumeServicesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.046s 2020-11-06 18:25:13.555 39 DEBUG tempest.lib.common.rest_client [req-4c3832ea-290c-41cc-af0d-e4cac8b4a205 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4c3832ea-290c-41cc-af0d-e4cac8b4a205', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:13.602 39 INFO tempest.lib.common.rest_client [req-f666ceaf-f3ec-46ce-9657-512a45373666 ] Request (VolumeServicesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.045s 2020-11-06 18:25:13.602 39 DEBUG tempest.lib.common.rest_client [req-f666ceaf-f3ec-46ce-9657-512a45373666 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f666ceaf-f3ec-46ce-9657-512a45373666', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:13.669 39 INFO tempest.lib.common.rest_client [req-245df927-6b2f-41bf-add2-d8d5581715d9 ] Request (VolumeServicesV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/0a7e90b4f78d498db098bcf0f1a1dd42/users/f24c719956ba4d7aa9dc20b1f45f1e47/roles/72a4576c553448cd941b052c1ca0cf2d 0.066s 2020-11-06 18:25:13.669 39 DEBUG tempest.lib.common.rest_client [req-245df927-6b2f-41bf-add2-d8d5581715d9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-245df927-6b2f-41bf-add2-d8d5581715d9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/0a7e90b4f78d498db098bcf0f1a1dd42/users/f24c719956ba4d7aa9dc20b1f45f1e47/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:13.670 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumeServicesV3RbacTest-707070568', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '0a7e90b4f78d498db098bcf0f1a1dd42', 'project_name': 'tempest-VolumeServicesV3RbacTest-707070568', 'tenant_id': '0a7e90b4f78d498db098bcf0f1a1dd42', 'tenant_name': 'tempest-VolumeServicesV3RbacTest-707070568', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'f24c719956ba4d7aa9dc20b1f45f1e47'}, Network: None, Subnet: None, Router: None 2020-11-06 18:25:13.670 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumeServicesV3RbacTest-707070568', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '0a7e90b4f78d498db098bcf0f1a1dd42', 'project_name': 'tempest-VolumeServicesV3RbacTest-707070568', 'tenant_id': '0a7e90b4f78d498db098bcf0f1a1dd42', 'tenant_name': 'tempest-VolumeServicesV3RbacTest-707070568', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'f24c719956ba4d7aa9dc20b1f45f1e47'}, Network: None, Subnet: None, Router: None 2020-11-06 18:25:13.782 39 INFO tempest.lib.common.rest_client [req-ef92d6dd-dc15-4916-b511-c456f8fcf312 ] Request (VolumeServicesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.101s 2020-11-06 18:25:13.782 39 DEBUG tempest.lib.common.rest_client [req-ef92d6dd-dc15-4916-b511-c456f8fcf312 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6577', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ef92d6dd-dc15-4916-b511-c456f8fcf312', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f24c719956ba4d7aa9dc20b1f45f1e47", "name": "tempest-VolumeServicesV3RbacTest-707070568", "password_expires_at": null}, "audit_ids": ["J1J9LGvUS8eZ1WFaSZry-g"], "expires_at": "2020-11-06T19:25:13.000000Z", "issued_at": "2020-11-06T18:25:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0a7e90b4f78d498db098bcf0f1a1dd42", "name": "tempest-VolumeServicesV3RbacTest-707070568"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0a7e90b4f78d498db098bcf0f1a1dd42", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0a7e90b4f78d498db098bcf0f1a1dd42", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0a7e90b4f78d498db098bcf0f1a1dd42", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0a7e90b4f78d498db098bcf0f1a1dd42", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0a7e90b4f78d498db098bcf0f1a1dd42", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0a7e90b4f78d498db098bcf0f1a1dd42", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:13.872 39 INFO tempest.lib.common.rest_client [req-0d2a8b82-3e82-41ed-b3ae-7dc9b1c9a184 ] Request (VolumeServicesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 18:25:13.873 39 DEBUG tempest.lib.common.rest_client [req-0d2a8b82-3e82-41ed-b3ae-7dc9b1c9a184 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0d2a8b82-3e82-41ed-b3ae-7dc9b1c9a184', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["hgMl4lqYSBWbX6ueL1p1lw"], "expires_at": "2020-11-06T19:25:13.000000Z", "issued_at": "2020-11-06T18:25:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:13.917 39 INFO tempest.lib.common.rest_client [req-b628a1ce-965b-4272-8bbd-c026db4dbba5 ] Request (VolumeServicesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:25:13.917 39 DEBUG tempest.lib.common.rest_client [req-b628a1ce-965b-4272-8bbd-c026db4dbba5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b628a1ce-965b-4272-8bbd-c026db4dbba5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["eZiU_X_cRzufV18joo0u5w"], "expires_at": "2020-11-06T19:25:13.000000Z", "issued_at": "2020-11-06T18:25:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:13.968 39 INFO tempest.lib.common.rest_client [req-bb9c4e26-f3d2-4ff5-b6ad-0bf0424f052a ] Request (VolumeServicesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.050s 2020-11-06 18:25:13.969 39 DEBUG tempest.lib.common.rest_client [req-bb9c4e26-f3d2-4ff5-b6ad-0bf0424f052a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bb9c4e26-f3d2-4ff5-b6ad-0bf0424f052a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:14.025 39 INFO tempest.lib.common.rest_client [req-a81f86ea-b236-47eb-9a08-a9961f5d82de ] Request (VolumeServicesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-11-06 18:25:14.025 39 DEBUG tempest.lib.common.rest_client [req-a81f86ea-b236-47eb-9a08-a9961f5d82de ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a81f86ea-b236-47eb-9a08-a9961f5d82de', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:14.026 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:25:14.026 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:25:14.078 39 INFO tempest.lib.common.rest_client [req-0e68b311-8889-431b-ab02-abc123c6b3d8 ] Request (VolumeServicesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/0a7e90b4f78d498db098bcf0f1a1dd42/users/f24c719956ba4d7aa9dc20b1f45f1e47/roles 0.051s 2020-11-06 18:25:14.078 39 DEBUG tempest.lib.common.rest_client [req-0e68b311-8889-431b-ab02-abc123c6b3d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0e68b311-8889-431b-ab02-abc123c6b3d8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0a7e90b4f78d498db098bcf0f1a1dd42/users/f24c719956ba4d7aa9dc20b1f45f1e47/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0a7e90b4f78d498db098bcf0f1a1dd42/users/f24c719956ba4d7aa9dc20b1f45f1e47/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:14.140 39 INFO tempest.lib.common.rest_client [req-b642aa89-4811-4d49-9e23-c4b7623d049f ] Request (VolumeServicesV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/0a7e90b4f78d498db098bcf0f1a1dd42/users/f24c719956ba4d7aa9dc20b1f45f1e47/roles/72a4576c553448cd941b052c1ca0cf2d 0.060s 2020-11-06 18:25:14.140 39 DEBUG tempest.lib.common.rest_client [req-b642aa89-4811-4d49-9e23-c4b7623d049f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b642aa89-4811-4d49-9e23-c4b7623d049f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/0a7e90b4f78d498db098bcf0f1a1dd42/users/f24c719956ba4d7aa9dc20b1f45f1e47/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:14.241 39 INFO tempest.lib.common.rest_client [req-fee5bac1-cf02-437c-ab87-7d2ad14db621 ] Request (VolumeServicesV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/0a7e90b4f78d498db098bcf0f1a1dd42/users/f24c719956ba4d7aa9dc20b1f45f1e47/roles/a629c95d64b3416fb80ae90af4f69c05 0.100s 2020-11-06 18:25:14.241 39 DEBUG tempest.lib.common.rest_client [req-fee5bac1-cf02-437c-ab87-7d2ad14db621 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fee5bac1-cf02-437c-ab87-7d2ad14db621', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/0a7e90b4f78d498db098bcf0f1a1dd42/users/f24c719956ba4d7aa9dc20b1f45f1e47/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:15.334 39 INFO tempest.lib.common.rest_client [req-a2d20034-6a14-418b-a7ea-c11e754dc100 ] Request (VolumeServicesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-11-06 18:25:15.334 39 DEBUG tempest.lib.common.rest_client [req-a2d20034-6a14-418b-a7ea-c11e754dc100 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a2d20034-6a14-418b-a7ea-c11e754dc100', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f24c719956ba4d7aa9dc20b1f45f1e47", "name": "tempest-VolumeServicesV3RbacTest-707070568", "password_expires_at": null}, "audit_ids": ["CHDnAMWmSAiUbntpvJ8SHA"], "expires_at": "2020-11-06T19:25:15.000000Z", "issued_at": "2020-11-06T18:25:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0a7e90b4f78d498db098bcf0f1a1dd42", "name": "tempest-VolumeServicesV3RbacTest-707070568"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0a7e90b4f78d498db098bcf0f1a1dd42", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0a7e90b4f78d498db098bcf0f1a1dd42", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0a7e90b4f78d498db098bcf0f1a1dd42", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0a7e90b4f78d498db098bcf0f1a1dd42", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0a7e90b4f78d498db098bcf0f1a1dd42", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0a7e90b4f78d498db098bcf0f1a1dd42", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:15.336 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:25:15.340 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:services:index, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:25:15.340 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:25:15.456 39 INFO tempest.lib.common.rest_client [req-f551e03d-45b9-4ad8-9b47-5763a7c5c3c1 ] Request (VolumeServicesV3RbacTest:test_list_services): 200 GET http://172.30.13.94/identity/v3/projects/0a7e90b4f78d498db098bcf0f1a1dd42/users/f24c719956ba4d7aa9dc20b1f45f1e47/roles 0.115s 2020-11-06 18:25:15.456 39 DEBUG tempest.lib.common.rest_client [req-f551e03d-45b9-4ad8-9b47-5763a7c5c3c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f551e03d-45b9-4ad8-9b47-5763a7c5c3c1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0a7e90b4f78d498db098bcf0f1a1dd42/users/f24c719956ba4d7aa9dc20b1f45f1e47/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0a7e90b4f78d498db098bcf0f1a1dd42/users/f24c719956ba4d7aa9dc20b1f45f1e47/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:15.495 39 INFO tempest.lib.common.rest_client [req-c270a0c1-3684-4023-acd5-9224a43bb198 ] Request (VolumeServicesV3RbacTest:test_list_services): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:25:15.496 39 DEBUG tempest.lib.common.rest_client [req-c270a0c1-3684-4023-acd5-9224a43bb198 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c270a0c1-3684-4023-acd5-9224a43bb198', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f24c719956ba4d7aa9dc20b1f45f1e47", "name": "tempest-VolumeServicesV3RbacTest-707070568", "password_expires_at": null}, "audit_ids": ["qE8HaE6PTRyZc-9QUuqdow"], "expires_at": "2020-11-06T19:25:15.000000Z", "issued_at": "2020-11-06T18:25:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0a7e90b4f78d498db098bcf0f1a1dd42", "name": "tempest-VolumeServicesV3RbacTest-707070568"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0a7e90b4f78d498db098bcf0f1a1dd42", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0a7e90b4f78d498db098bcf0f1a1dd42", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0a7e90b4f78d498db098bcf0f1a1dd42", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0a7e90b4f78d498db098bcf0f1a1dd42", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0a7e90b4f78d498db098bcf0f1a1dd42", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0a7e90b4f78d498db098bcf0f1a1dd42", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:15.685 39 INFO tempest.lib.common.rest_client [req-a949457b-b28e-4fe5-a40b-b93c174db489 ] Request (VolumeServicesV3RbacTest:test_list_services): 200 GET http://172.30.13.94/volume/v3/0a7e90b4f78d498db098bcf0f1a1dd42/os-services 0.188s 2020-11-06 18:25:15.685 39 DEBUG tempest.lib.common.rest_client [req-a949457b-b28e-4fe5-a40b-b93c174db489 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a949457b-b28e-4fe5-a40b-b93c174db489', 'content-length': '875', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a949457b-b28e-4fe5-a40b-b93c174db489', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/0a7e90b4f78d498db098bcf0f1a1dd42/os-services'} Body: b'{"services": [{"binary": "cinder-volume", "host": "lf-virtual9@ceph", "zone": "nova", "status": "enabled", "state": "up", "updated_at": "2020-11-06T18:25:08.000000", "disabled_reason": null, "replication_status": "disabled", "active_backend_id": null, "frozen": false}, {"binary": "cinder-scheduler", "host": "lf-virtual9", "zone": "nova", "status": "enabled", "state": "up", "updated_at": "2020-11-06T18:25:08.000000", "disabled_reason": null}, {"binary": "cinder-backup", "host": "lf-virtual9", "zone": "nova", "status": "enabled", "state": "up", "updated_at": "2020-11-06T18:25:10.000000", "disabled_reason": null}, {"binary": "cinder-volume", "host": "lf-virtual8@ceph", "zone": "nova", "status": "enabled", "state": "up", "updated_at": "2020-11-06T18:25:13.000000", "disabled_reason": null, "replication_status": "disabled", "active_backend_id": null, "frozen": false}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:15.689 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:25:15.740 39 INFO tempest.lib.common.rest_client [req-f484e015-1b37-490a-84fb-ea8aec482a7c ] Request (VolumeServicesV3RbacTest:test_list_services): 200 GET http://172.30.13.94/identity/v3/projects/0a7e90b4f78d498db098bcf0f1a1dd42/users/f24c719956ba4d7aa9dc20b1f45f1e47/roles 0.050s 2020-11-06 18:25:15.741 39 DEBUG tempest.lib.common.rest_client [req-f484e015-1b37-490a-84fb-ea8aec482a7c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f484e015-1b37-490a-84fb-ea8aec482a7c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0a7e90b4f78d498db098bcf0f1a1dd42/users/f24c719956ba4d7aa9dc20b1f45f1e47/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0a7e90b4f78d498db098bcf0f1a1dd42/users/f24c719956ba4d7aa9dc20b1f45f1e47/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:15.777 39 INFO tempest.lib.common.rest_client [req-9430e5cd-a2d5-4798-8e70-0c28c29e6e88 ] Request (VolumeServicesV3RbacTest:test_list_services): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-11-06 18:25:15.778 39 DEBUG tempest.lib.common.rest_client [req-9430e5cd-a2d5-4798-8e70-0c28c29e6e88 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9430e5cd-a2d5-4798-8e70-0c28c29e6e88', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f24c719956ba4d7aa9dc20b1f45f1e47", "name": "tempest-VolumeServicesV3RbacTest-707070568", "password_expires_at": null}, "audit_ids": ["qfrocNeIRN-r-PE7nnVU0A"], "expires_at": "2020-11-06T19:25:15.000000Z", "issued_at": "2020-11-06T18:25:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0a7e90b4f78d498db098bcf0f1a1dd42", "name": "tempest-VolumeServicesV3RbacTest-707070568"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0a7e90b4f78d498db098bcf0f1a1dd42", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0a7e90b4f78d498db098bcf0f1a1dd42", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0a7e90b4f78d498db098bcf0f1a1dd42", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0a7e90b4f78d498db098bcf0f1a1dd42", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0a7e90b4f78d498db098bcf0f1a1dd42", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0a7e90b4f78d498db098bcf0f1a1dd42", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:15.911 39 INFO tempest.lib.common.rest_client [req-49c02170-e9cb-40fa-b6d9-f0c732f1aa44 ] Request (VolumeServicesV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/f24c719956ba4d7aa9dc20b1f45f1e47 0.130s 2020-11-06 18:25:15.911 39 DEBUG tempest.lib.common.rest_client [req-49c02170-e9cb-40fa-b6d9-f0c732f1aa44 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-49c02170-e9cb-40fa-b6d9-f0c732f1aa44', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/f24c719956ba4d7aa9dc20b1f45f1e47'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:16.001 39 INFO tempest.lib.common.rest_client [req-41e13976-fd32-4d5a-91ed-9d9ea5644dce ] Request (VolumeServicesV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-11-06 18:25:16.002 39 DEBUG tempest.lib.common.rest_client [req-41e13976-fd32-4d5a-91ed-9d9ea5644dce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-41e13976-fd32-4d5a-91ed-9d9ea5644dce', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["GcHJA-VJTTG3lVayzGtSPw"], "expires_at": "2020-11-06T19:25:15.000000Z", "issued_at": "2020-11-06T18:25:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:16.372 39 INFO tempest.lib.common.rest_client [req-c3355b72-6271-4dbd-a758-35cb844434d7 ] Request (VolumeServicesV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=0a7e90b4f78d498db098bcf0f1a1dd42&name=default 0.369s 2020-11-06 18:25:16.372 39 DEBUG tempest.lib.common.rest_client [req-c3355b72-6271-4dbd-a758-35cb844434d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-c3355b72-6271-4dbd-a758-35cb844434d7', 'date': 'Fri, 06 Nov 2020 18:25:16 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=0a7e90b4f78d498db098bcf0f1a1dd42&name=default'} Body: b'{"security_groups": [{"id": "c6bedf05-dc1a-47e6-b90b-98eff2e4889c", "name": "default", "stateful": true, "tenant_id": "0a7e90b4f78d498db098bcf0f1a1dd42", "description": "Default security group", "security_group_rules": [{"id": "30ad55d6-3d9c-4941-93be-fb4961676c14", "tenant_id": "0a7e90b4f78d498db098bcf0f1a1dd42", "security_group_id": "c6bedf05-dc1a-47e6-b90b-98eff2e4889c", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "c6bedf05-dc1a-47e6-b90b-98eff2e4889c", "description": null, "tags": [], "created_at": "2020-11-06T18:25:16Z", "updated_at": "2020-11-06T18:25:16Z", "revision_number": 0, "project_id": "0a7e90b4f78d498db098bcf0f1a1dd42"}, {"id": "6dfe1188-f455-4167-9a5f-2ee9e2706ed9", "tenant_id": "0a7e90b4f78d498db098bcf0f1a1dd42", "security_group_id": "c6bedf05-dc1a-47e6-b90b-98eff2e4889c", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:25:16Z", "updated_at": "2020-11-06T18:25:16Z", "revision_number": 0, "project_id": "0a7e90b4f78d498db098bcf0f1a1dd42"}, {"id": "7d881666-3a50-40b9-b207-d81996ba7740", "tenant_id": "0a7e90b4f78d498db098bcf0f1a1dd42", "security_group_id": "c6bedf05-dc1a-47e6-b90b-98eff2e4889c", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:25:16Z", "updated_at": "2020-11-06T18:25:16Z", "revision_number": 0, "project_id": "0a7e90b4f78d498db098bcf0f1a1dd42"}, {"id": "a4ec563f-d366-4519-a0e8-70cdd8a16730", "tenant_id": "0a7e90b4f78d498db098bcf0f1a1dd42", "security_group_id": "c6bedf05-dc1a-47e6-b90b-98eff2e4889c", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "c6bedf05-dc1a-47e6-b90b-98eff2e4889c", "description": null, "tags": [], "created_at": "2020-11-06T18:25:16Z", "updated_at": "2020-11-06T18:25:16Z", "revision_number": 0, "project_id": "0a7e90b4f78d498db098bcf0f1a1dd42"}], "tags": [], "created_at": "2020-11-06T18:25:16Z", "updated_at": "2020-11-06T18:25:16Z", "revision_number": 1, "project_id": "0a7e90b4f78d498db098bcf0f1a1dd42"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:16.500 39 INFO tempest.lib.common.rest_client [req-6b59e0c1-6815-4205-a0bd-0c7d5dd4b2b9 ] Request (VolumeServicesV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/c6bedf05-dc1a-47e6-b90b-98eff2e4889c 0.126s 2020-11-06 18:25:16.500 39 DEBUG tempest.lib.common.rest_client [req-6b59e0c1-6815-4205-a0bd-0c7d5dd4b2b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-6b59e0c1-6815-4205-a0bd-0c7d5dd4b2b9', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:25:16 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/c6bedf05-dc1a-47e6-b90b-98eff2e4889c'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:16.610 39 INFO tempest.lib.common.rest_client [req-9939a6de-5527-47aa-8f95-a2fc9e2e6fe9 ] Request (VolumeServicesV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/0a7e90b4f78d498db098bcf0f1a1dd42 0.108s 2020-11-06 18:25:16.610 39 DEBUG tempest.lib.common.rest_client [req-9939a6de-5527-47aa-8f95-a2fc9e2e6fe9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9939a6de-5527-47aa-8f95-a2fc9e2e6fe9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/0a7e90b4f78d498db098bcf0f1a1dd42'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:16.703 39 INFO tempest.lib.common.rest_client [req-0e2a251d-3949-4543-9437-2f4acb607e7b ] Request (VolumesManageV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-11-06 18:25:16.704 39 DEBUG tempest.lib.common.rest_client [req-0e2a251d-3949-4543-9437-2f4acb607e7b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0e2a251d-3949-4543-9437-2f4acb607e7b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["pHCvYeo9SgKbtuJG9uZ-Gg"], "expires_at": "2020-11-06T19:25:16.000000Z", "issued_at": "2020-11-06T18:25:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:16.748 39 INFO tempest.lib.common.rest_client [req-274fbff6-2e3c-41a0-8eb2-5f56a76c337a ] Request (VolumesManageV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:25:16.748 39 DEBUG tempest.lib.common.rest_client [req-274fbff6-2e3c-41a0-8eb2-5f56a76c337a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-274fbff6-2e3c-41a0-8eb2-5f56a76c337a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["PFWE2HFgTMutt3cDzXXUnw"], "expires_at": "2020-11-06T19:25:16.000000Z", "issued_at": "2020-11-06T18:25:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:16.800 39 INFO tempest.lib.common.rest_client [req-0646f340-d07b-4a4b-b0ee-a95c500148d0 ] Request (VolumesManageV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.051s 2020-11-06 18:25:16.801 39 DEBUG tempest.lib.common.rest_client [req-0646f340-d07b-4a4b-b0ee-a95c500148d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0646f340-d07b-4a4b-b0ee-a95c500148d0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:16.871 39 INFO tempest.lib.common.rest_client [req-d2cd1709-0b1d-43f7-b906-c9f967e5ae04 ] Request (VolumesManageV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.069s 2020-11-06 18:25:16.871 39 DEBUG tempest.lib.common.rest_client [req-d2cd1709-0b1d-43f7-b906-c9f967e5ae04 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumesManageV3RbacTest-2016509898-desc", "domain_id": "default", "name": "tempest-VolumesManageV3RbacTest-2016509898"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '384', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d2cd1709-0b1d-43f7-b906-c9f967e5ae04', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "c580a8abbe444379804a951004a5b12c", "name": "tempest-VolumesManageV3RbacTest-2016509898", "domain_id": "default", "description": "tempest-VolumesManageV3RbacTest-2016509898-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/c580a8abbe444379804a951004a5b12c"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:17.000 39 INFO tempest.lib.common.rest_client [req-246ddfe6-4112-42cb-9f31-a55392f731b2 ] Request (VolumesManageV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.127s 2020-11-06 18:25:17.000 39 DEBUG tempest.lib.common.rest_client [req-246ddfe6-4112-42cb-9f31-a55392f731b2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumesManageV3RbacTest-2016509898", "password": "C8#mX&O3MZU6OWG", "project_id": "c580a8abbe444379804a951004a5b12c", "email": "tempest-VolumesManageV3RbacTest-855099358@example.com"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '401', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-246ddfe6-4112-42cb-9f31-a55392f731b2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "c580a8abbe444379804a951004a5b12c", "email": "tempest-VolumesManageV3RbacTest-855099358@example.com", "id": "208cf9595e5b4c2986cc1b84ad5c756e", "name": "tempest-VolumesManageV3RbacTest-2016509898", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/208cf9595e5b4c2986cc1b84ad5c756e"}}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:17.057 39 INFO tempest.lib.common.rest_client [req-701ed424-826c-4826-b444-4e86c4e5245e ] Request (VolumesManageV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.056s 2020-11-06 18:25:17.058 39 DEBUG tempest.lib.common.rest_client [req-701ed424-826c-4826-b444-4e86c4e5245e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-701ed424-826c-4826-b444-4e86c4e5245e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:17.112 39 INFO tempest.lib.common.rest_client [req-3f43768f-44fb-42a1-8d88-c0e05a930745 ] Request (VolumesManageV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.052s 2020-11-06 18:25:17.112 39 DEBUG tempest.lib.common.rest_client [req-3f43768f-44fb-42a1-8d88-c0e05a930745 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3f43768f-44fb-42a1-8d88-c0e05a930745', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:17.202 39 INFO tempest.lib.common.rest_client [req-106fee94-6161-4662-8a36-0ac97efb78ee ] Request (VolumesManageV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/c580a8abbe444379804a951004a5b12c/users/208cf9595e5b4c2986cc1b84ad5c756e/roles/72a4576c553448cd941b052c1ca0cf2d 0.086s 2020-11-06 18:25:17.202 39 DEBUG tempest.lib.common.rest_client [req-106fee94-6161-4662-8a36-0ac97efb78ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-106fee94-6161-4662-8a36-0ac97efb78ee', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c580a8abbe444379804a951004a5b12c/users/208cf9595e5b4c2986cc1b84ad5c756e/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:17.203 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesManageV3RbacTest-2016509898', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'c580a8abbe444379804a951004a5b12c', 'project_name': 'tempest-VolumesManageV3RbacTest-2016509898', 'tenant_id': 'c580a8abbe444379804a951004a5b12c', 'tenant_name': 'tempest-VolumesManageV3RbacTest-2016509898', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '208cf9595e5b4c2986cc1b84ad5c756e'}, Network: None, Subnet: None, Router: None 2020-11-06 18:25:17.203 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesManageV3RbacTest-2016509898', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'c580a8abbe444379804a951004a5b12c', 'project_name': 'tempest-VolumesManageV3RbacTest-2016509898', 'tenant_id': 'c580a8abbe444379804a951004a5b12c', 'tenant_name': 'tempest-VolumesManageV3RbacTest-2016509898', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '208cf9595e5b4c2986cc1b84ad5c756e'}, Network: None, Subnet: None, Router: None 2020-11-06 18:25:17.330 39 INFO tempest.lib.common.rest_client [req-72ae2f4a-a9fd-421a-9b1b-31064a21cab8 ] Request (VolumesManageV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.117s 2020-11-06 18:25:17.330 39 DEBUG tempest.lib.common.rest_client [req-72ae2f4a-a9fd-421a-9b1b-31064a21cab8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6577', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-72ae2f4a-a9fd-421a-9b1b-31064a21cab8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "208cf9595e5b4c2986cc1b84ad5c756e", "name": "tempest-VolumesManageV3RbacTest-2016509898", "password_expires_at": null}, "audit_ids": ["5OOaGDBESk6xj58GvH36OQ"], "expires_at": "2020-11-06T19:25:17.000000Z", "issued_at": "2020-11-06T18:25:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c580a8abbe444379804a951004a5b12c", "name": "tempest-VolumesManageV3RbacTest-2016509898"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c580a8abbe444379804a951004a5b12c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c580a8abbe444379804a951004a5b12c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c580a8abbe444379804a951004a5b12c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c580a8abbe444379804a951004a5b12c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c580a8abbe444379804a951004a5b12c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:17.419 39 INFO tempest.lib.common.rest_client [req-a8eb1939-bc25-4b27-ae71-4d20823870fd ] Request (VolumesManageV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-11-06 18:25:17.420 39 DEBUG tempest.lib.common.rest_client [req-a8eb1939-bc25-4b27-ae71-4d20823870fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a8eb1939-bc25-4b27-ae71-4d20823870fd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["O0Zr7GwcTFCF7nq6ZDvoNA"], "expires_at": "2020-11-06T19:25:17.000000Z", "issued_at": "2020-11-06T18:25:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:17.467 39 INFO tempest.lib.common.rest_client [req-4bfcff51-a082-420a-ae1d-e018cf1e0730 ] Request (VolumesManageV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-11-06 18:25:17.467 39 DEBUG tempest.lib.common.rest_client [req-4bfcff51-a082-420a-ae1d-e018cf1e0730 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4bfcff51-a082-420a-ae1d-e018cf1e0730', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["J9ShbYT5Qty3ANsYQwbSFg"], "expires_at": "2020-11-06T19:25:17.000000Z", "issued_at": "2020-11-06T18:25:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:17.515 39 INFO tempest.lib.common.rest_client [req-a27d785a-937a-4e40-b50c-599c68ed1b43 ] Request (VolumesManageV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.047s 2020-11-06 18:25:17.516 39 DEBUG tempest.lib.common.rest_client [req-a27d785a-937a-4e40-b50c-599c68ed1b43 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a27d785a-937a-4e40-b50c-599c68ed1b43', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:17.562 39 INFO tempest.lib.common.rest_client [req-c389ed7c-f732-4746-b0d9-79eafa0ec6f0 ] Request (VolumesManageV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.045s 2020-11-06 18:25:17.562 39 DEBUG tempest.lib.common.rest_client [req-c389ed7c-f732-4746-b0d9-79eafa0ec6f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c389ed7c-f732-4746-b0d9-79eafa0ec6f0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:17.563 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-11-06 18:25:17.563 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:25:17.610 39 INFO tempest.lib.common.rest_client [req-6da3778b-cd06-4872-9254-2fcf1c84791f ] Request (VolumesManageV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/c580a8abbe444379804a951004a5b12c/users/208cf9595e5b4c2986cc1b84ad5c756e/roles 0.046s 2020-11-06 18:25:17.610 39 DEBUG tempest.lib.common.rest_client [req-6da3778b-cd06-4872-9254-2fcf1c84791f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6da3778b-cd06-4872-9254-2fcf1c84791f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c580a8abbe444379804a951004a5b12c/users/208cf9595e5b4c2986cc1b84ad5c756e/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c580a8abbe444379804a951004a5b12c/users/208cf9595e5b4c2986cc1b84ad5c756e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:17.670 39 INFO tempest.lib.common.rest_client [req-2d58079c-7937-46fb-9af1-154f5eb66416 ] Request (VolumesManageV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/c580a8abbe444379804a951004a5b12c/users/208cf9595e5b4c2986cc1b84ad5c756e/roles/72a4576c553448cd941b052c1ca0cf2d 0.059s 2020-11-06 18:25:17.671 39 DEBUG tempest.lib.common.rest_client [req-2d58079c-7937-46fb-9af1-154f5eb66416 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2d58079c-7937-46fb-9af1-154f5eb66416', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c580a8abbe444379804a951004a5b12c/users/208cf9595e5b4c2986cc1b84ad5c756e/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:17.766 39 INFO tempest.lib.common.rest_client [req-0241fecb-6f25-48ee-855f-e84c1069f2aa ] Request (VolumesManageV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/c580a8abbe444379804a951004a5b12c/users/208cf9595e5b4c2986cc1b84ad5c756e/roles/a629c95d64b3416fb80ae90af4f69c05 0.094s 2020-11-06 18:25:17.767 39 DEBUG tempest.lib.common.rest_client [req-0241fecb-6f25-48ee-855f-e84c1069f2aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0241fecb-6f25-48ee-855f-e84c1069f2aa', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c580a8abbe444379804a951004a5b12c/users/208cf9595e5b4c2986cc1b84ad5c756e/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:18.857 39 INFO tempest.lib.common.rest_client [req-6e681bbf-33c3-4831-9555-8772fd3d046b ] Request (VolumesManageV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-11-06 18:25:18.858 39 DEBUG tempest.lib.common.rest_client [req-6e681bbf-33c3-4831-9555-8772fd3d046b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6e681bbf-33c3-4831-9555-8772fd3d046b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "208cf9595e5b4c2986cc1b84ad5c756e", "name": "tempest-VolumesManageV3RbacTest-2016509898", "password_expires_at": null}, "audit_ids": ["KViMmYm8TxKBGm7Mroz5-Q"], "expires_at": "2020-11-06T19:25:18.000000Z", "issued_at": "2020-11-06T18:25:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c580a8abbe444379804a951004a5b12c", "name": "tempest-VolumesManageV3RbacTest-2016509898"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c580a8abbe444379804a951004a5b12c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c580a8abbe444379804a951004a5b12c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c580a8abbe444379804a951004a5b12c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c580a8abbe444379804a951004a5b12c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c580a8abbe444379804a951004a5b12c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:18.860 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:25:18.863 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_manage, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:25:19.270 39 INFO tempest.lib.common.rest_client [req-9ef4d925-1edf-4d32-9b78-dbf958e2e264 ] Request (VolumesManageV3RbacTest:test_volume_manage): 202 POST http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes 0.406s 2020-11-06 18:25:19.271 39 DEBUG tempest.lib.common.rest_client [req-9ef4d925-1edf-4d32-9b78-dbf958e2e264 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-VolumesManageV3RbacTest-Volume-597304602"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-9ef4d925-1edf-4d32-9b78-dbf958e2e264', 'content-length': '843', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9ef4d925-1edf-4d32-9b78-dbf958e2e264', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes'} Body: b'{"volume": {"id": "74f1e0be-98ea-40c0-a44d-d7ecebb71e31", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:25:19.000000", "updated_at": null, "name": "tempest-VolumesManageV3RbacTest-Volume-597304602", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/74f1e0be-98ea-40c0-a44d-d7ecebb71e31"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c580a8abbe444379804a951004a5b12c/volumes/74f1e0be-98ea-40c0-a44d-d7ecebb71e31"}], "user_id": "208cf9595e5b4c2986cc1b84ad5c756e", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:19.355 39 INFO tempest.lib.common.rest_client [req-0a9d2380-01f0-495c-b15f-062619372e7d ] Request (VolumesManageV3RbacTest:test_volume_manage): 200 GET http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/74f1e0be-98ea-40c0-a44d-d7ecebb71e31 0.073s 2020-11-06 18:25:19.355 39 DEBUG tempest.lib.common.rest_client [req-0a9d2380-01f0-495c-b15f-062619372e7d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-0a9d2380-01f0-495c-b15f-062619372e7d', 'content-length': '1065', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0a9d2380-01f0-495c-b15f-062619372e7d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/74f1e0be-98ea-40c0-a44d-d7ecebb71e31'} Body: b'{"volume": {"id": "74f1e0be-98ea-40c0-a44d-d7ecebb71e31", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:25:19.000000", "updated_at": "2020-11-06T18:25:19.000000", "name": "tempest-VolumesManageV3RbacTest-Volume-597304602", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/74f1e0be-98ea-40c0-a44d-d7ecebb71e31"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c580a8abbe444379804a951004a5b12c/volumes/74f1e0be-98ea-40c0-a44d-d7ecebb71e31"}], "user_id": "208cf9595e5b4c2986cc1b84ad5c756e", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "c580a8abbe444379804a951004a5b12c"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:20.442 39 INFO tempest.lib.common.rest_client [req-9e6eceaa-874f-4c11-a99e-b90f5d2f1e54 ] Request (VolumesManageV3RbacTest:test_volume_manage): 200 GET http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/74f1e0be-98ea-40c0-a44d-d7ecebb71e31 0.070s 2020-11-06 18:25:20.443 39 DEBUG tempest.lib.common.rest_client [req-9e6eceaa-874f-4c11-a99e-b90f5d2f1e54 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-9e6eceaa-874f-4c11-a99e-b90f5d2f1e54', 'content-length': '1066', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9e6eceaa-874f-4c11-a99e-b90f5d2f1e54', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/74f1e0be-98ea-40c0-a44d-d7ecebb71e31'} Body: b'{"volume": {"id": "74f1e0be-98ea-40c0-a44d-d7ecebb71e31", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:25:19.000000", "updated_at": "2020-11-06T18:25:19.000000", "name": "tempest-VolumesManageV3RbacTest-Volume-597304602", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/74f1e0be-98ea-40c0-a44d-d7ecebb71e31"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c580a8abbe444379804a951004a5b12c/volumes/74f1e0be-98ea-40c0-a44d-d7ecebb71e31"}], "user_id": "208cf9595e5b4c2986cc1b84ad5c756e", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "c580a8abbe444379804a951004a5b12c"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:20.458 39 INFO tempest.common.waiters [-] volume 74f1e0be-98ea-40c0-a44d-d7ecebb71e31 reached available after waiting for 1.458542 seconds 2020-11-06 18:25:20.527 39 INFO tempest.lib.common.rest_client [req-8105d2c4-e998-4778-8063-faf33d2d5bb7 ] Request (VolumesManageV3RbacTest:test_volume_manage): 200 GET http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/74f1e0be-98ea-40c0-a44d-d7ecebb71e31 0.068s 2020-11-06 18:25:20.527 39 DEBUG tempest.lib.common.rest_client [req-8105d2c4-e998-4778-8063-faf33d2d5bb7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-8105d2c4-e998-4778-8063-faf33d2d5bb7', 'content-length': '1066', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8105d2c4-e998-4778-8063-faf33d2d5bb7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/74f1e0be-98ea-40c0-a44d-d7ecebb71e31'} Body: b'{"volume": {"id": "74f1e0be-98ea-40c0-a44d-d7ecebb71e31", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:25:19.000000", "updated_at": "2020-11-06T18:25:19.000000", "name": "tempest-VolumesManageV3RbacTest-Volume-597304602", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/74f1e0be-98ea-40c0-a44d-d7ecebb71e31"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c580a8abbe444379804a951004a5b12c/volumes/74f1e0be-98ea-40c0-a44d-d7ecebb71e31"}], "user_id": "208cf9595e5b4c2986cc1b84ad5c756e", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "c580a8abbe444379804a951004a5b12c"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:20.612 39 INFO tempest.lib.common.rest_client [req-4bf6ccb2-48da-4c99-994d-46bcddd5a841 ] Request (VolumesManageV3RbacTest:test_volume_manage): 202 POST http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/74f1e0be-98ea-40c0-a44d-d7ecebb71e31/action 0.069s 2020-11-06 18:25:20.612 39 DEBUG tempest.lib.common.rest_client [req-4bf6ccb2-48da-4c99-994d-46bcddd5a841 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-unmanage": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4bf6ccb2-48da-4c99-994d-46bcddd5a841', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/74f1e0be-98ea-40c0-a44d-d7ecebb71e31/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:20.689 39 INFO tempest.lib.common.rest_client [req-ef782409-9946-41db-b050-7e360e77770c ] Request (VolumesManageV3RbacTest:test_volume_manage): 200 GET http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/74f1e0be-98ea-40c0-a44d-d7ecebb71e31 0.076s 2020-11-06 18:25:20.690 39 DEBUG tempest.lib.common.rest_client [req-ef782409-9946-41db-b050-7e360e77770c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ef782409-9946-41db-b050-7e360e77770c', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ef782409-9946-41db-b050-7e360e77770c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/74f1e0be-98ea-40c0-a44d-d7ecebb71e31'} Body: b'{"volume": {"id": "74f1e0be-98ea-40c0-a44d-d7ecebb71e31", "status": "unmanaging", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:25:19.000000", "updated_at": "2020-11-06T18:25:21.000000", "name": "tempest-VolumesManageV3RbacTest-Volume-597304602", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/74f1e0be-98ea-40c0-a44d-d7ecebb71e31"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c580a8abbe444379804a951004a5b12c/volumes/74f1e0be-98ea-40c0-a44d-d7ecebb71e31"}], "user_id": "208cf9595e5b4c2986cc1b84ad5c756e", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "c580a8abbe444379804a951004a5b12c"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:21.753 39 INFO tempest.lib.common.rest_client [req-e9210a25-a121-40ef-9cce-c2d5613900a9 ] Request (VolumesManageV3RbacTest:test_volume_manage): 404 GET http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/74f1e0be-98ea-40c0-a44d-d7ecebb71e31 0.047s 2020-11-06 18:25:21.754 39 DEBUG tempest.lib.common.rest_client [req-e9210a25-a121-40ef-9cce-c2d5613900a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-e9210a25-a121-40ef-9cce-c2d5613900a9', 'x-openstack-request-id': 'req-e9210a25-a121-40ef-9cce-c2d5613900a9', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/74f1e0be-98ea-40c0-a44d-d7ecebb71e31'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 74f1e0be-98ea-40c0-a44d-d7ecebb71e31 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:21.754 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:25:21.870 39 INFO tempest.lib.common.rest_client [req-4b9c6422-3f03-4a76-8f27-6e646b0e37b4 ] Request (VolumesManageV3RbacTest:test_volume_manage): 200 GET http://172.30.13.94/identity/v3/projects/c580a8abbe444379804a951004a5b12c/users/208cf9595e5b4c2986cc1b84ad5c756e/roles 0.114s 2020-11-06 18:25:21.870 39 DEBUG tempest.lib.common.rest_client [req-4b9c6422-3f03-4a76-8f27-6e646b0e37b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4b9c6422-3f03-4a76-8f27-6e646b0e37b4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c580a8abbe444379804a951004a5b12c/users/208cf9595e5b4c2986cc1b84ad5c756e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c580a8abbe444379804a951004a5b12c/users/208cf9595e5b4c2986cc1b84ad5c756e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:21.907 39 INFO tempest.lib.common.rest_client [req-b0b47c97-99fa-417d-9866-00591712f73b ] Request (VolumesManageV3RbacTest:test_volume_manage): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-11-06 18:25:21.908 39 DEBUG tempest.lib.common.rest_client [req-b0b47c97-99fa-417d-9866-00591712f73b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b0b47c97-99fa-417d-9866-00591712f73b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "208cf9595e5b4c2986cc1b84ad5c756e", "name": "tempest-VolumesManageV3RbacTest-2016509898", "password_expires_at": null}, "audit_ids": ["6rpAA5XGR_2uvjRUhjOrvA"], "expires_at": "2020-11-06T19:25:21.000000Z", "issued_at": "2020-11-06T18:25:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c580a8abbe444379804a951004a5b12c", "name": "tempest-VolumesManageV3RbacTest-2016509898"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c580a8abbe444379804a951004a5b12c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c580a8abbe444379804a951004a5b12c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c580a8abbe444379804a951004a5b12c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c580a8abbe444379804a951004a5b12c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c580a8abbe444379804a951004a5b12c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:22.171 39 INFO tempest.lib.common.rest_client [req-d19c37e3-2281-482f-8554-0a300aedec0c ] Request (VolumesManageV3RbacTest:test_volume_manage): 202 POST http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/os-volume-manage 0.262s 2020-11-06 18:25:22.172 39 DEBUG tempest.lib.common.rest_client [req-d19c37e3-2281-482f-8554-0a300aedec0c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"name": "tempest-VolumesManageV3RbacTest-volume-559915238", "host": "lf-virtual9@ceph#ceph", "ref": {"source-name": "volume-74f1e0be-98ea-40c0-a44d-d7ecebb71e31"}, "volume_type": "ceph", "availability_zone": "nova"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d19c37e3-2281-482f-8554-0a300aedec0c', 'content-length': '843', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d19c37e3-2281-482f-8554-0a300aedec0c', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/os-volume-manage'} Body: b'{"volume": {"id": "6dafa058-9d19-4ac9-afef-c86b8823eca1", "status": "creating", "size": 0, "availability_zone": "nova", "created_at": "2020-11-06T18:25:22.085379", "updated_at": null, "name": "tempest-VolumesManageV3RbacTest-volume-559915238", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/6dafa058-9d19-4ac9-afef-c86b8823eca1"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c580a8abbe444379804a951004a5b12c/volumes/6dafa058-9d19-4ac9-afef-c86b8823eca1"}], "user_id": "208cf9595e5b4c2986cc1b84ad5c756e", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:22.187 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:25:22.242 39 INFO tempest.lib.common.rest_client [req-566a9726-1c2e-44a7-9c20-287c3482eda0 ] Request (VolumesManageV3RbacTest:test_volume_manage): 200 GET http://172.30.13.94/identity/v3/projects/c580a8abbe444379804a951004a5b12c/users/208cf9595e5b4c2986cc1b84ad5c756e/roles 0.054s 2020-11-06 18:25:22.243 39 DEBUG tempest.lib.common.rest_client [req-566a9726-1c2e-44a7-9c20-287c3482eda0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-566a9726-1c2e-44a7-9c20-287c3482eda0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c580a8abbe444379804a951004a5b12c/users/208cf9595e5b4c2986cc1b84ad5c756e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c580a8abbe444379804a951004a5b12c/users/208cf9595e5b4c2986cc1b84ad5c756e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:22.278 39 INFO tempest.lib.common.rest_client [req-f0a634fa-6bf9-4c6a-93cc-1a1e8d2fbc80 ] Request (VolumesManageV3RbacTest:test_volume_manage): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-11-06 18:25:22.279 39 DEBUG tempest.lib.common.rest_client [req-f0a634fa-6bf9-4c6a-93cc-1a1e8d2fbc80 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f0a634fa-6bf9-4c6a-93cc-1a1e8d2fbc80', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "208cf9595e5b4c2986cc1b84ad5c756e", "name": "tempest-VolumesManageV3RbacTest-2016509898", "password_expires_at": null}, "audit_ids": ["0ZQ9oYEkSZWoOmgx0Kn0Sg"], "expires_at": "2020-11-06T19:25:22.000000Z", "issued_at": "2020-11-06T18:25:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c580a8abbe444379804a951004a5b12c", "name": "tempest-VolumesManageV3RbacTest-2016509898"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c580a8abbe444379804a951004a5b12c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c580a8abbe444379804a951004a5b12c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c580a8abbe444379804a951004a5b12c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c580a8abbe444379804a951004a5b12c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c580a8abbe444379804a951004a5b12c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:22.412 39 INFO tempest.lib.common.rest_client [req-4fbb8a6d-9355-4647-b4c4-4a833951d4d9 ] Request (VolumesManageV3RbacTest:test_volume_manage): 200 GET http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/6dafa058-9d19-4ac9-afef-c86b8823eca1 0.132s 2020-11-06 18:25:22.413 39 DEBUG tempest.lib.common.rest_client [req-4fbb8a6d-9355-4647-b4c4-4a833951d4d9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4fbb8a6d-9355-4647-b4c4-4a833951d4d9', 'content-length': '1065', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4fbb8a6d-9355-4647-b4c4-4a833951d4d9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/6dafa058-9d19-4ac9-afef-c86b8823eca1'} Body: b'{"volume": {"id": "6dafa058-9d19-4ac9-afef-c86b8823eca1", "status": "creating", "size": 0, "availability_zone": "nova", "created_at": "2020-11-06T18:25:22.000000", "updated_at": "2020-11-06T18:25:22.000000", "name": "tempest-VolumesManageV3RbacTest-volume-559915238", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/6dafa058-9d19-4ac9-afef-c86b8823eca1"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c580a8abbe444379804a951004a5b12c/volumes/6dafa058-9d19-4ac9-afef-c86b8823eca1"}], "user_id": "208cf9595e5b4c2986cc1b84ad5c756e", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "c580a8abbe444379804a951004a5b12c"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:23.509 39 INFO tempest.lib.common.rest_client [req-82cb2d8b-c617-446d-a292-dd6ad0f61670 ] Request (VolumesManageV3RbacTest:test_volume_manage): 200 GET http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/6dafa058-9d19-4ac9-afef-c86b8823eca1 0.081s 2020-11-06 18:25:23.509 39 DEBUG tempest.lib.common.rest_client [req-82cb2d8b-c617-446d-a292-dd6ad0f61670 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-82cb2d8b-c617-446d-a292-dd6ad0f61670', 'content-length': '1066', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-82cb2d8b-c617-446d-a292-dd6ad0f61670', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/6dafa058-9d19-4ac9-afef-c86b8823eca1'} Body: b'{"volume": {"id": "6dafa058-9d19-4ac9-afef-c86b8823eca1", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:25:22.000000", "updated_at": "2020-11-06T18:25:22.000000", "name": "tempest-VolumesManageV3RbacTest-volume-559915238", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/6dafa058-9d19-4ac9-afef-c86b8823eca1"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c580a8abbe444379804a951004a5b12c/volumes/6dafa058-9d19-4ac9-afef-c86b8823eca1"}], "user_id": "208cf9595e5b4c2986cc1b84ad5c756e", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "c580a8abbe444379804a951004a5b12c"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:23.524 39 INFO tempest.common.waiters [-] volume 6dafa058-9d19-4ac9-afef-c86b8823eca1 reached available after waiting for 1.524179 seconds 2020-11-06 18:25:23.596 39 INFO tempest.lib.common.rest_client [req-38ffb58d-2806-46f3-aebd-e51be363086a ] Request (VolumesManageV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/6dafa058-9d19-4ac9-afef-c86b8823eca1 0.071s 2020-11-06 18:25:23.597 39 DEBUG tempest.lib.common.rest_client [req-38ffb58d-2806-46f3-aebd-e51be363086a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-38ffb58d-2806-46f3-aebd-e51be363086a', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/6dafa058-9d19-4ac9-afef-c86b8823eca1'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:23.663 39 INFO tempest.lib.common.rest_client [req-50bc9e2b-ed13-467b-adf8-6ef04488226c ] Request (VolumesManageV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/6dafa058-9d19-4ac9-afef-c86b8823eca1 0.065s 2020-11-06 18:25:23.663 39 DEBUG tempest.lib.common.rest_client [req-50bc9e2b-ed13-467b-adf8-6ef04488226c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-50bc9e2b-ed13-467b-adf8-6ef04488226c', 'content-length': '1065', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-50bc9e2b-ed13-467b-adf8-6ef04488226c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/6dafa058-9d19-4ac9-afef-c86b8823eca1'} Body: b'{"volume": {"id": "6dafa058-9d19-4ac9-afef-c86b8823eca1", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:25:22.000000", "updated_at": "2020-11-06T18:25:24.000000", "name": "tempest-VolumesManageV3RbacTest-volume-559915238", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/6dafa058-9d19-4ac9-afef-c86b8823eca1"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c580a8abbe444379804a951004a5b12c/volumes/6dafa058-9d19-4ac9-afef-c86b8823eca1"}], "user_id": "208cf9595e5b4c2986cc1b84ad5c756e", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "c580a8abbe444379804a951004a5b12c"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:24.726 39 INFO tempest.lib.common.rest_client [req-dc548946-89db-4d9a-88c1-5d1a87cb8ae2 ] Request (VolumesManageV3RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/6dafa058-9d19-4ac9-afef-c86b8823eca1 0.049s 2020-11-06 18:25:24.726 39 DEBUG tempest.lib.common.rest_client [req-dc548946-89db-4d9a-88c1-5d1a87cb8ae2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-dc548946-89db-4d9a-88c1-5d1a87cb8ae2', 'x-openstack-request-id': 'req-dc548946-89db-4d9a-88c1-5d1a87cb8ae2', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/6dafa058-9d19-4ac9-afef-c86b8823eca1'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 6dafa058-9d19-4ac9-afef-c86b8823eca1 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:24.730 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-11-06 18:25:24.733 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_unmanage, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-11-06 18:25:24.996 39 INFO tempest.lib.common.rest_client [req-133497a5-dec7-4f5f-b2fb-1e6e378f14d2 ] Request (VolumesManageV3RbacTest:test_volume_unmanage): 202 POST http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes 0.262s 2020-11-06 18:25:24.997 39 DEBUG tempest.lib.common.rest_client [req-133497a5-dec7-4f5f-b2fb-1e6e378f14d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-VolumesManageV3RbacTest-Volume-1939895538"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-133497a5-dec7-4f5f-b2fb-1e6e378f14d2', 'content-length': '844', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-133497a5-dec7-4f5f-b2fb-1e6e378f14d2', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes'} Body: b'{"volume": {"id": "06a8a237-436d-4d38-9be5-174dde7fc1c2", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:25:25.000000", "updated_at": null, "name": "tempest-VolumesManageV3RbacTest-Volume-1939895538", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/06a8a237-436d-4d38-9be5-174dde7fc1c2"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c580a8abbe444379804a951004a5b12c/volumes/06a8a237-436d-4d38-9be5-174dde7fc1c2"}], "user_id": "208cf9595e5b4c2986cc1b84ad5c756e", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:25.073 39 INFO tempest.lib.common.rest_client [req-f2f5ee10-b030-4cf4-87d8-0deb35ecb69d ] Request (VolumesManageV3RbacTest:test_volume_unmanage): 200 GET http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/06a8a237-436d-4d38-9be5-174dde7fc1c2 0.066s 2020-11-06 18:25:25.073 39 DEBUG tempest.lib.common.rest_client [req-f2f5ee10-b030-4cf4-87d8-0deb35ecb69d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-f2f5ee10-b030-4cf4-87d8-0deb35ecb69d', 'content-length': '1066', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f2f5ee10-b030-4cf4-87d8-0deb35ecb69d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/06a8a237-436d-4d38-9be5-174dde7fc1c2'} Body: b'{"volume": {"id": "06a8a237-436d-4d38-9be5-174dde7fc1c2", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:25:25.000000", "updated_at": "2020-11-06T18:25:25.000000", "name": "tempest-VolumesManageV3RbacTest-Volume-1939895538", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/06a8a237-436d-4d38-9be5-174dde7fc1c2"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c580a8abbe444379804a951004a5b12c/volumes/06a8a237-436d-4d38-9be5-174dde7fc1c2"}], "user_id": "208cf9595e5b4c2986cc1b84ad5c756e", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "c580a8abbe444379804a951004a5b12c"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:26.166 39 INFO tempest.lib.common.rest_client [req-d1195bb5-7dad-4ed1-8615-385b545075e6 ] Request (VolumesManageV3RbacTest:test_volume_unmanage): 200 GET http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/06a8a237-436d-4d38-9be5-174dde7fc1c2 0.076s 2020-11-06 18:25:26.166 39 DEBUG tempest.lib.common.rest_client [req-d1195bb5-7dad-4ed1-8615-385b545075e6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d1195bb5-7dad-4ed1-8615-385b545075e6', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d1195bb5-7dad-4ed1-8615-385b545075e6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/06a8a237-436d-4d38-9be5-174dde7fc1c2'} Body: b'{"volume": {"id": "06a8a237-436d-4d38-9be5-174dde7fc1c2", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:25:25.000000", "updated_at": "2020-11-06T18:25:25.000000", "name": "tempest-VolumesManageV3RbacTest-Volume-1939895538", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/06a8a237-436d-4d38-9be5-174dde7fc1c2"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c580a8abbe444379804a951004a5b12c/volumes/06a8a237-436d-4d38-9be5-174dde7fc1c2"}], "user_id": "208cf9595e5b4c2986cc1b84ad5c756e", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "c580a8abbe444379804a951004a5b12c"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:26.178 39 INFO tempest.common.waiters [-] volume 06a8a237-436d-4d38-9be5-174dde7fc1c2 reached available after waiting for 1.178932 seconds 2020-11-06 18:25:26.251 39 INFO tempest.lib.common.rest_client [req-bbed2ddb-e4f0-46d9-a094-5fadb84c6128 ] Request (VolumesManageV3RbacTest:test_volume_unmanage): 200 GET http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/06a8a237-436d-4d38-9be5-174dde7fc1c2 0.072s 2020-11-06 18:25:26.252 39 DEBUG tempest.lib.common.rest_client [req-bbed2ddb-e4f0-46d9-a094-5fadb84c6128 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-bbed2ddb-e4f0-46d9-a094-5fadb84c6128', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-bbed2ddb-e4f0-46d9-a094-5fadb84c6128', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/06a8a237-436d-4d38-9be5-174dde7fc1c2'} Body: b'{"volume": {"id": "06a8a237-436d-4d38-9be5-174dde7fc1c2", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:25:25.000000", "updated_at": "2020-11-06T18:25:25.000000", "name": "tempest-VolumesManageV3RbacTest-Volume-1939895538", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/06a8a237-436d-4d38-9be5-174dde7fc1c2"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c580a8abbe444379804a951004a5b12c/volumes/06a8a237-436d-4d38-9be5-174dde7fc1c2"}], "user_id": "208cf9595e5b4c2986cc1b84ad5c756e", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "c580a8abbe444379804a951004a5b12c"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:26.266 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:25:26.321 39 INFO tempest.lib.common.rest_client [req-5e5e80e0-0cb6-41b0-93ef-8ac9875c8b0c ] Request (VolumesManageV3RbacTest:test_volume_unmanage): 200 GET http://172.30.13.94/identity/v3/projects/c580a8abbe444379804a951004a5b12c/users/208cf9595e5b4c2986cc1b84ad5c756e/roles 0.054s 2020-11-06 18:25:26.321 39 DEBUG tempest.lib.common.rest_client [req-5e5e80e0-0cb6-41b0-93ef-8ac9875c8b0c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5e5e80e0-0cb6-41b0-93ef-8ac9875c8b0c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c580a8abbe444379804a951004a5b12c/users/208cf9595e5b4c2986cc1b84ad5c756e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c580a8abbe444379804a951004a5b12c/users/208cf9595e5b4c2986cc1b84ad5c756e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:26.359 39 INFO tempest.lib.common.rest_client [req-f76e629f-8581-4f50-a148-596ee9b0eb7f ] Request (VolumesManageV3RbacTest:test_volume_unmanage): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-11-06 18:25:26.360 39 DEBUG tempest.lib.common.rest_client [req-f76e629f-8581-4f50-a148-596ee9b0eb7f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f76e629f-8581-4f50-a148-596ee9b0eb7f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "208cf9595e5b4c2986cc1b84ad5c756e", "name": "tempest-VolumesManageV3RbacTest-2016509898", "password_expires_at": null}, "audit_ids": ["ED9ugXBaR12Tiyd2n0XTHQ"], "expires_at": "2020-11-06T19:25:26.000000Z", "issued_at": "2020-11-06T18:25:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c580a8abbe444379804a951004a5b12c", "name": "tempest-VolumesManageV3RbacTest-2016509898"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c580a8abbe444379804a951004a5b12c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c580a8abbe444379804a951004a5b12c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c580a8abbe444379804a951004a5b12c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c580a8abbe444379804a951004a5b12c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c580a8abbe444379804a951004a5b12c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:26.474 39 INFO tempest.lib.common.rest_client [req-c05a91e0-c382-4572-b9cd-2d03ecbe264d ] Request (VolumesManageV3RbacTest:test_volume_unmanage): 202 POST http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/06a8a237-436d-4d38-9be5-174dde7fc1c2/action 0.113s 2020-11-06 18:25:26.474 39 DEBUG tempest.lib.common.rest_client [req-c05a91e0-c382-4572-b9cd-2d03ecbe264d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-unmanage": {}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c05a91e0-c382-4572-b9cd-2d03ecbe264d', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/06a8a237-436d-4d38-9be5-174dde7fc1c2/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:26.474 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-11-06 18:25:26.533 39 INFO tempest.lib.common.rest_client [req-b7ac09d8-77f2-4dda-9e23-413f16e7c59e ] Request (VolumesManageV3RbacTest:test_volume_unmanage): 200 GET http://172.30.13.94/identity/v3/projects/c580a8abbe444379804a951004a5b12c/users/208cf9595e5b4c2986cc1b84ad5c756e/roles 0.058s 2020-11-06 18:25:26.534 39 DEBUG tempest.lib.common.rest_client [req-b7ac09d8-77f2-4dda-9e23-413f16e7c59e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b7ac09d8-77f2-4dda-9e23-413f16e7c59e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c580a8abbe444379804a951004a5b12c/users/208cf9595e5b4c2986cc1b84ad5c756e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c580a8abbe444379804a951004a5b12c/users/208cf9595e5b4c2986cc1b84ad5c756e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:26.577 39 INFO tempest.lib.common.rest_client [req-6f76b853-cefd-4f28-9c0a-b8795faa10b8 ] Request (VolumesManageV3RbacTest:test_volume_unmanage): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-11-06 18:25:26.578 39 DEBUG tempest.lib.common.rest_client [req-6f76b853-cefd-4f28-9c0a-b8795faa10b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6f76b853-cefd-4f28-9c0a-b8795faa10b8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "208cf9595e5b4c2986cc1b84ad5c756e", "name": "tempest-VolumesManageV3RbacTest-2016509898", "password_expires_at": null}, "audit_ids": ["XMUgUWuKS_WmXSCd6O2w0g"], "expires_at": "2020-11-06T19:25:26.000000Z", "issued_at": "2020-11-06T18:25:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c580a8abbe444379804a951004a5b12c", "name": "tempest-VolumesManageV3RbacTest-2016509898"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c580a8abbe444379804a951004a5b12c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c580a8abbe444379804a951004a5b12c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c580a8abbe444379804a951004a5b12c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c580a8abbe444379804a951004a5b12c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c580a8abbe444379804a951004a5b12c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:26.703 39 INFO tempest.lib.common.rest_client [req-df0ac85b-8196-49ac-a54b-8256460c53ca ] Request (VolumesManageV3RbacTest:test_volume_unmanage): 404 GET http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/06a8a237-436d-4d38-9be5-174dde7fc1c2 0.124s 2020-11-06 18:25:26.704 39 DEBUG tempest.lib.common.rest_client [req-df0ac85b-8196-49ac-a54b-8256460c53ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-df0ac85b-8196-49ac-a54b-8256460c53ca', 'x-openstack-request-id': 'req-df0ac85b-8196-49ac-a54b-8256460c53ca', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/06a8a237-436d-4d38-9be5-174dde7fc1c2'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 06a8a237-436d-4d38-9be5-174dde7fc1c2 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:26.910 39 INFO tempest.lib.common.rest_client [req-a7727dda-e0b3-419b-90c3-19eff61df7b1 ] Request (VolumesManageV3RbacTest:_run_cleanups): 202 POST http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/os-volume-manage 0.205s 2020-11-06 18:25:26.911 39 DEBUG tempest.lib.common.rest_client [req-a7727dda-e0b3-419b-90c3-19eff61df7b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"name": "tempest-VolumesManageV3RbacTest-volume-102594992", "host": "lf-virtual9@ceph#ceph", "ref": {"source-name": "volume-06a8a237-436d-4d38-9be5-174dde7fc1c2"}, "volume_type": "ceph", "availability_zone": "nova"}} Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a7727dda-e0b3-419b-90c3-19eff61df7b1', 'content-length': '843', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a7727dda-e0b3-419b-90c3-19eff61df7b1', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/os-volume-manage'} Body: b'{"volume": {"id": "d3e1f9d8-7bdc-45d4-8aa9-1ede1a197fa6", "status": "creating", "size": 0, "availability_zone": "nova", "created_at": "2020-11-06T18:25:26.812749", "updated_at": null, "name": "tempest-VolumesManageV3RbacTest-volume-102594992", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/d3e1f9d8-7bdc-45d4-8aa9-1ede1a197fa6"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c580a8abbe444379804a951004a5b12c/volumes/d3e1f9d8-7bdc-45d4-8aa9-1ede1a197fa6"}], "user_id": "208cf9595e5b4c2986cc1b84ad5c756e", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:26.994 39 INFO tempest.lib.common.rest_client [req-8dd308e8-2945-4667-82a9-d846bbb48bd9 ] Request (VolumesManageV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/d3e1f9d8-7bdc-45d4-8aa9-1ede1a197fa6 0.068s 2020-11-06 18:25:26.995 39 DEBUG tempest.lib.common.rest_client [req-8dd308e8-2945-4667-82a9-d846bbb48bd9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-8dd308e8-2945-4667-82a9-d846bbb48bd9', 'content-length': '1065', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8dd308e8-2945-4667-82a9-d846bbb48bd9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/d3e1f9d8-7bdc-45d4-8aa9-1ede1a197fa6'} Body: b'{"volume": {"id": "d3e1f9d8-7bdc-45d4-8aa9-1ede1a197fa6", "status": "creating", "size": 0, "availability_zone": "nova", "created_at": "2020-11-06T18:25:27.000000", "updated_at": "2020-11-06T18:25:27.000000", "name": "tempest-VolumesManageV3RbacTest-volume-102594992", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/d3e1f9d8-7bdc-45d4-8aa9-1ede1a197fa6"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c580a8abbe444379804a951004a5b12c/volumes/d3e1f9d8-7bdc-45d4-8aa9-1ede1a197fa6"}], "user_id": "208cf9595e5b4c2986cc1b84ad5c756e", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "c580a8abbe444379804a951004a5b12c"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:28.243 39 INFO tempest.lib.common.rest_client [req-a0b60b86-8a98-4526-8ab9-9675bf3cd7d7 ] Request (VolumesManageV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/d3e1f9d8-7bdc-45d4-8aa9-1ede1a197fa6 0.231s 2020-11-06 18:25:28.243 39 DEBUG tempest.lib.common.rest_client [req-a0b60b86-8a98-4526-8ab9-9675bf3cd7d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a0b60b86-8a98-4526-8ab9-9675bf3cd7d7', 'content-length': '1066', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a0b60b86-8a98-4526-8ab9-9675bf3cd7d7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/d3e1f9d8-7bdc-45d4-8aa9-1ede1a197fa6'} Body: b'{"volume": {"id": "d3e1f9d8-7bdc-45d4-8aa9-1ede1a197fa6", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:25:27.000000", "updated_at": "2020-11-06T18:25:27.000000", "name": "tempest-VolumesManageV3RbacTest-volume-102594992", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/d3e1f9d8-7bdc-45d4-8aa9-1ede1a197fa6"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c580a8abbe444379804a951004a5b12c/volumes/d3e1f9d8-7bdc-45d4-8aa9-1ede1a197fa6"}], "user_id": "208cf9595e5b4c2986cc1b84ad5c756e", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "c580a8abbe444379804a951004a5b12c"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:28.258 39 INFO tempest.common.waiters [-] volume d3e1f9d8-7bdc-45d4-8aa9-1ede1a197fa6 reached available after waiting for 1.258835 seconds 2020-11-06 18:25:28.353 39 INFO tempest.lib.common.rest_client [req-7594f849-74e1-455f-920f-d77d298283a9 ] Request (VolumesManageV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/d3e1f9d8-7bdc-45d4-8aa9-1ede1a197fa6 0.094s 2020-11-06 18:25:28.354 39 DEBUG tempest.lib.common.rest_client [req-7594f849-74e1-455f-920f-d77d298283a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7594f849-74e1-455f-920f-d77d298283a9', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/d3e1f9d8-7bdc-45d4-8aa9-1ede1a197fa6'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:28.426 39 INFO tempest.lib.common.rest_client [req-60aa5108-02f2-4e48-a7a2-f832170ef0b3 ] Request (VolumesManageV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/d3e1f9d8-7bdc-45d4-8aa9-1ede1a197fa6 0.071s 2020-11-06 18:25:28.427 39 DEBUG tempest.lib.common.rest_client [req-60aa5108-02f2-4e48-a7a2-f832170ef0b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-60aa5108-02f2-4e48-a7a2-f832170ef0b3', 'content-length': '1065', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-60aa5108-02f2-4e48-a7a2-f832170ef0b3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/d3e1f9d8-7bdc-45d4-8aa9-1ede1a197fa6'} Body: b'{"volume": {"id": "d3e1f9d8-7bdc-45d4-8aa9-1ede1a197fa6", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-11-06T18:25:27.000000", "updated_at": "2020-11-06T18:25:28.000000", "name": "tempest-VolumesManageV3RbacTest-volume-102594992", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/d3e1f9d8-7bdc-45d4-8aa9-1ede1a197fa6"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c580a8abbe444379804a951004a5b12c/volumes/d3e1f9d8-7bdc-45d4-8aa9-1ede1a197fa6"}], "user_id": "208cf9595e5b4c2986cc1b84ad5c756e", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "c580a8abbe444379804a951004a5b12c"}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:29.486 39 INFO tempest.lib.common.rest_client [req-f1db2c08-8dc9-4580-987d-5c29db72d10e ] Request (VolumesManageV3RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/d3e1f9d8-7bdc-45d4-8aa9-1ede1a197fa6 0.049s 2020-11-06 18:25:29.487 39 DEBUG tempest.lib.common.rest_client [req-f1db2c08-8dc9-4580-987d-5c29db72d10e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-f1db2c08-8dc9-4580-987d-5c29db72d10e', 'x-openstack-request-id': 'req-f1db2c08-8dc9-4580-987d-5c29db72d10e', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/d3e1f9d8-7bdc-45d4-8aa9-1ede1a197fa6'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume d3e1f9d8-7bdc-45d4-8aa9-1ede1a197fa6 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:29.544 39 INFO tempest.lib.common.rest_client [req-6fd3bc63-fcae-4aa5-836c-f3becbdf3a02 ] Request (VolumesManageV3RbacTest:tearDownClass): 404 DELETE http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/06a8a237-436d-4d38-9be5-174dde7fc1c2 0.047s 2020-11-06 18:25:29.545 39 DEBUG tempest.lib.common.rest_client [req-6fd3bc63-fcae-4aa5-836c-f3becbdf3a02 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-6fd3bc63-fcae-4aa5-836c-f3becbdf3a02', 'x-openstack-request-id': 'req-6fd3bc63-fcae-4aa5-836c-f3becbdf3a02', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/06a8a237-436d-4d38-9be5-174dde7fc1c2'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 06a8a237-436d-4d38-9be5-174dde7fc1c2 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:29.592 39 INFO tempest.lib.common.rest_client [req-3e9a0121-a8d8-464f-99af-e2d474d6fb4b ] Request (VolumesManageV3RbacTest:tearDownClass): 404 DELETE http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/74f1e0be-98ea-40c0-a44d-d7ecebb71e31 0.046s 2020-11-06 18:25:29.593 39 DEBUG tempest.lib.common.rest_client [req-3e9a0121-a8d8-464f-99af-e2d474d6fb4b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-3e9a0121-a8d8-464f-99af-e2d474d6fb4b', 'x-openstack-request-id': 'req-3e9a0121-a8d8-464f-99af-e2d474d6fb4b', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/c580a8abbe444379804a951004a5b12c/volumes/74f1e0be-98ea-40c0-a44d-d7ecebb71e31'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 74f1e0be-98ea-40c0-a44d-d7ecebb71e31 could not be found."}}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:29.768 39 INFO tempest.lib.common.rest_client [req-a40be0e1-7e09-414b-a0df-6100c29f5d58 ] Request (VolumesManageV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/208cf9595e5b4c2986cc1b84ad5c756e 0.174s 2020-11-06 18:25:29.769 39 DEBUG tempest.lib.common.rest_client [req-a40be0e1-7e09-414b-a0df-6100c29f5d58 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a40be0e1-7e09-414b-a0df-6100c29f5d58', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/208cf9595e5b4c2986cc1b84ad5c756e'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:29.865 39 INFO tempest.lib.common.rest_client [req-eb6c3cf1-dd25-4d32-891d-9cca0b643001 ] Request (VolumesManageV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-11-06 18:25:29.866 39 DEBUG tempest.lib.common.rest_client [req-eb6c3cf1-dd25-4d32-891d-9cca0b643001 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eb6c3cf1-dd25-4d32-891d-9cca0b643001', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a66a98c58a5a42ad95e40a2b99d88616", "name": "patrole_reader-user_30048f18-b96b-4343-a720-1173982b59b8", "password_expires_at": null}, "audit_ids": ["bFmsUMI3TZOimGQzaJZGTw"], "expires_at": "2020-11-06T19:25:29.000000Z", "issued_at": "2020-11-06T18:25:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d3e694f4541e406a85c66c35fb3f05ea", "name": "patrole_reader-project_30048f18-b96b-4343-a720-1173982b59b8"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d3e694f4541e406a85c66c35fb3f05ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:30.193 39 INFO tempest.lib.common.rest_client [req-a7c064ac-f46c-46e8-b14e-f063d782693b ] Request (VolumesManageV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=c580a8abbe444379804a951004a5b12c&name=default 0.326s 2020-11-06 18:25:30.193 39 DEBUG tempest.lib.common.rest_client [req-a7c064ac-f46c-46e8-b14e-f063d782693b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-a7c064ac-f46c-46e8-b14e-f063d782693b', 'date': 'Fri, 06 Nov 2020 18:25:30 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=c580a8abbe444379804a951004a5b12c&name=default'} Body: b'{"security_groups": [{"id": "be36d20e-ab45-4261-8039-912361f6b0d1", "name": "default", "stateful": true, "tenant_id": "c580a8abbe444379804a951004a5b12c", "description": "Default security group", "security_group_rules": [{"id": "18fcf061-9cb3-48b0-95e6-676347fffb24", "tenant_id": "c580a8abbe444379804a951004a5b12c", "security_group_id": "be36d20e-ab45-4261-8039-912361f6b0d1", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "be36d20e-ab45-4261-8039-912361f6b0d1", "description": null, "tags": [], "created_at": "2020-11-06T18:25:30Z", "updated_at": "2020-11-06T18:25:30Z", "revision_number": 0, "project_id": "c580a8abbe444379804a951004a5b12c"}, {"id": "55b2134e-2530-4b56-becf-a899e7b198b0", "tenant_id": "c580a8abbe444379804a951004a5b12c", "security_group_id": "be36d20e-ab45-4261-8039-912361f6b0d1", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:25:30Z", "updated_at": "2020-11-06T18:25:30Z", "revision_number": 0, "project_id": "c580a8abbe444379804a951004a5b12c"}, {"id": "5d96a454-1f1c-486f-b01b-b21ca72538bd", "tenant_id": "c580a8abbe444379804a951004a5b12c", "security_group_id": "be36d20e-ab45-4261-8039-912361f6b0d1", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-11-06T18:25:30Z", "updated_at": "2020-11-06T18:25:30Z", "revision_number": 0, "project_id": "c580a8abbe444379804a951004a5b12c"}, {"id": "f5eda2fe-7d66-4667-9fd7-de45dd0ec88e", "tenant_id": "c580a8abbe444379804a951004a5b12c", "security_group_id": "be36d20e-ab45-4261-8039-912361f6b0d1", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "be36d20e-ab45-4261-8039-912361f6b0d1", "description": null, "tags": [], "created_at": "2020-11-06T18:25:30Z", "updated_at": "2020-11-06T18:25:30Z", "revision_number": 0, "project_id": "c580a8abbe444379804a951004a5b12c"}], "tags": [], "created_at": "2020-11-06T18:25:30Z", "updated_at": "2020-11-06T18:25:30Z", "revision_number": 1, "project_id": "c580a8abbe444379804a951004a5b12c"}]}' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:30.338 39 INFO tempest.lib.common.rest_client [req-05b8c710-8ff7-4de6-a687-d0cd8a2082d7 ] Request (VolumesManageV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/be36d20e-ab45-4261-8039-912361f6b0d1 0.143s 2020-11-06 18:25:30.339 39 DEBUG tempest.lib.common.rest_client [req-05b8c710-8ff7-4de6-a687-d0cd8a2082d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-05b8c710-8ff7-4de6-a687-d0cd8a2082d7', 'content-length': '0', 'date': 'Fri, 06 Nov 2020 18:25:30 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/be36d20e-ab45-4261-8039-912361f6b0d1'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449 2020-11-06 18:25:30.479 39 INFO tempest.lib.common.rest_client [req-301b55b1-f69c-40ab-b1d7-7015d1d3a199 ] Request (VolumesManageV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/c580a8abbe444379804a951004a5b12c 0.140s 2020-11-06 18:25:30.480 39 DEBUG tempest.lib.common.rest_client [req-301b55b1-f69c-40ab-b1d7-7015d1d3a199 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Fri, 06 Nov 2020 18:25:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-301b55b1-f69c-40ab-b1d7-7015d1d3a199', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c580a8abbe444379804a951004a5b12c'} Body: b'' _log_request_full /root/.rally/verification/verifier-98720a70-c62d-4597-b027-6d0a85e25ff3/repo/tempest/lib/common/rest_client.py:449